%PDF-1.5 %���� ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY
Server IP : 49.231.201.246 / Your IP : 216.73.216.248 Web Server : Apache/2.4.18 (Ubuntu) System : Linux 246 4.4.0-210-generic #242-Ubuntu SMP Fri Apr 16 09:57:56 UTC 2021 x86_64 User : root ( 0) PHP Version : 7.0.33-0ubuntu0.16.04.16 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/share/webmin/useradmin/ |
Upload File : |
# solaris-lib.pl # Functions for solaris password file format # passfiles_type() # Returns 0 for old-style passwords (/etc/passwd only), 1 for FreeBSD-style # (/etc/master.passwd) and 2 for SysV (/etc/passwd & /etc/shadow) sub passfiles_type { return &password_file($config{'shadow_file'}) ? 2 : 0; } # groupfiles_type() # Returns 0 for normal group file (/etc/group only) and 2 for shadowed # (/etc/group and /etc/gshadow) sub groupfiles_type { return 0; } # open_last_command(handle, user) sub open_last_command { local ($fh, $user) = @_; open($fh, "last $user |"); } # read_last_line(handle) # Parses a line of output from last into an array of # user, tty, host, login, logout, period sub read_last_line { local $fh = $_[0]; while(1) { chop($line = <$fh>); if (!$line) { return (); } if ($line =~ /system boot/) { next; } if ($line =~ /^(\S+)\s+(\S+)\s+(\S+)?\s+(\S+\s+\S+\s+\d+\s+\d+:\d+)\s+\-\s+(\d+:\d+)\s+\((\d+:\d+)\)/) { return ($1, $2, $3, $4, $5, $6); } elsif ($line =~ /^(\S+)\s+(\S+)\s+(\S+)?\s+(\S+\s+\S+\s+\d+\s+\d+:\d+)\s+still/) { return ($1, $2, $3, $4); } } } # logged_in_users() # Returns a list of hashes containing details of logged-in users sub logged_in_users { local @rv; open(WHO, "who |"); while(<WHO>) { if (/^(\S+)\s+(\S+)\s+(\S+\s+\d+\s+\d+:\d+)\s+(\((\S+)\))?/) { push(@rv, { 'user' => $1, 'tty' => $2, 'when' => $3, 'from' => $5 }); } } close(WHO); return @rv; } # use_md5() # Returns 1 if MD5 encryption should be used, 2 if blowfish sub use_md5 { local $lref = &read_file_lines("/etc/security/policy.conf"); local $l; foreach $l (@$lref) { if ($l =~ /^CRYPT_DEFAULT\s*=\s*"([^"]*)"/ || $l =~ /^CRYPT_DEFAULT\s*=\s*'([^']*)'/ || $l =~ /^CRYPT_DEFAULT\s*=\s*(\S+)/) { return 1 if ($1 eq "1"); return 2 if ($1 eq "2a"); } } return 0; } 1;