disabled upap_rauthreq()

This commit is contained in:
Sylvain Rochet 2012-05-22 23:07:28 +02:00
parent 7736cdae1c
commit 6ce5c8eb78
2 changed files with 9 additions and 11 deletions

View File

@ -1435,6 +1435,7 @@ auth_reset(unit)
#endif #endif
} }
#if 0 /* UNUSED */
/* /*
* check_passwd - Check the user name and passwd against the PAP secrets * check_passwd - Check the user name and passwd against the PAP secrets
* file. If requested, also check against the system password database, * file. If requested, also check against the system password database,
@ -1455,7 +1456,6 @@ check_passwd(unit, auser, userlen, apasswd, passwdlen, msg)
char **msg; char **msg;
{ {
return UPAP_AUTHNAK; return UPAP_AUTHNAK;
#if 0
int ret; int ret;
char *filename; char *filename;
FILE *f; FILE *f;
@ -1566,8 +1566,8 @@ check_passwd(unit, auser, userlen, apasswd, passwdlen, msg)
BZERO(secret, sizeof(secret)); BZERO(secret, sizeof(secret));
return ret; return ret;
#endif
} }
#endif
/* /*
* null_login - Check if a username of "" and a password of "" are * null_login - Check if a username of "" and a password of "" are
@ -1663,9 +1663,7 @@ get_pap_passwd(passwd)
BZERO(secret, sizeof(secret)); BZERO(secret, sizeof(secret));
return 1; return 1;
} }
#endif
#if 0 /* UNUSED */
/* /*
* have_pap_secret - check whether we have a PAP file with any * have_pap_secret - check whether we have a PAP file with any
* secrets that we could possibly use for authenticating the peer. * secrets that we could possibly use for authenticating the peer.
@ -1901,6 +1899,7 @@ get_secret(unit, client, server, secret, secret_len, am_server)
} }
#if 0 /* UNUSED */
/* /*
* get_srp_secret - open the SRP secret file and return the secret * get_srp_secret - open the SRP secret file and return the secret
* for authenticating the given client on the given server. * for authenticating the given client on the given server.
@ -1914,9 +1913,6 @@ get_srp_secret(unit, client, server, secret, am_server)
char *secret; char *secret;
int am_server; int am_server;
{ {
/* FIXME: clean that */
return 0;
#if 0
FILE *fp; FILE *fp;
int ret; int ret;
char *filename; char *filename;
@ -1951,10 +1947,8 @@ get_srp_secret(unit, client, server, secret, am_server)
} }
return 1; return 1;
#endif
} }
#if 0 /* UNUSED */
/* /*
* set_allowed_addrs() - set the list of allowed addresses. * set_allowed_addrs() - set the list of allowed addresses.
* Also looks for `--' indicating options to apply for this peer * Also looks for `--' indicating options to apply for this peer

View File

@ -116,7 +116,9 @@ upap_state upap[NUM_PPP]; /* UPAP state; one for each unit */
static void upap_timeout __P((void *)); static void upap_timeout __P((void *));
static void upap_reqtimeout __P((void *)); static void upap_reqtimeout __P((void *));
#if 0 /* UNUSED */
static void upap_rauthreq __P((upap_state *, u_char *, int, int)); static void upap_rauthreq __P((upap_state *, u_char *, int, int));
#endif /* UNUSED */
static void upap_rauthack __P((upap_state *, u_char *, int, int)); static void upap_rauthack __P((upap_state *, u_char *, int, int));
static void upap_rauthnak __P((upap_state *, u_char *, int, int)); static void upap_rauthnak __P((upap_state *, u_char *, int, int));
static void upap_sauthreq __P((upap_state *)); static void upap_sauthreq __P((upap_state *));
@ -353,7 +355,9 @@ upap_input(unit, inpacket, l)
*/ */
switch (code) { switch (code) {
case UPAP_AUTHREQ: case UPAP_AUTHREQ:
#if 0 /* UNUSED */
upap_rauthreq(u, inp, id, len); upap_rauthreq(u, inp, id, len);
#endif /* UNUSED */
break; break;
case UPAP_AUTHACK: case UPAP_AUTHACK:
@ -369,7 +373,7 @@ upap_input(unit, inpacket, l)
} }
} }
#if 0 /* UNUSED */
/* /*
* upap_rauth - Receive Authenticate. * upap_rauth - Receive Authenticate.
*/ */
@ -468,7 +472,7 @@ upap_rauthreq(u, inp, id, len)
if (u->us_reqtimeout > 0) if (u->us_reqtimeout > 0)
UNTIMEOUT(upap_reqtimeout, u); UNTIMEOUT(upap_reqtimeout, u);
} }
#endif /* UNUSED */
/* /*
* upap_rauthack - Receive Authenticate-Ack. * upap_rauthack - Receive Authenticate-Ack.