OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:OBJ
(Results
1 - 25
of
119
) sorted by null
1
2
3
4
5
/external/openssh/regress/
forcecommand.sh
6
cp $
OBJ
/sshd_proxy $
OBJ
/sshd_proxy_bak
8
echon 'command="true" ' >$
OBJ
/authorized_keys_$USER
9
cat $
OBJ
/rsa.pub >> $
OBJ
/authorized_keys_$USER
10
echon 'command="true" ' >>$
OBJ
/authorized_keys_$USER
11
cat $
OBJ
/rsa1.pub >> $
OBJ
/authorized_keys_$USER
15
${SSH} -$p -F $
OBJ
/ssh_proxy somehost false \ ||
19
echon 'command="false" ' >$
OBJ
/authorized_keys_$USE
[
all
...]
connect-privsep.sh
6
cp $
OBJ
/sshd_proxy $
OBJ
/sshd_proxy.orig
7
echo 'UsePrivilegeSeparation yes' >> $
OBJ
/sshd_proxy
10
${SSH} -$p -F $
OBJ
/ssh_proxy 999.999.999.999 true
16
cp $
OBJ
/sshd_proxy.orig $
OBJ
/sshd_proxy
17
echo 'UsePrivilegeSeparation sandbox' >> $
OBJ
/sshd_proxy
20
${SSH} -$p -F $
OBJ
/ssh_proxy 999.999.999.999 true
host-expand.sh
5
echo 'PermitLocalCommand yes' >> $
OBJ
/ssh_proxy
6
printf 'LocalCommand printf "%%%%s\\n" "%%n" "%%h"\n' >> $
OBJ
/ssh_proxy
8
cat >$
OBJ
/expect <<EOE
15
${SSH} -F $
OBJ
/ssh_proxy -$p somehost true >$
OBJ
/actual
16
diff $
OBJ
/expect $
OBJ
/actual || fail "$tid proto $p"
banner.sh
5
echo "Banner $
OBJ
/banner.in" >> $
OBJ
/sshd_proxy
7
rm -f $
OBJ
/banner.out $
OBJ
/banner.in $
OBJ
/empty.in
8
touch $
OBJ
/empty.in
12
( ${SSH} -2 -F $
OBJ
/ssh_proxy otherhost true 2>$
OBJ
/banner.out && \
13
cmp $
OBJ
/empty.in $
OBJ
/banner.out ) ||
[
all
...]
cert-userkey.sh
12
rm -f $
OBJ
/authorized_keys_$USER $
OBJ
/user_ca_key* $
OBJ
/cert_user_key*
13
cp $
OBJ
/sshd_proxy $
OBJ
/sshd_proxy_bak
16
${SSHKEYGEN} -q -N '' -t rsa -f $
OBJ
/user_ca_key ||\
23
-f $
OBJ
/cert_user_key_${ktype} || \
25
${SSHKEYGEN} -q -s $
OBJ
/user_ca_key -I \
27
-n ${USER},mekmitasdigoat $
OBJ
/cert_user_key_${ktype} ||
31
cp $
OBJ
/cert_user_key_${ktype} $OBJ/cert_user_key_${ktype}_v0
[
all
...]
cfgmatch.sh
6
pidfile=$
OBJ
/remote_pid
10
echo "ExitOnForwardFailure=yes" >> $
OBJ
/ssh_config
11
echo "ExitOnForwardFailure=yes" >> $
OBJ
/ssh_proxy
42
cp $
OBJ
/sshd_proxy $
OBJ
/sshd_proxy_bak
43
grep -v AuthorizedKeysFile $
OBJ
/sshd_proxy_bak > $
OBJ
/sshd_proxy
44
echo "AuthorizedKeysFile /dev/null" >>$
OBJ
/sshd_proxy
45
echo "PermitOpen 127.0.0.1:1" >>$
OBJ
/sshd_config
46
echo "Match user $USER" >>$
OBJ
/sshd_prox
[
all
...]
cert-hostkey.sh
12
rm -f $
OBJ
/known_hosts-cert $
OBJ
/host_ca_key* $
OBJ
/cert_host_key*
13
cp $
OBJ
/sshd_proxy $
OBJ
/sshd_proxy_bak
18
${SSHKEYGEN} -q -N '' -t rsa -f $
OBJ
/host_ca_key ||\
23
cat $
OBJ
/host_ca_key.pub
24
) > $
OBJ
/known_hosts-cert
31
-f $
OBJ
/cert_host_key_${ktype} || \
33
${SSHKEYGEN} -h -q -s $
OBJ
/host_ca_key
[
all
...]
keygen-convert.sh
9
rm -f $
OBJ
/$t-key
10
${SSHKEYGEN} -q -N "" -t $t -f $
OBJ
/$t-key
13
${SSHKEYGEN} -q -e -f $
OBJ
/$t-key >$
OBJ
/$t-key-rfc || \
17
${SSHKEYGEN} -q -e -f $
OBJ
/$t-key.pub >$
OBJ
/$t-key-rfc.pub || \
20
cmp $
OBJ
/$t-key-rfc $
OBJ
/$t-key-rfc.pub || \
24
${SSHKEYGEN} -q -i -f $
OBJ
/$t-key-rfc >$
OBJ
/$t-rfc-imported ||
[
all
...]
localcommand.sh
6
echo 'PermitLocalCommand yes' >> $
OBJ
/ssh_proxy
7
echo 'LocalCommand echo foo' >> $
OBJ
/ssh_proxy
11
a=`${SSH} -F $
OBJ
/ssh_proxy -$p somehost true`
keytype.sh
11
cp $
OBJ
/sshd_proxy $
OBJ
/sshd_proxy_bak
12
cp $
OBJ
/ssh_proxy $
OBJ
/ssh_proxy_bak
20
rm -f $
OBJ
/key.$kt
24
${TIME} ${SSHKEYGEN} -b $bits -q -N '' -t $type -f $
OBJ
/key.$kt ||\
35
grep -v HostKey $
OBJ
/sshd_proxy_bak
36
echo HostKey $
OBJ
/key.$ht
37
) > $
OBJ
/sshd_proxy
39
grep -v IdentityFile $
OBJ
/ssh_proxy_ba
[
all
...]
ssh-com-client.sh
31
cp ${SRC}/dsa_ssh2.prv ${
OBJ
}/id.com
32
chmod 600 ${
OBJ
}/id.com
33
${SSHKEYGEN} -i -f ${
OBJ
}/id.com > $
OBJ
/id.openssh
34
chmod 600 ${
OBJ
}/id.openssh
35
${SSHKEYGEN} -y -f ${
OBJ
}/id.openssh > $
OBJ
/authorized_keys_$USER
36
${SSHKEYGEN} -e -f ${
OBJ
}/id.openssh > $
OBJ
/id.com.pub
37
echo IdKey ${
OBJ
}/id.com > ${OBJ}/id.lis
[
all
...]
brokenkeys.sh
6
KEYS="$
OBJ
/authorized_keys_${USER}"
15
cat $
OBJ
/$t.pub >> $
OBJ
/authorized_keys_$USER
17
${SSH} -2 -F $
OBJ
/ssh_config somehost true
reexec.sh
7
COPY=${
OBJ
}/copy
9
SSHD_COPY=$
OBJ
/sshd${EXEEXT}
26
${SSH} -nqo "Protocol=$p" -F $
OBJ
/ssh_config somehost \
38
cp $
OBJ
/sshd_config $
OBJ
/sshd_config.orig
40
echo "InvalidXXX=no" >> $
OBJ
/sshd_config
47
cp $
OBJ
/sshd_config.orig $
OBJ
/sshd_config
61
cp $
OBJ
/sshd_config.orig $
OBJ
/sshd_confi
[
all
...]
ssh-com.sh
33
cat << EOF > $
OBJ
/sshd2_config
39
UserConfigDirectory ${
OBJ
}/%U
46
RandomSeedFile ${
OBJ
}/random_seed
56
< $
OBJ
/ssh_config > $
OBJ
/ssh_config_com
59
rm -f ${
OBJ
}/dsa ${
OBJ
}/dsa.pub
60
${SSHKEYGEN} -q -N '' -t dsa -f ${
OBJ
}/dsa
63
mkdir -p ${
OBJ
}/${USER}
64
cp /dev/null ${
OBJ
}/${USER}/authorizatio
[
all
...]
test-exec.sh
33
OBJ
=$1
34
if [ "x$
OBJ
" = "x" ]; then
35
echo '$
OBJ
not defined'
38
if [ ! -d $
OBJ
]; then
39
echo "not a directory: $
OBJ
"
241
PIDFILE=$
OBJ
/pidfile
246
cat << EOF > $
OBJ
/sshd_config
254
AuthorizedKeysFile $
OBJ
/authorized_keys_%u
263
echo "$TEST_SSH_SSHD_CONFOPTS" >> $
OBJ
/sshd_config
267
cp $
OBJ
/sshd_config $OBJ/sshd_prox
[
all
...]
kextype.sh
7
cp $
OBJ
/sshd_proxy $
OBJ
/sshd_proxy_bak
8
cp $
OBJ
/ssh_proxy $
OBJ
/ssh_proxy_bak
24
${SSH} -F $
OBJ
/ssh_proxy -o KexAlgorithms=$k x true
keygen-change.sh
12
rm -f $
OBJ
/$t-key
13
${SSHKEYGEN} -q -N ${S1} -t $t -f $
OBJ
/$t-key
15
${SSHKEYGEN} -p -P ${S1} -N ${S2} -f $
OBJ
/$t-key > /dev/null
22
rm -f $
OBJ
/$t-key $
OBJ
/$t-key.pub
login-timeout.sh
7
echo "LoginGraceTime 10s" >> $
OBJ
/sshd_config
8
echo "MaxStartups 1" >> $
OBJ
/sshd_config
13
${SSH} -F $
OBJ
/ssh_config somehost true
21
echo "UsePrivilegeSeparation no" >> $
OBJ
/sshd_config
26
${SSH} -F $
OBJ
/ssh_config somehost true
agent-pkcs11.sh
10
SOFTPKCS11RC=$
OBJ
/pkcs11.info
30
rm -f $
OBJ
/pkcs11.key $
OBJ
/pkcs11.crt
31
openssl genrsa -out $
OBJ
/pkcs11.key 2048 > /dev/null 2>&1
32
chmod 600 $
OBJ
/pkcs11.key
33
openssl req -key $
OBJ
/pkcs11.key -new -x509 \
34
-out $
OBJ
/pkcs11.crt -text -subj '/CN=pkcs11 test' > /dev/null
35
printf "a\ta\t$
OBJ
/pkcs11.crt\t$
OBJ
/pkcs11.key" > $SOFTPKCS11RC
37
${SSHKEYGEN} -y -f $
OBJ
/pkcs11.key > $OBJ/authorized_keys_$USE
[
all
...]
addrmatch.sh
6
mv $
OBJ
/sshd_proxy $
OBJ
/sshd_proxy_bak
13
result=`${SSHD} -f $
OBJ
/sshd_proxy -T \
21
cp $
OBJ
/sshd_proxy_bak $
OBJ
/sshd_proxy
22
cat >>$
OBJ
/sshd_proxy <<EOD
44
cp $
OBJ
/sshd_proxy_bak $
OBJ
/sshd_proxy
45
rm $
OBJ
/sshd_proxy_bak
envpass.sh
9
cat << EOF > $
OBJ
/ssh_proxy_envpass
13
cat $
OBJ
/ssh_proxy >> $
OBJ
/ssh_proxy_envpass
17
_TEST_ENV=blah ${SSH} -oSendEnv="*" -F $
OBJ
/ssh_proxy_envpass otherhost \
28
_XXX_TEST_A=1 _XXX_TEST_B=2 ${SSH} -F $
OBJ
/ssh_proxy_envpass otherhost \
39
_XXX_TEST=blah ${SSH} -oSendEnv="_XXX_TEST" -F $
OBJ
/ssh_proxy_envpass \
51
-F $
OBJ
/ssh_proxy_envpass otherhost \
60
rm -f $
OBJ
/ssh_proxy_envpass
proxy-connect.sh
7
${SSH} -$p -F $
OBJ
/ssh_proxy 999.999.999.999 true
11
SSH_CONNECTION=`${SSH} -$p -F $
OBJ
/ssh_proxy 999.999.999.999 'echo $SSH_CONNECTION'`
connect.sh
9
${SSH} -o "Protocol=$p" -F $
OBJ
/ssh_config somehost true
putty-kex.sh
7
COPY=${
OBJ
}/copy
16
cp ${
OBJ
}/.putty/sessions/localhost_proxy \
17
${
OBJ
}/.putty/sessions/kex_$k
18
echo "KEX=$k" >> ${
OBJ
}/.putty/sessions/kex_$k
/external/llvm/test/MC/ARM/
elf-movt.s
2
@ RUN: llvm-mc %s -triple=armv7-linux-gnueabi -filetype=
obj
-o - | \
3
@ RUN: llvm-readobj -s -sd -sr | FileCheck -check-prefix=
OBJ
%s
18
@
OBJ
: Section {
19
@
OBJ
: Name: .text
20
@
OBJ
-NEXT: Type: SHT_PROGBITS
21
@
OBJ
-NEXT: Flags [ (0x6)
22
@
OBJ
-NEXT: SHF_ALLOC
23
@
OBJ
-NEXT: SHF_EXECINSTR
24
@
OBJ
-NEXT: ]
25
@
OBJ
-NEXT: Address: 0x
[
all
...]
Completed in 2013 milliseconds
1
2
3
4
5