Lines Matching refs:options
163 Options options; variable
257 hints.ai_family = options.address_family == -1 ? in resolve_host()
258 AF_UNSPEC : options.address_family; in resolve_host()
297 hints.ai_family = options.address_family == -1 ? in resolve_addr()
298 AF_UNSPEC : options.address_family; in resolve_addr()
345 if (*cname == '\0' || options.num_permitted_cnames == 0 || in check_follow_cname()
348 if (options.canonicalize_hostname == SSH_CANONICALISE_NO) in check_follow_cname()
354 if (!option_clear_or_none(options.proxy_command) && in check_follow_cname()
355 options.canonicalize_hostname != SSH_CANONICALISE_ALWAYS) in check_follow_cname()
358 for (i = 0; i < options.num_permitted_cnames; i++) { in check_follow_cname()
359 rule = options.permitted_cnames + i; in check_follow_cname()
385 if (options.canonicalize_hostname == SSH_CANONICALISE_NO) in resolve_canonicalize()
392 if (!option_clear_or_none(options.proxy_command) && in resolve_canonicalize()
393 options.canonicalize_hostname != SSH_CANONICALISE_ALWAYS) in resolve_canonicalize()
415 if (ndots > options.canonicalize_max_dots) { in resolve_canonicalize()
417 __func__, *hostp, options.canonicalize_max_dots); in resolve_canonicalize()
421 for (i = 0; i < options.num_canonical_domains; i++) { in resolve_canonicalize()
424 options.canonical_domains[i]); in resolve_canonicalize()
443 if (!options.canonicalize_fallback_local) in resolve_canonicalize()
461 !read_config_file(config, pw, host, host_arg, &options, in process_config_files()
470 &options, SSHCONF_CHECKPERM | SSHCONF_USERCONF | in process_config_files()
475 host, host_arg, &options, in process_config_files()
589 initialize_options(&options); in main()
602 options.protocol = SSH_PROTO_1; in main()
605 options.protocol = SSH_PROTO_2; in main()
608 options.address_family = AF_INET; in main()
611 options.address_family = AF_INET6; in main()
621 options.forward_x11 = 0; in main()
624 options.forward_x11 = 1; in main()
636 options.forward_x11 = 1; in main()
637 options.forward_x11_trusted = 1; in main()
640 options.fwd_opts.gateway_ports = 1; in main()
662 options.use_privileged_port = 0; in main()
694 options.forward_agent = 0; in main()
697 options.forward_agent = 1; in main()
700 options.gss_deleg_creds = 0; in main()
703 options.gss_authentication = 1; in main()
704 options.gss_deleg_creds = 1; in main()
713 add_identity_file(&options, NULL, optarg, 1); in main()
717 options.pkcs11_provider = xstrdup(optarg); in main()
723 if (options.request_tty == REQUEST_TTY_YES) in main()
724 options.request_tty = REQUEST_TTY_FORCE; in main()
726 options.request_tty = REQUEST_TTY_YES; in main()
731 options.log_level = SYSLOG_LEVEL_DEBUG1; in main()
733 if (options.log_level < SYSLOG_LEVEL_DEBUG3) in main()
734 options.log_level++; in main()
750 if (options.tun_open == -1) in main()
751 options.tun_open = SSH_TUNMODE_DEFAULT; in main()
752 options.tun_local = a2tun(optarg, &options.tun_remote); in main()
753 if (options.tun_local == SSH_TUNID_ERR) { in main()
774 options.request_tty = REQUEST_TTY_NO; in main()
776 options.clear_forwardings = 1; in main()
777 options.exit_on_forward_failure = 1; in main()
780 options.log_level = SYSLOG_LEVEL_QUIET; in main()
786 options.escape_char = (u_char) optarg[1] & 31; in main()
788 options.escape_char = (u_char) optarg[0]; in main()
790 options.escape_char = SSH_ESCAPECHAR_NONE; in main()
801 options.ciphers = xstrdup(optarg); in main()
802 options.cipher = SSH_CIPHER_INVALID; in main()
806 options.cipher = cipher_number(optarg); in main()
807 if (options.cipher == -1) { in main()
812 if (options.cipher == SSH_CIPHER_3DES) in main()
813 options.ciphers = xstrdup("3des-cbc"); in main()
814 else if (options.cipher == SSH_CIPHER_BLOWFISH) in main()
815 options.ciphers = xstrdup("blowfish-cbc"); in main()
817 options.ciphers = xstrdup(KEX_CLIENT_ENCRYPT); in main()
821 options.macs = xstrdup(optarg); in main()
829 if (options.control_master == SSHCTL_MASTER_YES) in main()
830 options.control_master = SSHCTL_MASTER_ASK; in main()
832 options.control_master = SSHCTL_MASTER_YES; in main()
835 options.port = a2port(optarg); in main()
836 if (options.port <= 0) { in main()
842 options.user = optarg; in main()
847 add_local_forward(&options, &fwd); in main()
858 add_remote_forward(&options, &fwd); in main()
869 add_local_forward(&options, &fwd); in main()
879 options.compression = 1; in main()
883 options.request_tty = REQUEST_TTY_NO; in main()
886 options.request_tty = REQUEST_TTY_NO; in main()
890 if (process_config_line(&options, pw, in main()
900 if (options.control_path != NULL) in main()
901 free(options.control_path); in main()
902 options.control_path = xstrdup(optarg); in main()
905 options.bind_address = optarg; in main()
924 options.user = p; in main()
988 options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level, in main()
1004 fill_default_options_for_canonicalization(&options); in main()
1007 if (options.hostname != NULL) { in main()
1009 cp = percent_expand(options.hostname, in main()
1013 free(options.hostname); in main()
1014 options.hostname = xstrdup(host); in main()
1019 if (options.canonicalize_hostname != SSH_CANONICALISE_NO) in main()
1020 addrs = resolve_canonicalize(&host, options.port); in main()
1035 if (addrs == NULL && options.num_permitted_cnames != 0 && in main()
1036 (option_clear_or_none(options.proxy_command) || in main()
1037 options.canonicalize_hostname == SSH_CANONICALISE_ALWAYS)) { in main()
1038 if ((addrs = resolve_host(host, options.port, in main()
1039 option_clear_or_none(options.proxy_command), in main()
1042 if (option_clear_or_none(options.proxy_command)) in main()
1052 if (options.canonicalize_hostname != 0) { in main()
1055 free(options.hostname); in main()
1056 options.hostname = xstrdup(host); in main()
1063 if (addrs != NULL && options.port > 0) in main()
1064 set_addrinfo_port(addrs, options.port); in main()
1068 fill_default_options(&options); in main()
1070 if (options.port == 0) in main()
1071 options.port = default_ssh_port(); in main()
1072 channel_set_af(options.address_family); in main()
1075 if (options.host_key_alias != NULL) in main()
1076 lowercase(options.host_key_alias); in main()
1077 if (options.proxy_command != NULL && in main()
1078 strcmp(options.proxy_command, "-") == 0 && in main()
1079 options.proxy_use_fdpass) in main()
1081 if (options.control_persist && in main()
1082 options.update_hostkeys == SSH_UPDATE_HOSTKEYS_ASK) { in main()
1085 options.update_hostkeys = 0; in main()
1089 options.use_privileged_port = 0; in main()
1093 log_init(argv0, options.log_level, SYSLOG_FACILITY_USER, !use_syslog); in main()
1095 if (options.request_tty == REQUEST_TTY_YES || in main()
1096 options.request_tty == REQUEST_TTY_FORCE) in main()
1101 tty_flag = options.request_tty != REQUEST_TTY_NO; in main()
1104 if (options.request_tty == REQUEST_TTY_NO || muxclient_command != 0) in main()
1108 options.request_tty != REQUEST_TTY_FORCE) { in main()
1117 if (options.user == NULL) in main()
1118 options.user = xstrdup(pw->pw_name); in main()
1124 snprintf(portstr, sizeof(portstr), "%d", options.port); in main()
1130 ssh_digest_update(md, options.user, strlen(options.user)) < 0 || in main()
1136 if (options.local_command != NULL) { in main()
1137 debug3("expanding LocalCommand: %s", options.local_command); in main()
1138 cp = options.local_command; in main()
1139 options.local_command = percent_expand(cp, in main()
1147 "r", options.user, in main()
1150 debug3("expanded LocalCommand: %s", options.local_command); in main()
1154 if (options.control_path != NULL) { in main()
1155 cp = tilde_expand_filename(options.control_path, in main()
1157 free(options.control_path); in main()
1158 options.control_path = percent_expand(cp, in main()
1165 "r", options.user, in main()
1173 dump_client_config(&options, host); in main()
1177 if (muxclient_command != 0 && options.control_path == NULL) in main()
1179 if (options.control_path != NULL) in main()
1180 muxclient(options.control_path); in main()
1186 if (addrs == NULL && options.proxy_command == NULL) { in main()
1187 if ((addrs = resolve_host(host, options.port, 1, in main()
1192 timeout_ms = options.connection_timeout * 1000; in main()
1195 if (ssh_connect(host, addrs, &hostaddr, options.port, in main()
1196 options.address_family, options.connection_attempts, in main()
1197 &timeout_ms, options.tcp_keep_alive, in main()
1198 options.use_privileged_port) != 0) in main()
1204 packet_set_timeout(options.server_alive_interval, in main()
1205 options.server_alive_count_max); in main()
1221 if (options.rhosts_rsa_authentication || in main()
1222 options.hostbased_authentication) { in main()
1254 if (options.hostbased_authentication == 1 && in main()
1318 tilde_expand_paths(options.system_hostfiles, in main()
1319 options.num_system_hostfiles); in main()
1320 tilde_expand_paths(options.user_hostfiles, options.num_user_hostfiles); in main()
1327 options.port, pw, timeout_ms); in main()
1348 for (i = 0; i < options.num_identity_files; i++) { in main()
1349 free(options.identity_files[i]); in main()
1350 options.identity_files[i] = NULL; in main()
1351 if (options.identity_keys[i]) { in main()
1352 key_free(options.identity_keys[i]); in main()
1353 options.identity_keys[i] = NULL; in main()
1360 if (options.control_path != NULL && muxserver_sock != -1) in main()
1361 unlink(options.control_path); in main()
1391 options.request_tty = orequest_tty; in control_persist_detach()
1395 options.control_master = SSHCTL_MASTER_NO; in control_persist_detach()
1396 muxclient(options.control_path); in control_persist_detach()
1411 setproctitle("%s [mux]", options.control_path); in control_persist_detach()
1454 if (options.exit_on_forward_failure) { in ssh_confirm_remote_forward()
1470 if (++remote_forward_confirms_received == options.num_remote_forwards) { in ssh_confirm_remote_forward()
1521 for (i = 0; i < options.num_local_forwards; i++) { in ssh_init_forwarding()
1524 (options.local_forwards[i].listen_path != NULL) ? in ssh_init_forwarding()
1525 options.local_forwards[i].listen_path : in ssh_init_forwarding()
1526 (options.local_forwards[i].listen_host == NULL) ? in ssh_init_forwarding()
1527 (options.fwd_opts.gateway_ports ? "*" : "LOCALHOST") : in ssh_init_forwarding()
1528 options.local_forwards[i].listen_host, in ssh_init_forwarding()
1529 options.local_forwards[i].listen_port, in ssh_init_forwarding()
1530 (options.local_forwards[i].connect_path != NULL) ? in ssh_init_forwarding()
1531 options.local_forwards[i].connect_path : in ssh_init_forwarding()
1532 options.local_forwards[i].connect_host, in ssh_init_forwarding()
1533 options.local_forwards[i].connect_port); in ssh_init_forwarding()
1535 &options.local_forwards[i], &options.fwd_opts); in ssh_init_forwarding()
1537 if (i > 0 && success != i && options.exit_on_forward_failure) in ssh_init_forwarding()
1543 for (i = 0; i < options.num_remote_forwards; i++) { in ssh_init_forwarding()
1546 (options.remote_forwards[i].listen_path != NULL) ? in ssh_init_forwarding()
1547 options.remote_forwards[i].listen_path : in ssh_init_forwarding()
1548 (options.remote_forwards[i].listen_host == NULL) ? in ssh_init_forwarding()
1549 "LOCALHOST" : options.remote_forwards[i].listen_host, in ssh_init_forwarding()
1550 options.remote_forwards[i].listen_port, in ssh_init_forwarding()
1551 (options.remote_forwards[i].connect_path != NULL) ? in ssh_init_forwarding()
1552 options.remote_forwards[i].connect_path : in ssh_init_forwarding()
1553 options.remote_forwards[i].connect_host, in ssh_init_forwarding()
1554 options.remote_forwards[i].connect_port); in ssh_init_forwarding()
1555 options.remote_forwards[i].handle = in ssh_init_forwarding()
1557 &options.remote_forwards[i]); in ssh_init_forwarding()
1558 if (options.remote_forwards[i].handle < 0) { in ssh_init_forwarding()
1559 if (options.exit_on_forward_failure) in ssh_init_forwarding()
1566 &options.remote_forwards[i]); in ssh_init_forwarding()
1571 if (options.tun_open != SSH_TUNMODE_NO) { in ssh_init_forwarding()
1572 if (client_request_tun_fwd(options.tun_open, in ssh_init_forwarding()
1573 options.tun_local, options.tun_remote) == -1) { in ssh_init_forwarding()
1574 if (options.exit_on_forward_failure) in ssh_init_forwarding()
1587 if (options.forward_agent) { in check_agent_present()
1590 options.forward_agent = 0; in check_agent_present()
1609 if (options.compression) { in ssh_session()
1611 options.compression_level); in ssh_session()
1613 if (options.compression_level < 1 || in ssh_session()
1614 options.compression_level > 9) in ssh_session()
1620 packet_put_int(options.compression_level); in ssh_session()
1625 packet_start_compression(options.compression_level); in ssh_session()
1675 if (display == NULL && options.forward_x11) in ssh_session()
1677 if (options.forward_x11 && display != NULL) { in ssh_session()
1680 client_x11_get_proto(display, options.xauth_location, in ssh_session()
1681 options.forward_x11_trusted, in ssh_session()
1682 options.forward_x11_timeout, in ssh_session()
1702 options.ip_qos_interactive, options.ip_qos_bulk); in ssh_session()
1707 if (options.forward_agent) { in ssh_session()
1723 if (options.local_command != NULL && in ssh_session()
1724 options.permit_local_command) in ssh_session()
1725 ssh_local_cmd(options.local_command); in ssh_session()
1732 if (options.exit_on_forward_failure && in ssh_session()
1733 options.num_remote_forwards > 0) { in ssh_session()
1763 options.escape_char : SSH_ESCAPECHAR_NONE, 0); in ssh_session()
1778 if (display == NULL && options.forward_x11) in ssh_session2_setup()
1780 if (options.forward_x11 && display != NULL) { in ssh_session2_setup()
1783 client_x11_get_proto(display, options.xauth_location, in ssh_session2_setup()
1784 options.forward_x11_trusted, in ssh_session2_setup()
1785 options.forward_x11_timeout, &proto, &data); in ssh_session2_setup()
1797 if (options.forward_agent) { in ssh_session2_setup()
1805 options.ip_qos_interactive, options.ip_qos_bulk); in ssh_session2_setup()
1864 if (!options.control_persist) in ssh_session2()
1880 if (options.control_persist && muxserver_sock != -1) { in ssh_session2()
1883 orequest_tty = options.request_tty; in ssh_session2()
1896 if (options.control_persist && muxserver_sock == -1) in ssh_session2()
1903 options.control_master == SSHCTL_MASTER_NO, in ssh_session2()
1904 options.ip_qos_interactive, options.ip_qos_bulk); in ssh_session2()
1908 if (options.control_master == SSHCTL_MASTER_NO && in ssh_session2()
1918 if (options.local_command != NULL && in ssh_session2()
1919 options.permit_local_command) in ssh_session2()
1920 ssh_local_cmd(options.local_command); in ssh_session2()
1927 if (options.exit_on_forward_failure && in ssh_session2()
1928 options.num_remote_forwards > 0) { in ssh_session2()
1936 options.escape_char : SSH_ESCAPECHAR_NONE, id); in ssh_session2()
1960 if (options.pkcs11_provider != NULL && in load_public_identity_files()
1961 options.num_identity_files < SSH_MAX_IDENTITY_FILES && in load_public_identity_files()
1962 (pkcs11_init(!options.batch_mode) == 0) && in load_public_identity_files()
1963 (nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, in load_public_identity_files()
1972 xstrdup(options.pkcs11_provider); /* XXX */ in load_public_identity_files()
1985 for (i = 0; i < options.num_identity_files; i++) { in load_public_identity_files()
1987 strcasecmp(options.identity_files[i], "none") == 0) { in load_public_identity_files()
1988 free(options.identity_files[i]); in load_public_identity_files()
1991 cp = tilde_expand_filename(options.identity_files[i], in load_public_identity_files()
1995 "r", options.user, (char *)NULL); in load_public_identity_files()
2000 free(options.identity_files[i]); in load_public_identity_files()
2028 options.num_identity_files = n_ids; in load_public_identity_files()
2029 memcpy(options.identity_files, identity_files, sizeof(identity_files)); in load_public_identity_files()
2030 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys)); in load_public_identity_files()