kpwvalid man page on Scientific

Man page or keyword search:  
man Server   26626 pages
apropos Keyword Search (all sections)
Output format
Scientific logo
[printable version]

KPWVALID(8)		     AFS Command Reference		   KPWVALID(8)

NAME
       kpwvalid - Checks quality of new password

SYNOPSIS
       kpwvalid

DESCRIPTION
       The kpwvalid command checks the quality of a new password passed to it
       from the kpasswd or kas setpassword command for the obsolete
       Authentication Server. It is optional. If it exists, it must reside in
       the same AFS directory as the binaries for the kpasswd and kas command
       suites (create a symbolic link from the client machine's local disk to
       this directory). The directory's ACL must extend the "a" (administer)
       and "w" (write) permissions to the system:administrators group only.
       These requirements prevent unauthorized users from substituting a
       spurious kpwvalid binary.

       The AFS distribution includes an example kpwvalid program that checks
       that the password is at least eight characters long; the code for it
       appears in EXAMPLES below.

       The script or program must accept a sequence of password strings, one
       per line, on the standard input stream. The first is the current
       password and is ignored. Each subsequent string is a candidate password
       to be checked. The program must write the following to the standard
       output stream for each one:

       ·   0 (zero) and a newline character to indicate that the password is
	   acceptable.

       ·   A non-zero decimal number and a newline character to indicate that
	   the password is not acceptable.

       Further, it must write any error messages only to the standard error
       stream, not to the standard output stream.

CAUTIONS
       The kpwvalid command is only used by the obsolete Authentication Server
       It is provided for sites that have not yet migrated to a Kerberos
       version 5 KDC. The Authentication Server and supporting commands,
       including kpwvalid, will be removed in a future version of OpenAFS.

EXAMPLES
       The following example program, included in the AFS distribution,
       verifies that the requested password includes eight or more characters.

	  #include <stdio.h>
	  /* prints 0 if the password is long enough, otherwise non-zero */
	  main()
	  {
	  char oldpassword[512];
	  char password[512];

	  if (fgets(oldpassword, 512, stdin))
	     while (fgets(password, 512, stdin)) {
		if (strlen(password) > 8) { /* password includes a newline */
		   fputs("0\n",stdout);
		   fflush(stdout);
		}
		else {
		   fputs("Passwords must contain at least 8 characters.\n",
			 stderr);
		   fputs("1\n",stdout);
		   fflush(stdout);
		}
	  return 0;
	  }

SEE ALSO
       kas_setpassword(8), kpasswd(1)

COPYRIGHT
       IBM Corporation 2000. <http://www.ibm.com/> All Rights Reserved.

       This documentation is covered by the IBM Public License Version 1.0.
       It was converted from HTML to POD by software written by Chas Williams
       and Russ Allbery, based on work by Alf Wachsmann and Elizabeth Cassell.

OpenAFS				  2013-10-09			   KPWVALID(8)
[top]

List of man pages available for Scientific

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net