xfree(gss_enc2oid);
}
- gss_enc2oid = xmalloc(sizeof(ssh_gss_kex_mapping)*
+ gss_enc2oid = xmalloc(sizeof(ssh_gss_kex_mapping) *
(gss_supported->count + 1));
buffer_init(&buf);
for (i = 0; i < gss_supported->count; i++) {
if (gss_supported->elements[i].length < 128 &&
(*check)(NULL, &(gss_supported->elements[i]), data)) {
+
deroid[0] = SSH_GSS_OIDTYPE;
deroid[1] = gss_supported->elements[i].length;
int gss_authentication; /* If true, permit GSSAPI authentication */
int gss_keyex; /* If true, permit GSSAPI key exchange */
int gss_cleanup_creds; /* If true, destroy cred cache on logout */
- char* gss_creds_path; /* If true, destroy cred cache on logout */
int gss_strict_acceptor; /* If true, restrict the GSSAPI acceptor name */
+ char* gss_creds_path; /* If true, destroy cred cache on logout */
int gsi_allow_limited_proxy; /* If true, accept limited proxies */
int password_authentication; /* If true, permit password
* authentication. */
.Dq yes
to indicate that the DNS is trusted to securely canonicalize
the name of the host being connected to. If
-.Dq no,
+.Dq no ,
the hostname entered on the
command line will be passed untouched to the GSSAPI library.
The default is
if (options.ciphers != NULL) {
myproposal[PROPOSAL_ENC_ALGS_CTOS] =
myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;
- }
+ }
myproposal[PROPOSAL_ENC_ALGS_CTOS] =
compat_cipher_proposal(myproposal[PROPOSAL_ENC_ALGS_CTOS]);