HomeSort by relevance Sort by last modified time
    Searched refs:ssh (Results 1 - 25 of 176) sorted by null

1 2 3 4 5 6 7 8

  /external/openssh/
ssh_api.h 29 #include "ssh.h"
37 /* public SSH API functions */
40 * ssh_init() create a ssh connection object with given (optional)
43 int ssh_init(struct ssh **, int is_server, struct kex_params *kex_params);
46 * release ssh connection state.
48 void ssh_free(struct ssh *);
53 void ssh_set_app_data(struct ssh *, void *);
54 void *ssh_get_app_data(struct ssh *);
57 * ssh_add_hostkey() registers a private/public hostkey for an ssh
64 int ssh_add_hostkey(struct ssh *ssh, struct sshkey *key)
    [all...]
packet.h 13 * called by a name other than "ssh" or "Secure Shell".
52 struct ssh { struct
84 typedef int (ssh_packet_hook_fn)(struct ssh *, struct sshbuf *,
87 struct ssh *ssh_alloc_session_state(void);
88 struct ssh *ssh_packet_set_connection(struct ssh *, int, int);
89 void ssh_packet_set_timeout(struct ssh *, int, int);
90 int ssh_packet_stop_discard(struct ssh *);
91 int ssh_packet_connection_af(struct ssh *);
92 void ssh_packet_set_nonblocking(struct ssh *);
    [all...]
dispatch.c 44 struct ssh *ssh = active_state; /* XXX */ local
50 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 ||
51 (r = sshpkt_put_u32(ssh, seq)) != 0 ||
52 (r = sshpkt_send(ssh)) != 0 ||
53 (r = ssh_packet_write_wait(ssh)) != 0)
54 sshpkt_fatal(ssh, __func__, r);
59 dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh)
66 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt
    [all...]
opacket.c 9 struct ssh *active_state, *backup_state;
14 ssh_packet_start(struct ssh *ssh, u_char type)
18 if ((r = sshpkt_start(ssh, type)) != 0)
23 ssh_packet_put_char(struct ssh *ssh, int value)
28 if ((r = sshpkt_put_u8(ssh, ch)) != 0)
33 ssh_packet_put_int(struct ssh *ssh, u_int value)
37 if ((r = sshpkt_put_u32(ssh, value)) != 0
    [all...]
ssh_api.c 34 int _ssh_exchange_banner(struct ssh *);
35 int _ssh_send_banner(struct ssh *, char **);
36 int _ssh_read_banner(struct ssh *, char **);
37 int _ssh_order_hostkeyalgs(struct ssh *);
38 int _ssh_verify_host_key(struct sshkey *, struct ssh *);
39 struct sshkey *_ssh_host_public_key(int, int, struct ssh *);
40 struct sshkey *_ssh_host_private_key(int, int, struct ssh *);
73 ssh_init(struct ssh **sshp, int is_server, struct kex_params *kex_params)
76 struct ssh *ssh; local
    [all...]
packet.c 13 * called by a name other than "ssh" or "Secure Shell".
84 #include "ssh.h"
229 struct ssh *
232 struct ssh *ssh = NULL; local
235 if ((ssh = calloc(1, sizeof(*ssh))) == NULL ||
243 TAILQ_INIT(&ssh->private_keys);
244 TAILQ_INIT(&ssh->public_keys);
256 ssh->state = state
    [all...]
start-ssh 7 DSA_KEY=/data/ssh/ssh_host_dsa_key
8 DSA_PUB_KEY=/data/ssh/ssh_host_dsa_key.pub
9 RSA_KEY=/data/ssh/ssh_host_rsa_key
10 RSA_PUB_KEY=/data/ssh/ssh_host_rsa_key.pub
11 AUTHORIZED_KEYS=/data/ssh/authorized_keys
15 /system/bin/ssh-keygen -t dsa -f $DSA_KEY -N ""
21 /system/bin/ssh-keygen -t rsa -f $RSA_KEY -N ""
33 /system/bin/logwrapper /system/bin/sshd -f /system/etc/ssh/sshd_config -D -d
36 /system/bin/sshd -f /system/etc/ssh/sshd_config -D
dispatch.h 37 struct ssh;
43 void ssh_dispatch_init(struct ssh *, dispatch_fn *);
44 void ssh_dispatch_set(struct ssh *, int, dispatch_fn *);
45 void ssh_dispatch_range(struct ssh *, u_int, u_int, dispatch_fn *);
46 int ssh_dispatch_run(struct ssh *, int, volatile sig_atomic_t *, void *);
47 void ssh_dispatch_run_fatal(struct ssh *, int, volatile sig_atomic_t *, void *);
kexgexc.c 58 kexgex_client(struct ssh *ssh)
60 struct kex *kex = ssh->kex;
72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 ||
73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 ||
74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 ||
75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 ||
76 (r = sshpkt_send(ssh)) != 0)
84 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP,
94 struct ssh *ssh = ctxt local
148 struct ssh *ssh = ctxt; local
    [all...]
kex.h 128 struct ssh;
153 int (*verify_host_key)(struct sshkey *, struct ssh *);
154 struct sshkey *(*load_host_public_key)(int, int, struct ssh *);
155 struct sshkey *(*load_host_private_key)(int, int, struct ssh *);
156 int (*host_key_index)(struct sshkey *, int, struct ssh *);
159 int (*kex[KEX_MAX])(struct ssh *);
174 int kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **);
175 int kex_setup(struct ssh *, char *[PROPOSAL_MAX]);
183 int kex_send_kexinit(struct ssh *);
186 int kex_derive_keys(struct ssh *, u_char *, u_int, const struct sshbuf *)
    [all...]
kexgexs.c 49 #include "ssh-gss.h"
61 kexgex_server(struct ssh *ssh)
63 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST,
72 struct ssh *ssh = ctxt; local
73 struct kex *kex = ssh->kex;
78 if ((r = sshpkt_get_u32(ssh, &min)) != 0 ||
79 (r = sshpkt_get_u32(ssh, &nbits)) != 0 ||
80 (r = sshpkt_get_u32(ssh, &max)) != 0 |
125 struct ssh *ssh = ctxt; local
    [all...]
kexecdhs.c 53 kexecdh_server(struct ssh *ssh)
56 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_ecdh_init);
63 struct ssh *ssh = ctxt; local
64 struct kex *kex = ssh->kex;
99 kex->hostkey_nid, ssh);
101 kex->hostkey_nid, ssh);
110 if ((r = sshpkt_get_ec(ssh, client_public, group)) != 0 ||
111 (r = sshpkt_get_end(ssh)) != 0
    [all...]
kexc25519c.c 50 kexc25519_client(struct ssh *ssh)
52 struct kex *kex = ssh->kex;
60 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 ||
61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey,
63 (r = sshpkt_send(ssh)) != 0)
67 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_c25519_reply);
74 struct ssh *ssh = ctxt; local
75 struct kex *kex = ssh->kex
    [all...]
kexc25519s.c 47 kexc25519_server(struct ssh *ssh)
50 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_c25519_init);
57 struct ssh *ssh = ctxt; local
58 struct kex *kex = ssh->kex;
80 kex->hostkey_nid, ssh);
82 kex->hostkey_nid, ssh);
88 if ((r = sshpkt_get_string(ssh, &client_pubkey, &pklen)) != 0 ||
89 (r = sshpkt_get_end(ssh)) != 0
    [all...]
  /external/chromium-trace/catapult/common/lab/
keychain_unlock.sh 6 # Script to SSH into a list of bots and set up their keychains for Telemetry.
11 ssh -t "$hostname" 'security unlock-keychain login.keychain
  /external/openssh/contrib/redhat/
gnome-ssh-askpass.csh 1 setenv SSH_ASKPASS /usr/libexec/openssh/gnome-ssh-askpass
gnome-ssh-askpass.sh 1 SSH_ASKPASS=/usr/libexec/openssh/gnome-ssh-askpass
  /external/toolchain-utils/go/chromeos/
target_sh 11 ssh ${target} "$*"
  /external/jacoco/org.jacoco.build/
publish.sh 10 ssh $USERNAME,eclemma@shell.sourceforge.net create
11 ssh $USERNAME,eclemma@shell.sourceforge.net '/home/project-web/eclemma/scripts/publish-jacoco-snapshot.sh'
  /external/openssh/contrib/
Makefile 4 @echo "Valid targets: gnome-ssh-askpass1 gnome-ssh-askpass2"
6 gnome-ssh-askpass1: gnome-ssh-askpass1.c
8 gnome-ssh-askpass1.c -o gnome-ssh-askpass1 \
11 gnome-ssh-askpass2: gnome-ssh-askpass2.c
13 gnome-ssh-askpass2.c -o gnome-ssh-askpass2
    [all...]
  /external/openssh/regress/
hostkey-rotate.sh 7 HOSTKEY_TYPES="ecdsa-sha2-nistp256 ssh-ed25519 ssh-rsa ssh-dss"
18 for k in `${SSH} -Q key-plain` ; do
19 ${SSHKEYGEN} -qt $k -f $OBJ/hkr.$k -N '' || fatal "ssh-keygen $k"
27 # All ssh should succeed in this test
28 ${SSH} -F $OBJ/ssh_proxy "$@" x true || fail "ssh $@ failed"
52 dossh -oHostKeyAlgorithms=ssh-ed25519 -oStrictHostKeyChecking=no
55 check_key_present ssh-ed25519 || fail "unstrict didn't learn key
    [all...]
  /external/toolchain-utils/dejagnu/boards/
gdbserver.sh.in 9 echo "Executing: ssh ${RSA_FILE} ${REMOTE_SSH_FLAGS} root@${FLAGS_remote} \"${ssh_cmd}\"" >&2
11 ssh ${REMOTE_SSH_FLAGS} root@${FLAGS_remote} "killall -9 gdbserver; ${ssh_cmd}"
  /external/autotest/site_utils/rpm_control_system/
rpm_controller.py 62 SSH_LOGIN_CMD = ('ssh -l %s -o StrictHostKeyChecking=no '
286 It logs into the hydra serial concentrator over ssh, launches the CLI
289 ssh = self._authenticate_with_hydra(admin_override=True)
290 if not ssh:
292 ssh.expect(RPMController.PASSWORD_PROMPT, timeout=60)
293 ssh.sendline(rpm_config.get('HYDRA', 'admin_password'))
294 ssh.expect(RPMController.HYDRA_PROMPT)
295 ssh.sendline(RPMController.CLI_CMD)
298 response = ssh.expect_list([cli_prompt_re, cli_held_re], timeout=60)
304 ssh.sendline(RPMController.CLI_KILL_PREVIOUS
    [all...]
  /external/openssh/regress/unittests/sshkey/
mktestdata.sh 10 ssh-keygen -f $_in -e -m pkcs8 | \
14 # XXX need conversion support in ssh-keygen for the other params
97 ssh-keygen -t rsa1 -b 1024 -C "RSA1 test key #1" -N "" -f rsa1_1
98 ssh-keygen -t rsa -b 1024 -C "RSA test key #1" -N "" -f rsa_1
99 ssh-keygen -t dsa -b 1024 -C "DSA test key #1" -N "" -f dsa_1
100 ssh-keygen -t ecdsa -b 256 -C "ECDSA test key #1" -N "" -f ecdsa_1
101 ssh-keygen -t ed25519 -C "ED25519 test key #1" -N "" -f ed25519_1
103 ssh-keygen -t rsa1 -b 2048 -C "RSA1 test key #2" -N "" -f rsa1_2
104 ssh-keygen -t rsa -b 2048 -C "RSA test key #2" -N "" -f rsa_2
105 ssh-keygen -t dsa -b 1024 -C "DSA test key #2" -N "" -f dsa_
    [all...]
  /tools/test/connectivity/acts/framework/acts/controllers/ap_lib/
bridge_interface.py 57 ssh_session: ssh session to the AP
59 self.ssh = ssh_session
72 self.ssh.run(CREATE_BRIDGE)
81 self.ssh.run(ENABLE_4ADDR)
90 self.ssh.run(ADD_INTERFACE)
98 self.ssh.run(SET_BRIDGE_IP)
112 self.ssh.run(BRING_DOWN_BRIDGE)
114 self.ssh.run(DELETE_BRIDGE)
118 self.ssh.run(BRING_DOWN_WLAN)
121 self.ssh.run(DISABLE_4ADDR
    [all...]

Completed in 405 milliseconds

1 2 3 4 5 6 7 8