Searched refs:SSH (Results 1 – 25 of 165) sorted by relevance
1234567
29 ${SSH} -S $CTL -N -M -F $OBJ/ssh_config -f $fwd somehost32 ${SSH} -F $OBJ/ssh_config -p$last -o 'ConnectionAttempts=4' \37 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost 2>/dev/null43 ${SSH} -F $OBJ/ssh_config \53 ${SSH} -q -F $OBJ/ssh_config \68 ${SSH} -F $OBJ/ssh_config -oClearAllForwardings=yes somehost true72 ${SSH} -S $CTL -N -M -f -F $OBJ/ssh_config -L ${base}01:127.0.0.1:$PORT \78 ${SSH} -F $OBJ/ssh_config -p ${base}01 somehost true \82 ${SSH} -F $OBJ/ssh_config -S $CTL -O exit somehost 2>/dev/null86 ${SSH} -S $CTL -N -M -f -F $OBJ/ssh_config -R ${base}01:127.0.0.1:$PORT \[all …]
33 (${SSH} -G -F $OBJ/ssh_config somehost >$OBJ/ssh_config.1 &&34 ${SSH} -G -F $OBJ/ssh_config.1 somehost >$OBJ/ssh_config.2 &&38 f=`${SSH} -GF $OBJ/ssh_config host | awk '/exitonforwardfailure/{print $2}'`40 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/exitonforwardfailure/{print $2}'`42 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o exitonforwardfailure=no h | \46 f=`${SSH} -GF $OBJ/ssh_config host | awk '/clearallforwardings/{print $2}'`48 f=`${SSH} -GF $OBJ/ssh_config -W a:1 h | awk '/clearallforwardings/{print $2}'`50 f=`${SSH} -GF $OBJ/ssh_config -W a:1 -o clearallforwardings=no h | \56 f=`${SSH} -GF $OBJ/ssh_config host | awk '/^user /{print $2}'`58 f=`${SSH} -GF $OBJ/ssh_config -o user=foo -l bar baz@host | awk '/^user /{print $2}'`[all …]
88 ${SSH} $certopts proxy true || fatal "cert failed"89 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"90 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"96 ${SSH} $certopts proxy true && fatal "cert succeeded"97 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"98 ${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"103 ${SSH} $certopts proxy true && fatal "cert succeeded"104 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"106 ${SSH} $opts -i $OBJ/user_key2 proxy true && fatal "key2 succeeded"112 ${SSH} $certopts proxy true || fatal "cert failed"[all …]
20 ${SSH} -F $OBJ/ssh_config -S $CTL -Ocheck otherhost \32 ${SSH} -Nn2 -MS$CTL -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" somehost \43 _XXX_TEST=blah ${SSH} -F $OBJ/ssh_config -oSendEnv="_XXX_TEST" -S$CTL otherhost sh << 'EOF'53 ${SSH} -F $OBJ/ssh_config -S$CTL otherhost cat ${DATA} > ${COPY}59 ${SSH} -F $OBJ/ssh_config -S $CTL otherhost cat ${DATA} > ${COPY}66 ${SFTP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost >>$TEST_REGRESS_LOGFILE 2>&172 ${SCP} -S ${SSH} -F $OBJ/ssh_config -oControlPath=$CTL otherhost:${DATA} ${COPY} >>$TEST_REGRESS_LO…81 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L127.0.0.1:$((${PORT} + 2)):127.0.0.1:$((${PORT} + 1))…91 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -L$OBJ/unix-2.fwd:$OBJ/unix-1.fwd otherhost >>$TEST_SSH…92 ${SSH} -F $OBJ/ssh_config -S $CTL -Oforward -R$OBJ/unix-3.fwd:$OBJ/unix-2.fwd otherhost >>$TEST_SSH…[all …]
10 PLAIN_TYPES=`$SSH -Q key-plain | maybe_filter_sk | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'`84 ${SSH} -i $OBJ/cert_user_key_${ktype} \93 ${SSH} -i $OBJ/cert_user_key_${ktype} \102 ${SSH} -i $OBJ/cert_user_key_${ktype} \111 ${SSH} -i $OBJ/cert_user_key_${ktype} \120 ${SSH} -i $OBJ/cert_user_key_${ktype} \130 ${SSH} -i $OBJ/cert_user_key_${ktype} \141 ${SSH} -i $OBJ/cert_user_key_${ktype} \165 ${SSH} -i $OBJ/cert_user_key_${ktype} \177 ${SSH} -i $OBJ/cert_user_key_${ktype} \[all …]
59 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \65 ${SSH} -F $OBJ/no_identity_config -oIdentitiesOnly=yes \72 ${SSH} $opts2 somehost exit 5281 ${SSH} $opts3 somehost exit 5291 ${SSH} $opts3 somehost exit 52100 ${SSH} $opts3 somehost exit 52110 ${SSH} $opts3 somehost exit 52142 ${SSH} $opts somehost exit 52149 ${SSH} $opts somehost exit 52156 ${SSH} $opts somehost exit 52
24 ${SSH} <${DATA} $_opts -v -F $OBJ/ssh_proxy somehost "cat > ${COPY}"40 for i in `${SSH} -Q kex`; do43 for i in `${SSH} -Q cipher`; do46 for i in `${SSH} -Q mac`; do56 if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then57 for c in `${SSH} -Q cipher-auth`; do58 for kex in `${SSH} -Q kex`; do73 ${SSH} < ${DATA} -oCompression=no -oRekeyLimit="default $s" -F \90 ${SSH} -oCompression=no -oRekeyLimit="default $s" -F \108 ${SSH} -oCompression=no -F $OBJ/ssh_proxy somehost "cat ${DATA}" \[all …]
20 r=`${SSH} -q -F $OBJ/ssh_proxy somehost echo foo`37 ${SSH} -ttq -F $OBJ/ssh_proxy somehost "tty > $OBJ/data; exit 0"55 ${SSH} -ttq -F $OBJ/ssh_proxy somehost "tty > $OBJ/data; exit 0"78 r=`${SSH} -q -F $OBJ/ssh_proxy somehost 'echo $FOO'`87 ${SSH} -q -F $OBJ/ssh_proxy somehost true95 r=`${SSH} -q -F $OBJ/ssh_proxy somehost 'echo true'`100 r=`${SSH} -q -F $OBJ/ssh_config somehost 'echo true'`112 ${SSH} -q -F $OBJ/ssh_proxy somehost true
78 ${SSH} -F $OBJ/ssh_proxy somehost exit 5290 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub -oIdentitiesOnly=yes \99 ${SSH} -A -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1104 ${SSH} "-oForwardAgent=$SSH_AUTH_SOCK" -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1109 ${SSH} -A -F $OBJ/ssh_proxy somehost \110 "${SSH} -F $OBJ/ssh_proxy somehost exit 52"117 ${SSH} "-oForwardAgent=$FW_SSH_AUTH_SOCK" -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1122 ${SSH} '-oForwardAgent=$FW_SSH_AUTH_SOCK' -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1134 ${SSH} '-oForwardAgent=$FW_SSH_AUTH_SOCK' -F $OBJ/ssh_proxy somehost ${SSHADD} -l > /dev/null 2>&1145 ${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub \
87 ${SSH} -i $OBJ/cert_user_key \96 ${SSH} -i $OBJ/cert_user_key \105 ${SSH} -i $OBJ/cert_user_key \114 ${SSH} -i $OBJ/cert_user_key \124 ${SSH} -i $OBJ/cert_user_key \134 ${SSH} -i $OBJ/cert_user_key \153 ${SSH} -i $OBJ/cert_user_key \165 ${SSH} -i $OBJ/cert_user_key \
10 kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange`27 ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true58 check 3072 `${SSH} -Q cipher | grep 128`59 check 7680 `${SSH} -Q cipher | grep 192`60 check 8192 `${SSH} -Q cipher | grep 256`
8 for c in `${SSH} -Q cipher`; do10 for m in `${SSH} -Q mac`; do16 ${SSH} -F $OBJ/ssh_proxy -m $m -c $c somehost true22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
17 _TEST_ENV=blah ${SSH} -oSendEnv="*" -F $OBJ/ssh_proxy_envpass otherhost \28 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -F $OBJ/ssh_proxy_envpass otherhost \39 _XXX_TEST=blah ${SSH} -oSendEnv="_XXX_TEST" -F $OBJ/ssh_proxy_envpass \50 _XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -oSendEnv="_XXX_TEST_*" \
12 SSH-1.99-*)15 SSH-2.0-*)18 SSH-1.5-*)
17 ${SSH} -vvv $fwd "$@" somehost true >>$TEST_REGRESS_LOGFILE 2>&122 ${SSH} -vvv $fwd "$@" somehost \143 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \178 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \190 ${SSH} -q -p $fwdport -F $OBJ/ssh_config somehost true || \
14 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do18 ( ${SSH} -o 'compression no' \
6 if [ "`${SSH} -Q compression`" = "none" ]; then15 SSH_CONNECTION=`${SSH} $opts 999.999.999.999 'echo $SSH_CONNECTION'`26 ${SSH} -F $OBJ/ssh_proxy ${USER}:style@999.999.999.999 true || \
11 ALLKEX=`${SSH} -Q kex`16 for k in `${SSH} -Q kex`; do19 ${SSH} -F $OBJ/ssh_proxy -o KexAlgorithms=$k x true
9 ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true17 ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true31 env MALLOC_OPTIONS="$m" ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
13 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}" true19 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/" true25 ${SSH} -F $OBJ/ssh_config "ssh://${USER}@somehost:${PORT}/${DATA}" true \
26 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${DATA}" ${COPY} || fail "…32 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config "sftp://${USER}@somehost:${PORT}/${COPY}" ${DIR} || fail "c…37 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config -b - \51 ${SFTP} -q -S "$SSH" -F $OBJ/ssh_config -b - \
10 macs=`${SSH} -Q mac`13 macs="$macs `${SSH} -Q cipher-auth`"40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then49 ${SSH} $macopt -F $OBJ/ssh_proxy -o "$pxy" \
47 ${SSH} $opts proxy true && fail "ssh succeeded with key"52 ${SSH} $opts proxy true && fail "ssh succeeded with key+cert"58 ${SSH} $opts proxy true || fail "ssh failed with multiple keys"64 ${SSH} $opts proxy true || fail "ssh failed with key/cert"
30 ${SSH} -F $OBJ/ssh_proxy -o $opt="echo '$arg' >$OBJ/actual" \38 ${SSH} -F $OBJ/ssh_proxy_match remuser@somehost true || true44 got=`${SSH} -F $OBJ/ssh_proxy -o $opt="/$arg /$arg" -G \49 got=`${SSH} -F $OBJ/ssh_proxy -o $opt="$arg" -G \
1 This document describes a lightweight SSH Signature format2 that is compatible with SSH keys and wire formats.8 The Armored SSH signatures consist of a header, a base6411 The header is the string "-----BEGIN SSH SIGNATURE-----"13 "-----END SSH SIGNATURE-----" immediately after a newline.25 -----BEGIN SSH SIGNATURE-----30 -----END SSH SIGNATURE-----46 public key used to make the signature using the usual SSH69 The signature itself is made using the SSH signature algorithm and91 signed during SSH user or host authentication.[all …]