[352] in SIPB_Linux_Development

home help back first fref pref prev next nref lref last post

kerberized tty login

daemon@ATHENA.MIT.EDU ("Mark W. Eichin")
Tue Jan 25 14:12:05 1994

Date: Tue, 25 Jan 94 14:11:36 EST
From: eichin@MIT.EDU ("Mark W. Eichin")
To: svalente@MIT.EDU
Cc: linux-dev@MIT.EDU
In-Reply-To: Salvatore Valente's message of Sun, 23 Jan 1994 11:53:43 -0500 <9401231653.AA01629@quiche-lorraine.MIT.EDU>

doing shadow passwords right shouldn't be too hard. The important
trick is to make them totally transparent -- ie. getpwent returns the
passwd field if you can read the shadow file, or "*" (ie. a "bad"
value) if not [unless there is a "real" value in /etc/passwd, in which
case it should use that....]

Setting it is a little trickier, but not much -- there's just not that
much code that does it...

home help back first fref pref prev next nref lref last post