Sponsored Content
Top Forums Programming userpw.h AIX ( delete entry from the shadow password database ) Post 302214700 by shamrock on Monday 14th of July 2008 06:21:23 PM
Old 07-14-2008
Does your machine have the /usr/include/shadow.h file on it. The getspent() family of functions are declared in that header file and my guess is that since they are not POSIX compliant AIX excludes them.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

remove shadow password

Does anyone know how to remove a stanza in the shadow password file if the user account has already been removed on an AIX box? I know it can be done by editing the file itself but I would prefer not to do it that way. cheers gizaa (2 Replies)
Discussion started by: gizaa
2 Replies

2. UNIX for Dummies Questions & Answers

shadow file after a password reset

hi, I had to reset a lost root password by editing the /etc/passwd and /etc/shadow files ( this is a xen vm file, so i mounted and chrooted the file ) after the reboot with an empty password on root , i have set a new password with passwd but it only changed the /etc/passwd file.... (0 Replies)
Discussion started by: progressdll
0 Replies

3. Programming

/etc/shadow update password entry! ( getspent? )

Hi i just whant to update an password entry in /etc/shadow. But dosen't get it to work. Something is wrong! in this code. What i try do do is if user kalle exist in shadow. I whant it to update it's password for just that entry. #include <stdio.h> #include <errno.h> #include <stdlib.h>... (2 Replies)
Discussion started by: nighter
2 Replies

4. Solaris

hash password in shadow show 'x' ???

Hello, I want to know the reason behing the scene why some systems have hashed password in /etc/shadow file as "x" not the alienoid language like A1Dksxi3kaA.. (13 characters) As far as I understand, etc/password will show password as "x" and move all hashed password to etc/shadow.... (8 Replies)
Discussion started by: Smith
8 Replies

5. UNIX for Dummies Questions & Answers

shadow entry

In /etc/shadow ..we have all the user entries ..? Like when ever an user is created a corresponding entry is created in /etc/shadow...? (2 Replies)
Discussion started by: rachna
2 Replies

6. Solaris

Password Recovery From /etc/shadow file

Is it possible to reset a normal user password , by editing password field in /etc/shadow file? Thanks (6 Replies)
Discussion started by: ksvaisakh
6 Replies

7. UNIX for Advanced & Expert Users

/etc/shadow encrypted password

Hi I wonder whether is possible to generate enrypted passwd for some user and paste it into /etc/shadow file ? What kind of encryption is used in /etc/shadow file ? ths for help. (1 Reply)
Discussion started by: presul
1 Replies

8. Red Hat

Shadow file password policy

Today i was going through some of security guides written on linux . Under shadow file security following points were mentioned. 1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters. 2)Usernames in shadow file must satisfy to all the same rules as... (14 Replies)
Discussion started by: pinga123
14 Replies

9. Shell Programming and Scripting

Users who have never changed their password from /etc/shadow.

Hello, I have to do a script which returns users who have never changed their password from /etc/shadow. Here is what have I done and I'm not sure if it's ok. I tried to return just users who doesn;t have password set or are locked. Can be there other kind of user who never changed the... (3 Replies)
Discussion started by: catalint
3 Replies

10. How to Post in the The UNIX and Linux Forums

Help me, write a bash script to delete parent entry with all their child entry in LDAP UNIX server

Hi All, Please help me and guide me to write a bash/shell script on Linux box to delete parent entry with all their child entries. example: Parent is : ---------- dn: email=yogesh.kumar@wipro.com, o=wipro, o=in child is: ---------- dn: cn: yogesh kumar, email=yogesh.kumar@wipro.com,... (1 Reply)
Discussion started by: Chand
1 Replies
getspent(3C)															      getspent(3C)

NAME
getspnam(), getspnam_r(), getspent(), setspent(), endspent(), fgetspent() - access shadow password entries SYNOPSIS
DESCRIPTION
The routines and return a pointer to a shadow password entry. Each shadow password entry is an structure, declared in the header file, with the following members: The routine returns a pointer to a structure containing an entry from the shadow password database with a matching The routine is similar to except that it does not work on systems which have been converted to trusted mode, and it has three extra parame- ters. updates the structure pointed to by and returns a pointer to that structure. Storage referenced by the structure pointed to by is allocated from the memory provided with the parameter, which is in size. A buffer length of 2048 is recommended. The initial call to returns a pointer to the first structure. Subsequent calls return pointers to successive structures. Repeated calls to can be used to search all entries in the password database. The routine searches password entries from beginning to end, until a login name matching name is found, and returns a pointer to that entry. The routine is used to reset access to the shadow password entries. After is called, the subsequent call to returns the first shadow pass- word entry. This mechanism is used to allow repeated searches of the shadow password entries. The routine is used to indicate that process- ing of password entries is complete. unlike the other functions above, does not use and does not access NIS. It returns a pointer to the next structure in the standard I/O stream. The I/O stream should be open for reading and its contents should match the format of Notes Shadow password entries normally reside in However, there are two exceptions to this. On a standard system with no file, the password and aging information is obtained from and translated into an structure. If the system has been converted to a trusted system, the password and aging information is obtained from the Protected Password Database and translated into an structure. If the fields corresponding to or are not specified in the entry, they default to If the returned value of or is then the feature associ- ated with that field is considered to be disabled. The routines and depend on the configuration of the file. See nsswitch.conf(4). Entries may reside in any repository specified in These routines use the switch for the database; for example, an entry in would contain Programs using these routines must be compiled with APPLICATION USAGE
In a multithreaded application on standard systems, and are thread-safe, but not async-cancel-safe. A cancellation point may occur when a thread is executing any of these interfaces. On systems which have been converted to trusted mode, only is thread-safe. RETURN VALUE
If an EOF or error is encountered while reading, and return a pointer. Otherwise, the return value points to a valid structure. In the case of and the structure resides in an internal area. In the case of the structure resides in the structure pointed to by the argument. WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality. FILES
system password file. shadow password file. protected password database, for trusted systems. SEE ALSO
getpwent(3C), getprpwent(3), nsswitch.conf(4), passwd(4), shadow(4). STANDARDS CONFORMANCE
: SVID3 getspent(3C)
All times are GMT -4. The time now is 04:48 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy