/dports/security/pam_ssh_agent_auth/pam_ssh_agent_auth-7ff7858/ |
H A D | pam_user_authorized_keys.c | 83 extern char *authorized_keys_file; 132 authorized_keys_file = in parse_authorized_key_file() 135 strncpy(auth_keys_file_buf, authorized_keys_file, in parse_authorized_key_file() 137 pamsshagentauth_xfree(authorized_keys_file) /* when we in parse_authorized_key_file() 152 authorized_keys_file = in parse_authorized_key_file() 163 key, authorized_keys_file) in pam_user_key_allowed() 165 authorized_keys_file) in pam_user_key_allowed()
|
H A D | pam_ssh_agent_auth.c | 65 char *authorized_keys_file = NULL; variable 183 authorized_keys_file = pamsshagentauth_xstrdup("/etc/security/authorized_keys"); in pam_sm_authenticate() 192 …uth_verbose("Attempting authentication: `%s' as `%s' using %s", ruser, user, authorized_keys_file); in pam_sm_authenticate() 203 …hagentauth_logit("Authenticated (sshd): `%s' as `%s' using %s", ruser, user, authorized_keys_file); in pam_sm_authenticate() 212 …agentauth_logit("Authenticated (agent): `%s' as `%s' using %s", ruser, user, authorized_keys_file); in pam_sm_authenticate() 215 …agentauth_logit("Failed Authentication: `%s' as `%s' using %s", ruser, user, authorized_keys_file); in pam_sm_authenticate() 227 free(authorized_keys_file); in pam_sm_authenticate()
|
/dports/sysutils/py-salt/salt-3004.1/tests/integration/states/ |
H A D | test_ssh_auth.py | 24 authorized_keys_file = os.path.join(user_ssh_dir, "authorized_keys") 28 name=authorized_keys_file, 45 with salt.utils.files.fopen(authorized_keys_file, "r") as fhr: 59 authorized_keys_file = os.path.join(user_ssh_dir, "authorized_keys") 84 with salt.utils.files.fopen(authorized_keys_file, "r") as fhr: 89 os.unlink(authorized_keys_file) 101 with salt.utils.files.fopen(authorized_keys_file, "r") as fhr:
|
/dports/sysutils/py-google-compute-engine/compute-image-packages-20190522/packages/python-google-compute-engine/google_compute_engine/accounts/ |
H A D | accounts_utils.py | 198 authorized_keys_file = os.path.join(ssh_dir, 'authorized_keys') 201 if os.path.islink(ssh_dir) or os.path.islink(authorized_keys_file): 220 if os.path.exists(authorized_keys_file): 221 lines = open(authorized_keys_file).readlines() 246 shutil.copy(updated_keys_file, authorized_keys_file) 249 authorized_keys_file, mode=0o600, uid=uid, gid=gid) 290 authorized_keys_file = os.path.join(home_dir, '.ssh', 'authorized_keys') 291 if os.path.exists(authorized_keys_file): 293 os.remove(authorized_keys_file)
|
/dports/sysutils/py-google-compute-engine/compute-image-packages-20190522/packages/python-google-compute-engine/google_compute_engine/accounts/tests/ |
H A D | accounts_utils_test.py | 275 authorized_keys_file = '/home/.ssh/authorized_keys' 337 authorized_keys_file = '/home/.ssh/authorized_keys' 382 authorized_keys_file = '/home/user/.ssh/authorized_keys' 422 authorized_keys_file = '/home/.ssh/authorized_keys' 485 authorized_keys_file = '/home/.ssh/authorized_keys' 493 mock_exists.assert_called_once_with(authorized_keys_file) 494 mock_remove.assert_called_once_with(authorized_keys_file) 502 authorized_keys_file = '/home/.ssh/authorized_keys' 510 mock_exists.assert_called_once_with(authorized_keys_file) 527 authorized_keys_file = '/home/.ssh/authorized_keys' [all …]
|
/dports/devel/py-buildbot/buildbot-3.4.1/buildbot/ |
H A D | manhole.py | 104 def __init__(self, authorized_keys_file): argument 105 self.authorized_keys_file = os.path.expanduser( 106 authorized_keys_file) 109 with open(self.authorized_keys_file, "rb") as f:
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/lib/gitlab/ |
H A D | authorized_keys.rb | 124 @file ||= Gitlab.config.gitlab_shell.authorized_keys_file
|
/dports/security/ncrack/ncrack-0.7/opensshlib/ |
H A D | auth.h | 166 char *authorized_keys_file(struct passwd *);
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/lib/gitlab/ |
H A D | authorized_keys_spec.rb | 266 Gitlab.config.gitlab_shell.authorized_keys_file
|
/dports/net-mgmt/crmsh/crmsh-4.3.1/crmsh/ |
H A D | bootstrap.py | 1190 authorized_keys_file = "/root/.ssh/authorized_keys" 1191 if not os.path.exists(authorized_keys_file): 1192 open(authorized_keys_file, 'w').close() 1193 authkeys = open(authorized_keys_file, "r+") 1201 append(fn + ".pub", authorized_keys_file)
|
/dports/security/pam-modules/pam-modules-2.2/pam_ldaphome/ |
H A D | pam_ldaphome.c | 50 static char *authorized_keys_file=".ssh/authorized_keys"; variable 1450 pathlen = strlen(authorized_keys_file); in store_pubkeys() 1458 strcpy(file_name + homelen, authorized_keys_file); in store_pubkeys() 2166 authorized_keys_file = val; in ldaphome_main()
|
/dports/net/x2goclient/x2goclient-4.1.2.2/src/ |
H A D | onmainwindow.cpp | 8942 if (!authorized_keys_file.open (QIODevice::ReadOnly | QIODevice::Text)) { in slotRetExportDir() 8948 QTemporaryFile tfile (authorized_keys_file.fileName ()); in slotRetExportDir() 8958 while (!authorized_keys_file.atEnd ()) { in slotRetExportDir() 8959 QByteArray newline = authorized_keys_file.readLine (); in slotRetExportDir() 8964 authorized_keys_file.close (); in slotRetExportDir() 8967 authorized_keys_file.remove (); in slotRetExportDir() 8969 tfile.copy (authorized_keys_file.fileName ()); in slotRetExportDir() 10070 x2goDebug << "Potentially creating file " << authorized_keys_file.fileName (); in startX2goMount() 10090 if (!authorized_keys_file.setPermissions (authorized_keys_file_target_perm)) { in startX2goMount() 10130 QTextStream out (&authorized_keys_file); in startX2goMount() [all …]
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/config/ |
H A D | gitlab.yml.example | 1193 authorized_keys_file: /home/git/.ssh/authorized_keys 1493 authorized_keys_file: tmp/tests/authorized_keys
|