diff options
author | Damien Miller <djm@mindrot.org> | 2018-07-20 13:18:28 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2018-07-31 12:59:30 +1000 |
commit | 87f08be054b7eeadbb9cdeb3fb4872be79ccf218 (patch) | |
tree | 80bfc724ddd93228b8571702a2f153787994022b /auth.h | |
parent | 5d14019ba2ff54acbfd20a6b9b96bb860a8c7c31 (diff) |
Remove support for S/Key
Most people will 1) be using modern multi-factor authentication methods
like TOTP/OATH etc and 2) be getting support for multi-factor
authentication via PAM or BSD Auth.
Diffstat (limited to 'auth.h')
-rw-r--r-- | auth.h | 4 |
1 files changed, 0 insertions, 4 deletions
@@ -187,8 +187,6 @@ int auth2_challenge(struct ssh *, char *); | |||
187 | void auth2_challenge_stop(struct ssh *); | 187 | void auth2_challenge_stop(struct ssh *); |
188 | int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); | 188 | int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); |
189 | int bsdauth_respond(void *, u_int, char **); | 189 | int bsdauth_respond(void *, u_int, char **); |
190 | int skey_query(void *, char **, char **, u_int *, char ***, u_int **); | ||
191 | int skey_respond(void *, u_int, char **); | ||
192 | 190 | ||
193 | int allowed_user(struct passwd *); | 191 | int allowed_user(struct passwd *); |
194 | struct passwd * getpwnamallow(const char *user); | 192 | struct passwd * getpwnamallow(const char *user); |
@@ -239,8 +237,6 @@ pid_t subprocess(const char *, struct passwd *, | |||
239 | 237 | ||
240 | int sys_auth_passwd(struct ssh *, const char *); | 238 | int sys_auth_passwd(struct ssh *, const char *); |
241 | 239 | ||
242 | #define SKEY_PROMPT "\nS/Key Password: " | ||
243 | |||
244 | #if defined(KRB5) && !defined(HEIMDAL) | 240 | #if defined(KRB5) && !defined(HEIMDAL) |
245 | #include <krb5.h> | 241 | #include <krb5.h> |
246 | krb5_error_code ssh_krb5_cc_gen(krb5_context, krb5_ccache *); | 242 | krb5_error_code ssh_krb5_cc_gen(krb5_context, krb5_ccache *); |