/aosp_15_r20/tools/test/connectivity/acts/framework/acts/controllers/openwrt_lib/ |
D | network_settings.py | 37 MDNS_PACKAGE = "avahi-utils avahi-daemon-service-http avahi-daemon-service-ssh libavahi-client avah… 55 ssh: ssh connection object. 56 ssh_settings: ssh settings for AccessPoint. 58 user: username for ssh. 67 def __init__(self, ssh, ssh_settings, logger): argument 71 ssh: ssh connection object. 72 ssh_settings: ssh settings for AccessPoint. 75 self.ssh = ssh 76 self.service_manager = ServiceManager(ssh) 110 out = self.ssh.run("cat %s" % HISTORY_CONFIG_PATH).stdout [all …]
|
D | wireless_settings_applier.py | 30 ssh: ssh object for the AP. 38 def __init__(self, ssh, configs, channel_2g, channel_5g, radio_2g=RADIO_2G, radio_5g=RADIO_5G): argument 42 ssh: ssh connection object. 48 self.ssh = ssh 49 self.service_manager = ServiceManager(ssh) 62 self.ssh.run("uci set wireless.%s.channel='%s'" % (self.radio_2g, self.channel_2g)) 63 self.ssh.run("uci set wireless.%s.channel='%s'" % (self.radio_5g, self.channel_5g)) 65 self.ssh.run("uci set wireless.%s.htmode='VHT20'" % self.radio_5g) 67 self.ssh.run("iw reg set IN") 68 self.ssh.run("uci set wireless.%s.htmode='VHT40'" % self.radio_5g) [all …]
|
/aosp_15_r20/external/autotest/server/hosts/ |
H A D | cros_repair_unittest.py | 21 (repair_utils.SshVerifier, 'ssh', ('ping', )), 23 (cros_repair.DevDefaultBootVerifier, 'dev_default_boot', ('ssh', )), 24 (cros_repair.DevModeVerifier, 'devmode', ('ssh', )), 25 (cros_repair.EnrollmentStateVerifier, 'enrollment_state', ('ssh', )), 26 (cros_repair.HWIDVerifier, 'hwid', ('ssh', )), 27 (cros_repair.ACPowerVerifier, 'power', ('ssh', )), 28 (cros_repair.EXT4fsErrorVerifier, 'ext4', ('ssh', )), 29 (cros_repair.WritableVerifier, 'writable', ('ssh', )), 30 (cros_repair.TPMStatusVerifier, 'tpm', ('ssh', )), 31 (cros_repair.UpdateSuccessVerifier, 'good_provision', ('ssh', )), [all …]
|
H A D | ssh_host.py | 11 SSHHost: a remote machine with a ssh access 46 This class represents a remote machine controlled through an ssh 57 serial console available then ordinary SSH-based commands will 82 Construct an ssh command with proper args for this host. 85 @param options: SSH options 86 @param alive_interval: SSH Alive interval. 87 @param alive_count_max: SSH AliveCountMax. 88 @param connection_attempts: SSH ConnectionAttempts 116 Prepend the command for the client with information about the ssh 119 @param command: the ssh command to be executed. [all …]
|
H A D | ssh_multiplex.py | 22 '/usr/bin/ssh -a -x -N ' 37 """Manages multiplex ssh connection.""" 58 """Returns the ssh option to use this multiplexed ssh. 67 """Starts the background process to run multiplex ssh connection. 73 @param timeout: timeout in seconds (default 5) to wait for main ssh 79 # ssh connection and create a new one, therefore use a lock to protect 82 # If a previously started main SSH connection is not running 87 'Main-ssh connection to %s is down.', self._hostname) 90 # Start a new main SSH connection. 95 # Start the main SSH connection in the background. [all …]
|
H A D | abstract_ssh.py | 59 # and a single ssh ping in wait_up(). 69 framework necessary for controlling a host via ssh. It implements 74 # Timeout for main ssh connection setup, in seconds. 92 @param user: The username to use when ssh'ing into the host. 93 @param password: The password to use when ssh'ing into the host. 94 @param port: The port to use for ssh. 101 the main ssh connection across control scripts. 130 Main SSH connection background job, socket temp directory and socket 131 control path option. If main-SSH is enabled, these fields will be 132 initialized by start_main_ssh when a new SSH connection is initiated. [all …]
|
/aosp_15_r20/tools/acloud/internal/lib/ |
H A D | ssh_test.py | 17 """Tests for acloud.internal.lib.ssh.""" 30 from acloud.internal.lib import ssh 35 """Test ssh class.""" 39 FAKE_IP = ssh.IP(external="1.1.1.1", internal="10.1.1.1") 40 FAKE_EXTRA_ARGS_SSH = "-o ProxyCommand='ssh [email protected] Server 22'" 61 None, "ssh command fail.")) 63 ssh.ShellCmdWithRetry, 68 ssh_object = ssh.Ssh(ip=self.FAKE_IP, 73 "/usr/bin/ssh -i /fake/acloud_rea -o LogLevel=ERROR -o ControlPath=none " 80 ssh_object = ssh.Ssh(self.FAKE_IP, self.FAKE_SSH_USER, self.FAKE_SSH_PRIVATE_KEY_PATH) [all …]
|
H A D | ssh.py | 14 """Ssh Utilities.""" 44 """Runs a single SSH command. 46 - SSH returns code 0 for "Successful execution". 50 cmd: String of the full SSH command to run, including the SSH binary 71 """Runs a single SSH command. 73 - SSH returns code 0 for "Successful execution". 77 cmd: String of the full SSH command to run, including the SSH binary 98 """Runs a single SSH command while logging its output and processes its return code. 101 SSH returns error code 255 for "failed to connect", so this is interpreted as a failure in 102 SSH rather than a failure on the target device and this is converted to a different exception [all …]
|
/aosp_15_r20/external/libwebsockets/READMEs/ |
H A D | README.plugin-sshd-base.md | 1 ssh-base Plugin 6 lws-ssh-base is a protcol plugin for libwebsockets that implements a 7 generic, abstract, ssh server. 20 - The plugin has no built-in behaviours like check ~/.ssh/authorized_keys, 28 handlers. So it's role is something like an abstract base class for an ssh 44 |Server host key|ssh-rsa (4096b)| 50 lws-ssh-base is Free Software, available under libwebsockets' MIT license. 58 $ ssh-keygen -t rsa -b 4096 -f mykeys 63 with ssh, you can just use that directly. 71 spawns a bash shell when an ssh client authenticates. The username used on [all …]
|
/aosp_15_r20/tools/test/connectivity/acts/framework/acts/controllers/ |
D | openwrt_ap.py | 19 from acts.controllers.utils_lib.ssh import connection 20 from acts.controllers.utils_lib.ssh import settings 47 username of the AP to connect to over SSH. 57 1 or more APs to configure. Each AP has a "ssh_config" key to provide SSH 58 login information. OpenWrtAP#__init__() uses this to create SSH object. 105 ssh: The ssh connection to the AP. 106 ssh_settings: The ssh settings being used by the ssh connection. 118 self.ssh = connection.SshConnection(self.ssh_settings) 119 self.ssh.setup_master_ssh() 121 logging.info("OpenWrt AP instance is not initialized, use SSH Auth...") [all …]
|
D | access_point.py | 43 from acts.controllers.utils_lib.ssh import connection 44 from acts.controllers.utils_lib.ssh import settings 63 containing the hostname and username of the ap to connect to over ssh. 203 ssh: The ssh connection to this ap. 204 ssh_settings: The ssh settings being used by the ssh connection. 231 self.ssh = connection.SshConnection(self.ssh_settings) 234 self._ip_cmd = ip.LinuxIpCommand(self.ssh) 235 self._route_cmd = route.LinuxRouteCommand(self.ssh) 272 self.ssh.run('stop wpasupplicant') 276 self.ssh.run('stop hostapd') [all …]
|
/aosp_15_r20/tools/test/connectivity/acts/framework/acts/controllers/utils_lib/ssh/ |
D | connection.py | 26 from acts.controllers.utils_lib.ssh import formatter 31 """An error occurred during an ssh operation.""" 38 result: The results of the ssh command that had the error. 43 result: The result of the ssh command that created the problem. 57 """Provides a connection to a remote machine through ssh. 72 settings: The ssh settings to use for this connection. 73 formatter: The object that will handle formatting ssh command 98 """Sets up the master ssh connection. 100 Sets up the initial master ssh connection if it has not already been 104 timeout_seconds: The time to wait for the master ssh connection to [all …]
|
/aosp_15_r20/tools/test/connectivity/acts/framework/acts/controllers/amarisoft_lib/ |
D | ssh_utils.py | 30 """Raises an error when run command without SSH connect.""" 34 """The SSH client class interacts with the test machine. 38 port: A string representing the default port of SSH. 41 ssh: A SSH client. 54 self.ssh = paramiko.SSHClient() 58 """Checks SSH connect or not. 61 True if SSH is connected, False otherwise. 63 return self.ssh and self.ssh.get_transport().is_active() 66 """Closes the SSH connection. 69 True if ssh session closed, False otherwise. [all …]
|
/aosp_15_r20/external/libnfnetlink/src/ |
H A D | libnfnetlink.c | 343 struct nfnl_subsys_handle *ssh; in nfnl_subsys_open2() local 353 ssh = &nfnlh->subsys[subsys_id]; in nfnl_subsys_open2() 354 if (ssh->cb) { in nfnl_subsys_open2() 359 ssh->cb = calloc(cb_count, sizeof(*(ssh->cb))); in nfnl_subsys_open2() 360 if (!ssh->cb) in nfnl_subsys_open2() 363 ssh->nfnlh = nfnlh; in nfnl_subsys_open2() 364 ssh->cb_count = cb_count; in nfnl_subsys_open2() 365 ssh->subscriptions = subscriptions; in nfnl_subsys_open2() 366 ssh->subsys_id = subsys_id; in nfnl_subsys_open2() 375 free(ssh->cb); in nfnl_subsys_open2() [all …]
|
/aosp_15_r20/tools/acloud/pull/ |
H A D | pull.py | 27 from acloud.internal.lib.ssh import Ssh 28 from acloud.internal.lib.ssh import IP 57 ssh = Ssh(ip=IP(ip=instance.ip), 61 log_files = SelectLogFileToPull(ssh, file_name) 62 PullLogs(ssh, log_files, instance.name) 64 DisplayLog(ssh, log_files[0], no_prompts) 68 def PullLogs(ssh, log_files, instance_name): argument 72 ssh: Ssh object. 83 ssh.ScpPullFile(log_file, target_file) 88 def DisplayLog(ssh, log_file, no_prompts=False): argument [all …]
|
/aosp_15_r20/external/ltp/testcases/network/stress/ssh/ |
H A D | ssh-stress.sh | 14 TST_NEEDS_CMDS="sshd ssh ssh-keygen od pkill pgrep" 17 # SSH config file on the remote host 19 # SSH command to connect from the remote host to the test host 30 # Stop the ssh daemon 36 # Kill all remaining ssh processes 37 [ -n "$RHOST_SSH_CONF" ] && tst_rhost_run -c "pkill -f '^ssh $RHOST_SSH_CONF'" 63 ssh-keygen -q -N "" -t rsa -b 4096 -f $TST_TMPDIR/ssh_host_rsa_key 64 ssh-keygen -q -N "" -t ecdsa -f $TST_TMPDIR/ssh_host_ecdsa_key 65 ssh-keygen -q -N "" -t ed25519 -f $TST_TMPDIR/ssh_host_ed25519_key 68 tst_rhost_run -s -c "ssh-keygen -t rsa -N \"\" -f $TST_TMPDIR/id_rsa \ [all …]
|
/aosp_15_r20/external/google-cloud-java/java-appengine-admin/proto-google-cloud-appengine-admin-v1/src/main/java/com/google/appengine/v1/ |
H A D | DebugInstanceRequest.java | 132 * Public SSH key to add to the instance. Examples: 133 * * `[USERNAME]:ssh-rsa [KEY_VALUE] [USERNAME]` 134 …* * `[USERNAME]:ssh-rsa [KEY_VALUE] google-ssh {"userName":"[USERNAME]","expireOn":"[EXPIRE_TIME]"… 136 …* [Adding and Removing SSH Keys](https://cloud.google.com/compute/docs/instances/adding-removing-s… 159 * Public SSH key to add to the instance. Examples: 160 * * `[USERNAME]:ssh-rsa [KEY_VALUE] [USERNAME]` 161 …* * `[USERNAME]:ssh-rsa [KEY_VALUE] google-ssh {"userName":"[USERNAME]","expireOn":"[EXPIRE_TIME]"… 163 …* [Adding and Removing SSH Keys](https://cloud.google.com/compute/docs/instances/adding-removing-s… 664 * Public SSH key to add to the instance. Examples: 665 * * `[USERNAME]:ssh-rsa [KEY_VALUE] [USERNAME]` [all …]
|
/aosp_15_r20/external/autotest/utils/frozen_chromite/lib/ |
H A D | remote_access.py | 53 # Ssh returns status 255 when it encounters errors in its own code. Otherwise 55 # possibly 255. Here we assume that 255 indicates only ssh errors. This may 59 # SSH default known_hosts filepath. 60 KNOWN_HOSTS_PATH = os.path.expanduser('~/.ssh/known_hosts') 71 """Raised when SSH connection has failed.""" 80 # indicates why SSH failed so this might be the best we can do. 197 """Creates a list of SSH connection options. 202 a value so that the SSH default value will be used. 206 resulting arguments are passed into an SSH call. 212 A list of arguments to pass to SSH. [all …]
|
/aosp_15_r20/tools/test/connectivity/acts/framework/acts/controllers/fuchsia_lib/ |
D | ssh.py | 36 """Result of an SSH command.""" 70 """A SSH command returned with a non-zero status code.""" 74 f'SSH command "{command}" unexpectedly returned {result}') 79 """A SSH command timed out.""" 83 f'SSH command "{err.cmd}" timed out after {err.timeout}s, ' 88 """Failure to send an SSH command.""" 93 """SSH client config.""" 95 # SSH flags. See ssh(1) for full details. 99 ssh_binary: str = 'ssh' 104 # SSH options. See ssh_config(5) for full details. [all …]
|
/aosp_15_r20/external/curl/tests/ |
H A D | sshhelp.pm | 79 our $sshdexe = 'sshd' .exe_ext('SSH'); # base name and ext of ssh daemon 80 our $sshexe = 'ssh' .exe_ext('SSH'); # base name and ext of ssh client 81 our $sftpsrvexe = 'sftp-server' .exe_ext('SSH'); # base name and ext of sftp-server 82 our $sftpexe = 'sftp' .exe_ext('SSH'); # base name and ext of sftp client 83 our $sshkeygenexe = 'ssh-keygen' .exe_ext('SSH'); # base name and ext of ssh-keygen 84 our $httptlssrvexe = 'gnutls-serv' .exe_ext('SSH'); # base name and ext of gnutls-serv 85 our $sshdconfig = 'curl_sshd_config'; # ssh daemon config file 86 our $sshconfig = 'curl_ssh_config'; # ssh client config file 88 our $sshdlog = undef; # ssh daemon log file 89 our $sshlog = undef; # ssh client log file [all …]
|
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/ |
D | oslogin_v1beta.users.sshPublicKeys.html | 82 <p class="firstline">Create an SSH public key</p> 85 <p class="firstline">Deletes an SSH public key.</p> 88 <p class="firstline">Retrieves an SSH public key.</p> 91 <p class="firstline">Updates an SSH public key and returns the profile information. This method sup… 100 <pre>Create an SSH public key 107 { # The SSH public key information associated with a Google account. 109 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… 110 …"key": "A String", # Public key text in SSH format, defined by RFC4253 section… 122 { # The SSH public key information associated with a Google account. 124 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… [all …]
|
D | oslogin_v1.users.sshPublicKeys.html | 82 <p class="firstline">Create an SSH public key</p> 85 <p class="firstline">Deletes an SSH public key.</p> 88 <p class="firstline">Retrieves an SSH public key.</p> 91 <p class="firstline">Updates an SSH public key and returns the profile information. This method sup… 100 <pre>Create an SSH public key 107 { # The SSH public key information associated with a Google account. 109 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… 110 …"key": "A String", # Public key text in SSH format, defined by RFC4253 section… 122 { # The SSH public key information associated with a Google account. 124 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… [all …]
|
D | oslogin_v1alpha.users.sshPublicKeys.html | 82 <p class="firstline">Create an SSH public key</p> 85 <p class="firstline">Deletes an SSH public key.</p> 88 <p class="firstline">Retrieves an SSH public key.</p> 91 <p class="firstline">Updates an SSH public key and returns the profile information. This method sup… 100 <pre>Create an SSH public key 107 { # The SSH public key information associated with a Google account. 109 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… 110 …"key": "A String", # Public key text in SSH format, defined by RFC4253 section… 122 { # The SSH public key information associated with a Google account. 124 …"fingerprint": "A String", # Output only. The SHA-256 fingerprint of the SSH p… [all …]
|
/aosp_15_r20/external/googleapis/google/cloud/oslogin/v1beta/ |
H A D | oslogin.proto | 37 // The Cloud OS Login API allows you to manage users and their associated SSH 47 // Create an SSH public key 66 // Deletes an SSH public key. 84 // Retrieves an SSH public key. 93 // Adds an SSH public key and returns the profile information. Default POSIX 106 // Updates an SSH public key and returns the profile information. This method 118 // Signs an SSH public key for a user to authenticate to an instance. 142 // A map from SSH public key fingerprint to the associated key object. 149 // A request message for creating an SSH public key. 159 // Required. The SSH public key and expiration time. [all …]
|
/aosp_15_r20/device/google/cuttlefish/tools/ |
D | network-setup.sh | 251 echo "Writing Rock Pi configuration to ~/.ssh/config..." 253 grep -w "Host rock01" $USER_HOME/.ssh/config > /dev/null 2>&1 255 cat >>$USER_HOME/.ssh/config << EOF 259 IdentityFile ~/.ssh/rock01_key 264 sed -i '/Host rock01/{n;s/.*/ HostName '${rockip}'/}' $USER_HOME/.ssh/config 266 grep -w "Host rockpi01" $USER_HOME/.ssh/config > /dev/null 2>&1 268 cat >>$USER_HOME/.ssh/config << EOF 272 IdentityFile ~/.ssh/rock01_key 275 sed -i '/Host rockpi01/{n;s/.*/ HostName '${rockip}'/}' $USER_HOME/.ssh/config 278 sudo chown $SUDO_USER:`id -ng $SUDO_USER` $USER_HOME/.ssh/config [all …]
|