djm@openbsd.org | 9e34e0c | 2018-11-23 05:08:07 +0000 | [diff] [blame] | 1 | /* $OpenBSD: readconf.h,v 1.129 2018/11/23 05:08:07 djm Exp $ */ |
Ben Lindstrom | 05764b9 | 2002-03-05 01:53:02 +0000 | [diff] [blame] | 2 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 3 | /* |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 5 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
| 6 | * All rights reserved |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 7 | * Functions for reading the configuration file. |
Damien Miller | 4af5130 | 2000-04-16 11:18:38 +1000 | [diff] [blame] | 8 | * |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 9 | * As far as I am concerned, the code I have written for this software |
| 10 | * can be used freely for any purpose. Any derived versions of this |
| 11 | * software must be clearly marked as such, and if the derived work is |
| 12 | * incompatible with the protocol description in the RFC file, it must be |
| 13 | * called by a name other than "ssh" or "Secure Shell". |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 14 | */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 15 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 16 | #ifndef READCONF_H |
| 17 | #define READCONF_H |
| 18 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 19 | /* Data structure for representing option data. */ |
| 20 | |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 21 | #define SSH_MAX_HOSTS_FILES 32 |
| 22 | #define MAX_CANON_DOMAINS 32 |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 23 | #define PATH_MAX_SUN (sizeof((struct sockaddr_un *)0)->sun_path) |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 24 | |
| 25 | struct allowed_cname { |
| 26 | char *source_list; |
| 27 | char *target_list; |
| 28 | }; |
Darren Tucker | 46bc075 | 2004-05-02 22:11:30 +1000 | [diff] [blame] | 29 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 30 | typedef struct { |
| 31 | int forward_agent; /* Forward authentication agent. */ |
| 32 | int forward_x11; /* Forward X11 display. */ |
Damien Miller | 1ab6a51 | 2010-06-26 10:02:24 +1000 | [diff] [blame] | 33 | int forward_x11_timeout; /* Expiration for Cookies */ |
Darren Tucker | 0a118da | 2003-10-15 15:54:32 +1000 | [diff] [blame] | 34 | int forward_x11_trusted; /* Trust Forward X11 display. */ |
Darren Tucker | e7d4b19 | 2006-07-12 22:17:10 +1000 | [diff] [blame] | 35 | int exit_on_forward_failure; /* Exit if bind(2) fails for -L/-R */ |
Damien Miller | d3a1857 | 2000-06-07 19:55:44 +1000 | [diff] [blame] | 36 | char *xauth_location; /* Location for xauth program */ |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 37 | struct ForwardOptions fwd_opts; /* forwarding options */ |
Damien Miller | 0bc1bd8 | 2000-11-13 22:57:25 +1100 | [diff] [blame] | 38 | int pubkey_authentication; /* Try ssh2 pubkey authentication. */ |
Ben Lindstrom | 5eabda3 | 2001-04-12 23:34:34 +0000 | [diff] [blame] | 39 | int hostbased_authentication; /* ssh2's rhosts_rsa */ |
Ben Lindstrom | 551ea37 | 2001-06-05 18:56:16 +0000 | [diff] [blame] | 40 | int challenge_response_authentication; |
Ben Lindstrom | 95fb2dd | 2001-01-23 03:12:10 +0000 | [diff] [blame] | 41 | /* Try S/Key or TIS, authentication. */ |
Darren Tucker | 0efd155 | 2003-08-26 11:49:55 +1000 | [diff] [blame] | 42 | int gss_authentication; /* Try GSS authentication */ |
| 43 | int gss_deleg_creds; /* Delegate GSS credentials */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 44 | int password_authentication; /* Try password |
| 45 | * authentication. */ |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 46 | int kbd_interactive_authentication; /* Try keyboard-interactive auth. */ |
| 47 | char *kbd_interactive_devices; /* Keyboard-interactive auth devices. */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 48 | int batch_mode; /* Batch mode: do not ask for passwords. */ |
| 49 | int check_host_ip; /* Also keep track of keys for IP address */ |
| 50 | int strict_host_key_checking; /* Strict host key checking. */ |
| 51 | int compression; /* Compress packets in both directions. */ |
Damien Miller | 12c150e | 2003-12-17 16:31:10 +1100 | [diff] [blame] | 52 | int tcp_keep_alive; /* Set SO_KEEPALIVE. */ |
Damien Miller | 0dac6fb | 2010-11-20 15:19:38 +1100 | [diff] [blame] | 53 | int ip_qos_interactive; /* IP ToS/DSCP/class for interactive */ |
| 54 | int ip_qos_bulk; /* IP ToS/DSCP/class for bulk traffic */ |
dtucker@openbsd.org | 68d3a2a | 2017-04-28 03:20:27 +0000 | [diff] [blame] | 55 | SyslogFacility log_facility; /* Facility for system logging. */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 56 | LogLevel log_level; /* Level for logging. */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 57 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 58 | int port; /* Port to connect. */ |
Darren Tucker | 0a4f04b | 2003-07-03 20:37:47 +1000 | [diff] [blame] | 59 | int address_family; |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 60 | int connection_attempts; /* Max attempts (seconds) before |
| 61 | * giving up */ |
Damien Miller | b78d5eb | 2003-05-16 11:39:04 +1000 | [diff] [blame] | 62 | int connection_timeout; /* Max time (seconds) before |
Damien Miller | a8e06ce | 2003-11-21 23:48:55 +1100 | [diff] [blame] | 63 | * aborting connection attempt */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 64 | int number_of_password_prompts; /* Max number of password |
| 65 | * prompts. */ |
Damien Miller | 30c3d42 | 2000-05-09 11:02:59 +1000 | [diff] [blame] | 66 | char *ciphers; /* SSH2 ciphers in order of preference. */ |
Ben Lindstrom | 06b33aa | 2001-02-15 03:01:59 +0000 | [diff] [blame] | 67 | char *macs; /* SSH2 macs in order of preference. */ |
Ben Lindstrom | 982dbbc | 2001-04-17 18:11:36 +0000 | [diff] [blame] | 68 | char *hostkeyalgorithms; /* SSH2 server key types in order of preference. */ |
Damien Miller | d5f62bf | 2010-09-24 22:11:14 +1000 | [diff] [blame] | 69 | char *kex_algorithms; /* SSH2 kex methods in order of preference. */ |
djm@openbsd.org | ecac7e1 | 2018-09-20 03:30:44 +0000 | [diff] [blame] | 70 | char *ca_sign_algorithms; /* Allowed CA signature algorithms */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 71 | char *hostname; /* Real host to connect. */ |
Ben Lindstrom | 4dccfa5 | 2000-12-28 16:40:05 +0000 | [diff] [blame] | 72 | char *host_key_alias; /* hostname alias for .ssh/known_hosts */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 73 | char *proxy_command; /* Proxy command for connecting the host. */ |
| 74 | char *user; /* User to log in as. */ |
| 75 | int escape_char; /* Escape character; -2 = none */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 76 | |
Damien Miller | 295ee63 | 2011-05-29 21:42:31 +1000 | [diff] [blame] | 77 | u_int num_system_hostfiles; /* Paths for /etc/ssh/ssh_known_hosts */ |
| 78 | char *system_hostfiles[SSH_MAX_HOSTS_FILES]; |
| 79 | u_int num_user_hostfiles; /* Path for $HOME/.ssh/known_hosts */ |
| 80 | char *user_hostfiles[SSH_MAX_HOSTS_FILES]; |
Ben Lindstrom | b9be60a | 2001-03-11 01:49:19 +0000 | [diff] [blame] | 81 | char *preferred_authentications; |
Ben Lindstrom | e0f8804 | 2001-04-30 13:06:24 +0000 | [diff] [blame] | 82 | char *bind_address; /* local socket address for connection to sshd */ |
djm@openbsd.org | ac2e302 | 2018-02-23 02:34:33 +0000 | [diff] [blame] | 83 | char *bind_interface; /* local interface for bind address */ |
Damien Miller | 7ea845e | 2010-02-12 09:21:02 +1100 | [diff] [blame] | 84 | char *pkcs11_provider; /* PKCS#11 provider */ |
Damien Miller | 37876e9 | 2003-05-15 10:19:46 +1000 | [diff] [blame] | 85 | int verify_host_key_dns; /* Verify host key using DNS */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 86 | |
Damien Miller | 0bc1bd8 | 2000-11-13 22:57:25 +1100 | [diff] [blame] | 87 | int num_identity_files; /* Number of files for RSA/DSA identities. */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 88 | char *identity_files[SSH_MAX_IDENTITY_FILES]; |
Darren Tucker | 1910478 | 2013-04-05 11:13:08 +1100 | [diff] [blame] | 89 | int identity_file_userprovided[SSH_MAX_IDENTITY_FILES]; |
djm@openbsd.org | 1129dcf | 2015-01-15 09:40:00 +0000 | [diff] [blame] | 90 | struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 91 | |
djm@openbsd.org | 4e44a79 | 2015-09-24 06:15:11 +0000 | [diff] [blame] | 92 | int num_certificate_files; /* Number of extra certificates for ssh. */ |
| 93 | char *certificate_files[SSH_MAX_CERTIFICATE_FILES]; |
| 94 | int certificate_file_userprovided[SSH_MAX_CERTIFICATE_FILES]; |
| 95 | struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; |
| 96 | |
jcs@openbsd.org | f361df4 | 2015-11-15 22:26:49 +0000 | [diff] [blame] | 97 | int add_keys_to_agent; |
markus@openbsd.org | b02ad1c | 2016-05-04 12:21:53 +0000 | [diff] [blame] | 98 | char *identity_agent; /* Optional path to ssh-agent socket */ |
jcs@openbsd.org | f361df4 | 2015-11-15 22:26:49 +0000 | [diff] [blame] | 99 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 100 | /* Local TCP/IP forward requests. */ |
| 101 | int num_local_forwards; |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 102 | struct Forward *local_forwards; |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 103 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 104 | /* Remote TCP/IP forward requests. */ |
| 105 | int num_remote_forwards; |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 106 | struct Forward *remote_forwards; |
Ben Lindstrom | 2b7a0e9 | 2001-09-20 00:57:55 +0000 | [diff] [blame] | 107 | int clear_forwardings; |
Ben Lindstrom | b6df73b | 2002-11-09 15:52:31 +0000 | [diff] [blame] | 108 | |
dtucker@openbsd.org | 8543ff3 | 2016-06-03 03:14:41 +0000 | [diff] [blame] | 109 | /* stdio forwarding (-W) host and port */ |
| 110 | char *stdio_forward_host; |
| 111 | int stdio_forward_port; |
| 112 | |
Ben Lindstrom | b6df73b | 2002-11-09 15:52:31 +0000 | [diff] [blame] | 113 | int enable_ssh_keysign; |
Damien Miller | 3dff176 | 2008-02-10 22:25:52 +1100 | [diff] [blame] | 114 | int64_t rekey_limit; |
Darren Tucker | c53c2af | 2013-05-16 20:28:16 +1000 | [diff] [blame] | 115 | int rekey_interval; |
Ben Lindstrom | 3cecc9a | 2001-10-03 17:39:38 +0000 | [diff] [blame] | 116 | int no_host_authentication_for_localhost; |
Damien Miller | bd394c3 | 2004-03-08 23:12:36 +1100 | [diff] [blame] | 117 | int identities_only; |
Darren Tucker | fc95970 | 2004-07-17 16:12:08 +1000 | [diff] [blame] | 118 | int server_alive_interval; |
Damien Miller | 509b010 | 2003-12-17 16:33:10 +1100 | [diff] [blame] | 119 | int server_alive_count_max; |
Darren Tucker | 46bc075 | 2004-05-02 22:11:30 +1000 | [diff] [blame] | 120 | |
| 121 | int num_send_env; |
djm@openbsd.org | 7082bb5 | 2018-06-09 03:01:12 +0000 | [diff] [blame] | 122 | char **send_env; |
| 123 | int num_setenv; |
| 124 | char **setenv; |
Damien Miller | 0e220db | 2004-06-15 10:34:08 +1000 | [diff] [blame] | 125 | |
| 126 | char *control_path; |
| 127 | int control_master; |
Damien Miller | e11e1ea | 2010-08-03 16:04:46 +1000 | [diff] [blame] | 128 | int control_persist; /* ControlPersist flag */ |
| 129 | int control_persist_timeout; /* ControlPersist timeout (seconds) */ |
Damien Miller | e177615 | 2005-03-01 21:47:37 +1100 | [diff] [blame] | 130 | |
| 131 | int hash_known_hosts; |
Damien Miller | d27b947 | 2005-12-13 19:29:02 +1100 | [diff] [blame] | 132 | |
| 133 | int tun_open; /* tun(4) */ |
| 134 | int tun_local; /* force tun device (optional) */ |
| 135 | int tun_remote; /* force tun device (optional) */ |
| 136 | |
| 137 | char *local_command; |
| 138 | int permit_local_command; |
bluhm@openbsd.org | 1112b53 | 2017-05-30 18:58:37 +0000 | [diff] [blame] | 139 | char *remote_command; |
Damien Miller | 1028824 | 2008-06-30 00:04:03 +1000 | [diff] [blame] | 140 | int visual_host_key; |
Damien Miller | d27b947 | 2005-12-13 19:29:02 +1100 | [diff] [blame] | 141 | |
Damien Miller | 21771e2 | 2011-05-15 08:45:50 +1000 | [diff] [blame] | 142 | int request_tty; |
Darren Tucker | 0763698 | 2013-05-16 20:30:03 +1000 | [diff] [blame] | 143 | |
Damien Miller | 1262b66 | 2013-08-21 02:44:24 +1000 | [diff] [blame] | 144 | int proxy_use_fdpass; |
| 145 | |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 146 | int num_canonical_domains; |
| 147 | char *canonical_domains[MAX_CANON_DOMAINS]; |
Damien Miller | 3850559 | 2013-10-17 11:48:13 +1100 | [diff] [blame] | 148 | int canonicalize_hostname; |
| 149 | int canonicalize_max_dots; |
| 150 | int canonicalize_fallback_local; |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 151 | int num_permitted_cnames; |
| 152 | struct allowed_cname permitted_cnames[MAX_CANON_DOMAINS]; |
| 153 | |
djm@openbsd.org | 5e39a49 | 2014-12-04 02:24:32 +0000 | [diff] [blame] | 154 | char *revoked_host_keys; |
| 155 | |
djm@openbsd.org | 8d4f872 | 2015-01-26 03:04:45 +0000 | [diff] [blame] | 156 | int fingerprint_hash; |
| 157 | |
djm@openbsd.org | 523463a | 2015-02-16 22:13:32 +0000 | [diff] [blame] | 158 | int update_hostkeys; /* one of SSH_UPDATE_HOSTKEYS_* */ |
djm@openbsd.org | 56d1c83 | 2014-12-21 22:27:55 +0000 | [diff] [blame] | 159 | |
markus@openbsd.org | 3a1638d | 2015-07-10 06:21:53 +0000 | [diff] [blame] | 160 | char *hostbased_key_types; |
| 161 | char *pubkey_key_types; |
djm@openbsd.org | 46347ed | 2015-01-30 11:43:14 +0000 | [diff] [blame] | 162 | |
djm@openbsd.org | ed877ef | 2016-07-15 00:24:30 +0000 | [diff] [blame] | 163 | char *jump_user; |
| 164 | char *jump_host; |
| 165 | int jump_port; |
| 166 | char *jump_extra; |
| 167 | |
Darren Tucker | 0763698 | 2013-05-16 20:30:03 +1000 | [diff] [blame] | 168 | char *ignored_unknown; /* Pattern list of unknown tokens to ignore */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 169 | } Options; |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 170 | |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 171 | #define SSH_CANONICALISE_NO 0 |
| 172 | #define SSH_CANONICALISE_YES 1 |
| 173 | #define SSH_CANONICALISE_ALWAYS 2 |
| 174 | |
Damien Miller | d14b1e7 | 2005-06-16 13:19:41 +1000 | [diff] [blame] | 175 | #define SSHCTL_MASTER_NO 0 |
| 176 | #define SSHCTL_MASTER_YES 1 |
| 177 | #define SSHCTL_MASTER_AUTO 2 |
| 178 | #define SSHCTL_MASTER_ASK 3 |
| 179 | #define SSHCTL_MASTER_AUTO_ASK 4 |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 180 | |
Damien Miller | 21771e2 | 2011-05-15 08:45:50 +1000 | [diff] [blame] | 181 | #define REQUEST_TTY_AUTO 0 |
| 182 | #define REQUEST_TTY_NO 1 |
| 183 | #define REQUEST_TTY_YES 2 |
| 184 | #define REQUEST_TTY_FORCE 3 |
| 185 | |
Darren Tucker | aefa368 | 2013-04-05 11:18:35 +1100 | [diff] [blame] | 186 | #define SSHCONF_CHECKPERM 1 /* check permissions on config file */ |
| 187 | #define SSHCONF_USERCONF 2 /* user provided config file not system */ |
djm@openbsd.org | 9e34e0c | 2018-11-23 05:08:07 +0000 | [diff] [blame] | 188 | #define SSHCONF_FINAL 4 /* Final pass over config, after canon. */ |
djm@openbsd.org | dc7990b | 2016-04-15 00:30:19 +0000 | [diff] [blame] | 189 | #define SSHCONF_NEVERMATCH 8 /* Match/Host never matches; internal only */ |
Darren Tucker | aefa368 | 2013-04-05 11:18:35 +1100 | [diff] [blame] | 190 | |
djm@openbsd.org | 523463a | 2015-02-16 22:13:32 +0000 | [diff] [blame] | 191 | #define SSH_UPDATE_HOSTKEYS_NO 0 |
| 192 | #define SSH_UPDATE_HOSTKEYS_YES 1 |
| 193 | #define SSH_UPDATE_HOSTKEYS_ASK 2 |
| 194 | |
djm@openbsd.org | 22376d2 | 2017-09-03 23:33:13 +0000 | [diff] [blame] | 195 | #define SSH_STRICT_HOSTKEY_OFF 0 |
| 196 | #define SSH_STRICT_HOSTKEY_NEW 1 |
| 197 | #define SSH_STRICT_HOSTKEY_YES 2 |
| 198 | #define SSH_STRICT_HOSTKEY_ASK 3 |
| 199 | |
Ben Lindstrom | 4cc240d | 2001-07-04 04:46:56 +0000 | [diff] [blame] | 200 | void initialize_options(Options *); |
| 201 | void fill_default_options(Options *); |
Damien Miller | 13f97b2 | 2014-02-24 15:57:55 +1100 | [diff] [blame] | 202 | void fill_default_options_for_canonicalization(Options *); |
djm@openbsd.org | 957fbce | 2014-10-08 22:20:25 +0000 | [diff] [blame] | 203 | int process_config_line(Options *, struct passwd *, const char *, |
| 204 | const char *, char *, const char *, int, int *, int); |
Damien Miller | 194fd90 | 2013-10-15 12:13:05 +1100 | [diff] [blame] | 205 | int read_config_file(const char *, struct passwd *, const char *, |
djm@openbsd.org | 9e34e0c | 2018-11-23 05:08:07 +0000 | [diff] [blame] | 206 | const char *, Options *, int, int *); |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 207 | int parse_forward(struct Forward *, const char *, int, int); |
djm@openbsd.org | ed877ef | 2016-07-15 00:24:30 +0000 | [diff] [blame] | 208 | int parse_jump(const char *, Options *, int); |
millert@openbsd.org | 887669e | 2017-10-21 23:06:24 +0000 | [diff] [blame] | 209 | int parse_ssh_uri(const char *, char **, char **, int *); |
Damien Miller | 194fd90 | 2013-10-15 12:13:05 +1100 | [diff] [blame] | 210 | int default_ssh_port(void); |
Damien Miller | 13f97b2 | 2014-02-24 15:57:55 +1100 | [diff] [blame] | 211 | int option_clear_or_none(const char *); |
djm@openbsd.org | 957fbce | 2014-10-08 22:20:25 +0000 | [diff] [blame] | 212 | void dump_client_config(Options *o, const char *host); |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 213 | |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 214 | void add_local_forward(Options *, const struct Forward *); |
| 215 | void add_remote_forward(Options *, const struct Forward *); |
Darren Tucker | 1910478 | 2013-04-05 11:13:08 +1100 | [diff] [blame] | 216 | void add_identity_file(Options *, const char *, const char *, int); |
djm@openbsd.org | 4e44a79 | 2015-09-24 06:15:11 +0000 | [diff] [blame] | 217 | void add_certificate_file(Options *, const char *, int); |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 218 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 219 | #endif /* READCONF_H */ |