Hi,

I'd like to add a new key value in the login.defs file to select the HMAC
algorithm used in pam_timestamp module. I already have a PR in pam
repository [1 <https://github.com/linux-pam/linux-pam/pull/342>] that
changes the actual hmac implementation embedded in pam_timestamp for one
that is provided by openssl. This library provides several algorithms to
calculate the HMAC message and in order to select the algorithm I decided
to get the configure from login.defs.

That brings me to my questions:

   1. Would the shadow-utils project be willing to accept a PR that adds
   this new key value?
   2. Do you think "HMAC_CRYPTO_ALGO" is a sufficiently meaningful name for
   the key?


Links:
[1] https://github.com/linux-pam/linux-pam/pull/342

-- 

Iker Pedrosa

Software Engineer, Identity Management team

Red Hat <https://www.redhat.com>
<https://www.redhat.com>
_______________________________________________
Pkg-shadow-devel mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-shadow-devel

Reply via email to