mirror of
https://github.com/lwip-tcpip/lwip.git
synced 2025-04-16 17:43:23 +00:00
disabled upap_rauthreq()
This commit is contained in:
parent
7736cdae1c
commit
6ce5c8eb78
@ -1435,6 +1435,7 @@ auth_reset(unit)
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#if 0 /* UNUSED */
|
||||||
/*
|
/*
|
||||||
* check_passwd - Check the user name and passwd against the PAP secrets
|
* check_passwd - Check the user name and passwd against the PAP secrets
|
||||||
* file. If requested, also check against the system password database,
|
* file. If requested, also check against the system password database,
|
||||||
@ -1455,7 +1456,6 @@ check_passwd(unit, auser, userlen, apasswd, passwdlen, msg)
|
|||||||
char **msg;
|
char **msg;
|
||||||
{
|
{
|
||||||
return UPAP_AUTHNAK;
|
return UPAP_AUTHNAK;
|
||||||
#if 0
|
|
||||||
int ret;
|
int ret;
|
||||||
char *filename;
|
char *filename;
|
||||||
FILE *f;
|
FILE *f;
|
||||||
@ -1566,8 +1566,8 @@ check_passwd(unit, auser, userlen, apasswd, passwdlen, msg)
|
|||||||
BZERO(secret, sizeof(secret));
|
BZERO(secret, sizeof(secret));
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
#endif
|
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* null_login - Check if a username of "" and a password of "" are
|
* null_login - Check if a username of "" and a password of "" are
|
||||||
@ -1663,9 +1663,7 @@ get_pap_passwd(passwd)
|
|||||||
BZERO(secret, sizeof(secret));
|
BZERO(secret, sizeof(secret));
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
|
|
||||||
#if 0 /* UNUSED */
|
|
||||||
/*
|
/*
|
||||||
* have_pap_secret - check whether we have a PAP file with any
|
* have_pap_secret - check whether we have a PAP file with any
|
||||||
* secrets that we could possibly use for authenticating the peer.
|
* secrets that we could possibly use for authenticating the peer.
|
||||||
@ -1901,6 +1899,7 @@ get_secret(unit, client, server, secret, secret_len, am_server)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#if 0 /* UNUSED */
|
||||||
/*
|
/*
|
||||||
* get_srp_secret - open the SRP secret file and return the secret
|
* get_srp_secret - open the SRP secret file and return the secret
|
||||||
* for authenticating the given client on the given server.
|
* for authenticating the given client on the given server.
|
||||||
@ -1914,9 +1913,6 @@ get_srp_secret(unit, client, server, secret, am_server)
|
|||||||
char *secret;
|
char *secret;
|
||||||
int am_server;
|
int am_server;
|
||||||
{
|
{
|
||||||
/* FIXME: clean that */
|
|
||||||
return 0;
|
|
||||||
#if 0
|
|
||||||
FILE *fp;
|
FILE *fp;
|
||||||
int ret;
|
int ret;
|
||||||
char *filename;
|
char *filename;
|
||||||
@ -1951,10 +1947,8 @@ get_srp_secret(unit, client, server, secret, am_server)
|
|||||||
}
|
}
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
#endif
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#if 0 /* UNUSED */
|
|
||||||
/*
|
/*
|
||||||
* set_allowed_addrs() - set the list of allowed addresses.
|
* set_allowed_addrs() - set the list of allowed addresses.
|
||||||
* Also looks for `--' indicating options to apply for this peer
|
* Also looks for `--' indicating options to apply for this peer
|
||||||
|
@ -116,7 +116,9 @@ upap_state upap[NUM_PPP]; /* UPAP state; one for each unit */
|
|||||||
|
|
||||||
static void upap_timeout __P((void *));
|
static void upap_timeout __P((void *));
|
||||||
static void upap_reqtimeout __P((void *));
|
static void upap_reqtimeout __P((void *));
|
||||||
|
#if 0 /* UNUSED */
|
||||||
static void upap_rauthreq __P((upap_state *, u_char *, int, int));
|
static void upap_rauthreq __P((upap_state *, u_char *, int, int));
|
||||||
|
#endif /* UNUSED */
|
||||||
static void upap_rauthack __P((upap_state *, u_char *, int, int));
|
static void upap_rauthack __P((upap_state *, u_char *, int, int));
|
||||||
static void upap_rauthnak __P((upap_state *, u_char *, int, int));
|
static void upap_rauthnak __P((upap_state *, u_char *, int, int));
|
||||||
static void upap_sauthreq __P((upap_state *));
|
static void upap_sauthreq __P((upap_state *));
|
||||||
@ -353,7 +355,9 @@ upap_input(unit, inpacket, l)
|
|||||||
*/
|
*/
|
||||||
switch (code) {
|
switch (code) {
|
||||||
case UPAP_AUTHREQ:
|
case UPAP_AUTHREQ:
|
||||||
|
#if 0 /* UNUSED */
|
||||||
upap_rauthreq(u, inp, id, len);
|
upap_rauthreq(u, inp, id, len);
|
||||||
|
#endif /* UNUSED */
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case UPAP_AUTHACK:
|
case UPAP_AUTHACK:
|
||||||
@ -369,7 +373,7 @@ upap_input(unit, inpacket, l)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#if 0 /* UNUSED */
|
||||||
/*
|
/*
|
||||||
* upap_rauth - Receive Authenticate.
|
* upap_rauth - Receive Authenticate.
|
||||||
*/
|
*/
|
||||||
@ -468,7 +472,7 @@ upap_rauthreq(u, inp, id, len)
|
|||||||
if (u->us_reqtimeout > 0)
|
if (u->us_reqtimeout > 0)
|
||||||
UNTIMEOUT(upap_reqtimeout, u);
|
UNTIMEOUT(upap_reqtimeout, u);
|
||||||
}
|
}
|
||||||
|
#endif /* UNUSED */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* upap_rauthack - Receive Authenticate-Ack.
|
* upap_rauthack - Receive Authenticate-Ack.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user