Update: On rereading, I've decided that mine isn't a very useful reply. /:
Actually, even on many systems with shadowed passwords, either the C library's getpw*() or Perl's wrapper will grab the shadow encrypted password when the routine is called by a process with effective user ID of 0 (root).
- tye (but my friends call me "Tye")In reply to (tye)Re: user authentication using unix password file
by tye
in thread user authentication using unix password file
by Anonymous Monk
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |