diff options
author | Colin Watson <cjwatson@debian.org> | 2015-08-19 17:00:17 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2015-08-19 17:00:17 +0100 |
commit | 544df7a04ae5b5c1fc30be7c445ad685d7a02dc9 (patch) | |
tree | 33d2a87dd50fe5894ac6ec4579c83401b7ab00a4 /servconf.h | |
parent | baccdb349b31c47cd76fb63211f754ed33a9707e (diff) | |
parent | 7de4b03a6e4071d454b72927ffaf52949fa34545 (diff) |
Import openssh_6.9p1.orig.tar.gz
Diffstat (limited to 'servconf.h')
-rw-r--r-- | servconf.h | 15 |
1 files changed, 11 insertions, 4 deletions
diff --git a/servconf.h b/servconf.h index 9922f0c8c..606d80c9d 100644 --- a/servconf.h +++ b/servconf.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: servconf.h,v 1.116 2015/01/13 07:39:19 djm Exp $ */ | 1 | /* $OpenBSD: servconf.h,v 1.119 2015/05/22 03:50:02 djm Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
@@ -58,7 +58,9 @@ typedef struct { | |||
58 | u_int num_ports; | 58 | u_int num_ports; |
59 | u_int ports_from_cmdline; | 59 | u_int ports_from_cmdline; |
60 | int ports[MAX_PORTS]; /* Port number to listen on. */ | 60 | int ports[MAX_PORTS]; /* Port number to listen on. */ |
61 | char *listen_addr; /* Address on which the server listens. */ | 61 | u_int num_queued_listens; |
62 | char **queued_listen_addrs; | ||
63 | int *queued_listen_ports; | ||
62 | struct addrinfo *listen_addrs; /* Addresses on which the server listens. */ | 64 | struct addrinfo *listen_addrs; /* Addresses on which the server listens. */ |
63 | int address_family; /* Address family used by the server. */ | 65 | int address_family; /* Address family used by the server. */ |
64 | char *host_key_files[MAX_HOSTKEYS]; /* Files containing host keys. */ | 66 | char *host_key_files[MAX_HOSTKEYS]; /* Files containing host keys. */ |
@@ -116,6 +118,7 @@ typedef struct { | |||
116 | * authenticated with Kerberos. */ | 118 | * authenticated with Kerberos. */ |
117 | int gss_authentication; /* If true, permit GSSAPI authentication */ | 119 | int gss_authentication; /* If true, permit GSSAPI authentication */ |
118 | int gss_cleanup_creds; /* If true, destroy cred cache on logout */ | 120 | int gss_cleanup_creds; /* If true, destroy cred cache on logout */ |
121 | int gss_strict_acceptor; /* If true, restrict the GSSAPI acceptor name */ | ||
119 | int password_authentication; /* If true, permit password | 122 | int password_authentication; /* If true, permit password |
120 | * authentication. */ | 123 | * authentication. */ |
121 | int kbd_interactive_authentication; /* If true, permit */ | 124 | int kbd_interactive_authentication; /* If true, permit */ |
@@ -176,9 +179,11 @@ typedef struct { | |||
176 | char *chroot_directory; | 179 | char *chroot_directory; |
177 | char *revoked_keys_file; | 180 | char *revoked_keys_file; |
178 | char *trusted_user_ca_keys; | 181 | char *trusted_user_ca_keys; |
179 | char *authorized_principals_file; | ||
180 | char *authorized_keys_command; | 182 | char *authorized_keys_command; |
181 | char *authorized_keys_command_user; | 183 | char *authorized_keys_command_user; |
184 | char *authorized_principals_file; | ||
185 | char *authorized_principals_command; | ||
186 | char *authorized_principals_command_user; | ||
182 | 187 | ||
183 | int64_t rekey_limit; | 188 | int64_t rekey_limit; |
184 | int rekey_interval; | 189 | int rekey_interval; |
@@ -214,9 +219,11 @@ struct connection_info { | |||
214 | M_CP_STROPT(banner); \ | 219 | M_CP_STROPT(banner); \ |
215 | M_CP_STROPT(trusted_user_ca_keys); \ | 220 | M_CP_STROPT(trusted_user_ca_keys); \ |
216 | M_CP_STROPT(revoked_keys_file); \ | 221 | M_CP_STROPT(revoked_keys_file); \ |
217 | M_CP_STROPT(authorized_principals_file); \ | ||
218 | M_CP_STROPT(authorized_keys_command); \ | 222 | M_CP_STROPT(authorized_keys_command); \ |
219 | M_CP_STROPT(authorized_keys_command_user); \ | 223 | M_CP_STROPT(authorized_keys_command_user); \ |
224 | M_CP_STROPT(authorized_principals_file); \ | ||
225 | M_CP_STROPT(authorized_principals_command); \ | ||
226 | M_CP_STROPT(authorized_principals_command_user); \ | ||
220 | M_CP_STROPT(hostbased_key_types); \ | 227 | M_CP_STROPT(hostbased_key_types); \ |
221 | M_CP_STROPT(pubkey_key_types); \ | 228 | M_CP_STROPT(pubkey_key_types); \ |
222 | M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \ | 229 | M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \ |