mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-21 09:30:12 +00:00
1aed65eb27
[auth-rh-rsa.c auth-rsa.c auth.c auth.h auth2-hostbased.c auth2-pubkey.c] [authfile.c authfile.h hostfile.c hostfile.h servconf.c servconf.h] [ssh-keygen.c ssh.1 sshconnect.c sshd_config.5] Add a TrustedUserCAKeys option to sshd_config to specify CA keys that are trusted to authenticate users (in addition than doing it per-user in authorized_keys). Add a RevokedKeys option to sshd_config and a @revoked marker to known_hosts to allow keys to me revoked and banned for user or host authentication. feedback and ok markus@
28 lines
1.0 KiB
C
28 lines
1.0 KiB
C
/* $OpenBSD: authfile.h,v 1.14 2010/03/04 10:36:03 djm Exp $ */
|
|
|
|
/*
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
* All rights reserved
|
|
*
|
|
* As far as I am concerned, the code I have written for this software
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
* software must be clearly marked as such, and if the derived work is
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
*/
|
|
|
|
#ifndef AUTHFILE_H
|
|
#define AUTHFILE_H
|
|
|
|
int key_save_private(Key *, const char *, const char *, const char *);
|
|
Key *key_load_public(const char *, char **);
|
|
Key *key_load_public_type(int, const char *, char **);
|
|
Key *key_load_private(const char *, const char *, char **);
|
|
Key *key_load_private_type(int, const char *, const char *, char **, int *);
|
|
Key *key_load_private_pem(int, int, const char *, char **);
|
|
int key_perm_ok(int, const char *);
|
|
int key_in_file(Key *, const char *, int);
|
|
|
|
#endif
|