Annotation of src/usr.bin/ssh/readconf.h, Revision 1.54
1.54 ! markus 1: /* $OpenBSD: readconf.h,v 1.53 2003/08/13 08:46:30 markus Exp $ */
1.42 stevesk 2:
1.1 deraadt 3: /*
1.11 deraadt 4: * Author: Tatu Ylonen <ylo@cs.hut.fi>
5: * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6: * All rights reserved
7: * Functions for reading the configuration file.
1.15 markus 8: *
1.21 deraadt 9: * As far as I am concerned, the code I have written for this software
10: * can be used freely for any purpose. Any derived versions of this
11: * software must be clearly marked as such, and if the derived work is
12: * incompatible with the protocol description in the RFC file, it must be
13: * called by a name other than "ssh" or "Secure Shell".
1.11 deraadt 14: */
1.1 deraadt 15:
16: #ifndef READCONF_H
17: #define READCONF_H
18:
1.27 markus 19: #include "key.h"
20:
1.1 deraadt 21: /* Data structure for representing a forwarding request. */
22:
1.11 deraadt 23: typedef struct {
1.13 markus 24: u_short port; /* Port to forward. */
25: char *host; /* Host to connect. */
26: u_short host_port; /* Port to connect on host. */
1.11 deraadt 27: } Forward;
1.1 deraadt 28: /* Data structure for representing option data. */
29:
1.11 deraadt 30: typedef struct {
31: int forward_agent; /* Forward authentication agent. */
32: int forward_x11; /* Forward X11 display. */
1.19 markus 33: char *xauth_location; /* Location for xauth program */
1.11 deraadt 34: int gateway_ports; /* Allow remote connects to forwarded ports. */
35: int use_privileged_port; /* Don't use privileged port if false. */
36: int rhosts_rsa_authentication; /* Try rhosts with RSA
37: * authentication. */
38: int rsa_authentication; /* Try RSA authentication. */
1.23 markus 39: int pubkey_authentication; /* Try ssh2 pubkey authentication. */
1.29 markus 40: int hostbased_authentication; /* ssh2's rhosts_rsa */
1.32 markus 41: int challenge_response_authentication;
1.25 markus 42: /* Try S/Key or TIS, authentication. */
1.34 dugsong 43: int kerberos_authentication; /* Try Kerberos authentication. */
44: int kerberos_tgt_passing; /* Try Kerberos TGT passing. */
1.54 ! markus 45: int gss_authentication; /* Try GSS authentication */
! 46: int gss_deleg_creds; /* Delegate GSS credentials */
1.11 deraadt 47: int password_authentication; /* Try password
48: * authentication. */
1.22 markus 49: int kbd_interactive_authentication; /* Try keyboard-interactive auth. */
50: char *kbd_interactive_devices; /* Keyboard-interactive auth devices. */
1.11 deraadt 51: int batch_mode; /* Batch mode: do not ask for passwords. */
52: int check_host_ip; /* Also keep track of keys for IP address */
53: int strict_host_key_checking; /* Strict host key checking. */
54: int compression; /* Compress packets in both directions. */
55: int compression_level; /* Compression level 1 (fast) to 9
56: * (best). */
57: int keepalives; /* Set SO_KEEPALIVE. */
58: LogLevel log_level; /* Level for logging. */
59:
60: int port; /* Port to connect. */
1.51 djm 61: int address_family;
1.11 deraadt 62: int connection_attempts; /* Max attempts (seconds) before
63: * giving up */
1.50 djm 64: int connection_timeout; /* Max time (seconds) before
65: * aborting connection attempt */
1.11 deraadt 66: int number_of_password_prompts; /* Max number of password
67: * prompts. */
68: int cipher; /* Cipher to use. */
1.18 markus 69: char *ciphers; /* SSH2 ciphers in order of preference. */
1.26 markus 70: char *macs; /* SSH2 macs in order of preference. */
1.30 markus 71: char *hostkeyalgorithms; /* SSH2 server key types in order of preference. */
1.14 markus 72: int protocol; /* Protocol in order of preference. */
1.11 deraadt 73: char *hostname; /* Real host to connect. */
1.24 markus 74: char *host_key_alias; /* hostname alias for .ssh/known_hosts */
1.11 deraadt 75: char *proxy_command; /* Proxy command for connecting the host. */
76: char *user; /* User to log in as. */
77: int escape_char; /* Escape character; -2 = none */
78:
1.41 deraadt 79: char *system_hostfile;/* Path for /etc/ssh/ssh_known_hosts. */
1.11 deraadt 80: char *user_hostfile; /* Path for $HOME/.ssh/known_hosts. */
1.16 markus 81: char *system_hostfile2;
82: char *user_hostfile2;
1.28 markus 83: char *preferred_authentications;
1.31 markus 84: char *bind_address; /* local socket address for connection to sshd */
1.37 markus 85: char *smartcard_device; /* Smartcard reader device */
1.48 jakob 86: int verify_host_key_dns; /* Verify host key using DNS */
1.11 deraadt 87:
1.23 markus 88: int num_identity_files; /* Number of files for RSA/DSA identities. */
1.11 deraadt 89: char *identity_files[SSH_MAX_IDENTITY_FILES];
1.27 markus 90: Key *identity_keys[SSH_MAX_IDENTITY_FILES];
1.11 deraadt 91:
92: /* Local TCP/IP forward requests. */
93: int num_local_forwards;
94: Forward local_forwards[SSH_MAX_FORWARDS_PER_DIRECTION];
95:
96: /* Remote TCP/IP forward requests. */
97: int num_remote_forwards;
98: Forward remote_forwards[SSH_MAX_FORWARDS_PER_DIRECTION];
1.39 stevesk 99: int clear_forwardings;
1.44 markus 100:
101: int enable_ssh_keysign;
1.47 markus 102: int rekey_limit;
1.40 markus 103: int no_host_authentication_for_localhost;
1.11 deraadt 104: } Options;
1.1 deraadt 105:
106:
1.35 markus 107: void initialize_options(Options *);
108: void fill_default_options(Options *);
1.38 stevesk 109: int read_config_file(const char *, const char *, Options *);
1.35 markus 110:
1.15 markus 111: int
1.33 itojun 112: process_config_line(Options *, const char *, char *, const char *, int, int *);
1.1 deraadt 113:
1.35 markus 114: void add_local_forward(Options *, u_short, const char *, u_short);
115: void add_remote_forward(Options *, u_short, const char *, u_short);
1.1 deraadt 116:
1.11 deraadt 117: #endif /* READCONF_H */