1crypt.conf(4) File Formats crypt.conf(4)
2
3
4
6 crypt.conf - configuration file for pluggable crypt modules
7
9 /etc/security/crypt.conf
10
11
13 crypt.conf is the configuration file for the pluggable crypt architec‐
14 ture. Each crypt module must provide a function to generate a password
15 hash, crypt_genhash_impl(3C), and a function to generate the salt,
16 crypt_gensalt_impl(3C).
17
18
19 There must be at least one entry in crypt.conf with the same name as is
20 stored in the crypt_algorithm_magic symbol of the module. The documen‐
21 tation provided with the module should list this name.
22
23
24 The module_path field specifies the path name to a shared library
25 object that implements crypt_genhash_impl(), crypt_gensalt_impl(), and
26 crypt_algorithm_magic. If the path name is not absolute, it is assumed
27 to be relative to /usr/lib/security/$ISA. If the path name contains
28 the $ISA token, the token is replaced by an implementation-defined
29 directory name that defines the path relative to the calling program's
30 instruction set architecture.
31
32
33 The params field is used to pass module-specific options to the shared
34 objects. See crypt_genhash_impl(3C) and crypt_gensalt_impl(3C). It is
35 the responsibility of the module to parse and interpret the options.
36 The params field can be used by the modules to turn on debugging or to
37 pass any module-specific parameters that control the output of the
38 hashing algorithm.
39
41 Example 1 Provide compatibility for md5crypt-generated passwords.
42
43
44 The default configuration preserves previous Solaris behavior while
45 adding compatibility for md5crypt-generated passwords as provided on
46 some BSD and Linux systems.
47
48
49 #
50 # crypt.conf
51 #
52 1 /usr/lib/security/$ISA/crypt_bsdmd5.so
53
54
55 Example 2 Use md5crypt to demonstrate compatibility with BSD- and
56 Linux-based systems.
57
58
59 The following example lists 4 algorithms and demonstrates how compati‐
60 bility with BSD- and Linux-based systems using md5crypt is made avail‐
61 able, using the algorithm names 1 and 2.
62
63
64 #
65 # crypt.conf
66 #
67 md5 /usr/lib/security/$ISA/crypt_md5.so
68 rot13 /usr/lib/security/$ISA/crypt_rot13.so
69
70 # For *BSD/Linux compatibilty
71 # 1 is md5, 2 is Blowfish
72 1 /usr/lib/security/$ISA/crypt_bsdmd5.so
73 2 /usr/lib/security/$ISA/crypt_bsdbf.so
74
75
77 See attributes(5) for descriptions of the following attributes:
78
79
80
81
82 ┌─────────────────────────────┬─────────────────────────────┐
83 │ ATTRIBUTE TYPE │ ATTRIBUTE VALUE │
84 ├─────────────────────────────┼─────────────────────────────┤
85 │Interface Stability │Evolving │
86 └─────────────────────────────┴─────────────────────────────┘
87
89 passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C),
90 crypt_gensalt_impl(3C), getpassphrase(3C), passwd(4), attributes(5),
91 crypt_unix(5)
92
93
94
95SunOS 5.11 10 Jun 2002 crypt.conf(4)