secur32: Avoid using long.
This commit is contained in:
parent
693ccc2556
commit
24592a7a62
|
@ -880,8 +880,8 @@ static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextW(
|
|||
else
|
||||
{
|
||||
TRACE("Negotiated %s\n", debugstr_a(buffer));
|
||||
sscanf(buffer + 3, "%lx", &(helper->neg_flags));
|
||||
TRACE("Stored 0x%08lx as flags\n", helper->neg_flags);
|
||||
sscanf(buffer + 3, "%x", &(helper->neg_flags));
|
||||
TRACE("Stored 0x%08x as flags\n", helper->neg_flags);
|
||||
}
|
||||
|
||||
TRACE("Getting session key\n");
|
||||
|
@ -1269,8 +1269,8 @@ static SECURITY_STATUS SEC_ENTRY ntlm_AcceptSecurityContext(
|
|||
else
|
||||
{
|
||||
TRACE("Negotiated %s\n", debugstr_a(buffer));
|
||||
sscanf(buffer + 3, "%lx", &(helper->neg_flags));
|
||||
TRACE("Stored 0x%08lx as flags\n", helper->neg_flags);
|
||||
sscanf(buffer + 3, "%x", &(helper->neg_flags));
|
||||
TRACE("Stored 0x%08x as flags\n", helper->neg_flags);
|
||||
}
|
||||
|
||||
TRACE("Getting session key\n");
|
||||
|
@ -1631,7 +1631,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_MakeSignature(PCtxtHandle phContext, ULONG
|
|||
return SEC_E_BUFFER_TOO_SMALL;
|
||||
|
||||
helper = (PNegoHelper)phContext->dwLower;
|
||||
TRACE("Negotiated flags are: 0x%08lx\n", helper->neg_flags);
|
||||
TRACE("Negotiated flags are: 0x%08x\n", helper->neg_flags);
|
||||
|
||||
return ntlm_CreateSignature(helper, pMessage, token_idx, NTLM_SEND, TRUE);
|
||||
}
|
||||
|
@ -1668,7 +1668,7 @@ static SECURITY_STATUS SEC_ENTRY ntlm_VerifySignature(PCtxtHandle phContext,
|
|||
FIXME("Ignoring MessageSeqNo\n");
|
||||
|
||||
helper = (PNegoHelper)phContext->dwLower;
|
||||
TRACE("Negotiated flags: 0x%08lx\n", helper->neg_flags);
|
||||
TRACE("Negotiated flags: 0x%08x\n", helper->neg_flags);
|
||||
|
||||
local_buff = HeapAlloc(GetProcessHeap(), 0, pMessage->cBuffers * sizeof(SecBuffer));
|
||||
|
||||
|
|
|
@ -1313,7 +1313,7 @@ void SECUR32_initSchannelSP(void)
|
|||
* even though the functions are missing, because the wrapper will
|
||||
* return SEC_E_UNSUPPORTED_FUNCTION if our function is NULL.
|
||||
*/
|
||||
static const long caps =
|
||||
static const LONG caps =
|
||||
SECPKG_FLAG_INTEGRITY |
|
||||
SECPKG_FLAG_PRIVACY |
|
||||
SECPKG_FLAG_CONNECTION |
|
||||
|
@ -1323,7 +1323,7 @@ void SECUR32_initSchannelSP(void)
|
|||
SECPKG_FLAG_ACCEPT_WIN32_NAME |
|
||||
SECPKG_FLAG_STREAM;
|
||||
static const short version = 1;
|
||||
static const long maxToken = 16384;
|
||||
static const LONG maxToken = 16384;
|
||||
SEC_WCHAR *uniSPName = (SEC_WCHAR *)UNISP_NAME_W,
|
||||
*schannel = (SEC_WCHAR *)SCHANNEL_NAME_W;
|
||||
const SecPkgInfoW info[] = {
|
||||
|
|
|
@ -550,7 +550,7 @@ static const WCHAR securityProvidersW[] = {
|
|||
static void SECUR32_initializeProviders(void)
|
||||
{
|
||||
HKEY key;
|
||||
long apiRet;
|
||||
LSTATUS apiRet;
|
||||
|
||||
TRACE("\n");
|
||||
InitializeCriticalSection(&cs);
|
||||
|
|
|
@ -64,7 +64,7 @@ typedef struct _NegoHelper {
|
|||
int com_buf_size;
|
||||
int com_buf_offset;
|
||||
BYTE *session_key;
|
||||
unsigned long neg_flags;
|
||||
ULONG neg_flags;
|
||||
struct {
|
||||
struct {
|
||||
ULONG seq_num;
|
||||
|
|
Loading…
Reference in New Issue