Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
24592a7a
Commit
24592a7a
authored
May 11, 2010
by
Michael Stefaniuc
Committed by
Alexandre Julliard
May 12, 2010
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
secur32: Avoid using long.
parent
693ccc25
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
10 additions
and
10 deletions
+10
-10
ntlm.c
dlls/secur32/ntlm.c
+6
-6
schannel.c
dlls/secur32/schannel.c
+2
-2
secur32.c
dlls/secur32/secur32.c
+1
-1
secur32_priv.h
dlls/secur32/secur32_priv.h
+1
-1
No files found.
dlls/secur32/ntlm.c
View file @
24592a7a
...
@@ -880,8 +880,8 @@ static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextW(
...
@@ -880,8 +880,8 @@ static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextW(
else
else
{
{
TRACE
(
"Negotiated %s
\n
"
,
debugstr_a
(
buffer
));
TRACE
(
"Negotiated %s
\n
"
,
debugstr_a
(
buffer
));
sscanf
(
buffer
+
3
,
"%
l
x"
,
&
(
helper
->
neg_flags
));
sscanf
(
buffer
+
3
,
"%x"
,
&
(
helper
->
neg_flags
));
TRACE
(
"Stored 0x%08
l
x as flags
\n
"
,
helper
->
neg_flags
);
TRACE
(
"Stored 0x%08x as flags
\n
"
,
helper
->
neg_flags
);
}
}
TRACE
(
"Getting session key
\n
"
);
TRACE
(
"Getting session key
\n
"
);
...
@@ -1269,8 +1269,8 @@ static SECURITY_STATUS SEC_ENTRY ntlm_AcceptSecurityContext(
...
@@ -1269,8 +1269,8 @@ static SECURITY_STATUS SEC_ENTRY ntlm_AcceptSecurityContext(
else
else
{
{
TRACE
(
"Negotiated %s
\n
"
,
debugstr_a
(
buffer
));
TRACE
(
"Negotiated %s
\n
"
,
debugstr_a
(
buffer
));
sscanf
(
buffer
+
3
,
"%
l
x"
,
&
(
helper
->
neg_flags
));
sscanf
(
buffer
+
3
,
"%x"
,
&
(
helper
->
neg_flags
));
TRACE
(
"Stored 0x%08
l
x as flags
\n
"
,
helper
->
neg_flags
);
TRACE
(
"Stored 0x%08x as flags
\n
"
,
helper
->
neg_flags
);
}
}
TRACE
(
"Getting session key
\n
"
);
TRACE
(
"Getting session key
\n
"
);
...
@@ -1631,7 +1631,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_MakeSignature(PCtxtHandle phContext, ULONG
...
@@ -1631,7 +1631,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_MakeSignature(PCtxtHandle phContext, ULONG
return
SEC_E_BUFFER_TOO_SMALL
;
return
SEC_E_BUFFER_TOO_SMALL
;
helper
=
(
PNegoHelper
)
phContext
->
dwLower
;
helper
=
(
PNegoHelper
)
phContext
->
dwLower
;
TRACE
(
"Negotiated flags are: 0x%08
l
x
\n
"
,
helper
->
neg_flags
);
TRACE
(
"Negotiated flags are: 0x%08x
\n
"
,
helper
->
neg_flags
);
return
ntlm_CreateSignature
(
helper
,
pMessage
,
token_idx
,
NTLM_SEND
,
TRUE
);
return
ntlm_CreateSignature
(
helper
,
pMessage
,
token_idx
,
NTLM_SEND
,
TRUE
);
}
}
...
@@ -1668,7 +1668,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_VerifySignature(PCtxtHandle phContext,
...
@@ -1668,7 +1668,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_VerifySignature(PCtxtHandle phContext,
FIXME
(
"Ignoring MessageSeqNo
\n
"
);
FIXME
(
"Ignoring MessageSeqNo
\n
"
);
helper
=
(
PNegoHelper
)
phContext
->
dwLower
;
helper
=
(
PNegoHelper
)
phContext
->
dwLower
;
TRACE
(
"Negotiated flags: 0x%08
l
x
\n
"
,
helper
->
neg_flags
);
TRACE
(
"Negotiated flags: 0x%08x
\n
"
,
helper
->
neg_flags
);
local_buff
=
HeapAlloc
(
GetProcessHeap
(),
0
,
pMessage
->
cBuffers
*
sizeof
(
SecBuffer
));
local_buff
=
HeapAlloc
(
GetProcessHeap
(),
0
,
pMessage
->
cBuffers
*
sizeof
(
SecBuffer
));
...
...
dlls/secur32/schannel.c
View file @
24592a7a
...
@@ -1313,7 +1313,7 @@ void SECUR32_initSchannelSP(void)
...
@@ -1313,7 +1313,7 @@ void SECUR32_initSchannelSP(void)
* even though the functions are missing, because the wrapper will
* even though the functions are missing, because the wrapper will
* return SEC_E_UNSUPPORTED_FUNCTION if our function is NULL.
* return SEC_E_UNSUPPORTED_FUNCTION if our function is NULL.
*/
*/
static
const
long
caps
=
static
const
LONG
caps
=
SECPKG_FLAG_INTEGRITY
|
SECPKG_FLAG_INTEGRITY
|
SECPKG_FLAG_PRIVACY
|
SECPKG_FLAG_PRIVACY
|
SECPKG_FLAG_CONNECTION
|
SECPKG_FLAG_CONNECTION
|
...
@@ -1323,7 +1323,7 @@ void SECUR32_initSchannelSP(void)
...
@@ -1323,7 +1323,7 @@ void SECUR32_initSchannelSP(void)
SECPKG_FLAG_ACCEPT_WIN32_NAME
|
SECPKG_FLAG_ACCEPT_WIN32_NAME
|
SECPKG_FLAG_STREAM
;
SECPKG_FLAG_STREAM
;
static
const
short
version
=
1
;
static
const
short
version
=
1
;
static
const
long
maxToken
=
16384
;
static
const
LONG
maxToken
=
16384
;
SEC_WCHAR
*
uniSPName
=
(
SEC_WCHAR
*
)
UNISP_NAME_W
,
SEC_WCHAR
*
uniSPName
=
(
SEC_WCHAR
*
)
UNISP_NAME_W
,
*
schannel
=
(
SEC_WCHAR
*
)
SCHANNEL_NAME_W
;
*
schannel
=
(
SEC_WCHAR
*
)
SCHANNEL_NAME_W
;
const
SecPkgInfoW
info
[]
=
{
const
SecPkgInfoW
info
[]
=
{
...
...
dlls/secur32/secur32.c
View file @
24592a7a
...
@@ -550,7 +550,7 @@ static const WCHAR securityProvidersW[] = {
...
@@ -550,7 +550,7 @@ static const WCHAR securityProvidersW[] = {
static
void
SECUR32_initializeProviders
(
void
)
static
void
SECUR32_initializeProviders
(
void
)
{
{
HKEY
key
;
HKEY
key
;
long
apiRet
;
LSTATUS
apiRet
;
TRACE
(
"
\n
"
);
TRACE
(
"
\n
"
);
InitializeCriticalSection
(
&
cs
);
InitializeCriticalSection
(
&
cs
);
...
...
dlls/secur32/secur32_priv.h
View file @
24592a7a
...
@@ -64,7 +64,7 @@ typedef struct _NegoHelper {
...
@@ -64,7 +64,7 @@ typedef struct _NegoHelper {
int
com_buf_size
;
int
com_buf_size
;
int
com_buf_offset
;
int
com_buf_offset
;
BYTE
*
session_key
;
BYTE
*
session_key
;
unsigned
long
neg_flags
;
ULONG
neg_flags
;
struct
{
struct
{
struct
{
struct
{
ULONG
seq_num
;
ULONG
seq_num
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment