Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-cw
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-cw
Commits
3eb448cf
Commit
3eb448cf
authored
Mar 27, 2015
by
Piotr Caban
Committed by
Alexandre Julliard
Mar 27, 2015
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
server: Make directory DACL entries inheritable.
parent
f956bb4c
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
10 additions
and
10 deletions
+10
-10
security.c
dlls/advapi32/tests/security.c
+6
-6
file.c
server/file.c
+4
-4
No files found.
dlls/advapi32/tests/security.c
View file @
3eb448cf
...
...
@@ -3192,9 +3192,9 @@ static void test_CreateDirectoryA(void)
ok
(
bret
,
"Failed to get Current User ACE.
\n
"
);
bret
=
EqualSid
(
&
ace
->
SidStart
,
user_sid
);
todo_wine
ok
(
bret
,
"Current User ACE != Current User SID.
\n
"
);
todo_wine
ok
(((
ACE_HEADER
*
)
ace
)
->
AceFlags
==
(
OBJECT_INHERIT_ACE
|
CONTAINER_INHERIT_ACE
),
"Current User ACE has unexpected flags (0x%x != 0x03)
\n
"
,
((
ACE_HEADER
*
)
ace
)
->
AceFlags
);
ok
(((
ACE_HEADER
*
)
ace
)
->
AceFlags
==
(
OBJECT_INHERIT_ACE
|
CONTAINER_INHERIT_ACE
),
"Current User ACE has unexpected flags (0x%x != 0x03)
\n
"
,
((
ACE_HEADER
*
)
ace
)
->
AceFlags
);
ok
(
ace
->
Mask
==
0x1f01ff
,
"Current User ACE has unexpected mask (0x%x != 0x1f01ff)
\n
"
,
ace
->
Mask
);
}
...
...
@@ -3204,9 +3204,9 @@ static void test_CreateDirectoryA(void)
ok
(
bret
,
"Failed to get Administators Group ACE.
\n
"
);
bret
=
EqualSid
(
&
ace
->
SidStart
,
admin_sid
);
todo_wine
ok
(
bret
,
"Administators Group ACE != Administators Group SID.
\n
"
);
todo_wine
ok
(((
ACE_HEADER
*
)
ace
)
->
AceFlags
==
(
OBJECT_INHERIT_ACE
|
CONTAINER_INHERIT_ACE
),
"Administators Group ACE has unexpected flags (0x%x != 0x03)
\n
"
,
((
ACE_HEADER
*
)
ace
)
->
AceFlags
);
ok
(((
ACE_HEADER
*
)
ace
)
->
AceFlags
==
(
OBJECT_INHERIT_ACE
|
CONTAINER_INHERIT_ACE
),
"Administators Group ACE has unexpected flags (0x%x != 0x03)
\n
"
,
((
ACE_HEADER
*
)
ace
)
->
AceFlags
);
ok
(
ace
->
Mask
==
0x1f01ff
,
"Administators Group ACE has unexpected mask (0x%x != 0x1f01ff)
\n
"
,
ace
->
Mask
);
}
...
...
server/file.c
View file @
3eb448cf
...
...
@@ -367,7 +367,7 @@ struct security_descriptor *mode_to_sd( mode_t mode, const SID *user, const SID
aaa
=
(
ACCESS_ALLOWED_ACE
*
)(
dacl
+
1
);
current_ace
=
&
aaa
->
Header
;
aaa
->
Header
.
AceType
=
ACCESS_ALLOWED_ACE_TYPE
;
aaa
->
Header
.
AceFlags
=
0
;
aaa
->
Header
.
AceFlags
=
(
mode
&
S_IFDIR
)
?
OBJECT_INHERIT_ACE
|
CONTAINER_INHERIT_ACE
:
0
;
aaa
->
Header
.
AceSize
=
FIELD_OFFSET
(
ACCESS_ALLOWED_ACE
,
SidStart
)
+
security_sid_len
(
local_system_sid
);
aaa
->
Mask
=
FILE_ALL_ACCESS
;
sid
=
(
SID
*
)
&
aaa
->
SidStart
;
...
...
@@ -379,7 +379,7 @@ struct security_descriptor *mode_to_sd( mode_t mode, const SID *user, const SID
aaa
=
(
ACCESS_ALLOWED_ACE
*
)
ace_next
(
current_ace
);
current_ace
=
&
aaa
->
Header
;
aaa
->
Header
.
AceType
=
ACCESS_ALLOWED_ACE_TYPE
;
aaa
->
Header
.
AceFlags
=
0
;
aaa
->
Header
.
AceFlags
=
(
mode
&
S_IFDIR
)
?
OBJECT_INHERIT_ACE
|
CONTAINER_INHERIT_ACE
:
0
;
aaa
->
Header
.
AceSize
=
FIELD_OFFSET
(
ACCESS_ALLOWED_ACE
,
SidStart
)
+
security_sid_len
(
user
);
aaa
->
Mask
=
WRITE_DAC
|
WRITE_OWNER
;
if
(
mode
&
S_IRUSR
)
...
...
@@ -397,7 +397,7 @@ struct security_descriptor *mode_to_sd( mode_t mode, const SID *user, const SID
ACCESS_DENIED_ACE
*
ada
=
(
ACCESS_DENIED_ACE
*
)
ace_next
(
current_ace
);
current_ace
=
&
ada
->
Header
;
ada
->
Header
.
AceType
=
ACCESS_DENIED_ACE_TYPE
;
ada
->
Header
.
AceFlags
=
0
;
ada
->
Header
.
AceFlags
=
(
mode
&
S_IFDIR
)
?
OBJECT_INHERIT_ACE
|
CONTAINER_INHERIT_ACE
:
0
;
ada
->
Header
.
AceSize
=
FIELD_OFFSET
(
ACCESS_DENIED_ACE
,
SidStart
)
+
security_sid_len
(
user
);
ada
->
Mask
=
0
;
if
(
!
(
mode
&
S_IRUSR
)
&&
(
mode
&
(
S_IRGRP
|
S_IROTH
)))
...
...
@@ -414,7 +414,7 @@ struct security_descriptor *mode_to_sd( mode_t mode, const SID *user, const SID
aaa
=
(
ACCESS_ALLOWED_ACE
*
)
ace_next
(
current_ace
);
current_ace
=
&
aaa
->
Header
;
aaa
->
Header
.
AceType
=
ACCESS_ALLOWED_ACE_TYPE
;
aaa
->
Header
.
AceFlags
=
0
;
aaa
->
Header
.
AceFlags
=
(
mode
&
S_IFDIR
)
?
OBJECT_INHERIT_ACE
|
CONTAINER_INHERIT_ACE
:
0
;
aaa
->
Header
.
AceSize
=
FIELD_OFFSET
(
ACCESS_ALLOWED_ACE
,
SidStart
)
+
security_sid_len
(
world_sid
);
aaa
->
Mask
=
0
;
if
(
mode
&
S_IROTH
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment