45 lines
2.1 KiB
XML
45 lines
2.1 KiB
XML
|
<!--
|
||
|
Copyright (c) 1991 - 1993, Julianne Frances Haugh
|
||
|
Copyright (c) 1991 - 1993, Chip Rosenthal
|
||
|
Copyright (c) 2007 - 2008, Nicolas François
|
||
|
All rights reserved.
|
||
|
|
||
|
Redistribution and use in source and binary forms, with or without
|
||
|
modification, are permitted provided that the following conditions
|
||
|
are met:
|
||
|
1. Redistributions of source code must retain the above copyright
|
||
|
notice, this list of conditions and the following disclaimer.
|
||
|
2. Redistributions in binary form must reproduce the above copyright
|
||
|
notice, this list of conditions and the following disclaimer in the
|
||
|
documentation and/or other materials provided with the distribution.
|
||
|
3. The name of the copyright holders or contributors may not be used to
|
||
|
endorse or promote products derived from this software without
|
||
|
specific prior written permission.
|
||
|
|
||
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||
|
``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||
|
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
|
||
|
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||
|
HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||
|
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||
|
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||
|
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||
|
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||
|
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||
|
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||
|
-->
|
||
|
<varlistentry condition="no_pam">
|
||
|
<term><option>HMAC_CRYPTO_ALGO</option> (string)</term>
|
||
|
<listitem>
|
||
|
<para>
|
||
|
Used to select the HMAC cryptography algorithm that the pam_timestamp
|
||
|
module is going to use to calculate the keyed-hash message authentication
|
||
|
code.
|
||
|
</para>
|
||
|
<para>
|
||
|
Note: Check <refentrytitle>hmac</refentrytitle><manvolnum>3</manvolnum>
|
||
|
to see the possible algorithms that are available in your system.
|
||
|
</para>
|
||
|
</listitem>
|
||
|
</varlistentry>
|