I might know the answer to this, but I just want to see if any of you know any work arounds before I go and re-write the whole thing.
I have a script as follow:
$ cat testing
#! /usr/bin/ksh
f ()
{
echo "Type \"y\" \c"
read value
if ;
then
... (1 Reply)
Hi ,
I am getting the below error if i am trying to set the passwd of a user:
New password:
Password cannot be circular shift of logonid.
is there a way thru which i can set the passwd of the user same as the username.
Thanks & regards,
Sagar. (2 Replies)
I have about 20 different variables that I need to check for null values then replace with a specific string if they are null. I've been doing this via 20 different if then statements like this:
if ; then
WIND="UUU"
fi
Is there a more elegant way to do this? The vars aren't sequential in... (6 Replies)
I have an event log which is a circular file. I would like to be able to see real-time updates of that event log. Kind of the equivalent of a 'tail -f'. But obviously 'tail -f' won't work if my circular file has already cycled over. Any ideas as to how I can do this? Let me know if I am clear.... (10 Replies)
hi all,
i need a c++ function which converts a linear list to circular.
presently i am working with two files. i.e., one linear list file. and one circular list file to do some operations. i thought it will be helpful if there is a function that converts a linear list to circular n undo the... (1 Reply)
I have box created with filewatch job as the first job follwed by 2 other jobs . For the time period of 8:00 am to 8:00 pm,we can get files anytime , with out any restriction on the number of times we get the file.
So for this I need to make this box work in circular fashion i.e. once the box... (5 Replies)
Hi Experts,
I am checking how to get day in Perl.
If it is “Monday” I need to process…below is the pseudo code.
Can you please prove the code for below condition.
if (today=="Monday" )
{
while (current_time LESS THAN 9:01 AM)
... (1 Reply)
I have modified a script to do a circular DNS look up.
The theory is this
for a given subnet build a range if IP's
do a reverse look up on those IP's
take the output of the reverse look up then and do a forward look up
If the returns match up give a good status
If not return a fail... (1 Reply)
Hi Help,
I am trying to create something like ---
Suppose, I have grid origin at X=600000.0 & Y=90000.0.
For any values of X, Y values lying within a circular periphery defined by circle of radius R=500m;X=599500.0 & 600500.0 ;Y=90500.0 & 89500.0should have a default=0or else it should... (4 Replies)
Hello,
I think there's an easier way to do this but can't seem to recall but given an array of animals and an initial value is a random index in the array, here it's 3.
3,4,5,4,3,2,1,0,1,2,3,4,5,4,3,2,1,0... inifinite repeat
a quick brute force solution i came up with was two functions, i... (6 Replies)
Discussion started by: f77hack
6 Replies
LEARN ABOUT DEBIAN
crypt_unix
crypt_unix(5) Standards, Environments, and Macros crypt_unix(5)NAME
crypt_unix - traditional UNIX crypt algorithm
DESCRIPTION
The crypt_unix algorithm is the traditional UNIX crypt algorithm. It is not considered sufficiently secure for current systems and is pro-
vided for backwards compatibility. The crypt_sunmd5(5), crypt_bsdmd5(5), or crypt_bsdbf(5) algorithm should be used instead.
The algorithm identifier for policy.conf(4) is __unix__. There is no entry in crypt.conf(4) for this algorithm.
The crypt_unix algorithm is internal to libc and provides the string encoding function used by crypt(3C) when the first character of the
salt is not a "$".
This algorithm is based on a one-way encryption algorithm with variations intended (among other things) to frustrate use of hardware imple-
mentations of a key search. Only the first eight characters of the key passed to crypt() are used with this algorithm; the rest are
silently ignored. The salt is a two-character string chosen from the set [a-zA-Z0-9./]. This string is used to perturb the hashing algo-
rithm in one of 4096 different ways.
The maximum password length for crypt_unix is 8 characters.
USAGE
The return value of the crypt_unix algorithm might not be portable among standard-conforming systems. See standards(5).
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|MT-Level |Safe |
+-----------------------------+-----------------------------+
SEE ALSO passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol-
icy.conf(4), attributes(5), crypt_bsdbf(5), crypt_bsdmd5(5), crypt_sunmd5(5), standards(5)SunOS 5.10 6 Aug 2003 crypt_unix(5)