/external/openssh/contrib/aix/ |
buildbff.sh | 127 VERSION=`./ssh -V 2>&1 | cut -f 1 -d , | cut -f 2 -d _` 139 # Set ssh and sshd parameters as per config.local 247 $bindir/ssh-keygen -t rsa1 -f $sysconfdir/ssh_host_key -N "" 252 $bindir/ssh-keygen -t dsa -f $sysconfdir/ssh_host_dsa_key -N "" 257 $bindir/ssh-keygen -t rsa -f $sysconfdir/ssh_host_rsa_key -N ""
|
/external/openssh/ |
opensshd.init.in | 19 SSH_KEYGEN=$prefix/bin/ssh-keygen
|
serverloop.c | 12 * called by a name other than "ssh" or "Secure Shell". 1156 struct ssh *ssh = active_state; /* XXX */ local 1168 while (ssh_packet_remaining(ssh) > 0) { 1171 if ((r = sshpkt_get_string_direct(ssh, &blob, &blen)) != 0 || 1181 if ((ndx = ssh->kex->host_key_index(key, 1, ssh)) == -1) { [all...] |
clientloop.c | 12 * called by a name other than "ssh" or "Secure Shell". 92 #include "ssh.h" 351 * ssh's willingness to forward X11 connections to 950 logit("Not supported for SSH protocol version 1."); 1027 {"^Z", "suspend ssh", SUPPRESS_MUXCLIENT}, 1029 {"&", "background ssh (when waiting for connections to terminate)", 1144 "%c^Z [suspend ssh]\r\n", escape_char); 2256 struct ssh *ssh = active_state; \/* XXX *\/ local 2329 struct ssh *ssh = active_state; \/* XXX *\/ local [all...] |
sshd.c | 6 * This program is the ssh daemon. It listens for connections from clients, 16 * called by a name other than "ssh" or "Secure Shell". 89 #include "ssh.h" 121 #include "ssh-gss.h" 125 #include "ssh-sandbox.h" 434 xasprintf(&server_version_string, "SSH-%d.%d-%.100s%s%s%s", 459 strncmp(buf, "SSH-1.5-W1.0", 12) == 0) 475 if (sscanf(client_version_string, "SSH-%d.%d-%[^\n]\n", 525 packet_disconnect("Your ssh version is too old and " 849 get_hostkey_by_type(int type, int nid, int need_private, struct ssh *ssh [all...] |
sshconnect2.c | 50 #include "ssh.h" 76 #include "ssh-gss.h" 95 verify_host_key_callback(Key *hostkey, struct ssh *ssh) 369 packet_put_cstring("ssh-userauth"); 395 authctxt.service = "ssh-connection"; /* service name */ 1036 "ssh-userauth" : 1581 struct ssh *ssh = active_state; local [all...] |
ssh-keyscan.c | 1 /* $OpenBSD: ssh-keyscan.c,v 1.101 2015/04/10 00:08:55 djm Exp $ */ 34 #include "ssh.h" 80 struct ssh *active_state = NULL; /* XXX needed for linking */ 93 int c_plen; /* Packet length field for ssh packet */ 103 struct ssh *c_ssh; /* SSH-connection */ 237 key_print_wrapper(struct sshkey *hostkey, struct ssh *ssh) 241 if ((c = ssh_get_app_data(ssh)) != NULL) 271 c->c_keytype == KT_DSA ? "ssh-dss" [all...] |
monitor.c | 69 #include "ssh.h" 97 #include "ssh-gss.h" 373 "with SSH protocol 1"); 690 struct ssh *ssh = active_state; /* XXX */ local 724 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) 754 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && 1850 struct ssh *ssh = active_state; \/* XXX *\/ local 1936 struct ssh *ssh = active_state; \/* XXX *\/ local [all...] |
/external/autotest/site_utils/ |
lxc_config.py | 17 "source": "ssh", 18 "target": "/root/.ssh", 49 2. Copy all files in ssh to /root/.ssh in container. 82 the module still supports copy over files like ssh config and autotest 217 # 2. Set ssh logleve to ERROR for all hosts. 296 1. Disable master ssh connection in shadow config, as it is not working 310 # container does not support master ssh connection yet. 347 """Modify ssh config for it to work inside container. 351 Therefore, the source of ssh config must be properly updated to be abl [all...] |
setup_dev_autotest.sh | 274 APACHE_SSH_DIR="$APACHE_HOME/.ssh" 275 SSH_KEYS_PATH=src/third_party/chromiumos-overlay/chromeos-base/chromeos-ssh-testkeys/files 283 IdentityFile ~/.ssh/testing_rsa 289 echo "apache user SSH setup failed."
|
/device/linaro/hikey/ |
device-common.mk | 24 PRODUCT_PACKAGES += ssh sftp scp sshd ssh-keygen sshd_config start-ssh uim
|
/tools/test/connectivity/acts/framework/acts/controllers/utils_lib/commands/ |
route.py | 18 from acts.controllers.utils_lib.ssh import connection
|
/external/libvncserver/webclients/java-applet/ssl/ |
ss_vncviewer | 4 # or an SSH tunnel. 25 # (however, see the -ssh option below, in which case you will need ssh(1) 73 # -ssh Use ssh instead of stunnel SSL. ssh(1) must be installed and you 74 # must be able to log into the remote machine via ssh. 77 # where "user@host" is used for the ssh login (see ssh(1) manpage). 80 # "user@gwhost" or "user@gwhost:port". "gwhost" is an incoming ssh [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.build.tools/properties/ |
feedPublish.eclipse.properties | 107 # optionally, if the target folder might not exist, you can use ssh to create it before scp'ing the file - only runs if sshMakeDirCommand is defined 108 sshExec=/usr/bin/ssh
|
feedPublish.emf.properties | 93 # optionally, if the target folder might not exist, you can use ssh to create it before scp'ing the file 94 sshExec=/usr/bin/ssh
|
feedPublish.uml2.properties | 93 # optionally, if the target folder might not exist, you can use ssh to create it before scp'ing the file - only runs if sshMakeDirCommand is defined 94 sshExec=/usr/bin/ssh
|
/external/libexif/doc/ |
Makefile.am | 88 ssh "sf" "find /home/groups/l/li/libexif/htdocs/internals /home/groups/l/li/libexif/htdocs/api \( -type d -exec chgrp libexif {} \; -exec chmod g+rwxs,a+rx {} \; \) -or \( -type f -exec chgrp libexif {} \; -exec chmod g+rw {} \; \( -name '*.html' -or -name '*.png' -or -name '*.php' -or -name '*.jpg' -or -name '*.css' -name '*.dot' -name '*.map' \) -exec chmod a+r {} \; \)"
|
/external/skia/fuzz/ |
coverage | 15 You can typically ssh into skia-fuzzer-be-1 and skia-fuzzer-be-2 and run
|
/external/webrtc/webrtc/modules/audio_coding/codecs/isac/fix/source/ |
lpc_masking_model.c | 540 int sh_lo, sh_hi, sh, ssh, shMem; local 872 ssh = sh_lo >> 1; // sqrt_nrg is in Qssh. 873 sh = ssh - 14; 880 tmp16a = (int16_t) WEBRTC_SPL_SHIFT_W32(tmp32c, -shft); // Q(ssh-shft) (denominator) 882 tmp32b = WebRtcSpl_DivW32W16(tmp32a, tmp16a); // Q(24-ssh+shft) 883 sh = ssh-shft-7; 921 ssh = sh_hi >> 1; // |sqrt_nrg| is in Qssh. 922 sh = ssh - 14; 929 tmp16a = (int16_t) WEBRTC_SPL_SHIFT_W32(tmp32c, -shft); // Q(ssh-shft) (denominator) 931 tmp32b = WebRtcSpl_DivW32W16(tmp32a, tmp16a); // Q(24-ssh+shft [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Lib/ |
urlparse.py | 40 'svn', 'svn+ssh']
44 'svn', 'svn+ssh', 'sftp','nfs','git', 'git+ssh']
|
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
urlparse.py | 40 'svn', 'svn+ssh'] 44 'svn', 'svn+ssh', 'sftp','nfs','git', 'git+ssh']
|
/prebuilts/gdb/linux-x86/lib/python2.7/ |
urlparse.py | 40 'svn', 'svn+ssh'] 44 'svn', 'svn+ssh', 'sftp','nfs','git', 'git+ssh']
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
urlparse.py | 40 'svn', 'svn+ssh'] 44 'svn', 'svn+ssh', 'sftp','nfs','git', 'git+ssh']
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
urlparse.py | 40 'svn', 'svn+ssh'] 44 'svn', 'svn+ssh', 'sftp','nfs','git', 'git+ssh']
|
/bionic/tests/ |
signal_test.cpp | 128 ScopedSignalHandler ssh(SIGALRM, raise_in_signal_handler_helper); 137 ScopedSignalHandler ssh(SIGALRM, HandleSIGALRM); 166 ScopedSignalHandler ssh(SIGALRM, SigSuspendTestHelper); 294 ScopedSignalHandler ssh(SIGALRM, SigqueueSignalHandler, SA_SIGINFO);
|