summaryrefslogtreecommitdiff
path: root/readconf.c
diff options
context:
space:
mode:
Diffstat (limited to 'readconf.c')
-rw-r--r--readconf.c12
1 files changed, 10 insertions, 2 deletions
diff --git a/readconf.c b/readconf.c
index acdf128f6..c9c463b29 100644
--- a/readconf.c
+++ b/readconf.c
@@ -12,7 +12,7 @@
12 */ 12 */
13 13
14#include "includes.h" 14#include "includes.h"
15RCSID("$OpenBSD: readconf.c,v 1.106 2003/04/09 12:00:37 djm Exp $"); 15RCSID("$OpenBSD: readconf.c,v 1.107 2003/05/14 18:16:20 jakob Exp $");
16 16
17#include "ssh.h" 17#include "ssh.h"
18#include "xmalloc.h" 18#include "xmalloc.h"
@@ -114,7 +114,7 @@ typedef enum {
114 oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication, 114 oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication,
115 oHostKeyAlgorithms, oBindAddress, oSmartcardDevice, 115 oHostKeyAlgorithms, oBindAddress, oSmartcardDevice,
116 oClearAllForwardings, oNoHostAuthenticationForLocalhost, 116 oClearAllForwardings, oNoHostAuthenticationForLocalhost,
117 oEnableSSHKeysign, oRekeyLimit, 117 oEnableSSHKeysign, oRekeyLimit, oVerifyHostKeyDNS,
118 oDeprecated 118 oDeprecated
119} OpCodes; 119} OpCodes;
120 120
@@ -187,6 +187,7 @@ static struct {
187 { "smartcarddevice", oSmartcardDevice }, 187 { "smartcarddevice", oSmartcardDevice },
188 { "clearallforwardings", oClearAllForwardings }, 188 { "clearallforwardings", oClearAllForwardings },
189 { "enablesshkeysign", oEnableSSHKeysign }, 189 { "enablesshkeysign", oEnableSSHKeysign },
190 { "verifyhostkeydns", oVerifyHostKeyDNS },
190 { "nohostauthenticationforlocalhost", oNoHostAuthenticationForLocalhost }, 191 { "nohostauthenticationforlocalhost", oNoHostAuthenticationForLocalhost },
191 { "rekeylimit", oRekeyLimit }, 192 { "rekeylimit", oRekeyLimit },
192 { NULL, oBadOption } 193 { NULL, oBadOption }
@@ -392,6 +393,10 @@ parse_flag:
392 intptr = &options->check_host_ip; 393 intptr = &options->check_host_ip;
393 goto parse_flag; 394 goto parse_flag;
394 395
396 case oVerifyHostKeyDNS:
397 intptr = &options->verify_host_key_dns;
398 goto parse_flag;
399
395 case oStrictHostKeyChecking: 400 case oStrictHostKeyChecking:
396 intptr = &options->strict_host_key_checking; 401 intptr = &options->strict_host_key_checking;
397 arg = strdelim(&s); 402 arg = strdelim(&s);
@@ -829,6 +834,7 @@ initialize_options(Options * options)
829 options->enable_ssh_keysign = - 1; 834 options->enable_ssh_keysign = - 1;
830 options->no_host_authentication_for_localhost = - 1; 835 options->no_host_authentication_for_localhost = - 1;
831 options->rekey_limit = - 1; 836 options->rekey_limit = - 1;
837 options->verify_host_key_dns = -1;
832} 838}
833 839
834/* 840/*
@@ -947,6 +953,8 @@ fill_default_options(Options * options)
947 options->enable_ssh_keysign = 0; 953 options->enable_ssh_keysign = 0;
948 if (options->rekey_limit == -1) 954 if (options->rekey_limit == -1)
949 options->rekey_limit = 0; 955 options->rekey_limit = 0;
956 if (options->verify_host_key_dns == -1)
957 options->verify_host_key_dns = 0;
950 /* options->proxy_command should not be set by default */ 958 /* options->proxy_command should not be set by default */
951 /* options->user will be set in the main program if appropriate */ 959 /* options->user will be set in the main program if appropriate */
952 /* options->hostname will be set in the main program if appropriate */ 960 /* options->hostname will be set in the main program if appropriate */