Home
last modified time | relevance | path

Searched refs:ssh (Results 1 – 25 of 295) sorted by relevance

12345678910>>...12

/openbmc/qemu/tests/rocker/
H A Dbridge-vlan-stp5 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
6 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
7 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
11 simp ssh tut sw1 --cmd "sudo /sbin/ip link add name br0 type bridge"
12 simp ssh tut sw1 --cmd "sudo brctl stp br0 on"
13 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p1 master br0"
14 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p2 master br0"
19 simp ssh tut sw1 --cmd "echo 0 | sudo dd of=/sys/class/net/br0/bridge/default_pvid 2> /dev/null"
20 simp ssh tut sw1 --cmd "echo 1 | sudo dd of=/sys/class/net/br0/bridge/vlan_filtering 2> /dev/null"
24 simp ssh tut sw1 --cmd "sudo /sbin/bridge vlan add vid 57 dev sw1p1"
[all …]
H A Dbridge-stp5 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
6 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
7 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
11 simp ssh tut sw1 --cmd "sudo /sbin/ip link add name br0 type bridge"
12 simp ssh tut sw1 --cmd "sudo brctl stp br0 on"
13 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p1 master br0"
14 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p2 master br0"
18 simp ssh tut sw1 --cmd "echo 0 | sudo dd of=/sys/class/net/br0/bridge/default_pvid 2> /dev/null"
22 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p1 learning off"
23 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p2 learning off"
[all …]
H A Dbridge-vlan5 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
6 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
7 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
11 simp ssh tut sw1 --cmd "sudo /sbin/ip link add name br0 type bridge"
12 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p1 master br0"
13 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p2 master br0"
18 simp ssh tut sw1 --cmd "echo 0 | sudo dd of=/sys/class/net/br0/bridge/default_pvid 2> /dev/null"
19 simp ssh tut sw1 --cmd "echo 1 | sudo dd of=/sys/class/net/br0/bridge/vlan_filtering 2> /dev/null"
23 simp ssh tut sw1 --cmd "sudo /sbin/bridge vlan add vid 57 dev sw1p1"
24 simp ssh tut sw1 --cmd "sudo /sbin/bridge vlan add vid 57 dev sw1p2"
[all …]
H A Dbridge5 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
6 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
7 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
11 simp ssh tut sw1 --cmd "sudo /sbin/ip link add name br0 type bridge"
12 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p1 master br0"
13 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p2 master br0"
17 simp ssh tut sw1 --cmd "echo 0 | sudo dd of=/sys/class/net/br0/bridge/default_pvid 2> /dev/null"
21 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p1 learning off"
22 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p2 learning off"
24 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p1 flood off"
[all …]
H A Dport4 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
5 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
6 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done
10 simp ssh tut sw1 --cmd "sudo ifconfig sw1p1 11.0.0.1/24"
11 simp ssh tut sw1 --cmd "sudo ifconfig sw1p2 12.0.0.1/24"
15 simp ssh tut h1 --cmd "sudo ifconfig sw1p1 11.0.0.2/24"
16 simp ssh tut h2 --cmd "sudo ifconfig sw1p1 12.0.0.2/24"
20 simp ssh tut h1 --cmd "ping -c10 11.0.0.1 >/dev/null"
22 simp ssh tut h2 --cmd "ping -c10 12.0.0.1 >/dev/null"
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gnome-keyring/gnome-keyring/
H A D0001-Set-paths-to-ssh-agent-and-ssh-add-by-configure-opti.patch4 Subject: [PATCH] Set paths to ssh-agent and ssh-add by configure options
27 - AC_PATH_PROG([SSH_AGENT], [ssh-agent], [no])
28 - AC_PATH_PROG([SSH_ADD], [ssh-add], [no])
29 + AC_ARG_WITH([ssh-agent-path],
30 + [AC_HELP_STRING([--with-ssh-agent-path=PATH],
31 + [path to ssh-agent])],
33 + AC_ARG_WITH([ssh-add-path],
34 + [AC_HELP_STRING([--with-ssh-add-path=PATH],
35 + [path to ssh-add])],
39 AC_MSG_ERROR([the ssh-agent and ssh-add commands were not found])
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/
H A Dopenssh_9.9p1.bb2 the SSH protocol including the ssh client and sshd server"
77 --sysconfdir=${sysconfdir}/ssh \
114 # Enable specific ssh host keys
115 sed -i '/HostKey/d' ${D}${sysconfdir}/ssh/sshd_config
117 echo "HostKey /etc/ssh/ssh_host_rsa_key" >> ${D}${sysconfdir}/ssh/sshd_config
120 echo "HostKey /etc/ssh/ssh_host_ecdsa_key" >> ${D}${sysconfdir}/ssh/sshd_config
123 echo "HostKey /etc/ssh/ssh_host_ed25519_key" >> ${D}${sysconfdir}/ssh/sshd_confi
[all...]
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gnome-keyring/
H A Dgnome-keyring_46.2.bb27 file://0001-Set-paths-to-ssh-agent-and-ssh-add-by-configure-opti.patch \
31 PACKAGECONFIG ??= "ssh-agent"
32 …ACKAGECONFIG[ssh-agent] = "--enable-ssh-agent --with-ssh-agent-path=${bindir}/ssh-agent --with-ssh
/openbmc/openbmc/meta-phosphor/classes/
H A Dphosphor-deploy-ssh-keys.bbclass5 # Add a basic class to add a privileged user from an ssh
9 # INHERIT += "phosphor-deploy-ssh-keys"
38 if [ ! -d ${IMAGE_ROOTFS}/home/${username}.ssh/ ]; then
39 install -d ${IMAGE_ROOTFS}/home/${username}/.ssh/
42 if [ ! -f ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys ]; then
43 install -m 0600 ${key_path} ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys
45 cat ${key_path} >> ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys
51 chown -R ${uid}:${guid} ${IMAGE_ROOTFS}/home/${username}/.ssh
52 chmod 600 ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys
53 chmod 700 ${IMAGE_ROOTFS}/home/${username}/.ssh
/openbmc/openbmc/meta-security/meta-hardening/recipes-connectivity/openssh/
H A Dopenssh_%.bbappend3 sed -i -e 's:#AllowTcpForwarding yes:AllowTcpForwarding no:' ${D}${sysconfdir}/ssh/sshd_config
4 sed -i -e 's:ClientAliveCountMax 4:ClientAliveCountMax 2:' ${D}${sysconfdir}/ssh/sshd_config
5 sed -i -e 's:#LogLevel INFO:LogLevel VERBOSE:' ${D}${sysconfdir}/ssh/sshd_config
6 sed -i -e 's:#MaxSessions.*:MaxSessions 2:' ${D}${sysconfdir}/ssh/sshd_config
7 sed -i -e 's:#TCPKeepAlive yes:TCPKeepAlive no:' ${D}${sysconfdir}/ssh/sshd_config
8 sed -i -e 's:#AllowAgentForwarding yes:AllowAgentForwarding no:' ${D}${sysconfdir}/ssh/sshd_config
11 …sed -i -e 's:#PermitRootLogin.*:PermitRootLogin prohibit-password:' ${D}${sysconfdir}/ssh/sshd_con…
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/
H A Dpam-ssh-agent-auth_0.10.3.bb1 SUMMARY = "pam-ssh-agent-auth"
2 DESCRIPTION = "A PAM module which permits authentication via ssh-agent."
22 # This gets us ssh-agent, which we are almost certain to want.
58 # ssh-rsa.c:59:24: error: passing argument 1 of 'EVP_DigestInit' from incompatible pointer type [-W…
59 # ssh-rsa.c:60:26: error: passing argument 1 of 'EVP_DigestUpdate' from incompatible pointer type […
60 # ssh-rsa.c:61:25: error: passing argument 1 of 'EVP_DigestFinal' from incompatible pointer type [-…
61 # ssh-ecdsa.c:76:18: error: passing argument 1 of 'DSA_SIG_get0' from incompatible pointer type [-W…
62 # ssh-ecdsa.c:76:23: error: passing argument 2 of 'DSA_SIG_get0' from incompatible pointer type [-W…
63 # ssh-ecdsa.c:76:27: error: passing argument 3 of 'DSA_SIG_get0' from incompatible pointer type [-W…
64 # ssh-ecdsa.c:148:18: error: passing argument 1 of 'DSA_SIG_get0' from incompatible pointer type [-…
[all …]
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/
H A Dssh_config3 # This is the ssh client system-wide configuration file. See
20 Include /etc/ssh/ssh_config.d/*.conf
34 # IdentityFile ~/.ssh/id_rsa
35 # IdentityFile ~/.ssh/id_dsa
36 # IdentityFile ~/.ssh/id_ecdsa
37 # IdentityFile ~/.ssh/id_ed25519
46 # ProxyCommand ssh -q -W %h:%p gateway.example.com
48 # UserKnownHostsFile ~/.ssh/known_hosts.d/%k
H A Dsshd_check_keys10 ssh-keygen -q -f "${FILE}.tmp" -N '' -t $TYPE
35 if test -f /etc/default/ssh; then
36 . /etc/default/ssh
39 [ -z "$SYSCONFDIR" ] && SYSCONFDIR=/etc/ssh
44 sshd_config=/etc/ssh/sshd_config
H A Dsshd_config13 Include /etc/ssh/sshd_config.d/*.conf
20 #HostKey /etc/ssh/ssh_host_rsa_key
21 #HostKey /etc/ssh/ssh_host_ecdsa_key
22 #HostKey /etc/ssh/ssh_host_ed25519_key
41 # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
42 # but this is overridden so installations will only check .ssh/authorized_keys
43 AuthorizedKeysFile .ssh/authorized_keys
50 # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
52 # Change to yes if you don't trust ~/.ssh/known_hosts for
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/
H A Drunqemu.py56 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
63 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
72 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
80 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
89 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
98 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
106 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
114 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
121 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
129 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu:
[all …]
H A Dglibc.py23 def run_check(self, ssh = None): argument
26 if ssh is not None:
28 features.append('TOOLCHAIN_TEST_HOST = "{0}"'.format(ssh))
43 ptestsuite = "glibc-user" if ssh is None else "glibc"
87 self.run_check(ssh = qemu.ip)
/openbmc/obmc-console/
H A Dmeson.build24 if get_option('ssh').allowed()
26 'conf/obmc-console-ssh@.service.in',
27 rename: ['obmc-console-ssh@.service'],
39 if get_option('ssh').allowed()
41 'conf/obmc-console-ssh.socket.in',
42 rename: ['obmc-console-ssh.socket'],
46 'conf/obmc-console-ssh@.service.d/use-socket.conf.in',
48 install_dir: systemdsystemunitdir / 'obmc-console-ssh@.service.d',
/openbmc/linux/tools/testing/selftests/rcutorture/bin/
H A Dkvm-remote.sh140 ssh -o BatchMode=yes $i getconf _NPROCESSORS_ONLN > $T/ssh.stdout 2> $T/ssh.stderr
146 cat $T/ssh.stdout | tee -a "$oldrun/remote-log"
149 cat $T/ssh.stderr | tee -a "$oldrun/remote-log"
153 echo $i: `cat $T/ssh.stdout` CPUs " " `date` | tee -a "$oldrun/remote-log"
161 cat $T/binres.tgz | ssh -o BatchMode=yes $i "cd /tmp; tar -xzf -"
168 cat $T/binres.tgz | ssh -o BatchMode=yes $i "cd /tmp; tar -xzf -"
193 ssh -o BatchMode=yes $1 "test -f \"$2\""
197 …echo " ---" ssh failure to $1 checking for file $2, retry after $sleeptime seconds. `date` | tee -…
240 echo ssh $i failed: exitcode $ret 1>&2
276 …( cd "$oldrun"; ssh -o BatchMode=yes $i "cd $rundir; tar -czf - kvm-remote-*.sh.out */console.log …
/openbmc/openbmc/meta-phosphor/recipes-phosphor/console/
H A Dobmc-console_git.bb12 PACKAGECONFIG ??= "udev ssh"
15 PACKAGECONFIG[ssh] = "-Dssh=enabled,-Dssh=disabled"
28 # Include ssh service if `ssh` is in PACKAGECONFIG.
29 # Only install the ssh socket if we are not enabling
31 SYSTEMD_SERVICE:${PN} += "${@bb.utils.contains('PACKAGECONFIG', 'ssh', 'obmc-console-ssh@.service',…
32 SSH_SYSTEMD_SOCKET = "${@bb.utils.contains('PACKAGECONFIG', 'ssh', 'obmc-console-ssh.socket', '', d…
43 if ${@bb.utils.contains('PACKAGECONFIG', 'ssh', 'true', 'false', d)} ; then
89 REGISTERED_SERVICES:${PN} += "${@bb.utils.contains('PACKAGECONFIG', 'ssh', 'obmc_console:tcp:2200:'…
/openbmc/qemu/tests/qemu-iotests/
H A D207.out3 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
21 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
32 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
43 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
49 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
60 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
66 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
77 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
83 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
94 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati…
[all …]
/openbmc/openbmc/meta-ibm/recipes-phosphor/console/
H A Dobmc-console_%.bbappend35 SYSTEMD_SERVICE:${PN}:append:p10bmc = " obmc-console-ssh@2200.service \
36 obmc-console-ssh@2201.service \
38 SYSTEMD_SERVICE:${PN}:remove:p10bmc = "obmc-console-ssh.socket"
40 FILES:${PN}:remove:p10bmc = "${systemd_system_unitdir}/obmc-console-ssh@.service.d/use-socket.conf"
53 SYSTEMD_SERVICE:${PN}:append:witherspoon-tacoma = " obmc-console-ssh@2200.service \
54 obmc-console-ssh@2201.service \
56 SYSTEMD_SERVICE:${PN}:remove:witherspoon-tacoma = "obmc-console-ssh.socket"
58 FILES:${PN}:remove:witherspoon-tacoma = "${systemd_system_unitdir}/obmc-console-ssh@.service.d/use-…
/openbmc/docs/
H A Dconsole.md12 To connect to an OpenBMC console session remotely, just ssh to your BMC on
13 port 2200. Use the same login credentials you would for a normal ssh session:
15 $ ssh -p 2200 [user]@[bmc-hostname]
28 Note that if you're on an ssh connection, you'll need to 'escape' the ~
33 This is because obmc-console-client is an ssh session, and a double `~` is
34 required to escape the "inner" (obmc-console-client) ssh session.
/openbmc/openbmc/poky/meta/recipes-connectivity/ssh-pregen-hostkeys/
H A Dssh-pregen-hostkeys_1.0.bb20 install -d ${D}${sysconfdir}/ssh
21 install ${UNPACKDIR}/openssh/* ${D}${sysconfdir}/ssh/
22 chmod 0600 ${D}${sysconfdir}/ssh/*
23 chmod 0644 ${D}${sysconfdir}/ssh/*.pub
/openbmc/openbmc/poky/meta/recipes-gnome/gcr/
H A Dgcr_4.3.0.bb38 ${systemd_user_unitdir}/gcr-ssh-agent.socket \
39 ${systemd_user_unitdir}/gcr-ssh-agent.service \
53 ssh-add = '${bindir}/ssh-add'
54 ssh-agent = '${bindir}/ssh-agent'
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-gnome/gcr/
H A Dgcr3_3.41.2.bb44 ${systemd_user_unitdir}/gcr-ssh-agent.socket \
45 ${systemd_user_unitdir}/gcr-ssh-agent.service \
58 ssh-add = '${bindir}/ssh-add'
59 ssh-agent = '${bindir}/ssh-agent'

12345678910>>...12