Annotation of src/usr.bin/ssh/readconf.h, Revision 1.40.2.2
1.40.2.2! brad 1: /* $OpenBSD: readconf.h,v 1.40.2.1 2002/03/07 17:37:47 jason Exp $ */
1.40.2.1 jason 2:
1.1 deraadt 3: /*
1.11 deraadt 4: * Author: Tatu Ylonen <ylo@cs.hut.fi>
5: * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6: * All rights reserved
7: * Functions for reading the configuration file.
1.15 markus 8: *
1.21 deraadt 9: * As far as I am concerned, the code I have written for this software
10: * can be used freely for any purpose. Any derived versions of this
11: * software must be clearly marked as such, and if the derived work is
12: * incompatible with the protocol description in the RFC file, it must be
13: * called by a name other than "ssh" or "Secure Shell".
1.11 deraadt 14: */
1.1 deraadt 15:
16: #ifndef READCONF_H
17: #define READCONF_H
18:
1.27 markus 19: #include "key.h"
20:
1.1 deraadt 21: /* Data structure for representing a forwarding request. */
22:
1.11 deraadt 23: typedef struct {
1.13 markus 24: u_short port; /* Port to forward. */
25: char *host; /* Host to connect. */
26: u_short host_port; /* Port to connect on host. */
1.11 deraadt 27: } Forward;
1.1 deraadt 28: /* Data structure for representing option data. */
29:
1.11 deraadt 30: typedef struct {
31: int forward_agent; /* Forward authentication agent. */
32: int forward_x11; /* Forward X11 display. */
1.19 markus 33: char *xauth_location; /* Location for xauth program */
1.11 deraadt 34: int gateway_ports; /* Allow remote connects to forwarded ports. */
35: int use_privileged_port; /* Don't use privileged port if false. */
36: int rhosts_authentication; /* Try rhosts authentication. */
37: int rhosts_rsa_authentication; /* Try rhosts with RSA
38: * authentication. */
39: int rsa_authentication; /* Try RSA authentication. */
1.23 markus 40: int pubkey_authentication; /* Try ssh2 pubkey authentication. */
1.29 markus 41: int hostbased_authentication; /* ssh2's rhosts_rsa */
1.32 markus 42: int challenge_response_authentication;
1.25 markus 43: /* Try S/Key or TIS, authentication. */
1.34 dugsong 44: #if defined(KRB4) || defined(KRB5)
45: int kerberos_authentication; /* Try Kerberos authentication. */
46: #endif
47: #if defined(AFS) || defined(KRB5)
48: int kerberos_tgt_passing; /* Try Kerberos TGT passing. */
1.1 deraadt 49: #endif
1.3 dugsong 50: #ifdef AFS
1.11 deraadt 51: int afs_token_passing; /* Try AFS token passing. */
1.1 deraadt 52: #endif
1.11 deraadt 53: int password_authentication; /* Try password
54: * authentication. */
1.22 markus 55: int kbd_interactive_authentication; /* Try keyboard-interactive auth. */
56: char *kbd_interactive_devices; /* Keyboard-interactive auth devices. */
1.11 deraadt 57: int fallback_to_rsh;/* Use rsh if cannot connect with ssh. */
58: int use_rsh; /* Always use rsh (don\'t try ssh). */
59: int batch_mode; /* Batch mode: do not ask for passwords. */
60: int check_host_ip; /* Also keep track of keys for IP address */
61: int strict_host_key_checking; /* Strict host key checking. */
62: int compression; /* Compress packets in both directions. */
63: int compression_level; /* Compression level 1 (fast) to 9
64: * (best). */
65: int keepalives; /* Set SO_KEEPALIVE. */
66: LogLevel log_level; /* Level for logging. */
67:
68: int port; /* Port to connect. */
69: int connection_attempts; /* Max attempts (seconds) before
70: * giving up */
71: int number_of_password_prompts; /* Max number of password
72: * prompts. */
73: int cipher; /* Cipher to use. */
1.18 markus 74: char *ciphers; /* SSH2 ciphers in order of preference. */
1.26 markus 75: char *macs; /* SSH2 macs in order of preference. */
1.30 markus 76: char *hostkeyalgorithms; /* SSH2 server key types in order of preference. */
1.14 markus 77: int protocol; /* Protocol in order of preference. */
1.11 deraadt 78: char *hostname; /* Real host to connect. */
1.24 markus 79: char *host_key_alias; /* hostname alias for .ssh/known_hosts */
1.11 deraadt 80: char *proxy_command; /* Proxy command for connecting the host. */
81: char *user; /* User to log in as. */
82: int escape_char; /* Escape character; -2 = none */
83:
1.40.2.2! brad 84: char *system_hostfile;/* Path for /etc/ssh_known_hosts. */
1.11 deraadt 85: char *user_hostfile; /* Path for $HOME/.ssh/known_hosts. */
1.16 markus 86: char *system_hostfile2;
87: char *user_hostfile2;
1.28 markus 88: char *preferred_authentications;
1.31 markus 89: char *bind_address; /* local socket address for connection to sshd */
1.37 markus 90: char *smartcard_device; /* Smartcard reader device */
1.11 deraadt 91:
1.23 markus 92: int num_identity_files; /* Number of files for RSA/DSA identities. */
1.11 deraadt 93: char *identity_files[SSH_MAX_IDENTITY_FILES];
1.27 markus 94: Key *identity_keys[SSH_MAX_IDENTITY_FILES];
1.11 deraadt 95:
96: /* Local TCP/IP forward requests. */
97: int num_local_forwards;
98: Forward local_forwards[SSH_MAX_FORWARDS_PER_DIRECTION];
99:
100: /* Remote TCP/IP forward requests. */
101: int num_remote_forwards;
102: Forward remote_forwards[SSH_MAX_FORWARDS_PER_DIRECTION];
1.39 stevesk 103: int clear_forwardings;
1.40 markus 104: int no_host_authentication_for_localhost;
1.11 deraadt 105: } Options;
1.1 deraadt 106:
107:
1.35 markus 108: void initialize_options(Options *);
109: void fill_default_options(Options *);
1.38 stevesk 110: int read_config_file(const char *, const char *, Options *);
1.35 markus 111:
1.15 markus 112: int
1.33 itojun 113: process_config_line(Options *, const char *, char *, const char *, int, int *);
1.1 deraadt 114:
1.35 markus 115: void add_local_forward(Options *, u_short, const char *, u_short);
116: void add_remote_forward(Options *, u_short, const char *, u_short);
1.1 deraadt 117:
1.11 deraadt 118: #endif /* READCONF_H */