diff options
author | 2011-05-11 04:47:06 +0000 | |
---|---|---|
committer | 2011-05-11 04:47:06 +0000 | |
commit | f7f33c9d59c2672bf9a0ca9b0b988cd56944b79c (patch) | |
tree | 9f38d4f7a9f5939128a7a770b51a31658f07ce43 /usr.bin/ssh/auth.c | |
parent | Don't leak swapslots when doing a uvm_km_pgremove and a page is in swap only. (diff) | |
download | wireguard-openbsd-f7f33c9d59c2672bf9a0ca9b0b988cd56944b79c.tar.xz wireguard-openbsd-f7f33c9d59c2672bf9a0ca9b0b988cd56944b79c.zip |
remove support for authorized_keys2; it is a relic from the early days
of protocol v.2 support and has been undocumented for many years;
ok markus@
Diffstat (limited to 'usr.bin/ssh/auth.c')
-rw-r--r-- | usr.bin/ssh/auth.c | 8 |
1 files changed, 1 insertions, 7 deletions
diff --git a/usr.bin/ssh/auth.c b/usr.bin/ssh/auth.c index 9330fd09de0..3852843f4b7 100644 --- a/usr.bin/ssh/auth.c +++ b/usr.bin/ssh/auth.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth.c,v 1.91 2010/11/29 23:45:51 djm Exp $ */ +/* $OpenBSD: auth.c,v 1.92 2011/05/11 04:47:06 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -271,12 +271,6 @@ authorized_keys_file(struct passwd *pw) } char * -authorized_keys_file2(struct passwd *pw) -{ - return expand_authorized_keys(options.authorized_keys_file2, pw); -} - -char * authorized_principals_file(struct passwd *pw) { if (options.authorized_principals_file == NULL) |