/external/openssh/ |
ssh_api.h | 29 #include "ssh.h" 37 /* public SSH API functions */ 40 * ssh_init() create a ssh connection object with given (optional) 43 int ssh_init(struct ssh **, int is_server, struct kex_params *kex_params); 46 * release ssh connection state. 48 void ssh_free(struct ssh *); 53 void ssh_set_app_data(struct ssh *, void *); 54 void *ssh_get_app_data(struct ssh *); 57 * ssh_add_hostkey() registers a private/public hostkey for an ssh 64 int ssh_add_hostkey(struct ssh *ssh, struct sshkey *key) [all...] |
packet.h | 13 * called by a name other than "ssh" or "Secure Shell". 52 struct ssh { struct 79 struct ssh *ssh_alloc_session_state(void); 80 struct ssh *ssh_packet_set_connection(struct ssh *, int, int); 81 void ssh_packet_set_timeout(struct ssh *, int, int); 82 int ssh_packet_stop_discard(struct ssh *); 83 int ssh_packet_connection_af(struct ssh *); 84 void ssh_packet_set_nonblocking(struct ssh *); 85 int ssh_packet_get_connection_in(struct ssh *); [all...] |
ssh_api.c | 36 int _ssh_exchange_banner(struct ssh *); 37 int _ssh_send_banner(struct ssh *, char **); 38 int _ssh_read_banner(struct ssh *, char **); 39 int _ssh_order_hostkeyalgs(struct ssh *); 40 int _ssh_verify_host_key(struct sshkey *, struct ssh *); 41 struct sshkey *_ssh_host_public_key(int, int, struct ssh *); 42 struct sshkey *_ssh_host_private_key(int, int, struct ssh *); 75 ssh_init(struct ssh **sshp, int is_server, struct kex_params *kex_params) 78 struct ssh *ssh; local [all...] |
dispatch.c | 44 struct ssh *ssh = active_state; /* XXX */ local 50 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || 51 (r = sshpkt_put_u32(ssh, seq)) != 0 || 52 (r = sshpkt_send(ssh)) != 0 || 53 (r = ssh_packet_write_wait(ssh)) != 0) 54 sshpkt_fatal(ssh, __func__, r); 59 dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh) 66 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt [all...] |
opacket.c | 9 struct ssh *active_state, *backup_state; 14 ssh_packet_start(struct ssh *ssh, u_char type) 18 if ((r = sshpkt_start(ssh, type)) != 0) 23 ssh_packet_put_char(struct ssh *ssh, int value) 28 if ((r = sshpkt_put_u8(ssh, ch)) != 0) 33 ssh_packet_put_int(struct ssh *ssh, u_int value) 37 if ((r = sshpkt_put_u32(ssh, value)) != 0 [all...] |
packet.c | 13 * called by a name other than "ssh" or "Secure Shell". 84 #include "ssh.h" 223 struct ssh * 226 struct ssh *ssh = NULL; local 229 if ((ssh = calloc(1, sizeof(*ssh))) == NULL || 237 TAILQ_INIT(&ssh->private_keys); 238 TAILQ_INIT(&ssh->public_keys); 250 ssh->state = state [all...] |
start-ssh | 7 DSA_KEY=/data/ssh/ssh_host_dsa_key 8 DSA_PUB_KEY=/data/ssh/ssh_host_dsa_key.pub 9 RSA_KEY=/data/ssh/ssh_host_rsa_key 10 RSA_PUB_KEY=/data/ssh/ssh_host_rsa_key.pub 11 AUTHORIZED_KEYS=/data/ssh/authorized_keys 15 /system/bin/ssh-keygen -t dsa -f $DSA_KEY -N "" 21 /system/bin/ssh-keygen -t rsa -f $RSA_KEY -N "" 33 /system/bin/logwrapper /system/bin/sshd -f /system/etc/ssh/sshd_config -D -d 36 /system/bin/sshd -f /system/etc/ssh/sshd_config -D
|
dispatch.h | 37 struct ssh; 43 void ssh_dispatch_init(struct ssh *, dispatch_fn *); 44 void ssh_dispatch_set(struct ssh *, int, dispatch_fn *); 45 void ssh_dispatch_range(struct ssh *, u_int, u_int, dispatch_fn *); 46 int ssh_dispatch_run(struct ssh *, int, volatile sig_atomic_t *, void *); 47 void ssh_dispatch_run_fatal(struct ssh *, int, volatile sig_atomic_t *, void *);
|
kexgexc.c | 58 kexgex_client(struct ssh *ssh) 60 struct kex *kex = ssh->kex; 72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 || 73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 || 74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 || 75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 || 76 (r = sshpkt_send(ssh)) != 0) 84 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, 94 struct ssh *ssh = ctxt local 148 struct ssh *ssh = ctxt; local [all...] |
kexgexs.c | 50 #include "ssh-gss.h" 61 kexgex_server(struct ssh *ssh) 63 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, 72 struct ssh *ssh = ctxt; local 73 struct kex *kex = ssh->kex; 78 if ((r = sshpkt_get_u32(ssh, &min)) != 0 || 79 (r = sshpkt_get_u32(ssh, &nbits)) != 0 || 80 (r = sshpkt_get_u32(ssh, &max)) != 0 | 125 struct ssh *ssh = ctxt; local [all...] |
kex.h | 122 struct ssh; 145 int (*verify_host_key)(struct sshkey *, struct ssh *); 146 struct sshkey *(*load_host_public_key)(int, int, struct ssh *); 147 struct sshkey *(*load_host_private_key)(int, int, struct ssh *); 148 int (*host_key_index)(struct sshkey *, int, struct ssh *); 151 int (*kex[KEX_MAX])(struct ssh *); 166 int kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **); 167 int kex_setup(struct ssh *, char *[PROPOSAL_MAX]); 175 int kex_send_kexinit(struct ssh *); 177 int kex_derive_keys(struct ssh *, u_char *, u_int, const struct sshbuf *) [all...] |
kexecdhs.c | 53 kexecdh_server(struct ssh *ssh) 56 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_ecdh_init); 63 struct ssh *ssh = ctxt; local 64 struct kex *kex = ssh->kex; 99 kex->hostkey_nid, ssh); 101 kex->hostkey_nid, ssh); 110 if ((r = sshpkt_get_ec(ssh, client_public, group)) != 0 || 111 (r = sshpkt_get_end(ssh)) != 0 [all...] |
kexc25519c.c | 50 kexc25519_client(struct ssh *ssh) 52 struct kex *kex = ssh->kex; 60 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || 61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey, 63 (r = sshpkt_send(ssh)) != 0) 67 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_c25519_reply); 74 struct ssh *ssh = ctxt; local 75 struct kex *kex = ssh->kex [all...] |
kexc25519s.c | 47 kexc25519_server(struct ssh *ssh) 50 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_c25519_init); 57 struct ssh *ssh = ctxt; local 58 struct kex *kex = ssh->kex; 80 kex->hostkey_nid, ssh); 82 kex->hostkey_nid, ssh); 88 if ((r = sshpkt_get_string(ssh, &client_pubkey, &pklen)) != 0 || 89 (r = sshpkt_get_end(ssh)) != 0 [all...] |
/external/valgrind/nightly/conf/ |
nemesis.conf | 6 export CVS_RSH=ssh
|
/external/chromium-trace/catapult/common/lab/ |
keychain_unlock.sh | 6 # Script to SSH into a list of bots and set up their keychains for Telemetry. 11 ssh -t "$hostname" 'security unlock-keychain login.keychain
|
/external/openssh/contrib/redhat/ |
gnome-ssh-askpass.csh | 1 setenv SSH_ASKPASS /usr/libexec/openssh/gnome-ssh-askpass
|
gnome-ssh-askpass.sh | 1 SSH_ASKPASS=/usr/libexec/openssh/gnome-ssh-askpass
|
/external/toolchain-utils/go/chromeos/ |
target_sh | 11 ssh ${target} "$*"
|
/external/openssh/contrib/ |
Makefile | 4 @echo "Valid targets: gnome-ssh-askpass1 gnome-ssh-askpass2" 6 gnome-ssh-askpass1: gnome-ssh-askpass1.c 8 gnome-ssh-askpass1.c -o gnome-ssh-askpass1 \ 11 gnome-ssh-askpass2: gnome-ssh-askpass2.c 13 gnome-ssh-askpass2.c -o gnome-ssh-askpass2 [all...] |
/external/jacoco/org.jacoco.build/ |
publish.sh | 10 ssh $USERNAME,eclemma@shell.sourceforge.net create 11 ssh $USERNAME,eclemma@shell.sourceforge.net '/home/project-web/eclemma/scripts/publish-jacoco-snapshot.sh'
|
/external/toolchain-utils/dejagnu/boards/ |
gdbserver.sh.in | 9 echo "Executing: ssh ${RSA_FILE} ${REMOTE_SSH_FLAGS} root@${FLAGS_remote} \"${ssh_cmd}\"" >&2 11 ssh ${REMOTE_SSH_FLAGS} root@${FLAGS_remote} "killall -9 gdbserver; ${ssh_cmd}"
|
/external/autotest/site_utils/rpm_control_system/ |
rpm_controller.py | 62 SSH_LOGIN_CMD = ('ssh -l %s -o StrictHostKeyChecking=no ' 286 It logs into the hydra serial concentrator over ssh, launches the CLI 289 ssh = self._authenticate_with_hydra(admin_override=True) 290 if not ssh: 292 ssh.expect(RPMController.PASSWORD_PROMPT, timeout=60) 293 ssh.sendline(rpm_config.get('HYDRA', 'admin_password')) 294 ssh.expect(RPMController.HYDRA_PROMPT) 295 ssh.sendline(RPMController.CLI_CMD) 298 response = ssh.expect_list([cli_prompt_re, cli_held_re], timeout=60) 304 ssh.sendline(RPMController.CLI_KILL_PREVIOUS [all...] |
/external/openssh/contrib/suse/ |
openssh.spec | 8 # The version of x11-ssh-askpass to use 14 Summary: OpenSSH, a free Secure Shell (SSH) protocol implementation 20 Source1: x11-ssh-askpass-%{xversion}.tar.gz 22 Group: Productivity/Networking/SSH 25 Obsoletes: ssh 26 Provides: ssh 41 Group: Productivity/Networking/SSH 43 Obsoletes: ssh-extras 44 Provides: openssh:${_libdir}/ssh/ssh-askpas [all...] |
/external/ltp/testcases/network/stress/ssh/ |
Makefile | 2 # testcases/network/stress/ssh Makefile. 27 INSTALL_TARGETS := ssh*
|