Home
last modified time | relevance | path

Searched refs:authorized_keys_file (Results 1 – 13 of 13) sorted by relevance

/dports/security/pam_ssh_agent_auth/pam_ssh_agent_auth-7ff7858/
H A Dpam_user_authorized_keys.c83 extern char *authorized_keys_file;
132 authorized_keys_file = in parse_authorized_key_file()
135 strncpy(auth_keys_file_buf, authorized_keys_file, in parse_authorized_key_file()
137 pamsshagentauth_xfree(authorized_keys_file) /* when we in parse_authorized_key_file()
152 authorized_keys_file = in parse_authorized_key_file()
163 key, authorized_keys_file) in pam_user_key_allowed()
165 authorized_keys_file) in pam_user_key_allowed()
H A Dpam_ssh_agent_auth.c65 char *authorized_keys_file = NULL; variable
183 authorized_keys_file = pamsshagentauth_xstrdup("/etc/security/authorized_keys"); in pam_sm_authenticate()
192 …uth_verbose("Attempting authentication: `%s' as `%s' using %s", ruser, user, authorized_keys_file); in pam_sm_authenticate()
203 …hagentauth_logit("Authenticated (sshd): `%s' as `%s' using %s", ruser, user, authorized_keys_file); in pam_sm_authenticate()
212 …agentauth_logit("Authenticated (agent): `%s' as `%s' using %s", ruser, user, authorized_keys_file); in pam_sm_authenticate()
215 …agentauth_logit("Failed Authentication: `%s' as `%s' using %s", ruser, user, authorized_keys_file); in pam_sm_authenticate()
227 free(authorized_keys_file); in pam_sm_authenticate()
/dports/sysutils/py-salt/salt-3004.1/tests/integration/states/
H A Dtest_ssh_auth.py24 authorized_keys_file = os.path.join(user_ssh_dir, "authorized_keys")
28 name=authorized_keys_file,
45 with salt.utils.files.fopen(authorized_keys_file, "r") as fhr:
59 authorized_keys_file = os.path.join(user_ssh_dir, "authorized_keys")
84 with salt.utils.files.fopen(authorized_keys_file, "r") as fhr:
89 os.unlink(authorized_keys_file)
101 with salt.utils.files.fopen(authorized_keys_file, "r") as fhr:
/dports/sysutils/py-google-compute-engine/compute-image-packages-20190522/packages/python-google-compute-engine/google_compute_engine/accounts/
H A Daccounts_utils.py198 authorized_keys_file = os.path.join(ssh_dir, 'authorized_keys')
201 if os.path.islink(ssh_dir) or os.path.islink(authorized_keys_file):
220 if os.path.exists(authorized_keys_file):
221 lines = open(authorized_keys_file).readlines()
246 shutil.copy(updated_keys_file, authorized_keys_file)
249 authorized_keys_file, mode=0o600, uid=uid, gid=gid)
290 authorized_keys_file = os.path.join(home_dir, '.ssh', 'authorized_keys')
291 if os.path.exists(authorized_keys_file):
293 os.remove(authorized_keys_file)
/dports/sysutils/py-google-compute-engine/compute-image-packages-20190522/packages/python-google-compute-engine/google_compute_engine/accounts/tests/
H A Daccounts_utils_test.py275 authorized_keys_file = '/home/.ssh/authorized_keys'
337 authorized_keys_file = '/home/.ssh/authorized_keys'
382 authorized_keys_file = '/home/user/.ssh/authorized_keys'
422 authorized_keys_file = '/home/.ssh/authorized_keys'
485 authorized_keys_file = '/home/.ssh/authorized_keys'
493 mock_exists.assert_called_once_with(authorized_keys_file)
494 mock_remove.assert_called_once_with(authorized_keys_file)
502 authorized_keys_file = '/home/.ssh/authorized_keys'
510 mock_exists.assert_called_once_with(authorized_keys_file)
527 authorized_keys_file = '/home/.ssh/authorized_keys'
[all …]
/dports/devel/py-buildbot/buildbot-3.4.1/buildbot/
H A Dmanhole.py104 def __init__(self, authorized_keys_file): argument
105 self.authorized_keys_file = os.path.expanduser(
106 authorized_keys_file)
109 with open(self.authorized_keys_file, "rb") as f:
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/lib/gitlab/
H A Dauthorized_keys.rb124 @file ||= Gitlab.config.gitlab_shell.authorized_keys_file
/dports/security/ncrack/ncrack-0.7/opensshlib/
H A Dauth.h166 char *authorized_keys_file(struct passwd *);
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/lib/gitlab/
H A Dauthorized_keys_spec.rb266 Gitlab.config.gitlab_shell.authorized_keys_file
/dports/net-mgmt/crmsh/crmsh-4.3.1/crmsh/
H A Dbootstrap.py1190 authorized_keys_file = "/root/.ssh/authorized_keys"
1191 if not os.path.exists(authorized_keys_file):
1192 open(authorized_keys_file, 'w').close()
1193 authkeys = open(authorized_keys_file, "r+")
1201 append(fn + ".pub", authorized_keys_file)
/dports/security/pam-modules/pam-modules-2.2/pam_ldaphome/
H A Dpam_ldaphome.c50 static char *authorized_keys_file=".ssh/authorized_keys"; variable
1450 pathlen = strlen(authorized_keys_file); in store_pubkeys()
1458 strcpy(file_name + homelen, authorized_keys_file); in store_pubkeys()
2166 authorized_keys_file = val; in ldaphome_main()
/dports/net/x2goclient/x2goclient-4.1.2.2/src/
H A Donmainwindow.cpp8942 if (!authorized_keys_file.open (QIODevice::ReadOnly | QIODevice::Text)) { in slotRetExportDir()
8948 QTemporaryFile tfile (authorized_keys_file.fileName ()); in slotRetExportDir()
8958 while (!authorized_keys_file.atEnd ()) { in slotRetExportDir()
8959 QByteArray newline = authorized_keys_file.readLine (); in slotRetExportDir()
8964 authorized_keys_file.close (); in slotRetExportDir()
8967 authorized_keys_file.remove (); in slotRetExportDir()
8969 tfile.copy (authorized_keys_file.fileName ()); in slotRetExportDir()
10070 x2goDebug << "Potentially creating file " << authorized_keys_file.fileName (); in startX2goMount()
10090 if (!authorized_keys_file.setPermissions (authorized_keys_file_target_perm)) { in startX2goMount()
10130 QTextStream out (&authorized_keys_file); in startX2goMount()
[all …]
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/config/
H A Dgitlab.yml.example1193 authorized_keys_file: /home/git/.ssh/authorized_keys
1493 authorized_keys_file: tmp/tests/authorized_keys