diff options
author | Damien Miller <djm@mindrot.org> | 2018-07-20 13:18:28 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2018-07-31 12:59:30 +1000 |
commit | 87f08be054b7eeadbb9cdeb3fb4872be79ccf218 (patch) | |
tree | 80bfc724ddd93228b8571702a2f153787994022b /auth.h | |
parent | 5d14019ba2ff54acbfd20a6b9b96bb860a8c7c31 (diff) | |
download | openssh-git-87f08be054b7eeadbb9cdeb3fb4872be79ccf218.tar.gz |
Remove support for S/Key
Most people will 1) be using modern multi-factor authentication methods
like TOTP/OATH etc and 2) be getting support for multi-factor
authentication via PAM or BSD Auth.
Diffstat (limited to 'auth.h')
-rw-r--r-- | auth.h | 4 |
1 files changed, 0 insertions, 4 deletions
@@ -187,8 +187,6 @@ int auth2_challenge(struct ssh *, char *); void auth2_challenge_stop(struct ssh *); int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); int bsdauth_respond(void *, u_int, char **); -int skey_query(void *, char **, char **, u_int *, char ***, u_int **); -int skey_respond(void *, u_int, char **); int allowed_user(struct passwd *); struct passwd * getpwnamallow(const char *user); @@ -239,8 +237,6 @@ pid_t subprocess(const char *, struct passwd *, int sys_auth_passwd(struct ssh *, const char *); -#define SKEY_PROMPT "\nS/Key Password: " - #if defined(KRB5) && !defined(HEIMDAL) #include <krb5.h> krb5_error_code ssh_krb5_cc_gen(krb5_context, krb5_ccache *); |