Update SSH command to bypass prompt

Changes:
   - Move security directory.
   - Add paramter to bypass key checking

Change-Id: I9b80ff242f53c1096d831ab144f5b14f556917e0
Signed-off-by: George Keishing <gkeishin@in.ibm.com>
diff --git a/redfish/security/test_bmc_ssh_security.robot b/security/test_bmc_ssh_security.robot
similarity index 93%
rename from redfish/security/test_bmc_ssh_security.robot
rename to security/test_bmc_ssh_security.robot
index a88fb70..6c01096 100644
--- a/redfish/security/test_bmc_ssh_security.robot
+++ b/security/test_bmc_ssh_security.robot
@@ -1,8 +1,8 @@
 *** Settings ***
 Documentation    Test BMC SSH security.
 
-Resource         ../../lib/resource.robot
-Resource         ../../lib/openbmc_ffdc_methods.robot
+Resource         ../lib/resource.robot
+Resource         ../lib/openbmc_ffdc_methods.robot
 
 *** Variables ***
 
@@ -49,6 +49,7 @@
     # - KEX: diffie-hellman-group1(any) , (any) SHA1
 
     Printn
-    ${ssh_cmd_buf}=  Catenate  ssh -o NumberOfPasswordPrompts=0 -vv ${OPENBMC_HOST} 2>&1
+    ${ssh_cmd_buf}=  Catenate  ssh -o NumberOfPasswordPrompts=0 UserKnownHostsFile=/dev/null
+    ...  StrictHostKeyChecking=no -vv ${OPENBMC_HOST} 2>&1
     Shell Cmd  ! ${ssh_cmd_buf} | egrep -- "${weak_key_regex}"
     Shell Cmd  ! ${ssh_cmd_buf} | egrep -- "${mac_key_regex}"