.\" Modified Sun Jun 18 01:53:57 1995 by Andries Brouwer (aeb@cwi.nl)
.\" Modified Mon Jan 5 20:24:40 MET 1998 by Michael Haardt
.\" (michael@cantor.informatik.rwth-aachen.de)
-.TH PASSWD 5 2018-04-30 "Linux man-pages (unreleased)"
+.TH passwd 5 (date) "Linux man-pages (unreleased)"
.SH NAME
passwd \- password file
.SH DESCRIPTION
basic assumption used to be that of a friendly user-community.
These days many people run some version of the shadow password suite, where
.I /etc/passwd
-has an \(aqx\(aq character in the password field,
+has an \[aq]x\[aq] character in the password field,
and the encrypted passwords are in
.IR /etc/shadow ,
which is readable by the superuser only.
.IR /etc/shadow ,
is an empty string, login is allowed without even asking for a password.
Note that this functionality may be intentionally disabled in applications,
-or configurable (for example using the "nullok" or "nonull" arguments to
-pam_unix.so).
+or configurable (for example using the
+.RB \[dq] nullok \[dq]
+or
+.RB \[dq] nonull \[dq]
+arguments to
+.BR pam_unix (8)).
.PP
If the encrypted password in
.I /etc/passwd
.TP
.I password
This is either the encrypted user password,
-an asterisk (*), or the letter \(aqx\(aq.
+an asterisk (*), or the letter \[aq]x\[aq].
(See
.BR pwconv (8)
-for an explanation of \(aqx\(aq.)
+for an explanation of \[aq]x\[aq].)
.TP
.I UID
The privileged