/openbmc/qemu/tests/rocker/ |
H A D | bridge-vlan-stp | 5 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 6 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 7 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 11 simp ssh tut sw1 --cmd "sudo /sbin/ip link add name br0 type bridge" 12 simp ssh tut sw1 --cmd "sudo brctl stp br0 on" 13 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p1 master br0" 14 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p2 master br0" 19 simp ssh tut sw1 --cmd "echo 0 | sudo dd of=/sys/class/net/br0/bridge/default_pvid 2> /dev/null" 20 simp ssh tut sw1 --cmd "echo 1 | sudo dd of=/sys/class/net/br0/bridge/vlan_filtering 2> /dev/null" 24 simp ssh tut sw1 --cmd "sudo /sbin/bridge vlan add vid 57 dev sw1p1" [all …]
|
H A D | bridge-stp | 5 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 6 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 7 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 11 simp ssh tut sw1 --cmd "sudo /sbin/ip link add name br0 type bridge" 12 simp ssh tut sw1 --cmd "sudo brctl stp br0 on" 13 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p1 master br0" 14 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p2 master br0" 18 simp ssh tut sw1 --cmd "echo 0 | sudo dd of=/sys/class/net/br0/bridge/default_pvid 2> /dev/null" 22 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p1 learning off" 23 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p2 learning off" [all …]
|
H A D | bridge-vlan | 5 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 6 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 7 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 11 simp ssh tut sw1 --cmd "sudo /sbin/ip link add name br0 type bridge" 12 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p1 master br0" 13 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p2 master br0" 18 simp ssh tut sw1 --cmd "echo 0 | sudo dd of=/sys/class/net/br0/bridge/default_pvid 2> /dev/null" 19 simp ssh tut sw1 --cmd "echo 1 | sudo dd of=/sys/class/net/br0/bridge/vlan_filtering 2> /dev/null" 23 simp ssh tut sw1 --cmd "sudo /sbin/bridge vlan add vid 57 dev sw1p1" 24 simp ssh tut sw1 --cmd "sudo /sbin/bridge vlan add vid 57 dev sw1p2" [all …]
|
H A D | bridge | 5 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 6 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 7 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 11 simp ssh tut sw1 --cmd "sudo /sbin/ip link add name br0 type bridge" 12 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p1 master br0" 13 simp ssh tut sw1 --cmd "sudo /sbin/ip link set dev sw1p2 master br0" 17 simp ssh tut sw1 --cmd "echo 0 | sudo dd of=/sys/class/net/br0/bridge/default_pvid 2> /dev/null" 21 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p1 learning off" 22 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p2 learning off" 24 simp ssh tut sw1 --cmd "sudo /sbin/bridge link set dev sw1p1 flood off" [all …]
|
H A D | port | 4 while ! simp ssh tut sw1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 5 while ! simp ssh tut h1 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 6 while ! simp ssh tut h2 --cmd "ping -c 1 localhost >/dev/null"; do sleep 1; done 10 simp ssh tut sw1 --cmd "sudo ifconfig sw1p1 11.0.0.1/24" 11 simp ssh tut sw1 --cmd "sudo ifconfig sw1p2 12.0.0.1/24" 15 simp ssh tut h1 --cmd "sudo ifconfig sw1p1 11.0.0.2/24" 16 simp ssh tut h2 --cmd "sudo ifconfig sw1p1 12.0.0.2/24" 20 simp ssh tut h1 --cmd "ping -c10 11.0.0.1 >/dev/null" 22 simp ssh tut h2 --cmd "ping -c10 12.0.0.1 >/dev/null"
|
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gnome-keyring/gnome-keyring/ |
H A D | 0001-Set-paths-to-ssh-agent-and-ssh-add-by-configure-opti.patch | 4 Subject: [PATCH] Set paths to ssh-agent and ssh-add by configure options 27 - AC_PATH_PROG([SSH_AGENT], [ssh-agent], [no]) 28 - AC_PATH_PROG([SSH_ADD], [ssh-add], [no]) 29 + AC_ARG_WITH([ssh-agent-path], 30 + [AC_HELP_STRING([--with-ssh-agent-path=PATH], 31 + [path to ssh-agent])], 33 + AC_ARG_WITH([ssh-add-path], 34 + [AC_HELP_STRING([--with-ssh-add-path=PATH], 35 + [path to ssh-add])], 39 AC_MSG_ERROR([the ssh-agent and ssh-add commands were not found])
|
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/ |
H A D | openssh_9.9p1.bb | 2 the SSH protocol including the ssh client and sshd server" 77 --sysconfdir=${sysconfdir}/ssh \ 114 # Enable specific ssh host keys 115 sed -i '/HostKey/d' ${D}${sysconfdir}/ssh/sshd_config 117 echo "HostKey /etc/ssh/ssh_host_rsa_key" >> ${D}${sysconfdir}/ssh/sshd_config 120 echo "HostKey /etc/ssh/ssh_host_ecdsa_key" >> ${D}${sysconfdir}/ssh/sshd_config 123 echo "HostKey /etc/ssh/ssh_host_ed25519_key" >> ${D}${sysconfdir}/ssh/sshd_confi [all...] |
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gnome-keyring/ |
H A D | gnome-keyring_46.2.bb | 27 file://0001-Set-paths-to-ssh-agent-and-ssh-add-by-configure-opti.patch \ 31 PACKAGECONFIG ??= "ssh-agent" 32 …ACKAGECONFIG[ssh-agent] = "--enable-ssh-agent --with-ssh-agent-path=${bindir}/ssh-agent --with-ssh…
|
/openbmc/openbmc/meta-phosphor/classes/ |
H A D | phosphor-deploy-ssh-keys.bbclass | 5 # Add a basic class to add a privileged user from an ssh 9 # INHERIT += "phosphor-deploy-ssh-keys" 38 if [ ! -d ${IMAGE_ROOTFS}/home/${username}.ssh/ ]; then 39 install -d ${IMAGE_ROOTFS}/home/${username}/.ssh/ 42 if [ ! -f ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys ]; then 43 install -m 0600 ${key_path} ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 45 cat ${key_path} >> ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 51 chown -R ${uid}:${guid} ${IMAGE_ROOTFS}/home/${username}/.ssh 52 chmod 600 ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 53 chmod 700 ${IMAGE_ROOTFS}/home/${username}/.ssh
|
/openbmc/openbmc/meta-security/meta-hardening/recipes-connectivity/openssh/ |
H A D | openssh_%.bbappend | 3 sed -i -e 's:#AllowTcpForwarding yes:AllowTcpForwarding no:' ${D}${sysconfdir}/ssh/sshd_config 4 sed -i -e 's:ClientAliveCountMax 4:ClientAliveCountMax 2:' ${D}${sysconfdir}/ssh/sshd_config 5 sed -i -e 's:#LogLevel INFO:LogLevel VERBOSE:' ${D}${sysconfdir}/ssh/sshd_config 6 sed -i -e 's:#MaxSessions.*:MaxSessions 2:' ${D}${sysconfdir}/ssh/sshd_config 7 sed -i -e 's:#TCPKeepAlive yes:TCPKeepAlive no:' ${D}${sysconfdir}/ssh/sshd_config 8 sed -i -e 's:#AllowAgentForwarding yes:AllowAgentForwarding no:' ${D}${sysconfdir}/ssh/sshd_config 11 …sed -i -e 's:#PermitRootLogin.*:PermitRootLogin prohibit-password:' ${D}${sysconfdir}/ssh/sshd_con…
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/ |
H A D | pam-ssh-agent-auth_0.10.3.bb | 1 SUMMARY = "pam-ssh-agent-auth" 2 DESCRIPTION = "A PAM module which permits authentication via ssh-agent." 22 # This gets us ssh-agent, which we are almost certain to want. 58 # ssh-rsa.c:59:24: error: passing argument 1 of 'EVP_DigestInit' from incompatible pointer type [-W… 59 # ssh-rsa.c:60:26: error: passing argument 1 of 'EVP_DigestUpdate' from incompatible pointer type [… 60 # ssh-rsa.c:61:25: error: passing argument 1 of 'EVP_DigestFinal' from incompatible pointer type [-… 61 # ssh-ecdsa.c:76:18: error: passing argument 1 of 'DSA_SIG_get0' from incompatible pointer type [-W… 62 # ssh-ecdsa.c:76:23: error: passing argument 2 of 'DSA_SIG_get0' from incompatible pointer type [-W… 63 # ssh-ecdsa.c:76:27: error: passing argument 3 of 'DSA_SIG_get0' from incompatible pointer type [-W… 64 # ssh-ecdsa.c:148:18: error: passing argument 1 of 'DSA_SIG_get0' from incompatible pointer type [-… [all …]
|
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/ |
H A D | ssh_config | 3 # This is the ssh client system-wide configuration file. See 20 Include /etc/ssh/ssh_config.d/*.conf 34 # IdentityFile ~/.ssh/id_rsa 35 # IdentityFile ~/.ssh/id_dsa 36 # IdentityFile ~/.ssh/id_ecdsa 37 # IdentityFile ~/.ssh/id_ed25519 46 # ProxyCommand ssh -q -W %h:%p gateway.example.com 48 # UserKnownHostsFile ~/.ssh/known_hosts.d/%k
|
H A D | sshd_check_keys | 10 ssh-keygen -q -f "${FILE}.tmp" -N '' -t $TYPE 35 if test -f /etc/default/ssh; then 36 . /etc/default/ssh 39 [ -z "$SYSCONFDIR" ] && SYSCONFDIR=/etc/ssh 44 sshd_config=/etc/ssh/sshd_config
|
H A D | sshd_config | 13 Include /etc/ssh/sshd_config.d/*.conf 20 #HostKey /etc/ssh/ssh_host_rsa_key 21 #HostKey /etc/ssh/ssh_host_ecdsa_key 22 #HostKey /etc/ssh/ssh_host_ed25519_key 41 # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 42 # but this is overridden so installations will only check .ssh/authorized_keys 43 AuthorizedKeysFile .ssh/authorized_keys 50 # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts 52 # Change to yes if you don't trust ~/.ssh/known_hosts for
|
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/ |
H A D | runqemu.py | 56 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: 63 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: 72 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: 80 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: 89 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: 98 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: 106 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: 114 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: 121 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: 129 with runqemu(self.recipe, ssh=False, launch_cmd=cmd) as qemu: [all …]
|
H A D | glibc.py | 23 def run_check(self, ssh = None): argument 26 if ssh is not None: 28 features.append('TOOLCHAIN_TEST_HOST = "{0}"'.format(ssh)) 43 ptestsuite = "glibc-user" if ssh is None else "glibc" 87 self.run_check(ssh = qemu.ip)
|
/openbmc/obmc-console/ |
H A D | meson.build | 24 if get_option('ssh').allowed() 26 'conf/obmc-console-ssh@.service.in', 27 rename: ['obmc-console-ssh@.service'], 39 if get_option('ssh').allowed() 41 'conf/obmc-console-ssh.socket.in', 42 rename: ['obmc-console-ssh.socket'], 46 'conf/obmc-console-ssh@.service.d/use-socket.conf.in', 48 install_dir: systemdsystemunitdir / 'obmc-console-ssh@.service.d',
|
/openbmc/linux/tools/testing/selftests/rcutorture/bin/ |
H A D | kvm-remote.sh | 140 ssh -o BatchMode=yes $i getconf _NPROCESSORS_ONLN > $T/ssh.stdout 2> $T/ssh.stderr 146 cat $T/ssh.stdout | tee -a "$oldrun/remote-log" 149 cat $T/ssh.stderr | tee -a "$oldrun/remote-log" 153 echo $i: `cat $T/ssh.stdout` CPUs " " `date` | tee -a "$oldrun/remote-log" 161 cat $T/binres.tgz | ssh -o BatchMode=yes $i "cd /tmp; tar -xzf -" 168 cat $T/binres.tgz | ssh -o BatchMode=yes $i "cd /tmp; tar -xzf -" 193 ssh -o BatchMode=yes $1 "test -f \"$2\"" 197 …echo " ---" ssh failure to $1 checking for file $2, retry after $sleeptime seconds. `date` | tee -… 240 echo ssh $i failed: exitcode $ret 1>&2 276 …( cd "$oldrun"; ssh -o BatchMode=yes $i "cd $rundir; tar -czf - kvm-remote-*.sh.out */console.log …
|
/openbmc/openbmc/meta-phosphor/recipes-phosphor/console/ |
H A D | obmc-console_git.bb | 12 PACKAGECONFIG ??= "udev ssh" 15 PACKAGECONFIG[ssh] = "-Dssh=enabled,-Dssh=disabled" 28 # Include ssh service if `ssh` is in PACKAGECONFIG. 29 # Only install the ssh socket if we are not enabling 31 SYSTEMD_SERVICE:${PN} += "${@bb.utils.contains('PACKAGECONFIG', 'ssh', 'obmc-console-ssh@.service',… 32 SSH_SYSTEMD_SOCKET = "${@bb.utils.contains('PACKAGECONFIG', 'ssh', 'obmc-console-ssh.socket', '', d… 43 if ${@bb.utils.contains('PACKAGECONFIG', 'ssh', 'true', 'false', d)} ; then 89 REGISTERED_SERVICES:${PN} += "${@bb.utils.contains('PACKAGECONFIG', 'ssh', 'obmc_console:tcp:2200:'…
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 207.out | 3 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… 21 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… 32 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… 43 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… 49 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… 60 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… 66 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… 77 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… 83 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… 94 {"execute": "blockdev-create", "arguments": {"job-id": "job0", "options": {"driver": "ssh", "locati… [all …]
|
/openbmc/openbmc/meta-ibm/recipes-phosphor/console/ |
H A D | obmc-console_%.bbappend | 35 SYSTEMD_SERVICE:${PN}:append:p10bmc = " obmc-console-ssh@2200.service \ 36 obmc-console-ssh@2201.service \ 38 SYSTEMD_SERVICE:${PN}:remove:p10bmc = "obmc-console-ssh.socket" 40 FILES:${PN}:remove:p10bmc = "${systemd_system_unitdir}/obmc-console-ssh@.service.d/use-socket.conf" 53 SYSTEMD_SERVICE:${PN}:append:witherspoon-tacoma = " obmc-console-ssh@2200.service \ 54 obmc-console-ssh@2201.service \ 56 SYSTEMD_SERVICE:${PN}:remove:witherspoon-tacoma = "obmc-console-ssh.socket" 58 FILES:${PN}:remove:witherspoon-tacoma = "${systemd_system_unitdir}/obmc-console-ssh@.service.d/use-…
|
/openbmc/docs/ |
H A D | console.md | 12 To connect to an OpenBMC console session remotely, just ssh to your BMC on 13 port 2200. Use the same login credentials you would for a normal ssh session: 15 $ ssh -p 2200 [user]@[bmc-hostname] 28 Note that if you're on an ssh connection, you'll need to 'escape' the ~ 33 This is because obmc-console-client is an ssh session, and a double `~` is 34 required to escape the "inner" (obmc-console-client) ssh session.
|
/openbmc/openbmc/poky/meta/recipes-connectivity/ssh-pregen-hostkeys/ |
H A D | ssh-pregen-hostkeys_1.0.bb | 20 install -d ${D}${sysconfdir}/ssh 21 install ${UNPACKDIR}/openssh/* ${D}${sysconfdir}/ssh/ 22 chmod 0600 ${D}${sysconfdir}/ssh/* 23 chmod 0644 ${D}${sysconfdir}/ssh/*.pub
|
/openbmc/openbmc/poky/meta/recipes-gnome/gcr/ |
H A D | gcr_4.3.0.bb | 38 ${systemd_user_unitdir}/gcr-ssh-agent.socket \ 39 ${systemd_user_unitdir}/gcr-ssh-agent.service \ 53 ssh-add = '${bindir}/ssh-add' 54 ssh-agent = '${bindir}/ssh-agent'
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-gnome/gcr/ |
H A D | gcr3_3.41.2.bb | 44 ${systemd_user_unitdir}/gcr-ssh-agent.socket \ 45 ${systemd_user_unitdir}/gcr-ssh-agent.service \ 58 ssh-add = '${bindir}/ssh-add' 59 ssh-agent = '${bindir}/ssh-agent'
|