hosts, and one of them leaks the secret to an adversary, all hosts are
compromised. This is not the case with the first approach.
+The particular data structure is outlined in the picture:
+
+
## Module Operation
Authentication file, containing nonce, encrypted shared secret,
Slot 2 is the default. Secret must be supplied when creating the file,
and when modifying the file in the absense of the token. Password is
used to construct the challenge. If not supplied empty string is used.
-The pam module also used empty string when given "noaskpass" argument,
+The pam module also uses empty string when given "noaskpass" argument,
so this can be used for "one factor" authentication mode with token
only. Payload is a string that can be optionally injected as the PAM
authentication token after successful authentication; subsequent PAM