summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* correctly match ECDSA subtype (== curve) for offered/recevieddjm2015-01-261-3/+3
* adapt kex to sshbuf and struct ssh; ok djm@markus2015-01-191-6/+7
* remember which public keys have been used for authentication anddjm2014-12-221-1/+8
* make the "Too many authentication failures" message include thedjm2014-07-031-3/+2
* remove experimental, never-enabled JPAKE code; ok markus@djm2014-01-291-5/+1
* add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,markus2013-07-191-1/+3
* for hostbased authentication, print the client host and user ondjm2013-06-211-2/+3
* Standardise logging of supplemental information during userauth. Keysdjm2013-05-191-3/+7
* add submethod support to AuthenticationMethods; ok and freedback djm@markus2013-03-071-2/+3
* Fixes logging of partial authentication when privsep is enableddjm2012-12-021-4/+5
* Support multiple required authentication via an AuthenticationMethodsdjm2012-11-041-1/+6
* new sshd_config option AuthorizedKeysCommand to support fetchingdjm2012-10-301-1/+5
* allow AuthorizedKeysFile to specify multiple files, separated by spaces.djm2011-05-231-2/+2
* remove support for authorized_keys2; it is a relic from the early daysdjm2011-05-111-2/+1
* allow GSSAPI authentication to detect when a server-side failure causesdjm2011-03-101-1/+2
* add some optional indirection to matching of principal names listeddjm2010-05-071-1/+3
* Add a TrustedUserCAKeys option to sshd_config to specify CA keys thatdjm2010-03-041-1/+2
* Add support for certificate key types for users and hosts.djm2010-02-261-2/+3
* remove unused define. markus@ ok.fgsch2009-08-151-2/+1
* Add support for an experimental zero-knowledge password authenticationdjm2008-11-041-1/+5
* Merge duplicate host key file checks, based in part on a patch from Robdtucker2008-07-021-3/+2
* unifdef -DBSD_AUTHdjm2007-09-211-5/+1
* login_cap.h doesn't belong heredjm2007-08-231-4/+1
* delay authentication related cleanups until we're authenticated andmarkus2006-08-181-1/+2
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-9/+2
* move #include <stdio.h> out of includes.hstevesk2006-08-011-1/+2
* #include <signal.h> for sig_atomic_t; need this prior to <sys/param.h>stevesk2006-07-231-1/+2
* move #include <pwd.h> out of includes.h; ok markus@stevesk2006-07-061-3/+8
* replace the last non-sig_atomic_t flag used in a signal handler with adjm2006-04-201-2/+2
* standardise spacing in $OpenBSD$ tags; requested by deraadt@djm2006-03-251-1/+1
* introduce a generic %foo expansion function. replace existing % expansion anddjm2005-06-061-2/+1
* Add MaxAuthTries sshd config option; ok markus@dtucker2004-05-231-3/+1
* support for password change; ok dtucker@markus2004-01-301-1/+2
* standardise arguments to auth methods - they should all take authctxt.djm2003-11-041-3/+3
* replace fatal_cleanup() and linked list of fatal callbacks with staticmarkus2003-09-231-7/+4
* remove kerberos support from ssh1, since it has been replaced with GSSAPI;markus2003-08-281-2/+1
* fix passwd auth for 'username leaks via timing'; with djm@, original patches from solarmarkus2003-08-261-1/+3
* support GSS API user authentication; patches from Simon Wilkinson,markus2003-08-221-1/+2
* remove (already disabled) KRB4/AFS support, re-enable -k in ssh(1);markus2003-07-221-18/+1
* document struct Authctxt; with solarmarkus2003-04-161-5/+11
* krb4 + privsep; ok dugsong@, deraadt@markus2002-09-261-2/+2
* kerberos support for privsep. confirmed to work by lha@stacken.kth.seitojun2002-09-091-2/+2
* move Authmethod definitons to per-method file.markus2002-05-311-8/+8
* split auth2.c into one file per method; ok provos@/deraadt@markus2002-05-251-1/+8
* move the packet_send_debug handling from auth-options.c to auth.c; ok provos@markus2002-05-131-1/+6
* Fix sshd Banner option for privsep; ok markus@ provos@djm2002-05-121-1/+3
* clean up prototypesmarkus2002-03-191-2/+19
* integrate privilege separated openssh; its turned off by default for now.provos2002-03-181-1/+4
* have the authentication functions return the authentication contextprovos2002-03-181-3/+3
* getpwnamallow returns struct passwd * only if user valid; okay markus@provos2002-03-171-1/+2