version 1.238, 2015/07/10 06:21:53 |
version 1.239, 2015/07/30 00:01:34 |
|
|
arg = strdelim(&s); |
arg = strdelim(&s); |
if (!arg || *arg == '\0') |
if (!arg || *arg == '\0') |
fatal("%.200s line %d: Missing argument.", filename, linenum); |
fatal("%.200s line %d: Missing argument.", filename, linenum); |
if (!ciphers_valid(arg)) |
if (!ciphers_valid(*arg == '+' ? arg + 1 : arg)) |
fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.", |
fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.", |
filename, linenum, arg ? arg : "<NONE>"); |
filename, linenum, arg ? arg : "<NONE>"); |
if (*activep && options->ciphers == NULL) |
if (*activep && options->ciphers == NULL) |
|
|
arg = strdelim(&s); |
arg = strdelim(&s); |
if (!arg || *arg == '\0') |
if (!arg || *arg == '\0') |
fatal("%.200s line %d: Missing argument.", filename, linenum); |
fatal("%.200s line %d: Missing argument.", filename, linenum); |
if (!mac_valid(arg)) |
if (!mac_valid(*arg == '+' ? arg + 1 : arg)) |
fatal("%.200s line %d: Bad SSH2 Mac spec '%s'.", |
fatal("%.200s line %d: Bad SSH2 Mac spec '%s'.", |
filename, linenum, arg ? arg : "<NONE>"); |
filename, linenum, arg ? arg : "<NONE>"); |
if (*activep && options->macs == NULL) |
if (*activep && options->macs == NULL) |
|
|
if (!arg || *arg == '\0') |
if (!arg || *arg == '\0') |
fatal("%.200s line %d: Missing argument.", |
fatal("%.200s line %d: Missing argument.", |
filename, linenum); |
filename, linenum); |
if (!kex_names_valid(arg)) |
if (!kex_names_valid(*arg == '+' ? arg + 1 : arg)) |
fatal("%.200s line %d: Bad SSH2 KexAlgorithms '%s'.", |
fatal("%.200s line %d: Bad SSH2 KexAlgorithms '%s'.", |
filename, linenum, arg ? arg : "<NONE>"); |
filename, linenum, arg ? arg : "<NONE>"); |
if (*activep && options->kex_algorithms == NULL) |
if (*activep && options->kex_algorithms == NULL) |
|
|
if (!arg || *arg == '\0') |
if (!arg || *arg == '\0') |
fatal("%.200s line %d: Missing argument.", |
fatal("%.200s line %d: Missing argument.", |
filename, linenum); |
filename, linenum); |
if (!sshkey_names_valid2(arg, 1)) |
if (!sshkey_names_valid2(*arg == '+' ? arg + 1 : arg, 1)) |
fatal("%s line %d: Bad key types '%s'.", |
fatal("%s line %d: Bad key types '%s'.", |
filename, linenum, arg ? arg : "<NONE>"); |
filename, linenum, arg ? arg : "<NONE>"); |
if (*activep && *charptr == NULL) |
if (*activep && *charptr == NULL) |
|
|
/* Selected in ssh_login(). */ |
/* Selected in ssh_login(). */ |
if (options->cipher == -1) |
if (options->cipher == -1) |
options->cipher = SSH_CIPHER_NOT_SET; |
options->cipher = SSH_CIPHER_NOT_SET; |
/* options->ciphers, default set in myproposals.h */ |
|
/* options->macs, default set in myproposals.h */ |
|
/* options->kex_algorithms, default set in myproposals.h */ |
|
/* options->hostkeyalgorithms, default set in myproposals.h */ |
/* options->hostkeyalgorithms, default set in myproposals.h */ |
if (options->protocol == SSH_PROTO_UNKNOWN) |
if (options->protocol == SSH_PROTO_UNKNOWN) |
options->protocol = SSH_PROTO_2; |
options->protocol = SSH_PROTO_2; |
|
|
options->fingerprint_hash = SSH_FP_HASH_DEFAULT; |
options->fingerprint_hash = SSH_FP_HASH_DEFAULT; |
if (options->update_hostkeys == -1) |
if (options->update_hostkeys == -1) |
options->update_hostkeys = 0; |
options->update_hostkeys = 0; |
if (options->hostbased_key_types == NULL) |
if (kex_assemble_names(KEX_CLIENT_ENCRYPT, &options->ciphers) != 0 || |
options->hostbased_key_types = xstrdup(KEX_DEFAULT_PK_ALG); |
kex_assemble_names(KEX_CLIENT_MAC, &options->macs) != 0 || |
if (options->pubkey_key_types == NULL) |
kex_assemble_names(KEX_CLIENT_KEX, &options->kex_algorithms) != 0 || |
options->pubkey_key_types = xstrdup(KEX_DEFAULT_PK_ALG); |
kex_assemble_names(KEX_DEFAULT_PK_ALG, |
|
&options->hostbased_key_types) != 0 || |
|
kex_assemble_names(KEX_DEFAULT_PK_ALG, |
|
&options->pubkey_key_types) != 0) |
|
fatal("%s: kex_assemble_names failed", __func__); |
|
|
#define CLEAR_ON_NONE(v) \ |
#define CLEAR_ON_NONE(v) \ |
do { \ |
do { \ |