version 1.395, 2012/11/04 10:38:43 |
version 1.396, 2012/11/04 11:09:15 |
|
|
int remote_port; |
int remote_port; |
char *line; |
char *line; |
int config_s[2] = { -1 , -1 }; |
int config_s[2] = { -1 , -1 }; |
|
u_int n; |
u_int64_t ibytes, obytes; |
u_int64_t ibytes, obytes; |
mode_t new_umask; |
mode_t new_umask; |
Key *key; |
Key *key; |
|
|
strcasecmp(options.authorized_keys_command, "none") != 0)) |
strcasecmp(options.authorized_keys_command, "none") != 0)) |
fatal("AuthorizedKeysCommand set without " |
fatal("AuthorizedKeysCommand set without " |
"AuthorizedKeysCommandUser"); |
"AuthorizedKeysCommandUser"); |
|
|
|
/* |
|
* Check whether there is any path through configured auth methods. |
|
* Unfortunately it is not possible to verify this generally before |
|
* daemonisation in the presence of Match block, but this catches |
|
* and warns for trivial misconfigurations that could break login. |
|
*/ |
|
if (options.num_auth_methods != 0) { |
|
if ((options.protocol & SSH_PROTO_1)) |
|
fatal("AuthenticationMethods is not supported with " |
|
"SSH protocol 1"); |
|
for (n = 0; n < options.num_auth_methods; n++) { |
|
if (auth2_methods_valid(options.auth_methods[n], |
|
1) == 0) |
|
break; |
|
} |
|
if (n >= options.num_auth_methods) |
|
fatal("AuthenticationMethods cannot be satisfied by " |
|
"enabled authentication methods"); |
|
} |
|
|
/* set default channel AF */ |
/* set default channel AF */ |
channel_set_af(options.address_family); |
channel_set_af(options.address_family); |