s3: Remove smbd_server_fd() from srv_netlog_nt
authorVolker Lendecke <vl@samba.org>
Sat, 28 Aug 2010 15:19:42 +0000 (17:19 +0200)
committerVolker Lendecke <vl@samba.org>
Sun, 29 Aug 2010 19:55:25 +0000 (21:55 +0200)
This is not actually used. If it was to be activated, we'd have to pass in a
pipes_struct.

source3/rpc_server/srv_netlog_nt.c

index 73f216f73a217a9f3136b60f24fa8c0fb9ca6457..d0f9dc9dba155cb60b3c629cf6d99c8c9246006f 100644 (file)
@@ -600,7 +600,6 @@ static NTSTATUS get_md4pw(struct samr_Password *md4pw, const char *mach_acct,
        union samr_UserInfo *info;
        struct auth_serversupplied_info *server_info;
 #if 0
-       char addr[INET6_ADDRSTRLEN];
 
     /*
      * Currently this code is redundent as we already have a filter
@@ -612,8 +611,8 @@ static NTSTATUS get_md4pw(struct samr_Password *md4pw, const char *mach_acct,
      */
 
        if (!allow_access(lp_domain_hostsdeny(), lp_domain_hostsallow(),
-                         client_name(smbd_server_fd()),
-                         client_addr(smbd_server_fd(),addr,sizeof(addr)))) {
+                         p->client_id.name,
+                         p->client_id.addr)) {
                DEBUG(0,("get_md4pw: Workstation %s denied access to domain\n", mach_acct));
                return False;
        }