[BACK]Return to lock.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / lock

Annotation of src/usr.bin/lock/lock.1, Revision 1.6

1.6     ! aaron       1: .\"    $OpenBSD: lock.1,v 1.5 1998/11/11 23:01:44 aaron Exp $
1.1       deraadt     2: .\"    $NetBSD: lock.1,v 1.4 1994/12/22 01:16:21 jtc Exp $
                      3: .\"
                      4: .\" Copyright (c) 1987, 1990, 1993
                      5: .\"    The Regents of the University of California.  All rights reserved.
                      6: .\"
                      7: .\" Redistribution and use in source and binary forms, with or without
                      8: .\" modification, are permitted provided that the following conditions
                      9: .\" are met:
                     10: .\" 1. Redistributions of source code must retain the above copyright
                     11: .\"    notice, this list of conditions and the following disclaimer.
                     12: .\" 2. Redistributions in binary form must reproduce the above copyright
                     13: .\"    notice, this list of conditions and the following disclaimer in the
                     14: .\"    documentation and/or other materials provided with the distribution.
                     15: .\" 3. All advertising materials mentioning features or use of this software
                     16: .\"    must display the following acknowledgement:
                     17: .\"    This product includes software developed by the University of
                     18: .\"    California, Berkeley and its contributors.
                     19: .\" 4. Neither the name of the University nor the names of its contributors
                     20: .\"    may be used to endorse or promote products derived from this software
                     21: .\"    without specific prior written permission.
                     22: .\"
                     23: .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
                     24: .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
                     25: .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
                     26: .\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
                     27: .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
                     28: .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
                     29: .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
                     30: .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
                     31: .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
                     32: .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
                     33: .\" SUCH DAMAGE.
                     34: .\"
                     35: .\"    @(#)lock.1      8.1 (Berkeley) 6/6/93
                     36: .\"
                     37: .Dd June 6, 1993
                     38: .Dt LOCK 1
                     39: .Os
                     40: .Sh NAME
                     41: .Nm lock
                     42: .Nd reserve a terminal
                     43: .Sh SYNOPSIS
                     44: .Nm lock
1.3       downsj     45: .Op Fl n
1.1       deraadt    46: .Op Fl p
                     47: .Op Fl t Ar timeout
                     48: .Sh DESCRIPTION
1.6     ! aaron      49: .Nm
1.1       deraadt    50: requests a password from the user, reads it again for verification
                     51: and then will normally not relinquish the terminal until the password is
                     52: repeated.
                     53: There are two other conditions under which it will terminate: it
                     54: will timeout after some interval of time and it may be killed by someone
1.4       aaron      55: with the appropriate privileges.
1.1       deraadt    56: .Pp
                     57: Options:
                     58: .Bl -tag -width Fl
1.3       downsj     59: .It Fl n
                     60: Don't use a timeout value.  Terminal will be locked forever.
1.1       deraadt    61: .It Fl p
                     62: A password is not requested, instead the user's current login password
                     63: is used.
                     64: If the user has an S/Key key, they may also use it
                     65: to unlock the terminal. To do this the user should enter "s/key"
                     66: at the unlock "Key:" prompt. The user will then be issued an S/Key
                     67: challange to which they may respond with a six-word S/Key one-time
                     68: password.
1.6     ! aaron      69: .It Fl t Ar timeout
1.1       deraadt    70: The time limit (default 15 minutes) is changed to
                     71: .Ar timeout
                     72: minutes.
                     73: .El
                     74: .Sh SEE ALSO
                     75: .Xr skey 1
                     76: .Sh HISTORY
                     77: The
1.6     ! aaron      78: .Nm
1.1       deraadt    79: command appeared in
                     80: .Bx 3.0 .