summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog5
-rw-r--r--readconf.c17
-rw-r--r--readconf.h4
-rw-r--r--servconf.c9
-rw-r--r--servconf.h4
-rw-r--r--ssh.c5
6 files changed, 10 insertions, 34 deletions
diff --git a/ChangeLog b/ChangeLog
index 5796787d5..1aaa41485 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -41,6 +41,9 @@
41 - markus@cvs.openbsd.org 2003/09/01 13:52:18 41 - markus@cvs.openbsd.org 2003/09/01 13:52:18
42 [ssh.h] 42 [ssh.h]
43 rm whitespace 43 rm whitespace
44 - markus@cvs.openbsd.org 2003/09/01 18:15:50
45 [readconf.c readconf.h servconf.c servconf.h ssh.c]
46 remove unused kerberos code; ok henning@
44 47
4520030829 4820030829
46 - (bal) openbsd-compat/ clean up. Considate headers, add in Id on our 49 - (bal) openbsd-compat/ clean up. Considate headers, add in Id on our
@@ -956,4 +959,4 @@
956 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. 959 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
957 Report from murple@murple.net, diagnosis from dtucker@zip.com.au 960 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
958 961
959$Id: ChangeLog,v 1.2931 2003/09/02 12:57:54 djm Exp $ 962$Id: ChangeLog,v 1.2932 2003/09/02 12:58:22 djm Exp $
diff --git a/readconf.c b/readconf.c
index d7ef58936..13987ffa7 100644
--- a/readconf.c
+++ b/readconf.c
@@ -12,7 +12,7 @@
12 */ 12 */
13 13
14#include "includes.h" 14#include "includes.h"
15RCSID("$OpenBSD: readconf.c,v 1.120 2003/09/01 12:50:46 markus Exp $"); 15RCSID("$OpenBSD: readconf.c,v 1.121 2003/09/01 18:15:50 markus Exp $");
16 16
17#include "ssh.h" 17#include "ssh.h"
18#include "xmalloc.h" 18#include "xmalloc.h"
@@ -92,7 +92,6 @@ typedef enum {
92 oForwardAgent, oForwardX11, oGatewayPorts, 92 oForwardAgent, oForwardX11, oGatewayPorts,
93 oPasswordAuthentication, oRSAAuthentication, 93 oPasswordAuthentication, oRSAAuthentication,
94 oChallengeResponseAuthentication, oXAuthLocation, 94 oChallengeResponseAuthentication, oXAuthLocation,
95 oKerberosAuthentication, oKerberosTgtPassing,
96 oIdentityFile, oHostName, oPort, oCipher, oRemoteForward, oLocalForward, 95 oIdentityFile, oHostName, oPort, oCipher, oRemoteForward, oLocalForward,
97 oUser, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand, 96 oUser, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand,
98 oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, 97 oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
@@ -383,14 +382,6 @@ parse_flag:
383 intptr = &options->challenge_response_authentication; 382 intptr = &options->challenge_response_authentication;
384 goto parse_flag; 383 goto parse_flag;
385 384
386 case oKerberosAuthentication:
387 intptr = &options->kerberos_authentication;
388 goto parse_flag;
389
390 case oKerberosTgtPassing:
391 intptr = &options->kerberos_tgt_passing;
392 goto parse_flag;
393
394 case oGssAuthentication: 385 case oGssAuthentication:
395 intptr = &options->gss_authentication; 386 intptr = &options->gss_authentication;
396 goto parse_flag; 387 goto parse_flag;
@@ -821,8 +812,6 @@ initialize_options(Options * options)
821 options->rsa_authentication = -1; 812 options->rsa_authentication = -1;
822 options->pubkey_authentication = -1; 813 options->pubkey_authentication = -1;
823 options->challenge_response_authentication = -1; 814 options->challenge_response_authentication = -1;
824 options->kerberos_authentication = -1;
825 options->kerberos_tgt_passing = -1;
826 options->gss_authentication = -1; 815 options->gss_authentication = -1;
827 options->gss_deleg_creds = -1; 816 options->gss_deleg_creds = -1;
828 options->password_authentication = -1; 817 options->password_authentication = -1;
@@ -895,10 +884,6 @@ fill_default_options(Options * options)
895 options->pubkey_authentication = 1; 884 options->pubkey_authentication = 1;
896 if (options->challenge_response_authentication == -1) 885 if (options->challenge_response_authentication == -1)
897 options->challenge_response_authentication = 1; 886 options->challenge_response_authentication = 1;
898 if (options->kerberos_authentication == -1)
899 options->kerberos_authentication = 1;
900 if (options->kerberos_tgt_passing == -1)
901 options->kerberos_tgt_passing = 1;
902 if (options->gss_authentication == -1) 887 if (options->gss_authentication == -1)
903 options->gss_authentication = 1; 888 options->gss_authentication = 1;
904 if (options->gss_deleg_creds == -1) 889 if (options->gss_deleg_creds == -1)
diff --git a/readconf.h b/readconf.h
index 1100205b8..60287f710 100644
--- a/readconf.h
+++ b/readconf.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: readconf.h,v 1.54 2003/08/22 10:56:09 markus Exp $ */ 1/* $OpenBSD: readconf.h,v 1.55 2003/09/01 18:15:50 markus Exp $ */
2 2
3/* 3/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi> 4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -40,8 +40,6 @@ typedef struct {
40 int hostbased_authentication; /* ssh2's rhosts_rsa */ 40 int hostbased_authentication; /* ssh2's rhosts_rsa */
41 int challenge_response_authentication; 41 int challenge_response_authentication;
42 /* Try S/Key or TIS, authentication. */ 42 /* Try S/Key or TIS, authentication. */
43 int kerberos_authentication; /* Try Kerberos authentication. */
44 int kerberos_tgt_passing; /* Try Kerberos TGT passing. */
45 int gss_authentication; /* Try GSS authentication */ 43 int gss_authentication; /* Try GSS authentication */
46 int gss_deleg_creds; /* Delegate GSS credentials */ 44 int gss_deleg_creds; /* Delegate GSS credentials */
47 int password_authentication; /* Try password 45 int password_authentication; /* Try password
diff --git a/servconf.c b/servconf.c
index 6051918c2..71e28b3cb 100644
--- a/servconf.c
+++ b/servconf.c
@@ -10,7 +10,7 @@
10 */ 10 */
11 11
12#include "includes.h" 12#include "includes.h"
13RCSID("$OpenBSD: servconf.c,v 1.126 2003/08/28 12:54:34 markus Exp $"); 13RCSID("$OpenBSD: servconf.c,v 1.127 2003/09/01 18:15:50 markus Exp $");
14 14
15#include "ssh.h" 15#include "ssh.h"
16#include "log.h" 16#include "log.h"
@@ -72,7 +72,6 @@ initialize_server_options(ServerOptions *options)
72 options->kerberos_authentication = -1; 72 options->kerberos_authentication = -1;
73 options->kerberos_or_local_passwd = -1; 73 options->kerberos_or_local_passwd = -1;
74 options->kerberos_ticket_cleanup = -1; 74 options->kerberos_ticket_cleanup = -1;
75 options->kerberos_tgt_passing = -1;
76 options->gss_authentication=-1; 75 options->gss_authentication=-1;
77 options->gss_cleanup_creds = -1; 76 options->gss_cleanup_creds = -1;
78 options->password_authentication = -1; 77 options->password_authentication = -1;
@@ -182,8 +181,6 @@ fill_default_server_options(ServerOptions *options)
182 options->kerberos_or_local_passwd = 1; 181 options->kerberos_or_local_passwd = 1;
183 if (options->kerberos_ticket_cleanup == -1) 182 if (options->kerberos_ticket_cleanup == -1)
184 options->kerberos_ticket_cleanup = 1; 183 options->kerberos_ticket_cleanup = 1;
185 if (options->kerberos_tgt_passing == -1)
186 options->kerberos_tgt_passing = 0;
187 if (options->gss_authentication == -1) 184 if (options->gss_authentication == -1)
188 options->gss_authentication = 0; 185 options->gss_authentication = 0;
189 if (options->gss_cleanup_creds == -1) 186 if (options->gss_cleanup_creds == -1)
@@ -632,10 +629,6 @@ parse_flag:
632 intptr = &options->kerberos_ticket_cleanup; 629 intptr = &options->kerberos_ticket_cleanup;
633 goto parse_flag; 630 goto parse_flag;
634 631
635 case sKerberosTgtPassing:
636 intptr = &options->kerberos_tgt_passing;
637 goto parse_flag;
638
639 case sGssAuthentication: 632 case sGssAuthentication:
640 intptr = &options->gss_authentication; 633 intptr = &options->gss_authentication;
641 goto parse_flag; 634 goto parse_flag;
diff --git a/servconf.h b/servconf.h
index f86cb2209..828e94c5c 100644
--- a/servconf.h
+++ b/servconf.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: servconf.h,v 1.64 2003/08/22 10:56:09 markus Exp $ */ 1/* $OpenBSD: servconf.h,v 1.65 2003/09/01 18:15:50 markus Exp $ */
2 2
3/* 3/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi> 4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -80,8 +80,6 @@ typedef struct {
80 * /etc/passwd */ 80 * /etc/passwd */
81 int kerberos_ticket_cleanup; /* If true, destroy ticket 81 int kerberos_ticket_cleanup; /* If true, destroy ticket
82 * file on logout. */ 82 * file on logout. */
83 int kerberos_tgt_passing; /* If true, permit Kerberos TGT
84 * passing. */
85 int gss_authentication; /* If true, permit GSSAPI authentication */ 83 int gss_authentication; /* If true, permit GSSAPI authentication */
86 int gss_cleanup_creds; /* If true, destroy cred cache on logout */ 84 int gss_cleanup_creds; /* If true, destroy cred cache on logout */
87 int password_authentication; /* If true, permit password 85 int password_authentication; /* If true, permit password
diff --git a/ssh.c b/ssh.c
index 46640a857..35418f693 100644
--- a/ssh.c
+++ b/ssh.c
@@ -40,7 +40,7 @@
40 */ 40 */
41 41
42#include "includes.h" 42#include "includes.h"
43RCSID("$OpenBSD: ssh.c,v 1.200 2003/08/13 09:07:10 markus Exp $"); 43RCSID("$OpenBSD: ssh.c,v 1.201 2003/09/01 18:15:50 markus Exp $");
44 44
45#include <openssl/evp.h> 45#include <openssl/evp.h>
46#include <openssl/err.h> 46#include <openssl/err.h>
@@ -154,7 +154,6 @@ usage(void)
154 _PATH_SSH_USER_CONFFILE); 154 _PATH_SSH_USER_CONFFILE);
155 fprintf(stderr, " -A Enable authentication agent forwarding.\n"); 155 fprintf(stderr, " -A Enable authentication agent forwarding.\n");
156 fprintf(stderr, " -a Disable authentication agent forwarding (default).\n"); 156 fprintf(stderr, " -a Disable authentication agent forwarding (default).\n");
157 fprintf(stderr, " -k Disable Kerberos ticket forwarding.\n");
158 fprintf(stderr, " -X Enable X11 connection forwarding.\n"); 157 fprintf(stderr, " -X Enable X11 connection forwarding.\n");
159 fprintf(stderr, " -x Disable X11 connection forwarding (default).\n"); 158 fprintf(stderr, " -x Disable X11 connection forwarding (default).\n");
160 fprintf(stderr, " -i file Identity for public key authentication " 159 fprintf(stderr, " -i file Identity for public key authentication "
@@ -305,7 +304,7 @@ again:
305 options.forward_agent = 1; 304 options.forward_agent = 1;
306 break; 305 break;
307 case 'k': 306 case 'k':
308 options.kerberos_tgt_passing = 0; 307 /* ignored for backward compatibility */
309 break; 308 break;
310 case 'i': 309 case 'i':
311 if (stat(optarg, &st) < 0) { 310 if (stat(optarg, &st) < 0) {