Commit e10847ed authored by Steve French's avatar Steve French

[CIFS] More removing of unused functions

Signed-off-by: default avatarSteve French <sfrench@us.ibm.com>
parent 2eaf5586
...@@ -252,6 +252,7 @@ MD5Transform(__u32 buf[4], __u32 const in[16]) ...@@ -252,6 +252,7 @@ MD5Transform(__u32 buf[4], __u32 const in[16])
buf[3] += d; buf[3] += d;
} }
#if 0 /* currently unused */
/*********************************************************************** /***********************************************************************
the rfc 2104 version of hmac_md5 initialisation. the rfc 2104 version of hmac_md5 initialisation.
***********************************************************************/ ***********************************************************************/
...@@ -289,6 +290,7 @@ hmac_md5_init_rfc2104(unsigned char *key, int key_len, ...@@ -289,6 +290,7 @@ hmac_md5_init_rfc2104(unsigned char *key, int key_len,
MD5Init(&ctx->ctx); MD5Init(&ctx->ctx);
MD5Update(&ctx->ctx, ctx->k_ipad, 64); MD5Update(&ctx->ctx, ctx->k_ipad, 64);
} }
#endif
/*********************************************************************** /***********************************************************************
the microsoft version of hmac_md5 initialisation. the microsoft version of hmac_md5 initialisation.
...@@ -333,6 +335,7 @@ hmac_md5_update(const unsigned char *text, int text_len, ...@@ -333,6 +335,7 @@ hmac_md5_update(const unsigned char *text, int text_len,
/*********************************************************************** /***********************************************************************
finish off hmac_md5 "inner" buffer and generate outer one. finish off hmac_md5 "inner" buffer and generate outer one.
***********************************************************************/ ***********************************************************************/
#if 0 /* currently unused */
void void
hmac_md5_final(unsigned char *digest, struct HMACMD5Context *ctx) hmac_md5_final(unsigned char *digest, struct HMACMD5Context *ctx)
{ {
...@@ -361,3 +364,4 @@ hmac_md5(unsigned char key[16], unsigned char *data, int data_len, ...@@ -361,3 +364,4 @@ hmac_md5(unsigned char key[16], unsigned char *data, int data_len,
} }
hmac_md5_final(digest, &ctx); hmac_md5_final(digest, &ctx);
} }
#endif
...@@ -364,6 +364,7 @@ E_P24(unsigned char *p21, unsigned char *c8, unsigned char *p24) ...@@ -364,6 +364,7 @@ E_P24(unsigned char *p21, unsigned char *c8, unsigned char *p24)
smbhash(p24 + 16, c8, p21 + 14, 1); smbhash(p24 + 16, c8, p21 + 14, 1);
} }
#if 0 /* currently unsued */
static void static void
D_P16(unsigned char *p14, unsigned char *in, unsigned char *out) D_P16(unsigned char *p14, unsigned char *in, unsigned char *out)
{ {
...@@ -377,7 +378,6 @@ E_old_pw_hash(unsigned char *p14, unsigned char *in, unsigned char *out) ...@@ -377,7 +378,6 @@ E_old_pw_hash(unsigned char *p14, unsigned char *in, unsigned char *out)
smbhash(out, in, p14, 1); smbhash(out, in, p14, 1);
smbhash(out + 8, in + 8, p14 + 7, 1); smbhash(out + 8, in + 8, p14 + 7, 1);
} }
#if 0
/* these routines are currently unneeded, but may be /* these routines are currently unneeded, but may be
needed later */ needed later */
void void
......
...@@ -141,6 +141,7 @@ E_md4hash(const unsigned char *passwd, unsigned char *p16) ...@@ -141,6 +141,7 @@ E_md4hash(const unsigned char *passwd, unsigned char *p16)
memset(wpwd,0,129 * 2); memset(wpwd,0,129 * 2);
} }
#if 0 /* currently unused */
/* Does both the NT and LM owfs of a user's password */ /* Does both the NT and LM owfs of a user's password */
static void static void
nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16]) nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16])
...@@ -168,6 +169,7 @@ nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16]) ...@@ -168,6 +169,7 @@ nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16])
/* clear out local copy of user's password (just being paranoid). */ /* clear out local copy of user's password (just being paranoid). */
memset(passwd, '\0', sizeof (passwd)); memset(passwd, '\0', sizeof (passwd));
} }
#endif
/* Does the NTLMv2 owfs of a user's password */ /* Does the NTLMv2 owfs of a user's password */
#if 0 /* function not needed yet - but will be soon */ #if 0 /* function not needed yet - but will be soon */
...@@ -220,6 +222,7 @@ SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8, ...@@ -220,6 +222,7 @@ SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8,
} }
/* Does the des encryption from the FIRST 8 BYTES of the NT or LM MD4 hash. */ /* Does the des encryption from the FIRST 8 BYTES of the NT or LM MD4 hash. */
#if 0 /* currently unused */
static void static void
NTLMSSPOWFencrypt(unsigned char passwd[8], NTLMSSPOWFencrypt(unsigned char passwd[8],
unsigned char *ntlmchalresp, unsigned char p24[24]) unsigned char *ntlmchalresp, unsigned char p24[24])
...@@ -232,6 +235,7 @@ NTLMSSPOWFencrypt(unsigned char passwd[8], ...@@ -232,6 +235,7 @@ NTLMSSPOWFencrypt(unsigned char passwd[8],
E_P24(p21, ntlmchalresp, p24); E_P24(p21, ntlmchalresp, p24);
} }
#endif
/* Does the NT MD4 hash then des encryption. */ /* Does the NT MD4 hash then des encryption. */
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment