version 1.41, 2001/04/13 22:46:53 |
version 1.41.2.3, 2002/06/02 22:56:10 |
|
|
|
/* $OpenBSD$ */ |
|
|
/* |
/* |
* Author: Tatu Ylonen <ylo@cs.hut.fi> |
* Author: Tatu Ylonen <ylo@cs.hut.fi> |
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
|
|
* called by a name other than "ssh" or "Secure Shell". |
* called by a name other than "ssh" or "Secure Shell". |
*/ |
*/ |
|
|
/* RCSID("$OpenBSD$"); */ |
|
|
|
#ifndef SERVCONF_H |
#ifndef SERVCONF_H |
#define SERVCONF_H |
#define SERVCONF_H |
|
|
|
|
* for RhostsRsaAuth */ |
* for RhostsRsaAuth */ |
int print_motd; /* If true, print /etc/motd. */ |
int print_motd; /* If true, print /etc/motd. */ |
int print_lastlog; /* If true, print lastlog */ |
int print_lastlog; /* If true, print lastlog */ |
int check_mail; /* If true, check for new mail. */ |
|
int x11_forwarding; /* If true, permit inet (spoofing) X11 fwd. */ |
int x11_forwarding; /* If true, permit inet (spoofing) X11 fwd. */ |
int x11_display_offset; /* What DISPLAY number to start |
int x11_display_offset; /* What DISPLAY number to start |
* searching at */ |
* searching at */ |
|
int x11_use_localhost; /* If true, use localhost for fake X11 server. */ |
char *xauth_location; /* Location of xauth program */ |
char *xauth_location; /* Location of xauth program */ |
int strict_modes; /* If true, require string home dir modes. */ |
int strict_modes; /* If true, require string home dir modes. */ |
int keepalives; /* If true, set SO_KEEPALIVE. */ |
int keepalives; /* If true, set SO_KEEPALIVE. */ |
|
|
int hostbased_uses_name_from_packet_only; /* experimental */ |
int hostbased_uses_name_from_packet_only; /* experimental */ |
int rsa_authentication; /* If true, permit RSA authentication. */ |
int rsa_authentication; /* If true, permit RSA authentication. */ |
int pubkey_authentication; /* If true, permit ssh2 pubkey authentication. */ |
int pubkey_authentication; /* If true, permit ssh2 pubkey authentication. */ |
#ifdef KRB4 |
#if defined(KRB4) || defined(KRB5) |
int kerberos_authentication; /* If true, permit Kerberos |
int kerberos_authentication; /* If true, permit Kerberos |
* authentication. */ |
* authentication. */ |
int kerberos_or_local_passwd; /* If true, permit kerberos |
int kerberos_or_local_passwd; /* If true, permit kerberos |
|
|
int kerberos_ticket_cleanup; /* If true, destroy ticket |
int kerberos_ticket_cleanup; /* If true, destroy ticket |
* file on logout. */ |
* file on logout. */ |
#endif |
#endif |
#ifdef AFS |
#if defined(AFS) || defined(KRB5) |
int kerberos_tgt_passing; /* If true, permit Kerberos tgt |
int kerberos_tgt_passing; /* If true, permit Kerberos TGT |
* passing. */ |
* passing. */ |
|
#endif |
|
#ifdef AFS |
int afs_token_passing; /* If true, permit AFS token passing. */ |
int afs_token_passing; /* If true, permit AFS token passing. */ |
#endif |
#endif |
int password_authentication; /* If true, permit password |
int password_authentication; /* If true, permit password |
* authentication. */ |
* authentication. */ |
int kbd_interactive_authentication; /* If true, permit */ |
int kbd_interactive_authentication; /* If true, permit */ |
int challenge_reponse_authentication; |
int challenge_response_authentication; |
int permit_empty_passwd; /* If false, do not permit empty |
int permit_empty_passwd; /* If false, do not permit empty |
* passwords. */ |
* passwords. */ |
int use_login; /* If true, login(1) is used */ |
int use_login; /* If true, login(1) is used */ |
|
|
int max_startups_rate; |
int max_startups_rate; |
int max_startups; |
int max_startups; |
char *banner; /* SSH-2 banner message */ |
char *banner; /* SSH-2 banner message */ |
int reverse_mapping_check; /* cross-check ip and dns */ |
int verify_reverse_mapping; /* cross-check ip and dns */ |
int client_alive_interval; /* |
int client_alive_interval; /* |
* poke the client this often to |
* poke the client this often to |
* see if it's still there |
* see if it's still there |
*/ |
*/ |
int client_alive_count_max; /* |
int client_alive_count_max; /* |
*If the client is unresponsive |
* If the client is unresponsive |
* for this many intervals, above |
* for this many intervals above, |
* diconnect the session |
* disconnect the session |
*/ |
*/ |
|
|
|
char *authorized_keys_file; /* File containing public keys */ |
|
char *authorized_keys_file2; |
} ServerOptions; |
} ServerOptions; |
/* |
|
* Initializes the server options to special values that indicate that they |
|
* have not yet been set. |
|
*/ |
|
void initialize_server_options(ServerOptions * options); |
|
|
|
/* |
void initialize_server_options(ServerOptions *); |
* Reads the server configuration file. This only sets the values for those |
void read_server_config(ServerOptions *, const char *); |
* options that have the special value indicating they have not been set. |
void fill_default_server_options(ServerOptions *); |
*/ |
int process_server_config_line(ServerOptions *, char *, const char *, int); |
void read_server_config(ServerOptions * options, const char *filename); |
|
|
|
/* Sets values for those values that have not yet been set. */ |
|
void fill_default_server_options(ServerOptions * options); |
|
|
|
#endif /* SERVCONF_H */ |
#endif /* SERVCONF_H */ |