summaryrefslogtreecommitdiff
path: root/servconf.h
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2015-08-19 17:00:17 +0100
committerColin Watson <cjwatson@debian.org>2015-08-19 17:00:17 +0100
commit544df7a04ae5b5c1fc30be7c445ad685d7a02dc9 (patch)
tree33d2a87dd50fe5894ac6ec4579c83401b7ab00a4 /servconf.h
parentbaccdb349b31c47cd76fb63211f754ed33a9707e (diff)
parent7de4b03a6e4071d454b72927ffaf52949fa34545 (diff)
Import openssh_6.9p1.orig.tar.gz
Diffstat (limited to 'servconf.h')
-rw-r--r--servconf.h15
1 files changed, 11 insertions, 4 deletions
diff --git a/servconf.h b/servconf.h
index 9922f0c8c..606d80c9d 100644
--- a/servconf.h
+++ b/servconf.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: servconf.h,v 1.116 2015/01/13 07:39:19 djm Exp $ */ 1/* $OpenBSD: servconf.h,v 1.119 2015/05/22 03:50:02 djm Exp $ */
2 2
3/* 3/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi> 4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -58,7 +58,9 @@ typedef struct {
58 u_int num_ports; 58 u_int num_ports;
59 u_int ports_from_cmdline; 59 u_int ports_from_cmdline;
60 int ports[MAX_PORTS]; /* Port number to listen on. */ 60 int ports[MAX_PORTS]; /* Port number to listen on. */
61 char *listen_addr; /* Address on which the server listens. */ 61 u_int num_queued_listens;
62 char **queued_listen_addrs;
63 int *queued_listen_ports;
62 struct addrinfo *listen_addrs; /* Addresses on which the server listens. */ 64 struct addrinfo *listen_addrs; /* Addresses on which the server listens. */
63 int address_family; /* Address family used by the server. */ 65 int address_family; /* Address family used by the server. */
64 char *host_key_files[MAX_HOSTKEYS]; /* Files containing host keys. */ 66 char *host_key_files[MAX_HOSTKEYS]; /* Files containing host keys. */
@@ -116,6 +118,7 @@ typedef struct {
116 * authenticated with Kerberos. */ 118 * authenticated with Kerberos. */
117 int gss_authentication; /* If true, permit GSSAPI authentication */ 119 int gss_authentication; /* If true, permit GSSAPI authentication */
118 int gss_cleanup_creds; /* If true, destroy cred cache on logout */ 120 int gss_cleanup_creds; /* If true, destroy cred cache on logout */
121 int gss_strict_acceptor; /* If true, restrict the GSSAPI acceptor name */
119 int password_authentication; /* If true, permit password 122 int password_authentication; /* If true, permit password
120 * authentication. */ 123 * authentication. */
121 int kbd_interactive_authentication; /* If true, permit */ 124 int kbd_interactive_authentication; /* If true, permit */
@@ -176,9 +179,11 @@ typedef struct {
176 char *chroot_directory; 179 char *chroot_directory;
177 char *revoked_keys_file; 180 char *revoked_keys_file;
178 char *trusted_user_ca_keys; 181 char *trusted_user_ca_keys;
179 char *authorized_principals_file;
180 char *authorized_keys_command; 182 char *authorized_keys_command;
181 char *authorized_keys_command_user; 183 char *authorized_keys_command_user;
184 char *authorized_principals_file;
185 char *authorized_principals_command;
186 char *authorized_principals_command_user;
182 187
183 int64_t rekey_limit; 188 int64_t rekey_limit;
184 int rekey_interval; 189 int rekey_interval;
@@ -214,9 +219,11 @@ struct connection_info {
214 M_CP_STROPT(banner); \ 219 M_CP_STROPT(banner); \
215 M_CP_STROPT(trusted_user_ca_keys); \ 220 M_CP_STROPT(trusted_user_ca_keys); \
216 M_CP_STROPT(revoked_keys_file); \ 221 M_CP_STROPT(revoked_keys_file); \
217 M_CP_STROPT(authorized_principals_file); \
218 M_CP_STROPT(authorized_keys_command); \ 222 M_CP_STROPT(authorized_keys_command); \
219 M_CP_STROPT(authorized_keys_command_user); \ 223 M_CP_STROPT(authorized_keys_command_user); \
224 M_CP_STROPT(authorized_principals_file); \
225 M_CP_STROPT(authorized_principals_command); \
226 M_CP_STROPT(authorized_principals_command_user); \
220 M_CP_STROPT(hostbased_key_types); \ 227 M_CP_STROPT(hostbased_key_types); \
221 M_CP_STROPT(pubkey_key_types); \ 228 M_CP_STROPT(pubkey_key_types); \
222 M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \ 229 M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \