/external/ltp/testcases/commands/su/ |
su_set_passwd | 3 # Set Password for a specific new user 7 # ./su_set_passwd USER ENCRYPTED_PASSWD 10 USER=$1 13 usermod -p $ENCRYPTED_PASSWD $USER
|
/sdk/eclipse/scripts/ |
build_update_site.sh | 11 # - calls buildserver with /home/$USER/www/no_crawl and -z 30 [ -z "$DEST_DIR" ] && [ -n "$USER" ] && DEST_DIR="/home/$USER"
|
/external/eigen/scripts/ |
eigen_gen_docs | 4 # You should call this script with USER set as you want, else some default 6 USER=${USER:-'orzel'} 18 rsync -az --no-p --delete build/doc/html/ $USER@ssh.tuxfamily.org:eigen/eigen.tuxfamily.org-web/htdocs/$UPLOAD_DIR/ || { echo "upload failed"; exit 1; } 21 ssh $USER@ssh.tuxfamily.org "chmod -R g+w /home/eigen/eigen.tuxfamily.org-web/htdocs/$UPLOAD_DIR" || { echo "perm failed"; exit 1; }
|
/external/openssh/regress/ |
forcecommand.sh | 8 cp /dev/null $OBJ/authorized_keys_$USER 10 printf 'command="true" ' >>$OBJ/authorized_keys_$USER 11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 20 cp /dev/null $OBJ/authorized_keys_$USER 22 printf 'command="false" ' >> $OBJ/authorized_keys_$USER 23 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 37 echo "Match User $USER" >> $OBJ/sshd_proxy
|
brokenkeys.sh | 6 KEYS="$OBJ/authorized_keys_${USER}" 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
multipubkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 || 45 rm -f $OBJ/authorized_principals_$USER 46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 50 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 55 rm -f $OBJ/authorized_principals_$USER [all...] |
cert-userkey.sh | 4 tid="certified user keys" 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 29 # Generate and sign user keys 31 verbose "$tid: sign user ${ktype} cert" 41 -I "regress user key for $USER" \ 42 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 53 rm -f $OBJ/authorized_keys_$USER 69 rm -f $OBJ/authorized_principals_$USER 78 echo > $OBJ/authorized_principals_$USER [all...] |
principals-command.sh | 17 # Create a CA key and a user certificate. 22 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "Joanne User" \ 23 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \ 39 test "x\$4" != "xJoanne User" && exit 1 64 rm -f $OBJ/authorized_keys_$USER 80 echo > $OBJ/authorized_principals_$USER 89 echo gregorsamsa > $OBJ/authorized_principals_$USER 98 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 107 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER 117 $OBJ/authorized_principals_$USER [all...] |
limit-keytype.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 25 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 26 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 || 37 echo mekmitasdigoat > $OBJ/authorized_principals_$USER 38 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER 39 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER 82 # Allow RSA in main config, Ed25519 for non-existent user. 85 "Match user x$USER" "PubkeyAcceptedKeyTypes +ssh-ed25519 [all...] |
cert-file.sh | 29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 30 -z $$ -n ${USER} $OBJ/user_key1 || 33 ${SSHKEYGEN} -q -s $OBJ/user_ca_key2 -I "regress user key for $USER" \ 34 -z $$ -n ${USER} $OBJ/user_key1 || 37 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ 38 -z $$ -n ${USER} $OBJ/user_key3 || 41 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" [all...] |
ssh-com.sh | 63 mkdir -p ${OBJ}/${USER} 64 cp /dev/null ${OBJ}/${USER}/authorization 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 67 echo Key $t.com >> ${OBJ}/${USER}/authorization 115 rm -rf ${OBJ}/${USER}
|
/external/autotest/site_utils/admin/ |
suite_scheduler.conf | 15 USER="chromeos-test" 22 exec sudo -u ${USER} ${SCHEDULER_DIR}/${SCHEDULER_COMMAND} ${SCHEDULER_ARGS}
|
/external/curl/docs/cmdline-opts/ |
ftp-alternative-to-user.d | 1 Long: ftp-alternative-to-user 3 Help: String to replace USER [name] 7 If authenticating with the USER and PASS commands fails, send this command.
|
/external/toybox/tests/ |
groupadd.test | 10 echo "# usage: addgroup [-g GID] [USER] GROUP 11 # Add a group or add a user to a group." 44 testing "group_name (add/del user)" "groupadd toyTestGroup && 45 grep '^toyTestGroup:' /etc/group $arg && groupadd $USER toyTestGroup && 46 grep '^toyTestGroup:.*:.*:.*$USER.*' /etc/group $arg && 47 groupdel $USER toyTestGroup $arg || groupdel toyTestGroup &&
|
/external/python/cpython2/Mac/BuildScript/scripts/ |
postflight.patch-profile | 14 theShell="`finger $USER | grep Shell: | head -1 | awk '{ print $NF }'`" 25 P=`su - ${USER} -c 'echo A-X-4-X@@$PATH@@X-4-X-A' | grep 'A-X-4-X@@.*@@X-4-X-A' | sed -e 's/^A-X-4-X@@//g' -e 's/@@X-4-X-A$//g'` 64 chown "${USER}" "${RC}" 97 chown "${USER}" "${PR}"
|
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/filesystem/ |
DirectoryEntryTest.groovy | 31 entry.owner = USER
39 assert clone.owner == USER
|
/external/toolchain-utils/cwp/ |
demo_pipeline.sh | 4 DATA_DIR=/usr/local/google/home/${USER}/ 21 PROFILE_UTIL_BINARY=/home/mrdmnd/${USER}-profiledb/google3/blaze-bin/perftools/gwp/chromeos/profile_util 26 CNS_LOC=/cns/ag-d/home/${USER}/profiledb/ 39 echo " For demo purposes, UN=${USER}@google.com, PW=xjpbmshkzefutlrm" 53 echo " dremel> define table t /cns/ag-d/home/${USER}/profiledb/profiles.cio-*"
|
/system/sepolicy/prebuilts/api/26.0/private/ |
keys.conf | 7 # TARGET_BUILD_VARIANT. Typcially this is user, eng, and userdebug. Another 23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
|
/system/sepolicy/private/ |
keys.conf | 7 # TARGET_BUILD_VARIANT. Typcially this is user, eng, and userdebug. Another 23 USER : $DEFAULT_SYSTEM_DEV_CERTIFICATE/testkey.x509.pem
|
/tools/loganalysis/src/com/android/loganalysis/item/ |
TopItem.java | 28 public static final String USER = "USER"; 47 USER, NICE, SYSTEM, IDLE, IOW, IRQ, SIRQ, TOTAL, TEXT)); 61 * Get the number of user ticks. 64 return (Integer) getAttribute(USER); 68 * Set the number of user ticks. 70 public void setUser(int user) { 71 setAttribute(USER, user);
|
/external/mockftpserver/MockFtpServer/src/test/java/org/mockftpserver/stub/command/ |
UserCommandHandlerTest.java | 60 testHandleCommand_InvalidParameters(commandHandler, CommandNames.USER, EMPTY);
80 command1 = new Command(CommandNames.USER, array(USERNAME1));
81 command2 = new Command(CommandNames.USER, array(USERNAME2));
|
/external/mockftpserver/branches/1.x_Branch/src/test/java/org/mockftpserver/stub/command/ |
UserCommandHandlerTest.java | 62 testHandleCommand_InvalidParameters(commandHandler, CommandNames.USER, EMPTY);
82 command1 = new Command(CommandNames.USER, array(USERNAME1));
83 command2 = new Command(CommandNames.USER, array(USERNAME2));
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
UserInfo.java | 36 * User information part of a URL. 47 /** user field 49 protected String user; field in class:UserInfo 65 public final static int USER = 2; 86 if (!this.user.equalsIgnoreCase(other.user)) { 102 * Encode the user information as a string. 111 buffer.append(user).append(COLON).append(password); 113 buffer.append(user); 125 * Gets the user type (which can be set to TELEPHONE_SUBSCRIBER or USER [all...] |
/device/google/wahoo/sepolicy/vendor/ |
keys.conf | 7 USER : device/google/wahoo/sepolicy/vendor/certs/tango_userdev.x509.pem 21 USER : device/google/wahoo/sepolicy/vendor/certs/arcore_userdev.x509.pem
|
/frameworks/base/services/core/java/com/android/server/lights/ |
Light.java | 28 * Light brightness is managed by a user setting. 30 public static final int BRIGHTNESS_MODE_USER = Brightness.USER;
|