summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/authfile.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* factor out reading/writing sshbufs to dedicated functions;djm2020-01-251-2/+1
| | | | feedback and ok markus@
* add sshkey_save_public(), to save a public key; ok markus@djm2020-01-021-1/+3
|
* move advance_past_options to authfile.c and make it public;djm2019-09-031-1/+2
| | | | ok markus@
* Remove now-redundant perm_ok arg since sshkey_load_private_type willdtucker2019-08-051-3/+3
| | | | | now return SSH_ERR_KEY_BAD_PERMISSIONS in that case. Patch from jitendra.sharma at intel.com, ok djm@
* deprecate key_load_private_pem() and sshkey_load_private_pem()djm2015-01-081-3/+7
| | | | | | | | | | | | | | | interfaces. Refactor the generic key loading API to not require pathnames to be specified (they weren't really used). Fixes a few other things en passant: Makes ed25519 keys work for hostbased authentication (ssh-keysign previously used the PEM-only routines). Fixes key comment regression bz#2306: key pathnames were being lost as comment fields. ok markus@
* add RevokedHostKeys option for the clientdjm2014-12-041-2/+3
| | | | Allow textfile or KRL-based revocation of hostkeys.
* remove leakmalloc droppingsdjm2014-07-031-5/+1
|
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-22/+41
| | | | | | | | | existing API is offered as a set of wrappers. with and ok markus@ Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review a few months ago.
* new private key format, bcrypt as KDF by default; details in PROTOCOL.key;markus2013-12-061-2/+3
| | | | feedback and lots help from djm; ok djm@
* allow "ssh-add - < key"; feedback and ok markus@djm2011-05-041-1/+3
|
* enable certificates for hostbased authentication, from Iain Morgan;djm2010-08-041-1/+3
| | | | "looks ok" markus@
* Add a TrustedUserCAKeys option to sshd_config to specify CA keys thatdjm2010-03-041-1/+2
| | | | | | | | | | | are trusted to authenticate users (in addition than doing it per-user in authorized_keys). Add a RevokedKeys option to sshd_config and a @revoked marker to known_hosts to allow keys to me revoked and banned for user or host authentication. feedback and ok markus@
* Prevent ssh from trying to open private keys with bad permissions more thandtucker2006-04-251-2/+2
| | | | | once or prompting for their passphrases (which it subsequently ignores anyway), similar to a previous change in ssh-add. bz #1186, ok djm@
* standardise spacing in $OpenBSD$ tags; requested by deraadt@djm2006-03-251-1/+1
|
* Make ssh-add check file permissions before attempting to load privatedtucker2006-03-131-1/+2
| | | | | key files multiple times; it will fail anyway and this prevents confusing multiple prompts and warnings. mindrot #1138, ok djm@
* add /usr/libexec/ssh-keysign: a setuid helper program for hostbased authenticationmarkus2002-05-231-1/+2
| | | | in protocol v2 (needs to access the hostkeys).
* $OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; addstevesk2002-03-041-2/+2
| | | | | missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c files. ok markus@
* remove comments from .h, since they are cut&paste from the .c filesmarkus2001-06-261-15/+6
| | | | and out of sync
* prototype pedant. not very creative...itojun2001-06-261-9/+6
| | | | | - () -> (void) - no variable names
* simpler key load/save interface, see authfile.hmarkus2001-03-261-30/+15
|
* Add idents for files which lack themdjm2000-10-161-0/+4
| | | | Fix idents Id -> OpenBSD for the rest
* some more Copyright fixesmarkus2000-09-071-20/+9
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-0/+23
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* prototypemarkus2000-09-061-3/+2
|
* add DSA pubkey auth and other SSH2 fixes. use ssh-keygen -[xX]markus2000-04-261-0/+36
for trading keys with the real and the original SSH, directly from the people who invented the SSH protocol.