Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

crypt_bsdbf(5) [osx man page]

crypt_bsdbf(5)						Standards, Environments, and Macros					    crypt_bsdbf(5)

NAME
crypt_bsdbf - password hashing module using Blowfish cryptographic algorithm SYNOPSIS
/usr/lib/security/$ISA/crypt_bsdbf.so DESCRIPTION
The crypt_bsdbf module is a one-way password hashing module for use with crypt(3C) that uses the Blowfish cryptographic algorithm. The algorithm identifier for crypt.conf(4) and policy.conf(4) is 2a. The maximum password length for crypt_bsdbf is 255 characters. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |MT-Level |Safe | +-----------------------------+-----------------------------+ SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol- icy.conf(4), attributes(5) SunOS 5.10 6 Aug 2003 crypt_bsdbf(5)

Check Out this Related Man Page

crypt_bsdbf(5)						Standards, Environments, and Macros					    crypt_bsdbf(5)

NAME
crypt_bsdbf - password hashing module using Blowfish cryptographic algorithm SYNOPSIS
/usr/lib/security/$ISA/crypt_bsdbf.so DESCRIPTION
The crypt_bsdbf module is a one-way password hashing module for use with crypt(3C) that uses the Blowfish cryptographic algorithm. The algorithm identifier for crypt.conf(4) and policy.conf(4) is 2a. The maximum password length for crypt_bsdbf is 255 characters. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |MT-Level |Safe | +-----------------------------+-----------------------------+ SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol- icy.conf(4), attributes(5) SunOS 5.10 6 Aug 2003 crypt_bsdbf(5)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Converting freebsd (5.2.1) master.passwd to Debian shadow

I'm trying to make this work, and it half works. Accounts with password hashes matching the old crypt(3) algorithm work just fine: JUpfW/w6jo6aw But accounts with longer password hashes preceded by $1$, such as the following, do not work: $1$iIcbppdP$HDyjJeVMGgJ.ovLsnjtTR.... (0 Replies)
Discussion started by: davidstvz
0 Replies

2. Solaris

help reset netra T1 lom admin password

Can someone please help here on how to reset a T1 lom password? I have tried the JP13 an try to find lom.conf in scadm dir but lom.conf is not on the machine ,some help thanks (1 Reply)
Discussion started by: rafise
1 Replies

3. Programming

C++ - Problem in asking and checking user's passwd

This is the source code: #include <pwd.h> #include <iostream> #include <string.h> using namespace std; int main() { struct passwd *user; char login="alex", password="qwertyuiop"; if ((user= getpwnam(login)) == NULL) cout << "No such user\n"; else if... (24 Replies)
Discussion started by: hakermania
24 Replies

4. Solaris

[solved] Password hashing

Hello, I'm having an issue with my password hashing. In /etc/shadow all the passwords hashes start with $1$. The security people want me to change it so the password hash starts with $5$ or $6$. So this is what I did to fix this. I changed CRYPT_DEFAULT for 1 to 6 CRYPT_DEFAULT=6When I create a... (0 Replies)
Discussion started by: bitlord
0 Replies

5. AIX

Problem with password algorithm ssha1

Hello, I have an AIX 6.1 machine and a few months ago i changed the default password algorithm to ssha1 after suggestions of our security department that it is a more secure algorithm to encrypt passwords rather than standard AIX algorithm. I noticed that i am having some problems every now and... (0 Replies)
Discussion started by: omonoiatis9
0 Replies