Lines Matching full:user

4 tid="certified user keys"
6 rm -f $OBJ/authorized_keys_${USER}* $OBJ/user_ca_key* $OBJ/cert_user_key*
46 # Generate and sign user keys
48 verbose "$tid: sign user ${ktype} cert"
58 -I "regress user key for $USER" \
59 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
69 rm -f $OBJ/authorized_keys_${USER}* $OBJ/authorized_principals_${USER}*
70 touch $OBJ/authorized_keys_${USER}_A
71 touch $OBJ/authorized_keys_${USER}_Z
72 touch $OBJ/authorized_principals_${USER}_A
73 touch $OBJ/authorized_principals_${USER}_Z
88 rm -f $OBJ/authorized_principals_${USER}_X
97 echo > $OBJ/authorized_principals_${USER}_X
106 echo gregorsamsa > $OBJ/authorized_principals_${USER}_X
115 echo mekmitasdigoat > $OBJ/authorized_principals_${USER}_X
124 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_${USER}_X
134 $OBJ/authorized_principals_${USER}_X
145 $OBJ/authorized_principals_${USER}_X
153 rm -f $OBJ/authorized_principals_${USER}_X
168 ) > $OBJ/authorized_keys_${USER}_X
180 ) > $OBJ/authorized_keys_${USER}_X
190 rm -f $OBJ/authorized_keys_${USER}*
191 touch $OBJ/authorized_keys_${USER}_A
192 touch $OBJ/authorized_keys_${USER}_Z
198 ) > $OBJ/authorized_keys_${USER}_X
200 echo > $OBJ/authorized_keys_${USER}_X
278 verbose "$tid: ensure CA key does not authenticate user"
308 ) > $OBJ/authorized_keys_${USER}_X
310 echo > $OBJ/authorized_keys_${USER}_X
322 -I "regress user key for $USER" \
342 test_one "correct principal" success "-n ${USER}"
343 test_one "host-certificate" failure "-n ${USER} -h"
345 test_one "cert not yet valid" failure "-n ${USER} -V20300101:20320101"
346 test_one "cert expired" failure "-n ${USER} -V19800101:19900101"
347 test_one "cert valid interval" success "-n ${USER} -V-1w:+2w"
348 test_one "wrong source-address" failure "-n ${USER} -Osource-address=10.0.0.0/8"
349 test_one "force-command" failure "-n ${USER} -Oforce-command=false"
359 rm -f $OBJ/authorized_keys_${USER}_X
360 echo mekmitasdigoat > $OBJ/authorized_principals_${USER}_X
367 rm -f $OBJ/authorized_principals_${USER}_X
375 "-n ${USER} -Oforce-command=true" \
378 "-n ${USER} -Oforce-command=false" \
381 "-n ${USER} -Oforce-command=false" \
384 "-n ${USER} -Oforce-command=true" \
393 "regress user key for $USER" \
394 -n $USER $OBJ/cert_user_key_${ktype} ||
396 verbose "$tid: user ${ktype} connect wrong cert"
404 rm -f $OBJ/authorized_keys_${USER}* $OBJ/user_ca_key* $OBJ/cert_user_key*