=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/readconf.c,v retrieving revision 1.95.2.2 retrieving revision 1.96 diff -u -r1.95.2.2 -r1.96 --- src/usr.bin/ssh/readconf.c 2003/04/03 22:35:17 1.95.2.2 +++ src/usr.bin/ssh/readconf.c 2002/06/08 05:17:01 1.96 @@ -12,7 +12,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: readconf.c,v 1.95.2.2 2003/04/03 22:35:17 miod Exp $"); +RCSID("$OpenBSD: readconf.c,v 1.96 2002/06/08 05:17:01 markus Exp $"); #include "ssh.h" #include "xmalloc.h" @@ -92,7 +92,7 @@ typedef enum { oBadOption, oForwardAgent, oForwardX11, oGatewayPorts, oRhostsAuthentication, - oPasswordAuthentication, oRSAAuthentication, + oPasswordAuthentication, oRSAAuthentication, oChallengeResponseAuthentication, oXAuthLocation, #if defined(KRB4) || defined(KRB5) oKerberosAuthentication, @@ -114,7 +114,6 @@ oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication, oHostKeyAlgorithms, oBindAddress, oSmartcardDevice, oClearAllForwardings, oNoHostAuthenticationForLocalhost, - oEnableSSHKeysign, oDeprecated } OpCodes; @@ -186,7 +185,6 @@ { "bindaddress", oBindAddress }, { "smartcarddevice", oSmartcardDevice }, { "clearallforwardings", oClearAllForwardings }, - { "enablesshkeysign", oEnableSSHKeysign }, { "nohostauthenticationforlocalhost", oNoHostAuthenticationForLocalhost }, { NULL, oBadOption } }; @@ -266,16 +264,14 @@ * Processes a single option line as used in the configuration files. This * only sets those values that have not already been set. */ -#define WHITESPACE " \t\r\n" int process_config_line(Options *options, const char *host, char *line, const char *filename, int linenum, int *activep) { - char buf[256], *s, **charptr, *endofnumber, *keyword, *arg; + char buf[256], *s, *string, **charptr, *endofnumber, *keyword, *arg; int opcode, *intptr, value; - size_t len; u_short fwd_port, fwd_host_port; char sfwd_host_port[6]; @@ -488,9 +484,16 @@ case oProxyCommand: charptr = &options->proxy_command; - len = strspn(s, WHITESPACE "="); + string = xstrdup(""); + while ((arg = strdelim(&s)) != NULL && *arg != '\0') { + string = xrealloc(string, strlen(string) + strlen(arg) + 2); + strcat(string, " "); + strcat(string, arg); + } if (*activep && *charptr == NULL) - *charptr = xstrdup(s + len); + *charptr = string; + else + xfree(string); return 0; case oPort: @@ -664,14 +667,10 @@ *intptr = value; break; - case oEnableSSHKeysign: - intptr = &options->enable_ssh_keysign; - goto parse_flag; - case oDeprecated: - debug("%s line %d: Deprecated option \"%s\"", + fatal("%s line %d: Deprecated option \"%s\"", filename, linenum, keyword); - return 0; + break; default: fatal("process_config_line: Unimplemented opcode %d", opcode); @@ -791,7 +790,6 @@ options->preferred_authentications = NULL; options->bind_address = NULL; options->smartcard_device = NULL; - options->enable_ssh_keysign = - 1; options->no_host_authentication_for_localhost = - 1; } @@ -816,7 +814,7 @@ if (options->use_privileged_port == -1) options->use_privileged_port = 0; if (options->rhosts_authentication == -1) - options->rhosts_authentication = 0; + options->rhosts_authentication = 1; if (options->rsa_authentication == -1) options->rsa_authentication = 1; if (options->pubkey_authentication == -1) @@ -840,7 +838,7 @@ if (options->kbd_interactive_authentication == -1) options->kbd_interactive_authentication = 1; if (options->rhosts_rsa_authentication == -1) - options->rhosts_rsa_authentication = 0; + options->rhosts_rsa_authentication = 1; if (options->hostbased_authentication == -1) options->hostbased_authentication = 0; if (options->batch_mode == -1) @@ -907,8 +905,6 @@ clear_forwardings(options); if (options->no_host_authentication_for_localhost == - 1) options->no_host_authentication_for_localhost = 0; - if (options->enable_ssh_keysign == -1) - options->enable_ssh_keysign = 0; /* options->proxy_command should not be set by default */ /* options->user will be set in the main program if appropriate */ /* options->hostname will be set in the main program if appropriate */