3 .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
4 .\" Generator: DocBook XSL Stylesheets v1.75.1 <http://docbook.sf.net/>
6 .\" Manual: Polecenia Zarządzania Systemem
7 .\" Source: Polecenia Zarządzania Systemem
10 .TH "CHGPASSWD" "8" "07/24/2009" "Polecenia Zarządzania Systemem" "Polecenia Zarządzania Systemem"
11 .\" -----------------------------------------------------------------
12 .\" * set default formatting
13 .\" -----------------------------------------------------------------
14 .\" disable hyphenation
16 .\" disable justification (adjust text to left margin only)
18 .\" -----------------------------------------------------------------
19 .\" * MAIN CONTENT STARTS HERE *
20 .\" -----------------------------------------------------------------
22 chgpasswd \- wsadowa aktualizacja hase\(/l grup
24 .HP \w'\fBchgpasswd\fR\ 'u
25 \fBchgpasswd\fR [\fIopcje\fR]
30 czyta pary danych (grupa i has\(/lo) ze standardowego wejścia\&. Odczytane informacje wykorzystywane są do aktualizacji danych o grupach istniejących użytkownik\('ow\&. Każdy wiersz przekazywanych danych ma postać:
32 \fInazwa_grupy\fR:\fIhas\(/lo\fR
34 By default the supplied password must be in clear\-text, and is encrypted by
37 The default encryption algorithm can be defined for the system with the ENCRYPT_METHOD variable of
38 /etc/login\&.defs, and can be overwiten with the
44 Polecenie to przeznaczone jest do użytku w dużych systemach, gdzie aktualizuje się wiele kont naraz\&.
49 posiada następujące opcje:
51 \fB\-c\fR, \fB\-\-crypt\-method\fR
53 Use the specified method to encrypt the passwords\&.
55 The available methods are DES, MD5, NONE, and SHA256 or SHA512 if your libc support these methods\&.
58 \fB\-e\fR, \fB\-\-encrypted\fR
60 Dostarczone na standardowe wejście has\(/la są traktowane jako już zakodowane\&.
63 \fB\-h\fR, \fB\-\-help\fR
65 Wyświetlenie komunikatu pomocy i zakończenie dzia\(/lania\&.
68 \fB\-m\fR, \fB\-\-md5\fR
70 Jeżeli dpostarczane has\(/la są w postaci jawnej użyj kodowania MD5 zamiast domyślnego DES\&.
73 \fB\-s\fR, \fB\-\-sha\-rounds\fR
75 Use the specified number of rounds to encrypt the passwords\&.
77 The value 0 means that the system will choose the default number of rounds for the crypt method (5000)\&.
79 A minimal value of 1000 and a maximal value of 999,999,999 will be enforced\&.
81 You can only use this option with the SHA256 or SHA512 crypt method\&.
83 By default, the number of rounds is defined by the SHA_CRYPT_MIN_ROUNDS and SHA_CRYPT_MAX_ROUNDS variables in
88 Pamiętaj żeby zabezpieczyć przed odczytem plik przekazywany na standardowe wejście polecenia\&.
90 You should make sure the passwords and the encryption method respect the system\'s password policy\&.
93 The following configuration variables in
95 change the behavior of this tool:
97 \fBENCRYPT_METHOD\fR (string)
99 This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\&.
101 It can take one of these values:
149 Note: this parameter overrides the
154 \fBMAX_MEMBERS_PER_GROUP\fR (number)
156 Maximum members per group entry\&. When the maximum is reached, a new group entry (line) is started in
158 (with the same name, same password, and same GID)\&.
160 The default value is 0, meaning that there are no limits in the number of members in a group\&.
162 This feature (split group) permits to limit the length of lines in the group file\&. This is useful to make sure that lines for NIS groups are not larger than 1024 characters\&.
164 If you need to enforce such limit, you can use 25\&.
166 Note: split groups may not be supported by all tools (even in the Shadow toolsuite)\&. You should not use this variable unless you really need it\&.
169 \fBMD5_CRYPT_ENAB\fR (boolean)
171 Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
172 \fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
174 if you need to copy encrypted passwords to other systems which don\'t understand the new algorithm\&. Default is
177 This variable is superceded by the
179 variable or by any command line option used to configure the encryption algorithm\&.
181 This variable is deprecated\&. You should use
182 \fBENCRYPT_METHOD\fR\&.
185 \fBSHA_CRYPT_MIN_ROUNDS\fR (number), \fBSHA_CRYPT_MAX_ROUNDS\fR (number)
192 \fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
194 With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
196 If not specified, the libc will choose the default number of rounds (5000)\&.
198 The values must be inside the 1000\-999999999 range\&.
201 \fBSHA_CRYPT_MIN_ROUNDS\fR
203 \fBSHA_CRYPT_MAX_ROUNDS\fR
204 values is set, then this value will be used\&.
207 \fBSHA_CRYPT_MIN_ROUNDS\fR
209 \fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
215 Informacje o grupach użytkownik\('ow\&.
220 Informacje chronione o grupach użytkownik\('ow\&.
225 Konfiguracja pakietu shadow\&.
232 \fBlogin.defs\fR(5)\&.