/freebsd-13-stable/tools/tools/hcomp/ |
H A D | Makefile | 4 BINOWN ?= ${USER} 5 BINGRP ?= ${USER} 9 MANOWN ?= ${USER} 10 MANGRP ?= ${USER}
|
/freebsd-13-stable/crypto/openssh/regress/ |
H A D | forcecommand.sh | 8 cp /dev/null $OBJ/authorized_keys_$USER 10 printf 'command="true" ' >>$OBJ/authorized_keys_$USER 11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 17 cp /dev/null $OBJ/authorized_keys_$USER 19 printf 'command="false" ' >> $OBJ/authorized_keys_$USER 20 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 31 echo "Match User $USER" >> $OBJ/sshd_proxy
|
H A D | brokenkeys.sh | 6 KEYS="$OBJ/authorized_keys_${USER}" 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | connect-uri.sh | 13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true 19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true 25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
|
H A D | multipubkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 || 45 rm -f $OBJ/authorized_principals_$USER 46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 50 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 55 rm -f $OBJ/authorized_principals_$USER 57 $OBJ/authorized_keys_$USER [all...] |
H A D | cert-userkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 42 -I "regress user key for $USER" \ 43 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 54 rm -f $OBJ/authorized_keys_$USER 70 rm -f $OBJ/authorized_principals_$USER 79 echo > $OBJ/authorized_principals_$USER 88 echo gregorsamsa > $OBJ/authorized_principals_$USER 97 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 106 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 116 $OBJ/authorized_principals_$USER [all...] |
H A D | proxy-connect.sh | 20 ${SSH} -F $OBJ/ssh_proxy ${USER}:style@999.999.999.999 true || \
|
H A D | cfgmatchlisten.sh | 70 echo "Match user $USER" >>$OBJ/sshd_proxy 92 cp /dev/null $OBJ/authorized_keys_$USER 94 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER 95 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 126 echo "Match User $USER" >>$OBJ/sshd_proxy 154 cp /dev/null $OBJ/authorized_keys_$USER 156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER 157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 171 cp /dev/null $OBJ/authorized_keys_$USER 173 printf 'permitlisten="'$fwdspec2'" ' >> $OBJ/authorized_keys_$USER [all...] |
H A D | principals-command.sh | 23 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \ 64 rm -f $OBJ/authorized_keys_$USER 80 echo > $OBJ/authorized_principals_$USER 89 echo gregorsamsa > $OBJ/authorized_principals_$USER 98 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 107 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 117 $OBJ/authorized_principals_$USER 127 $OBJ/authorized_principals_$USER 135 rm -f $OBJ/authorized_principals_$USER 146 ) > $OBJ/authorized_keys_$USER [all...] |
H A D | forward-control.sh | 97 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak 115 cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER} 145 < ${OBJ}/authorized_keys_${USER}.bak \ 146 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail" 154 < ${OBJ}/authorized_keys_${USER}.bak \ 155 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail" 165 < ${OBJ}/authorized_keys_${USER}.bak \ 166 > ${OBJ}/authorized_keys_${USER} || fata [all...] |
H A D | limit-keytype.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 25 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 26 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 || 37 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 38 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 39 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER 86 "Match user x$USER" "PubkeyAcceptedKeyTypes +ssh-ed25519" 94 "Match user $USER" "PubkeyAcceptedKeyTypes +ssh-ed25519"
|
H A D | cert-file.sh | 29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 30 -z $$ -n ${USER} $OBJ/user_key1 || 33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \ 34 -z $$ -n ${USER} $OBJ/user_key1 || 37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 38 -z $$ -n ${USER} $OBJ/user_key3 || 41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 42 -z $$ -n ${USER} $OBJ/user_key4 || 49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
|
H A D | scp-uri.sh | 29 $SCP $scpopts ${DATA} "scp://${USER}@somehost:${PORT}/${COPY}" || fail "copy failed" 34 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed" 40 $SCP $scpopts ${COPY} "scp://${USER}@somehost:${PORT}/${DIR}" || fail "copy failed" 46 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed" 53 $SCP $scpopts -r ${DIR} "scp://${USER}@somehost:${PORT}/${DIR2}" || fail "copy failed" 62 $SCP $scpopts -r "scp://${USER}@somehost:${PORT}/${DIR}" ${DIR2} || fail "copy failed"
|
H A D | sftp-uri.sh | 26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed" 32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed" 38 "sftp://${USER}@somehost:${PORT}/${DIR}/" > /dev/null 2>&1 << EOF 52 "sftp://${USER}@somehost:${PORT}/${DIR}" > /dev/null 2>&1 << EOF
|
H A D | cfgmatch.sh | 49 echo "Match user $USER" >>$OBJ/sshd_proxy 73 cp /dev/null $OBJ/authorized_keys_$USER 75 printf 'permitopen="127.0.0.1:'$PORT'" ' >> $OBJ/authorized_keys_$USER 76 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 94 echo "Match User $USER" >>$OBJ/sshd_proxy
|
H A D | ssh-com.sh | 63 mkdir -p ${OBJ}/${USER} 64 cp /dev/null ${OBJ}/${USER}/authorization 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 67 echo Key $t.com >> ${OBJ}/${USER}/authorization 115 rm -rf ${OBJ}/${USER}
|
H A D | conch-ciphers.sh | 19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
H A D | sftp-chroot.sh | 7 FILENAME=testdata_${USER}
|
H A D | ssh-com-client.sh | 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 47 mkdir -p ${OBJ}/${USER}/hostkeys 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1 57 User ${USER} 126 rm -rf ${OBJ}/${USER}
|
/freebsd-13-stable/usr.bin/bmake/tests/ |
H A D | test-new.mk | 6 rm -rf /tmp/${USER}.make.test
|
/freebsd-13-stable/contrib/ntp/scripts/rc/ |
H A D | ntpd | 5 USER=ntp 7 NTPD_OPTS="-g -u $USER:$GROUP -p $PIDFILE"
|
/freebsd-13-stable/bin/ps/ |
H A D | keyword.c | 75 {"args", "COMMAND", NULL, "arguments", COMM|LJUST|USER, arguments, 0, 82 {"command", "COMMAND", NULL, "command", COMM|LJUST|USER, command, 0, 94 {"etime", "ELAPSED", NULL, "elapsed-time", USER, elapsed, 0, CHAR, 96 {"etimes", "ELAPSED", NULL, "elapsed-times", USER, elapseds, 0, CHAR, 107 {"inblk", "INBLK", NULL, "read-blocks", USER, rvar, ROFF(ru_inblock), 123 {"lstart", "STARTED", NULL, "start-time", LJUST|USER, lstarted, 0, 127 {"majflt", "MAJFLT", NULL, "major-faults", USER, rvar, ROFF(ru_majflt), 129 {"minflt", "MINFLT", NULL, "minor-faults", USER, rvar, ROFF(ru_minflt), 131 {"msgrcv", "MSGRCV", NULL, "received-messages", USER, rvar, 133 {"msgsnd", "MSGSND", NULL, "sent-messages", USER, rva [all...] |
H A D | ps.h | 73 #define USER 0x04 /* needs user structure */ macro
|
/freebsd-13-stable/stand/common/ |
H A D | newvers.sh | 49 u=${USER-root} h=${HOSTNAME-`hostname`} t=`date`
|
/freebsd-13-stable/contrib/dialog/samples/ |
H A D | form1 | 15 user="$USER"
|