/external/openssh/ |
ssh_api.h | 29 #include "ssh.h" 37 /* public SSH API functions */ 40 * ssh_init() create a ssh connection object with given (optional) 43 int ssh_init(struct ssh **, int is_server, struct kex_params *kex_params); 46 * release ssh connection state. 48 void ssh_free(struct ssh *); 53 void ssh_set_app_data(struct ssh *, void *); 54 void *ssh_get_app_data(struct ssh *); 57 * ssh_add_hostkey() registers a private/public hostkey for an ssh 64 int ssh_add_hostkey(struct ssh *ssh, struct sshkey *key) [all...] |
packet.h | 13 * called by a name other than "ssh" or "Secure Shell". 52 struct ssh { struct 84 typedef int (ssh_packet_hook_fn)(struct ssh *, struct sshbuf *, 87 struct ssh *ssh_alloc_session_state(void); 88 struct ssh *ssh_packet_set_connection(struct ssh *, int, int); 89 void ssh_packet_set_timeout(struct ssh *, int, int); 90 int ssh_packet_stop_discard(struct ssh *); 91 int ssh_packet_connection_af(struct ssh *); 92 void ssh_packet_set_nonblocking(struct ssh *); [all...] |
dispatch.c | 44 struct ssh *ssh = active_state; /* XXX */ local 50 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 || 51 (r = sshpkt_put_u32(ssh, seq)) != 0 || 52 (r = sshpkt_send(ssh)) != 0 || 53 (r = ssh_packet_write_wait(ssh)) != 0) 54 sshpkt_fatal(ssh, __func__, r); 59 dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh) 66 ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt [all...] |
opacket.c | 9 struct ssh *active_state, *backup_state; 14 ssh_packet_start(struct ssh *ssh, u_char type) 18 if ((r = sshpkt_start(ssh, type)) != 0) 23 ssh_packet_put_char(struct ssh *ssh, int value) 28 if ((r = sshpkt_put_u8(ssh, ch)) != 0) 33 ssh_packet_put_int(struct ssh *ssh, u_int value) 37 if ((r = sshpkt_put_u32(ssh, value)) != 0 [all...] |
ssh_api.c | 34 int _ssh_exchange_banner(struct ssh *); 35 int _ssh_send_banner(struct ssh *, char **); 36 int _ssh_read_banner(struct ssh *, char **); 37 int _ssh_order_hostkeyalgs(struct ssh *); 38 int _ssh_verify_host_key(struct sshkey *, struct ssh *); 39 struct sshkey *_ssh_host_public_key(int, int, struct ssh *); 40 struct sshkey *_ssh_host_private_key(int, int, struct ssh *); 73 ssh_init(struct ssh **sshp, int is_server, struct kex_params *kex_params) 76 struct ssh *ssh; local [all...] |
packet.c | 13 * called by a name other than "ssh" or "Secure Shell". 84 #include "ssh.h" 229 struct ssh * 232 struct ssh *ssh = NULL; local 235 if ((ssh = calloc(1, sizeof(*ssh))) == NULL || 243 TAILQ_INIT(&ssh->private_keys); 244 TAILQ_INIT(&ssh->public_keys); 256 ssh->state = state [all...] |
start-ssh | 7 DSA_KEY=/data/ssh/ssh_host_dsa_key 8 DSA_PUB_KEY=/data/ssh/ssh_host_dsa_key.pub 9 RSA_KEY=/data/ssh/ssh_host_rsa_key 10 RSA_PUB_KEY=/data/ssh/ssh_host_rsa_key.pub 11 AUTHORIZED_KEYS=/data/ssh/authorized_keys 15 /system/bin/ssh-keygen -t dsa -f $DSA_KEY -N "" 21 /system/bin/ssh-keygen -t rsa -f $RSA_KEY -N "" 33 /system/bin/logwrapper /system/bin/sshd -f /system/etc/ssh/sshd_config -D -d 36 /system/bin/sshd -f /system/etc/ssh/sshd_config -D
|
dispatch.h | 37 struct ssh; 43 void ssh_dispatch_init(struct ssh *, dispatch_fn *); 44 void ssh_dispatch_set(struct ssh *, int, dispatch_fn *); 45 void ssh_dispatch_range(struct ssh *, u_int, u_int, dispatch_fn *); 46 int ssh_dispatch_run(struct ssh *, int, volatile sig_atomic_t *, void *); 47 void ssh_dispatch_run_fatal(struct ssh *, int, volatile sig_atomic_t *, void *);
|
kexgexc.c | 58 kexgex_client(struct ssh *ssh) 60 struct kex *kex = ssh->kex; 72 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST)) != 0 || 73 (r = sshpkt_put_u32(ssh, kex->min)) != 0 || 74 (r = sshpkt_put_u32(ssh, kex->nbits)) != 0 || 75 (r = sshpkt_put_u32(ssh, kex->max)) != 0 || 76 (r = sshpkt_send(ssh)) != 0) 84 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, 94 struct ssh *ssh = ctxt local 148 struct ssh *ssh = ctxt; local [all...] |
kex.h | 128 struct ssh; 153 int (*verify_host_key)(struct sshkey *, struct ssh *); 154 struct sshkey *(*load_host_public_key)(int, int, struct ssh *); 155 struct sshkey *(*load_host_private_key)(int, int, struct ssh *); 156 int (*host_key_index)(struct sshkey *, int, struct ssh *); 159 int (*kex[KEX_MAX])(struct ssh *); 174 int kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **); 175 int kex_setup(struct ssh *, char *[PROPOSAL_MAX]); 183 int kex_send_kexinit(struct ssh *); 186 int kex_derive_keys(struct ssh *, u_char *, u_int, const struct sshbuf *) [all...] |
kexgexs.c | 49 #include "ssh-gss.h" 61 kexgex_server(struct ssh *ssh) 63 ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REQUEST, 72 struct ssh *ssh = ctxt; local 73 struct kex *kex = ssh->kex; 78 if ((r = sshpkt_get_u32(ssh, &min)) != 0 || 79 (r = sshpkt_get_u32(ssh, &nbits)) != 0 || 80 (r = sshpkt_get_u32(ssh, &max)) != 0 | 125 struct ssh *ssh = ctxt; local [all...] |
kexecdhs.c | 53 kexecdh_server(struct ssh *ssh) 56 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_ecdh_init); 63 struct ssh *ssh = ctxt; local 64 struct kex *kex = ssh->kex; 99 kex->hostkey_nid, ssh); 101 kex->hostkey_nid, ssh); 110 if ((r = sshpkt_get_ec(ssh, client_public, group)) != 0 || 111 (r = sshpkt_get_end(ssh)) != 0 [all...] |
kexc25519c.c | 50 kexc25519_client(struct ssh *ssh) 52 struct kex *kex = ssh->kex; 60 if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_ECDH_INIT)) != 0 || 61 (r = sshpkt_put_string(ssh, kex->c25519_client_pubkey, 63 (r = sshpkt_send(ssh)) != 0) 67 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_REPLY, &input_kex_c25519_reply); 74 struct ssh *ssh = ctxt; local 75 struct kex *kex = ssh->kex [all...] |
kexc25519s.c | 47 kexc25519_server(struct ssh *ssh) 50 ssh_dispatch_set(ssh, SSH2_MSG_KEX_ECDH_INIT, &input_kex_c25519_init); 57 struct ssh *ssh = ctxt; local 58 struct kex *kex = ssh->kex; 80 kex->hostkey_nid, ssh); 82 kex->hostkey_nid, ssh); 88 if ((r = sshpkt_get_string(ssh, &client_pubkey, &pklen)) != 0 || 89 (r = sshpkt_get_end(ssh)) != 0 [all...] |
/external/chromium-trace/catapult/common/lab/ |
keychain_unlock.sh | 6 # Script to SSH into a list of bots and set up their keychains for Telemetry. 11 ssh -t "$hostname" 'security unlock-keychain login.keychain
|
/external/openssh/contrib/redhat/ |
gnome-ssh-askpass.csh | 1 setenv SSH_ASKPASS /usr/libexec/openssh/gnome-ssh-askpass
|
gnome-ssh-askpass.sh | 1 SSH_ASKPASS=/usr/libexec/openssh/gnome-ssh-askpass
|
/external/toolchain-utils/go/chromeos/ |
target_sh | 11 ssh ${target} "$*"
|
/external/jacoco/org.jacoco.build/ |
publish.sh | 10 ssh $USERNAME,eclemma@shell.sourceforge.net create 11 ssh $USERNAME,eclemma@shell.sourceforge.net '/home/project-web/eclemma/scripts/publish-jacoco-snapshot.sh'
|
/external/openssh/contrib/ |
Makefile | 4 @echo "Valid targets: gnome-ssh-askpass1 gnome-ssh-askpass2" 6 gnome-ssh-askpass1: gnome-ssh-askpass1.c 8 gnome-ssh-askpass1.c -o gnome-ssh-askpass1 \ 11 gnome-ssh-askpass2: gnome-ssh-askpass2.c 13 gnome-ssh-askpass2.c -o gnome-ssh-askpass2 [all...] |
/external/openssh/regress/ |
hostkey-rotate.sh | 7 HOSTKEY_TYPES="ecdsa-sha2-nistp256 ssh-ed25519 ssh-rsa ssh-dss" 18 for k in `${SSH} -Q key-plain` ; do 19 ${SSHKEYGEN} -qt $k -f $OBJ/hkr.$k -N '' || fatal "ssh-keygen $k" 27 # All ssh should succeed in this test 28 ${SSH} -F $OBJ/ssh_proxy "$@" x true || fail "ssh $@ failed" 52 dossh -oHostKeyAlgorithms=ssh-ed25519 -oStrictHostKeyChecking=no 55 check_key_present ssh-ed25519 || fail "unstrict didn't learn key [all...] |
/external/toolchain-utils/dejagnu/boards/ |
gdbserver.sh.in | 9 echo "Executing: ssh ${RSA_FILE} ${REMOTE_SSH_FLAGS} root@${FLAGS_remote} \"${ssh_cmd}\"" >&2 11 ssh ${REMOTE_SSH_FLAGS} root@${FLAGS_remote} "killall -9 gdbserver; ${ssh_cmd}"
|
/external/autotest/site_utils/rpm_control_system/ |
rpm_controller.py | 62 SSH_LOGIN_CMD = ('ssh -l %s -o StrictHostKeyChecking=no ' 286 It logs into the hydra serial concentrator over ssh, launches the CLI 289 ssh = self._authenticate_with_hydra(admin_override=True) 290 if not ssh: 292 ssh.expect(RPMController.PASSWORD_PROMPT, timeout=60) 293 ssh.sendline(rpm_config.get('HYDRA', 'admin_password')) 294 ssh.expect(RPMController.HYDRA_PROMPT) 295 ssh.sendline(RPMController.CLI_CMD) 298 response = ssh.expect_list([cli_prompt_re, cli_held_re], timeout=60) 304 ssh.sendline(RPMController.CLI_KILL_PREVIOUS [all...] |
/external/openssh/regress/unittests/sshkey/ |
mktestdata.sh | 10 ssh-keygen -f $_in -e -m pkcs8 | \ 14 # XXX need conversion support in ssh-keygen for the other params 97 ssh-keygen -t rsa1 -b 1024 -C "RSA1 test key #1" -N "" -f rsa1_1 98 ssh-keygen -t rsa -b 1024 -C "RSA test key #1" -N "" -f rsa_1 99 ssh-keygen -t dsa -b 1024 -C "DSA test key #1" -N "" -f dsa_1 100 ssh-keygen -t ecdsa -b 256 -C "ECDSA test key #1" -N "" -f ecdsa_1 101 ssh-keygen -t ed25519 -C "ED25519 test key #1" -N "" -f ed25519_1 103 ssh-keygen -t rsa1 -b 2048 -C "RSA1 test key #2" -N "" -f rsa1_2 104 ssh-keygen -t rsa -b 2048 -C "RSA test key #2" -N "" -f rsa_2 105 ssh-keygen -t dsa -b 1024 -C "DSA test key #2" -N "" -f dsa_ [all...] |
/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/ |
bridge_interface.py | 57 ssh_session: ssh session to the AP 59 self.ssh = ssh_session 72 self.ssh.run(CREATE_BRIDGE) 81 self.ssh.run(ENABLE_4ADDR) 90 self.ssh.run(ADD_INTERFACE) 98 self.ssh.run(SET_BRIDGE_IP) 112 self.ssh.run(BRING_DOWN_BRIDGE) 114 self.ssh.run(DELETE_BRIDGE) 118 self.ssh.run(BRING_DOWN_WLAN) 121 self.ssh.run(DISABLE_4ADDR [all...] |