version 1.144, 2005/08/06 10:03:12 |
version 1.144.2.1, 2006/02/03 03:01:56 |
|
|
options->authorized_keys_file = NULL; |
options->authorized_keys_file = NULL; |
options->authorized_keys_file2 = NULL; |
options->authorized_keys_file2 = NULL; |
options->num_accept_env = 0; |
options->num_accept_env = 0; |
|
options->permit_tun = -1; |
|
|
/* Needs to be accessable in many places */ |
/* Needs to be accessable in many places */ |
use_privsep = -1; |
use_privsep = -1; |
|
|
} |
} |
if (options->authorized_keys_file == NULL) |
if (options->authorized_keys_file == NULL) |
options->authorized_keys_file = _PATH_SSH_USER_PERMITTED_KEYS; |
options->authorized_keys_file = _PATH_SSH_USER_PERMITTED_KEYS; |
|
if (options->permit_tun == -1) |
|
options->permit_tun = SSH_TUNMODE_NO; |
|
|
/* Turn privilege separation on by default */ |
/* Turn privilege separation on by default */ |
if (use_privsep == -1) |
if (use_privsep == -1) |
|
|
sBanner, sUseDNS, sHostbasedAuthentication, |
sBanner, sUseDNS, sHostbasedAuthentication, |
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval, |
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval, |
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2, |
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2, |
sGssAuthentication, sGssCleanupCreds, sAcceptEnv, |
sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel, |
sUsePrivilegeSeparation, |
sUsePrivilegeSeparation, |
sDeprecated, sUnsupported |
sDeprecated, sUnsupported |
} ServerOpCodes; |
} ServerOpCodes; |
|
|
{ "authorizedkeysfile2", sAuthorizedKeysFile2 }, |
{ "authorizedkeysfile2", sAuthorizedKeysFile2 }, |
{ "useprivilegeseparation", sUsePrivilegeSeparation}, |
{ "useprivilegeseparation", sUsePrivilegeSeparation}, |
{ "acceptenv", sAcceptEnv }, |
{ "acceptenv", sAcceptEnv }, |
|
{ "permittunnel", sPermitTunnel }, |
{ NULL, sBadOption } |
{ NULL, sBadOption } |
}; |
}; |
|
|
|
|
options->accept_env[options->num_accept_env++] = |
options->accept_env[options->num_accept_env++] = |
xstrdup(arg); |
xstrdup(arg); |
} |
} |
|
break; |
|
|
|
case sPermitTunnel: |
|
intptr = &options->permit_tun; |
|
arg = strdelim(&cp); |
|
if (!arg || *arg == '\0') |
|
fatal("%s line %d: Missing yes/point-to-point/" |
|
"ethernet/no argument.", filename, linenum); |
|
value = 0; /* silence compiler */ |
|
if (strcasecmp(arg, "ethernet") == 0) |
|
value = SSH_TUNMODE_ETHERNET; |
|
else if (strcasecmp(arg, "point-to-point") == 0) |
|
value = SSH_TUNMODE_POINTOPOINT; |
|
else if (strcasecmp(arg, "yes") == 0) |
|
value = SSH_TUNMODE_YES; |
|
else if (strcasecmp(arg, "no") == 0) |
|
value = SSH_TUNMODE_NO; |
|
else |
|
fatal("%s line %d: Bad yes/point-to-point/ethernet/" |
|
"no argument: %s", filename, linenum, arg); |
|
if (*intptr == -1) |
|
*intptr = value; |
break; |
break; |
|
|
case sDeprecated: |
case sDeprecated: |