diff options
author | mouring <mouring> | 2002-11-09 15:52:31 +0000 |
---|---|---|
committer | mouring <mouring> | 2002-11-09 15:52:31 +0000 |
commit | 360a90ba06c581ebbfced0fbd23829f5d0a9b781 (patch) | |
tree | 31bfbd1e6bd8656de2342048a2685d3bf4ab5b23 /readconf.h | |
parent | 818a81b792159eab9a3f601f222621ab272f9d0c (diff) | |
download | openssh-360a90ba06c581ebbfced0fbd23829f5d0a9b781.tar.gz |
- markus@cvs.openbsd.org 2002/11/07 22:08:07
[readconf.c readconf.h ssh-keysign.8 ssh-keysign.c]
we cannot use HostbasedAuthentication for enabling ssh-keysign(8),
because HostbasedAuthentication might be enabled based on the
target host and ssh-keysign(8) does not know the remote hostname
and not trust ssh(1) about the hostname, so we add a new option
EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de
Diffstat (limited to 'readconf.h')
-rw-r--r-- | readconf.h | 4 |
1 files changed, 3 insertions, 1 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: readconf.h,v 1.43 2002/06/08 05:17:01 markus Exp $ */ +/* $OpenBSD: readconf.h,v 1.44 2002/11/07 22:08:07 markus Exp $ */ /* * Author: Tatu Ylonen <ylo@cs.hut.fi> @@ -99,6 +99,8 @@ typedef struct { int num_remote_forwards; Forward remote_forwards[SSH_MAX_FORWARDS_PER_DIRECTION]; int clear_forwardings; + + int enable_ssh_keysign; int no_host_authentication_for_localhost; } Options; |