/external/curl/tests/ |
serverhelp.pm | 88 /^(tftp|sftp|socks|ssh|rtsp|gopher|httptls)(\d*)(-ipv6|)$/) { 108 ($proto =~ /^(((FTP|HTTP|HTTP\/2|IMAP|POP3|SMTP|HTTP-PIPE)S?)|(TFTP|SFTP|SOCKS|SSH|RTSP|GOPHER|HTTPTLS))$/));
|
sshserver.pl | 25 # Also creates the ssh configuration files needed for these tests. 87 my $idnum = 1; # dafault ssh daemon instance number 88 my $proto = 'ssh'; # protocol the ssh daemon speaks 92 my $pidfile; # ssh daemon pid file 176 # Default ssh daemon pid file name 184 # ssh, socks and sftp server log file names 186 $sshdlog = server_logfilename($logdir, 'ssh', $ipvnum, $idnum); 192 # Logging level for ssh server and client 201 $error = 'Will not run ssh server without a user name' [all...] |
runtests.pl | 35 # as using scp & ssh, rsync & telnet, or using a NFS shared directory 36 # and ssh. 266 my $sshdid; # for socks server, ssh daemon version id 267 my $sshdvernum; # for socks server, ssh daemon version number 268 my $sshdverstr; # for socks server, ssh daemon version string 269 my $sshderror; # for socks server, ssh daemon version error 381 for my $proto (('tftp', 'sftp', 'socks', 'ssh', 'rtsp', 'gopher', 'httptls')) { 441 # Ugly hack but ssh client and gnutls-serv don't support pid files 536 # my $out = system("ssh $CLIENTIP cd \'$pwd\' \\; \'$cmd\'"); 549 # my @out = `ssh $CLIENTIP cd \'$pwd\' \\; \'$cmd\'` [all...] |
/external/libnetfilter_conntrack/include/libnetfilter_conntrack/ |
libnetfilter_conntrack.h | 562 nfct_build_conntrack(struct nfnl_subsys_handle *ssh, 575 int nfct_build_query(struct nfnl_subsys_handle *ssh, 709 int nfexp_build_expect(struct nfnl_subsys_handle *ssh, 722 int nfexp_build_query(struct nfnl_subsys_handle *ssh,
|
/external/ltp/testcases/kdump/lib/ |
test.sh | 238 expect -f ./ssh.tcl "/etc/init.d/kdump propagate" "${SCP_PASS}" 261 expect -f ./ssh.tcl "/etc/init.d/kdump propagate" "${SCP_PASS}"
|
/tools/test/connectivity/acts/framework/acts/controllers/ |
adb.py | 27 from acts.controllers.utils_lib.ssh import connection 80 conected to a remote host that we can reach via SSH.
|
/tools/test/connectivity/acts/framework/acts/controllers/utils_lib/commands/ |
shell.py | 19 from acts.controllers.utils_lib.ssh import connection 30 Note: At the moment this only works with the ssh runner.
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
urlparse.py | 41 'svn', 'svn+ssh', 'sftp','nfs','git', 'git+ssh']
|
/prebuilts/go/darwin-x86/src/cmd/go/ |
vcs.go | 46 "git+ssh": true, 47 "bzr+ssh": true, 48 "svn+ssh": true, 49 "ssh": true, 125 scheme: []string{"https", "http", "ssh"}, 162 scheme: []string{"git", "https", "http", "git+ssh", "ssh"}, 168 // repositories by SSH. 190 // "ssh://git@github.com/user/repo". 192 Scheme: "ssh", [all...] |
vcs_test.go | 226 {vcsGit, "ssh://user@example.com/foo.git", true}, 233 {vcsHg, "ssh://user@example.com/path/to/repo.hg", true}, 265 {vcsHg, "ssh://user@example.com/path/to/repo.hg", true}, 267 {vcsGit, "ssh://user@example.com/foo.git", false},
|
/prebuilts/go/linux-x86/src/cmd/go/ |
vcs.go | 46 "git+ssh": true, 47 "bzr+ssh": true, 48 "svn+ssh": true, 49 "ssh": true, 125 scheme: []string{"https", "http", "ssh"}, 162 scheme: []string{"git", "https", "http", "git+ssh", "ssh"}, 168 // repositories by SSH. 190 // "ssh://git@github.com/user/repo". 192 Scheme: "ssh", [all...] |
vcs_test.go | 226 {vcsGit, "ssh://user@example.com/foo.git", true}, 233 {vcsHg, "ssh://user@example.com/path/to/repo.hg", true}, 265 {vcsHg, "ssh://user@example.com/path/to/repo.hg", true}, 267 {vcsGit, "ssh://user@example.com/foo.git", false},
|
/external/curl/lib/ |
ssh.c | 70 #include "ssh.h" 306 error code, and possibly add a few new SSH-related one. We must however 332 * SSH State machine related code 334 /* This is the ONLY way to change SSH state! */ 575 infof(data, "SSH host check: %d, key: %s\n", keycheck, 672 infof(data, "SSH MD5 fingerprint: %s\n", md5buffer); 682 "Denied establishing ssh session: mismatch md5 fingerprint. " 686 "Denied establishing ssh session: md5 fingerprint not available"); 702 * ssh_statemach_act() runs the SSH state machine as far as it can without 742 failf(data, "Failure establishing ssh session") 2878 struct SSHPROTO *ssh; local 2899 struct ssh_conn *ssh; local 3057 struct ssh_conn *ssh = &conn->proto.sshc; local [all...] |
/prebuilts/tools/common/m2/repository/tightvnc/ |
tightvnc.jar | |
/external/ltp/testcases/lib/ |
test_net.sh | 68 output=`ssh -n -q $user@$RHOST "sh -c \
|
/external/openssh/contrib/cygwin/ |
ssh-host-config | 3 # ssh-host-config, Copyright 2000-2014 Red Hat Inc. 44 /usr/bin/ssh-keygen openssh 76 local _my_etcdir="/ssh-host-config.$$" 94 # Add ssh 22/tcp and ssh 22/udp to services 95 if [ `/usr/bin/grep -q 'ssh[[:space:]][[:space:]]*22' "${_services}"; echo $?` -ne 0 ] 97 if /usr/bin/awk '{ if ( $2 ~ /^23\/tcp/ ) print "ssh 22/tcp'"${_spaces}"'SSH Remote Login Protocol\nssh 22/udp'"${_spaces}"'SSH Remote Login Protocol"; print $0; }' < "${_services}" > "${_serv_tmp}" 101 csih_inform "Added ssh to ${_wservices} [all...] |
/external/openssh/ |
ssh-keysign.c | 1 /* $OpenBSD: ssh-keysign.c,v 1.49 2015/07/03 03:56:25 djm Exp $ */ 47 #include "ssh.h" 60 struct ssh *active_state = NULL; /* XXX needed for linking */ 104 if (strcmp("ssh-connection", p) != 0) 206 log_init("ssh-keysign", SYSLOG_LEVEL_DEBUG3, SYSLOG_FACILITY_AUTH, 0); 209 /* verify that ssh-keysign is enabled by the admin */ 214 fatal("ssh-keysign not enabled in %s",
|
monitor_wrap.c | 49 #include "ssh.h" 72 #include "ssh-gss.h" 480 struct ssh *ssh = active_state; /* XXX */ local 486 if ((r = ssh_packet_get_state(ssh, m)) != 0)
|
/bionic/tests/ |
time_test.cpp | 295 ScopedSignalHandler ssh(SIGUSR1, timer_create_SIGEV_SIGNAL_signal_handler); 409 ScopedSignalHandler ssh(SIGALRM, timer_create_NULL_signal_handler);
|
/external/autotest/server/cros/ |
telemetry_runner.py | 28 DUT_RSYNC_OPTIONS = ' '.join(['--rsh="/usr/bin/ssh %s"' % DUT_SSH_OPTIONS, 117 ssh [dut] run_benchmark --browser=system [test] 120 ssh [devserver] run_benchmark --browser=cros-chrome --remote=[dut] [test] 123 ssh [devserver] ssh [dut] run_benchmark --browser=system [test] 128 If not set, "ssh [devserver] " will be appended to test 213 telemetry_cmd.extend(['ssh', devserver_hostname]) 217 ['ssh', 421 command = 'ssh %s %s' % (devserver_hostname, command) 433 # send_file() relies on rsync over ssh. Couldn't be better [all...] |
/external/autotest/server/hosts/ |
ssh_host.py | 10 SSHHost: a remote machine with a ssh access 31 This class represents a remote machine controlled through an ssh 42 serial console available then ordinary SSH-based commands will 64 Construct an ssh command with proper args for this host. 67 @param options: SSH options 68 @param alive_interval: SSH Alive interval. 81 Prepend the command for the client with information about the ssh command 84 @param command: the ssh command to be executed. 120 # resolution errors on ssh commands; the problem never 135 # ssh_counter records the outcome of each ssh invocatio [all...] |
/external/chromium-trace/catapult/telemetry/telemetry/core/ |
cros_interface.py | 4 """A wrapper around ssh for common operations on a CrOS-based device""" 73 RunCmd(['ssh'], quiet=True) 116 # Establish master SSH connection using ControlPersist. 146 """Constructs a subprocess-suitable command line for `ssh'. 150 # how commands are run through SSH (crbug.com/239161). This work 151 # around will be unnecessary once we implement a persistent SSH 155 full_args = ['ssh', '-o ForwardX11=no', '-o ForwardX11Trusted=no', '-n', 204 """Removes specific ssh warning lines from a string. 234 'SSH to it manually to fix connectivity.') % 243 raise KeylessLoginRequiredException('Need to set up ssh auth for %s' [all...] |
/tools/test/connectivity/acts/framework/acts/controllers/utils_lib/ssh/ |
connection.py | 26 from acts.controllers.utils_lib.ssh import formatter 31 """An error occured during an ssh operation.""" 38 result: The results of the ssh command that had the error. 44 result: The result of the ssh command that created the problem. 58 """Provides a connection to a remote machine through ssh. 74 settings: The ssh settings to use for this conneciton. 75 formatter: The object that will handle formatting ssh command 89 """Sets up the master ssh connection. 91 Sets up the inital master ssh connection if it has not already been 95 timeout_seconds: The time to wait for the master ssh connection to be made [all...] |
/external/testng/ant/ |
ivy-2.1.0.jar | |
/external/libnetfilter_conntrack/src/conntrack/ |
build.c | 462 int __build_conntrack(struct nfnl_subsys_handle *ssh, 478 nfnl_fill_hdr(ssh, &req->nlh, 0, l3num, 0, type, flags);
|