Searched refs:SUDO (Results 1 - 15 of 15) sorted by relevance
/freebsd-13-stable/crypto/openssh/regress/ |
H A D | agent-getpeereid.sh | 16 case "x$SUDO" in 20 echo "need SUDO to switch to uid $UNPRIV" 24 echo "unsupported $SUDO - "doas" and "sudo" are allowed" 43 ${SUDO} -n -u ${UNPRIV} ${SSHADD} -l 2>/dev/null 46 < /dev/null ${SUDO} -S -u ${UNPRIV} ${SSHADD} -l 2>/dev/null
|
H A D | agent-ptrace.sh | 34 if test -z "$SUDO" ; then 35 echo "skipped (SUDO not set)" 38 $SUDO chown 0 ${SSHAGENT} 39 $SUDO chgrp 0 ${SSHAGENT} 40 $SUDO chmod 2755 ${SSHAGENT}
|
H A D | sftp-chroot.sh | 10 if [ -z "$SUDO" -a ! -w /var/run ]; then 11 echo "need SUDO to create file in /var/run, test won't work without" 21 $SUDO sh -c "echo mekmitastdigoat > $PRIVDATA" || \ 32 $SUDO rm $PRIVDATA
|
H A D | cfgparse.sh | 12 # will fail if we're not running with SUDO (no permissions for real keys) or 20 ($SUDO ${SSHD} -T -f $OBJ/sshd_config_minimal >$OBJ/sshd_config.1 && 21 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 && 25 ($SUDO ${SSHD} -T -f $OBJ/sshd_config >$OBJ/sshd_config.1 && 26 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 && 53 ($SUDO ${SSHD} -T -f $OBJ/sshd_config.1 | \ 69 ($SUDO ${SSHD} -T -f $OBJ/sshd_config.1 | \
|
H A D | reconfigure.sh | 26 PID=`$SUDO cat $PIDFILE` 28 $SUDO kill -HUP $PID
|
H A D | keys-command.sh | 6 if [ -z "$SUDO" -a ! -w /var/run ]; then 7 echo "skipped (SUDO not set)" 8 echo "need SUDO to create file in /var/run, test won't work without" 23 cat << _EOF | $SUDO sh -c "rm -f '$KEY_COMMAND' ; cat > '$KEY_COMMAND'" 37 $SUDO chmod 0755 "$KEY_COMMAND" 41 $SUDO rm -f $KEY_COMMAND 82 $SUDO rm -f $KEY_COMMAND
|
H A D | principals-command.sh | 9 if [ -z "$SUDO" -a ! -w /var/run ]; then 10 echo "skipped (SUDO not set)" 11 echo "need SUDO to create file in /var/run, test won't work without" 34 cat << _EOF | $SUDO sh -c "cat > '$PRINCIPALS_COMMAND'" 49 $SUDO chmod 0755 "$PRINCIPALS_COMMAND" 54 $SUDO rm -f $PRINCIPALS_COMMAND
|
H A D | scp.sh | 91 if [ ! -z "$SUDO" ]; then 98 $SUDO chown root ${DIR2}/copy 100 $SUDO diff ${DIFFOPT} ${DIR} ${DIR2} || fail "corrupted copy" 101 $SUDO rm ${DIR2}/copy
|
H A D | test-exec.sh | 4 #SUDO=sudo 300 pid=`$SUDO cat $PIDFILE` 307 $SUDO kill $pid 315 if $SUDO kill -0 $pid; then 494 $SUDO cp $OBJ/$t $OBJ/host.$t 497 # don't use SUDO for proxy connect 561 echo proxycommand ${SUDO} sh ${SRC}/sshd-log-wrapper.sh ${TEST_SSHD_LOGFILE} ${SSHD} -i -f $OBJ/sshd_proxy 570 $SUDO ${SSHD} -f $OBJ/sshd_config "$@" -t || fatal "sshd_config broken" 571 $SUDO ${SSHD} -f $OBJ/sshd_config "$@" -E$TEST_SSHD_LOGFILE
|
H A D | Makefile | 14 test -z "${SUDO}" || ${SUDO} rm -f ${SUDO_CLEAN} 210 (env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \ 217 (env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \
|
H A D | integrity.sh | 21 cmd="$SUDO sh ${SRC}/sshd-log-wrapper.sh ${TEST_SSHD_LOGFILE} ${SSHD} -i -f $OBJ/sshd_proxy"
|
H A D | rekey.sh | 158 b=`$SUDO ${SSHD} -T -o "rekeylimit $size $time" -f $OBJ/sshd_proxy | \ 160 s=`$SUDO ${SSHD} -T -o "rekeylimit $size $time" -f $OBJ/sshd_proxy | \
|
H A D | ssh-com-client.sh | 43 $SUDO cp $OBJ/$t $OBJ/host.$t
|
/freebsd-13-stable/cddl/usr.sbin/dwatch/ |
H A D | dwatch | 123 SUDO= 239 eval $SUDO ${timeout:+timeout \"\$TIMEOUT\"} dtrace \ 722 [ "$( id -u )" != 0 ] && type sudo > /dev/null 2>&1 && SUDO=sudo 1115 eval $SUDO ${TIMEOUT:+timeout \"\$TIMEOUT\"} dtrace \ 1122 ) | $SUDO awk \
|
/freebsd-13-stable/sys/contrib/openzfs/tests/test-runner/bin/ |
H A D | test-runner.py.in | 45 SUDO = 'sudo' 193 cmd = [SUDO, KILL, signal, str(proc.pid)] 238 ret = '%s -E -u %s %s' % (SUDO, user, cmd) 899 testcmd = [SUDO, '-n', '-u', user, TRUE]
|
Completed in 186 milliseconds