krb5/Eliminate-preprocessor-disabled-dead-code.patch
2018-07-19 16:43:06 -04:00

2951 lines
97 KiB
Diff

From 904a5789da342857a50de5874fe6aae1f96cbc5c Mon Sep 17 00:00:00 2001
From: Robbie Harwood <rharwood@redhat.com>
Date: Mon, 16 Jul 2018 15:35:15 -0400
Subject: [PATCH] Eliminate preprocessor-disabled dead code
It's been policy for a while now not to create "dead hunks" like
these. A great deal of this code simply doesn't work because it
hasn't been kept up-to-date, and may never have worked. Eliminate
these dead hunks along with the complexity to support them.
(cherry picked from commit 2bc951d3c88b460a16249115cbd51d69c3c57e22)
[rharwood@redhat.com: context skew]
---
src/ccapi/common/win/OldCC/ccutils.c | 6 --
src/ccapi/common/win/OldCC/ccutils.h | 3 -
src/ccapi/common/win/OldCC/opts.cxx | 39 ----------
src/ccapi/common/win/OldCC/secure.hxx | 6 --
src/ccapi/common/win/OldCC/util.h | 3 -
src/ccapi/lib/win/OldCC/client.cxx | 39 ----------
src/ccapi/lib/win/ccapi_os_ipc.cxx | 15 ----
src/ccapi/lib/win/ccs_reply_proc.c | 8 +-
src/ccapi/lib/win/dllmain.cxx | 12 +--
src/ccapi/server/win/ccs_os_server.cpp | 23 +-----
src/ccapi/server/win/ccs_request_proc.c | 12 +--
src/ccapi/server/win/ccs_win_pipe.c | 4 +-
src/ccapi/test/pingtest.c | 6 --
src/clients/ksu/authorization.c | 17 -----
src/config/win-post.in | 8 --
src/include/gssrpc/auth.h | 15 ----
src/include/gssrpc/rename.h | 26 +------
src/include/gssrpc/rpc.h | 25 -------
src/include/gssrpc/types.hin | 7 --
src/include/k5-platform.h | 28 +------
src/kadmin/dbutil/kdb5_util.c | 38 ----------
src/kadmin/server/ipropd_svc.c | 29 -------
src/kdc/kdc_log.c | 8 --
src/kdc/kdc_preauth.c | 13 ----
src/lib/apputils/net-server.c | 27 -------
src/lib/crypto/builtin/des/destest.c | 4 -
src/lib/crypto/builtin/des/t_verify.c | 24 ------
src/lib/crypto/builtin/pbkdf2.c | 38 +---------
src/lib/crypto/builtin/sha1/t_shs.c | 15 ----
src/lib/crypto/crypto_tests/t_cksums.c | 4 -
src/lib/crypto/crypto_tests/t_crc.c | 45 +----------
src/lib/crypto/crypto_tests/t_cts.c | 27 -------
src/lib/crypto/crypto_tests/t_decrypt.c | 4 -
src/lib/crypto/crypto_tests/t_derive.c | 4 -
src/lib/crypto/crypto_tests/t_hmac.c | 11 ---
src/lib/crypto/crypto_tests/t_str2key.c | 4 -
src/lib/crypto/crypto_tests/vectors.c | 5 --
src/lib/crypto/krb/nfold.c | 10 ---
src/lib/gssapi/generic/util_set.c | 15 ----
src/lib/gssapi/krb5/accept_sec_context.c | 11 ---
src/lib/gssapi/krb5/gssapi_krb5.c | 28 -------
src/lib/gssapi/krb5/naming_exts.c | 10 ---
src/lib/gssapi/mechglue/g_initialize.c | 25 -------
src/lib/gssapi/mechglue/g_inq_cred.c | 5 --
src/lib/gssapi/mechglue/mglueP.h | 5 --
src/lib/kadm5/clnt/client_init.c | 48 +-----------
src/lib/kadm5/srv/server_init.c | 11 ---
src/lib/kadm5/unit-test/setkey-test.c | 9 ---
src/lib/krb5/asn.1/ldap_key_seq.c | 3 -
src/lib/krb5/ccache/ccapi/stdcc.c | 58 --------------
src/lib/krb5/ccache/ccapi/winccld.h | 36 ---------
src/lib/krb5/keytab/t_keytab.c | 13 ----
src/lib/krb5/krb/gc_via_tkt.c | 11 ---
src/lib/krb5/krb/init_ctx.c | 7 --
src/lib/krb5/krb/rd_req_dec.c | 31 +-------
src/lib/krb5/krb/t_ser.c | 75 +------------------
src/lib/krb5/krb/unparse.c | 7 --
src/lib/krb5/os/localaddr.c | 22 ------
src/lib/krb5/rcache/rc_io.c | 4 -
src/lib/rpc/auth_gssapi.c | 8 --
src/lib/rpc/svc_auth.c | 3 -
src/lib/rpc/svc_auth_gssapi.c | 4 -
src/lib/win_glue.c | 9 ---
src/plugins/kdb/db2/lockout.c | 4 -
src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c | 3 -
src/plugins/preauth/pkinit/pkinit_clnt.c | 18 -----
src/plugins/preauth/pkinit/pkinit_matching.c | 11 ---
src/plugins/preauth/pkinit/pkinit_srv.c | 18 -----
src/tests/asn.1/krb5_decode_leak.c | 12 ---
src/tests/dejagnu/config/default.exp | 20 -----
src/tests/shlib/t_loader.c | 12 ---
src/tests/threads/t_rcache.c | 6 --
src/util/profile/prof_file.c | 43 -----------
src/util/support/fake-addrinfo.c | 6 --
src/util/support/utf8.c | 22 ------
src/windows/include/loadfuncs-krb5.h | 23 ------
src/windows/kfwlogon/kfwlogon.c | 11 ---
src/windows/leash/Leash.cpp | 4 -
src/windows/leash/Makefile.in | 3 -
src/windows/leash/VSroutines.c | 64 ----------------
src/windows/leashdll/lsh_pwd.c | 11 ---
src/windows/leashdll/lshfunc.c | 32 +-------
src/windows/leashdll/lshutil.cpp | 11 ---
src/windows/lib/cacheapi.h | 15 ----
84 files changed, 23 insertions(+), 1396 deletions(-)
delete mode 100644 src/windows/leash/VSroutines.c
diff --git a/src/ccapi/common/win/OldCC/ccutils.c b/src/ccapi/common/win/OldCC/ccutils.c
index 13f72cbe0..403c67ebe 100644
--- a/src/ccapi/common/win/OldCC/ccutils.c
+++ b/src/ccapi/common/win/OldCC/ccutils.c
@@ -101,9 +101,6 @@ HANDLE createThreadEvent(char* uuid, char* suffix) {
event_name = allocEventName(uuid, suffix);
if (!event_name) status = cci_check_error(ccErrNoMem);
}
-#if 0
- cci_debug_printf("%s event_name:%s", __FUNCTION__, event_name);
-#endif
if (!status) {
hEvent = CreateEvent(psa, FALSE, FALSE, event_name);
if (!hEvent) status = cci_check_error(GetLastError());
@@ -125,9 +122,6 @@ HANDLE openThreadEvent(char* uuid, char* suffix) {
event_name = allocEventName(uuid, suffix);
if (!event_name) status = cci_check_error(ccErrNoMem);
-#if 0
- cci_debug_printf("%s event_name:%s", __FUNCTION__, event_name);
-#endif
if (!status) {
hEvent = OpenEvent(EVENT_MODIFY_STATE, FALSE, event_name);
if (!hEvent) status = cci_check_error(GetLastError());
diff --git a/src/ccapi/common/win/OldCC/ccutils.h b/src/ccapi/common/win/OldCC/ccutils.h
index f91c77702..9da3d87fd 100644
--- a/src/ccapi/common/win/OldCC/ccutils.h
+++ b/src/ccapi/common/win/OldCC/ccutils.h
@@ -29,9 +29,6 @@
#ifdef __cplusplus
extern "C" {
#endif
-#if 0
-}
-#endif
#define REPLY_SUFFIX (char*)"reply"
#define LISTEN_SUFFIX (char*)"listen"
diff --git a/src/ccapi/common/win/OldCC/opts.cxx b/src/ccapi/common/win/OldCC/opts.cxx
index bd5f503ea..c9776638b 100644
--- a/src/ccapi/common/win/OldCC/opts.cxx
+++ b/src/ccapi/common/win/OldCC/opts.cxx
@@ -29,45 +29,6 @@
#include <stdlib.h>
#include <opts.hxx>
-#if 0
-const struct Opts*
-GetOpts(
- )
-{
- bool done = false;
- struct Opts* o;
- if (!(o = new Opts))
- goto cleanup;
- if (!(o->pszString = new char[lstrlenA(opts.pszString) + 1]))
- goto cleanup;
- if (!(o->pszEndpoint = new char[lstrlenA(opts.pszEndpoint) + 1]))
- goto cleanup;
- strcpy(o->pszString, opts.pszString);
- strcpy(o->pszEndpoint, opts.pszEndpoint);
- done = true;
- cleanup:
- if (!done) {
- FreeOpts(o);
- o = 0;
- }
- return o;
-}
-
-void
-FreeOpts(
- struct Opts* o
- )
-{
- if (o) {
- if (o->pszString)
- delete [] o->pszString;
- if (o->pszEndpoint)
- delete [] o->pszEndpoint;
- delete o;
- }
-}
-#endif
-
bool
ParseOpts::IsValidOpt(
char ch
diff --git a/src/ccapi/common/win/OldCC/secure.hxx b/src/ccapi/common/win/OldCC/secure.hxx
index 3714c6f84..1b2e7532d 100644
--- a/src/ccapi/common/win/OldCC/secure.hxx
+++ b/src/ccapi/common/win/OldCC/secure.hxx
@@ -38,12 +38,6 @@ public:
static void Start(SecureClient*& s);
static void Stop(SecureClient*& s);
-#if 0
- static DWORD CheckImpersonation();
- static bool IsImp();
- static DWORD DuplicateImpAsPrimary(HANDLE& hPrimary);
-#endif
-
SecureClient();
~SecureClient();
DWORD Error();
diff --git a/src/ccapi/common/win/OldCC/util.h b/src/ccapi/common/win/OldCC/util.h
index 082f6080b..45e069a71 100644
--- a/src/ccapi/common/win/OldCC/util.h
+++ b/src/ccapi/common/win/OldCC/util.h
@@ -29,9 +29,6 @@
#ifdef __cplusplus
extern "C" {
#endif
-#if 0
-}
-#endif
BOOL isNT();
diff --git a/src/ccapi/lib/win/OldCC/client.cxx b/src/ccapi/lib/win/OldCC/client.cxx
index 4b2d718cc..0f95dfceb 100644
--- a/src/ccapi/lib/win/OldCC/client.cxx
+++ b/src/ccapi/lib/win/OldCC/client.cxx
@@ -118,9 +118,6 @@ DWORD find_server(Init::InitInfo& info, LPSTR endpoint) {
char* szDir = 0;
BOOL bRes = FALSE;
char* cmdline = NULL;
-#if 0
- HANDLE hToken = 0;
-#endif
psa = isNT() ? &sa : 0;
@@ -156,38 +153,6 @@ DWORD find_server(Init::InitInfo& info, LPSTR endpoint) {
}
if (!status) {
-
-#if 0
- if (SecureClient::IsImp()) {
- cci_debug_printf(STARTUP "Token is impersonation token"));
- SecureClient::DuplicateImpAsPrimary(hToken);
- }
- else {
- cci_debug_printf(STARTUP "Token is NOT impersonation token"));
- }
-#endif
-
-#if 0
- if (hToken)
- bRes = CreateProcessAsUser(hToken,
- szExe, // app name
- NULL, // cmd line
- psa, // SA
- psa, // SA
- FALSE,
- CREATE_NEW_PROCESS_GROUP |
- //CREATE_NEW_CONSOLE |
- NORMAL_PRIORITY_CLASS |
- // CREATE_NO_WINDOW |
- DETACHED_PROCESS |
- 0
- ,
- NULL, // environment
- szDir, // current dir
- &si,
- &pi);
- else
-#endif
alloc_cmdline_2_args(szExe, endpoint, "-D", &cmdline);
bRes = CreateProcess( szExe, // app name
NULL, //cmdline, // cmd line is <server endpoint -[DC]>
@@ -223,10 +188,6 @@ DWORD find_server(Init::InitInfo& info, LPSTR endpoint) {
cci_debug_printf(" unexpected error while looking for server: 0D%d / 0U%u / 0X%X", status, status, status);
}
-#if 0
- if (hToken)
- CloseHandle(hToken);
-#endif
if (szDir) free_alloc_p(&szDir);
if (szExe) free_alloc_p(&szExe);
if (hEvent) CloseHandle(hEvent);
diff --git a/src/ccapi/lib/win/ccapi_os_ipc.cxx b/src/ccapi/lib/win/ccapi_os_ipc.cxx
index 35589a54f..1b1f874e9 100644
--- a/src/ccapi/lib/win/ccapi_os_ipc.cxx
+++ b/src/ccapi/lib/win/ccapi_os_ipc.cxx
@@ -132,9 +132,6 @@ extern "C" cc_int32 cci_os_ipc_thread_init (void) {
cci_check_error(err);
}
-#if 0
- cci_debug_printf("%s UUID:<%s>", __FUNCTION__, tspdata_getUUID(ptspdata));
-#endif
// Initialize old CCAPI if necessary:
if (!err) if (!Init:: Initialized()) err = Init:: Initialize( );
if (!err) if (!Client::Initialized()) err = Client::Initialize(0);
@@ -243,10 +240,6 @@ extern "C" cc_int32 cci_os_ipc_msg( cc_int32 in_launch_server,
if (!GetTspData(GetTlsIndex(), &ptspdata)) {return ccErrBadParam;}
uuid = tspdata_getUUID(ptspdata);
lenUUID = 1 + strlen(uuid); /* 1+ includes terminating \0. */
-#if 0
- cci_debug_printf("%s calling remote ccs_rpc_request tsp*:0x%X", __FUNCTION__, ptspdata);
- cci_debug_printf(" rpcmsg:%d; UUID[%d]:<%s> SST:%ld", in_msg, lenUUID, uuid, sst);
-#endif
/* copy ptr into handle; ptr may be 4 or 8 bytes, depending on platform; handle is always 8 */
memcpy(tspdata_handle, &ptspdata, sizeof(ptspdata));
ccs_rpc_request( /* make call with user message: */
@@ -282,11 +275,6 @@ extern "C" cc_int32 cci_os_ipc_msg( cc_int32 in_launch_server,
if (!err && server_died) {
err = cci_check_error (ccErrServerUnavailable);
}
-#if 0
- if (err == BOOTSTRAP_UNKNOWN_SERVICE && !in_launch_server) {
- err = ccNoError; /* If the server is not running just return an empty stream. */
- }
-#endif
if (!err) {
*out_reply_stream = tspdata_getStream(ptspdata);
@@ -365,9 +353,6 @@ cc_int32 ccapi_connect(const struct tspdata* tsp) {
ReleaseMutex(hCCAPIv2Mutex);
if (!status) {
-#if 0
- cci_debug_printf("%s Waiting for replyEvent.", __FUNCTION__);
-#endif
status = WaitForSingleObject(replyEvent, INFINITE);//(SECONDS_TO_WAIT)*1000);
status = cci_check_error(RpcMgmtIsServerListening(CLIENT_REQUEST_RPC_HANDLE));
cci_debug_printf(" Server %sFOUND!", (status) ? "NOT " : "");
diff --git a/src/ccapi/lib/win/ccs_reply_proc.c b/src/ccapi/lib/win/ccs_reply_proc.c
index bf8c7f4f4..b4dbc0d19 100644
--- a/src/ccapi/lib/win/ccs_reply_proc.c
+++ b/src/ccapi/lib/win/ccs_reply_proc.c
@@ -47,9 +47,7 @@ void ccs_rpc_request_reply(
struct tspdata* tsp;
k5_ipc_stream stream;
long status = 0;
-#if 0
- cci_debug_printf("%s! msg#:%d SST:%ld uuid:%s", __FUNCTION__, rpcmsg, srvStartTime, uuid);
-#endif
+
memcpy(&tsp, tspHandle, sizeof(tsp));
if (!status) {
status = krb5int_ipc_stream_new (&stream); /* Create a stream for the request data */
@@ -77,9 +75,7 @@ void ccs_rpc_connect_reply(
HANDLE hEvent = openThreadEvent(uuid, REPLY_SUFFIX);
DWORD* p = (DWORD*)(tspHandle);
-#if 0
- cci_debug_printf("%s! msg#:%d SST:%ld uuid:%s", __FUNCTION__, rpcmsg, srvStartTime, uuid);
-#endif
+
SetEvent(hEvent);
CloseHandle(hEvent);
}
diff --git a/src/ccapi/lib/win/dllmain.cxx b/src/ccapi/lib/win/dllmain.cxx
index 82cacad9c..aa5d00a65 100644
--- a/src/ccapi/lib/win/dllmain.cxx
+++ b/src/ccapi/lib/win/dllmain.cxx
@@ -163,17 +163,7 @@ BOOL WINAPI DllMain(HINSTANCE hinstDLL, // DLL module handle
// using multiple DLLs that use this DLL.
//
WaitForSingleObject( hCCAPIv2Mutex, INFINITE );
-#if 0
- bool process_teardown_workaround = false;
- if (lpvReserved) {
- Init::InitInfo info;
- status = Init::Info(info);
- if (status) break;
- if (!info.isNT) process_teardown_workaround = true;
- }
- if (process_teardown_workaround)
- break;
-#endif
+
// return value is ignored, so we set status for debugging purposes
status = Client::Cleanup();
status = Init::Cleanup();
diff --git a/src/ccapi/server/win/ccs_os_server.cpp b/src/ccapi/server/win/ccs_os_server.cpp
index f84239491..7c5012039 100644
--- a/src/ccapi/server/win/ccs_os_server.cpp
+++ b/src/ccapi/server/win/ccs_os_server.cpp
@@ -245,10 +245,7 @@ cc_int32 ccs_os_server_listen_loop (int argc, const char *argv[]) {
if (worklist_remove(&rpcmsg, &pipe, &buf, &serverStartTime)) {
uuid = ccs_win_pipe_getUuid(pipe);
-#if 0
- cci_debug_printf("%s: processing WorkItem msg:%ld pipeUUID:<%s> pipeHandle:0x%X SST:%ld",
- __FUNCTION__, rpcmsg, uuid, ccs_win_pipe_getHandle(pipe), serverStartTime);
-#endif
+
if (serverStartTime <= getMySST()) {
switch (rpcmsg) {
case CCMSG_CONNECT: {
@@ -472,13 +469,6 @@ void receiveLoop(void* rpcargs) {
} // End receiveLoop
-#if 0
-
- return status;
-}
-#endif
-
-
/* ------------------------------------------------------------------------ */
/* The connection listener thread waits forever for a call to the CCAPI_CLIENT_<UUID>
@@ -647,17 +637,6 @@ RPC_STATUS send_connection_reply(ccs_pipe_t in_pipe) {
return (status);
}
-#if 0
-DWORD alloc_name(LPSTR* pname, LPSTR postfix) {
- DWORD len = strlen(sessID) + 1 + strlen(postfix) + 1;
-
- *pname = (LPSTR)malloc(len);
- if (!*pname) return GetLastError();
- _snprintf(*pname, len, "%s.%s", sessID, postfix);
- return 0;
- }
-#endif
-
RPC_STATUS GetPeerName( RPC_BINDING_HANDLE hClient,
LPTSTR pszClientName,
int iMaxLen) {
diff --git a/src/ccapi/server/win/ccs_request_proc.c b/src/ccapi/server/win/ccs_request_proc.c
index 461c441ed..c0328ea7e 100644
--- a/src/ccapi/server/win/ccs_request_proc.c
+++ b/src/ccapi/server/win/ccs_request_proc.c
@@ -45,9 +45,7 @@ void ccs_rpc_request(
k5_ipc_stream stream;
UINT64* p = (UINT64*)(tspHandle);
WIN_PIPE* pipe = NULL;
-#if 0
- cci_debug_printf("%s rpcmsg:%d; UUID:<%s> SST:<%s>", __FUNCTION__, rpcmsg, pszUUID, serverStartTime);
-#endif
+
status = (rpcmsg != CCMSG_REQUEST) && (rpcmsg != CCMSG_PING);
if (!status) {
@@ -72,9 +70,7 @@ void ccs_rpc_connect(
UINT64* p = (UINT64*)(tspHandle);
WIN_PIPE* pipe = ccs_win_pipe_new(pszUUID, *p);
-#if 0
- cci_debug_printf("%s; rpcmsg:%d; UUID: <%s>", __FUNCTION__, rpcmsg, pszUUID);
-#endif
+
worklist_add( rpcmsg,
pipe,
NULL, /* No payload with connect request */
@@ -89,9 +85,7 @@ CC_UINT32 ccs_authenticate(const CC_CHAR* name) {
PDWORD pvalue = 0;
CC_UINT32 result = 0;
DWORD status = 0;
-#if 0
- cci_debug_printf("%s ( %s )", __FUNCTION__, name);
-#endif
+
hMap = OpenFileMapping(FILE_MAP_ALL_ACCESS, FALSE, (LPSTR)name);
status = !hMap;
diff --git a/src/ccapi/server/win/ccs_win_pipe.c b/src/ccapi/server/win/ccs_win_pipe.c
index d23e4448e..99c667017 100644
--- a/src/ccapi/server/win/ccs_win_pipe.c
+++ b/src/ccapi/server/win/ccs_win_pipe.c
@@ -61,9 +61,7 @@ struct ccs_win_pipe_t* ccs_win_pipe_new (const char* uuid, const UINT64 h) {
out_pipe->uuid = uuidCopy;
out_pipe->clientHandle = h;
}
-#if 0
- cci_debug_printf("0x%X = %s(%s, 0x%X)", out_pipe, __FUNCTION__, uuid, h);
-#endif
+
return out_pipe;
}
diff --git a/src/ccapi/test/pingtest.c b/src/ccapi/test/pingtest.c
index d44839f71..0ffc15e7a 100644
--- a/src/ccapi/test/pingtest.c
+++ b/src/ccapi/test/pingtest.c
@@ -74,12 +74,6 @@ int main( int argc, char *argv[]) {
if ((dwTlsIndex = TlsAlloc()) == TLS_OUT_OF_INDEXES) return FALSE;
-// send_test("krbcc.229026.0.ep");
-
-#if 0
- err = cc_initialize(&context, ccapi_version_7, NULL, NULL);
-#endif
-
if (!err) {
err = cci_os_ipc_thread_init();
}
diff --git a/src/clients/ksu/authorization.c b/src/clients/ksu/authorization.c
index 90aafbd75..891921870 100644
--- a/src/clients/ksu/authorization.c
+++ b/src/clients/ksu/authorization.c
@@ -123,23 +123,6 @@ krb5_error_code krb5_authorization(context, principal, luser,
"In krb5_authorization: if auth files exist -> can access\n");
}
-#if 0
- if (cmd){
- if(k5users_flag){
- return 0; /* if kusers does not exist -> done */
- }else{
- if(retval = k5users_lookup(users_fp,princname,
- cmd,&retbool,out_fcmd)){
- auth_cleanup(users_fp, login_fp, princname);
- return retval;
- }else{
- *ok =retbool;
- return retval;
- }
- }
- }
-#endif
-
/* if either file exists,
first see if the principal is in the login in file,
if it's not there check the k5users file */
diff --git a/src/config/win-post.in b/src/config/win-post.in
index 6535c1ba5..3f43bda77 100644
--- a/src/config/win-post.in
+++ b/src/config/win-post.in
@@ -121,14 +121,6 @@ clean-windows-files:
!else
@if exist $(OUTPRE3)$(DIRNUL) deltree /y $(OUTPRE3)
!endif
-!if 0
- $(RM) .\$(OUTPRE)*.obj .\$(OUTPRE)*.res
- $(RM) .\$(OUTPRE)*.exe .\$(OUTPRE)*.dll
- $(RM) .\$(OUTPRE)*.lib .\$(OUTPRE)*.pdb
- $(RM) .\$(OUTPRE)*.exp .\$(OUTPRE)*.map
- $(RM) .\$(OUTPRE)*.idb .\$(OUTPRE)*.ilk
- $(RM) .\$(OUTPRE)*.manifest
-!endif
# Dependencies
!if exist($(srcdir)/deps)
diff --git a/src/include/gssrpc/auth.h b/src/include/gssrpc/auth.h
index 0f653fcc7..8576c5142 100644
--- a/src/include/gssrpc/auth.h
+++ b/src/include/gssrpc/auth.h
@@ -75,12 +75,6 @@ enum auth_stat {
};
union des_block {
-#if 0 /* XXX nothing uses this, anyway */
- struct {
- uint32_t high;
- uint32_t low;
- } key;
-#endif
char c[8];
};
typedef union des_block des_block;
@@ -207,15 +201,6 @@ extern bool_t xdr_opaque_auth(XDR *, struct opaque_auth *);
#define AUTH_GSSAPI 300001 /* GSS-API style */
#define RPCSEC_GSS 6 /* RPCSEC_GSS */
-#if 0
-/*
- * BACKWARDS COMPATIBILIY! OpenV*Secure 1.0 had AUTH_GSSAPI == 4. We
- * need to accept this value until 1.0 is dead.
- */
-/* This conflicts with AUTH_KERB (Solaris). */
-#define AUTH_GSSAPI_COMPAT 4
-#endif
-
GSSRPC__END_DECLS
#endif /* !defined(GSSRPC_AUTH_H) */
diff --git a/src/include/gssrpc/rename.h b/src/include/gssrpc/rename.h
index 669a0580c..df37e95b7 100644
--- a/src/include/gssrpc/rename.h
+++ b/src/include/gssrpc/rename.h
@@ -50,10 +50,7 @@
* External names in the RPC API not beginning with "_" get renamed
* with the prefix "gssrpc_" via #define, e.g., "foo" -> "gssrpc_foo".
* External names in the RPC API beginning with "_" get textually
- * rewritten, with "#if 0"-disabled #defines mapping them back to
- * their original forms, e.g., "_foo" is rewrittten to "gssrpc__foo"
- * in the original files, with an unused "#define gssrpc__foo _foo"
- * here.
+ * rewritten.
*/
#ifndef GSSRPC_RENAME_H
@@ -72,10 +69,6 @@
#define authdes_create gssrpc_authdes_create
#define xdr_opaque_auth gssrpc_xdr_opaque_auth
-#if 0
-#define gssrpc__null_auth _null_auth
-#endif
-
/* auth_gss.c */
#define auth_debug_gss gssrpc_auth_debug_gss
@@ -181,10 +174,6 @@
#define callrpc gssrpc_callrpc
#define getrpcport gssrpc_getrpcport
-#if 0
-#define gssrpc__rpc_getdtablesize _rpc_getdtablesize
-#endif
-
/* rpc_msg.h */
#define xdr_callmsg gssrpc_xdr_callmsg
@@ -193,10 +182,6 @@
#define xdr_accepted_reply gssrpc_xdr_accepted_reply
#define xdr_rejected_reply gssrpc_xdr_rejected_reply
-#if 0
-#define gssrpc__seterr_reply _seterr_reply
-#endif
-
/* svc.h */
#define svc_register gssrpc_svc_register
@@ -244,15 +229,6 @@
#define svcauth_gss_set_svc_name gssrpc_svcauth_gss_set_svc_name
#define svcauth_gss_get_principal gssrpc_svcauth_gss_get_principal
-#if 0
-#define gssrpc__authenticate _authenticate
-#define gssrpc__svcauth_none _svcauth_none
-#define gssrpc__svcauth_unix _svcauth_unix
-#define gssrpc__svcauth_short _svcauth_short
-#define gssrpc__svcauth_gssapi _svcauth_gssapi
-#define gssrpc__svcauth_gss _svcauth_gss
-#endif
-
/* svc_auth_gss.c */
#define svc_debug_gss gssrpc_svc_debug_gss
diff --git a/src/include/gssrpc/rpc.h b/src/include/gssrpc/rpc.h
index 2d94a7fe9..78727c49d 100644
--- a/src/include/gssrpc/rpc.h
+++ b/src/include/gssrpc/rpc.h
@@ -55,36 +55,11 @@
#include <gssrpc/rpc_msg.h> /* protocol for rpc messages */
#include <gssrpc/auth_unix.h> /* protocol for unix style cred */
#include <gssrpc/auth_gss.h> /* RPCSEC_GSS */
-/*
- * Uncomment-out the next line if you are building the rpc library with
- * DES Authentication (see the README file in the secure_rpc/ directory).
- */
-#if 0
-#include <gssrpc/auth_des.h> protocol for des style cred
-#endif
/* Server side only remote procedure callee */
#include <gssrpc/svc_auth.h> /* service side authenticator */
#include <gssrpc/svc.h> /* service manager and multiplexer */
-/*
- * Punt the rpc/netdb.h everywhere because it just makes things much more
- * difficult. We don't use the *rpcent functions anyway.
- */
-#if 0
-/*
- * COMMENT OUT THE NEXT INCLUDE IF RUNNING ON SUN OS OR ON A VERSION
- * OF UNIX BASED ON NFSSRC. These systems will already have the structures
- * defined by <rpc/netdb.h> included in <netdb.h>.
- */
-/* routines for parsing /etc/rpc */
-#if 0 /* netdb.h already included in rpc/types.h */
-#include <netdb.h>
-#endif
-
-#include <gssrpc/netdb.h> /* structures and routines to parse /etc/rpc */
-#endif
-
/*
* get the local host's IP address without consulting
* name service library functions
diff --git a/src/include/gssrpc/types.hin b/src/include/gssrpc/types.hin
index 022ab4fa9..4c4120c6f 100644
--- a/src/include/gssrpc/types.hin
+++ b/src/include/gssrpc/types.hin
@@ -116,13 +116,6 @@ typedef int32_t rpc_inline_t;
#define mem_alloc(bsize) malloc(bsize)
#define mem_free(ptr, bsize) free(ptr)
-#if 0
-#include <netdb.h> /* XXX This should not have to be here.
- * I got sick of seeing the warnings for MAXHOSTNAMELEN
- * and the two values were different. -- shanzer
- */
-#endif
-
#ifndef INADDR_LOOPBACK
#define INADDR_LOOPBACK (uint32_t)0x7F000001
#endif
diff --git a/src/include/k5-platform.h b/src/include/k5-platform.h
index 763408a09..3368c7193 100644
--- a/src/include/k5-platform.h
+++ b/src/include/k5-platform.h
@@ -526,15 +526,11 @@ typedef struct { int error; unsigned char did_run; } k5_init_t;
# endif
#elif TARGET_OS_MAC
# include <architecture/byte_order.h>
-# if 0 /* This causes compiler warnings. */
-# define SWAP16 OSSwapInt16
-# else
-# define SWAP16 k5_swap16
+# define SWAP16 k5_swap16
static inline unsigned int k5_swap16 (unsigned int x) {
x &= 0xffff;
return (x >> 8) | ((x & 0xff) << 8);
}
-# endif
# define SWAP32 OSSwapInt32
# define SWAP64 OSSwapInt64
#elif defined(HAVE_SYS_BSWAP_H)
@@ -848,25 +844,6 @@ k5_ntohll (uint64_t val)
business. Probably most callers won't check the return status
anyways. */
-#if 0
-static inline void
-set_cloexec_fd(int fd)
-{
-#if defined(F_SETFD)
-# ifdef FD_CLOEXEC
- (void)fcntl(fd, F_SETFD, FD_CLOEXEC);
-# else
- (void)fcntl(fd, F_SETFD, 1);
-# endif
-#endif
-}
-
-static inline void
-set_cloexec_file(FILE *f)
-{
- return set_cloexec_fd(fileno(f));
-}
-#else
/* Macros make the Sun compiler happier, and all variants of this do a
single evaluation of the argument, and fcntl and fileno should
produce reasonable error messages on type mismatches, on any system
@@ -881,9 +858,6 @@ set_cloexec_file(FILE *f)
# define set_cloexec_fd(FD) ((void)(FD))
#endif
#define set_cloexec_file(F) set_cloexec_fd(fileno(F))
-#endif
-
-
/* Since the original ANSI C spec left it undefined whether or
how you could copy around a va_list, C 99 added va_copy.
diff --git a/src/kadmin/dbutil/kdb5_util.c b/src/kadmin/dbutil/kdb5_util.c
index 000b5595c..4ff1cdf38 100644
--- a/src/kadmin/dbutil/kdb5_util.c
+++ b/src/kadmin/dbutil/kdb5_util.c
@@ -358,44 +358,6 @@ int main(argc, argv)
return exit_status;
}
-#if 0
-/*
- * This function is no longer used in kdb5_util (and it would no
- * longer work, anyway).
- */
-void set_dbname(argc, argv)
- int argc;
- char *argv[];
-{
- krb5_error_code retval;
-
- if (argc < 3) {
- com_err(argv[0], 0, _("Too few arguments"));
- com_err(progname, 0, _("Usage: %s dbpathname realmname"), argv[0]);
- exit_status++;
- return;
- }
- if (dbactive) {
- if ((retval = krb5_db_fini(util_context)) && retval!= KRB5_KDB_DBNOTINITED) {
- com_err(progname, retval, _("while closing previous database"));
- exit_status++;
- return;
- }
- if (valid_master_key) {
- krb5_free_keyblock_contents(util_context, &master_keyblock);
- master_keyblock.contents = NULL;
- valid_master_key = 0;
- }
- krb5_free_principal(util_context, master_princ);
- free(mkey_fullname);
- dbactive = FALSE;
- }
-
- (void) set_dbname_help(progname, argv[1]);
- return;
-}
-#endif
-
/*
* open_db_and_mkey: Opens the KDC and policy database, and sets the
* global master_* variables. Sets dbactive to TRUE if the databases
diff --git a/src/kadmin/server/ipropd_svc.c b/src/kadmin/server/ipropd_svc.c
index e6e190136..3228687c7 100644
--- a/src/kadmin/server/ipropd_svc.c
+++ b/src/kadmin/server/ipropd_svc.c
@@ -621,32 +621,3 @@ krb5_iprop_prog_1(struct svc_req *rqstp,
}
}
-
-#if 0
-/*
- * Get the host base service name for the kiprop principal. Returns
- * KADM5_OK on success. Caller must free the storage allocated for
- * host_service_name.
- */
-kadm5_ret_t
-kiprop_get_adm_host_srv_name(krb5_context context,
- const char *realm,
- char **host_service_name)
-{
- kadm5_ret_t ret;
- char *name;
- char *host;
-
- if (ret = kadm5_get_master(context, realm, &host))
- return (ret);
-
- if (asprintf(&name, "%s@%s", KIPROP_SVC_NAME, host) < 0) {
- free(host);
- return (ENOMEM);
- }
- free(host);
- *host_service_name = name;
-
- return (KADM5_OK);
-}
-#endif
diff --git a/src/kdc/kdc_log.c b/src/kdc/kdc_log.c
index 7e8733980..4eec50373 100644
--- a/src/kdc/kdc_log.c
+++ b/src/kdc/kdc_log.c
@@ -94,14 +94,6 @@ log_as_req(krb5_context context,
krb5_db_audit_as_req(context, request,
local_addr->address, remote_addr->address,
client, server, authtime, errcode);
-#if 0
- /* Sun (OpenSolaris) version would probably something like this.
- The client and server names passed can be null, unlike in the
- logging routines used above. Note that a struct in_addr is
- used, but the real address could be an IPv6 address. */
- audit_krb5kdc_as_req(some in_addr *, (in_port_t)remote_addr->port, 0,
- cname, sname, errcode);
-#endif
}
/*
diff --git a/src/kdc/kdc_preauth.c b/src/kdc/kdc_preauth.c
index 86b9e2991..811c16368 100644
--- a/src/kdc/kdc_preauth.c
+++ b/src/kdc/kdc_preauth.c
@@ -712,19 +712,6 @@ const char *missing_required_preauth(krb5_db_entry *client,
krb5_db_entry *server,
krb5_enc_tkt_part *enc_tkt_reply)
{
-#if 0
- /*
- * If this is the pwchange service, and the pre-auth bit is set,
- * allow it even if the HW preauth would normally be required.
- *
- * Sandia national labs wanted this for some strange reason... we
- * leave it disabled normally.
- */
- if (isflagset(server->attributes, KRB5_KDB_PWCHANGE_SERVICE) &&
- isflagset(enc_tkt_reply->flags, TKT_FLG_PRE_AUTH))
- return 0;
-#endif
-
#ifdef DEBUG
krb5_klog_syslog (
LOG_DEBUG,
diff --git a/src/lib/apputils/net-server.c b/src/lib/apputils/net-server.c
index a40da927e..54ee4c5c5 100644
--- a/src/lib/apputils/net-server.c
+++ b/src/lib/apputils/net-server.c
@@ -1060,17 +1060,6 @@ process_packet(verto_ctx *ctx, verto_ev *ev)
return;
}
-#if 0
- if (state->daddr_len > 0) {
- char addrbuf[100];
- if (getnameinfo(ss2sa(&state->daddr), state->daddr_len,
- addrbuf, sizeof(addrbuf),
- 0, 0, NI_NUMERICHOST))
- strlcpy(addrbuf, "?", sizeof(addrbuf));
- com_err(conn->prog, 0, _("pktinfo says local addr is %s"), addrbuf);
- }
-#endif
-
if (state->daddr_len == 0 && conn->type == CONN_UDP) {
/*
* An address couldn't be obtained, so the PKTINFO option probably
@@ -1116,11 +1105,6 @@ kill_lru_tcp_or_rpc_connection(void *handle, verto_ev *newev)
continue;
if (c->type != CONN_TCP && c->type != CONN_RPC)
continue;
-#if 0
- krb5_klog_syslog(LOG_INFO, "fd %d started at %ld",
- verto_get_fd(oldest_ev),
- c->start_time);
-#endif
if (oldest_c == NULL
|| oldest_c->start_time > c->start_time) {
oldest_ev = ev;
@@ -1186,10 +1170,6 @@ accept_tcp_connection(verto_ctx *ctx, verto_ev *ev)
strlcpy(p, tmpbuf, end - p);
}
}
-#if 0
- krb5_klog_syslog(LOG_INFO, "accepted TCP connection on socket %d from %s",
- s, newconn->addrbuf);
-#endif
newconn->addr_s = addr_s;
newconn->addrlen = addrlen;
@@ -1481,9 +1461,6 @@ accept_rpc_connection(verto_ctx *ctx, verto_ev *ev)
newconn = verto_get_private(newev);
set_cloexec_fd(s);
-#if 0
- setnbio(s), setnolinger(s), setkeepalive(s);
-#endif
if (getpeername(s, addr, &addrlen) ||
getnameinfo(addr, addrlen,
@@ -1503,10 +1480,6 @@ accept_rpc_connection(verto_ctx *ctx, verto_ev *ev)
strlcpy(p, tmpbuf, end - p);
}
}
-#if 0
- krb5_klog_syslog(LOG_INFO, _("accepted RPC connection on socket %d "
- "from %s"), s, newconn->addrbuf);
-#endif
newconn->addr_s = addr_s;
newconn->addrlen = addrlen;
diff --git a/src/lib/crypto/builtin/des/destest.c b/src/lib/crypto/builtin/des/destest.c
index dd2f68ec4..0d92b365b 100644
--- a/src/lib/crypto/builtin/des/destest.c
+++ b/src/lib/crypto/builtin/des/destest.c
@@ -67,9 +67,6 @@ main(argc, argv)
char *argv[];
{
char block1[17], block2[17], block3[17];
-#if 0
- mit_des_cblock key, input, output, output2;
-#else
/* Force tests of unaligned accesses. */
union { unsigned char c[8*4+3]; long l; } u;
unsigned char *ioblocks = u.c;
@@ -77,7 +74,6 @@ main(argc, argv)
unsigned char *output = ioblocks+10;
unsigned char *output2 = ioblocks+19;
unsigned char *key = ioblocks+27;
-#endif
mit_des_key_schedule sched;
int num = 0;
int retval;
diff --git a/src/lib/crypto/builtin/des/t_verify.c b/src/lib/crypto/builtin/des/t_verify.c
index 1f3239fed..f4332f5c0 100644
--- a/src/lib/crypto/builtin/des/t_verify.c
+++ b/src/lib/crypto/builtin/des/t_verify.c
@@ -334,30 +334,6 @@ main(argc,argv)
exit(0);
}
-#if 0
-void
-flip(array)
- char *array;
-{
- register int old,new,i,j;
- /* flips the bit order within each byte from 0 lsb to 0 msb */
- for (i = 0; i<=7; i++) {
- old = *array;
- new = 0;
- for (j = 0; j<=7; j++) {
- if (old & 01)
- new = new | 01;
- if (j < 7) {
- old = old >> 1;
- new = new << 1;
- }
- }
- *array = new;
- array++;
- }
-}
-#endif
-
static void
do_encrypt(in,out)
unsigned char *in;
diff --git a/src/lib/crypto/builtin/pbkdf2.c b/src/lib/crypto/builtin/pbkdf2.c
index d36b32e7e..8905f2671 100644
--- a/src/lib/crypto/builtin/pbkdf2.c
+++ b/src/lib/crypto/builtin/pbkdf2.c
@@ -102,11 +102,6 @@ F(char *output, char *u_tmp1, char *u_tmp2,
krb5_data out;
krb5_error_code err;
-#if 0
- printf("F(i=%d, count=%lu, pass=%d:%s)\n", i, count,
- pass->length, pass->data);
-#endif
-
/* Compute U_1. */
store_32_be(i, ibytes);
@@ -114,45 +109,25 @@ F(char *output, char *u_tmp1, char *u_tmp2,
memcpy(u_tmp2 + salt->length, ibytes, 4);
sdata = make_data(u_tmp2, salt->length + 4);
-#if 0
- printd("initial salt", &sdata);
-#endif
-
out = make_data(u_tmp1, hlen);
-#if 0
- printf("F: computing hmac #1 (U_1) with %s\n", pdata.contents);
-#endif
err = hmac(hash, pass, &sdata, &out);
if (err)
return err;
-#if 0
- printd("F: prf return value", &out);
-#endif
+
memcpy(output, u_tmp1, hlen);
/* Compute U_2, .. U_c. */
sdata.length = hlen;
for (j = 2; j <= count; j++) {
-#if 0
- printf("F: computing hmac #%d (U_%d)\n", j, j);
-#endif
memcpy(u_tmp2, u_tmp1, hlen);
err = hmac(hash, pass, &sdata, &out);
if (err)
return err;
-#if 0
- printd("F: prf return value", &out);
-#endif
+
/* And xor them together. */
for (k = 0; k < hlen; k++)
output[k] ^= u_tmp1[k];
-#if 0
- printf("F: xor result:\n");
- for (k = 0; k < hlen; k++)
- printf(" %02x", 0xff & output[k]);
- printf("\n");
-#endif
}
return 0;
}
@@ -185,9 +160,6 @@ pbkdf2(const struct krb5_hash_provider *hash, krb5_keyblock *pass,
/* Step 3. */
for (i = 1; i <= l; i++) {
-#if 0
- int j;
-#endif
krb5_error_code err;
char *out;
@@ -205,12 +177,6 @@ pbkdf2(const struct krb5_hash_provider *hash, krb5_keyblock *pass,
memcpy(output->data + (i-1) * hlen, utmp3,
output->length - (i-1) * hlen);
-#if 0
- printf("after F(%d), @%p:\n", i, output->data);
- for (j = (i-1) * hlen; j < i * hlen; j++)
- printf(" %02x", 0xff & output->data[j]);
- printf ("\n");
-#endif
}
free(utmp1);
free(utmp2);
diff --git a/src/lib/crypto/builtin/sha1/t_shs.c b/src/lib/crypto/builtin/sha1/t_shs.c
index 08157b662..c1d18f557 100644
--- a/src/lib/crypto/builtin/sha1/t_shs.c
+++ b/src/lib/crypto/builtin/sha1/t_shs.c
@@ -59,10 +59,6 @@ main()
{
SHS_INFO shsInfo;
unsigned int i;
-#if 0
- time_t secondCount;
- SHS_BYTE data[ 200 ];
-#endif
/* Make sure we've got the endianness set right. If the machine is
big-endian (up to 64 bits) the following value will be signed,
@@ -120,17 +116,6 @@ main()
puts( "passed, result= 3232AFFA48628A26653B5AAA44541FD90D690603" );
#endif /* NEW_SHS */
-#if 0
- printf( "\nTesting speed for 100MB data... " );
- shsInit( &shsInfo );
- secondCount = time( NULL );
- for( i = 0; i < 500000U; i++ )
- shsUpdate( &shsInfo, data, 200 );
- secondCount = time( NULL ) - secondCount;
- printf( "done. Time = %ld seconds, %ld kbytes/second.\n", \
- secondCount, 100500L / secondCount );
-#endif
-
puts( "\nAll SHS tests passed" );
exit( 0 );
}
diff --git a/src/lib/crypto/crypto_tests/t_cksums.c b/src/lib/crypto/crypto_tests/t_cksums.c
index 4b5406e67..5afc90ed8 100644
--- a/src/lib/crypto/crypto_tests/t_cksums.c
+++ b/src/lib/crypto/crypto_tests/t_cksums.c
@@ -175,15 +175,11 @@ printhex(const char *head, void *data, size_t len)
printf("%s", head);
for (i = 0; i < len; i++) {
-#if 0 /* For convenience when updating test cases. */
- printf("\\x%02X", ((unsigned char*)data)[i]);
-#else
printf("%02X", ((unsigned char*)data)[i]);
if (i % 16 == 15 && i + 1 < len)
printf("\n%*s", (int)strlen(head), "");
else if (i + 1 < len)
printf(" ");
-#endif
}
printf("\n");
}
diff --git a/src/lib/crypto/crypto_tests/t_crc.c b/src/lib/crypto/crypto_tests/t_crc.c
index 1a35cfba5..8cd1d36cb 100644
--- a/src/lib/crypto/crypto_tests/t_crc.c
+++ b/src/lib/crypto/crypto_tests/t_crc.c
@@ -107,41 +107,9 @@ struct crc_trial trials[] = {
#define NTRIALS (sizeof(trials) / sizeof(trials[0]))
-#if 0
-static void
-timetest(unsigned int nblk, unsigned int blksiz)
-{
- char *block;
- unsigned int i;
- struct tms before, after;
- unsigned long cksum;
- block = malloc(blksiz * nblk);
- if (block == NULL)
- exit(1);
- for (i = 0; i < blksiz * nblk; i++)
- block[i] = i % 256;
- times(&before);
- for (i = 0; i < nblk; i++) {
- cksum = 0;
- mit_crc32(block + i * blksiz, blksiz, &cksum);
- }
-
- times(&after);
- printf("shift-8 implementation, %d blocks of %d bytes:\n",
- nblk, blksiz);
- printf("\tu=%ld s=%ld cu=%ld cs=%ld\n",
- (long)(after.tms_utime - before.tms_utime),
- (long)(after.tms_stime - before.tms_stime),
- (long)(after.tms_cutime - before.tms_cutime),
- (long)(after.tms_cstime - before.tms_cstime));
-
- free(block);
-}
-#endif
-
-static void
-verify(void)
+int
+main(void)
{
unsigned int i;
struct crc_trial trial;
@@ -176,14 +144,5 @@ verify(void)
(trial.sum == cksum) ? "OK" : "***BAD***",
typestr, trial.data, cksum);
}
-}
-
-int
-main(void)
-{
-#if 0
- timetest(64*1024, 1024);
-#endif
- verify();
exit(0);
}
diff --git a/src/lib/crypto/crypto_tests/t_cts.c b/src/lib/crypto/crypto_tests/t_cts.c
index 2b022b4ac..fe505169f 100644
--- a/src/lib/crypto/crypto_tests/t_cts.c
+++ b/src/lib/crypto/crypto_tests/t_cts.c
@@ -44,37 +44,10 @@
const char *whoami;
-#if 0
-static void printhex (size_t len, const char *p)
-{
- while (len--)
- printf ("%02x", 0xff & *p++);
-}
-
-static void printstringhex (const char *p) { printhex (strlen (p), p); }
-
-static void printdata (krb5_data *d) { printhex (d->length, d->data); }
-
-static void printkey (krb5_keyblock *k) { printhex (k->length, k->contents); }
-#endif
-
-
#define JURISIC "Juri\305\241i\304\207" /* hi Miro */
#define ESZETT "\303\237"
#define GCLEF "\360\235\204\236" /* outside BMP, woo hoo! */
-#if 0
-static void
-check_error (int r, int line) {
- if (r != 0) {
- fprintf (stderr, "%s:%d: %s\n", __FILE__, line,
- error_message (r));
- exit (1);
- }
-}
-#define CHECK check_error(r, __LINE__)
-#endif
-
static void printd (const char *descr, krb5_data *d) {
unsigned int i, j;
const int r = 16;
diff --git a/src/lib/crypto/crypto_tests/t_decrypt.c b/src/lib/crypto/crypto_tests/t_decrypt.c
index 1dbc4dd1b..4ae0256cc 100644
--- a/src/lib/crypto/crypto_tests/t_decrypt.c
+++ b/src/lib/crypto/crypto_tests/t_decrypt.c
@@ -658,15 +658,11 @@ printhex(const char *head, void *data, size_t len)
printf("%s", head);
for (i = 0; i < len; i++) {
-#if 0 /* For convenience when updating test cases. */
- printf("\\x%02X", ((unsigned char*)data)[i]);
-#else
printf("%02X", ((unsigned char*)data)[i]);
if (i % 16 == 15 && i + 1 < len)
printf("\n%*s", (int)strlen(head), "");
else if (i + 1 < len)
printf(" ");
-#endif
}
printf("\n");
}
diff --git a/src/lib/crypto/crypto_tests/t_derive.c b/src/lib/crypto/crypto_tests/t_derive.c
index 381ae4393..afbf7477f 100644
--- a/src/lib/crypto/crypto_tests/t_derive.c
+++ b/src/lib/crypto/crypto_tests/t_derive.c
@@ -273,15 +273,11 @@ printhex(const char *head, void *data, size_t len)
printf("%s", head);
for (i = 0; i < len; i++) {
-#if 0 /* For convenience when updating test cases. */
- printf("\\x%02X", ((unsigned char*)data)[i]);
-#else
printf("%02X", ((unsigned char*)data)[i]);
if (i % 16 == 15 && i + 1 < len)
printf("\n%*s", (int)strlen(head), "");
else if (i + 1 < len)
printf(" ");
-#endif
}
printf("\n");
}
diff --git a/src/lib/crypto/crypto_tests/t_hmac.c b/src/lib/crypto/crypto_tests/t_hmac.c
index 93d54828f..da359cb49 100644
--- a/src/lib/crypto/crypto_tests/t_hmac.c
+++ b/src/lib/crypto/crypto_tests/t_hmac.c
@@ -46,17 +46,6 @@ static void keyToData (krb5_keyblock *k, krb5_data *d) {
d->data = (char *) k->contents;
}
-#if 0
-static void check_error (int r, int line) {
- if (r != 0) {
- fprintf (stderr, "%s:%d: %s\n", __FILE__, line,
- error_message (r));
- exit (1);
- }
-}
-#define CHECK check_error(r, __LINE__)
-#endif
-
static void printd (const char *descr, krb5_data *d) {
unsigned int i, j;
const int r = 16;
diff --git a/src/lib/crypto/crypto_tests/t_str2key.c b/src/lib/crypto/crypto_tests/t_str2key.c
index 7a7813874..27896e61e 100644
--- a/src/lib/crypto/crypto_tests/t_str2key.c
+++ b/src/lib/crypto/crypto_tests/t_str2key.c
@@ -719,15 +719,11 @@ printhex(const char *head, void *data, size_t len)
printf("%s", head);
for (i = 0; i < len; i++) {
-#if 0 /* For convenience when updating test cases. */
- printf("\\x%02X", ((unsigned char*)data)[i]);
-#else
printf("%02X", ((unsigned char*)data)[i]);
if (i % 16 == 15 && i + 1 < len)
printf("\n%*s", (int)strlen(head), "");
else if (i + 1 < len)
printf(" ");
-#endif
}
printf("\n");
}
diff --git a/src/lib/crypto/crypto_tests/vectors.c b/src/lib/crypto/crypto_tests/vectors.c
index 482d2de20..c1a765732 100644
--- a/src/lib/crypto/crypto_tests/vectors.c
+++ b/src/lib/crypto/crypto_tests/vectors.c
@@ -448,11 +448,6 @@ int main (int argc, char **argv)
{
whoami = argv[0];
test_nfold ();
-#if 0
- test_mit_des_s2k ();
- test_des3_s2k ();
- test_dr_dk ();
-#endif
test_pbkdf2();
return 0;
}
diff --git a/src/lib/crypto/krb/nfold.c b/src/lib/crypto/krb/nfold.c
index ea02fddcf..75bceaecd 100644
--- a/src/lib/crypto/krb/nfold.c
+++ b/src/lib/crypto/krb/nfold.c
@@ -98,19 +98,9 @@ krb5int_nfold(unsigned int inbits, const unsigned char *in, unsigned int outbits
byte += out[i%outbits];
out[i%outbits] = byte&0xff;
-#if 0
- printf("msbit[%d] = %d\tbyte = %02x\tsum = %03x\n", i, msbit,
- (((in[((inbits-1)-(msbit>>3))%inbits]<<8)|
- (in[((inbits)-(msbit>>3))%inbits]))
- >>((msbit&7)+1))&0xff, byte);
-#endif
-
/* keep around the carry bit, if any */
byte >>= 8;
-#if 0
- printf("carry=%d\n", byte);
-#endif
}
/* if there's a carry bit left over, add it back in */
diff --git a/src/lib/gssapi/generic/util_set.c b/src/lib/gssapi/generic/util_set.c
index 8866f525f..432a9ee0d 100644
--- a/src/lib/gssapi/generic/util_set.c
+++ b/src/lib/gssapi/generic/util_set.c
@@ -40,21 +40,6 @@ int g_set_init(g_set_elt *s)
return(0);
}
-#if 0
-int g_set_destroy(g_set_elt *s)
-{
- g_set next;
-
- while (*s) {
- next = (*s)->next;
- free(*s);
- *s = next;
- }
-
- return(0);
-}
-#endif
-
int g_set_entry_add(g_set_elt *s, void *key, void *value)
{
g_set_elt first;
diff --git a/src/lib/gssapi/krb5/accept_sec_context.c b/src/lib/gssapi/krb5/accept_sec_context.c
index 06967aa27..5baa6cecf 100644
--- a/src/lib/gssapi/krb5/accept_sec_context.c
+++ b/src/lib/gssapi/krb5/accept_sec_context.c
@@ -654,17 +654,6 @@ kg_accept_krb5(minor_status, context_handle,
krb5_auth_con_getauthenticator(context, auth_context, &authdat);
-#if 0
- /* make sure the necessary parts of the authdat are present */
-
- if ((authdat->authenticator->subkey == NULL) ||
- (authdat->ticket->enc_part2 == NULL)) {
- code = KG_NO_SUBKEY;
- major_status = GSS_S_FAILURE;
- goto fail;
- }
-#endif
-
if (authdat->checksum == NULL) {
/*
* Some SMB client implementations use handcrafted GSSAPI code that
diff --git a/src/lib/gssapi/krb5/gssapi_krb5.c b/src/lib/gssapi/krb5/gssapi_krb5.c
index 43930dd61..1eaf2bffb 100644
--- a/src/lib/gssapi/krb5/gssapi_krb5.c
+++ b/src/lib/gssapi/krb5/gssapi_krb5.c
@@ -465,28 +465,12 @@ krb5_gss_inquire_cred_by_oid(OM_uint32 *minor_status,
return GSS_S_UNAVAILABLE;
}
-/*
- * gss_set_sec_context_option() methods
- * (Disabled until we have something to populate the array.)
- */
-#if 0
-static struct {
- gss_OID_desc oid;
- OM_uint32 (*func)(OM_uint32 *, gss_ctx_id_t *, const gss_OID, const gss_buffer_t);
-} krb5_gss_set_sec_context_option_ops[] = {
-};
-#endif
-
OM_uint32 KRB5_CALLCONV
krb5_gss_set_sec_context_option (OM_uint32 *minor_status,
gss_ctx_id_t *context_handle,
const gss_OID desired_object,
const gss_buffer_t value)
{
-#if 0
- size_t i;
-#endif
-
if (minor_status == NULL)
return GSS_S_CALL_INACCESSIBLE_WRITE;
@@ -498,18 +482,6 @@ krb5_gss_set_sec_context_option (OM_uint32 *minor_status,
if (desired_object == GSS_C_NO_OID)
return GSS_S_CALL_INACCESSIBLE_READ;
-#if 0
- for (i = 0; i < sizeof(krb5_gss_set_sec_context_option_ops)/
- sizeof(krb5_gss_set_sec_context_option_ops[0]); i++) {
- if (g_OID_prefix_equal(desired_object, &krb5_gss_set_sec_context_option_ops[i].oid)) {
- return (*krb5_gss_set_sec_context_option_ops[i].func)(minor_status,
- context_handle,
- desired_object,
- value);
- }
- }
-#endif
-
*minor_status = EINVAL;
return GSS_S_UNAVAILABLE;
diff --git a/src/lib/gssapi/krb5/naming_exts.c b/src/lib/gssapi/krb5/naming_exts.c
index 5f00efe34..41752d90b 100644
--- a/src/lib/gssapi/krb5/naming_exts.c
+++ b/src/lib/gssapi/krb5/naming_exts.c
@@ -664,13 +664,3 @@ cleanup:
return kg_map_name_error(minor_status, code);
}
-
-#if 0
-OM_uint32
-krb5_gss_display_name_ext(OM_uint32 *minor_status,
- gss_name_t name,
- gss_OID display_as_name_type,
- gss_buffer_t display_name)
-{
-}
-#endif
diff --git a/src/lib/gssapi/mechglue/g_initialize.c b/src/lib/gssapi/mechglue/g_initialize.c
index 9197666e1..0ad11c0b0 100644
--- a/src/lib/gssapi/mechglue/g_initialize.c
+++ b/src/lib/gssapi/mechglue/g_initialize.c
@@ -391,9 +391,6 @@ build_mechSet(void)
g_mechSet.count = count;
}
-#if 0
- g_mechSetTime = fileInfo.st_mtime;
-#endif
k5_mutex_unlock(&g_mechSetLock);
k5_mutex_unlock(&g_mechListLock);
@@ -916,10 +913,6 @@ loadInterMech(gss_mech_info minfo)
if (krb5int_open_plugin(minfo->uLibName, &dl, &errinfo) != 0 ||
errinfo.code != 0) {
-#if 0
- (void) syslog(LOG_INFO, "libgss dlopen(%s): %s\n",
- aMech->uLibName, dlerror());
-#endif
return;
}
@@ -959,12 +952,6 @@ loadInterMech(gss_mech_info minfo)
dl = NULL;
cleanup:
-#if 0
- if (aMech->mech == NULL) {
- (void) syslog(LOG_INFO, "unable to initialize mechanism"
- " library [%s]\n", aMech->uLibName);
- }
-#endif
if (dl != NULL)
krb5int_close_plugin(dl);
k5_clear_error(&errinfo);
@@ -1161,10 +1148,6 @@ gssint_get_mechanism(gss_const_OID oid)
if (krb5int_open_plugin(aMech->uLibName, &dl, &errinfo) != 0 ||
errinfo.code != 0) {
-#if 0
- (void) syslog(LOG_INFO, "libgss dlopen(%s): %s\n",
- aMech->uLibName, dlerror());
-#endif
k5_mutex_unlock(&g_mechListLock);
return ((gss_mechanism)NULL);
}
@@ -1180,10 +1163,6 @@ gssint_get_mechanism(gss_const_OID oid)
}
if (aMech->mech == NULL) {
(void) krb5int_close_plugin(dl);
-#if 0
- (void) syslog(LOG_INFO, "unable to initialize mechanism"
- " library [%s]\n", aMech->uLibName);
-#endif
k5_mutex_unlock(&g_mechListLock);
return ((gss_mechanism)NULL);
}
@@ -1503,10 +1482,6 @@ addConfigEntry(const char *oidStr, const char *oid, const char *sharedLib,
oidBuf.length = strlen(oid);
if (generic_gss_str_to_oid(&minor, &oidBuf, &mechOid)
!= GSS_S_COMPLETE) {
-#if 0
- (void) syslog(LOG_INFO, "invalid mechanism oid"
- " [%s] in configuration file", oid);
-#endif
return;
}
diff --git a/src/lib/gssapi/mechglue/g_inq_cred.c b/src/lib/gssapi/mechglue/g_inq_cred.c
index 911196264..cbe045ab9 100644
--- a/src/lib/gssapi/mechglue/g_inq_cred.c
+++ b/src/lib/gssapi/mechglue/g_inq_cred.c
@@ -198,11 +198,6 @@ gss_inquire_cred_by_mech(minor_status, cred_handle, mech_type, name,
union_cred = (gss_union_cred_t) cred_handle;
mech_cred = gssint_get_mechanism_cred(union_cred, selected_mech);
-#if 0
- if (mech_cred == NULL)
- return (GSS_S_DEFECTIVE_CREDENTIAL);
-#endif
-
public_mech = gssint_get_public_oid(selected_mech);
status = mech->gss_inquire_cred_by_mech(minor_status,
mech_cred, public_mech,
diff --git a/src/lib/gssapi/mechglue/mglueP.h b/src/lib/gssapi/mechglue/mglueP.h
index 2b5145e07..2b00987e6 100644
--- a/src/lib/gssapi/mechglue/mglueP.h
+++ b/src/lib/gssapi/mechglue/mglueP.h
@@ -730,11 +730,6 @@ typedef struct gss_mech_config {
/********************************************************/
/* Internal mechglue routines */
-#if 0
-int gssint_mechglue_init(void);
-void gssint_mechglue_fini(void);
-#endif
-
OM_uint32 gssint_select_mech_type(OM_uint32 *minor, gss_const_OID in_oid,
gss_OID *selected_oid);
gss_OID gssint_get_public_oid(gss_const_OID internal_oid);
diff --git a/src/lib/kadm5/clnt/client_init.c b/src/lib/kadm5/clnt/client_init.c
index 4350a9eb0..6f10db018 100644
--- a/src/lib/kadm5/clnt/client_init.c
+++ b/src/lib/kadm5/clnt/client_init.c
@@ -161,7 +161,6 @@ init_any(krb5_context context, char *client_name, enum init_type init_type,
generic_ret r = { 0, 0 };
initialize_ovk_error_table();
-/* initialize_adb_error_table(); */
initialize_ovku_error_table();
if (! server_handle) {
@@ -612,53 +611,8 @@ setup_gss(kadm5_server_handle_t handle, kadm5_config_params *params_in,
gssstat = gss_acquire_cred(&minor_stat, gss_client, 0,
GSS_C_NULL_OID_SET, GSS_C_INITIATE,
&handle->cred, NULL, NULL);
- if (gssstat != GSS_S_COMPLETE) {
-#if 0 /* for debugging only */
- {
- OM_uint32 maj_status, min_status, message_context = 0;
- gss_buffer_desc status_string;
- do {
- maj_status = gss_display_status(&min_status,
- gssstat,
- GSS_C_GSS_CODE,
- GSS_C_NO_OID,
- &message_context,
- &status_string);
- if (maj_status == GSS_S_COMPLETE) {
- fprintf(stderr, "MAJ: %.*s\n",
- (int) status_string.length,
- (char *)status_string.value);
- gss_release_buffer(&min_status, &status_string);
- } else {
- fprintf(stderr,
- "MAJ? gss_display_status returns 0x%lx?!\n",
- (unsigned long) maj_status);
- message_context = 0;
- }
- } while (message_context != 0);
- do {
- maj_status = gss_display_status(&min_status,
- minor_stat,
- GSS_C_MECH_CODE,
- GSS_C_NO_OID,
- &message_context,
- &status_string);
- if (maj_status == GSS_S_COMPLETE) {
- fprintf(stderr, "MIN: %.*s\n",
- (int) status_string.length,
- (char *)status_string.value);
- gss_release_buffer(&min_status, &status_string);
- } else {
- fprintf(stderr,
- "MIN? gss_display_status returns 0x%lx?!\n",
- (unsigned long) maj_status);
- message_context = 0;
- }
- } while (message_context != 0);
- }
-#endif
+ if (gssstat != GSS_S_COMPLETE)
goto error;
- }
/*
* Do actual creation of RPC auth handle. Implements auth flavor
diff --git a/src/lib/kadm5/srv/server_init.c b/src/lib/kadm5/srv/server_init.c
index b3ae4ff5c..87a732292 100644
--- a/src/lib/kadm5/srv/server_init.c
+++ b/src/lib/kadm5/srv/server_init.c
@@ -186,7 +186,6 @@ kadm5_ret_t kadm5_init(krb5_context context, char *client_name, char *pass,
handle->context = context;
initialize_ovk_error_table();
-/* initialize_adb_error_table(); */
initialize_ovku_error_table();
handle->magic_number = KADM5_SERVER_HANDLE_MAGIC;
@@ -207,16 +206,6 @@ kadm5_ret_t kadm5_init(krb5_context context, char *client_name, char *pass,
*/
memset(&params_local, 0, sizeof(params_local));
-#if 0 /* Now that we look at krb5.conf as well as kdc.conf, we can
- expect to see admin_server being set sometimes. */
-#define ILLEGAL_PARAMS (KADM5_CONFIG_ADMIN_SERVER)
- if (params_in && (params_in->mask & ILLEGAL_PARAMS)) {
- free_db_args(handle);
- free(handle);
- return KADM5_BAD_SERVER_PARAMS;
- }
-#endif
-
ret = kadm5_get_config_params(handle->context, 1, params_in,
&handle->params);
if (ret) {
diff --git a/src/lib/kadm5/unit-test/setkey-test.c b/src/lib/kadm5/unit-test/setkey-test.c
index 0431653bf..fa2392f81 100644
--- a/src/lib/kadm5/unit-test/setkey-test.c
+++ b/src/lib/kadm5/unit-test/setkey-test.c
@@ -35,15 +35,6 @@ krb5_keyblock *tests[] = {
test1, test2, test3, NULL
};
-#if 0
-int keyblocks_equal(krb5_keyblock *kb1, krb5_keyblock *kb2)
-{
- return (kb1->enctype == kb2->enctype &&
- kb1->length == kb2->length &&
- memcmp(kb1->contents, kb2->contents, kb1->length) == 0);
-}
-#endif
-
krb5_data tgtname = {
0,
KRB5_TGS_NAME_SIZE,
diff --git a/src/lib/krb5/asn.1/ldap_key_seq.c b/src/lib/krb5/asn.1/ldap_key_seq.c
index 74569d9e2..f0be2d6d9 100644
--- a/src/lib/krb5/asn.1/ldap_key_seq.c
+++ b/src/lib/krb5/asn.1/ldap_key_seq.c
@@ -96,9 +96,6 @@ no_salt(void *p)
DEFOPTIONALTYPE(key_data_salt_if_present, is_salt_present, no_salt, krbsalt);
DEFCTAGGEDTYPE(key_data_0, 0, key_data_salt_if_present);
DEFCTAGGEDTYPE(key_data_1, 1, encryptionkey);
-#if 0 /* We don't support this field currently. */
-DEFCTAGGEDTYPE(key_data_2, 2, s2kparams),
-#endif
static const struct atype_info *key_data_fields[] = {
&k5_atype_key_data_0, &k5_atype_key_data_1
};
diff --git a/src/lib/krb5/ccache/ccapi/stdcc.c b/src/lib/krb5/ccache/ccapi/stdcc.c
index 0256a0a5d..db69eebb4 100644
--- a/src/lib/krb5/ccache/ccapi/stdcc.c
+++ b/src/lib/krb5/ccache/ccapi/stdcc.c
@@ -1300,14 +1300,6 @@ krb5_error_code KRB5_CALLCONV krb5_stdcc_initialize
return cc_err_xlate(err);
}
-#if 0
- /*
- * Some implementations don't set the principal name
- * correctly, so we force set it to the correct value.
- */
- err = cc_set_principal(gCntrlBlock, ccapi_data->NamedCache,
- CC_CRED_V5, cName);
-#endif
krb5_free_unparsed_name(context, cName);
cache_changed();
@@ -1432,54 +1424,6 @@ krb5_error_code KRB5_CALLCONV krb5_stdcc_next_cred
*
* - try to find a matching credential in the cache
*/
-#if 0
-krb5_error_code KRB5_CALLCONV krb5_stdcc_retrieve
-(krb5_context context,
- krb5_ccache id,
- krb5_flags whichfields,
- krb5_creds *mcreds,
- krb5_creds *creds )
-{
- krb5_error_code retval;
- krb5_cc_cursor curs = NULL;
- krb5_creds *fetchcreds;
-
- if ((retval = stdcc_setup(context, NULL)))
- return retval;
-
- fetchcreds = (krb5_creds *)malloc(sizeof(krb5_creds));
- if (fetchcreds == NULL) return KRB5_CC_NOMEM;
-
- /* we're going to use the iterators */
- krb5_stdcc_start_seq_get(context, id, &curs);
-
- while (!krb5_stdcc_next_cred(context, id, &curs, fetchcreds)) {
- /*
- * look at each credential for a match
- * use this match routine since it takes the
- * whichfields and the API doesn't
- */
- if (stdccCredsMatch(context, fetchcreds,
- mcreds, whichfields)) {
- /* we found it, copy and exit */
- *creds = *fetchcreds;
- krb5_stdcc_end_seq_get(context, id, &curs);
- return 0;
- }
- /* free copy allocated by next_cred */
- krb5_free_cred_contents(context, fetchcreds);
- }
-
- /* no luck, end get and exit */
- krb5_stdcc_end_seq_get(context, id, &curs);
-
- /* we're not using this anymore so we should get rid of it! */
- free(fetchcreds);
-
- return KRB5_CC_NOTFOUND;
-}
-#else
-
krb5_error_code KRB5_CALLCONV
krb5_stdcc_retrieve(context, id, whichfields, mcreds, creds)
krb5_context context;
@@ -1492,8 +1436,6 @@ krb5_stdcc_retrieve(context, id, whichfields, mcreds, creds)
creds);
}
-#endif
-
/*
* end seq
*
diff --git a/src/lib/krb5/ccache/ccapi/winccld.h b/src/lib/krb5/ccache/ccapi/winccld.h
index 85017abbd..df34e3346 100644
--- a/src/lib/krb5/ccache/ccapi/winccld.h
+++ b/src/lib/krb5/ccache/ccapi/winccld.h
@@ -85,24 +85,10 @@ DECL_FUNC_PTR(cc_create);
DECL_FUNC_PTR(cc_open);
DECL_FUNC_PTR(cc_close);
DECL_FUNC_PTR(cc_destroy);
-#if 0 /* Not used */
-#ifdef CC_API_VER2
-DECL_FUNC_PTR(cc_seq_fetch_NCs_begin);
-DECL_FUNC_PTR(cc_seq_fetch_NCs_next);
-DECL_FUNC_PTR(cc_seq_fetch_NCs_end);
-#else
-DECL_FUNC_PTR(cc_seq_fetch_NCs);
-#endif
-DECL_FUNC_PTR(cc_get_NC_info);
-DECL_FUNC_PTR(cc_free_NC_info);
-#endif
DECL_FUNC_PTR(cc_get_name);
DECL_FUNC_PTR(cc_set_principal);
DECL_FUNC_PTR(cc_get_principal);
DECL_FUNC_PTR(cc_get_cred_version);
-#if 0 /* Not used */
-DECL_FUNC_PTR(cc_lock_request);
-#endif
DECL_FUNC_PTR(cc_store);
DECL_FUNC_PTR(cc_remove_cred);
#ifdef CC_API_VER2
@@ -127,18 +113,10 @@ FUNC_INFO krbcc_fi[] = {
MAKE_FUNC_INFO(cc_open),
MAKE_FUNC_INFO(cc_close),
MAKE_FUNC_INFO(cc_destroy),
-#if 0 /* Not used */
- MAKE_FUNC_INFO(cc_seq_fetch_NCs),
- MAKE_FUNC_INFO(cc_get_NC_info),
- MAKE_FUNC_INFO(cc_free_NC_info),
-#endif
MAKE_FUNC_INFO(cc_get_name),
MAKE_FUNC_INFO(cc_set_principal),
MAKE_FUNC_INFO(cc_get_principal),
MAKE_FUNC_INFO(cc_get_cred_version),
-#if 0 /* Not used */
- MAKE_FUNC_INFO(cc_lock_request),
-#endif
MAKE_FUNC_INFO(cc_store),
MAKE_FUNC_INFO(cc_remove_cred),
#ifdef CC_API_VER2
@@ -166,24 +144,10 @@ FUNC_INFO krbcc_fi[] = {
#define cc_open pcc_open
#define cc_close pcc_close
#define cc_destroy pcc_destroy
-#if 0 /* Not used */
-#ifdef CC_API_VER2
-#define cc_seq_fetch_NCs_begin pcc_seq_fetch_NCs_begin
-#define cc_seq_fetch_NCs_next pcc_seq_fetch_NCs_next
-#define cc_seq_fetch_NCs_end pcc_seq_fetch_NCs_end
-#else
-#define cc_seq_fetch_NCs pcc_seq_fetch_NCs
-#endif
-#define cc_get_NC_info pcc_get_NC_info
-#define cc_free_NC_info pcc_free_NC_info
-#endif /* End of Not used */
#define cc_get_name pcc_get_name
#define cc_set_principal pcc_set_principal
#define cc_get_principal pcc_get_principal
#define cc_get_cred_version pcc_get_cred_version
-#if 0 /* Not used */
-#define cc_lock_request pcc_lock_request
-#endif
#define cc_store pcc_store
#define cc_remove_cred pcc_remove_cred
#ifdef CC_API_VER2
diff --git a/src/lib/krb5/keytab/t_keytab.c b/src/lib/krb5/keytab/t_keytab.c
index 80a94eafe..c845596d6 100644
--- a/src/lib/krb5/keytab/t_keytab.c
+++ b/src/lib/krb5/keytab/t_keytab.c
@@ -441,16 +441,3 @@ main(void)
return 0;
}
-
-
-#if 0
-/* remove and add are functions, so that they can return NOWRITE
- if not a writable keytab */
-krb5_error_code KRB5_CALLCONV krb5_kt_remove_entry
-(krb5_context,
- krb5_keytab,
- krb5_keytab_entry * );
-
-
-
-#endif
diff --git a/src/lib/krb5/krb/gc_via_tkt.c b/src/lib/krb5/krb/gc_via_tkt.c
index 5b9bb9573..e7a3b01f8 100644
--- a/src/lib/krb5/krb/gc_via_tkt.c
+++ b/src/lib/krb5/krb/gc_via_tkt.c
@@ -131,17 +131,6 @@ check_reply_server(krb5_context context, krb5_flags kdcoptions,
/* Canonicalization not requested, and not a TGS referral. */
return KRB5_KDCREP_MODIFIED;
}
-#if 0
- /*
- * Is this check needed? find_nxt_kdc() in gc_frm_kdc.c already
- * effectively checks this.
- */
- if (krb5_realm_compare(context, in_cred->client, in_cred->server) &&
- data_eq(*in_cred->server->data[1], *in_cred->client->realm)) {
- /* Attempted to rewrite local TGS. */
- return KRB5_KDCREP_MODIFIED;
- }
-#endif
return 0;
}
diff --git a/src/lib/krb5/krb/init_ctx.c b/src/lib/krb5/krb/init_ctx.c
index 4246c5dd2..c90b2af87 100644
--- a/src/lib/krb5/krb/init_ctx.c
+++ b/src/lib/krb5/krb/init_ctx.c
@@ -232,13 +232,6 @@ krb5_init_context_profile(profile_t profile, krb5_flags flags,
get_integer(ctx, KRB5_CONF_CLOCKSKEW, DEFAULT_CLOCKSKEW, &tmp);
ctx->clockskew = tmp;
-#if 0
- /* Default ticket lifetime is currently not supported */
- profile_get_integer(ctx->profile, KRB5_CONF_LIBDEFAULTS, "tkt_lifetime",
- 0, 10 * 60 * 60, &tmp);
- ctx->tkt_lifetime = tmp;
-#endif
-
/* DCE 1.1 and below only support CKSUMTYPE_RSA_MD4 (2) */
/* DCE add kdc_req_checksum_type = 2 to krb5.conf */
get_integer(ctx, KRB5_CONF_KDC_REQ_CHECKSUM_TYPE, CKSUMTYPE_RSA_MD5,
diff --git a/src/lib/krb5/krb/rd_req_dec.c b/src/lib/krb5/krb/rd_req_dec.c
index 6defbdbf0..4cd429a11 100644
--- a/src/lib/krb5/krb/rd_req_dec.c
+++ b/src/lib/krb5/krb/rd_req_dec.c
@@ -441,30 +441,6 @@ decrypt_ticket(krb5_context context, const krb5_ap_req *req,
#endif /* LEAN_CLIENT */
}
-#if 0
-#include <syslog.h>
-static void
-debug_log_authz_data(const char *which, krb5_authdata **a)
-{
- if (a) {
- syslog(LOG_ERR|LOG_DAEMON, "%s authz data:", which);
- while (*a) {
- syslog(LOG_ERR|LOG_DAEMON, " ad_type:%d length:%d '%.*s'",
- (*a)->ad_type, (*a)->length, (*a)->length,
- (char *) (*a)->contents);
- a++;
- }
- syslog(LOG_ERR|LOG_DAEMON, " [end]");
- } else
- syslog(LOG_ERR|LOG_DAEMON, "no %s authz data", which);
-}
-#else
-static void
-debug_log_authz_data(const char *which, krb5_authdata **a)
-{
-}
-#endif
-
static krb5_error_code
rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context,
const krb5_ap_req *req, krb5_const_principal server,
@@ -759,8 +735,6 @@ rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context,
&((*auth_context)->key))))
goto cleanup;
- debug_log_authz_data("ticket", req->ticket->enc_part2->authorization_data);
-
/*
* If not AP_OPTS_MUTUAL_REQUIRED then and sequence numbers are used
* then the default sequence number is the one's complement of the
@@ -855,10 +829,9 @@ decrypt_authenticator(krb5_context context, const krb5_ap_req *request,
free(scratch.data);}
/* now decode the decrypted stuff */
- if (!(retval = decode_krb5_authenticator(&scratch, &local_auth))) {
+ if (!(retval = decode_krb5_authenticator(&scratch, &local_auth)))
*authpp = local_auth;
- debug_log_authz_data("authenticator", local_auth->authorization_data);
- }
+
clean_scratch();
return retval;
}
diff --git a/src/lib/krb5/krb/t_ser.c b/src/lib/krb5/krb/t_ser.c
index 9cdf5e641..1d6cceaa2 100644
--- a/src/lib/krb5/krb/t_ser.c
+++ b/src/lib/krb5/krb/t_ser.c
@@ -151,10 +151,6 @@ ser_data(int verbose, char *msg, krb5_pointer ctx, krb5_magic dtype)
krb5_encrypt_block *eblock;
eblock = (krb5_encrypt_block *) nctx;
-#if 0
- if (eblock->priv && eblock->priv_size)
- free(eblock->priv);
-#endif
if (eblock->key)
krb5_free_keyblock(ser_ctx, eblock->key);
free(eblock);
@@ -450,60 +446,6 @@ ser_rcache_test(krb5_context kcontext, int verbose)
return(kret);
}
-#if 0
-/*
- * Serialize krb5_encrypt_block.
- */
-static krb5_error_code
-ser_eblock_test(kcontext, verbose)
- krb5_context kcontext;
- int verbose;
-{
- krb5_error_code kret;
- krb5_encrypt_block eblock;
- krb5_keyblock ukeyblock;
- krb5_octet keydata[8];
-
- memset(&eblock, 0, sizeof(krb5_encrypt_block));
- eblock.magic = KV5M_ENCRYPT_BLOCK;
- krb5_use_enctype(kcontext, &eblock, DEFAULT_KDC_ENCTYPE);
- if (!(kret = ser_data(verbose, "> NULL eblock",
- (krb5_pointer) &eblock, KV5M_ENCRYPT_BLOCK))) {
-#if 0
- eblock.priv = (krb5_pointer) stuff;
- eblock.priv_size = 8;
-#endif
- if (!(kret = ser_data(verbose, "> eblock with private data",
- (krb5_pointer) &eblock,
- KV5M_ENCRYPT_BLOCK))) {
- memset(&ukeyblock, 0, sizeof(ukeyblock));
- memset(keydata, 0, sizeof(keydata));
- ukeyblock.enctype = ENCTYPE_DES_CBC_MD5;
- ukeyblock.length = sizeof(keydata);
- ukeyblock.contents = keydata;
- keydata[0] = 0xde;
- keydata[1] = 0xad;
- keydata[2] = 0xbe;
- keydata[3] = 0xef;
- keydata[4] = 0xfe;
- keydata[5] = 0xed;
- keydata[6] = 0xf0;
- keydata[7] = 0xd;
- eblock.key = &ukeyblock;
- if (!(kret = ser_data(verbose, "> eblock with private key",
- (krb5_pointer) &eblock,
- KV5M_ENCRYPT_BLOCK))) {
- if (verbose)
- printf("* eblock test succeeded\n");
- }
- }
- }
- if (kret)
- printf("* eblock test failed\n");
- return(kret);
-}
-#endif
-
/*
* Serialize krb5_principal
*/
@@ -584,7 +526,7 @@ main(int argc, char **argv)
do_ptest = 1;
do_rtest = 1;
do_stest = 1;
- while ((option = getopt(argc, argv, "acekprsxvACEKPRSX")) != -1) {
+ while ((option = getopt(argc, argv, "acekprsxvACKPRSX")) != -1) {
switch (option) {
case 'a':
do_atest = 0;
@@ -619,11 +561,6 @@ main(int argc, char **argv)
case 'C':
do_ctest = 1;
break;
-#if 0
- case 'E':
- do_etest = 1;
- break;
-#endif
case 'K':
do_ktest = 1;
break;
@@ -641,7 +578,7 @@ main(int argc, char **argv)
break;
default:
fprintf(stderr,
- "%s: usage is %s [-acekprsxvACEKPRSX]\n",
+ "%s: usage is %s [-acekprsxvACKPRSX]\n",
argv[0], argv[0]);
exit(1);
break;
@@ -682,14 +619,6 @@ main(int argc, char **argv)
if (kret)
goto fail;
}
-#if 0 /* code to be tested is currently disabled */
- if (do_etest) {
- ch_err = 'e';
- kret = ser_eblock_test(kcontext, verbose);
- if (kret)
- goto fail;
- }
-#endif
if (do_ptest) {
ch_err = 'p';
kret = ser_princ_test(kcontext, verbose);
diff --git a/src/lib/krb5/krb/unparse.c b/src/lib/krb5/krb/unparse.c
index 5bb64d00a..d94aa3cfa 100644
--- a/src/lib/krb5/krb/unparse.c
+++ b/src/lib/krb5/krb/unparse.c
@@ -122,13 +122,6 @@ copy_component_quoting(char *dest, const krb5_data *src, int flags)
*q++ = '\\';
*q++ = 'b';
break;
-#if 0
- /* Heimdal escapes spaces in principal names upon unparsing */
- case ' ':
- *q++ = '\\';
- *q++ = ' ';
- break;
-#endif
case '\0':
*q++ = '\\';
*q++ = '0';
diff --git a/src/lib/krb5/os/localaddr.c b/src/lib/krb5/os/localaddr.c
index 58443f6e3..92d765f4b 100644
--- a/src/lib/krb5/os/localaddr.c
+++ b/src/lib/krb5/os/localaddr.c
@@ -392,20 +392,6 @@ get_linux_ipv6_addrs ()
a6.s6_addr[i] = addrbyte[i];
if (scope != 0)
continue;
-#if 0 /* These symbol names are as used by ifconfig, but none of the
- system header files export them. Dig up the kernel versions
- someday and see if they're exported. */
- switch (scope) {
- case 0:
- default:
- break;
- case IPV6_ADDR_LINKLOCAL:
- case IPV6_ADDR_SITELOCAL:
- case IPV6_ADDR_COMPATv4:
- case IPV6_ADDR_LOOPBACK:
- continue;
- }
-#endif
nw = calloc (1, sizeof (struct linux_ipv6_addr_list));
if (nw == 0)
continue;
@@ -1331,14 +1317,6 @@ krb5_os_localaddr(krb5_context context, krb5_address ***addr)
return get_localaddrs(context, addr, 1);
}
-#if 0 /* not actually used anywhere currently */
-krb5_error_code
-krb5int_local_addresses(krb5_context context, krb5_address ***addr)
-{
- return get_localaddrs(context, addr, 0);
-}
-#endif
-
static krb5_error_code
get_localaddrs (krb5_context context, krb5_address ***addr, int use_profile)
{
diff --git a/src/lib/krb5/rcache/rc_io.c b/src/lib/krb5/rcache/rc_io.c
index b9859fe9f..35fa14a1f 100644
--- a/src/lib/krb5/rcache/rc_io.c
+++ b/src/lib/krb5/rcache/rc_io.c
@@ -117,10 +117,6 @@ krb5_rc_io_mkstemp(krb5_context context, krb5_rc_iostuff *d, char *dir)
return 0;
}
-#if 0
-static krb5_error_code rc_map_errno (int) __attribute__((cold));
-#endif
-
static krb5_error_code
rc_map_errno (krb5_context context, int e, const char *fn,
const char *operation)
diff --git a/src/lib/rpc/auth_gssapi.c b/src/lib/rpc/auth_gssapi.c
index ace0be925..568ec6d87 100644
--- a/src/lib/rpc/auth_gssapi.c
+++ b/src/lib/rpc/auth_gssapi.c
@@ -744,14 +744,6 @@ skip_call:
}
free(AUTH_PRIVATE(auth)->client_handle.value);
-
-#if 0
- PRINTF(("gssapi_destroy: calling GSSAPI_EXIT\n"));
- AUTH_PRIVATE(auth)->established = FALSE;
- callstat = clnt_call(AUTH_PRIVATE(auth)->clnt, AUTH_GSSAPI_EXIT,
- xdr_void, NULL, xdr_void, NULL, timeout);
-#endif
-
free(auth->ah_private);
free(auth);
PRINTF(("gssapi_destroy: done\n"));
diff --git a/src/lib/rpc/svc_auth.c b/src/lib/rpc/svc_auth.c
index 5fedef7d7..e0f80af0b 100644
--- a/src/lib/rpc/svc_auth.c
+++ b/src/lib/rpc/svc_auth.c
@@ -59,9 +59,6 @@ static struct svcauthsw_type {
} svcauthsw[] = {
{AUTH_GSSAPI, gssrpc__svcauth_gssapi}, /* AUTH_GSSAPI */
{AUTH_NONE, gssrpc__svcauth_none}, /* AUTH_NONE */
-#if 0
- {AUTH_GSSAPI_COMPAT, gssrpc__svcauth_gssapi}, /* AUTH_GSSAPI_COMPAT */
-#endif
{AUTH_UNIX, gssrpc__svcauth_unix}, /* AUTH_UNIX */
{AUTH_SHORT, gssrpc__svcauth_short}, /* AUTH_SHORT */
{RPCSEC_GSS, gssrpc__svcauth_gss} /* RPCSEC_GSS */
diff --git a/src/lib/rpc/svc_auth_gssapi.c b/src/lib/rpc/svc_auth_gssapi.c
index f3b3e35b8..384bdc336 100644
--- a/src/lib/rpc/svc_auth_gssapi.c
+++ b/src/lib/rpc/svc_auth_gssapi.c
@@ -869,10 +869,6 @@ done:
L_PRINTF(2, ("destroy_client: client %d destroyed\n", client_data->key));
free(client_data);
-
-#if 0 /*ifdef PURIFY*/
- purify_watch_n(client_data, sizeof(*client_data), "rw");
-#endif
}
static void dump_db(char *msg)
diff --git a/src/lib/win_glue.c b/src/lib/win_glue.c
index 3d6dd7206..e149a1226 100644
--- a/src/lib/win_glue.c
+++ b/src/lib/win_glue.c
@@ -111,10 +111,6 @@ void GetCallingAppVerInfo( char *AppTitle, char *AppVer, char *AppIni,
* hey , I bet we don't have a version resource, let's
* punt
*/
-#if 0
- /* let's see what we have? (1813 means no resource) */
- size = GetLastError(); /* WIN32 only */
-#endif
*VSflag = FALSE;
return;
}
@@ -291,11 +287,6 @@ krb5_error_code krb5_vercheck()
return retval;
#endif
#ifdef VERSERV
-#if 0
- /* Check library ? */
- if (CallVersionServer(APP_TITLE, APP_VER, APP_INI, NULL))
- return KRB5_LIB_EXPIRED;
-#endif
{
#ifdef APP_TITLE
if (CallVersionServer(APP_TITLE, APP_VER, APP_INI, NULL))
diff --git a/src/plugins/kdb/db2/lockout.c b/src/plugins/kdb/db2/lockout.c
index 3a4f41821..30fb554db 100644
--- a/src/plugins/kdb/db2/lockout.c
+++ b/src/plugins/kdb/db2/lockout.c
@@ -157,10 +157,6 @@ krb5_db2_lockout_audit(krb5_context context,
case KRB5KDC_ERR_PREAUTH_FAILED:
case KRB5KRB_AP_ERR_BAD_INTEGRITY:
break;
-#if 0
- case KRB5KDC_ERR_CLIENT_REVOKED:
- break;
-#endif
default:
return 0;
}
diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c
index 28dffe0c2..f6d00be9f 100644
--- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c
+++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c
@@ -777,9 +777,6 @@ krb5_ldap_read_realm_params(krb5_context context, char *lrealm,
ent = ldap_first_entry (ld, result);
if (ent == NULL) {
ldap_get_option (ld, LDAP_OPT_ERROR_NUMBER, (void *) &st);
-#if 0
- st = translate_ldap_error(st, OP_SEARCH);
-#endif
goto cleanup;
}
diff --git a/src/plugins/preauth/pkinit/pkinit_clnt.c b/src/plugins/preauth/pkinit/pkinit_clnt.c
index 77e9e5308..238101762 100644
--- a/src/plugins/preauth/pkinit/pkinit_clnt.c
+++ b/src/plugins/preauth/pkinit/pkinit_clnt.c
@@ -507,24 +507,6 @@ verify_kdc_san(krb5_context context,
for (hostptr = certhosts; *hostptr != NULL; hostptr++)
TRACE_PKINIT_CLIENT_SAN_KDCCERT_DNSNAME(context, *hostptr);
}
-#if 0
- retval = call_san_checking_plugins(context, plgctx, reqctx, idctx,
- princs, hosts, &plugin_decision,
- need_eku_checking);
- pkiDebug("%s: call_san_checking_plugins() returned retval %d\n",
- __FUNCTION__);
- if (retval) {
- retval = KRB5KDC_ERR_KDC_NAME_MISMATCH;
- goto out;
- }
- pkiDebug("%s: call_san_checking_plugins() returned decision %d and "
- "need_eku_checking %d\n",
- __FUNCTION__, plugin_decision, *need_eku_checking);
- if (plugin_decision != NO_DECISION) {
- retval = plugin_decision;
- goto out;
- }
-#endif
pkiDebug("%s: Checking pkinit sans\n", __FUNCTION__);
for (i = 0; princs != NULL && princs[i] != NULL; i++) {
diff --git a/src/plugins/preauth/pkinit/pkinit_matching.c b/src/plugins/preauth/pkinit/pkinit_matching.c
index c2a4c084d..afcce3f8b 100644
--- a/src/plugins/preauth/pkinit/pkinit_matching.c
+++ b/src/plugins/preauth/pkinit/pkinit_matching.c
@@ -572,17 +572,6 @@ check_all_certs(krb5_context context,
*/
for (i = 0, md = matchdata[i]; md != NULL; md = matchdata[++i]) {
pkiDebug("%s: subject: '%s'\n", __FUNCTION__, md->subject_dn);
-#if 0
- pkiDebug("%s: issuer: '%s'\n", __FUNCTION__, md->subject_dn);
- for (j = 0; md->sans != NULL && md->sans[j] != NULL; j++) {
- char *san_string;
- krb5_unparse_name(context, md->sans[j], &san_string);
- pkiDebug("%s: PKINIT san: '%s'\n", __FUNCTION__, san_string);
- krb5_free_unparsed_name(context, san_string);
- }
- for (j = 0; md->upns != NULL && md->upns[j] != NULL; j++)
- pkiDebug("%s: UPN san: '%s'\n", __FUNCTION__, md->upns[j]);
-#endif
certs_checked++;
for (rc = rs->crs; rc != NULL; rc = rc->next) {
comp_match = component_match(context, rc, md);
diff --git a/src/plugins/preauth/pkinit/pkinit_srv.c b/src/plugins/preauth/pkinit/pkinit_srv.c
index 76ad5bf19..27e6ef4d2 100644
--- a/src/plugins/preauth/pkinit/pkinit_srv.c
+++ b/src/plugins/preauth/pkinit/pkinit_srv.c
@@ -204,24 +204,6 @@ verify_client_san(krb5_context context,
goto out;
}
- /* XXX Verify this is consistent with client side XXX */
-#if 0
- retval = call_san_checking_plugins(context, plgctx, reqctx, princs,
- upns, NULL, &plugin_decision, &ignore);
- pkiDebug("%s: call_san_checking_plugins() returned retval %d\n",
- __FUNCTION__);
- if (retval) {
- retval = KRB5KDC_ERR_CLIENT_NAME_MISMATCH;
- goto cleanup;
- }
- pkiDebug("%s: call_san_checking_plugins() returned decision %d\n",
- __FUNCTION__, plugin_decision);
- if (plugin_decision != NO_DECISION) {
- retval = plugin_decision;
- goto out;
- }
-#endif
-
#ifdef DEBUG_SAN_INFO
krb5_unparse_name(context, client, &client_string);
#endif
diff --git a/src/tests/asn.1/krb5_decode_leak.c b/src/tests/asn.1/krb5_decode_leak.c
index 22601c7bf..77fd3ee40 100644
--- a/src/tests/asn.1/krb5_decode_leak.c
+++ b/src/tests/asn.1/krb5_decode_leak.c
@@ -633,18 +633,6 @@ main(int argc, char **argv)
krb5_free_ad_kdcissued);
ktest_empty_ad_kdcissued(&kdci);
}
-#if 0
- /****************************************************************/
- /* encode_krb5_ad_signedpath_data */
- {
- krb5_ad_signedpath_data spd, *tmp;
- ktest_make_sample_ad_signedpath_data(&spd);
- leak_test(spd, encode_krb5_ad_signedpath_data,
- decode_krb5_ad_signedpath_data,
- NULL);
- ktest_empty_ad_signedpath_data(&spd);
- }
-#endif
/****************************************************************/
/* encode_krb5_ad_signedpath */
{
diff --git a/src/tests/dejagnu/config/default.exp b/src/tests/dejagnu/config/default.exp
index 2d1686c56..daf3c7d3b 100644
--- a/src/tests/dejagnu/config/default.exp
+++ b/src/tests/dejagnu/config/default.exp
@@ -32,26 +32,6 @@ set tgt_support_desmd5 0
# request a des-cbc-md4 session key. Since only des-cbc-crc is in the
# KDC's permitted_enctypes list, the TGT will be unusable.
-# KLUDGE for tracking down leaking ptys
-if 0 {
- rename spawn oldspawn
- rename wait oldwait
- proc spawn { args } {
- upvar 1 spawn_id spawn_id
- verbose "spawn: args=$args"
- set pid [eval oldspawn $args]
- verbose "spawn: pid=$pid spawn_id=$spawn_id"
- return $pid
- }
- proc wait { args } {
- upvar 1 spawn_id spawn_id
- verbose "wait: args=$args"
- set ret [eval oldwait $args]
- verbose "wait: $ret"
- return $ret
- }
-}
-
if { [string length $VALGRIND] } {
rename spawn valgrind_aux_spawn
proc spawn { args } {
diff --git a/src/tests/shlib/t_loader.c b/src/tests/shlib/t_loader.c
index 869be800a..29481a7be 100644
--- a/src/tests/shlib/t_loader.c
+++ b/src/tests/shlib/t_loader.c
@@ -186,18 +186,6 @@ int main()
(void) setvbuf(stdout, 0, _IONBF, 0);
-#if 0
- /* Simplest test: Load, then unload out of order. */
- celib = do_open("com_err", "3.0", 0);
- k5lib = do_open("krb5", "3.2", 0);
- gsslib = do_open("gssapi_krb5", "2.2", 0);
- celib2 = do_open("com_err", "3.0", 0);
- do_close(celib);
- do_close(k5lib);
- do_close(celib2);
- do_close(gsslib);
-#endif
-
celib = do_open("com_err", "3.0", 0);
k5lib = do_open("krb5", "3.2", 0);
gsslib = do_open("gssapi_krb5", "2.2", 0);
diff --git a/src/tests/threads/t_rcache.c b/src/tests/threads/t_rcache.c
index d6187f061..9d9b1acd3 100644
--- a/src/tests/threads/t_rcache.c
+++ b/src/tests/threads/t_rcache.c
@@ -106,7 +106,6 @@ static void try_one (struct tinfo *t)
static void *run_a_loop (void *x)
{
struct tinfo t = { 0 };
-/* int chr = "ABCDEFGHIJKLMNOPQRSTUVWXYZ_"[(*(int*)x) % 27]; */
t.now = time(0);
t.idx = *(int *)x;
@@ -117,12 +116,7 @@ static void *run_a_loop (void *x)
t.now = time(0);
try_one(&t);
t.total++;
-#if 0
- printf("%c", chr);
- fflush(stdout);
-#endif
}
-/* printf("thread %u total %u\n", (unsigned) ((int *)x-ip), t.total);*/
*(int*)x = t.total;
return 0;
}
diff --git a/src/util/profile/prof_file.c b/src/util/profile/prof_file.c
index 0f5462aea..64b32dbf1 100644
--- a/src/util/profile/prof_file.c
+++ b/src/util/profile/prof_file.c
@@ -79,39 +79,6 @@ void profile_library_finalizer(void)
static void profile_free_file_data(prf_data_t);
-#if 0
-
-#define scan_shared_trees_locked() \
- { \
- prf_data_t d; \
- k5_mutex_assert_locked(&g_shared_trees_mutex); \
- for (d = g_shared_trees; d; d = d->next) { \
- assert(d->magic == PROF_MAGIC_FILE_DATA); \
- assert((d->flags & PROFILE_FILE_SHARED) != 0); \
- assert(d->filespec[0] != 0); \
- assert(d->fslen <= 1000); /* XXX */ \
- assert(d->filespec[d->fslen] == 0); \
- assert(d->fslen = strlen(d->filespec)); \
- assert(d->root != NULL); \
- } \
- }
-
-#define scan_shared_trees_unlocked() \
- { \
- int r; \
- r = k5_mutex_lock(&g_shared_trees_mutex); \
- assert (r == 0); \
- scan_shared_trees_locked(); \
- k5_mutex_unlock(&g_shared_trees_mutex); \
- }
-
-#else
-
-#define scan_shared_trees_locked() { ; }
-#define scan_shared_trees_unlocked() { ; }
-
-#endif
-
static int rw_access(const_profile_filespec_t filespec)
{
#ifdef HAVE_ACCESS
@@ -209,8 +176,6 @@ errcode_t profile_open_file(const_profile_filespec_t filespec,
if (retval)
return retval;
- scan_shared_trees_unlocked();
-
prf = malloc(sizeof(struct _prf_file_t));
if (!prf)
return ENOMEM;
@@ -244,7 +209,6 @@ errcode_t profile_open_file(const_profile_filespec_t filespec,
}
k5_mutex_lock(&g_shared_trees_mutex);
- scan_shared_trees_locked();
for (data = g_shared_trees; data; data = data->next) {
if (!strcmp(data->filespec, expanded_filename)
/* Check that current uid has read access. */
@@ -264,7 +228,6 @@ errcode_t profile_open_file(const_profile_filespec_t filespec,
}
prf->data = data;
*ret_prof = prf;
- scan_shared_trees_unlocked();
return 0;
}
k5_mutex_unlock(&g_shared_trees_mutex);
@@ -291,11 +254,9 @@ errcode_t profile_open_file(const_profile_filespec_t filespec,
}
k5_mutex_lock(&g_shared_trees_mutex);
- scan_shared_trees_locked();
data->flags |= PROFILE_FILE_SHARED;
data->next = g_shared_trees;
g_shared_trees = data;
- scan_shared_trees_locked();
k5_mutex_unlock(&g_shared_trees_mutex);
*ret_prof = prf;
@@ -537,11 +498,9 @@ void profile_dereference_data(prf_data_t data)
}
void profile_dereference_data_locked(prf_data_t data)
{
- scan_shared_trees_locked();
data->refcount--;
if (data->refcount == 0)
profile_free_file_data(data);
- scan_shared_trees_locked();
}
void profile_lock_global()
@@ -562,7 +521,6 @@ void profile_free_file(prf_file_t prf)
/* Call with mutex locked! */
static void profile_free_file_data(prf_data_t data)
{
- scan_shared_trees_locked();
if (data->flags & PROFILE_FILE_SHARED) {
/* Remove from linked list. */
if (g_shared_trees == data)
@@ -586,7 +544,6 @@ static void profile_free_file_data(prf_data_t data)
data->magic = 0;
k5_mutex_destroy(&data->lock);
free(data);
- scan_shared_trees_locked();
}
errcode_t profile_close_file(prf_file_t prf)
diff --git a/src/util/support/fake-addrinfo.c b/src/util/support/fake-addrinfo.c
index 3ee162e0d..0fb35cf15 100644
--- a/src/util/support/fake-addrinfo.c
+++ b/src/util/support/fake-addrinfo.c
@@ -888,16 +888,10 @@ fake_getaddrinfo (const char *name, const char *serv,
If it's not set, don't accept such names. */
if (flags & AI_NUMERICHOST) {
struct in_addr addr4;
-#if 0
- ret = inet_aton (name, &addr4);
- if (ret)
- return EAI_NONAME;
-#else
addr4.s_addr = inet_addr (name);
if (addr4.s_addr == 0xffffffff || addr4.s_addr == -1)
/* 255.255.255.255 or parse error, both bad */
return EAI_NONAME;
-#endif
ret = fai_add_entry (&res, &addr4, port, &template);
} else {
ret = fai_add_hosts_by_name (name, &template, port, flags,
diff --git a/src/util/support/utf8.c b/src/util/support/utf8.c
index 34e2b6adb..ea8818116 100644
--- a/src/util/support/utf8.c
+++ b/src/util/support/utf8.c
@@ -404,28 +404,6 @@ int krb5int_utf8_isalnum(const char * p)
return KRB5_ALNUM(c);
}
-
-#if 0
-int krb5int_utf8_islower(const char * p)
-{
- unsigned c = * (const unsigned char *) p;
-
- if (!KRB5_ASCII(c))
- return 0;
-
- return KRB5_LOWER(c);
-}
-
-int krb5int_utf8_isupper(const char * p)
-{
- unsigned c = * (const unsigned char *) p;
-
- if (!KRB5_ASCII(c))
- return 0;
-
- return KRB5_UPPER(c);
-}
-#endif
#endif
diff --git a/src/windows/include/loadfuncs-krb5.h b/src/windows/include/loadfuncs-krb5.h
index a90678878..39a3504f6 100644
--- a/src/windows/include/loadfuncs-krb5.h
+++ b/src/windows/include/loadfuncs-krb5.h
@@ -106,29 +106,6 @@ TYPEDEF_FUNC(
krb5_free_ap_rep,
(krb5_context, krb5_ap_rep * )
);
-
-/* Removed around the time of krb5_rc_* change... */
-#if 0
-TYPEDEF_FUNC(
- void,
- KRB5_CALLCONV,
- krb5_free_safe,
- (krb5_context, krb5_safe * )
- );
-TYPEDEF_FUNC(
- void,
- KRB5_CALLCONV,
- krb5_free_priv,
- (krb5_context, krb5_priv * )
- );
-TYPEDEF_FUNC(
- void,
- KRB5_CALLCONV,
- krb5_free_priv_enc_part,
- (krb5_context, krb5_priv_enc_part * )
- );
-#endif
-
TYPEDEF_FUNC(
void,
KRB5_CALLCONV,
diff --git a/src/windows/kfwlogon/kfwlogon.c b/src/windows/kfwlogon/kfwlogon.c
index d851c4685..c388fffcd 100644
--- a/src/windows/kfwlogon/kfwlogon.c
+++ b/src/windows/kfwlogon/kfwlogon.c
@@ -434,9 +434,6 @@ static BOOL
GetSecurityLogonSessionData(HANDLE hToken, PSECURITY_LOGON_SESSION_DATA * ppSessionData)
{
NTSTATUS Status = 0;
-#if 0
- HANDLE TokenHandle;
-#endif
TOKEN_STATISTICS Stats;
DWORD ReqLen;
BOOL Success;
@@ -445,16 +442,8 @@ GetSecurityLogonSessionData(HANDLE hToken, PSECURITY_LOGON_SESSION_DATA * ppSess
return FALSE;
*ppSessionData = NULL;
-#if 0
- Success = OpenProcessToken( HANDLE GetCurrentProcess(), TOKEN_QUERY, &TokenHandle );
- if ( !Success )
- return FALSE;
-#endif
Success = GetTokenInformation( hToken, TokenStatistics, &Stats, sizeof(TOKEN_STATISTICS), &ReqLen );
-#if 0
- CloseHandle( TokenHandle );
-#endif
if ( !Success )
return FALSE;
diff --git a/src/windows/leash/Leash.cpp b/src/windows/leash/Leash.cpp
index f4e749350..cafcda7ce 100644
--- a/src/windows/leash/Leash.cpp
+++ b/src/windows/leash/Leash.cpp
@@ -46,8 +46,6 @@
static char THIS_FILE[] = __FILE__;
#endif
-extern "C" int VScheckVersion(HWND hWnd, HANDLE hThisInstance);
-
TicketInfoWrapper ticketinfo;
HWND CLeashApp::m_hProgram = 0;
@@ -479,8 +477,6 @@ BOOL CLeashApp::InitInstance()
}
}
- VScheckVersion(m_pMainWnd->m_hWnd, AfxGetInstanceHandle());
-
// The one and only window has been initialized, so show and update it.
m_pMainWnd->SetWindowText("MIT Kerberos");
m_pMainWnd->UpdateWindow();
diff --git a/src/windows/leash/Makefile.in b/src/windows/leash/Makefile.in
index 1b124e90f..57f93a418 100644
--- a/src/windows/leash/Makefile.in
+++ b/src/windows/leash/Makefile.in
@@ -61,9 +61,6 @@ OBJS= \
$(OUTPRE)MainFrm.obj \
$(OUTPRE)out2con.obj \
$(OUTPRE)StdAfx.obj \
- $(OUTPRE)AfsProperties.obj \
- $(OUTPRE)VSroutines.obj \
- $(OUTPRE)KrbMiscConfigOpt.obj \
$(OUTPRE)KrbListTickets.obj
RESFILE = $(OUTPRE)Leash.res
diff --git a/src/windows/leash/VSroutines.c b/src/windows/leash/VSroutines.c
deleted file mode 100644
index 63f0b4ae1..000000000
--- a/src/windows/leash/VSroutines.c
+++ /dev/null
@@ -1,64 +0,0 @@
-#include <windows.h>
-#include <winver.h>
-
-#if 0
-//#ifdef USE_VS
-#include <vs.h>
-
-#define ININAME "leash.ini"
-
-int VScheckVersion(HWND hWnd, HANDLE hThisInstance)
-{
- VS_Request vrequest;
- VS_Status status;
- BOOL ok_to_continue;
- HCURSOR hcursor;
- char szFilename[255];
- char szVerQ[90];
- char *cp;
- LPSTR lpAppVersion;
- LPSTR lpAppName;
- LONG FAR *lpLangInfo;
- DWORD hVersionInfoID;
- DWORD size;
- GLOBALHANDLE hVersionInfo;
- LPSTR lpVersionInfo;
- int dumint;
- int retval;
-
- GetModuleFileName(hThisInstance, (LPSTR)szFilename, 255);
- size = GetFileVersionInfoSize((LPSTR) szFilename, &hVersionInfoID);
- hVersionInfo = GlobalAlloc(GHND, size);
- lpVersionInfo = GlobalLock(hVersionInfo);
- retval = GetFileVersionInfo(szFilename, hVersionInfoID, size,
- lpVersionInfo);
- retval = VerQueryValue(lpVersionInfo, "\\VarFileInfo\\Translation",
- (LPSTR FAR *)&lpLangInfo, &dumint);
- wsprintf(szVerQ, "\\StringFileInfo\\%04x%04x\\",
- LOWORD(*lpLangInfo), HIWORD(*lpLangInfo));
- cp = szVerQ + lstrlen(szVerQ);
- lstrcpy(cp, "ProductName");
- retval = VerQueryValue(lpVersionInfo, szVerQ, &lpAppName, &dumint);
- lstrcpy(cp, "ProductVersion");
-
- retval = VerQueryValue(lpVersionInfo, szVerQ, &lpAppVersion, &dumint);
- hcursor = SetCursor(LoadCursor((HINSTANCE)NULL, IDC_WAIT));
- vrequest = VSFormRequest(lpAppName, lpAppVersion, ININAME, NULL, hWnd,
- V_CHECK_AND_LOG);
- if ((ok_to_continue = (ReqStatus(vrequest) != V_E_CANCEL))
- && v_complain((status = VSProcessRequest(vrequest)), ININAME))
- WinVSReportRequest(vrequest, hWnd, "Version Server Status Report");
- if (ok_to_continue && status == V_REQUIRED)
- ok_to_continue = FALSE;
- VSDestroyRequest(vrequest);
- SetCursor(hcursor);
- GlobalUnlock(hVersionInfo);
- GlobalFree(hVersionInfo);
- return(ok_to_continue);
-}
-#else
-int VScheckVersion(HWND hWnd, HANDLE hThisInstance)
-{
- return(1);
-}
-#endif
diff --git a/src/windows/leashdll/lsh_pwd.c b/src/windows/leashdll/lsh_pwd.c
index ac85625a0..7cbe3d7e4 100644
--- a/src/windows/leashdll/lsh_pwd.c
+++ b/src/windows/leashdll/lsh_pwd.c
@@ -1426,11 +1426,6 @@ AuthenticateProc(
CSetDlgItemText(hDialog, IDC_EDIT_PRINCIPAL, principal);
CSetDlgItemText(hDialog, IDC_EDIT_PASSWORD, "");
-#if 0 /* 20030619 - mjv wishes to return to the default character */
- /* echo spaces */
- CSendDlgItemMessage(hDialog, IDC_EDIT_PASSWORD, EM_SETPASSWORDCHAR, 32, 0);
-#endif
-
/* Set Lifetime Slider
* min value = 5
* max value = 1440
@@ -1817,12 +1812,6 @@ NewPasswordProc(
if (hEditCtrl)
pAutoComplete = Leash_pec_create(hEditCtrl);
-#if 0 /* 20030619 - mjv wishes to return to the default character */
- /* echo spaces */
- CSendDlgItemMessage(hDialog, IDC_EDIT_PASSWORD, EM_SETPASSWORDCHAR, 32, 0);
- CSendDlgItemMessage(hDialog, IDC_EDIT_PASSWORD2, EM_SETPASSWORDCHAR, 32, 0);
- CSendDlgItemMessage(hDialog, IDC_EDIT_PASSWORD3, EM_SETPASSWORDCHAR, 32, 0);
-#endif
/* setup text of stuff. */
if (Position.x > 0 && Position.y > 0 &&
diff --git a/src/windows/leashdll/lshfunc.c b/src/windows/leashdll/lshfunc.c
index 8dafb7bed..47337de5d 100644
--- a/src/windows/leashdll/lshfunc.c
+++ b/src/windows/leashdll/lshfunc.c
@@ -279,19 +279,11 @@ Leash_changepwd_v5(
if ( !pkrb5_init_context )
goto cleanup;
- if (rc = pkrb5_init_context(&context)) {
-#if 0
- com_err(argv[0], ret, "initializing kerberos library");
-#endif
+ if (rc = pkrb5_init_context(&context))
goto cleanup;
- }
- if (rc = pkrb5_parse_name(context, principal, &princ)) {
-#if 0
- com_err(argv[0], ret, "parsing client name");
-#endif
+ if (rc = pkrb5_parse_name(context, principal, &princ))
goto cleanup;
- }
pkrb5_get_init_creds_opt_init(&opts);
pkrb5_get_init_creds_opt_set_tkt_life(&opts, 5*60);
@@ -305,29 +297,13 @@ Leash_changepwd_v5(
if (rc = pkrb5_get_init_creds_password(context, &creds, princ, password,
- 0, 0, 0, "kadmin/changepw", &opts)) {
- if (rc == KRB5KRB_AP_ERR_BAD_INTEGRITY) {
-#if 0
- com_err(argv[0], 0,
- "Password incorrect while getting initial ticket");
-#endif
- }
- else {
-#if 0
- com_err(argv[0], ret, "getting initial ticket");
-#endif
- }
+ 0, 0, 0, "kadmin/changepw", &opts))
goto cleanup;
- }
if (rc = pkrb5_change_password(context, &creds, newpassword,
&result_code, &result_code_string,
- &result_string)) {
-#if 0
- com_err(argv[0], ret, "changing password");
-#endif
+ &result_string))
goto cleanup;
- }
if (result_code) {
int len = result_code_string.length +
diff --git a/src/windows/leashdll/lshutil.cpp b/src/windows/leashdll/lshutil.cpp
index 37c0723f3..a90e7e92e 100644
--- a/src/windows/leashdll/lshutil.cpp
+++ b/src/windows/leashdll/lshutil.cpp
@@ -531,17 +531,6 @@ protected:
IAutoCompleteDropDown* pacdd = NULL;
hRes = pac->QueryInterface(IID_IAutoCompleteDropDown, (LPVOID*)&pacdd);
pac->Release();
-
- // @TODO: auto-suggest; other advanced options?
-#if 0
- IAutoComplete2 *pac2;
-
- if (SUCCEEDED(pac->QueryInterface(IID_IAutoComplete2,
- (LPVOID*)&pac2))) {
- pac2->SetOptions(ACO_AUTOSUGGEST);
- pac2->Release();
- }
-#endif
m_acdd = pacdd;
}
}
diff --git a/src/windows/lib/cacheapi.h b/src/windows/lib/cacheapi.h
index c485080c1..b30857810 100644
--- a/src/windows/lib/cacheapi.h
+++ b/src/windows/lib/cacheapi.h
@@ -102,21 +102,6 @@ typedef struct opaque_dll_control_block_type* apiCB;
typedef struct opaque_ccache_pointer_type* ccache_p;
typedef struct opaque_credential_iterator_type* ccache_cit;
-#if 0
-enum _cc_data_type {
- type_ticket = 0, /* 0 for ticket, second_ticket */
- /* Ted's draft spec says these are to be
- "as defined in the Kerberos V5 protocol"
- all I can find are typdefs,
- can't find an enumerated type or #define
- */
- type_address, /* = <"as defined in the Kerberos V5 protocol"> */
- type_authdata, /* = <"as defined in the Kerberos V5 protocol"> */
- type_encryption, /* = <"as defined in the Kerberos V5 protocol"> */
- cc_data_type_max /* for validation */
-};
-#endif
-
typedef struct _cc_data
{
cc_uint32 type; // should be one of _cc_data_type