summaryrefslogtreecommitdiff
path: root/servconf.c
diff options
context:
space:
mode:
Diffstat (limited to 'servconf.c')
-rw-r--r--servconf.c15
1 files changed, 1 insertions, 14 deletions
diff --git a/servconf.c b/servconf.c
index 48cb0d5b1..03a503d07 100644
--- a/servconf.c
+++ b/servconf.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: servconf.c,v 1.214 2011/03/29 18:54:17 stevesk Exp $ */ 1/* $OpenBSD: servconf.c,v 1.215 2011/05/11 04:47:06 djm Exp $ */
2/* 2/*
3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4 * All rights reserved 4 * All rights reserved
@@ -127,7 +127,6 @@ initialize_server_options(ServerOptions *options)
127 options->client_alive_interval = -1; 127 options->client_alive_interval = -1;
128 options->client_alive_count_max = -1; 128 options->client_alive_count_max = -1;
129 options->authorized_keys_file = NULL; 129 options->authorized_keys_file = NULL;
130 options->authorized_keys_file2 = NULL;
131 options->num_accept_env = 0; 130 options->num_accept_env = 0;
132 options->permit_tun = -1; 131 options->permit_tun = -1;
133 options->num_permitted_opens = -1; 132 options->num_permitted_opens = -1;
@@ -264,13 +263,6 @@ fill_default_server_options(ServerOptions *options)
264 options->client_alive_interval = 0; 263 options->client_alive_interval = 0;
265 if (options->client_alive_count_max == -1) 264 if (options->client_alive_count_max == -1)
266 options->client_alive_count_max = 3; 265 options->client_alive_count_max = 3;
267 if (options->authorized_keys_file2 == NULL) {
268 /* authorized_keys_file2 falls back to authorized_keys_file */
269 if (options->authorized_keys_file != NULL)
270 options->authorized_keys_file2 = xstrdup(options->authorized_keys_file);
271 else
272 options->authorized_keys_file2 = xstrdup(_PATH_SSH_USER_PERMITTED_KEYS2);
273 }
274 if (options->authorized_keys_file == NULL) 266 if (options->authorized_keys_file == NULL)
275 options->authorized_keys_file = xstrdup(_PATH_SSH_USER_PERMITTED_KEYS); 267 options->authorized_keys_file = xstrdup(_PATH_SSH_USER_PERMITTED_KEYS);
276 if (options->permit_tun == -1) 268 if (options->permit_tun == -1)
@@ -1252,9 +1244,6 @@ process_server_config_line(ServerOptions *options, char *line,
1252 case sAuthorizedKeysFile: 1244 case sAuthorizedKeysFile:
1253 charptr = &options->authorized_keys_file; 1245 charptr = &options->authorized_keys_file;
1254 goto parse_tilde_filename; 1246 goto parse_tilde_filename;
1255 case sAuthorizedKeysFile2:
1256 charptr = &options->authorized_keys_file2;
1257 goto parse_tilde_filename;
1258 case sAuthorizedPrincipalsFile: 1247 case sAuthorizedPrincipalsFile:
1259 charptr = &options->authorized_principals_file; 1248 charptr = &options->authorized_principals_file;
1260 parse_tilde_filename: 1249 parse_tilde_filename:
@@ -1519,7 +1508,6 @@ copy_set_server_options(ServerOptions *dst, ServerOptions *src, int preauth)
1519 M_CP_STROPT(trusted_user_ca_keys); 1508 M_CP_STROPT(trusted_user_ca_keys);
1520 M_CP_STROPT(revoked_keys_file); 1509 M_CP_STROPT(revoked_keys_file);
1521 M_CP_STROPT(authorized_keys_file); 1510 M_CP_STROPT(authorized_keys_file);
1522 M_CP_STROPT(authorized_keys_file2);
1523 M_CP_STROPT(authorized_principals_file); 1511 M_CP_STROPT(authorized_principals_file);
1524} 1512}
1525 1513
@@ -1737,7 +1725,6 @@ dump_config(ServerOptions *o)
1737 dump_cfg_string(sMacs, o->macs); 1725 dump_cfg_string(sMacs, o->macs);
1738 dump_cfg_string(sBanner, o->banner); 1726 dump_cfg_string(sBanner, o->banner);
1739 dump_cfg_string(sAuthorizedKeysFile, o->authorized_keys_file); 1727 dump_cfg_string(sAuthorizedKeysFile, o->authorized_keys_file);
1740 dump_cfg_string(sAuthorizedKeysFile2, o->authorized_keys_file2);
1741 dump_cfg_string(sForceCommand, o->adm_forced_command); 1728 dump_cfg_string(sForceCommand, o->adm_forced_command);
1742 dump_cfg_string(sChrootDirectory, o->chroot_directory); 1729 dump_cfg_string(sChrootDirectory, o->chroot_directory);
1743 dump_cfg_string(sTrustedUserCAKeys, o->trusted_user_ca_keys); 1730 dump_cfg_string(sTrustedUserCAKeys, o->trusted_user_ca_keys);