version 1.420.4.1, 2014/04/21 00:30:48 |
version 1.421, 2014/03/26 19:58:37 |
|
|
#include "ssh-sandbox.h" |
#include "ssh-sandbox.h" |
#include "version.h" |
#include "version.h" |
|
|
#ifdef LIBWRAP |
|
#include <tcpd.h> |
|
#include <syslog.h> |
|
int allow_severity = LOG_INFO; |
|
int deny_severity = LOG_WARNING; |
|
#endif /* LIBWRAP */ |
|
|
|
#ifndef O_NOCTTY |
#ifndef O_NOCTTY |
#define O_NOCTTY 0 |
#define O_NOCTTY 0 |
#endif |
#endif |
|
|
*/ |
*/ |
remote_ip = get_remote_ipaddr(); |
remote_ip = get_remote_ipaddr(); |
|
|
#ifdef LIBWRAP |
|
/* Check whether logins are denied from this host. */ |
|
if (packet_connection_is_on_socket()) { |
|
struct request_info req; |
|
|
|
request_init(&req, RQ_DAEMON, __progname, RQ_FILE, sock_in, 0); |
|
fromhost(&req); |
|
|
|
if (!hosts_access(&req)) { |
|
debug("Connection refused by tcp wrapper"); |
|
refuse(&req); |
|
/* NOTREACHED */ |
|
fatal("libwrap refuse returns"); |
|
} |
|
} |
|
#endif /* LIBWRAP */ |
|
|
|
/* Log the connection. */ |
/* Log the connection. */ |
verbose("Connection from %s port %d on %s port %d", |
verbose("Connection from %s port %d on %s port %d", |
remote_ip, remote_port, |
remote_ip, remote_port, |
|
|
} |
} |
if (options.kex_algorithms != NULL) |
if (options.kex_algorithms != NULL) |
myproposal[PROPOSAL_KEX_ALGS] = options.kex_algorithms; |
myproposal[PROPOSAL_KEX_ALGS] = options.kex_algorithms; |
|
|
myproposal[PROPOSAL_KEX_ALGS] = compat_kex_proposal( |
|
myproposal[PROPOSAL_KEX_ALGS]); |
|
|
|
if (options.rekey_limit || options.rekey_interval) |
if (options.rekey_limit || options.rekey_interval) |
packet_set_rekey_limits((u_int32_t)options.rekey_limit, |
packet_set_rekey_limits((u_int32_t)options.rekey_limit, |