]> andersk Git - openssh.git/blame_incremental - servconf.h
- (djm) Clean up. Strip some unnecessary differences with OpenBSD's code,
[openssh.git] / servconf.h
... / ...
CommitLineData
1/*
2 * Author: Tatu Ylonen <ylo@cs.hut.fi>
3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4 * All rights reserved
5 * Definitions for server configuration data and for the functions reading it.
6 *
7 * As far as I am concerned, the code I have written for this software
8 * can be used freely for any purpose. Any derived versions of this
9 * software must be clearly marked as such, and if the derived work is
10 * incompatible with the protocol description in the RFC file, it must be
11 * called by a name other than "ssh" or "Secure Shell".
12 */
13
14/* RCSID("$OpenBSD: servconf.h,v 1.28 2000/09/07 20:27:53 deraadt Exp $"); */
15
16#ifndef SERVCONF_H
17#define SERVCONF_H
18
19#define MAX_PORTS 256 /* Max # ports. */
20
21#define MAX_ALLOW_USERS 256 /* Max # users on allow list. */
22#define MAX_DENY_USERS 256 /* Max # users on deny list. */
23#define MAX_ALLOW_GROUPS 256 /* Max # groups on allow list. */
24#define MAX_DENY_GROUPS 256 /* Max # groups on deny list. */
25#define MAX_SUBSYSTEMS 256 /* Max # subsystems. */
26
27typedef struct {
28 unsigned int num_ports;
29 unsigned int ports_from_cmdline;
30 u_short ports[MAX_PORTS]; /* Port number to listen on. */
31 char *listen_addr; /* Address on which the server listens. */
32 struct addrinfo *listen_addrs; /* Addresses on which the server listens. */
33 char *host_key_file; /* File containing host key. */
34 char *host_dsa_key_file; /* File containing dsa host key. */
35 char *pid_file; /* Where to put our pid */
36 int server_key_bits;/* Size of the server key. */
37 int login_grace_time; /* Disconnect if no auth in this time
38 * (sec). */
39 int key_regeneration_time; /* Server key lifetime (seconds). */
40 int permit_root_login; /* If true, permit root login. */
41 int ignore_rhosts; /* Ignore .rhosts and .shosts. */
42 int ignore_user_known_hosts; /* Ignore ~/.ssh/known_hosts
43 * for RhostsRsaAuth */
44 int print_motd; /* If true, print /etc/motd. */
45 int check_mail; /* If true, check for new mail. */
46 int x11_forwarding; /* If true, permit inet (spoofing) X11 fwd. */
47 int x11_display_offset; /* What DISPLAY number to start
48 * searching at */
49 char *xauth_location; /* Location of xauth program */
50 int strict_modes; /* If true, require string home dir modes. */
51 int keepalives; /* If true, set SO_KEEPALIVE. */
52 char *ciphers; /* Ciphers in order of preference. */
53 int protocol; /* Protocol in order of preference. */
54 int gateway_ports; /* If true, allow remote connects to forwarded ports. */
55 SyslogFacility log_facility; /* Facility for system logging. */
56 LogLevel log_level; /* Level for system logging. */
57 int rhosts_authentication; /* If true, permit rhosts
58 * authentication. */
59 int rhosts_rsa_authentication; /* If true, permit rhosts RSA
60 * authentication. */
61 int rsa_authentication; /* If true, permit RSA authentication. */
62 int dsa_authentication; /* If true, permit DSA authentication. */
63#ifdef KRB4
64 int kerberos_authentication; /* If true, permit Kerberos
65 * authentication. */
66 int kerberos_or_local_passwd; /* If true, permit kerberos
67 * and any other password
68 * authentication mechanism,
69 * such as SecurID or
70 * /etc/passwd */
71 int kerberos_ticket_cleanup; /* If true, destroy ticket
72 * file on logout. */
73#endif
74#ifdef AFS
75 int kerberos_tgt_passing; /* If true, permit Kerberos tgt
76 * passing. */
77 int afs_token_passing; /* If true, permit AFS token passing. */
78#endif
79 int password_authentication; /* If true, permit password
80 * authentication. */
81#ifdef SKEY
82 int skey_authentication; /* If true, permit s/key
83 * authentication. */
84#endif
85 int permit_empty_passwd; /* If false, do not permit empty
86 * passwords. */
87 int use_login; /* If true, login(1) is used */
88 unsigned int num_allow_users;
89 char *allow_users[MAX_ALLOW_USERS];
90 unsigned int num_deny_users;
91 char *deny_users[MAX_DENY_USERS];
92 unsigned int num_allow_groups;
93 char *allow_groups[MAX_ALLOW_GROUPS];
94 unsigned int num_deny_groups;
95 char *deny_groups[MAX_DENY_GROUPS];
96
97 unsigned int num_subsystems;
98 char *subsystem_name[MAX_SUBSYSTEMS];
99 char *subsystem_command[MAX_SUBSYSTEMS];
100
101 int max_startups_begin;
102 int max_startups_rate;
103 int max_startups;
104
105} ServerOptions;
106/*
107 * Initializes the server options to special values that indicate that they
108 * have not yet been set.
109 */
110void initialize_server_options(ServerOptions * options);
111
112/*
113 * Reads the server configuration file. This only sets the values for those
114 * options that have the special value indicating they have not been set.
115 */
116void read_server_config(ServerOptions * options, const char *filename);
117
118/* Sets values for those values that have not yet been set. */
119void fill_default_server_options(ServerOptions * options);
120
121#endif /* SERVCONF_H */
This page took 0.048235 seconds and 5 git commands to generate.