version 1.16, 1999/10/14 20:17:24 |
version 1.17, 1999/10/17 20:48:07 |
|
|
#endif |
#endif |
options->permit_empty_passwd = -1; |
options->permit_empty_passwd = -1; |
options->use_login = -1; |
options->use_login = -1; |
options->silent_deny = -1; |
|
options->num_allow_hosts = 0; |
|
options->num_deny_hosts = 0; |
|
options->num_allow_users = 0; |
options->num_allow_users = 0; |
options->num_deny_users = 0; |
options->num_deny_users = 0; |
options->num_allow_groups = 0; |
options->num_allow_groups = 0; |
|
|
options->permit_empty_passwd = 1; |
options->permit_empty_passwd = 1; |
if (options->use_login == -1) |
if (options->use_login == -1) |
options->use_login = 0; |
options->use_login = 0; |
if (options->silent_deny == -1) |
|
options->silent_deny = 0; |
|
} |
} |
|
|
#define WHITESPACE " \t\r\n" |
#define WHITESPACE " \t\r\n" |
|
|
#ifdef SKEY |
#ifdef SKEY |
sSkeyAuthentication, |
sSkeyAuthentication, |
#endif |
#endif |
sPasswordAuthentication, sAllowHosts, sDenyHosts, sListenAddress, |
sPasswordAuthentication, sListenAddress, |
sPrintMotd, sIgnoreRhosts, sX11Forwarding, sX11DisplayOffset, |
sPrintMotd, sIgnoreRhosts, sX11Forwarding, sX11DisplayOffset, |
sStrictModes, sEmptyPasswd, sRandomSeedFile, sKeepAlives, sCheckMail, |
sStrictModes, sEmptyPasswd, sRandomSeedFile, sKeepAlives, sCheckMail, |
sUseLogin, sSilentDeny, sAllowUsers, sDenyUsers, sAllowGroups, sDenyGroups |
sUseLogin, sAllowUsers, sDenyUsers, sAllowGroups, sDenyGroups |
|
|
} ServerOpCodes; |
} ServerOpCodes; |
|
|
|
|
#ifdef SKEY |
#ifdef SKEY |
{ "skeyauthentication", sSkeyAuthentication }, |
{ "skeyauthentication", sSkeyAuthentication }, |
#endif |
#endif |
{ "allowhosts", sAllowHosts }, |
|
{ "checkmail", sCheckMail }, |
{ "checkmail", sCheckMail }, |
{ "denyhosts", sDenyHosts }, |
|
{ "listenaddress", sListenAddress }, |
{ "listenaddress", sListenAddress }, |
{ "printmotd", sPrintMotd }, |
{ "printmotd", sPrintMotd }, |
{ "ignorerhosts", sIgnoreRhosts }, |
{ "ignorerhosts", sIgnoreRhosts }, |
|
|
{ "strictmodes", sStrictModes }, |
{ "strictmodes", sStrictModes }, |
{ "permitemptypasswords", sEmptyPasswd }, |
{ "permitemptypasswords", sEmptyPasswd }, |
{ "uselogin", sUseLogin }, |
{ "uselogin", sUseLogin }, |
{ "silentdeny", sSilentDeny }, |
|
{ "randomseed", sRandomSeedFile }, |
{ "randomseed", sRandomSeedFile }, |
{ "keepalive", sKeepAlives }, |
{ "keepalive", sKeepAlives }, |
{ "allowusers", sAllowUsers }, |
{ "allowusers", sAllowUsers }, |
|
|
intptr = &options->use_login; |
intptr = &options->use_login; |
goto parse_flag; |
goto parse_flag; |
|
|
case sSilentDeny: |
|
intptr = &options->silent_deny; |
|
goto parse_flag; |
|
|
|
case sLogFacility: |
case sLogFacility: |
cp = strtok(NULL, WHITESPACE); |
cp = strtok(NULL, WHITESPACE); |
if (!cp) |
if (!cp) |
|
|
options->log_facility = log_facilities[i].facility; |
options->log_facility = log_facilities[i].facility; |
break; |
break; |
|
|
case sAllowHosts: |
|
while ((cp = strtok(NULL, WHITESPACE))) |
|
{ |
|
if (options->num_allow_hosts >= MAX_ALLOW_HOSTS) |
|
{ |
|
fprintf(stderr, "%s line %d: too many allow hosts.\n", |
|
filename, linenum); |
|
exit(1); |
|
} |
|
options->allow_hosts[options->num_allow_hosts++] = xstrdup(cp); |
|
} |
|
break; |
|
|
|
case sDenyHosts: |
|
while ((cp = strtok(NULL, WHITESPACE))) |
|
{ |
|
if (options->num_deny_hosts >= MAX_DENY_HOSTS) |
|
{ |
|
fprintf(stderr, "%s line %d: too many deny hosts.\n", |
|
filename, linenum); |
|
exit(1); |
|
} |
|
options->deny_hosts[options->num_deny_hosts++] = xstrdup(cp); |
|
} |
|
break; |
|
|
|
case sAllowUsers: |
case sAllowUsers: |
while ((cp = strtok(NULL, WHITESPACE))) |
while ((cp = strtok(NULL, WHITESPACE))) |
{ |
{ |