diff options
author | Markus Friedl <markus@cvs.openbsd.org> | 2001-01-19 12:45:28 +0000 |
---|---|---|
committer | Markus Friedl <markus@cvs.openbsd.org> | 2001-01-19 12:45:28 +0000 |
commit | 1bc81e8568fafa5782b4e7e0eb7be33a489d4e12 (patch) | |
tree | 66f0f96c0b52fa2f4cde127046d42e8bdb1bee87 | |
parent | 70e4be3ea2932a4a2c3c8e85675ba6fe3eb8edcc (diff) |
only auth-chall.c needs #ifdef SKEY
-rw-r--r-- | usr.bin/ssh/auth-chall.c | 4 | ||||
-rw-r--r-- | usr.bin/ssh/servconf.c | 12 | ||||
-rw-r--r-- | usr.bin/ssh/servconf.h | 4 | ||||
-rw-r--r-- | usr.bin/ssh/ssh.h | 8 | ||||
-rw-r--r-- | usr.bin/ssh/sshd.c | 4 |
5 files changed, 7 insertions, 25 deletions
diff --git a/usr.bin/ssh/auth-chall.c b/usr.bin/ssh/auth-chall.c index e02e99d36a6..e99ddb39f9f 100644 --- a/usr.bin/ssh/auth-chall.c +++ b/usr.bin/ssh/auth-chall.c @@ -23,12 +23,14 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-chall.c,v 1.1 2001/01/18 17:12:43 markus Exp $"); +RCSID("$OpenBSD: auth-chall.c,v 1.2 2001/01/19 12:45:26 markus Exp $"); #include "ssh.h" #include "auth.h" #ifdef SKEY +#include <skey.h> + char * get_challenge(Authctxt *authctxt, char *devs) { diff --git a/usr.bin/ssh/servconf.c b/usr.bin/ssh/servconf.c index 544bb340ea8..801267b4853 100644 --- a/usr.bin/ssh/servconf.c +++ b/usr.bin/ssh/servconf.c @@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: servconf.c,v 1.58 2001/01/18 16:20:22 markus Exp $"); +RCSID("$OpenBSD: servconf.c,v 1.59 2001/01/19 12:45:26 markus Exp $"); #include "ssh.h" #include "servconf.h" @@ -61,9 +61,7 @@ initialize_server_options(ServerOptions *options) #endif options->password_authentication = -1; options->kbd_interactive_authentication = -1; -#ifdef SKEY options->skey_authentication = -1; -#endif options->permit_empty_passwd = -1; options->use_login = -1; options->allow_tcp_forwarding = -1; @@ -157,10 +155,8 @@ fill_default_server_options(ServerOptions *options) options->password_authentication = 1; if (options->kbd_interactive_authentication == -1) options->kbd_interactive_authentication = 0; -#ifdef SKEY if (options->skey_authentication == -1) options->skey_authentication = 1; -#endif if (options->permit_empty_passwd == -1) options->permit_empty_passwd = 0; if (options->use_login == -1) @@ -189,9 +185,7 @@ typedef enum { #ifdef AFS sKerberosTgtPassing, sAFSTokenPassing, #endif -#ifdef SKEY sSkeyAuthentication, -#endif sPasswordAuthentication, sKbdInteractiveAuthentication, sListenAddress, sPrintMotd, sIgnoreRhosts, sX11Forwarding, sX11DisplayOffset, sStrictModes, sEmptyPasswd, sRandomSeedFile, sKeepAlives, sCheckMail, @@ -233,9 +227,7 @@ static struct { #endif { "passwordauthentication", sPasswordAuthentication }, { "kbdinteractiveauthentication", sKbdInteractiveAuthentication }, -#ifdef SKEY { "skeyauthentication", sSkeyAuthentication }, -#endif { "checkmail", sCheckMail }, { "listenaddress", sListenAddress }, { "printmotd", sPrintMotd }, @@ -530,11 +522,9 @@ parse_flag: intptr = &options->check_mail; goto parse_flag; -#ifdef SKEY case sSkeyAuthentication: intptr = &options->skey_authentication; goto parse_flag; -#endif case sPrintMotd: intptr = &options->print_motd; diff --git a/usr.bin/ssh/servconf.h b/usr.bin/ssh/servconf.h index 532b22f6e67..ea0694905f2 100644 --- a/usr.bin/ssh/servconf.h +++ b/usr.bin/ssh/servconf.h @@ -11,7 +11,7 @@ * called by a name other than "ssh" or "Secure Shell". */ -/* RCSID("$OpenBSD: servconf.h,v 1.33 2001/01/08 22:29:05 markus Exp $"); */ +/* RCSID("$OpenBSD: servconf.h,v 1.34 2001/01/19 12:45:27 markus Exp $"); */ #ifndef SERVCONF_H #define SERVCONF_H @@ -80,10 +80,8 @@ typedef struct { int password_authentication; /* If true, permit password * authentication. */ int kbd_interactive_authentication; /* If true, permit */ -#ifdef SKEY int skey_authentication; /* If true, permit s/key * authentication. */ -#endif int permit_empty_passwd; /* If false, do not permit empty * passwords. */ int use_login; /* If true, login(1) is used */ diff --git a/usr.bin/ssh/ssh.h b/usr.bin/ssh/ssh.h index 30fa28bfda2..c80a2a2d52a 100644 --- a/usr.bin/ssh/ssh.h +++ b/usr.bin/ssh/ssh.h @@ -12,7 +12,7 @@ * called by a name other than "ssh" or "Secure Shell". */ -/* RCSID("$OpenBSD: ssh.h,v 1.58 2001/01/18 16:20:22 markus Exp $"); */ +/* RCSID("$OpenBSD: ssh.h,v 1.59 2001/01/19 12:45:27 markus Exp $"); */ #ifndef SSH_H #define SSH_H @@ -502,12 +502,6 @@ int radix_to_creds(const char *buf, CREDENTIALS * creds); #endif /* KRB4 */ -#ifdef SKEY -#include <skey.h> -char *skey_fake_keyinfo(char *username); -int auth_skey_password(struct passwd * pw, const char *password); -#endif /* SKEY */ - /* AF_UNSPEC or AF_INET or AF_INET6 */ extern int IPv4or6; diff --git a/usr.bin/ssh/sshd.c b/usr.bin/ssh/sshd.c index fb9e340669f..41df30d5ea0 100644 --- a/usr.bin/ssh/sshd.c +++ b/usr.bin/ssh/sshd.c @@ -40,7 +40,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: sshd.c,v 1.152 2001/01/18 16:20:22 markus Exp $"); +RCSID("$OpenBSD: sshd.c,v 1.153 2001/01/19 12:45:27 markus Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -1226,10 +1226,8 @@ do_ssh1_kex(void) if (options.afs_token_passing) auth_mask |= 1 << SSH_PASS_AFS_TOKEN; #endif -#ifdef SKEY if (options.skey_authentication == 1) auth_mask |= 1 << SSH_AUTH_TIS; -#endif if (options.password_authentication) auth_mask |= 1 << SSH_AUTH_PASSWORD; packet_put_int(auth_mask); |