{"id":4250,"date":"2022-12-20T17:39:54","date_gmt":"2022-12-20T20:39:54","guid":{"rendered":"http:\/\/lode.uno\/linux-man\/index.php\/2022\/12\/20\/chpasswd-zh_cn\/"},"modified":"2022-12-20T17:39:54","modified_gmt":"2022-12-20T20:39:54","slug":"chpasswd-zh_cn","status":"publish","type":"post","link":"https:\/\/lode.uno\/linux-man\/2022\/12\/20\/chpasswd-zh_cn\/","title":{"rendered":"CHPASSWD (zh_CN)"},"content":{"rendered":"<h1 align=\"center\">CHPASSWD<\/h1>\n<p> <a href=\"#\u00e5\u00e7\u00a7\u00b0\">\u00e5\u00e7\u00a7\u00b0<\/a><br \/> <a href=\"#\u00e5\u00a4\u00a7\u00e7\u00ba\u00b2\">\u00e5\u00a4\u00a7\u00e7\u00ba\u00b2<\/a><br \/> <a href=\"#\u00e6\u00e8\u00bf\u00b0\">\u00e6\u00e8\u00bf\u00b0<\/a><br \/> <a href=\"#\u00e9\u00e9\u00a1\u00b9\">\u00e9\u00e9\u00a1\u00b9<\/a><br \/> <a href=\"#CAVEATS\">CAVEATS<\/a><br \/> <a href=\"#\u00e9\u00e7\u00bd\u00ae\u00e6\u00e4\u00bb\u00b6\">\u00e9\u00e7\u00bd\u00ae\u00e6\u00e4\u00bb\u00b6<\/a><br \/> <a href=\"#\u00e6\u00e4\u00bb\u00b6\">\u00e6\u00e4\u00bb\u00b6<\/a><br \/> <a href=\"#\u00e5\u00e8\u00a7\">\u00e5\u00e8\u00a7<\/a> <\/p>\n<hr>\n<h2>\u00e5\u00e7\u00a7\u00b0 <a name=\"\u00e5\u00e7\u00a7\u00b0\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">chpasswd \u2212 \u00e6\u00b9\u00e9\u00e6\u00b4\u00e6\u00b0\u00e5\u00af\u00e7\u00a0<\/p>\n<h2>\u00e5\u00a4\u00a7\u00e7\u00ba\u00b2 <a name=\"\u00e5\u00a4\u00a7\u00e7\u00ba\u00b2\"><\/a> <\/h2>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"23%\">\n<p style=\"margin-top: 1em\"><b>chpasswd<\/b> [<i>\u00e9\u00e9\u00a1\u00b9<\/i>]<\/p>\n<\/td>\n<td width=\"66%\"> <\/td>\n<\/tr>\n<\/table>\n<h2>\u00e6\u00e8\u00bf\u00b0 <a name=\"\u00e6\u00e8\u00bf\u00b0\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">The <b>chpasswd<\/b> command reads a list of user name and password pairs from standard input and uses this information to update a group of existing users. Each line is of the format:<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>user_name<\/i>:<i>password<\/i><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">\u00e9\u00bb\u00e8\u00ae\u00a4\u00e5\u00bf\u00e9\u00a1\u00bb\u00e6\u00e6\u00e6\u00e4\u00be\u00e5\u00af\u00e7\u00a0\u00ef\u00bc\u00e7\u00b6\u00e5\u00e7\u00b1 <b>chpasswd<\/b> \u00e5\u00a0\u00e5\u00af\u00e3\u00e5\u00a6\u00e6\u00e5- \u00e5\u00a8\u00e5\u00af\u00e7\u00a0\u00e5\u00b9\u00b4\u00e9\u00be\u00e4\u00bf\u00a1\u00e6\u00af\u00ef\u00bc\u00e4\u00b9\u00e4\u00bc\u00e6\u00b4\u00e6\u00b0\u00e4\u00b9\u00e3<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">The default encryption algorithm can be defined for the system with the <b>ENCRYPT_METHOD<\/b> or <b>MD5_CRYPT_ENAB<\/b> variables of \/etc\/login.defs, and can be overwritten with the <b>\u2212e<\/b>, <b>\u2212m<\/b>, or <b>\u2212c<\/b> options.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>chpasswd<\/b> first updates all the passwords in memory, and then commits all the changes to disk if no errors occurred for any user.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">\u00e6\u00a4\u00e5\u00bd\u00e4\u00bb\u00a4\u00e4\u00b8\u00e8\u00ac\u00e7\u00a8\u00e4\u00ba\u00e9\u00e8\u00a6\u00e4\u00b8\u00e6\u00ac\u00a1\u00e5\u00e5\u00bb\u00ba\u00e5\u00be\u00e5\u00a4\u00e7\u00a8\u00e6\u00b7\u00e7\u00e5\u00a4\u00a7\u00e5\u00e7\u00b3\u00bb\u00e7\u00bb\u00e3<\/p>\n<h2>\u00e9\u00e9\u00a1\u00b9 <a name=\"\u00e9\u00e9\u00a1\u00b9\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>chpasswd<\/b> \u00e5\u00af\u00e4\u00bb\u00a5\u00e6\u00a5\u00e5\u00e7\u00e9\u00e9\u00a1\u00b9\u00e6\u00ef\u00bc<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>\u2212c<\/b>, <b>\u2212\u2212crypt\u2212method\u00a0<\/b><i>METHOD<\/i><\/p>\n<p style=\"margin-left:17%;\">\u00e4\u00bd\u00bf\u00e7\u00a8\u00e6\u00e5\u00ae\u00e7\u00e6\u00b9\u00e6\u00b3\u00e5\u00a0\u00e5\u00af\u00e5\u00af\u00e7\u00a0\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e5\u00af\u00e7\u00a8\u00e7\u00e6\u00b9\u00e6\u00b3\u00e6 DES, MD5, NONE, and SHA256 \u00e6 SHA512\u00ef\u00bc\u00e5\u00e6\u00e6\u00af\u00e6\u00a8\u00e7 libc \u00e6\u00af\u00e6\u00e8\u00bf\u00e5\u00e6\u00b9\u00e6\u00b3\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">By default (if none of the <b>\u2212c<\/b>, <b>\u2212m<\/b>, or <b>\u2212e<\/b> options are specified), the encryption method is defined by the <b>ENCRYPT_METHOD<\/b> or <b>MD5_CRYPT_ENAB<\/b> variables of \/etc\/login.defs.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>\u2212e<\/b>, <b>\u2212\u2212encrypted<\/b><\/p>\n<p style=\"margin-left:17%;\">\u00e6\u00e4\u00be\u00e7\u00e5\u00af\u00e7\u00a0\u00e6\u00af\u00e5\u00b7\u00b2\u00e7\u00bb\u00e5\u00a0\u00e5\u00af\u00e4\u00ba\u00e7<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>\u2212h<\/b>, <b>\u2212\u2212help<\/b><\/p>\n<p style=\"margin-left:17%;\">\u00e7\u00b0\u00e5\u00ae\u00e5\u00b8\u00ae\u00e5\u00a9\u00e4\u00bf\u00a1\u00e6\u00af\u00e5\u00b9\u00b6\u00e9\u00e5\u00ba\u00e3<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>\u2212m<\/b>, <b>\u2212\u2212md5<\/b><\/p>\n<p style=\"margin-left:17%;\">\u00e5\u00a6\u00e6\u00e6\u00e4\u00be\u00e7\u00e5\u00af\u00e7\u00a0\u00e6\u00b2\u00a1\u00e6\u00e5\u00a0\u00e5\u00af\u00ef\u00bc\u00e5\u00e4\u00bd\u00bf\u00e7\u00a8 MD5 \u00e5\u00a0\u00e5\u00af\u00e8\u00e4\u00b8\u00e6\u00af DES\u00e3<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>\u2212R<\/b>, <b>\u2212\u2212root\u00a0<\/b><i>CHROOT_DIR<\/i><\/p>\n<p style=\"margin-left:17%;\">Apply changes in the <i>CHROOT_DIR<\/i> directory and use the configuration files from the <i>CHROOT_DIR<\/i> directory.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>\u2212s<\/b>, <b>\u2212\u2212sha\u2212rounds\u00a0<\/b><i>ROUNDS<\/i><\/p>\n<p style=\"margin-left:17%;\">\u00e4\u00bd\u00bf\u00e7\u00a8\u00e6\u00e5\u00ae\u00e6\u00ac\u00a1\u00e6\u00b0\u00e7\u00e8\u00bd\u00ae\u00e8\u00bd\u00ac\u00e6\u00a5\u00e5\u00a0\u00e5\u00af\u00e5\u00af\u00e7\u00a0\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e5\u00bc 0 \u00e8\u00a1\u00a8\u00e7\u00a4\u00ba\u00e8\u00ae\u00a9\u00e7\u00b3\u00bb\u00e7\u00bb\u00e4\u00b8\u00ba\u00e5\u00a0\u00e5\u00af\u00e6\u00b9\u00e6\u00b3\u00e9\u00e6\u00a9\u00e9\u00bb\u00e8\u00ae\u00a4\u00e7\u00e8\u00bd\u00ae\u00e8\u00bd\u00ac\u00e6\u00ac\u00a1\u00e6\u00b0 (5000)\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e4\u00bc\u00e5\u00bc\u00ba\u00e5\u00b6\u00e6\u00e5\u00b0 1,000\u00ef\u00bc\u00e6\u00e5\u00a4\u00a7 9,9999,9999<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e6\u00a8\u00e5\u00aa\u00e5\u00af\u00e4\u00bb\u00a5\u00e5\u00af\u00b9 SHA256 \u00e6 SHA512 \u00e4\u00bd\u00bf\u00e7\u00a8\u00e6\u00a4\u00e9\u00e9\u00a1\u00b9\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">By default, the number of rounds is defined by the <b>SHA_CRYPT_MIN_ROUNDS<\/b> and <b>SHA_CRYPT_MAX_ROUNDS<\/b> variables in \/etc\/login.defs.<\/p>\n<h2>CAVEATS <a name=\"CAVEATS\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">\u00e8\u00ae\u00b0\u00e4\u00bd\u00e8\u00a6\u00e8\u00ae\u00be\u00e7\u00bd\u00ae\u00e6\u00e9\u00e6\u00e8\u00e6\u00a9\u00e7\u00a0\u00e6\u00a5\u00e9\u00bb\u00e6\u00a2\u00e5\u00b6\u00e5\u00ae\u00e7\u00a8\u00e6\u00b7\u00e5\u00af\u00b9\u00e6\u00aa\u00e5\u00a0\u00e5\u00af\u00e6\u00e4\u00bb\u00b6\u00e7\u00e8\u00af\u00bb\u00e5\u00e3<\/p>\n<h2>\u00e9\u00e7\u00bd\u00ae\u00e6\u00e4\u00bb\u00b6 <a name=\"\u00e9\u00e7\u00bd\u00ae\u00e6\u00e4\u00bb\u00b6\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">\u00e5\u00a8 \/etc\/login.defs \u00e4\u00b8\u00e6\u00e5\u00a6\u00e4\u00b8\u00e9\u00e7\u00bd\u00ae\u00e5\u00e9\u00ef\u00bc\u00e5\u00af\u00e4\u00bb\u00a5\u00e7\u00a8\u00e6\u00a5\u00e6\u00b4\u00e6\u00b9\u00e6\u00a4\u00e5\u00b7\u00a5\u00e5\u00b7\u00e7\u00e8\u00a1\u00e4\u00b8\u00ba\u00ef\u00bc<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ENCRYPT_METHOD<\/b> (string)<\/p>\n<p style=\"margin-left:17%;\">\u00e8\u00bf\u00e5\u00ae\u00e4\u00b9\u00e4\u00ba\u00e7\u00b3\u00bb\u00e7\u00bb\u00e5\u00a0\u00e5\u00af\u00e5\u00af\u00e7\u00a0\u00e7\u00e9\u00bb\u00e8\u00ae\u00a4\u00e7\u00ae\u00e6\u00b3(\u00e5\u00a6\u00e6\u00e6\u00b2\u00a1\u00e6\u00e5\u00a8\u00e5\u00bd\u00e4\u00bb\u00a4\u00e8\u00a1\u00e4\u00b8\u00e6\u00e5\u00ae\u00e7\u00ae\u00e6\u00b3)\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e5\u00af\u00e4\u00bb\u00a5\u00e4\u00bd\u00bf\u00e7\u00a8\u00e5\u00a6\u00e4\u00b8\u00e5\u00bc\u00ef\u00bc<i>DES<\/i> (default), <i>MD5<\/i>, <i>SHA256<\/i>, <i>SHA512<\/i>.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e6\u00b3\u00a8\u00e6\u00ef\u00bc\u00e6\u00a4\u00e5\u00e6\u00b0\u00e4\u00bc\u00e8\u00a6\u00e7 <b>MD5_CRYPT_ENAB<\/b> \u00e5\u00e9\u00e3<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>MD5_CRYPT_ENAB<\/b> (boolean)<\/p>\n<p style=\"margin-left:17%;\">\u00e8\u00a1\u00a8\u00e7\u00a4\u00ba\u00e5\u00af\u00e7\u00a0\u00e6\u00af\u00e5\u00a6\u00e5\u00bf\u00e9\u00a1\u00bb\u00e4\u00bd\u00bf\u00e7\u00a8\u00e5\u00ba\u00e4\u00ba MD5 \u00e7\u00e7\u00ae\u00e6\u00b3\u00e5\u00a0\u00e5\u00af\u00e3\u00e5\u00a6\u00e6\u00e8\u00ae\u00be\u00e4\u00b8\u00ba <i>yes<\/i>\u00ef\u00bc\u00e6\u00b0\u00e5\u00af\u00e7\u00a0\u00e5\u00b0\u00e4\u00bd\u00bf\u00e7\u00a8\u00e5\u00af\u00e4\u00bb\u00a5\u00e5\u00e6\u00b0\u00e7 FreeBSD \u00e5\u00bc\u00e5\u00ae\u00b9\u00e7\u00e5\u00ba\u00e4\u00ba MD5 \u00e7\u00e7\u00ae\u00e6\u00b3\u00e5\u00a0\u00e5\u00af\u00e3\u00e5\u00ae\u00e6\u00af\u00e6\u00e6\u00a0\u00e9\u00e9\u00bf\u00e5\u00ba\u00a6\u00e7\u00e5\u00af\u00e7\u00a0\u00e4\u00bb\u00a5\u00e5\u00e6\u00b4\u00e9\u00bf\u00e7\u00e7\u00e5- \u00e7\u00ac\u00a6\u00e4\u00b8\u00b2\u00e3\u00e5\u00a6\u00e6\u00e6\u00a8\u00e9\u00e8\u00a6\u00e5\u00b0\u00e5\u00a0\u00e5\u00af\u00e7\u00e5\u00af\u00e7\u00a0\u00e5\u00a4\u00e5\u00b6\u00e5\u00b0\u00e5\u00b6\u00e5\u00ae\u00e4\u00b8\u00e7\u00e8\u00a7\u00a3\u00e6\u00b0\u00e7\u00ae\u00e6\u00b3\u00e7\u00e7\u00b3\u00bb\u00e7\u00bb\u00ef\u00bc\u00e8\u00ae\u00be\u00e7\u00bd\u00ae\u00e4\u00b8\u00ba <i>no<\/i>\u00e3\u00e9\u00bb\u00e8\u00ae\u00a4\u00e5\u00bc\u00e6\u00af <i>no<\/i>\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">This variable is superseded by the <b>ENCRYPT_METHOD<\/b> variable or by any command line option used to configure the encryption algorithm.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e6\u00a4\u00e5\u00e9\u00e5\u00b7\u00b2\u00e7\u00bb\u00e5\u00ba\u00e5\u00bc\u00e3\u00e6\u00a8\u00e5\u00ba\u00e8\u00af\u00a5\u00e4\u00bd\u00bf\u00e7\u00a8 <b>ENCRYPT_METHOD<\/b>\u00e3<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>SHA_CRYPT_MIN_ROUNDS<\/b> (number), <b>SHA_CRYPT_MAX_ROUNDS<\/b> (number)<\/p>\n<p style=\"margin-left:17%;\"><b>ENCRYPT_METHOD<\/b> \u00e8\u00ae\u00be\u00e4\u00b8\u00ba <i>SHA256<\/i> \u00e6 <i>SHA512<\/i> \u00e6\u00b6\u00ef\u00bc\u00e6- \u00a4\u00e9\u00a1\u00b9\u00e7\u00a1\u00ae\u00e5\u00ae\u00e5\u00a0\u00e5\u00af\u00e7\u00ae\u00e6\u00b3\u00e9\u00bb\u00e8\u00ae\u00a4\u00e4\u00bd\u00bf\u00e7\u00a8 SHA \u00e8\u00bd\u00ae\u00e8\u00bd\u00ac\u00e6\u00b0\u00e7\u00ae(\u00e5\u00bd\u00e8\u00bd\u00ae\u00e8\u00bd\u00ac\u00e6\u00b0\u00e6\u00b2\u00a1\u00e6\u00e9\u00e8\u00bf\u00e5\u00bd\u00e4\u00bb\u00a4\u00e8\u00a1\u00e6\u00e5\u00ae\u00e6\u00b6)\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e4\u00bd\u00bf\u00e7\u00a8\u00e5\u00be\u00e5\u00a4\u00e8\u00bd\u00ae\u00e8\u00bd\u00ac\u00ef\u00bc\u00e4\u00bc\u00e8\u00ae\u00a9\u00e6\u00b4\u00e5\u00e7\u00a0\u00b4\u00e8\u00a7\u00a3\u00e6\u00b4\u00e5\u00a0\u00e5\u00b0\u00e9\u00be\u00e3\u00e4\u00bd\u00e6\u00af\u00e9\u00e8\u00a6\u00e6\u00b3\u00a8\u00e6\u00ef\u00bc\u00e8\u00ae\u00a4\u00e8\u00af\u00e7\u00a8\u00e6\u00b7\u00e6\u00b6\u00e4\u00b9\u00e4\u00bc\u00e9\u00e8\u00a6\u00e6\u00b4\u00e5\u00a4\u00e7 CPU \u00e8\u00b5\u00e6\u00ba\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e5\u00a6\u00e6\u00e6\u00b2\u00a1\u00e6\u00e6\u00e5\u00ae\u00ef\u00bclibc \u00e4\u00bc\u00e9\u00e6\u00a9\u00e9\u00bb\u00e8\u00ae\u00a4\u00e7\u00e8\u00bd\u00ae\u00e8\u00bd\u00ac\u00e6\u00b0(5000)\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e5\u00bc\u00e5\u00bf\u00e9\u00a1\u00bb\u00e5\u00a8 1000 \u2212 999,999,999 \u00e4\u00b9\u00e9\u00b4\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e5\u00a6\u00e6\u00e5\u00aa\u00e8\u00ae\u00be\u00e7\u00bd\u00ae\u00e4\u00ba\u00e4\u00b8\u00e4\u00b8\u00aa <b>SHA_CRYPT_MIN_ROUNDS<\/b> \u00e6 <b>SHA_CRYPT_MAX_ROUNDS<\/b> \u00e5\u00bc\u00ef\u00bc\u00e5\u00b0\u00b1\u00e4\u00bc\u00e4\u00bd\u00bf\u00e7\u00a8\u00e8\u00bf\u00e4\u00b8\u00aa\u00e5\u00bc\u00e3<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">\u00e5\u00a6\u00e6 <b>SHA_CRYPT_MIN_ROUNDS<\/b> > <b>SHA_CRYPT_MAX_ROUNDS<\/b>\u00ef\u00bc\u00e5\u00b0\u00e4\u00bc\u00e4\u00bd\u00bf\u00e7\u00a8\u00e5\u00a4\u00a7\u00e7\u00e9\u00a3\u00e4\u00b8\u00aa\u00e3<\/p>\n<h2>\u00e6\u00e4\u00bb\u00b6 <a name=\"\u00e6\u00e4\u00bb\u00b6\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">\/etc\/passwd<\/p>\n<p style=\"margin-left:17%;\">\u00e7\u00a8\u00e6\u00b7\u00e8\u00b4\u00a6\u00e6\u00b7\u00e4\u00bf\u00a1\u00e6\u00af\u00e3<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">\/etc\/shadow<\/p>\n<p style=\"margin-left:17%;\">\u00e5\u00ae\u00e5\u00a8\u00e7\u00a8\u00e6\u00b7\u00e8\u00b4\u00a6\u00e6\u00b7\u00e4\u00bf\u00a1\u00e6\u00af\u00e3<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">\/etc\/login.defs<\/p>\n<p style=\"margin-left:17%;\">Shadow \u00e5\u00af\u00e7\u00a0\u00e5\u00a5\u00e4\u00bb\u00b6\u00e9\u00e7\u00bd\u00ae\u00e3<\/p>\n<h2>\u00e5\u00e8\u00a7 <a name=\"\u00e5\u00e8\u00a7\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>passwd<\/b>(1), <b>newusers<\/b>(8), <b>login.defs<\/b>(5),<b>useradd<\/b>(8).<\/p>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>CHPASSWD \u00e5\u00e7\u00a7\u00b0 \u00e5\u00a4\u00a7\u00e7\u00ba\u00b2 \u00e6\u00e8\u00bf\u00b0 \u00e9\u00e9\u00a1\u00b9 CAVEATS \u00e9\u00e7\u00bd\u00ae\u00e6\u00e4\u00bb\u00b6 \u00e6\u00e4\u00bb\u00b6 \u00e5\u00e8\u00a7 \u00e5\u00e7\u00a7\u00b0 chpasswd \u2212 \u00e6\u00b9\u00e9\u00e6\u00b4\u00e6\u00b0\u00e5\u00af\u00e7\u00a0 \u00e5\u00a4\u00a7\u00e7\u00ba\u00b2 chpasswd [\u00e9\u00e9\u00a1\u00b9] \u00e6\u00e8\u00bf\u00b0 The chpasswd command reads a list of user name and password pairs from standard input and uses this information to update a group of existing users. Each line is of the format: user_name:password \u00e9\u00bb\u00e8\u00ae\u00a4\u00e5\u00bf\u00e9\u00a1\u00bb\u00e6\u00e6\u00e6\u00e4\u00be\u00e5\u00af\u00e7\u00a0\u00ef\u00bc\u00e7\u00b6\u00e5\u00e7\u00b1 chpasswd \u00e5\u00a0\u00e5\u00af\u00e3\u00e5\u00a6\u00e6\u00e5- \u00e5\u00a8\u00e5\u00af\u00e7\u00a0\u00e5\u00b9\u00b4\u00e9\u00be\u00e4\u00bf\u00a1\u00e6\u00af\u00ef\u00bc\u00e4\u00b9\u00e4\u00bc\u00e6\u00b4\u00e6\u00b0\u00e4\u00b9\u00e3 The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[5,52,650,1284],"class_list":["post-4250","post","type-post","status-publish","format-standard","hentry","category-8-administracion-del-sistema","tag-5","tag-administracion","tag-chpasswd","tag-zh_cn"],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/4250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/comments?post=4250"}],"version-history":[{"count":0,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/4250\/revisions"}],"wp:attachment":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/media?parent=4250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/categories?post=4250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/tags?post=4250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}