Home
last modified time | relevance | path

Searched refs:SUDO (Results 1 – 18 of 18) sorted by relevance

/external/openssh/regress/
Dcfgparse.sh20 ($SUDO ${SSHD} -T -f $OBJ/sshd_config_minimal >$OBJ/sshd_config.1 &&
21 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 &&
25 ($SUDO ${SSHD} -T -f $OBJ/sshd_config >$OBJ/sshd_config.1 &&
26 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 &&
53 ($SUDO ${SSHD} -T -f $OBJ/sshd_config.1 | \
69 ($SUDO ${SSHD} -T -f $OBJ/sshd_config.1 | \
Dkeys-command.sh6 if [ -z "$SUDO" -a ! -w /var/run ]; then
23 cat << _EOF | $SUDO sh -c "rm -f '$KEY_COMMAND' ; cat > '$KEY_COMMAND'"
37 $SUDO chmod 0755 "$KEY_COMMAND"
41 $SUDO rm -f $KEY_COMMAND
82 $SUDO rm -f $KEY_COMMAND
Dagent-getpeereid.sh16 case "x$SUDO" in
23 echo "unsupported $SUDO - "doas" and "sudo" are allowed"
42 ${SUDO} -n -u ${UNPRIV} ${SSHADD} -l 2>/dev/null
45 < /dev/null ${SUDO} -S -u ${UNPRIV} ${SSHADD} -l 2>/dev/null
Dagent-ptrace.sh34 if test -z "$SUDO" ; then
38 $SUDO chown 0 ${SSHAGENT}
39 $SUDO chgrp 0 ${SSHAGENT}
40 $SUDO chmod 2755 ${SSHAGENT}
Dsftp-chroot.sh10 if [ -z "$SUDO" -a ! -w /var/run ]; then
20 $SUDO sh -c "echo mekmitastdigoat > $PRIVDATA" || \
31 $SUDO rm $PRIVDATA
Dprincipals-command.sh9 if [ -z "$SUDO" -a ! -w /var/run ]; then
34 cat << _EOF | $SUDO sh -c "cat > '$PRINCIPALS_COMMAND'"
49 $SUDO chmod 0755 "$PRINCIPALS_COMMAND"
54 $SUDO rm -f $PRINCIPALS_COMMAND
Dscp.sh91 if [ ! -z "$SUDO" ]; then
98 $SUDO chown root ${DIR2}/copy
100 $SUDO diff ${DIFFOPT} ${DIR} ${DIR2} || fail "corrupted copy"
101 $SUDO rm ${DIR2}/copy
DMakefile14 test -z "${SUDO}" || ${SUDO} rm -f ${SUDO_CLEAN}
202 …(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDI…
209 …(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDI…
Dreconfigure.sh28 PID=`$SUDO cat $PIDFILE`
30 $SUDO kill -HUP $PID
Dtest-exec.sh299 pid=`$SUDO cat $PIDFILE`
306 $SUDO kill $pid
488 $SUDO cp $OBJ/$t $OBJ/host.$t
548 …echo proxycommand ${SUDO} sh ${SRC}/sshd-log-wrapper.sh ${TEST_SSHD_LOGFILE} ${SSHD} -i -f $OBJ/ss…
557 $SUDO ${SSHD} -f $OBJ/sshd_config "$@" -t || fatal "sshd_config broken"
558 $SUDO ${SSHD} -f $OBJ/sshd_config "$@" -E$TEST_SSHD_LOGFILE
Drekey.sh158 b=`$SUDO ${SSHD} -T -o "rekeylimit $size $time" -f $OBJ/sshd_proxy | \
160 s=`$SUDO ${SSHD} -T -o "rekeylimit $size $time" -f $OBJ/sshd_proxy | \
Dintegrity.sh21 cmd="$SUDO sh ${SRC}/sshd-log-wrapper.sh ${TEST_SSHD_LOGFILE} ${SSHD} -i -f $OBJ/sshd_proxy"
Dssh-com-client.sh43 $SUDO cp $OBJ/$t $OBJ/host.$t
DREADME.regress23 SUDO: path to sudo command, if desired. Note that some systems (notably
/external/elfutils/src/
Dmake-debug-archive.in17 SUDO=${SUDO:-/usr/bin/sudo}
37 echo "With --sudo, touches the installed file via $SUDO."
65 x--sudo) sudo=$SUDO ;;
/external/libjpeg-turbo/release/
Dmakedpkg.in10 SUDO=
15 $SUDO rm -rf $TMPDIR
92 $SUDO chown -Rh root:root $TMPDIR/*
109 SUDO=sudo
Dmaketarball.in10 SUDO=
/external/openssh/
DChangeLog1268 Use $SUDO to read pidfile in case root's umask is
2054 is already root, the test should not expect that SUDO is set. If ssh needs
8210 skip, rather than fatal when run without SUDO set
8230 make this work without SUDO set; ok dtucker@