|
Lines 146-151
initialize_server_options(ServerOptions *options)
Link Here
|
| 146 |
options->adm_forced_command = NULL; |
146 |
options->adm_forced_command = NULL; |
| 147 |
options->chroot_directory = NULL; |
147 |
options->chroot_directory = NULL; |
| 148 |
options->authorized_keys_command = NULL; |
148 |
options->authorized_keys_command = NULL; |
|
|
149 |
options->authorized_keys_command_owner = NULL; |
| 149 |
options->authorized_keys_command_user = NULL; |
150 |
options->authorized_keys_command_user = NULL; |
| 150 |
options->revoked_keys_file = NULL; |
151 |
options->revoked_keys_file = NULL; |
| 151 |
options->trusted_user_ca_keys = NULL; |
152 |
options->trusted_user_ca_keys = NULL; |
|
Lines 346-352
typedef enum {
Link Here
|
| 346 |
sHostCertificate, |
347 |
sHostCertificate, |
| 347 |
sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile, |
348 |
sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile, |
| 348 |
sKexAlgorithms, sIPQoS, sVersionAddendum, |
349 |
sKexAlgorithms, sIPQoS, sVersionAddendum, |
| 349 |
sAuthorizedKeysCommand, sAuthorizedKeysCommandUser, |
350 |
sAuthorizedKeysCommand, sAuthorizedKeysCommandOwner, sAuthorizedKeysCommandUser, |
| 350 |
sAuthenticationMethods, sHostKeyAgent, |
351 |
sAuthenticationMethods, sHostKeyAgent, |
| 351 |
sDeprecated, sUnsupported |
352 |
sDeprecated, sUnsupported |
| 352 |
} ServerOpCodes; |
353 |
} ServerOpCodes; |
|
Lines 471-476
static struct {
Link Here
|
| 471 |
{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL }, |
472 |
{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL }, |
| 472 |
{ "ipqos", sIPQoS, SSHCFG_ALL }, |
473 |
{ "ipqos", sIPQoS, SSHCFG_ALL }, |
| 473 |
{ "authorizedkeyscommand", sAuthorizedKeysCommand, SSHCFG_ALL }, |
474 |
{ "authorizedkeyscommand", sAuthorizedKeysCommand, SSHCFG_ALL }, |
|
|
475 |
{ "authorizedkeyscommandowner", sAuthorizedKeysCommandOwner, SSHCFG_ALL }, |
| 474 |
{ "authorizedkeyscommanduser", sAuthorizedKeysCommandUser, SSHCFG_ALL }, |
476 |
{ "authorizedkeyscommanduser", sAuthorizedKeysCommandUser, SSHCFG_ALL }, |
| 475 |
{ "versionaddendum", sVersionAddendum, SSHCFG_GLOBAL }, |
477 |
{ "versionaddendum", sVersionAddendum, SSHCFG_GLOBAL }, |
| 476 |
{ "authenticationmethods", sAuthenticationMethods, SSHCFG_ALL }, |
478 |
{ "authenticationmethods", sAuthenticationMethods, SSHCFG_ALL }, |
|
Lines 1594-1599
process_server_config_line(ServerOptions *options, char *line,
Link Here
|
| 1594 |
} |
1596 |
} |
| 1595 |
return 0; |
1597 |
return 0; |
| 1596 |
|
1598 |
|
|
|
1599 |
case sAuthorizedKeysCommandOwner: |
| 1600 |
charptr = &options->authorized_keys_command_owner; |
| 1601 |
|
| 1602 |
arg = strdelim(&cp); |
| 1603 |
if (*activep && *charptr == NULL) |
| 1604 |
*charptr = xstrdup(arg); |
| 1605 |
break; |
| 1606 |
|
| 1597 |
case sAuthorizedKeysCommandUser: |
1607 |
case sAuthorizedKeysCommandUser: |
| 1598 |
charptr = &options->authorized_keys_command_user; |
1608 |
charptr = &options->authorized_keys_command_user; |
| 1599 |
|
1609 |
|
|
Lines 2033-2038
dump_config(ServerOptions *o)
Link Here
|
| 2033 |
o->authorized_principals_file); |
2043 |
o->authorized_principals_file); |
| 2034 |
dump_cfg_string(sVersionAddendum, o->version_addendum); |
2044 |
dump_cfg_string(sVersionAddendum, o->version_addendum); |
| 2035 |
dump_cfg_string(sAuthorizedKeysCommand, o->authorized_keys_command); |
2045 |
dump_cfg_string(sAuthorizedKeysCommand, o->authorized_keys_command); |
|
|
2046 |
dump_cfg_string(sAuthorizedKeysCommandOwner, o->authorized_keys_command_owner); |
| 2036 |
dump_cfg_string(sAuthorizedKeysCommandUser, o->authorized_keys_command_user); |
2047 |
dump_cfg_string(sAuthorizedKeysCommandUser, o->authorized_keys_command_user); |
| 2037 |
dump_cfg_string(sHostKeyAgent, o->host_key_agent); |
2048 |
dump_cfg_string(sHostKeyAgent, o->host_key_agent); |
| 2038 |
dump_cfg_string(sKexAlgorithms, o->kex_algorithms ? o->kex_algorithms : |
2049 |
dump_cfg_string(sKexAlgorithms, o->kex_algorithms ? o->kex_algorithms : |