summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--content/posts/how-bsd-authentication-works/index.org3
1 files changed, 2 insertions, 1 deletions
diff --git a/content/posts/how-bsd-authentication-works/index.org b/content/posts/how-bsd-authentication-works/index.org
index f79841b..a886395 100644
--- a/content/posts/how-bsd-authentication-works/index.org
+++ b/content/posts/how-bsd-authentication-works/index.org
@@ -37,7 +37,8 @@ itself. This is my best attempt to understand the flow of BSD Auth
from what I've read.
All of the high level authentication functions are described in
-=authenticate(3)=.
+=authenticate(3)=, with the lower level functions being described in
+=auth_subr(3)=.
The highest level function, and easiest to use is =auth_userokay=
which takes four character arrays as arguments, =name=, =style=,