version 1.37, 2000/05/03 10:21:47 |
version 1.38, 2000/05/03 18:03:06 |
|
|
options->num_deny_groups = 0; |
options->num_deny_groups = 0; |
options->ciphers = NULL; |
options->ciphers = NULL; |
options->protocol = SSH_PROTO_UNKNOWN; |
options->protocol = SSH_PROTO_UNKNOWN; |
|
options->gateway_ports = -1; |
} |
} |
|
|
void |
void |
|
|
options->use_login = 0; |
options->use_login = 0; |
if (options->protocol == SSH_PROTO_UNKNOWN) |
if (options->protocol == SSH_PROTO_UNKNOWN) |
options->protocol = SSH_PROTO_1|SSH_PROTO_2; |
options->protocol = SSH_PROTO_1|SSH_PROTO_2; |
|
if (options->gateway_ports == -1) |
|
options->gateway_ports = 0; |
} |
} |
|
|
#define WHITESPACE " \t\r\n" |
#define WHITESPACE " \t\r\n" |
|
|
sPrintMotd, sIgnoreRhosts, sX11Forwarding, sX11DisplayOffset, |
sPrintMotd, sIgnoreRhosts, sX11Forwarding, sX11DisplayOffset, |
sStrictModes, sEmptyPasswd, sRandomSeedFile, sKeepAlives, sCheckMail, |
sStrictModes, sEmptyPasswd, sRandomSeedFile, sKeepAlives, sCheckMail, |
sUseLogin, sAllowUsers, sDenyUsers, sAllowGroups, sDenyGroups, |
sUseLogin, sAllowUsers, sDenyUsers, sAllowGroups, sDenyGroups, |
sIgnoreUserKnownHosts, sHostDSAKeyFile, sCiphers, sProtocol, sPidFile |
sIgnoreUserKnownHosts, sHostDSAKeyFile, sCiphers, sProtocol, sPidFile, |
|
sGatewayPorts |
} ServerOpCodes; |
} ServerOpCodes; |
|
|
/* Textual representation of the tokens. */ |
/* Textual representation of the tokens. */ |
|
|
{ "denygroups", sDenyGroups }, |
{ "denygroups", sDenyGroups }, |
{ "ciphers", sCiphers }, |
{ "ciphers", sCiphers }, |
{ "protocol", sProtocol }, |
{ "protocol", sProtocol }, |
|
{ "gatewayports", sGatewayPorts }, |
{ NULL, 0 } |
{ NULL, 0 } |
}; |
}; |
|
|
|
|
|
|
case sUseLogin: |
case sUseLogin: |
intptr = &options->use_login; |
intptr = &options->use_login; |
|
goto parse_flag; |
|
|
|
case sGatewayPorts: |
|
intptr = &options->gateway_ports; |
goto parse_flag; |
goto parse_flag; |
|
|
case sLogFacility: |
case sLogFacility: |