disabled upap_rauthreq()

This commit is contained in:
Sylvain Rochet 2012-05-22 23:07:28 +02:00
parent 7736cdae1c
commit 6ce5c8eb78
2 changed files with 9 additions and 11 deletions

View File

@ -1435,6 +1435,7 @@ auth_reset(unit)
#endif
}
#if 0 /* UNUSED */
/*
* check_passwd - Check the user name and passwd against the PAP secrets
* file. If requested, also check against the system password database,
@ -1455,7 +1456,6 @@ check_passwd(unit, auser, userlen, apasswd, passwdlen, msg)
char **msg;
{
return UPAP_AUTHNAK;
#if 0
int ret;
char *filename;
FILE *f;
@ -1566,8 +1566,8 @@ check_passwd(unit, auser, userlen, apasswd, passwdlen, msg)
BZERO(secret, sizeof(secret));
return ret;
#endif
}
#endif
/*
* null_login - Check if a username of "" and a password of "" are
@ -1663,9 +1663,7 @@ get_pap_passwd(passwd)
BZERO(secret, sizeof(secret));
return 1;
}
#endif
#if 0 /* UNUSED */
/*
* have_pap_secret - check whether we have a PAP file with any
* secrets that we could possibly use for authenticating the peer.
@ -1901,6 +1899,7 @@ get_secret(unit, client, server, secret, secret_len, am_server)
}
#if 0 /* UNUSED */
/*
* get_srp_secret - open the SRP secret file and return the secret
* for authenticating the given client on the given server.
@ -1914,9 +1913,6 @@ get_srp_secret(unit, client, server, secret, am_server)
char *secret;
int am_server;
{
/* FIXME: clean that */
return 0;
#if 0
FILE *fp;
int ret;
char *filename;
@ -1951,10 +1947,8 @@ get_srp_secret(unit, client, server, secret, am_server)
}
return 1;
#endif
}
#if 0 /* UNUSED */
/*
* set_allowed_addrs() - set the list of allowed addresses.
* Also looks for `--' indicating options to apply for this peer

View File

@ -116,7 +116,9 @@ upap_state upap[NUM_PPP]; /* UPAP state; one for each unit */
static void upap_timeout __P((void *));
static void upap_reqtimeout __P((void *));
#if 0 /* UNUSED */
static void upap_rauthreq __P((upap_state *, u_char *, int, int));
#endif /* UNUSED */
static void upap_rauthack __P((upap_state *, u_char *, int, int));
static void upap_rauthnak __P((upap_state *, u_char *, int, int));
static void upap_sauthreq __P((upap_state *));
@ -353,7 +355,9 @@ upap_input(unit, inpacket, l)
*/
switch (code) {
case UPAP_AUTHREQ:
#if 0 /* UNUSED */
upap_rauthreq(u, inp, id, len);
#endif /* UNUSED */
break;
case UPAP_AUTHACK:
@ -369,7 +373,7 @@ upap_input(unit, inpacket, l)
}
}
#if 0 /* UNUSED */
/*
* upap_rauth - Receive Authenticate.
*/
@ -468,7 +472,7 @@ upap_rauthreq(u, inp, id, len)
if (u->us_reqtimeout > 0)
UNTIMEOUT(upap_reqtimeout, u);
}
#endif /* UNUSED */
/*
* upap_rauthack - Receive Authenticate-Ack.