Deleted Added
full compact
login.1 (117333) login.1 (131507)
1.\" Copyright (c) 1980, 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)login.1 8.2 (Berkeley) 5/5/94
1.\" Copyright (c) 1980, 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)login.1 8.2 (Berkeley) 5/5/94
33.\" $FreeBSD: head/usr.bin/login/login.1 117333 2003-07-08 13:01:28Z dannyboy $
33.\" $FreeBSD: head/usr.bin/login/login.1 131507 2004-07-03 00:24:45Z ru $
34.\"
35.Dd May 5, 1994
36.Dt LOGIN 1
37.Os
38.Sh NAME
39.Nm login
40.Nd log into the computer
41.Sh SYNOPSIS

--- 20 unchanged lines hidden (view full) ---

62When a user name is specified, this option indicates that proper
63authentication has already been done and that no password need be
64requested.
65This option may only be used by the super-user or when an already
66logged in user is logging in as themselves.
67.It Fl h
68Specify the host from which the connection was received.
69It is used by various daemons such as
34.\"
35.Dd May 5, 1994
36.Dt LOGIN 1
37.Os
38.Sh NAME
39.Nm login
40.Nd log into the computer
41.Sh SYNOPSIS

--- 20 unchanged lines hidden (view full) ---

62When a user name is specified, this option indicates that proper
63authentication has already been done and that no password need be
64requested.
65This option may only be used by the super-user or when an already
66logged in user is logging in as themselves.
67.It Fl h
68Specify the host from which the connection was received.
69It is used by various daemons such as
70.Xr telnetd 8 .
70.Xr telnetd 8 .
71This option may only be used by the super-user.
72.It Fl p
73By default,
74.Nm
75discards any previous environment.
76The
77.Fl p
78option disables this behavior.

--- 88 unchanged lines hidden ---
71This option may only be used by the super-user.
72.It Fl p
73By default,
74.Nm
75discards any previous environment.
76The
77.Fl p
78option disables this behavior.

--- 88 unchanged lines hidden ---