Displaying 20 results from an estimated 23 matches for "number_of_password_prompt".
Did you mean:
number_of_password_prompts
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
...&options->retry_delay;
+ goto parse_int;
+
case oCipher:
intptr = &options->cipher;
arg = strdelim(&s);
@@ -687,6 +692,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->retry_delay = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
@@ -770,6 +776,8 @@
options->port = 0; /* Filled in ssh_connect. */
if (options->connection_attempts == -1)
options->connection_attempts = 4;
+ if (options->retry_delay == -1)
+ options->retry_delay = 1;
if (o...
2000 Jun 06
0
connection timeout
...intptr = &options->connection_timeout;
+ goto parse_int;
case oCipher:
intptr = &options->cipher;
@@ -669,6 +675,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
@@ -746,6 +753,8 @@
options->port = 0; /* Filled in ssh_connect. */
if (options->connection_attempts == -1)
options->connection_attempts = 4;
+ if (options->connection_timeout == -1)
+ options->connection...
2002 May 22
0
[PATCH] connect() timeout
...ntptr == -1)
+ *intptr = value;
+ break;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -775,6 +790,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.2.2p1/readconf.h.ORIG Tue Mar 5 02:53:05 2002
+++ openssh-3.2.2p1/readconf.h Tue May 21 15:40:06 2002
@@ -68,6 +68,8 @@
int port; /* Port to connect. */
int connection_attempts; /* Max attempts (seconds) bef...
2002 Jan 26
5
[PATCH] Connect timeout
...>connection_timeout;
+ goto parse_int;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -775,6 +782,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- readconf.h.OK Wed Oct 3 19:39:39 2001
+++ readconf.h Sat Jan 26 21:44:35 2002
@@ -68,6 +68,8 @@
int port; /* Port to connect. */
int connection_attempts; /* Max attempts (seconds) before
* giving up */
+ int...
2000 Sep 09
0
2.2.0p1 PATCH: ssh/scp/slogin will invoke ssh-askpass
...(SSH_ASKPASS_ENV);
+ else
+ askpass = SSH_ASKPASS_DEFAULT;
+ snprintf(buf, sizeof buf,
+ "Challenge: \"%s\"; enter response:", challenge);
+ } else {
+ fprintf(stderr, "%s\n", challenge);
+ }
xfree(challenge);
fflush(stderr);
for (i = 0; i < options.number_of_password_prompts; i++) {
- if (i != 0)
- error("Permission denied, please try again.");
- response = read_passphrase("Response: ", 0);
+ if (!interactive && getenv("DISPLAY")) {
+ if (i != 0)
+ response = ssh_askpass(askpass,
+ "Permission denied, please...
2002 Apr 22
9
Password from open filedescriptor
...more
clean solution.
diff -bur openssh-3.1p1.org/readconf.c openssh-3.1p1/readconf.c
--- openssh-3.1p1.org/readconf.c Tue Feb 5 02:26:35 2002
+++ openssh-3.1p1/readconf.c Mon Apr 22 09:56:31 2002
@@ -776,6 +776,7 @@
options->port = -1;
options->connection_attempts = -1;
options->number_of_password_prompts = -1;
+ options->password_from_fd = -1;
options->cipher = -1;
options->ciphers = NULL;
options->macs = NULL;
diff -bur openssh-3.1p1.org/readconf.h openssh-3.1p1/readconf.h
--- openssh-3.1p1.org/readconf.h Tue Mar 5 02:53:05 2002
+++ openssh-3.1p1/readconf.h Mon Apr 22 10:24:06...
2001 Nov 17
0
[PATCH] Connect timeout
...>connection_timeout;
+ goto parse_int;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -775,6 +782,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.0.1p1/readconf.h.ORIG Sat Nov 17 22:49:09 2001
+++ openssh-3.0.1p1/readconf.h Sat Nov 17 22:49:47 2001
@@ -68,6 +68,8 @@
int port; /* Port to connect. */
int connection_attempts; /* Max attempts (seconds) bef...
2003 Apr 15
0
Connect timeout patch
...tptr == -1)
+ *intptr = value;
+ break;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -770,6 +783,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.6.1p1/readconf.h.ORIG Tue Apr 15 23:06:30 2003
+++ openssh-3.6.1p1/readconf.h Tue Apr 15 23:08:28 2003
@@ -66,6 +66,8 @@
int port; /* Port to connect. */
int connection_attempts; /* Max attempts (seconds) bef...
2002 Apr 03
1
[PATCH] connect() timeout
...ntptr == -1)
+ *intptr = value;
+ break;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -775,6 +790,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.1p1/readconf.h.ORIG Tue Mar 5 02:53:05 2002
+++ openssh-3.1p1/readconf.h Wed Apr 3 23:33:48 2002
@@ -68,6 +68,8 @@
int port; /* Port to connect. */
int connection_attempts; /* Max attempts (seconds) before...
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
...tptr == -1)
+ *intptr = value;
+ break;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -769,6 +782,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.5p1/readconf.h.ORIG Sun Jun 9 22:04:03 2002
+++ openssh-3.5p1/readconf.h Wed Oct 16 14:59:12 2002
@@ -66,6 +66,8 @@
int port; /* Port to connect. */
int connection_attempts; /* Max attempts (seconds) before...
1999 Dec 10
2
[David Huggins-Daines <dhd@plcom.on.ca>] Bug#52414: ssh-add uses ssh-askpass, but ssh doesn't
...sphrase = ssh_askpass(SSH_ASKPASS_DEFAULT, buf);
+ } else
+ passphrase = read_passphrase(buf, 0);
+ } else {
debug("Will not query passphrase for %.100s in batch mode.",
comment);
passphrase = xstrdup("");
@@ -921,7 +931,14 @@
for (i = 0; i < options.number_of_password_prompts; i++) {
if (i != 0)
error("Permission denied, please try again.");
- response = read_passphrase("Response: ", 0);
+ if (use_askpass) {
+ const char * askpass;
+ if ((askpass = getenv(SSH_ASKPASS_ENV)))
+ response = ssh_askpass(askpass, "Response: ");
+...
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
...packet_disconnect("%s",buf);
+ }
+
+ if (private == NULL && !options.batch_mode && perm_ok && !options.checkey) {
snprintf(buf, sizeof(buf),
"Enter passphrase for RSA key '%.100s': ", comment);
for (i = 0; i < options.number_of_password_prompts; i++) {
--- orig/openssh-4.6p1/ssh.c 2007-01-05 00:30:17.000000000 -0500
+++ openssh-4.6p1/ssh.c 2007-05-10 11:40:06.279706888 -0400
@@ -185,7 +185,7 @@
usage(void)
{
fprintf(stderr,
-"usage: ssh [-1246AaCfgkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]\n"
+"usage: ssh [-1246...
2001 Oct 11
0
[patch] option to prevent connection timeout
...uot;loglevel", oLogLevel },
{ "dynamicforward", oDynamicForward },
@@ -415,6 +416,10 @@
intptr = &options->keepalives;
goto parse_flag;
+ case oIdle:
+ intptr = &options->idle;
+ goto parse_int;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -767,6 +772,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->idle = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -859,6 +865,8 @@...
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
...frequency", oNoopMsgFrequency },
{ NULL, 0 }
};
@@ -387,6 +388,10 @@
intptr = &options->keepalives;
goto parse_flag;
+ case oNoopMsgFrequency:
+ intptr = &options->noop_msg_frequency;
+ goto parse_int;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -707,6 +712,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->noop_msg_frequency = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -791,...
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
...l },
{ "dynamicforward", oDynamicForward },
@@ -394,6 +395,10 @@
intptr = &options->keepalives;
goto parse_flag;
+ case oKeepAlivesForward:
+ intptr = &options->keepalives_forward;
+ goto parse_flag;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -738,6 +743,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->keepalives_forward = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -825,...
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
...ber.", filename, linenum);
+ if (*activep && *intptr == -1)
+ *intptr = value;
+ if (options->bogus_traffic_interval_max <= value)
+ fatal("%.200s line %d: Bad value.", filename, linenum);
+ break;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -738,6 +776,8 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->bogus_traffic_interval_max = -1;
+ options->bogus_traffic_interval_min = -1;
options->compression_level = -1;
options->port...
2001 Oct 09
1
TISviaPAM patch
Here is a patch that does TIS auth via PAM. It's controlled by a switch
in the sshd_config. You'd use it by having a PAM module that sets
PAM_PROMPT_ECHO_ON. eg, you could use it with pam_skey or pam_smxs.
The patch is against the 2.9.9p2 distribution.
I'm not on the list, a reply if this patch is accepted would be great.
(But not required, I know some folks have a distaste for
2000 Mar 03
7
[PATCH] Add a Maximum Idle Time (1.2.2)
...;, oTISAuthentication },
{ "loglevel", oLogLevel },
@@ -355,6 +357,10 @@
intptr = &options->keepalives;
goto parse_flag;
+ case oTransmitInterlude:
+ intptr = &options->trans_inter;
+ goto parse_int;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -610,6 +616,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->trans_inter = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -677,6 +684,...
2003 Apr 04
5
Anti-idle in OpenSSH client?
Heya,
Most of the windows ssh clients (putty, securecrt) have anti-idle
features. They offer either a null packet or protocol no-op or user
defined string to be sent over every x seconds.
Is this possible or planned with the OpenSSH client? Our draconian
firewall admins have started timing out ssh sessions. Yes I'm aware I
could hack up a port forwarding dumb traffic process, but was
2020 Oct 06
2
Accessing SSH key path using SSH_ASKPASS and passwordstore
Hello,
With the introduction of SSH_ASKPASS_REQUIRE in version 8.4, I've set
up a script for SSH_ASKPASS to query my local passwordstore
(https://www.passwordstore.org/) vault to retrieve the password for a
given key. This works for ssh-add as well as ssh (configured with
AddKeysToAgent set to 'yes'). My workflow effectively transforms into
entering the password for the GPG key used