Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
9b11f6fd
Commit
9b11f6fd
authored
Feb 11, 2022
by
Hans Leidekker
Committed by
Alexandre Julliard
Feb 11, 2022
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
msv1_0: Build without -DWINE_NO_LONG_TYPES.
Signed-off-by:
Hans Leidekker
<
hans@codeweavers.com
>
Signed-off-by:
Alexandre Julliard
<
julliard@winehq.org
>
parent
a5770a04
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
25 additions
and
26 deletions
+25
-26
Makefile.in
dlls/msv1_0/Makefile.in
+0
-1
main.c
dlls/msv1_0/main.c
+25
-25
No files found.
dlls/msv1_0/Makefile.in
View file @
9b11f6fd
EXTRADEFS
=
-DWINE_NO_LONG_TYPES
MODULE
=
msv1_0.dll
UNIXLIB
=
msv1_0.so
IMPORTS
=
netapi32 advapi32
...
...
dlls/msv1_0/main.c
View file @
9b11f6fd
...
...
@@ -111,7 +111,7 @@ static NTSTATUS NTAPI ntlm_LsaApInitializePackage( ULONG package_id, LSA_DISPATC
LSA_STRING
*
str
;
char
*
ptr
;
TRACE
(
"%
08
x, %p, %s, %s, %p
\n
"
,
package_id
,
dispatch
,
debugstr_as
(
database
),
debugstr_as
(
confidentiality
),
TRACE
(
"%
#l
x, %p, %s, %s, %p
\n
"
,
package_id
,
dispatch
,
debugstr_as
(
database
),
debugstr_as
(
confidentiality
),
package_name
);
if
(
ntlm_check_version
())
...
...
@@ -135,7 +135,7 @@ static NTSTATUS NTAPI ntlm_LsaApInitializePackage( ULONG package_id, LSA_DISPATC
static
NTSTATUS
NTAPI
ntlm_SpInitialize
(
ULONG_PTR
package_id
,
SECPKG_PARAMETERS
*
params
,
LSA_SECPKG_FUNCTION_TABLE
*
lsa_function_table
)
{
TRACE
(
"%
lu
, %p, %p
\n
"
,
package_id
,
params
,
lsa_function_table
);
TRACE
(
"%
#Ix
, %p, %p
\n
"
,
package_id
,
params
,
lsa_function_table
);
if
(
ntlm_check_version
())
{
...
...
@@ -192,7 +192,7 @@ static NTSTATUS NTAPI ntlm_SpAcquireCredentialsHandle( UNICODE_STRING *principal
WCHAR
*
domain
=
NULL
,
*
user
=
NULL
,
*
password
=
NULL
;
SEC_WINNT_AUTH_IDENTITY_W
*
id
=
NULL
;
TRACE
(
"%s,
0x%08
x, %p, %p, %p, %p, %p, %p
\n
"
,
debugstr_us
(
principal
),
cred_use
,
logon_id
,
auth_data
,
TRACE
(
"%s,
%#l
x, %p, %p, %p, %p, %p, %p
\n
"
,
debugstr_us
(
principal
),
cred_use
,
logon_id
,
auth_data
,
get_key_fn
,
get_key_arg
,
cred
,
expiry
);
switch
(
cred_use
&
~
SECPKG_CRED_RESERVED
)
...
...
@@ -298,7 +298,7 @@ static NTSTATUS NTAPI ntlm_SpFreeCredentialsHandle( LSA_SEC_HANDLE handle )
{
struct
ntlm_cred
*
cred
=
(
struct
ntlm_cred
*
)
handle
;
TRACE
(
"%
l
x
\n
"
,
handle
);
TRACE
(
"%
#I
x
\n
"
,
handle
);
if
(
!
cred
)
return
SEC_E_OK
;
...
...
@@ -589,7 +589,7 @@ static NTSTATUS NTAPI ntlm_SpInitLsaModeContext( LSA_SEC_HANDLE cred_handle, LSA
unsigned
int
len
,
bin_len
;
int
idx
;
TRACE
(
"%
lx, %lx, %s, 0x%08x, %
u, %p, %p, %p, %p, %p, %p, %p
\n
"
,
cred_handle
,
ctx_handle
,
debugstr_us
(
target
),
TRACE
(
"%
#Ix, %#Ix, %s, %#lx, %l
u, %p, %p, %p, %p, %p, %p, %p
\n
"
,
cred_handle
,
ctx_handle
,
debugstr_us
(
target
),
ctx_req
,
data_rep
,
input
,
new_ctx_handle
,
output
,
ctx_attr
,
expiry
,
mapped_ctx
,
ctx_data
);
/* when communicating with the client there can be the following reply packets:
...
...
@@ -875,7 +875,7 @@ done:
free
(
bin
);
free
(
want_flags
);
TRACE
(
"returning %
08
x
\n
"
,
status
);
TRACE
(
"returning %
#l
x
\n
"
,
status
);
return
status
;
}
...
...
@@ -890,9 +890,9 @@ static NTSTATUS NTAPI ntlm_SpAcceptLsaModeContext( LSA_SEC_HANDLE cred_handle, L
char
*
buf
,
*
bin
,
*
want_flags
=
NULL
;
unsigned
int
len
,
bin_len
;
TRACE
(
"%
lx, %lx, %08x, %
u, %p, %p, %p, %p, %p, %p, %p
\n
"
,
cred_handle
,
ctx_handle
,
ctx_req
,
data_rep
,
input
,
TRACE
(
"%
#Ix, %#Ix, %#lx, %l
u, %p, %p, %p, %p, %p, %p, %p
\n
"
,
cred_handle
,
ctx_handle
,
ctx_req
,
data_rep
,
input
,
new_ctx_handle
,
output
,
ctx_attr
,
expiry
,
mapped_ctx
,
ctx_data
);
if
(
ctx_req
)
FIXME
(
"ignoring flags %
08
x
\n
"
,
ctx_req
);
if
(
ctx_req
)
FIXME
(
"ignoring flags %
#l
x
\n
"
,
ctx_req
);
if
(
!
(
buf
=
malloc
(
NTLM_MAX_BUF
)))
return
SEC_E_INSUFFICIENT_MEMORY
;
if
(
!
(
bin
=
malloc
(
NTLM_MAX_BUF
)))
goto
done
;
...
...
@@ -1088,7 +1088,7 @@ done:
free
(
bin
);
free
(
want_flags
);
TRACE
(
"returning %
08
x
\n
"
,
status
);
TRACE
(
"returning %
#l
x
\n
"
,
status
);
return
status
;
}
...
...
@@ -1096,7 +1096,7 @@ static NTSTATUS NTAPI ntlm_SpDeleteContext( LSA_SEC_HANDLE handle )
{
struct
ntlm_ctx
*
ctx
=
(
struct
ntlm_ctx
*
)
handle
;
TRACE
(
"%
l
x
\n
"
,
handle
);
TRACE
(
"%
#I
x
\n
"
,
handle
);
if
(
!
ctx
)
return
SEC_E_INVALID_HANDLE
;
ntlm_cleanup
(
ctx
);
...
...
@@ -1124,7 +1124,7 @@ static SecPkgInfoW *build_package_info( const SecPkgInfoW *info )
static
NTSTATUS
NTAPI
ntlm_SpQueryContextAttributes
(
LSA_SEC_HANDLE
handle
,
ULONG
attr
,
void
*
buf
)
{
TRACE
(
"%
lx, %
u, %p
\n
"
,
handle
,
attr
,
buf
);
TRACE
(
"%
#Ix, %l
u, %p
\n
"
,
handle
,
attr
,
buf
);
if
(
!
handle
)
return
SEC_E_INVALID_HANDLE
;
...
...
@@ -1171,7 +1171,7 @@ static NTSTATUS NTAPI ntlm_SpQueryContextAttributes( LSA_SEC_HANDLE handle, ULON
}
#undef X
default:
FIXME
(
"unknown attribute %u
\n
"
,
attr
);
FIXME
(
"unknown attribute %
l
u
\n
"
,
attr
);
break
;
}
...
...
@@ -1221,7 +1221,7 @@ static SECPKG_FUNCTION_TABLE ntlm_table =
NTSTATUS
NTAPI
SpLsaModeInitialize
(
ULONG
lsa_version
,
ULONG
*
package_version
,
SECPKG_FUNCTION_TABLE
**
table
,
ULONG
*
table_count
)
{
TRACE
(
"%
08
x, %p, %p, %p
\n
"
,
lsa_version
,
package_version
,
table
,
table_count
);
TRACE
(
"%
#l
x, %p, %p, %p
\n
"
,
lsa_version
,
package_version
,
table
,
table_count
);
*
package_version
=
SECPKG_INTERFACE_VERSION
;
*
table
=
&
ntlm_table
;
...
...
@@ -1231,7 +1231,7 @@ NTSTATUS NTAPI SpLsaModeInitialize( ULONG lsa_version, ULONG *package_version, S
static
NTSTATUS
NTAPI
ntlm_SpInstanceInit
(
ULONG
version
,
SECPKG_DLL_FUNCTIONS
*
dll_functions
,
void
**
user_functions
)
{
TRACE
(
"%
08
x, %p, %p
\n
"
,
version
,
dll_functions
,
user_functions
);
TRACE
(
"%
#l
x, %p, %p
\n
"
,
version
,
dll_functions
,
user_functions
);
return
STATUS_SUCCESS
;
}
...
...
@@ -1400,9 +1400,9 @@ static NTSTATUS NTAPI ntlm_SpMakeSignature( LSA_SEC_HANDLE handle, ULONG qop, Se
struct
ntlm_ctx
*
ctx
=
(
struct
ntlm_ctx
*
)
handle
;
int
idx
;
TRACE
(
"%
lx, 0x%08x, %p, %
u
\n
"
,
handle
,
qop
,
msg
,
msg_seq_no
);
if
(
qop
)
FIXME
(
"ignoring quality of protection %
08
x
\n
"
,
qop
);
if
(
msg_seq_no
)
FIXME
(
"ignoring message sequence number %u
\n
"
,
msg_seq_no
);
TRACE
(
"%
#Ix, %#lx, %p, %l
u
\n
"
,
handle
,
qop
,
msg
,
msg_seq_no
);
if
(
qop
)
FIXME
(
"ignoring quality of protection %
#l
x
\n
"
,
qop
);
if
(
msg_seq_no
)
FIXME
(
"ignoring message sequence number %
l
u
\n
"
,
msg_seq_no
);
if
(
!
handle
)
return
SEC_E_INVALID_HANDLE
;
if
(
!
msg
||
!
msg
->
pBuffers
||
msg
->
cBuffers
<
2
||
(
idx
=
get_buffer_index
(
msg
,
SECBUFFER_TOKEN
))
==
-
1
)
...
...
@@ -1456,8 +1456,8 @@ static NTSTATUS NTAPI ntlm_SpVerifySignature( LSA_SEC_HANDLE handle, SecBufferDe
struct
ntlm_ctx
*
ctx
=
(
struct
ntlm_ctx
*
)
handle
;
int
idx
;
TRACE
(
"%
lx, %p, %
u, %p
\n
"
,
handle
,
msg
,
msg_seq_no
,
qop
);
if
(
msg_seq_no
)
FIXME
(
"ignoring message sequence number %u
\n
"
,
msg_seq_no
);
TRACE
(
"%
#Ix, %p, %l
u, %p
\n
"
,
handle
,
msg
,
msg_seq_no
,
qop
);
if
(
msg_seq_no
)
FIXME
(
"ignoring message sequence number %
l
u
\n
"
,
msg_seq_no
);
if
(
!
handle
)
return
SEC_E_INVALID_HANDLE
;
if
(
!
msg
||
!
msg
->
pBuffers
||
msg
->
cBuffers
<
2
||
(
idx
=
get_buffer_index
(
msg
,
SECBUFFER_TOKEN
))
==
-
1
)
...
...
@@ -1472,9 +1472,9 @@ static NTSTATUS NTAPI ntlm_SpSealMessage( LSA_SEC_HANDLE handle, ULONG qop, SecB
int
token_idx
,
data_idx
;
struct
ntlm_ctx
*
ctx
;
TRACE
(
"%
lx, %08x, %p %
u
\n
"
,
handle
,
qop
,
msg
,
msg_seq_no
);
if
(
qop
)
FIXME
(
"ignoring quality of protection %
08
x
\n
"
,
qop
);
if
(
msg_seq_no
)
FIXME
(
"ignoring message sequence number %u
\n
"
,
msg_seq_no
);
TRACE
(
"%
#Ix, %#lx, %p %l
u
\n
"
,
handle
,
qop
,
msg
,
msg_seq_no
);
if
(
qop
)
FIXME
(
"ignoring quality of protection %
#l
x
\n
"
,
qop
);
if
(
msg_seq_no
)
FIXME
(
"ignoring message sequence number %
l
u
\n
"
,
msg_seq_no
);
if
(
!
handle
)
return
SEC_E_INVALID_HANDLE
;
...
...
@@ -1514,8 +1514,8 @@ static NTSTATUS NTAPI ntlm_SpUnsealMessage( LSA_SEC_HANDLE handle, SecBufferDesc
int
token_idx
,
data_idx
;
struct
ntlm_ctx
*
ctx
;
TRACE
(
"%
lx, %p, %
u, %p
\n
"
,
handle
,
msg
,
msg_seq_no
,
qop
);
if
(
msg_seq_no
)
FIXME
(
"ignoring message sequence number %u
\n
"
,
msg_seq_no
);
TRACE
(
"%
#Ix, %p, %l
u, %p
\n
"
,
handle
,
msg
,
msg_seq_no
,
qop
);
if
(
msg_seq_no
)
FIXME
(
"ignoring message sequence number %
l
u
\n
"
,
msg_seq_no
);
if
(
!
handle
)
return
SEC_E_INVALID_HANDLE
;
...
...
@@ -1559,7 +1559,7 @@ static SECPKG_USER_FUNCTION_TABLE ntlm_user_table =
NTSTATUS
NTAPI
SpUserModeInitialize
(
ULONG
lsa_version
,
ULONG
*
package_version
,
SECPKG_USER_FUNCTION_TABLE
**
table
,
ULONG
*
table_count
)
{
TRACE
(
"%
08
x, %p, %p, %p
\n
"
,
lsa_version
,
package_version
,
table
,
table_count
);
TRACE
(
"%
#l
x, %p, %p, %p
\n
"
,
lsa_version
,
package_version
,
table
,
table_count
);
*
package_version
=
SECPKG_INTERFACE_VERSION
;
*
table
=
&
ntlm_user_table
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment