|
Lines 63-73
Link Here
|
| 63 |
.Sh DESCRIPTION |
63 |
.Sh DESCRIPTION |
| 64 |
The |
64 |
The |
| 65 |
.Nm |
65 |
.Nm |
| 66 |
program |
66 |
command |
| 67 |
allows editing of the user database information associated |
67 |
allows editing of the user database information associated |
| 68 |
with |
68 |
with |
| 69 |
.Ar user |
69 |
.Ar user |
| 70 |
or, by default, the current user. |
70 |
or, by default, the current user. |
|
|
71 |
.Pp |
| 72 |
The |
| 73 |
.Xr chfn 1 , |
| 74 |
.Xr chsh 1 , |
| 75 |
.Xr ypchpass 1 , |
| 76 |
.Xr ypchfn 1 |
| 77 |
and |
| 78 |
.Xr ypchsh 1 |
| 79 |
commands behave identically to |
| 80 |
.Nm . |
| 81 |
.Pq There is only one program. |
| 82 |
.Pp |
| 71 |
The information is formatted and supplied to an editor for changes. |
83 |
The information is formatted and supplied to an editor for changes. |
| 72 |
.Pp |
84 |
.Pp |
| 73 |
Only the information that the user is allowed to change is displayed. |
85 |
Only the information that the user is allowed to change is displayed. |
|
Lines 469-484
Link Here
|
| 469 |
.%A Ken Thompson |
481 |
.%A Ken Thompson |
| 470 |
.%T "UNIX Password security" |
482 |
.%T "UNIX Password security" |
| 471 |
.Re |
483 |
.Re |
| 472 |
.Sh NOTES |
|
|
| 473 |
The |
| 474 |
.Xr chfn 1 , |
| 475 |
.Xr chsh 1 , |
| 476 |
.Xr ypchpass 1 , |
| 477 |
.Xr ypchfn 1 |
| 478 |
and |
| 479 |
.Xr ypchsh 1 |
| 480 |
commands are really only links to |
| 481 |
.Nm . |
| 482 |
.Sh BUGS |
484 |
.Sh BUGS |
| 483 |
User information should (and eventually will) be stored elsewhere. |
485 |
User information should (and eventually will) be stored elsewhere. |
| 484 |
.Sh HISTORY |
486 |
.Sh HISTORY |