Home
last modified time | relevance | path

Searched full:ssh (Results 1 – 25 of 322) sorted by relevance

12345678910>>...13

/third_party/libwebsockets/READMEs/
DREADME.plugin-sshd-base.md1 ssh-base Plugin
6 lws-ssh-base is a protcol plugin for libwebsockets that implements a
7 generic, abstract, ssh server.
20 - The plugin has no built-in behaviours like check ~/.ssh/authorized_keys,
28 handlers. So it's role is something like an abstract base class for an ssh
44 |Server host key|ssh-rsa (4096b)|
50 lws-ssh-base is Free Software, available under libwebsockets' MIT license.
58 $ ssh-keygen -t rsa -b 4096 -f mykeys
63 with ssh, you can just use that directly.
71 spawns a bash shell when an ssh client authenticates. The username used on
[all …]
DREADME.http-fallback.md24 What happens if you try to connect, eg, an ssh client to the http server port
47 socket to handle both http(s) and a second protocol, as we will see, like ssh.
165 But if you try to connect to it with an ssh client, that will also work fine.
169 `ssh -p 443 invalid@libwebsockets.org`... you will get permission denied from
170 your ssh client. With valid credentials in fact that works perfectly for
171 ssh, scp, git-over-ssh etc all on port 443...
/third_party/gstreamer/gstplugins_bad/tests/check/elements/
Dcurlsftpsink.c74 g_object_set (G_OBJECT (sink), "ssh-auth-type", CURLSSH_AUTH_PUBLICKEY, NULL); in GST_START_TEST()
75 g_object_set (G_OBJECT (sink), "ssh-pub-keyfile", "public_key_file", NULL); in GST_START_TEST()
76 g_object_set (G_OBJECT (sink), "ssh-priv-keyfile", "private_key_file", NULL); in GST_START_TEST()
77 g_object_set (G_OBJECT (sink), "ssh-knownhosts", "known_hosts", NULL); in GST_START_TEST()
78 g_object_set (G_OBJECT (sink), "ssh-host-pubkey-md5", in GST_START_TEST()
81 g_object_set (G_OBJECT (sink), "ssh-host-pubkey-sha256", in GST_START_TEST()
84 g_object_set (G_OBJECT (sink), "ssh-accept-unknownhost", TRUE, NULL); in GST_START_TEST()
85 g_object_set (G_OBJECT (sink), "ssh-key-passphrase", "SoMePaSsPhRaSe", NULL); in GST_START_TEST()
95 "ssh-auth-type", &res_auth_type, "ssh-pub-keyfile", &res_pubkey_file, in GST_START_TEST()
96 "ssh-priv-keyfile", &res_privkey_file, "ssh-knownhosts", &res_kh_file, in GST_START_TEST()
[all …]
/third_party/ltp/testcases/network/stress/ssh/
Dssh-stress.sh14 TST_NEEDS_CMDS="sshd ssh ssh-keygen od pkill pgrep"
18 # SSH config file on the remote host
20 # SSH command to connect from the remote host to the test host
31 # Stop the ssh daemon
37 # Kill all remaining ssh processes
38 [ -n "$RHOST_SSH_CONF" ] && tst_rhost_run -c "pkill -f '^ssh $RHOST_SSH_CONF'"
64 ssh-keygen -q -N "" -t rsa -b 4096 -f $TST_TMPDIR/ssh_host_rsa_key
65 ssh-keygen -q -N "" -t ecdsa -f $TST_TMPDIR/ssh_host_ecdsa_key
66 ssh-keygen -q -N "" -t ed25519 -f $TST_TMPDIR/ssh_host_ed25519_key
69 tst_rhost_run -s -c "ssh-keygen -t rsa -N \"\" -f $TST_TMPDIR/id_rsa \
[all …]
/third_party/python/Tools/buildbot/
DremoteDeploy.bat18 ssh %SSH_SERVER% echo Make sure we can find SSH and SSH_SERVER variable is valid
19 if %ERRORLEVEL% NEQ 0 (echo SSH does not work) & exit /b %ERRORLEVEL%
28 ssh %SSH_SERVER% "kill python.exe"
29 ssh %SSH_SERVER% "kill python_d.exe"
30 ssh %SSH_SERVER% "if EXIST %REMOTE_PYTHON_DIR% (rd %REMOTE_PYTHON_DIR% /s/q)"
33 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%PCBuild\arm32"
34 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%temp"
35 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%Modules"
36 ssh %SSH_SERVER% "md %REMOTE_PYTHON_DIR%PC"
57 echo The test worker should have the SSH agent running.
[all …]
DremotePythonInfo.bat25 ssh %SSH_SERVER% %PYTHON_EXE% -m test.pythoninfo
32 echo The test worker should have the SSH agent running.
33 echo Also a key must be created with ssh-keygen and added to both the buildbot worker machine
34 … ARM32 worker device: see https://docs.microsoft.com/en-us/windows/iot-core/connect-your-device/ssh
/third_party/gstreamer/gstplugins_bad/ext/curl/
Dgstcurlsshsink.c74 /* curl SSH-key matching callback */
122 "curl ssh sink element"); in gst_curl_ssh_sink_class_init()
125 "Curl SSH sink", "Sink/Network", in gst_curl_ssh_sink_class_init()
126 "Upload data over SSH/SFTP using libcurl", "Sorin L. <sorin@axis.com>"); in gst_curl_ssh_sink_class_init()
136 g_param_spec_enum ("ssh-auth-type", "SSH authentication type", in gst_curl_ssh_sink_class_init()
137 "SSH authentication method to authenticate on the SSH/SFTP server", in gst_curl_ssh_sink_class_init()
142 g_param_spec_string ("ssh-pub-keyfile", in gst_curl_ssh_sink_class_init()
143 "SSH public key file", in gst_curl_ssh_sink_class_init()
144 "The complete path & filename of the SSH public key file", in gst_curl_ssh_sink_class_init()
148 g_param_spec_string ("ssh-priv-keyfile", in gst_curl_ssh_sink_class_init()
[all …]
Dgstcurlsftpsink.c26 * a SFTP (SSH File Transfer Protocol) server.
36 * ssh-auth-type=1 ssh-key-passphrase=blabla \
37 * ssh-pub-keyfile=/home/jdoe/.ssh/id_rsa.pub \
38 * ssh-priv-keyfile=/home/jdoe/.ssh/id_rsa \
/third_party/curl/tests/
Dsshhelp.pm79 our $sshdexe = 'sshd' .exe_ext('SSH'); # base name and ext of ssh daemon
80 our $sshexe = 'ssh' .exe_ext('SSH'); # base name and ext of ssh client
81 our $sftpsrvexe = 'sftp-server' .exe_ext('SSH'); # base name and ext of sftp-server
82 our $sftpexe = 'sftp' .exe_ext('SSH'); # base name and ext of sftp client
83 our $sshkeygenexe = 'ssh-keygen' .exe_ext('SSH'); # base name and ext of ssh-keygen
84 our $httptlssrvexe = 'gnutls-serv' .exe_ext('SSH'); # base name and ext of gnutls-serv
85 our $sshdconfig = 'curl_sshd_config'; # ssh daemon config file
86 our $sshconfig = 'curl_ssh_config'; # ssh client config file
88 our $sshdlog = undef; # ssh daemon log file
89 our $sshlog = undef; # ssh client log file
[all …]
Dsshserver.pl27 # Also creates the ssh configuration files needed for these tests.
97 my $idnum = 1; # default ssh daemon instance number
98 my $proto = 'ssh'; # protocol the ssh daemon speaks
103 my $pidfile; # ssh daemon pid file
196 # Default ssh daemon pid file name & directory
209 # ssh and sftp server log file names
211 $sshdlog = server_logfilename($logdir, 'ssh', $ipvnum, $idnum);
216 # Logging level for ssh server and client
225 $error = 'Will not run ssh server without a user name';
228 $error = 'Will not run ssh server as root to mitigate security risks';
[all …]
/third_party/libwebsockets/plugins/
DCMakeLists.txt196 create_plugin(protocol_lws_ssh_base "ssh-base/include"
197ssh-base/sshd.c;ssh-base/telnet.c;ssh-base/kex-25519.c" "ssh-base/crypto/chacha.c;ssh-base/crypto/…
202 create_plugin(protocol_lws_sshd_demo "ssh-base/include" "protocol_lws_sshd_demo.c" "" "")
207 include_directories("${PROJECT_SOURCE_DIR}/plugins/ssh-base/include")
Dprotocol_lws_sshd_demo.c31 #include <lws-ssh.h>
46 * This is a copy of the lws ssh test public key, you can find it in
47 * /usr[/local]/share/libwebsockets-test-server/lws-ssh-test-keys.pub
48 * and the matching private key there too in .../lws-ssh-test-keys
53 * ssh -p 2222 -i /usr/local/share/libwebsockets-test-server/lws-ssh-test-keys anyuser@127.0.0.1
59 "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCnWiP+c+kSD6Lk+C6NA9KruApa45sbt"
69 "Eu/B10U6Jf4Efojhh1dk85BD1LTIb+N3Q== ssh-test-key@lws";
267 if (strcmp(type, "ssh-rsa")) { in ssh_ops_is_pubkey_authorized()
268 lwsl_notice("type is not ssh-rsa\n"); in ssh_ops_is_pubkey_authorized()
346 " |\\---/| lws-ssh Test Server\n" in ssh_ops_banner()
[all …]
/third_party/skia/infra/bots/recipe_modules/flavor/
Dssh.py11 """SSH flavor, used for running code on a remote device via SSH.
33 def ssh(self, title, *cmd, **kwargs): member in SSHFlavor
37 ssh_cmd = ['ssh', '-oConnectTimeout=15', '-oBatchMode=yes',
43 self.ssh('mkdir %s' % path, 'mkdir', '-p', path)
52 self.ssh('make %s executable' % self.app_name, 'chmod', '+x', device_path)
56 self.ssh('rm %s' % path, 'rm', '-rf', path)
60 rv = self.ssh('read %s' % path,
67 self.ssh('rm %s' % path, 'rm', '-f', path)
86 self.ssh(str(name), *cmd)
/third_party/lwip/doc/
Dsavannah.txt6 2 - Committers/developers Git access using SSH
26 2 Committers/developers Git access using SSH
29 The Savannah server uses SSH (Secure Shell) protocol 2 authentication and encryption.
30 As such, Git commits to the server occur through a SSH tunnel for project members.
32 ssh-keygen
34 Under Windows, a recommended SSH client is "PuTTY", freely available with good
40 Try to login using SSH:
41 ssh -v your_login@git.sv.gnu.org
54 are allowed to use SSH for Git only. Now, you should be able to do this:
61 (If SSH asks about authenticity of the host, you can check the key
/third_party/curl/docs/cmdline-opts/
Dcompressed-ssh.d3 Long: compressed-ssh
4 Help: Enable SSH compression
7 Category: scp ssh
9 Example: --compressed-ssh sftp://example.com/
12 Enables built-in SSH compression.
Dkey.d5 Protocols: TLS SSH
7 Category: tls ssh
14 file. For SSH, if not specified, curl tries the following candidates in order:
15 '~/.ssh/id_rsa', '~/.ssh/id_dsa', './id_rsa', './id_dsa'.
/third_party/skia/infra/bots/recipe_modules/flavor/examples/full.expected/
DTest-ChromeOS-Clang-SamsungChromebookPlus-GPU-MaliT860-arm-Release-All.json37 "ssh",
55 "ssh",
102 "ssh",
121 "ssh",
140 "ssh",
159 "ssh",
178 "ssh",
210 "ssh",
229 "ssh",
307 "ssh",
[all …]
DPerf-ChromeOS-Clang-SamsungChromebookPlus-GPU-MaliT860-arm-Release-All.json37 "ssh",
55 "ssh",
102 "ssh",
121 "ssh",
140 "ssh",
159 "ssh",
178 "ssh",
210 "ssh",
229 "ssh",
307 "ssh",
[all …]
/third_party/libwebsockets/plugins/ssh-base/include/
Dlws-plugin-ssh.h113 /*! \defgroup ssh-base plugin: lws-ssh-base
116 * ##Plugin lws-ssh-base
118 * This is the interface to customize the ssh server per-vhost. A pointer
122 * - "lws-ssh-base" - the ssh serving part
126 * This way you can have different instances of ssh servers wired up to
147 * lws_callback_on_writable() on this wsi causes your ssh server
167 * \param wsi: struct lws * for the ssh connection
184 * trigger the ssh protocol to ask if you have any tx waiting.
202 * trigger the ssh protocol to ask if you have any tx waiting. If you
246 * exec() - spawn command and wire up stdin/out/err to ssh channel
[all …]
/third_party/node/deps/npm/node_modules/pacote/lib/
Dgit.js28 // prefer https if there's auth, since ssh will drop that.
29 // otherwise, prefer ssh if available (more secure).
86 // try to use ssh, fall back to git.
93 // Fall back to SSH to support private repos
95 // is present, otherwise ssh if the hosted type provides it
103 const ssh = hosted.sshurl && hosted.sshurl()
105 if (!ssh || hosted.auth) {
108 return this[_resolvedFromRepo](ssh)
259 // fall back to ssh download if tarball fails
282 // Fall back to SSH to support private repos
[all …]
/third_party/rust/crates/clang-sys/.github/workflows/
Dssh.yml1 name: SSH
12 ssh:
13 name: SSH
37 # SSH
38 - name: Enable SSH
/third_party/ltp/testcases/kernel/mce-test/kvm/
DREADME48 * (optionally) ssh-keygen
101 2. Use ssh-keygen to generate public and privite keys on the host OS,
102 and copy id_rsa and id_rsa.pub from ~/.ssh/ into the testing directory
132 c) enable SSH public/private key authorization, otherwise, the SSH connection password
134 please check /etc/ssh/ssd_config and ensure related options are opened.
138 after the related options are opened, please restart ssh service
/third_party/libwebsockets/test-apps/
Dtest-sshd.c21 * This test app listens on port 2200 for authorized ssh connections. Run it
28 * $ ssh -p 2200 -i /usr/local/share/libwebsockets-test-server/lws-ssh-test-keys anyuser@127.0.0.1
54 * This is a copy of the lws ssh test public key, you can find it in
55 * /usr[/local]/share/libwebsockets-test-server/lws-ssh-test-keys.pub
56 * and the matching private key there too in .../lws-ssh-test-keys
62 "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCnWiP+c+kSD6Lk+C6NA9KruApa45sbt"
72 "Eu/B10U6Jf4Efojhh1dk85BD1LTIb+N3Q== ssh-test-key@lws";
307 if (strcmp(type, "ssh-rsa")) { in ssh_ops_is_pubkey_authorized()
308 lwsl_notice("type is not ssh-rsa\n"); in ssh_ops_is_pubkey_authorized()
590 " |\\---/| lws-ssh Test Server\n" in ssh_ops_banner()
[all …]
/third_party/node/deps/npm/node_modules/hosted-git-info/lib/
Dhosts.js13 `git+ssh://git@${domain}/${user}/${project}.git${maybeJoin('#', committish)}`,
41 protocols: ['git:', 'http:', 'git+ssh:', 'git+https:', 'ssh:', 'https:'],
75 protocols: ['git+ssh:', 'git+https:', 'ssh:', 'https:'],
103 protocols: ['git+ssh:', 'git+https:', 'ssh:', 'https:'],
134 protocols: ['git:', 'git+ssh:', 'git+https:', 'ssh:', 'https:'],
140 `git+ssh://git@${domain}/${project}.git${maybeJoin('#', committish)}`,
192 protocols: ['git+ssh:', 'https:'],
/third_party/curl/docs/libcurl/opts/
DCURLOPT_SSH_PRIVATE_KEYFILE.328 CURLOPT_SSH_PRIVATE_KEYFILE \- private key file for SSH auth
37 libcurl defaults to \fB$HOME/.ssh/id_rsa\fP or \fB$HOME/.ssh/id_dsa\fP if the
56 "/home/clarkkent/.ssh/id_rsa");

12345678910>>...13