/freebsd/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 6 rm -f $OBJ/known_hosts-cert* $OBJ/host_ca_key* $OBJ/host_revoked_* 7 rm -f $OBJ/cert_host_key* $OBJ/host_krl_* 33 ) >> $OBJ/ssh_proxy 34 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak 38 ) >> $OBJ/sshd_proxy_bak 45 cat $OBJ/$k || fatal "couldn't cat $k" 51 cat $OBJ/$k || fatal "couldn't cat $k" 59 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/host_ca_key ||\ 61 ${SSHKEYGEN} -q -N '' -t $ktype2 -f $OBJ/host_ca_key2 ||\ 64 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig [all …]
|
H A D | agent-pkcs11-restrict.sh | 8 rm -f $SSH_AUTH_SOCK $OBJ/agent.log $OBJ/host_[abcx]* $OBJ/user_[abcx]* 9 rm -f $OBJ/sshd_proxy_host* $OBJ/ssh_output* $OBJ/expect_* 10 rm -f $OBJ/ssh_proxy[._]* $OBJ/command $OBJ/authorized_keys_* 14 $SSHKEYGEN -q -t ed25519 -C host_$h -N '' -f $OBJ/host_$h || \ 29 SSH_AUTH_SOCK="$OBJ/agent.sock" 33 ${SSHAGENT} ${EXTRA_AGENT_ARGS} -d -a $SSH_AUTH_SOCK > $OBJ/agent.log 2>&1 & 52 $OBJ/ssh_proxy > $OBJ/ssh_proxy.bak 53 cat << _EOF > $OBJ/ssh_proxy 58 cp $OBJ/ssh_proxy $OBJ/ssh_proxy_noid 61 cat << _EOF >> $OBJ/ssh_proxy [all …]
|
H A D | cert-userkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 7 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak 8 cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak 40 ${SSHKEYGEN} -q -N '' -t $catype -f $OBJ/user_ca_key ||\ 47 -f $OBJ/cert_user_key_${ktype} || \ 54 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -z $$ \ 56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 66 rm -f $OBJ/authorized_keys_$USER 68 cat $OBJ/sshd_proxy_bak 70 "$OBJ/authorized_principals_%u" [all …]
|
H A D | agent-restrict.sh | 6 SSH_AUTH_SOCK="$OBJ/agent.sock" 8 rm -f $SSH_AUTH_SOCK $OBJ/agent.log $OBJ/host_[abcdex]* $OBJ/user_[abcdex]* 9 rm -f $OBJ/sshd_proxy_host* $OBJ/ssh_output* $OBJ/expect_* 10 rm -f $OBJ/ssh_proxy[._]* $OBJ/command 14 $SSHKEYGEN -q -t ed25519 -C host_$h -N '' -f $OBJ/host_$h || \ 16 $SSHKEYGEN -q -t ed25519 -C user_$h -N '' -f $OBJ/user_$h || \ 23 $SSHKEYGEN -q -s $OBJ/host_ca -I $id -n $id -h $OBJ/host_${h}.pub || \ 29 $OBJ/ssh_proxy > $OBJ/ssh_proxy.bak 30 cat << _EOF > $OBJ/ssh_proxy 35 cp $OBJ/ssh_proxy $OBJ/ssh_proxy_noid [all …]
|
H A D | keygen-knownhosts.sh | 6 rm -f $OBJ/kh.* 10 ${SSHKEYGEN} -qt ed25519 -f $OBJ/kh.$x -C "$x" -N "" || \ 13 echo "# $x" >> $OBJ/kh.hosts 24 cat $OBJ/kh.${x}.pub 26 echo "" >> $OBJ/kh.hosts 27 ) >> $OBJ/kh.hosts 33 cat $OBJ/kh.hosts >> $OBJ/kh.invalid 34 echo "host-i " >> $OBJ/kh.invalid 36 cp $OBJ/kh.invalid $OBJ/kh.invalid.orig 37 cp $OBJ/kh.hosts $OBJ/kh.hosts.orig [all …]
|
H A D | multipubkey.sh | 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 9 mv $OBJ/sshd_proxy $OBJ/sshd_proxy.orig 10 mv $OBJ/ssh_proxy $OBJ/ssh_proxy.orig 13 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_ca_key ||\ 17 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_key1 || \ 19 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_key2 || \ 21 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "regress user key for $USER" \ 22 -z $$ -n ${USER},mekmitasdigoat $OBJ/user_key1 || 26 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1.pub [all …]
|
H A D | cert-file.sh | 6 rm -f $OBJ/user_ca_key* $OBJ/user_key* 7 rm -f $OBJ/cert_user_key* 10 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_ca_key1 ||\ 12 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_ca_key2 ||\ 16 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_key1 || \ 18 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_key2 || \ 20 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_key3 || \ 22 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_key4 || \ 24 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_key5 || \ 29 ${SSHKEYGEN} -q -s $OBJ/user_ca_key1 -I "regress user key for $USER" \ [all …]
|
H A D | forcecommand.sh | 6 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak 10 cp /dev/null $OBJ/authorized_keys_$USER 13 printf "command=\"$cmd\" " >>$OBJ/authorized_keys_$USER 14 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER 20 rm -f $OBJ/ssh_proxy.tmp 21 echo "@get $OBJ/ssh_proxy $OBJ/ssh_proxy.tmp" | \ 22 ${SFTP} -S ${SSH} -b - -qF $OBJ/ssh_proxy somehost 2>/dev/null || \ 24 test -f "$OBJ/ssh_proxy.tmp" || fail "sftp did not download file" 25 rm -f $OBJ/ssh_proxy.tmp 29 ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command in key option" [all …]
|
H A D | principals-command.sh | 6 rm -f $OBJ/user_ca_key* $OBJ/cert_user_key* 7 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak 21 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_ca_key || \ 23 ${SSHKEYGEN} -q -N '' -t ${userkeytype} -f $OBJ/cert_user_key || \ 25 ${SSHKEYGEN} -q -s $OBJ/user_ca_key -I "Joanne User" \ 26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key || \ 29 CERT_BODY=`cat $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'` 30 CA_BODY=`cat $OBJ/user_ca_key.pub | awk '{ print $2 }'` 31 CERT_FP=`${SSHKEYGEN} -lf $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'` 32 CA_FP=`${SSHKEYGEN} -lf $OBJ/user_ca_key.pub | awk '{ print $2 }'` [all …]
|
H A D | channel-timeout.sh | 8 rm -f $OBJ/finished.* $OBJ/mux.* 10 MUXPATH=$OBJ/mux.$$ 12 ${SSH} -nNfM -oControlPath=$MUXPATH -F $OBJ/ssh_proxy "$@" somehost || 19 ${SSH} -qF $OBJ/ssh_proxy -oControlPath=$MUXPATH -O exit somehost || 22 test -e $OBJ/mux && break 28 ${SSH} -F $OBJ/ssh_proxy -oControlPath=$MUXPATH somehost "$@" 31 rm -f $OBJ/sshd_proxy.orig 32 cp $OBJ/sshd_proxy $OBJ/sshd_proxy.orig 35 ${SSH} -F $OBJ/ssh_proxy somehost "sleep 5 ; exit 23" 42 (cat $OBJ/sshd_proxy.orig ; echo "ChannelTimeout session:command=1") \ [all …]
|
H A D | limit-keytype.sh | 8 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/user_key* 9 rm -f $OBJ/authorized_principals_$USER $OBJ/cert_user_key* 11 mv $OBJ/sshd_proxy $OBJ/sshd_proxy.orig 12 mv $OBJ/ssh_proxy $OBJ/ssh_proxy.orig 27 ${SSHKEYGEN} -q -N '' -t $ktype1 -f $OBJ/user_ca_key ||\ 31 ${SSHKEYGEN} -q -N '' -t $ktype1 -f $OBJ/user_key1 || \ 33 ${SSHKEYGEN} -q -N '' -t $ktype2 -f $OBJ/user_key2 || \ 35 ${SSHKEYGEN} -q -N '' -t $ktype2 -f $OBJ/user_key3 || \ 37 ${SSHKEYGEN} -q -N '' -t $ktype4 -f $OBJ/user_key4 || \ 39 ${SSHKEYGEN} -q -N '' -t $ktype5 -f $OBJ/user_key5 || \ [all …]
|
H A D | hostkey-agent.sh | 6 rm -f $OBJ/agent-key.* $OBJ/ssh_proxy.orig $OBJ/known_hosts.orig $OBJ/agent-ca* 13 grep -vi 'hostkey' $OBJ/sshd_proxy > $OBJ/sshd_proxy.orig 14 echo "HostKeyAgent $SSH_AUTH_SOCK" >> $OBJ/sshd_proxy.orig 18 ${SSHKEYGEN} -qt ed25519 -f $OBJ/agent-ca -N '' || fatal "ssh-keygen CA" 22 ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k" 23 ${SSHKEYGEN} -s $OBJ/agent-ca -qh -n localhost-with-alias \ 24 -I localhost-with-alias $OBJ/agent-key.$k.pub || \ 26 ${SSHADD} -k $OBJ/agent-key.$k >/dev/null 2>&1 || \ 27 fatal "couldn't load key $OBJ/agent-key.$k" 29 rm $OBJ/agent-key.$k || fatal "couldn't rm $OBJ/agent-key.$k" [all …]
|
H A D | test-exec.sh | 16 OBJ=$1 17 if [ "x$OBJ" = "x" ]; then 21 if [ ! -d $OBJ ]; then 22 echo "not a directory: $OBJ" 111 NC=$OBJ/netcat 196 rm -rf $OBJ/valgrind-out $OBJ/valgrind-vgdb 197 mkdir -p $OBJ/valgrind-out $OBJ/valgrind-vgdb 200 chmod 777 $OBJ/valgrind-out $OBJ/valgrind-vgdb 220 VG_LOG="$OBJ/valgrind-out/${VG_TEST}." 224 VG_OPTS="$VG_OPTS --vgdb-prefix=$OBJ/valgrind-vgdb/" [all …]
|
H A D | cfgmatchlisten.sh | 6 pidfile=$OBJ/remote_pid 11 echo "ExitOnForwardFailure=yes" >> $OBJ/ssh_config 12 echo "ExitOnForwardFailure=yes" >> $OBJ/ssh_proxy 142 expect_client_ok -F $OBJ/ssh_proxy 143 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \ 152 cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy 153 echo "PermitListen 127.0.0.1:1 $fwdspec 127.0.0.2:2" >>$OBJ/sshd_proxy 154 cp /dev/null $OBJ/authorized_keys_$USER 156 printf 'permitlisten="'$fwdspec'" ' >> $OBJ/authorized_keys_$USER 157 cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER [all …]
|
H A D | banner.sh | 5 echo "Banner $OBJ/banner.in" >> $OBJ/sshd_proxy 7 rm -f $OBJ/banner.out $OBJ/banner.in $OBJ/empty.in 8 touch $OBJ/empty.in 12 ( ${SSH} -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \ 13 cmp $OBJ/empty.in $OBJ/banner.out ) || \ 19 touch $OBJ/banner.in 22 echo "abcdefghi" >$OBJ/banner.in 25 cp $OBJ/banner.in $OBJ/banner.out 27 cat $OBJ/banner.out >> $OBJ/banner.in 33 ( ${SSH} -F $OBJ/ssh_proxy otherhost true 2>$OBJ/banner.out && \ [all …]
|
H A D | krl.sh | 23 rm -f $OBJ/revoked-* $OBJ/krl-* 26 $SSHKEYGEN -t $ktype1 -f $OBJ/revoked-ca -C "" -N "" > /dev/null || 28 $SSHKEYGEN -t $ktype2 -f $OBJ/revoked-ca2 -C "" -N "" > /dev/null || 34 cat << EOF >> $OBJ/revoked-serials 57 touch $OBJ/revoked-keyid 61 echo "id: revoked $n" >> $OBJ/revoked-keyid 66 f=$OBJ/revoked-`printf "%04d" $N` 80 $SSHKEYGEN -s $OBJ/revoked-ca -z $n -I "revoked $N" $f >/dev/null 2>&1 \ 102 touch $OBJ/revoked-sha1 $OBJ/revoked-sha256 $OBJ/revoked-hash 104 (printf "sha1: "; cat $rkey) >> $OBJ/revoked-sha1 [all …]
|
H A D | cfgparse.sh | 16 grep "HostKey " $OBJ/sshd_config > $OBJ/sshd_config_minimal 17 SSHD_KEYS="`cat $OBJ/sshd_config_minimal`" 20 ($SUDO ${SSHD} -T -f $OBJ/sshd_config_minimal >$OBJ/sshd_config.1 && 21 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 && 22 diff $OBJ/sshd_config.1 $OBJ/sshd_config.2) || fail "reparse minimal config" 25 ($SUDO ${SSHD} -T -f $OBJ/sshd_config >$OBJ/sshd_config.1 && 26 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 && 27 diff $OBJ/sshd_config.1 $OBJ/sshd_config.2) || fail "reparse regress config" 31 cat > $OBJ/sshd_config.0 <<EOD 35 [ X${SKIP_IPV6} = Xyes ] || cat >> $OBJ/sshd_config.0 <<EOD [all …]
|
H A D | sshsig.sh | 6 DATA2=$OBJ/${DATANAME}.2 9 rm -f $OBJ/sshsig-*.sig $OBJ/wrong-key* $OBJ/sigca-key* 15 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/wrong-key \ 18 WRONG=$OBJ/wrong-key.pub 21 ${SSHKEYGEN} -q -t ed25519 -f $OBJ/sigca-key -C "CA" -N '' \ 23 CA_PRIV=$OBJ/sigca-key 24 CA_PUB=$OBJ/sigca-key.pub 39 -n $sig_principal $OBJ/${t} || \ 47 privkey=${OBJ}/`basename $t -cert.pub` 48 sigfile=${OBJ}/sshsig-${keybase}.sig [all …]
|
H A D | hostkey-rotate.sh | 25 rm -f $OBJ/hkr.* $OBJ/ssh_proxy.orig $OBJ/ssh_proxy.orig 27 grep -vi 'hostkey' $OBJ/sshd_proxy > $OBJ/sshd_proxy.orig 28 mv $OBJ/ssh_proxy $OBJ/ssh_proxy.orig 29 grep -vi 'globalknownhostsfile' $OBJ/ssh_proxy.orig > $OBJ/ssh_proxy 30 echo "UpdateHostkeys=yes" >> $OBJ/ssh_proxy 31 echo "GlobalKnownHostsFile=none" >> $OBJ/ssh_proxy 32 rm $OBJ/known_hosts 43 ${SSHKEYGEN} -qt $k -f $OBJ/hkr.$k -N '' || fatal "ssh-keygen $k" 44 echo "Hostkey $OBJ/hkr.${k}" >> $OBJ/sshd_proxy.orig 60 ${SSH} -F $OBJ/ssh_proxy "$@" x true || fail "ssh $@ failed" [all …]
|
H A D | agent.sh | 29 rm -f $OBJ/user_ca_key $OBJ/user_ca_key.pub 30 ${SSHKEYGEN} -q -N '' -t ed25519 -f $OBJ/user_ca_key \ 34 printf '' > $OBJ/authorized_keys_$USER 38 rm -f $OBJ/$t-agent $OBJ/$t-agent.pub* 39 ${SSHKEYGEN} -q -N '' -t $t -f $OBJ/$t-agent ||\ 42 ${SSHKEYGEN} -qs $OBJ/user_ca_key -I "$t cert" \ 43 -n estragon $OBJ/$t-agent.pub || fatal "ca sign failed" 46 cat $OBJ/$t-agent.pub >> $OBJ/authorized_keys_$USER 48 ${SSHADD} $OBJ/$t-agent > /dev/null 2>&1 53 SSH_AUTH_SOCK=$FW_SSH_AUTH_SOCK ${SSHADD} $OBJ/$t-agent > /dev/null 2>&1 [all …]
|
H A D | keygen-convert.sh | 6 cat > $OBJ/askpass <<EOD 10 chmod u+x $OBJ/askpass 19 rm -f $OBJ/$t-key 20 ${SSHKEYGEN} -q -N "" -t $t -f $OBJ/$t-key 24 ${SSHKEYGEN} -q -e -f $OBJ/$t-key >$OBJ/$t-key-rfc || \ 28 ${SSHKEYGEN} -q -e -f $OBJ/$t-key.pub >$OBJ/$t-key-rfc.pub || \ 31 cmp $OBJ/$t-key-rfc $OBJ/$t-key-rfc.pub || \ 35 ${SSHKEYGEN} -q -i -f $OBJ/$t-key-rfc >$OBJ/$t-rfc-imported || \ 38 cut -f1,2 -d " " $OBJ/$t-key.pub >$OBJ/$t-key-nocomment.pub 39 cmp $OBJ/$t-key-nocomment.pub $OBJ/$t-rfc-imported || \ [all …]
|
H A D | ssh-com-client.sh | 31 cp ${SRC}/dsa_ssh2.prv ${OBJ}/id.com 32 chmod 600 ${OBJ}/id.com 33 ${SSHKEYGEN} -i -f ${OBJ}/id.com > $OBJ/id.openssh 34 chmod 600 ${OBJ}/id.openssh 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub 37 echo IdKey ${OBJ}/id.com > ${OBJ}/id.list 41 rm -f ${OBJ}/$t ${OBJ}/$t.pub 42 ${SSHKEYGEN} -q -N '' -t $t -f ${OBJ}/$t 43 $SUDO cp $OBJ/$t $OBJ/host.$t [all …]
|
H A D | cfginclude.sh | 9 cat > $OBJ/ssh_config.i << _EOF 15 Include $OBJ/ssh_config.i.* 18 Include $OBJ/ssh_config.i.* 22 Include $OBJ/ssh_config.i.* # comment 29 Include $OBJ/ssh_config.i.* 32 Include $OBJ/ssh_config.i.* 36 Include $OBJ/ssh_config.i.* 39 cat > $OBJ/ssh_config.i.0 << _EOF 43 cat > $OBJ/ssh_config.i.1 << _EOF 63 cat > $OBJ/ssh_config.i.2 << _EOF [all …]
|
H A D | match-subsystem.sh | 6 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak 12 ${SSHD} -tf $OBJ/sshd_proxy || fatal "$_id: bad config" 13 ${SSH} -sF $OBJ/ssh_proxy somehost $_subsystem 23 cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy 24 cat >> $OBJ/sshd_proxy << _EOF 30 cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy 31 cat >> $OBJ/sshd_proxy << _EOF 38 cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy 39 cat >> $OBJ/sshd_proxy << _EOF 46 cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy [all …]
|
/freebsd/crypto/heimdal/lib/wind/ |
H A D | NTMakefile | 37 $(OBJ)\bidi.obj \ 38 $(OBJ)\bidi_table.obj \ 39 $(OBJ)\combining.obj \ 40 $(OBJ)\combining_table.obj \ 41 $(OBJ)\errorlist.obj \ 42 $(OBJ)\errorlist_table.obj \ 43 $(OBJ)\map.obj \ 44 $(OBJ)\map_table.obj \ 45 $(OBJ)\ldap.obj \ 46 $(OBJ)\normalize.obj \ [all …]
|