09-24-2010
Switch to something newer than the crypt algorithm.
Supported algorithms are listed in /etc/security/crypt.conf
To change the default one, modify the "CRYPT_DEFAULT=xxx" line in /etc/security/policy.conf
10 More Discussions You Might Find Interesting
1. Solaris
How to set passwd history feature in Solaris 8 to stop users from using their old passwords? (4 Replies)
Discussion started by: amoorti
4 Replies
2. Solaris
Now I face a problem in changing the NIS passwd,I have no idea,want you to help me!
Today I add some user in the NIS master server ,I "vi" /etc/passwd &/etc/shadow,add user account and password by hand(shadow----no password ,only eight ":").
when finsh,I login ,system told me to input a password... (3 Replies)
Discussion started by: dlsjm
3 Replies
3. UNIX for Dummies Questions & Answers
Hello chiefs :)
I have a SUN Enterprise 250, running Solaris 8.5 - I have managed to be able to connect a dumb terminal to the box via a standard straight-through rj45 cable, to my ibm laptop. OK so Putty can connect to the box via ssh - nice! But I dont have the password for root - or any... (1 Reply)
Discussion started by: congo
1 Replies
4. UNIX for Advanced & Expert Users
i'm trying to change passwd remotely in unix (solaris) and tried using "expect" but it is not working.
Any ideas to change the passwd remotely using a shell script? (1 Reply)
Discussion started by: pharos467
1 Replies
5. Solaris
Dear all,
One one of the systems running solaris 8 the oracle account has a issue when trying to set the passwd. Following is what i get when the passwd command is executed.
:/opt/oracle> passwd
Enter existing login password:
System configuration error. Please contact your administrator.... (1 Reply)
Discussion started by: earlysame55
1 Replies
6. Emergency UNIX and Linux Support
on Runnning passwd command on HPUX 11.23
I am getting
pam_chauthtok: Shared object load failure.
Pls help ... (13 Replies)
Discussion started by: ultimatix
13 Replies
7. Solaris
I have turned off PermitEmptyPasswords in sshd_config, but a user with empty passwd (deleted by passwd -d user) can still login without password, why? it is big security concern, linux doesn't have the issue.
$ uname -a
SunOS 5.10 Generic_118855-14 i86pc i386 i86pc
... (8 Replies)
Discussion started by: honglus
8 Replies
8. Programming
This is the source code:
#include <pwd.h>
#include <iostream>
#include <string.h>
using namespace std;
int main()
{
struct passwd *user;
char login="alex", password="qwertyuiop";
if ((user= getpwnam(login)) == NULL)
cout << "No such user\n";
else if... (24 Replies)
Discussion started by: hakermania
24 Replies
9. Solaris
Hello all,
Since Solaris passwd does not have --stdin option can you advise how to change the password for 30 users with a script. The password can be the same one. I`ve tried already echoing, xargs, cat and similar.
Thanks.
---------- Post updated at 04:04 AM ---------- Previous update... (0 Replies)
Discussion started by: click
0 Replies
10. Solaris
Hello
I am trying to monitor when a user account gets added to my solaris server.
Does anyone know how I can set up an snmptrap for changes in the /etc/passwd file ? (4 Replies)
Discussion started by: prince2010
4 Replies
LEARN ABOUT OSX
crypt_gensalt
crypt_gensalt(3C) Standard C Library Functions crypt_gensalt(3C)
NAME
crypt_gensalt - generate salt string for string encoding
SYNOPSIS
#include <crypt.h>
char *crypt_gensalt(const char *oldsalt, const struct passwd *userinfo);
DESCRIPTION
The crypt_gensalt() function generates the salt string required by crypt(3C).
If oldsalt is NULL, crypt_gensalt() uses the algorithm defined by CRYPT_DEFAULT in /etc/security/policy.conf. See policy.conf(4).
If oldsalt is non-null, crypt_gensalt() determines if the algorithm specified by oldsalt is allowable by checking the CRYPT_ALGO-
RITHMS_ALLOW and CRYPT_ALGORITHMS_DEPRECATE variables in /etc/security/policy.conf. If the algorithm is allowed, crypt_gensalt() loads the
appropriate shared library and calls crypt_gensalt_impl(3C). If the algorithm is not allowed or there is no entry for it in crypt.conf,
crypt_gensalt() uses the default algorithm.
The mechanism just described provides a means to migrate users to new password hashing algorithms when the password is changed.
RETURN VALUES
Upon successful completion, crypt_gensalt() returns a pointer to the new salt. Otherwise a null pointer is returned and errno is set to
indicate the error.
ERRORS
The crypt_gensalt() function will fail if:
EINVAL The configuration file crypt.conf contains an invalid entry.
ELIBACC The required shared library was not found.
ENOMEM There is insufficient memory to perform hashing.
USAGE
The value returned by crypt_gensalt() points to a null-terminated string. The caller of crypt_gensalt() is responsible for calling
free(3C).
Applications dealing with user authentication and password changing should not call crypt_gensalt() directly but should instead call the
appropriate pam(3PAM) functions.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
|MT-Level |MT-Safe |
+-----------------------------+-----------------------------+
SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt_impl(3C), getpassphrase(3C), malloc(3C), pam(3PAM), crypt.conf(4), passwd(4),
policy.conf(4), attributes(5)
SunOS 5.10 10 Jun 2002 crypt_gensalt(3C)