summaryrefslogtreecommitdiff
path: root/servconf.c
diff options
context:
space:
mode:
Diffstat (limited to 'servconf.c')
-rw-r--r--servconf.c21
1 files changed, 2 insertions, 19 deletions
diff --git a/servconf.c b/servconf.c
index 63ff4ffbc..37fd2de6d 100644
--- a/servconf.c
+++ b/servconf.c
@@ -1,5 +1,5 @@
1 1
2/* $OpenBSD: servconf.c,v 1.248 2013/12/06 13:39:49 markus Exp $ */ 2/* $OpenBSD: servconf.c,v 1.249 2014/01/29 06:18:35 djm Exp $ */
3/* 3/*
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5 * All rights reserved 5 * All rights reserved
@@ -150,7 +150,6 @@ initialize_server_options(ServerOptions *options)
150 options->chroot_directory = NULL; 150 options->chroot_directory = NULL;
151 options->authorized_keys_command = NULL; 151 options->authorized_keys_command = NULL;
152 options->authorized_keys_command_user = NULL; 152 options->authorized_keys_command_user = NULL;
153 options->zero_knowledge_password_authentication = -1;
154 options->revoked_keys_file = NULL; 153 options->revoked_keys_file = NULL;
155 options->trusted_user_ca_keys = NULL; 154 options->trusted_user_ca_keys = NULL;
156 options->authorized_principals_file = NULL; 155 options->authorized_principals_file = NULL;
@@ -305,8 +304,6 @@ fill_default_server_options(ServerOptions *options)
305 } 304 }
306 if (options->permit_tun == -1) 305 if (options->permit_tun == -1)
307 options->permit_tun = SSH_TUNMODE_NO; 306 options->permit_tun = SSH_TUNMODE_NO;
308 if (options->zero_knowledge_password_authentication == -1)
309 options->zero_knowledge_password_authentication = 0;
310 if (options->ip_qos_interactive == -1) 307 if (options->ip_qos_interactive == -1)
311 options->ip_qos_interactive = IPTOS_LOWDELAY; 308 options->ip_qos_interactive = IPTOS_LOWDELAY;
312 if (options->ip_qos_bulk == -1) 309 if (options->ip_qos_bulk == -1)
@@ -360,7 +357,7 @@ typedef enum {
360 sAcceptEnv, sPermitTunnel, 357 sAcceptEnv, sPermitTunnel,
361 sMatch, sPermitOpen, sForceCommand, sChrootDirectory, 358 sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
362 sUsePrivilegeSeparation, sAllowAgentForwarding, 359 sUsePrivilegeSeparation, sAllowAgentForwarding,
363 sZeroKnowledgePasswordAuthentication, sHostCertificate, 360 sHostCertificate,
364 sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile, 361 sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile,
365 sKexAlgorithms, sIPQoS, sVersionAddendum, 362 sKexAlgorithms, sIPQoS, sVersionAddendum,
366 sAuthorizedKeysCommand, sAuthorizedKeysCommandUser, 363 sAuthorizedKeysCommand, sAuthorizedKeysCommandUser,
@@ -443,11 +440,6 @@ static struct {
443 { "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_ALL }, 440 { "kbdinteractiveauthentication", sKbdInteractiveAuthentication, SSHCFG_ALL },
444 { "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, 441 { "challengeresponseauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL },
445 { "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */ 442 { "skeyauthentication", sChallengeResponseAuthentication, SSHCFG_GLOBAL }, /* alias */
446#ifdef JPAKE
447 { "zeroknowledgepasswordauthentication", sZeroKnowledgePasswordAuthentication, SSHCFG_ALL },
448#else
449 { "zeroknowledgepasswordauthentication", sUnsupported, SSHCFG_ALL },
450#endif
451 { "checkmail", sDeprecated, SSHCFG_GLOBAL }, 443 { "checkmail", sDeprecated, SSHCFG_GLOBAL },
452 { "listenaddress", sListenAddress, SSHCFG_GLOBAL }, 444 { "listenaddress", sListenAddress, SSHCFG_GLOBAL },
453 { "addressfamily", sAddressFamily, SSHCFG_GLOBAL }, 445 { "addressfamily", sAddressFamily, SSHCFG_GLOBAL },
@@ -1141,10 +1133,6 @@ process_server_config_line(ServerOptions *options, char *line,
1141 intptr = &options->password_authentication; 1133 intptr = &options->password_authentication;
1142 goto parse_flag; 1134 goto parse_flag;
1143 1135
1144 case sZeroKnowledgePasswordAuthentication:
1145 intptr = &options->zero_knowledge_password_authentication;
1146 goto parse_flag;
1147
1148 case sKbdInteractiveAuthentication: 1136 case sKbdInteractiveAuthentication:
1149 intptr = &options->kbd_interactive_authentication; 1137 intptr = &options->kbd_interactive_authentication;
1150 goto parse_flag; 1138 goto parse_flag;
@@ -1810,7 +1798,6 @@ copy_set_server_options(ServerOptions *dst, ServerOptions *src, int preauth)
1810 M_CP_INTOPT(hostbased_authentication); 1798 M_CP_INTOPT(hostbased_authentication);
1811 M_CP_INTOPT(hostbased_uses_name_from_packet_only); 1799 M_CP_INTOPT(hostbased_uses_name_from_packet_only);
1812 M_CP_INTOPT(kbd_interactive_authentication); 1800 M_CP_INTOPT(kbd_interactive_authentication);
1813 M_CP_INTOPT(zero_knowledge_password_authentication);
1814 M_CP_INTOPT(permit_root_login); 1801 M_CP_INTOPT(permit_root_login);
1815 M_CP_INTOPT(permit_empty_passwd); 1802 M_CP_INTOPT(permit_empty_passwd);
1816 1803
@@ -2056,10 +2043,6 @@ dump_config(ServerOptions *o)
2056 dump_cfg_fmtint(sGssStrictAcceptor, o->gss_strict_acceptor); 2043 dump_cfg_fmtint(sGssStrictAcceptor, o->gss_strict_acceptor);
2057 dump_cfg_fmtint(sGssStoreRekey, o->gss_store_rekey); 2044 dump_cfg_fmtint(sGssStoreRekey, o->gss_store_rekey);
2058#endif 2045#endif
2059#ifdef JPAKE
2060 dump_cfg_fmtint(sZeroKnowledgePasswordAuthentication,
2061 o->zero_knowledge_password_authentication);
2062#endif
2063 dump_cfg_fmtint(sPasswordAuthentication, o->password_authentication); 2046 dump_cfg_fmtint(sPasswordAuthentication, o->password_authentication);
2064 dump_cfg_fmtint(sKbdInteractiveAuthentication, 2047 dump_cfg_fmtint(sKbdInteractiveAuthentication,
2065 o->kbd_interactive_authentication); 2048 o->kbd_interactive_authentication);