Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-cw
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-cw
Commits
57ab0cd9
Commit
57ab0cd9
authored
Jan 06, 2009
by
Michael Stefaniuc
Committed by
Alexandre Julliard
Jan 06, 2009
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
include: sspi.h: Use the Win types as per MSDN.
This improves the Win64 compatibility.
parent
92892873
Hide whitespace changes
Inline
Side-by-side
Showing
7 changed files
with
65 additions
and
65 deletions
+65
-65
rpc_message.c
dlls/rpcrt4/rpc_message.c
+1
-1
main.c
dlls/schannel/tests/main.c
+4
-4
ntlm.c
dlls/secur32/ntlm.c
+1
-1
schannel.c
dlls/secur32/schannel.c
+3
-3
ntlm.c
dlls/secur32/tests/ntlm.c
+7
-7
secur32.c
dlls/secur32/tests/secur32.c
+2
-2
sspi.h
include/sspi.h
+47
-47
No files found.
dlls/rpcrt4/rpc_message.c
View file @
57ab0cd9
...
...
@@ -606,7 +606,7 @@ static RPC_STATUS RPCRT4_ClientAuthorize(RpcConnection *conn, SecBuffer *in,
}
}
TRACE
(
"cbBuffer = %
l
d
\n
"
,
out
->
cbBuffer
);
TRACE
(
"cbBuffer = %d
\n
"
,
out
->
cbBuffer
);
if
(
!
continue_needed
)
{
...
...
dlls/schannel/tests/main.c
View file @
57ab0cd9
...
...
@@ -144,13 +144,13 @@ static void testGetInfo(void)
/* First package: Unified */
status
=
pTables
->
GetInfo
(
&
PackageInfo
);
ok
(
status
==
STATUS_SUCCESS
,
"status: 0x%x
\n
"
,
status
);
ok
(
PackageInfo
.
fCapabilities
==
0x107b3
,
"fCapabilities: 0x%
l
x
\n
"
,
ok
(
PackageInfo
.
fCapabilities
==
0x107b3
,
"fCapabilities: 0x%x
\n
"
,
PackageInfo
.
fCapabilities
);
ok
(
PackageInfo
.
wVersion
==
1
,
"wVersion: %d
\n
"
,
PackageInfo
.
wVersion
);
ok
(
PackageInfo
.
wRPCID
==
14
,
"wRPCID: %d
\n
"
,
PackageInfo
.
wRPCID
);
ok
(
PackageInfo
.
cbMaxToken
==
0x4000
||
PackageInfo
.
cbMaxToken
==
0x6000
,
/* Vista */
"cbMaxToken: 0x%
l
x
\n
"
,
"cbMaxToken: 0x%x
\n
"
,
PackageInfo
.
cbMaxToken
);
/* Second package: SChannel */
...
...
@@ -164,11 +164,11 @@ static void testGetInfo(void)
if
(
status
==
STATUS_SUCCESS
)
{
ok
(
PackageInfo
.
fCapabilities
==
0x107b3
,
"fCapabilities: 0x%
l
x
\n
"
,
ok
(
PackageInfo
.
fCapabilities
==
0x107b3
,
"fCapabilities: 0x%x
\n
"
,
PackageInfo
.
fCapabilities
);
ok
(
PackageInfo
.
wVersion
==
1
,
"wVersion: %d
\n
"
,
PackageInfo
.
wVersion
);
ok
(
PackageInfo
.
wRPCID
==
14
,
"wRPCID: %d
\n
"
,
PackageInfo
.
wRPCID
);
ok
(
PackageInfo
.
cbMaxToken
==
0x4000
,
"cbMaxToken: 0x%
l
x
\n
"
,
ok
(
PackageInfo
.
cbMaxToken
==
0x4000
,
"cbMaxToken: 0x%x
\n
"
,
PackageInfo
.
cbMaxToken
);
}
}
...
...
dlls/secur32/ntlm.c
View file @
57ab0cd9
...
...
@@ -768,7 +768,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextW(
if
(
pInput
->
pBuffers
[
input_token_idx
].
cbBuffer
>
max_len
)
{
TRACE
(
"pInput->pBuffers[%d].cbBuffer is: %
l
d
\n
"
,
TRACE
(
"pInput->pBuffers[%d].cbBuffer is: %d
\n
"
,
input_token_idx
,
pInput
->
pBuffers
[
input_token_idx
].
cbBuffer
);
ret
=
SEC_E_INVALID_TOKEN
;
...
...
dlls/secur32/schannel.c
View file @
57ab0cd9
...
...
@@ -507,7 +507,7 @@ static void schan_resize_current_buffer(const struct schan_buffers *s, SIZE_T mi
if
(
!
new_data
)
{
TRACE
(
"Failed to resize %p from %
l
d to %ld
\n
"
,
b
->
pvBuffer
,
b
->
cbBuffer
,
new_size
);
TRACE
(
"Failed to resize %p from %d to %ld
\n
"
,
b
->
pvBuffer
,
b
->
cbBuffer
,
new_size
);
return
;
}
...
...
@@ -539,7 +539,7 @@ static char *schan_get_buffer(const struct schan_transport *t, struct schan_buff
}
buffer
=
&
s
->
desc
->
pBuffers
[
s
->
current_buffer_idx
];
TRACE
(
"Using buffer %d: cbBuffer %
ld, BufferType %#l
x, pvBuffer %p
\n
"
,
s
->
current_buffer_idx
,
buffer
->
cbBuffer
,
buffer
->
BufferType
,
buffer
->
pvBuffer
);
TRACE
(
"Using buffer %d: cbBuffer %
d, BufferType %#
x, pvBuffer %p
\n
"
,
s
->
current_buffer_idx
,
buffer
->
cbBuffer
,
buffer
->
BufferType
,
buffer
->
pvBuffer
);
schan_resize_current_buffer
(
s
,
s
->
offset
+
*
count
);
max_count
=
buffer
->
cbBuffer
-
s
->
offset
;
...
...
@@ -636,7 +636,7 @@ static void dump_buffer_desc(SecBufferDesc *desc)
for
(
i
=
0
;
i
<
desc
->
cBuffers
;
++
i
)
{
SecBuffer
*
b
=
&
desc
->
pBuffers
[
i
];
TRACE
(
"
\t
buffer %u: cbBuffer %
ld, BufferType %#l
x pvBuffer %p
\n
"
,
i
,
b
->
cbBuffer
,
b
->
BufferType
,
b
->
pvBuffer
);
TRACE
(
"
\t
buffer %u: cbBuffer %
d, BufferType %#
x pvBuffer %p
\n
"
,
i
,
b
->
cbBuffer
,
b
->
BufferType
,
b
->
pvBuffer
);
}
}
...
...
dlls/secur32/tests/ntlm.c
View file @
57ab0cd9
...
...
@@ -447,7 +447,7 @@ static SECURITY_STATUS runClient(SspiData *sspi_data, BOOL first, ULONG data_rep
ok
(
ret
==
SEC_E_BUFFER_TOO_SMALL
,
"expected SEC_E_BUFFER_TOO_SMALL, got %s
\n
"
,
getSecError
(
ret
));
ok
(
out_buf
->
pBuffers
[
0
].
cbBuffer
==
0
,
"InitializeSecurityContext set buffer size to %
l
u
\n
"
,
out_buf
->
pBuffers
[
0
].
cbBuffer
);
"InitializeSecurityContext set buffer size to %u
\n
"
,
out_buf
->
pBuffers
[
0
].
cbBuffer
);
out_buf
->
pBuffers
[
0
].
cbBuffer
=
sspi_data
->
max_token
;
out_buf
->
pBuffers
[
0
].
BufferType
=
SECBUFFER_DATA
;
...
...
@@ -476,9 +476,9 @@ static SECURITY_STATUS runClient(SspiData *sspi_data, BOOL first, ULONG data_rep
}
ok
(
out_buf
->
pBuffers
[
0
].
BufferType
==
SECBUFFER_TOKEN
,
"buffer type was changed from SECBUFFER_TOKEN to %
l
d
\n
"
,
out_buf
->
pBuffers
[
0
].
BufferType
);
"buffer type was changed from SECBUFFER_TOKEN to %d
\n
"
,
out_buf
->
pBuffers
[
0
].
BufferType
);
ok
(
out_buf
->
pBuffers
[
0
].
cbBuffer
<
sspi_data
->
max_token
,
"InitializeSecurityContext set buffer size to %
l
u
\n
"
,
out_buf
->
pBuffers
[
0
].
cbBuffer
);
"InitializeSecurityContext set buffer size to %u
\n
"
,
out_buf
->
pBuffers
[
0
].
cbBuffer
);
return
ret
;
}
...
...
@@ -870,16 +870,16 @@ static void testAuth(ULONG data_rep, BOOL fake)
"pQueryContextAttributesA(SECPKG_ATTR_SIZES) returned %s
\n
"
,
getSecError
(
sec_status
));
ok
((
ctxt_sizes
.
cbMaxToken
==
1904
)
||
(
ctxt_sizes
.
cbMaxToken
==
2888
),
"cbMaxToken should be 1904 or 2888 but is %
l
u
\n
"
,
"cbMaxToken should be 1904 or 2888 but is %u
\n
"
,
ctxt_sizes
.
cbMaxToken
);
ok
(
ctxt_sizes
.
cbMaxSignature
==
16
,
"cbMaxSignature should be 16 but is %
l
u
\n
"
,
"cbMaxSignature should be 16 but is %u
\n
"
,
ctxt_sizes
.
cbMaxSignature
);
ok
(
ctxt_sizes
.
cbSecurityTrailer
==
16
,
"cbSecurityTrailer should be 16 but is %
l
u
\n
"
,
"cbSecurityTrailer should be 16 but is %u
\n
"
,
ctxt_sizes
.
cbSecurityTrailer
);
ok
(
ctxt_sizes
.
cbBlockSize
==
0
,
"cbBlockSize should be 0 but is %
l
u
\n
"
,
"cbBlockSize should be 0 but is %u
\n
"
,
ctxt_sizes
.
cbBlockSize
);
tAuthend:
...
...
dlls/secur32/tests/secur32.c
View file @
57ab0cd9
...
...
@@ -101,7 +101,7 @@ static void test_InitSecurityInterface(void)
sftA
=
pInitSecurityInterfaceA
();
ok
(
sftA
!=
NULL
,
"pInitSecurityInterfaceA failed
\n
"
);
ok
(
sftA
->
dwVersion
==
SECURITY_SUPPORT_PROVIDER_INTERFACE_VERSION
,
"wrong dwVersion %
l
d in security function table
\n
"
,
sftA
->
dwVersion
);
ok
(
sftA
->
dwVersion
==
SECURITY_SUPPORT_PROVIDER_INTERFACE_VERSION
,
"wrong dwVersion %d in security function table
\n
"
,
sftA
->
dwVersion
);
ok
(
!
sftA
->
Reserved2
,
"Reserved2 should be NULL instead of %p in security function table
\n
"
,
sftA
->
Reserved2
);
ok
(
sftA
->
Reserved3
==
sftA
->
EncryptMessage
,
"Reserved3 should be equal to EncryptMessage in the security function table
\n
"
);
ok
(
sftA
->
Reserved4
==
sftA
->
DecryptMessage
,
"Reserved4 should be equal to DecryptMessage in the security function table
\n
"
);
...
...
@@ -114,7 +114,7 @@ static void test_InitSecurityInterface(void)
sftW
=
pInitSecurityInterfaceW
();
ok
(
sftW
!=
NULL
,
"pInitSecurityInterfaceW failed
\n
"
);
ok
(
sftW
->
dwVersion
==
SECURITY_SUPPORT_PROVIDER_INTERFACE_VERSION
,
"wrong dwVersion %
l
d in security function table
\n
"
,
sftW
->
dwVersion
);
ok
(
sftW
->
dwVersion
==
SECURITY_SUPPORT_PROVIDER_INTERFACE_VERSION
,
"wrong dwVersion %d in security function table
\n
"
,
sftW
->
dwVersion
);
ok
(
!
sftW
->
Reserved2
,
"Reserved2 should be NULL instead of %p in security function table
\n
"
,
sftW
->
Reserved2
);
ok
(
sftW
->
Reserved3
==
sftW
->
EncryptMessage
,
"Reserved3 should be equal to EncryptMessage in the security function table
\n
"
);
ok
(
sftW
->
Reserved4
==
sftW
->
DecryptMessage
,
"Reserved4 should be equal to DecryptMessage in the security function table
\n
"
);
...
...
include/sspi.h
View file @
57ab0cd9
...
...
@@ -89,22 +89,22 @@ typedef UNICODE_STRING SECURITY_STRING, *PSECURITY_STRING;
typedef
struct
_SecPkgInfoA
{
unsigned
long
fCapabilities
;
unsigned
short
wVersion
;
unsigned
short
wRPCID
;
unsigned
long
cbMaxToken
;
SEC_CHAR
*
Name
;
SEC_CHAR
*
Comment
;
ULONG
fCapabilities
;
USHORT
wVersion
;
USHORT
wRPCID
;
ULONG
cbMaxToken
;
SEC_CHAR
*
Name
;
SEC_CHAR
*
Comment
;
}
SecPkgInfoA
,
*
PSecPkgInfoA
;
typedef
struct
_SecPkgInfoW
{
unsigned
long
fCapabilities
;
unsigned
short
wVersion
;
unsigned
short
wRPCID
;
unsigned
long
cbMaxToken
;
SEC_WCHAR
*
Name
;
SEC_WCHAR
*
Comment
;
ULONG
fCapabilities
;
USHORT
wVersion
;
USHORT
wRPCID
;
ULONG
cbMaxToken
;
SEC_WCHAR
*
Name
;
SEC_WCHAR
*
Comment
;
}
SecPkgInfoW
,
*
PSecPkgInfoW
;
#define SecPkgInfo WINELIB_NAME_AW(SecPkgInfo)
...
...
@@ -133,9 +133,9 @@ typedef struct _SecPkgInfoW
typedef
struct
_SecBuffer
{
unsigned
long
cbBuffer
;
unsigned
long
BufferType
;
void
*
pvBuffer
;
ULONG
cbBuffer
;
ULONG
BufferType
;
PVOID
pvBuffer
;
}
SecBuffer
,
*
PSecBuffer
;
/* values for BufferType */
...
...
@@ -162,9 +162,9 @@ typedef struct _SecBuffer
typedef
struct
_SecBufferDesc
{
unsigned
long
ulVersion
;
unsigned
long
cBuffers
;
PSecBuffer
pBuffers
;
ULONG
ulVersion
;
ULONG
cBuffers
;
PSecBuffer
pBuffers
;
}
SecBufferDesc
,
*
PSecBufferDesc
;
/* values for ulVersion */
...
...
@@ -434,19 +434,19 @@ typedef SECURITY_STATUS (SEC_ENTRY *QUERY_CONTEXT_ATTRIBUTES_FN_W)(PCtxtHandle,
typedef
struct
_SecPkgContext_Sizes
{
unsigned
long
cbMaxToken
;
unsigned
long
cbMaxSignature
;
unsigned
long
cbBlockSize
;
unsigned
long
cbSecurityTrailer
;
ULONG
cbMaxToken
;
ULONG
cbMaxSignature
;
ULONG
cbBlockSize
;
ULONG
cbSecurityTrailer
;
}
SecPkgContext_Sizes
,
*
PSecPkgContext_Sizes
;
typedef
struct
_SecPkgContext_StreamSizes
{
unsigned
long
cbHeader
;
unsigned
long
cbTrailer
;
unsigned
long
cbMaximumMessage
;
unsigned
long
cbBuffers
;
unsigned
long
cbBlockSize
;
ULONG
cbHeader
;
ULONG
cbTrailer
;
ULONG
cbMaximumMessage
;
ULONG
cbBuffers
;
ULONG
cbBlockSize
;
}
SecPkgContext_StreamSizes
,
*
PSecPkgContext_StreamSizes
;
typedef
struct
_SecPkgContext_NamesA
...
...
@@ -470,26 +470,26 @@ typedef struct _SecPkgContext_Lifespan
typedef
struct
_SecPkgContext_DceInfo
{
unsigned
long
AuthzSvc
;
void
*
pPac
;
ULONG
AuthzSvc
;
PVOID
pPac
;
}
SecPkgContext_DceInfo
,
*
PSecPkgContext_DceInfo
;
typedef
struct
_SecPkgContext_KeyInfoA
{
SEC_CHAR
*
sSignatureAlgorithmName
;
SEC_CHAR
*
sEncryptAlgorithmName
;
unsigned
long
KeySize
;
unsigned
long
SignatureAlgorithm
;
unsigned
long
EncryptAlgorithm
;
SEC_CHAR
*
sSignatureAlgorithmName
;
SEC_CHAR
*
sEncryptAlgorithmName
;
ULONG
KeySize
;
ULONG
SignatureAlgorithm
;
ULONG
EncryptAlgorithm
;
}
SecPkgContext_KeyInfoA
,
*
PSecPkgContext_KeyInfoA
;
typedef
struct
_SecPkgContext_KeyInfoW
{
SEC_WCHAR
*
sSignatureAlgorithmName
;
SEC_WCHAR
*
sEncryptAlgorithmName
;
unsigned
long
KeySize
;
unsigned
long
SignatureAlgorithm
;
unsigned
long
EncryptAlgorithm
;
SEC_WCHAR
*
sSignatureAlgorithmName
;
SEC_WCHAR
*
sEncryptAlgorithmName
;
ULONG
KeySize
;
ULONG
SignatureAlgorithm
;
ULONG
EncryptAlgorithm
;
}
SecPkgContext_KeyInfoW
,
*
PSecPkgContext_KeyInfoW
;
#define SecPkgContext_KeyInfo WINELIB_NAME_AW(SecPkgContext_KeyInfo)
...
...
@@ -510,16 +510,16 @@ typedef struct _SecPkgContext_AuthorityW
typedef
struct
_SecPkgContext_ProtoInfoA
{
SEC_CHAR
*
sProtocolName
;
unsigned
long
majorVersion
;
unsigned
long
minorVersion
;
SEC_CHAR
*
sProtocolName
;
ULONG
majorVersion
;
ULONG
minorVersion
;
}
SecPkgContext_ProtoInfoA
,
*
PSecPkgContext_ProtoInfoA
;
typedef
struct
_SecPkgContext_ProtoInfoW
{
SEC_WCHAR
*
sProtocolName
;
unsigned
long
majorVersion
;
unsigned
long
minorVersion
;
SEC_WCHAR
*
sProtocolName
;
ULONG
majorVersion
;
ULONG
minorVersion
;
}
SecPkgContext_ProtoInfoW
,
*
PSecPkgContext_ProtoInfoW
;
#define SecPkgContext_ProtoInfo WINELIB_NAME_AW(SecPkgContext_ProtoInfo)
...
...
@@ -742,7 +742,7 @@ typedef SECURITY_STATUS (SEC_ENTRY *SET_CONTEXT_ATTRIBUTES_FN_W)(PCtxtHandle,
typedef
struct
_SECURITY_FUNCTION_TABLE_A
{
unsigned
long
dwVersion
;
ULONG
dwVersion
;
ENUMERATE_SECURITY_PACKAGES_FN_A
EnumerateSecurityPackagesA
;
QUERY_CREDENTIALS_ATTRIBUTES_FN_A
QueryCredentialsAttributesA
;
ACQUIRE_CREDENTIALS_HANDLE_FN_A
AcquireCredentialsHandleA
;
...
...
@@ -774,7 +774,7 @@ typedef struct _SECURITY_FUNCTION_TABLE_A
typedef
struct
_SECURITY_FUNCTION_TABLE_W
{
unsigned
long
dwVersion
;
ULONG
dwVersion
;
ENUMERATE_SECURITY_PACKAGES_FN_W
EnumerateSecurityPackagesW
;
QUERY_CREDENTIALS_ATTRIBUTES_FN_W
QueryCredentialsAttributesW
;
ACQUIRE_CREDENTIALS_HANDLE_FN_W
AcquireCredentialsHandleW
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment