Home
last modified time | relevance | path

Searched refs:SSH (Results 1 – 25 of 79) sorted by relevance

1234

/external/openssh/regress/
Dforwarding.sh25 ${SSH} -$p -F $OBJ/ssh_config -f $fwd somehost sleep 10
28 ${SSH} -$q -F $OBJ/ssh_config -p$last -o 'ConnectionAttempts=4' \
41 ${SSH} -$p -F $OBJ/ssh_config \
51 ${SSH} -q -$p -F $OBJ/ssh_config \
68 ${SSH} -$p -F $OBJ/ssh_config -oClearAllForwardings=yes somehost true
71 ${SSH} -$p -f -F $OBJ/ssh_config -L ${base}01:127.0.0.1:$PORT \
77 ${SSH} -$p -F $OBJ/ssh_config -p ${base}01 true \
84 ${SSH} -$p -f -F $OBJ/ssh_config -R ${base}01:127.0.0.1:$PORT \
90 ${SSH} -$p -F $OBJ/ssh_config -p ${base}01 true \
99 cmd="${SSH} -$p -F $OBJ/ssh_config"
Dmultiplex.sh20 ${SSH} -Nn2 -MS$CTL -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" somehost &
28 _XXX_TEST=blah ${SSH} -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" -S$CTL otherhost sh << 'EOF'
38 ${SSH} -F $OBJ/ssh_config -S$CTL otherhost cat ${DATA} > ${COPY}
44 ${SSH} -F $OBJ/ssh_config -S $CTL otherhost cat ${DATA} > ${COPY}
51 ${SFTP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost >$LOG 2>&1
57 ${SCP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost:${DATA} ${COPY} >$LOG 2>&1
66 ${SSH} -F $OBJ/ssh_config -S $CTL otherhost exit $s
74 ${SSH} -F $OBJ/ssh_config -S $CTL -n otherhost \
Dcert-userkey.sh57 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
66 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
75 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
84 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
93 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
103 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
114 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
133 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
145 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
177 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
[all …]
Dkey-options.sh15 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost echo foo`
29 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost tty`
40 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost 'echo $FOO'`
51 ${SSH} -$p -q -F $OBJ/ssh_proxy somehost true
59 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost 'echo true'`
64 r=`${SSH} -$p -q -F $OBJ/ssh_config somehost 'echo true'`
Dlogin-timeout.sh11 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 &
13 ${SSH} -F $OBJ/ssh_config somehost true
24 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 &
26 ${SSH} -F $OBJ/ssh_config somehost true
Dtry-ciphers.sh18 ${SSH} -F $OBJ/ssh_proxy -2 -m $m -c $c somehost true
29 ${SSH} -F $OBJ/ssh_proxy -1 -c $c somehost true
35 if ${SSH} -oCiphers=acss@openssh.org 2>&1 | grep "Bad SSH2 cipher" >/dev/null
45 ${SSH} -F $OBJ/ssh_proxy -2 -m $m -c $c somehost true
Denvpass.sh17 _TEST_ENV=blah ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass otherhost \
28 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -F $OBJ/ssh_proxy_envpass otherhost \
39 _XXX_TEST=blah ${SSH} -oSendEnv="_XXX_TEST" -F $OBJ/ssh_proxy_envpass \
50 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -oSendEnv="_XXX_TEST_*" \
Dagent.sh48 ${SSH} -$p -F $OBJ/ssh_proxy somehost exit 5$p
56 ${SSH} -A -$p -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
60 ${SSH} -A -$p -F $OBJ/ssh_proxy somehost \
61 "${SSH} -$p -F $OBJ/ssh_proxy somehost exit 5$p"
Dproto-version.sh13 SSH-1.99-*)
16 SSH-2.0-*)
19 SSH-1.5-*)
Dforcecommand.sh15 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
29 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
40 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
Dbanner.sh12 ( ${SSH} -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \
33 ( ${SSH} -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \
40 ( ${SSH} -q -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \
Dproxy-connect.sh7 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
11 SSH_CONNECTION=`${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 'echo $SSH_CONNECTION'`
Dproto-mismatch.sh18 mismatch 2 SSH-1.5-HALLO
19 mismatch 1 SSH-2.0-HALLO
Dcert-hostkey.sh58 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
100 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
125 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
163 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
212 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
247 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
Dexit-status.sh10 ${SSH} -$p -F $OBJ/ssh_proxy otherhost exit $s
17 ${SSH} -$p -F $OBJ/ssh_proxy -n otherhost \
Dconnect-privsep.sh10 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
20 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
Dportnum.sh9 if ${SSH} -F $OBJ/ssh_proxy -p $port somehost true 2>/dev/null ; then
16 if ${SSH} -F $OBJ/ssh_proxy -p $port somehost true 2>/dev/null ; then
Dcfgmatch.sh16 ${SSH} -q -$p $fwd "$@" somehost \
124 ${SSH} -q -$p -p $fwdport -F $OBJ/ssh_config somehost true || \
Dtransfer.sh12 ${SSH} -n -q -$p -F $OBJ/ssh_proxy somehost cat ${DATA} > ${COPY}
22 ${SSH} -q -$p -F $OBJ/ssh_proxy somehost "cat > ${COPY}"
/external/ganymed-ssh2/
DREADME.txt2 Ganymed SSH-2 for Java - build 251 beta1
7 Ganymed SSH-2 for Java is a library which implements the SSH-2 protocol in pure Java
8 (tested on J2SE 1.4.2, 5 and 6). It allows one to connect to SSH servers from within
9 Java programs. It supports SSH sessions (remote command execution and shell access),
13 Ganymed SSH-2 for Java was originally developed for the Ganymed replication project
/external/openssh/contrib/suse/
Dsysconfig.ssh1 ## Path: Network/Remote access/SSH
2 ## Description: SSH server settings
/external/openssh/
Dssh-keysign.01 SSH-KEYSIGN(8) OpenBSD System Manager's Manual SSH-KEYSIGN(8)
11 the digital signature required during host-based authentication with SSH
Dssh-pkcs11-helper.01 SSH-PKCS11-HELPER(8) OpenBSD System Manager's Manual SSH-PKCS11-HELPER(8)
/external/dropbear/debian/
Dcontrol13 dropbear is a SSH 2 server and client designed to be small enough to
17 It implements most required features of the SSH 2 protocol, and other
/external/openssh/contrib/
DREADME7 SSH Proxy Command -- connect.c
10 which allows the use of outbound SSH from behind a SOCKS4, SOCKS5 or
17 X11 SSH Askpass:

1234