Displaying 6 results from an estimated 6 matches for "ssh2_msg_userauth_info_request".
2002 Jun 27
1
[PATCH] kbdintctxt->nreq test
...02
@@ -217,6 +217,8 @@
if (kbdintctxt->device->query(kbdintctxt->ctxt,
&name, &instr, &kbdintctxt->nreq, &prompts, &echo_on))
return 0;
+ if (kbdintctxt->nreq > 100)
+ fatal("send_userauth_info_request: too many prompts");
packet_start(SSH2_MSG_USERAUTH_INFO_REQUEST);
packet_put_cstring(name);
/fc
2003 Mar 27
0
[Bug 524] Keyboard-interactive PAM back end hides information
...n the first prompt).
I did the patch for someone else and now there seems to be some other problem
with using PAM from sshd on my system, so consider it untested.
--CUT--
--- auth2-pam.c.old Fri Mar 21 11:10:57 2003
+++ auth2-pam.c Thu Mar 27 10:52:08 2003
@@ -84,7 +84,14 @@
packet_start(SSH2_MSG_USERAUTH_INFO_REQUEST);
packet_put_cstring(""); /* Name */
- packet_put_cstring(""); /* Instructions */
+
+ if (text) {
+ packet_put_cstring(text);
+ xfree(text);
+ text = NULL;
+ } else
+ packet_put_cstring(""); /* Instructions */
+
packet_put_cst...
2014 Nov 18
55
[Bug 2319] New: [PATCH REVIEW] U2F authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=2319
Bug ID: 2319
Summary: [PATCH REVIEW] U2F authentication
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at
2002 Apr 26
0
PAM keyboard-interactive
..._fail;
+ pam_err = pam_authenticate(pamh, 0);
+ if (pam_err != PAM_SUCCESS)
+ goto auth_fail;
+ pam_send(ctxt, "=OK");
+ pam_end(pamh, pam_err);
+ exit(0);
+ auth_fail:
+ pam_send(ctxt, "!%s", pam_strerror(pamh, pam_err));
+ pam_end(pamh, pam_err);
+ exit(0);
+}
- packet_start(SSH2_MSG_USERAUTH_INFO_REQUEST);
- packet_put_cstring(""); /* Name */
- packet_put_cstring(""); /* Instructions */
- packet_put_cstring(""); /* Language */
- packet_put_int(context_pam2.num_expected);
-
- for (i = 0, j = 0; i < num_msg; i++) {
- int style = PAM_MSG_MEMBER(msg, i, msg_style);
-
-...
2002 Jul 02
3
New PAM kbd-int diff
...BER(msg, i, msg));
+ /*sshpam_send(ctxt, "e%s", msg[i]->msg);*/
break;
+ case PAM_TEXT_INFO:
+ /*sshpam_send(ctxt, "i%s", msg[i]->msg);*/
+ break;
+ default:
+ goto fail;
}
}
-
- if (context_pam2.num_expected == 0)
- return PAM_SUCCESS;
-
- packet_start(SSH2_MSG_USERAUTH_INFO_REQUEST);
- packet_put_cstring(""); /* Name */
- packet_put_cstring(""); /* Instructions */
- packet_put_cstring(""); /* Language */
- packet_put_int(context_pam2.num_expected);
-
- for (i = 0, j = 0; i < num_msg; i++) {
- int style = PAM_MSG_MEMBER(msg, i, msg_style);
-...
2002 Jun 25
4
PAM kbd-int with privsep
...BER(msg, i, msg));
+ /*sshpam_send(ctxt, "e%s", msg[i]->msg);*/
+ break;
+ case PAM_TEXT_INFO:
+ /*sshpam_send(ctxt, "i%s", msg[i]->msg);*/
break;
+ default:
+ goto fail;
}
}
-
- if (context_pam2.num_expected == 0)
- return PAM_SUCCESS;
-
- packet_start(SSH2_MSG_USERAUTH_INFO_REQUEST);
- packet_put_cstring(""); /* Name */
- packet_put_cstring(""); /* Instructions */
- packet_put_cstring(""); /* Language */
- packet_put_int(context_pam2.num_expected);
-
- for (i = 0, j = 0; i < num_msg; i++) {
- int style = PAM_MSG_MEMBER(msg, i, msg_style);
-...