|
Lines 318-324
static struct {
Link Here
|
| 318 |
{ "gssapiauthentication", sUnsupported, SSHCFG_GLOBAL }, |
318 |
{ "gssapiauthentication", sUnsupported, SSHCFG_GLOBAL }, |
| 319 |
{ "gssapicleanupcredentials", sUnsupported, SSHCFG_GLOBAL }, |
319 |
{ "gssapicleanupcredentials", sUnsupported, SSHCFG_GLOBAL }, |
| 320 |
#endif |
320 |
#endif |
| 321 |
{ "passwordauthentication", sPasswordAuthentication, SSHCFG_GLOBAL }, |
321 |
{ "passwordauthentication", sPasswordAuthentication, SSHCFG_ALL }, |
| 322 |
{ "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_GLOBAL }, |
322 |
{ "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_GLOBAL }, |
| 323 |
{ "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, |
323 |
{ "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, |
| 324 |
{ "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */ |
324 |
{ "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */ |
|
Lines 352-358
static struct {
Link Here
|
| 352 |
{ "subsystem", sSubsystem, SSHCFG_GLOBAL }, |
352 |
{ "subsystem", sSubsystem, SSHCFG_GLOBAL }, |
| 353 |
{ "maxstartups", sMaxStartups, SSHCFG_GLOBAL }, |
353 |
{ "maxstartups", sMaxStartups, SSHCFG_GLOBAL }, |
| 354 |
{ "maxauthtries", sMaxAuthTries, SSHCFG_GLOBAL }, |
354 |
{ "maxauthtries", sMaxAuthTries, SSHCFG_GLOBAL }, |
| 355 |
{ "banner", sBanner, SSHCFG_GLOBAL }, |
355 |
{ "banner", sBanner, SSHCFG_ALL }, |
| 356 |
{ "usedns", sUseDNS, SSHCFG_GLOBAL }, |
356 |
{ "usedns", sUseDNS, SSHCFG_GLOBAL }, |
| 357 |
{ "verifyreversemapping", sDeprecated, SSHCFG_GLOBAL }, |
357 |
{ "verifyreversemapping", sDeprecated, SSHCFG_GLOBAL }, |
| 358 |
{ "reversemappingcheck", sDeprecated, SSHCFG_GLOBAL }, |
358 |
{ "reversemappingcheck", sDeprecated, SSHCFG_GLOBAL }, |
|
Lines 1273-1285
parse_server_match_config(ServerOptions
Link Here
|
| 1273 |
|
1273 |
|
| 1274 |
initialize_server_options(&mo); |
1274 |
initialize_server_options(&mo); |
| 1275 |
parse_server_config(&mo, "reprocess config", &cfg, user, host, address); |
1275 |
parse_server_config(&mo, "reprocess config", &cfg, user, host, address); |
| 1276 |
copy_set_server_options(options, &mo); |
1276 |
copy_set_server_options(options, &mo, 0); |
| 1277 |
} |
1277 |
} |
| 1278 |
|
1278 |
|
| 1279 |
/* Copy any (supported) values that are set */ |
1279 |
/* |
|
|
1280 |
* Copy any supported values that are set. |
| 1281 |
* |
| 1282 |
* If the preauth flag is set, we do not bother copying the the string or |
| 1283 |
* array values that are not used pre-authentication, because any that we |
| 1284 |
* do use must be explictly sent in mm_getpwnamallow(). |
| 1285 |
*/ |
| 1280 |
void |
1286 |
void |
| 1281 |
copy_set_server_options(ServerOptions *dst, ServerOptions *src) |
1287 |
copy_set_server_options(ServerOptions *dst, ServerOptions *src, int preauth) |
| 1282 |
{ |
1288 |
{ |
|
|
1289 |
if (src->password_authentication != -1) |
| 1290 |
dst->password_authentication = src->password_authentication; |
| 1291 |
if (src->banner != NULL) { |
| 1292 |
if (dst->banner != NULL) |
| 1293 |
xfree(dst->banner); |
| 1294 |
dst->banner = src->banner; |
| 1295 |
} |
| 1296 |
if (preauth) |
| 1297 |
return; |
| 1283 |
if (src->allow_tcp_forwarding != -1) |
1298 |
if (src->allow_tcp_forwarding != -1) |
| 1284 |
dst->allow_tcp_forwarding = src->allow_tcp_forwarding; |
1299 |
dst->allow_tcp_forwarding = src->allow_tcp_forwarding; |
| 1285 |
if (src->gateway_ports != -1) |
1300 |
if (src->gateway_ports != -1) |