head	1.2;
access;
symbols;
locks; strict;
comment	@# @;


1.2
date	96.09.05.06.38.38;	author morgan;	state Exp;
branches;
next	1.1;

1.1
date	96.08.29.13.24.33;	author morgan;	state Exp;
branches;
next	;


desc
@@


1.2
log
@rewritten to apply to new unix_module
@
text
@This is the pam_unix module. It has been significantly rewritten since
.51 was released (due mostly to the efforts of Cristian Gafton), and
now takes more options and correctly updates vanilla UNIX/shadow/md5
passwords.

[Please read the source and make a note of all the warnings there, as
the license suggests -- use at your own risk.]

So far as I am concerned this module is now pretty stable. If you find
any bugs, PLEASE tell me! <morgan@@physics.ucla.edu>

Options recognized by this module are as follows:

	debug		-	log more debugging info
	use_first_pass	-	don't prompt the user for passwords
				take them from PAM_ items instead
	try_first_pass  -	don't prompt the user for the passwords
				unless PAM_(OLD)AUTHTOK is unset
	use_authtok	-	like try_first_pass, but *fail* if the new
				PAM_AUTHTOK has not been previously set.
				(intended for stacking password modules only)
	not_set_pass    -	don't set the PAM_ items with the passwords
				used by this module.
	shadow          -       try to maintian a shadow based system. This
				option requires HAVE_SHADOW_H is defined when
				the module is compiled (see top level makefile)
				Also, note that the libc you are using must
				support shadow.
	md5		-	when a user changes their password next,
				encrypt it with the md5 algorithm.

There is some support for building a shadow file on-the-fly from an
/etc/passwd file. This is VERY alpha. If you want to play with it you
should read the source to find the appropriate #define that you will
need.

---------------------
Andrew Morgan <morgan@@physics.ucla.edu>@


1.1
log
@Initial revision
@
text
@d2 3
a4 4
what appeared in .51 and now takes more options and correctly updates
vanilla UNIX passwords. [Please read the source and make a note of all
the warnings there, as the copyright suggests -- use at your own
risk.]
d6 5
a10 1
If you find any bugs, PLEASE tell me. <morgan@@physics.ucla.edu>
d21 1
a21 1
				(intended for password module only)
d24 12
@
