Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-cw
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-cw
Commits
794ad909
Commit
794ad909
authored
Aug 08, 2012
by
Michael Stefaniuc
Committed by
Alexandre Julliard
Aug 13, 2012
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
server: Avoid TRUE:FALSE conditional expressions.
parent
dfa57c6e
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
5 additions
and
5 deletions
+5
-5
security.h
server/security.h
+2
-2
token.c
server/token.c
+3
-3
No files found.
server/security.h
View file @
794ad909
...
...
@@ -90,7 +90,7 @@ extern int sd_is_valid( const struct security_descriptor *sd, data_size_t size )
/* gets the discretionary access control list from a security descriptor */
static
inline
const
ACL
*
sd_get_dacl
(
const
struct
security_descriptor
*
sd
,
int
*
present
)
{
*
present
=
(
sd
->
control
&
SE_DACL_PRESENT
?
TRUE
:
FALSE
)
;
*
present
=
(
sd
->
control
&
SE_DACL_PRESENT
)
!=
0
;
if
(
sd
->
dacl_len
)
return
(
const
ACL
*
)((
const
char
*
)(
sd
+
1
)
+
...
...
@@ -102,7 +102,7 @@ static inline const ACL *sd_get_dacl( const struct security_descriptor *sd, int
/* gets the system access control list from a security descriptor */
static
inline
const
ACL
*
sd_get_sacl
(
const
struct
security_descriptor
*
sd
,
int
*
present
)
{
*
present
=
(
sd
->
control
&
SE_SACL_PRESENT
?
TRUE
:
FALSE
)
;
*
present
=
(
sd
->
control
&
SE_SACL_PRESENT
)
!=
0
;
if
(
sd
->
sacl_len
)
return
(
const
ACL
*
)((
const
char
*
)(
sd
+
1
)
+
...
...
server/token.c
View file @
794ad909
...
...
@@ -475,9 +475,9 @@ static struct token *create_token( unsigned primary, const SID *user,
memcpy
(
&
group
->
sid
,
groups
[
i
].
Sid
,
FIELD_OFFSET
(
SID
,
SubAuthority
[((
const
SID
*
)
groups
[
i
].
Sid
)
->
SubAuthorityCount
]
)
);
group
->
enabled
=
TRUE
;
group
->
def
=
TRUE
;
group
->
logon
=
(
groups
[
i
].
Attributes
&
SE_GROUP_LOGON_ID
)
?
TRUE
:
FALSE
;
group
->
mandatory
=
(
groups
[
i
].
Attributes
&
SE_GROUP_MANDATORY
)
?
TRUE
:
FALSE
;
group
->
owner
=
groups
[
i
].
Attributes
&
SE_GROUP_OWNER
?
TRUE
:
FALSE
;
group
->
logon
=
(
groups
[
i
].
Attributes
&
SE_GROUP_LOGON_ID
)
!=
0
;
group
->
mandatory
=
(
groups
[
i
].
Attributes
&
SE_GROUP_MANDATORY
)
!=
0
;
group
->
owner
=
(
groups
[
i
].
Attributes
&
SE_GROUP_OWNER
)
!=
0
;
group
->
resource
=
FALSE
;
group
->
deny_only
=
FALSE
;
list_add_tail
(
&
token
->
groups
,
&
group
->
entry
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment