kentpeacock / rpms / openssh

Forked from rpms/openssh 2 years ago
Clone
674526
diff --git a/servconf.c b/servconf.c
674526
index ad5869b..1171c33 100644
674526
--- a/servconf.c
674526
+++ b/servconf.c
674526
@@ -1990,6 +1990,8 @@ dump_cfg_strarray_oneline(ServerOpCodes code, u_int count, char **vals)
674526
 {
674526
 	u_int i;
674526
 
674526
+	if (count <= 0)
674526
+		return;
674526
 	printf("%s", lookup_opcode_name(code));
674526
 	for (i = 0; i < count; i++)
674526
 		printf(" %s",  vals[i]);
674526
@@ -2028,7 +2030,7 @@ dump_config(ServerOptions *o)
674526
 
674526
 	/* integer arguments */
674526
 #ifdef USE_PAM
674526
-	dump_cfg_int(sUsePAM, o->use_pam);
674526
+	dump_cfg_fmtint(sUsePAM, o->use_pam);
674526
 #endif
674526
 	dump_cfg_int(sServerKeyBits, o->server_key_bits);
674526
 	dump_cfg_int(sLoginGraceTime, o->login_grace_time);
674526
@@ -2084,6 +2086,7 @@ dump_config(ServerOptions *o)
674526
 	dump_cfg_fmtint(sShowPatchLevel, o->show_patchlevel);
674526
 	dump_cfg_fmtint(sUseDNS, o->use_dns);
674526
 	dump_cfg_fmtint(sAllowTcpForwarding, o->allow_tcp_forwarding);
674526
+	dump_cfg_fmtint(sAllowAgentForwarding, o->allow_agent_forwarding);
674526
 	dump_cfg_fmtint(sUsePrivilegeSeparation, use_privsep);
674526
 	dump_cfg_fmtint(sKerberosUseKuserok, o->use_kuserok);
674526
 	dump_cfg_fmtint(sGssEnablek5users, o->enable_k5users);
674526
@@ -2094,14 +2097,15 @@ dump_config(ServerOptions *o)
674526
 	dump_cfg_string(sCiphers, o->ciphers ? o->ciphers :
674526
 	    cipher_alg_list(',', 0));
674526
 	dump_cfg_string(sMacs, o->macs ? o->macs : mac_alg_list(','));
674526
-	dump_cfg_string(sBanner, o->banner);
674526
+	dump_cfg_string(sBanner, o->banner == NULL ? "none" : o->banner);
674526
 	dump_cfg_string(sForceCommand, o->adm_forced_command);
674526
 	dump_cfg_string(sChrootDirectory, o->chroot_directory);
674526
 	dump_cfg_string(sTrustedUserCAKeys, o->trusted_user_ca_keys);
674526
 	dump_cfg_string(sRevokedKeys, o->revoked_keys_file);
674526
 	dump_cfg_string(sAuthorizedPrincipalsFile,
674526
 	    o->authorized_principals_file);
674526
-	dump_cfg_string(sVersionAddendum, o->version_addendum);
674526
+	dump_cfg_string(sVersionAddendum, *o->version_addendum == '\0' ?
674526
+	    "none" : o->version_addendum);
674526
 	dump_cfg_string(sAuthorizedKeysCommand, o->authorized_keys_command);
674526
 	dump_cfg_string(sAuthorizedKeysCommandUser, o->authorized_keys_command_user);
674526
 	dump_cfg_string(sHostKeyAgent, o->host_key_agent);
674526
@@ -2117,7 +2121,7 @@ dump_config(ServerOptions *o)
674526
 	    o->authorized_keys_files);
674526
 	dump_cfg_strarray(sHostKeyFile, o->num_host_key_files,
674526
 	     o->host_key_files);
674526
-	dump_cfg_strarray(sHostKeyFile, o->num_host_cert_files,
674526
+	dump_cfg_strarray(sHostCertificate, o->num_host_cert_files,
674526
 	     o->host_cert_files);
674526
 	dump_cfg_strarray(sAllowUsers, o->num_allow_users, o->allow_users);
674526
 	dump_cfg_strarray(sDenyUsers, o->num_deny_users, o->deny_users);
674526
diff --git a/ssh.1 b/ssh.1
674526
index f65e42f..4a7d1cd 100644
674526
--- a/ssh.1
674526
+++ b/ssh.1
674526
@@ -444,7 +444,11 @@ For full details of the options listed below, and their possible values, see
674526
 .It GatewayPorts
674526
 .It GlobalKnownHostsFile
674526
 .It GSSAPIAuthentication
674526
+.It GSSAPIKeyExchange
674526
+.It GSSAPIClientIdentity
674526
 .It GSSAPIDelegateCredentials
674526
+.It GSSAPIRenewalForcesRekey
674526
+.It GSSAPITrustDns
674526
 .It HashKnownHosts
674526
 .It Host
674526
 .It HostbasedAuthentication