Home
last modified time | relevance | path

Searched refs:SSH (Results 1 – 25 of 127) sorted by relevance

123456

/external/openssh/regress/
Dforwarding.sh32 ${SSH} -S $CTL -M -$p -F $OBJ/ssh_config -f $fwd somehost sleep 10
35 ${SSH} -$q -F $OBJ/ssh_config -p$last -o 'ConnectionAttempts=4' \
40 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost
48 ${SSH} -$p -F $OBJ/ssh_config \
58 ${SSH} -q -$p -F $OBJ/ssh_config \
75 ${SSH} -$p -F $OBJ/ssh_config -oClearAllForwardings=yes somehost true
79 ${SSH} -S $CTL -M -$p -f -F $OBJ/ssh_config -L ${base}01:127.0.0.1:$PORT \
85 ${SSH} -$p -F $OBJ/ssh_config -p ${base}01 somehost true \
89 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost
93 ${SSH} -S $CTL -M -$p -f -F $OBJ/ssh_config -R ${base}01:127.0.0.1:$PORT \
[all …]
Dlimit-keytype.sh57 ${SSH} $certopts proxy true || fatal "cert failed"
58 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
59 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
64 ${SSH} $certopts proxy true && fatal "cert succeeded"
65 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
66 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
71 ${SSH} $certopts proxy true && fatal "cert succeeded"
72 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
73 ${SSH} $opts -i $OBJ/user_key2 proxy true && fatal "key2 succeeded"
78 ${SSH} $certopts proxy true || fatal "cert failed"
[all …]
Dsshcfgparse.sh7 (${SSH} -G -F $OBJ/ssh_config somehost >$OBJ/ssh_config.1 &&
8 ${SSH} -G -F $OBJ/ssh_config.1 somehost >$OBJ/ssh_config.2 &&
12 f=`${SSH} -GF $OBJ/ssh_config host | awk '/exitonforwardfailure/{print $2}'`
14 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/exitonforwardfailure/{print $2}'`
16 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o exitonforwardfailure=no h | \
20 f=`${SSH} -GF $OBJ/ssh_config host | awk '/clearallforwardings/{print $2}'`
22 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/clearallforwardings/{print $2}'`
24 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o clearallforwardings=no h | \
Dmultiplex.sh21 ${SSH} -F $OBJ/ssh_config -S $CTL -Ocheck otherhost \
33 ${SSH} -Nn2 -MS$CTL -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" somehost \
44 _XXX_TEST=blah ${SSH} -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" -S$CTL otherhost sh << 'EOF'
54 ${SSH} -F $OBJ/ssh_config -S$CTL otherhost cat ${DATA} > ${COPY}
60 ${SSH} -F $OBJ/ssh_config -S $CTL otherhost cat ${DATA} > ${COPY}
67 ${SFTP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost >>$TEST_REGRESS_LOGFILE 2>&1
73 ${SCP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost:${DATA} ${COPY} >>$TEST_REGRESS_LO…
82 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L127.0.0.1:$((${PORT} + 2)):127.0.0.1:$((${PORT} + 1))…
91 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L$OBJ/unix-2.fwd:$OBJ/unix-1.fwd otherhost >>$TEST_SSH…
92 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -R$OBJ/unix-3.fwd:$OBJ/unix-2.fwd otherhost >>$TEST_SSH…
[all …]
Dcert-userkey.sh10 PLAIN_TYPES=`$SSH -Q key-plain | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'`
70 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
79 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
88 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
97 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
106 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
116 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
127 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
151 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
163 ${SSH} -2i $OBJ/cert_user_key_${ktype} \
[all …]
Drekey.sh24 ${SSH} <${DATA} $_opts -v -F $OBJ/ssh_proxy somehost "cat > ${COPY}"
40 for i in `${SSH} -Q kex`; do
43 for i in `${SSH} -Q cipher`; do
46 for i in `${SSH} -Q mac`; do
56 if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then
57 for c in `${SSH} -Q cipher-auth`; do
58 for kex in `${SSH} -Q kex`; do
73 ${SSH} < ${DATA} -oCompression=no -oRekeyLimit="default $s" -F \
90 ${SSH} -oCompression=no -oRekeyLimit="default $s" -F \
108 ${SSH} -oCompression=no -F $OBJ/ssh_proxy somehost "cat ${DATA}" \
[all …]
Dcert-file.sh60 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \
66 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \
73 ${SSH} $opts2 somehost exit 5$p
82 ${SSH} $opts3 somehost exit 5$p
92 ${SSH} $opts3 somehost exit 5$p
101 ${SSH} $opts3 somehost exit 5$p
111 ${SSH} $opts3 somehost exit 5$p
145 ${SSH} -2 $opts somehost exit 52
152 ${SSH} -2 $opts somehost exit 52
159 ${SSH} -2 $opts somehost exit 52
Dkey-options.sh15 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost echo foo`
29 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost tty`
40 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost 'echo $FOO'`
51 ${SSH} -$p -q -F $OBJ/ssh_proxy somehost true
59 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost 'echo true'`
64 r=`${SSH} -$p -q -F $OBJ/ssh_config somehost 'echo true'`
Dtry-ciphers.sh8 for c in `${SSH} -Q cipher`; do
10 for m in `${SSH} -Q mac`; do
16 ${SSH} -F $OBJ/ssh_proxy -2 -m $m -c $c somehost true
22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
37 ${SSH} -F $OBJ/ssh_proxy -1 -c $c somehost true
Dprincipals-command.sh81 ${SSH} -2i $OBJ/cert_user_key \
90 ${SSH} -2i $OBJ/cert_user_key \
99 ${SSH} -2i $OBJ/cert_user_key \
108 ${SSH} -2i $OBJ/cert_user_key \
118 ${SSH} -2i $OBJ/cert_user_key \
128 ${SSH} -2i $OBJ/cert_user_key \
147 ${SSH} -2i $OBJ/cert_user_key \
159 ${SSH} -2i $OBJ/cert_user_key \
Ddhgex.sh10 kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange`
27 ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true
56 check 3072 `${SSH} -Q cipher | grep 128`
58 check 7680 `${SSH} -Q cipher | grep 192`
59 check 8192 `${SSH} -Q cipher | grep 256`
Dlogin-timeout.sh13 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 &
15 ${SSH} -F $OBJ/ssh_config somehost true
27 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 &
29 ${SSH} -F $OBJ/ssh_config somehost true
Denvpass.sh17 _TEST_ENV=blah ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass otherhost \
28 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -F $OBJ/ssh_proxy_envpass otherhost \
39 _XXX_TEST=blah ${SSH} -oSendEnv="_XXX_TEST" -F $OBJ/ssh_proxy_envpass \
50 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -oSendEnv="_XXX_TEST_*" \
Dcipher-speed.sh14 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do
18 ( ${SSH} -o 'compression no' \
Dproto-version.sh13 SSH-1.99-*)
16 SSH-2.0-*)
19 SSH-1.5-*)
Dagent.sh50 ${SSH} -$p -F $OBJ/ssh_proxy somehost exit 5$p
59 ${SSH} -A -$p -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
64 ${SSH} -A -$p -F $OBJ/ssh_proxy somehost \
65 "${SSH} -$p -F $OBJ/ssh_proxy somehost exit 5$p"
Dkextype.sh11 ALLKEX=`${SSH} -Q kex`
16 for k in `${SSH} -Q kex`; do
19 ${SSH} -F $OBJ/ssh_proxy -o KexAlgorithms=$k x true
Dintegrity.sh10 macs=`${SSH} -Q mac`
13 macs="$macs `${SSH} -Q cipher-auth`"
40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
49 ${SSH} $macopt -2F $OBJ/ssh_proxy -o "$pxy" \
Dconnect-privsep.sh10 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
20 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
36 env MALLOC_OPTIONS="$m" ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
Dmultipubkey.sh47 ${SSH} $opts proxy true && fail "ssh succeeded with key"
52 ${SSH} $opts proxy true && fail "ssh succeeded with key+cert"
58 ${SSH} $opts proxy true || fail "ssh failed with multiple keys"
64 ${SSH} $opts proxy true || fail "ssh failed with key/cert"
Dtest-exec.sh69 SSH=ssh
85 SSH="${TEST_SSH_SSH}"
151 SSH_BIN=${SSH}
182 SSH="$VG --log-file=${VG_LOG}ssh.%p $SSH"
222 echo "exec ${SSH} -E${TEST_SSH_LOGFILE} "'"$@"' >>$SSHLOGWRAP
225 REAL_SSH="$SSH"
226 SSH="$SSHLOGWRAP"
247 export SSH SSHD SSHAGENT SSHADD SSHKEYGEN SSHKEYSCAN SFTP SFTPSERVER SCP
Dbanner.sh12 ( ${SSH} -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \
33 ( ${SSH} -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \
40 ( ${SSH} -q -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \
Dforcecommand.sh16 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
31 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
42 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
Dcert-hostkey.sh11 for i in `$SSH -Q key`; do
62 PLAIN_TYPES=`$SSH -Q key-plain | sed 's/^ssh-dss/ssh-dsa/g;s/^ssh-//'`
107 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
172 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
193 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
225 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
274 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
306 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
/external/syslinux/core/lwip/doc/
Dsavannah.txt6 2 - Committers/developers CVS access using SSH (to be written)
28 3 Committers/developers CVS access using SSH
31 The Savannah server uses SSH (Secure Shell) protocol 2 authentication and encryption.
32 As such, CVS commits to the server occur through a SSH tunnel for project members.
37 Under Windows, a recommended SSH client is "PuTTY", freely available with good
43 Try to login using SSH:
53 are allowed to use SSH for CVS only. Now, you should be able to do this:
62 (If SSH asks about authenticity of the host, you can check the key

123456