}
}
-#if 0
- if (whoisit.sin_port != hm_port && whoisit.sin_port != hm_srv_port &&
- strcasecmp(new_notice.z_class, ZEPHYR_ADMIN_CLASS) != 0 &&
- whoisit.sin_port != srv_addr.sin_port &&
- new_notice.z_kind != CLIENTACK) {
- syslog(LOG_ERR, "bad port %s/%d", inet_ntoa(whoisit.sin_addr),
- ntohs(whoisit.sin_port));
- return;
- }
-#endif
-
message_notices.val++;
dispatch(&new_notice, authentic, &whoisit, from_server);
return;
}
who2 = *who;
-#if 0
- if (0 && from_server) {
- /* incorporate server_dispatch here */
- }
-#endif
+
notice_class = make_string(notice->z_class,1);
if (from_server) {
#endif
}
-#if 0
-void ZLogKey(char *label, krb5_keyblock *keyblock) {
- char *p, *buf;
- unsigned char *k;
- int i;
- buf = malloc(5 *Z_keylen(keyblock)+1);
-
- k=Z_keydata(keyblock);
- for (i=0,p=buf; i < Z_keylen(keyblock); i++,p+=strlen(p))
- sprintf(p, " 0x%02x", k[i]);
- syslog(LOG_ERR, "key %s is type %d, %d bytes, %s", label, Z_enctype(keyblock), Z_keylen(keyblock), buf);
- free(buf);
-}
-#endif
-
void
ZSetSession(krb5_keyblock *keyblock) {
-#if 1
krb5_error_code result;
if (__Zephyr_keyblock) {
if (result) /*XXX we're out of memory? */
;
-#else
- memcpy(__Zephyr_session, Z_keydata(keyblock), sizeof(C_Block));
-#endif
}
#endif
#ifdef HAVE_KRB4