|
Lines 14-19
Link Here
|
| 14 |
#include <sys/socket.h> |
14 |
#include <sys/socket.h> |
| 15 |
#include <sys/queue.h> |
15 |
#include <sys/queue.h> |
| 16 |
|
16 |
|
|
|
17 |
#include <netinet/in.h> |
| 18 |
#include <netinet/in_systm.h> |
| 19 |
#include <netinet/ip.h> |
| 20 |
|
| 17 |
#include <netdb.h> |
21 |
#include <netdb.h> |
| 18 |
#include <pwd.h> |
22 |
#include <pwd.h> |
| 19 |
#include <stdio.h> |
23 |
#include <stdio.h> |
|
Lines 126-131
initialize_server_options(ServerOptions
Link Here
|
| 126 |
options->revoked_keys_file = NULL; |
130 |
options->revoked_keys_file = NULL; |
| 127 |
options->trusted_user_ca_keys = NULL; |
131 |
options->trusted_user_ca_keys = NULL; |
| 128 |
options->authorized_principals_file = NULL; |
132 |
options->authorized_principals_file = NULL; |
|
|
133 |
options->ip_qos_interactive = -1; |
| 134 |
options->ip_qos_bulk = -1; |
| 129 |
} |
135 |
} |
| 130 |
|
136 |
|
| 131 |
void |
137 |
void |
|
Lines 257-262
fill_default_server_options(ServerOption
Link Here
|
| 257 |
options->permit_tun = SSH_TUNMODE_NO; |
263 |
options->permit_tun = SSH_TUNMODE_NO; |
| 258 |
if (options->zero_knowledge_password_authentication == -1) |
264 |
if (options->zero_knowledge_password_authentication == -1) |
| 259 |
options->zero_knowledge_password_authentication = 0; |
265 |
options->zero_knowledge_password_authentication = 0; |
|
|
266 |
if (options->ip_qos_interactive == -1) |
| 267 |
options->ip_qos_interactive = IPTOS_LOWDELAY; |
| 268 |
if (options->ip_qos_bulk == -1) |
| 269 |
options->ip_qos_bulk = IPTOS_THROUGHPUT; |
| 260 |
|
270 |
|
| 261 |
/* Turn privilege separation on by default */ |
271 |
/* Turn privilege separation on by default */ |
| 262 |
if (use_privsep == -1) |
272 |
if (use_privsep == -1) |
|
Lines 290-296
typedef enum {
Link Here
|
| 290 |
sUsePrivilegeSeparation, sAllowAgentForwarding, |
300 |
sUsePrivilegeSeparation, sAllowAgentForwarding, |
| 291 |
sZeroKnowledgePasswordAuthentication, sHostCertificate, |
301 |
sZeroKnowledgePasswordAuthentication, sHostCertificate, |
| 292 |
sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile, |
302 |
sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile, |
| 293 |
sKexAlgorithms, |
303 |
sKexAlgorithms, sIPQoS, |
| 294 |
sDeprecated, sUnsupported |
304 |
sDeprecated, sUnsupported |
| 295 |
} ServerOpCodes; |
305 |
} ServerOpCodes; |
| 296 |
|
306 |
|
|
Lines 402-407
static struct {
Link Here
|
| 402 |
{ "trustedusercakeys", sTrustedUserCAKeys, SSHCFG_ALL }, |
412 |
{ "trustedusercakeys", sTrustedUserCAKeys, SSHCFG_ALL }, |
| 403 |
{ "authorizedprincipalsfile", sAuthorizedPrincipalsFile, SSHCFG_ALL }, |
413 |
{ "authorizedprincipalsfile", sAuthorizedPrincipalsFile, SSHCFG_ALL }, |
| 404 |
{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL }, |
414 |
{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL }, |
|
|
415 |
{ "ipqos", sIPQoS, SSHCFG_ALL }, |
| 405 |
{ NULL, sBadOption, 0 } |
416 |
{ NULL, sBadOption, 0 } |
| 406 |
}; |
417 |
}; |
| 407 |
|
418 |
|
|
Lines 631-637
process_server_config_line(ServerOptions
Link Here
|
| 631 |
const char *host, const char *address) |
642 |
const char *host, const char *address) |
| 632 |
{ |
643 |
{ |
| 633 |
char *cp, **charptr, *arg, *p; |
644 |
char *cp, **charptr, *arg, *p; |
| 634 |
int cmdline = 0, *intptr, value, n; |
645 |
int cmdline = 0, *intptr, value, value2, n; |
| 635 |
SyslogFacility *log_facility_ptr; |
646 |
SyslogFacility *log_facility_ptr; |
| 636 |
LogLevel *log_level_ptr; |
647 |
LogLevel *log_level_ptr; |
| 637 |
ServerOpCodes opcode; |
648 |
ServerOpCodes opcode; |
|
Lines 1325-1330
process_server_config_line(ServerOptions
Link Here
|
| 1325 |
charptr = &options->revoked_keys_file; |
1336 |
charptr = &options->revoked_keys_file; |
| 1326 |
goto parse_filename; |
1337 |
goto parse_filename; |
| 1327 |
|
1338 |
|
|
|
1339 |
case sIPQoS: |
| 1340 |
arg = strdelim(&cp); |
| 1341 |
if ((value = parse_ipqos(arg)) == -1) |
| 1342 |
fatal("%s line %d: Bad IPQoS value: %s", |
| 1343 |
filename, linenum, arg); |
| 1344 |
arg = strdelim(&cp); |
| 1345 |
if (arg == NULL) |
| 1346 |
value2 = value; |
| 1347 |
else if ((value2 = parse_ipqos(arg)) == -1) |
| 1348 |
fatal("%s line %d: Bad IPQoS value: %s", |
| 1349 |
filename, linenum, arg); |
| 1350 |
if (*activep) { |
| 1351 |
options->ip_qos_interactive = value; |
| 1352 |
options->ip_qos_bulk = value2; |
| 1353 |
} |
| 1354 |
break; |
| 1355 |
|
| 1328 |
case sDeprecated: |
1356 |
case sDeprecated: |
| 1329 |
logit("%s line %d: Deprecated option %s", |
1357 |
logit("%s line %d: Deprecated option %s", |
| 1330 |
filename, linenum, arg); |
1358 |
filename, linenum, arg); |
|
Lines 1435-1440
copy_set_server_options(ServerOptions *d
Link Here
|
| 1435 |
M_CP_INTOPT(x11_use_localhost); |
1463 |
M_CP_INTOPT(x11_use_localhost); |
| 1436 |
M_CP_INTOPT(max_sessions); |
1464 |
M_CP_INTOPT(max_sessions); |
| 1437 |
M_CP_INTOPT(max_authtries); |
1465 |
M_CP_INTOPT(max_authtries); |
|
|
1466 |
M_CP_INTOPT(ip_qos_interactive); |
| 1467 |
M_CP_INTOPT(ip_qos_bulk); |
| 1438 |
|
1468 |
|
| 1439 |
M_CP_STROPT(banner); |
1469 |
M_CP_STROPT(banner); |
| 1440 |
if (preauth) |
1470 |
if (preauth) |
|
Lines 1694-1699
dump_config(ServerOptions *o)
Link Here
|
| 1694 |
break; |
1724 |
break; |
| 1695 |
} |
1725 |
} |
| 1696 |
dump_cfg_string(sPermitTunnel, s); |
1726 |
dump_cfg_string(sPermitTunnel, s); |
|
|
1727 |
|
| 1728 |
printf("ipqos 0x%02x 0x%02x\n", o->ip_qos_interactive, o->ip_qos_bulk); |
| 1697 |
|
1729 |
|
| 1698 |
channel_print_adm_permitted_opens(); |
1730 |
channel_print_adm_permitted_opens(); |
| 1699 |
} |
1731 |
} |