spelling: overridden

This commit is contained in:
Josh Soref
2017-10-22 21:01:25 +00:00
parent ad7b83fc86
commit 146a0da7b3
296 changed files with 296 additions and 296 deletions
tests
chage
15_chage-I_no_shadow_entry
config
16_chage-m_no_shadow_entry
config
17_chage-M_no_shadow_entry
config
18_chage-d_no_shadow_entry
config
19_chage-W_no_shadow_entry
config
20_chage-E_no_shadow_entry
config
25_chage_interactive
config
26_chage_interactive_date_0
config
27_chage_interactive_date_-1
config
28_chage_interactive_date_EPOCH
config
29_chage_interactive_date_pre-EPOCH
config
30_chage_interactive_date_pre-EPOCH2
config
31_chage_interactive_date_invalid
config
32_chage_interactive_date_invalid2
config
33_chage_interactive-W_invalid1
config
34_chage_interactive-W_invalid2
config
35_chage_interactive-W-1
config
36_chage_interactive-I_invalid1
config
37_chage_interactive-I_invalid2
config
38_chage_interactive-I-1
config
39_chage_interactive-d-1
config
chroot
chage
01_chage--root
config_chroot
chgpasswd
01_chgpasswd--root
config_chroot
chpasswd
01_chpasswd--root_nopam
config_chroot
02_chpasswd--root_pam
config_chroot
chsh
01_chsh--root
config_chroot
gpasswd
01_gpasswd--root
config_chroot
groupadd
01_groupadd--root
config_chroot
groupdel
01_groupdel--root
config_chroot
groupmod
01_groupmod--root
config_chroot
grpck
01_grpck--root
config_chroot
grpconv
01_grpconv--root
config_chroot
grpunconv
01_grpunconv--root
config_chroot
lastlog
01_lastlog--root
config_chroot
login
01_login_sublogin
config
config_chroot
pwck
01_pwck--root
config_chroot
pwconv
01_pwconv--root
config_chroot
pwunconv
01_pwunconv--root
config_chroot
useradd
01_useradd--root
config_chroot
02_useradd--root_login.defs
config_chroot
03_useradd--root_useradd.default
config_chroot
04_useradd--root_useradd-D
config_chroot
05_useradd--root_useradd-D-e-g
config_chroot
userdel
01_userdel--root
config_chroot
usermod
01_usermod--root
config_chroot
crypt
login.defs_DES-MD5_CRYPT_ENAB
config
login.defs_DES
config
login.defs_MD5
config
login.defs_MD5_CRYPT_ENAB
config
login.defs_SHA256-round-max
config
login.defs_SHA256-round-min-max
config
login.defs_SHA256-round-min
config
login.defs_SHA256
config
login.defs_SHA512
config
login.defs_none
config
failures
chage
01_chage_openRW_passwd_failure
config
02_chage_openRO_passwd_failure
config
03_chage_openRW_shadow_failure
config
04_chage_openRO_shadow_failure
config
05_chage_rename_shadow_failure
config
06_chage_rename_passwd_failure
config
chgpasswd
01_chgpasswd-e_open_group_failure
config
02_chgpasswd-e_open_gshadow_failure
config
03_chgpasswd-e_rename_group_failure
config
04_chgpasswd-e_rename_gshadow_failure
config
chpasswd-PAM
01_chpasswd-e_open_passwd_failure
config
02_chpasswd-e_open_shadow_failure
config
03_chpasswd-e_rename_passwd_failure
config
04_chpasswd-e_rename_shadow_failure
config
chsh
01_chsh_open_passwd_failure
config
02_chsh_rename_passwd_failure
config
cppw
01_cppw_open_passwd_in_failure
config
02_cppw_open_passwd_backup_failure
config
03_cppw_rename_passwd_failure
config
gpasswd
01_gpasswd_group_open_failure
config
02_gpasswd_gshadow_open_failure
config
03_gpasswd-a_group_open_failure
config
04_gpasswd-d_group_open_failure
config
05_gpasswd-r_group_open_failure
config
06_gpasswd-R_gshadow_open_failure
config
07_gpasswd-A_gshadow_open_failure
config
08_gpasswd_group_openRO_failure
config
09_gpasswd_gshadow_openRO_failure
config
10_gpasswd_group_rename_failure
config
11_gpasswd_gshadow_rename_failure
config
groupadd
01_groupadd_gshadow_rename_failure
config
02_groupadd_group_rename_failure
config
03_groupadd_gshadow_open_failure
config
04_groupadd_group_open_failure
config
groupdel
01_groupdel_gshadow_rename_failure
config
02_groupdel_group_rename_failure
config
03_groupdel_gshadow_open_failure
config
04_groupdel_group_open_failure
config
groupmod
01_groupmod_change_group_name_gshadow_rename_failure
config
02_groupmod_change_gid_change_primary_group_passwd_rename_failure
config
03_groupmod_change_group_name_group_rename_failure
config
04_groupmod_group_open_failure
config
05_groupmod_gshadow_open_failure
config
06_groupmod_-g_no_gshadow_open_failure
config
07_groupmod_passwd_open_failure
config
08_groupmod_-g_same_gid_no_passwd_open_failure
config
09_groupmod_-n_no_passwd_open_failure
config
grpck
01_grpck_system_group_open_failure
config
02_grpck_group_open_failure
config
03_grpck_system_gshadow_open_failure
config
04_grpck_gshadow_open_failure
config
05_grpck_sort_group_rename_failure
config
06_grpck_sort_gshadow_rename_failure
config
grpconv
01_grpconv_open_group_failure
config
02_grpconv_open_gshadow_failure
config
03_grpconv_rename_group_failure
config
04_grpconv_rename_gshadow_failure
config
grpunconv
01_grpunconv_group_rename_failure
config
02_grpunconv_open_group_failure
config
03_grpunconv_open_gshadow_failure
config
04_grpunconv_unlink_gshadow_failure
config
newusers
01_newusers_open_passwd_failure
config
02_newusers_open_shadow_failure
config
03_newusers_open_group_failure
config
04_newusers_open_gshadow_failure
config
05_newusers_rename_passwd_failure
config
06_newusers_rename_shadow_failure
config
07_newusers_rename_group_failure
config
08_newusers_rename_gshadow_failure
config
09_newusers_rename_shadow_failure_PAM
config
pwconv
01_pwconv_open_passwd_failure
config
02_pwconv_open_shadow_failure
config
03_pwconv_rename_passwd_failure
config
04_pwconv_rename_shadow_failure
config
pwunconv
01_pwunconv_passwd_rename_failure
config
02_pwunconv_open_passwd_failure
config
03_pwunconv_open_shadow_failure
config
04_pwunconv_unlink_shadow_failure
config
useradd
01_useradd_open_passwd_failure
config
02_useradd_open_shadow_failure
config
03_useradd_open_group_failure
config
04_useradd_open_gshadow_failure
config
05_useradd_rename_passwd_failure
config
06_useradd_rename_shadow_failure
config
07_useradd_rename_group_failure
config
08_useradd_rename_gshadow_failure
config
09_useradd_rename_defaults_failure
config
10_useradd_rename_defaults_backup_failure
config
12_useradd_open_subuid_failure
config
13_useradd_open_subgid_failure
config
14_username_rename_subuid_failure
config
15_username_rename_subgid_failure
config
userdel
01_userdel_gshadow_rename_failure
config
02_userdel_group_rename_failure
config
03_userdel_shadow_rename_failure
config
04_userdel_passwd_rename_failure
config
05_userdel_failure_remove_mailbox
config
06_userdel_failure_remove_file_homedir
config
07_userdel_failure_remove_homedir
config
08_userdel_open_passwd_failure
config
09_userdel_open_shadow_failure
config
10_userdel_open_group_failure
config
11_userdel_open_gshadow_failure
config
12_userdel_open_subuid_failure
config
13_userdel_open_subgid_failure
config
14_userdel_rename_subuid_failure
config
15_userdel_rename_subgid_failure
config
usermod
01_usermod_change_user_name_gshadow_rename_failure
config
02_usermod_change_uid_passwd_rename_failure
config
03_usermod_change_user_name_group_rename_failure
config
04_usermod_change_user_name_gshadow_rename_no_failure
config
05_usermod_change_uid_shadow_rename_failure
config
06_usermod_change_user_name_open_passwd_failure
config
07_usermod_change_user_name_open_shadow_failure
config
08_usermod_change_user_name_open_group_failure
config
09_usermod_change_user_name_open_gshadow_failure
config
12_usermod_change_uid_passwd_unlock_passwd_failure
config
13_usermod_-v_open_subuid_failure
config
14_usermod_-V_open_subuid_failure
config
15_usermod_-w_open_subgid_failure
config
16_usermod_-W_open_subgid_failure
config
17_usermod_-v_rename_subuid_failure
config
18_usermod_-w_rename_subgid_failure
config
grouptools
chgpasswd
01_chgpasswd_invalid_group
config
02_chgpasswd_multiple_groups
config
03_chgpasswd_no_gshadow_file
config
04_chgpasswd_no_gshadow_entry
config
05_chgpasswd_error_no_password
config
gpasswd
19_gpasswd_change_passwd-root
config
20_gpasswd_change_passwd-root-no_shadow_group
config
21_gpasswd_change_passwd-root-no_gshadow_file
config
22_gpasswd_change_passwd-myuser
config
69_gpasswd_change_passwd_2_tries
config
70_gpasswd_change_passwd_3_tries
config
71_gpasswd_change_passwd_4_tries
config
groupadd
01_groupadd_add_group
config
02_groupadd_add_group_GID_MIN
config
03_groupadd_add_group_-K_GID_MIN
config
04_groupadd_set_password
config
05_groupadd_set_GID
config
06_groupadd_-f_add_existing_group
config
07_groupadd_-f_add_existing_GID
config
10_groupadd_-o_add_existing_GID
config
17_groupadd_add_systemgroup
config
18_groupadd_no_more_GID
config
19_groupadd_-r_no_more_system_GID
config
25_groupadd_no_gshadow
config
groupdel
01_groupdel_delete_group
config
02_groupdel_delete_group_no_gshadow_group
config
03_groupdel_delete_group_no_gshadow_file
config
04_groupdel_delete_group_error_busy_group
config
05_groupdel_delete_group_error_unknown_group
config
06_groupdel_delete_group_error_locked_group
config
07_groupdel_delete_group_error_locked_gshadow
config
08_groupdel_delete_group_error_no_group_parameter
config
09_groupdel_delete_group_error_two_group_parameter
config
10_groupdel_usage
config
11_groupdel_invalid_option
config
groupmems
54_groupmems_usage_invalid_option
config
55_groupmems_usage-a-d
config
56_groupmems_usage_extra_arg
config
groupmod
01_groupmod_change_gid
config
02_groupmod_change_gid_change_primary_group
config
03_groupmod_change_gid_no_gshadow_group
config
04_groupmod_change_gid_no_gshadow_file
config
05_groupmod_change_gid_-o_override_used_GID
config
06_groupmod_change_group_name
config
07_groupmod_change_group_name_no_gshadow_group
config
08_groupmod_change_group_name_no_gshadow_file
config
09_groupmod_set_password
config
10_groupmod_set_password_no_gshadow_group
config
11_groupmod_set_password_no_gshadow_file
config
12_groupmod_change_gid_error_unknown_group
config
13_groupmod_change_gid_error_used_GID
config
14_groupmod_change_group_name_error_used_name
config
15_groupmod_change_group_name_error_invalid_name
config
16_groupmod_change_group_name_no_changes
config
17_groupmod_change_gid_error_locked_group
config
18_groupmod_change_gid_no_error_locked_gshadow
config
19_groupmod_change_gid_error_invalid_GID
config
20_groupmod_change_gid_error_negative_GID
config
21_groupmod_change_gid_error_no_group
config
22_groupmod_change_gid_and_group_name
config
23_groupmod_change_gid_and_group_name_and_password
config
24_groupmod_change_gid_and_name_error_locked_gshadow
config
25_groupmod_change_gid_change_primary_group_error_locked_passwd
config
26_groupmod_change_group_name_no_error_locked_passwd
config
27_groupmod_change_gid_error_GID_4294967295
config
29_groupmod_-g_same_gid_new_name
config
30_groupmod_-g_same_gid_same_name
config
31_groupmod_-g_same_gid
config
33_groupmod_set_password_no_gshadow_file_with_group_pwd_x
config
34_groupmod_set_password_group_without_shadow_pwd
config
35_groupmod_set_password_group_without_shadow_pwd_no_gshadow_group
config
36_groupmod_set_password_group_with_shadow_pwd_no_gshadow_group
config
37_groupmod_invalid_option
config
login
01_login_prompt
config
02_login_user
config
03_login_check_tty
config
newusers
25_create_user_error_no_remaining_UID
config
26_create_user_error_no_remaining_GID
config
split_groups
01_useradd_split_group
config
02_useradd_no_split_group
config
03_useradd_split_group_already_split
config
04_useradd_split_group_already_full
config
05_useradd_split_group_already_split_passwd_differ
config
06_useradd_split_group_already_split_GID_differ
config
07_useradd_split_group_already_split_user_in_both_lines
config
08_useradd_no_split_group_already_split
config
09_groupdel_split_group_already_split
config
10_groupdel_no_split_group_already_split
config
su
04
config
05
config
06
config
07
config
08
config
09
config
10_su_sulog_success
config
11_su_sulog_failure
config
12_su_child_failure
config
13_su_child_success
config
subids
12_useradd_invalid_subuid_configuration1
config
13_useradd_invalid_subuid_configuration2
config
14_useradd_invalid_subuid_configuration3
config
15_useradd_invalid_subgid_configuration1
config
16_useradd_invalid_subgid_configuration2
config
17_useradd_invalid_subgid_configuration3
config
18_useradd_min=max
config
usertools
chpasswd
01_chpasswd_invalid_user
config
02_chpasswd_multiple_users
config
03_chpasswd_no_shadow_file
config
04_chpasswd_no_shadow_entry
config
05_chpasswd_error_no_password
config
userdel
05_userdel_no_USERGROUPS_ENAB
config
06_userdel_no_usergroup
config
07_userdel_usergroup_not_primary
config
08_userdel_usergroup_with_other_members
config
09_userdel_usergroup_no_other_members_in_gshadow
config
usermod
47_usermod-u_default_maildir
config
48_usermod-u_MAIL_FILE
config

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -176,7 +176,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

@@ -185,7 +185,7 @@ GID_MAX 60000
#
# Max number of login retries if password is bad. This will most likely be
# overriden by PAM, since the default pam_unix module has it's own built
# overridden by PAM, since the default pam_unix module has it's own built
# in of 3 retries. However, this is a safe fallback in case you are using
# an authentication module that does not enforce PAM_MAXTRIES.
#

Some files were not shown because too many files have changed in this diff Show More