checkpoint of hacking for mail.cs.berkeley.edu
[unix-history] / usr / src / usr.bin / lock / lock.1
CommitLineData
d9d7a9f0 1.\" Copyright (c) 1987, 1990 The Regents of the University of California.
fcc2be53 2.\" All rights reserved.
f5fe5f05 3.\"
b14a7a4a 4.\" %sccs.include.redist.roff%
fcc2be53 5.\"
b14a7a4a 6.\" @(#)lock.1 6.9 (Berkeley) %G%
f5fe5f05 7.\"
d9d7a9f0
CL
8.Dd
9.Dt LOCK 1
b14a7a4a 10.Os
d9d7a9f0
CL
11.Sh NAME
12.Nm lock
13.Nd reserve a terminal
14.Sh SYNOPSIS
15.Nm lock
16.Op Fl p
17.Op Fl t Ar timeout
18.Sh DESCRIPTION
19.Nm Lock
00b2d8a9
KB
20requests a password from the user, reads it again for verification
21and then will normally not relinquish the terminal until the password is
22repeated.
23There are two other conditions under which it will terminate: it
24will timeout after some interval of time and it may be killed by someone
25with the appropriate permission.
b14a7a4a 26.Pp
d9d7a9f0
CL
27Options:
28.Pp
b14a7a4a
CL
29.Bl -tag -width Fl
30.It Fl p
31A password is not requested, instead the user's current login password
32is used.
33.It Fl t Ar timeout
d9d7a9f0
CL
34The time limit (default 15 minutes) is changed to
35.Ar timeout
36minutes.
b14a7a4a 37.El
d9d7a9f0 38.Sh HISTORY
b14a7a4a
CL
39The
40.Nm lock
41command appeared in
42.Bx 3.0 .