/external/eigen/scripts/ |
H A D | eigen_gen_docs | 4 # You should call this script with USER set as you want, else some default 6 USER=${USER:-'orzel'} 16 rsync -az --no-p --delete build/doc/html/ $USER@ssh.tuxfamily.org:eigen/eigen.tuxfamily.org-web/htdocs/dox-devel/ || { echo "upload failed"; exit 1; } 19 ssh $USER@ssh.tuxfamily.org 'chmod -R g+w /home/eigen/eigen.tuxfamily.org-web/htdocs/dox-devel' || { echo "perm failed"; exit 1; }
|
/external/openssh/regress/ |
H A D | forcecommand.sh | 8 echon 'command="true" ' >$OBJ/authorized_keys_$USER 9 cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER 10 echon 'command="true" ' >>$OBJ/authorized_keys_$USER 11 cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER 19 echon 'command="false" ' >$OBJ/authorized_keys_$USER 20 cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER 21 echon 'command="false" ' >>$OBJ/authorized_keys_$USER 22 cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER 35 echo "Match User $USER" >> $OBJ/sshd_proxy
|
H A D | cert-userkey.sh | 12 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 26 "regress user key for $USER" \ 27 -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype} || 34 "regress user key for $USER" \ 35 -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype}_v00 || 45 rm -f $OBJ/authorized_keys_$USER 56 rm -f $OBJ/authorized_principals_$USER 65 echo > $OBJ/authorized_principals_$USER 74 echo gregorsamsa > $OBJ/authorized_principals_$USER 83 echo mekmitasdigoat > $OBJ/authorized_principals_$USER [all...] |
H A D | brokenkeys.sh | 6 KEYS="$OBJ/authorized_keys_${USER}" 15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
H A D | ssh-com.sh | 63 mkdir -p ${OBJ}/${USER} 64 cp /dev/null ${OBJ}/${USER}/authorization 66 ${SSHKEYGEN} -e -f ${OBJ}/$t.pub > ${OBJ}/${USER}/$t.com 67 echo Key $t.com >> ${OBJ}/${USER}/authorization 115 rm -rf ${OBJ}/${USER}
|
H A D | cfgmatch.sh | 46 echo "Match user $USER" >>$OBJ/sshd_proxy 78 echon 'permitopen="127.0.0.1:'$PORT'" ' >$OBJ/authorized_keys_$USER 79 cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER 80 echon 'permitopen="127.0.0.1:'$PORT'" ' >>$OBJ/authorized_keys_$USER 81 cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER 102 echo "Match User $USER" >>$OBJ/sshd_proxy
|
H A D | ssh-com-client.sh | 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 47 mkdir -p ${OBJ}/${USER}/hostkeys 48 HK=${OBJ}/${USER}/hostkeys/key_${PORT}_127.0.0.1 57 User ${USER} 130 rm -rf ${OBJ}/${USER}
|
H A D | test-exec.sh | 24 USER=`/usr/ucb/whoami` 26 USER=`whoami` 28 USER=`logname` 30 USER=`id -un` 279 User $USER 296 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER 312 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 322 chmod 644 $OBJ/authorized_keys_$USER 348 >> $OBJ/authorized_keys_$USER
|
H A D | agent.sh | 22 echon > $OBJ/authorized_keys_$USER 29 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER
|
H A D | conch-ciphers.sh | 22 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
H A D | cert-hostkey.sh | 34 -I "regress host key for $USER" \ 42 -I "regress host key for $USER" \ 153 -I "regress host key for $USER" \ 199 -I "regress host key for $USER" \ 237 -I "regress host key for $USER" \
|
H A D | key-options.sh | 7 authkeys="$OBJ/authorized_keys_${USER}"
|
H A D | keytype.sh | 46 cat $OBJ/key.$ut.pub > $OBJ/authorized_keys_$USER
|
H A D | agent-pkcs11.sh | 37 ${SSHKEYGEN} -y -f $OBJ/pkcs11.key > $OBJ/authorized_keys_$USER
|
H A D | Makefile | 67 USER!= id -un 70 authorized_keys_${USER} known_hosts pidfile \ 80 authorized_principals_${USER} expect actual
|
/external/qemu/distrib/sdl-1.2.15/Xcode/SDL/pkg-support/devel-resources/ |
H A D | install.sh | 9 USER=`basename ~` 10 echo "User is \"$USER\"" 23 #sudo -u $USER mkdir -p ~/Library/Frameworks 24 #sudo -u $USER /Developer/Tools/CpMac -r $ROOT/SDL.framework ~/Library/Frameworks 34 #sudo -u $USER /usr/bin/cc -precomp ~/Library/Frameworks/SDL.framework/Headers/SDL.h -o ~/Library/Frameworks/SDL.framework/Headers/SDL.p 73 sudo -u $USER cp "$ROOT/Readme SDL Developer.txt" ~/ 76 sudo -u $USER open ~/"Readme SDL Developer.txt"
|
/external/sepolicy/ |
H A D | keys.conf | 23 USER : testkey.x509.pem
|
/external/webkit/Tools/BuildSlaveSupport/gtk/crashmon/ |
H A D | run | 27 : ${buildbot_user:=${USER:-${LOGNAME}}} 66 USER="${buildbot_user}" \
|
/external/webkit/Tools/BuildSlaveSupport/gtk/buildbot/ |
H A D | run | 61 : ${buildbot_user:=${USER}} 70 USER="${buildbot_user}" \
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
H A D | UserInfo.java | 65 public final static int USER = 2; field in class:UserInfo 125 * Gets the user type (which can be set to TELEPHONE_SUBSCRIBER or USER) 160 setUserType(USER); 173 * Set the user type (to TELEPHONE_SUBSCRIBER or USER). 178 if (type != TELEPHONE_SUBSCRIBER && type != USER) {
|
/external/chromium/chrome/browser/policy/ |
H A D | cloud_policy_controller_unittest.cc | 175 em::DeviceRegisterRequest::USER, "", ""); 187 "google/chromeos/user", em::DeviceRegisterRequest::USER, 198 "google/chromeos/user", em::DeviceRegisterRequest::USER, 210 em::DeviceRegisterRequest::USER, 225 em::DeviceRegisterRequest::USER, 241 em::DeviceRegisterRequest::USER, 256 em::DeviceRegisterRequest::USER, 272 em::DeviceRegisterRequest::USER,
|
H A D | device_token_fetcher_unittest.cc | 81 em::DeviceRegisterRequest::USER, 93 em::DeviceRegisterRequest::USER, 114 em::DeviceRegisterRequest::USER, 132 em::DeviceRegisterRequest::USER,
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/irc/servlet/ |
H A D | irc.js | 57 sendCommand(commands.USER, 135 USER: "USER"
|
/external/webkit/WebKitLibraries/win/tools/scripts/ |
H A D | auto-version.sh | 94 VERSION_TEXT="${VERSION_TEXT_SHORT} ${USER} - ${BUILD_DATE} - r${SVN_REVISION}"
|
/external/smack/src/org/xbill/DNS/ |
H A D | KEYRecord.java | 113 public static final int USER = 0x0000; field in class:KEYRecord.Flags 201 flags.add(USER, "USER"); 274 public static final int OWNER_USER = Flags.USER;
|