diff options
author | Andrew Bartlett <abartlet@samba.org> | 2006-01-06 00:46:35 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 13:49:46 -0500 |
commit | 37bc6b5f813d5c2ace7486a38331748dd86f121d (patch) | |
tree | 093a87e57d667777ed19f44c5f9f89125533ebb0 /source4/lib/socket | |
parent | db04cffbbfe15a52b954960ff0eb40d2a5e4f00d (diff) | |
download | samba-37bc6b5f813d5c2ace7486a38331748dd86f121d.tar.gz samba-37bc6b5f813d5c2ace7486a38331748dd86f121d.tar.bz2 samba-37bc6b5f813d5c2ace7486a38331748dd86f121d.zip |
r12728: Revive testparm.
It needs work to not dump defaults from loadparm.c, but otherwise it works.
Andrew Bartlett
(This used to be commit 1260fcf46579d708a406625f548add9be9fdc6fb)
Diffstat (limited to 'source4/lib/socket')
-rw-r--r-- | source4/lib/socket/access.c | 6 | ||||
-rw-r--r-- | source4/lib/socket/socket.h | 3 |
2 files changed, 6 insertions, 3 deletions
diff --git a/source4/lib/socket/access.c b/source4/lib/socket/access.c index a64444d41c..1d0a90f1ee 100644 --- a/source4/lib/socket/access.c +++ b/source4/lib/socket/access.c @@ -249,9 +249,9 @@ static BOOL allow_access_internal(TALLOC_CTX *mem_ctx, } /* return true if access should be allowed */ -static BOOL allow_access(TALLOC_CTX *mem_ctx, - const char **deny_list, const char **allow_list, - const char *cname, const char *caddr) +BOOL allow_access(TALLOC_CTX *mem_ctx, + const char **deny_list, const char **allow_list, + const char *cname, const char *caddr) { BOOL ret; char *nc_cname = talloc_strdup(mem_ctx, cname); diff --git a/source4/lib/socket/socket.h b/source4/lib/socket/socket.h index a79d698716..165fbb6377 100644 --- a/source4/lib/socket/socket.h +++ b/source4/lib/socket/socket.h @@ -136,6 +136,9 @@ int socket_get_my_port(struct socket_context *sock); int socket_get_fd(struct socket_context *sock); NTSTATUS socket_dup(struct socket_context *sock); const struct socket_ops *socket_getops_byname(const char *name, enum socket_type type); +BOOL allow_access(TALLOC_CTX *mem_ctx, + const char **deny_list, const char **allow_list, + const char *cname, const char *caddr); BOOL socket_check_access(struct socket_context *sock, const char *service_name, const char **allow_list, const char **deny_list); |