The salt is random, or if you are trying to match an existing has, it is 
the first two characters after the Magic String, which is usually $1$.

Spencer

On Thursday 31 October 2002 02:17 am, Daniel Brown wrote:
> might crypt(3) be of use here? i dont know where one might get the
> char *salt value from...
>
>  danb
>
> (not cc-ed intentionally)
>
> On Thu, Oct 31, 2002 at 01:03:45AM -0600, Spencer Ogden wrote:
> > The perl module Crypt::PasswdMD5 seems to be what you want. It seems
> > like it might need a little tweaking.
> >
> > Spencer
> >
> > On Thursday 31 October 2002 12:22 am, Jeff Strunk wrote:
> > > ----- Forwarded message from Justin Georgeson <[EMAIL PROTECTED]>
> > > -----
> > >
> > > Since I already receive over 300 emails a day from mailing lists,
> > > and only have one question for siglinux, could you relay a question
> > > for me?
> > >
> > > I am looking for a way to generate md5 password hashes, like those
> > > that go in /etc/shadow, from the command line. Be it a perl module
> > > or what, I just want to be able to issue a single command, giving it
> > > the string to generate the hash from, and get back the has, via
> > > stdout or dumped to a file. Using passwd requires an account, and
> > > I'd rather not have a dummy account just for getting password
> > > hashes. I tried putting the string in a text file (no newline at the
> > > end) and running md5sum on it, but that didn't give the same has as
> > > in /etc/shadow. Thanks.
> >
> > _______________________________________________
> > Siglinux mailing list
> > [EMAIL PROTECTED]
> > http://www.utacm.org/mailman/listinfo/siglinux

_______________________________________________
Siglinux mailing list
[EMAIL PROTECTED]
http://www.utacm.org/mailman/listinfo/siglinux

Reply via email to