Displaying 20 results from an estimated 2000 matches similar to: "[patch] one warning, one omission, and two requests; portable CVS"
2001 Aug 28
1
Compile-time warning in readpass.c
The patch below fixes a compile-time warning in readpass.c.
MIME-Version: 1.0
Content-Type: application/aegis-patch
Subject: openssh.2 - Fix warning in readpass.c
Content-Name: openssh.2.C010.patch
Content-Disposition: attachment; filename=openssh.2.C010.patch
X-Aegis-Project-Name: openssh.2
X-Aegis-Change-Number: 10
#
# Fix the following warning in readpass.c:
#
# readpass.c: In function
2023 May 12
0
[Bug 3571] New: Canceling SSH_ASKPASS actually sends an empty string
https://bugzilla.mindrot.org/show_bug.cgi?id=3571
Bug ID: 3571
Summary: Canceling SSH_ASKPASS actually sends an empty string
Product: Portable OpenSSH
Version: 8.8p1
Hardware: Other
OS: Linux
Status: NEW
Severity: major
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2000 Sep 09
0
2.2.0p1 PATCH: ssh/scp/slogin will invoke ssh-askpass
Enclosed is a patch against 2.2.0p1 that teaches ssh (and therefore
slogin and scp) how to invoke ssh-askpass to request a password,
RSA/DSA key passphrase, or an skey challenge response.
I've tested this on Linux (i386), for passwords and RSA/DSA key
passphrases. I cannot easily test whether the Right Thing will happen
for skey challenge responses; I would appreciate it if someone who
uses
1999 Dec 10
2
[David Huggins-Daines <dhd@plcom.on.ca>] Bug#52414: ssh-add uses ssh-askpass, but ssh doesn't
Damien,
Here's a forwarded bug for you.
Cheers, Phil.
--[[message/rfc822]]
Subject: Bug#52414: ssh-add uses ssh-askpass, but ssh doesn't
Reply-To: David Huggins-Daines <dhd at plcom.on.ca>, 52414 at bugs.debian.org
Resent-From: David Huggins-Daines <dhd at plcom.on.ca>
Resent-To: debian-bugs-dist at lists.debian.org
Resent-CC: Philip Hands <phil at hands.com>
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
Moin,
attached is a patch, which adds a new configuration option
"PreferAskpass" to the ssh config.
ssh{,-add,-keygen,-agent} will use ssh-askpass to prompt for passwords, if
this option is set to "yes", and if ssh-askpass is available.
Default for "PreferAskpass" is "no".
Pacth is against current CVS.
Sebastian
--
signature intentionally left blank.
2001 Oct 09
0
Small patch for ssh_askpass()
Hi,
There is small bug in ssh_askpass().
Fix like this.
Additionally removing '\r' is for Win32 environment.
--- readpass.c 2001/10/09 05:42:49 1.1.1.1
+++ readpass.c 2001/10/09 08:06:38
@@ -45,7 +45,7 @@
{
pid_t pid;
size_t len;
- char *nl, *pass;
+ char *pass;
int p[2], status;
char buf[1024];
@@ -71,16 +71,15 @@
fatal("ssh_askpass: exec(%s): %s", askpass,
2001 Oct 24
0
readpass.c patch
To make readpass.c work on first try with gnome-askpass on RHL 7.1:
wget http://bass.directhit.com/openssh_snap/openssh-SNAP-20011023.tar.gz
tar xfz openssh-SNAP-20011023.tar.gz
cd openssh
./configure --with-pam --enable-gnome-askpass --with-tcp-wrappers
mv readpass.c readpass.c1
new readpass.c according to patch I received from djm 5-13-01:
--------------------- cut here
2004 Apr 12
1
Regarding SSH_ASKPASS
I've been giving SSH_ASKPASS a hard look, and it's not clear to
me how it's supposed to work. The documentation (ssh.1) seems
explicit enough:
SSH_ASKPASS
If ssh needs a passphrase, it will read the passphrase from the
current terminal if it was run from a terminal. If ssh does not
have a terminal associated with it but DISPLAY and SSH_ASKPASS
are set, it will execute
2000 Nov 05
1
suggested bsd-setproctitle.c
Keven Steves,
Can I suggest this minor change. To halt a bit of compiler grumble on
BSD4.3 platforms.
It's complaining about unsued variable "__progname".
I wanted to check with you before committing it incase you had some
other plans in mind (and I know how I hate when others break my code =).
Thanks,
- Ben
--- ../openssh/bsd-setproctitle.c Wed Oct 18 08:11:44 2000
+++
2003 Mar 15
1
Force reading with SSH_ASKPASS?
Hi,
I'm looking at integrating sftp into a larger project. It would be nice if
there was a way to force read_passphrase() (in readpass.c) to use SSH_ASKPASS
regardless of the properties of the terminal.
This would be easy enough to do, an environment variable or a new flag
definition would achieve this (I'm using an environment variable for
convenience at the moment). Would anyone
2007 Jan 18
2
SSH_ASKPASS behavior change proposal
Hello, OpenSSH Developers!
I'm not a member of the OpenSSH development team or a member of this
mailing list. I have a small change to propose for OpenSSH and since
the mailing list page at openssh.com indicated the general discussion
list is for support, I thought this list would be a better place to
discuss this. Please forgive me if I've committed a faux pas.
I propose that the
2001 Jun 27
0
two GCC-3.0 warnings
In openssh_cvs/openbsd-compat:
readpassphrase.c: In function `readpassphrase':
readpassphrase.c:116: warning: operation on `ch' may be undefined
The offending line is:
ch = ch &= 0x7f;
probably should be:
ch &= 0x7f;
In openssh-2.9p2:
readpass.c: In function `read_passphrase':
readpass.c:120: warning: passing
2000 Oct 30
2
Minor fixes for openssh-SNAP-20001028
I've attached a patch for openssh-SNAP-20001028 which fixes the
following two problems:
1) I fixed fixpaths to complain instead of failing silently if it
can't write the output file.
2) I changed log-server.c to use av0 as the first argument to
openlog(). I also made sure it called openlog() before the TCP
wrapper stuff, because libwrap calls syslog() and winds up using
the
2015 Feb 24
4
Current 6.8 git build issues on HP-UX
On Wed, Feb 25, 2015 at 09:04:57AM +1100, Darren Tucker wrote:
> On Tue, Feb 24, 2015 at 12:11:16PM -0800, Kevin Brott wrote:
> > ld: Unsatisfied symbol "xstrdup" in file
> > openbsd-compat//libopenbsd-compat.a[bsd-misc.o]
>
> How about removing the dependency on xmalloc? eg (untested):
Shoulda tested it. Now one that will compile:
diff --git
2002 Apr 22
9
Password from open filedescriptor
The included patch adds a new option to the ssh client:
-d fd Read the password from file descriptor fd. If you use 0 for fd,
the passphrase will be read from stdin.
This is basically the same as GPG:s parameter --passphrase-fd.
Flames about why this is a bad idea goes into /dev/null. I really need to
do this. There are lots of ugly Expect-hacks out there, but I want a more
clean
2015 Feb 24
2
Current 6.8 git build issues on HP-UX
On Wed, Feb 25, 2015 at 09:20:01AM +1100, Darren Tucker wrote:
[...]
> Sigh. And now the right patch from the tree that compiled.
> (djm: I get the idea :-)
Tim: is this sufficient to back out the "Work around finicky USL linker"
change?
https://anongit.mindrot.org/openssh.git/commit/?id=d1db656021d0cd8c001a6692f772f1de29b67c8b
> diff --git a/openbsd-compat/bsd-misc.c
2008 Aug 20
1
using ssh-add unattended on dubious files -- how can i avoid a hang?
I need ssh-add to fail cleanly if it tries and fails to read a key,
rather than prompting the user. I can't seem to figure out how to do
that.
This is on a Linux 2.6.26 system, running OpenSSH 5.1p1 (as built on
debian lenny/sid)
First, the things i've tried:
* i've unset the DISPLAY and SSH_ASKPASS environment variables, so no
X11-style prompting should happen.
* i've
2011 Jan 18
2
ssh-add with stdin and read_passphrase
I would like to use ssh-add to unlock a key with a password provided
through a web interface.
It seems even though ssh-add calls read_passphrase with RP_ALLOW_STDIN
at ssh-add.c:173, stdin is not used as a last resort without a valid
terminal or display. Is it an intended behaviour ? And if so, what are
the security implications of using popen() to write the password to
ssh-add (not using echo
2001 Jul 04
0
Sneek peak at what was commited.
For those following the portable CVS tree.. I'd suggest holding off for a
day or so unless you really want to get dirty. I just commited 32 patches
from the OpenBSD tree, but have not worked out all the issues (due to
Linux brain damage <sigh..Faster OpenBSD gets SMP..the happer I'll be>).
The two things that need to be finished integrated in the configure.in is
KRB5 and
2000 Dec 27
1
patch to support hurd-i386.
Damn, forgot the rest of the patch. Here it comes.
diff -Nur openssh-2.2.0p1-/ssh-keygen.c openssh-2.2.0p1/ssh-keygen.c
--- openssh-2.2.0p1-/ssh-keygen.c Wed Aug 23 02:46:24 2000
+++ openssh-2.2.0p1/ssh-keygen.c Sun Oct 29 16:44:50 2000
@@ -68,7 +68,7 @@
static const char *__progname = "ssh-keygen";
#endif /* HAVE___PROGNAME */
-char hostname[MAXHOSTNAMELEN];
+char