diff --git a/src/interfaces/libpq/fe-secure.c b/src/interfaces/libpq/fe-secure.c
index 545a19ca3c8861425fea0dd0bcd1707da93b7160..07a9f3af14507185c07fbff4f8f6494796b2722d 100644
--- a/src/interfaces/libpq/fe-secure.c
+++ b/src/interfaces/libpq/fe-secure.c
@@ -11,7 +11,7 @@
  *
  *
  * IDENTIFICATION
- *	  $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-secure.c,v 1.14 2002/09/26 04:41:55 momjian Exp $
+ *	  $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-secure.c,v 1.15 2002/09/26 05:37:58 momjian Exp $
  *
  * NOTES
  *	  The client *requires* a valid server certificate.  Since
@@ -123,7 +123,9 @@
 
 #ifdef USE_SSL
 static int	verify_cb(int ok, X509_STORE_CTX *ctx);
+#ifdef NOT_USED
 static int	verify_peer(PGconn *);
+#endif
 static DH  *load_dh_file(int keylength);
 static DH  *load_dh_buffer(const char *, size_t);
 static DH  *tmp_dh_cb(SSL *s, int is_export, int keylength);
@@ -362,6 +364,7 @@ verify_cb(int ok, X509_STORE_CTX *ctx)
 	return ok;
 }
 
+#ifdef NOT_USED
 /*
  *	Verify that common name resolves to peer.
  *	This function is not thread-safe due to gethostbyname().
@@ -448,6 +451,7 @@ verify_peer(PGconn *conn)
 
 	return -1;
 }
+#endif
 
 /*
  *	Load precomputed DH parameters.
@@ -777,7 +781,9 @@ destroy_SSL(void)
 static int
 open_client_SSL(PGconn *conn)
 {
+#ifdef NOT_USED
 	int			r;
+#endif
 
 	if (!(conn->ssl = SSL_new(SSL_context)) ||
 		!SSL_set_app_data(conn->ssl, conn) ||