1.\" $NetBSD: userinfo.8,v 1.6 2002/02/02 02:06:50 wiz Exp $ */ 2.\" 3.\" 4.\" Copyright (c) 1999 Alistair G. Crooks. All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 3. All advertising materials mentioning features or use of this software 15.\" must display the following acknowledgement: 16.\" This product includes software developed by Alistair G. Crooks. 17.\" 4. The name of the author may not be used to endorse or promote 18.\" products derived from this software without specific prior written 19.\" permission. 20.\" 21.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS 22.\" OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 23.\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY 25.\" DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE 27.\" GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 28.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 29.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 30.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 31.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 32.\" 33.\" 34.Dd November 30, 1999 35.Dt USERINFO 8 36.Os 37.Sh NAME 38.Nm userinfo 39.Nd displays user information 40.Sh SYNOPSIS 41.Nm 42.Op Fl ev 43.Ar user 44.Sh DESCRIPTION 45The 46.Nm 47utility retrieves the user information from the system. 48.Pp 49The following command line options are recognised: 50.Bl -tag -width Ds 51.It Fl e 52return 0 if the user exists, and non-zero if the 53user does not exist, on the system. No information is 54displayed. This form of the command is useful for 55scripts which need to check whether a particular user 56name or uid is already in use on the system. 57.It Fl v 58perform any actions in a verbose manner. 59.El 60.Pp 61The 62.Ar user 63argument may either be a user's name, or a uid. 64.Pp 65The 66.Nm 67utility exits 0 if the user name or uid exists, and non-zero if it does not. 68.Sh FILES 69.Bl -tag -width /etc/usermgmt.conf -compact 70.It Pa /etc/usermgmt.conf 71.El 72.Sh SEE ALSO 73.Xr passwd 5 74.Sh HISTORY 75The 76.Nm 77utility first appeared in 78.Nx 1.5 . 79It is based on the 80.Ar addnerd 81package by the same author. 82.Sh AUTHORS 83The 84.Nm 85utility was written by Alistair G. Crooks (agc@netbsd.org). 86