summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth.c
diff options
context:
space:
mode:
authordjm <djm@openbsd.org>2011-05-11 04:47:06 +0000
committerdjm <djm@openbsd.org>2011-05-11 04:47:06 +0000
commitf7f33c9d59c2672bf9a0ca9b0b988cd56944b79c (patch)
tree9f38d4f7a9f5939128a7a770b51a31658f07ce43 /usr.bin/ssh/auth.c
parentDon't leak swapslots when doing a uvm_km_pgremove and a page is in swap only. (diff)
downloadwireguard-openbsd-f7f33c9d59c2672bf9a0ca9b0b988cd56944b79c.tar.xz
wireguard-openbsd-f7f33c9d59c2672bf9a0ca9b0b988cd56944b79c.zip
remove support for authorized_keys2; it is a relic from the early days
of protocol v.2 support and has been undocumented for many years; ok markus@
Diffstat (limited to 'usr.bin/ssh/auth.c')
-rw-r--r--usr.bin/ssh/auth.c8
1 files changed, 1 insertions, 7 deletions
diff --git a/usr.bin/ssh/auth.c b/usr.bin/ssh/auth.c
index 9330fd09de0..3852843f4b7 100644
--- a/usr.bin/ssh/auth.c
+++ b/usr.bin/ssh/auth.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: auth.c,v 1.91 2010/11/29 23:45:51 djm Exp $ */
+/* $OpenBSD: auth.c,v 1.92 2011/05/11 04:47:06 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
@@ -271,12 +271,6 @@ authorized_keys_file(struct passwd *pw)
}
char *
-authorized_keys_file2(struct passwd *pw)
-{
- return expand_authorized_keys(options.authorized_keys_file2, pw);
-}
-
-char *
authorized_principals_file(struct passwd *pw)
{
if (options.authorized_principals_file == NULL)