summaryrefslogtreecommitdiff
path: root/source4/lib/socket
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2006-01-06 00:46:35 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 13:49:46 -0500
commit37bc6b5f813d5c2ace7486a38331748dd86f121d (patch)
tree093a87e57d667777ed19f44c5f9f89125533ebb0 /source4/lib/socket
parentdb04cffbbfe15a52b954960ff0eb40d2a5e4f00d (diff)
downloadsamba-37bc6b5f813d5c2ace7486a38331748dd86f121d.tar.gz
samba-37bc6b5f813d5c2ace7486a38331748dd86f121d.tar.bz2
samba-37bc6b5f813d5c2ace7486a38331748dd86f121d.zip
r12728: Revive testparm.
It needs work to not dump defaults from loadparm.c, but otherwise it works. Andrew Bartlett (This used to be commit 1260fcf46579d708a406625f548add9be9fdc6fb)
Diffstat (limited to 'source4/lib/socket')
-rw-r--r--source4/lib/socket/access.c6
-rw-r--r--source4/lib/socket/socket.h3
2 files changed, 6 insertions, 3 deletions
diff --git a/source4/lib/socket/access.c b/source4/lib/socket/access.c
index a64444d41c..1d0a90f1ee 100644
--- a/source4/lib/socket/access.c
+++ b/source4/lib/socket/access.c
@@ -249,9 +249,9 @@ static BOOL allow_access_internal(TALLOC_CTX *mem_ctx,
}
/* return true if access should be allowed */
-static BOOL allow_access(TALLOC_CTX *mem_ctx,
- const char **deny_list, const char **allow_list,
- const char *cname, const char *caddr)
+BOOL allow_access(TALLOC_CTX *mem_ctx,
+ const char **deny_list, const char **allow_list,
+ const char *cname, const char *caddr)
{
BOOL ret;
char *nc_cname = talloc_strdup(mem_ctx, cname);
diff --git a/source4/lib/socket/socket.h b/source4/lib/socket/socket.h
index a79d698716..165fbb6377 100644
--- a/source4/lib/socket/socket.h
+++ b/source4/lib/socket/socket.h
@@ -136,6 +136,9 @@ int socket_get_my_port(struct socket_context *sock);
int socket_get_fd(struct socket_context *sock);
NTSTATUS socket_dup(struct socket_context *sock);
const struct socket_ops *socket_getops_byname(const char *name, enum socket_type type);
+BOOL allow_access(TALLOC_CTX *mem_ctx,
+ const char **deny_list, const char **allow_list,
+ const char *cname, const char *caddr);
BOOL socket_check_access(struct socket_context *sock,
const char *service_name,
const char **allow_list, const char **deny_list);