/external/openssh/regress/ |
H A D | banner.sh | 1 # $OpenBSD: banner.sh,v 1.2 2003/10/11 11:49:49 dtucker Exp $ 4 tid="banner" 5 echo "Banner $OBJ/banner.in" >> $OBJ/sshd_proxy 7 rm -f $OBJ/banner.out $OBJ/banner.in $OBJ/empty.in 10 trace "test missing banner file" 11 verbose "test $tid: missing banner file" 12 ( ${SSH} -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \ 13 cmp $OBJ/empty.in $OBJ/banner.out ) || \ 14 fail "missing banner fil [all...] |
H A D | proto-mismatch.sh | 10 banner=`echo ${client} | ${SSHD} -o "Protocol=${server}" -i -f ${OBJ}/sshd_proxy` 12 trace "sshd prints ${banner}" 14 fail "sshd prints ${banner} and accepts connect with version ${client}"
|
H A D | proto-version.sh | 6 # we just start sshd in inetd mode and check the banner 11 banner=`echon | ${SSHD} -o "Protocol=${version}" -i -f ${OBJ}/sshd_proxy` 12 case ${banner} in 27 fail "wrong protocol version ${banner} for ${version}"
|
H A D | Makefile | 23 banner \ 74 ls.copy banner.in banner.out empty.in \
|
/external/chromium/chrome/browser/policy/ |
H A D | managed_prefs_banner_base_unittest.cc | 13 // Tests whether managed preferences banner base functionality correctly 14 // determines banner visiblity. 31 ManagedPrefsBannerBase banner(local_state_.get(), 34 banner.AddLocalStatePref(prefs::kMetricsReportingEnabled); 35 EXPECT_FALSE(banner.DetermineVisibility()); 38 EXPECT_FALSE(banner.DetermineVisibility()); 41 EXPECT_FALSE(banner.DetermineVisibility()); 44 EXPECT_TRUE(banner.DetermineVisibility()); 47 EXPECT_TRUE(banner.DetermineVisibility()); 49 EXPECT_TRUE(banner [all...] |
/external/llvm/lib/CodeGen/ |
H A D | MachineFunctionPrinterPass.cpp | 34 MachineFunctionPrinterPass(raw_ostream &os, const std::string &banner) argument 35 : MachineFunctionPass(ID), OS(os), Banner(banner) {} 60 /// default banner is empty.
|
/external/dropbear/ |
H A D | cli-auth.c | 62 unsigned char* banner = NULL; local 68 TRACE(("leave recv_msg_userauth_banner: banner after auth done")) 72 banner = buf_getstring(ses.payload, &bannerlen); 80 cleantext(banner); 85 if (banner[i] == '\n') { 87 banner[i] = '\0'; 94 printf("%s\n", banner); 97 m_free(banner);
|
H A D | svr-auth.c | 66 /* Send a banner message if specified to the client. The client might 71 if (svr_opts.banner == NULL) { 72 TRACE(("leave send_msg_userauth_banner: banner is NULL")) 79 buf_putstring(ses.writepayload, buf_getptr(svr_opts.banner, 80 svr_opts.banner->len), svr_opts.banner->len); 84 buf_free(svr_opts.banner); 85 svr_opts.banner = NULL; 105 /* send the banner if it exists, it will only exist once */ 106 if (svr_opts.banner) { [all...] |
H A D | runopts.h | 86 buffer * banner; member in struct:svr_runopts
|
H A D | svr-runopts.c | 106 svr_opts.banner = NULL; 250 dropbear_exit("Error opening banner file '%s'", 259 svr_opts.banner = buf_new(buf.st_size); 260 if (buf_readfile(svr_opts.banner, svr_opts.bannerfile)!=DROPBEAR_SUCCESS) { 261 dropbear_exit("Error reading banner file '%s'", 264 buf_setpos(svr_opts.banner, 0);
|
/external/openssh/ |
H A D | auth2.c | 106 char *banner = NULL; local 110 if ((fd = open(options.banner, O_RDONLY)) == -1) 122 banner = xmalloc(len + 1); 123 n = atomicio(read, fd, banner, len); 127 xfree(banner); 130 banner[n] = '\0'; 132 return (banner); 151 char *banner = NULL; local 153 if (options.banner == NULL || 154 strcasecmp(options.banner, "non [all...] |
H A D | servconf.h | 142 char *banner; /* SSH-2 banner message */ member in struct:__anon10262 178 M_CP_STROPT(banner); \
|
H A D | monitor_wrap.c | 302 char *banner; local 312 banner = buffer_get_string(&m, NULL); 315 /* treat empty banner as missing banner */ 316 if (strlen(banner) == 0) { 317 xfree(banner); 318 banner = NULL; 320 return (banner);
|
H A D | monitor.c | 810 char *banner; local 813 banner = auth2_read_banner(); 814 buffer_put_cstring(m, banner != NULL ? banner : ""); 817 if (banner != NULL) 818 xfree(banner);
|
H A D | servconf.c | 129 options->banner = NULL; 434 { "banner", sBanner, SSHCFG_ALL }, 1236 charptr = &options->banner; 1767 dump_cfg_string(sBanner, o->banner);
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
H A D | racoon.conf | 31 banner "/etc/racoon/motd";
|
/external/webkit/Tools/Scripts/ |
H A D | clean-header-guards | 8 opts.banner = "Usage: clean-header-guards [options]"
|
/external/valgrind/main/auxprogs/ |
H A D | valgrind-listener.c | 213 static void banner ( char* str ) function 224 banner("exited"); 258 banner("started");
|
/external/webkit/Source/JavaScriptCore/ |
H A D | create_hash_table | 50 my $banner = 0; 234 if (!$banner) { 235 $banner = 1;
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/ |
H A D | AuthenticationManager.java | 48 private String banner; field in class:AuthenticationManager 120 banner = sb.getBanner(); 132 return banner;
|
/external/chromium/chrome/browser/resources/options/chromeos/ |
H A D | internet_options_page.css | 154 #locked-network-banner { 187 #internetPage:not([accesslocked]) #locked-network-banner,
|
/external/webkit/Tools/iExploder/iexploder-1.7.2/src/ |
H A D | webserver.rb | 153 opts.banner = "Usage: webserver.rb [options]"
|
H A D | browser_harness.rb | 354 opts.banner = "Usage: browser_harness.rb [options] -- <browser path> <browser options>"
|
/external/ipsec-tools/src/racoon/ |
H A D | racoonctl.c | 1421 * Print ISAKMP mode config info (IP and banner) 1430 char *banner = NULL; local 1470 banner = racoon_malloc(ntohs(attr->lorv) + 1); 1471 if (banner == NULL) { 1475 memcpy(banner, attr + 1, ntohs(attr->lorv)); 1476 banner[ntohs(attr->lorv)] = '\0'; 1495 if (banner) { 1505 printf("\n%s\n", banner); 1509 racoon_free(banner);
|
/external/icu4c/test/intltest/ |
H A D | dtfmttst.cpp | 2115 char banner[25]; local 2116 sprintf(banner, "%d", daysdelta); 2117 UnicodeString bannerStr(banner, "");
|