Searched refs:authorized_keys (Results 1 – 21 of 21) sorted by relevance
8 authorized_keys() { function19 authorized_keys28 authorized_keys true31 authorized_keys false38 authorized_keys
287 basic_tests authorized_keys352 test_one "empty principals" failure "" authorized_keys369 authorized_keys ',principals="mekmitasdigoat"'371 authorized_keys ',principals="mekmitasdigoat"'376 authorized_keys ',command="true"'379 authorized_keys ',command="false"'382 authorized_keys ',command="true"'385 authorized_keys ',command="false"'
39 cp $OBJ/authorized_keys_$USER $authkeydir/authorized_keys
86 trace "prepare authorized_keys"
851 trace Create dropbear keys and add to authorized_keys
47 …zRdK8jlqm8tehUc9c9WhQ== vagrant insecure public key" > ${DESTDIR}/home/vagrant/.ssh/authorized_keys48 …w1F+wvG9hXGoqiysfJOn5Y vagrant insecure public key" >> ${DESTDIR}/home/vagrant/.ssh/authorized_keys49 chmod 600 ${DESTDIR}/home/vagrant/.ssh/authorized_keys
42 if [ ! -f .ssh/authorized_keys ]; then46 atf_check -o inline:"100600\n" stat -f %p .ssh/authorized_keys47 atf_check -o inline:"mykey\n" cat .ssh/authorized_keys49 atf_check -o inline:"mykey\nmykey\n" cat .ssh/authorized_keys
263 …eck -o inline:"ssh-rsa AAAAB3NzaC1y...== Generated by Nova\n" cat home/freebsd/.ssh/authorized_keys290 …eck -o inline:"ssh-rsa AAAAB3NzaC1y...== Generated by Nova\n" cat home/freebsd/.ssh/authorized_keys336 atf_check -o inline:"ssh-ed25519 my_key_id tdb@host\n" cat home/freebsd/.ssh/authorized_keys
42 # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys243 # but this is overridden so installations will only check .ssh/authorized_keys44 AuthorizedKeysFile .ssh/authorized_keys
24 The OpenSSH server simply uses the file /root/.ssh/authorized_keys to
690 authorized_keys files, are formatted as a single line of text consisting
1760 upstream: There is a warning next to the authorized_keys command=""8406 upstream: Do not apply authorized_keys options when signature8409 applied to subsequent keys in authorized_keys. bz3733, ok markus@
297 AUTH_KEY_FILE=/etc/dropbear/authorized_keys;299 AUTH_KEY_FILE=config/settings/ssh/authorized_keys;324 L_KEYS="$SCRATCH_DIR"/authorized_keys
31 your public key to a remote machine's ~/.ssh/authorized_keys file.
217 cat ${KEYDIR}/*.pub > ${tmpdir}/authorized_keys218 if [ ! -s ${tmpdir}/authorized_keys ]; then
93 cp ssh_user_key.pub authorized_keys97 atf_check -s eq:0 -o empty -e empty chmod 600 authorized_keys
19 AuthorizedKeysFile @WORKDIR@/authorized_keys
41 keyfile=$HOME/.ssh/authorized_keys ; \
106 cp ssh_user_key.pub authorized_keys110 atf_check -s eq:0 -o empty -e empty chmod 600 authorized_keys
80 2. Add your SSH key(s) to `/etc/dropbear-initramfs/authorized_keys`. Note