Home
last modified time | relevance | path

Searched refs:file (Results 1 – 25 of 51) sorted by relevance

123

/openssh-portable/regress/unittests/test_helper/
H A Dtest_helper.c293 ssl_err_check(const char *file, int line) in ssl_err_check() argument
305 file, line); in ssl_err_check()
344 file, line, test_number, active_test_name, in test_header()
473 test_header(file, line, a1, a2, "INT", pred); in assert_int()
506 test_header(file, line, a1, a2, "LONG", pred); in assert_long()
530 test_header(file, line, a1, a2, "CHAR", pred); in assert_char()
543 test_header(file, line, a1, a2, "U8", pred); in assert_u8()
554 test_header(file, line, a1, a2, "U16", pred); in assert_u16()
565 test_header(file, line, a1, a2, "U32", pred); in assert_u32()
576 test_header(file, line, a1, a2, "U64", pred); in assert_u64()
[all …]
H A Dtest_helper.h56 void assert_bignum(const char *file, int line,
63 void assert_mem(const char *file, int line,
69 void assert_int(const char *file, int line,
75 void assert_u_int(const char *file, int line,
78 void assert_long(const char *file, int line,
84 void assert_char(const char *file, int line,
87 void assert_ptr(const char *file, int line,
90 void assert_u8(const char *file, int line,
93 void assert_u16(const char *file, int line,
96 void assert_u32(const char *file, int line,
[all …]
/openssh-portable/contrib/cygwin/
H A Dssh-user-config47 local file="$1"
50 if [ ! -f "${pwdhome}/.ssh/${file}" ]
54 csih_inform "Generating ${pwdhome}/.ssh/${file}"
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
59 ssh-keygen -t "${type}" -f "${pwdhome}/.ssh/${file}" > /dev/null
64 cat "${pwdhome}/.ssh/${file}.pub" >> "${pwdhome}/.ssh/authorized_keys"
H A Dsshd-inetd1 # This file can be used to enable sshd as a slave of the inetd service
/openssh-portable/
H A Dssh_config3 # This is the ssh client system-wide configuration file. See
4 # ssh_config(5) for more information. This file provides defaults for
10 # 2. user-specific file
11 # 3. system-wide file
14 # configuration file, and defaults at the end.
H A Dlog.c424 sshlog(const char *file, const char *func, int line, int showfunc, in sshlog() argument
430 sshlogv(file, func, line, showfunc, level, suffix, fmt, args); in sshlog()
435 sshlogdie(const char *file, const char *func, int line, int showfunc, in sshlogdie() argument
441 sshlogv(file, func, line, showfunc, SYSLOG_LEVEL_INFO, in sshlogdie()
448 sshsigdie(const char *file, const char *func, int line, int showfunc, in sshsigdie() argument
454 sshlogv(file, func, line, showfunc, SYSLOG_LEVEL_FATAL, in sshsigdie()
461 sshlogv(const char *file, const char *func, int line, int showfunc, in sshlogv() argument
470 (cp = strrchr(file, '/')) == NULL ? file : cp + 1, func, line, in sshlogv()
H A Dmkinstalldirs9 for file
11 set fnord `echo ":$file" | sed -ne 's/^:\//#/;s/^://;s/\// /g;s/^#/\//;p'`
H A Dfatal.c37 sshfatal(const char *file, const char *func, int line, int showfunc, in sshfatal() argument
43 sshlogv(file, func, line, showfunc, level, suffix, fmt, args); in sshfatal()
H A Dauth.c429 char *file, uidstr[32], ret[PATH_MAX]; in expand_authorized_keys() local
434 file = percent_expand(filename, "h", pw->pw_dir, in expand_authorized_keys()
441 if (path_absolute(file)) in expand_authorized_keys()
442 return (file); in expand_authorized_keys()
444 i = snprintf(ret, sizeof(ret), "%s/%s", pw->pw_dir, file); in expand_authorized_keys()
447 free(file); in expand_authorized_keys()
496 found->host, found->file, found->line); in check_key_in_hostfiles()
514 if ((fd = open(file, O_RDONLY|O_NONBLOCK)) == -1) { in auth_openfile()
516 debug("Could not open %s '%s': %s", file_type, file, in auth_openfile()
527 pw->pw_name, file_type, file); in auth_openfile()
[all …]
H A DREADME.dns18 file containing the public host key file. If you have multiple keys,
27 to your DNS zone file and sign your zone.
33 add the following option to the ssh configuration file
H A Dauth2-pubkey.c400 snprintf(loc, sizeof(loc), "%.200s:%lu", file, linenum); in process_principals()
421 debug("trying authorized principals file %s", file); in match_principals_file()
426 success = process_principals(ssh, f, file, cert, authoptsp); in match_principals_file()
737 snprintf(loc, sizeof(loc), "%.200s:%lu", file, linenum); in check_authkeys_file()
853 char *file, struct sshauthopt **authoptsp) in user_key_allowed2() argument
864 debug("trying public key file %s", file); in user_key_allowed2()
866 found_key = check_authkeys_file(ssh, pw, f, file, in user_key_allowed2()
1016 char *file; in user_key_allowed() local
1031 file = expand_authorized_keys( in user_key_allowed()
1033 success = user_key_allowed2(ssh, pw, key, file, &opts); in user_key_allowed()
[all …]
H A Dprogressmeter.c67 static const char *file; /* name of the file being transferred */ variable
173 file_len, file); in refresh_progress_meter()
244 file = f; in start_progress_meter()
H A DPROTOCOL12 The protocol used by OpenSSH's ssh-agent is described in the file
44 in the file PROTOCOL.certkeys
133 originates (e.g. by closing its read file descriptor).
409 The "fstatvfs@openssh.com" operates on an open file handle:
419 uint64 f_bsize /* file system block size */
422 uint64 f_bfree /* free blocks in file system */
424 uint64 f_files /* total file inodes */
425 uint64 f_ffree /* free file inodes */
426 uint64 f_favail /* free file inodes for to non-root */
427 uint64 f_fsid /* file system id */
[all …]
H A Dsshconnect.c746 debug3_f("trying %s hostfile \"%s\"", which, file); in hostkeys_find_by_key_hostfile()
750 debug_f("hostkeys file %s does not exist", file); in hostkeys_find_by_key_hostfile()
753 error_fr(r, "hostkeys_foreach failed for %s", file); in hostkeys_find_by_key_hostfile()
1043 host_found->file, host_found->line); in check_host_key()
1064 (path_in_hostfiles(host_found->file, in check_host_key()
1067 path_in_hostfiles(ip_found->file, in check_host_key()
1241 host_found->file, host_found->line); in check_host_key()
1264 ip_found->file, ip_found->line); in check_host_key()
1272 host_found->file, host_found->line); in check_host_key()
1369 host_found->file, host_found->line); in check_host_key()
[all …]
H A DPROTOCOL.agent1 This file used to contain a description of the SSH agent protocol
H A Dauthfile.c302 char *file = NULL; in sshkey_load_cert() local
308 if (asprintf(&file, "%s-cert.pub", filename) == -1) in sshkey_load_cert()
311 r = sshkey_try_load_public(keyp, file, NULL); in sshkey_load_cert()
312 free(file); in sshkey_load_cert()
H A Dmisc.h195 void opt_array_append(const char *file, const int line,
197 void opt_array_append2(const char *file, const int line,
H A DOVERVIEW1 [Note: This file has not been updated for OpenSSH versions after
17 file with the same name.
74 The file defines a generic framework for arbitrary communication
132 configuration file (servconf.c). It then reads the host key,
158 ssh.h the main header file for ssh (various definitions)
H A DINSTALL118 the dependency (.depend) file using "make depend", which requires the
159 file as "/etc/pam.d/sshd" (or wherever your system prefers to keep
167 using a recent version of Red Hat Linux, the config file in
169 valid PAM file may result in an inability to use password
183 --with-prngd-socket=/some/file allows you to enable EGD or PRNGD
191 --with-lastlog=FILE will specify the location of the lastlog file.
216 --with-pid-dir=PATH specifies the directory in which the sshd.pid file is
274 [check the contents of the file "survey" to ensure there's no information
H A DREADME.tun14 have to add the following option to the ssh server configuration file
24 The OpenSSH server simply uses the file /root/.ssh/authorized_keys to
33 Use the hostname.if(5) interface-specific configuration file to set up
/openssh-portable/contrib/
H A DREADME31 your public key to a remote machine's ~/.ssh/authorized_keys file.
40 A generic PAM config file which may be useful on your system. YMMV
44 A PAM config file which works with FreeBSD's PAM port. Contributed by
57 RPM spec file and scripts for building Caldera OpenLinuix packages
66 RPM spec file and scripts for building Redhat packages
69 RPM spec file and scripts for building SuSE packages
/openssh-portable/regress/
H A Dkeygen-comment.sh8 file="$1"
10 trace "fingerprinting $file"
11 if ! ${SSHKEYGEN} -l -E sha256 -f $file > $OBJ/$t-fgp ; then
/openssh-portable/contrib/hpux/
H A DREADME4 sshd: configuration file for sshd.rc
6 egd: configuration file for egd.rc
H A Degd3 # EGD_LOG: EGD stdout and stderr log file (default /etc/opt/egd/egd.log)
/openssh-portable/regress/misc/sk-dummy/
H A Dfatal.c13 sshfatal(const char *file, const char *func, int line, int showfunc, in sshfatal() argument

123