Print this page
4107 Add passwd option to read passwords from stdin

Split Close
Expand all
Collapse all
          --- old/usr/src/man/man1/passwd.1.man.txt
          +++ new/usr/src/man/man1/passwd.1.man.txt
↓ open down ↓ 42 lines elided ↑ open up ↑
  43   43         passwd -r nisplus -s [-a]
  44   44  
  45   45  
  46   46         passwd -r nisplus [-D domainname] -s [name]
  47   47  
  48   48  
  49   49         passwd -r nisplus [-l | -u | -N] [-f] [-n min] [-w warn]
  50   50              [-x max] [-D domainname] name
  51   51  
  52   52  
       53 +       passwd -S [name]
       54 +
       55 +
  53   56  DESCRIPTION
  54   57         The passwd command changes the password or lists password attributes
  55   58         associated with the user's login name. Additionally, privileged users
  56   59         can use passwd to install or change passwords and attributes associated
  57   60         with any login name.
  58   61  
  59   62  
  60   63         When used to change a password, passwd prompts everyone for their old
  61   64         password, if any. It then prompts for the new password twice. When the
  62   65         old password is entered, passwd checks to see if it has aged
↓ open down ↓ 326 lines elided ↑ open up ↑
 389  392                    of days before the password expires and the user is warned.
 390  393                    This option is not valid if password aging is disabled.
 391  394  
 392  395  
 393  396         -x max
 394  397                    Sets maximum field for name. The max field contains the
 395  398                    number of days that the password is valid for name. The
 396  399                    aging for name is turned off immediately if max is set to1.
 397  400  
 398  401  
      402 +       -S
      403 +                  Read the password from standard input (pipe).
      404 +
      405 +
 399  406  OPERANDS
 400  407         The following operand is supported:
 401  408  
 402  409         name
 403  410                 User login name.
 404  411  
 405  412  
 406  413  ENVIRONMENT VARIABLES
 407  414         If any of the LC_* variables, that is, LC_CTYPE, LC_MESSAGES, LC_TIME,
 408  415         LC_COLLATE, LC_NUMERIC, and LC_MONETARY (see environ(5)), are not set
↓ open down ↓ 278 lines elided ↑ open up ↑
 687  694         shells(4), attributes(5), environ(5), pam_authtok_check(5),
 688  695         pam_authtok_get(5), pam_authtok_store(5), pam_dhkeys(5), pam_ldap(5),
 689  696         pam_unix_account(5), pam_unix_auth(5), pam_unix_session(5)
 690  697  
 691  698  NOTES
 692  699         The pam_unix(5) module is no longer supported. Similar functionality is
 693  700         provided by pam_unix_account(5), pam_unix_auth(5), pam_unix_session(5),
 694  701         pam_authtok_check(5), pam_authtok_get(5), pam_authtok_store(5),
 695  702         pam_dhkeys(5), and pam_passwd_auth(5).
 696  703  
 697      -
 698  704         The nispasswd and ypasswd commands are wrappers around passwd. Use of
 699  705         nispasswd and ypasswd is discouraged. Use passwd -r repository_name
 700  706         instead.
 701  707  
 702  708  
 703  709         NIS+ might not be supported in future releases of the Solaris operating
 704  710         system.  Tools to aid the migration from NIS+ to LDAP are available in
 705  711         the current Solaris release. For more information, visit
 706  712         http://www.sun.com/directory/nisplus/transition.html.
 707  713  
↓ open down ↓ 14 lines elided ↑ open up ↑
 722  728  
 723  729         Input terminal processing might interpret some key sequences and not
 724  730         pass them to the passwd command.
 725  731  
 726  732  
 727  733         An account with no password, status code NP, might not be able to
 728  734         login.  See the login(1) PASSREQ option.
 729  735  
 730  736  
 731  737  
 732      -                                 May 31, 2013                        PASSWD(1)
      738 +                                 June 18, 2015                       PASSWD(1)
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX