summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth-options.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* delete support for legacy v00 certificates; "sure" markus@ dtucker@djm2015-07-031-30/+16
* Don't make parsing of authorized_keys' environment= option conditionaldjm2015-05-011-9/+14
* unknown certificate extensions are non-fatal, so don't fataldjm2015-04-221-2/+2
* swith auth-options to new sshbuf/sshkey; ok djm@markus2015-01-141-44/+38
* Add support for Unix domain socket forwarding. A remote TCP portmillert2014-07-151-2/+3
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-7/+7
* simplify freeing of source-address certificate restrictiondjm2013-12-191-7/+7
* use calloc for all structure allocations; from markus@djm2013-11-081-2/+2
* no need to include monitor_wrap.h and ssh-gss.hmarkus2013-11-021-5/+1
* fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@djm2013-07-121-3/+5
* bye, bye xfree(); ok markus@djm2013-05-171-30/+30
* make AllowTcpForwarding accept "local" and "remote" in addition to itsdjm2012-12-021-2/+2
* remove explict search for \0 in packet strings, this job is now donedjm2011-10-181-15/+1
* Add wildcard support to PermitOpen, allowing things like "PermitOpendtucker2011-09-231-2/+2
* don't send the actual forced command in a debug message; ok markus deraadtdjm2010-12-241-2/+2
* Add buffer_get_cstring() and related functions that verify that thedjm2010-08-311-4/+4
* Move the permit-* options to the non-critical "extensions" field for v01djm2010-05-201-102/+180
* add some optional indirection to matching of principal names listeddjm2010-05-071-1/+42
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-10/+11
* spelling in error message. ok djm kettenisstevesk2010-03-161-3/+3
* Hold authentication debug messages until after successful authentication.dtucker2010-03-071-8/+1
* "force-command" is not spelled "forced-command"; spotted bydjm2010-03-041-2/+2
* reject strings with embedded ASCII nul chars in certificate key IDs,djm2010-03-031-8/+20
* Add support for certificate key types for users and hosts.djm2010-02-261-1/+149
* another chunk of a2port() diff that got away. wtfdjm??djm2009-01-221-3/+3
* support CIDR address matching in .ssh/authorized_keys from="..." stanzasdjm2008-06-101-8/+17
* Implement a channel success/failure status confirmation callbackdjm2008-05-081-1/+2
* add no-user-rc authorized_keys option to disable execution of ~/.ssh/rcdjm2008-03-261-1/+10
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-4/+10
* move #include <string.h> out of includes.hstevesk2006-07-221-1/+2
* Use '\0' rather than 0 to terminates strings; ok djm@dtucker2006-07-171-6/+6
* move #include <netdb.h> out of includes.h; ok djm@stevesk2006-07-121-1/+2
* move #include <pwd.h> out of includes.h; ok markus@stevesk2006-07-061-1/+5
* Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatdjm2006-03-251-0/+1
* RCSID() can diederaadt2006-03-191-1/+0
* two changes to the new ssh tunnel support. this breaks compatibilityreyk2005-12-081-2/+2
* Add support for tun(4) forwarding over OpenSSH, based on an idea andreyk2005-12-061-1/+40
* spacingderaadt2005-03-101-2/+2
* spacingderaadt2005-03-101-3/+3
* bz#413: allow optional specification of bind address for port forwardings.djm2005-03-011-12/+16
* deprecate VerifyReverseMapping since it's dangerous if combinedmarkus2003-06-021-2/+2
* rename log() into logit() to avoid name conflict. markus ok, from netbsditojun2003-04-081-3/+3
* add PermitUserEnvironment (off by default!); from dot@dotat.at; ok provos, deraadtmarkus2002-07-301-2/+3
* unneeded includesstevesk2002-07-211-3/+1
* move the packet_send_debug handling from auth-options.c to auth.c; ok provos@markus2002-05-131-57/+19
* clean up prototypesmarkus2002-03-191-2/+2
* integrate privilege separated openssh; its turned off by default for now.provos2002-03-181-15/+65
* s/ReverseMappingCheck/VerifyReverseMapping/ and avoid confusion; ok stevesk@markus2002-01-291-2/+2
* validate ports for permitopen key file option. add host/portstevesk2001-08-301-17/+15
* move ip+hostname check to match.cmarkus2001-06-241-14/+5