version 1.71, 2001/04/07 08:55:17 |
version 1.72, 2001/04/12 19:15:25 |
|
|
oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs, |
oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs, |
oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication, |
oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication, |
oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias, |
oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias, |
oDynamicForward, oPreferredAuthentications |
oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication |
} OpCodes; |
} OpCodes; |
|
|
/* Textual representations of the tokens. */ |
/* Textual representations of the tokens. */ |
|
|
{ "rsaauthentication", oRSAAuthentication }, |
{ "rsaauthentication", oRSAAuthentication }, |
{ "pubkeyauthentication", oPubkeyAuthentication }, |
{ "pubkeyauthentication", oPubkeyAuthentication }, |
{ "dsaauthentication", oPubkeyAuthentication }, /* alias */ |
{ "dsaauthentication", oPubkeyAuthentication }, /* alias */ |
|
{ "rhostsrsaauthentication", oRhostsRSAAuthentication }, |
|
{ "hostbaedauthentication", oHostbasedAuthentication }, |
{ "challengeresponseauthentication", oChallengeResponseAuthentication }, |
{ "challengeresponseauthentication", oChallengeResponseAuthentication }, |
{ "skeyauthentication", oChallengeResponseAuthentication }, /* alias */ |
{ "skeyauthentication", oChallengeResponseAuthentication }, /* alias */ |
{ "tisauthentication", oChallengeResponseAuthentication }, /* alias */ |
{ "tisauthentication", oChallengeResponseAuthentication }, /* alias */ |
|
|
{ "user", oUser }, |
{ "user", oUser }, |
{ "host", oHost }, |
{ "host", oHost }, |
{ "escapechar", oEscapeChar }, |
{ "escapechar", oEscapeChar }, |
{ "rhostsrsaauthentication", oRhostsRSAAuthentication }, |
|
{ "globalknownhostsfile", oGlobalKnownHostsFile }, |
{ "globalknownhostsfile", oGlobalKnownHostsFile }, |
{ "userknownhostsfile", oUserKnownHostsFile }, |
{ "userknownhostsfile", oUserKnownHostsFile }, |
{ "globalknownhostsfile2", oGlobalKnownHostsFile2 }, |
{ "globalknownhostsfile2", oGlobalKnownHostsFile2 }, |
|
|
intptr = &options->rhosts_rsa_authentication; |
intptr = &options->rhosts_rsa_authentication; |
goto parse_flag; |
goto parse_flag; |
|
|
|
case oHostbasedAuthentication: |
|
intptr = &options->hostbased_authentication; |
|
goto parse_flag; |
|
|
case oChallengeResponseAuthentication: |
case oChallengeResponseAuthentication: |
intptr = &options->challenge_reponse_authentication; |
intptr = &options->challenge_reponse_authentication; |
goto parse_flag; |
goto parse_flag; |
|
|
filename, linenum); |
filename, linenum); |
fwd_port = atoi(arg); |
fwd_port = atoi(arg); |
add_local_forward(options, fwd_port, "socks4", 0); |
add_local_forward(options, fwd_port, "socks4", 0); |
break; |
break; |
|
|
case oHost: |
case oHost: |
*activep = 0; |
*activep = 0; |
|
|
options->kbd_interactive_authentication = -1; |
options->kbd_interactive_authentication = -1; |
options->kbd_interactive_devices = NULL; |
options->kbd_interactive_devices = NULL; |
options->rhosts_rsa_authentication = -1; |
options->rhosts_rsa_authentication = -1; |
|
options->hostbased_authentication = -1; |
options->fallback_to_rsh = -1; |
options->fallback_to_rsh = -1; |
options->use_rsh = -1; |
options->use_rsh = -1; |
options->batch_mode = -1; |
options->batch_mode = -1; |
|
|
options->kbd_interactive_authentication = 1; |
options->kbd_interactive_authentication = 1; |
if (options->rhosts_rsa_authentication == -1) |
if (options->rhosts_rsa_authentication == -1) |
options->rhosts_rsa_authentication = 1; |
options->rhosts_rsa_authentication = 1; |
|
if (options->hostbased_authentication == -1) |
|
options->hostbased_authentication = 0; |
if (options->fallback_to_rsh == -1) |
if (options->fallback_to_rsh == -1) |
options->fallback_to_rsh = 0; |
options->fallback_to_rsh = 0; |
if (options->use_rsh == -1) |
if (options->use_rsh == -1) |