1PWCONV(8)                 System Management Commands                 PWCONV(8)
2
3
4

NAME

6       pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow
7       passwords and groups
8

SYNOPSIS

10       pwconv
11
12       pwunconv
13
14       grpconv
15
16       grpunconv
17

DESCRIPTION

19       pwconv creates shadow from passwd and an optionally existing shadow.
20
21       pwunconv creates passwd from passwd and shadow and then removes shadow.
22
23       grpconv creates gshadow from group and an optionally existing gshadow.
24
25       grpunconv creates group from group and gshadow and then removes
26       gshadow.
27
28       These four programs all operate on the normal and shadow password and
29       group files: /etc/passwd, /etc/group, /etc/shadow, and /etc/gshadow.
30
31       Each program acquires the necessary locks before conversion.  pwconv
32       and grpconv are similar. First, entries in the shadowed file which
33       don't exist in the main file are removed. Then, shadowed entries which
34       don't have `x' as the password in the main file are updated. Any
35       missing shadowed entries are added. Finally, passwords in the main file
36       are replaced with `x'. These programs can be used for initial
37       conversion as well to update the shadowed file if the main file is
38       edited by hand.
39
40       pwconv will use the values of PASS_MIN_DAYS, PASS_MAX_DAYS, and
41       PASS_WARN_AGE from /etc/login.defs when adding new entries to
42       /etc/shadow.
43
44       Likewise pwunconv and grpunconv are similar. Passwords in the main file
45       are updated from the shadowed file. Entries which exist in the main
46       file but not in the shadowed file are left alone. Finally, the shadowed
47       file is removed. Some password aging information is lost by pwunconv.
48       It will convert what it can.
49

BUGS

51       Errors in the password or group files (such as invalid or duplicate
52       entries) may cause these programs to loop forever or fail in other
53       strange ways. Please run pwck and grpck to correct any such errors
54       before converting to or from shadow passwords or groups.
55

FILES

57       /etc/login.defs
58          Shadow password suite configuration.
59

SEE ALSO

61       grpck(8), login.defs(5), pwck(8).
62
63
64
65System Management Commands        07/30/2006                         PWCONV(8)
Impressum