path: root/modules/pam_unix/unix_chkpwd.8
diff options
Diffstat (limited to 'modules/pam_unix/unix_chkpwd.8')
1 files changed, 0 insertions, 80 deletions
diff --git a/modules/pam_unix/unix_chkpwd.8 b/modules/pam_unix/unix_chkpwd.8
deleted file mode 100644
index 02ccfe4a..00000000
--- a/modules/pam_unix/unix_chkpwd.8
+++ /dev/null
@@ -1,80 +0,0 @@
-.\" Copyright (C) 2003 International Business Machines Corporation
-.\" This file is distributed according to the GNU General Public License.
-.\" See the file COPYING in the top level source directory for details.
-.\" Sh \" Subsection
-.if t .Sp 5
-.. Sp \" Vertical space (when we can't use .PP)
-.if t .sp .5v
-.if n .sp
-.. Ip \" List item \\n(.$>=3 .ne \\$3
-.el .ne 3
-.IP "\\$1" \\$2
-.TH "UNIX_CHKPWD" 8 "2003-03-21" "Linux-PAM 0.76" "Linux-PAM Manual"
-unix_chkpwd \- helper binary that verifies the password of the current user
-.hy 0
-/sbin/unix_chkpwd [\fIusername\fR]
-\fBunix_chkpwd\fR is a helper program for the pam_unix module that verifies
-the password of the current user. It is not intended to be run directly from
-the command line and logs a security violation if done so.
-It is typically installed setuid root or setgid shadow.
-unix_pwdchk optionally takes the following argument:
-The username of the user whose password you want to check: this must match the current user id.
-unix_pwdchk expects the following inputs via stdin:
-Either nullok or nonull, depending on whether the user can have an empty password.
-The password to verify.
-\fBunix_chkpwd\fR has the following return codes:
-unix_chkpwd was inappropriately called from the command line or the password is incorrect.
-The password is correct.
-Written by Andrew Morgan
-Emily Ratliff.