Home
last modified time | relevance | path

Searched refs:USER (Results 1 – 25 of 103) sorted by relevance

12345

/openbsd/regress/usr.bin/ssh/
H A Dcert-userkey.sh58 -I "regress user key for $USER" \
69 rm -f $OBJ/authorized_keys_${USER}* $OBJ/authorized_principals_${USER}*
70 touch $OBJ/authorized_keys_${USER}_A
71 touch $OBJ/authorized_keys_${USER}_Z
168 ) > $OBJ/authorized_keys_${USER}_X
180 ) > $OBJ/authorized_keys_${USER}_X
190 rm -f $OBJ/authorized_keys_${USER}*
191 touch $OBJ/authorized_keys_${USER}_A
192 touch $OBJ/authorized_keys_${USER}_Z
198 ) > $OBJ/authorized_keys_${USER}_X
[all …]
H A Dmultipubkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 ||
51 rm -f $OBJ/authorized_principals_$USER
52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
57 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
63 rm -f $OBJ/authorized_principals_$USER
65 $OBJ/authorized_keys_$USER
71 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
[all …]
H A Dcfgmatchlisten.sh154 cp /dev/null $OBJ/authorized_keys_$USER
156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER
157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
171 cp /dev/null $OBJ/authorized_keys_$USER
174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
183 cp /dev/null $OBJ/authorized_keys_$USER
185 printf 'permitlisten="'$fwdport'" ' >> $OBJ/authorized_keys_$USER
186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
195 cp /dev/null $OBJ/authorized_keys_$USER
197 printf 'permitlisten="99" ' >> $OBJ/authorized_keys_$USER
[all …]
H A Dpenalty.sh7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak
13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
25 cat /dev/null > $OBJ/authorized_keys_${USER}
27 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
35 cat /dev/null > $OBJ/authorized_keys_${USER}
37 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
H A Dforward-control.sh90 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak
108 cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER}
138 < ${OBJ}/authorized_keys_${USER}.bak \
139 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail"
147 < ${OBJ}/authorized_keys_${USER}.bak \
148 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail"
158 < ${OBJ}/authorized_keys_${USER}.bak \
159 > ${OBJ}/authorized_keys_${USER} || fatal "sed 3 fail"
166 < ${OBJ}/authorized_keys_${USER}.bak \
175 < ${OBJ}/authorized_keys_${USER}.bak \
[all …]
H A Dprincipals-command.sh26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \
57 rm -f $OBJ/authorized_keys_$USER
72 echo > $OBJ/authorized_principals_$USER
81 echo gregorsamsa > $OBJ/authorized_principals_$USER
90 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
99 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
109 $OBJ/authorized_principals_$USER
120 $OBJ/authorized_principals_$USER
129 rm -f $OBJ/authorized_principals_$USER
139 ) > $OBJ/authorized_keys_$USER
[all …]
H A Dpenalty-expire.sh7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak
13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
25 cat /dev/null > $OBJ/authorized_keys_${USER}
30 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
H A Dcert-file.sh29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
30 -z $$ -n ${USER} $OBJ/user_key1 ||
33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \
34 -z $$ -n ${USER} $OBJ/user_key1 ||
37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
38 -z $$ -n ${USER} $OBJ/user_key3 ||
41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
42 -z $$ -n ${USER} $OBJ/user_key4 ||
49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
H A Dlimit-keytype.sh8 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
9 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
43 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
44 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 ||
55 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER
119 "Match user x$USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
129 "Match user $USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
H A Dscp-uri.sh37 $SCP $scpopts ${DATA} "scp://${USER}@somehost:${PORT}/${COPY}" || fail "copy failed"
42 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed"
48 $SCP $scpopts ${COPY} "scp://${USER}@somehost:${PORT}/${DIR}" || fail "copy failed"
54 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed"
61 $SCP $scpopts -r ${DIR} "scp://${USER}@somehost:${PORT}/${DIR2}" || fail "copy failed"
70 $SCP $scpopts -r "scp://${USER}@somehost:${PORT}/${DIR}" ${DIR2} || fail "copy failed"
H A Dssh-com.sh63 mkdir -p ${OBJ}/${USER}
64 cp /dev/null ${OBJ}/${USER}/authorization
66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com
67 echo Key $t.com >> ${OBJ}/${USER}/authorization
115 rm -rf ${OBJ}/${USER}
H A Dsftp-uri.sh26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "…
32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c…
38 "sftp://${USER}@somehost:${PORT}/${DIR}/" > /dev/null 2>&1 << EOF
52 "sftp://${USER}@somehost:${PORT}/${DIR}" > /dev/null 2>&1 << EOF
H A Dconnect-uri.sh13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true
19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true
25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
H A Dforcecommand.sh10 cp /dev/null $OBJ/authorized_keys_$USER
13 printf "command=\"$cmd\" " >>$OBJ/authorized_keys_$USER
14 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
47 echo "Match User $USER" >> $OBJ/sshd_proxy
H A Dssh-com-client.sh35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER
47 mkdir -p ${OBJ}/${USER}/hostkeys
48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1
57 User ${USER}
H A Dpercent.sh6 USER=`id -u -n`
71 REMUSER=$USER ;;
93 trial $i '%u' $USER
99 out="%/$USERID/127.0.0.1/$HOME/$HOST/$HOSTNAME/somehost/$PORT/$REMUSER/$USER"
H A Dbrokenkeys.sh6 KEYS="$OBJ/authorized_keys_${USER}"
15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
H A Dtest-exec.sh42 USER=`id -un`
238 test -z "$SUDO" || chown $USER \$logfile
341 $SUDO chown -R $USER $logfile
498 User $USER
514 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER
555 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
573 chmod 644 $OBJ/authorized_keys_$USER
609 >> $OBJ/authorized_keys_$USER
679 >>$OBJ/authorized_keys_$USER
/openbsd/bin/ps/
H A Dkeyword.c56 {{"utime"}, "UTIME", USER, utime, 4},
57 {{"stime"}, "STIME", USER, stime, 4},
58 {{"ixrss"}, "IXRSS", USER, ixrss, 4},
59 {{"idrss"}, "IDRSS", USER, idrss, 4},
60 {{"isrss"}, "ISRSS", USER, isrss, 4},
98 {"command", "COMMAND", NULL, COMM|LJUST|USER, command, 16},
104 {"etime", "ELAPSED", NULL, USER, elapsed, 12},
119 {"lstart", "STARTED", NULL, LJUST|USER, lstarted, 28},
140 {"pagein", "PAGEIN", NULL, USER, pagein, 6},
169 {"start", "STARTED", NULL, LJUST|USER, started, 8},
[all …]
/openbsd/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/
H A DCredentials.pm5 use vars qw($USER $PASSWORD $PROXY_USER $PROXY_PASSWORD);
15 undef $USER;
48 if ($USER && $PASSWORD) {
49 return ($USER, $PASSWORD);
52 $USER = $CPAN::Config->{username};
54 return ($USER, $PASSWORD);
62 ($USER, $PASSWORD) =
64 return ($USER,$PASSWORD);
/openbsd/games/gomoku/
H A Dmain.c44 #define USER 0 /* get input from standard input */ macro
175 input[color] = USER; in main()
180 input[BLACK] = USER; in main()
181 input[WHITE] = USER; in main()
191 plyr[BLACK] = input[BLACK] == USER ? you : __progname; in main()
192 plyr[WHITE] = input[WHITE] == USER ? you : __progname; in main()
205 input[color] = USER; in main()
210 input[BLACK] = USER; in main()
211 input[WHITE] = USER; in main()
224 case USER: /* input comes from standard input */ in main()
[all …]
/openbsd/etc/
H A Dksh.kshrc35 USER=$(id -un)
44 PROMPT="$USER:!$PS1S"
45 #PROMPT="<$USER@$HOST:!>$PS1S"
46 PPROMPT='$USER:$PWD:!'"$PS1S"
47 #PPROMPT='<$USER@$HOST:$PWD:!>'"$PS1S"
85 alias stripe='label "$USER@$HOST ($tty) - $PWD"'
86 alias istripe='ilabel "$USER@$HOST ($tty)"'
/openbsd/regress/usr.bin/rcs/
H A Dkeywords.out1 Author: USER
3 Header: file,v 1.1 YYYY/MM/DD HH:MI:SS USER Exp
4 Id: file,v 1.1 YYYY/MM/DD HH:MI:SS USER Exp
/openbsd/games/fish/
H A Dfish.c53 #define USER 1 macro
115 printplayer(USER); in main()
121 if (gofish(move, USER, userhand)) in main()
124 goodmove(USER, move, userhand, comphand); in main()
255 if (player == USER || hand[card] == CARDS) { in drawcard()
340 case USER: in printplayer()
/openbsd/usr.sbin/ldapd/schema/
H A Dcore.schema16 NO-USER-MODIFICATION
24 NO-USER-MODIFICATION
31 NO-USER-MODIFICATION
39 NO-USER-MODIFICATION
46 NO-USER-MODIFICATION
53 NO-USER-MODIFICATION
60 NO-USER-MODIFICATION
641 NO-USER-MODIFICATION
648 NO-USER-MODIFICATION
676 NO-USER-MODIFICATION

12345