/freebsd/crypto/openssh/regress/ |
H A D | forwarding.sh | 29 ${SSH} -S $CTL -N -M -F $OBJ/ssh_config -f $fwd somehost 32 ${SSH} -F $OBJ/ssh_config -p$last -o 'ConnectionAttempts=10' \ 37 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost 2>/dev/null 43 ${SSH} -F $OBJ/ssh_config \ 53 ${SSH} -q -F $OBJ/ssh_config \ 68 ${SSH} -F $OBJ/ssh_config -oClearAllForwardings=yes somehost true 72 ${SSH} -S $CTL -N -M -f -F $OBJ/ssh_config -L ${base}01:127.0.0.1:$PORT \ 78 ${SSH} -F $OBJ/ssh_config -p ${base}01 somehost true \ 82 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost 2>/dev/null 86 ${SSH} -S $CTL -N -M -f -F $OBJ/ssh_config -R ${base}01:127.0.0.1:$PORT \ [all …]
|
H A D | sshcfgparse.sh | 33 (${SSH} -G -F $OBJ/ssh_config somehost >$OBJ/ssh_config.1 && 34 ${SSH} -G -F $OBJ/ssh_config.1 somehost >$OBJ/ssh_config.2 && 38 f=`${SSH} -GF $OBJ/ssh_config host | awk '/exitonforwardfailure/{print $2}'` 40 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/exitonforwardfailure/{print $2}'` 42 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o exitonforwardfailure=no h | \ 46 f=`${SSH} -GF $OBJ/ssh_config host | awk '/clearallforwardings/{print $2}'` 48 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/clearallforwardings/{print $2}'` 50 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o clearallforwardings=no h | \ 56 f=`${SSH} -GF $OBJ/ssh_config host | awk '/^user /{print $2}'` 58 f=`${SSH} -GF $OBJ/ssh_config -o user=foo -l bar baz@host | awk '/^user /{print $2}'` [all …]
|
H A D | limit-keytype.sh | 88 ${SSH} $certopts proxy true || fatal "cert failed" 89 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed" 90 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed" 96 ${SSH} $certopts proxy true && fatal "cert succeeded" 97 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed" 98 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed" 103 ${SSH} $certopts proxy true && fatal "cert succeeded" 104 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed" 106 ${SSH} $opts -i $OBJ/user_key2 proxy true && fatal "key2 succeeded" 112 ${SSH} $certopts proxy true || fatal "cert failed" [all …]
|
H A D | multiplex.sh | 19 ${SSH} -F $OBJ/ssh_config -S $CTL -Ocheck otherhost \ 32 ${SSH} -Nn2 -MS$CTL -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" somehost \ 43 _XXX_TEST=blah ${SSH} -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" -S$CTL otherhost sh << 'EOF' 52 ${SSH} -F $OBJ/ssh_config -oSetEnv="_XXX_TEST=foo" -S$CTL otherhost sh << 'EOF' 63 ${SSH} -F $OBJ/ssh_config -S$CTL otherhost cat ${DATA} > ${COPY} 69 ${SSH} -F $OBJ/ssh_config -S $CTL otherhost cat ${DATA} > ${COPY} 76 ${SFTP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost >>$TEST_REGRESS_LOGFILE 2>&1 82 ${SCP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost:${DATA} ${COPY} >>$TEST_REGRESS_LO… 91 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L127.0.0.1:$((${PORT} + 2)):127.0.0.1:$((${PORT} + 1))… 101 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L$OBJ/unix-2.fwd:$OBJ/unix-1.fwd otherhost >>$TEST_SSH… [all …]
|
H A D | knownhosts.sh | 9 ${SSH} $opts somehost true || fail "initial connection" 13 ${SSH} -ohashknownhosts=yes -o stricthostkeychecking=no $opts somehost true \ 17 ${SSH} $opts somehost true || fail "reconnect with hashed known hosts" 21 ${SSH} $opts -ostricthostkeychecking=no somehost true \ 23 ${SSH} $opts -ostricthostkeychecking=yes somehost true \ 28 ${SSH} $opts -ostricthostkeychecking=no somehost true \ 30 ${SSH} $opts -ostricthostkeychecking=yes somehost true \
|
H A D | cert-userkey.sh | 10 PLAIN_TYPES=`$SSH -Q key-plain | maybe_filter_sk | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'` 82 ${SSH} -i $OBJ/cert_user_key_${ktype} \ 91 ${SSH} -i $OBJ/cert_user_key_${ktype} \ 100 ${SSH} -i $OBJ/cert_user_key_${ktype} \ 109 ${SSH} -i $OBJ/cert_user_key_${ktype} \ 118 ${SSH} -i $OBJ/cert_user_key_${ktype} \ 128 ${SSH} -i $OBJ/cert_user_key_${ktype} \ 139 ${SSH} -i $OBJ/cert_user_key_${ktype} \ 162 ${SSH} -i $OBJ/cert_user_key_${ktype} \ 174 ${SSH} -i $OBJ/cert_user_key_${ktype} \ [all …]
|
H A D | channel-timeout.sh | 12 ${SSH} -nNfM -oControlPath=$MUXPATH -F $OBJ/ssh_proxy "$@" somehost || 19 ${SSH} -qF $OBJ/ssh_proxy -oControlPath=$MUXPATH -O exit somehost || 28 ${SSH} -F $OBJ/ssh_proxy -oControlPath=$MUXPATH somehost "$@" 35 ${SSH} -F $OBJ/ssh_proxy somehost "sleep 5 ; exit 23" 44 ${SSH} -F $OBJ/ssh_proxy somehost "sleep 5 ; exit 23" 53 ${SSH} -F $OBJ/ssh_proxy somehost "exit 23" 62 ${SSH} -F $OBJ/ssh_proxy somehost "sleep 5 ; exit 23" 71 ${SSH} -F $OBJ/ssh_proxy somehost "sleep 5 ; exit 23" 130 $SFTP -qS $SSH -F $OBJ/ssh_proxy somehost:$DATA $COPY 143 $SFTP -qS $SSH -F $OBJ/ssh_proxy somehost:$DATA $COPY [all …]
|
H A D | cert-file.sh | 59 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \ 65 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \ 72 ${SSH} $opts2 somehost exit 52 81 ${SSH} $opts3 somehost exit 52 91 ${SSH} $opts3 somehost exit 52 100 ${SSH} $opts3 somehost exit 52 110 ${SSH} $opts3 somehost exit 52 142 ${SSH} $opts somehost exit 52 149 ${SSH} $opts somehost exit 52 156 ${SSH} $opts somehost exit 52
|
H A D | envpass.sh | 18 _TEST_ENV=blah ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass otherhost \ 29 ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass -oSetEnv="_TEST_ENV=blah" \ 41 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -F $OBJ/ssh_proxy_envpass otherhost \ 52 _XXX_TEST=blah ${SSH} -oSendEnv="_XXX_TEST" -F $OBJ/ssh_proxy_envpass \ 63 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -oSendEnv="_XXX_TEST_*" \ 75 ${SSH} -F $OBJ/ssh_proxy_envpass \ 86 ${SSH} -F $OBJ/ssh_proxy_envpass \ 100 ${SSH} -F $OBJ/ssh_proxy_envpass \ 114 ${SSH} -F $OBJ/ssh_proxy_envpass \
|
H A D | rekey.sh | 24 ${SSH} <${DATA} $_opts -v -F $OBJ/ssh_proxy somehost "cat > ${COPY}" 40 for i in `${SSH} -Q kex`; do 43 for i in `${SSH} -Q cipher`; do 46 for i in `${SSH} -Q mac`; do 56 if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then 57 for c in `${SSH} -Q cipher-auth`; do 58 for kex in `${SSH} -Q kex`; do 73 ${SSH} < ${DATA} -oCompression=no -oRekeyLimit="default $s" -F \ 90 ${SSH} -oCompression=no -oRekeyLimit="default $s" -F \ 108 ${SSH} -oCompression=no -F $OBJ/ssh_proxy somehost "cat ${DATA}" \ [all …]
|
H A D | key-options.sh | 20 r=`${SSH} -q -F $OBJ/ssh_proxy somehost echo foo` 37 ${SSH} -ttq -F $OBJ/ssh_proxy somehost "tty > $OBJ/data; exit 0" 55 ${SSH} -ttq -F $OBJ/ssh_proxy somehost "tty > $OBJ/data; exit 0" 78 r=`${SSH} -q -F $OBJ/ssh_proxy somehost 'echo $FOO'` 87 ${SSH} -q -F $OBJ/ssh_proxy somehost true 95 r=`${SSH} -q -F $OBJ/ssh_proxy somehost 'echo true'` 100 r=`${SSH} -q -F $OBJ/ssh_config somehost 'echo true'` 112 ${SSH} -q -F $OBJ/ssh_proxy somehost true
|
H A D | forcecommand.sh | 22 ${SFTP} -S ${SSH} -b - -qF $OBJ/ssh_proxy somehost 2>/dev/null || \ 29 ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command in key option" 36 ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command config" 44 ${SFTP} -S ${SSH} -F $OBJ/ssh_proxy -oLoglevel=quiet somehost && \ 51 ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command match" 55 ${SFTP} -S ${SSH} -F $OBJ/ssh_proxy -oLoglevel=quiet somehost && \ 64 ${SFTP} -S ${SSH} -b - -qF $OBJ/ssh_proxy somehost 2>/dev/null || \
|
H A D | cipher-speed.sh | 7 ciphers=`${SSH} -Q Ciphers | tr '\n' , | sed 's/,$//'` 8 macs=`${SSH} -Q MACs | tr '\n' , | sed 's/,$//'` 24 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do 28 ( ${SSH} -o 'compression no' \
|
H A D | principals-command.sh | 85 ${SSH} -i $OBJ/cert_user_key \ 94 ${SSH} -i $OBJ/cert_user_key \ 103 ${SSH} -i $OBJ/cert_user_key \ 112 ${SSH} -i $OBJ/cert_user_key \ 122 ${SSH} -i $OBJ/cert_user_key \ 133 ${SSH} -i $OBJ/cert_user_key \ 152 ${SSH} -i $OBJ/cert_user_key \ 164 ${SSH} -i $OBJ/cert_user_key \
|
H A D | agent.sh | 81 ${SSH} -F $OBJ/ssh_proxy somehost exit 52 93 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub -oIdentitiesOnly=yes \ 102 ${SSH} -A -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1 107 ${SSH} "-oForwardAgent=$SSH_AUTH_SOCK" -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1 112 ${SSH} -A -F $OBJ/ssh_proxy somehost \ 113 "${SSH} -F $OBJ/ssh_proxy somehost exit 52" 120 ${SSH} "-oForwardAgent=$FW_SSH_AUTH_SOCK" -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1 125 ${SSH} '-oForwardAgent=$FW_SSH_AUTH_SOCK' -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1 137 ${SSH} '-oForwardAgent=$FW_SSH_AUTH_SOCK' -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1 148 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub \
|
H A D | dhgex.sh | 10 kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange` 27 ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true 58 check 3072 `${SSH} -Q cipher | grep 128` 59 check 7680 `${SSH} -Q cipher | grep 192` 60 check 8192 `${SSH} -Q cipher | grep 256`
|
H A D | try-ciphers.sh | 8 for c in `${SSH} -Q cipher`; do 10 for m in `${SSH} -Q mac`; do 16 ${SSH} -F $OBJ/ssh_proxy -m $m -c $c somehost true 22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
|
H A D | reconfigure.sh | 21 ${SSH} -F $OBJ/ssh_config somehost true 40 ${SSH} -F $OBJ/ssh_config somehost true 46 ${SSH} -F $OBJ/ssh_config somehost sleep 10 # authenticated client 62 ${SSH} -F $OBJ/ssh_config somehost true
|
H A D | cfgmatchlisten.sh | 17 ${SSH} -vvv $fwd "$@" somehost true >>$TEST_REGRESS_LOGFILE 2>&1 22 ${SSH} -vvv $fwd "$@" somehost \ 143 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \ 178 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \ 190 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \
|
H A D | knownhosts-command.sh | 22 ${SSH} -F $OBJ/ssh_proxy x true || fail "ssh connect failed" 30 ${SSH} -F $OBJ/ssh_proxy x true && fail "ssh connect succeeded with no keys" 39 ${SSH} -F $OBJ/ssh_proxy x true && fail "ssh connect succeeded with bad exit" 53 ${SSH} -F $OBJ/ssh_proxy -oHostKeyAlgorithms=$algs x true ||
|
H A D | proto-version.sh | 12 SSH-1.99-*) 15 SSH-2.0-*) 18 SSH-1.5-*)
|
H A D | proxy-connect.sh | 6 if [ "`${SSH} -Q compression`" = "none" ]; then 15 SSH_CONNECTION=`${SSH} $opts 999.999.999.999 'echo $SSH_CONNECTION'` 26 ${SSH} -F $OBJ/ssh_proxy ${USER}:style@999.999.999.999 true || \
|
H A D | sftp-uri.sh | 26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "… 32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c… 37 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config -b - \ 51 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config -b - \
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.sshsig | 1 This document describes a lightweight SSH Signature format 2 that is compatible with SSH keys and wire formats. 8 The Armored SSH signatures consist of a header, a base64 11 The header is the string "-----BEGIN SSH SIGNATURE-----" 13 "-----END SSH SIGNATURE-----" immediately after a newline. 25 -----BEGIN SSH SIGNATURE----- 30 -----END SSH SIGNATURE----- 46 public key used to make the signature using the usual SSH 69 The signature itself is made using the SSH signature algorithm and 91 signed during SSH user or host authentication. [all …]
|
/freebsd/crypto/openssh/contrib/ |
H A D | ssh-copy-id | 66 SSH="ssh -a -x" 202 $SSH -i "${PRIV_ID_FILE:-$L_TMP_ID_FILE}" \ 293 $SSH -f -N -M -S "$L_SHARED_CON" "$@" 294 L_CLEANUP="$SSH -S $L_SHARED_CON -O exit 'ignored' >/dev/null 2>&1 ; $SCRATCH_CLEANUP" 328 REMOTE_VERSION=$($SSH -v -o PreferredAuthentications=',' -o ControlPath=none "$@" 2>&1 | 341 …[ "$DRY_RUN" ] || printf 'set ssh pka-dsa key %s\nsave\nexit\n' "$KEY" | $SSH -T "$@" >/dev/null 2… 361 $SSH "$@" "$(installkeys_sh)"
|