Lines Matching refs:options

78 extern Options options;
94 options.required_rsa_size)) != 0)
128 for (i = 0; i < options.num_user_hostfiles; i++)
129 load_hostkeys(hostkeys, hostname, options.user_hostfiles[i], 0);
130 for (i = 0; i < options.num_system_hostfiles; i++) {
132 options.system_hostfiles[i], 0);
134 if (options.known_hosts_command != NULL) {
135 load_hostkeys_command(hostkeys, options.known_hosts_command,
145 best = first_alg(options.hostkeyalgorithms);
151 ret = xstrdup(options.hostkeyalgorithms);
159 oavail = avail = xstrdup(options.hostkeyalgorithms);
224 if (options.rekey_limit || options.rekey_interval)
225 ssh_packet_set_rekey_limits(ssh, options.rekey_limit,
226 options.rekey_interval);
233 if (options.hostkeyalgorithms == NULL ||
234 options.hostkeyalgorithms[0] == '-' ||
235 options.hostkeyalgorithms[0] == '+')
240 if ((r = kex_assemble_names(&options.hostkeyalgorithms,
249 options.kex_algorithms, options.ciphers, options.macs,
250 compression_alg_list(options.compression),
251 hkalgs ? hkalgs : options.hostkeyalgorithms);
383 &options.gss_authentication,
389 &options.hostbased_authentication,
394 &options.pubkey_authentication,
399 &options.kbd_interactive_authentication,
400 &options.batch_mode},
404 &options.password_authentication,
405 &options.batch_mode},
421 if (options.preferred_authentications == NULL)
422 options.preferred_authentications = authmethods_get();
571 if (len > 0 && options.log_level >= SYSLOG_LEVEL_INFO)
653 fp = sshkey_fingerprint(id->key, options.fingerprint_hash,
719 fp = sshkey_fingerprint(key, options.fingerprint_hash,
820 status = ssh_gssapi_init_ctx(gssctxt, options.gss_deleg_creds,
977 (void)ssh_gssapi_init_ctx(gssctxt, options.gss_deleg_creds,
1028 const char *host = options.host_key_alias ? options.host_key_alias :
1032 if (authctxt->attempt_passwd++ >= options.number_of_password_prompts)
1077 host = options.host_key_alias ? options.host_key_alias : authctxt->host;
1160 options.pubkey_accepted_algos, NULL);
1177 oallowed = allowed = xstrdup(options.pubkey_accepted_algos);
1237 options.fingerprint_hash, SSH_FP_DEFAULT)) == NULL)
1239 notifier = notify_start(options.batch_mode,
1245 alg, options.sk_provider, pin, compat)) != 0) {
1314 (options.pubkey_authentication & SSH_PUBKEY_AUTH_HBOUND) != 0) {
1319 if ((fp = sshkey_fingerprint(id->key, options.fingerprint_hash,
1526 for (i = 0; i <= options.number_of_password_prompts; i++) {
1542 if (options.batch_mode) {
1562 options.sk_provider == NULL) {
1570 options.required_rsa_size)) != 0) {
1593 options.pubkey_accepted_algos, 0) == 1)
1600 options.pubkey_accepted_algos, 0) == 1)
1603 options.pubkey_accepted_algos, 0) == 1)
1608 options.pubkey_accepted_algos, 0) == 1)
1611 options.pubkey_accepted_algos, 0) == 1)
1674 for (i = 0; i < options.num_identity_files; i++) {
1675 key = options.identity_keys[i];
1679 "certificate", options.identity_files[i]);
1682 if (key && sshkey_is_sk(key) && options.sk_provider == NULL) {
1685 options.identity_files[i]);
1688 options.identity_keys[i] = NULL;
1692 id->filename = xstrdup(options.identity_files[i]);
1693 id->userprovided = options.identity_file_userprovided[i];
1697 for (i = 0; i < options.num_certificate_files; i++) {
1698 key = options.certificates[i];
1702 "certificate", options.identity_files[i]);
1705 if (key && sshkey_is_sk(key) && options.sk_provider == NULL) {
1709 options.identity_files[i]);
1715 id->filename = xstrdup(options.certificate_files[i]);
1716 id->userprovided = options.certificate_file_userprovided[i];
1723 options.required_rsa_size)) != 0) {
1742 if (!found && !options.identities_only) {
1775 if (!found && options.identities_only) {
1904 if (authctxt->attempt_kbdint++ >= options.number_of_password_prompts)
1919 (r = sshpkt_put_cstring(ssh, options.kbd_interactive_devices ?
1920 options.kbd_interactive_devices : "")) != 0 ||
1975 authctxt->server_user, options.host_key_alias ?
1976 options.host_key_alias : authctxt->host, prompt) == -1)
2130 authctxt->oktypes = xstrdup(options.hostbased_accepted_algos);
2175 if ((fp = sshkey_fingerprint(private, options.fingerprint_hash,
2256 * given auth method name, if configurable options permit this method fill
2264 /* return false if options indicate this method is disabled */
2303 authlist = options.preferred_authentications;
2309 preferred = options.preferred_authentications;