diff options
author | Jakob Schlyter <jakob@cvs.openbsd.org> | 2003-05-15 14:02:48 +0000 |
---|---|---|
committer | Jakob Schlyter <jakob@cvs.openbsd.org> | 2003-05-15 14:02:48 +0000 |
commit | 782dd291c3e106d804c772d5a49109766ddd699f (patch) | |
tree | 6b44ec0a9fbe1889fee246e2bb3b638d022083fd /usr.bin/ssh/readconf.c | |
parent | 1834f1e70f6b015219c87aae683639d4c1fcdb23 (diff) |
warn for unsupported config option. ok markus@
Diffstat (limited to 'usr.bin/ssh/readconf.c')
-rw-r--r-- | usr.bin/ssh/readconf.c | 38 |
1 files changed, 24 insertions, 14 deletions
diff --git a/usr.bin/ssh/readconf.c b/usr.bin/ssh/readconf.c index 6634b215962..adbb13fa435 100644 --- a/usr.bin/ssh/readconf.c +++ b/usr.bin/ssh/readconf.c @@ -12,7 +12,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: readconf.c,v 1.109 2003/05/15 04:08:44 jakob Exp $"); +RCSID("$OpenBSD: readconf.c,v 1.110 2003/05/15 14:02:47 jakob Exp $"); #include "ssh.h" #include "xmalloc.h" @@ -107,7 +107,7 @@ typedef enum { oHostKeyAlgorithms, oBindAddress, oSmartcardDevice, oClearAllForwardings, oNoHostAuthenticationForLocalhost, oEnableSSHKeysign, oRekeyLimit, oVerifyHostKeyDNS, - oDeprecated + oDeprecated, oUnsupported } OpCodes; /* Textual representations of the tokens. */ @@ -133,9 +133,18 @@ static struct { { "challengeresponseauthentication", oChallengeResponseAuthentication }, { "skeyauthentication", oChallengeResponseAuthentication }, /* alias */ { "tisauthentication", oChallengeResponseAuthentication }, /* alias */ +#if defined(KRB4) || defined(KRB5) { "kerberosauthentication", oKerberosAuthentication }, { "kerberostgtpassing", oKerberosTgtPassing }, +#else + { "kerberosauthentication", oUnsupported }, + { "kerberostgtpassing", oUnsupported }, +#endif +#if defined(AFS) { "afstokenpassing", oAFSTokenPassing }, +#else + { "afstokenpassing", oUnsupported }, +#endif { "fallbacktorsh", oDeprecated }, { "usersh", oDeprecated }, { "identityfile", oIdentityFile }, @@ -170,10 +179,18 @@ static struct { { "preferredauthentications", oPreferredAuthentications }, { "hostkeyalgorithms", oHostKeyAlgorithms }, { "bindaddress", oBindAddress }, +#ifdef SMARTCARD { "smartcarddevice", oSmartcardDevice }, +#else + { "smartcarddevice", oUnsupported }, +#endif { "clearallforwardings", oClearAllForwardings }, { "enablesshkeysign", oEnableSSHKeysign }, +#ifdef DNS { "verifyhostkeydns", oVerifyHostKeyDNS }, +#else + { "verifyhostkeydns", oUnsupported }, +#endif { "nohostauthenticationforlocalhost", oNoHostAuthenticationForLocalhost }, { "rekeylimit", oRekeyLimit }, { NULL, oBadOption } @@ -695,6 +712,11 @@ parse_int: filename, linenum, keyword); return 0; + case oUnsupported: + error("%s line %d: Unsupported option \"%s\"", + filename, linenum, keyword); + return 0; + default: fatal("process_config_line: Unimplemented opcode %d", opcode); } @@ -842,23 +864,11 @@ fill_default_options(Options * options) if (options->challenge_response_authentication == -1) options->challenge_response_authentication = 1; if (options->kerberos_authentication == -1) -#if defined(KRB4) || defined(KRB5) options->kerberos_authentication = 1; -#else - options->kerberos_authentication = 0; -#endif if (options->kerberos_tgt_passing == -1) -#if defined(KRB4) || defined(KRB5) options->kerberos_tgt_passing = 1; -#else - options->kerberos_tgt_passing = 0; -#endif if (options->afs_token_passing == -1) -#if defined(AFS) options->afs_token_passing = 1; -#else - options->afs_token_passing = 0; -#endif if (options->password_authentication == -1) options->password_authentication = 1; if (options->kbd_interactive_authentication == -1) |