From 88d88f5d0d23c8c849739b9441872734c0431c99 Mon Sep 17 00:00:00 2001 From: Jeremy Allison Date: Fri, 5 Jun 1998 20:46:05 +0000 Subject: loadparm.c: Did it ! Changed defaults for 'case preserve' and 'short case preserve'. Also removed 'domain allow/deny' parameters. shmem_sysv.c: Added strerror code so I can see why sysV calls are failing. lib/rpc/server/srv_netlog.c: Removed code that used 'domain allow/deny' parameters - replaced with a comment so I will remember to fix this later. Jeremy. (This used to be commit 5f46c7c4b11a75f1ffbd806cde915b4bf28232db) --- source3/rpc_server/srv_netlog.c | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) (limited to 'source3/rpc_server/srv_netlog.c') diff --git a/source3/rpc_server/srv_netlog.c b/source3/rpc_server/srv_netlog.c index 821945b757..0679e876e2 100644 --- a/source3/rpc_server/srv_netlog.c +++ b/source3/rpc_server/srv_netlog.c @@ -229,7 +229,16 @@ static void net_reply_sam_logoff(NET_Q_SAM_LOGOFF *q_s, prs_struct *rdata, static BOOL get_md4pw(char *md4pw, char *mach_name, char *mach_acct) { struct smb_passwd *smb_pass; - extern int Client; + +#if 0 + /* + * Currently this code is redundent as we already have a filter + * by hostname list. What this code really needs to do is to + * get a hosts allowed/hosts denied list from the SAM database + * on a per user basis, and make the access decision there. + * I will leave this code here for now as a reminder to implement + * this at a later date. JRA. + */ if (!allow_access(lp_domain_hostsdeny(), lp_domain_hostsallow(), client_name(Client), client_addr(Client))) @@ -237,6 +246,7 @@ static BOOL get_md4pw(char *md4pw, char *mach_name, char *mach_acct) DEBUG(0,("get_md4pw: Workstation %s denied access to domain\n", mach_acct)); return False; } +#endif /* 0 */ become_root(True); smb_pass = getsmbpwnam(mach_acct); -- cgit