/external/eigen/scripts/ |
eigen_gen_docs | 4 # You should call this script with USER set as you want, else some default 6 USER=${USER:-'orzel'} 16 rsync -az --no-p --delete build/doc/html/ $USER@ssh.tuxfamily.org:eigen/eigen.tuxfamily.org-web/htdocs/dox-devel/ || { echo "upload failed"; exit 1; } 19 ssh $USER@ssh.tuxfamily.org 'chmod -R g+w /home/eigen/eigen.tuxfamily.org-web/htdocs/dox-devel' || { echo "perm failed"; exit 1; }
|
/external/openssh/regress/ |
forcecommand.sh | 8 echon 'command="true" ' >$OBJ/authorized_keys_$USER 9 cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER 10 echon 'command="true" ' >>$OBJ/authorized_keys_$USER 11 cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER 19 echon 'command="false" ' >$OBJ/authorized_keys_$USER 20 cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER 21 echon 'command="false" ' >>$OBJ/authorized_keys_$USER 22 cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER 35 echo "Match User $USER" >> $OBJ/sshd_prox [all...] |
cert-userkey.sh | 4 tid="certified user keys" 12 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 19 # Generate and sign user keys 21 verbose "$tid: sign user ${ktype} cert" 26 "regress user key for $USER" \ 27 -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype} || 34 "regress user key for $USER" \ 35 -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype}_v00 | [all...] |
brokenkeys.sh | 6 KEYS="$OBJ/authorized_keys_${USER}" 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
ssh-com.sh | 63 mkdir -p ${OBJ}/${USER} 64 cp /dev/null ${OBJ}/${USER}/authorization 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 67 echo Key $t.com >> ${OBJ}/${USER}/authorization 115 rm -rf ${OBJ}/${USER}
|
cfgmatch.sh | 46 echo "Match user $USER" >>$OBJ/sshd_proxy 78 echon 'permitopen="127.0.0.1:'$PORT'" ' >$OBJ/authorized_keys_$USER 79 cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER 80 echon 'permitopen="127.0.0.1:'$PORT'" ' >>$OBJ/authorized_keys_$USER 81 cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER 102 echo "Match User $USER" >>$OBJ/sshd_proxy 116 echo "Match User NoSuchUser" >>$OBJ/sshd_proxy
|
ssh-com-client.sh | 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 47 mkdir -p ${OBJ}/${USER}/hostkeys 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1 57 User ${USER} 130 rm -rf ${OBJ}/${USER}
|
test-exec.sh | 24 USER=`/usr/ucb/whoami` 26 USER=`whoami` 28 USER=`logname` 30 USER=`id -un` 279 User $USER 296 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER 300 # generate user key 312 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 322 chmod 644 $OBJ/authorized_keys_$USER [all...] |
agent.sh | 22 echon > $OBJ/authorized_keys_$USER 24 # generate user key for agent 29 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER
|
/sdk/eclipse/scripts/ |
build_update_site.sh | 11 # - calls buildserver with /home/$USER/www/no_crawl and -z 30 [ -z "$DEST_DIR" ] && [ -n "$USER" ] && DEST_DIR="/home/$USER"
|
/external/qemu/distrib/sdl-1.2.15/Xcode/SDL/pkg-support/devel-resources/ |
install.sh | 9 USER=`basename ~` 10 echo "User is \"$USER\"" 20 ## Using the home directory here is problematic for multi-user systems too. 23 #sudo -u $USER mkdir -p ~/Library/Frameworks 24 #sudo -u $USER /Developer/Tools/CpMac -r $ROOT/SDL.framework ~/Library/Frameworks 34 #sudo -u $USER /usr/bin/cc -precomp ~/Library/Frameworks/SDL.framework/Headers/SDL.h -o ~/Library/Frameworks/SDL.framework/Headers/SDL.p 73 sudo -u $USER cp "$ROOT/Readme SDL Developer.txt" ~/ 76 sudo -u $USER open ~/"Readme SDL Developer.txt"
|
/external/sepolicy/ |
keys.conf | 7 # TARGET_BUILD_VARIANT. Typcially this is user, eng, and userdebug. Another 23 USER : testkey.x509.pem
|
/build/tools/ |
buildinfo.sh | 15 echo "ro.build.user=$USER"
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
UserInfo.java | 36 * User information part of a URL. 47 /** user field 49 protected String user; field in class:UserInfo 65 public final static int USER = 2; 86 if (!this.user.equalsIgnoreCase(other.user)) { 102 * Encode the user information as a string. 111 buffer.append(user).append(COLON).append(password); 113 buffer.append(user); 125 * Gets the user type (which can be set to TELEPHONE_SUBSCRIBER or USER [all...] |
/build/core/ |
version_defaults.mk | 41 # which is the version that we reveal to the end user. 97 BUILD_NUMBER := eng.$(USER).$(shell date +%Y%m%d.%H%M%S)
|
/external/chromium/chrome/browser/policy/ |
cloud_policy_controller_unittest.cc | 174 "machine_model", "google/chromeos/user", 175 em::DeviceRegisterRequest::USER, "", ""); 187 "google/chromeos/user", em::DeviceRegisterRequest::USER, 194 // If the current user belongs to a known non-managed domain, no token fetch 198 "google/chromeos/user", em::DeviceRegisterRequest::USER, 209 "machine_model", "google/chromeos/user", 210 em::DeviceRegisterRequest::USER, 224 "machine_model", "google/chromeos/user", [all...] |
device_token_fetcher_unittest.cc | 81 em::DeviceRegisterRequest::USER, 93 em::DeviceRegisterRequest::USER, 114 em::DeviceRegisterRequest::USER, 132 em::DeviceRegisterRequest::USER,
|
/ndk/build/tools/ |
dev-platform-expand-all.sh | 30 DSTDIR=/tmp/ndk-$USER/platforms
|
gen-system-symbols.sh | 96 SYMBOL_EXCLUDES=/tmp/ndk-$USER/ndk-symbol-excludes.txt 100 SYMBOL_INCLUDES=/tmp/ndk-$USER/ndk-symbol-includes.txt 103 SYMBOL_TMPFILE=/tmp/ndk-$USER/ndk-symbols-list.txt
|
dev-platform-compress.sh | 48 SRCDIR=/tmp/ndk-$USER/platforms 51 DSTDIR=/tmp/ndk-$USER/platforms-compressed
|
/ndk/sources/android/support/tests/ |
run-host.sh | 10 EXECUTABLE=${EXECUTABLE:-/tmp/ndk-$USER/$EXENAME}
|
/ndk/sources/host-tools/ndk-depends/ |
GNUmakefile | 20 BUILD_DIR := /tmp/ndk-$(USER)/build/build-ndk-depends 21 PROGNAME := /tmp/ndk-$(USER)/ndk-depends
|
/external/chromium_org/remoting/host/installer/mac/Scripts/ |
remoting_postflight.sh | 33 local user=$1 34 ps -ec -u "$user" -o comm,pid | awk '$1 == "loginwindow" { print $2; exit }' 85 # Load the service for each user for whom the service was unloaded in the 86 # preflight script (this includes the root user, in case only the login screen 88 # Also, in case this is a fresh install, load the service for the user running 90 if [[ -n "$USER" && "$USER" != "root" ]]; then 91 id -u "$USER" >> "$USERS_TMP_FILE" 96 logger Starting service for user "$uid". 104 # Load the launchd agent in the bootstrap context of user $uid's graphica [all...] |
/packages/apps/Exchange/tests/src/com/android/exchange/ |
EasSyncServiceTests.java | 39 static private final String USER = "user"; 97 private EasSyncService setupService(String user) { 99 svc.mUserName = user; 107 // Simple user name and command 108 EasSyncService svc = setupService(USER); 113 assertEquals("Basic " + Base64.encodeToString((USER+":"+PASSWORD).getBytes(), 115 assertEquals("&User=" + USER + "&DeviceId=" + ID + "&DeviceType=" + 119 // User name that requires encodin 120 String user = "name_with_underscore@foo%bar.com"; local [all...] |
/external/chromium_org/remoting/host/installer/mac/PrivilegedHelperTools/ |
org.chromium.chromoting.me2me.sh | 142 # Ensure the config is readable by the user registering the host. 143 chmod +a "$USER:allow:read" "$CONFIG_FILE" 156 echo Host started for user $USER at $"$(date)"
|