DATA_BLOB *pblob);
#define HASH_SECURITY_INFO (SECINFO_OWNER | \
- GROUP_SECURITY_INFORMATION | \
+ SECINFO_GROUP | \
DACL_SECURITY_INFORMATION | \
SACL_SECURITY_INFORMATION)
if (!(security_info & SECINFO_OWNER)) {
psd->owner_sid = NULL;
}
- if (!(security_info & GROUP_SECURITY_INFORMATION)) {
+ if (!(security_info & SECINFO_GROUP)) {
psd->group_sid = NULL;
}
if (!(security_info & DACL_SECURITY_INFORMATION)) {
return SMB_VFS_FSET_NT_ACL(fsp,
(SECINFO_OWNER |
- GROUP_SECURITY_INFORMATION |
+ SECINFO_GROUP |
DACL_SECURITY_INFORMATION),
psd);
}
NULL,
parent_name,
(SECINFO_OWNER |
- GROUP_SECURITY_INFORMATION |
+ SECINFO_GROUP |
DACL_SECURITY_INFORMATION),
&parent_desc);
NULL,
fname,
(SECINFO_OWNER |
- GROUP_SECURITY_INFORMATION |
+ SECINFO_GROUP |
DACL_SECURITY_INFORMATION),
&pdesc);
if (NT_STATUS_IS_OK(status)) {
/* Ensure we have OWNER/GROUP/DACL set. */
if ((security_info_sent & (SECINFO_OWNER|
- GROUP_SECURITY_INFORMATION|
+ SECINFO_GROUP|
DACL_SECURITY_INFORMATION)) !=
(SECINFO_OWNER|
- GROUP_SECURITY_INFORMATION|
+ SECINFO_GROUP|
DACL_SECURITY_INFORMATION)) {
/* No we don't - read from the existing SD. */
struct security_descriptor *nc_psd = NULL;
status = get_nt_acl_internal(handle, fsp,
NULL,
(SECINFO_OWNER|
- GROUP_SECURITY_INFORMATION|
+ SECINFO_GROUP|
DACL_SECURITY_INFORMATION),
&nc_psd);
}
security_info_sent |= SECINFO_OWNER;
- if (security_info_sent & GROUP_SECURITY_INFORMATION) {
+ if (security_info_sent & SECINFO_GROUP) {
nc_psd->group_sid = psd->group_sid;
}
- security_info_sent |= GROUP_SECURITY_INFORMATION;
+ security_info_sent |= SECINFO_GROUP;
if (security_info_sent & DACL_SECURITY_INFORMATION) {
nc_psd->dacl = dup_sec_acl(talloc_tos(), psd->dacl);