summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth-options.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* highly polished whitespace, mostly fixing spaces-for-tab and baddjm2021-04-031-2/+2
* use the new variant log macros instead of prepending __func__ anddjm2020-10-181-8/+7
* support for requiring user verified FIDO keys in sshddjm2020-08-271-5/+15
* fix null-deref on calloc failure; ok djmmarkus2020-03-061-4/+6
* change explicit_bzero();free() to freezero()jsg2020-02-261-3/+2
* add a "no-touch-required" option for authorized_keys and a similardjm2019-11-251-12/+26
* Plug mem leaks on error paths, based in part on github pr#120 fromdtucker2019-09-131-1/+2
* lots of things were relying on libcrypto headers to transitivelydjm2019-09-061-1/+2
* move authorized_keys option parsing helpsers to misc.c and makedjm2019-09-031-70/+1
* cap the number of permiopen/permitlisten directives we're willing todjm2019-07-091-2/+2
* Some asprintf() calls were checked < 0, rather than the precise == -1.deraadt2019-06-271-2/+2
* Allow ssh_config IdentityAgent directive to accept environment variabledjm2018-10-031-7/+10
* allow bare port numbers to appear in PermitListen directives, e.g.djm2018-06-191-5/+17
* some permitlisten fixes from markus@ that I missed in my insomnia-fueleddjm2018-06-071-4/+4
* fix regression caused by recent permitlisten option commit:djm2018-06-071-5/+5
* permitlisten option for authorized_keys; ok markus@djm2018-06-061-46/+94
* relax checking of authorized_keys environment="..." options to allowdjm2018-04-061-2/+2
* rename recently-added "valid-before" key restriction to "expiry-time"djm2018-03-141-2/+2
* add valid-before="[time]" authorized_keys option. A simple way ofdjm2018-03-121-3/+29
* switch over to the new authorized_keys options API and remove thedjm2018-03-031-647/+3
* Introduce a new API for handling authorized_keys options. This APIdjm2018-03-031-1/+828
* refactor channels.cdjm2017-09-121-3/+8
* make sure we don't pass a NULL string to vfprintf (triggered by themarkus2017-05-311-2/+3
* When a forced-command appears in both a certificate and andjm2016-11-301-6/+21
* refactor canohost.c: move functions that cache results closer to thedjm2016-03-071-5/+8
* Remove NULL-checks before free().mmcc2015-12-101-17/+9
* Add a new authorized_keys option "restrict" that includes all currentdjm2015-11-161-30/+57
* delete support for legacy v00 certificates; "sure" markus@ dtucker@djm2015-07-031-30/+16
* Don't make parsing of authorized_keys' environment= option conditionaldjm2015-05-011-9/+14
* unknown certificate extensions are non-fatal, so don't fataldjm2015-04-221-2/+2
* swith auth-options to new sshbuf/sshkey; ok djm@markus2015-01-141-44/+38
* Add support for Unix domain socket forwarding. A remote TCP portmillert2014-07-151-2/+3
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-7/+7
* simplify freeing of source-address certificate restrictiondjm2013-12-191-7/+7
* use calloc for all structure allocations; from markus@djm2013-11-081-2/+2
* no need to include monitor_wrap.h and ssh-gss.hmarkus2013-11-021-5/+1
* fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@djm2013-07-121-3/+5
* bye, bye xfree(); ok markus@djm2013-05-171-30/+30
* make AllowTcpForwarding accept "local" and "remote" in addition to itsdjm2012-12-021-2/+2
* remove explict search for \0 in packet strings, this job is now donedjm2011-10-181-15/+1
* Add wildcard support to PermitOpen, allowing things like "PermitOpendtucker2011-09-231-2/+2
* don't send the actual forced command in a debug message; ok markus deraadtdjm2010-12-241-2/+2
* Add buffer_get_cstring() and related functions that verify that thedjm2010-08-311-4/+4
* Move the permit-* options to the non-critical "extensions" field for v01djm2010-05-201-102/+180
* add some optional indirection to matching of principal names listeddjm2010-05-071-1/+42
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-10/+11
* spelling in error message. ok djm kettenisstevesk2010-03-161-3/+3
* Hold authentication debug messages until after successful authentication.dtucker2010-03-071-8/+1
* "force-command" is not spelled "forced-command"; spotted bydjm2010-03-041-2/+2
* reject strings with embedded ASCII nul chars in certificate key IDs,djm2010-03-031-8/+20