diff options
author | djm@openbsd.org <djm@openbsd.org> | 2020-07-05 23:59:45 +0000 |
---|---|---|
committer | Darren Tucker <dtucker@dtucker.net> | 2020-07-15 15:07:42 +1000 |
commit | 6d755706a0059eb9e2d63517f288b75cbc3b4701 (patch) | |
tree | adb003b1adcea270f4480baa4ff83d495b3478f3 /servconf.c | |
parent | b0c1e8384d5e136ebdf895d1434aea7dd8661a1c (diff) |
upstream: some language improvements; ok markus
OpenBSD-Commit-ID: 939d787d571b4d5da50b3b721fd0b2ac236acaa8
Diffstat (limited to 'servconf.c')
-rw-r--r-- | servconf.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/servconf.c b/servconf.c index 22cb9583f..67581ccf2 100644 --- a/servconf.c +++ b/servconf.c | |||
@@ -1,5 +1,5 @@ | |||
1 | 1 | ||
2 | /* $OpenBSD: servconf.c,v 1.366 2020/06/24 15:09:53 markus Exp $ */ | 2 | /* $OpenBSD: servconf.c,v 1.367 2020/07/05 23:59:45 djm Exp $ */ |
3 | /* | 3 | /* |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
5 | * All rights reserved | 5 | * All rights reserved |
@@ -141,7 +141,7 @@ initialize_server_options(ServerOptions *options) | |||
141 | options->challenge_response_authentication = -1; | 141 | options->challenge_response_authentication = -1; |
142 | options->permit_empty_passwd = -1; | 142 | options->permit_empty_passwd = -1; |
143 | options->permit_user_env = -1; | 143 | options->permit_user_env = -1; |
144 | options->permit_user_env_whitelist = NULL; | 144 | options->permit_user_env_allowlist = NULL; |
145 | options->compression = -1; | 145 | options->compression = -1; |
146 | options->rekey_limit = -1; | 146 | options->rekey_limit = -1; |
147 | options->rekey_interval = -1; | 147 | options->rekey_interval = -1; |
@@ -213,11 +213,11 @@ assemble_algorithms(ServerOptions *o) | |||
213 | all_key = sshkey_alg_list(0, 0, 1, ','); | 213 | all_key = sshkey_alg_list(0, 0, 1, ','); |
214 | all_sig = sshkey_alg_list(0, 1, 1, ','); | 214 | all_sig = sshkey_alg_list(0, 1, 1, ','); |
215 | /* remove unsupported algos from default lists */ | 215 | /* remove unsupported algos from default lists */ |
216 | def_cipher = match_filter_whitelist(KEX_SERVER_ENCRYPT, all_cipher); | 216 | def_cipher = match_filter_allowlist(KEX_SERVER_ENCRYPT, all_cipher); |
217 | def_mac = match_filter_whitelist(KEX_SERVER_MAC, all_mac); | 217 | def_mac = match_filter_allowlist(KEX_SERVER_MAC, all_mac); |
218 | def_kex = match_filter_whitelist(KEX_SERVER_KEX, all_kex); | 218 | def_kex = match_filter_allowlist(KEX_SERVER_KEX, all_kex); |
219 | def_key = match_filter_whitelist(KEX_DEFAULT_PK_ALG, all_key); | 219 | def_key = match_filter_allowlist(KEX_DEFAULT_PK_ALG, all_key); |
220 | def_sig = match_filter_whitelist(SSH_ALLOWED_CA_SIGALGS, all_sig); | 220 | def_sig = match_filter_allowlist(SSH_ALLOWED_CA_SIGALGS, all_sig); |
221 | #define ASSEMBLE(what, defaults, all) \ | 221 | #define ASSEMBLE(what, defaults, all) \ |
222 | do { \ | 222 | do { \ |
223 | if ((r = kex_assemble_names(&o->what, defaults, all)) != 0) \ | 223 | if ((r = kex_assemble_names(&o->what, defaults, all)) != 0) \ |
@@ -390,7 +390,7 @@ fill_default_server_options(ServerOptions *options) | |||
390 | options->permit_empty_passwd = 0; | 390 | options->permit_empty_passwd = 0; |
391 | if (options->permit_user_env == -1) { | 391 | if (options->permit_user_env == -1) { |
392 | options->permit_user_env = 0; | 392 | options->permit_user_env = 0; |
393 | options->permit_user_env_whitelist = NULL; | 393 | options->permit_user_env_allowlist = NULL; |
394 | } | 394 | } |
395 | if (options->compression == -1) | 395 | if (options->compression == -1) |
396 | #ifdef WITH_ZLIB | 396 | #ifdef WITH_ZLIB |
@@ -1630,7 +1630,7 @@ process_server_config_line_depth(ServerOptions *options, char *line, | |||
1630 | 1630 | ||
1631 | case sPermitUserEnvironment: | 1631 | case sPermitUserEnvironment: |
1632 | intptr = &options->permit_user_env; | 1632 | intptr = &options->permit_user_env; |
1633 | charptr = &options->permit_user_env_whitelist; | 1633 | charptr = &options->permit_user_env_allowlist; |
1634 | arg = strdelim(&cp); | 1634 | arg = strdelim(&cp); |
1635 | if (!arg || *arg == '\0') | 1635 | if (!arg || *arg == '\0') |
1636 | fatal("%s line %d: missing argument.", | 1636 | fatal("%s line %d: missing argument.", |
@@ -2925,11 +2925,11 @@ dump_config(ServerOptions *o) | |||
2925 | } | 2925 | } |
2926 | printf("\n"); | 2926 | printf("\n"); |
2927 | 2927 | ||
2928 | if (o->permit_user_env_whitelist == NULL) { | 2928 | if (o->permit_user_env_allowlist == NULL) { |
2929 | dump_cfg_fmtint(sPermitUserEnvironment, o->permit_user_env); | 2929 | dump_cfg_fmtint(sPermitUserEnvironment, o->permit_user_env); |
2930 | } else { | 2930 | } else { |
2931 | printf("permituserenvironment %s\n", | 2931 | printf("permituserenvironment %s\n", |
2932 | o->permit_user_env_whitelist); | 2932 | o->permit_user_env_allowlist); |
2933 | } | 2933 | } |
2934 | 2934 | ||
2935 | printf("pubkeyauthoptions"); | 2935 | printf("pubkeyauthoptions"); |