*/
FN_LOCAL_STRING(path, path)
-FN_LOCAL_LIST(hostsallow, hostsallow)
+FN_LOCAL_LIST(hosts_allow, hostsallow)
FN_LOCAL_LIST(hostsdeny, hostsdeny)
FN_LOCAL_STRING(fstype, fstype)
FN_LOCAL_LIST(ntvfs_handler, ntvfs_handler)
rhost = raddr;
}
- if (!allow_access(lp_hostsdeny(snum), lp_hostsallow(snum),
+ if (!allow_access(lp_hostsdeny(snum), lp_hosts_allow(snum),
rhost, raddr)) {
DEBUG(3, ("access DENIED (hosts allow/deny) for printer open\n"));
ZERO_STRUCTP(r->out.handle);
* Haven't we checked this in smbd_process already???
*/
- ok = allow_access(lp_hostsdeny(-1), lp_hostsallow(-1),
+ ok = allow_access(lp_hostsdeny(-1), lp_hosts_allow(-1),
sconn->remote_hostname, raddr);
TALLOC_FREE(raddr);
sconn->remote_hostname,
locaddr);
- if (!allow_access(lp_hostsdeny(-1), lp_hostsallow(-1),
+ if (!allow_access(lp_hostsdeny(-1), lp_hosts_allow(-1),
sconn->remote_hostname,
remaddr)) {
/*
}
if (!lp_snum_ok(snum) ||
- !allow_access(lp_hostsdeny(snum), lp_hostsallow(snum),
+ !allow_access(lp_hostsdeny(snum), lp_hosts_allow(snum),
rhost, raddr)) {
return NT_STATUS_ACCESS_DENIED;
}
static void do_per_share_checks(int s)
{
const char **deny_list = lp_hostsdeny(s);
- const char **allow_list = lp_hostsallow(s);
+ const char **allow_list = lp_hosts_allow(s);
int i;
if(deny_list) {
/* this is totally ugly, a real `quick' hack */
for (s=0;s<1000;s++) {
if (VALID_SNUM(s)) {
- if (allow_access(lp_hostsdeny(-1), lp_hostsallow(-1), cname, caddr)
- && allow_access(lp_hostsdeny(s), lp_hostsallow(s), cname, caddr)) {
+ if (allow_access(lp_hostsdeny(-1), lp_hosts_allow(-1), cname, caddr)
+ && allow_access(lp_hostsdeny(s), lp_hosts_allow(s), cname, caddr)) {
fprintf(stderr,"Allow connection from %s (%s) to %s\n",
cname,caddr,lp_servicename(talloc_tos(), s));
} else {
}
if (strcmp(opt_name, SHARE_HOSTS_ALLOW) == 0) {
- return lpcfg_hostsallow(s, lpcfg_default_service(lp_ctx));
+ return lpcfg_hosts_allow(s, lpcfg_default_service(lp_ctx));
}
if (strcmp(opt_name, SHARE_HOSTS_DENY) == 0) {
srv_conn->event.ctx = ev;
srv_conn->lp_ctx = lp_ctx;
- if (!socket_check_access(sock, "smbd", lpcfg_hostsallow(NULL, lpcfg_default_service(lp_ctx)), lpcfg_hostsdeny(NULL, lpcfg_default_service(lp_ctx)))) {
+ if (!socket_check_access(sock, "smbd", lpcfg_hosts_allow(NULL, lpcfg_default_service(lp_ctx)), lpcfg_hostsdeny(NULL, lpcfg_default_service(lp_ctx)))) {
stream_terminate_connection(srv_conn, "denied by access rules");
return;
}