Searched refs:SSH (Results 1 – 25 of 127) sorted by relevance
123456
32 ${SSH} -S $CTL -M -$p -F $OBJ/ssh_config -f $fwd somehost sleep 1035 ${SSH} -$q -F $OBJ/ssh_config -p$last -o 'ConnectionAttempts=4' \40 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost48 ${SSH} -$p -F $OBJ/ssh_config \58 ${SSH} -q -$p -F $OBJ/ssh_config \75 ${SSH} -$p -F $OBJ/ssh_config -oClearAllForwardings=yes somehost true79 ${SSH} -S $CTL -M -$p -f -F $OBJ/ssh_config -L ${base}01:127.0.0.1:$PORT \85 ${SSH} -$p -F $OBJ/ssh_config -p ${base}01 somehost true \89 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost93 ${SSH} -S $CTL -M -$p -f -F $OBJ/ssh_config -R ${base}01:127.0.0.1:$PORT \[all …]
57 ${SSH} $certopts proxy true || fatal "cert failed"58 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"59 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"64 ${SSH} $certopts proxy true && fatal "cert succeeded"65 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"66 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"71 ${SSH} $certopts proxy true && fatal "cert succeeded"72 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"73 ${SSH} $opts -i $OBJ/user_key2 proxy true && fatal "key2 succeeded"78 ${SSH} $certopts proxy true || fatal "cert failed"[all …]
7 (${SSH} -G -F $OBJ/ssh_config somehost >$OBJ/ssh_config.1 &&8 ${SSH} -G -F $OBJ/ssh_config.1 somehost >$OBJ/ssh_config.2 &&12 f=`${SSH} -GF $OBJ/ssh_config host | awk '/exitonforwardfailure/{print $2}'`14 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/exitonforwardfailure/{print $2}'`16 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o exitonforwardfailure=no h | \20 f=`${SSH} -GF $OBJ/ssh_config host | awk '/clearallforwardings/{print $2}'`22 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/clearallforwardings/{print $2}'`24 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o clearallforwardings=no h | \
21 ${SSH} -F $OBJ/ssh_config -S $CTL -Ocheck otherhost \33 ${SSH} -Nn2 -MS$CTL -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" somehost \44 _XXX_TEST=blah ${SSH} -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" -S$CTL otherhost sh << 'EOF'54 ${SSH} -F $OBJ/ssh_config -S$CTL otherhost cat ${DATA} > ${COPY}60 ${SSH} -F $OBJ/ssh_config -S $CTL otherhost cat ${DATA} > ${COPY}67 ${SFTP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost >>$TEST_REGRESS_LOGFILE 2>&173 ${SCP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost:${DATA} ${COPY} >>$TEST_REGRESS_LO…82 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L127.0.0.1:$((${PORT} + 2)):127.0.0.1:$((${PORT} + 1))…91 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L$OBJ/unix-2.fwd:$OBJ/unix-1.fwd otherhost >>$TEST_SSH…92 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -R$OBJ/unix-3.fwd:$OBJ/unix-2.fwd otherhost >>$TEST_SSH…[all …]
10 PLAIN_TYPES=`$SSH -Q key-plain | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'`70 ${SSH} -2i $OBJ/cert_user_key_${ktype} \79 ${SSH} -2i $OBJ/cert_user_key_${ktype} \88 ${SSH} -2i $OBJ/cert_user_key_${ktype} \97 ${SSH} -2i $OBJ/cert_user_key_${ktype} \106 ${SSH} -2i $OBJ/cert_user_key_${ktype} \116 ${SSH} -2i $OBJ/cert_user_key_${ktype} \127 ${SSH} -2i $OBJ/cert_user_key_${ktype} \151 ${SSH} -2i $OBJ/cert_user_key_${ktype} \163 ${SSH} -2i $OBJ/cert_user_key_${ktype} \[all …]
24 ${SSH} <${DATA} $_opts -v -F $OBJ/ssh_proxy somehost "cat > ${COPY}"40 for i in `${SSH} -Q kex`; do43 for i in `${SSH} -Q cipher`; do46 for i in `${SSH} -Q mac`; do56 if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then57 for c in `${SSH} -Q cipher-auth`; do58 for kex in `${SSH} -Q kex`; do73 ${SSH} < ${DATA} -oCompression=no -oRekeyLimit="default $s" -F \90 ${SSH} -oCompression=no -oRekeyLimit="default $s" -F \108 ${SSH} -oCompression=no -F $OBJ/ssh_proxy somehost "cat ${DATA}" \[all …]
60 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \66 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \73 ${SSH} $opts2 somehost exit 5$p82 ${SSH} $opts3 somehost exit 5$p92 ${SSH} $opts3 somehost exit 5$p101 ${SSH} $opts3 somehost exit 5$p111 ${SSH} $opts3 somehost exit 5$p145 ${SSH} -2 $opts somehost exit 52152 ${SSH} -2 $opts somehost exit 52159 ${SSH} -2 $opts somehost exit 52
15 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost echo foo`29 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost tty`40 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost 'echo $FOO'`51 ${SSH} -$p -q -F $OBJ/ssh_proxy somehost true59 r=`${SSH} -$p -q -F $OBJ/ssh_proxy somehost 'echo true'`64 r=`${SSH} -$p -q -F $OBJ/ssh_config somehost 'echo true'`
8 for c in `${SSH} -Q cipher`; do10 for m in `${SSH} -Q mac`; do16 ${SSH} -F $OBJ/ssh_proxy -2 -m $m -c $c somehost true22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then37 ${SSH} -F $OBJ/ssh_proxy -1 -c $c somehost true
81 ${SSH} -2i $OBJ/cert_user_key \90 ${SSH} -2i $OBJ/cert_user_key \99 ${SSH} -2i $OBJ/cert_user_key \108 ${SSH} -2i $OBJ/cert_user_key \118 ${SSH} -2i $OBJ/cert_user_key \128 ${SSH} -2i $OBJ/cert_user_key \147 ${SSH} -2i $OBJ/cert_user_key \159 ${SSH} -2i $OBJ/cert_user_key \
10 kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange`27 ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true56 check 3072 `${SSH} -Q cipher | grep 128`58 check 7680 `${SSH} -Q cipher | grep 192`59 check 8192 `${SSH} -Q cipher | grep 256`
13 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 & 15 ${SSH} -F $OBJ/ssh_config somehost true27 (echo SSH-2.0-fake; sleep 60) | telnet 127.0.0.1 ${PORT} >/dev/null 2>&1 & 29 ${SSH} -F $OBJ/ssh_config somehost true
17 _TEST_ENV=blah ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass otherhost \28 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -F $OBJ/ssh_proxy_envpass otherhost \39 _XXX_TEST=blah ${SSH} -oSendEnv="_XXX_TEST" -F $OBJ/ssh_proxy_envpass \50 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -oSendEnv="_XXX_TEST_*" \
14 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do18 ( ${SSH} -o 'compression no' \
13 SSH-1.99-*)16 SSH-2.0-*)19 SSH-1.5-*)
50 ${SSH} -$p -F $OBJ/ssh_proxy somehost exit 5$p59 ${SSH} -A -$p -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&164 ${SSH} -A -$p -F $OBJ/ssh_proxy somehost \65 "${SSH} -$p -F $OBJ/ssh_proxy somehost exit 5$p"
11 ALLKEX=`${SSH} -Q kex`16 for k in `${SSH} -Q kex`; do19 ${SSH} -F $OBJ/ssh_proxy -o KexAlgorithms=$k x true
10 macs=`${SSH} -Q mac`13 macs="$macs `${SSH} -Q cipher-auth`"40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then49 ${SSH} $macopt -2F $OBJ/ssh_proxy -o "$pxy" \
10 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true20 ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true36 env MALLOC_OPTIONS="$m" ${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
47 ${SSH} $opts proxy true && fail "ssh succeeded with key"52 ${SSH} $opts proxy true && fail "ssh succeeded with key+cert"58 ${SSH} $opts proxy true || fail "ssh failed with multiple keys"64 ${SSH} $opts proxy true || fail "ssh failed with key/cert"
69 SSH=ssh85 SSH="${TEST_SSH_SSH}"151 SSH_BIN=${SSH}182 SSH="$VG --log-file=${VG_LOG}ssh.%p $SSH"222 echo "exec ${SSH} -E${TEST_SSH_LOGFILE} "'"$@"' >>$SSHLOGWRAP225 REAL_SSH="$SSH"226 SSH="$SSHLOGWRAP"247 export SSH SSHD SSHAGENT SSHADD SSHKEYGEN SSHKEYSCAN SFTP SFTPSERVER SCP
12 ( ${SSH} -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \33 ( ${SSH} -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \40 ( ${SSH} -q -2 -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \
16 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||31 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||42 ${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
11 for i in `$SSH -Q key`; do62 PLAIN_TYPES=`$SSH -Q key-plain | sed 's/^ssh-dss/ssh-dsa/g;s/^ssh-//'`107 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \172 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \193 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \225 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \274 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \306 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
6 2 - Committers/developers CVS access using SSH (to be written)28 3 Committers/developers CVS access using SSH31 The Savannah server uses SSH (Secure Shell) protocol 2 authentication and encryption.32 As such, CVS commits to the server occur through a SSH tunnel for project members.37 Under Windows, a recommended SSH client is "PuTTY", freely available with good43 Try to login using SSH:53 are allowed to use SSH for CVS only. Now, you should be able to do this:62 (If SSH asks about authenticity of the host, you can check the key