On Wed, Jul 21, 1999 at 10:57:24AM -0600, Oscar Bonilla wrote: <Lots snipped>
> > I don't see where the modularized crypt would fit in then... > i totally agree that pam has this capability i was just trying to fit > in the crypt stuff people have been working on. (Mark Murray: jump in here if I get this wrong) The way I understand it, a PAM module (pam_unix?) would need to be able to look at the password hash and figure out which of the crypt functions to call. Ideally, the PAM configuration would be able to specify which crypt functions are valid for the system. That said, one of the very attractive features of specifying the crypt function in the login class is the ability to assign different crypt algorithms on a user by user basis. Regards, --Keith Stevenson-- -- Keith Stevenson System Programmer - Data Center Services - University of Louisville [email protected] PGP key fingerprint = 4B 29 A8 95 A8 82 EA A2 29 CE 68 DE FC EE B6 A0 To Unsubscribe: send mail to [email protected] with "unsubscribe freebsd-hackers" in the body of the message

