/freebsd/crypto/openssh/regress/ |
H A D | cert-userkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 55 -I "regress user key for $USER" \ 56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 66 rm -f $OBJ/authorized_keys_$USER 81 rm -f $OBJ/authorized_principals_$USER 90 echo > $OBJ/authorized_principals_$USER 99 echo gregorsamsa > $OBJ/authorized_principals_$USER 108 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 117 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 127 $OBJ/authorized_principals_$USER [all …]
|
H A D | multipubkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 || 51 rm -f $OBJ/authorized_principals_$USER 52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 63 rm -f $OBJ/authorized_principals_$USER 65 $OBJ/authorized_keys_$USER [all …]
|
H A D | cfgmatchlisten.sh | 154 cp /dev/null $OBJ/authorized_keys_$USER 156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER 157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 171 cp /dev/null $OBJ/authorized_keys_$USER 173 printf 'permitlisten="'$fwdspec2'" ' >> $OBJ/authorized_keys_$USER 174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 183 cp /dev/null $OBJ/authorized_keys_$USER 185 printf 'permitlisten="'$fwdport'" ' >> $OBJ/authorized_keys_$USER 186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 195 cp /dev/null $OBJ/authorized_keys_$USER [all …]
|
H A D | penalty.sh | 7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak 13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 25 cat /dev/null > $OBJ/authorized_keys_${USER} 27 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 35 cat /dev/null > $OBJ/authorized_keys_${USER} 37 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
|
H A D | forward-control.sh | 90 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak 108 cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER} 138 < ${OBJ}/authorized_keys_${USER}.bak \ 139 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail" 147 < ${OBJ}/authorized_keys_${USER}.bak \ 148 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail" 158 < ${OBJ}/authorized_keys_${USER}.bak \ 159 > ${OBJ}/authorized_keys_${USER} || fatal "sed 3 fail" 166 < ${OBJ}/authorized_keys_${USER}.bak \ 167 > ${OBJ}/authorized_keys_${USER} || fatal "sed 4 fail" [all …]
|
H A D | principals-command.sh | 26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \ 69 rm -f $OBJ/authorized_keys_$USER 84 echo > $OBJ/authorized_principals_$USER 93 echo gregorsamsa > $OBJ/authorized_principals_$USER 102 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 111 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 121 $OBJ/authorized_principals_$USER 132 $OBJ/authorized_principals_$USER 141 rm -f $OBJ/authorized_principals_$USER 151 ) > $OBJ/authorized_keys_$USER [all …]
|
H A D | penalty-expire.sh | 7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak 13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 25 cat /dev/null > $OBJ/authorized_keys_${USER} 30 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
|
H A D | cert-file.sh | 29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 30 -z $$ -n ${USER} $OBJ/user_key1 || 33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \ 34 -z $$ -n ${USER} $OBJ/user_key1 || 37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 38 -z $$ -n ${USER} $OBJ/user_key3 || 41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 42 -z $$ -n ${USER} $OBJ/user_key4 || 49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
|
H A D | limit-keytype.sh | 8 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 9 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 43 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 44 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 || 55 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER 119 "Match user x$USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`" 129 "Match user $USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
|
H A D | scp-uri.sh | 37 $SCP $scpopts ${DATA} "scp://${USER}@somehost:${PORT}/${COPY}" || fail "copy failed" 42 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed" 48 $SCP $scpopts ${COPY} "scp://${USER}@somehost:${PORT}/${DIR}" || fail "copy failed" 54 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed" 61 $SCP $scpopts -r ${DIR} "scp://${USER}@somehost:${PORT}/${DIR2}" || fail "copy failed" 70 $SCP $scpopts -r "scp://${USER}@somehost:${PORT}/${DIR}" ${DIR2} || fail "copy failed"
|
H A D | ssh-com.sh | 63 mkdir -p ${OBJ}/${USER} 64 cp /dev/null ${OBJ}/${USER}/authorization 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 67 echo Key $t.com >> ${OBJ}/${USER}/authorization 115 rm -rf ${OBJ}/${USER}
|
H A D | sftp-uri.sh | 26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "… 32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c… 38 "sftp://${USER}@somehost:${PORT}/${DIR}/" > /dev/null 2>&1 << EOF 52 "sftp://${USER}@somehost:${PORT}/${DIR}" > /dev/null 2>&1 << EOF
|
H A D | connect-uri.sh | 13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true 19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true 25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
|
H A D | forcecommand.sh | 10 cp /dev/null $OBJ/authorized_keys_$USER 13 printf "command=\"$cmd\" " >>$OBJ/authorized_keys_$USER 14 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 47 echo "Match User $USER" >> $OBJ/sshd_proxy
|
H A D | ssh-com-client.sh | 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 47 mkdir -p ${OBJ}/${USER}/hostkeys 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1 57 User ${USER}
|
H A D | percent.sh | 6 USER=`id -u -n` 71 REMUSER=$USER ;; 93 trial $i '%u' $USER 99 out="%/$USERID/127.0.0.1/$HOME/$HOST/$HOSTNAME/somehost/$PORT/$REMUSER/$USER"
|
H A D | test-exec.sh | 45 USER=`/usr/ucb/whoami` 47 USER=`whoami` 49 USER=`logname` 51 USER=`id -un` 54 LOGNAME="${USER}" 332 test -z "$SUDO" || chown $USER \$logfile 524 $SUDO chown -R $USER $logfile 681 User $USER 697 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER 742 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER [all …]
|
H A D | brokenkeys.sh | 6 KEYS="$OBJ/authorized_keys_${USER}" 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | agent-restrict.sh | 91 >$OBJ/authorized_keys_$USER 94 cat $OBJ/user_$h.pub) >> $OBJ/authorized_keys_$USER 273 $SSHADD -h "${USER}@host_$h" -H $OBJ/known_hosts -q $OBJ/user_$h \ 396 cp $OBJ/user_a.pub $OBJ/authorized_keys_$USER # only one key used. 427 $SSHADD -h host_a -h "host_a>${USER}@host_b" -h "host_b>${USER}@host_c" \ 428 -h "host_c>${USER}@host_d" -h "host_d>${USER}@host_e" \
|
/freebsd/bin/ps/ |
H A D | keyword.c | 66 {"args", "COMMAND", NULL, "arguments", COMM|LJUST|USER, arguments, 0, 73 {"command", "COMMAND", NULL, "command", COMM|LJUST|USER, command, 0, 85 {"etime", "ELAPSED", NULL, "elapsed-time", USER, elapsed, 0, CHAR, 87 {"etimes", "ELAPSED", NULL, "elapsed-times", USER, elapseds, 0, CHAR, 98 {"inblk", "INBLK", NULL, "read-blocks", USER, rvar, ROFF(ru_inblock), 114 {"lstart", "STARTED", NULL, "start-time", LJUST|USER, lstarted, 0, 118 {"majflt", "MAJFLT", NULL, "major-faults", USER, rvar, ROFF(ru_majflt), 120 {"minflt", "MINFLT", NULL, "minor-faults", USER, rvar, ROFF(ru_minflt), 122 {"msgrcv", "MSGRCV", NULL, "received-messages", USER, rvar, 124 {"msgsnd", "MSGSND", NULL, "sent-messages", USER, rvar, [all …]
|
/freebsd/tools/tools/hcomp/ |
H A D | Makefile | 2 BINOWN ?= ${USER} 3 BINGRP ?= ${USER} 7 MANOWN ?= ${USER} 8 MANGRP ?= ${USER}
|
/freebsd/cddl/usr.sbin/dwatch/ |
H A D | dwatch | 97 USER= # -u user 569 [ "$USER" ] && ARGV="$ARGV -u $USER" 771 u) USER="$OPTARG" ;; 845 case "$USER" in 847 *[![:alnum:]_-]*) RUID="$USER" ;; 848 *[!0-9]*) RUID=$( id -u "$USER" 2> /dev/null ) || die "No such user: $USER" ;; 849 *) RUID=$USER 1073 if [ $COUNT -eq 0 -a ! "$EXECREGEX$FILTER$GROUP$OUTPUT_CMD$PID$USER" ] 1101 [ "$USER" ] && msg="$msg user: $USER"
|
/freebsd/contrib/one-true-awk/testdir/ |
H A D | funstack.awk | 631 USER = ENVIRON["USER"] 632 if (USER == "") 633 USER = ENVIRON["LOGNAME"] 634 if (USER == "") 635 USER = "????" 638 ("ypcat passwd | grep '^" USER ":' | awk -F: '{print $5}'") | getline PERSONAL_NAME 640 ("grep '^" USER ":' /etc/passwd | awk -F: '{print $5}'") | getline PERSONAL_NAME 646 print "<!-- for " PERSONAL_NAME " (" USER "@" HOSTNAME ") -->" 656 print prefix(2) "<LINK REV=\"made\" HREF=\"mailto:" USER "@" HOSTNAME "\">"
|
/freebsd/sys/contrib/device-tree/src/arm64/hisilicon/ |
H A D | hi3798cv200-poplar.dts | 140 gpio-line-names = "", "USER-LED-1", 141 "USER-LED-2", "", 149 "", "USER-LED-0", 159 "USER-LED-3", "";
|
/freebsd/contrib/ntp/scripts/rc/ |
H A D | ntpd | 5 USER=ntp 7 NTPD_OPTS="-g -u $USER:$GROUP -p $PIDFILE"
|