Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

crypt_bsdmd5(5) [opendarwin man page]

crypt_bsdmd5(5) 					Standards, Environments, and Macros					   crypt_bsdmd5(5)

NAME
crypt_bsdmd5 - password hashing module using MD5 message hash algorithm SYNOPSIS
/usr/lib/security/$ISA/crypt_bsdmd5.so DESCRIPTION
The crypt_bsdmd5 module is a one-way password hashing module for use with crypt(3C) that uses the MD5 message hash algorithm. The algorithm identifier for crypt.conf(4) and policy.conf(4) is 1. The output is compatible with md5crypt on BSD and Linux systems. The maximum password length for crypt_bsdmd5 is 255 characters. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |MT-Level |Safe | +-----------------------------+-----------------------------+ SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol- icy.conf(4), attributes(5) SunOS 5.10 6 Aug 2003 crypt_bsdmd5(5)

Check Out this Related Man Page

crypt_unix(5)						Standards, Environments, and Macros					     crypt_unix(5)

NAME
crypt_unix - traditional UNIX crypt algorithm DESCRIPTION
The crypt_unix algorithm is the traditional UNIX crypt algorithm. It is not considered sufficiently secure for current systems and is pro- vided for backwards compatibility. The crypt_sunmd5(5), crypt_bsdmd5(5), or crypt_bsdbf(5) algorithm should be used instead. The algorithm identifier for policy.conf(4) is __unix__. There is no entry in crypt.conf(4) for this algorithm. The crypt_unix algorithm is internal to libc and provides the string encoding function used by crypt(3C) when the first character of the salt is not a "$". This algorithm is based on a one-way encryption algorithm with variations intended (among other things) to frustrate use of hardware imple- mentations of a key search. Only the first eight characters of the key passed to crypt() are used with this algorithm; the rest are silently ignored. The salt is a two-character string chosen from the set [a-zA-Z0-9./]. This string is used to perturb the hashing algo- rithm in one of 4096 different ways. The maximum password length for crypt_unix is 8 characters. USAGE
The return value of the crypt_unix algorithm might not be portable among standard-conforming systems. See standards(5). ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |MT-Level |Safe | +-----------------------------+-----------------------------+ SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol- icy.conf(4), attributes(5), crypt_bsdbf(5), crypt_bsdmd5(5), crypt_sunmd5(5), standards(5) SunOS 5.10 6 Aug 2003 crypt_unix(5)
Man Page

7 More Discussions You Might Find Interesting

1. Programming

MD5 hash calculation

hi i want to generate MD5 hash of string in unix (hp) i have the algorithm which takes file as argument and returns hash of file but when i tried to generate hash of "a" result was "60b725f10c9c85c70d97880dfe8191b3" hash but actually it should have been "0cc175b9c0f1b6a831c399e269772661" now i... (4 Replies)
Discussion started by: zedex
4 Replies

2. Red Hat

RHLE r4 and r5

Does anyone know how to verify which hashing algorithm is used to encrypt the passwords in /etc/shadow on red hat linux enterprise systems? or what the default hash setting is? Is there a file that stores this information? (1 Reply)
Discussion started by: stevej123
1 Replies

3. UNIX for Advanced & Expert Users

password hashing algorithms

I'm collecting some info on the password hashing algorithms in use on various Unix systems. So far I have: no $ legacy unix crypt $1$ MD5 $2$ Blowfish on BSD $2a$ alternate Blowfish on BSD $md5$ Sun's alternate MD5 $3$ a Microsoft hash $4$ not used? $5$ RedHat proposed Sha-256... (2 Replies)
Discussion started by: Perderabo
2 Replies

4. UNIX for Dummies Questions & Answers

passwd -S on linux- what are the fields?

I'm looking for some documentation on what the different fields mean in the output of passwd -S username: passwd -S foo foo PS 2012-03-20 0 70 3 -1 (Password set, MD5 crypt.) I think the date given is the date of the last password change, the 0 after that is the minimum password age, and... (2 Replies)
Discussion started by: Anne Neville
2 Replies

5. UNIX for Advanced & Expert Users

Passwd file define user with special character

Hi all , The FTP user defind in my passwd file has ! in the hash password field and i want to know way is that its usually either MD5(Unix) hash or * can anyone explain to me i'm new for unix and want to learn this how my passwd file looks : ... (2 Replies)
Discussion started by: dahash11
2 Replies

6. AIX

Decrypt ssha1 password

hi to all, i have an AIX6.1 machine and i want to decrypt an ssha1 password written on /etc/security/passwd. the reason that i want to do that is because i have some complains about a few users that cannot login and receive the message for invalid login. i suspect that they are entering wrong... (15 Replies)
Discussion started by: omonoiatis9
15 Replies

7. Shell Programming and Scripting

Is there generic Encryption / Masking Tool available ?

I was using crypt command to mask and unmask my password in the script in Linux. But, I don't find crypt on SunOS mymac 5.10 Generic_150400-26 sun4v sparc sun4v Thus, my script fails. Is there a generic / more common command tool / script across Linux and Unix (most / all... (9 Replies)
Discussion started by: mohtashims
9 Replies