Lines Matching defs:options
140 /* Server configuration options. */
141 ServerOptions options;
234 /* options.max_startup sized array of fd ints */
283 for (i = 0; i < options.max_startups; i++)
388 sensitive_data.server_key ? "new " : "", options.server_key_bits);
392 options.server_key_bits);
420 if ((options.protocol & SSH_PROTO_1) &&
421 (options.protocol & SSH_PROTO_2)) {
424 } else if (options.protocol & SSH_PROTO_2) {
435 *options.version_addendum == '\0' ? "" : " ",
436 options.version_addendum, newline);
513 if (options.protocol & SSH_PROTO_2)
519 if (!(options.protocol & SSH_PROTO_1)) {
532 if (options.protocol & SSH_PROTO_2) {
566 for (i = 0; i < options.num_host_key_files; i++) {
593 for (i = 0; i < options.num_host_key_files; i++) {
618 if (options.gss_authentication)
735 if (authctxt->pw->pw_uid == 0 || options.use_login) {
796 for (i = 0; i < options.num_host_key_files; i++) {
844 for (i = 0; i < options.num_host_key_files; i++) {
883 if (ind < 0 || ind >= options.num_host_key_files)
891 if (ind < 0 || ind >= options.num_host_key_files)
901 for (i = 0; i < options.num_host_key_files; i++) {
933 for (i = nkeys = 0; i < options.num_host_key_files; i++) {
938 fp = sshkey_fingerprint(key, options.fingerprint_hash,
973 if (startups < options.max_startups_begin)
975 if (startups >= options.max_startups)
977 if (options.max_startups_rate == 100)
980 p = 100 - options.max_startups_rate;
981 p *= startups - options.max_startups_begin;
982 p /= options.max_startups - options.max_startups_begin;
983 p += options.max_startups_rate;
1153 for (ai = options.listen_addrs; ai; ai = ai->ai_next) {
1179 * Set socket options.
1208 freeaddrinfo(options.listen_addrs);
1237 startup_pipes = xcalloc(options.max_startups, sizeof(int));
1238 for (i = 0; i < options.max_startups; i++)
1255 for (i = 0; i < options.max_startups; i++)
1267 if (options.pid_file != NULL)
1268 unlink(options.pid_file);
1279 for (i = 0; i < options.max_startups; i++)
1331 for (j = 0; j < options.max_startups; j++)
1388 options.log_level,
1389 options.log_facility,
1415 if ((options.protocol & SSH_PROTO_1) &&
1419 alarm(options.key_regeneration_time);
1492 /* Initialize configuration options to their default values. */
1493 initialize_server_options(&options);
1499 options.address_family = AF_INET;
1502 options.address_family = AF_INET6;
1508 if (options.num_host_cert_files >= MAX_HOSTCERTS) {
1512 options.host_cert_files[options.num_host_cert_files++] =
1518 options.log_level = SYSLOG_LEVEL_DEBUG1;
1519 } else if (options.log_level < SYSLOG_LEVEL_DEBUG3)
1520 options.log_level++;
1545 options.log_level = SYSLOG_LEVEL_QUIET;
1548 options.server_key_bits = (int)strtonum(optarg, 256,
1552 options.ports_from_cmdline = 1;
1553 if (options.num_ports >= MAX_PORTS) {
1557 options.ports[options.num_ports++] = a2port(optarg);
1558 if (options.ports[options.num_ports-1] <= 0) {
1564 if ((options.login_grace_time = convtime(optarg)) == -1) {
1570 if ((options.key_regeneration_time = convtime(optarg)) == -1) {
1576 if (options.num_host_key_files >= MAX_HOSTKEYS) {
1580 options.host_key_files[options.num_host_key_files++] =
1603 if (process_server_config_line(&options, line,
1637 options.log_level == SYSLOG_LEVEL_NOT_SET ?
1638 SYSLOG_LEVEL_INFO : options.log_level,
1639 options.log_facility == SYSLOG_FACILITY_NOT_SET ?
1640 SYSLOG_FACILITY_AUTH : options.log_facility,
1681 parse_server_config(&options, rexeced_flag ? "rexec" : config_file_name,
1686 /* Fill in default values for those options not explicitly set. */
1687 fill_default_server_options(&options);
1690 if (options.challenge_response_authentication)
1691 options.kbd_interactive_authentication = 1;
1693 /* Check that options are sensible */
1694 if (options.authorized_keys_command_user == NULL &&
1695 (options.authorized_keys_command != NULL &&
1696 strcasecmp(options.authorized_keys_command, "none") != 0))
1706 if (options.num_auth_methods != 0) {
1707 if ((options.protocol & SSH_PROTO_1))
1710 for (n = 0; n < options.num_auth_methods; n++) {
1711 if (auth2_methods_valid(options.auth_methods[n],
1715 if (n >= options.num_auth_methods)
1721 channel_set_af(options.address_family);
1739 if (use_privsep || options.kerberos_authentication)
1758 sensitive_data.host_keys = xcalloc(options.num_host_key_files,
1760 sensitive_data.host_pubkeys = xcalloc(options.num_host_key_files,
1763 if (options.host_key_agent) {
1764 if (strcmp(options.host_key_agent, SSH_AUTHSOCKET_ENV_NAME))
1766 options.host_key_agent, 1);
1771 options.host_key_agent, ssh_err(r));
1774 for (i = 0; i < options.num_host_key_files; i++) {
1775 if (options.host_key_files[i] == NULL)
1777 key = key_load_private(options.host_key_files[i], "", NULL);
1778 pubkey = key_load_public(options.host_key_files[i], NULL);
1787 options.host_key_files[i]);
1793 options.host_key_files[i]);
1812 if ((fp = sshkey_fingerprint(pubkey, options.fingerprint_hash,
1820 if ((options.protocol & SSH_PROTO_1) && !sensitive_data.have_ssh1_key) {
1822 options.protocol &= ~SSH_PROTO_1;
1824 if ((options.protocol & SSH_PROTO_2) && !sensitive_data.have_ssh2_key) {
1826 options.protocol &= ~SSH_PROTO_2;
1828 if (!(options.protocol & (SSH_PROTO_1|SSH_PROTO_2))) {
1837 sensitive_data.host_certificates = xcalloc(options.num_host_key_files,
1839 for (i = 0; i < options.num_host_key_files; i++)
1842 for (i = 0; i < options.num_host_cert_files; i++) {
1843 if (options.host_cert_files[i] == NULL)
1845 key = key_load_public(options.host_cert_files[i], NULL);
1848 options.host_cert_files[i]);
1853 options.host_cert_files[i]);
1858 for (j = 0; j < options.num_host_key_files; j++) {
1865 if (j >= options.num_host_key_files) {
1867 options.host_cert_files[i]);
1878 if (options.protocol & SSH_PROTO_1) {
1879 if (options.server_key_bits < 512 ||
1880 options.server_key_bits > 32768) {
1889 if (options.server_key_bits >
1891 SSH_KEY_BITS_RESERVED && options.server_key_bits <
1894 options.server_key_bits =
1898 options.server_key_bits);
1924 parse_server_match_config(&options, connection_info);
1925 dump_config(&options);
1959 log_init(__progname, options.log_level, options.log_facility, log_stderr);
1983 log_init(__progname, options.log_level, options.log_facility, log_stderr);
2000 if (options.protocol & SSH_PROTO_1)
2012 if (options.pid_file != NULL && !debug_flag) {
2013 FILE *f = fopen(options.pid_file, "w");
2017 options.pid_file, strerror(errno));
2070 log_init(__progname, options.log_level,
2071 options.log_facility, log_stderr);
2111 if (options.tcp_keep_alive && packet_connection_is_on_socket() &&
2122 * get_remote_ipaddr here so IP options will be checked.
2151 alarm(options.login_grace_time);
2223 if (options.gss_authentication) {
2230 if (options.use_pam) {
2247 packet_set_timeout(options.client_alive_interval,
2248 options.client_alive_count_max);
2265 if (options.use_pam)
2385 if (options.rhosts_rsa_authentication)
2387 if (options.rsa_authentication)
2389 if (options.challenge_response_authentication == 1)
2391 if (options.password_authentication)
2537 if (options.ciphers != NULL) {
2539 myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;
2546 if (options.macs != NULL) {
2548 myproposal[PROPOSAL_MAC_ALGS_STOC] = options.macs;
2550 if (options.compression == COMP_NONE) {
2553 } else if (options.compression == COMP_DELAYED) {
2557 if (options.kex_algorithms != NULL)
2558 myproposal[PROPOSAL_KEX_ALGS] = options.kex_algorithms;
2563 if (options.rekey_limit || options.rekey_interval)
2564 packet_set_rekey_limits((u_int32_t)options.rekey_limit,
2565 (time_t)options.rekey_interval);