Home
last modified time | relevance | path

Searched full:ssh (Results 1 – 25 of 258) sorted by relevance

1234567891011

/third_party/libwebsockets/READMEs/
DREADME.plugin-sshd-base.md1 ssh-base Plugin
6 lws-ssh-base is a protcol plugin for libwebsockets that implements a
7 generic, abstract, ssh server.
20 - The plugin has no built-in behaviours like check ~/.ssh/authorized_keys,
28 handlers. So it's role is something like an abstract base class for an ssh
44 |Server host key|ssh-rsa (4096b)|
50 lws-ssh-base is Free Software, available under libwebsockets' MIT license.
58 $ ssh-keygen -t rsa -b 4096 -f mykeys
63 with ssh, you can just use that directly.
71 spawns a bash shell when an ssh client authenticates. The username used on
[all …]
DREADME.http-fallback.md24 What happens if you try to connect, eg, an ssh client to the http server port
47 socket to handle both http(s) and a second protocol, as we will see, like ssh.
165 But if you try to connect to it with an ssh client, that will also work fine.
169 `ssh -p 443 invalid@libwebsockets.org`... you will get permission denied from
170 your ssh client. With valid credentials in fact that works perfectly for
171 ssh, scp, git-over-ssh etc all on port 443...
/third_party/ltp/testcases/network/stress/ssh/
Dssh-stress.sh14 TST_NEEDS_CMDS="sshd ssh ssh-keygen od pkill pgrep"
17 # SSH config file on the remote host
19 # SSH command to connect from the remote host to the test host
30 # Stop the ssh daemon
36 # Kill all remaining ssh processes
37 [ -n "$RHOST_SSH_CONF" ] && tst_rhost_run -c "pkill -f '^ssh $RHOST_SSH_CONF'"
63 ssh-keygen -q -N "" -t rsa -b 4096 -f $TST_TMPDIR/ssh_host_rsa_key
64 ssh-keygen -q -N "" -t ecdsa -f $TST_TMPDIR/ssh_host_ecdsa_key
65 ssh-keygen -q -N "" -t ed25519 -f $TST_TMPDIR/ssh_host_ed25519_key
68 tst_rhost_run -s -c "ssh-keygen -t rsa -N \"\" -f $TST_TMPDIR/id_rsa \
[all …]
/third_party/python/Tools/buildbot/
DremoteDeploy.bat18 ssh %SSH_SERVER% echo Make sure we can find SSH and SSH_SERVER variable is valid
19 if %ERRORLEVEL% NEQ 0 (echo SSH does not work) & exit /b %ERRORLEVEL%
28 ssh %SSH_SERVER% "kill python.exe"
29 ssh %SSH_SERVER% "kill python_d.exe"
30 ssh %SSH_SERVER% "if EXIST %REMOTE_PYTHON_DIR% (rd %REMOTE_PYTHON_DIR% /s/q)"
33 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%PCBuild\arm32"
34 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%temp"
35 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%Modules"
36 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%PC"
57 echo The test worker should have the SSH agent running.
[all …]
DremotePythonInfo.bat25 ssh %SSH_SERVER% %PYTHON_EXE% -m test.pythoninfo
32 echo The test worker should have the SSH agent running.
33 echo Also a key must be created with ssh-keygen and added to both the buildbot worker machine
34 … ARM32 worker device: see https://docs.microsoft.com/en-us/windows/iot-core/connect-your-device/ssh
/third_party/curl/tests/
Dsshhelp.pm79 our $sshdexe = 'sshd' .exe_ext('SSH'); # base name and ext of ssh daemon
80 our $sshexe = 'ssh' .exe_ext('SSH'); # base name and ext of ssh client
81 our $sftpsrvexe = 'sftp-server' .exe_ext('SSH'); # base name and ext of sftp-server
82 our $sftpexe = 'sftp' .exe_ext('SSH'); # base name and ext of sftp client
83 our $sshkeygenexe = 'ssh-keygen' .exe_ext('SSH'); # base name and ext of ssh-keygen
84 our $httptlssrvexe = 'gnutls-serv' .exe_ext('SSH'); # base name and ext of gnutls-serv
85 our $sshdconfig = 'curl_sshd_config'; # ssh daemon config file
86 our $sshconfig = 'curl_ssh_config'; # ssh client config file
88 our $sshdlog = undef; # ssh daemon log file
89 our $sshlog = undef; # ssh client log file
[all …]
Dsshserver.pl27 # Also creates the ssh configuration files needed for these tests.
97 my $idnum = 1; # default ssh daemon instance number
98 my $proto = 'ssh'; # protocol the ssh daemon speaks
103 my $pidfile; # ssh daemon pid file
196 # Default ssh daemon pid file name & directory
209 # ssh and sftp server log file names
211 $sshdlog = server_logfilename($logdir, 'ssh', $ipvnum, $idnum);
216 # Logging level for ssh server and client
225 $error = 'Will not run ssh server without a user name';
228 $error = 'Will not run ssh server as root to mitigate security risks';
[all …]
/third_party/skia/infra/bots/recipe_modules/flavor/
Dssh.py11 """SSH flavor, used for running code on a remote device via SSH.
33 def ssh(self, title, *cmd, **kwargs): member in SSHFlavor
37 ssh_cmd = ['ssh', '-oConnectTimeout=15', '-oBatchMode=yes',
43 self.ssh('mkdir %s' % path, 'mkdir', '-p', path)
52 self.ssh('make %s executable' % self.app_name, 'chmod', '+x', device_path)
56 self.ssh('rm %s' % path, 'rm', '-rf', path)
60 rv = self.ssh('read %s' % path,
67 self.ssh('rm %s' % path, 'rm', '-f', path)
86 self.ssh(str(name), *cmd)
/third_party/libwebsockets/plugins/
DCMakeLists.txt196 create_plugin(protocol_lws_ssh_base "ssh-base/include"
197ssh-base/sshd.c;ssh-base/telnet.c;ssh-base/kex-25519.c" "ssh-base/crypto/chacha.c;ssh-base/crypto/…
202 create_plugin(protocol_lws_sshd_demo "ssh-base/include" "protocol_lws_sshd_demo.c" "" "")
207 include_directories("${PROJECT_SOURCE_DIR}/plugins/ssh-base/include")
Dprotocol_lws_sshd_demo.c31 #include <lws-ssh.h>
46 * This is a copy of the lws ssh test public key, you can find it in
47 * /usr[/local]/share/libwebsockets-test-server/lws-ssh-test-keys.pub
48 * and the matching private key there too in .../lws-ssh-test-keys
53 * ssh -p 2222 -i /usr/local/share/libwebsockets-test-server/lws-ssh-test-keys anyuser@127.0.0.1
59 "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCnWiP+c+kSD6Lk+C6NA9KruApa45sbt"
69 "Eu/B10U6Jf4Efojhh1dk85BD1LTIb+N3Q== ssh-test-key@lws";
267 if (strcmp(type, "ssh-rsa")) { in ssh_ops_is_pubkey_authorized()
268 lwsl_notice("type is not ssh-rsa\n"); in ssh_ops_is_pubkey_authorized()
346 " |\\---/| lws-ssh Test Server\n" in ssh_ops_banner()
[all …]
/third_party/curl/docs/cmdline-opts/
Dcompressed-ssh.md4 Long: compressed-ssh
5 Help: Enable SSH compression
8 Category: scp ssh
13 - --compressed-ssh sftp://example.com/
16 # `--compressed-ssh`
18 Enables built-in SSH compression. This is a request, not an order; the server
Dkey.md6 Protocols: TLS SSH
8 Category: tls ssh
21 file. For SSH, if not specified, curl tries the following candidates in order:
22 `~/.ssh/id_rsa`, `~/.ssh/id_dsa`, `./id_rsa`, `./id_dsa`.
/third_party/lwip/doc/
Dsavannah.txt6 2 - Committers/developers Git access using SSH
26 2 Committers/developers Git access using SSH
29 The Savannah server uses SSH (Secure Shell) protocol 2 authentication and encryption.
30 As such, Git commits to the server occur through a SSH tunnel for project members.
32 ssh-keygen
34 Under Windows, a recommended SSH client is "PuTTY", freely available with good
40 Try to login using SSH:
41 ssh -v your_login@git.sv.gnu.org
54 are allowed to use SSH for Git only. Now, you should be able to do this:
61 (If SSH asks about authenticity of the host, you can check the key
/third_party/curl/docs/libcurl/opts/
DCURLOPT_SSH_PRIVATE_KEYFILE.md17 CURLOPT_SSH_PRIVATE_KEYFILE - private key file for SSH auth
31 used, libcurl defaults to **$HOME/.ssh/id_rsa** or **$HOME/.ssh/id_dsa** if
38 The SSH library derives the public key from this private key when possible. If
39 the SSH library cannot derive the public key from the private one and no
60 "/home/clarkkent/.ssh/id_rsa");
DCURLOPT_SSH_PUBLIC_KEYFILE.md17 CURLOPT_SSH_PUBLIC_KEYFILE - public key file for SSH auth
31 libcurl defaults to **$HOME/.ssh/id_dsa.pub** if the HOME environment variable
35 public key to the SSH library, which then rather derives it from the private
36 key. If the SSH library cannot derive the public key from the private one and
56 "/home/clarkkent/.ssh/id_rsa.pub");
/third_party/skia/infra/bots/recipe_modules/flavor/examples/full.expected/
DPerf-ChromeOS-Clang-SamsungChromebookPlus-GPU-MaliT860-arm-Release-All.json37 "ssh",
55 "ssh",
102 "ssh",
121 "ssh",
140 "ssh",
159 "ssh",
178 "ssh",
210 "ssh",
229 "ssh",
307 "ssh",
[all …]
DTest-ChromeOS-Clang-SamsungChromebookPlus-GPU-MaliT860-arm-Release-All.json37 "ssh",
55 "ssh",
102 "ssh",
121 "ssh",
140 "ssh",
159 "ssh",
178 "ssh",
210 "ssh",
229 "ssh",
307 "ssh",
[all …]
/third_party/rust/crates/clang-sys/.github/workflows/
Dssh.yml1 name: SSH
12 ssh:
13 name: SSH
37 # SSH
38 - name: Enable SSH
/third_party/libwebsockets/plugins/ssh-base/include/
Dlws-plugin-ssh.h113 /*! \defgroup ssh-base plugin: lws-ssh-base
116 * ##Plugin lws-ssh-base
118 * This is the interface to customize the ssh server per-vhost. A pointer
122 * - "lws-ssh-base" - the ssh serving part
126 * This way you can have different instances of ssh servers wired up to
147 * lws_callback_on_writable() on this wsi causes your ssh server
167 * \param wsi: struct lws * for the ssh connection
184 * trigger the ssh protocol to ask if you have any tx waiting.
202 * trigger the ssh protocol to ask if you have any tx waiting. If you
246 * exec() - spawn command and wire up stdin/out/err to ssh channel
[all …]
/third_party/libwebsockets/test-apps/
Dtest-sshd.c21 * This test app listens on port 2200 for authorized ssh connections. Run it
28 * $ ssh -p 2200 -i /usr/local/share/libwebsockets-test-server/lws-ssh-test-keys anyuser@127.0.0.1
54 * This is a copy of the lws ssh test public key, you can find it in
55 * /usr[/local]/share/libwebsockets-test-server/lws-ssh-test-keys.pub
56 * and the matching private key there too in .../lws-ssh-test-keys
62 "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCnWiP+c+kSD6Lk+C6NA9KruApa45sbt"
72 "Eu/B10U6Jf4Efojhh1dk85BD1LTIb+N3Q== ssh-test-key@lws";
307 if (strcmp(type, "ssh-rsa")) { in ssh_ops_is_pubkey_authorized()
308 lwsl_notice("type is not ssh-rsa\n"); in ssh_ops_is_pubkey_authorized()
590 " |\\---/| lws-ssh Test Server\n" in ssh_ops_banner()
[all …]
/third_party/libwebsockets/minimal-examples/raw/minimal-raw-proxy/
DREADME.md6 By default the example will proxy 127.0.0.1:22, usually your ssh server
7 listen port, on 127.0.0.1:7681. You should be able to ssh into port 7681
8 the same as you can port 22. But your ssh server is only listening on port 22...
36 $ ssh -p7681 me@127.0.0.1
/third_party/curl/lib/vssh/
Dssh.h36 #include <wolfssh/ssh.h>
41 * SSH unique setup
47 SSH_INIT, /* First state in SSH-CONNECT */
65 SSH_SFTP_REALPATH, /* Last state in SSH-CONNECT */
141 sshstate state; /* always use ssh.c:state() to change state! */
195 LIBSSH2_AGENT *ssh_agent; /* proxy to ssh-agent/pageant */
260 /* generic SSH backend functions */
267 /* for non-SSH builds */
Dlibssh.c61 #include "ssh.h"
234 * SSH State machine related code
236 /* This is the ONLY way to change SSH state! */
312 infof(data, "SSH %p state change from %s to %s (line %d)", in mystate()
370 "Denied establishing ssh session: md5 fingerprint not available"); in myssh_is_known()
377 infof(data, "SSH MD5 fingerprint: %s", md5buffer); in myssh_is_known()
381 "Denied establishing ssh session: mismatch md5 fingerprint. " in myssh_is_known()
665 * ssh_statemach_act() runs the SSH state machine as far as it can without
674 struct SSHPROTO *protop = data->req.p.ssh; in myssh_statemach_act()
707 failf(data, "Failure establishing ssh session"); in myssh_statemach_act()
[all …]
/third_party/libwebsockets/minimal-examples/raw/minimal-raw-proxy-fallback/
DREADME.md9 your ssh server listen port, on 127.0.0.1:7681. You should be able to ssh into
12 https://127.0.0.1:7681 while your ssh client can still connect to the same
43 $ ssh -p7681 me@127.0.0.1
/third_party/ltp/runtest/
Dnet_stress.appl2 # Stress test for major application protocol (ssh, dns, http, ftp)
5 ssh4-stress ssh-stress.sh
6 ssh6-stress ssh-stress.sh -6

1234567891011