HomeSort by relevance Sort by last modified time
    Searched refs:sshd (Results 1 - 22 of 22) sorted by null

  /external/openssh/regress/
sshd-log-wrapper.sh 2 # $OpenBSD: sshd-log-wrapper.sh,v 1.2 2005/02/27 11:40:30 dtucker Exp $
5 # simple wrapper for sshd proxy mode to catch stderr output
6 # sh sshd-log-wrapper.sh /path/to/sshd /path/to/logfile
8 sshd=$1
13 exec $sshd $@ -e 2>>$log
runtests.sh 4 TEST_SSH_SSHD=../sshd
reexec.sh 8 SSHD_ORIG=$SSHD${EXEEXT}
9 SSHD_COPY=$OBJ/sshd${EXEEXT}
11 # Start a sshd and then delete it
15 SSHD=$SSHD_COPY
17 SSHD=$SSHD_ORIG
test-exec.sh 63 SSHD=sshd
81 SSHD="${TEST_SSH_SSHD}"
126 # Path to sshd must be absolute for rexec
127 case "$SSHD" in
129 *) SSHD=`which sshd` ;;
137 export SSH SSHD SSHAGENT SSHADD SSHKEYGEN SSHKEYSCAN SFTP SFTPSERVER SCP
138 #echo $SSH $SSHD $SSHAGENT $SSHADD $SSHKEYGEN $SSHKEYSCAN $SFTP $SFTPSERVER $SCP
172 echo no sshd runnin
    [all...]
  /external/openssh/contrib/aix/
pam.conf 7 sshd auth required /usr/lib/security/pam_aix
11 sshd account required /usr/lib/security/pam_aix
15 sshd password required /usr/lib/security/pam_aix
19 sshd session required /usr/lib/security/pam_aix
buildbff.sh 94 SSH_PRIVSEP_USER=sshd
139 # Set ssh and sshd parameters as per config.local
221 mkuser gecos='SSHD PrivSep User' login=false rlogin=false account_locked=true pgrp=$SSH_PRIVSEP_USER $SSH_PRIVSEP_USER
264 echo Creating SRC sshd subsystem.
265 rmssys -s sshd 2>&1 >/dev/null
266 mkssys -s sshd -p "$sbindir/sshd" -a '-D' -u 0 -S -n 15 -f 9 -R -G tcpip
267 startupcmd="start $sbindir/sshd \\\"\\\$src_running\\\""
268 oldstartcmd="$sbindir/sshd"
270 startupcmd="$sbindir/sshd"
    [all...]
  /external/openssh/contrib/redhat/
sshd.init 8 # processname: sshd
13 # pidfile: /var/run/sshd.pid
19 [ -f /etc/sysconfig/sshd ] && . /etc/sysconfig/sshd
22 prog="sshd"
25 SSHD=/usr/sbin/sshd
26 PID_FILE=/var/run/sshd.pid
30 $SSHD -t
50 $SSHD $OPTIONS && success || failur
    [all...]
sshd.init.old 8 # processname: sshd
13 # pidfile: /var/run/sshd.pid
19 [ -f /etc/sysconfig/sshd ] && . /etc/sysconfig/sshd
22 prog="sshd"
26 SSHD=/usr/sbin/sshd
30 PID_FILE=/var/run/sshd.pid
110 $SSHD -t
126 echo -n "Starting sshd:
    [all...]
openssh.spec 158 the secure shell daemon (sshd). The sshd daemon allows SSH clients to
199 --with-privsep-path=%{_var}/empty/sshd \
252 mkdir -p -m755 $RPM_BUILD_ROOT%{_var}/empty/sshd
260 install -m644 contrib/redhat/sshd.pam.old $RPM_BUILD_ROOT/etc/pam.d/sshd
262 install -m644 contrib/redhat/sshd.pam $RPM_BUILD_ROOT/etc/pam.d/sshd
264 install -m755 contrib/redhat/sshd.init $RPM_BUILD_ROOT/etc/rc.d/init.d/sshd
    [all...]
  /external/openssh/contrib/hpux/
sshd.rc 4 # sshd.rc: SSH daemon start-up and shutdown script
26 WHAT_PATH=/opt/openssh/sbin/sshd
27 WHAT_PID=/var/run/sshd.pid
28 WHAT_CONFIG=/etc/rc.config.d/sshd
  /external/openssh/contrib/suse/
rc.sshd 6 # /etc/init.d/sshd
13 # Provides: sshd
18 # Description: Start the sshd daemon
21 SSHD_BIN=/usr/sbin/sshd
28 SSHD_PIDFILE=/var/run/sshd.init.pid
52 startproc -f -p $SSHD_PIDFILE /usr/sbin/sshd $SSHD_OPTS -o "PidFile=$SSHD_PIDFILE"
62 killproc -p $SSHD_PIDFILE -TERM /usr/sbin/sshd
88 echo -n "Reload service sshd"
90 killproc -p $SSHD_PIDFILE -HUP /usr/sbin/sshd
96 echo -n "Checking for service sshd "
    [all...]
openssh.spec 92 - Removed patches that included /etc/pam.d/sshd, /sbin/init.d/rc.sshd, and
93 /var/adm/fillup-templates/rc.config.sshd, since Damien merged these into
162 install -m644 contrib/sshd.pam.generic $RPM_BUILD_ROOT/etc/pam.d/sshd
163 install -m744 contrib/suse/rc.sshd $RPM_BUILD_ROOT/etc/init.d/sshd
177 /usr/sbin/groupadd -g %{sshd_gid} -o -r sshd 2> /dev/null || :
178 /usr/sbin/useradd -r -o -g sshd -u %{sshd_uid} -s /bin/false -c "SSH Privilege Separation User" -d /var/lib/sshd sshd 2> /dev/null ||
    [all...]
  /external/openssh/contrib/caldera/
openssh.spec 70 Summary : OpenSSH Secure Shell protocol server (sshd).
71 Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd).
72 Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd).
73 Summary(fr) : Serveur de protocole du shell s?curis? OpenSSH (sshd).
74 Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd).
75 Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd).
76 Summary(pt_BR) : Servidor do protocolo Secure Shell OpenSSH (sshd).
144 This package installs the sshd, the server portion of OpenSSH.
147 Dieses Paket installiert den sshd, den Server-Teil der OpenSSH.
150 Este paquete instala sshd, la parte servidor de OpenSSH
    [all...]
sshd.init 3 # $Id: sshd.init,v 1.4 2003/11/21 12:48:57 djm Exp $
11 # Description: sshd
19 NAME=sshd
  /external/openssh/
opensshd.init.in 15 SSHD=$prefix/sbin/sshd
16 PIDFILE=$piddir/sshd.pid
59 # Start SSHD
60 echo "starting $SSHD... \c" ; $SSHD
64 echo "$0: Error ${sshd_rc} starting ${SSHD}... bailing."
start-ssh 32 # run sshd in debug mode and capture output to logcat
33 /system/bin/logwrapper /system/bin/sshd -f /system/etc/ssh/sshd_config -D -d
35 # don't daemonize - otherwise we can't stop the sshd service
36 /system/bin/sshd -f /system/etc/ssh/sshd_config -D
Android.mk 102 ###################### sshd ######################
109 sshd.c auth-rhosts.c auth-rsa.c auth-rh-rsa.c \
126 LOCAL_MODULE := sshd
buildpkg.sh.in 150 SSH_PRIVSEP_USER=sshd
335 # NOTE, The manifest disables sshd by default.
420 \$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER
535 # This could get hairy, as the running sshd may not be under SMF.
541 if [ -s ${piddir}/sshd.pid ] && \
545 -p "Should the running sshd daemon be restarted? ${DEF_MSG}"\` || exit \$?
554 # determine if we should start sshd
556 -p "Start the sshd daemon after installing this package? ${DEF_MSG}"\` || exit \$?
583 if [ -s ${piddir}/sshd.pid -a -f ${TEST_DIR}/etc/init.d/${SYSVINIT_NAME} ]
586 -p "Should the running sshd daemon be restarted? ${DEF_MSG}"\` || exit \$
    [all...]
configure     [all...]
  /external/openssh/contrib/cygwin/
ssh-host-config 45 /usr/sbin/sshd openssh
140 # Remove sshd 22/port from services
141 if [ `/usr/bin/grep -q 'sshd[ \t][ \t]*22' "${_services}"; echo $?` -eq 0 ]
143 /usr/bin/grep -v 'sshd[ \t][ \t]*22' "${_services}" > "${_serv_tmp}"
148 csih_inform "Removing sshd from ${_wservices}"
150 csih_warning "Removing sshd from ${_wservices} failed!"
155 csih_warning "Removing sshd from ${_wservices} failed!"
193 csih_inform "However, this requires a non-privileged account called 'sshd'."
198 if ! csih_create_unprivileged_user sshd
200 csih_error_recoverable "Couldn't create user 'sshd'!"
    [all...]
Makefile 35 $(INSTALL) -m 644 sshd-inetd $(DESTDIR)$(inetdefdir)/sshd-inetd
  /external/dropbear/debian/
dropbear.postinst 28 if test -x /usr/sbin/sshd; then

Completed in 513 milliseconds