Updated: October 28, 2024 |
Create entries for QNX Neutrino shadow files
mkshadow -u username [-d hash] [-e expiry] [-I inactivity] [-i iteration] [-k KDF] [-l last_change] [-m min_age] [-o path] [-P prompt] [-p password] [-s salt] [-u username] [-v verbosity] [-w warning] [-x max_age]
Linux, Mac, Microsoft Windows
Supported values: sha256, sha512 (the default).
Example: 2029-12-31T23:59:59
Supported value: pbkdf2 (the default).
Example: 2019-08-27T09:30:00
Example: C53253F1E9FCC1B5A90DA6A0A3E9A11C
For information on the individual fields in a shadow file, see /etc/shadow in the QNX Neutrino User's Guide.
The mkshadow host-side utility is used to create entries for QNX Neutrino shadow files.
By default, mkshadow creates a shadow file entry with the password disabled, which prevents users from logging into the account using a password. To set the password for an account, use either -p or -P.
Create a shadow file entry for the user qnxuser. Because no password options are specified, the password is disabled for this user:
mkshadow -u qnxuser
Create a shadow file entry with the password qnxuser:
mkshadow -u qnxuser -p qnxuser
Create a shadow file entry with a password that is specified by prompting the user for a value:
mkshadow -u qnxuser -P Password: Confirm Password:
Create a shadow file entry whose password hash is stretched to 8192 iterations (instead of the default 4096 iterations):
mkshadow -u qnxuser -p qnxuser -i 8192
Create a shadow file entry with the custom cryptographic salt 9BBA04C71AC554C5CEB08FF237BC93AB:
mkshadow -u qnxuser -p qnxuser -s 9BBA04C71AC554C5CEB08FF237BC93AB