summaryrefslogtreecommitdiff
path: root/servconf.h
diff options
context:
space:
mode:
Diffstat (limited to 'servconf.h')
-rw-r--r--servconf.h19
1 files changed, 5 insertions, 14 deletions
diff --git a/servconf.h b/servconf.h
index 024987dd6..828e94c5c 100644
--- a/servconf.h
+++ b/servconf.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: servconf.h,v 1.59 2002/07/30 17:03:55 markus Exp $ */ 1/* $OpenBSD: servconf.h,v 1.65 2003/09/01 18:15:50 markus Exp $ */
2 2
3/* 3/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi> 4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -65,15 +65,12 @@ typedef struct {
65 int gateway_ports; /* If true, allow remote connects to forwarded ports. */ 65 int gateway_ports; /* If true, allow remote connects to forwarded ports. */
66 SyslogFacility log_facility; /* Facility for system logging. */ 66 SyslogFacility log_facility; /* Facility for system logging. */
67 LogLevel log_level; /* Level for system logging. */ 67 LogLevel log_level; /* Level for system logging. */
68 int rhosts_authentication; /* If true, permit rhosts
69 * authentication. */
70 int rhosts_rsa_authentication; /* If true, permit rhosts RSA 68 int rhosts_rsa_authentication; /* If true, permit rhosts RSA
71 * authentication. */ 69 * authentication. */
72 int hostbased_authentication; /* If true, permit ssh2 hostbased auth */ 70 int hostbased_authentication; /* If true, permit ssh2 hostbased auth */
73 int hostbased_uses_name_from_packet_only; /* experimental */ 71 int hostbased_uses_name_from_packet_only; /* experimental */
74 int rsa_authentication; /* If true, permit RSA authentication. */ 72 int rsa_authentication; /* If true, permit RSA authentication. */
75 int pubkey_authentication; /* If true, permit ssh2 pubkey authentication. */ 73 int pubkey_authentication; /* If true, permit ssh2 pubkey authentication. */
76#if defined(KRB4) || defined(KRB5)
77 int kerberos_authentication; /* If true, permit Kerberos 74 int kerberos_authentication; /* If true, permit Kerberos
78 * authentication. */ 75 * authentication. */
79 int kerberos_or_local_passwd; /* If true, permit kerberos 76 int kerberos_or_local_passwd; /* If true, permit kerberos
@@ -83,14 +80,8 @@ typedef struct {
83 * /etc/passwd */ 80 * /etc/passwd */
84 int kerberos_ticket_cleanup; /* If true, destroy ticket 81 int kerberos_ticket_cleanup; /* If true, destroy ticket
85 * file on logout. */ 82 * file on logout. */
86#endif 83 int gss_authentication; /* If true, permit GSSAPI authentication */
87#if defined(AFS) || defined(KRB5) 84 int gss_cleanup_creds; /* If true, destroy cred cache on logout */
88 int kerberos_tgt_passing; /* If true, permit Kerberos TGT
89 * passing. */
90#endif
91#ifdef AFS
92 int afs_token_passing; /* If true, permit AFS token passing. */
93#endif
94 int password_authentication; /* If true, permit password 85 int password_authentication; /* If true, permit password
95 * authentication. */ 86 * authentication. */
96 int kbd_interactive_authentication; /* If true, permit */ 87 int kbd_interactive_authentication; /* If true, permit */
@@ -118,7 +109,7 @@ typedef struct {
118 int max_startups_rate; 109 int max_startups_rate;
119 int max_startups; 110 int max_startups;
120 char *banner; /* SSH-2 banner message */ 111 char *banner; /* SSH-2 banner message */
121 int verify_reverse_mapping; /* cross-check ip and dns */ 112 int use_dns;
122 int client_alive_interval; /* 113 int client_alive_interval; /*
123 * poke the client this often to 114 * poke the client this often to
124 * see if it's still there 115 * see if it's still there
@@ -131,7 +122,7 @@ typedef struct {
131 122
132 char *authorized_keys_file; /* File containing public keys */ 123 char *authorized_keys_file; /* File containing public keys */
133 char *authorized_keys_file2; 124 char *authorized_keys_file2;
134 int pam_authentication_via_kbd_int; 125 int use_pam; /* Enable auth via PAM */
135} ServerOptions; 126} ServerOptions;
136 127
137void initialize_server_options(ServerOptions *); 128void initialize_server_options(ServerOptions *);