vishalmishra434 / rpms / openssh

Forked from rpms/openssh a month ago
Clone
3009ed
commit 5481d0b4036b33b92c372ee36258ed11bff57d5d
3009ed
Author: Jakub Jelen <jjelen@redhat.com>
3009ed
Date:   Thu Feb 27 10:07:33 2020 +0100
3009ed
3009ed
    Mark the RDomain configuration option unsupported on non-openbsd builds
3009ed
3009ed
diff --git a/servconf.c b/servconf.c
3009ed
index db80e943..153d2525 100644
3009ed
--- a/servconf.c
3009ed
+++ b/servconf.c
3009ed
@@ -698,7 +698,11 @@ static struct {
3009ed
 	{ "fingerprinthash", sFingerprintHash, SSHCFG_GLOBAL },
3009ed
 	{ "disableforwarding", sDisableForwarding, SSHCFG_ALL },
3009ed
 	{ "exposeauthinfo", sExposeAuthInfo, SSHCFG_ALL },
3009ed
+#if defined(__OpenBSD__)
3009ed
 	{ "rdomain", sRDomain, SSHCFG_ALL },
3009ed
+#else
3009ed
+	{ "rdomain", sUnsupported, SSHCFG_ALL },
3009ed
+#endif
3009ed
 	{ "casignaturealgorithms", sCASignatureAlgorithms, SSHCFG_ALL },
3009ed
 	{ NULL, sBadOption, 0 }
3009ed
 };
3009ed
@@ -2841,7 +2845,9 @@ dump_config(ServerOptions *o)
3009ed
 	    o->hostkeyalgorithms : KEX_DEFAULT_PK_ALG);
3009ed
 	dump_cfg_string(sPubkeyAcceptedKeyTypes, o->pubkey_key_types ?
3009ed
 	    o->pubkey_key_types : KEX_DEFAULT_PK_ALG);
3009ed
+#if defined(__OpenBSD__)
3009ed
 	dump_cfg_string(sRDomain, o->routing_domain);
3009ed
+#endif
3009ed
 
3009ed
 	/* string arguments requiring a lookup */
3009ed
 	dump_cfg_string(sLogLevel, log_level_name(o->log_level));
3009ed
diff --git a/sshd_config.5 b/sshd_config.5
3009ed
index 5dca8981..766e9b90 100644
3009ed
--- a/sshd_config.5
3009ed
+++ b/sshd_config.5
3009ed
@@ -1542,6 +1542,7 @@ will be bound to this
3009ed
 If the routing domain is set to
3009ed
 .Cm \&%D ,
3009ed
 then the domain in which the incoming connection was received will be applied.
3009ed
+This feature is available on OpenBSD only.
3009ed
 .It Cm SetEnv
3009ed
 Specifies one or more environment variables to set in child sessions started
3009ed
 by