1
0
mirror of http://galexander.org/git/simplesshd.git synced 2024-11-30 11:18:12 +00:00
simplesshd/dropbear/runopts.h

197 lines
4.7 KiB
C
Raw Normal View History

2014-12-10 21:56:49 +00:00
/*
* Dropbear - a SSH2 server
*
* Copyright (c) 2002,2003 Matt Johnston
* All rights reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE. */
2019-06-09 20:44:26 +00:00
#ifndef DROPBEAR_RUNOPTS_H_
#define DROPBEAR_RUNOPTS_H_
2014-12-10 21:56:49 +00:00
#include "includes.h"
#include "signkey.h"
#include "buffer.h"
#include "auth.h"
#include "tcpfwd.h"
typedef struct runopts {
2019-06-09 20:44:26 +00:00
#if DROPBEAR_SVR_REMOTETCPFWD || DROPBEAR_CLI_LOCALTCPFWD \
|| DROPBEAR_CLI_REMOTETCPFWD
2014-12-10 21:56:49 +00:00
int listen_fwd_all;
#endif
unsigned int recv_window;
time_t keepalive_secs; /* Time between sending keepalives. 0 is off */
time_t idle_timeout_secs; /* Exit if no traffic is sent/received in this time */
2019-06-09 20:44:26 +00:00
int usingsyslog;
2014-12-10 21:56:49 +00:00
#ifndef DISABLE_ZLIB
/* TODO: add a commandline flag. Currently this is on by default if compression
* is compiled in, but disabled for a client's non-final multihop stages. (The
* intermediate stages are compressed streams, so are uncompressible. */
2019-06-09 20:44:26 +00:00
enum {
DROPBEAR_COMPRESS_DELAYED, /* Server only */
DROPBEAR_COMPRESS_ON,
DROPBEAR_COMPRESS_OFF,
} compress_mode;
2014-12-10 21:56:49 +00:00
#endif
2019-06-09 20:44:26 +00:00
#if DROPBEAR_USER_ALGO_LIST
2014-12-10 21:56:49 +00:00
char *cipher_list;
char *mac_list;
#endif
} runopts;
extern runopts opts;
int readhostkey(const char * filename, sign_key * hostkey,
enum signkey_type *type);
2019-06-09 20:44:26 +00:00
void load_all_hostkeys(void);
2014-12-10 21:56:49 +00:00
typedef struct svr_runopts {
char * bannerfile;
int forkbg;
2019-06-09 20:44:26 +00:00
/* ports and addresses are arrays of the portcount
listening ports. strings are malloced. */
2014-12-10 21:56:49 +00:00
char *ports[DROPBEAR_MAX_PORTS];
unsigned int portcount;
char *addresses[DROPBEAR_MAX_PORTS];
int inetdmode;
/* Flags indicating whether to use ipv4 and ipv6 */
/* not used yet
int ipv4;
int ipv6;
*/
2019-06-09 20:44:26 +00:00
#if DO_MOTD
2014-12-10 21:56:49 +00:00
/* whether to print the MOTD */
int domotd;
#endif
int norootlogin;
2019-06-09 20:44:26 +00:00
#ifdef HAVE_GETGROUPLIST
/* restrict_group is the group name if group restriction was enabled,
NULL otherwise */
char *restrict_group;
/* restrict_group_gid is only valid if restrict_group is set */
gid_t restrict_group_gid;
#endif
2014-12-10 21:56:49 +00:00
int noauthpass;
int norootpass;
int allowblankpass;
2019-06-09 20:44:26 +00:00
unsigned int maxauthtries;
2014-12-10 21:56:49 +00:00
2019-06-09 20:44:26 +00:00
#if DROPBEAR_SVR_REMOTETCPFWD
2014-12-10 21:56:49 +00:00
int noremotetcp;
#endif
2019-06-09 20:44:26 +00:00
#if DROPBEAR_SVR_LOCALTCPFWD
2014-12-10 21:56:49 +00:00
int nolocaltcp;
#endif
sign_key *hostkey;
int delay_hostkey;
char *hostkey_files[MAX_HOSTKEYS];
int num_hostkey_files;
buffer * banner;
char * pidfile;
2019-06-09 20:44:26 +00:00
char * forced_command;
2020-12-28 21:40:37 +00:00
#if DROPBEAR_PLUGIN
char *pubkey_plugin;
char *pubkey_plugin_options;
#endif
2014-12-10 21:56:49 +00:00
} svr_runopts;
extern svr_runopts svr_opts;
void svr_getopts(int argc, char ** argv);
2019-06-09 20:44:26 +00:00
void loadhostkeys(void);
2014-12-10 21:56:49 +00:00
typedef struct cli_runopts {
char *progname;
char *remotehost;
2019-06-09 20:44:26 +00:00
const char *remoteport;
2014-12-10 21:56:49 +00:00
char *own_user;
char *username;
char *cmd;
int wantpty;
int always_accept_key;
int no_hostkey_check;
int no_cmd;
int backgrounded;
int is_subsystem;
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLI_PUBKEY_AUTH
2014-12-10 21:56:49 +00:00
m_list *privkeys; /* Keys to use for public-key auth */
#endif
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLI_ANYTCPFWD
int exit_on_fwd_failure;
#endif
#if DROPBEAR_CLI_REMOTETCPFWD
2014-12-10 21:56:49 +00:00
m_list * remotefwds;
#endif
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLI_LOCALTCPFWD
2014-12-10 21:56:49 +00:00
m_list * localfwds;
#endif
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLI_AGENTFWD
2014-12-10 21:56:49 +00:00
int agent_fwd;
int agent_keys_loaded; /* whether pubkeys has been populated with a
list of keys held by the agent */
int agent_fd; /* The agent fd is only set during authentication. Forwarded
agent sessions have their own file descriptors */
#endif
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLI_NETCAT
2014-12-10 21:56:49 +00:00
char *netcat_host;
unsigned int netcat_port;
#endif
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLI_PROXYCMD
2014-12-10 21:56:49 +00:00
char *proxycmd;
#endif
2019-06-09 20:44:26 +00:00
char *bind_address;
char *bind_port;
2014-12-10 21:56:49 +00:00
} cli_runopts;
extern cli_runopts cli_opts;
void cli_getopts(int argc, char ** argv);
2019-06-09 20:44:26 +00:00
#if DROPBEAR_USER_ALGO_LIST
void parse_ciphers_macs(void);
2014-12-10 21:56:49 +00:00
#endif
void print_version(void);
2019-06-09 20:44:26 +00:00
#endif /* DROPBEAR_RUNOPTS_H_ */