version 1.137, 2004/08/13 11:09:24 |
version 1.138, 2004/12/23 23:11:00 |
|
|
static void add_listen_addr(ServerOptions *, char *, u_short); |
static void add_listen_addr(ServerOptions *, char *, u_short); |
static void add_one_listen_addr(ServerOptions *, char *, u_short); |
static void add_one_listen_addr(ServerOptions *, char *, u_short); |
|
|
/* AF_UNSPEC or AF_INET or AF_INET6 */ |
|
extern int IPv4or6; |
|
/* Use of privilege separation or not */ |
/* Use of privilege separation or not */ |
extern int use_privsep; |
extern int use_privsep; |
|
|
|
|
options->num_ports = 0; |
options->num_ports = 0; |
options->ports_from_cmdline = 0; |
options->ports_from_cmdline = 0; |
options->listen_addrs = NULL; |
options->listen_addrs = NULL; |
|
options->address_family = -1; |
options->num_host_key_files = 0; |
options->num_host_key_files = 0; |
options->pid_file = NULL; |
options->pid_file = NULL; |
options->server_key_bits = -1; |
options->server_key_bits = -1; |
|
|
sKerberosAuthentication, sKerberosOrLocalPasswd, sKerberosTicketCleanup, |
sKerberosAuthentication, sKerberosOrLocalPasswd, sKerberosTicketCleanup, |
sKerberosGetAFSToken, |
sKerberosGetAFSToken, |
sKerberosTgtPassing, sChallengeResponseAuthentication, |
sKerberosTgtPassing, sChallengeResponseAuthentication, |
sPasswordAuthentication, sKbdInteractiveAuthentication, sListenAddress, |
sPasswordAuthentication, sKbdInteractiveAuthentication, |
|
sListenAddress, sAddressFamily, |
sPrintMotd, sPrintLastLog, sIgnoreRhosts, |
sPrintMotd, sPrintLastLog, sIgnoreRhosts, |
sX11Forwarding, sX11DisplayOffset, sX11UseLocalhost, |
sX11Forwarding, sX11DisplayOffset, sX11UseLocalhost, |
sStrictModes, sEmptyPasswd, sTCPKeepAlive, |
sStrictModes, sEmptyPasswd, sTCPKeepAlive, |
|
|
{ "skeyauthentication", sChallengeResponseAuthentication }, /* alias */ |
{ "skeyauthentication", sChallengeResponseAuthentication }, /* alias */ |
{ "checkmail", sDeprecated }, |
{ "checkmail", sDeprecated }, |
{ "listenaddress", sListenAddress }, |
{ "listenaddress", sListenAddress }, |
|
{ "addressfamily", sAddressFamily }, |
{ "printmotd", sPrintMotd }, |
{ "printmotd", sPrintMotd }, |
{ "printlastlog", sPrintLastLog }, |
{ "printlastlog", sPrintLastLog }, |
{ "ignorerhosts", sIgnoreRhosts }, |
{ "ignorerhosts", sIgnoreRhosts }, |
|
|
|
|
if (options->num_ports == 0) |
if (options->num_ports == 0) |
options->ports[options->num_ports++] = SSH_DEFAULT_PORT; |
options->ports[options->num_ports++] = SSH_DEFAULT_PORT; |
|
if (options->address_family == -1) |
|
options->address_family = AF_UNSPEC; |
if (port == 0) |
if (port == 0) |
for (i = 0; i < options->num_ports; i++) |
for (i = 0; i < options->num_ports; i++) |
add_one_listen_addr(options, addr, options->ports[i]); |
add_one_listen_addr(options, addr, options->ports[i]); |
|
|
int gaierr; |
int gaierr; |
|
|
memset(&hints, 0, sizeof(hints)); |
memset(&hints, 0, sizeof(hints)); |
hints.ai_family = IPv4or6; |
hints.ai_family = options->address_family; |
hints.ai_socktype = SOCK_STREAM; |
hints.ai_socktype = SOCK_STREAM; |
hints.ai_flags = (addr == NULL) ? AI_PASSIVE : 0; |
hints.ai_flags = (addr == NULL) ? AI_PASSIVE : 0; |
snprintf(strport, sizeof strport, "%u", port); |
snprintf(strport, sizeof strport, "%u", port); |
|
|
else |
else |
fatal("%s line %d: bad inet addr usage.", |
fatal("%s line %d: bad inet addr usage.", |
filename, linenum); |
filename, linenum); |
|
break; |
|
|
|
case sAddressFamily: |
|
arg = strdelim(&cp); |
|
intptr = &options->address_family; |
|
if (options->listen_addrs != NULL) |
|
fatal("%s line %d: address family must be specified before " |
|
"ListenAddress.", filename, linenum); |
|
if (strcasecmp(arg, "inet") == 0) |
|
value = AF_INET; |
|
else if (strcasecmp(arg, "inet6") == 0) |
|
value = AF_INET6; |
|
else if (strcasecmp(arg, "any") == 0) |
|
value = AF_UNSPEC; |
|
else |
|
fatal("%s line %d: unsupported address family \"%s\".", |
|
filename, linenum, arg); |
|
if (*intptr == -1) |
|
*intptr = value; |
break; |
break; |
|
|
case sHostKeyFile: |
case sHostKeyFile: |