Home
last modified time | relevance | path

Searched refs:agent (Results 1 – 25 of 85) sorted by relevance

1234

/openbsd/usr.bin/snmp/
H A Dsnmp.c93 if ((agent = malloc(sizeof(*agent))) == NULL) in snmp_connect_v12()
102 return agent; in snmp_connect_v12()
105 free(agent); in snmp_connect_v12()
114 if ((agent = malloc(sizeof(*agent))) == NULL) in snmp_connect_v3()
127 return agent; in snmp_connect_v3()
136 free(agent); in snmp_free_agent()
415 agent->v3->engineid, agent->v3->engineidlen, in snmp_package()
422 if ((securityparams = agent->v3->sec->genparams(agent, in snmp_package()
428 if ((encpdu = agent->v3->sec->encpdu(agent, scopedpdu, in snmp_package()
456 if (agent->v3->sec->finalparams(agent, packet, in snmp_package()
[all …]
H A Dusm.c120 usm_doinit(struct snmp_agent *agent) in usm_doinit() argument
123 struct usm_sec *usm = agent->v3->sec->data; in usm_doinit()
130 level = agent->v3->level; in usm_doinit()
131 agent->v3->level = SNMP_MSGFLAG_REPORT; in usm_doinit()
136 agent->v3->level = level; in usm_doinit()
142 agent->v3->level = level; in usm_doinit()
163 struct usm_sec *usm = agent->v3->sec->data; in usm_genparams()
189 if (agent->v3->level & SNMP_MSGFLAG_AUTH) in usm_genparams()
191 if (agent->v3->level & SNMP_MSGFLAG_PRIV) in usm_genparams()
393 usm_doinit(agent); in usm_parseparams()
[all …]
H A Dsnmpc.c528 struct snmp_agent *agent; in snmpc_get() local
540 agent->timeout = timeout; in snmpc_get()
541 agent->retries = retries; in snmpc_get()
587 snmp_free_agent(agent); in snmpc_get()
597 struct snmp_agent *agent; in snmpc_walk() local
613 agent->timeout = timeout; in snmpc_walk()
614 agent->retries = retries; in snmpc_walk()
735 snmp_free_agent(agent); in snmpc_walk()
742 struct snmp_agent *agent; in snmpc_set() local
778 snmp_free_agent(agent); in snmpc_set()
[all …]
/openbsd/gnu/usr.bin/perl/cpan/HTTP-Tiny/t/
H A D003_agent.t18 is $ua->agent, $default, 'default agent string is as expected';
22 my $ua = HTTP::Tiny->new(agent => 'something else');
23 is $ua->agent, 'something else', 'agent string is as expected';
27 my $ua = HTTP::Tiny->new(agent => 'something else ');
29 $ua->agent,
41 $ua->agent(undef);
42 is $ua->agent, undef, 'agent string is empty';
44 $ua->agent('something else');
45 is $ua->agent, 'something else', 'agent string is as expected';
47 $ua->agent('something else ');
[all …]
H A D160_cookies.t53 my $agent = $new_args{agent} || "HTTP-Tiny/$version";
58 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
H A D161_basic_auth.t32 my $agent = $new_args{agent} || "HTTP-Tiny/$version";
38 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
H A D162_proxy_auth.t32 my $agent = $new_args{agent} || "HTTP-Tiny/$version";
38 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
H A D130_redirect.t33 my $agent = $new_args{agent} || "HTTP-Tiny/$version";
39 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
H A D100_get.t35 my $agent = $new_args{agent} || "HTTP-Tiny/$version";
38 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
/openbsd/regress/usr.bin/ssh/
H A Dagent.sh38 rm -f $OBJ/$t-agent $OBJ/$t-agent.pub*
39 ${SSHKEYGEN} -q -N '' -t $t -f $OBJ/$t-agent ||\
43 -n estragon $OBJ/$t-agent.pub || fatal "ca sign failed"
46 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER
48 ${SSHADD} $OBJ/$t-agent > /dev/null 2>&1
59 mv -f $OBJ/$t-agent $OBJ/$t-agent-private
60 cp -f $OBJ/$t-agent.pub $OBJ/$t-agent-private.pub
61 cp -f $OBJ/$t-agent-cert.pub $OBJ/$t-agent-private-cert.pub
148 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub \
149 -oCertificateFile=$OBJ/$t-agent-cert.pub \
[all …]
H A Dhostkey-agent.sh6 rm -f $OBJ/agent-key.* $OBJ/ssh_proxy.orig $OBJ/known_hosts.orig $OBJ/agent-ca*
18 ${SSHKEYGEN} -qt ed25519 -f $OBJ/agent-ca -N '' || fatal "ssh-keygen CA"
23 ${SSHKEYGEN} -s $OBJ/agent-ca -qh -n localhost-with-alias \
24 -I localhost-with-alias $OBJ/agent-key.$k.pub || \
26 ${SSHADD} -k $OBJ/agent-key.$k >/dev/null 2>&1 || \
29 rm $OBJ/agent-key.$k || fatal "couldn't rm $OBJ/agent-key.$k"
31 rm $OBJ/agent-ca # Don't need CA private any more either
42 cat $OBJ/agent-key.$k.pub) > $OBJ/known_hosts
64 test -f $OBJ/agent-key.${k}.pub || fatal "no $k key"
65 test -f $OBJ/agent-key.${k}-cert.pub || fatal "no $k cert"
[all …]
H A DMakefile38 agent \
39 agent-getpeereid \
40 agent-timeout \
41 agent-ptrace \
42 agent-subprocess \
88 hostkey-agent \
99 agent-restrict \
104 agent-pkcs11-restrict \
105 agent-pkcs11-cert \
112 EXTRA_TESTS= agent
[all...]
H A Dagent-getpeereid.sh7 ASOCK=${OBJ}/agent
9 >$OBJ/ssh-agent.log
28 eval `${SSHAGENT} ${EXTRA_AGENT_ARGS} -s -a ${ASOCK}` >$OBJ/ssh-agent.log 2>&1
54 ${SSHAGENT} -k >>$OBJ/ssh-agent.log 2>&1
57 rm -f ${OBJ}/agent
H A Dagent-pkcs11-restrict.sh8 rm -f $SSH_AUTH_SOCK $OBJ/agent.log $OBJ/host_[abcx]* $OBJ/user_[abcx]*
33 ${SSHAGENT} ${EXTRA_AGENT_ARGS} -d -a $SSH_AUTH_SOCK > $OBJ/agent.log 2>&1 &
117 (printf "%s" "restrict,agent-forwarding,command=\"$OBJ/command\" ";
/openbsd/usr.bin/ssh/
H A DPROTOCOL.agent1 The SSH agent protocol is described in
2 https://tools.ietf.org/html/draft-miller-ssh-agent
4 This file documents OpenSSH's extensions to the agent protocol.
8 This extension allows a ssh client to bind an agent connection to a
11 exchange. This binding is verifiable at the agent by including the
42 smartcard keys are added to an agent.
65 When receiving this message, the agent will ensure that the
68 and signify the initial hop from the host running ssh-agent). The agent
74 the agent connection over which they were received.
110 the resultant certificates to be loaded to the agent. The default
[all …]
/openbsd/gnu/llvm/libcxx/utils/ci/
H A Dmacos-ci-setup35 cat <<EOF > ~/Library/LaunchAgents/libcxx.buildkite-agent.plist
41 <string>libcxx.buildkite-agent</string>
45 <string>${HOMEBREW_PREFIX}/bin/buildkite-agent</string>
48 <string>${HOME}/libcxx.buildkite-agent/builds</string>
73 <string>${HOME}/libcxx.buildkite-agent/stdout.log</string>
76 <string>${HOME}/libcxx.buildkite-agent/stderr.log</string>
82 launchctl load ~/Library/LaunchAgents/libcxx.buildkite-agent.plist
99 for package in sphinx-doc python3 ninja cmake clang-format buildkite/buildkite/buildkite-agent; do
H A DDockerfile18 # to run a BuildKite agent.
112 # Install the Buildkite agent and dependencies. This must be done as non-root
113 # for the Buildkite agent to be installed in a path where we can find it.
114 RUN bash -c "$(curl -sL https://raw.githubusercontent.com/buildkite/agent/main/install.sh)"
115 ENV PATH="${PATH}:/home/libcxx-builder/.buildkite-agent/bin"
116 …uilders,arch=$(uname -m),os=linux\"" >> "/home/libcxx-builder/.buildkite-agent/buildkite-agent.cfg"
118 # By default, start the Buildkite agent (this requires a token).
119 CMD buildkite-agent start
H A Dbuildkite-pipeline-clang.yml24 - "buildkite-agent artifact upload 'install/**/*'"
41 - "buildkite-agent artifact download 'install/**' ."
63 - "buildkite-agent artifact download 'install/**' ."
85 - "buildkite-agent artifact download 'install/**' ."
/openbsd/usr.sbin/lpd/
H A Dlp_rmjob.c34 lp_rmjob(int ofd, struct lp_printer *lp, const char *agent, in lp_rmjob() argument
59 if (currjob[0] && docheck(lp, agent, jf, currjob, 1, 0) == 1) { in lp_rmjob()
69 switch (docheck(lp, agent, jf, q.cfname[i], active, 0)) { in lp_rmjob()
97 docheck(struct lp_printer *lp, const char *agent, struct lp_jobfilter *jf, in docheck() argument
107 if (!strcmp(agent, "-all") && !strcmp(LP_JOBHOST(cfname), jf->hostfrom)) in docheck()
114 if (!strcmp(agent, "root")) in docheck()
128 if (!strcmp(person, agent) && in docheck()
/openbsd/usr.bin/ssh/ssh-agent/
H A DMakefile5 SRCS= ssh-agent.c ${SRCS_PKCS11_CLIENT}
10 PROG= ssh-agent
24 CLEANFILES+= ssh-agent.tar install.sh
/openbsd/share/snmp/
H A DSNMPv2-TC.txt201 exists in the agent, but is missing information
302 agent.
324 noError: because the agent chooses to create the
339 wrongValue: because the agent does not support
349 inconsistentValue: because the agent is unable to
450 that the agent does not implement the object-type
469 supplied by the agent (note that an agent must provide
494 the agent will not allow that particular columnar
535 - a value is returned, indicating that the agent
550 the agent does not have sufficient information to
[all …]
/openbsd/regress/usr.bin/ssh/unittests/authopt/testdata/
H A Dmktestdata.sh21 sign all_permit.cert -Opermit-agent-forwarding -Opermit-port-forwarding \
25 sign no_agentfwd.cert -Ono-agent-forwarding
31 sign only_agentfwd.cert -Oclear -Opermit-agent-forwarding
/openbsd/gnu/usr.bin/perl/cpan/HTTP-Tiny/lib/HTTP/
H A DTiny.pm96 sub agent { subroutine
97 my($self, $agent) = @_;
99 $self->{agent} =
100 (defined $agent && $agent =~ / $/) ? $agent . $self->_agent : $agent;
102 return $self->{agent};
141 $self->agent( exists $args{agent} ? $args{agent} : $class->_agent );
788 my $agent = exists($request->{headers}{'user-agent'})
789 ? $request->{headers}{'user-agent'} : $self->{agent};
796 'user-agent' => $agent,
838 $request->{headers}{'user-agent'} ||= $self->{agent};
/openbsd/gnu/llvm/libcxx/docs/
H A DAddingNewCIJobs.rst17 `Buildkite guide <https://buildkite.com/docs/agent/v3>`_ to setup your
20 agent to register itself to Buildkite, it will need a BuildKite Agent token.
40 use agent tags to allow targetting your agents from the Buildkite pipeline
55 Testing your new job is easy -- once your agent is set up (if any), just open
/openbsd/usr.sbin/smtpd/
H A Denvelope.c368 return ascii_load_time(&ep->agent.bounce.delay, buf); in ascii_load_field()
371 return ascii_load_time(&ep->agent.bounce.ttl, buf); in ascii_load_field()
374 return ascii_load_bounce_type(&ep->agent.bounce.type, buf); in ascii_load_field()
612 if (ep->agent.bounce.type != B_DELAYED) in ascii_dump_field()
614 return ascii_dump_time(ep->agent.bounce.delay, buf, len); in ascii_dump_field()
618 if (ep->agent.bounce.type != B_DELAYED) in ascii_dump_field()
620 return ascii_dump_time(ep->agent.bounce.ttl, buf, len); in ascii_dump_field()
624 return ascii_dump_bounce_type(ep->agent.bounce.type, buf, len); in ascii_dump_field()

1234