path: root/modules/pam_unix/unix_chkpwd.8
diff options
Diffstat (limited to 'modules/pam_unix/unix_chkpwd.8')
1 files changed, 80 insertions, 0 deletions
diff --git a/modules/pam_unix/unix_chkpwd.8 b/modules/pam_unix/unix_chkpwd.8
new file mode 100644
index 00000000..02ccfe4a
--- /dev/null
+++ b/modules/pam_unix/unix_chkpwd.8
@@ -0,0 +1,80 @@
+.\" Copyright (C) 2003 International Business Machines Corporation
+.\" This file is distributed according to the GNU General Public License.
+.\" See the file COPYING in the top level source directory for details.
+.\" Sh \" Subsection
+.if t .Sp 5
+.. Sp \" Vertical space (when we can't use .PP)
+.if t .sp .5v
+.if n .sp
+.. Ip \" List item \\n(.$>=3 .ne \\$3
+.el .ne 3
+.IP "\\$1" \\$2
+.TH "UNIX_CHKPWD" 8 "2003-03-21" "Linux-PAM 0.76" "Linux-PAM Manual"
+unix_chkpwd \- helper binary that verifies the password of the current user
+.hy 0
+/sbin/unix_chkpwd [\fIusername\fR]
+\fBunix_chkpwd\fR is a helper program for the pam_unix module that verifies
+the password of the current user. It is not intended to be run directly from
+the command line and logs a security violation if done so.
+It is typically installed setuid root or setgid shadow.
+unix_pwdchk optionally takes the following argument:
+The username of the user whose password you want to check: this must match the current user id.
+unix_pwdchk expects the following inputs via stdin:
+Either nullok or nonull, depending on whether the user can have an empty password.
+The password to verify.
+\fBunix_chkpwd\fR has the following return codes:
+unix_chkpwd was inappropriately called from the command line or the password is incorrect.
+The password is correct.
+Written by Andrew Morgan
+Emily Ratliff.