|
Lines 138-143
initialize_server_options(ServerOptions
Link Here
|
| 138 |
options->revoked_keys_file = NULL; |
138 |
options->revoked_keys_file = NULL; |
| 139 |
options->trusted_user_ca_keys = NULL; |
139 |
options->trusted_user_ca_keys = NULL; |
| 140 |
options->authorized_principals_file = NULL; |
140 |
options->authorized_principals_file = NULL; |
|
|
141 |
options->use_kuserok = -1; |
| 141 |
} |
142 |
} |
| 142 |
|
143 |
|
| 143 |
void |
144 |
void |
|
Lines 286-291
fill_default_server_options(ServerOption
Link Here
|
| 286 |
if (use_privsep == -1) |
287 |
if (use_privsep == -1) |
| 287 |
use_privsep = 1; |
288 |
use_privsep = 1; |
| 288 |
|
289 |
|
|
|
290 |
if (options->use_kuserok == -1) |
| 291 |
options->use_kuserok = 1; |
| 289 |
#ifndef HAVE_MMAP |
292 |
#ifndef HAVE_MMAP |
| 290 |
if (use_privsep && options->compression == 1) { |
293 |
if (use_privsep && options->compression == 1) { |
| 291 |
error("This platform does not support both privilege " |
294 |
error("This platform does not support both privilege " |
|
Lines 307-313
typedef enum {
Link Here
|
| 307 |
sPermitRootLogin, sLogFacility, sLogLevel, |
310 |
sPermitRootLogin, sLogFacility, sLogLevel, |
| 308 |
sRhostsRSAAuthentication, sRSAAuthentication, |
311 |
sRhostsRSAAuthentication, sRSAAuthentication, |
| 309 |
sKerberosAuthentication, sKerberosOrLocalPasswd, sKerberosTicketCleanup, |
312 |
sKerberosAuthentication, sKerberosOrLocalPasswd, sKerberosTicketCleanup, |
| 310 |
sKerberosGetAFSToken, |
313 |
sKerberosGetAFSToken, sKerberosUseKuserok, |
| 311 |
sKerberosTgtPassing, sChallengeResponseAuthentication, |
314 |
sKerberosTgtPassing, sChallengeResponseAuthentication, |
| 312 |
sPasswordAuthentication, sKbdInteractiveAuthentication, |
315 |
sPasswordAuthentication, sKbdInteractiveAuthentication, |
| 313 |
sListenAddress, sAddressFamily, |
316 |
sListenAddress, sAddressFamily, |
|
Lines 377-387
static struct {
Link Here
|
| 377 |
#else |
380 |
#else |
| 378 |
{ "kerberosgetafstoken", sUnsupported, SSHCFG_GLOBAL }, |
381 |
{ "kerberosgetafstoken", sUnsupported, SSHCFG_GLOBAL }, |
| 379 |
#endif |
382 |
#endif |
|
|
383 |
{ "kerberosusekuserok", sKerberosUseKuserok, SSHCFG_ALL }, |
| 380 |
#else |
384 |
#else |
| 381 |
{ "kerberosauthentication", sUnsupported, SSHCFG_ALL }, |
385 |
{ "kerberosauthentication", sUnsupported, SSHCFG_ALL }, |
| 382 |
{ "kerberosorlocalpasswd", sUnsupported, SSHCFG_GLOBAL }, |
386 |
{ "kerberosorlocalpasswd", sUnsupported, SSHCFG_GLOBAL }, |
| 383 |
{ "kerberosticketcleanup", sUnsupported, SSHCFG_GLOBAL }, |
387 |
{ "kerberosticketcleanup", sUnsupported, SSHCFG_GLOBAL }, |
| 384 |
{ "kerberosgetafstoken", sUnsupported, SSHCFG_GLOBAL }, |
388 |
{ "kerberosgetafstoken", sUnsupported, SSHCFG_GLOBAL }, |
|
|
389 |
{ "kerberosusekuserok", sUnsupported, SSHCFG_ALL }, |
| 385 |
#endif |
390 |
#endif |
| 386 |
{ "kerberostgtpassing", sUnsupported, SSHCFG_GLOBAL }, |
391 |
{ "kerberostgtpassing", sUnsupported, SSHCFG_GLOBAL }, |
| 387 |
{ "afstokenpassing", sUnsupported, SSHCFG_GLOBAL }, |
392 |
{ "afstokenpassing", sUnsupported, SSHCFG_GLOBAL }, |
|
Lines 1341-1346
process_server_config_line(ServerOptions
Link Here
|
| 1341 |
*activep = value; |
1346 |
*activep = value; |
| 1342 |
break; |
1347 |
break; |
| 1343 |
|
1348 |
|
|
|
1349 |
case sKerberosUseKuserok: |
| 1350 |
intptr = &options->use_kuserok; |
| 1351 |
goto parse_flag; |
| 1352 |
|
| 1344 |
case sPermitOpen: |
1353 |
case sPermitOpen: |
| 1345 |
arg = strdelim(&cp); |
1354 |
arg = strdelim(&cp); |
| 1346 |
if (!arg || *arg == '\0') |
1355 |
if (!arg || *arg == '\0') |
|
Lines 1525-1530
copy_set_server_options(ServerOptions *d
Link Here
|
| 1525 |
M_CP_INTOPT(x11_use_localhost); |
1534 |
M_CP_INTOPT(x11_use_localhost); |
| 1526 |
M_CP_INTOPT(max_sessions); |
1535 |
M_CP_INTOPT(max_sessions); |
| 1527 |
M_CP_INTOPT(max_authtries); |
1536 |
M_CP_INTOPT(max_authtries); |
|
|
1537 |
M_CP_INTOPT(use_kuserok); |
| 1528 |
|
1538 |
|
| 1529 |
M_CP_STROPT(banner); |
1539 |
M_CP_STROPT(banner); |
| 1530 |
if (preauth) |
1540 |
if (preauth) |
|
Lines 1745-1750
dump_config(ServerOptions *o)
Link Here
|
| 1745 |
dump_cfg_fmtint(sUseDNS, o->use_dns); |
1755 |
dump_cfg_fmtint(sUseDNS, o->use_dns); |
| 1746 |
dump_cfg_fmtint(sAllowTcpForwarding, o->allow_tcp_forwarding); |
1756 |
dump_cfg_fmtint(sAllowTcpForwarding, o->allow_tcp_forwarding); |
| 1747 |
dump_cfg_fmtint(sUsePrivilegeSeparation, use_privsep); |
1757 |
dump_cfg_fmtint(sUsePrivilegeSeparation, use_privsep); |
|
|
1758 |
dump_cfg_fmtint(sKerberosUseKuserok, o->use_kuserok); |
| 1748 |
|
1759 |
|
| 1749 |
/* string arguments */ |
1760 |
/* string arguments */ |
| 1750 |
dump_cfg_string(sPidFile, o->pid_file); |
1761 |
dump_cfg_string(sPidFile, o->pid_file); |