• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10.1/OpenSSH-189/openssh/

Lines Matching refs:options

160  * General data structure for command line options and options configurable
163 Options options;
325 initialize_options(&options);
337 options.protocol = SSH_PROTO_1;
340 options.protocol = SSH_PROTO_2;
343 options.address_family = AF_INET;
346 options.address_family = AF_INET6;
356 options.forward_x11 = 0;
359 options.forward_x11 = 1;
365 options.forward_x11 = 1;
366 options.forward_x11_trusted = 1;
369 options.gateway_ports = 1;
391 options.use_privileged_port = 0;
394 options.forward_agent = 0;
397 options.forward_agent = 1;
400 options.gss_deleg_creds = 0;
403 options.gss_authentication = 1;
404 options.gss_deleg_creds = 1;
413 add_identity_file(&options, NULL, optarg, 1);
417 options.pkcs11_provider = xstrdup(optarg);
423 if (options.request_tty == REQUEST_TTY_YES)
424 options.request_tty = REQUEST_TTY_FORCE;
426 options.request_tty = REQUEST_TTY_YES;
431 options.log_level = SYSLOG_LEVEL_DEBUG1;
433 if (options.log_level < SYSLOG_LEVEL_DEBUG3)
434 options.log_level++;
445 if (options.tun_open == -1)
446 options.tun_open = SSH_TUNMODE_DEFAULT;
447 options.tun_local = a2tun(optarg, &options.tun_remote);
448 if (options.tun_local == SSH_TUNID_ERR) {
469 options.request_tty = REQUEST_TTY_NO;
471 options.clear_forwardings = 1;
472 options.exit_on_forward_failure = 1;
475 options.log_level = SYSLOG_LEVEL_QUIET;
481 options.escape_char = (u_char) optarg[1] & 31;
483 options.escape_char = (u_char) optarg[0];
485 options.escape_char = SSH_ESCAPECHAR_NONE;
495 options.ciphers = xstrdup(optarg);
496 options.cipher = SSH_CIPHER_INVALID;
499 options.cipher = cipher_number(optarg);
500 if (options.cipher == -1) {
506 if (options.cipher == SSH_CIPHER_3DES)
507 options.ciphers = "3des-cbc";
508 else if (options.cipher == SSH_CIPHER_BLOWFISH)
509 options.ciphers = "blowfish-cbc";
511 options.ciphers = (char *)-1;
516 options.macs = xstrdup(optarg);
524 if (options.control_master == SSHCTL_MASTER_YES)
525 options.control_master = SSHCTL_MASTER_ASK;
527 options.control_master = SSHCTL_MASTER_YES;
530 options.port = a2port(optarg);
531 if (options.port <= 0) {
537 options.user = optarg;
542 add_local_forward(&options, &fwd);
553 add_remote_forward(&options, &fwd);
564 add_local_forward(&options, &fwd);
574 options.compression = 1;
578 options.request_tty = REQUEST_TTY_NO;
581 options.request_tty = REQUEST_TTY_NO;
586 if (process_config_line(&options, host ? host : "",
596 if (options.control_path != NULL)
597 free(options.control_path);
598 options.control_path = xstrdup(optarg);
601 options.bind_address = optarg;
620 options.user = p;
674 options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level,
682 if (!read_config_file(config, host, &options, SSHCONF_USERCONF))
689 (void)read_config_file(buf, host, &options,
694 &options, 0);
698 fill_default_options(&options);
700 channel_set_af(options.address_family);
703 log_init(argv0, options.log_level, SYSLOG_FACILITY_USER, !use_syslog);
705 if (options.request_tty == REQUEST_TTY_YES ||
706 options.request_tty == REQUEST_TTY_FORCE)
711 tty_flag = options.request_tty != REQUEST_TTY_NO;
714 if (options.request_tty == REQUEST_TTY_NO || muxclient_command != 0)
718 options.request_tty != REQUEST_TTY_FORCE) {
727 if (options.user == NULL)
728 options.user = xstrdup(pw->pw_name);
731 if (options.port == 0) {
733 options.port = sp ? ntohs(sp->s_port) : SSH_DEFAULT_PORT;
738 if (options.hostname != NULL) {
739 host = percent_expand(options.hostname,
747 snprintf(portstr, sizeof(portstr), "%d", options.port);
749 if (options.local_command != NULL) {
750 debug3("expanding LocalCommand: %s", options.local_command);
751 cp = options.local_command;
752 options.local_command = percent_expand(cp, "d", pw->pw_dir,
753 "h", host, "l", thishost, "n", host_arg, "r", options.user,
756 debug3("expanded LocalCommand: %s", options.local_command);
761 if (options.host_key_alias != NULL) {
762 for (p = options.host_key_alias; *p; p++)
767 if (options.proxy_command != NULL &&
768 strcmp(options.proxy_command, "none") == 0) {
769 xfree(options.proxy_command);
770 options.proxy_command = NULL;
772 if (options.control_path != NULL &&
773 strcmp(options.control_path, "none") == 0) {
774 xfree(options.control_path);
775 options.control_path = NULL;
778 if (options.control_path != NULL) {
779 cp = tilde_expand_filename(options.control_path,
781 xfree(options.control_path);
782 options.control_path = percent_expand(cp, "h", host,
783 "l", thishost, "n", host_arg, "r", options.user,
788 if (muxclient_command != 0 && options.control_path == NULL)
790 if (options.control_path != NULL)
791 muxclient(options.control_path);
793 timeout_ms = options.connection_timeout * 1000;
796 if (ssh_connect(host, &hostaddr, options.port,
797 options.address_family, options.connection_attempts, &timeout_ms,
798 options.tcp_keep_alive,
800 options.use_privileged_port,
802 original_effective_uid == 0 && options.use_privileged_port,
804 options.proxy_command) != 0)
821 if (options.rhosts_rsa_authentication ||
822 options.hostbased_authentication) {
850 if (options.hostbased_authentication == 1 &&
905 /* load options.identity_files */
909 tilde_expand_paths(options.system_hostfiles,
910 options.num_system_hostfiles);
911 tilde_expand_paths(options.user_hostfiles, options.num_user_hostfiles);
918 options.port, pw, timeout_ms);
939 for (i = 0; i < options.num_identity_files; i++) {
940 if (options.identity_files[i]) {
941 xfree(options.identity_files[i]);
942 options.identity_files[i] = NULL;
944 if (options.identity_keys[i]) {
945 key_free(options.identity_keys[i]);
946 options.identity_keys[i] = NULL;
953 if (options.control_path != NULL && muxserver_sock != -1)
954 unlink(options.control_path);
984 options.request_tty = orequest_tty;
988 options.control_master = SSHCTL_MASTER_NO;
989 muxclient(options.control_path);
1003 setproctitle("%s [mux]", options.control_path);
1042 if (options.exit_on_forward_failure)
1049 if (++remote_forward_confirms_received == options.num_remote_forwards) {
1092 for (i = 0; i < options.num_local_forwards; i++) {
1095 (options.local_forwards[i].listen_host == NULL) ?
1096 (options.gateway_ports ? "*" : "LOCALHOST") :
1097 options.local_forwards[i].listen_host,
1098 options.local_forwards[i].listen_port,
1099 options.local_forwards[i].connect_host,
1100 options.local_forwards[i].connect_port);
1102 options.local_forwards[i].listen_host,
1103 options.local_forwards[i].listen_port,
1104 options.local_forwards[i].connect_host,
1105 options.local_forwards[i].connect_port,
1106 options.gateway_ports);
1108 if (i > 0 && success != i && options.exit_on_forward_failure)
1114 for (i = 0; i < options.num_remote_forwards; i++) {
1117 (options.remote_forwards[i].listen_host == NULL) ?
1118 "LOCALHOST" : options.remote_forwards[i].listen_host,
1119 options.remote_forwards[i].listen_port,
1120 options.remote_forwards[i].connect_host,
1121 options.remote_forwards[i].connect_port);
1122 options.remote_forwards[i].handle =
1124 options.remote_forwards[i].listen_host,
1125 options.remote_forwards[i].listen_port,
1126 options.remote_forwards[i].connect_host,
1127 options.remote_forwards[i].connect_port);
1128 if (options.remote_forwards[i].handle < 0) {
1129 if (options.exit_on_forward_failure)
1136 &options.remote_forwards[i]);
1141 if (options.tun_open != SSH_TUNMODE_NO) {
1142 if (client_request_tun_fwd(options.tun_open,
1143 options.tun_local, options.tun_remote) == -1) {
1144 if (options.exit_on_forward_failure)
1155 if (options.forward_agent) {
1158 options.forward_agent = 0;
1173 if (options.compression) {
1175 options.compression_level);
1177 if (options.compression_level < 1 ||
1178 options.compression_level > 9)
1184 packet_put_int(options.compression_level);
1189 packet_start_compression(options.compression_level);
1239 if (options.forward_x11 && display != NULL) {
1242 client_x11_get_proto(display, options.xauth_location,
1243 options.forward_x11_trusted,
1244 options.forward_x11_timeout,
1264 options.ip_qos_interactive, options.ip_qos_bulk);
1269 if (options.forward_agent) {
1285 if (options.local_command != NULL &&
1286 options.permit_local_command)
1287 ssh_local_cmd(options.local_command);
1294 if (options.exit_on_forward_failure &&
1295 options.num_remote_forwards > 0) {
1325 options.escape_char : SSH_ESCAPECHAR_NONE, 0);
1340 if (options.forward_x11 && display != NULL) {
1343 client_x11_get_proto(display, options.xauth_location,
1344 options.forward_x11_trusted,
1345 options.forward_x11_timeout, &proto, &data);
1357 if (options.forward_agent) {
1365 options.ip_qos_interactive, options.ip_qos_bulk);
1424 if (!options.control_persist)
1440 if (options.control_persist && muxserver_sock != -1) {
1443 orequest_tty = options.request_tty;
1456 if (options.control_persist && muxserver_sock == -1)
1463 if (options.control_master == SSHCTL_MASTER_NO &&
1473 if (options.local_command != NULL &&
1474 options.permit_local_command)
1475 ssh_local_cmd(options.local_command);
1482 if (options.exit_on_forward_failure &&
1483 options.num_remote_forwards > 0) {
1490 if (options.use_roaming)
1494 options.escape_char : SSH_ESCAPECHAR_NONE, id);
1518 if (options.pkcs11_provider != NULL &&
1519 options.num_identity_files < SSH_MAX_IDENTITY_FILES &&
1520 (pkcs11_init(!options.batch_mode) == 0) &&
1521 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL,
1530 xstrdup(options.pkcs11_provider); /* XXX */
1543 for (i = 0; i < options.num_identity_files; i++) {
1545 strcasecmp(options.identity_files[i], "none") == 0) {
1546 xfree(options.identity_files[i]);
1549 cp = tilde_expand_filename(options.identity_files[i],
1553 "r", options.user, (char *)NULL);
1558 xfree(options.identity_files[i]);
1586 options.num_identity_files = n_ids;
1587 memcpy(options.identity_files, identity_files, sizeof(identity_files));
1588 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys));