Digging into the PAM configuration for the supported #Linux crypt #password hashes.
libxcrypt supports scrypt, yescrypt, and gost-yescrypt, among others.
PAM has a "rounds=n" option specifying the CPU cost. But scrypt, yescrypt, and gost-yescrypt are CPU and RAM intensive. How do you set the other params?
yescrypt handles it for you:
if rounds==0 {
rounds=5
} else if rounds>11 {
return ERROR
} else if rounds<3 {
N=2^(rounds+9)
r=8
p=1
} else {
N=2^(rounds+7)
r=32
p=1
}
I alternate between these terminal utilities: pwgen, mkpasswd, xkcdpass, diceware, makepasswd.
What I should do when I get bored enough is write a wrapper script that randomly picks one of these utilities to generate a password of the same format.
Or have each utility generate 1 each.
@UncleIroh However, you might also enjoy this Gist. I need to update it as I have some more approaches to shell-based password generators.
https://gist.github.com/atoponce/b542807f389d5af54b2102e7ccdffd95
@UncleIroh Note that mkpasswd(1) makes password hashes, rather than generating passwords.