summaryrefslogtreecommitdiffstats
path: root/auth.h
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2018-07-20 05:18:28 +0200
committerDamien Miller <djm@mindrot.org>2018-07-31 04:59:30 +0200
commit87f08be054b7eeadbb9cdeb3fb4872be79ccf218 (patch)
tree80bfc724ddd93228b8571702a2f153787994022b /auth.h
parentupstream: avoid expensive channel_open_message() calls; ok djm@ (diff)
downloadopenssh-87f08be054b7eeadbb9cdeb3fb4872be79ccf218.tar.xz
openssh-87f08be054b7eeadbb9cdeb3fb4872be79ccf218.zip
Remove support for S/Key
Most people will 1) be using modern multi-factor authentication methods like TOTP/OATH etc and 2) be getting support for multi-factor authentication via PAM or BSD Auth.
Diffstat (limited to 'auth.h')
-rw-r--r--auth.h4
1 files changed, 0 insertions, 4 deletions
diff --git a/auth.h b/auth.h
index 29491df98..977562f0a 100644
--- a/auth.h
+++ b/auth.h
@@ -187,8 +187,6 @@ int auth2_challenge(struct ssh *, char *);
void auth2_challenge_stop(struct ssh *);
int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **);
int bsdauth_respond(void *, u_int, char **);
-int skey_query(void *, char **, char **, u_int *, char ***, u_int **);
-int skey_respond(void *, u_int, char **);
int allowed_user(struct passwd *);
struct passwd * getpwnamallow(const char *user);
@@ -239,8 +237,6 @@ pid_t subprocess(const char *, struct passwd *,
int sys_auth_passwd(struct ssh *, const char *);
-#define SKEY_PROMPT "\nS/Key Password: "
-
#if defined(KRB5) && !defined(HEIMDAL)
#include <krb5.h>
krb5_error_code ssh_krb5_cc_gen(krb5_context, krb5_ccache *);