Home
last modified time | relevance | path

Searched refs:USER (Results 1 – 25 of 140) sorted by relevance

123456

/freebsd/crypto/openssh/regress/
H A Dcert-userkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key*
55 -I "regress user key for $USER" \
56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
66 rm -f $OBJ/authorized_keys_$USER
81 rm -f $OBJ/authorized_principals_$USER
90 echo > $OBJ/authorized_principals_$USER
99 echo gregorsamsa > $OBJ/authorized_principals_$USER
108 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
117 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
127 $OBJ/authorized_principals_$USER
[all …]
H A Dmultipubkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 ||
51 rm -f $OBJ/authorized_principals_$USER
52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
57 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
63 rm -f $OBJ/authorized_principals_$USER
65 $OBJ/authorized_keys_$USER
[all …]
H A Dcfgmatchlisten.sh154 cp /dev/null $OBJ/authorized_keys_$USER
156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER
157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
171 cp /dev/null $OBJ/authorized_keys_$USER
173 printf 'permitlisten="'$fwdspec2'" ' >> $OBJ/authorized_keys_$USER
174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
183 cp /dev/null $OBJ/authorized_keys_$USER
185 printf 'permitlisten="'$fwdport'" ' >> $OBJ/authorized_keys_$USER
186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
195 cp /dev/null $OBJ/authorized_keys_$USER
[all …]
H A Dpenalty.sh7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak
13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
25 cat /dev/null > $OBJ/authorized_keys_${USER}
27 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
35 cat /dev/null > $OBJ/authorized_keys_${USER}
37 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
H A Dforward-control.sh90 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak
108 cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER}
138 < ${OBJ}/authorized_keys_${USER}.bak \
139 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail"
147 < ${OBJ}/authorized_keys_${USER}.bak \
148 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail"
158 < ${OBJ}/authorized_keys_${USER}.bak \
159 > ${OBJ}/authorized_keys_${USER} || fatal "sed 3 fail"
166 < ${OBJ}/authorized_keys_${USER}.bak \
167 > ${OBJ}/authorized_keys_${USER} || fatal "sed 4 fail"
[all …]
H A Dprincipals-command.sh26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \
69 rm -f $OBJ/authorized_keys_$USER
84 echo > $OBJ/authorized_principals_$USER
93 echo gregorsamsa > $OBJ/authorized_principals_$USER
102 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
111 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
121 $OBJ/authorized_principals_$USER
132 $OBJ/authorized_principals_$USER
141 rm -f $OBJ/authorized_principals_$USER
151 ) > $OBJ/authorized_keys_$USER
[all …]
H A Dpenalty-expire.sh7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak
13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
25 cat /dev/null > $OBJ/authorized_keys_${USER}
30 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
H A Dcert-file.sh29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
30 -z $$ -n ${USER} $OBJ/user_key1 ||
33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \
34 -z $$ -n ${USER} $OBJ/user_key1 ||
37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
38 -z $$ -n ${USER} $OBJ/user_key3 ||
41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
42 -z $$ -n ${USER} $OBJ/user_key4 ||
49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
H A Dlimit-keytype.sh8 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
9 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
43 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
44 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 ||
55 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER
119 "Match user x$USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
129 "Match user $USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
H A Dscp-uri.sh37 $SCP $scpopts ${DATA} "scp://${USER}@somehost:${PORT}/${COPY}" || fail "copy failed"
42 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed"
48 $SCP $scpopts ${COPY} "scp://${USER}@somehost:${PORT}/${DIR}" || fail "copy failed"
54 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed"
61 $SCP $scpopts -r ${DIR} "scp://${USER}@somehost:${PORT}/${DIR2}" || fail "copy failed"
70 $SCP $scpopts -r "scp://${USER}@somehost:${PORT}/${DIR}" ${DIR2} || fail "copy failed"
H A Dssh-com.sh63 mkdir -p ${OBJ}/${USER}
64 cp /dev/null ${OBJ}/${USER}/authorization
66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com
67 echo Key $t.com >> ${OBJ}/${USER}/authorization
115 rm -rf ${OBJ}/${USER}
H A Dsftp-uri.sh26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "…
32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c…
38 "sftp://${USER}@somehost:${PORT}/${DIR}/" > /dev/null 2>&1 << EOF
52 "sftp://${USER}@somehost:${PORT}/${DIR}" > /dev/null 2>&1 << EOF
H A Dconnect-uri.sh13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true
19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true
25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
H A Dforcecommand.sh10 cp /dev/null $OBJ/authorized_keys_$USER
13 printf "command=\"$cmd\" " >>$OBJ/authorized_keys_$USER
14 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
47 echo "Match User $USER" >> $OBJ/sshd_proxy
H A Dssh-com-client.sh35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER
47 mkdir -p ${OBJ}/${USER}/hostkeys
48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1
57 User ${USER}
H A Dpercent.sh6 USER=`id -u -n`
71 REMUSER=$USER ;;
93 trial $i '%u' $USER
99 out="%/$USERID/127.0.0.1/$HOME/$HOST/$HOSTNAME/somehost/$PORT/$REMUSER/$USER"
H A Dtest-exec.sh45 USER=`/usr/ucb/whoami`
47 USER=`whoami`
49 USER=`logname`
51 USER=`id -un`
54 LOGNAME="${USER}"
332 test -z "$SUDO" || chown $USER \$logfile
524 $SUDO chown -R $USER $logfile
681 User $USER
697 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER
742 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
[all …]
H A Dbrokenkeys.sh6 KEYS="$OBJ/authorized_keys_${USER}"
15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
H A Dagent-restrict.sh91 >$OBJ/authorized_keys_$USER
94 cat $OBJ/user_$h.pub) >> $OBJ/authorized_keys_$USER
273 $SSHADD -h "${USER}@host_$h" -H $OBJ/known_hosts -q $OBJ/user_$h \
396 cp $OBJ/user_a.pub $OBJ/authorized_keys_$USER # only one key used.
427 $SSHADD -h host_a -h "host_a>${USER}@host_b" -h "host_b>${USER}@host_c" \
428 -h "host_c>${USER}@host_d" -h "host_d>${USER}@host_e" \
/freebsd/bin/ps/
H A Dkeyword.c66 {"args", "COMMAND", NULL, "arguments", COMM|LJUST|USER, arguments, 0,
73 {"command", "COMMAND", NULL, "command", COMM|LJUST|USER, command, 0,
85 {"etime", "ELAPSED", NULL, "elapsed-time", USER, elapsed, 0, CHAR,
87 {"etimes", "ELAPSED", NULL, "elapsed-times", USER, elapseds, 0, CHAR,
98 {"inblk", "INBLK", NULL, "read-blocks", USER, rvar, ROFF(ru_inblock),
114 {"lstart", "STARTED", NULL, "start-time", LJUST|USER, lstarted, 0,
118 {"majflt", "MAJFLT", NULL, "major-faults", USER, rvar, ROFF(ru_majflt),
120 {"minflt", "MINFLT", NULL, "minor-faults", USER, rvar, ROFF(ru_minflt),
122 {"msgrcv", "MSGRCV", NULL, "received-messages", USER, rvar,
124 {"msgsnd", "MSGSND", NULL, "sent-messages", USER, rvar,
[all …]
/freebsd/tools/tools/hcomp/
H A DMakefile2 BINOWN ?= ${USER}
3 BINGRP ?= ${USER}
7 MANOWN ?= ${USER}
8 MANGRP ?= ${USER}
/freebsd/cddl/usr.sbin/dwatch/
H A Ddwatch97 USER= # -u user
569 [ "$USER" ] && ARGV="$ARGV -u $USER"
771 u) USER="$OPTARG" ;;
845 case "$USER" in
847 *[![:alnum:]_-]*) RUID="$USER" ;;
848 *[!0-9]*) RUID=$( id -u "$USER" 2> /dev/null ) || die "No such user: $USER" ;;
849 *) RUID=$USER
1073 if [ $COUNT -eq 0 -a ! "$EXECREGEX$FILTER$GROUP$OUTPUT_CMD$PID$USER" ]
1101 [ "$USER" ] && msg="$msg user: $USER"
/freebsd/contrib/one-true-awk/testdir/
H A Dfunstack.awk631 USER = ENVIRON["USER"]
632 if (USER == "")
633 USER = ENVIRON["LOGNAME"]
634 if (USER == "")
635 USER = "????"
638 ("ypcat passwd | grep '^" USER ":' | awk -F: '{print $5}'") | getline PERSONAL_NAME
640 ("grep '^" USER ":' /etc/passwd | awk -F: '{print $5}'") | getline PERSONAL_NAME
646 print "<!-- for " PERSONAL_NAME " (" USER "@" HOSTNAME ") -->"
656 print prefix(2) "<LINK REV=\"made\" HREF=\"mailto:" USER "@" HOSTNAME "\">"
/freebsd/sys/contrib/device-tree/src/arm64/hisilicon/
H A Dhi3798cv200-poplar.dts140 gpio-line-names = "", "USER-LED-1",
141 "USER-LED-2", "",
149 "", "USER-LED-0",
159 "USER-LED-3", "";
/freebsd/contrib/ntp/scripts/rc/
H A Dntpd5 USER=ntp
7 NTPD_OPTS="-g -u $USER:$GROUP -p $PIDFILE"

123456