/freebsd-11-stable/tools/tools/hcomp/ |
H A D | Makefile | 4 BINOWN ?= ${USER} 5 BINGRP ?= ${USER} 9 MANOWN ?= ${USER} 10 MANGRP ?= ${USER}
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | forcecommand.sh | 8 cp /dev/null $OBJ/authorized_keys_$USER 10 printf 'command="true" ' >>$OBJ/authorized_keys_$USER 11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 20 cp /dev/null $OBJ/authorized_keys_$USER 22 printf 'command="false" ' >> $OBJ/authorized_keys_$USER 23 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 37 echo "Match User $USER" >> $OBJ/sshd_proxy
|
H A D | brokenkeys.sh | 6 KEYS="$OBJ/authorized_keys_${USER}" 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | multipubkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 || 45 rm -f $OBJ/authorized_principals_$USER 46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 50 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 55 rm -f $OBJ/authorized_principals_$USER 57 $OBJ/authorized_keys_$USER [all...] |
H A D | cert-userkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 41 -I "regress user key for $USER" \ 42 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 53 rm -f $OBJ/authorized_keys_$USER 69 rm -f $OBJ/authorized_principals_$USER 78 echo > $OBJ/authorized_principals_$USER 87 echo gregorsamsa > $OBJ/authorized_principals_$USER 96 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 105 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 115 $OBJ/authorized_principals_$USER [all...] |
H A D | principals-command.sh | 23 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \ 64 rm -f $OBJ/authorized_keys_$USER 80 echo > $OBJ/authorized_principals_$USER 89 echo gregorsamsa > $OBJ/authorized_principals_$USER 98 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 107 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 117 $OBJ/authorized_principals_$USER 127 $OBJ/authorized_principals_$USER 135 rm -f $OBJ/authorized_principals_$USER 146 ) > $OBJ/authorized_keys_$USER [all...] |
H A D | limit-keytype.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 25 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 26 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 || 37 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 38 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 39 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER 85 "Match user x$USER" "PubkeyAcceptedKeyTypes +ssh-ed25519" 93 "Match user $USER" "PubkeyAcceptedKeyTypes +ssh-ed25519"
|
H A D | cert-file.sh | 29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 30 -z $$ -n ${USER} $OBJ/user_key1 || 33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \ 34 -z $$ -n ${USER} $OBJ/user_key1 || 37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 38 -z $$ -n ${USER} $OBJ/user_key3 || 41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 42 -z $$ -n ${USER} $OBJ/user_key4 || 49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
|
H A D | ssh-com.sh | 63 mkdir -p ${OBJ}/${USER} 64 cp /dev/null ${OBJ}/${USER}/authorization 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 67 echo Key $t.com >> ${OBJ}/${USER}/authorization 115 rm -rf ${OBJ}/${USER}
|
H A D | conch-ciphers.sh | 19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
H A D | forward-control.sh | 99 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak 119 cp ${OBJ}/authorized_keys_${USER}.bak \ 120 ${OBJ}/authorized_keys_${USER} 144 < ${OBJ}/authorized_keys_${USER}.bak \ 145 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail" 153 < ${OBJ}/authorized_keys_${USER}.bak \ 154 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail"
|
H A D | proxy-connect.sh | 30 ${SSH} -$p -F $OBJ/ssh_proxy ${USER}:style@999.999.999.999 true || \
|
H A D | sftp-chroot.sh | 7 FILENAME=testdata_${USER}
|
H A D | cfgmatch.sh | 49 echo "Match user $USER" >>$OBJ/sshd_proxy 77 cp /dev/null $OBJ/authorized_keys_$USER 79 printf 'permitopen="127.0.0.1:'$PORT'" ' >> $OBJ/authorized_keys_$USER 80 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 102 echo "Match User $USER" >>$OBJ/sshd_proxy
|
H A D | ssh-com-client.sh | 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 47 mkdir -p ${OBJ}/${USER}/hostkeys 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1 57 User ${USER} 126 rm -rf ${OBJ}/${USER}
|
H A D | agent.sh | 22 printf '' > $OBJ/authorized_keys_$USER 29 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER
|
/freebsd-11-stable/usr.bin/bmake/tests/ |
H A D | test-new.mk | 6 rm -rf /tmp/${USER}.make.test
|
/freebsd-11-stable/contrib/ntp/scripts/rc/ |
H A D | ntpd | 5 USER=ntp 7 NTPD_OPTS="-g -u $USER:$GROUP -p $PIDFILE"
|
/freebsd-11-stable/bin/ps/ |
H A D | keyword.c | 73 {"args", "COMMAND", NULL, "arguments", COMM|LJUST|USER, arguments, 0, 80 {"command", "COMMAND", NULL, "command", COMM|LJUST|USER, command, 0, 93 {"etime", "ELAPSED", NULL, "elapsed-time", USER, elapsed, 0, CHAR, 95 {"etimes", "ELAPSED", NULL, "elapsed-times", USER, elapseds, 0, CHAR, 106 {"inblk", "INBLK", NULL, "read-blocks", USER, rvar, ROFF(ru_inblock), 122 {"lstart", "STARTED", NULL, "start-time", LJUST|USER, lstarted, 0, 126 {"majflt", "MAJFLT", NULL, "major-faults", USER, rvar, ROFF(ru_majflt), 128 {"minflt", "MINFLT", NULL, "minor-faults", USER, rvar, ROFF(ru_minflt), 130 {"msgrcv", "MSGRCV", NULL, "received-messages", USER, rvar, 132 {"msgsnd", "MSGSND", NULL, "sent-messages", USER, rva [all...] |
H A D | ps.h | 71 #define USER 0x04 /* needs user structure */ macro
|
/freebsd-11-stable/stand/common/ |
H A D | newvers.sh | 49 u=${USER-root} h=${HOSTNAME-`hostname`} t=`date`
|
/freebsd-11-stable/contrib/dialog/samples/ |
H A D | form1 | 15 user="$USER"
|
H A D | form1-both | 12 user="$USER"
|
H A D | form1-extra | 12 user="$USER"
|
H A D | form1-help | 12 user="$USER"
|