| /openbsd-src/usr.bin/snmp/ |
| H A D | snmp.c | 87 struct snmp_agent *agent; in snmp_connect_v12() local 93 if ((agent = malloc(sizeof(*agent))) == NULL) in snmp_connect_v12() 95 agent->fd = fd; in snmp_connect_v12() 96 agent->version = version; in snmp_connect_v12() 97 if ((agent->community = strdup(community)) == NULL) in snmp_connect_v12() 99 agent->timeout = 1; in snmp_connect_v12() 100 agent->retries = 5; in snmp_connect_v12() 101 agent->v3 = NULL; in snmp_connect_v12() 102 return agent; in snmp_connect_v12() 105 free(agent); in snmp_connect_v12() [all …]
|
| H A D | usm.c | 67 static struct ber_element *usm_encpdu(struct snmp_agent *agent, 120 usm_doinit(struct snmp_agent *agent) in usm_doinit() argument 123 struct usm_sec *usm = agent->v3->sec->data; in usm_doinit() 130 level = agent->v3->level; in usm_doinit() 131 agent->v3->level = SNMP_MSGFLAG_REPORT; in usm_doinit() 135 if ((ber = snmp_get(agent, NULL, 0)) == NULL) { in usm_doinit() 136 agent->v3->level = level; in usm_doinit() 142 agent->v3->level = level; in usm_doinit() 151 if ((ber = snmp_get(agent, NULL, 0)) == NULL) in usm_doinit() 159 usm_genparams(struct snmp_agent *agent, size_t *len, void **cookie) in usm_genparams() argument [all …]
|
| H A D | snmpc.c | 528 struct snmp_agent *agent; in snmpc_get() local 538 if ((agent = snmpc_connect(argv[0], "161")) == NULL) in snmpc_get() 540 agent->timeout = timeout; in snmpc_get() 541 agent->retries = retries; in snmpc_get() 556 if ((pdu = snmp_getnext(agent, oid, argc)) == NULL) in snmpc_get() 563 if ((pdu = snmp_getbulk(agent, oid, argc, non_repeaters, in snmpc_get() 567 if ((pdu = snmp_get(agent, oid, argc)) == NULL) in snmpc_get() 587 snmp_free_agent(agent); in snmpc_get() 597 struct snmp_agent *agent; in snmpc_walk() local 611 if ((agent = snmpc_connect(argv[0], "161"))== NULL) in snmpc_walk() [all …]
|
| /openbsd-src/gnu/usr.bin/perl/cpan/HTTP-Tiny/t/ |
| H A D | 003_agent.t | 18 is $ua->agent, $default, 'default agent string is as expected'; 22 my $ua = HTTP::Tiny->new(agent => 'something else'); 23 is $ua->agent, 'something else', 'agent string is as expected'; 27 my $ua = HTTP::Tiny->new(agent => 'something else '); 29 $ua->agent, 41 $ua->agent(undef); 42 is $ua->agent, undef, 'agent string is empty'; 44 $ua->agent('something else'); 45 is $ua->agent, 'something else', 'agent string is as expected'; 47 $ua->agent('something else '); [all …]
|
| H A D | 160_cookies.t | 53 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 58 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
| H A D | 162_proxy_auth.t | 32 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 38 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
| H A D | 161_basic_auth.t | 32 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 38 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
| H A D | 130_redirect.t | 33 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 39 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
| H A D | 100_get.t | 35 my $agent = $new_args{agent} || "HTTP-Tiny/$version"; 38 $expect_req =~ s{HTTP-Tiny/VERSION}{$agent};
|
| /openbsd-src/regress/usr.bin/ssh/ |
| H A D | agent.sh | 1 # $OpenBSD: agent.sh,v 1.22 2024/10/24 03:28:34 djm Exp $ 4 tid="simple agent test" 11 trace "start agent, args ${EXTRA_AGENT_ARGS} -s" 12 eval `${SSHAGENT} ${EXTRA_AGENT_ARGS} -s` >`ssh_logfile ssh-agent` 15 fatal "could not start ssh-agent: exit code $r" 21 fatal "could not start second ssh-agent: exit code $r" 37 # generate user key for agent 38 rm -f $OBJ/$t-agent $OBJ/$t-agent.pub* 39 ${SSHKEYGEN} -q -N '' -t $t -f $OBJ/$t-agent ||\ [all...] |
| H A D | hostkey-agent.sh | 1 # $OpenBSD: hostkey-agent.sh,v 1.15 2024/12/04 10:51:13 dtucker Exp $ 4 tid="hostkey agent" 6 rm -f $OBJ/agent-key.* $OBJ/ssh_proxy.orig $OBJ/known_hosts.orig $OBJ/agent-ca* 8 trace "start agent" 11 [ $r -ne 0 ] && fatal "could not start ssh-agent: exit code $r" 18 ${SSHKEYGEN} -qt ed25519 -f $OBJ/agent-ca -N '' || fatal "ssh-keygen CA" 22 ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k" 23 ${SSHKEYGEN} -s $OBJ/agent-ca -qh -n localhost-with-alias \ 24 -I localhost-with-alias $OBJ/agent [all...] |
| H A D | Makefile | 38 agent \ 39 agent-getpeereid \ 40 agent-timeout \ 41 agent-ptrace \ 42 agent-subprocess \ 88 hostkey-agent \ 99 agent-restrict \ 104 agent-pkcs11-restrict \ 105 agent-pkcs11-cert \ 113 EXTRA_TESTS= agent-pkcs11 [all …]
|
| H A D | agent-getpeereid.sh | 7 ASOCK=${OBJ}/agent 9 >$OBJ/ssh-agent.log 28 eval `${SSHAGENT} ${EXTRA_AGENT_ARGS} -s -a ${ASOCK}` >$OBJ/ssh-agent.log 2>&1 54 ${SSHAGENT} -k >>$OBJ/ssh-agent.log 2>&1 57 rm -f ${OBJ}/agent
|
| H A D | agent-pkcs11-restrict.sh | 8 rm -f $SSH_AUTH_SOCK $OBJ/agent.log $OBJ/host_[abcx]* $OBJ/user_[abcx]* 33 ${SSHAGENT} ${EXTRA_AGENT_ARGS} -d -a $SSH_AUTH_SOCK > $OBJ/agent.log 2>&1 & 117 (printf "%s" "restrict,agent-forwarding,command=\"$OBJ/command\" ";
|
| /openbsd-src/usr.bin/ssh/ |
| H A D | PROTOCOL.agent | 1 The SSH agent protocol is described in 2 https://datatracker.ietf.org/doc/draft-ietf-sshm-ssh-agent/ 4 This file documents OpenSSH's extensions to the agent protocol. 8 This extension allows a ssh client to bind an agent connection to a 11 exchange. This binding is verifiable at the agent by including the 31 When an agent received this message, it will verify the signature and 42 smartcard keys are added to an agent. 65 When receiving this message, the agent will ensure that the 68 and signify the initial hop from the host running ssh-agent). The agent [all...] |
| H A D | OVERVIEW | 15 the auxiliary programs ssh-keygen, ssh-agent, ssh-add, and 77 agent forwarding. 80 Authentication agent 82 - Code to communicate with the authentication agent is in authfd.c. 96 authentication agent using authfd.c.
|
| /openbsd-src/gnu/llvm/libcxx/utils/ci/ |
| H A D | macos-ci-setup | 35 cat <<EOF > ~/Library/LaunchAgents/libcxx.buildkite-agent.plist 41 <string>libcxx.buildkite-agent</string> 45 <string>${HOMEBREW_PREFIX}/bin/buildkite-agent</string> 48 <string>${HOME}/libcxx.buildkite-agent/builds</string> 73 <string>${HOME}/libcxx.buildkite-agent/stdout.log</string> 76 <string>${HOME}/libcxx.buildkite-agent/stderr.log</string> 82 launchctl load ~/Library/LaunchAgents/libcxx.buildkite-agent.plist 99 for package in sphinx-doc python3 ninja cmake clang-format buildkite/buildkite/buildkite-agent; do
|
| H A D | Dockerfile | 18 # to run a BuildKite agent. 112 # Install the Buildkite agent and dependencies. This must be done as non-root 113 # for the Buildkite agent to be installed in a path where we can find it. 114 RUN bash -c "$(curl -sL https://raw.githubusercontent.com/buildkite/agent/main/install.sh)" 115 ENV PATH="${PATH}:/home/libcxx-builder/.buildkite-agent/bin" 116 …uilders,arch=$(uname -m),os=linux\"" >> "/home/libcxx-builder/.buildkite-agent/buildkite-agent.cfg" 118 # By default, start the Buildkite agent (this requires a token). 119 CMD buildkite-agent start
|
| /openbsd-src/usr.sbin/lpd/ |
| H A D | lp_rmjob.c | 34 lp_rmjob(int ofd, struct lp_printer *lp, const char *agent, in lp_rmjob() argument 59 if (currjob[0] && docheck(lp, agent, jf, currjob, 1, 0) == 1) { in lp_rmjob() 69 switch (docheck(lp, agent, jf, q.cfname[i], active, 0)) { in lp_rmjob() 97 docheck(struct lp_printer *lp, const char *agent, struct lp_jobfilter *jf, in docheck() argument 107 if (!strcmp(agent, "-all") && !strcmp(LP_JOBHOST(cfname), jf->hostfrom)) in docheck() 114 if (!strcmp(agent, "root")) in docheck() 128 if (!strcmp(person, agent) && in docheck()
|
| /openbsd-src/usr.bin/ssh/ssh-agent/ |
| H A D | Makefile | 5 SRCS= ssh-agent.c ${SRCS_PKCS11_CLIENT} 10 PROG= ssh-agent 24 CLEANFILES+= ssh-agent.tar install.sh
|
| /openbsd-src/share/snmp/ |
| H A D | SNMPv2-TC.txt | 194 row exists in the agent, but is unavailable for use by 201 exists in the agent, but is missing information 228 the agent has sufficient information to attempt to make it 231 to make it so would fail because the agent has insufficient 302 agent. 313 (4) at the discretion of the agent, the return value may be 316 inconsistentName: because the agent does not choose to 324 noError: because the agent chooses to create the 329 depending on the information available to the agent. If 339 wrongValue: because the agent does not support [all …]
|
| /openbsd-src/regress/usr.bin/ssh/unittests/authopt/testdata/ |
| H A D | mktestdata.sh | 21 sign all_permit.cert -Opermit-agent-forwarding -Opermit-port-forwarding \ 25 sign no_agentfwd.cert -Ono-agent-forwarding 31 sign only_agentfwd.cert -Oclear -Opermit-agent-forwarding
|
| /openbsd-src/gnu/usr.bin/perl/cpan/HTTP-Tiny/lib/HTTP/ |
| H A D | Tiny.pm | 18 #pod * C<agent> — A user-agent string (defaults to 'HTTP-Tiny/$VERSION'). If 19 #pod C<agent> — ends in a space character, the default user-agent string is 96 sub agent { subroutine 97 my($self, $agent) = @_; 99 $self->{agent} = 100 (defined $agent && $agent =~ / $/) ? $agent [all...] |
| /openbsd-src/gnu/llvm/libcxx/docs/ |
| H A D | AddingNewCIJobs.rst | 17 `Buildkite guide <https://buildkite.com/docs/agent/v3>`_ to setup your 20 agent to register itself to Buildkite, it will need a BuildKite Agent token. 40 use agent tags to allow targetting your agents from the Buildkite pipeline 55 Testing your new job is easy -- once your agent is set up (if any), just open
|
| /openbsd-src/usr.sbin/smtpd/ |
| H A D | envelope.c | 368 return ascii_load_time(&ep->agent.bounce.delay, buf); in ascii_load_field() 371 return ascii_load_time(&ep->agent.bounce.ttl, buf); in ascii_load_field() 374 return ascii_load_bounce_type(&ep->agent.bounce.type, buf); in ascii_load_field() 612 if (ep->agent.bounce.type != B_DELAYED) in ascii_dump_field() 614 return ascii_dump_time(ep->agent.bounce.delay, buf, len); in ascii_dump_field() 618 if (ep->agent.bounce.type != B_DELAYED) in ascii_dump_field() 620 return ascii_dump_time(ep->agent.bounce.ttl, buf, len); in ascii_dump_field() 624 return ascii_dump_bounce_type(ep->agent.bounce.type, buf, len); in ascii_dump_field()
|