Home
last modified time | relevance | path

Searched refs:USER (Results 1 – 25 of 732) sorted by relevance

12345678910>>...30

/external/openssh/regress/
Dcert-userkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key*
41 -I "regress user key for $USER" \
42 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
53 rm -f $OBJ/authorized_keys_$USER
69 rm -f $OBJ/authorized_principals_$USER
78 echo > $OBJ/authorized_principals_$USER
87 echo gregorsamsa > $OBJ/authorized_principals_$USER
96 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
105 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
115 $OBJ/authorized_principals_$USER
[all …]
Dmultipubkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 ||
45 rm -f $OBJ/authorized_principals_$USER
46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
50 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
55 rm -f $OBJ/authorized_principals_$USER
57 $OBJ/authorized_keys_$USER
[all …]
Dprincipals-command.sh23 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \
64 rm -f $OBJ/authorized_keys_$USER
80 echo > $OBJ/authorized_principals_$USER
89 echo gregorsamsa > $OBJ/authorized_principals_$USER
98 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
107 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
117 $OBJ/authorized_principals_$USER
127 $OBJ/authorized_principals_$USER
135 rm -f $OBJ/authorized_principals_$USER
146 ) > $OBJ/authorized_keys_$USER
[all …]
Dforcecommand.sh8 cp /dev/null $OBJ/authorized_keys_$USER
10 printf 'command="true" ' >>$OBJ/authorized_keys_$USER
11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
20 cp /dev/null $OBJ/authorized_keys_$USER
22 printf 'command="false" ' >> $OBJ/authorized_keys_$USER
23 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
37 echo "Match User $USER" >> $OBJ/sshd_proxy
Dlimit-keytype.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
25 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
26 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 ||
37 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
38 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
39 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER
85 "Match user x$USER" "PubkeyAcceptedKeyTypes +ssh-ed25519"
93 "Match user $USER" "PubkeyAcceptedKeyTypes +ssh-ed25519"
Dcert-file.sh29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
30 -z $$ -n ${USER} $OBJ/user_key1 ||
33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \
34 -z $$ -n ${USER} $OBJ/user_key1 ||
37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
38 -z $$ -n ${USER} $OBJ/user_key3 ||
41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
42 -z $$ -n ${USER} $OBJ/user_key4 ||
49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
Dssh-com.sh63 mkdir -p ${OBJ}/${USER}
64 cp /dev/null ${OBJ}/${USER}/authorization
66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com
67 echo Key $t.com >> ${OBJ}/${USER}/authorization
115 rm -rf ${OBJ}/${USER}
Dforward-control.sh144 < ${OBJ}/authorized_keys_${USER}.bak \
145 > ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail"
153 < ${OBJ}/authorized_keys_${USER}.bak \
154 > ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail"
Dtest-exec.sh31 USER=`/usr/ucb/whoami`
33 USER=`whoami`
35 USER=`logname`
37 USER=`id -un`
444 User $USER
461 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER
484 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
494 chmod 644 $OBJ/authorized_keys_$USER
524 >> $OBJ/authorized_keys_$USER
/external/autotest/client/site_tests/platform_CryptohomeLECredentialManager/
Dplatform_CryptohomeLECredentialManager.py20 USER = 'testing@gmail.com' variable in platform_CryptohomeLECredentialManager
49 cryptohome.remove_vault(self.USER)
63 cryptohome.mount_vault(user=self.USER, password=self.TEST_PASSWORD,
66 user=self.USER, password=self.TEST_PASSWORD,
72 cryptohome.mount_vault(user=self.USER, password=self.GOOD_PIN,
81 cryptohome.mount_vault(user=self.USER, password=self.BAD_PIN,
88 cryptohome.mount_vault(user=self.USER, password=self.GOOD_PIN,
97 cryptohome.mount_vault(user=self.USER, password=self.TEST_PASSWORD,
100 cryptohome.mount_vault(user=self.USER, password=self.GOOD_PIN,
134 cryptohome.remove_key(user=self.USER, password=self.TEST_PASSWORD,
[all …]
/external/curl/tests/data/
Dtest28029 REPLY USER 530 We don't like USER commands
30 COUNT USER 1
41 FTP --ftp-alternative-to-user on USER failure
44 ftp://%HOSTIP:%FTPPORT/280/ --ftp-alternative-to-user "USER replacement"
52 USER anonymous
53 USER replacement
Dtest11311 REPLY USER 314 bluah you fewl!
21 FTP download, failed login: USER not valid
34 USER anonymous
/external/selinux/secilc/test/
Dminimum.cil5 (user USER)
15 (userrole USER ROLE)
16 (userlevel USER (SENS))
17 (userrange USER ((SENS)(SENS (CAT))))
18 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
Doptional_test.cil6 (user USER)
16 (userrole USER ROLE)
17 (userlevel USER (SENS))
18 (userrange USER ((SENS)(SENS (CAT))))
19 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
Dneverallow.cil5 (user USER)
15 (userrole USER ROLE)
16 (userlevel USER (SENS))
17 (userrange USER ((SENS)(SENS (CAT))))
18 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
Dblock_test.cil6 (user USER)
16 (userrole USER ROLE)
17 (userlevel USER (SENS))
18 (userrange USER ((SENS)(SENS (CAT))))
19 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
/external/u-boot/arch/arm/dts/
Dhi3798cv200-poplar.dts35 label = "USER-LED0";
42 label = "USER-LED1";
49 label = "USER-LED2";
56 label = "USER-LED3";
111 gpio-line-names = "", "USER-LED-1",
112 "USER-LED-2", "",
120 "", "USER-LED-0",
130 "USER-LED-3", "";
/external/toolchain-utils/cwp/
Ddemo_pipeline.sh4 DATA_DIR=/usr/local/google/home/${USER}/
21 PROFILE_UTIL_BINARY=/home/mrdmnd/${USER}-profiledb/google3/blaze-bin/perftools/gwp/chromeos/profile…
26 CNS_LOC=/cns/ag-d/home/${USER}/profiledb/
39 echo " For demo purposes, UN=${USER}@google.com, PW=xjpbmshkzefutlrm"
53 echo " dremel> define table t /cns/ag-d/home/${USER}/profiledb/profiles.cio-*"
/external/eigen/scripts/
Deigen_gen_docs6 USER=${USER:-'orzel'}
18 rsync -az --no-p --delete build/doc/html/ $USER@ssh.tuxfamily.org:eigen/eigen.tuxfamily.org-web/htd…
21 ssh $USER@ssh.tuxfamily.org "chmod -R g+w /home/eigen/eigen.tuxfamily.org-web/htdocs/$UPLOAD_DIR" |…
/external/python/cpython2/Mac/BuildScript/scripts/
Dpostflight.patch-profile14 theShell="`finger $USER | grep Shell: | head -1 | awk '{ print $NF }'`"
25 …P=`su - ${USER} -c 'echo A-X-4-X@@$PATH@@X-4-X-A' | grep 'A-X-4-X@@.*@@X-4-X-A' | sed -e 's/^A-X-4…
64 chown "${USER}" "${RC}"
97 chown "${USER}" "${PR}"
/external/python/cpython3/Mac/BuildScript/scripts/
Dpostflight.patch-profile14 theShell="`finger $USER | grep Shell: | head -1 | awk '{ print $NF }'`"
25 …P=`su - ${USER} -c 'echo A-X-4-X@@$PATH@@X-4-X-A' | grep 'A-X-4-X@@.*@@X-4-X-A' | sed -e 's/^A-X-4…
64 chown "${USER}" "${RC}"
97 chown "${USER}" "${PR}"
/external/honggfuzz/examples/apache-httpd/
DREADME.md12 Note: The examples provided below use hardcoded paths (here to _/home/$USER/_) and
30 5. Copy custom configuration files (```httpd.conf.h1``` and ```httpd.conf.h2```) to ```/home/$USER/…
33 $ cp httpd.conf.h1 httpd.conf.h2 /home/$USER/fuzz/apache/apache2/conf/
43 …_http1 -w ./httpd.wordlist -- ./apache2/bin/httpd -DFOREGROUND -f /home/$USER/fuzz/apache/apache2…
49 …s_http2 -w ./httpd.wordlist -- ./apache2/bin/httpd -DFOREGROUND -f /home/$USER/fuzz/apache/apache2…
/external/toybox/tests/
Dgroupadd.test52 grep '^toyTestGroup:' /etc/group $arg && groupadd $USER toyTestGroup &&
53 grep '^toyTestGroup:.*:.*:.*$USER.*' /etc/group $arg &&
54 groupdel $USER toyTestGroup $arg || groupdel toyTestGroup &&
/external/ltp/testscripts/
Dtpm_tools.sh52 USER="`whoami`"
109 echo "User '$USER' is not a member of the 'pkcs11' group"
146 if [ -d $P11DIR/var/lib/opencryptoki/tpm/$USER ]
148 rm -rf $P11DIR/var/lib/opencryptoki/tpm/$USER
/external/autotest/client/site_tests/platform_ImageLoader/
Dplatform_ImageLoader.py32 USER = 'chronos' variable in platform_ImageLoader
46 user=self.USER,
57 user=self.USER,
68 user=self.USER,
79 user=self.USER,
90 user=self.USER,
101 user=self.USER,

12345678910>>...30