version 1.214, 2011/03/29 18:54:17 |
version 1.215, 2011/05/11 04:47:06 |
|
|
options->client_alive_interval = -1; |
options->client_alive_interval = -1; |
options->client_alive_count_max = -1; |
options->client_alive_count_max = -1; |
options->authorized_keys_file = NULL; |
options->authorized_keys_file = NULL; |
options->authorized_keys_file2 = NULL; |
|
options->num_accept_env = 0; |
options->num_accept_env = 0; |
options->permit_tun = -1; |
options->permit_tun = -1; |
options->num_permitted_opens = -1; |
options->num_permitted_opens = -1; |
|
|
options->client_alive_interval = 0; |
options->client_alive_interval = 0; |
if (options->client_alive_count_max == -1) |
if (options->client_alive_count_max == -1) |
options->client_alive_count_max = 3; |
options->client_alive_count_max = 3; |
if (options->authorized_keys_file2 == NULL) { |
|
/* authorized_keys_file2 falls back to authorized_keys_file */ |
|
if (options->authorized_keys_file != NULL) |
|
options->authorized_keys_file2 = xstrdup(options->authorized_keys_file); |
|
else |
|
options->authorized_keys_file2 = xstrdup(_PATH_SSH_USER_PERMITTED_KEYS2); |
|
} |
|
if (options->authorized_keys_file == NULL) |
if (options->authorized_keys_file == NULL) |
options->authorized_keys_file = xstrdup(_PATH_SSH_USER_PERMITTED_KEYS); |
options->authorized_keys_file = xstrdup(_PATH_SSH_USER_PERMITTED_KEYS); |
if (options->permit_tun == -1) |
if (options->permit_tun == -1) |
|
|
case sAuthorizedKeysFile: |
case sAuthorizedKeysFile: |
charptr = &options->authorized_keys_file; |
charptr = &options->authorized_keys_file; |
goto parse_tilde_filename; |
goto parse_tilde_filename; |
case sAuthorizedKeysFile2: |
|
charptr = &options->authorized_keys_file2; |
|
goto parse_tilde_filename; |
|
case sAuthorizedPrincipalsFile: |
case sAuthorizedPrincipalsFile: |
charptr = &options->authorized_principals_file; |
charptr = &options->authorized_principals_file; |
parse_tilde_filename: |
parse_tilde_filename: |
|
|
M_CP_STROPT(trusted_user_ca_keys); |
M_CP_STROPT(trusted_user_ca_keys); |
M_CP_STROPT(revoked_keys_file); |
M_CP_STROPT(revoked_keys_file); |
M_CP_STROPT(authorized_keys_file); |
M_CP_STROPT(authorized_keys_file); |
M_CP_STROPT(authorized_keys_file2); |
|
M_CP_STROPT(authorized_principals_file); |
M_CP_STROPT(authorized_principals_file); |
} |
} |
|
|
|
|
dump_cfg_string(sMacs, o->macs); |
dump_cfg_string(sMacs, o->macs); |
dump_cfg_string(sBanner, o->banner); |
dump_cfg_string(sBanner, o->banner); |
dump_cfg_string(sAuthorizedKeysFile, o->authorized_keys_file); |
dump_cfg_string(sAuthorizedKeysFile, o->authorized_keys_file); |
dump_cfg_string(sAuthorizedKeysFile2, o->authorized_keys_file2); |
|
dump_cfg_string(sForceCommand, o->adm_forced_command); |
dump_cfg_string(sForceCommand, o->adm_forced_command); |
dump_cfg_string(sChrootDirectory, o->chroot_directory); |
dump_cfg_string(sChrootDirectory, o->chroot_directory); |
dump_cfg_string(sTrustedUserCAKeys, o->trusted_user_ca_keys); |
dump_cfg_string(sTrustedUserCAKeys, o->trusted_user_ca_keys); |