Password Algorithm Identifiers
You specify the algorithms configuration for your site in the /etc/security/policy.conf file. In the policy.conf file,
the algorithms are named by their identifier, as shown in the following table.
Table 2–1 Password Encryption Algorithms
Identifier
|
Description
|
Algorithm Man Page
|
1
|
The MD5 algorithm that is compatible with MD5 algorithms on BSD
and Linux systems.
|
crypt_bsdmd5(5)
|
2a
|
The Blowfish algorithm that is compatible with the Blowfish algorithm
on BSD systems.
|
crypt_bsdbf(5)
|
md5
|
The Sun MD5 algorithm, which is considered stronger than the BSD
and Linux version of MD5.
|
crypt_sunmd5(5)
|
5
|
The SHA256 algorithm. SHA stands for Secure Hash Algorithm. This
algorithm is a member of the SHA-2 family. SHA256 supports 255-character passwords.
|
crypt_sha256(5)
|
6
|
The SHA512 algorithm.
|
crypt_sha512(5)
|
__unix__
|
The traditional UNIX encryption algorithm. This algorithm is the
default module in the policy.conf file.
|
crypt_unix(5)
|