version 1.31, 2000/05/08 17:12:15 |
version 1.31.2.1, 2000/06/12 02:37:34 |
|
|
oBadOption, |
oBadOption, |
oForwardAgent, oForwardX11, oGatewayPorts, oRhostsAuthentication, |
oForwardAgent, oForwardX11, oGatewayPorts, oRhostsAuthentication, |
oPasswordAuthentication, oRSAAuthentication, oFallBackToRsh, oUseRsh, |
oPasswordAuthentication, oRSAAuthentication, oFallBackToRsh, oUseRsh, |
oSkeyAuthentication, |
oSkeyAuthentication, oXAuthLocation, |
#ifdef KRB4 |
#ifdef KRB4 |
oKerberosAuthentication, |
oKerberosAuthentication, |
#endif /* KRB4 */ |
#endif /* KRB4 */ |
|
|
} keywords[] = { |
} keywords[] = { |
{ "forwardagent", oForwardAgent }, |
{ "forwardagent", oForwardAgent }, |
{ "forwardx11", oForwardX11 }, |
{ "forwardx11", oForwardX11 }, |
|
{ "xauthlocation", oXAuthLocation }, |
{ "gatewayports", oGatewayPorts }, |
{ "gatewayports", oGatewayPorts }, |
{ "useprivilegedport", oUsePrivilegedPort }, |
{ "useprivilegedport", oUsePrivilegedPort }, |
{ "rhostsauthentication", oRhostsAuthentication }, |
{ "rhostsauthentication", oRhostsAuthentication }, |
|
|
} |
} |
break; |
break; |
|
|
|
case oXAuthLocation: |
|
charptr=&options->xauth_location; |
|
goto parse_string; |
|
|
case oUser: |
case oUser: |
charptr = &options->user; |
charptr = &options->user; |
parse_string: |
parse_string: |
|
|
case oCipher: |
case oCipher: |
intptr = &options->cipher; |
intptr = &options->cipher; |
cp = strtok(NULL, WHITESPACE); |
cp = strtok(NULL, WHITESPACE); |
|
if (!cp) |
|
fatal("%.200s line %d: Missing argument.", filename, linenum); |
value = cipher_number(cp); |
value = cipher_number(cp); |
if (value == -1) |
if (value == -1) |
fatal("%.200s line %d: Bad cipher '%s'.", |
fatal("%.200s line %d: Bad cipher '%s'.", |
|
|
|
|
case oCiphers: |
case oCiphers: |
cp = strtok(NULL, WHITESPACE); |
cp = strtok(NULL, WHITESPACE); |
|
if (!cp) |
|
fatal("%.200s line %d: Missing argument.", filename, linenum); |
if (!ciphers_valid(cp)) |
if (!ciphers_valid(cp)) |
fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.", |
fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.", |
filename, linenum, cp ? cp : "<NONE>"); |
filename, linenum, cp ? cp : "<NONE>"); |
|
|
case oProtocol: |
case oProtocol: |
intptr = &options->protocol; |
intptr = &options->protocol; |
cp = strtok(NULL, WHITESPACE); |
cp = strtok(NULL, WHITESPACE); |
|
if (!cp) |
|
fatal("%.200s line %d: Missing argument.", filename, linenum); |
value = proto_spec(cp); |
value = proto_spec(cp); |
if (value == SSH_PROTO_UNKNOWN) |
if (value == SSH_PROTO_UNKNOWN) |
fatal("%.200s line %d: Bad protocol spec '%s'.", |
fatal("%.200s line %d: Bad protocol spec '%s'.", |
|
|
memset(options, 'X', sizeof(*options)); |
memset(options, 'X', sizeof(*options)); |
options->forward_agent = -1; |
options->forward_agent = -1; |
options->forward_x11 = -1; |
options->forward_x11 = -1; |
|
options->xauth_location = NULL; |
options->gateway_ports = -1; |
options->gateway_ports = -1; |
options->use_privileged_port = -1; |
options->use_privileged_port = -1; |
options->rhosts_authentication = -1; |
options->rhosts_authentication = -1; |
|
|
fill_default_options(Options * options) |
fill_default_options(Options * options) |
{ |
{ |
if (options->forward_agent == -1) |
if (options->forward_agent == -1) |
options->forward_agent = 1; |
options->forward_agent = 0; |
if (options->forward_x11 == -1) |
if (options->forward_x11 == -1) |
options->forward_x11 = 0; |
options->forward_x11 = 0; |
|
#ifdef XAUTH_PATH |
|
if (options->xauth_location == NULL) |
|
options->xauth_location = XAUTH_PATH; |
|
#endif /* XAUTH_PATH */ |
if (options->gateway_ports == -1) |
if (options->gateway_ports == -1) |
options->gateway_ports = 0; |
options->gateway_ports = 0; |
if (options->use_privileged_port == -1) |
if (options->use_privileged_port == -1) |