Home
last modified time | relevance | path

Searched full:ssh (Results 1 – 25 of 329) sorted by relevance

12345678910>>...14

/third_party/libwebsockets/READMEs/
DREADME.plugin-sshd-base.md1 ssh-base Plugin
6 lws-ssh-base is a protcol plugin for libwebsockets that implements a
7 generic, abstract, ssh server.
20 - The plugin has no built-in behaviours like check ~/.ssh/authorized_keys,
28 handlers. So it's role is something like an abstract base class for an ssh
44 |Server host key|ssh-rsa (4096b)|
50 lws-ssh-base is Free Software, available under libwebsockets' MIT license.
58 $ ssh-keygen -t rsa -b 4096 -f mykeys
63 with ssh, you can just use that directly.
71 spawns a bash shell when an ssh client authenticates. The username used on
[all …]
/third_party/ltp/testcases/network/stress/ssh/
Dssh-stress.sh14 TST_NEEDS_CMDS="sshd ssh ssh-keygen od pkill pgrep"
17 # SSH config file on the remote host
19 # SSH command to connect from the remote host to the test host
30 # Stop the ssh daemon
36 # Kill all remaining ssh processes
37 [ -n "$RHOST_SSH_CONF" ] && tst_rhost_run -c "pkill -f '^ssh $RHOST_SSH_CONF'"
63 ssh-keygen -q -N "" -t rsa -b 4096 -f $TST_TMPDIR/ssh_host_rsa_key
64 ssh-keygen -q -N "" -t ecdsa -f $TST_TMPDIR/ssh_host_ecdsa_key
65 ssh-keygen -q -N "" -t ed25519 -f $TST_TMPDIR/ssh_host_ed25519_key
68 tst_rhost_run -s -c "ssh-keygen -t rsa -N \"\" -f $TST_TMPDIR/id_rsa \
[all …]
/third_party/python/Tools/buildbot/
DremoteDeploy.bat18 ssh %SSH_SERVER% echo Make sure we can find SSH and SSH_SERVER variable is valid
19 if %ERRORLEVEL% NEQ 0 (echo SSH does not work) & exit /b %ERRORLEVEL%
28 ssh %SSH_SERVER% "kill python.exe"
29 ssh %SSH_SERVER% "kill python_d.exe"
30 ssh %SSH_SERVER% "if EXIST %REMOTE_PYTHON_DIR% (rd %REMOTE_PYTHON_DIR% /s/q)"
33 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%PCBuild\arm32"
34 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%temp"
35 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%Modules"
36 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%PC"
57 echo The test worker should have the SSH agent running.
[all …]
/third_party/grpc/tools/internal_ci/linux/aws/
Dgrpc_aws_run_remote_test.sh64 ssh-keygen -N '' -t rsa -b 4096 -f ~/.ssh/temp_client_key
65 ssh-keygen -N '' -t ecdsa -b 256 -f ~/.ssh/temp_server_key
66 SERVER_PRIVATE_KEY=$(cat ~/.ssh/temp_server_key | sed 's/\(.*\)/ \1/')
67 SERVER_PUBLIC_KEY=$(cat ~/.ssh/temp_server_key.pub | awk '{print $1 " " $2 " root@localhost"}')
68 SERVER_HOST_KEY_ENTRY=$(cat ~/.ssh/temp_server_key.pub | awk '{print $1 " " $2}')
69 CLIENT_PUBLIC_KEY=$(cat ~/.ssh/temp_client_key.pub)
97 echo $SERVER_HOST_KEY_ENTRY >> ~/.ssh/known_hosts
102 # use rsync over ssh since it's much faster than scp
103 time rsync -e "ssh -i ~/.ssh/temp_client_key" -a github/grpc ubuntu@$IP:~/workspace
111 # to avoid problems with ssh session not closing after the remote script finishes
[all …]
/third_party/mesa3d/.gitlab-ci/lava/utils/
Dssh_job_definition.py8 containers as a test alongside the DUT one, to be able to create an SSH server
9 in the DUT the earliest possible and an SSH client in a docker container, to
10 establish a SSH session between both, allowing the console output to be passed
11 via SSH pseudo terminal, instead of relying in the error-prone UART.
14 with SSH LAVA test-cases.
17 Although these chores are not required for establishing an SSH session, they are
23 1. [DUT] Logging in to DUT and run the SSH server with root access.
24 2. [DUT] Running the "init-stage1.sh" script for the first SSH test case.
26 4. [SSH] Enabling the pseudo-terminal for colors and running the "init-stage2.sh"
27 script after sourcing "dut-env-vars.sh" again for the second SSH test case.
[all …]
/third_party/skia/m133/infra/bots/recipe_modules/flavor/
Dssh.py11 """SSH flavor, used for running code on a remote device via SSH.
33 def ssh(self, title, *cmd, **kwargs): member in SSHFlavor
37 ssh_cmd = ['ssh', '-oConnectTimeout=15', '-oBatchMode=yes',
43 self.ssh('mkdir %s' % path, 'mkdir', '-p', path)
52 self.ssh('make %s executable' % self.app_name, 'chmod', '+x', device_path)
56 self.ssh('rm %s' % path, 'rm', '-rf', path)
60 rv = self.ssh('read %s' % path,
67 self.ssh('rm %s' % path, 'rm', '-f', path)
86 self.ssh(str(name), *cmd)
/third_party/skia/infra/bots/recipe_modules/flavor/
Dssh.py11 """SSH flavor, used for running code on a remote device via SSH.
33 def ssh(self, title, *cmd, **kwargs): member in SSHFlavor
37 ssh_cmd = ['ssh', '-oConnectTimeout=15', '-oBatchMode=yes',
43 self.ssh('mkdir %s' % path, 'mkdir', '-p', path)
52 self.ssh('make %s executable' % self.app_name, 'chmod', '+x', device_path)
56 self.ssh('rm %s' % path, 'rm', '-rf', path)
60 rv = self.ssh('read %s' % path,
67 self.ssh('rm %s' % path, 'rm', '-f', path)
86 self.ssh(str(name), *cmd)
/third_party/curl/tests/
Dsshhelp.pm79 our $sshdexe = 'sshd' .exe_ext('SSH'); # base name and ext of ssh daemon
80 our $sshexe = 'ssh' .exe_ext('SSH'); # base name and ext of ssh client
81 our $sftpsrvexe = 'sftp-server' .exe_ext('SSH'); # base name and ext of sftp-server
82 our $sftpexe = 'sftp' .exe_ext('SSH'); # base name and ext of sftp client
83 our $sshkeygenexe = 'ssh-keygen' .exe_ext('SSH'); # base name and ext of ssh-keygen
84 our $httptlssrvexe = 'gnutls-serv' .exe_ext('SSH'); # base name and ext of gnutls-serv
85 our $sshdconfig = 'curl_sshd_config'; # ssh daemon config file
86 our $sshconfig = 'curl_ssh_config'; # ssh client config file
88 our $sshdlog = undef; # ssh daemon log file
89 our $sshlog = undef; # ssh client log file
[all …]
Dsshserver.pl27 # Also creates the ssh configuration files needed for these tests.
97 my $idnum = 1; # default ssh daemon instance number
98 my $proto = 'ssh'; # protocol the ssh daemon speaks
103 my $pidfile; # ssh daemon pid file
196 # Default ssh daemon pid file name & directory
209 # ssh and sftp server log file names
211 $sshdlog = server_logfilename($logdir, 'ssh', $ipvnum, $idnum);
216 # Logging level for ssh server and client
225 $error = 'Will not run ssh server without a user name';
228 $error = 'Will not run ssh server as root to mitigate security risks';
[all …]
/third_party/libwebsockets/plugins/
DCMakeLists.txt196 create_plugin(protocol_lws_ssh_base "ssh-base/include"
197ssh-base/sshd.c;ssh-base/telnet.c;ssh-base/kex-25519.c" "ssh-base/crypto/chacha.c;ssh-base/crypto/…
202 create_plugin(protocol_lws_sshd_demo "ssh-base/include" "protocol_lws_sshd_demo.c" "" "")
207 include_directories("${PROJECT_SOURCE_DIR}/plugins/ssh-base/include")
Dprotocol_lws_sshd_demo.c31 #include <lws-ssh.h>
46 * This is a copy of the lws ssh test public key, you can find it in
47 * /usr[/local]/share/libwebsockets-test-server/lws-ssh-test-keys.pub
48 * and the matching private key there too in .../lws-ssh-test-keys
53 * ssh -p 2222 -i /usr/local/share/libwebsockets-test-server/lws-ssh-test-keys anyuser@127.0.0.1
59 "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCnWiP+c+kSD6Lk+C6NA9KruApa45sbt"
69 "Eu/B10U6Jf4Efojhh1dk85BD1LTIb+N3Q== ssh-test-key@lws";
267 if (strcmp(type, "ssh-rsa")) { in ssh_ops_is_pubkey_authorized()
268 lwsl_notice("type is not ssh-rsa\n"); in ssh_ops_is_pubkey_authorized()
346 " |\\---/| lws-ssh Test Server\n" in ssh_ops_banner()
[all …]
/third_party/curl/docs/cmdline-opts/
Dcompressed-ssh.md4 Long: compressed-ssh
5 Help: Enable SSH compression
8 Category: scp ssh
13 - --compressed-ssh sftp://example.com/
16 # `--compressed-ssh`
18 Enables built-in SSH compression. This is a request, not an order; the server
Dkey.md6 Protocols: TLS SSH
8 Category: tls ssh
21 file. For SSH, if not specified, curl tries the following candidates in order:
22 `~/.ssh/id_rsa`, `~/.ssh/id_dsa`, `./id_rsa`, `./id_dsa`.
/third_party/skia/m133/infra/bots/recipe_modules/flavor/examples/full.expected/
DPerf-ChromeOS-Clang-SamsungChromebookPlus-GPU-MaliT860-arm-Release-All.json37 "ssh",
55 "ssh",
102 "ssh",
121 "ssh",
140 "ssh",
159 "ssh",
178 "ssh",
210 "ssh",
229 "ssh",
297 "ssh",
[all …]
DTest-ChromeOS-Clang-SamsungChromebookPlus-GPU-MaliT860-arm-Release-All.json37 "ssh",
55 "ssh",
102 "ssh",
121 "ssh",
140 "ssh",
159 "ssh",
178 "ssh",
210 "ssh",
229 "ssh",
297 "ssh",
[all …]
/third_party/mesa3d/.gitlab-ci/tests/utils/
Dtest_lava_job_definition.py85 # Mock a Collabora farm-like device runner tag to enable SSH execution
89 @pytest.mark.parametrize("force_uart", [True, False], ids=["SSH", "UART"])
124 is_running_ssh = "ssh" in first_test_name
139 "test", # DUT: SSH server
140 "test", # Docker: SSH client
148 "test", # DUT: SSH server
149 "test", # Docker: SSH client
153 # SSH server in the DUT
155 # SSH client via docker
161 # SSH server bootstrapping
[all …]
/third_party/lwip/doc/
Dsavannah.txt6 2 - Committers/developers Git access using SSH
26 2 Committers/developers Git access using SSH
29 The Savannah server uses SSH (Secure Shell) protocol 2 authentication and encryption.
30 As such, Git commits to the server occur through a SSH tunnel for project members.
32 ssh-keygen
34 Under Windows, a recommended SSH client is "PuTTY", freely available with good
40 Try to login using SSH:
41 ssh -v your_login@git.sv.gnu.org
54 are allowed to use SSH for Git only. Now, you should be able to do this:
61 (If SSH asks about authenticity of the host, you can check the key
/third_party/curl/docs/libcurl/opts/
DCURLOPT_SSH_PRIVATE_KEYFILE.md17 CURLOPT_SSH_PRIVATE_KEYFILE - private key file for SSH auth
31 used, libcurl defaults to **$HOME/.ssh/id_rsa** or **$HOME/.ssh/id_dsa** if
38 The SSH library derives the public key from this private key when possible. If
39 the SSH library cannot derive the public key from the private one and no
60 "/home/clarkkent/.ssh/id_rsa");
DCURLOPT_SSH_PUBLIC_KEYFILE.md17 CURLOPT_SSH_PUBLIC_KEYFILE - public key file for SSH auth
31 libcurl defaults to **$HOME/.ssh/id_dsa.pub** if the HOME environment variable
35 public key to the SSH library, which then rather derives it from the private
36 key. If the SSH library cannot derive the public key from the private one and
56 "/home/clarkkent/.ssh/id_rsa.pub");
/third_party/grpc/tools/run_tests/performance/
Dremote_host_prepare.sh23 ssh "${USER_AT_HOST}" "killall -9 qps_worker dotnet mono node ruby worker || true"
27 ssh "${USER_AT_HOST}" "ps -e | egrep 'qps_worker|dotnet' | awk '{print \$1}' | xargs kill -9 || tru…
30 ssh "${USER_AT_HOST}" "rm -rf ~/performance_workspace && mkdir -p ~/performance_workspace"
36 ssh "${USER_AT_HOST}" "tar -xf ~/performance_workspace/grpc.tar -C ~/performance_workspace || tar -…
40 ssh "${USER_AT_HOST}" "~/performance_workspace/grpc/tools/run_tests/performance/kill_workers.sh"
43 ssh "${USER_AT_HOST}" "cd ~/performance_workspace/grpc/ && python tools/run_tests/start_port_server…
/third_party/rust/crates/clang-sys/.github/workflows/
Dssh.yml1 name: SSH
12 ssh:
13 name: SSH
37 # SSH
38 - name: Enable SSH
/third_party/skia/infra/bots/recipe_modules/flavor/examples/full.expected/
DTest-ChromeOS-Clang-SamsungChromebookPlus-GPU-MaliT860-arm-Release-All.json37 "ssh",
55 "ssh",
102 "ssh",
121 "ssh",
140 "ssh",
159 "ssh",
178 "ssh",
210 "ssh",
229 "ssh",
307 "ssh",
[all …]
DPerf-ChromeOS-Clang-SamsungChromebookPlus-GPU-MaliT860-arm-Release-All.json37 "ssh",
55 "ssh",
102 "ssh",
121 "ssh",
140 "ssh",
159 "ssh",
178 "ssh",
210 "ssh",
229 "ssh",
307 "ssh",
[all …]
/third_party/grpc/tools/internal_ci/helper_scripts/
Dprepare_build_linux_perf_multilang_rc35 # Allow SSH to Kokoro performance workers without explicit key verification
36 gsutil cp gs://grpc-testing-secrets/grpc_kokoro_performance_ssh_keys/id_rsa ~/.ssh
37 echo -e 'Host grpc-kokoro-performance*\n\tStrictHostKeyChecking no' >> ~/.ssh/config
38 chmod 600 ~/.ssh/id_rsa ~/.ssh/config
/third_party/grpc/tools/gce/
Dkokoro_performance.pub1 # Enable Kokoro CI to SSH to the VM (Added by linux_kokoro_performance_worker_init.sh)
2 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDg7L/ZaEauETWrPklUTky3kvxqQfe2Ax/2CsSqhNIGNMnK/8d79CHlmY9+dE1…
3 # Enable kokoro multi-machine benchmark driver VM to SSH to the VM (Added by linux_kokoro_performan…
4 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKQ5UEX4AFefec9BKICupFS7x9Hoq4ZyLKy+QX0J31I49ew9mG2AJlr3sp8ql…

12345678910>>...14