version 1.265, 2017/01/30 00:34:01 |
version 1.266, 2017/01/30 00:38:50 |
|
|
|
|
Host books.com |
Host books.com |
RemoteForward 9999 shadows.cs.hut.fi:9999 |
RemoteForward 9999 shadows.cs.hut.fi:9999 |
Cipher 3des |
Ciphers 3des-cbc |
|
|
Host fascist.blob.com |
Host fascist.blob.com |
Port 23123 |
Port 23123 |
|
|
PublicKeyAuthentication no |
PublicKeyAuthentication no |
|
|
Host *.su |
Host *.su |
Cipher none |
Ciphers aes128-ctr |
PasswordAuthentication no |
PasswordAuthentication no |
|
|
Host vpn.fake.com |
Host vpn.fake.com |
|
|
const char *name; |
const char *name; |
OpCodes opcode; |
OpCodes opcode; |
} keywords[] = { |
} keywords[] = { |
|
/* Deprecated options */ |
|
{ "fallbacktorsh", oDeprecated }, |
|
{ "globalknownhostsfile2", oDeprecated }, |
|
{ "rhostsauthentication", oDeprecated }, |
|
{ "userknownhostsfile2", oDeprecated }, |
|
{ "useroaming", oDeprecated }, |
|
{ "usersh", oDeprecated }, |
|
|
|
/* Unsupported options */ |
|
{ "afstokenpassing", oUnsupported }, |
|
{ "kerberosauthentication", oUnsupported }, |
|
{ "kerberostgtpassing", oUnsupported }, |
|
|
|
/* Sometimes-unsupported options */ |
|
#if defined(GSSAPI) |
|
{ "gssapiauthentication", oGssAuthentication }, |
|
{ "gssapidelegatecredentials", oGssDelegateCreds }, |
|
# else |
|
{ "gssapiauthentication", oUnsupported }, |
|
{ "gssapidelegatecredentials", oUnsupported }, |
|
#endif |
|
#ifdef ENABLE_PKCS11 |
|
{ "smartcarddevice", oPKCS11Provider }, |
|
{ "pkcs11provider", oPKCS11Provider }, |
|
# else |
|
{ "smartcarddevice", oUnsupported }, |
|
{ "pkcs11provider", oUnsupported }, |
|
#endif |
|
#ifdef WITH_SSH1 |
|
{ "rsaauthentication", oRSAAuthentication }, |
|
{ "rhostsrsaauthentication", oRhostsRSAAuthentication }, |
|
{ "compressionlevel", oCompressionLevel }, |
|
# else |
|
{ "rsaauthentication", oUnsupported }, |
|
{ "rhostsrsaauthentication", oUnsupported }, |
|
{ "compressionlevel", oUnsupported }, |
|
#endif |
|
|
{ "forwardagent", oForwardAgent }, |
{ "forwardagent", oForwardAgent }, |
{ "forwardx11", oForwardX11 }, |
{ "forwardx11", oForwardX11 }, |
{ "forwardx11trusted", oForwardX11Trusted }, |
{ "forwardx11trusted", oForwardX11Trusted }, |
|
|
{ "xauthlocation", oXAuthLocation }, |
{ "xauthlocation", oXAuthLocation }, |
{ "gatewayports", oGatewayPorts }, |
{ "gatewayports", oGatewayPorts }, |
{ "useprivilegedport", oUsePrivilegedPort }, |
{ "useprivilegedport", oUsePrivilegedPort }, |
{ "rhostsauthentication", oDeprecated }, |
|
{ "passwordauthentication", oPasswordAuthentication }, |
{ "passwordauthentication", oPasswordAuthentication }, |
{ "kbdinteractiveauthentication", oKbdInteractiveAuthentication }, |
{ "kbdinteractiveauthentication", oKbdInteractiveAuthentication }, |
{ "kbdinteractivedevices", oKbdInteractiveDevices }, |
{ "kbdinteractivedevices", oKbdInteractiveDevices }, |
{ "rsaauthentication", oRSAAuthentication }, |
|
{ "pubkeyauthentication", oPubkeyAuthentication }, |
{ "pubkeyauthentication", oPubkeyAuthentication }, |
{ "dsaauthentication", oPubkeyAuthentication }, /* alias */ |
{ "dsaauthentication", oPubkeyAuthentication }, /* alias */ |
{ "rhostsrsaauthentication", oRhostsRSAAuthentication }, |
|
{ "hostbasedauthentication", oHostbasedAuthentication }, |
{ "hostbasedauthentication", oHostbasedAuthentication }, |
{ "challengeresponseauthentication", oChallengeResponseAuthentication }, |
{ "challengeresponseauthentication", oChallengeResponseAuthentication }, |
{ "skeyauthentication", oChallengeResponseAuthentication }, /* alias */ |
{ "skeyauthentication", oChallengeResponseAuthentication }, /* alias */ |
{ "tisauthentication", oChallengeResponseAuthentication }, /* alias */ |
{ "tisauthentication", oChallengeResponseAuthentication }, /* alias */ |
{ "kerberosauthentication", oUnsupported }, |
|
{ "kerberostgtpassing", oUnsupported }, |
|
{ "afstokenpassing", oUnsupported }, |
|
#if defined(GSSAPI) |
|
{ "gssapiauthentication", oGssAuthentication }, |
|
{ "gssapidelegatecredentials", oGssDelegateCreds }, |
|
#else |
|
{ "gssapiauthentication", oUnsupported }, |
|
{ "gssapidelegatecredentials", oUnsupported }, |
|
#endif |
|
{ "fallbacktorsh", oDeprecated }, |
|
{ "usersh", oDeprecated }, |
|
{ "identityfile", oIdentityFile }, |
{ "identityfile", oIdentityFile }, |
{ "identityfile2", oIdentityFile }, /* obsolete */ |
{ "identityfile2", oIdentityFile }, /* obsolete */ |
{ "identitiesonly", oIdentitiesOnly }, |
{ "identitiesonly", oIdentitiesOnly }, |
|
|
{ "match", oMatch }, |
{ "match", oMatch }, |
{ "escapechar", oEscapeChar }, |
{ "escapechar", oEscapeChar }, |
{ "globalknownhostsfile", oGlobalKnownHostsFile }, |
{ "globalknownhostsfile", oGlobalKnownHostsFile }, |
{ "globalknownhostsfile2", oDeprecated }, |
|
{ "userknownhostsfile", oUserKnownHostsFile }, |
{ "userknownhostsfile", oUserKnownHostsFile }, |
{ "userknownhostsfile2", oDeprecated }, |
|
{ "connectionattempts", oConnectionAttempts }, |
{ "connectionattempts", oConnectionAttempts }, |
{ "batchmode", oBatchMode }, |
{ "batchmode", oBatchMode }, |
{ "checkhostip", oCheckHostIP }, |
{ "checkhostip", oCheckHostIP }, |
{ "stricthostkeychecking", oStrictHostKeyChecking }, |
{ "stricthostkeychecking", oStrictHostKeyChecking }, |
{ "compression", oCompression }, |
{ "compression", oCompression }, |
{ "compressionlevel", oCompressionLevel }, |
|
{ "tcpkeepalive", oTCPKeepAlive }, |
{ "tcpkeepalive", oTCPKeepAlive }, |
{ "keepalive", oTCPKeepAlive }, /* obsolete */ |
{ "keepalive", oTCPKeepAlive }, /* obsolete */ |
{ "numberofpasswordprompts", oNumberOfPasswordPrompts }, |
{ "numberofpasswordprompts", oNumberOfPasswordPrompts }, |
|
|
{ "preferredauthentications", oPreferredAuthentications }, |
{ "preferredauthentications", oPreferredAuthentications }, |
{ "hostkeyalgorithms", oHostKeyAlgorithms }, |
{ "hostkeyalgorithms", oHostKeyAlgorithms }, |
{ "bindaddress", oBindAddress }, |
{ "bindaddress", oBindAddress }, |
#ifdef ENABLE_PKCS11 |
|
{ "smartcarddevice", oPKCS11Provider }, |
|
{ "pkcs11provider", oPKCS11Provider }, |
|
#else |
|
{ "smartcarddevice", oUnsupported }, |
|
{ "pkcs11provider", oUnsupported }, |
|
#endif |
|
{ "clearallforwardings", oClearAllForwardings }, |
{ "clearallforwardings", oClearAllForwardings }, |
{ "enablesshkeysign", oEnableSSHKeysign }, |
{ "enablesshkeysign", oEnableSSHKeysign }, |
{ "verifyhostkeydns", oVerifyHostKeyDNS }, |
{ "verifyhostkeydns", oVerifyHostKeyDNS }, |
|
|
{ "localcommand", oLocalCommand }, |
{ "localcommand", oLocalCommand }, |
{ "permitlocalcommand", oPermitLocalCommand }, |
{ "permitlocalcommand", oPermitLocalCommand }, |
{ "visualhostkey", oVisualHostKey }, |
{ "visualhostkey", oVisualHostKey }, |
{ "useroaming", oDeprecated }, |
|
{ "kexalgorithms", oKexAlgorithms }, |
{ "kexalgorithms", oKexAlgorithms }, |
{ "ipqos", oIPQoS }, |
{ "ipqos", oIPQoS }, |
{ "requesttty", oRequestTTY }, |
{ "requesttty", oRequestTTY }, |
|
|
dump_cfg_fmtint(oProxyUseFdpass, o->proxy_use_fdpass); |
dump_cfg_fmtint(oProxyUseFdpass, o->proxy_use_fdpass); |
dump_cfg_fmtint(oPubkeyAuthentication, o->pubkey_authentication); |
dump_cfg_fmtint(oPubkeyAuthentication, o->pubkey_authentication); |
dump_cfg_fmtint(oRequestTTY, o->request_tty); |
dump_cfg_fmtint(oRequestTTY, o->request_tty); |
|
#ifdef WITH_RSA1 |
dump_cfg_fmtint(oRhostsRSAAuthentication, o->rhosts_rsa_authentication); |
dump_cfg_fmtint(oRhostsRSAAuthentication, o->rhosts_rsa_authentication); |
dump_cfg_fmtint(oRSAAuthentication, o->rsa_authentication); |
dump_cfg_fmtint(oRSAAuthentication, o->rsa_authentication); |
|
#endif |
dump_cfg_fmtint(oStreamLocalBindUnlink, o->fwd_opts.streamlocal_bind_unlink); |
dump_cfg_fmtint(oStreamLocalBindUnlink, o->fwd_opts.streamlocal_bind_unlink); |
dump_cfg_fmtint(oStrictHostKeyChecking, o->strict_host_key_checking); |
dump_cfg_fmtint(oStrictHostKeyChecking, o->strict_host_key_checking); |
dump_cfg_fmtint(oTCPKeepAlive, o->tcp_keep_alive); |
dump_cfg_fmtint(oTCPKeepAlive, o->tcp_keep_alive); |
|
|
|
|
/* Integer options */ |
/* Integer options */ |
dump_cfg_int(oCanonicalizeMaxDots, o->canonicalize_max_dots); |
dump_cfg_int(oCanonicalizeMaxDots, o->canonicalize_max_dots); |
|
#ifdef WITH_SSH1 |
dump_cfg_int(oCompressionLevel, o->compression_level); |
dump_cfg_int(oCompressionLevel, o->compression_level); |
|
#endif |
dump_cfg_int(oConnectionAttempts, o->connection_attempts); |
dump_cfg_int(oConnectionAttempts, o->connection_attempts); |
dump_cfg_int(oForwardX11Timeout, o->forward_x11_timeout); |
dump_cfg_int(oForwardX11Timeout, o->forward_x11_timeout); |
dump_cfg_int(oNumberOfPasswordPrompts, o->number_of_password_prompts); |
dump_cfg_int(oNumberOfPasswordPrompts, o->number_of_password_prompts); |
|
|
dump_cfg_string(oLocalCommand, o->local_command); |
dump_cfg_string(oLocalCommand, o->local_command); |
dump_cfg_string(oLogLevel, log_level_name(o->log_level)); |
dump_cfg_string(oLogLevel, log_level_name(o->log_level)); |
dump_cfg_string(oMacs, o->macs ? o->macs : KEX_CLIENT_MAC); |
dump_cfg_string(oMacs, o->macs ? o->macs : KEX_CLIENT_MAC); |
|
#ifdef ENABLE_PKCS11 |
dump_cfg_string(oPKCS11Provider, o->pkcs11_provider); |
dump_cfg_string(oPKCS11Provider, o->pkcs11_provider); |
|
#endif |
dump_cfg_string(oPreferredAuthentications, o->preferred_authentications); |
dump_cfg_string(oPreferredAuthentications, o->preferred_authentications); |
dump_cfg_string(oPubkeyAcceptedKeyTypes, o->pubkey_key_types); |
dump_cfg_string(oPubkeyAcceptedKeyTypes, o->pubkey_key_types); |
dump_cfg_string(oRevokedHostKeys, o->revoked_host_keys); |
dump_cfg_string(oRevokedHostKeys, o->revoked_host_keys); |