Searched refs:OBJ (Results 1 - 25 of 80) sorted by relevance

1234

/freebsd-9.3-release/crypto/openssh/regress/
H A Dforcecommand.sh6 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
8 printf 'command="true" ' >$OBJ/authorized_keys_$USER
9 cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER
10 printf 'command="true" ' >>$OBJ/authorized_keys_$USER
11 cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER
15 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
19 printf 'command="false" ' >$OBJ/authorized_keys
[all...]
H A Dhost-expand.sh6 echo 'PermitLocalCommand yes' >> $OBJ/ssh_proxy
7 printf 'LocalCommand printf "%%%%s\\n" "%%n" "%%h"\n' >> $OBJ/ssh_proxy
9 cat >$OBJ/expect <<EOE
16 ${SSH} -F $OBJ/ssh_proxy -$p somehost true >$OBJ/actual
17 diff $OBJ/expect $OBJ/actual || fail "$tid proto $p"
H A Dbanner.sh5 echo "Banner $OBJ/banner.in" >> $OBJ/sshd_proxy
7 rm -f $OBJ/banner.out $OBJ/banner.in $OBJ/empty.in
8 touch $OBJ/empty.in
12 ( ${SSH} -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \
13 cmp $OBJ/empty.in $OBJ/banne
[all...]
H A Dconnect-privsep.sh6 cp $OBJ/sshd_proxy $OBJ/sshd_proxy.orig
7 echo 'UsePrivilegeSeparation yes' >> $OBJ/sshd_proxy
10 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
16 cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy
17 echo 'UsePrivilegeSeparation sandbox' >> $OBJ/sshd_proxy
20 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
31 env MALLOC_OPTIONS="$m" ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
H A Dlogin-timeout.sh7 cp $OBJ/sshd_config $OBJ/sshd_config.orig
8 grep -vi LoginGraceTime $OBJ/sshd_config.orig > $OBJ/sshd_config
9 echo "LoginGraceTime 10s" >> $OBJ/sshd_config
10 echo "MaxStartups 1" >> $OBJ/sshd_config
15 ${SSH} -F $OBJ/ssh_config somehost true
23 echo "UsePrivilegeSeparation no" >> $OBJ/sshd_config
28 ${SSH} -F $OBJ/ssh_config somehost true
H A Dcfgmatch.sh6 pidfile=$OBJ/remote_pid
10 echo "ExitOnForwardFailure=yes" >> $OBJ/ssh_config
11 echo "ExitOnForwardFailure=yes" >> $OBJ/ssh_proxy
41 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
42 echo "PermitOpen 127.0.0.1:1" >>$OBJ/sshd_config
43 echo "Match Address 127.0.0.1" >>$OBJ/sshd_config
44 echo "PermitOpen 127.0.0.1:$PORT" >>$OBJ/sshd_config
46 grep -v AuthorizedKeysFile $OBJ/sshd_proxy_bak > $OBJ/sshd_prox
[all...]
H A Dcert-hostkey.sh6 rm -f $OBJ/known_hosts-cert $OBJ/host_ca_key* $OBJ/cert_host_key*
7 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
12 ${SSHKEYGEN} -q -N '' -t rsa -f $OBJ/host_ca_key ||\
17 cat $OBJ/host_ca_key.pub
18 ) > $OBJ/known_hosts-cert
34 -f $OBJ/cert_host_key_${ktype} || \
36 ${SSHKEYGEN} -h -q -s $OBJ/host_ca_ke
[all...]
H A Dkextype.sh7 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
8 cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
14 ${SSH} -F $OBJ/ssh_proxy -o KexAlgorithms=$k x true
H A Dkeygen-convert.sh9 rm -f $OBJ/$t-key
10 ${SSHKEYGEN} -q -N "" -t $t -f $OBJ/$t-key
13 ${SSHKEYGEN} -q -e -f $OBJ/$t-key >$OBJ/$t-key-rfc || \
17 ${SSHKEYGEN} -q -e -f $OBJ/$t-key.pub >$OBJ/$t-key-rfc.pub || \
20 cmp $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub || \
24 ${SSHKEYGEN} -q -i -f $OBJ/$t-key-rfc >$OBJ/
[all...]
H A Dcert-userkey.sh6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key*
7 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
19 ${SSHKEYGEN} -q -N '' -t rsa -f $OBJ/user_ca_key ||\
26 -f $OBJ/cert_user_key_${ktype} || \
28 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \
29 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype} ||
32 cp $OBJ/cert_user_key
[all...]
H A Dlocalcommand.sh6 echo 'PermitLocalCommand yes' >> $OBJ/ssh_proxy
7 echo 'LocalCommand echo foo' >> $OBJ/ssh_proxy
11 a=`${SSH} -F $OBJ/ssh_proxy -$p somehost true`
H A Dkeytype.sh11 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
12 cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
26 rm -f $OBJ/key.$kt
30 ${TIME} ${SSHKEYGEN} -b $bits -q -N '' -t $type -f $OBJ/key.$kt ||\
41 grep -v HostKey $OBJ/sshd_proxy_bak
42 echo HostKey $OBJ/key.$ht
43 ) > $OBJ/sshd_proxy
45 grep -v IdentityFile $OBJ/ssh_proxy_ba
[all...]
H A Dbrokenkeys.sh6 KEYS="$OBJ/authorized_keys_${USER}"
15 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
17 ${SSH} -2 -F $OBJ/ssh_config somehost true
H A Dssh-com-client.sh31 cp ${SRC}/dsa_ssh2.prv ${OBJ}/id.com
32 chmod 600 ${OBJ}/id.com
33 ${SSHKEYGEN} -i -f ${OBJ}/id.com > $OBJ/id.openssh
34 chmod 600 ${OBJ}/id.openssh
35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER
36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub
37 echo IdKey ${OBJ}/i
[all...]
H A Dkeys-command.sh18 exec cat "$OBJ/authorized_keys_${LOGNAME}"
22 cp $OBJ/sshd_proxy $OBJ/sshd_proxy.bak
24 grep -vi AuthorizedKeysFile $OBJ/sshd_proxy.bak
28 ) > $OBJ/sshd_proxy
31 ${SSH} -F $OBJ/ssh_proxy somehost true
H A Dssh-com.sh33 cat << EOF > $OBJ/sshd2_config
39 UserConfigDirectory ${OBJ}/%U
46 RandomSeedFile ${OBJ}/random_seed
56 < $OBJ/ssh_config > $OBJ/ssh_config_com
59 rm -f ${OBJ}/dsa ${OBJ}/dsa.pub
60 ${SSHKEYGEN} -q -N '' -t dsa -f ${OBJ}/dsa
63 mkdir -p ${OBJ}/${USER}
64 cp /dev/null ${OBJ}/
[all...]
H A Dkeygen-change.sh12 rm -f $OBJ/$t-key
13 ${SSHKEYGEN} -q -N ${S1} -t $t -f $OBJ/$t-key
15 ${SSHKEYGEN} -p -P ${S1} -N ${S2} -f $OBJ/$t-key > /dev/null
22 rm -f $OBJ/$t-key $OBJ/$t-key.pub
H A Dreexec.sh7 SSHD_COPY=$OBJ/sshd
24 ${SSH} -nqo "Protocol=$p" -F $OBJ/ssh_config somehost \
36 cp $OBJ/sshd_config $OBJ/sshd_config.orig
38 echo "InvalidXXX=no" >> $OBJ/sshd_config
45 cp $OBJ/sshd_config.orig $OBJ/sshd_config
62 cp $OBJ/sshd_config.orig $OBJ/sshd_config
63 echo "UsePrivilegeSeparation=no" >> $OBJ/sshd_confi
[all...]
H A Dkrl.sh15 rm -f $OBJ/revoked-* $OBJ/krl-*
18 $SSHKEYGEN -t $ECDSA -f $OBJ/revoked-ca -C "" -N "" > /dev/null ||
24 cat << EOF >> $OBJ/revoked-serials
43 touch $OBJ/revoked-keyid
46 echo "id: revoked $n" >> $OBJ/revoked-keyid
51 f=$OBJ/revoked-`printf "%04d" $N`
61 $SSHKEYGEN -s $OBJ/revoked-ca -z $n -I "revoked $N" $f >/dev/null 2>&1 \
83 $SSHKEYGEN $OPTS -kf $OBJ/krl-empty - </dev/null \
85 $SSHKEYGEN $OPTS -kf $OBJ/kr
[all...]
H A Dproxy-connect.sh8 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
12 SSH_CONNECTION=`${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 'echo $SSH_CONNECTION'`
23 ${SSH} -$p -F $OBJ/ssh_proxy ${USER}:style@999.999.999.999 true || \
H A Dtest-exec.sh40 OBJ=$1
41 if [ "x$OBJ" = "x" ]; then
42 echo '$OBJ not defined'
45 if [ ! -d $OBJ ]; then
46 echo "not a directory: $OBJ"
149 TEST_SSH_LOGFILE=$OBJ/ssh.log
152 TEST_SSHD_LOGFILE=$OBJ/sshd.log
155 TEST_REGRESS_LOGFILE=$OBJ/regress.log
165 SSHLOGWRAP=$OBJ/ssh-log-wrapper.sh
169 chmod a+rx $OBJ/ss
[all...]
H A Dagent-pkcs11.sh10 SOFTPKCS11RC=$OBJ/pkcs11.info
30 rm -f $OBJ/pkcs11.key $OBJ/pkcs11.crt
31 openssl genrsa -out $OBJ/pkcs11.key 2048 > /dev/null 2>&1
32 chmod 600 $OBJ/pkcs11.key
33 openssl req -key $OBJ/pkcs11.key -new -x509 \
34 -out $OBJ/pkcs11.crt -text -subj '/CN=pkcs11 test' > /dev/null
35 printf "a\ta\t$OBJ/pkcs11.crt\t$OBJ/pkcs11.key" > $SOFTPKCS11RC
37 ${SSHKEYGEN} -y -f $OBJ/pkcs1
[all...]
H A Ddynamic-forward.sh26 ${SSH} -$p -F $OBJ/ssh_config -f -D $FWDPORT -q \
28 \'"echo \$\$ > $OBJ/remote_pid; exec sleep 444"\'
42 ${SSH} -F $OBJ/ssh_config \
44 somehost cat $DATA > $OBJ/ls.copy
45 test -f $OBJ/ls.copy || fail "failed copy $DATA"
46 cmp $DATA $OBJ/ls.copy || fail "corrupted copy of $DATA"
50 if [ -f $OBJ/remote_pid ]; then
51 remote=`cat $OBJ/remote_pid`
57 fail "no pid file: $OBJ/remote_pid"
H A Denvpass.sh9 cat << EOF > $OBJ/ssh_proxy_envpass
13 cat $OBJ/ssh_proxy >> $OBJ/ssh_proxy_envpass
17 _TEST_ENV=blah ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass otherhost \
28 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -F $OBJ/ssh_proxy_envpass otherhost \
39 _XXX_TEST=blah ${SSH} -oSendEnv="_XXX_TEST" -F $OBJ/ssh_proxy_envpass \
51 -F $OBJ/ssh_proxy_envpass otherhost \
60 rm -f $OBJ/ssh_proxy_envpass
H A Dconnect.sh9 ${SSH} -o "Protocol=$p" -F $OBJ/ssh_config somehost true

Completed in 123 milliseconds

1234