=pod =head1 NAME passwd - compute password hashes =head1 SYNOPSIS B [B<-help>] [B<-crypt>] [B<-1>] [B<-apr1>] [B<-aixmd5>] [B<-5>] [B<-6>] [B<-salt> I] [B<-in> I] [B<-stdin>] [B<-noverify>] [B<-quiet>] [B<-table>] {I} =head1 DESCRIPTION The B command computes the hash of a password typed at run-time or the hash of each password in a list. The password list is taken from the named file for option B<-in file>, from stdin for option B<-stdin>, or from the command line, or from the terminal otherwise. The Unix standard algorithm B and the MD5-based BSD password algorithm B<1>, its Apache variant B, and its AIX variant are available. =head1 OPTIONS =over 4 =item B<-help> Print out a usage message. =item B<-crypt> Use the B algorithm (default). =item B<-1> Use the MD5 based BSD password algorithm B<1>. =item B<-apr1> Use the B algorithm (Apache variant of the BSD algorithm). =item B<-aixmd5> Use the B algorithm (AIX variant of the BSD algorithm). =item B<-5> =item B<-6> Use the B / B based algorithms defined by Ulrich Drepper. See L. =item B<-salt> I Use the specified salt. When reading a password from the terminal, this implies B<-noverify>. =item B<-in> I Read passwords from I. =item B<-stdin> Read passwords from B. =item B<-noverify> Don't verify when reading a password from the terminal. =item B<-quiet> Don't output warnings when passwords given at the command line are truncated. =item B<-table> In the output list, prepend the cleartext password and a TAB character to each password hash. =back =head1 EXAMPLES B prints B. B prints B<$1$xxxxxxxx$UYCIxa628.9qXjpQCjM4a.>. B prints B<$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0>. B prints B. =head1 COPYRIGHT Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved. Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at L. =cut