Searched refs:USER (Results 1 - 25 of 85) sorted by relevance

1234

/freebsd-13-stable/tools/tools/hcomp/
H A DMakefile4 BINOWN ?= ${USER}
5 BINGRP ?= ${USER}
9 MANOWN ?= ${USER}
10 MANGRP ?= ${USER}
/freebsd-13-stable/crypto/openssh/regress/
H A Dforcecommand.sh8 cp /dev/null $OBJ/authorized_keys_$USER
10 printf 'command="true" ' >>$OBJ/authorized_keys_$USER
11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
17 cp /dev/null $OBJ/authorized_keys_$USER
19 printf 'command="false" ' >> $OBJ/authorized_keys_$USER
20 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
31 echo "Match User $USER" >> $OBJ/sshd_proxy
H A Dbrokenkeys.sh6 KEYS="$OBJ/authorized_keys_${USER}"
15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
H A Dconnect-uri.sh13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true
19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true
25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
H A Dmultipubkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 ||
45 rm -f $OBJ/authorized_principals_$USER
46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
50 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
55 rm -f $OBJ/authorized_principals_$USER
57 $OBJ/authorized_keys_$USER
[all...]
H A Dcert-userkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key*
42 -I "regress user key for $USER" \
43 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
54 rm -f $OBJ/authorized_keys_$USER
70 rm -f $OBJ/authorized_principals_$USER
79 echo > $OBJ/authorized_principals_$USER
88 echo gregorsamsa > $OBJ/authorized_principals_$USER
97 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
106 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
116 $OBJ/authorized_principals_$USER
[all...]
H A Dproxy-connect.sh20 ${SSH} -F $OBJ/ssh_proxy ${USER}:style@999.999.999.999 true || \
H A Dcfgmatchlisten.sh70 echo "Match user $USER" >>$OBJ/sshd_proxy
92 cp /dev/null $OBJ/authorized_keys_$USER
94 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER
95 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
126 echo "Match User $USER" >>$OBJ/sshd_proxy
154 cp /dev/null $OBJ/authorized_keys_$USER
156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER
157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
171 cp /dev/null $OBJ/authorized_keys_$USER
173 printf 'permitlisten="'$fwdspec2'" ' >> $OBJ/authorized_keys_$USER
[all...]
H A Dprincipals-command.sh23 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \
64 rm -f $OBJ/authorized_keys_$USER
80 echo > $OBJ/authorized_principals_$USER
89 echo gregorsamsa > $OBJ/authorized_principals_$USER
98 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
107 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
117 $OBJ/authorized_principals_$USER
127 $OBJ/authorized_principals_$USER
135 rm -f $OBJ/authorized_principals_$USER
146 ) > $OBJ/authorized_keys_$USER
[all...]
H A Dforward-control.sh97 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak
115 cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER}
145 < ${OBJ}/authorized_keys_${USER}.bak \
146 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail"
154 < ${OBJ}/authorized_keys_${USER}.bak \
155 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail"
165 < ${OBJ}/authorized_keys_${USER}.bak \
166 > ${OBJ}/authorized_keys_${USER} || fata
[all...]
H A Dlimit-keytype.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
25 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
26 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 ||
37 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
38 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
39 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER
86 "Match user x$USER" "PubkeyAcceptedKeyTypes +ssh-ed25519"
94 "Match user $USER" "PubkeyAcceptedKeyTypes +ssh-ed25519"
H A Dcert-file.sh29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
30 -z $$ -n ${USER} $OBJ/user_key1 ||
33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \
34 -z $$ -n ${USER} $OBJ/user_key1 ||
37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
38 -z $$ -n ${USER} $OBJ/user_key3 ||
41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
42 -z $$ -n ${USER} $OBJ/user_key4 ||
49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
H A Dscp-uri.sh29 $SCP $scpopts ${DATA} "scp://${USER}@somehost:${PORT}/${COPY}" || fail "copy failed"
34 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed"
40 $SCP $scpopts ${COPY} "scp://${USER}@somehost:${PORT}/${DIR}" || fail "copy failed"
46 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed"
53 $SCP $scpopts -r ${DIR} "scp://${USER}@somehost:${PORT}/${DIR2}" || fail "copy failed"
62 $SCP $scpopts -r "scp://${USER}@somehost:${PORT}/${DIR}" ${DIR2} || fail "copy failed"
H A Dsftp-uri.sh26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed"
32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed"
38 "sftp://${USER}@somehost:${PORT}/${DIR}/" > /dev/null 2>&1 << EOF
52 "sftp://${USER}@somehost:${PORT}/${DIR}" > /dev/null 2>&1 << EOF
H A Dcfgmatch.sh49 echo "Match user $USER" >>$OBJ/sshd_proxy
73 cp /dev/null $OBJ/authorized_keys_$USER
75 printf 'permitopen="127.0.0.1:'$PORT'" ' >> $OBJ/authorized_keys_$USER
76 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
94 echo "Match User $USER" >>$OBJ/sshd_proxy
H A Dssh-com.sh63 mkdir -p ${OBJ}/${USER}
64 cp /dev/null ${OBJ}/${USER}/authorization
66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com
67 echo Key $t.com >> ${OBJ}/${USER}/authorization
115 rm -rf ${OBJ}/${USER}
H A Dconch-ciphers.sh19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
H A Dsftp-chroot.sh7 FILENAME=testdata_${USER}
H A Dssh-com-client.sh35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER
47 mkdir -p ${OBJ}/${USER}/hostkeys
48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1
57 User ${USER}
126 rm -rf ${OBJ}/${USER}
/freebsd-13-stable/usr.bin/bmake/tests/
H A Dtest-new.mk6 rm -rf /tmp/${USER}.make.test
/freebsd-13-stable/contrib/ntp/scripts/rc/
H A Dntpd5 USER=ntp
7 NTPD_OPTS="-g -u $USER:$GROUP -p $PIDFILE"
/freebsd-13-stable/bin/ps/
H A Dkeyword.c75 {"args", "COMMAND", NULL, "arguments", COMM|LJUST|USER, arguments, 0,
82 {"command", "COMMAND", NULL, "command", COMM|LJUST|USER, command, 0,
94 {"etime", "ELAPSED", NULL, "elapsed-time", USER, elapsed, 0, CHAR,
96 {"etimes", "ELAPSED", NULL, "elapsed-times", USER, elapseds, 0, CHAR,
107 {"inblk", "INBLK", NULL, "read-blocks", USER, rvar, ROFF(ru_inblock),
123 {"lstart", "STARTED", NULL, "start-time", LJUST|USER, lstarted, 0,
127 {"majflt", "MAJFLT", NULL, "major-faults", USER, rvar, ROFF(ru_majflt),
129 {"minflt", "MINFLT", NULL, "minor-faults", USER, rvar, ROFF(ru_minflt),
131 {"msgrcv", "MSGRCV", NULL, "received-messages", USER, rvar,
133 {"msgsnd", "MSGSND", NULL, "sent-messages", USER, rva
[all...]
H A Dps.h73 #define USER 0x04 /* needs user structure */ macro
/freebsd-13-stable/stand/common/
H A Dnewvers.sh49 u=${USER-root} h=${HOSTNAME-`hostname`} t=`date`
/freebsd-13-stable/contrib/dialog/samples/
H A Dform115 user="$USER"

Completed in 193 milliseconds

1234