/tools/test/connectivity/acts/framework/acts/controllers/ |
access_point.py | 28 from acts.controllers.utils_lib.ssh import connection 29 from acts.controllers.utils_lib.ssh import settings 40 containing the hostname and username of the ap to connect to over ssh. 99 ssh: The ssh connection to this ap. 100 ssh_settings: The ssh settings being used by the ssh conneciton. 107 ssh_settings: acts.controllers.utils_lib.ssh.SshSettings instance. 110 self.ssh = connection.SshConnection(self.ssh_settings) 113 self._ip_cmd = ip.LinuxIpCommand(self.ssh) [all...] |
/external/toolchain-utils/dejagnu/ |
chromeos.exp.in | 7 set ssh_options [board_info $board ssh,options] 11 eval "exec ssh -N -f $ssh_options root@$hostname &" 12 local_exec "ssh -n $ssh_options root@$hostname sh -c 'mkdir -p $tmpdir'" \ 22 set ssh_options [board_info $board ssh,options] 25 local_exec "ssh $ssh_options -O exit root@$hostname" {} {} 10 27 local_exec "ssh -n $ssh_options root@$hostname sh -c 'rm -fr $tmpdir'" \ 32 # Upload a file to the board. Uses scp over persistent SSH connection. 38 set ssh_options [board_info $board ssh,options] 52 # Download a file to the host machine. Uses scp over persistent SSH connection. 58 set ssh_options [board_info $board ssh,options [all...] |
/external/autotest/site_utils/rpm_control_system/ |
rpm_controller_unittest.py | 53 self.ssh = self.mox.CreateMockAnything() 55 rpm_controller.pexpect.spawn(mox.IgnoreArg()).AndReturn(self.ssh) 70 self.ssh.expect('Password:', timeout=60) 71 self.ssh.sendline(password) 72 self.ssh.expect(prompt, timeout=60) 73 self.ssh.sendline('%s %s' % (new_state, self.powerunit_info.outlet)) 74 self.ssh.expect('Command successful', timeout=60) 75 self.ssh.sendline('logout') 76 self.ssh.close(force=True) 88 self.ssh.expect('Password:', timeout=60 [all...] |
/external/llvm/utils/bugpoint/ |
RemoteRunSafely.sh | 5 # Synopsis: This script simply runs another program remotely using ssh. 51 RCLIENT=ssh
|
/external/ltp/testcases/network/tcp_cmds/ssh/ |
ssh_setup | 27 tst_check_cmds expect ssh useradd userdel
|
/external/openssh/contrib/redhat/ |
sshd.init.old | 9 # config: /etc/ssh/ssh_host_key 10 # config: /etc/ssh/ssh_host_key.pub 11 # config: /etc/ssh/ssh_random_seed 12 # config: /etc/ssh/sshd_config 25 KEYGEN=/usr/bin/ssh-keygen 27 RSA1_KEY=/etc/ssh/ssh_host_key 28 RSA_KEY=/etc/ssh/ssh_host_rsa_key 29 DSA_KEY=/etc/ssh/ssh_host_dsa_key
|
/external/swiftshader/third_party/LLVM/utils/bugpoint/ |
RemoteRunSafely.sh | 5 # Synopsis: This script simply runs another program remotely using ssh. 51 RCLIENT=ssh
|
/external/autotest/client/site_tests/firmware_TouchMTB/tools/ |
host_replay.sh | 67 ssh root@$FLAGS_machine_ip "${MACHINE_PROJ_DIR}/${MACHINE_REPLAY} -b $board" 91 LOG_PATHNAMES=`ssh root@$FLAGS_machine_ip "ls ${MACHINE_LOG_ROOT}/*/*.log"`
|
/external/toolchain-utils/user_activity_benchmarks/ |
collect_telemetry_profiles.sh | 80 # The ssh connection should be configured without password. We need to do 83 ssh root@$IP "rm -rf /usr/local/profilers/*"
|
/external/openssh/ |
auth.h | 45 struct ssh; 206 Key *get_hostkey_public_by_index(int, struct ssh *); 207 Key *get_hostkey_public_by_type(int, int, struct ssh *); 208 Key *get_hostkey_private_by_type(int, int, struct ssh *); 209 int get_hostkey_index(Key *, int, struct ssh *);
|
/external/libnetfilter_conntrack/src/expect/ |
api.c | 490 * \param ssh nfnetlink subsystem handler 504 int nfexp_build_expect(struct nfnl_subsys_handle *ssh, 511 assert(ssh != NULL); 515 return __build_expect(ssh, req, size, type, flags, exp); 519 __build_query_exp(struct nfnl_subsys_handle *ssh, 526 assert(ssh != NULL); 534 __build_expect(ssh, req, size, IPCTNL_MSG_EXP_NEW, NLM_F_REQUEST|NLM_F_CREATE|NLM_F_ACK|NLM_F_EXCL, data); 537 __build_expect(ssh, req, size, IPCTNL_MSG_EXP_NEW, NLM_F_REQUEST|NLM_F_CREATE|NLM_F_ACK, data); 540 __build_expect(ssh, req, size, IPCTNL_MSG_EXP_GET, NLM_F_REQUEST|NLM_F_ACK, data); 543 __build_expect(ssh, req, size, IPCTNL_MSG_EXP_DELETE, NLM_F_REQUEST|NLM_F_ACK, data) [all...] |
build.c | 52 int __build_expect(struct nfnl_subsys_handle *ssh, 70 nfnl_fill_hdr(ssh, &req->nlh, 0, l3num, 0, type, flags);
|
/bionic/tests/ |
stack_unwinding_test.cpp | 115 ScopedSignalHandler ssh(SIGUSR1, UnwindSignalHandler); 122 ScopedSignalHandler ssh(SIGUSR1, UnwindSignalHandler, SA_SIGINFO);
|
/tools/test/connectivity/acts/framework/tests/ |
acts_test_ssh.py | 25 from acts.controllers.utils_lib.ssh import connection 26 from acts.controllers.utils_lib.ssh import settings 37 """Test running an ssh command. 39 Test that running an ssh command works. 47 """Test that special envirment variables get sent over ssh. 83 raise ValueError("usage: %s <username> <hostname to ssh to>" %
|
/external/curl/tests/ |
sshhelp.pm | 109 $sshdexe = 'sshd' .exe_ext(); # base name and ext of ssh daemon 110 $sshexe = 'ssh' .exe_ext(); # base name and ext of ssh client 113 $sshkeygenexe = 'ssh-keygen' .exe_ext(); # base name and ext of ssh-keygen 115 $sshdconfig = 'curl_sshd_config'; # ssh daemon config file 116 $sshconfig = 'curl_ssh_config'; # ssh client config file 118 $sshdlog = undef; # ssh daemon log file 119 $sshlog = undef; # ssh client log file 122 $knownhosts = 'curl_client_knownhosts'; # ssh knownhosts fil [all...] |
/external/linux-kselftest/tools/testing/selftests/ntb/ |
ntb_test.sh | 36 echo "device. SSH will then be used to test the remote side." 37 echo "An SSH key between the root users of the host would then" 46 echo " to for the test (using ssh)" 105 ssh "$REMOTE" cat "$VPATH" 117 ssh "$REMOTE" "echo \"$VALUE\" > \"$VPATH\"" 214 ssh "$REMOTE" \ 236 ssh "$REMOTE" cat "$VPATH" > "$A" 244 ssh "$REMOTE" cat "$VPATH" > "$B" 406 ssh $REMOTE_HOST ls -1 /sys/bus/ntb/devices
|
/external/ltp/testcases/kdump/ |
runkdump.sh | 98 file=$(ssh -i ~/.ssh/kdump_id_rsa "${SCP_PATH}" "ls -t ${COREDIR}/*/vmcore* \ 106 scp -i ~/.ssh/kdump_id_rsa "${SCP_PATH}:${file}" "${COREDIR}/${last}"
|
/external/autotest/contrib/ |
servo-stat | 23 KEYFILE=$KEYFILE/chromeos-base/chromeos-ssh-testkeys/files/testing_rsa 25 # Need some temporary files to keep ssh happy: 48 timeout 45 ssh "${ssh_opts[@]}" root@$servo "$@" 113 STATUS=("${STATUS[@]}" "ssh is down")
|
/external/toolchain-utils/binary_search_tool/sysroot_wrapper/ |
glibc_test_script.sh | 44 ( ssh ${SSH_OPTS} root@${DUT} -- /bin/bash -l /tmp/repro.sh ) > /tmp/result
|
/external/libnetfilter_conntrack/src/conntrack/ |
api.c | 756 * \param ssh nfnetlink subsystem handler 770 int nfct_build_conntrack(struct nfnl_subsys_handle *ssh, 777 assert(ssh != NULL); 781 return __build_conntrack(ssh, req, size, type, flags, ct); 785 __build_query_ct(struct nfnl_subsys_handle *ssh, 792 assert(ssh != NULL); 800 __build_conntrack(ssh, req, size, IPCTNL_MSG_CT_NEW, NLM_F_REQUEST|NLM_F_CREATE|NLM_F_ACK|NLM_F_EXCL, data); 803 __build_conntrack(ssh, req, size, IPCTNL_MSG_CT_NEW, NLM_F_REQUEST|NLM_F_ACK, data); 806 __build_conntrack(ssh, req, size, IPCTNL_MSG_CT_DELETE, NLM_F_REQUEST|NLM_F_ACK, data); 809 __build_conntrack(ssh, req, size, IPCTNL_MSG_CT_GET, NLM_F_REQUEST|NLM_F_ACK, data) [all...] |
/external/autotest/client/cros/cellular/ |
forward_8960_screen | 7 # A local web server that sets up SSH port-forwarding to display the 17 This will start up an SSH to port-forward connections to the 8960. 105 ['/usr/bin/ssh', 109 bastion_ip,]) as ssh:
|
/external/autotest/server/site_tests/platform_GCC/ |
dejagnu_remote.sh | 35 PS1=. TERM=linux ssh ${SSH_ARGS} -t -t -M -S "${CONTROL_PATH}" root@$1 \ 49 COMMAND="ssh ${SSH_ARGS} -t -o ControlPath=${CONTROL_PATH} $@"
|
/external/ltp/testcases/network/stress/ssh/ |
ssh-stress | 23 TCID=ssh-stress 29 # Temporary directory to store sshd setting or ssh key 30 # Note: ssh doesn't work when those directory is under /tmp. 35 # Stop the ssh daemon 48 tst_check_cmds pkill sshd ssh od 82 tst_rhost_run -s -c "ssh-keygen -t rsa -N \"\" -f $rtmpdir/id_rsa > /dev/null" 108 tst_resm TINFO "Creating '$CONNECTION_TOTAL' ssh sessions" 110 tst_rhost_run -s -c "ssh-stress01-rmt $ipver $(tst_ipaddr) \ 121 tst_rhost_run -s -c "ssh-stress02-rmt $ipver $(tst_ipaddr) \ 136 tst_rhost_run -s -c "ssh-stress03-rmt $ipver $(tst_ipaddr) [all...] |
/external/openssh/contrib/cygwin/ |
ssh-user-config | 3 # ssh-user-config, Copyright 2000-2014 Red Hat Inc. 43 # optionally create identity of type argument in ~/.ssh 44 # optionally add result to ~/.ssh/authorized_keys 50 if [ ! -f "${pwdhome}/.ssh/${file}" ] 54 csih_inform "Generating ${pwdhome}/.ssh/${file}" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 59 ssh-keygen -t "${type}" -f "${pwdhome}/.ssh/${file}" > /dev/null 63 csih_inform "Adding to ${pwdhome}/.ssh/authorized_keys [all...] |
/external/libnetfilter_conntrack/include/internal/ |
prototypes.h | 7 int __build_conntrack(struct nfnl_subsys_handle *ssh, struct nfnlhdr *req, size_t size, uint16_t type, uint16_t flags, const struct nf_conntrack *ct); 49 int __build_expect(struct nfnl_subsys_handle *ssh, struct nfnlhdr *req, size_t size, uint16_t type, uint16_t flags, const struct nf_expect *exp);
|