diff options
author | Damien Miller <djm@mindrot.org> | 2018-07-20 05:18:28 +0200 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2018-07-31 04:59:30 +0200 |
commit | 87f08be054b7eeadbb9cdeb3fb4872be79ccf218 (patch) | |
tree | 80bfc724ddd93228b8571702a2f153787994022b /auth.h | |
parent | upstream: avoid expensive channel_open_message() calls; ok djm@ (diff) | |
download | openssh-87f08be054b7eeadbb9cdeb3fb4872be79ccf218.tar.xz openssh-87f08be054b7eeadbb9cdeb3fb4872be79ccf218.zip |
Remove support for S/Key
Most people will 1) be using modern multi-factor authentication methods
like TOTP/OATH etc and 2) be getting support for multi-factor
authentication via PAM or BSD Auth.
Diffstat (limited to 'auth.h')
-rw-r--r-- | auth.h | 4 |
1 files changed, 0 insertions, 4 deletions
@@ -187,8 +187,6 @@ int auth2_challenge(struct ssh *, char *); void auth2_challenge_stop(struct ssh *); int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); int bsdauth_respond(void *, u_int, char **); -int skey_query(void *, char **, char **, u_int *, char ***, u_int **); -int skey_respond(void *, u_int, char **); int allowed_user(struct passwd *); struct passwd * getpwnamallow(const char *user); @@ -239,8 +237,6 @@ pid_t subprocess(const char *, struct passwd *, int sys_auth_passwd(struct ssh *, const char *); -#define SKEY_PROMPT "\nS/Key Password: " - #if defined(KRB5) && !defined(HEIMDAL) #include <krb5.h> krb5_error_code ssh_krb5_cc_gen(krb5_context, krb5_ccache *); |