diff options
author | Andrew Bartlett <abartlet@samba.org> | 2004-01-05 04:10:28 +0000 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2004-01-05 04:10:28 +0000 |
commit | a7f8c26d24b78dc6a0f829cf7b53112e5ddbdeda (patch) | |
tree | 7452bffcb646e5c1fb4c02d43b61645733c5c97e /source3/nsswitch/winbindd_ads.c | |
parent | 72de1cd0f7701cb0b66c4eebc0c103a6b62c1cd7 (diff) | |
download | samba-a7f8c26d24b78dc6a0f829cf7b53112e5ddbdeda.tar.gz samba-a7f8c26d24b78dc6a0f829cf7b53112e5ddbdeda.tar.bz2 samba-a7f8c26d24b78dc6a0f829cf7b53112e5ddbdeda.zip |
Change our Domain controller lookup routines to more carefully seperate
DNS names (realms) from NetBIOS domain names.
Until now, we would experience delays as we broadcast lookups for DNS names
onto the local network segments.
Now if DNS comes back negative, we fall straight back to looking up the
short name.
Andrew Bartlett
(This used to be commit 32397c8b01f1dec7b05140d210bb32f836a80ca6)
Diffstat (limited to 'source3/nsswitch/winbindd_ads.c')
-rw-r--r-- | source3/nsswitch/winbindd_ads.c | 4 |
1 files changed, 1 insertions, 3 deletions
diff --git a/source3/nsswitch/winbindd_ads.c b/source3/nsswitch/winbindd_ads.c index 3a70c1a01e..5e12b0fbb5 100644 --- a/source3/nsswitch/winbindd_ads.c +++ b/source3/nsswitch/winbindd_ads.c @@ -842,7 +842,6 @@ static NTSTATUS trusted_domains(struct winbindd_domain *domain, struct cli_state *cli = NULL; /* i think we only need our forest and downlevel trusted domains */ uint32 flags = DS_DOMAIN_IN_FOREST | DS_DOMAIN_DIRECT_OUTBOUND; - char *contact_domain_name; DEBUG(3,("ads: trusted_domains\n")); @@ -851,8 +850,7 @@ static NTSTATUS trusted_domains(struct winbindd_domain *domain, *names = NULL; *dom_sids = NULL; - contact_domain_name = *domain->alt_name ? domain->alt_name : domain->name; - if ( !NT_STATUS_IS_OK(result = cm_fresh_connection(contact_domain_name, PI_NETLOGON, &cli)) ) { + if ( !NT_STATUS_IS_OK(result = cm_fresh_connection(domain, PI_NETLOGON, &cli)) ) { DEBUG(5, ("trusted_domains: Could not open a connection to %s for PIPE_NETLOGON (%s)\n", domain->name, nt_errstr(result))); return NT_STATUS_UNSUCCESSFUL; |