diff options
author | Günther Deschner <gd@samba.org> | 2008-04-04 01:44:16 +0200 |
---|---|---|
committer | Günther Deschner <gd@samba.org> | 2008-04-04 01:44:16 +0200 |
commit | be9b46b2ce3216e72d2c333230bb643a4a8b5938 (patch) | |
tree | bcb813a6b49e573e44e8e7e9fd7403dd596918c2 /source3/rpcclient | |
parent | 29f44dc144c6d4dfe58fd9eb7fb673d3d702d556 (diff) | |
download | samba-be9b46b2ce3216e72d2c333230bb643a4a8b5938.tar.gz samba-be9b46b2ce3216e72d2c333230bb643a4a8b5938.tar.bz2 samba-be9b46b2ce3216e72d2c333230bb643a4a8b5938.zip |
Remove some dead code in rpcclient.
Guenther
(This used to be commit c7ae1a9b53ef578cf4dfdf8e05915817c69896b5)
Diffstat (limited to 'source3/rpcclient')
-rw-r--r-- | source3/rpcclient/cmd_samr.c | 23 |
1 files changed, 0 insertions, 23 deletions
diff --git a/source3/rpcclient/cmd_samr.c b/source3/rpcclient/cmd_samr.c index a003a2e640..e58354d0d3 100644 --- a/source3/rpcclient/cmd_samr.c +++ b/source3/rpcclient/cmd_samr.c @@ -276,7 +276,6 @@ static NTSTATUS cmd_samr_query_user(struct rpc_pipe_client *cli, uint32 info_level = 21; uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; union samr_UserInfo *info = NULL; - fstring server; uint32 user_rid = 0; if ((argc < 2) || (argc > 4)) { @@ -293,9 +292,6 @@ static NTSTATUS cmd_samr_query_user(struct rpc_pipe_client *cli, sscanf(argv[3], "%x", &access_mask); - slprintf(server, sizeof(fstring)-1, "\\\\%s", cli->cli->desthost); - strupper_m(server); - result = rpccli_try_samr_connects(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS, &connect_pol); @@ -468,7 +464,6 @@ static NTSTATUS cmd_samr_query_group(struct rpc_pipe_client *cli, enum samr_GroupInfoEnum info_level = GROUPINFOALL; uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; union samr_GroupInfo *group_info = NULL; - fstring server; uint32 group_rid; if ((argc < 2) || (argc > 4)) { @@ -484,9 +479,6 @@ static NTSTATUS cmd_samr_query_group(struct rpc_pipe_client *cli, if (argc > 3) sscanf(argv[3], "%x", &access_mask); - slprintf(server, sizeof(fstring)-1, "\\\\%s", cli->cli->desthost); - strupper_m(server); - result = rpccli_try_samr_connects(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS, &connect_pol); @@ -542,7 +534,6 @@ static NTSTATUS cmd_samr_query_usergroups(struct rpc_pipe_client *cli, uint32 user_rid; uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; int i; - fstring server; struct samr_RidWithAttributeArray *rid_array = NULL; if ((argc < 2) || (argc > 3)) { @@ -555,9 +546,6 @@ static NTSTATUS cmd_samr_query_usergroups(struct rpc_pipe_client *cli, if (argc > 2) sscanf(argv[2], "%x", &access_mask); - slprintf(server, sizeof(fstring)-1, "\\\\%s", cli->cli->desthost); - strupper_m(server); - result = rpccli_try_samr_connects(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS, &connect_pol); @@ -614,7 +602,6 @@ static NTSTATUS cmd_samr_query_useraliases(struct rpc_pipe_client *cli, size_t num_sids; uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; int i; - fstring server; struct lsa_SidArray sid_array; struct samr_Ids alias_rids; @@ -655,9 +642,6 @@ static NTSTATUS cmd_samr_query_useraliases(struct rpc_pipe_client *cli, sid_array.num_sids = num_sids; - slprintf(server, sizeof(fstring)-1, "\\\\%s", cli->cli->desthost); - strupper_m(server); - result = rpccli_try_samr_connects(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS, &connect_pol); @@ -712,7 +696,6 @@ static NTSTATUS cmd_samr_query_groupmem(struct rpc_pipe_client *cli, uint32 group_rid; uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; int i; - fstring server; unsigned int old_timeout; struct samr_RidTypeArray *rids = NULL; @@ -726,9 +709,6 @@ static NTSTATUS cmd_samr_query_groupmem(struct rpc_pipe_client *cli, if (argc > 2) sscanf(argv[2], "%x", &access_mask); - slprintf(server, sizeof(fstring)-1, "\\\\%s", cli->cli->desthost); - strupper_m(server); - result = rpccli_try_samr_connects(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS, &connect_pol); @@ -2221,7 +2201,6 @@ static NTSTATUS cmd_samr_query_sec_obj(struct rpc_pipe_client *cli, POLICY_HND connect_pol, domain_pol, user_pol, *pol; NTSTATUS result = NT_STATUS_UNSUCCESSFUL; uint32 sec_info = DACL_SECURITY_INFORMATION; - fstring server; uint32 user_rid = 0; TALLOC_CTX *ctx = NULL; SEC_DESC_BUF *sec_desc_buf=NULL; @@ -2247,8 +2226,6 @@ static NTSTATUS cmd_samr_query_sec_obj(struct rpc_pipe_client *cli, sec_info = atoi(argv[2]); } - slprintf(server, sizeof(fstring)-1, "\\\\%s", cli->cli->desthost); - strupper_m(server); result = rpccli_try_samr_connects(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS, &connect_pol); |