1crypt.conf(4)                    File Formats                    crypt.conf(4)
2
3
4

NAME

6       crypt.conf - configuration file for pluggable crypt modules
7

SYNOPSIS

9       /etc/security/crypt.conf
10
11

DESCRIPTION

13       crypt.conf  is the configuration file for the pluggable crypt architec‐
14       ture.  Each crypt module must provide a function to generate a password
15       hash,  crypt_genhash_impl(3C),  and  a  function  to generate the salt,
16       crypt_gensalt_impl(3C).
17
18
19       There must be at least one entry in crypt.conf with the same name as is
20       stored  in the crypt_algorithm_magic symbol of the module. The documen‐
21       tation provided with the module should list this name.
22
23
24       The module_path field specifies the  path  name  to  a  shared  library
25       object  that implements crypt_genhash_impl(), crypt_gensalt_impl(), and
26       crypt_algorithm_magic.  If the path name is not absolute, it is assumed
27       to  be  relative  to /usr/lib/security/$ISA.  If the path name contains
28       the $ISA token, the token  is  replaced  by  an  implementation-defined
29       directory  name that defines the path relative to the calling program's
30       instruction set architecture.
31
32
33       The params field is used to pass module-specific options to the  shared
34       objects.  See crypt_genhash_impl(3C) and crypt_gensalt_impl(3C).  It is
35       the responsibility of the module to parse and  interpret  the  options.
36       The  params field can be used by the modules to turn on debugging or to
37       pass any module-specific parameters that  control  the  output  of  the
38       hashing algorithm.
39

EXAMPLES

41       Example 1 Provide compatibility for md5crypt-generated passwords.
42
43
44       The  default  configuration  preserves  previous Solaris behavior while
45       adding compatibility for md5crypt-generated passwords  as  provided  on
46       some BSD and Linux systems.
47
48
49         #
50         # crypt.conf
51         #
52         1 /usr/lib/security/$ISA/crypt_bsdmd5.so
53
54
55       Example  2  Use  md5crypt  to  demonstrate  compatibility with BSD- and
56       Linux-based systems.
57
58
59       The following example lists 4 algorithms and demonstrates how  compati‐
60       bility  with BSD- and Linux-based systems using md5crypt is made avail‐
61       able, using the algorithm names 1 and 2.
62
63
64         #
65         # crypt.conf
66         #
67         md5 /usr/lib/security/$ISA/crypt_md5.so
68         rot13 /usr/lib/security/$ISA/crypt_rot13.so
69
70         # For *BSD/Linux compatibilty
71         # 1 is md5,  2 is Blowfish
72         1 /usr/lib/security/$ISA/crypt_bsdmd5.so
73         2 /usr/lib/security/$ISA/crypt_bsdbf.so
74
75

ATTRIBUTES

77       See attributes(5) for descriptions of the following attributes:
78
79
80
81
82       ┌─────────────────────────────┬─────────────────────────────┐
83       │      ATTRIBUTE TYPE         │      ATTRIBUTE VALUE        │
84       ├─────────────────────────────┼─────────────────────────────┤
85       │Interface Stability          │Evolving                     │
86       └─────────────────────────────┴─────────────────────────────┘
87

SEE ALSO

89       passwd(1),   crypt(3C),   crypt_genhash_impl(3C),    crypt_gensalt(3C),
90       crypt_gensalt_impl(3C),  getpassphrase(3C),  passwd(4),  attributes(5),
91       crypt_unix(5)
92
93
94
95SunOS 5.11                        10 Jun 2002                    crypt.conf(4)
Impressum