Home
last modified time | relevance | path

Searched refs:USER (Results 1 – 25 of 146) sorted by relevance

123456

/freebsd/crypto/openssh/regress/
H A Dcert-userkey.sh6 rm -f $OBJ/authorized_keys_${USER}* $OBJ/user_ca_key* $OBJ/cert_user_key*
58 -I "regress user key for $USER" \
59 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
69 rm -f $OBJ/authorized_keys_${USER}* $OBJ/authorized_principals_${USER}*
70 touch $OBJ/authorized_keys_${USER}_A
71 touch $OBJ/authorized_keys_${USER}_Z
72 touch $OBJ/authorized_principals_${USER}_A
73 touch $OBJ/authorized_principals_${USER}_Z
88 rm -f $OBJ/authorized_principals_${USER}_X
97 echo > $OBJ/authorized_principals_${USER}_X
[all …]
H A Dmultipubkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 ||
51 rm -f $OBJ/authorized_principals_$USER
52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
57 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
63 rm -f $OBJ/authorized_principals_$USER
65 $OBJ/authorized_keys_$USER
[all …]
H A Dcfgmatchlisten.sh154 cp /dev/null $OBJ/authorized_keys_$USER
156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER
157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
171 cp /dev/null $OBJ/authorized_keys_$USER
173 printf 'permitlisten="'$fwdspec2'" ' >> $OBJ/authorized_keys_$USER
174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
183 cp /dev/null $OBJ/authorized_keys_$USER
185 printf 'permitlisten="'$fwdport'" ' >> $OBJ/authorized_keys_$USER
186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
195 cp /dev/null $OBJ/authorized_keys_$USER
[all …]
H A Dpenalty.sh7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak
13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
25 cat /dev/null > $OBJ/authorized_keys_${USER}
27 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
35 cat /dev/null > $OBJ/authorized_keys_${USER}
37 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
H A Dforward-control.sh90 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak
108 cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER}
138 < ${OBJ}/authorized_keys_${USER}.bak \
139 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail"
147 < ${OBJ}/authorized_keys_${USER}.bak \
148 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail"
158 < ${OBJ}/authorized_keys_${USER}.bak \
159 > ${OBJ}/authorized_keys_${USER} || fatal "sed 3 fail"
166 < ${OBJ}/authorized_keys_${USER}.bak \
167 > ${OBJ}/authorized_keys_${USER} || fatal "sed 4 fail"
[all …]
H A Dprincipals-command.sh26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \
69 rm -f $OBJ/authorized_keys_$USER
84 echo > $OBJ/authorized_principals_$USER
93 echo gregorsamsa > $OBJ/authorized_principals_$USER
102 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
111 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
121 $OBJ/authorized_principals_$USER
132 $OBJ/authorized_principals_$USER
141 rm -f $OBJ/authorized_principals_$USER
151 ) > $OBJ/authorized_keys_$USER
[all …]
H A Dpenalty-expire.sh7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak
13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
25 cat /dev/null > $OBJ/authorized_keys_${USER}
30 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
H A Dcert-file.sh29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
30 -z $$ -n ${USER} $OBJ/user_key1 ||
33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \
34 -z $$ -n ${USER} $OBJ/user_key1 ||
37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
38 -z $$ -n ${USER} $OBJ/user_key3 ||
41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
42 -z $$ -n ${USER} $OBJ/user_key4 ||
49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
H A Dlimit-keytype.sh8 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
9 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
43 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
44 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 ||
55 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER
119 "Match user x$USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
129 "Match user $USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
H A Dscp-uri.sh37 $SCP $scpopts ${DATA} "scp://${USER}@somehost:${PORT}/${COPY}" || fail "copy failed"
42 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed"
48 $SCP $scpopts ${COPY} "scp://${USER}@somehost:${PORT}/${DIR}" || fail "copy failed"
54 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed"
61 $SCP $scpopts -r ${DIR} "scp://${USER}@somehost:${PORT}/${DIR2}" || fail "copy failed"
70 $SCP $scpopts -r "scp://${USER}@somehost:${PORT}/${DIR}" ${DIR2} || fail "copy failed"
H A Dssh-com.sh63 mkdir -p ${OBJ}/${USER}
64 cp /dev/null ${OBJ}/${USER}/authorization
66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com
67 echo Key $t.com >> ${OBJ}/${USER}/authorization
115 rm -rf ${OBJ}/${USER}
H A Dsftp-uri.sh26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "…
32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c…
38 "sftp://${USER}@somehost:${PORT}/${DIR}/" > /dev/null 2>&1 << EOF
52 "sftp://${USER}@somehost:${PORT}/${DIR}" > /dev/null 2>&1 << EOF
H A Dconnect-uri.sh13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true
19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true
25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
H A Dforcecommand.sh10 cp /dev/null $OBJ/authorized_keys_$USER
13 printf "command=\"$cmd\" " >>$OBJ/authorized_keys_$USER
14 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
47 echo "Match User $USER" >> $OBJ/sshd_proxy
H A Dssh-com-client.sh35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER
47 mkdir -p ${OBJ}/${USER}/hostkeys
48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1
57 User ${USER}
H A Dtest-exec.sh45 USER=`/usr/ucb/whoami`
47 USER=`whoami`
49 USER=`logname`
51 USER=`id -un`
54 LOGNAME="${USER}"
343 test -z "$SUDO" || chown $USER \$logfile
535 $SUDO chown -R $USER $logfile
693 User $USER
709 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER
754 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
[all …]
H A Dpercent.sh6 USER=`id -u -n`
100 REMUSER=$USER ;;
122 trial $i '%u' $USER
129 out="%/$USERID/127.0.0.1/$HOME/$HOST/$HOSTNAME/somehost/$PORT/$REMUSER/$USER"
H A Dbrokenkeys.sh6 KEYS="$OBJ/authorized_keys_${USER}"
15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
H A Dagent-ptrace.sh15 if [ "x$USER" = "xroot" ]; then
41 trap "$SUDO chown ${USER} ${SSHAGENT}; $SUDO chmod 755 ${SSHAGENT}" 0
/freebsd/bin/ps/
H A Dkeyword.c73 {"args", {NULL}, "COMMAND", "arguments", COMM|LJUST|USER, arguments, 0,
80 {"command", {NULL}, "COMMAND", "command", COMM|LJUST|USER, command, 0,
92 {"etime", {NULL}, "ELAPSED", "elapsed-time", USER, elapsed, 0,
94 {"etimes", {NULL}, "ELAPSED", "elapsed-times", USER, elapseds, 0,
105 {"inblk", {NULL}, "INBLK", "read-blocks", USER, rvar, ROFF(ru_inblock),
121 {"lstart", {NULL}, "STARTED", "start-time", LJUST|USER, lstarted, 0,
125 {"majflt", {NULL}, "MAJFLT", "major-faults", USER, rvar, ROFF(ru_majflt),
127 {"minflt", {NULL}, "MINFLT", "minor-faults", USER, rvar, ROFF(ru_minflt),
129 {"msgrcv", {NULL}, "MSGRCV", "received-messages", USER, rvar,
131 {"msgsnd", {NULL}, "MSGSND", "sent-messages", USER, rvar,
[all …]
/freebsd/tools/tools/hcomp/
H A DMakefile2 BINOWN ?= ${USER}
3 BINGRP ?= ${USER}
7 MANOWN ?= ${USER}
8 MANGRP ?= ${USER}
/freebsd/cddl/usr.sbin/dwatch/
H A Ddwatch97 USER= # -u user
569 [ "$USER" ] && ARGV="$ARGV -u $USER"
771 u) USER="$OPTARG" ;;
845 case "$USER" in
847 *[![:alnum:]_-]*) RUID="$USER" ;;
848 *[!0-9]*) RUID=$( id -u "$USER" 2> /dev/null ) || die "No such user: $USER" ;;
849 *) RUID=$USER
1073 if [ $COUNT -eq 0 -a ! "$EXECREGEX$FILTER$GROUP$OUTPUT_CMD$PID$USER" ]
1101 [ "$USER" ] && msg="$msg user: $USER"
/freebsd/contrib/one-true-awk/testdir/
H A Dfunstack.awk631 USER = ENVIRON["USER"]
632 if (USER == "")
633 USER = ENVIRON["LOGNAME"]
634 if (USER == "")
635 USER = "????"
638 ("ypcat passwd | grep '^" USER ":' | awk -F: '{print $5}'") | getline PERSONAL_NAME
640 ("grep '^" USER ":' /etc/passwd | awk -F: '{print $5}'") | getline PERSONAL_NAME
646 print "<!-- for " PERSONAL_NAME " (" USER "@" HOSTNAME ") -->"
656 print prefix(2) "<LINK REV=\"made\" HREF=\"mailto:" USER "@" HOSTNAME "\">"
/freebsd/sys/contrib/device-tree/src/arm64/hisilicon/
H A Dhi3798cv200-poplar.dts140 gpio-line-names = "", "USER-LED-1",
141 "USER-LED-2", "",
149 "", "USER-LED-0",
159 "USER-LED-3", "";
/freebsd/contrib/ntp/scripts/rc/
H A Dntpd5 USER=ntp
7 NTPD_OPTS="-g -u $USER:$GROUP -p $PIDFILE"

123456