Displaying 13 results from an estimated 13 matches for "rp_echo".
2002 Jan 25
0
[Bug 81] New: ssh cannot use ssh-askspass & passphrases as documented
...l: response = read_passphrase(prompt, 0);
sshconnect1.c-original: password = read_passphrase(prompt, 0);
sshconnect2.c-original: password = read_passphrase(prompt, 0);
sshconnect2.c-original: passphrase = read_passphrase(prompt, 0);
sshconnect2.c-original: response = read_passphrase(prompt, echo ? RP_ECHO : 0);
(white space adjusted above)
Note that the second arguments are all set to zero. To make ssh work as
documented one call in each of the two sshconnect[12].c source files must be
altered to have the enabling second argument as below:
# grep 'read_passphrase(' sshconnect[12].c
ssh...
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
...#include "pathnames.h"
#include "log.h"
#include "ssh.h"
+#include "readconf.h"
+
+extern Options options;
static char *
ssh_askpass(char *askpass, const char *msg)
@@ -103,7 +106,9 @@
int rppflags, use_askpass = 0, ttyfd;
rppflags = (flags & RP_ECHO) ? RPP_ECHO_ON : RPP_ECHO_OFF;
- if (flags & RP_USE_ASKPASS)
+ if (flags & RP_USE_ASKPASS ||
+ (options.prefer_askpass && getenv(SSH_ASKPASS_ENV) &&
+ !(flags & RP_ECHO)))
use_askpass = 1;
else if (flags & RP_ALLOW_STDIN) {
if (!isatty(STDIN_FILENO))
Ind...
2004 Jan 06
1
Keychain Patch Try II
...2003
+++ openssh-3.7p1/readpass.c Thu Jan 23 16:36:23 2003
@@ -99,7 +99,7 @@
char *
read_passphrase(const char *prompt, int flags)
{
- char *askpass = NULL, *ret, buf[1024], response;
+ char *askpass = NULL, *ret, buf[1024];
int rppflags, use_askpass = 0, ttyfd;
rppflags = (flags & RP_ECHO) ? RPP_ECHO_ON : RPP_ECHO_OFF;
@@ -126,60 +126,13 @@
return ret;
}
- /* Before reading the passphrase from the user, find it in the
- keychain. */
-#ifdef USE_KEYCHAIN
- if (get_passphrase_from_keychain(prompt, buf, sizeof buf) ==
0) {
- /* We got the password; do nothing now t...
2005 Feb 17
1
SFTP batch mode patch
...enssh-3.9p1\sshconnect.c Thu Oct 14 09:02:32 2004
@@ -537,8 +537,11 @@
char *p;
int ret = -1;
- if (options.batch_mode)
+ if (options.batch_mode) {
+ logit(prompt);
+ logit("Replied NO (batch mode)");
return 0;
+ }
for (msg = prompt;;msg = again) {
p = read_passphrase(msg, RP_ECHO);
if (p == NULL ||
2004 Apr 12
1
Regarding SSH_ASKPASS
...get called is for
open(_PATH_TTY, O_RDWR) to fail. But /dev/tty is a+rw in the
normal case.
>From readpass.c:
char *
read_passphrase(const char *prompt, int flags)
{
char *askpass = NULL, *ret, buf[1024];
int rppflags, use_askpass = 0, ttyfd;
rppflags = (flags & RP_ECHO) ? RPP_ECHO_ON : RPP_ECHO_OFF;
if (flags & RP_ALLOW_STDIN) {
if (!isatty(STDIN_FILENO))
use_askpass = 1;
} else {
rppflags |= RPP_REQUIRE_TTY;
ttyfd = open(_PATH_TTY, O_RDWR);
if (ttyfd >=...
2002 Aug 02
3
[Bug 377] New: Reduce compiler warnings. Use unsigned args to the ctype.h is*() macros.
...==================
RCS file: /cvs/openssh/clientloop.c,v
retrieving revision 1.87
diff -u -p -r1.87 clientloop.c
--- clientloop.c 4 Jul 2002 00:14:18 -0000 1.87
+++ clientloop.c 2 Aug 2002 12:13:38 -0000
@@ -485,7 +485,7 @@ process_cmdline(void)
cmd = s = read_passphrase("\r\nssh> ", RP_ECHO);
if (s == NULL)
goto out;
-
while (*s && isspace(*s))
+
while (*s && isspace((unsigned)*s))
s++;
if (*s == 0)
goto out;
@@ -500,7 +500,7 @@ process_cmdline(void)
goto out;
}
s += 2;
-
while (*s && isspace(*s))
+
while (*s && isspace((unsigned)*s)...
2003 Mar 26
4
[Bug 69] Generalize SSH_ASKPASS
http://bugzilla.mindrot.org/show_bug.cgi?id=69
astrand at lysator.liu.se changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |astrand at lysator.liu.se
------- Additional Comments From astrand at lysator.liu.se 2003-03-26 21:10 -------
>hmmm, alternately
2001 Oct 26
5
New password echoes on Sol8
I tried replacing readpassphrase() for v2.9.9p2 on Sol8 with a different
version that just calls getpassphrase(). It appears to solve the echo
problem when the user tries to login in interactive mode and needs to
change their password.
Can anyone else try this with v2.9.9p2 on Solaris? Be sure to add:
#define HAVE_GETPASSPHRASE
... to config.h when compiling (since it's not a configurable
2001 Oct 09
1
TISviaPAM patch
Here is a patch that does TIS auth via PAM. It's controlled by a switch
in the sshd_config. You'd use it by having a PAM module that sets
PAM_PROMPT_ECHO_ON. eg, you could use it with pam_skey or pam_smxs.
The patch is against the 2.9.9p2 distribution.
I'm not on the list, a reply if this patch is accepted would be great.
(But not required, I know some folks have a distaste for
2002 Feb 15
0
[Bug 118] New: Implement TIS (protocol 1) via PAM
...sshconnect1.c Fri Feb 15 02:15:05 2002
@@ -849,7 +849,7 @@
if (options.cipher == SSH_CIPHER_NONE)
log("WARNING: Encryption is disabled! "
"Reponse will be transmitted in clear text.");
- response = read_passphrase(prompt, 0);
+ response = read_passphrase(prompt, RP_ECHO);
if (strcmp(response, "") == 0) {
xfree(response);
break;
diff -uNr openssh-3.0.2p1.orig/sshd.8 openssh-3.0.2p1/sshd.8
--- openssh-3.0.2p1.orig/sshd.8 Sat Dec 1 15:37:08 2001
+++ openssh-3.0.2p1/sshd.8 Fri Feb 15 02:15:05 2002
@@ -379,6 +379,12 @@
are supported.
The default...
2017 Mar 02
64
[Bug 2687] New: Coverity scan fixes
https://bugzilla.mindrot.org/show_bug.cgi?id=2687
Bug ID: 2687
Summary: Coverity scan fixes
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at mindrot.org
2008 Aug 29
7
[Bug 69] Generalize SSH_ASKPASS
https://bugzilla.mindrot.org/show_bug.cgi?id=69
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Alias| |generalised-askpass
--
Configure bugmail:
2010 Aug 09
8
Call for testing: OpenSSH-5.6
Hi,
OpenSSH 5.6 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a moderately large
release, with a number of new features and bug fixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH