| /freebsd/crypto/openssh/regress/ |
| H A D | cert-userkey.sh | 6 rm -f $OBJ/authorized_keys_${USER}* $OBJ/user_ca_key* $OBJ/cert_user_key* 58 -I "regress user key for $USER" \ 59 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 69 rm -f $OBJ/authorized_keys_${USER}* $OBJ/authorized_principals_${USER}* 70 touch $OBJ/authorized_keys_${USER}_A 71 touch $OBJ/authorized_keys_${USER}_Z 72 touch $OBJ/authorized_principals_${USER}_A 73 touch $OBJ/authorized_principals_${USER}_Z 88 rm -f $OBJ/authorized_principals_${USER}_X 97 echo > $OBJ/authorized_principals_${USER}_X [all …]
|
| H A D | multipubkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 || 51 rm -f $OBJ/authorized_principals_$USER 52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 63 rm -f $OBJ/authorized_principals_$USER 65 $OBJ/authorized_keys_$USER [all …]
|
| H A D | cfgmatchlisten.sh | 154 cp /dev/null $OBJ/authorized_keys_$USER 156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER 157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 171 cp /dev/null $OBJ/authorized_keys_$USER 173 printf 'permitlisten="'$fwdspec2'" ' >> $OBJ/authorized_keys_$USER 174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 183 cp /dev/null $OBJ/authorized_keys_$USER 185 printf 'permitlisten="'$fwdport'" ' >> $OBJ/authorized_keys_$USER 186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 195 cp /dev/null $OBJ/authorized_keys_$USER [all …]
|
| H A D | penalty.sh | 7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak 13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 25 cat /dev/null > $OBJ/authorized_keys_${USER} 27 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 35 cat /dev/null > $OBJ/authorized_keys_${USER} 37 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
|
| H A D | forward-control.sh | 90 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak 108 cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER} 138 < ${OBJ}/authorized_keys_${USER}.bak \ 139 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail" 147 < ${OBJ}/authorized_keys_${USER}.bak \ 148 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail" 158 < ${OBJ}/authorized_keys_${USER}.bak \ 159 > ${OBJ}/authorized_keys_${USER} || fatal "sed 3 fail" 166 < ${OBJ}/authorized_keys_${USER}.bak \ 167 > ${OBJ}/authorized_keys_${USER} || fatal "sed 4 fail" [all …]
|
| H A D | principals-command.sh | 26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \ 69 rm -f $OBJ/authorized_keys_$USER 84 echo > $OBJ/authorized_principals_$USER 93 echo gregorsamsa > $OBJ/authorized_principals_$USER 102 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 111 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 121 $OBJ/authorized_principals_$USER 132 $OBJ/authorized_principals_$USER 141 rm -f $OBJ/authorized_principals_$USER 151 ) > $OBJ/authorized_keys_$USER [all …]
|
| H A D | penalty-expire.sh | 7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak 13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 25 cat /dev/null > $OBJ/authorized_keys_${USER} 30 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
|
| H A D | cert-file.sh | 29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 30 -z $$ -n ${USER} $OBJ/user_key1 || 33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \ 34 -z $$ -n ${USER} $OBJ/user_key1 || 37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 38 -z $$ -n ${USER} $OBJ/user_key3 || 41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 42 -z $$ -n ${USER} $OBJ/user_key4 || 49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
|
| H A D | limit-keytype.sh | 8 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 9 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 43 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 44 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 || 55 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER 119 "Match user x$USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`" 129 "Match user $USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
|
| H A D | scp-uri.sh | 37 $SCP $scpopts ${DATA} "scp://${USER}@somehost:${PORT}/${COPY}" || fail "copy failed" 42 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed" 48 $SCP $scpopts ${COPY} "scp://${USER}@somehost:${PORT}/${DIR}" || fail "copy failed" 54 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed" 61 $SCP $scpopts -r ${DIR} "scp://${USER}@somehost:${PORT}/${DIR2}" || fail "copy failed" 70 $SCP $scpopts -r "scp://${USER}@somehost:${PORT}/${DIR}" ${DIR2} || fail "copy failed"
|
| H A D | ssh-com.sh | 63 mkdir -p ${OBJ}/${USER} 64 cp /dev/null ${OBJ}/${USER}/authorization 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 67 echo Key $t.com >> ${OBJ}/${USER}/authorization 115 rm -rf ${OBJ}/${USER}
|
| H A D | sftp-uri.sh | 26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "… 32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c… 38 "sftp://${USER}@somehost:${PORT}/${DIR}/" > /dev/null 2>&1 << EOF 52 "sftp://${USER}@somehost:${PORT}/${DIR}" > /dev/null 2>&1 << EOF
|
| H A D | connect-uri.sh | 13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true 19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true 25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
|
| H A D | forcecommand.sh | 10 cp /dev/null $OBJ/authorized_keys_$USER 13 printf "command=\"$cmd\" " >>$OBJ/authorized_keys_$USER 14 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 47 echo "Match User $USER" >> $OBJ/sshd_proxy
|
| H A D | ssh-com-client.sh | 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 47 mkdir -p ${OBJ}/${USER}/hostkeys 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1 57 User ${USER}
|
| H A D | test-exec.sh | 45 USER=`/usr/ucb/whoami` 47 USER=`whoami` 49 USER=`logname` 51 USER=`id -un` 54 LOGNAME="${USER}" 343 test -z "$SUDO" || chown $USER \$logfile 535 $SUDO chown -R $USER $logfile 693 User $USER 709 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER 754 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER [all …]
|
| H A D | percent.sh | 6 USER=`id -u -n` 100 REMUSER=$USER ;; 122 trial $i '%u' $USER 129 out="%/$USERID/127.0.0.1/$HOME/$HOST/$HOSTNAME/somehost/$PORT/$REMUSER/$USER"
|
| H A D | brokenkeys.sh | 6 KEYS="$OBJ/authorized_keys_${USER}" 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
| H A D | agent-ptrace.sh | 15 if [ "x$USER" = "xroot" ]; then 41 trap "$SUDO chown ${USER} ${SSHAGENT}; $SUDO chmod 755 ${SSHAGENT}" 0
|
| /freebsd/bin/ps/ |
| H A D | keyword.c | 73 {"args", {NULL}, "COMMAND", "arguments", COMM|LJUST|USER, arguments, 0, 80 {"command", {NULL}, "COMMAND", "command", COMM|LJUST|USER, command, 0, 92 {"etime", {NULL}, "ELAPSED", "elapsed-time", USER, elapsed, 0, 94 {"etimes", {NULL}, "ELAPSED", "elapsed-times", USER, elapseds, 0, 105 {"inblk", {NULL}, "INBLK", "read-blocks", USER, rvar, ROFF(ru_inblock), 121 {"lstart", {NULL}, "STARTED", "start-time", LJUST|USER, lstarted, 0, 125 {"majflt", {NULL}, "MAJFLT", "major-faults", USER, rvar, ROFF(ru_majflt), 127 {"minflt", {NULL}, "MINFLT", "minor-faults", USER, rvar, ROFF(ru_minflt), 129 {"msgrcv", {NULL}, "MSGRCV", "received-messages", USER, rvar, 131 {"msgsnd", {NULL}, "MSGSND", "sent-messages", USER, rvar, [all …]
|
| /freebsd/tools/tools/hcomp/ |
| H A D | Makefile | 2 BINOWN ?= ${USER} 3 BINGRP ?= ${USER} 7 MANOWN ?= ${USER} 8 MANGRP ?= ${USER}
|
| /freebsd/cddl/usr.sbin/dwatch/ |
| H A D | dwatch | 97 USER= # -u user 569 [ "$USER" ] && ARGV="$ARGV -u $USER" 771 u) USER="$OPTARG" ;; 845 case "$USER" in 847 *[![:alnum:]_-]*) RUID="$USER" ;; 848 *[!0-9]*) RUID=$( id -u "$USER" 2> /dev/null ) || die "No such user: $USER" ;; 849 *) RUID=$USER 1073 if [ $COUNT -eq 0 -a ! "$EXECREGEX$FILTER$GROUP$OUTPUT_CMD$PID$USER" ] 1101 [ "$USER" ] && msg="$msg user: $USER"
|
| /freebsd/contrib/one-true-awk/testdir/ |
| H A D | funstack.awk | 631 USER = ENVIRON["USER"] 632 if (USER == "") 633 USER = ENVIRON["LOGNAME"] 634 if (USER == "") 635 USER = "????" 638 ("ypcat passwd | grep '^" USER ":' | awk -F: '{print $5}'") | getline PERSONAL_NAME 640 ("grep '^" USER ":' /etc/passwd | awk -F: '{print $5}'") | getline PERSONAL_NAME 646 print "<!-- for " PERSONAL_NAME " (" USER "@" HOSTNAME ") -->" 656 print prefix(2) "<LINK REV=\"made\" HREF=\"mailto:" USER "@" HOSTNAME "\">"
|
| /freebsd/sys/contrib/device-tree/src/arm64/hisilicon/ |
| H A D | hi3798cv200-poplar.dts | 140 gpio-line-names = "", "USER-LED-1", 141 "USER-LED-2", "", 149 "", "USER-LED-0", 159 "USER-LED-3", "";
|
| /freebsd/contrib/ntp/scripts/rc/ |
| H A D | ntpd | 5 USER=ntp 7 NTPD_OPTS="-g -u $USER:$GROUP -p $PIDFILE"
|