0
0
Fork 0
mirror of https://github.com/matrix-construct/construct synced 2024-12-25 15:04:10 +01:00
construct/tools
2018-07-03 14:35:10 -07:00
..
appveyor-build.sh tools: Move appveyor-build script to tools. 2018-06-15 23:50:15 -06:00
boostrap.sh tools/boostrap: Add a bjam --clean here to ensure reconfigure update. 2018-05-22 16:24:11 -07:00
buildjs.sh configure/tools: Derive number of make jobs for buildjs.sh. 2018-07-03 14:35:10 -07:00
buildrocks.sh tools/buildrocks: Detect number of processors to set make job count. 2018-06-14 19:44:18 -06:00
doxygen.conf tools/doxygen.conf: Callgraphs look pretty but, no. 2018-05-21 02:35:57 -07:00
genssl.in Just use 4k RSA certificates while at it 2013-11-19 00:59:08 +01:00
Makefile.am What is the Matrix? Control. 2017-03-10 17:51:18 -08:00
mkfingerprint.cc Convert IRCd to C++ 2016-07-22 19:46:27 -07:00
mkpasswd.cc Fix error on GCC-6 platform 2016-08-20 19:30:33 -07:00
README.mkpasswd mkpasswd: improve help and remove DES support. 2016-03-21 09:12:59 -05:00
smoketest.sh smoketest: Remove race conditions causing occasional test failures. 2014-06-12 23:43:05 +02:00
synapse.db.py tools: Add very preliminary synapse db dump tool. 2017-11-30 11:23:43 -08:00

mkpasswd.c documentation

This is documentation for the updated mkpasswd.c included with a number
of ircd, irc services, and non-IRC related programs

This version of mkpasswd can create Blowfish, MD5, SHA256, and SHA512 crypted
passwords, with either randomly generated or user provided salts.  

Options:
-x Generate a SHA256 password
-y Generate a SHA512 password
-m Generate an MD5 password
-b Generate a Blowfish password
-l Specify a length for a random MD5 or Blowfish salt
-r Specify a number of rounds for a Blowfish password
   Default 4, no more than 6 recommended
-s Specify a salt, up to 16 for MD5, SHA256, and SHA512
   up to 22 for Blowfish
-p Specify a plaintext password to use
-? Get brief help
-h Get extended help

Without the presence of any parameters, it'll generate a SHA512 hash with a
randomly generated salt and prompting for the password (without echo).

An MD5, SHA256, and SHA512 salt consists of up to 16 alphanumeric characters
(plus '.' and '/'), such as 'tGd' or 'J6d4dfG'.

A Blowfish salt consists of up to 22 alphanumeric characters (plus '.' and
'/').  Blowfish also specifies a number of rounds*, by default 4.

Blowfish may not always be available, but MD5, SHA256, and SHA512 are
guaranteed to be.

This program should work anywhere Charybdis does; if you find otherwise, file
a bug.

 * Blowfish's rounds parameter is a logarithm, not an integer value