/openbsd/usr.bin/snmp/ |
H A D | snmp.c | 93 if ((agent = malloc(sizeof(*agent))) == NULL) in snmp_connect_v12() 102 return agent; in snmp_connect_v12() 105 free(agent); in snmp_connect_v12() 114 if ((agent = malloc(sizeof(*agent))) == NULL) in snmp_connect_v3() 127 return agent; in snmp_connect_v3() 136 free(agent); in snmp_free_agent() 415 agent->v3->engineid, agent->v3->engineidlen, in snmp_package() 422 if ((securityparams = agent->v3->sec->genparams(agent, in snmp_package() 428 if ((encpdu = agent->v3->sec->encpdu(agent, scopedpdu, in snmp_package() 456 if (agent->v3->sec->finalparams(agent, packet, in snmp_package() [all …]
|
H A D | usm.c | 120 usm_doinit(struct snmp_agent *agent) in usm_doinit() argument 123 struct usm_sec *usm = agent->v3->sec->data; in usm_doinit() 130 level = agent->v3->level; in usm_doinit() 131 agent->v3->level = SNMP_MSGFLAG_REPORT; in usm_doinit() 136 agent->v3->level = level; in usm_doinit() 142 agent->v3->level = level; in usm_doinit() 163 struct usm_sec *usm = agent->v3->sec->data; in usm_genparams() 189 if (agent->v3->level & SNMP_MSGFLAG_AUTH) in usm_genparams() 191 if (agent->v3->level & SNMP_MSGFLAG_PRIV) in usm_genparams() 393 usm_doinit(agent); in usm_parseparams() [all …]
|
H A D | snmpc.c | 528 struct snmp_agent *agent; in snmpc_get() local 540 agent->timeout = timeout; in snmpc_get() 541 agent->retries = retries; in snmpc_get() 587 snmp_free_agent(agent); in snmpc_get() 597 struct snmp_agent *agent; in snmpc_walk() local 613 agent->timeout = timeout; in snmpc_walk() 614 agent->retries = retries; in snmpc_walk() 735 snmp_free_agent(agent); in snmpc_walk() 742 struct snmp_agent *agent; in snmpc_set() local 778 snmp_free_agent(agent); in snmpc_set() [all …]
|
/openbsd/gnu/usr.bin/perl/cpan/HTTP-Tiny/t/ |
H A D | 003_agent.t | 18 is $ua->agent, $default, 'default agent string is as expected'; 22 my $ua = HTTP::Tiny->new(agent => 'something else'); 23 is $ua->agent, 'something else', 'agent string is as expected'; 27 my $ua = HTTP::Tiny->new(agent => 'something else '); 29 $ua->agent, 41 $ua->agent(undef); 42 is $ua->agent, undef, 'agent string is empty'; 44 $ua->agent('something else'); 45 is $ua->agent, 'something else', 'agent string is as expected'; 47 $ua->agent('something else '); [all …]
|
H A D | 160_cookies.t | 53 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 58 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
H A D | 161_basic_auth.t | 32 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 38 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
H A D | 162_proxy_auth.t | 32 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 38 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
H A D | 130_redirect.t | 33 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 39 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
H A D | 100_get.t | 35 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 38 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
/openbsd/regress/usr.bin/ssh/ |
H A D | agent.sh | 38 rm -f $OBJ/$t-agent $OBJ/$t-agent.pub* 39 ${SSHKEYGEN} -q -N '' -t $t -f $OBJ/$t-agent ||\ 43 -n estragon $OBJ/$t-agent.pub || fatal "ca sign failed" 46 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER 48 ${SSHADD} $OBJ/$t-agent > /dev/null 2>&1 59 mv -f $OBJ/$t-agent $OBJ/$t-agent-private 60 cp -f $OBJ/$t-agent.pub $OBJ/$t-agent-private.pub 61 cp -f $OBJ/$t-agent-cert.pub $OBJ/$t-agent-private-cert.pub 148 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub \ 149 -oCertificateFile=$OBJ/$t-agent-cert.pub \ [all …]
|
H A D | hostkey-agent.sh | 6 rm -f $OBJ/agent-key.* $OBJ/ssh_proxy.orig $OBJ/known_hosts.orig $OBJ/agent-ca* 18 ${SSHKEYGEN} -qt ed25519 -f $OBJ/agent-ca -N '' || fatal "ssh-keygen CA" 23 ${SSHKEYGEN} -s $OBJ/agent-ca -qh -n localhost-with-alias \ 24 -I localhost-with-alias $OBJ/agent-key.$k.pub || \ 26 ${SSHADD} -k $OBJ/agent-key.$k >/dev/null 2>&1 || \ 29 rm $OBJ/agent-key.$k || fatal "couldn't rm $OBJ/agent-key.$k" 31 rm $OBJ/agent-ca # Don't need CA private any more either 42 cat $OBJ/agent-key.$k.pub) > $OBJ/known_hosts 64 test -f $OBJ/agent-key.${k}.pub || fatal "no $k key" 65 test -f $OBJ/agent-key.${k}-cert.pub || fatal "no $k cert" [all …]
|
H A D | Makefile | 38 agent \ 39 agent-getpeereid \ 40 agent-timeout \ 41 agent-ptrace \ 42 agent-subprocess \ 88 hostkey-agent \ 99 agent-restrict \ 104 agent-pkcs11-restrict \ 105 agent-pkcs11-cert \ 112 EXTRA_TESTS= agent [all...] |
H A D | agent-getpeereid.sh | 7 ASOCK=${OBJ}/agent 9 >$OBJ/ssh-agent.log 28 eval `${SSHAGENT} ${EXTRA_AGENT_ARGS} -s -a ${ASOCK}` >$OBJ/ssh-agent.log 2>&1 54 ${SSHAGENT} -k >>$OBJ/ssh-agent.log 2>&1 57 rm -f ${OBJ}/agent
|
H A D | agent-pkcs11-restrict.sh | 8 rm -f $SSH_AUTH_SOCK $OBJ/agent.log $OBJ/host_[abcx]* $OBJ/user_[abcx]* 33 ${SSHAGENT} ${EXTRA_AGENT_ARGS} -d -a $SSH_AUTH_SOCK > $OBJ/agent.log 2>&1 & 117 (printf "%s" "restrict,agent-forwarding,command=\"$OBJ/command\" ";
|
/openbsd/usr.bin/ssh/ |
H A D | PROTOCOL.agent | 1 The SSH agent protocol is described in 2 https://tools.ietf.org/html/draft-miller-ssh-agent 4 This file documents OpenSSH's extensions to the agent protocol. 8 This extension allows a ssh client to bind an agent connection to a 11 exchange. This binding is verifiable at the agent by including the 42 smartcard keys are added to an agent. 65 When receiving this message, the agent will ensure that the 68 and signify the initial hop from the host running ssh-agent). The agent 74 the agent connection over which they were received. 110 the resultant certificates to be loaded to the agent. The default [all …]
|
/openbsd/gnu/llvm/libcxx/utils/ci/ |
H A D | macos-ci-setup | 35 cat <<EOF > ~/Library/LaunchAgents/libcxx.buildkite-agent.plist 41 <string>libcxx.buildkite-agent</string> 45 <string>${HOMEBREW_PREFIX}/bin/buildkite-agent</string> 48 <string>${HOME}/libcxx.buildkite-agent/builds</string> 73 <string>${HOME}/libcxx.buildkite-agent/stdout.log</string> 76 <string>${HOME}/libcxx.buildkite-agent/stderr.log</string> 82 launchctl load ~/Library/LaunchAgents/libcxx.buildkite-agent.plist 99 for package in sphinx-doc python3 ninja cmake clang-format buildkite/buildkite/buildkite-agent; do
|
H A D | Dockerfile | 18 # to run a BuildKite agent. 112 # Install the Buildkite agent and dependencies. This must be done as non-root 113 # for the Buildkite agent to be installed in a path where we can find it. 114 RUN bash -c "$(curl -sL https://raw.githubusercontent.com/buildkite/agent/main/install.sh)" 115 ENV PATH="${PATH}:/home/libcxx-builder/.buildkite-agent/bin" 116 …uilders,arch=$(uname -m),os=linux\"" >> "/home/libcxx-builder/.buildkite-agent/buildkite-agent.cfg" 118 # By default, start the Buildkite agent (this requires a token). 119 CMD buildkite-agent start
|
H A D | buildkite-pipeline-clang.yml | 24 - "buildkite-agent artifact upload 'install/**/*'" 41 - "buildkite-agent artifact download 'install/**' ." 63 - "buildkite-agent artifact download 'install/**' ." 85 - "buildkite-agent artifact download 'install/**' ."
|
/openbsd/usr.sbin/lpd/ |
H A D | lp_rmjob.c | 34 lp_rmjob(int ofd, struct lp_printer *lp, const char *agent, in lp_rmjob() argument 59 if (currjob[0] && docheck(lp, agent, jf, currjob, 1, 0) == 1) { in lp_rmjob() 69 switch (docheck(lp, agent, jf, q.cfname[i], active, 0)) { in lp_rmjob() 97 docheck(struct lp_printer *lp, const char *agent, struct lp_jobfilter *jf, in docheck() argument 107 if (!strcmp(agent, "-all") && !strcmp(LP_JOBHOST(cfname), jf->hostfrom)) in docheck() 114 if (!strcmp(agent, "root")) in docheck() 128 if (!strcmp(person, agent) && in docheck()
|
/openbsd/usr.bin/ssh/ssh-agent/ |
H A D | Makefile | 5 SRCS= ssh-agent.c ${SRCS_PKCS11_CLIENT} 10 PROG= ssh-agent 24 CLEANFILES+= ssh-agent.tar install.sh
|
/openbsd/share/snmp/ |
H A D | SNMPv2-TC.txt | 201 exists in the agent, but is missing information 302 agent. 324 noError: because the agent chooses to create the 339 wrongValue: because the agent does not support 349 inconsistentValue: because the agent is unable to 450 that the agent does not implement the object-type 469 supplied by the agent (note that an agent must provide 494 the agent will not allow that particular columnar 535 - a value is returned, indicating that the agent 550 the agent does not have sufficient information to [all …]
|
/openbsd/regress/usr.bin/ssh/unittests/authopt/testdata/ |
H A D | mktestdata.sh | 21 sign all_permit.cert -Opermit-agent-forwarding -Opermit-port-forwarding \ 25 sign no_agentfwd.cert -Ono-agent-forwarding 31 sign only_agentfwd.cert -Oclear -Opermit-agent-forwarding
|
/openbsd/gnu/usr.bin/perl/cpan/HTTP-Tiny/lib/HTTP/ |
H A D | Tiny.pm | 96 sub agent { subroutine 97 my($self, $agent) = @_; 99 $self->{agent} = 100 (defined $agent && $agent =~ / $/) ? $agent . $self->_agent : $agent; 102 return $self->{agent}; 141 $self->agent( exists $args{agent} ? $args{agent} : $class->_agent ); 788 my $agent = exists($request->{headers}{'user-agent'}) 789 ? $request->{headers}{'user-agent'} : $self->{agent}; 796 'user-agent' => $agent, 838 $request->{headers}{'user-agent'} ||= $self->{agent};
|
/openbsd/gnu/llvm/libcxx/docs/ |
H A D | AddingNewCIJobs.rst | 17 `Buildkite guide <https://buildkite.com/docs/agent/v3>`_ to setup your 20 agent to register itself to Buildkite, it will need a BuildKite Agent token. 40 use agent tags to allow targetting your agents from the Buildkite pipeline 55 Testing your new job is easy -- once your agent is set up (if any), just open
|
/openbsd/usr.sbin/smtpd/ |
H A D | envelope.c | 368 return ascii_load_time(&ep->agent.bounce.delay, buf); in ascii_load_field() 371 return ascii_load_time(&ep->agent.bounce.ttl, buf); in ascii_load_field() 374 return ascii_load_bounce_type(&ep->agent.bounce.type, buf); in ascii_load_field() 612 if (ep->agent.bounce.type != B_DELAYED) in ascii_dump_field() 614 return ascii_dump_time(ep->agent.bounce.delay, buf, len); in ascii_dump_field() 618 if (ep->agent.bounce.type != B_DELAYED) in ascii_dump_field() 620 return ascii_dump_time(ep->agent.bounce.ttl, buf, len); in ascii_dump_field() 624 return ascii_dump_bounce_type(ep->agent.bounce.type, buf, len); in ascii_dump_field()
|