|
Lines 123-128
Link Here
|
| 123 |
options->authorized_keys_file = NULL; |
123 |
options->authorized_keys_file = NULL; |
| 124 |
options->authorized_keys_file2 = NULL; |
124 |
options->authorized_keys_file2 = NULL; |
| 125 |
options->num_accept_env = 0; |
125 |
options->num_accept_env = 0; |
|
|
126 |
options->require_both_password_and_pub_key = -1; |
| 126 |
options->permit_tun = -1; |
127 |
options->permit_tun = -1; |
| 127 |
options->num_permitted_opens = -1; |
128 |
options->num_permitted_opens = -1; |
| 128 |
options->adm_forced_command = NULL; |
129 |
options->adm_forced_command = NULL; |
|
Lines 256-261
Link Here
|
| 256 |
} |
257 |
} |
| 257 |
if (options->authorized_keys_file == NULL) |
258 |
if (options->authorized_keys_file == NULL) |
| 258 |
options->authorized_keys_file = _PATH_SSH_USER_PERMITTED_KEYS; |
259 |
options->authorized_keys_file = _PATH_SSH_USER_PERMITTED_KEYS; |
|
|
260 |
if (options->require_both_password_and_pub_key == -1) |
| 261 |
options->require_both_password_and_pub_key = 0; |
| 262 |
else if (options->require_both_password_and_pub_key == 1) |
| 263 |
options->password_authentication = |
| 264 |
options->pubkey_authentication = 1; |
| 259 |
if (options->permit_tun == -1) |
265 |
if (options->permit_tun == -1) |
| 260 |
options->permit_tun = SSH_TUNMODE_NO; |
266 |
options->permit_tun = SSH_TUNMODE_NO; |
| 261 |
|
267 |
|
|
Lines 302-307
Link Here
|
| 302 |
sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel, |
308 |
sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel, |
| 303 |
sMatch, sPermitOpen, sForceCommand, sChrootDirectory, |
309 |
sMatch, sPermitOpen, sForceCommand, sChrootDirectory, |
| 304 |
sUsePrivilegeSeparation, sAllowAgentForwarding, |
310 |
sUsePrivilegeSeparation, sAllowAgentForwarding, |
|
|
311 |
sRequireBothPasswordAndPubKey, |
| 305 |
sDeprecated, sUnsupported |
312 |
sDeprecated, sUnsupported |
| 306 |
} ServerOpCodes; |
313 |
} ServerOpCodes; |
| 307 |
|
314 |
|
|
Lines 410-415
Link Here
|
| 410 |
{ "authorizedkeysfile2", sAuthorizedKeysFile2, SSHCFG_GLOBAL }, |
417 |
{ "authorizedkeysfile2", sAuthorizedKeysFile2, SSHCFG_GLOBAL }, |
| 411 |
{ "useprivilegeseparation", sUsePrivilegeSeparation, SSHCFG_GLOBAL }, |
418 |
{ "useprivilegeseparation", sUsePrivilegeSeparation, SSHCFG_GLOBAL }, |
| 412 |
{ "acceptenv", sAcceptEnv, SSHCFG_GLOBAL }, |
419 |
{ "acceptenv", sAcceptEnv, SSHCFG_GLOBAL }, |
|
|
420 |
{ "requirebothpasswordandpubkey", sRequireBothPasswordAndPubKey }, |
| 413 |
{ "permittunnel", sPermitTunnel, SSHCFG_GLOBAL }, |
421 |
{ "permittunnel", sPermitTunnel, SSHCFG_GLOBAL }, |
| 414 |
{ "match", sMatch, SSHCFG_ALL }, |
422 |
{ "match", sMatch, SSHCFG_ALL }, |
| 415 |
{ "permitopen", sPermitOpen, SSHCFG_ALL }, |
423 |
{ "permitopen", sPermitOpen, SSHCFG_ALL }, |
|
Lines 979-984
Link Here
|
| 979 |
*intptr = value; |
987 |
*intptr = value; |
| 980 |
break; |
988 |
break; |
| 981 |
|
989 |
|
|
|
990 |
case sRequireBothPasswordAndPubKey: |
| 991 |
intptr = &options->require_both_password_and_pub_key; |
| 992 |
goto parse_flag; |
| 993 |
|
| 982 |
case sGatewayPorts: |
994 |
case sGatewayPorts: |
| 983 |
intptr = &options->gateway_ports; |
995 |
intptr = &options->gateway_ports; |
| 984 |
arg = strdelim(&cp); |
996 |
arg = strdelim(&cp); |