Searched refs:SUDO (Results 1 - 15 of 15) sorted by relevance

/freebsd-13-stable/crypto/openssh/regress/
H A Dagent-getpeereid.sh16 case "x$SUDO" in
20 echo "need SUDO to switch to uid $UNPRIV"
24 echo "unsupported $SUDO - "doas" and "sudo" are allowed"
43 ${SUDO} -n -u ${UNPRIV} ${SSHADD} -l 2>/dev/null
46 < /dev/null ${SUDO} -S -u ${UNPRIV} ${SSHADD} -l 2>/dev/null
H A Dagent-ptrace.sh34 if test -z "$SUDO" ; then
35 echo "skipped (SUDO not set)"
38 $SUDO chown 0 ${SSHAGENT}
39 $SUDO chgrp 0 ${SSHAGENT}
40 $SUDO chmod 2755 ${SSHAGENT}
H A Dsftp-chroot.sh10 if [ -z "$SUDO" -a ! -w /var/run ]; then
11 echo "need SUDO to create file in /var/run, test won't work without"
21 $SUDO sh -c "echo mekmitastdigoat > $PRIVDATA" || \
32 $SUDO rm $PRIVDATA
H A Dcfgparse.sh12 # will fail if we're not running with SUDO (no permissions for real keys) or
20 ($SUDO ${SSHD} -T -f $OBJ/sshd_config_minimal >$OBJ/sshd_config.1 &&
21 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 &&
25 ($SUDO ${SSHD} -T -f $OBJ/sshd_config >$OBJ/sshd_config.1 &&
26 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 &&
53 ($SUDO ${SSHD} -T -f $OBJ/sshd_config.1 | \
69 ($SUDO ${SSHD} -T -f $OBJ/sshd_config.1 | \
H A Dreconfigure.sh26 PID=`$SUDO cat $PIDFILE`
28 $SUDO kill -HUP $PID
H A Dkeys-command.sh6 if [ -z "$SUDO" -a ! -w /var/run ]; then
7 echo "skipped (SUDO not set)"
8 echo "need SUDO to create file in /var/run, test won't work without"
23 cat << _EOF | $SUDO sh -c "rm -f '$KEY_COMMAND' ; cat > '$KEY_COMMAND'"
37 $SUDO chmod 0755 "$KEY_COMMAND"
41 $SUDO rm -f $KEY_COMMAND
82 $SUDO rm -f $KEY_COMMAND
H A Dprincipals-command.sh9 if [ -z "$SUDO" -a ! -w /var/run ]; then
10 echo "skipped (SUDO not set)"
11 echo "need SUDO to create file in /var/run, test won't work without"
34 cat << _EOF | $SUDO sh -c "cat > '$PRINCIPALS_COMMAND'"
49 $SUDO chmod 0755 "$PRINCIPALS_COMMAND"
54 $SUDO rm -f $PRINCIPALS_COMMAND
H A Dscp.sh91 if [ ! -z "$SUDO" ]; then
98 $SUDO chown root ${DIR2}/copy
100 $SUDO diff ${DIFFOPT} ${DIR} ${DIR2} || fail "corrupted copy"
101 $SUDO rm ${DIR2}/copy
H A Dtest-exec.sh4 #SUDO=sudo
300 pid=`$SUDO cat $PIDFILE`
307 $SUDO kill $pid
315 if $SUDO kill -0 $pid; then
494 $SUDO cp $OBJ/$t $OBJ/host.$t
497 # don't use SUDO for proxy connect
561 echo proxycommand ${SUDO} sh ${SRC}/sshd-log-wrapper.sh ${TEST_SSHD_LOGFILE} ${SSHD} -i -f $OBJ/sshd_proxy
570 $SUDO ${SSHD} -f $OBJ/sshd_config "$@" -t || fatal "sshd_config broken"
571 $SUDO ${SSHD} -f $OBJ/sshd_config "$@" -E$TEST_SSHD_LOGFILE
H A DMakefile14 test -z "${SUDO}" || ${SUDO} rm -f ${SUDO_CLEAN}
210 (env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \
217 (env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \
H A Dintegrity.sh21 cmd="$SUDO sh ${SRC}/sshd-log-wrapper.sh ${TEST_SSHD_LOGFILE} ${SSHD} -i -f $OBJ/sshd_proxy"
H A Drekey.sh158 b=`$SUDO ${SSHD} -T -o "rekeylimit $size $time" -f $OBJ/sshd_proxy | \
160 s=`$SUDO ${SSHD} -T -o "rekeylimit $size $time" -f $OBJ/sshd_proxy | \
H A Dssh-com-client.sh43 $SUDO cp $OBJ/$t $OBJ/host.$t
/freebsd-13-stable/cddl/usr.sbin/dwatch/
H A Ddwatch123 SUDO=
239 eval $SUDO ${timeout:+timeout \"\$TIMEOUT\"} dtrace \
722 [ "$( id -u )" != 0 ] && type sudo > /dev/null 2>&1 && SUDO=sudo
1115 eval $SUDO ${TIMEOUT:+timeout \"\$TIMEOUT\"} dtrace \
1122 ) | $SUDO awk \
/freebsd-13-stable/sys/contrib/openzfs/tests/test-runner/bin/
H A Dtest-runner.py.in45 SUDO = 'sudo'
193 cmd = [SUDO, KILL, signal, str(proc.pid)]
238 ret = '%s -E -u %s %s' % (SUDO, user, cmd)
899 testcmd = [SUDO, '-n', '-u', user, TRUE]

Completed in 186 milliseconds