On Sat, 2009-08-15 at 14:16 +0200, Thorsten Kukuk wrote: > On Sat, Aug 15, Matthew W. S. Bell wrote: > You are under the assumption that there has to be a shadow entry > if this function is called. But this is not that case. For example, > if you are using NIS, it is most likely that there is no entry. > Which would mean, that the log file would get flooded with this > message. >From the code, I can see that the shadow database is only accessed if the relevant information is not in the passwd database. In both cases, the database accessed is controlled in an opaque manner to this client code by the nsswitch framework. Matthew _______________________________________________ Pam-list mailing list Pam-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/pam-list