Lines Matching refs:OBJ

16 OBJ=$1
17 if [ "x$OBJ" = "x" ]; then
21 if [ ! -d $OBJ ]; then
22 echo "not a directory: $OBJ"
112 NC=$OBJ/netcat
200 rm -rf $OBJ/valgrind-out $OBJ/valgrind-vgdb
201 mkdir -p $OBJ/valgrind-out $OBJ/valgrind-vgdb
204 chmod 777 $OBJ/valgrind-out $OBJ/valgrind-vgdb
224 VG_LOG="$OBJ/valgrind-out/${VG_TEST}."
228 VG_OPTS="$VG_OPTS --vgdb-prefix=$OBJ/valgrind-vgdb/"
242 cat > $OBJ/valgrind-sftp-server.sh << EOF
246 chmod a+rx $OBJ/valgrind-sftp-server.sh
247 SFTPSERVER="$OBJ/valgrind-sftp-server.sh"
258 TEST_SSH_LOGDIR=$OBJ/log
262 TEST_SSH_LOGFILE=$OBJ/ssh.log
265 TEST_SSHD_LOGFILE=$OBJ/sshd.log
268 TEST_REGRESS_LOGFILE=$OBJ/regress.log
307 SSHLOGWRAP=$OBJ/ssh-log-wrapper.sh
310 timestamp="\`$OBJ/timestamp\`"
320 chmod a+rx $OBJ/ssh-log-wrapper.sh
325 SSHDLOGWRAP=$OBJ/sshd-log-wrapper.sh
328 timestamp="\`$OBJ/timestamp\`"
338 chmod a+rx $OBJ/sshd-log-wrapper.sh
343 timestamp="`$OBJ/timestamp`"
354 DATA=$OBJ/${DATANAME}
357 COPY=$OBJ/copy
452 SSH_REGRESS_TMP="$($OBJ/mkdtemp openssh-XXXXXXXX)" || \
519 tarname="$OBJ/failed-$testname-logs.tar"
531 (cat $TEST_REGRESS_LOGFILE; echo) >>$OBJ/failed-regress.log
532 (cat $TEST_SSH_LOGFILE; echo) >>$OBJ/failed-ssh.log
533 (cat $TEST_SSHD_LOGFILE; echo) >>$OBJ/failed-sshd.log
536 (cd $OBJ &&
600 echo " SetEnv PATH='$PATH_WITH_SCP'" >>$OBJ/sshd_config
601 echo " SetEnv PATH='$PATH_WITH_SCP'" >>$OBJ/sshd_proxy ;;
606 PIDFILE=$OBJ/pidfile
611 cat << EOF > $OBJ/sshd_config
618 AuthorizedKeysFile $OBJ/authorized_keys_%u
631 echo " StrictModes no" >> $OBJ/sshd_config
635 dir="${OBJ}"
661 echo " ModuliFile '$TEST_SSH_MODULI_FILE'" >> $OBJ/sshd_config
666 echo "$TEST_SSH_SSHD_CONFOPTS" >> $OBJ/sshd_config
670 cp $OBJ/sshd_config $OBJ/sshd_proxy
673 echo 'StrictModes no' >> $OBJ/sshd_proxy
676 cat << EOF > $OBJ/ssh_config
682 GlobalKnownHostsFile $OBJ/known_hosts
683 UserKnownHostsFile $OBJ/known_hosts
694 echo "$TEST_SSH_SSH_CONFOPTS" >> $OBJ/ssh_config
697 rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER
704 elif [ -f "${OBJ}/misc/sk-dummy/sk-dummy.so" ] ; then
705 SSH_SK_PROVIDER="${OBJ}/misc/sk-dummy/sk-dummy.so"
713 echo "SecurityKeyProvider $SSH_SK_PROVIDER" >> $OBJ/ssh_config
714 echo "SecurityKeyProvider $SSH_SK_PROVIDER" >> $OBJ/sshd_config
715 echo "SecurityKeyProvider $SSH_SK_PROVIDER" >> $OBJ/sshd_proxy
732 if [ ! -f $OBJ/$t ] || [ ${SSHKEYGEN_BIN} -nt $OBJ/$t ]; then
734 rm -f $OBJ/$t
735 ${SSHKEYGEN} -q -N '' -t $t -f $OBJ/$t ||\
742 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
743 echo IdentityFile $OBJ/$t >> $OBJ/ssh_config
750 cat $OBJ/$t.pub
751 ) >> $OBJ/known_hosts
754 (umask 077; $SUDO cp $OBJ/$t $OBJ/host.$t)
755 echo HostKey $OBJ/host.$t >> $OBJ/sshd_config
758 echo HostKey $OBJ/$t >> $OBJ/sshd_proxy
760 chmod 644 $OBJ/authorized_keys_$USER
785 mkdir -p ${OBJ}/.putty
788 rm -f ${OBJ}/putty.rsa2
789 if ! "$PUTTYGEN" -t rsa -o ${OBJ}/putty.rsa2 \
795 "$PUTTYGEN" -O public-openssh ${OBJ}/putty.rsa2 \
796 >> $OBJ/authorized_keys_$USER
799 cp $OBJ/ssh-rsa $OBJ/ssh-rsa_oldfmt
800 ${SSHKEYGEN} -p -N '' -m PEM -f $OBJ/ssh-rsa_oldfmt >/dev/null
801 ${SRC}/ssh2putty.sh 127.0.0.1 $PORT $OBJ/ssh-rsa_oldfmt > \
802 ${OBJ}/.putty/sshhostkeys
803 ${SRC}/ssh2putty.sh 127.0.0.1 22 $OBJ/ssh-rsa_oldfmt >> \
804 ${OBJ}/.putty/sshhostkeys
805 rm -f $OBJ/ssh-rsa_oldfmt
808 mkdir -p ${OBJ}/.putty/sessions
809 rm -f ${OBJ}/.putty/sessions/localhost_proxy
810 echo "Protocol=ssh" >> ${OBJ}/.putty/sessions/localhost_proxy
811 echo "HostName=127.0.0.1" >> ${OBJ}/.putty/sessions/localhost_proxy
812 echo "PortNumber=$PORT" >> ${OBJ}/.putty/sessions/localhost_proxy
813 echo "ProxyMethod=5" >> ${OBJ}/.putty/sessions/localhost_proxy
814 …echo "ProxyTelnetCommand=${OBJ}/sshd-log-wrapper.sh -i -f $OBJ/sshd_proxy" >> ${OBJ}/.putty/sessio…
815 echo "ProxyLocalhost=1" >> ${OBJ}/.putty/sessions/localhost_proxy
825 echo "HostKeyAlgorithms +ssh-rsa" >> ${OBJ}/sshd_proxy
826 echo "PubkeyAcceptedKeyTypes +ssh-rsa" >> ${OBJ}/sshd_proxy
831 >>${OBJ}/sshd_proxy
833 PUTTYDIR=${OBJ}/.putty
848 mkdir -p $OBJ/.dropbear
854 rm -f "$OBJ/.dropbear/id_$i"
858 if [ ! -f "$OBJ/.dropbear/id_$i" ]; then
860 $DROPBEARKEY -t $i -f $OBJ/.dropbear/id_$i \
863 $DROPBEARCONVERT dropbear openssh $OBJ/.dropbear/id_$i \
864 $OBJ/.dropbear/ossh.id_$i >/dev/null 2>&1
865 $SSHKEYGEN -y -f $OBJ/.dropbear/ossh.id_$i \
866 >>$OBJ/authorized_keys_$USER
867 rm -f $OBJ/.dropbear/id_$i.pub $OBJ/.dropbear/ossh.id_$i
873 cat $OBJ/ssh_config
874 …roxycommand ${SUDO} env SSH_SK_HELPER=\"$SSH_SK_HELPER\" ${OBJ}/sshd-log-wrapper.sh -i -f $OBJ/ssh…
875 ) > $OBJ/ssh_proxy
878 ${SSHD} -t -f $OBJ/sshd_proxy || fatal "sshd_proxy broken"
881 echo '#!/bin/sh' >$OBJ/ssh_proxy.sh
882 awk '/^proxycommand/' $OBJ/ssh_proxy | sed 's/^proxycommand//' \
883 >>$OBJ/ssh_proxy.sh
884 chmod a+x $OBJ/ssh_proxy.sh
888 PIDFILE=$OBJ/pidfile
890 logfile="${TEST_SSH_LOGDIR}/sshd.`$OBJ/timestamp`.$$.log"
891 $SUDO ${SSHD} -f $OBJ/sshd_config "$@" -t || fatal "sshd_config broken"
893 ${SSHD} -f $OBJ/sshd_config "$@" -E$TEST_SSHD_LOGFILE
936 SSH_SOFTHSM_DIR=$OBJ/SOFTHSM