summaryrefslogtreecommitdiff
path: root/auth.h
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2018-07-20 13:18:28 +1000
committerDamien Miller <djm@mindrot.org>2018-07-31 12:59:30 +1000
commit87f08be054b7eeadbb9cdeb3fb4872be79ccf218 (patch)
tree80bfc724ddd93228b8571702a2f153787994022b /auth.h
parent5d14019ba2ff54acbfd20a6b9b96bb860a8c7c31 (diff)
Remove support for S/Key
Most people will 1) be using modern multi-factor authentication methods like TOTP/OATH etc and 2) be getting support for multi-factor authentication via PAM or BSD Auth.
Diffstat (limited to 'auth.h')
-rw-r--r--auth.h4
1 files changed, 0 insertions, 4 deletions
diff --git a/auth.h b/auth.h
index 29491df98..977562f0a 100644
--- a/auth.h
+++ b/auth.h
@@ -187,8 +187,6 @@ int auth2_challenge(struct ssh *, char *);
187void auth2_challenge_stop(struct ssh *); 187void auth2_challenge_stop(struct ssh *);
188int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); 188int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **);
189int bsdauth_respond(void *, u_int, char **); 189int bsdauth_respond(void *, u_int, char **);
190int skey_query(void *, char **, char **, u_int *, char ***, u_int **);
191int skey_respond(void *, u_int, char **);
192 190
193int allowed_user(struct passwd *); 191int allowed_user(struct passwd *);
194struct passwd * getpwnamallow(const char *user); 192struct passwd * getpwnamallow(const char *user);
@@ -239,8 +237,6 @@ pid_t subprocess(const char *, struct passwd *,
239 237
240int sys_auth_passwd(struct ssh *, const char *); 238int sys_auth_passwd(struct ssh *, const char *);
241 239
242#define SKEY_PROMPT "\nS/Key Password: "
243
244#if defined(KRB5) && !defined(HEIMDAL) 240#if defined(KRB5) && !defined(HEIMDAL)
245#include <krb5.h> 241#include <krb5.h>
246krb5_error_code ssh_krb5_cc_gen(krb5_context, krb5_ccache *); 242krb5_error_code ssh_krb5_cc_gen(krb5_context, krb5_ccache *);