passwd.5 (45930) | passwd.5 (49831) |
---|---|
1.\" Copyright (c) 1988, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" From: @(#)passwd.5 8.1 (Berkeley) 6/5/93 | 1.\" Copyright (c) 1988, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" From: @(#)passwd.5 8.1 (Berkeley) 6/5/93 |
33.\" $Id: passwd.5,v 1.22 1998/08/31 16:41:07 wosch Exp $ | 33.\" $Id: passwd.5,v 1.23 1999/04/22 04:05:56 grog Exp $ |
34.\" 35.Dd September 29, 1994 36.Dt PASSWD 5 37.Os 38.Sh NAME 39.Nm passwd 40.Nd format of the password file 41.Sh DESCRIPTION --- 572 unchanged lines hidden (view full) --- 614.Xr db 3 -format 615password database, with passwords intact 616.El 617.Sh SEE ALSO 618.Xr chpass 1 , 619.Xr login 1 , 620.Xr passwd 1 , 621.Xr getpwent 3 , | 34.\" 35.Dd September 29, 1994 36.Dt PASSWD 5 37.Os 38.Sh NAME 39.Nm passwd 40.Nd format of the password file 41.Sh DESCRIPTION --- 572 unchanged lines hidden (view full) --- 614.Xr db 3 -format 615password database, with passwords intact 616.El 617.Sh SEE ALSO 618.Xr chpass 1 , 619.Xr login 1 , 620.Xr passwd 1 , 621.Xr getpwent 3 , |
622.Xr login.conf 5 , | |
623.Xr login_getclass 3 , 624.Xr yp 4 , 625.Xr login.conf 5 , 626.Xr adduser 8 , | 622.Xr login_getclass 3 , 623.Xr yp 4 , 624.Xr login.conf 5 , 625.Xr adduser 8 , |
627.Xr pwd_mkdb 8 , | |
628.Xr pw 8 , | 626.Xr pw 8 , |
627.Xr pwd_mkdb 8 , |
|
629.Xr vipw 8 630.Sh BUGS 631User information should (and eventually will) be stored elsewhere. 632.Pp 633The YP/NIS password database makes encrypted passwords visible to 634ordinary users, thus making password cracking easier unless you use 635shadow passwords with the 636.Pa master.passwd --- 53 unchanged lines hidden --- | 628.Xr vipw 8 629.Sh BUGS 630User information should (and eventually will) be stored elsewhere. 631.Pp 632The YP/NIS password database makes encrypted passwords visible to 633ordinary users, thus making password cracking easier unless you use 634shadow passwords with the 635.Pa master.passwd --- 53 unchanged lines hidden --- |