Annotation of src/usr.bin/lock/lock.1, Revision 1.9
1.9 ! aaron 1: .\" $OpenBSD: lock.1,v 1.8 1999/10/17 20:24:34 aaron Exp $
1.1 deraadt 2: .\" $NetBSD: lock.1,v 1.4 1994/12/22 01:16:21 jtc Exp $
3: .\"
4: .\" Copyright (c) 1987, 1990, 1993
5: .\" The Regents of the University of California. All rights reserved.
6: .\"
7: .\" Redistribution and use in source and binary forms, with or without
8: .\" modification, are permitted provided that the following conditions
9: .\" are met:
10: .\" 1. Redistributions of source code must retain the above copyright
11: .\" notice, this list of conditions and the following disclaimer.
12: .\" 2. Redistributions in binary form must reproduce the above copyright
13: .\" notice, this list of conditions and the following disclaimer in the
14: .\" documentation and/or other materials provided with the distribution.
15: .\" 3. All advertising materials mentioning features or use of this software
16: .\" must display the following acknowledgement:
17: .\" This product includes software developed by the University of
18: .\" California, Berkeley and its contributors.
19: .\" 4. Neither the name of the University nor the names of its contributors
20: .\" may be used to endorse or promote products derived from this software
21: .\" without specific prior written permission.
22: .\"
23: .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24: .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25: .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26: .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27: .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28: .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29: .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30: .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31: .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32: .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33: .\" SUCH DAMAGE.
34: .\"
35: .\" @(#)lock.1 8.1 (Berkeley) 6/6/93
36: .\"
37: .Dd June 6, 1993
38: .Dt LOCK 1
39: .Os
40: .Sh NAME
41: .Nm lock
42: .Nd reserve a terminal
43: .Sh SYNOPSIS
44: .Nm lock
1.3 downsj 45: .Op Fl n
1.1 deraadt 46: .Op Fl p
47: .Op Fl t Ar timeout
48: .Sh DESCRIPTION
1.6 aaron 49: .Nm
1.1 deraadt 50: requests a password from the user, reads it again for verification
51: and then will normally not relinquish the terminal until the password is
52: repeated.
53: There are two other conditions under which it will terminate: it
54: will timeout after some interval of time and it may be killed by someone
1.4 aaron 55: with the appropriate privileges.
1.1 deraadt 56: .Pp
1.8 aaron 57: The options are as follows:
1.1 deraadt 58: .Bl -tag -width Fl
1.3 downsj 59: .It Fl n
1.9 ! aaron 60: Don't use a timeout value.
! 61: Terminal will be locked forever.
1.1 deraadt 62: .It Fl p
63: A password is not requested, instead the user's current login password
64: is used.
65: If the user has an S/Key key, they may also use it
1.9 ! aaron 66: to unlock the terminal.
! 67: To do this the user should enter
! 68: .Qq s/key
! 69: at the unlock
! 70: .Dq Key:
! 71: prompt.
! 72: The user will then be issued an S/Key
1.7 alex 73: challenge to which they may respond with a six-word S/Key one-time
1.1 deraadt 74: password.
1.6 aaron 75: .It Fl t Ar timeout
1.1 deraadt 76: The time limit (default 15 minutes) is changed to
77: .Ar timeout
78: minutes.
79: .El
80: .Sh SEE ALSO
81: .Xr skey 1
82: .Sh HISTORY
83: The
1.6 aaron 84: .Nm
1.1 deraadt 85: command appeared in
86: .Bx 3.0 .