Dre4m Shell
Server IP : 85.214.239.14  /  Your IP : 3.137.177.116
Web Server : Apache/2.4.62 (Debian)
System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.18
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /proc/2/cwd/proc/2/task/2/cwd/usr/share/bash-completion/completions/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /proc/2/cwd/proc/2/task/2/cwd/usr/share/bash-completion/completions/ipsec
# Linux ipsec(8) completion (for FreeS/WAN and strongSwan) -*- shell-script -*-

# Complete ipsec.conf conn entries.
#
# Reads a file from stdin in the ipsec.conf(5) format.
_ipsec_connections()
{
    local keyword name
    while read -r keyword name; do
        if [[ $keyword == [#]* ]]; then continue; fi
        [[ $keyword == conn && $name != '%default' ]] && COMPREPLY+=("$name")
    done
    COMPREPLY=($(compgen -W '${COMPREPLY[@]}' -- "$cur"))
}

_ipsec_freeswan()
{
    local cur prev words cword
    _init_completion || return

    if ((cword == 1)); then
        COMPREPLY=($(compgen -W 'auto barf eroute klipsdebug look manual
            pluto ranbits rsasigkey setup showdefaults showhostkey spi spigrp
            tncfg whack' -- "$cur"))
        return
    fi

    case ${words[1]} in
        auto)
            COMPREPLY=($(compgen -W '--asynchronous --up --add --delete
                --replace --down --route --unroute --ready --status
                --rereadsecrets' -- "$cur"))
            ;;
        manual)
            COMPREPLY=($(compgen -W '--up --down --route --unroute --union' \
                -- "$cur"))
            ;;
        ranbits)
            COMPREPLY=($(compgen -W '--quick --continuous --bytes' -- "$cur"))
            ;;
        setup)
            COMPREPLY=($(compgen -W '--start --stop --restart' -- "$cur"))
            ;;
        *) ;;

    esac
}

_ipsec_strongswan()
{
    local cur prev words cword
    _init_completion || return

    if ((cword == 1)); then
        COMPREPLY=($(compgen -W 'down irdumm leases listaacerts listacerts
            listalgs listall listcacerts listcainfos listcards listcerts
            listcrls listgroups listocsp listocspcerts listpubkeys openac pki
            pluto pool purgecerts purgecrls purgeike purgeocsp ready reload
            rereadaacerts rereadacerts rereadall rereadcacerts rereadcrls
            rereadgroups rereadocspcerts rereadsecrets restart route scdecrypt
            scencrypt scepclient secrets start starter status statusall stop
            stroke unroute uci up update version whack --confdir --copyright
            --directory --help --version --versioncode' -- "$cur"))
        return
    fi

    case ${words[1]} in
        down | route | status | statusall | unroute | up)
            local confdir=$(ipsec --confdir)
            _ipsec_connections <"$confdir/ipsec.conf"
            ;;
        list*)
            COMPREPLY=($(compgen -W '--utc' -- "$cur"))
            ;;
        restart | start)
            COMPREPLY=($(compgen -W '--attach-gdb --auto-update --debug
                --debug-all --debug-more --nofork' -- "$cur"))
            ;;
        pki)
            COMPREPLY=($(compgen -W '--gen --issue --keyid --print --pub
                --req --self --signcrl --verify' -- "$cur"))
            ;;
        pool) ;;

        irdumm)
            _filedir 'rb'
            ;;
        *) ;;

    esac
}

case "$(ipsec --version 2>/dev/null)" in
    *strongSwan*)
        complete -F _ipsec_strongswan ipsec
        ;;
    *)
        complete -F _ipsec_freeswan ipsec
        ;;
esac

# ex: filetype=sh

Anon7 - 2022
AnonSec Team