crypt_bsdbf(5) Standards, Environments, and Macros crypt_bsdbf(5)NAME
crypt_bsdbf - password hashing module using Blowfish cryptographic algorithm
SYNOPSIS
/usr/lib/security/$ISA/crypt_bsdbf.so
DESCRIPTION
The crypt_bsdbf module is a one-way password hashing module for use with crypt(3C) that uses the Blowfish cryptographic algorithm. The
algorithm identifier for crypt.conf(4) and policy.conf(4) is 2a.
The maximum password length for crypt_bsdbf is 255 characters.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|MT-Level |Safe |
+-----------------------------+-----------------------------+
SEE ALSO passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol-
icy.conf(4), attributes(5)SunOS 5.10 6 Aug 2003 crypt_bsdbf(5)
Check Out this Related Man Page
crypt_bsdbf(5) Standards, Environments, and Macros crypt_bsdbf(5)NAME
crypt_bsdbf - password hashing module using Blowfish cryptographic algorithm
SYNOPSIS
/usr/lib/security/$ISA/crypt_bsdbf.so
DESCRIPTION
The crypt_bsdbf module is a one-way password hashing module for use with crypt(3C) that uses the Blowfish cryptographic algorithm. The
algorithm identifier for crypt.conf(4) and policy.conf(4) is 2a.
The maximum password length for crypt_bsdbf is 255 characters.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|MT-Level |Safe |
+-----------------------------+-----------------------------+
SEE ALSO passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol-
icy.conf(4), attributes(5)SunOS 5.11 6 Aug 2003 crypt_bsdbf(5)
I'm trying to make this work, and it half works. Accounts with password hashes matching the old crypt(3) algorithm work just fine:
JUpfW/w6jo6aw
But accounts with longer password hashes preceded by $1$, such as the following, do not work:
$1$iIcbppdP$HDyjJeVMGgJ.ovLsnjtTR.... (0 Replies)
Can someone please help here on how to reset a T1 lom password? I have tried the JP13 an try to find lom.conf in scadm dir but lom.conf is not on the machine ,some help thanks (1 Reply)
This is the source code:
#include <pwd.h>
#include <iostream>
#include <string.h>
using namespace std;
int main()
{
struct passwd *user;
char login="alex", password="qwertyuiop";
if ((user= getpwnam(login)) == NULL)
cout << "No such user\n";
else if... (24 Replies)
Hello,
I'm having an issue with my password hashing. In /etc/shadow all the passwords hashes start with $1$. The security people want me to change it so the password hash starts with $5$ or $6$. So this is what I did to fix this.
I changed CRYPT_DEFAULT for 1 to 6
CRYPT_DEFAULT=6When I create a... (0 Replies)
Hello, I have an AIX 6.1 machine and a few months ago i changed the default password algorithm to ssha1 after suggestions of our security department that it is a more secure algorithm to encrypt passwords rather than standard AIX algorithm. I noticed that i am having some problems every now and... (0 Replies)