Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
2638e9d4
Commit
2638e9d4
authored
Oct 15, 2006
by
Hans Leidekker
Committed by
Alexandre Julliard
Oct 16, 2006
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
secur32: Win64 printf format warning fixes.
parent
21ff87bf
Expand all
Show whitespace changes
Inline
Side-by-side
Showing
9 changed files
with
161 additions
and
165 deletions
+161
-165
Makefile.in
dlls/secur32/Makefile.in
+0
-1
negotiate.c
dlls/secur32/negotiate.c
+12
-12
ntlm.c
dlls/secur32/ntlm.c
+16
-16
schannel.c
dlls/secur32/schannel.c
+9
-9
secur32.c
dlls/secur32/secur32.c
+6
-6
thunks.c
dlls/secur32/thunks.c
+34
-34
thunks.h
dlls/secur32/thunks.h
+16
-16
wrapper.c
dlls/secur32/wrapper.c
+36
-37
sspi.h
include/sspi.h
+32
-34
No files found.
dlls/secur32/Makefile.in
View file @
2638e9d4
...
...
@@ -6,7 +6,6 @@ MODULE = secur32.dll
IMPORTLIB
=
libsecur32.
$(IMPLIBEXT)
IMPORTS
=
netapi32 user32 advapi32 kernel32 ntdll
DELAYIMPORTS
=
crypt32
EXTRADEFS
=
-DWINE_NO_LONG_AS_INT
C_SRCS
=
\
base64_codec.c
\
...
...
dlls/secur32/negotiate.c
View file @
2638e9d4
...
...
@@ -55,7 +55,7 @@ static SECURITY_STATUS SEC_ENTRY nego_QueryCredentialsAttributesA(
{
SECURITY_STATUS
ret
;
TRACE
(
"(%p, %
l
d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
TRACE
(
"(%p, %d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
switch
(
ulAttribute
)
{
...
...
@@ -78,7 +78,7 @@ static SECURITY_STATUS SEC_ENTRY nego_QueryCredentialsAttributesW(
{
SECURITY_STATUS
ret
;
TRACE
(
"(%p, %
l
d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
TRACE
(
"(%p, %d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
switch
(
ulAttribute
)
{
...
...
@@ -102,7 +102,7 @@ static SECURITY_STATUS SEC_ENTRY nego_AcquireCredentialsHandleA(
PLUID
pLogonID
,
PVOID
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
PVOID
pGetKeyArgument
,
PCredHandle
phCredential
,
PTimeStamp
ptsExpiry
)
{
TRACE
(
"(%s, %s, 0x%08
l
x, %p, %p, %p, %p, %p, %p) stub
\n
"
,
TRACE
(
"(%s, %s, 0x%08x, %p, %p, %p, %p, %p, %p) stub
\n
"
,
debugstr_a
(
pszPrincipal
),
debugstr_a
(
pszPackage
),
fCredentialUse
,
pLogonID
,
pAuthData
,
pGetKeyFn
,
pGetKeyArgument
,
phCredential
,
ptsExpiry
);
return
SEC_E_UNSUPPORTED_FUNCTION
;
...
...
@@ -116,7 +116,7 @@ static SECURITY_STATUS SEC_ENTRY nego_AcquireCredentialsHandleW(
PLUID
pLogonID
,
PVOID
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
PVOID
pGetKeyArgument
,
PCredHandle
phCredential
,
PTimeStamp
ptsExpiry
)
{
TRACE
(
"(%s, %s, 0x%08
l
x, %p, %p, %p, %p, %p, %p) stub
\n
"
,
TRACE
(
"(%s, %s, 0x%08x, %p, %p, %p, %p, %p, %p) stub
\n
"
,
debugstr_w
(
pszPrincipal
),
debugstr_w
(
pszPackage
),
fCredentialUse
,
pLogonID
,
pAuthData
,
pGetKeyFn
,
pGetKeyArgument
,
phCredential
,
ptsExpiry
);
return
SEC_E_UNSUPPORTED_FUNCTION
;
...
...
@@ -133,7 +133,7 @@ static SECURITY_STATUS SEC_ENTRY nego_InitializeSecurityContextA(
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %p %s %
ld %ld %ld %p %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
TRACE
(
"%p %p %s %
d %d %d %p %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
debugstr_a
(
pszTargetName
),
fContextReq
,
Reserved1
,
TargetDataRep
,
pInput
,
Reserved1
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
if
(
phCredential
){
...
...
@@ -157,7 +157,7 @@ static SECURITY_STATUS SEC_ENTRY nego_InitializeSecurityContextW(
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %p %s %
ld %ld %ld %p %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
TRACE
(
"%p %p %s %
d %d %d %p %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
debugstr_w
(
pszTargetName
),
fContextReq
,
Reserved1
,
TargetDataRep
,
pInput
,
Reserved1
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
if
(
phCredential
)
...
...
@@ -181,7 +181,7 @@ static SECURITY_STATUS SEC_ENTRY nego_AcceptSecurityContext(
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %p %p %
ld %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
pInput
,
TRACE
(
"%p %p %p %
d %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
pInput
,
fContextReq
,
TargetDataRep
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
if
(
phCredential
)
...
...
@@ -258,7 +258,7 @@ static SECURITY_STATUS SEC_ENTRY nego_ApplyControlToken(PCtxtHandle phContext,
* QueryContextAttributesW
*/
static
SECURITY_STATUS
SEC_ENTRY
nego_QueryContextAttributesW
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
)
{
SECURITY_STATUS
ret
;
...
...
@@ -266,7 +266,7 @@ static SECURITY_STATUS SEC_ENTRY nego_QueryContextAttributesW(PCtxtHandle phCont
* the SecurePackage part and the dwLower part is the actual context
* handle. It should be easy to extract the context attributes from that.
*/
TRACE
(
"%p %
l
d %p
\n
"
,
phContext
,
ulAttribute
,
pBuffer
);
TRACE
(
"%p %d %p
\n
"
,
phContext
,
ulAttribute
,
pBuffer
);
if
(
phContext
)
{
ret
=
SEC_E_UNSUPPORTED_FUNCTION
;
...
...
@@ -282,7 +282,7 @@ static SECURITY_STATUS SEC_ENTRY nego_QueryContextAttributesW(PCtxtHandle phCont
* QueryContextAttributesA
*/
static
SECURITY_STATUS
SEC_ENTRY
nego_QueryContextAttributesA
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
)
{
return
nego_QueryContextAttributesW
(
phContext
,
ulAttribute
,
pBuffer
);
}
...
...
@@ -333,7 +333,7 @@ static SECURITY_STATUS SEC_ENTRY nego_MakeSignature(PCtxtHandle phContext, ULONG
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %
ld %p %l
d
\n
"
,
phContext
,
fQOP
,
pMessage
,
MessageSeqNo
);
TRACE
(
"%p %
d %p %
d
\n
"
,
phContext
,
fQOP
,
pMessage
,
MessageSeqNo
);
if
(
phContext
)
{
ret
=
SEC_E_UNSUPPORTED_FUNCTION
;
...
...
@@ -353,7 +353,7 @@ static SECURITY_STATUS SEC_ENTRY nego_VerifySignature(PCtxtHandle phContext,
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %p %
l
d %p
\n
"
,
phContext
,
pMessage
,
MessageSeqNo
,
pfQOP
);
TRACE
(
"%p %p %d %p
\n
"
,
phContext
,
pMessage
,
MessageSeqNo
,
pfQOP
);
if
(
phContext
)
{
ret
=
SEC_E_UNSUPPORTED_FUNCTION
;
...
...
dlls/secur32/ntlm.c
View file @
2638e9d4
...
...
@@ -43,7 +43,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_QueryCredentialsAttributesA(
{
SECURITY_STATUS
ret
;
TRACE
(
"(%p, %
l
d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
TRACE
(
"(%p, %d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
if
(
ulAttribute
==
SECPKG_ATTR_NAMES
)
{
...
...
@@ -64,7 +64,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_QueryCredentialsAttributesW(
{
SECURITY_STATUS
ret
;
TRACE
(
"(%p, %
l
d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
TRACE
(
"(%p, %d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
if
(
ulAttribute
==
SECPKG_ATTR_NAMES
)
{
...
...
@@ -100,7 +100,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_AcquireCredentialsHandleW(
server_helper_protocol
,
NULL
};
TRACE
(
"(%s, %s, 0x%08
l
x, %p, %p, %p, %p, %p, %p)
\n
"
,
TRACE
(
"(%s, %s, 0x%08x, %p, %p, %p, %p, %p, %p)
\n
"
,
debugstr_w
(
pszPrincipal
),
debugstr_w
(
pszPackage
),
fCredentialUse
,
pLogonID
,
pAuthData
,
pGetKeyFn
,
pGetKeyArgument
,
phCredential
,
ptsExpiry
);
...
...
@@ -273,7 +273,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_AcquireCredentialsHandleA(
PSEC_WINNT_AUTH_IDENTITY_W
pAuthDataW
=
NULL
;
PSEC_WINNT_AUTH_IDENTITY_A
identity
=
NULL
;
TRACE
(
"(%s, %s, 0x%08
l
x, %p, %p, %p, %p, %p, %p)
\n
"
,
TRACE
(
"(%s, %s, 0x%08x, %p, %p, %p, %p, %p, %p)
\n
"
,
debugstr_a
(
pszPrincipal
),
debugstr_a
(
pszPackage
),
fCredentialUse
,
pLogonID
,
pAuthData
,
pGetKeyFn
,
pGetKeyArgument
,
phCredential
,
ptsExpiry
);
...
...
@@ -384,7 +384,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextW(
PBYTE
bin
;
int
buffer_len
,
bin_len
,
max_len
=
NTLM_MAX_BUF
;
TRACE
(
"%p %p %s %
ld %ld %ld %p %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
TRACE
(
"%p %p %s %
d %d %d %p %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
debugstr_w
(
pszTargetName
),
fContextReq
,
Reserved1
,
TargetDataRep
,
pInput
,
Reserved1
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
...
...
@@ -731,7 +731,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextA(
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %p %s %
ld %ld %ld %p %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
TRACE
(
"%p %p %s %
d %d %d %p %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
debugstr_a
(
pszTargetName
),
fContextReq
,
Reserved1
,
TargetDataRep
,
pInput
,
Reserved1
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
...
...
@@ -776,7 +776,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_AcceptSecurityContext(
ULONG
ctxt_attr
=
0
;
PNegoHelper
helper
;
TRACE
(
"%p %p %p %
ld %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
pInput
,
TRACE
(
"%p %p %p %
d %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
pInput
,
fContextReq
,
TargetDataRep
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
...
...
@@ -1101,9 +1101,9 @@ static SECURITY_STATUS SEC_ENTRY ntlm_DeleteSecurityContext(PCtxtHandle phContex
* QueryContextAttributesW
*/
static
SECURITY_STATUS
SEC_ENTRY
ntlm_QueryContextAttributesW
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
)
{
TRACE
(
"%p %
l
d %p
\n
"
,
phContext
,
ulAttribute
,
pBuffer
);
TRACE
(
"%p %d %p
\n
"
,
phContext
,
ulAttribute
,
pBuffer
);
if
(
!
phContext
)
return
SEC_E_INVALID_HANDLE
;
...
...
@@ -1146,7 +1146,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_QueryContextAttributesW(PCtxtHandle phCont
_x
(
SECPKG_ATTR_TARGET_INFORMATION
);
#undef _x
default:
TRACE
(
"Unknown value %
l
d passed for ulAttribute
\n
"
,
ulAttribute
);
TRACE
(
"Unknown value %d passed for ulAttribute
\n
"
,
ulAttribute
);
}
return
SEC_E_UNSUPPORTED_FUNCTION
;
...
...
@@ -1156,7 +1156,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_QueryContextAttributesW(PCtxtHandle phCont
* QueryContextAttributesA
*/
static
SECURITY_STATUS
SEC_ENTRY
ntlm_QueryContextAttributesA
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
)
{
return
ntlm_QueryContextAttributesW
(
phContext
,
ulAttribute
,
pBuffer
);
}
...
...
@@ -1208,12 +1208,12 @@ static SECURITY_STATUS SEC_ENTRY ntlm_MakeSignature(PCtxtHandle phContext, ULONG
PNegoHelper
helper
;
ULONG
sign_version
=
1
;
TRACE
(
"%p %
ld %p %l
d
\n
"
,
phContext
,
fQOP
,
pMessage
,
MessageSeqNo
);
TRACE
(
"%p %
d %p %
d
\n
"
,
phContext
,
fQOP
,
pMessage
,
MessageSeqNo
);
if
(
!
phContext
)
return
SEC_E_INVALID_HANDLE
;
if
(
fQOP
)
FIXME
(
"Ignoring fQOP 0x%08
l
x
\n
"
,
fQOP
);
FIXME
(
"Ignoring fQOP 0x%08x
\n
"
,
fQOP
);
if
(
MessageSeqNo
)
FIXME
(
"Ignoring MessageSeqNo
\n
"
);
...
...
@@ -1287,7 +1287,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_VerifySignature(PCtxtHandle phContext,
PNegoHelper
helper
;
ULONG
fQOP
=
0
;
TRACE
(
"%p %p %
l
d %p
\n
"
,
phContext
,
pMessage
,
MessageSeqNo
,
pfQOP
);
TRACE
(
"%p %p %d %p
\n
"
,
phContext
,
pMessage
,
MessageSeqNo
,
pfQOP
);
if
(
!
phContext
)
return
SEC_E_INVALID_HANDLE
;
...
...
@@ -1390,7 +1390,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_EncryptMessage(PCtxtHandle phContext,
ULONG
fQOP
,
PSecBufferDesc
pMessage
,
ULONG
MessageSeqNo
)
{
PNegoHelper
helper
;
TRACE
(
"(%p %
ld %p %l
d)
\n
"
,
phContext
,
fQOP
,
pMessage
,
MessageSeqNo
);
TRACE
(
"(%p %
d %p %
d)
\n
"
,
phContext
,
fQOP
,
pMessage
,
MessageSeqNo
);
if
(
!
phContext
)
return
SEC_E_INVALID_HANDLE
;
...
...
@@ -1460,7 +1460,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_DecryptMessage(PCtxtHandle phContext,
SECURITY_STATUS
ret
;
ULONG
ntlmssp_flags_save
;
PNegoHelper
helper
;
TRACE
(
"(%p %p %
l
d %p)
\n
"
,
phContext
,
pMessage
,
MessageSeqNo
,
pfQOP
);
TRACE
(
"(%p %p %d %p)
\n
"
,
phContext
,
pMessage
,
MessageSeqNo
,
pfQOP
);
if
(
!
phContext
)
return
SEC_E_INVALID_HANDLE
;
...
...
dlls/secur32/schannel.c
View file @
2638e9d4
...
...
@@ -39,7 +39,7 @@ static SECURITY_STATUS schan_QueryCredentialsAttributes(
if
(
pBuffer
)
{
/* FIXME: get from CryptoAPI */
FIXME
(
"%
l
d: stub
\n
"
,
ulAttribute
);
FIXME
(
"%d: stub
\n
"
,
ulAttribute
);
ret
=
SEC_E_UNSUPPORTED_FUNCTION
;
}
else
...
...
@@ -49,7 +49,7 @@ static SECURITY_STATUS schan_QueryCredentialsAttributes(
if
(
pBuffer
)
{
/* FIXME: get from CryptoAPI */
FIXME
(
"%
l
d: stub
\n
"
,
ulAttribute
);
FIXME
(
"%d: stub
\n
"
,
ulAttribute
);
ret
=
SEC_E_UNSUPPORTED_FUNCTION
;
}
else
...
...
@@ -59,7 +59,7 @@ static SECURITY_STATUS schan_QueryCredentialsAttributes(
if
(
pBuffer
)
{
/* FIXME: get from OpenSSL? */
FIXME
(
"%
l
d: stub
\n
"
,
ulAttribute
);
FIXME
(
"%d: stub
\n
"
,
ulAttribute
);
ret
=
SEC_E_UNSUPPORTED_FUNCTION
;
}
else
...
...
@@ -76,7 +76,7 @@ static SECURITY_STATUS SEC_ENTRY schan_QueryCredentialsAttributesA(
{
SECURITY_STATUS
ret
;
TRACE
(
"(%p, %
l
d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
TRACE
(
"(%p, %d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
switch
(
ulAttribute
)
{
...
...
@@ -96,7 +96,7 @@ static SECURITY_STATUS SEC_ENTRY schan_QueryCredentialsAttributesW(
{
SECURITY_STATUS
ret
;
TRACE
(
"(%p, %
l
d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
TRACE
(
"(%p, %d, %p)
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
switch
(
ulAttribute
)
{
...
...
@@ -212,7 +212,7 @@ static SECURITY_STATUS SEC_ENTRY schan_AcquireCredentialsHandleA(
PLUID
pLogonID
,
PVOID
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
PVOID
pGetKeyArgument
,
PCredHandle
phCredential
,
PTimeStamp
ptsExpiry
)
{
TRACE
(
"(%s, %s, 0x%08
l
x, %p, %p, %p, %p, %p, %p)
\n
"
,
TRACE
(
"(%s, %s, 0x%08x, %p, %p, %p, %p, %p, %p)
\n
"
,
debugstr_a
(
pszPrincipal
),
debugstr_a
(
pszPackage
),
fCredentialUse
,
pLogonID
,
pAuthData
,
pGetKeyFn
,
pGetKeyArgument
,
phCredential
,
ptsExpiry
);
return
schan_AcquireCredentialsHandle
(
fCredentialUse
,
...
...
@@ -224,7 +224,7 @@ static SECURITY_STATUS SEC_ENTRY schan_AcquireCredentialsHandleW(
PLUID
pLogonID
,
PVOID
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
PVOID
pGetKeyArgument
,
PCredHandle
phCredential
,
PTimeStamp
ptsExpiry
)
{
TRACE
(
"(%s, %s, 0x%08
l
x, %p, %p, %p, %p, %p, %p)
\n
"
,
TRACE
(
"(%s, %s, 0x%08x, %p, %p, %p, %p, %p, %p)
\n
"
,
debugstr_w
(
pszPrincipal
),
debugstr_w
(
pszPackage
),
fCredentialUse
,
pLogonID
,
pAuthData
,
pGetKeyFn
,
pGetKeyArgument
,
phCredential
,
ptsExpiry
);
return
schan_AcquireCredentialsHandle
(
fCredentialUse
,
...
...
@@ -249,7 +249,7 @@ static SECURITY_STATUS SEC_ENTRY schan_InitializeSecurityContextA(
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %p %s %
ld %ld %ld %p %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
TRACE
(
"%p %p %s %
d %d %d %p %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
debugstr_a
(
pszTargetName
),
fContextReq
,
Reserved1
,
TargetDataRep
,
pInput
,
Reserved1
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
if
(
phCredential
)
...
...
@@ -275,7 +275,7 @@ static SECURITY_STATUS SEC_ENTRY schan_InitializeSecurityContextW(
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %p %s %
ld %ld %ld %p %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
TRACE
(
"%p %p %s %
d %d %d %p %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
debugstr_w
(
pszTargetName
),
fContextReq
,
Reserved1
,
TargetDataRep
,
pInput
,
Reserved1
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
if
(
phCredential
)
...
...
dlls/secur32/secur32.c
View file @
2638e9d4
...
...
@@ -745,7 +745,7 @@ SECURITY_STATUS WINAPI EnumerateSecurityPackagesW(PULONG pcPackages,
memcpy
(
pkgInfo
,
&
package
->
infoW
,
sizeof
(
SecPkgInfoW
));
if
(
package
->
infoW
.
Name
)
{
TRACE
(
"Name[%
l
d] = %s
\n
"
,
i
-
1
,
debugstr_w
(
package
->
infoW
.
Name
));
TRACE
(
"Name[%d] = %s
\n
"
,
i
-
1
,
debugstr_w
(
package
->
infoW
.
Name
));
pkgInfo
->
Name
=
nextString
;
lstrcpyW
(
nextString
,
package
->
infoW
.
Name
);
nextString
+=
lstrlenW
(
nextString
)
+
1
;
...
...
@@ -754,7 +754,7 @@ SECURITY_STATUS WINAPI EnumerateSecurityPackagesW(PULONG pcPackages,
pkgInfo
->
Name
=
NULL
;
if
(
package
->
infoW
.
Comment
)
{
TRACE
(
"Comment[%
l
d] = %s
\n
"
,
i
-
1
,
debugstr_w
(
package
->
infoW
.
Comment
));
TRACE
(
"Comment[%d] = %s
\n
"
,
i
-
1
,
debugstr_w
(
package
->
infoW
.
Comment
));
pkgInfo
->
Comment
=
nextString
;
lstrcpyW
(
nextString
,
package
->
infoW
.
Comment
);
nextString
+=
lstrlenW
(
nextString
)
+
1
;
...
...
@@ -768,7 +768,7 @@ SECURITY_STATUS WINAPI EnumerateSecurityPackagesW(PULONG pcPackages,
}
}
LeaveCriticalSection
(
&
cs
);
TRACE
(
"<-- 0x%08
l
x
\n
"
,
ret
);
TRACE
(
"<-- 0x%08x
\n
"
,
ret
);
return
ret
;
}
...
...
@@ -943,7 +943,7 @@ BOOLEAN WINAPI GetComputerObjectNameW(
if
(
ntStatus
!=
STATUS_SUCCESS
)
{
SetLastError
(
LsaNtStatusToWinError
(
ntStatus
));
WARN
(
"LsaOpenPolicy failed with NT status %
l
x
\n
"
,
GetLastError
());
WARN
(
"LsaOpenPolicy failed with NT status %x
\n
"
,
GetLastError
());
return
FALSE
;
}
...
...
@@ -953,7 +953,7 @@ BOOLEAN WINAPI GetComputerObjectNameW(
if
(
ntStatus
!=
STATUS_SUCCESS
)
{
SetLastError
(
LsaNtStatusToWinError
(
ntStatus
));
WARN
(
"LsaQueryInformationPolicy failed with NT status %
l
x
\n
"
,
WARN
(
"LsaQueryInformationPolicy failed with NT status %x
\n
"
,
GetLastError
());
LsaClose
(
policyHandle
);
return
FALSE
;
...
...
@@ -1050,7 +1050,7 @@ NTSTATUS WINAPI LsaCallAuthenticationPackage(
ULONG
SubmitBufferLength
,
PVOID
*
ProtocolReturnBuffer
,
PULONG
ReturnBufferLength
,
PNTSTATUS
ProtocolStatus
)
{
FIXME
(
"%p %
ld %p %l
d %p %p %p
\n
"
,
LsaHandle
,
AuthenticationPackage
,
FIXME
(
"%p %
d %p %
d %p %p %p
\n
"
,
LsaHandle
,
AuthenticationPackage
,
ProtocolSubmitBuffer
,
SubmitBufferLength
,
ProtocolReturnBuffer
,
ReturnBufferLength
,
ProtocolStatus
);
return
0
;
...
...
dlls/secur32/thunks.c
View file @
2638e9d4
...
...
@@ -38,7 +38,7 @@ SECURITY_STATUS SEC_ENTRY thunk_AcquireCredentialsHandleA(
{
SECURITY_STATUS
ret
;
TRACE
(
"%s %s %
l
d %p %p %p %p %p %p
\n
"
,
debugstr_a
(
pszPrincipal
),
TRACE
(
"%s %s %d %p %p %p %p %p %p
\n
"
,
debugstr_a
(
pszPrincipal
),
debugstr_a
(
pszPackage
),
fCredentialsUse
,
pvLogonID
,
pAuthData
,
pGetKeyFn
,
pvGetKeyArgument
,
phCredential
,
ptsExpiry
);
if
(
pszPackage
)
...
...
@@ -65,7 +65,7 @@ SECURITY_STATUS SEC_ENTRY thunk_AcquireCredentialsHandleW(
{
SECURITY_STATUS
ret
;
TRACE
(
"%s %s %
l
d %p %p %p %p %p %p
\n
"
,
debugstr_w
(
pszPrincipal
),
TRACE
(
"%s %s %d %p %p %p %p %p %p
\n
"
,
debugstr_w
(
pszPrincipal
),
debugstr_w
(
pszPackage
),
fCredentialsUse
,
pvLogonID
,
pAuthData
,
pGetKeyFn
,
pvGetKeyArgument
,
phCredential
,
ptsExpiry
);
if
(
pszPackage
)
...
...
@@ -89,11 +89,11 @@ SECURITY_STATUS SEC_ENTRY thunk_AcquireCredentialsHandleW(
* so we have to know about every type the caller does
*/
SECURITY_STATUS
SEC_ENTRY
thunk_QueryCredentialsAttributesA
(
PCredHandle
phCredential
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
PCredHandle
phCredential
,
ULONG
ulAttribute
,
void
*
pBuffer
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %
l
d %p
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
TRACE
(
"%p %d %p
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
if
(
phCredential
)
{
SecurePackage
*
package
=
(
SecurePackage
*
)
phCredential
->
dwUpper
;
...
...
@@ -125,7 +125,7 @@ SECURITY_STATUS SEC_ENTRY thunk_QueryCredentialsAttributesA(
break
;
}
default:
WARN
(
"attribute type %
l
d unknown
\n
"
,
ulAttribute
);
WARN
(
"attribute type %d unknown
\n
"
,
ulAttribute
);
ret
=
SEC_E_INTERNAL_ERROR
;
}
}
...
...
@@ -142,11 +142,11 @@ SECURITY_STATUS SEC_ENTRY thunk_QueryCredentialsAttributesA(
}
SECURITY_STATUS
SEC_ENTRY
thunk_QueryCredentialsAttributesW
(
PCredHandle
phCredential
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
PCredHandle
phCredential
,
ULONG
ulAttribute
,
void
*
pBuffer
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %
l
d %p
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
TRACE
(
"%p %d %p
\n
"
,
phCredential
,
ulAttribute
,
pBuffer
);
if
(
phCredential
)
{
SecurePackage
*
package
=
(
SecurePackage
*
)
phCredential
->
dwUpper
;
...
...
@@ -178,7 +178,7 @@ SECURITY_STATUS SEC_ENTRY thunk_QueryCredentialsAttributesW(
break
;
}
default:
WARN
(
"attribute type %
l
d unknown
\n
"
,
ulAttribute
);
WARN
(
"attribute type %d unknown
\n
"
,
ulAttribute
);
ret
=
SEC_E_INTERNAL_ERROR
;
}
}
...
...
@@ -196,14 +196,14 @@ SECURITY_STATUS SEC_ENTRY thunk_QueryCredentialsAttributesW(
SECURITY_STATUS
SEC_ENTRY
thunk_InitializeSecurityContextA
(
PCredHandle
phCredential
,
PCtxtHandle
phContext
,
SEC_CHAR
*
pszTargetName
,
unsigned
long
fContextReq
,
unsigned
long
Reserved1
,
unsigned
long
TargetDataRep
,
PSecBufferDesc
pInput
,
unsigned
long
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
unsigned
long
*
pfContextAttr
,
PTimeStamp
ptsExpiry
)
SEC_CHAR
*
pszTargetName
,
ULONG
fContextReq
,
ULONG
Reserved1
,
ULONG
TargetDataRep
,
PSecBufferDesc
pInput
,
ULONG
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
ULONG
*
pfContextAttr
,
PTimeStamp
ptsExpiry
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %p %s %
ld %ld %ld %p %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
TRACE
(
"%p %p %s %
d %d %d %p %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
debugstr_a
(
pszTargetName
),
fContextReq
,
Reserved1
,
TargetDataRep
,
pInput
,
Reserved1
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
if
(
phCredential
)
...
...
@@ -236,14 +236,14 @@ SECURITY_STATUS SEC_ENTRY thunk_InitializeSecurityContextA(
SECURITY_STATUS
SEC_ENTRY
thunk_InitializeSecurityContextW
(
PCredHandle
phCredential
,
PCtxtHandle
phContext
,
SEC_WCHAR
*
pszTargetName
,
unsigned
long
fContextReq
,
unsigned
long
Reserved1
,
unsigned
long
TargetDataRep
,
PSecBufferDesc
pInput
,
unsigned
long
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
unsigned
long
*
pfContextAttr
,
PTimeStamp
ptsExpiry
)
SEC_WCHAR
*
pszTargetName
,
ULONG
fContextReq
,
ULONG
Reserved1
,
ULONG
TargetDataRep
,
PSecBufferDesc
pInput
,
ULONG
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
ULONG
*
pfContextAttr
,
PTimeStamp
ptsExpiry
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %p %s %
ld %ld %ld %p %l
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
TRACE
(
"%p %p %s %
d %d %d %p %
d %p %p %p %p
\n
"
,
phCredential
,
phContext
,
debugstr_w
(
pszTargetName
),
fContextReq
,
Reserved1
,
TargetDataRep
,
pInput
,
Reserved1
,
phNewContext
,
pOutput
,
pfContextAttr
,
ptsExpiry
);
if
(
phCredential
)
...
...
@@ -274,13 +274,13 @@ SECURITY_STATUS SEC_ENTRY thunk_InitializeSecurityContextW(
}
SECURITY_STATUS
SEC_ENTRY
thunk_AddCredentialsA
(
PCredHandle
hCredentials
,
SEC_CHAR
*
pszPrincipal
,
SEC_CHAR
*
pszPackage
,
unsigned
long
fCredentialUse
,
SEC_CHAR
*
pszPrincipal
,
SEC_CHAR
*
pszPackage
,
ULONG
fCredentialUse
,
void
*
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
void
*
pvGetKeyArgument
,
PTimeStamp
ptsExpiry
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %s %s %
l
d %p %p %p %p
\n
"
,
hCredentials
,
debugstr_a
(
pszPrincipal
),
TRACE
(
"%p %s %s %d %p %p %p %p
\n
"
,
hCredentials
,
debugstr_a
(
pszPrincipal
),
debugstr_a
(
pszPackage
),
fCredentialUse
,
pAuthData
,
pGetKeyFn
,
pvGetKeyArgument
,
ptsExpiry
);
if
(
hCredentials
)
...
...
@@ -314,13 +314,13 @@ SECURITY_STATUS SEC_ENTRY thunk_AddCredentialsA(PCredHandle hCredentials,
}
SECURITY_STATUS
SEC_ENTRY
thunk_AddCredentialsW
(
PCredHandle
hCredentials
,
SEC_WCHAR
*
pszPrincipal
,
SEC_WCHAR
*
pszPackage
,
unsigned
long
fCredentialUse
,
SEC_WCHAR
*
pszPrincipal
,
SEC_WCHAR
*
pszPackage
,
ULONG
fCredentialUse
,
void
*
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
void
*
pvGetKeyArgument
,
PTimeStamp
ptsExpiry
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %s %s %
l
d %p %p %p %p
\n
"
,
hCredentials
,
debugstr_w
(
pszPrincipal
),
TRACE
(
"%p %s %s %d %p %p %p %p
\n
"
,
hCredentials
,
debugstr_w
(
pszPrincipal
),
debugstr_w
(
pszPackage
),
fCredentialUse
,
pAuthData
,
pGetKeyFn
,
pvGetKeyArgument
,
ptsExpiry
);
if
(
hCredentials
)
...
...
@@ -404,7 +404,7 @@ static PSecPkgInfoA _copyPackageInfoFlatWToA(PSecPkgInfoW infoW)
}
static
SECURITY_STATUS
thunk_ContextAttributesWToA
(
SecurePackage
*
package
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
)
{
SECURITY_STATUS
ret
=
SEC_E_OK
;
...
...
@@ -536,7 +536,7 @@ static SECURITY_STATUS thunk_ContextAttributesWToA(SecurePackage *package,
case
SECPKG_ATTR_TARGET_INFORMATION
:
break
;
default:
WARN
(
"attribute type %
l
d unknown
\n
"
,
ulAttribute
);
WARN
(
"attribute type %d unknown
\n
"
,
ulAttribute
);
ret
=
SEC_E_INTERNAL_ERROR
;
}
}
...
...
@@ -546,11 +546,11 @@ static SECURITY_STATUS thunk_ContextAttributesWToA(SecurePackage *package,
}
SECURITY_STATUS
SEC_ENTRY
thunk_QueryContextAttributesA
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %
l
d %p
\n
"
,
phContext
,
ulAttribute
,
pBuffer
);
TRACE
(
"%p %d %p
\n
"
,
phContext
,
ulAttribute
,
pBuffer
);
if
(
phContext
)
{
SecurePackage
*
package
=
(
SecurePackage
*
)
phContext
->
dwUpper
;
...
...
@@ -629,7 +629,7 @@ static PSecPkgInfoW _copyPackageInfoFlatAToW(PSecPkgInfoA infoA)
}
static
SECURITY_STATUS
thunk_ContextAttributesAToW
(
SecurePackage
*
package
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
)
{
SECURITY_STATUS
ret
=
SEC_E_OK
;
...
...
@@ -762,7 +762,7 @@ static SECURITY_STATUS thunk_ContextAttributesAToW(SecurePackage *package,
case
SECPKG_ATTR_TARGET_INFORMATION
:
break
;
default:
WARN
(
"attribute type %
l
d unknown
\n
"
,
ulAttribute
);
WARN
(
"attribute type %d unknown
\n
"
,
ulAttribute
);
ret
=
SEC_E_INTERNAL_ERROR
;
}
}
...
...
@@ -772,11 +772,11 @@ static SECURITY_STATUS thunk_ContextAttributesAToW(SecurePackage *package,
}
SECURITY_STATUS
SEC_ENTRY
thunk_QueryContextAttributesW
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %
l
d %p
\n
"
,
phContext
,
ulAttribute
,
pBuffer
);
TRACE
(
"%p %d %p
\n
"
,
phContext
,
ulAttribute
,
pBuffer
);
if
(
phContext
)
{
SecurePackage
*
package
=
(
SecurePackage
*
)
phContext
->
dwUpper
;
...
...
@@ -804,11 +804,11 @@ SECURITY_STATUS SEC_ENTRY thunk_QueryContextAttributesW(PCtxtHandle phContext,
}
SECURITY_STATUS
SEC_ENTRY
thunk_SetContextAttributesA
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
,
unsigned
long
cbBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
,
ULONG
cbBuffer
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %
ld %p %l
d
\n
"
,
phContext
,
ulAttribute
,
pBuffer
,
cbBuffer
);
TRACE
(
"%p %
d %p %
d
\n
"
,
phContext
,
ulAttribute
,
pBuffer
,
cbBuffer
);
if
(
phContext
)
{
SecurePackage
*
package
=
(
SecurePackage
*
)
phContext
->
dwUpper
;
...
...
@@ -837,11 +837,11 @@ SECURITY_STATUS SEC_ENTRY thunk_SetContextAttributesA(PCtxtHandle phContext,
}
SECURITY_STATUS
SEC_ENTRY
thunk_SetContextAttributesW
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
,
unsigned
long
cbBuffer
)
ULONG
ulAttribute
,
void
*
pBuffer
,
ULONG
cbBuffer
)
{
SECURITY_STATUS
ret
;
TRACE
(
"%p %
ld %p %l
d
\n
"
,
phContext
,
ulAttribute
,
pBuffer
,
cbBuffer
);
TRACE
(
"%p %
d %p %
d
\n
"
,
phContext
,
ulAttribute
,
pBuffer
,
cbBuffer
);
if
(
phContext
)
{
SecurePackage
*
package
=
(
SecurePackage
*
)
phContext
->
dwUpper
;
...
...
dlls/secur32/thunks.h
View file @
2638e9d4
...
...
@@ -34,16 +34,16 @@ SECURITY_STATUS SEC_ENTRY thunk_AcquireCredentialsHandleW(
PVOID
pvGetKeyArgument
,
PCredHandle
phCredential
,
PTimeStamp
ptsExpiry
);
SECURITY_STATUS
SEC_ENTRY
thunk_InitializeSecurityContextA
(
PCredHandle
phCredential
,
PCtxtHandle
phContext
,
SEC_CHAR
*
pszTargetName
,
unsigned
long
fContextReq
,
unsigned
long
Reserved1
,
unsigned
long
TargetDataRep
,
PSecBufferDesc
pInput
,
unsigned
long
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
unsigned
long
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
SEC_CHAR
*
pszTargetName
,
ULONG
fContextReq
,
ULONG
Reserved1
,
ULONG
TargetDataRep
,
PSecBufferDesc
pInput
,
ULONG
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
ULONG
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
SECURITY_STATUS
SEC_ENTRY
thunk_InitializeSecurityContextW
(
PCredHandle
phCredential
,
PCtxtHandle
phContext
,
SEC_WCHAR
*
pszTargetName
,
unsigned
long
fContextReq
,
unsigned
long
Reserved1
,
unsigned
long
TargetDataRep
,
PSecBufferDesc
pInput
,
unsigned
long
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
unsigned
long
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
SEC_WCHAR
*
pszTargetName
,
ULONG
fContextReq
,
ULONG
Reserved1
,
ULONG
TargetDataRep
,
PSecBufferDesc
pInput
,
ULONG
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
ULONG
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
SECURITY_STATUS
SEC_ENTRY
thunk_ImportSecurityContextA
(
SEC_CHAR
*
pszPackage
,
PSecBuffer
pPackedContext
,
void
*
Token
,
PCtxtHandle
phContext
);
...
...
@@ -51,24 +51,24 @@ SECURITY_STATUS SEC_ENTRY thunk_ImportSecurityContextW(
SEC_WCHAR
*
pszPackage
,
PSecBuffer
pPackedContext
,
void
*
Token
,
PCtxtHandle
phContext
);
SECURITY_STATUS
SEC_ENTRY
thunk_AddCredentialsA
(
PCredHandle
hCredentials
,
SEC_CHAR
*
pszPrincipal
,
SEC_CHAR
*
pszPackage
,
unsigned
long
fCredentialUse
,
SEC_CHAR
*
pszPrincipal
,
SEC_CHAR
*
pszPackage
,
ULONG
fCredentialUse
,
void
*
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
void
*
pvGetKeyArgument
,
PTimeStamp
ptsExpiry
);
SECURITY_STATUS
SEC_ENTRY
thunk_AddCredentialsW
(
PCredHandle
hCredentials
,
SEC_WCHAR
*
pszPrincipal
,
SEC_WCHAR
*
pszPackage
,
unsigned
long
fCredentialUse
,
SEC_WCHAR
*
pszPrincipal
,
SEC_WCHAR
*
pszPackage
,
ULONG
fCredentialUse
,
void
*
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
void
*
pvGetKeyArgument
,
PTimeStamp
ptsExpiry
);
SECURITY_STATUS
SEC_ENTRY
thunk_QueryCredentialsAttributesA
(
PCredHandle
phCredential
,
unsigned
long
ulAttribute
,
void
*
pBuffer
);
PCredHandle
phCredential
,
ULONG
ulAttribute
,
void
*
pBuffer
);
SECURITY_STATUS
SEC_ENTRY
thunk_QueryCredentialsAttributesW
(
PCredHandle
phCredential
,
unsigned
long
ulAttribute
,
void
*
pBuffer
);
PCredHandle
phCredential
,
ULONG
ulAttribute
,
void
*
pBuffer
);
SECURITY_STATUS
SEC_ENTRY
thunk_QueryContextAttributesA
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
);
PCtxtHandle
phContext
,
ULONG
ulAttribute
,
void
*
pBuffer
);
SECURITY_STATUS
SEC_ENTRY
thunk_QueryContextAttributesW
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
);
PCtxtHandle
phContext
,
ULONG
ulAttribute
,
void
*
pBuffer
);
SECURITY_STATUS
SEC_ENTRY
thunk_SetContextAttributesA
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
,
unsigned
long
cbBuffer
);
ULONG
ulAttribute
,
void
*
pBuffer
,
ULONG
cbBuffer
);
SECURITY_STATUS
SEC_ENTRY
thunk_SetContextAttributesW
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
,
unsigned
long
cbBuffer
);
ULONG
ulAttribute
,
void
*
pBuffer
,
ULONG
cbBuffer
);
#endif
/* ndef __SECUR32_THUNKS_H__ */
dlls/secur32/wrapper.c
View file @
2638e9d4
This diff is collapsed.
Click to expand it.
include/sspi.h
View file @
2638e9d4
...
...
@@ -172,15 +172,15 @@ typedef SECURITY_STATUS (SEC_ENTRY *ENUMERATE_SECURITY_PACKAGES_FN_W)(PULONG,
#define ENUMERATE_SECURITY_PACKAGES_FN WINELIB_NAME_AW(ENUMERATE_SECURITY_PACKAGES_FN_)
SECURITY_STATUS
SEC_ENTRY
QueryCredentialsAttributesA
(
PCredHandle
phCredential
,
unsigned
long
ulAttribute
,
void
*
pBuffer
);
PCredHandle
phCredential
,
ULONG
ulAttribute
,
void
*
pBuffer
);
SECURITY_STATUS
SEC_ENTRY
QueryCredentialsAttributesW
(
PCredHandle
phCredential
,
unsigned
long
ulAttribute
,
void
*
pBuffer
);
PCredHandle
phCredential
,
ULONG
ulAttribute
,
void
*
pBuffer
);
#define QueryCredentialsAttributes WINELIB_NAME_AW(QueryCredentialsAttributes)
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
QUERY_CREDENTIALS_ATTRIBUTES_FN_A
)
(
PCredHandle
,
unsigned
long
,
PVOID
);
(
PCredHandle
,
ULONG
,
PVOID
);
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
QUERY_CREDENTIALS_ATTRIBUTES_FN_W
)
(
PCredHandle
,
unsigned
long
,
PVOID
);
(
PCredHandle
,
ULONG
,
PVOID
);
#define QUERY_CREDENTIALS_ATTRIBUTES_FN WINELIB_NAME_AW(QUERY_CREDENTIALS_ATTRIBUTES_FN_)
/* values for QueryCredentialsAttributes ulAttribute */
...
...
@@ -237,26 +237,24 @@ typedef SECURITY_STATUS (SEC_ENTRY *FREE_CREDENTIALS_HANDLE_FN)(PCredHandle);
SECURITY_STATUS
SEC_ENTRY
InitializeSecurityContextA
(
PCredHandle
phCredential
,
PCtxtHandle
phContext
,
SEC_CHAR
*
pszTargetName
,
unsigned
long
fContextReq
,
unsigned
long
Reserved1
,
unsigned
long
TargetDataRep
,
PSecBufferDesc
pInput
,
unsigned
long
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
unsigned
long
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
SEC_CHAR
*
pszTargetName
,
ULONG
fContextReq
,
ULONG
Reserved1
,
ULONG
TargetDataRep
,
PSecBufferDesc
pInput
,
ULONG
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
ULONG
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
SECURITY_STATUS
SEC_ENTRY
InitializeSecurityContextW
(
PCredHandle
phCredential
,
PCtxtHandle
phContext
,
SEC_WCHAR
*
pszTargetName
,
unsigned
long
fContextReq
,
unsigned
long
Reserved1
,
unsigned
long
TargetDataRep
,
PSecBufferDesc
pInput
,
unsigned
long
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
unsigned
long
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
SEC_WCHAR
*
pszTargetName
,
ULONG
fContextReq
,
ULONG
Reserved1
,
ULONG
TargetDataRep
,
PSecBufferDesc
pInput
,
ULONG
Reserved2
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
ULONG
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
#define InitializeSecurityContext WINELIB_NAME_AW(InitializeSecurityContext)
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
INITIALIZE_SECURITY_CONTEXT_FN_A
)
(
PCredHandle
,
PCtxtHandle
,
SEC_CHAR
*
,
unsigned
long
,
unsigned
long
,
unsigned
long
,
PSecBufferDesc
,
unsigned
long
,
PCtxtHandle
,
PSecBufferDesc
,
unsigned
long
*
,
PTimeStamp
);
(
PCredHandle
,
PCtxtHandle
,
SEC_CHAR
*
,
ULONG
,
ULONG
,
ULONG
,
PSecBufferDesc
,
ULONG
,
PCtxtHandle
,
PSecBufferDesc
,
ULONG
*
,
PTimeStamp
);
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
INITIALIZE_SECURITY_CONTEXT_FN_W
)
(
PCredHandle
,
PCtxtHandle
,
SEC_WCHAR
*
,
unsigned
long
,
unsigned
long
,
unsigned
long
,
PSecBufferDesc
,
unsigned
long
,
PCtxtHandle
,
PSecBufferDesc
,
unsigned
long
*
,
PTimeStamp
);
(
PCredHandle
,
PCtxtHandle
,
SEC_WCHAR
*
,
ULONG
,
ULONG
,
ULONG
,
PSecBufferDesc
,
ULONG
,
PCtxtHandle
,
PSecBufferDesc
,
ULONG
*
,
PTimeStamp
);
#define INITIALIZE_SECURITY_CONTEXT_FN WINELIB_NAME_AW(INITIALIZE_SECURITY_CONTEXT_FN_)
/* flags for InitializeSecurityContext fContextReq and pfContextAttr */
...
...
@@ -308,13 +306,13 @@ typedef SECURITY_STATUS (SEC_ENTRY *INITIALIZE_SECURITY_CONTEXT_FN_W)
SECURITY_STATUS
SEC_ENTRY
AcceptSecurityContext
(
PCredHandle
phCredential
,
PCtxtHandle
phContext
,
PSecBufferDesc
pInput
,
unsigned
long
fContextReq
,
unsigned
long
TargetDataRep
,
ULONG
fContextReq
,
ULONG
TargetDataRep
,
PCtxtHandle
phNewContext
,
PSecBufferDesc
pOutput
,
unsigned
long
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
ULONG
*
pfContextAttr
,
PTimeStamp
ptsExpiry
);
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
ACCEPT_SECURITY_CONTEXT_FN
)(
PCredHandle
,
PCtxtHandle
,
PSecBufferDesc
,
unsigned
long
,
unsigned
long
,
PCtxtHandle
,
PSecBufferDesc
,
unsigned
long
*
,
PTimeStamp
);
PCtxtHandle
,
PSecBufferDesc
,
ULONG
,
ULONG
,
PCtxtHandle
,
PSecBufferDesc
,
ULONG
*
,
PTimeStamp
);
/* flags for AcceptSecurityContext fContextReq and pfContextAttr */
#define ASC_REQ_DELEGATE 0x00000001
...
...
@@ -384,15 +382,15 @@ typedef SECURITY_STATUS (SEC_ENTRY *APPLY_CONTROL_TOKEN_FN)(PCtxtHandle,
PSecBufferDesc
);
SECURITY_STATUS
SEC_ENTRY
QueryContextAttributesA
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
);
ULONG
ulAttribute
,
void
*
pBuffer
);
SECURITY_STATUS
SEC_ENTRY
QueryContextAttributesW
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
);
ULONG
ulAttribute
,
void
*
pBuffer
);
#define QueryContextAttributes WINELIB_NAME_AW(QueryContextAttributes)
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
QUERY_CONTEXT_ATTRIBUTES_FN_A
)(
PCtxtHandle
,
unsigned
long
,
void
*
);
ULONG
,
void
*
);
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
QUERY_CONTEXT_ATTRIBUTES_FN_W
)(
PCtxtHandle
,
unsigned
long
,
void
*
);
ULONG
,
void
*
);
#define QUERY_CONTEXT_ATTRIBUTES_FN WINELIB_NAME_AW(QUERY_CONTEXT_ATTRIBUTES_FN_)
/* values for QueryContextAttributes/SetContextAttributes ulAttribute */
...
...
@@ -678,20 +676,20 @@ typedef SECURITY_STATUS (SEC_ENTRY *IMPORT_SECURITY_CONTEXT_FN_W)(SEC_WCHAR *,
#define IMPORT_SECURITY_CONTEXT_FN WINELIB_NAME_AW(IMPORT_SECURITY_CONTEXT_FN_)
SECURITY_STATUS
SEC_ENTRY
AddCredentialsA
(
PCredHandle
hCredentials
,
SEC_CHAR
*
pszPrincipal
,
SEC_CHAR
*
pszPackage
,
unsigned
long
fCredentialUse
,
SEC_CHAR
*
pszPrincipal
,
SEC_CHAR
*
pszPackage
,
ULONG
fCredentialUse
,
void
*
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
void
*
pvGetKeyArgument
,
PTimeStamp
ptsExpiry
);
SECURITY_STATUS
SEC_ENTRY
AddCredentialsW
(
PCredHandle
hCredentials
,
SEC_WCHAR
*
pszPrincipal
,
SEC_WCHAR
*
pszPackage
,
unsigned
long
fCredentialUse
,
SEC_WCHAR
*
pszPrincipal
,
SEC_WCHAR
*
pszPackage
,
ULONG
fCredentialUse
,
void
*
pAuthData
,
SEC_GET_KEY_FN
pGetKeyFn
,
void
*
pvGetKeyArgument
,
PTimeStamp
ptsExpiry
);
#define AddCredentials WINELIB_NAME_AW(AddCredentials)
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
ADD_CREDENTIALS_FN_A
)(
PCredHandle
,
SEC_CHAR
*
,
SEC_CHAR
*
,
unsigned
long
,
void
*
,
SEC_GET_KEY_FN
,
void
*
,
SEC_CHAR
*
,
SEC_CHAR
*
,
ULONG
,
void
*
,
SEC_GET_KEY_FN
,
void
*
,
PTimeStamp
);
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
ADD_CREDENTIALS_FN_W
)(
PCredHandle
,
SEC_WCHAR
*
,
SEC_WCHAR
*
,
unsigned
long
,
void
*
,
SEC_GET_KEY_FN
,
void
*
,
SEC_WCHAR
*
,
SEC_WCHAR
*
,
ULONG
,
void
*
,
SEC_GET_KEY_FN
,
void
*
,
PTimeStamp
);
SECURITY_STATUS
SEC_ENTRY
QuerySecurityContextToken
(
PCtxtHandle
phContext
,
...
...
@@ -714,15 +712,15 @@ typedef SECURITY_STATUS (SEC_ENTRY *DECRYPT_MESSAGE_FN)(PCtxtHandle,
PSecBufferDesc
,
ULONG
,
PULONG
);
SECURITY_STATUS
SEC_ENTRY
SetContextAttributesA
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
,
unsigned
long
cbBuffer
);
ULONG
ulAttribute
,
void
*
pBuffer
,
ULONG
cbBuffer
);
SECURITY_STATUS
SEC_ENTRY
SetContextAttributesW
(
PCtxtHandle
phContext
,
unsigned
long
ulAttribute
,
void
*
pBuffer
,
unsigned
long
cbBuffer
);
ULONG
ulAttribute
,
void
*
pBuffer
,
ULONG
cbBuffer
);
#define SetContextAttributes WINELIB_NAME_AW(SetContextAttributes)
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
SET_CONTEXT_ATTRIBUTES_FN_A
)(
PCtxtHandle
,
unsigned
long
,
void
*
,
unsigned
long
);
ULONG
,
void
*
,
ULONG
);
typedef
SECURITY_STATUS
(
SEC_ENTRY
*
SET_CONTEXT_ATTRIBUTES_FN_W
)(
PCtxtHandle
,
unsigned
long
,
void
*
,
unsigned
long
);
ULONG
,
void
*
,
ULONG
);
#define SECURITY_ENTRYPOINT_ANSIA "InitSecurityInterfaceA"
#define SECURITY_ENTRYPOINT_ANSIW "InitSecurityInterfaceW"
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment