version 1.333, 2018/06/19 02:59:41 |
version 1.334, 2018/07/03 10:59:35 |
|
|
options->challenge_response_authentication = -1; |
options->challenge_response_authentication = -1; |
options->permit_empty_passwd = -1; |
options->permit_empty_passwd = -1; |
options->permit_user_env = -1; |
options->permit_user_env = -1; |
|
options->permit_user_env_whitelist = NULL; |
options->compression = -1; |
options->compression = -1; |
options->rekey_limit = -1; |
options->rekey_limit = -1; |
options->rekey_interval = -1; |
options->rekey_interval = -1; |
|
|
options->challenge_response_authentication = 1; |
options->challenge_response_authentication = 1; |
if (options->permit_empty_passwd == -1) |
if (options->permit_empty_passwd == -1) |
options->permit_empty_passwd = 0; |
options->permit_empty_passwd = 0; |
if (options->permit_user_env == -1) |
if (options->permit_user_env == -1) { |
options->permit_user_env = 0; |
options->permit_user_env = 0; |
|
options->permit_user_env_whitelist = NULL; |
|
} |
if (options->compression == -1) |
if (options->compression == -1) |
options->compression = COMP_DELAYED; |
options->compression = COMP_DELAYED; |
if (options->rekey_limit == -1) |
if (options->rekey_limit == -1) |
|
|
|
|
case sPermitUserEnvironment: |
case sPermitUserEnvironment: |
intptr = &options->permit_user_env; |
intptr = &options->permit_user_env; |
goto parse_flag; |
charptr = &options->permit_user_env_whitelist; |
|
arg = strdelim(&cp); |
|
if (!arg || *arg == '\0') |
|
fatal("%s line %d: missing argument.", |
|
filename, linenum); |
|
value = 0; |
|
p = NULL; |
|
if (strcmp(arg, "yes") == 0) |
|
value = 1; |
|
else if (strcmp(arg, "no") == 0) |
|
value = 0; |
|
else { |
|
/* Pattern-list specified */ |
|
value = 1; |
|
p = xstrdup(arg); |
|
} |
|
if (*activep && *intptr == -1) { |
|
*intptr = value; |
|
*charptr = p; |
|
p = NULL; |
|
} |
|
free(p); |
|
break; |
|
|
case sCompression: |
case sCompression: |
intptr = &options->compression; |
intptr = &options->compression; |
|
|
dump_cfg_fmtint(sStrictModes, o->strict_modes); |
dump_cfg_fmtint(sStrictModes, o->strict_modes); |
dump_cfg_fmtint(sTCPKeepAlive, o->tcp_keep_alive); |
dump_cfg_fmtint(sTCPKeepAlive, o->tcp_keep_alive); |
dump_cfg_fmtint(sEmptyPasswd, o->permit_empty_passwd); |
dump_cfg_fmtint(sEmptyPasswd, o->permit_empty_passwd); |
dump_cfg_fmtint(sPermitUserEnvironment, o->permit_user_env); |
|
dump_cfg_fmtint(sCompression, o->compression); |
dump_cfg_fmtint(sCompression, o->compression); |
dump_cfg_fmtint(sGatewayPorts, o->fwd_opts.gateway_ports); |
dump_cfg_fmtint(sGatewayPorts, o->fwd_opts.gateway_ports); |
dump_cfg_fmtint(sUseDNS, o->use_dns); |
dump_cfg_fmtint(sUseDNS, o->use_dns); |
|
|
printf(" %s", o->permitted_listens[i]); |
printf(" %s", o->permitted_listens[i]); |
} |
} |
printf("\n"); |
printf("\n"); |
|
|
|
if (o->permit_user_env_whitelist == NULL) { |
|
dump_cfg_fmtint(sPermitUserEnvironment, o->permit_user_env); |
|
} else { |
|
printf("permituserenvironment %s\n", |
|
o->permit_user_env_whitelist); |
|
} |
|
|
} |
} |