Home
last modified time | relevance | path

Searched refs:SUDO (Results 1 – 21 of 21) sorted by relevance

/openssh-portable/regress/
H A Dcfgparse.sh20 ($SUDO ${SSHD} -T -f $OBJ/sshd_config_minimal >$OBJ/sshd_config.1 &&
21 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 &&
25 ($SUDO ${SSHD} -T -f $OBJ/sshd_config >$OBJ/sshd_config.1 &&
26 $SUDO ${SSHD} -T -f $OBJ/sshd_config.1 >$OBJ/sshd_config.2 &&
53 ($SUDO ${SSHD} -T -f $OBJ/sshd_config.1 | \
69 ($SUDO ${SSHD} -T -f $OBJ/sshd_config.1 | \
H A Dagent-ptrace.sh34 if test -z "$SUDO" ; then
38 $SUDO chown 0 ${SSHAGENT}
39 $SUDO chgrp 0 ${SSHAGENT}
40 $SUDO chmod 2755 ${SSHAGENT}
H A Dagent-getpeereid.sh16 case "x$SUDO" in
24 echo "unsupported $SUDO - "doas" and "sudo" are allowed"
43 ${SUDO} -n -u ${UNPRIV} ${SSHADD} -l 2>/dev/null
46 < /dev/null ${SUDO} -S -u ${UNPRIV} ${SSHADD} -l 2>/dev/null
H A Dkeys-command.sh6 if [ -z "$SUDO" -a ! -w /var/run ]; then
23 trap "${SUDO} rm -f ${KEY_COMMAND}" 0
24 cat << _EOF | $SUDO sh -c "rm -f '$KEY_COMMAND' ; cat > '$KEY_COMMAND'"
38 $SUDO chmod 0755 "$KEY_COMMAND"
42 $SUDO rm -f $KEY_COMMAND
H A Dsftp-chroot.sh9 trap "${SUDO} rm -f ${PRIVDATA}" 0
11 if [ -z "$SUDO" -a ! -w /var/run ]; then
22 $SUDO sh -c "echo mekmitastdigoat > $PRIVDATA" || \
H A Dprincipals-command.sh9 if [ -z "$SUDO" -a ! -w /var/run ]; then
39 trap "$SUDO rm -f ${PRINCIPALS_COMMAND}" 0
40 cat << _EOF | $SUDO sh -c "cat > '$PRINCIPALS_COMMAND'"
55 $SUDO chmod 0755 "$PRINCIPALS_COMMAND"
60 $SUDO rm -f $PRINCIPALS_COMMAND
H A Dreconfigure.sh26 PID=`$SUDO cat $PIDFILE`
28 $SUDO kill -HUP $PID
H A Dservcfginclude.sh89 ${SUDO} ${REAL_SSHD} -f $OBJ/sshd_config.i -T \
116 ${SUDO} ${REAL_SSHD} -f $OBJ/sshd_config.i \
121 ${SUDO} ${REAL_SSHD} -f $OBJ/sshd_config.i \
149 ${SUDO} ${REAL_SSHD} -f $OBJ/sshd_config.i.x -T \
179 ${SUDO} ${REAL_SSHD} -f $OBJ/sshd_config.i -T \
H A Dscp.sh92 if [ ! -z "$SUDO" ]; then
99 $SUDO chown root ${DIR2}/copy
101 $SUDO diff ${DIFFOPT} ${DIR} ${DIR2} || fail "corrupted copy"
102 $SUDO rm ${DIR2}/copy
H A Dtest-exec.sh185 if [ "x$SUDO" != "x" ]; then
195 if [ "x${SUDO}" != "x" ]; then
350 pid=`$SUDO cat $PIDFILE`
357 $SUDO kill $pid
365 if $SUDO kill -0 $pid; then
598 $SUDO cp $OBJ/$t $OBJ/host.$t
664 …echo proxycommand ${SUDO} env SSH_SK_HELPER=\"$SSH_SK_HELPER\" sh ${SRC}/sshd-log-wrapper.sh ${TES…
673 $SUDO ${SSHD} -f $OBJ/sshd_config "$@" -t || fatal "sshd_config broken"
674 $SUDO env SSH_SK_HELPER="$SSH_SK_HELPER" \
H A Dcfgmatch.sh134 ${SUDO} ${SSHD} -f $OBJ/sshd_config -T >/dev/null || \
153 result=`${SUDO} ${SSHD} -f $OBJ/sshd_config -T -C "$spec" | \
H A DMakefile223 …(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDI…
233 …(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDI…
240 …(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDI…
H A Drekey.sh158 b=`$SUDO ${SSHD} -T -o "rekeylimit $size $time" -f $OBJ/sshd_proxy | \
160 s=`$SUDO ${SSHD} -T -o "rekeylimit $size $time" -f $OBJ/sshd_proxy | \
H A Dintegrity.sh21 cmd="$SUDO env SSH_SK_HELPER="$SSH_SK_HELPER" sh ${SRC}/sshd-log-wrapper.sh ${TEST_SSHD_LOGFILE} ${…
H A Dkey-options.sh12 if ! config_defined HAVE_OPENPTY && [ "x$SUDO" = "x" ]; then
H A Daddrmatch.sh62 ${SUDO} ${SSHD} -f $OBJ/sshd_proxy -t >/dev/null 2>&1 && \
H A Dssh-com-client.sh43 $SUDO cp $OBJ/$t $OBJ/host.$t
H A DREADME.regress24 SUDO: path to sudo/doas command, if desired. Note that some systems
/openssh-portable/.github/
H A Dconfigs16 SUDO=sudo # run with sudo by default
128 SUDO=""
149 export CC CFLAGS LTESTS SUDO TEST_TARGET TEST_SSH_UNSAFE_PERMISSIONS
H A Drun_test.sh5 [ -z "${SUDO}" ] || ${SUDO} mkdir -p /var/empty
/openssh-portable/.github/workflows/
H A Dupstream.yml31 run: vmrun "cd /usr/src/regress/usr.bin/ssh && make obj && make clean && SUDO=sudo make"