/openbsd/regress/usr.bin/ssh/ |
H A D | cert-userkey.sh | 58 -I "regress user key for $USER" \ 69 rm -f $OBJ/authorized_keys_${USER}* $OBJ/authorized_principals_${USER}* 70 touch $OBJ/authorized_keys_${USER}_A 71 touch $OBJ/authorized_keys_${USER}_Z 168 ) > $OBJ/authorized_keys_${USER}_X 180 ) > $OBJ/authorized_keys_${USER}_X 190 rm -f $OBJ/authorized_keys_${USER}* 191 touch $OBJ/authorized_keys_${USER}_A 192 touch $OBJ/authorized_keys_${USER}_Z 198 ) > $OBJ/authorized_keys_${USER}_X [all …]
|
H A D | multipubkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 || 51 rm -f $OBJ/authorized_principals_$USER 52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 63 rm -f $OBJ/authorized_principals_$USER 65 $OBJ/authorized_keys_$USER 71 echo mekmitasdigoat > $OBJ/authorized_principals_$USER [all …]
|
H A D | cfgmatchlisten.sh | 154 cp /dev/null $OBJ/authorized_keys_$USER 156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER 157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 171 cp /dev/null $OBJ/authorized_keys_$USER 174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 183 cp /dev/null $OBJ/authorized_keys_$USER 185 printf 'permitlisten="'$fwdport'" ' >> $OBJ/authorized_keys_$USER 186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 195 cp /dev/null $OBJ/authorized_keys_$USER 197 printf 'permitlisten="99" ' >> $OBJ/authorized_keys_$USER [all …]
|
H A D | penalty.sh | 7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak 13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 25 cat /dev/null > $OBJ/authorized_keys_${USER} 27 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 35 cat /dev/null > $OBJ/authorized_keys_${USER} 37 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
|
H A D | forward-control.sh | 90 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak 108 cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER} 138 < ${OBJ}/authorized_keys_${USER}.bak \ 139 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail" 147 < ${OBJ}/authorized_keys_${USER}.bak \ 148 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail" 158 < ${OBJ}/authorized_keys_${USER}.bak \ 159 > ${OBJ}/authorized_keys_${USER} || fatal "sed 3 fail" 166 < ${OBJ}/authorized_keys_${USER}.bak \ 175 < ${OBJ}/authorized_keys_${USER}.bak \ [all …]
|
H A D | principals-command.sh | 26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \ 57 rm -f $OBJ/authorized_keys_$USER 72 echo > $OBJ/authorized_principals_$USER 81 echo gregorsamsa > $OBJ/authorized_principals_$USER 90 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 99 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 109 $OBJ/authorized_principals_$USER 120 $OBJ/authorized_principals_$USER 129 rm -f $OBJ/authorized_principals_$USER 139 ) > $OBJ/authorized_keys_$USER [all …]
|
H A D | penalty-expire.sh | 7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak 13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 25 cat /dev/null > $OBJ/authorized_keys_${USER} 30 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
|
H A D | cert-file.sh | 29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 30 -z $$ -n ${USER} $OBJ/user_key1 || 33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \ 34 -z $$ -n ${USER} $OBJ/user_key1 || 37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 38 -z $$ -n ${USER} $OBJ/user_key3 || 41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 42 -z $$ -n ${USER} $OBJ/user_key4 || 49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
|
H A D | limit-keytype.sh | 8 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 9 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 43 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 44 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 || 55 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER 119 "Match user x$USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`" 129 "Match user $USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
|
H A D | scp-uri.sh | 37 $SCP $scpopts ${DATA} "scp://${USER}@somehost:${PORT}/${COPY}" || fail "copy failed" 42 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed" 48 $SCP $scpopts ${COPY} "scp://${USER}@somehost:${PORT}/${DIR}" || fail "copy failed" 54 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed" 61 $SCP $scpopts -r ${DIR} "scp://${USER}@somehost:${PORT}/${DIR2}" || fail "copy failed" 70 $SCP $scpopts -r "scp://${USER}@somehost:${PORT}/${DIR}" ${DIR2} || fail "copy failed"
|
H A D | ssh-com.sh | 63 mkdir -p ${OBJ}/${USER} 64 cp /dev/null ${OBJ}/${USER}/authorization 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 67 echo Key $t.com >> ${OBJ}/${USER}/authorization 115 rm -rf ${OBJ}/${USER}
|
H A D | sftp-uri.sh | 26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "… 32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c… 38 "sftp://${USER}@somehost:${PORT}/${DIR}/" > /dev/null 2>&1 << EOF 52 "sftp://${USER}@somehost:${PORT}/${DIR}" > /dev/null 2>&1 << EOF
|
H A D | connect-uri.sh | 13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true 19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true 25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
|
H A D | forcecommand.sh | 10 cp /dev/null $OBJ/authorized_keys_$USER 13 printf "command=\"$cmd\" " >>$OBJ/authorized_keys_$USER 14 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 47 echo "Match User $USER" >> $OBJ/sshd_proxy
|
H A D | ssh-com-client.sh | 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 47 mkdir -p ${OBJ}/${USER}/hostkeys 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1 57 User ${USER}
|
H A D | percent.sh | 6 USER=`id -u -n` 71 REMUSER=$USER ;; 93 trial $i '%u' $USER 99 out="%/$USERID/127.0.0.1/$HOME/$HOST/$HOSTNAME/somehost/$PORT/$REMUSER/$USER"
|
H A D | brokenkeys.sh | 6 KEYS="$OBJ/authorized_keys_${USER}" 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | test-exec.sh | 42 USER=`id -un` 238 test -z "$SUDO" || chown $USER \$logfile 341 $SUDO chown -R $USER $logfile 498 User $USER 514 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER 555 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 573 chmod 644 $OBJ/authorized_keys_$USER 609 >> $OBJ/authorized_keys_$USER 679 >>$OBJ/authorized_keys_$USER
|
/openbsd/bin/ps/ |
H A D | keyword.c | 56 {{"utime"}, "UTIME", USER, utime, 4}, 57 {{"stime"}, "STIME", USER, stime, 4}, 58 {{"ixrss"}, "IXRSS", USER, ixrss, 4}, 59 {{"idrss"}, "IDRSS", USER, idrss, 4}, 60 {{"isrss"}, "ISRSS", USER, isrss, 4}, 98 {"command", "COMMAND", NULL, COMM|LJUST|USER, command, 16}, 104 {"etime", "ELAPSED", NULL, USER, elapsed, 12}, 119 {"lstart", "STARTED", NULL, LJUST|USER, lstarted, 28}, 140 {"pagein", "PAGEIN", NULL, USER, pagein, 6}, 169 {"start", "STARTED", NULL, LJUST|USER, started, 8}, [all …]
|
/openbsd/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/ |
H A D | Credentials.pm | 5 use vars qw($USER $PASSWORD $PROXY_USER $PROXY_PASSWORD); 15 undef $USER; 48 if ($USER && $PASSWORD) { 49 return ($USER, $PASSWORD); 52 $USER = $CPAN::Config->{username}; 54 return ($USER, $PASSWORD); 62 ($USER, $PASSWORD) = 64 return ($USER,$PASSWORD);
|
/openbsd/games/gomoku/ |
H A D | main.c | 44 #define USER 0 /* get input from standard input */ macro 175 input[color] = USER; in main() 180 input[BLACK] = USER; in main() 181 input[WHITE] = USER; in main() 191 plyr[BLACK] = input[BLACK] == USER ? you : __progname; in main() 192 plyr[WHITE] = input[WHITE] == USER ? you : __progname; in main() 205 input[color] = USER; in main() 210 input[BLACK] = USER; in main() 211 input[WHITE] = USER; in main() 224 case USER: /* input comes from standard input */ in main() [all …]
|
/openbsd/etc/ |
H A D | ksh.kshrc | 35 USER=$(id -un) 44 PROMPT="$USER:!$PS1S" 45 #PROMPT="<$USER@$HOST:!>$PS1S" 46 PPROMPT='$USER:$PWD:!'"$PS1S" 47 #PPROMPT='<$USER@$HOST:$PWD:!>'"$PS1S" 85 alias stripe='label "$USER@$HOST ($tty) - $PWD"' 86 alias istripe='ilabel "$USER@$HOST ($tty)"'
|
/openbsd/regress/usr.bin/rcs/ |
H A D | keywords.out | 1 Author: USER 3 Header: file,v 1.1 YYYY/MM/DD HH:MI:SS USER Exp 4 Id: file,v 1.1 YYYY/MM/DD HH:MI:SS USER Exp
|
/openbsd/games/fish/ |
H A D | fish.c | 53 #define USER 1 macro 115 printplayer(USER); in main() 121 if (gofish(move, USER, userhand)) in main() 124 goodmove(USER, move, userhand, comphand); in main() 255 if (player == USER || hand[card] == CARDS) { in drawcard() 340 case USER: in printplayer()
|
/openbsd/usr.sbin/ldapd/schema/ |
H A D | core.schema | 16 NO-USER-MODIFICATION 24 NO-USER-MODIFICATION 31 NO-USER-MODIFICATION 39 NO-USER-MODIFICATION 46 NO-USER-MODIFICATION 53 NO-USER-MODIFICATION 60 NO-USER-MODIFICATION 641 NO-USER-MODIFICATION 648 NO-USER-MODIFICATION 676 NO-USER-MODIFICATION
|