diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | readconf.c | 17 | ||||
-rw-r--r-- | readconf.h | 4 | ||||
-rw-r--r-- | servconf.c | 9 | ||||
-rw-r--r-- | servconf.h | 4 | ||||
-rw-r--r-- | ssh.c | 5 |
6 files changed, 10 insertions, 34 deletions
@@ -41,6 +41,9 @@ | |||
41 | - markus@cvs.openbsd.org 2003/09/01 13:52:18 | 41 | - markus@cvs.openbsd.org 2003/09/01 13:52:18 |
42 | [ssh.h] | 42 | [ssh.h] |
43 | rm whitespace | 43 | rm whitespace |
44 | - markus@cvs.openbsd.org 2003/09/01 18:15:50 | ||
45 | [readconf.c readconf.h servconf.c servconf.h ssh.c] | ||
46 | remove unused kerberos code; ok henning@ | ||
44 | 47 | ||
45 | 20030829 | 48 | 20030829 |
46 | - (bal) openbsd-compat/ clean up. Considate headers, add in Id on our | 49 | - (bal) openbsd-compat/ clean up. Considate headers, add in Id on our |
@@ -956,4 +959,4 @@ | |||
956 | - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. | 959 | - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. |
957 | Report from murple@murple.net, diagnosis from dtucker@zip.com.au | 960 | Report from murple@murple.net, diagnosis from dtucker@zip.com.au |
958 | 961 | ||
959 | $Id: ChangeLog,v 1.2931 2003/09/02 12:57:54 djm Exp $ | 962 | $Id: ChangeLog,v 1.2932 2003/09/02 12:58:22 djm Exp $ |
diff --git a/readconf.c b/readconf.c index d7ef58936..13987ffa7 100644 --- a/readconf.c +++ b/readconf.c | |||
@@ -12,7 +12,7 @@ | |||
12 | */ | 12 | */ |
13 | 13 | ||
14 | #include "includes.h" | 14 | #include "includes.h" |
15 | RCSID("$OpenBSD: readconf.c,v 1.120 2003/09/01 12:50:46 markus Exp $"); | 15 | RCSID("$OpenBSD: readconf.c,v 1.121 2003/09/01 18:15:50 markus Exp $"); |
16 | 16 | ||
17 | #include "ssh.h" | 17 | #include "ssh.h" |
18 | #include "xmalloc.h" | 18 | #include "xmalloc.h" |
@@ -92,7 +92,6 @@ typedef enum { | |||
92 | oForwardAgent, oForwardX11, oGatewayPorts, | 92 | oForwardAgent, oForwardX11, oGatewayPorts, |
93 | oPasswordAuthentication, oRSAAuthentication, | 93 | oPasswordAuthentication, oRSAAuthentication, |
94 | oChallengeResponseAuthentication, oXAuthLocation, | 94 | oChallengeResponseAuthentication, oXAuthLocation, |
95 | oKerberosAuthentication, oKerberosTgtPassing, | ||
96 | oIdentityFile, oHostName, oPort, oCipher, oRemoteForward, oLocalForward, | 95 | oIdentityFile, oHostName, oPort, oCipher, oRemoteForward, oLocalForward, |
97 | oUser, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand, | 96 | oUser, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand, |
98 | oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, | 97 | oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, |
@@ -383,14 +382,6 @@ parse_flag: | |||
383 | intptr = &options->challenge_response_authentication; | 382 | intptr = &options->challenge_response_authentication; |
384 | goto parse_flag; | 383 | goto parse_flag; |
385 | 384 | ||
386 | case oKerberosAuthentication: | ||
387 | intptr = &options->kerberos_authentication; | ||
388 | goto parse_flag; | ||
389 | |||
390 | case oKerberosTgtPassing: | ||
391 | intptr = &options->kerberos_tgt_passing; | ||
392 | goto parse_flag; | ||
393 | |||
394 | case oGssAuthentication: | 385 | case oGssAuthentication: |
395 | intptr = &options->gss_authentication; | 386 | intptr = &options->gss_authentication; |
396 | goto parse_flag; | 387 | goto parse_flag; |
@@ -821,8 +812,6 @@ initialize_options(Options * options) | |||
821 | options->rsa_authentication = -1; | 812 | options->rsa_authentication = -1; |
822 | options->pubkey_authentication = -1; | 813 | options->pubkey_authentication = -1; |
823 | options->challenge_response_authentication = -1; | 814 | options->challenge_response_authentication = -1; |
824 | options->kerberos_authentication = -1; | ||
825 | options->kerberos_tgt_passing = -1; | ||
826 | options->gss_authentication = -1; | 815 | options->gss_authentication = -1; |
827 | options->gss_deleg_creds = -1; | 816 | options->gss_deleg_creds = -1; |
828 | options->password_authentication = -1; | 817 | options->password_authentication = -1; |
@@ -895,10 +884,6 @@ fill_default_options(Options * options) | |||
895 | options->pubkey_authentication = 1; | 884 | options->pubkey_authentication = 1; |
896 | if (options->challenge_response_authentication == -1) | 885 | if (options->challenge_response_authentication == -1) |
897 | options->challenge_response_authentication = 1; | 886 | options->challenge_response_authentication = 1; |
898 | if (options->kerberos_authentication == -1) | ||
899 | options->kerberos_authentication = 1; | ||
900 | if (options->kerberos_tgt_passing == -1) | ||
901 | options->kerberos_tgt_passing = 1; | ||
902 | if (options->gss_authentication == -1) | 887 | if (options->gss_authentication == -1) |
903 | options->gss_authentication = 1; | 888 | options->gss_authentication = 1; |
904 | if (options->gss_deleg_creds == -1) | 889 | if (options->gss_deleg_creds == -1) |
diff --git a/readconf.h b/readconf.h index 1100205b8..60287f710 100644 --- a/readconf.h +++ b/readconf.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: readconf.h,v 1.54 2003/08/22 10:56:09 markus Exp $ */ | 1 | /* $OpenBSD: readconf.h,v 1.55 2003/09/01 18:15:50 markus Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
@@ -40,8 +40,6 @@ typedef struct { | |||
40 | int hostbased_authentication; /* ssh2's rhosts_rsa */ | 40 | int hostbased_authentication; /* ssh2's rhosts_rsa */ |
41 | int challenge_response_authentication; | 41 | int challenge_response_authentication; |
42 | /* Try S/Key or TIS, authentication. */ | 42 | /* Try S/Key or TIS, authentication. */ |
43 | int kerberos_authentication; /* Try Kerberos authentication. */ | ||
44 | int kerberos_tgt_passing; /* Try Kerberos TGT passing. */ | ||
45 | int gss_authentication; /* Try GSS authentication */ | 43 | int gss_authentication; /* Try GSS authentication */ |
46 | int gss_deleg_creds; /* Delegate GSS credentials */ | 44 | int gss_deleg_creds; /* Delegate GSS credentials */ |
47 | int password_authentication; /* Try password | 45 | int password_authentication; /* Try password |
diff --git a/servconf.c b/servconf.c index 6051918c2..71e28b3cb 100644 --- a/servconf.c +++ b/servconf.c | |||
@@ -10,7 +10,7 @@ | |||
10 | */ | 10 | */ |
11 | 11 | ||
12 | #include "includes.h" | 12 | #include "includes.h" |
13 | RCSID("$OpenBSD: servconf.c,v 1.126 2003/08/28 12:54:34 markus Exp $"); | 13 | RCSID("$OpenBSD: servconf.c,v 1.127 2003/09/01 18:15:50 markus Exp $"); |
14 | 14 | ||
15 | #include "ssh.h" | 15 | #include "ssh.h" |
16 | #include "log.h" | 16 | #include "log.h" |
@@ -72,7 +72,6 @@ initialize_server_options(ServerOptions *options) | |||
72 | options->kerberos_authentication = -1; | 72 | options->kerberos_authentication = -1; |
73 | options->kerberos_or_local_passwd = -1; | 73 | options->kerberos_or_local_passwd = -1; |
74 | options->kerberos_ticket_cleanup = -1; | 74 | options->kerberos_ticket_cleanup = -1; |
75 | options->kerberos_tgt_passing = -1; | ||
76 | options->gss_authentication=-1; | 75 | options->gss_authentication=-1; |
77 | options->gss_cleanup_creds = -1; | 76 | options->gss_cleanup_creds = -1; |
78 | options->password_authentication = -1; | 77 | options->password_authentication = -1; |
@@ -182,8 +181,6 @@ fill_default_server_options(ServerOptions *options) | |||
182 | options->kerberos_or_local_passwd = 1; | 181 | options->kerberos_or_local_passwd = 1; |
183 | if (options->kerberos_ticket_cleanup == -1) | 182 | if (options->kerberos_ticket_cleanup == -1) |
184 | options->kerberos_ticket_cleanup = 1; | 183 | options->kerberos_ticket_cleanup = 1; |
185 | if (options->kerberos_tgt_passing == -1) | ||
186 | options->kerberos_tgt_passing = 0; | ||
187 | if (options->gss_authentication == -1) | 184 | if (options->gss_authentication == -1) |
188 | options->gss_authentication = 0; | 185 | options->gss_authentication = 0; |
189 | if (options->gss_cleanup_creds == -1) | 186 | if (options->gss_cleanup_creds == -1) |
@@ -632,10 +629,6 @@ parse_flag: | |||
632 | intptr = &options->kerberos_ticket_cleanup; | 629 | intptr = &options->kerberos_ticket_cleanup; |
633 | goto parse_flag; | 630 | goto parse_flag; |
634 | 631 | ||
635 | case sKerberosTgtPassing: | ||
636 | intptr = &options->kerberos_tgt_passing; | ||
637 | goto parse_flag; | ||
638 | |||
639 | case sGssAuthentication: | 632 | case sGssAuthentication: |
640 | intptr = &options->gss_authentication; | 633 | intptr = &options->gss_authentication; |
641 | goto parse_flag; | 634 | goto parse_flag; |
diff --git a/servconf.h b/servconf.h index f86cb2209..828e94c5c 100644 --- a/servconf.h +++ b/servconf.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: servconf.h,v 1.64 2003/08/22 10:56:09 markus Exp $ */ | 1 | /* $OpenBSD: servconf.h,v 1.65 2003/09/01 18:15:50 markus Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
@@ -80,8 +80,6 @@ typedef struct { | |||
80 | * /etc/passwd */ | 80 | * /etc/passwd */ |
81 | int kerberos_ticket_cleanup; /* If true, destroy ticket | 81 | int kerberos_ticket_cleanup; /* If true, destroy ticket |
82 | * file on logout. */ | 82 | * file on logout. */ |
83 | int kerberos_tgt_passing; /* If true, permit Kerberos TGT | ||
84 | * passing. */ | ||
85 | int gss_authentication; /* If true, permit GSSAPI authentication */ | 83 | int gss_authentication; /* If true, permit GSSAPI authentication */ |
86 | int gss_cleanup_creds; /* If true, destroy cred cache on logout */ | 84 | int gss_cleanup_creds; /* If true, destroy cred cache on logout */ |
87 | int password_authentication; /* If true, permit password | 85 | int password_authentication; /* If true, permit password |
@@ -40,7 +40,7 @@ | |||
40 | */ | 40 | */ |
41 | 41 | ||
42 | #include "includes.h" | 42 | #include "includes.h" |
43 | RCSID("$OpenBSD: ssh.c,v 1.200 2003/08/13 09:07:10 markus Exp $"); | 43 | RCSID("$OpenBSD: ssh.c,v 1.201 2003/09/01 18:15:50 markus Exp $"); |
44 | 44 | ||
45 | #include <openssl/evp.h> | 45 | #include <openssl/evp.h> |
46 | #include <openssl/err.h> | 46 | #include <openssl/err.h> |
@@ -154,7 +154,6 @@ usage(void) | |||
154 | _PATH_SSH_USER_CONFFILE); | 154 | _PATH_SSH_USER_CONFFILE); |
155 | fprintf(stderr, " -A Enable authentication agent forwarding.\n"); | 155 | fprintf(stderr, " -A Enable authentication agent forwarding.\n"); |
156 | fprintf(stderr, " -a Disable authentication agent forwarding (default).\n"); | 156 | fprintf(stderr, " -a Disable authentication agent forwarding (default).\n"); |
157 | fprintf(stderr, " -k Disable Kerberos ticket forwarding.\n"); | ||
158 | fprintf(stderr, " -X Enable X11 connection forwarding.\n"); | 157 | fprintf(stderr, " -X Enable X11 connection forwarding.\n"); |
159 | fprintf(stderr, " -x Disable X11 connection forwarding (default).\n"); | 158 | fprintf(stderr, " -x Disable X11 connection forwarding (default).\n"); |
160 | fprintf(stderr, " -i file Identity for public key authentication " | 159 | fprintf(stderr, " -i file Identity for public key authentication " |
@@ -305,7 +304,7 @@ again: | |||
305 | options.forward_agent = 1; | 304 | options.forward_agent = 1; |
306 | break; | 305 | break; |
307 | case 'k': | 306 | case 'k': |
308 | options.kerberos_tgt_passing = 0; | 307 | /* ignored for backward compatibility */ |
309 | break; | 308 | break; |
310 | case 'i': | 309 | case 'i': |
311 | if (stat(optarg, &st) < 0) { | 310 | if (stat(optarg, &st) < 0) { |