| /openbsd-src/regress/usr.bin/ssh/ |
| H A D | cert-userkey.sh | 6 rm -f $OBJ/authorized_keys_${USER}* $OBJ/user_ca_key* $OBJ/cert_user_key* 58 -I "regress user key for $USER" \ 59 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 69 rm -f $OBJ/authorized_keys_${USER}* $OBJ/authorized_principals_${USER}* 70 touch $OBJ/authorized_keys_${USER}_A 71 touch $OBJ/authorized_keys_${USER}_Z 72 touch $OBJ/authorized_principals_${USER}_A 73 touch $OBJ/authorized_principals_${USER}_Z 88 rm -f $OBJ/authorized_principals_${USER}_ [all...] |
| H A D | multipubkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 || 51 rm -f $OBJ/authorized_principals_$USER 52 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 58 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 63 rm -f $OBJ/authorized_principals_$USER 65 $OBJ/authorized_keys_$USER [all …]
|
| H A D | cfgmatchlisten.sh | 154 cp /dev/null $OBJ/authorized_keys_$USER 156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER 157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 171 cp /dev/null $OBJ/authorized_keys_$USER 173 printf 'permitlisten="'$fwdspec2'" ' >> $OBJ/authorized_keys_$USER 174 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 183 cp /dev/null $OBJ/authorized_keys_$USER 185 printf 'permitlisten="'$fwdport'" ' >> $OBJ/authorized_keys_$USER 186 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 195 cp /dev/null $OBJ/authorized_keys_$USER [all …]
|
| H A D | penalty.sh | 7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak 13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 25 cat /dev/null > $OBJ/authorized_keys_${USER} 27 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 35 cat /dev/null > $OBJ/authorized_keys_${USER} 37 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
|
| H A D | forward-control.sh | 90 cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak 108 cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER} 138 < ${OBJ}/authorized_keys_${USER}.bak \ 139 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail" 147 < ${OBJ}/authorized_keys_${USER}.bak \ 148 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail" 158 < ${OBJ}/authorized_keys_${USER}.bak \ 159 > ${OBJ}/authorized_keys_${USER} || fatal "sed 3 fail" 166 < ${OBJ}/authorized_keys_${USER}.bak \ 167 > ${OBJ}/authorized_keys_${USER} || fatal "sed 4 fail" [all …]
|
| H A D | principals-command.sh | 26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \ 57 rm -f $OBJ/authorized_keys_$USER 72 echo > $OBJ/authorized_principals_$USER 81 echo gregorsamsa > $OBJ/authorized_principals_$USER 90 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 99 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 109 $OBJ/authorized_principals_$USER 120 $OBJ/authorized_principals_$USER 129 rm -f $OBJ/authorized_principals_$USER 139 ) > $OBJ/authorized_keys_$USER [all …]
|
| H A D | penalty-expire.sh | 7 cp $OBJ/authorized_keys_${USER} $OBJ/authorized_keys_${USER}.bak 13 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER} 25 cat /dev/null > $OBJ/authorized_keys_${USER} 30 cp $OBJ/authorized_keys_${USER}.bak $OBJ/authorized_keys_${USER}
|
| H A D | cert-file.sh | 29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 30 -z $$ -n ${USER} $OBJ/user_key1 || 33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \ 34 -z $$ -n ${USER} $OBJ/user_key1 || 37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 38 -z $$ -n ${USER} $OBJ/user_key3 || 41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 42 -z $$ -n ${USER} $OBJ/user_key4 || 49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
|
| H A D | limit-keytype.sh | 8 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 9 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 43 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 44 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 || 55 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 56 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 57 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER 119 "Match user x$USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`" 129 "Match user $USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
|
| H A D | scp-uri.sh | 37 $SCP $scpopts ${DATA} "scp://${USER}@somehost:${PORT}/${COPY}" || fail "copy failed" 42 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "copy failed" 48 $SCP $scpopts ${COPY} "scp://${USER}@somehost:${PORT}/${DIR}" || fail "copy failed" 54 $SCP $scpopts "scp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "copy failed" 61 $SCP $scpopts -r ${DIR} "scp://${USER}@somehost:${PORT}/${DIR2}" || fail "copy failed" 70 $SCP $scpopts -r "scp://${USER}@somehost:${PORT}/${DIR}" ${DIR2} || fail "copy failed"
|
| H A D | ssh-com.sh | 63 mkdir -p ${OBJ}/${USER} 64 cp /dev/null ${OBJ}/${USER}/authorization 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 67 echo Key $t.com >> ${OBJ}/${USER}/authorization 115 rm -rf ${OBJ}/${USER}
|
| H A D | sftp-uri.sh | 26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "… 32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c… 38 "sftp://${USER}@somehost:${PORT}/${DIR}/" > /dev/null 2>&1 << EOF 52 "sftp://${USER}@somehost:${PORT}/${DIR}" > /dev/null 2>&1 << EOF
|
| H A D | connect-uri.sh | 13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true 19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true 25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
|
| H A D | forcecommand.sh | 10 cp /dev/null $OBJ/authorized_keys_$USER 13 printf "command=\"$cmd\" " >>$OBJ/authorized_keys_$USER 14 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 47 echo "Match User $USER" >> $OBJ/sshd_proxy
|
| H A D | ssh-com-client.sh | 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 47 mkdir -p ${OBJ}/${USER}/hostkeys 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1 57 User ${USER}
|
| H A D | percent.sh | 6 USER=`id -u -n` 71 REMUSER=$USER ;; 93 trial $i '%u' $USER 99 out="%/$USERID/127.0.0.1/$HOME/$HOST/$HOSTNAME/somehost/$PORT/$REMUSER/$USER"
|
| H A D | brokenkeys.sh | 6 KEYS="$OBJ/authorized_keys_${USER}" 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
| H A D | test-exec.sh | 42 USER=`id -un` 238 test -z "$SUDO" || chown $USER \$logfile 341 $SUDO chown -R $USER $logfile 498 User $USER 514 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER 555 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 573 chmod 644 $OBJ/authorized_keys_$USER 609 >> $OBJ/authorized_keys_$USER 679 >>$OBJ/authorized_keys_$USER
|
| H A D | agent-pkcs11-cert.sh | 18 $SSHKEYGEN -qs $OBJ/ca -I "ecdsa_key" -n $USER -z 1 ${SSH_SOFTHSM_DIR}/EC.pub || 20 $SSHKEYGEN -qs $OBJ/ca -I "rsa_key" -n $USER -z 2 ${SSH_SOFTHSM_DIR}/RSA.pub || 22 $SSHKEYGEN -qs $OBJ/ca -I "ca_ca" -n $USER -z 3 $OBJ/ca.pub ||
|
| /openbsd-src/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/ |
| H A D | Credentials.pm | 5 use vars qw($USER $PASSWORD $PROXY_USER $PROXY_PASSWORD); 15 undef $USER; 48 if ($USER && $PASSWORD) { 49 return ($USER, $PASSWORD); 52 $USER = $CPAN::Config->{username}; 54 return ($USER, $PASSWORD); 62 ($USER, $PASSWORD) = 64 return ($USER,$PASSWORD);
|
| /openbsd-src/games/gomoku/ |
| H A D | main.c | 44 #define USER 0 /* get input from standard input */ macro 175 input[color] = USER; in main() 180 input[BLACK] = USER; in main() 181 input[WHITE] = USER; in main() 191 plyr[BLACK] = input[BLACK] == USER ? you : __progname; in main() 192 plyr[WHITE] = input[WHITE] == USER ? you : __progname; in main() 205 input[color] = USER; in main() 210 input[BLACK] = USER; in main() 211 input[WHITE] = USER; in main() 219 plyr[BLACK] = input[BLACK] == USER ? you : __progname; in main() [all …]
|
| /openbsd-src/etc/ |
| H A D | ksh.kshrc | 35 USER=$(id -un) 44 PROMPT="$USER:!$PS1S" 45 #PROMPT="<$USER@$HOST:!>$PS1S" 46 PPROMPT='$USER:$PWD:!'"$PS1S" 47 #PPROMPT='<$USER@$HOST:$PWD:!>'"$PS1S" 85 alias stripe='label "$USER@$HOST ($tty) - $PWD"' 86 alias istripe='ilabel "$USER@$HOST ($tty)"'
|
| /openbsd-src/regress/usr.bin/rcs/ |
| H A D | keywords.out | 1 Author: USER 3 Header: file,v 1.1 YYYY/MM/DD HH:MI:SS USER Exp 4 Id: file,v 1.1 YYYY/MM/DD HH:MI:SS USER Exp
|
| /openbsd-src/games/fish/ |
| H A D | fish.c | 53 #define USER 1 macro 115 printplayer(USER); in main() 121 if (gofish(move, USER, userhand)) in main() 124 goodmove(USER, move, userhand, comphand); in main() 255 if (player == USER || hand[card] == CARDS) { in drawcard() 340 case USER: in printplayer()
|
| /openbsd-src/usr.sbin/ldapd/schema/ |
| H A D | core.schema | 16 NO-USER-MODIFICATION 24 NO-USER-MODIFICATION 31 NO-USER-MODIFICATION 39 NO-USER-MODIFICATION 46 NO-USER-MODIFICATION 53 NO-USER-MODIFICATION 60 NO-USER-MODIFICATION 641 NO-USER-MODIFICATION 648 NO-USER-MODIFICATION 676 NO-USER-MODIFICATION
|