exercising pam_cracklib from the command line

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



CentOS-6.6

Is there any command line program that determines and reports what
pam_cracklib.so returns for a given password; subject to variation in the
command line options and values provided?  For example, assuming a cli driver
program called cli_driver_pgm:

cli_driver_pgm   pam_cracklib.so difok=8 minlen=14 dcredit=3 ucredit=3
lcredit=3 ocredit=3 minclass=2 maxrepeat=3 maxsequence=3 reject_username
gecoscheck  -- somepassword

-> pam_cracklib calculated minlen value for somepassword


My Google-fu appears to have deserted me.

-- 
***          E-Mail is NOT a SECURE channel          ***
James B. Byrne                mailto:ByrneJB@xxxxxxxxxxxxx
Harte & Lyne Limited          http://www.harte-lyne.ca
9 Brockley Drive              vox: +1 905 561 1241
Hamilton, Ontario             fax: +1 905 561 0757
Canada  L8E 3C3

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux