diff options
Diffstat (limited to 'servconf.c')
-rw-r--r-- | servconf.c | 15 |
1 files changed, 1 insertions, 14 deletions
diff --git a/servconf.c b/servconf.c index 48cb0d5b1..03a503d07 100644 --- a/servconf.c +++ b/servconf.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: servconf.c,v 1.214 2011/03/29 18:54:17 stevesk Exp $ */ | 1 | /* $OpenBSD: servconf.c,v 1.215 2011/05/11 04:47:06 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
4 | * All rights reserved | 4 | * All rights reserved |
@@ -127,7 +127,6 @@ initialize_server_options(ServerOptions *options) | |||
127 | options->client_alive_interval = -1; | 127 | options->client_alive_interval = -1; |
128 | options->client_alive_count_max = -1; | 128 | options->client_alive_count_max = -1; |
129 | options->authorized_keys_file = NULL; | 129 | options->authorized_keys_file = NULL; |
130 | options->authorized_keys_file2 = NULL; | ||
131 | options->num_accept_env = 0; | 130 | options->num_accept_env = 0; |
132 | options->permit_tun = -1; | 131 | options->permit_tun = -1; |
133 | options->num_permitted_opens = -1; | 132 | options->num_permitted_opens = -1; |
@@ -264,13 +263,6 @@ fill_default_server_options(ServerOptions *options) | |||
264 | options->client_alive_interval = 0; | 263 | options->client_alive_interval = 0; |
265 | if (options->client_alive_count_max == -1) | 264 | if (options->client_alive_count_max == -1) |
266 | options->client_alive_count_max = 3; | 265 | options->client_alive_count_max = 3; |
267 | if (options->authorized_keys_file2 == NULL) { | ||
268 | /* authorized_keys_file2 falls back to authorized_keys_file */ | ||
269 | if (options->authorized_keys_file != NULL) | ||
270 | options->authorized_keys_file2 = xstrdup(options->authorized_keys_file); | ||
271 | else | ||
272 | options->authorized_keys_file2 = xstrdup(_PATH_SSH_USER_PERMITTED_KEYS2); | ||
273 | } | ||
274 | if (options->authorized_keys_file == NULL) | 266 | if (options->authorized_keys_file == NULL) |
275 | options->authorized_keys_file = xstrdup(_PATH_SSH_USER_PERMITTED_KEYS); | 267 | options->authorized_keys_file = xstrdup(_PATH_SSH_USER_PERMITTED_KEYS); |
276 | if (options->permit_tun == -1) | 268 | if (options->permit_tun == -1) |
@@ -1252,9 +1244,6 @@ process_server_config_line(ServerOptions *options, char *line, | |||
1252 | case sAuthorizedKeysFile: | 1244 | case sAuthorizedKeysFile: |
1253 | charptr = &options->authorized_keys_file; | 1245 | charptr = &options->authorized_keys_file; |
1254 | goto parse_tilde_filename; | 1246 | goto parse_tilde_filename; |
1255 | case sAuthorizedKeysFile2: | ||
1256 | charptr = &options->authorized_keys_file2; | ||
1257 | goto parse_tilde_filename; | ||
1258 | case sAuthorizedPrincipalsFile: | 1247 | case sAuthorizedPrincipalsFile: |
1259 | charptr = &options->authorized_principals_file; | 1248 | charptr = &options->authorized_principals_file; |
1260 | parse_tilde_filename: | 1249 | parse_tilde_filename: |
@@ -1519,7 +1508,6 @@ copy_set_server_options(ServerOptions *dst, ServerOptions *src, int preauth) | |||
1519 | M_CP_STROPT(trusted_user_ca_keys); | 1508 | M_CP_STROPT(trusted_user_ca_keys); |
1520 | M_CP_STROPT(revoked_keys_file); | 1509 | M_CP_STROPT(revoked_keys_file); |
1521 | M_CP_STROPT(authorized_keys_file); | 1510 | M_CP_STROPT(authorized_keys_file); |
1522 | M_CP_STROPT(authorized_keys_file2); | ||
1523 | M_CP_STROPT(authorized_principals_file); | 1511 | M_CP_STROPT(authorized_principals_file); |
1524 | } | 1512 | } |
1525 | 1513 | ||
@@ -1737,7 +1725,6 @@ dump_config(ServerOptions *o) | |||
1737 | dump_cfg_string(sMacs, o->macs); | 1725 | dump_cfg_string(sMacs, o->macs); |
1738 | dump_cfg_string(sBanner, o->banner); | 1726 | dump_cfg_string(sBanner, o->banner); |
1739 | dump_cfg_string(sAuthorizedKeysFile, o->authorized_keys_file); | 1727 | dump_cfg_string(sAuthorizedKeysFile, o->authorized_keys_file); |
1740 | dump_cfg_string(sAuthorizedKeysFile2, o->authorized_keys_file2); | ||
1741 | dump_cfg_string(sForceCommand, o->adm_forced_command); | 1728 | dump_cfg_string(sForceCommand, o->adm_forced_command); |
1742 | dump_cfg_string(sChrootDirectory, o->chroot_directory); | 1729 | dump_cfg_string(sChrootDirectory, o->chroot_directory); |
1743 | dump_cfg_string(sTrustedUserCAKeys, o->trusted_user_ca_keys); | 1730 | dump_cfg_string(sTrustedUserCAKeys, o->trusted_user_ca_keys); |