]> jfr.im git - solanum.git/blame_incremental - tools/README.mkpasswd
chmode: Get elevated access for op-only queries
[solanum.git] / tools / README.mkpasswd
... / ...
CommitLineData
1mkpasswd.c documentation
2
3This is documentation for the updated mkpasswd.c included with a number
4of ircd, irc services, and non-IRC related programs
5
6This version of mkpasswd can create Blowfish, MD5, SHA256, and SHA512 crypted
7passwords, with either randomly generated or user provided salts.
8
9Options:
10-x Generate a SHA256 password
11-y Generate a SHA512 password
12-m Generate an MD5 password
13-b Generate a Blowfish password
14-l Specify a length for a random MD5 or Blowfish salt
15-r Specify a number of rounds for a Blowfish password
16 Default 4, no more than 6 recommended
17-s Specify a salt, up to 16 for MD5, SHA256, and SHA512
18 up to 22 for Blowfish
19-p Specify a plaintext password to use
20-? Get brief help
21-h Get extended help
22
23Without the presence of any parameters, it'll generate a SHA512 hash with a
24randomly generated salt and prompting for the password (without echo).
25
26An MD5, SHA256, and SHA512 salt consists of up to 16 alphanumeric characters
27(plus '.' and '/'), such as 'tGd' or 'J6d4dfG'.
28
29A Blowfish salt consists of up to 22 alphanumeric characters (plus '.' and
30'/'). Blowfish also specifies a number of rounds*, by default 4.
31
32Blowfish may not always be available, but MD5, SHA256, and SHA512 are
33guaranteed to be.
34
35This program should work anywhere Solanum does; if you find otherwise, file
36a bug.
37
38 * Blowfish's rounds parameter is a logarithm, not an integer value