summaryrefslogtreecommitdiff
path: root/servconf.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2020-07-05 23:59:45 +0000
committerDarren Tucker <dtucker@dtucker.net>2020-07-15 15:07:42 +1000
commit6d755706a0059eb9e2d63517f288b75cbc3b4701 (patch)
treeadb003b1adcea270f4480baa4ff83d495b3478f3 /servconf.c
parentb0c1e8384d5e136ebdf895d1434aea7dd8661a1c (diff)
upstream: some language improvements; ok markus
OpenBSD-Commit-ID: 939d787d571b4d5da50b3b721fd0b2ac236acaa8
Diffstat (limited to 'servconf.c')
-rw-r--r--servconf.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/servconf.c b/servconf.c
index 22cb9583f..67581ccf2 100644
--- a/servconf.c
+++ b/servconf.c
@@ -1,5 +1,5 @@
1 1
2/* $OpenBSD: servconf.c,v 1.366 2020/06/24 15:09:53 markus Exp $ */ 2/* $OpenBSD: servconf.c,v 1.367 2020/07/05 23:59:45 djm Exp $ */
3/* 3/*
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5 * All rights reserved 5 * All rights reserved
@@ -141,7 +141,7 @@ initialize_server_options(ServerOptions *options)
141 options->challenge_response_authentication = -1; 141 options->challenge_response_authentication = -1;
142 options->permit_empty_passwd = -1; 142 options->permit_empty_passwd = -1;
143 options->permit_user_env = -1; 143 options->permit_user_env = -1;
144 options->permit_user_env_whitelist = NULL; 144 options->permit_user_env_allowlist = NULL;
145 options->compression = -1; 145 options->compression = -1;
146 options->rekey_limit = -1; 146 options->rekey_limit = -1;
147 options->rekey_interval = -1; 147 options->rekey_interval = -1;
@@ -213,11 +213,11 @@ assemble_algorithms(ServerOptions *o)
213 all_key = sshkey_alg_list(0, 0, 1, ','); 213 all_key = sshkey_alg_list(0, 0, 1, ',');
214 all_sig = sshkey_alg_list(0, 1, 1, ','); 214 all_sig = sshkey_alg_list(0, 1, 1, ',');
215 /* remove unsupported algos from default lists */ 215 /* remove unsupported algos from default lists */
216 def_cipher = match_filter_whitelist(KEX_SERVER_ENCRYPT, all_cipher); 216 def_cipher = match_filter_allowlist(KEX_SERVER_ENCRYPT, all_cipher);
217 def_mac = match_filter_whitelist(KEX_SERVER_MAC, all_mac); 217 def_mac = match_filter_allowlist(KEX_SERVER_MAC, all_mac);
218 def_kex = match_filter_whitelist(KEX_SERVER_KEX, all_kex); 218 def_kex = match_filter_allowlist(KEX_SERVER_KEX, all_kex);
219 def_key = match_filter_whitelist(KEX_DEFAULT_PK_ALG, all_key); 219 def_key = match_filter_allowlist(KEX_DEFAULT_PK_ALG, all_key);
220 def_sig = match_filter_whitelist(SSH_ALLOWED_CA_SIGALGS, all_sig); 220 def_sig = match_filter_allowlist(SSH_ALLOWED_CA_SIGALGS, all_sig);
221#define ASSEMBLE(what, defaults, all) \ 221#define ASSEMBLE(what, defaults, all) \
222 do { \ 222 do { \
223 if ((r = kex_assemble_names(&o->what, defaults, all)) != 0) \ 223 if ((r = kex_assemble_names(&o->what, defaults, all)) != 0) \
@@ -390,7 +390,7 @@ fill_default_server_options(ServerOptions *options)
390 options->permit_empty_passwd = 0; 390 options->permit_empty_passwd = 0;
391 if (options->permit_user_env == -1) { 391 if (options->permit_user_env == -1) {
392 options->permit_user_env = 0; 392 options->permit_user_env = 0;
393 options->permit_user_env_whitelist = NULL; 393 options->permit_user_env_allowlist = NULL;
394 } 394 }
395 if (options->compression == -1) 395 if (options->compression == -1)
396#ifdef WITH_ZLIB 396#ifdef WITH_ZLIB
@@ -1630,7 +1630,7 @@ process_server_config_line_depth(ServerOptions *options, char *line,
1630 1630
1631 case sPermitUserEnvironment: 1631 case sPermitUserEnvironment:
1632 intptr = &options->permit_user_env; 1632 intptr = &options->permit_user_env;
1633 charptr = &options->permit_user_env_whitelist; 1633 charptr = &options->permit_user_env_allowlist;
1634 arg = strdelim(&cp); 1634 arg = strdelim(&cp);
1635 if (!arg || *arg == '\0') 1635 if (!arg || *arg == '\0')
1636 fatal("%s line %d: missing argument.", 1636 fatal("%s line %d: missing argument.",
@@ -2925,11 +2925,11 @@ dump_config(ServerOptions *o)
2925 } 2925 }
2926 printf("\n"); 2926 printf("\n");
2927 2927
2928 if (o->permit_user_env_whitelist == NULL) { 2928 if (o->permit_user_env_allowlist == NULL) {
2929 dump_cfg_fmtint(sPermitUserEnvironment, o->permit_user_env); 2929 dump_cfg_fmtint(sPermitUserEnvironment, o->permit_user_env);
2930 } else { 2930 } else {
2931 printf("permituserenvironment %s\n", 2931 printf("permituserenvironment %s\n",
2932 o->permit_user_env_whitelist); 2932 o->permit_user_env_allowlist);
2933 } 2933 }
2934 2934
2935 printf("pubkeyauthoptions"); 2935 printf("pubkeyauthoptions");