Searched refs:USER (Results 1 - 25 of 206) sorted by relevance

123456789

/external/ltp/testcases/commands/su/
H A Dsu_set_passwd7 # ./su_set_passwd USER ENCRYPTED_PASSWD
10 USER=$1
13 usermod -p $ENCRYPTED_PASSWD $USER
/external/eigen/scripts/
H A Deigen_gen_docs4 # You should call this script with USER set as you want, else some default
6 USER=${USER:-'orzel'}
18 rsync -az --no-p --delete build/doc/html/ $USER@ssh.tuxfamily.org:eigen/eigen.tuxfamily.org-web/htdocs/$UPLOAD_DIR/ || { echo "upload failed"; exit 1; }
21 ssh $USER@ssh.tuxfamily.org "chmod -R g+w /home/eigen/eigen.tuxfamily.org-web/htdocs/$UPLOAD_DIR" || { echo "perm failed"; exit 1; }
/external/openssh/regress/
H A Dforcecommand.sh8 cp /dev/null $OBJ/authorized_keys_$USER
10 printf 'command="true" ' >>$OBJ/authorized_keys_$USER
11 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
20 cp /dev/null $OBJ/authorized_keys_$USER
22 printf 'command="false" ' >> $OBJ/authorized_keys_$USER
23 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
37 echo "Match User $USER" >> $OBJ/sshd_proxy
H A Dbrokenkeys.sh6 KEYS="$OBJ/authorized_keys_${USER}"
15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
H A Dmultipubkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 ||
45 rm -f $OBJ/authorized_principals_$USER
46 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
50 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
51 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
55 rm -f $OBJ/authorized_principals_$USER
57 $OBJ/authorized_keys_$USER
[all...]
H A Dcert-userkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key*
41 -I "regress user key for $USER" \
42 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
53 rm -f $OBJ/authorized_keys_$USER
69 rm -f $OBJ/authorized_principals_$USER
78 echo > $OBJ/authorized_principals_$USER
87 echo gregorsamsa > $OBJ/authorized_principals_$USER
96 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
105 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
115 $OBJ/authorized_principals_$USER
[all...]
H A Dprincipals-command.sh23 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \
64 rm -f $OBJ/authorized_keys_$USER
80 echo > $OBJ/authorized_principals_$USER
89 echo gregorsamsa > $OBJ/authorized_principals_$USER
98 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
107 echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
117 $OBJ/authorized_principals_$USER
127 $OBJ/authorized_principals_$USER
135 rm -f $OBJ/authorized_principals_$USER
146 ) > $OBJ/authorized_keys_$USER
[all...]
H A Dlimit-keytype.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key*
7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key*
25 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
26 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key3 ||
37 echo mekmitasdigoat > $OBJ/authorized_principals_$USER
38 cat $OBJ/user_key1.pub > $OBJ/authorized_keys_$USER
39 cat $OBJ/user_key2.pub >> $OBJ/authorized_keys_$USER
85 "Match user x$USER" "PubkeyAcceptedKeyTypes +ssh-ed25519"
93 "Match user $USER" "PubkeyAcceptedKeyTypes +ssh-ed25519"
/external/autotest/site_utils/admin/
H A Dsuite_scheduler.conf15 USER="chromeos-test"
22 exec sudo -u ${USER} ${SCHEDULER_DIR}/${SCHEDULER_COMMAND} ${SCHEDULER_ARGS}
/external/curl/docs/cmdline-opts/
H A Dftp-alternative-to-user.d3 Help: String to replace USER [name]
7 If authenticating with the USER and PASS commands fails, send this command.
/external/toybox/tests/
H A Dgroupadd.test10 echo "# usage: addgroup [-g GID] [USER] GROUP
45 grep '^toyTestGroup:' /etc/group $arg && groupadd $USER toyTestGroup &&
46 grep '^toyTestGroup:.*:.*:.*$USER.*' /etc/group $arg &&
47 groupdel $USER toyTestGroup $arg || groupdel toyTestGroup &&
/external/python/cpython2/Mac/BuildScript/scripts/
H A Dpostflight.patch-profile14 theShell="`finger $USER | grep Shell: | head -1 | awk '{ print $NF }'`"
25 P=`su - ${USER} -c 'echo A-X-4-X@@$PATH@@X-4-X-A' | grep 'A-X-4-X@@.*@@X-4-X-A' | sed -e 's/^A-X-4-X@@//g' -e 's/@@X-4-X-A$//g'`
64 chown "${USER}" "${RC}"
97 chown "${USER}" "${PR}"
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.0/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.0-rc1/MockFtpServer/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.0-rc1/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.0-rc3/MockFtpServer/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.0.1/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.0.2/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.1/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.2/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.3/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.4/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/mockftpserver/tags/2.5/src/test/groovy/org/mockftpserver/fake/filesystem/
H A DDirectoryEntryTest.groovy31 entry.owner = USER
39 assert clone.owner == USER
/external/toolchain-utils/cwp/
H A Ddemo_pipeline.sh4 DATA_DIR=/usr/local/google/home/${USER}/
21 PROFILE_UTIL_BINARY=/home/mrdmnd/${USER}-profiledb/google3/blaze-bin/perftools/gwp/chromeos/profile_util
26 CNS_LOC=/cns/ag-d/home/${USER}/profiledb/
39 echo " For demo purposes, UN=${USER}@google.com, PW=xjpbmshkzefutlrm"
53 echo " dremel> define table t /cns/ag-d/home/${USER}/profiledb/profiles.cio-*"

Completed in 3615 milliseconds

123456789