From 5a6be0b3149e43bad14bb75c308ced904909dc58 Mon Sep 17 00:00:00 2001 From: Volker Lendecke Date: Sat, 28 Aug 2010 17:19:42 +0200 Subject: s3: Remove smbd_server_fd() from srv_netlog_nt This is not actually used. If it was to be activated, we'd have to pass in a pipes_struct. --- source3/rpc_server/srv_netlog_nt.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/source3/rpc_server/srv_netlog_nt.c b/source3/rpc_server/srv_netlog_nt.c index 73f216f73a..d0f9dc9dba 100644 --- a/source3/rpc_server/srv_netlog_nt.c +++ b/source3/rpc_server/srv_netlog_nt.c @@ -600,7 +600,6 @@ static NTSTATUS get_md4pw(struct samr_Password *md4pw, const char *mach_acct, union samr_UserInfo *info; struct auth_serversupplied_info *server_info; #if 0 - char addr[INET6_ADDRSTRLEN]; /* * Currently this code is redundent as we already have a filter @@ -612,8 +611,8 @@ static NTSTATUS get_md4pw(struct samr_Password *md4pw, const char *mach_acct, */ if (!allow_access(lp_domain_hostsdeny(), lp_domain_hostsallow(), - client_name(smbd_server_fd()), - client_addr(smbd_server_fd(),addr,sizeof(addr)))) { + p->client_id.name, + p->client_id.addr)) { DEBUG(0,("get_md4pw: Workstation %s denied access to domain\n", mach_acct)); return False; } -- cgit