|
Lines 155-160
initialize_server_options(ServerOptions *options)
Link Here
|
| 155 |
options->adm_forced_command = NULL; |
155 |
options->adm_forced_command = NULL; |
| 156 |
options->chroot_directory = NULL; |
156 |
options->chroot_directory = NULL; |
| 157 |
options->authorized_keys_command = NULL; |
157 |
options->authorized_keys_command = NULL; |
|
|
158 |
options->authorized_keys_command_owner = NULL; |
| 158 |
options->authorized_keys_command_user = NULL; |
159 |
options->authorized_keys_command_user = NULL; |
| 159 |
options->revoked_keys_file = NULL; |
160 |
options->revoked_keys_file = NULL; |
| 160 |
options->trusted_user_ca_keys = NULL; |
161 |
options->trusted_user_ca_keys = NULL; |
|
Lines 397-403
typedef enum {
Link Here
|
| 397 |
sHostCertificate, |
398 |
sHostCertificate, |
| 398 |
sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile, |
399 |
sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile, |
| 399 |
sKexAlgorithms, sIPQoS, sVersionAddendum, |
400 |
sKexAlgorithms, sIPQoS, sVersionAddendum, |
| 400 |
sAuthorizedKeysCommand, sAuthorizedKeysCommandUser, |
401 |
sAuthorizedKeysCommand, sAuthorizedKeysCommandOwner, sAuthorizedKeysCommandUser, |
| 401 |
sAuthenticationMethods, sHostKeyAgent, sPermitUserRC, |
402 |
sAuthenticationMethods, sHostKeyAgent, sPermitUserRC, |
| 402 |
sStreamLocalBindMask, sStreamLocalBindUnlink, |
403 |
sStreamLocalBindMask, sStreamLocalBindUnlink, |
| 403 |
sAllowStreamLocalForwarding, sFingerprintHash, |
404 |
sAllowStreamLocalForwarding, sFingerprintHash, |
|
Lines 527-532
static struct {
Link Here
|
| 527 |
{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL }, |
528 |
{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL }, |
| 528 |
{ "ipqos", sIPQoS, SSHCFG_ALL }, |
529 |
{ "ipqos", sIPQoS, SSHCFG_ALL }, |
| 529 |
{ "authorizedkeyscommand", sAuthorizedKeysCommand, SSHCFG_ALL }, |
530 |
{ "authorizedkeyscommand", sAuthorizedKeysCommand, SSHCFG_ALL }, |
|
|
531 |
{ "authorizedkeyscommandowner", sAuthorizedKeysCommandOwner, SSHCFG_ALL }, |
| 530 |
{ "authorizedkeyscommanduser", sAuthorizedKeysCommandUser, SSHCFG_ALL }, |
532 |
{ "authorizedkeyscommanduser", sAuthorizedKeysCommandUser, SSHCFG_ALL }, |
| 531 |
{ "versionaddendum", sVersionAddendum, SSHCFG_GLOBAL }, |
533 |
{ "versionaddendum", sVersionAddendum, SSHCFG_GLOBAL }, |
| 532 |
{ "authenticationmethods", sAuthenticationMethods, SSHCFG_ALL }, |
534 |
{ "authenticationmethods", sAuthenticationMethods, SSHCFG_ALL }, |
|
Lines 1686-1691
process_server_config_line(ServerOptions *options, char *line,
Link Here
|
| 1686 |
} |
1688 |
} |
| 1687 |
return 0; |
1689 |
return 0; |
| 1688 |
|
1690 |
|
|
|
1691 |
case sAuthorizedKeysCommandOwner: |
| 1692 |
charptr = &options->authorized_keys_command_owner; |
| 1693 |
|
| 1694 |
arg = strdelim(&cp); |
| 1695 |
if (*activep && *charptr == NULL) |
| 1696 |
*charptr = xstrdup(arg); |
| 1697 |
break; |
| 1698 |
|
| 1689 |
case sAuthorizedKeysCommandUser: |
1699 |
case sAuthorizedKeysCommandUser: |
| 1690 |
charptr = &options->authorized_keys_command_user; |
1700 |
charptr = &options->authorized_keys_command_user; |
| 1691 |
|
1701 |
|
|
Lines 2165-2170
dump_config(ServerOptions *o)
Link Here
|
| 2165 |
o->authorized_principals_file); |
2175 |
o->authorized_principals_file); |
| 2166 |
dump_cfg_string(sVersionAddendum, o->version_addendum); |
2176 |
dump_cfg_string(sVersionAddendum, o->version_addendum); |
| 2167 |
dump_cfg_string(sAuthorizedKeysCommand, o->authorized_keys_command); |
2177 |
dump_cfg_string(sAuthorizedKeysCommand, o->authorized_keys_command); |
|
|
2178 |
dump_cfg_string(sAuthorizedKeysCommandOwner, o->authorized_keys_command_owner); |
| 2168 |
dump_cfg_string(sAuthorizedKeysCommandUser, o->authorized_keys_command_user); |
2179 |
dump_cfg_string(sAuthorizedKeysCommandUser, o->authorized_keys_command_user); |
| 2169 |
dump_cfg_string(sHostKeyAgent, o->host_key_agent); |
2180 |
dump_cfg_string(sHostKeyAgent, o->host_key_agent); |
| 2170 |
dump_cfg_string(sKexAlgorithms, |
2181 |
dump_cfg_string(sKexAlgorithms, |