mirror of
https://github.com/lwip-tcpip/lwip.git
synced 2025-04-15 23:42:33 +00:00
disabled upap_rauthreq()
This commit is contained in:
parent
7736cdae1c
commit
6ce5c8eb78
@ -1435,6 +1435,7 @@ auth_reset(unit)
|
||||
#endif
|
||||
}
|
||||
|
||||
#if 0 /* UNUSED */
|
||||
/*
|
||||
* check_passwd - Check the user name and passwd against the PAP secrets
|
||||
* file. If requested, also check against the system password database,
|
||||
@ -1455,7 +1456,6 @@ check_passwd(unit, auser, userlen, apasswd, passwdlen, msg)
|
||||
char **msg;
|
||||
{
|
||||
return UPAP_AUTHNAK;
|
||||
#if 0
|
||||
int ret;
|
||||
char *filename;
|
||||
FILE *f;
|
||||
@ -1566,8 +1566,8 @@ check_passwd(unit, auser, userlen, apasswd, passwdlen, msg)
|
||||
BZERO(secret, sizeof(secret));
|
||||
|
||||
return ret;
|
||||
#endif
|
||||
}
|
||||
#endif
|
||||
|
||||
/*
|
||||
* null_login - Check if a username of "" and a password of "" are
|
||||
@ -1663,9 +1663,7 @@ get_pap_passwd(passwd)
|
||||
BZERO(secret, sizeof(secret));
|
||||
return 1;
|
||||
}
|
||||
#endif
|
||||
|
||||
#if 0 /* UNUSED */
|
||||
/*
|
||||
* have_pap_secret - check whether we have a PAP file with any
|
||||
* secrets that we could possibly use for authenticating the peer.
|
||||
@ -1901,6 +1899,7 @@ get_secret(unit, client, server, secret, secret_len, am_server)
|
||||
}
|
||||
|
||||
|
||||
#if 0 /* UNUSED */
|
||||
/*
|
||||
* get_srp_secret - open the SRP secret file and return the secret
|
||||
* for authenticating the given client on the given server.
|
||||
@ -1914,9 +1913,6 @@ get_srp_secret(unit, client, server, secret, am_server)
|
||||
char *secret;
|
||||
int am_server;
|
||||
{
|
||||
/* FIXME: clean that */
|
||||
return 0;
|
||||
#if 0
|
||||
FILE *fp;
|
||||
int ret;
|
||||
char *filename;
|
||||
@ -1951,10 +1947,8 @@ get_srp_secret(unit, client, server, secret, am_server)
|
||||
}
|
||||
|
||||
return 1;
|
||||
#endif
|
||||
}
|
||||
|
||||
#if 0 /* UNUSED */
|
||||
/*
|
||||
* set_allowed_addrs() - set the list of allowed addresses.
|
||||
* Also looks for `--' indicating options to apply for this peer
|
||||
|
@ -116,7 +116,9 @@ upap_state upap[NUM_PPP]; /* UPAP state; one for each unit */
|
||||
|
||||
static void upap_timeout __P((void *));
|
||||
static void upap_reqtimeout __P((void *));
|
||||
#if 0 /* UNUSED */
|
||||
static void upap_rauthreq __P((upap_state *, u_char *, int, int));
|
||||
#endif /* UNUSED */
|
||||
static void upap_rauthack __P((upap_state *, u_char *, int, int));
|
||||
static void upap_rauthnak __P((upap_state *, u_char *, int, int));
|
||||
static void upap_sauthreq __P((upap_state *));
|
||||
@ -353,7 +355,9 @@ upap_input(unit, inpacket, l)
|
||||
*/
|
||||
switch (code) {
|
||||
case UPAP_AUTHREQ:
|
||||
#if 0 /* UNUSED */
|
||||
upap_rauthreq(u, inp, id, len);
|
||||
#endif /* UNUSED */
|
||||
break;
|
||||
|
||||
case UPAP_AUTHACK:
|
||||
@ -369,7 +373,7 @@ upap_input(unit, inpacket, l)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
#if 0 /* UNUSED */
|
||||
/*
|
||||
* upap_rauth - Receive Authenticate.
|
||||
*/
|
||||
@ -468,7 +472,7 @@ upap_rauthreq(u, inp, id, len)
|
||||
if (u->us_reqtimeout > 0)
|
||||
UNTIMEOUT(upap_reqtimeout, u);
|
||||
}
|
||||
|
||||
#endif /* UNUSED */
|
||||
|
||||
/*
|
||||
* upap_rauthack - Receive Authenticate-Ack.
|
||||
|
Loading…
x
Reference in New Issue
Block a user