03-10-2009
Quote:
Originally Posted by
avklinux
[...]How can i identify the hashing algo used by shadow file in aix box >???[...]
Help -
Quote:
The standard AIX® authentication mechanism uses a one-way hash function called crypt to authenticate users. The crypt function is a modified DES algorithm. It performs a one-way encryption of a fixed data array with the supplied password and a Salt.[...]
From AIX 6.1 on a loadable password algorithm is supported. It allows for different algorithms to be used.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have been asked to look at an AIX box that the owner (not a technical person) installed a new SCSI disk into, but cannot figure out how to build volumes or file systems on. It has been years since I messed with AIX, and I remember enough to know that it isn't like Solaris.
To make things... (1 Reply)
Discussion started by: 98_1LE
1 Replies
2. IP Networking
Hi,
I was wondering if any body out there can tell me how can I find out what is the name of the mail host on the AIX box that I am working on?
Is there any command to bring up the configuration for the mail server or mail host?
Thanks in advance. (4 Replies)
Discussion started by: Shaz
4 Replies
3. AIX
i want to move my AIX os ver 4.2.1 to a new version IBM system. how can i acheive this. (1 Reply)
Discussion started by: gmonix
1 Replies
4. Shell Programming and Scripting
I am trying to find the total CPU usage on an IBM AIX machine that could have several processors. I am using
ps uax | awk {'print $3'} to find the CPU usage columns for the processes and then adding them up to find the total CPU usage. It was doing fine. However to my surprise, I find that the... (2 Replies)
Discussion started by: asutoshch
2 Replies
5. UNIX for Dummies Questions & Answers
Hi,
I need a clarification.
Is there any difference between AIX box and Sun Solaris box?
The bzip command with -c option works in AIX box and the same does not work in Sun Solaris box.
Can anyone please explain if there is an implementation difference in both these boxes for the shell... (1 Reply)
Discussion started by: nisha4680
1 Replies
6. Linux
Hi,
How to find remote Linux box login account without login in to that box?
I don't have login account at my remote Linux box. But I need who are all having login account. How do I findout?
Thanks,
--Muthu. (3 Replies)
Discussion started by: Muthuselvan
3 Replies
7. AIX
Quick backgound. We just moved the Datacenter. I attempted to boot one of our older AIX machines backup and it stops at a 518 Error code. Which is fine I need to run fsck on the volumes. The issue is I can't find the original media with the appropriate Date that was originally installed(previous... (1 Reply)
Discussion started by: jcompguru
1 Replies
8. AIX
Hi
When I run cfgmgr -v in my aix box I get the below error :
cfgmgr: 0514-621 WARNING: The following device packages are required for
device support but are not currently installed.
devices.loopback
My oslevel is 6100-06-02-1044
Please assist.
Please use and tags when... (3 Replies)
Discussion started by: samsungsamsung
3 Replies
9. Cybersecurity
Guys, i want to securing AIX after install by scrath. Is anybody can inform about the standard port which used by AIX? (0 Replies)
Discussion started by: michlix
0 Replies
10. AIX
Hi guys...
I have got a old Aix box i.e. 7043 - 150 for home experimenting purposes. I am having some issues to setup the tcpip on it correctly, so that i can access it within the network and also from outside i.e. work.
My setup looks like this:
Modem ----> Apple airport wireless router... (2 Replies)
Discussion started by: uzair_rock
2 Replies
LEARN ABOUT PHP
hash_init
HASH_INIT(3) 1 HASH_INIT(3)
hash_init - Initialize an incremental hashing context
SYNOPSIS
resource hash_init NULL (string $algo, [int $options], [string $key])
DESCRIPTION
PARAMETERS
o $algo
- Name of selected hashing algorithm (i.e. "md5", "sha256", "haval160,4", etc..). For a list of supported algorithms see
hash_algos(3).
o $options
- Optional settings for hash generation, currently supports only one option: HASH_HMAC. When specified, the $key must be speci-
fied.
o $key
- When HASH_HMAC is specified for $options, a shared secret key to be used with the HMAC hashing method must be supplied in this
parameter.
RETURN VALUES
Returns a Hashing Context resource for use with hash_update(3), hash_update_stream(3), hash_update_file(3), and hash_final(3).
EXAMPLES
Example #1
Incremental hashing example
<?php
$ctx = hash_init('md5');
hash_update($ctx, 'The quick brown fox ');
hash_update($ctx, 'jumped over the lazy dog.');
echo hash_final($ctx);
?>
The above example will output:
5c6ffbdd40d9556b73a21e63c3e0e904
SEE ALSO
hash(3), hash_algos(3), hash_file(3), hash_hmac(3), hash_hmac_file(3).
PHP Documentation Group HASH_INIT(3)