Home
last modified time | relevance | path

Searched refs:SSH (Results 1 – 25 of 123) sorted by relevance

12345

/freebsd/crypto/openssh/regress/
H A Dforwarding.sh29 ${SSH} -S $CTL -N -M -F $OBJ/ssh_config -f $fwd somehost
32 ${SSH} -F $OBJ/ssh_config -p$last -o 'ConnectionAttempts=10' \
37 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost 2>/dev/null
43 ${SSH} -F $OBJ/ssh_config \
53 ${SSH} -q -F $OBJ/ssh_config \
68 ${SSH} -F $OBJ/ssh_config -oClearAllForwardings=yes somehost true
72 ${SSH} -S $CTL -N -M -f -F $OBJ/ssh_config -L ${base}01:127.0.0.1:$PORT \
78 ${SSH} -F $OBJ/ssh_config -p ${base}01 somehost true \
82 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost 2>/dev/null
86 ${SSH} -S $CTL -N -M -f -F $OBJ/ssh_config -R ${base}01:127.0.0.1:$PORT \
[all …]
H A Dsshcfgparse.sh33 (${SSH} -G -F $OBJ/ssh_config somehost >$OBJ/ssh_config.1 &&
34 ${SSH} -G -F $OBJ/ssh_config.1 somehost >$OBJ/ssh_config.2 &&
38 f=`${SSH} -GF $OBJ/ssh_config host | awk '/exitonforwardfailure/{print $2}'`
40 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/exitonforwardfailure/{print $2}'`
42 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o exitonforwardfailure=no h | \
46 f=`${SSH} -GF $OBJ/ssh_config host | awk '/clearallforwardings/{print $2}'`
48 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/clearallforwardings/{print $2}'`
50 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o clearallforwardings=no h | \
56 f=`${SSH} -GF $OBJ/ssh_config host | awk '/^user /{print $2}'`
58 f=`${SSH} -GF $OBJ/ssh_config -o user=foo -l bar baz@host | awk '/^user /{print $2}'`
[all …]
H A Dlimit-keytype.sh88 ${SSH} $certopts proxy true || fatal "cert failed"
89 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
90 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
96 ${SSH} $certopts proxy true && fatal "cert succeeded"
97 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
98 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
103 ${SSH} $certopts proxy true && fatal "cert succeeded"
104 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
106 ${SSH} $opts -i $OBJ/user_key2 proxy true && fatal "key2 succeeded"
112 ${SSH} $certopts proxy true || fatal "cert failed"
[all …]
H A Dmultiplex.sh19 ${SSH} -F $OBJ/ssh_config -S $CTL -Ocheck otherhost \
32 ${SSH} -Nn2 -MS$CTL -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" somehost \
43 _XXX_TEST=blah ${SSH} -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" -S$CTL otherhost sh << 'EOF'
52 ${SSH} -F $OBJ/ssh_config -oSetEnv="_XXX_TEST=foo" -S$CTL otherhost sh << 'EOF'
63 ${SSH} -F $OBJ/ssh_config -S$CTL otherhost cat ${DATA} > ${COPY}
69 ${SSH} -F $OBJ/ssh_config -S $CTL otherhost cat ${DATA} > ${COPY}
76 ${SFTP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost >>$TEST_REGRESS_LOGFILE 2>&1
82 ${SCP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost:${DATA} ${COPY} >>$TEST_REGRESS_LO…
91 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L127.0.0.1:$((${PORT} + 2)):127.0.0.1:$((${PORT} + 1))…
101 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L$OBJ/unix-2.fwd:$OBJ/unix-1.fwd otherhost >>$TEST_SSH…
[all …]
H A Dknownhosts.sh9 ${SSH} $opts somehost true || fail "initial connection"
13 ${SSH} -ohashknownhosts=yes -o stricthostkeychecking=no $opts somehost true \
17 ${SSH} $opts somehost true || fail "reconnect with hashed known hosts"
21 ${SSH} $opts -ostricthostkeychecking=no somehost true \
23 ${SSH} $opts -ostricthostkeychecking=yes somehost true \
28 ${SSH} $opts -ostricthostkeychecking=no somehost true \
30 ${SSH} $opts -ostricthostkeychecking=yes somehost true \
H A Dcert-userkey.sh10 PLAIN_TYPES=`$SSH -Q key-plain | maybe_filter_sk | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'`
82 ${SSH} -i $OBJ/cert_user_key_${ktype} \
91 ${SSH} -i $OBJ/cert_user_key_${ktype} \
100 ${SSH} -i $OBJ/cert_user_key_${ktype} \
109 ${SSH} -i $OBJ/cert_user_key_${ktype} \
118 ${SSH} -i $OBJ/cert_user_key_${ktype} \
128 ${SSH} -i $OBJ/cert_user_key_${ktype} \
139 ${SSH} -i $OBJ/cert_user_key_${ktype} \
162 ${SSH} -i $OBJ/cert_user_key_${ktype} \
174 ${SSH} -i $OBJ/cert_user_key_${ktype} \
[all …]
H A Dchannel-timeout.sh12 ${SSH} -nNfM -oControlPath=$MUXPATH -F $OBJ/ssh_proxy "$@" somehost ||
19 ${SSH} -qF $OBJ/ssh_proxy -oControlPath=$MUXPATH -O exit somehost ||
28 ${SSH} -F $OBJ/ssh_proxy -oControlPath=$MUXPATH somehost "$@"
35 ${SSH} -F $OBJ/ssh_proxy somehost "sleep 5 ; exit 23"
44 ${SSH} -F $OBJ/ssh_proxy somehost "sleep 5 ; exit 23"
53 ${SSH} -F $OBJ/ssh_proxy somehost "exit 23"
62 ${SSH} -F $OBJ/ssh_proxy somehost "sleep 5 ; exit 23"
71 ${SSH} -F $OBJ/ssh_proxy somehost "sleep 5 ; exit 23"
130 $SFTP -qS $SSH -F $OBJ/ssh_proxy somehost:$DATA $COPY
143 $SFTP -qS $SSH -F $OBJ/ssh_proxy somehost:$DATA $COPY
[all …]
H A Dcert-file.sh59 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \
65 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \
72 ${SSH} $opts2 somehost exit 52
81 ${SSH} $opts3 somehost exit 52
91 ${SSH} $opts3 somehost exit 52
100 ${SSH} $opts3 somehost exit 52
110 ${SSH} $opts3 somehost exit 52
142 ${SSH} $opts somehost exit 52
149 ${SSH} $opts somehost exit 52
156 ${SSH} $opts somehost exit 52
H A Denvpass.sh18 _TEST_ENV=blah ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass otherhost \
29 ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass -oSetEnv="_TEST_ENV=blah" \
41 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -F $OBJ/ssh_proxy_envpass otherhost \
52 _XXX_TEST=blah ${SSH} -oSendEnv="_XXX_TEST" -F $OBJ/ssh_proxy_envpass \
63 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -oSendEnv="_XXX_TEST_*" \
75 ${SSH} -F $OBJ/ssh_proxy_envpass \
86 ${SSH} -F $OBJ/ssh_proxy_envpass \
100 ${SSH} -F $OBJ/ssh_proxy_envpass \
114 ${SSH} -F $OBJ/ssh_proxy_envpass \
H A Drekey.sh24 ${SSH} <${DATA} $_opts -v -F $OBJ/ssh_proxy somehost "cat > ${COPY}"
40 for i in `${SSH} -Q kex`; do
43 for i in `${SSH} -Q cipher`; do
46 for i in `${SSH} -Q mac`; do
56 if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then
57 for c in `${SSH} -Q cipher-auth`; do
58 for kex in `${SSH} -Q kex`; do
73 ${SSH} < ${DATA} -oCompression=no -oRekeyLimit="default $s" -F \
90 ${SSH} -oCompression=no -oRekeyLimit="default $s" -F \
108 ${SSH} -oCompression=no -F $OBJ/ssh_proxy somehost "cat ${DATA}" \
[all …]
H A Dkey-options.sh20 r=`${SSH} -q -F $OBJ/ssh_proxy somehost echo foo`
37 ${SSH} -ttq -F $OBJ/ssh_proxy somehost "tty > $OBJ/data; exit 0"
55 ${SSH} -ttq -F $OBJ/ssh_proxy somehost "tty > $OBJ/data; exit 0"
78 r=`${SSH} -q -F $OBJ/ssh_proxy somehost 'echo $FOO'`
87 ${SSH} -q -F $OBJ/ssh_proxy somehost true
95 r=`${SSH} -q -F $OBJ/ssh_proxy somehost 'echo true'`
100 r=`${SSH} -q -F $OBJ/ssh_config somehost 'echo true'`
112 ${SSH} -q -F $OBJ/ssh_proxy somehost true
H A Dforcecommand.sh22 ${SFTP} -S ${SSH} -b - -qF $OBJ/ssh_proxy somehost 2>/dev/null || \
29 ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command in key option"
36 ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command config"
44 ${SFTP} -S ${SSH} -F $OBJ/ssh_proxy -oLoglevel=quiet somehost && \
51 ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command match"
55 ${SFTP} -S ${SSH} -F $OBJ/ssh_proxy -oLoglevel=quiet somehost && \
64 ${SFTP} -S ${SSH} -b - -qF $OBJ/ssh_proxy somehost 2>/dev/null || \
H A Dcipher-speed.sh7 ciphers=`${SSH} -Q Ciphers | tr '\n' , | sed 's/,$//'`
8 macs=`${SSH} -Q MACs | tr '\n' , | sed 's/,$//'`
24 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do
28 ( ${SSH} -o 'compression no' \
H A Dprincipals-command.sh85 ${SSH} -i $OBJ/cert_user_key \
94 ${SSH} -i $OBJ/cert_user_key \
103 ${SSH} -i $OBJ/cert_user_key \
112 ${SSH} -i $OBJ/cert_user_key \
122 ${SSH} -i $OBJ/cert_user_key \
133 ${SSH} -i $OBJ/cert_user_key \
152 ${SSH} -i $OBJ/cert_user_key \
164 ${SSH} -i $OBJ/cert_user_key \
H A Dagent.sh81 ${SSH} -F $OBJ/ssh_proxy somehost exit 52
93 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub -oIdentitiesOnly=yes \
102 ${SSH} -A -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
107 ${SSH} "-oForwardAgent=$SSH_AUTH_SOCK" -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
112 ${SSH} -A -F $OBJ/ssh_proxy somehost \
113 "${SSH} -F $OBJ/ssh_proxy somehost exit 52"
120 ${SSH} "-oForwardAgent=$FW_SSH_AUTH_SOCK" -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
125 ${SSH} '-oForwardAgent=$FW_SSH_AUTH_SOCK' -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
137 ${SSH} '-oForwardAgent=$FW_SSH_AUTH_SOCK' -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1
148 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub \
H A Ddhgex.sh10 kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange`
27 ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true
58 check 3072 `${SSH} -Q cipher | grep 128`
59 check 7680 `${SSH} -Q cipher | grep 192`
60 check 8192 `${SSH} -Q cipher | grep 256`
H A Dtry-ciphers.sh8 for c in `${SSH} -Q cipher`; do
10 for m in `${SSH} -Q mac`; do
16 ${SSH} -F $OBJ/ssh_proxy -m $m -c $c somehost true
22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
H A Dreconfigure.sh21 ${SSH} -F $OBJ/ssh_config somehost true
40 ${SSH} -F $OBJ/ssh_config somehost true
46 ${SSH} -F $OBJ/ssh_config somehost sleep 10 # authenticated client
62 ${SSH} -F $OBJ/ssh_config somehost true
H A Dcfgmatchlisten.sh17 ${SSH} -vvv $fwd "$@" somehost true >>$TEST_REGRESS_LOGFILE 2>&1
22 ${SSH} -vvv $fwd "$@" somehost \
143 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \
178 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \
190 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \
H A Dknownhosts-command.sh22 ${SSH} -F $OBJ/ssh_proxy x true || fail "ssh connect failed"
30 ${SSH} -F $OBJ/ssh_proxy x true && fail "ssh connect succeeded with no keys"
39 ${SSH} -F $OBJ/ssh_proxy x true && fail "ssh connect succeeded with bad exit"
53 ${SSH} -F $OBJ/ssh_proxy -oHostKeyAlgorithms=$algs x true ||
H A Dproto-version.sh12 SSH-1.99-*)
15 SSH-2.0-*)
18 SSH-1.5-*)
H A Dproxy-connect.sh6 if [ "`${SSH} -Q compression`" = "none" ]; then
15 SSH_CONNECTION=`${SSH} $opts 999.999.999.999 'echo $SSH_CONNECTION'`
26 ${SSH} -F $OBJ/ssh_proxy ${USER}:style@999.999.999.999 true || \
H A Dsftp-uri.sh26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "…
32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c…
37 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config -b - \
51 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config -b - \
/freebsd/crypto/openssh/
H A DPROTOCOL.sshsig1 This document describes a lightweight SSH Signature format
2 that is compatible with SSH keys and wire formats.
8 The Armored SSH signatures consist of a header, a base64
11 The header is the string "-----BEGIN SSH SIGNATURE-----"
13 "-----END SSH SIGNATURE-----" immediately after a newline.
25 -----BEGIN SSH SIGNATURE-----
30 -----END SSH SIGNATURE-----
46 public key used to make the signature using the usual SSH
69 The signature itself is made using the SSH signature algorithm and
91 signed during SSH user or host authentication.
[all …]
/freebsd/crypto/openssh/contrib/
H A Dssh-copy-id66 SSH="ssh -a -x"
202 $SSH -i "${PRIV_ID_FILE:-$L_TMP_ID_FILE}" \
293 $SSH -f -N -M -S "$L_SHARED_CON" "$@"
294 L_CLEANUP="$SSH -S $L_SHARED_CON -O exit 'ignored' >/dev/null 2>&1 ; $SCRATCH_CLEANUP"
328 REMOTE_VERSION=$($SSH -v -o PreferredAuthentications=',' -o ControlPath=none "$@" 2>&1 |
341 …[ "$DRY_RUN" ] || printf 'set ssh pka-dsa key %s\nsave\nexit\n' "$KEY" | $SSH -T "$@" >/dev/null 2…
361 $SSH "$@" "$(installkeys_sh)"

12345