Home
last modified time | relevance | path

Searched full:agent (Results 1 – 25 of 405) sorted by relevance

12345678910>>...17

/freebsd/crypto/openssh/regress/
H A Dagent.sh1 # $OpenBSD: agent.sh,v 1.21 2023/03/01 09:29:32 dtucker Exp $
4 tid="simple agent test"
11 trace "start agent, args ${EXTRA_AGENT_ARGS} -s"
12 eval `${SSHAGENT} ${EXTRA_AGENT_ARGS} -s` >`ssh_logfile ssh-agent`
15 fatal "could not start ssh-agent: exit code $r"
21 fatal "could not start second ssh-agent: exit code $r"
37 # generate user key for agent
38 rm -f $OBJ/$t-agent $OBJ/$t-agent.pub*
39 ${SSHKEYGEN} -q -N '' -t $t -f $OBJ/$t-agent ||\
40 fatal "ssh-keygen for $t-agent failed"
[all …]
H A Dhostkey-agent.sh1 # $OpenBSD: hostkey-agent.sh,v 1.13 2021/09/30 05:20:08 dtucker Exp $
4 tid="hostkey agent"
6 rm -f $OBJ/agent-key.* $OBJ/ssh_proxy.orig $OBJ/known_hosts.orig $OBJ/agent-ca*
8 trace "start agent"
11 [ $r -ne 0 ] && fatal "could not start ssh-agent: exit code $r"
18 ${SSHKEYGEN} -qt ed25519 -f $OBJ/agent-ca -N '' || fatal "ssh-keygen CA"
22 ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k"
23 ${SSHKEYGEN} -s $OBJ/agent-ca -qh -n localhost-with-alias \
24 -I localhost-with-alias $OBJ/agent-key.$k.pub || \
26 ${SSHADD} -k $OBJ/agent-key.$k >/dev/null 2>&1 || \
[all …]
H A Dagent-restrict.sh1 # $OpenBSD: agent-restrict.sh,v 1.6 2023/03/01 09:29:32 dtucker Exp $
4 tid="agent restrictions"
6 SSH_AUTH_SOCK="$OBJ/agent.sock"
8 rm -f $SSH_AUTH_SOCK $OBJ/agent.log $OBJ/host_[abcdex]* $OBJ/user_[abcdex]*
93 (printf "%s" "restrict,agent-forwarding,command=\"$_command\" ";
166 # Move the private key files out of the way to force use of agent-hosted keys.
181 ${SSHADD} -D > /dev/null 2>&1 || fatal "clear agent failed"
187 verbose "authentication w/o agent"
189 expect_succeed $h "w/o agent"
192 expect_succeed_key $h $wrongkey "\"wrong\" key w/o agent"
[all …]
H A Dagent-getpeereid.sh1 # $OpenBSD: agent-getpeereid.sh,v 1.15 2023/02/08 08:06:03 dtucker Exp $
2 # $OpenBSD: agent-getpeereid.sh,v 1.13 2021/09/01 00:50:27 dtucker Exp $
5 tid="disallow agent attach from other uid"
8 ASOCK=${OBJ}/agent
10 >$OBJ/ssh-agent.log
30 trace "start agent"
31 eval `${SSHAGENT} ${EXTRA_AGENT_ARGS} -s -a ${ASOCK}` >$OBJ/ssh-agent.log 2>&1
34 fail "could not start ssh-agent: exit code $r"
56 trace "kill agent"
57 ${SSHAGENT} -k >>$OBJ/ssh-agent.log 2>&1
[all …]
H A Dagent-pkcs11-restrict.sh1 # $OpenBSD: agent-pkcs11-restrict.sh,v 1.1 2023/12/18 14:49:39 djm Exp $
4 tid="pkcs11 agent constraint test"
8 rm -f $SSH_AUTH_SOCK $OBJ/agent.log $OBJ/host_[abcx]* $OBJ/user_[abcx]*
29 SSH_AUTH_SOCK="$OBJ/agent.sock"
32 trace "start agent"
33 ${SSHAGENT} ${EXTRA_AGENT_ARGS} -d -a $SSH_AUTH_SOCK > $OBJ/agent.log 2>&1 &
47 # XXX a lot of this is a copy of agent-restrict.sh, but I couldn't see a nice
106 echo AGENT
117 (printf "%s" "restrict,agent-forwarding,command=\"$OBJ/command\" ";
122 $SSHADD -qD >/dev/null || fatal "clear agent failed"
[all …]
H A DREADME.regress49 $ make tests LTESTS=agent-timeout
57 agent-timeout.sh
58 ok agent timeout test
84 agent.sh: simple connect via agent
85 agent-getpeereid.sh: disallow agent attach from other uid
86 agent-timeout.sh: agent timeout test
87 agent-ptrace.sh: disallow agent ptrace attach
132 hostkey-agent.sh: hostkey agent
145 $ PATH=`pwd`/..:$PATH:. sh -x test-exec.sh `pwd` agent-timeout.sh
H A Dagent-pkcs11.sh1 # $OpenBSD: agent-pkcs11.sh,v 1.13 2023/10/30 23:00:25 djm Exp $
4 tid="pkcs11 agent test"
8 trace "start agent"
12 fail "could not start ssh-agent: exit code $r"
14 trace "add pkcs11 key to agent"
21 trace "pkcs11 list via agent"
37 trace "pkcs11 connect via agent ($k)"
52 trace "kill agent"
H A Dagent-timeout.sh1 # $OpenBSD: agent-timeout.sh,v 1.6 2019/11/26 23:43:10 djm Exp $
4 tid="agent timeout test"
8 trace "start agent"
12 fail "could not start ssh-agent: exit code $r"
24 trace "agent has $n keys"
31 ${SSHADD} -l 2> /dev/null | grep 'The agent has no identities.' >/dev/null
36 trace "kill agent"
H A DMakefile45 agent \
46 agent-getpeereid \
47 agent-timeout \
48 agent-ptrace \
49 agent-subprocess \
95 hostkey-agent \
106 agent-restrict \
111 agent-pkcs11-restrict \
112 agent-pkcs11-cert \
120 EXTRA_TESTS= agent-pkcs11
[all …]
/freebsd/sys/ofed/drivers/infiniband/core/
H A Dib_mad_rmpp.c51 struct ib_mad_agent_private *agent; member
91 void ib_cancel_rmpp_recvs(struct ib_mad_agent_private *agent) in ib_cancel_rmpp_recvs() argument
96 spin_lock_irqsave(&agent->lock, flags); in ib_cancel_rmpp_recvs()
97 list_for_each_entry(rmpp_recv, &agent->rmpp_list, list) { in ib_cancel_rmpp_recvs()
102 spin_unlock_irqrestore(&agent->lock, flags); in ib_cancel_rmpp_recvs()
104 list_for_each_entry(rmpp_recv, &agent->rmpp_list, list) { in ib_cancel_rmpp_recvs()
109 flush_workqueue(agent->qp_info->port_priv->wq); in ib_cancel_rmpp_recvs()
112 &agent->rmpp_list, list) { in ib_cancel_rmpp_recvs()
145 msg = ib_create_send_mad(&rmpp_recv->agent->agent, recv_wc->wc->src_qp, in ack_recv()
159 static struct ib_mad_send_buf *alloc_response_msg(struct ib_mad_agent *agent, in alloc_response_msg() argument
[all …]
H A Dib_agent.c44 #include "agent.h"
52 struct ib_mad_agent *agent[2]; member
64 if (entry->agent[1]->device == device && in __ib_get_agent_port()
65 entry->agent[1]->port_num == port_num) in __ib_get_agent_port()
88 struct ib_mad_agent *agent; in agent_send_response() local
99 dev_err(&device->dev, "Unable to find port agent\n"); in agent_send_response()
103 agent = port_priv->agent[qpn]; in agent_send_response()
104 ah = ib_create_ah_from_wc(agent->qp->pd, wc, grh, port_num); in agent_send_response()
114 send_buf = ib_create_send_mad(agent, wc->src_qp, wc->pkey_index, 0, in agent_send_response()
167 /* Obtain send only MAD agent for SMI QP */ in ib_agent_port_open()
[all …]
H A Dib_user_mad.c116 struct ib_mad_agent *agent[IB_UMAD_MAX_AGENTS]; member
161 return file->agents_dead ? NULL : file->agent[id]; in __get_agent()
165 struct ib_mad_agent *agent, in queue_packet() argument
175 if (agent == __get_agent(file, packet->mad.hdr.id)) { in queue_packet()
195 static void send_handler(struct ib_mad_agent *agent, in send_handler() argument
198 struct ib_umad_file *file = agent->context; in send_handler()
208 if (!queue_packet(file, agent, packet)) in send_handler()
214 static void recv_handler(struct ib_mad_agent *agent, in recv_handler() argument
218 struct ib_umad_file *file = agent->context; in recv_handler()
243 ret = ib_init_ah_from_wc(agent->device, agent->port_num, in recv_handler()
[all …]
H A Dib_mad.c54 #include "agent.h"
360 mad_agent_priv->agent.rmpp_version = rmpp_version; in ib_register_mad_agent()
361 mad_agent_priv->agent.device = device; in ib_register_mad_agent()
362 mad_agent_priv->agent.recv_handler = recv_handler; in ib_register_mad_agent()
363 mad_agent_priv->agent.send_handler = send_handler; in ib_register_mad_agent()
364 mad_agent_priv->agent.context = context; in ib_register_mad_agent()
365 mad_agent_priv->agent.qp = port_priv->qp_info[qpn].qp; in ib_register_mad_agent()
366 mad_agent_priv->agent.port_num = port_num; in ib_register_mad_agent()
367 mad_agent_priv->agent.flags = registration_flags; in ib_register_mad_agent()
380 mad_agent_priv->agent.hi_tid = ++ib_mad_client_id; in ib_register_mad_agent()
[all …]
/freebsd/crypto/openssh/
H A Dssh-agent.11 .\" $OpenBSD: ssh-agent.1,v 1.79 2023/08/10 14:37:32 naddy Exp $
41 .Nm ssh-agent
42 .Nd OpenSSH authentication agent
44 .Nm ssh-agent
52 .Nm ssh-agent
59 .Nm ssh-agent
65 Through use of environment variables the agent can be located
73 Bind the agent to the
78 .Pa $TMPDIR/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt .
104 Kill the current agent (given by the
[all …]
H A DPROTOCOL.agent1 The SSH agent protocol is described in
2 https://tools.ietf.org/html/draft-miller-ssh-agent
4 This file documents OpenSSH's extensions to the agent protocol.
8 This extension allows a ssh client to bind an agent connection to a
11 exchange. This binding is verifiable at the agent by including the
31 When an agent received this message, it will verify the signature and
42 smartcard keys are added to an agent.
65 When receiving this message, the agent will ensure that the
68 and signify the initial hop from the host running ssh-agent). The agent
74 the agent connection over which they were received.
[all …]
H A Dssh-add.143 .Nd adds private key identities to the OpenSSH authentication agent
64 adds private key identities to the authentication agent,
65 .Xr ssh-agent 1 .
88 The authentication agent must be running and the
97 When loading keys into or deleting keys from the agent, process
108 Deletes all identities from the agent.
110 Instead of adding identities, removes identities from the agent.
116 public key files to specify keys and certificates to be removed from the agent.
162 .Xr ssh-agent 1 )
168 .Xr ssh-agent 1
[all …]
/freebsd/contrib/ofed/libibmad/
H A Dregister.c87 int vers, agent; in mad_register_port_client() local
94 agent = umad_register(port_id, mgmt, vers, rmpp_version, 0); in mad_register_port_client()
95 if (agent < 0) in mad_register_port_client()
96 DEBUG("Can't register agent for class %d", mgmt); in mad_register_port_client()
98 return agent; in mad_register_port_client()
109 int agent; in mad_register_client_via() local
114 agent = mad_register_port_client(mad_rpc_portid(srcport), mgmt, in mad_register_client_via()
116 if (agent < 0) in mad_register_client_via()
117 return agent; in mad_register_client_via()
119 srcport->class_agents[mgmt] = agent; in mad_register_client_via()
[all …]
/freebsd/usr.sbin/nscd/
H A Dagent.c33 #include "agent.h"
39 struct agent const *ap1 = *((struct agent const **)a1); in agent_cmp_func()
40 struct agent const *ap2 = *((struct agent const **)a2); in agent_cmp_func()
70 register_agent(struct agent_table *at, struct agent *a) in register_agent()
72 struct agent **new_agents; in register_agent()
82 memcpy(new_agents, at->agents, at->agents_num * sizeof(struct agent *)); in register_agent()
84 qsort(new_agents, new_agents_num, sizeof(struct agent *), in register_agent()
93 struct agent *
96 struct agent **res; in find_agent()
97 struct agent model, *model_p; in find_agent()
[all …]
/freebsd/lib/libpmc/
H A Dpmc.atom.3136 Events that require an agent qualifier to be specified use an
138 .Dq Li agent= Ns agent ,
140 .Ar agent
144 Measure events associated with this bus agent.
146 Measure events caused by any bus agent.
328 .It Li BUS_BNR_DRV Op ,agent= Ns Ar agent
336 .It Li BUS_DRDY_CLOCKS Op ,agent= Ns Ar agent
341 .It Li BUS_HIT_DRV Op ,agent= Ns Ar agent
347 .It Li BUS_HITM_DRV Op ,agent= Ns Ar agent
358 .Op ,agent= Ns Ar agent
[all …]
H A Dpmc.core2.3135 Events that require an agent qualifier to be specified use an
137 .Dq Li agent= Ns agent ,
139 .Ar agent
143 Measure events associated with this bus agent.
145 Measure events caused by any bus agent.
324 .It Li BUS_BNR_DRV Op ,agent= Ns Ar agent
330 .It Li BUS_DRDY_CLOCKS Op ,agent= Ns Ar agent
334 .It Li BUS_HIT_DRV Op ,agent= Ns Ar agent
339 .It Li BUS_HITM_DRV Op ,agent= Ns Ar agent
349 .Op ,agent= Ns Ar agent
[all …]
H A Dpmc.core.3127 Events that require an agent qualifier to be specified use an
129 .Dq Li agent= Ns value ,
135 Measure events associated with this bus agent.
137 Measure events caused by any bus agent.
264 .It Li Bus_DRDY_Clocks Op ,agent= Ns Ar agent
278 .Op ,agent= Ns Ar agent
288 .Op ,agent= Ns Ar agent
294 .It Li Bus_Trans_Any Op ,agent= Ns Ar agent
300 .It Li Bus_Trans_Burst Op ,agent= Ns Ar agent
308 .Op ,agent= Ns Ar agent
[all …]
/freebsd/contrib/llvm-project/llvm/lib/ExecutionEngine/OProfileJIT/
H A DOProfileWrapper.cpp33 // Global mutex to ensure a single thread initializes oprofile agent.
41 : Agent(0), in OProfileWrapper()
186 Agent = OpenAgentFunc(); in op_open_agent()
187 return Agent != 0; in op_open_agent()
198 if (Agent && CloseAgentFunc) { in op_close_agent()
199 ret = CloseAgentFunc(Agent); in op_close_agent()
201 Agent = 0; in op_close_agent()
208 return Agent != 0; in isAgentAvailable()
218 if (Agent && WriteNativeCodeFunc) in op_write_native_code()
219 return WriteNativeCodeFunc(Agent, Name, Addr, Code, Size); in op_write_native_code()
[all …]
/freebsd/contrib/ofed/infiniband-diags/src/
H A Dmcm_rereg_test.c94 static int rereg_send(int port, int agent, ib_portid_t * dport, in rereg_send() argument
103 if (umad_send(port, agent, umad, len, TMO, 0) < 0) { in rereg_send()
115 static int rereg_port_gid(int port, int agent, ib_portid_t * dport, in rereg_port_gid() argument
124 if (umad_send(port, agent, umad, len, TMO, 0) < 0) { in rereg_port_gid()
132 if (umad_send(port, agent, umad, len, TMO, 0) < 0) { in rereg_port_gid()
148 static int rereg_send_all(int port, int agent, ib_portid_t * dport, in rereg_send_all() argument
166 rereg_port_gid(port, agent, dport, umad, len, list[i].gid); in rereg_send_all()
183 static int rereg_recv(int port, int agent, ib_portid_t * dport, in rereg_recv() argument
206 static int rereg_recv_all(int port, int agent, ib_portid_t * dport, in rereg_recv_all() argument
224 while (rereg_recv(port, agent, dport, umad, len, TMO) > 0) { in rereg_recv_all()
[all …]
/freebsd/lib/libpam/modules/pam_ssh/
H A Dpam_ssh.c85 static const char *pam_ssh_agent = "/usr/bin/ssh-agent";
86 static char str_ssh_agent[] = "ssh-agent";
235 * Parses a line from ssh-agent's output.
270 * Starts an ssh agent and stores the environment variables derived from
280 /* get a pipe which we will use to read the agent's output */ in pam_ssh_start_agent()
284 /* start the agent */ in pam_ssh_start_agent()
285 openpam_log(PAM_LOG_DEBUG, "starting an ssh agent"); in pam_ssh_start_agent()
296 /* child: drop privs, close fds and start agent */ in pam_ssh_start_agent()
320 * Adds previously stored keys to a running agent.
338 /* get a connection to the agent */ in pam_ssh_add_keys_to_agent()
[all …]
/freebsd/crypto/openssh/contrib/
H A Dssh-copy-id.156 .Xr ssh-agent 1
139 .Xr ssh-agent 1
167 .Xr ssh-agent 1 .
170 option, then load one or more old keys into the agent, possibly by
173 option to allow agent forwarding:
193 file, rather than just the filename that was loaded into your agent.
196 .Xr ssh-agent 1 .
198 .Xr ssh-agent 1
204 option, you might consider using this whenever using agent forwarding
214 .Xr ssh-agent 1 .
[all …]

12345678910>>...17