HomeSort by relevance Sort by last modified time
    Searched refs:USER (Results 1 - 25 of 519) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/ltp/testcases/commands/su/
su_set_passwd 3 # Set Password for a specific new user
7 # ./su_set_passwd USER ENCRYPTED_PASSWD
10 USER=$1
13 usermod -p $ENCRYPTED_PASSWD $USER
  /sdk/eclipse/scripts/
build_update_site.sh 11 # - calls buildserver with /home/$USER/www/no_crawl and -z
30 [ -z "$DEST_DIR" ] && [ -n "$USER" ] && DEST_DIR="/home/$USER"
  /external/eigen/scripts/
eigen_gen_docs 4 # You should call this script with USER set as you want, else some default
6 USER=${USER:-'orzel'}
18 rsync -az --no-p --delete build/doc/html/ $USER@ssh.tuxfamily.org:eigen/eigen.tuxfamily.org-web/htdocs/$UPLOAD_DIR/ || { echo "upload failed"; exit 1; }
21 ssh $USER@ssh.tuxfamily.org "chmod -R g+w /home/eigen/eigen.tuxfamily.org-web/htdocs/$UPLOAD_DIR" || { echo "perm failed"; exit 1; }
  /external/openssh/regress/
forcecommand.sh 8 cp /dev/null $OBJ/authorized_keys_$USER
10 printf 'command="true" ' >>$OBJ/authorized_keys_$USER
11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
20 cp /dev/null $OBJ/authorized_keys_$USER
22 printf 'command="false" ' >> $OBJ/authorized_keys_$USER
23 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
37 echo "Match User $USER" >> $OBJ/sshd_proxy
brokenkeys.sh 6 KEYS="$OBJ/authorized_keys_${USER}"
15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
multipubkey.sh 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 ||
45 rm -f $OBJ/authorized_principals_$USER
46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
50 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
55 rm -f $OBJ/authorized_principals_$USER
    [all...]
cert-userkey.sh 4 tid="certified user keys"
6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key*
29 # Generate and sign user keys
31 verbose "$tid: sign user ${ktype} cert"
41 -I "regress user key for $USER" \
42 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
53 rm -f $OBJ/authorized_keys_$USER
69 rm -f $OBJ/authorized_principals_$USER
78 echo > $OBJ/authorized_principals_$USER
    [all...]
principals-command.sh 17 # Create a CA key and a user certificate.
22 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "Joanne User" \
23 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \
39 test "x\$4" != "xJoanne User" && exit 1
64 rm -f $OBJ/authorized_keys_$USER
80 echo > $OBJ/authorized_principals_$USER
89 echo gregorsamsa > $OBJ/authorized_principals_$USER
98 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
107 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
117 $OBJ/authorized_principals_$USER
    [all...]
limit-keytype.sh 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
25 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
26 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 ||
37 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
38 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
39 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER
82 # Allow RSA in main config, Ed25519 for non-existent user.
85 "Match user x$USER" "PubkeyAcceptedKeyTypes +ssh-ed25519
    [all...]
cert-file.sh 29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
30 -z $$ -n ${USER} $OBJ/user_key1 ||
33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \
34 -z $$ -n ${USER} $OBJ/user_key1 ||
37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \
38 -z $$ -n ${USER} $OBJ/user_key3 ||
41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER"
    [all...]
ssh-com.sh 63 mkdir -p ${OBJ}/${USER}
64 cp /dev/null ${OBJ}/${USER}/authorization
66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com
67 echo Key $t.com >> ${OBJ}/${USER}/authorization
115 rm -rf ${OBJ}/${USER}
  /external/autotest/site_utils/admin/
suite_scheduler.conf 15 USER="chromeos-test"
22 exec sudo -u ${USER} ${SCHEDULER_DIR}/${SCHEDULER_COMMAND} ${SCHEDULER_ARGS}
  /external/curl/docs/cmdline-opts/
ftp-alternative-to-user.d 1 Long: ftp-alternative-to-user
3 Help: String to replace USER [name]
7 If authenticating with the USER and PASS commands fails, send this command.
  /external/toybox/tests/
groupadd.test 10 echo "# usage: addgroup [-g GID] [USER] GROUP
11 # Add a group or add a user to a group."
44 testing "group_name (add/del user)" "groupadd toyTestGroup &&
45 grep '^toyTestGroup:' /etc/group $arg && groupadd $USER toyTestGroup &&
46 grep '^toyTestGroup:.*:.*:.*$USER.*' /etc/group $arg &&
47 groupdel $USER toyTestGroup $arg || groupdel toyTestGroup &&
  /external/python/cpython2/Mac/BuildScript/scripts/
postflight.patch-profile 14 theShell="`finger $USER | grep Shell: | head -1 | awk '{ print $NF }'`"
25 P=`su - ${USER} -c 'echo A-X-4-X@@$PATH@@X-4-X-A' | grep 'A-X-4-X@@.*@@X-4-X-A' | sed -e 's/^A-X-4-X@@//g' -e 's/@@X-4-X-A$//g'`
64 chown "${USER}" "${RC}"
97 chown "${USER}" "${PR}"
  /external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/filesystem/
DirectoryEntryTest.groovy 31 entry.owner = USER
39 assert clone.owner == USER
  /external/toolchain-utils/cwp/
demo_pipeline.sh 4 DATA_DIR=/usr/local/google/home/${USER}/
21 PROFILE_UTIL_BINARY=/home/mrdmnd/${USER}-profiledb/google3/blaze-bin/perftools/gwp/chromeos/profile_util
26 CNS_LOC=/cns/ag-d/home/${USER}/profiledb/
39 echo " For demo purposes, UN=${USER}@google.com, PW=xjpbmshkzefutlrm"
53 echo " dremel> define table t /cns/ag-d/home/${USER}/profiledb/profiles.cio-*"
  /system/sepolicy/prebuilts/api/26.0/private/
keys.conf 7 # TARGET_BUILD_VARIANT. Typcially this is user, eng, and userdebug. Another
23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
  /system/sepolicy/private/
keys.conf 7 # TARGET_BUILD_VARIANT. Typcially this is user, eng, and userdebug. Another
23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
  /tools/loganalysis/src/com/android/loganalysis/item/
TopItem.java 28 public static final String USER = "USER";
47 USER, NICE, SYSTEM, IDLE, IOW, IRQ, SIRQ, TOTAL, TEXT));
61 * Get the number of user ticks.
64 return (Integer) getAttribute(USER);
68 * Set the number of user ticks.
70 public void setUser(int user) {
71 setAttribute(USER, user);
  /external/mockftpserver/MockFtpServer/src/test/java/org/mockftpserver/stub/command/
UserCommandHandlerTest.java 60 testHandleCommand_InvalidParameters(commandHandler, CommandNames.USER, EMPTY);
80 command1 = new Command(CommandNames.USER, array(USERNAME1));
81 command2 = new Command(CommandNames.USER, array(USERNAME2));
  /external/mockftpserver/branches/1.x_Branch/src/test/java/org/mockftpserver/stub/command/
UserCommandHandlerTest.java 62 testHandleCommand_InvalidParameters(commandHandler, CommandNames.USER, EMPTY);
82 command1 = new Command(CommandNames.USER, array(USERNAME1));
83 command2 = new Command(CommandNames.USER, array(USERNAME2));
  /external/nist-sip/java/gov/nist/javax/sip/address/
UserInfo.java 36 * User information part of a URL.
47 /** user field
49 protected String user; field in class:UserInfo
65 public final static int USER = 2;
86 if (!this.user.equalsIgnoreCase(other.user)) {
102 * Encode the user information as a string.
111 buffer.append(user).append(COLON).append(password);
113 buffer.append(user);
125 * Gets the user type (which can be set to TELEPHONE_SUBSCRIBER or USER
    [all...]
  /device/google/wahoo/sepolicy/vendor/
keys.conf 7 USER : device/google/wahoo/sepolicy/vendor/certs/tango_userdev.x509.pem
21 USER : device/google/wahoo/sepolicy/vendor/certs/arcore_userdev.x509.pem
  /frameworks/base/services/core/java/com/android/server/lights/
Light.java 28 * Light brightness is managed by a user setting.
30 public static final int BRIGHTNESS_MODE_USER = Brightness.USER;

Completed in 1013 milliseconds

1 2 3 4 5 6 7 8 91011>>