?
Solved

getpwname( ) for shadow support ??

Posted on 1997-05-13
1
Medium Priority
?
301 Views
Last Modified: 2008-03-10
I installed shadow password in my Linux machine, all my scripts using function getpwnam( ) now returned 'X' instead of 'encrypted' password. What do I do now? rewrite all of them? uninstall shadow? or some other functions support shadow? like getspnam( ) ?? Thanks.
0
Comment
Question by:administrator051397
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 1

Accepted Solution

by:
sherwood earned 300 total points
ID: 1203998
I used the following script to create a conventional passwd
file to run crack on.  Under normal circumstances, most scripts
don't need the password.  If you need it, you can use this sort
of hoop rolling.

#!/usr/local/bin/perl
open (PASS, "/.secure/etc/passwd");
while (<PASS>){
  ($login,$passwd,$trash) = split(/\:/);
  $pass{$login} = $passwd;
   # above creates an associative array for passwds based on login
  }
close PASS;

open (PASSWD, "/etc/passwd");
while (<PASSWD>) {
         ($ypuser,$yppasswd,$uid,$gid,$Full,$home,$shell)=split(/\:/);
         $yppasswd = $pass{$ypuser};
         print "$ypuser:$yppasswd:$uid:$gid:$Full:$home:$shell";
         }
exit;

0

Featured Post

Introducing Priority Question

Increase expert visibility of your issues by participating in Priority Question, our latest feature for Premium and Team Account holders. Adjust the priority of your question to get emergent issues in front of subject-matter experts for help when you need it most.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email validation in proper way is  very important validation required in any web pages. This code is self explainable except that Regular Expression which I used for pattern matching. I originally published as a thread on my website : http://www…
There are many situations when we need to display the data in sorted order. For example: Student details by name or by rank or by total marks etc. If you are working on data driven based projects then you will use sorting techniques very frequently.…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Six Sigma Control Plans
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question