Home
last modified time | relevance | path

Searched refs:SSH (Results 1 – 25 of 164) sorted by relevance

1234567

/external/openssh/regress/
Dforwarding.sh29 ${SSH} -S $CTL -N -M -F $OBJ/ssh_config -f $fwd somehost
32 ${SSH} -F $OBJ/ssh_config -p$last -o 'ConnectionAttempts=4' \
37 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost 2>/dev/null
43 ${SSH} -F $OBJ/ssh_config \
53 ${SSH} -q -F $OBJ/ssh_config \
68 ${SSH} -F $OBJ/ssh_config -oClearAllForwardings=yes somehost true
72 ${SSH} -S $CTL -N -M -f -F $OBJ/ssh_config -L ${base}01:127.0.0.1:$PORT \
78 ${SSH} -F $OBJ/ssh_config -p ${base}01 somehost true \
82 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost 2>/dev/null
86 ${SSH} -S $CTL -N -M -f -F $OBJ/ssh_config -R ${base}01:127.0.0.1:$PORT \
[all …]
Dsshcfgparse.sh33 (${SSH} -G -F $OBJ/ssh_config somehost >$OBJ/ssh_config.1 &&
34 ${SSH} -G -F $OBJ/ssh_config.1 somehost >$OBJ/ssh_config.2 &&
38 f=`${SSH} -GF $OBJ/ssh_config host | awk '/exitonforwardfailure/{print $2}'`
40 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/exitonforwardfailure/{print $2}'`
42 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o exitonforwardfailure=no h | \
46 f=`${SSH} -GF $OBJ/ssh_config host | awk '/clearallforwardings/{print $2}'`
48 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/clearallforwardings/{print $2}'`
50 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o clearallforwardings=no h | \
56 f=`${SSH} -GF $OBJ/ssh_config host | awk '/^user /{print $2}'`
58 f=`${SSH} -GF $OBJ/ssh_config -o user=foo -l bar baz@host | awk '/^user /{print $2}'`
[all …]
Dlimit-keytype.sh88 ${SSH} $certopts proxy true || fatal "cert failed"
89 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
90 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
96 ${SSH} $certopts proxy true && fatal "cert succeeded"
97 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
98 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
103 ${SSH} $certopts proxy true && fatal "cert succeeded"
104 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
106 ${SSH} $opts -i $OBJ/user_key2 proxy true && fatal "key2 succeeded"
112 ${SSH} $certopts proxy true || fatal "cert failed"
[all …]
Dmultiplex.sh20 ${SSH} -F $OBJ/ssh_config -S $CTL -Ocheck otherhost \
32 ${SSH} -Nn2 -MS$CTL -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" somehost \
43 _XXX_TEST=blah ${SSH} -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" -S$CTL otherhost sh << 'EOF'
53 ${SSH} -F $OBJ/ssh_config -S$CTL otherhost cat ${DATA} > ${COPY}
59 ${SSH} -F $OBJ/ssh_config -S $CTL otherhost cat ${DATA} > ${COPY}
66 ${SFTP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost >>$TEST_REGRESS_LOGFILE 2>&1
72 ${SCP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost:${DATA} ${COPY} >>$TEST_REGRESS_LO…
81 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L127.0.0.1:$((${PORT} + 2)):127.0.0.1:$((${PORT} + 1))…
91 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L$OBJ/unix-2.fwd:$OBJ/unix-1.fwd otherhost >>$TEST_SSH…
92 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -R$OBJ/unix-3.fwd:$OBJ/unix-2.fwd otherhost >>$TEST_SSH…
[all …]
Dcert-userkey.sh10 PLAIN_TYPES=`$SSH -Q key-plain | maybe_filter_sk | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'`
84 ${SSH} -i $OBJ/cert_user_key_${ktype} \
93 ${SSH} -i $OBJ/cert_user_key_${ktype} \
102 ${SSH} -i $OBJ/cert_user_key_${ktype} \
111 ${SSH} -i $OBJ/cert_user_key_${ktype} \
120 ${SSH} -i $OBJ/cert_user_key_${ktype} \
130 ${SSH} -i $OBJ/cert_user_key_${ktype} \
141 ${SSH} -i $OBJ/cert_user_key_${ktype} \
165 ${SSH} -i $OBJ/cert_user_key_${ktype} \
177 ${SSH} -i $OBJ/cert_user_key_${ktype} \
[all …]
Dcert-file.sh59 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \
65 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \
72 ${SSH} $opts2 somehost exit 52
81 ${SSH} $opts3 somehost exit 52
91 ${SSH} $opts3 somehost exit 52
100 ${SSH} $opts3 somehost exit 52
110 ${SSH} $opts3 somehost exit 52
142 ${SSH} $opts somehost exit 52
149 ${SSH} $opts somehost exit 52
156 ${SSH} $opts somehost exit 52
Drekey.sh24 ${SSH} <${DATA} $_opts -v -F $OBJ/ssh_proxy somehost "cat > ${COPY}"
40 for i in `${SSH} -Q kex`; do
43 for i in `${SSH} -Q cipher`; do
46 for i in `${SSH} -Q mac`; do
56 if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then
57 for c in `${SSH} -Q cipher-auth`; do
58 for kex in `${SSH} -Q kex`; do
73 ${SSH} < ${DATA} -oCompression=no -oRekeyLimit="default $s" -F \
90 ${SSH} -oCompression=no -oRekeyLimit="default $s" -F \
108 ${SSH} -oCompression=no -F $OBJ/ssh_proxy somehost "cat ${DATA}" \
[all …]
Dkey-options.sh20 r=`${SSH} -q -F $OBJ/ssh_proxy somehost echo foo`
37 ${SSH} -ttq -F $OBJ/ssh_proxy somehost "tty > $OBJ/data; exit 0"
55 ${SSH} -ttq -F $OBJ/ssh_proxy somehost "tty > $OBJ/data; exit 0"
78 r=`${SSH} -q -F $OBJ/ssh_proxy somehost 'echo $FOO'`
87 ${SSH} -q -F $OBJ/ssh_proxy somehost true
95 r=`${SSH} -q -F $OBJ/ssh_proxy somehost 'echo true'`
100 r=`${SSH} -q -F $OBJ/ssh_config somehost 'echo true'`
112 ${SSH} -q -F $OBJ/ssh_proxy somehost true
Dagent.sh78 ${SSH} -F $OBJ/ssh_proxy somehost exit 52
90 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub -oIdentitiesOnly=yes \
99 ${SSH} -A -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
104 ${SSH} "-oForwardAgent=$SSH_AUTH_SOCK" -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
109 ${SSH} -A -F $OBJ/ssh_proxy somehost \
110 "${SSH} -F $OBJ/ssh_proxy somehost exit 52"
117 ${SSH} "-oForwardAgent=$FW_SSH_AUTH_SOCK" -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
122 ${SSH} '-oForwardAgent=$FW_SSH_AUTH_SOCK' -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
134 ${SSH} '-oForwardAgent=$FW_SSH_AUTH_SOCK' -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
145 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub \
Dprincipals-command.sh87 ${SSH} -i $OBJ/cert_user_key \
96 ${SSH} -i $OBJ/cert_user_key \
105 ${SSH} -i $OBJ/cert_user_key \
114 ${SSH} -i $OBJ/cert_user_key \
124 ${SSH} -i $OBJ/cert_user_key \
134 ${SSH} -i $OBJ/cert_user_key \
153 ${SSH} -i $OBJ/cert_user_key \
165 ${SSH} -i $OBJ/cert_user_key \
Ddhgex.sh10 kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange`
27 ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true
58 check 3072 `${SSH} -Q cipher | grep 128`
59 check 7680 `${SSH} -Q cipher | grep 192`
60 check 8192 `${SSH} -Q cipher | grep 256`
Dtry-ciphers.sh8 for c in `${SSH} -Q cipher`; do
10 for m in `${SSH} -Q mac`; do
16 ${SSH} -F $OBJ/ssh_proxy -m $m -c $c somehost true
22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
Denvpass.sh17 _TEST_ENV=blah ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass otherhost \
28 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -F $OBJ/ssh_proxy_envpass otherhost \
39 _XXX_TEST=blah ${SSH} -oSendEnv="_XXX_TEST" -F $OBJ/ssh_proxy_envpass \
50 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -oSendEnv="_XXX_TEST_*" \
Dcfgmatchlisten.sh17 ${SSH} -vvv $fwd "$@" somehost true >>$TEST_REGRESS_LOGFILE 2>&1
22 ${SSH} -vvv $fwd "$@" somehost \
143 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \
178 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \
190 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \
Dproto-version.sh12 SSH-1.99-*)
15 SSH-2.0-*)
18 SSH-1.5-*)
Dcipher-speed.sh14 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do
18 ( ${SSH} -o 'compression no' \
Dproxy-connect.sh6 if [ "`${SSH} -Q compression`" = "none" ]; then
15 SSH_CONNECTION=`${SSH} $opts 999.999.999.999 'echo $SSH_CONNECTION'`
26 ${SSH} -F $OBJ/ssh_proxy ${USER}:style@999.999.999.999 true || \
Dsftp-uri.sh26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "…
32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c…
37 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config -b - \
51 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config -b - \
Dconnect-privsep.sh9 ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
17 ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
31 env MALLOC_OPTIONS="$m" ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
Dkextype.sh11 ALLKEX=`${SSH} -Q kex`
16 for k in `${SSH} -Q kex`; do
19 ${SSH} -F $OBJ/ssh_proxy -o KexAlgorithms=$k x true
Dconnect-uri.sh13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true
19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true
25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
Dintegrity.sh10 macs=`${SSH} -Q mac`
13 macs="$macs `${SSH} -Q cipher-auth`"
40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
49 ${SSH} $macopt -F $OBJ/ssh_proxy -o "$pxy" \
Dmultipubkey.sh47 ${SSH} $opts proxy true && fail "ssh succeeded with key"
52 ${SSH} $opts proxy true && fail "ssh succeeded with key+cert"
58 ${SSH} $opts proxy true || fail "ssh failed with multiple keys"
64 ${SSH} $opts proxy true || fail "ssh failed with key/cert"
Dpercent.sh30 ${SSH} -F $OBJ/ssh_proxy -o $opt="echo '$arg' >$OBJ/actual" \
38 ${SSH} -F $OBJ/ssh_proxy_match remuser@somehost true || true
44 got=`${SSH} -F $OBJ/ssh_proxy -o $opt="/$arg /$arg" -G \
49 got=`${SSH} -F $OBJ/ssh_proxy -o $opt="$arg" -G \
/external/openssh/
DPROTOCOL.sshsig1 This document describes a lightweight SSH Signature format
2 that is compatible with SSH keys and wire formats.
8 The Armored SSH signatures consist of a header, a base64
11 The header is the string "-----BEGIN SSH SIGNATURE-----"
13 "-----END SSH SIGNATURE-----" immediately after a newline.
25 -----BEGIN SSH SIGNATURE-----
30 -----END SSH SIGNATURE-----
46 public key used to make the signature using the usual SSH
69 The signature itself is made using the SSH signature algorithm and
91 signed during SSH user or host authentication.
[all …]

1234567