[CentOS] exercising pam_cracklib from the command line

Thu Nov 20 09:44:38 UTC 2014
Elias Persson <delreich at takeit.se>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 2014-11-17 20:57, James B. Byrne wrote:
> CentOS-6.6
> 
> Is there any command line program that determines and reports what 
> pam_cracklib.so returns for a given password; subject to variation
> in the command line options and values provided?  For example,
> assuming a cli driver program called cli_driver_pgm:
> 
> cli_driver_pgm   pam_cracklib.so difok=8 minlen=14 dcredit=3
> ucredit=3 lcredit=3 ocredit=3 minclass=2 maxrepeat=3 maxsequence=3
> reject_username gecoscheck  -- somepassword
> 
> -> pam_cracklib calculated minlen value for somepassword
> 
> 
> My Google-fu appears to have deserted me.
> 

Googling for `"pam_cracklib" cli tool` got me a recommendation of
`cracklib-check` via superuser [1]. Not sure if that does what you want,
but it might be a start?

[1]: http://superuser.com/q/441220


- -- 
AF24 6DE9 D1DF DFB8 3A74  A7AC F457 B7A3 5DF1 4240
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBAgAGBQJUbbgGAAoJEPRXt6Nd8UJAIpkP/RDLHSlEtaCJrb+oFxr0RP7T
5Tw15ejbEN92uMNC2510zubRhDMwOpMUASyDCa+rijQafTWPc/yxRGBCPWbYLkc3
orEpkN6mHpDgen8T65TDlqDqoTJCkfy+yh1JoLsrETPOGMWx6YyP7NrM+iSdcuie
YLUYyrI6nqTNG+T6c0jvoNWfQ0YK6BOxGsBIwl3GRHEq8qWbkcWnr8ImMhkheNTX
rr9ssmQuDr52NLWM3MZYUtjcKKKyk6sFQlCW0tE260CfBOTAlMGMIU/5A9NwH9fV
TqeubOi3FL5dV9UH09nVqWnDfPnoGMwmuVzPOqFC4YiMxZVSYedxdkFSILFuWfQT
eIfn6F5amiR4YbIJ9QDtybDbxO4POhHhEZ2BsiZf50UjQNNTmcmmyQuPHfH1ZCRd
iNymLTsUFpW6akAPhFyZsxaxIzV9SgLkwp09pWYTe2POC65jCPuvwE1m/umHSgjc
4Yvo/NV0x27eGZ1nllrxUmR5vwdZNNa/mXskDEQwfkuK01BT1uUnOBZFfnAV89I5
zGryFZLEMVy0ZOgpaTBqwhhLjUxchA7EDfabCPq6VDE8ymOR8upPJowSISKlUaNF
4a2IQEhWZX2lgCgu7c49sYjfFFtqnrBdY9IrhJ8zXnu23ky5uPEkdvA98Ni7xffM
9EfBmb5lRi5X5EHQViNg
=WIze
-----END PGP SIGNATURE-----