version 1.226, 2012/05/13 01:42:32 |
version 1.227, 2012/06/19 18:25:27 |
|
|
{ "keepalive", sTCPKeepAlive, SSHCFG_GLOBAL }, /* obsolete alias */ |
{ "keepalive", sTCPKeepAlive, SSHCFG_GLOBAL }, /* obsolete alias */ |
{ "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL }, |
{ "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL }, |
{ "allowagentforwarding", sAllowAgentForwarding, SSHCFG_ALL }, |
{ "allowagentforwarding", sAllowAgentForwarding, SSHCFG_ALL }, |
{ "allowusers", sAllowUsers, SSHCFG_GLOBAL }, |
{ "allowusers", sAllowUsers, SSHCFG_ALL }, |
{ "denyusers", sDenyUsers, SSHCFG_GLOBAL }, |
{ "denyusers", sDenyUsers, SSHCFG_ALL }, |
{ "allowgroups", sAllowGroups, SSHCFG_GLOBAL }, |
{ "allowgroups", sAllowGroups, SSHCFG_ALL }, |
{ "denygroups", sDenyGroups, SSHCFG_GLOBAL }, |
{ "denygroups", sDenyGroups, SSHCFG_ALL }, |
{ "ciphers", sCiphers, SSHCFG_GLOBAL }, |
{ "ciphers", sCiphers, SSHCFG_GLOBAL }, |
{ "macs", sMacs, SSHCFG_GLOBAL }, |
{ "macs", sMacs, SSHCFG_GLOBAL }, |
{ "protocol", sProtocol, SSHCFG_GLOBAL }, |
{ "protocol", sProtocol, SSHCFG_GLOBAL }, |
|
|
{ "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_ALL }, |
{ "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_ALL }, |
{ "authorizedkeysfile2", sDeprecated, SSHCFG_ALL }, |
{ "authorizedkeysfile2", sDeprecated, SSHCFG_ALL }, |
{ "useprivilegeseparation", sUsePrivilegeSeparation, SSHCFG_GLOBAL}, |
{ "useprivilegeseparation", sUsePrivilegeSeparation, SSHCFG_GLOBAL}, |
{ "acceptenv", sAcceptEnv, SSHCFG_GLOBAL }, |
{ "acceptenv", sAcceptEnv, SSHCFG_ALL }, |
{ "permittunnel", sPermitTunnel, SSHCFG_ALL }, |
{ "permittunnel", sPermitTunnel, SSHCFG_ALL }, |
{ "match", sMatch, SSHCFG_ALL }, |
{ "match", sMatch, SSHCFG_ALL }, |
{ "permitopen", sPermitOpen, SSHCFG_ALL }, |
{ "permitopen", sPermitOpen, SSHCFG_ALL }, |
|
|
if (options->num_allow_users >= MAX_ALLOW_USERS) |
if (options->num_allow_users >= MAX_ALLOW_USERS) |
fatal("%s line %d: too many allow users.", |
fatal("%s line %d: too many allow users.", |
filename, linenum); |
filename, linenum); |
|
if (!*activep) |
|
continue; |
options->allow_users[options->num_allow_users++] = |
options->allow_users[options->num_allow_users++] = |
xstrdup(arg); |
xstrdup(arg); |
} |
} |
|
|
if (options->num_deny_users >= MAX_DENY_USERS) |
if (options->num_deny_users >= MAX_DENY_USERS) |
fatal("%s line %d: too many deny users.", |
fatal("%s line %d: too many deny users.", |
filename, linenum); |
filename, linenum); |
|
if (!*activep) |
|
continue; |
options->deny_users[options->num_deny_users++] = |
options->deny_users[options->num_deny_users++] = |
xstrdup(arg); |
xstrdup(arg); |
} |
} |
|
|
if (options->num_allow_groups >= MAX_ALLOW_GROUPS) |
if (options->num_allow_groups >= MAX_ALLOW_GROUPS) |
fatal("%s line %d: too many allow groups.", |
fatal("%s line %d: too many allow groups.", |
filename, linenum); |
filename, linenum); |
|
if (!*activep) |
|
continue; |
options->allow_groups[options->num_allow_groups++] = |
options->allow_groups[options->num_allow_groups++] = |
xstrdup(arg); |
xstrdup(arg); |
} |
} |
|
|
if (options->num_deny_groups >= MAX_DENY_GROUPS) |
if (options->num_deny_groups >= MAX_DENY_GROUPS) |
fatal("%s line %d: too many deny groups.", |
fatal("%s line %d: too many deny groups.", |
filename, linenum); |
filename, linenum); |
options->deny_groups[options->num_deny_groups++] = xstrdup(arg); |
if (!*activep) |
|
continue; |
|
options->deny_groups[options->num_deny_groups++] = |
|
xstrdup(arg); |
} |
} |
break; |
break; |
|
|
|
|
fatal("%s line %d: too many allow env.", |
fatal("%s line %d: too many allow env.", |
filename, linenum); |
filename, linenum); |
if (!*activep) |
if (!*activep) |
break; |
continue; |
options->accept_env[options->num_accept_env++] = |
options->accept_env[options->num_accept_env++] = |
xstrdup(arg); |
xstrdup(arg); |
} |
} |