Sponsored Content
Full Discussion: Shadow Passwords
Top Forums Programming Shadow Passwords Post 302091284 by Perderabo on Sunday 1st of October 2006 03:21:43 AM
Old 10-01-2006
Quote:
Originally Posted by nathan
In my experience at work, our HP-UX systems don't shadow the password at all.
You can download a shadow password package for HP-UX 11i here: HP-UX Shadow Passwords. Shadow passwords are a standard feature starting with HP-UX 11i Version 2 as mentioned in the Release Notes.
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Shadow

Can some one explain to me how to disable the Shadow file or disconnect it from the passwd file. I am trying to configure a UNIX SCO box to use NIS and it continues to look at its own Shadow file. Thanks (5 Replies)
Discussion started by: mokie44
5 Replies

2. UNIX for Dummies Questions & Answers

shadow file

Sirs, What is a shadow file,How it be usefull.For my project i have to keep the password in shawdow file also i am doing in php how can i do it. Thanks in advance, ArunKumar (3 Replies)
Discussion started by: arunkumar_mca
3 Replies

3. Solaris

Passwords in /etc/shadow file

I want to import my passwd/shadow files from Solaris 6 to Solaris 10. I found that the encryption method for passwords has changed. Is there a command or script to convert the Solaris 6 passwords to Solaris 10? I have searched the net and just can't seem to find the answer. For Example: The... (6 Replies)
Discussion started by: westsiderick
6 Replies

4. UNIX for Advanced & Expert Users

/etc/shadow file....

Does anyone know what "!!" represents in the password field of the /etc/shadow file? :confused: (6 Replies)
Discussion started by: avcert1998
6 Replies

5. UNIX for Dummies Questions & Answers

'!!' in /etc/shadow

I notice there are '*'s and '!!'s in my /etc/shadow file. And I know these are for preventing login. But what are the differences among '*', '!' and '!!' ? THX! mail:*:14789:0:99999:7::: uucp:*:14789:0:99999:7::: ... dbus:!!:14919:::::: rpc:!!:14919:0:99999:7::: ...... (4 Replies)
Discussion started by: vistastar
4 Replies

6. Cybersecurity

Cracking complex passwords (/etc/shadow)

I'm doing some labs regarding password cracking on Linux machines. I took the shadow file from one of my virtual machines and it looks like below: bruno:$1$mrVjnhtj$bg47WvwLXN4bZrUNCf1Lh.:14019:0:99999:7::: From my understanding the most important piece regarding password cracking on linux... (1 Reply)
Discussion started by: bcaseiro
1 Replies

7. UNIX for Advanced & Expert Users

When did UNIX start using encrypted passwords, and not displaying passwords when you type them in?

I've been using various versions of UNIX and Linux since 1993, and I've never run across one that showed your password as you type it in when you log in, or one that stored passwords in plain text rather than encrypted. I'm writing a script for work for a security audit, and two of the... (5 Replies)
Discussion started by: Anne Neville
5 Replies

8. UNIX for Advanced & Expert Users

Need a help with /etc/shadow

Hi, I wanna see the content of the file /etc/shadow.. But i don't have the permission and also the root permission. Still is it possible to view it??? Any tricks?? (5 Replies)
Discussion started by: Adhi
5 Replies
getspent(3C)															      getspent(3C)

NAME
getspnam(), getspnam_r(), getspent(), setspent(), endspent(), fgetspent() - access shadow password entries SYNOPSIS
DESCRIPTION
The routines and return a pointer to a shadow password entry. Each shadow password entry is an structure, declared in the header file, with the following members: The routine returns a pointer to a structure containing an entry from the shadow password database with a matching The routine is similar to except that it does not work on systems which have been converted to trusted mode, and it has three extra parame- ters. updates the structure pointed to by and returns a pointer to that structure. Storage referenced by the structure pointed to by is allocated from the memory provided with the parameter, which is in size. A buffer length of 2048 is recommended. The initial call to returns a pointer to the first structure. Subsequent calls return pointers to successive structures. Repeated calls to can be used to search all entries in the password database. The routine searches password entries from beginning to end, until a login name matching name is found, and returns a pointer to that entry. The routine is used to reset access to the shadow password entries. After is called, the subsequent call to returns the first shadow pass- word entry. This mechanism is used to allow repeated searches of the shadow password entries. The routine is used to indicate that process- ing of password entries is complete. unlike the other functions above, does not use and does not access NIS. It returns a pointer to the next structure in the standard I/O stream. The I/O stream should be open for reading and its contents should match the format of Notes Shadow password entries normally reside in However, there are two exceptions to this. On a standard system with no file, the password and aging information is obtained from and translated into an structure. If the system has been converted to a trusted system, the password and aging information is obtained from the Protected Password Database and translated into an structure. If the fields corresponding to or are not specified in the entry, they default to If the returned value of or is then the feature associ- ated with that field is considered to be disabled. The routines and depend on the configuration of the file. See nsswitch.conf(4). Entries may reside in any repository specified in These routines use the switch for the database; for example, an entry in would contain Programs using these routines must be compiled with APPLICATION USAGE
In a multithreaded application on standard systems, and are thread-safe, but not async-cancel-safe. A cancellation point may occur when a thread is executing any of these interfaces. On systems which have been converted to trusted mode, only is thread-safe. RETURN VALUE
If an EOF or error is encountered while reading, and return a pointer. Otherwise, the return value points to a valid structure. In the case of and the structure resides in an internal area. In the case of the structure resides in the structure pointed to by the argument. WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality. FILES
system password file. shadow password file. protected password database, for trusted systems. SEE ALSO
getpwent(3C), getprpwent(3), nsswitch.conf(4), passwd(4), shadow(4). STANDARDS CONFORMANCE
: SVID3 getspent(3C)
All times are GMT -4. The time now is 09:40 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy