| /external/autotest/server/hosts/ |
| D | cros_repair_unittest.py | 21 (repair_utils.SshVerifier, 'ssh', ('ping', )), 23 (cros_repair.DevDefaultBootVerifier, 'dev_default_boot', ('ssh', )), 24 (cros_repair.DevModeVerifier, 'devmode', ('ssh', )), 25 (cros_repair.EnrollmentStateVerifier, 'enrollment_state', ('ssh', )), 26 (cros_repair.HWIDVerifier, 'hwid', ('ssh', )), 27 (cros_repair.ACPowerVerifier, 'power', ('ssh', )), 28 (cros_repair.EXT4fsErrorVerifier, 'ext4', ('ssh', )), 29 (cros_repair.WritableVerifier, 'writable', ('ssh', )), 30 (cros_repair.TPMStatusVerifier, 'tpm', ('ssh', )), 31 (cros_repair.UpdateSuccessVerifier, 'good_provision', ('ssh', )), [all …]
|
| D | ssh_multiplex.py | 22 '/usr/bin/ssh -a -x -N ' 37 """Manages multiplex ssh connection.""" 58 """Returns the ssh option to use this multiplexed ssh. 67 """Starts the background process to run multiplex ssh connection. 73 @param timeout: timeout in seconds (default 5) to wait for main ssh 79 # ssh connection and create a new one, therefore use a lock to protect 82 # If a previously started main SSH connection is not running 87 'Main-ssh connection to %s is down.', self._hostname) 90 # Start a new main SSH connection. 95 # Start the main SSH connection in the background. [all …]
|
| D | ssh_host.py | 11 SSHHost: a remote machine with a ssh access 46 This class represents a remote machine controlled through an ssh 57 serial console available then ordinary SSH-based commands will 82 Construct an ssh command with proper args for this host. 85 @param options: SSH options 86 @param alive_interval: SSH Alive interval. 87 @param alive_count_max: SSH AliveCountMax. 88 @param connection_attempts: SSH ConnectionAttempts 116 Prepend the command for the client with information about the ssh 119 @param command: the ssh command to be executed. [all …]
|
| /external/libwebsockets/READMEs/ |
| D | README.plugin-sshd-base.md | 1 ssh-base Plugin 6 lws-ssh-base is a protcol plugin for libwebsockets that implements a 7 generic, abstract, ssh server. 20 - The plugin has no built-in behaviours like check ~/.ssh/authorized_keys, 28 handlers. So it's role is something like an abstract base class for an ssh 44 |Server host key|ssh-rsa (4096b)| 50 lws-ssh-base is Free Software, available under libwebsockets' MIT license. 58 $ ssh-keygen -t rsa -b 4096 -f mykeys 63 with ssh, you can just use that directly. 71 spawns a bash shell when an ssh client authenticates. The username used on [all …]
|
| /external/ltp/testcases/network/stress/ssh/ |
| D | ssh-stress.sh | 14 TST_NEEDS_CMDS="sshd ssh ssh-keygen od pkill pgrep" 17 # SSH config file on the remote host 19 # SSH command to connect from the remote host to the test host 30 # Stop the ssh daemon 36 # Kill all remaining ssh processes 37 [ -n "$RHOST_SSH_CONF" ] && tst_rhost_run -c "pkill -f '^ssh $RHOST_SSH_CONF'" 63 ssh-keygen -q -N "" -t rsa -b 4096 -f $TST_TMPDIR/ssh_host_rsa_key 64 ssh-keygen -q -N "" -t ecdsa -f $TST_TMPDIR/ssh_host_ecdsa_key 65 ssh-keygen -q -N "" -t ed25519 -f $TST_TMPDIR/ssh_host_ed25519_key 68 tst_rhost_run -s -c "ssh-keygen -t rsa -N \"\" -f $TST_TMPDIR/id_rsa \ [all …]
|
| /external/autotest/server/cros/network/rf_switch/ |
| D | rf_switch_ssh_tunnel.py | 5 """Interface to RF Switch over SSH tunnel. 8 a firewall and can be accessed through a SSH tunnel. Please make sure you 9 can login to SSH Tunnel machine without a password by configuring the ssh 18 | Test +-----| -------+ SSH +------+ RF | 38 """RF Switch handler over ssh tunnel.""" 50 @param proxy_host: Hostname or IP address of SSH tunnel device 51 @param proxy_username: Username for SSH tunnel device 53 @param proxy_port: port number to bind for SSH tunnel 77 """Start a RF Switch with ssh tunnel session and close it when done. 82 @param proxy_host: Hostname or IP address of SSH tunnel device [all …]
|
| D | scpi_ssh_tunnel.py | 5 """Interface for SCPI Protocol through a SSH tunnel. 8 a firewall and can be accessed through a SSH tunnel. Please make sure you 9 can login to SSH Tunnel machine without a password by configuring the ssh 18 | Test +-----| -------+ SSH +------+ SCPI | 44 """Class for SCPI protocol though SSH tunnel.""" 57 @param proxy_host: Hostname or IP address of SSH tunnel device 58 @param proxy_username: Username for SSH tunnel device 60 @param proxy_port: port number to bind for SSH tunnel. If 73 # Start SSH tunnel 81 'Started ssh tunnel, local = %d, remote = %d, pid = %d', [all …]
|
| /external/selinux/scripts/ci/ |
| D | travis-kvm-setup.sh | 40 # Set up a key so we can ssh into the VM 41 ssh-keygen -N "" -f "$HOME/.ssh/id_rsa" 65 # - Force a relabel to fix labels on ssh keys 70 --append-line '/etc/ssh/sshd_config:PermitRootLogin yes' \ 71 --append-line '/etc/ssh/sshd_config:PubkeyAuthentication yes' \ 72 --mkdir /root/.ssh \ 73 --upload "$HOME/.ssh/id_rsa.pub:/root/.ssh/authorized_keys" \ 74 --chmod '0600:/root/.ssh/authorized_keys' \ 75 --run-command 'chown root:root /root/.ssh/authorized_keys' \ 82 # It should be ready to go for ssh, once ssh starts. [all …]
|
| /external/python/cpython3/Tools/buildbot/ |
| D | remoteDeploy.bat | 18 ssh %SSH_SERVER% echo Make sure we can find SSH and SSH_SERVER variable is valid 19 if %ERRORLEVEL% NEQ 0 (echo SSH does not work) & exit /b %ERRORLEVEL% 28 ssh %SSH_SERVER% "kill python.exe" 29 ssh %SSH_SERVER% "kill python_d.exe" 30 ssh %SSH_SERVER% "if EXIST %REMOTE_PYTHON_DIR% (rd %REMOTE_PYTHON_DIR% /s/q)" 33 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%PCBuild\arm32" 34 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%temp" 35 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%Modules" 36 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%PC" 57 echo The test worker should have the SSH agent running. [all …]
|
| /external/python/google-api-python-client/docs/dyn/ |
| D | oslogin_v1.users.sshPublicKeys.html | 82 <p class="firstline">Create an SSH public key</p> 85 <p class="firstline">Deletes an SSH public key.</p> 88 <p class="firstline">Retrieves an SSH public key.</p> 91 <p class="firstline">Updates an SSH public key and returns the profile information. This method sup… 100 <pre>Create an SSH public key 107 { # The SSH public key information associated with a Google account. 109 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… 110 …"key": "A String", # Public key text in SSH format, defined by RFC4253 section… 122 { # The SSH public key information associated with a Google account. 124 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… [all …]
|
| D | oslogin_v1beta.users.sshPublicKeys.html | 82 <p class="firstline">Create an SSH public key</p> 85 <p class="firstline">Deletes an SSH public key.</p> 88 <p class="firstline">Retrieves an SSH public key.</p> 91 <p class="firstline">Updates an SSH public key and returns the profile information. This method sup… 100 <pre>Create an SSH public key 107 { # The SSH public key information associated with a Google account. 109 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… 110 …"key": "A String", # Public key text in SSH format, defined by RFC4253 section… 122 { # The SSH public key information associated with a Google account. 124 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… [all …]
|
| D | oslogin_v1alpha.users.sshPublicKeys.html | 82 <p class="firstline">Create an SSH public key</p> 85 <p class="firstline">Deletes an SSH public key.</p> 88 <p class="firstline">Retrieves an SSH public key.</p> 91 <p class="firstline">Updates an SSH public key and returns the profile information. This method sup… 100 <pre>Create an SSH public key 107 { # The SSH public key information associated with a Google account. 109 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… 110 …"key": "A String", # Public key text in SSH format, defined by RFC4253 section… 122 { # The SSH public key information associated with a Google account. 124 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… [all …]
|
| D | baremetalsolution_v1alpha1.projects.sshKeys.html | 82 <p class="firstline">Create a new SSH key registration in the specified project.</p> 85 <p class="firstline">Delete an SSH key registration in the specified project.</p> 88 <p class="firstline">List the public SSH keys registered for the specified project.</p> 100 <pre>Create a new SSH key registration in the specified project. 103 parent: string, Required. The parent project containing the SSH keys. (required) 107 { # A public SSH key registered in the project. Used primarily for the interactive serial console f… 108 "name": "A String", # Output only. The name of this SSH key. 109 "publicKey": "A String", # The public SSH key. 121 …{ # A public SSH key registered in the project. Used primarily for the interactive serial console … 122 "name": "A String", # Output only. The name of this SSH key. [all …]
|
| /external/grpc-grpc/tools/internal_ci/linux/aws/ |
| D | grpc_aws_run_remote_test.sh | 64 ssh-keygen -N '' -t rsa -b 4096 -f ~/.ssh/temp_client_key 65 ssh-keygen -N '' -t ecdsa -b 256 -f ~/.ssh/temp_server_key 66 SERVER_PRIVATE_KEY=$(cat ~/.ssh/temp_server_key | sed 's/\(.*\)/ \1/') 67 SERVER_PUBLIC_KEY=$(cat ~/.ssh/temp_server_key.pub | awk '{print $1 " " $2 " root@localhost"}') 68 SERVER_HOST_KEY_ENTRY=$(cat ~/.ssh/temp_server_key.pub | awk '{print $1 " " $2}') 69 CLIENT_PUBLIC_KEY=$(cat ~/.ssh/temp_client_key.pub) 97 echo $SERVER_HOST_KEY_ENTRY >> ~/.ssh/known_hosts 102 # use rsync over ssh since it's much faster than scp 103 time rsync -e "ssh -i ~/.ssh/temp_client_key" -a github/grpc ubuntu@$IP:~/workspace 111 # to avoid problems with ssh session not closing after the remote script finishes [all …]
|
| /external/rust/crates/grpcio-sys/grpc/tools/internal_ci/linux/aws/ |
| D | grpc_aws_run_remote_test.sh | 64 ssh-keygen -N '' -t rsa -b 4096 -f ~/.ssh/temp_client_key 65 ssh-keygen -N '' -t ecdsa -b 256 -f ~/.ssh/temp_server_key 66 SERVER_PRIVATE_KEY=$(cat ~/.ssh/temp_server_key | sed 's/\(.*\)/ \1/') 67 SERVER_PUBLIC_KEY=$(cat ~/.ssh/temp_server_key.pub | awk '{print $1 " " $2 " root@localhost"}') 68 SERVER_HOST_KEY_ENTRY=$(cat ~/.ssh/temp_server_key.pub | awk '{print $1 " " $2}') 69 CLIENT_PUBLIC_KEY=$(cat ~/.ssh/temp_client_key.pub) 97 echo $SERVER_HOST_KEY_ENTRY >> ~/.ssh/known_hosts 102 # use rsync over ssh since it's much faster than scp 103 time rsync -e "ssh -i ~/.ssh/temp_client_key" -a github/grpc ubuntu@$IP:~/workspace 111 # to avoid problems with ssh session not closing after the remote script finishes [all …]
|
| /external/google-cloud-java/java-appengine-admin/proto-google-cloud-appengine-admin-v1/src/main/java/com/google/appengine/v1/ |
| D | DebugInstanceRequestOrBuilder.java | 57 * Public SSH key to add to the instance. Examples: 58 * * `[USERNAME]:ssh-rsa [KEY_VALUE] [USERNAME]` 59 …* * `[USERNAME]:ssh-rsa [KEY_VALUE] google-ssh {"userName":"[USERNAME]","expireOn":"[EXPIRE_TIME]"… 61 …* [Adding and Removing SSH Keys](https://cloud.google.com/compute/docs/instances/adding-removing-s… 73 * Public SSH key to add to the instance. Examples: 74 * * `[USERNAME]:ssh-rsa [KEY_VALUE] [USERNAME]` 75 …* * `[USERNAME]:ssh-rsa [KEY_VALUE] google-ssh {"userName":"[USERNAME]","expireOn":"[EXPIRE_TIME]"… 77 …* [Adding and Removing SSH Keys](https://cloud.google.com/compute/docs/instances/adding-removing-s…
|
| D | DebugInstanceRequest.java | 132 * Public SSH key to add to the instance. Examples: 133 * * `[USERNAME]:ssh-rsa [KEY_VALUE] [USERNAME]` 134 …* * `[USERNAME]:ssh-rsa [KEY_VALUE] google-ssh {"userName":"[USERNAME]","expireOn":"[EXPIRE_TIME]"… 136 …* [Adding and Removing SSH Keys](https://cloud.google.com/compute/docs/instances/adding-removing-s… 159 * Public SSH key to add to the instance. Examples: 160 * * `[USERNAME]:ssh-rsa [KEY_VALUE] [USERNAME]` 161 …* * `[USERNAME]:ssh-rsa [KEY_VALUE] google-ssh {"userName":"[USERNAME]","expireOn":"[EXPIRE_TIME]"… 163 …* [Adding and Removing SSH Keys](https://cloud.google.com/compute/docs/instances/adding-removing-s… 664 * Public SSH key to add to the instance. Examples: 665 * * `[USERNAME]:ssh-rsa [KEY_VALUE] [USERNAME]` [all …]
|
| /external/mesa3d/.gitlab-ci/lava/utils/ |
| D | ssh_job_definition.py | 8 containers as a test alongside the DUT one, to be able to create an SSH server 9 in the DUT the earliest possible and an SSH client in a docker container, to 10 establish a SSH session between both, allowing the console output to be passed 11 via SSH pseudo terminal, instead of relying in the error-prone UART. 14 with SSH LAVA test-cases. 17 Although these chores are not required for establishing an SSH session, they are 23 1. [DUT] Logging in to DUT and run the SSH server with root access. 24 2. [DUT] Running the "init-stage1.sh" script for the first SSH test case. 26 4. [SSH] Enabling the pseudo-terminal for colors and running the "init-stage2.sh" 27 script after sourcing "dut-env-vars.sh" again for the second SSH test case. [all …]
|
| /external/autotest/server/site_tests/autoupdate_EndToEndTest/ |
| D | control | 91 4. Setup ssh correctly. 92 You will need to setup a number of ssh keys and then copy them to 93 your chroot so that you can ssh into a devserver from there. 95 Run ssh-keygen to generate your id_rsa and id_rsa.pub files into ~/.ssh/ 97 Download the testing_rsa ssh keys from here: 99 Save both to ~/.ssh 100 chmod 600 ~/.ssh/testing_rsa* (otherwise permissions are too loose and 103 Add these lines to your ~/.ssh/config 106 IdentityFile /usr/local/google/home/<your ldap here>/.ssh/testing_rsa 108 You should now be able to ssh into DUTs in the lab without a password. [all …]
|
| /external/googleapis/google/cloud/oslogin/v1beta/ |
| D | oslogin.proto | 37 // The Cloud OS Login API allows you to manage users and their associated SSH 47 // Create an SSH public key 66 // Deletes an SSH public key. 84 // Retrieves an SSH public key. 93 // Adds an SSH public key and returns the profile information. Default POSIX 106 // Updates an SSH public key and returns the profile information. This method 118 // Signs an SSH public key for a user to authenticate to an instance. 142 // A map from SSH public key fingerprint to the associated key object. 149 // A request message for creating an SSH public key. 159 // Required. The SSH public key and expiration time. [all …]
|
| /external/cldr/tools/scripts/ansible/ |
| D | backup-db-playbook.yml | 28 - name: set up /home/cldrbackup/.ssh/ 30 path: /home/cldrbackup/.ssh/ 35 - name: set up /home/cldrbackup/.ssh/config 38 dest: /home/cldrbackup/.ssh/config 42 - name: set up /home/cldrbackup/.ssh/id_rsa 46 dest: /home/cldrbackup/.ssh/id_rsa 50 - name: set up /home/cldrbackup/.ssh/id_rsa.pub 53 dest: /home/cldrbackup/.ssh/id_rsa.pub 57 - name: set up /home/cldrbackup/.ssh/known_hosts 60 dest: /home/cldrbackup/.ssh/known_hosts
|
| D | README.md | 23 - Make sure you can `ssh` into all of the needed systems. For example, 24 `ssh cldr-ref.unicode.org` should succeed without needing a password. 57 ssh-keygen -t rsa -b 4096 -f ./local-vars/surveytool -P '' -C 'surveytool deploy' 73 run `ssh-keyscan smoketest.example.com` where _smoketest.example.com_ 75 secret. One of these lines should match `~/.ssh/known_hosts` on your 76 own system when you ssh into smoketest. 77 Try `grep -i smoke ~/.ssh/known_hosts` 84 …herwise, create new ones with `ssh-keygen -t rsa` and copy the public key to corp.unicode.org with… 115 key: ssh-rsa … ( SSH key goes here) 126 ssh-keygen -t rsa -b 2048 -C 'CLDR Commit Checker' -f local-vars/cldrcc/id_rsa [all …]
|
| /external/curl/tests/ |
| D | sshhelp.pm | 79 our $sshdexe = 'sshd' .exe_ext('SSH'); # base name and ext of ssh daemon 80 our $sshexe = 'ssh' .exe_ext('SSH'); # base name and ext of ssh client 81 our $sftpsrvexe = 'sftp-server' .exe_ext('SSH'); # base name and ext of sftp-server 82 our $sftpexe = 'sftp' .exe_ext('SSH'); # base name and ext of sftp client 83 our $sshkeygenexe = 'ssh-keygen' .exe_ext('SSH'); # base name and ext of ssh-keygen 84 our $httptlssrvexe = 'gnutls-serv' .exe_ext('SSH'); # base name and ext of gnutls-serv 85 our $sshdconfig = 'curl_sshd_config'; # ssh daemon config file 86 our $sshconfig = 'curl_ssh_config'; # ssh client config file 88 our $sshdlog = undef; # ssh daemon log file 89 our $sshlog = undef; # ssh client log file [all …]
|
| /external/googleapis/google/cloud/baremetalsolution/v2/ |
| D | ssh_key.proto | 30 // An SSH key, used for authorizing with the interactive serial console feature. 37 // Output only. The name of this SSH key. 41 // The public SSH key. This must be in OpenSSH .authorized_keys format. 45 // Message for listing the public SSH keys in a project. 47 // Required. The parent containing the SSH keys. 65 // The SSH keys registered in the project. 73 // Message for registering a public SSH key in a project. 75 // Required. The parent containing the SSH keys. 83 // Required. The SSH key to register. 94 // Message for deleting an SSH key from a project. [all …]
|
| /external/autotest/site_utils/lxc/ |
| D | config.py | 17 "source": "ssh", 18 "target": "/root/.ssh", 49 2. Copy all files in ssh to /root/.ssh in container. 82 the module still supports copy over files like ssh config and autotest 215 # 2. Set ssh logleve to ERROR for all hosts. 292 1. Disable main ssh connection in shadow config, as it is not working 306 # container does not support main ssh connection yet. 343 """Modify ssh config for it to work inside container. 347 Therefore, the source of ssh config must be properly updated to be able 352 ssh_config = '/root/.ssh/config' [all …]
|