/external/openssh/regress/ |
sshd-log-wrapper.sh | 2 # $OpenBSD: sshd-log-wrapper.sh,v 1.2 2005/02/27 11:40:30 dtucker Exp $ 5 # simple wrapper for sshd proxy mode to catch stderr output 6 # sh sshd-log-wrapper.sh /path/to/sshd /path/to/logfile 8 sshd=$1 13 exec $sshd $@ -e 2>>$log
|
runtests.sh | 4 TEST_SSH_SSHD=../sshd
|
reexec.sh | 8 SSHD_ORIG=$SSHD${EXEEXT} 9 SSHD_COPY=$OBJ/sshd${EXEEXT} 11 # Start a sshd and then delete it 15 SSHD=$SSHD_COPY 17 SSHD=$SSHD_ORIG
|
test-exec.sh | 63 SSHD=sshd 81 SSHD="${TEST_SSH_SSHD}" 126 # Path to sshd must be absolute for rexec 127 case "$SSHD" in 129 *) SSHD=`which sshd` ;; 137 export SSH SSHD SSHAGENT SSHADD SSHKEYGEN SSHKEYSCAN SFTP SFTPSERVER SCP 138 #echo $SSH $SSHD $SSHAGENT $SSHADD $SSHKEYGEN $SSHKEYSCAN $SFTP $SFTPSERVER $SCP 172 echo no sshd runnin [all...] |
/external/openssh/contrib/aix/ |
pam.conf | 7 sshd auth required /usr/lib/security/pam_aix 11 sshd account required /usr/lib/security/pam_aix 15 sshd password required /usr/lib/security/pam_aix 19 sshd session required /usr/lib/security/pam_aix
|
buildbff.sh | 94 SSH_PRIVSEP_USER=sshd 139 # Set ssh and sshd parameters as per config.local 221 mkuser gecos='SSHD PrivSep User' login=false rlogin=false account_locked=true pgrp=$SSH_PRIVSEP_USER $SSH_PRIVSEP_USER 264 echo Creating SRC sshd subsystem. 265 rmssys -s sshd 2>&1 >/dev/null 266 mkssys -s sshd -p "$sbindir/sshd" -a '-D' -u 0 -S -n 15 -f 9 -R -G tcpip 267 startupcmd="start $sbindir/sshd \\\"\\\$src_running\\\"" 268 oldstartcmd="$sbindir/sshd" 270 startupcmd="$sbindir/sshd" [all...] |
/external/openssh/contrib/redhat/ |
sshd.init | 8 # processname: sshd 13 # pidfile: /var/run/sshd.pid 19 [ -f /etc/sysconfig/sshd ] && . /etc/sysconfig/sshd 22 prog="sshd" 25 SSHD=/usr/sbin/sshd 26 PID_FILE=/var/run/sshd.pid 30 $SSHD -t 50 $SSHD $OPTIONS && success || failur [all...] |
sshd.init.old | 8 # processname: sshd 13 # pidfile: /var/run/sshd.pid 19 [ -f /etc/sysconfig/sshd ] && . /etc/sysconfig/sshd 22 prog="sshd" 26 SSHD=/usr/sbin/sshd 30 PID_FILE=/var/run/sshd.pid 110 $SSHD -t 126 echo -n "Starting sshd: [all...] |
openssh.spec | 158 the secure shell daemon (sshd). The sshd daemon allows SSH clients to 199 --with-privsep-path=%{_var}/empty/sshd \ 252 mkdir -p -m755 $RPM_BUILD_ROOT%{_var}/empty/sshd 260 install -m644 contrib/redhat/sshd.pam.old $RPM_BUILD_ROOT/etc/pam.d/sshd 262 install -m644 contrib/redhat/sshd.pam $RPM_BUILD_ROOT/etc/pam.d/sshd 264 install -m755 contrib/redhat/sshd.init $RPM_BUILD_ROOT/etc/rc.d/init.d/sshd [all...] |
/external/openssh/contrib/hpux/ |
sshd.rc | 4 # sshd.rc: SSH daemon start-up and shutdown script 26 WHAT_PATH=/opt/openssh/sbin/sshd 27 WHAT_PID=/var/run/sshd.pid 28 WHAT_CONFIG=/etc/rc.config.d/sshd
|
/external/openssh/contrib/suse/ |
rc.sshd | 6 # /etc/init.d/sshd 13 # Provides: sshd 18 # Description: Start the sshd daemon 21 SSHD_BIN=/usr/sbin/sshd 28 SSHD_PIDFILE=/var/run/sshd.init.pid 52 startproc -f -p $SSHD_PIDFILE /usr/sbin/sshd $SSHD_OPTS -o "PidFile=$SSHD_PIDFILE" 62 killproc -p $SSHD_PIDFILE -TERM /usr/sbin/sshd 88 echo -n "Reload service sshd" 90 killproc -p $SSHD_PIDFILE -HUP /usr/sbin/sshd 96 echo -n "Checking for service sshd " [all...] |
openssh.spec | 92 - Removed patches that included /etc/pam.d/sshd, /sbin/init.d/rc.sshd, and 93 /var/adm/fillup-templates/rc.config.sshd, since Damien merged these into 162 install -m644 contrib/sshd.pam.generic $RPM_BUILD_ROOT/etc/pam.d/sshd 163 install -m744 contrib/suse/rc.sshd $RPM_BUILD_ROOT/etc/init.d/sshd 177 /usr/sbin/groupadd -g %{sshd_gid} -o -r sshd 2> /dev/null || : 178 /usr/sbin/useradd -r -o -g sshd -u %{sshd_uid} -s /bin/false -c "SSH Privilege Separation User" -d /var/lib/sshd sshd 2> /dev/null || [all...] |
/external/openssh/contrib/caldera/ |
openssh.spec | 70 Summary : OpenSSH Secure Shell protocol server (sshd). 71 Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd). 72 Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd). 73 Summary(fr) : Serveur de protocole du shell s?curis? OpenSSH (sshd). 74 Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd). 75 Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd). 76 Summary(pt_BR) : Servidor do protocolo Secure Shell OpenSSH (sshd). 144 This package installs the sshd, the server portion of OpenSSH. 147 Dieses Paket installiert den sshd, den Server-Teil der OpenSSH. 150 Este paquete instala sshd, la parte servidor de OpenSSH [all...] |
sshd.init | 3 # $Id: sshd.init,v 1.4 2003/11/21 12:48:57 djm Exp $ 11 # Description: sshd 19 NAME=sshd
|
/external/openssh/ |
opensshd.init.in | 15 SSHD=$prefix/sbin/sshd 16 PIDFILE=$piddir/sshd.pid 59 # Start SSHD 60 echo "starting $SSHD... \c" ; $SSHD 64 echo "$0: Error ${sshd_rc} starting ${SSHD}... bailing."
|
start-ssh | 32 # run sshd in debug mode and capture output to logcat 33 /system/bin/logwrapper /system/bin/sshd -f /system/etc/ssh/sshd_config -D -d 35 # don't daemonize - otherwise we can't stop the sshd service 36 /system/bin/sshd -f /system/etc/ssh/sshd_config -D
|
Android.mk | 102 ###################### sshd ###################### 109 sshd.c auth-rhosts.c auth-rsa.c auth-rh-rsa.c \ 126 LOCAL_MODULE := sshd
|
buildpkg.sh.in | 150 SSH_PRIVSEP_USER=sshd 335 # NOTE, The manifest disables sshd by default. 420 \$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER 535 # This could get hairy, as the running sshd may not be under SMF. 541 if [ -s ${piddir}/sshd.pid ] && \ 545 -p "Should the running sshd daemon be restarted? ${DEF_MSG}"\` || exit \$? 554 # determine if we should start sshd 556 -p "Start the sshd daemon after installing this package? ${DEF_MSG}"\` || exit \$? 583 if [ -s ${piddir}/sshd.pid -a -f ${TEST_DIR}/etc/init.d/${SYSVINIT_NAME} ] 586 -p "Should the running sshd daemon be restarted? ${DEF_MSG}"\` || exit \$ [all...] |
configure | [all...] |
/external/openssh/contrib/cygwin/ |
ssh-host-config | 45 /usr/sbin/sshd openssh 140 # Remove sshd 22/port from services 141 if [ `/usr/bin/grep -q 'sshd[ \t][ \t]*22' "${_services}"; echo $?` -eq 0 ] 143 /usr/bin/grep -v 'sshd[ \t][ \t]*22' "${_services}" > "${_serv_tmp}" 148 csih_inform "Removing sshd from ${_wservices}" 150 csih_warning "Removing sshd from ${_wservices} failed!" 155 csih_warning "Removing sshd from ${_wservices} failed!" 193 csih_inform "However, this requires a non-privileged account called 'sshd'." 198 if ! csih_create_unprivileged_user sshd 200 csih_error_recoverable "Couldn't create user 'sshd'!" [all...] |
Makefile | 35 $(INSTALL) -m 644 sshd-inetd $(DESTDIR)$(inetdefdir)/sshd-inetd
|
/external/dropbear/debian/ |
dropbear.postinst | 28 if test -x /usr/sbin/sshd; then
|