secur32: Constify some variables.
This commit is contained in:
parent
c6784cdad3
commit
d01c8407a9
|
@ -21,7 +21,7 @@
|
|||
|
||||
#include "hmac_md5.h"
|
||||
|
||||
void HMACMD5Init(HMAC_MD5_CTX *ctx, unsigned char *key, unsigned int key_len)
|
||||
void HMACMD5Init(HMAC_MD5_CTX *ctx, const unsigned char *key, unsigned int key_len)
|
||||
{
|
||||
int i;
|
||||
unsigned char inner_padding[64];
|
||||
|
@ -55,7 +55,7 @@ void HMACMD5Init(HMAC_MD5_CTX *ctx, unsigned char *key, unsigned int key_len)
|
|||
MD5Update(&(ctx->ctx), inner_padding, 64);
|
||||
}
|
||||
|
||||
void HMACMD5Update(HMAC_MD5_CTX *ctx, unsigned char *data, unsigned int data_len)
|
||||
void HMACMD5Update(HMAC_MD5_CTX *ctx, const unsigned char *data, unsigned int data_len)
|
||||
{
|
||||
MD5Update(&(ctx->ctx), data, data_len);
|
||||
}
|
||||
|
|
|
@ -42,7 +42,7 @@ void WINAPI MD5Init( MD5_CTX *ctx );
|
|||
void WINAPI MD5Update( MD5_CTX *ctx, const unsigned char *buf, unsigned int len );
|
||||
void WINAPI MD5Final( MD5_CTX *ctx );
|
||||
|
||||
void HMACMD5Init(HMAC_MD5_CTX *ctx, unsigned char *key, unsigned int key_len);
|
||||
void HMACMD5Update(HMAC_MD5_CTX *ctx, unsigned char *data, unsigned int data_len);
|
||||
void HMACMD5Init(HMAC_MD5_CTX *ctx, const unsigned char *key, unsigned int key_len);
|
||||
void HMACMD5Update(HMAC_MD5_CTX *ctx, const unsigned char *data, unsigned int data_len);
|
||||
void HMACMD5Final(HMAC_MD5_CTX *ctx, unsigned char *digest);
|
||||
#endif /*_HMAC_MD5_H_*/
|
||||
|
|
|
@ -29,7 +29,7 @@
|
|||
WINE_DEFAULT_DEBUG_CHANNEL(secur32);
|
||||
|
||||
static SECURITY_STATUS schan_QueryCredentialsAttributes(
|
||||
PCredHandle phCredential, ULONG ulAttribute, PVOID pBuffer)
|
||||
PCredHandle phCredential, ULONG ulAttribute, const VOID *pBuffer)
|
||||
{
|
||||
SECURITY_STATUS ret;
|
||||
|
||||
|
@ -111,7 +111,7 @@ static SECURITY_STATUS SEC_ENTRY schan_QueryCredentialsAttributesW(
|
|||
return ret;
|
||||
}
|
||||
|
||||
static SECURITY_STATUS schan_CheckCreds(PSCHANNEL_CRED schanCred)
|
||||
static SECURITY_STATUS schan_CheckCreds(const SCHANNEL_CRED *schanCred)
|
||||
{
|
||||
SECURITY_STATUS st;
|
||||
|
||||
|
@ -149,7 +149,7 @@ static SECURITY_STATUS schan_CheckCreds(PSCHANNEL_CRED schanCred)
|
|||
return st;
|
||||
}
|
||||
|
||||
static SECURITY_STATUS schan_AcquireClientCredentials(PSCHANNEL_CRED schanCred,
|
||||
static SECURITY_STATUS schan_AcquireClientCredentials(const SCHANNEL_CRED *schanCred,
|
||||
PCredHandle phCredential, PTimeStamp ptsExpiry)
|
||||
{
|
||||
SECURITY_STATUS st = SEC_E_OK;
|
||||
|
@ -177,7 +177,7 @@ static SECURITY_STATUS schan_AcquireClientCredentials(PSCHANNEL_CRED schanCred,
|
|||
return st;
|
||||
}
|
||||
|
||||
static SECURITY_STATUS schan_AcquireServerCredentials(PSCHANNEL_CRED schanCred,
|
||||
static SECURITY_STATUS schan_AcquireServerCredentials(const SCHANNEL_CRED *schanCred,
|
||||
PCredHandle phCredential, PTimeStamp ptsExpiry)
|
||||
{
|
||||
SECURITY_STATUS st;
|
||||
|
@ -194,7 +194,7 @@ static SECURITY_STATUS schan_AcquireServerCredentials(PSCHANNEL_CRED schanCred,
|
|||
}
|
||||
|
||||
static SECURITY_STATUS schan_AcquireCredentialsHandle(ULONG fCredentialUse,
|
||||
PSCHANNEL_CRED schanCred, PCredHandle phCredential, PTimeStamp ptsExpiry)
|
||||
const SCHANNEL_CRED *schanCred, PCredHandle phCredential, PTimeStamp ptsExpiry)
|
||||
{
|
||||
SECURITY_STATUS ret;
|
||||
|
||||
|
|
|
@ -588,7 +588,7 @@ static void SECUR32_initializeProviders(void)
|
|||
}
|
||||
}
|
||||
|
||||
SecurePackage *SECUR32_findPackageW(PWSTR packageName)
|
||||
SecurePackage *SECUR32_findPackageW(PCWSTR packageName)
|
||||
{
|
||||
SecurePackage *ret = NULL;
|
||||
BOOL matched = FALSE;
|
||||
|
@ -634,7 +634,7 @@ SecurePackage *SECUR32_findPackageW(PWSTR packageName)
|
|||
return ret;
|
||||
}
|
||||
|
||||
SecurePackage *SECUR32_findPackageA(PSTR packageName)
|
||||
SecurePackage *SECUR32_findPackageA(PCSTR packageName)
|
||||
{
|
||||
SecurePackage *ret;
|
||||
|
||||
|
@ -778,7 +778,7 @@ SECURITY_STATUS WINAPI EnumerateSecurityPackagesW(PULONG pcPackages,
|
|||
* structures) into an array of SecPkgInfoA structures, which it returns.
|
||||
*/
|
||||
static PSecPkgInfoA thunk_PSecPkgInfoWToA(ULONG cPackages,
|
||||
const PSecPkgInfoW info)
|
||||
const SecPkgInfoW *info)
|
||||
{
|
||||
PSecPkgInfoA ret;
|
||||
|
||||
|
|
|
@ -112,11 +112,11 @@ void SECUR32_addPackages(SecureProvider *provider, ULONG toAdd,
|
|||
/* Tries to find the package named packageName. If it finds it, implicitly
|
||||
* loads the package if it isn't already loaded.
|
||||
*/
|
||||
SecurePackage *SECUR32_findPackageW(PWSTR packageName);
|
||||
SecurePackage *SECUR32_findPackageW(PCWSTR packageName);
|
||||
|
||||
/* Tries to find the package named packageName. (Thunks to _findPackageW)
|
||||
*/
|
||||
SecurePackage *SECUR32_findPackageA(PSTR packageName);
|
||||
SecurePackage *SECUR32_findPackageA(PCSTR packageName);
|
||||
|
||||
/* A few string helpers; will return NULL if str is NULL. Free return with
|
||||
* SECUR32_FREE */
|
||||
|
|
|
@ -351,7 +351,7 @@ SECURITY_STATUS SEC_ENTRY thunk_AddCredentialsW(PCredHandle hCredentials,
|
|||
return ret;
|
||||
}
|
||||
|
||||
static PSecPkgInfoA _copyPackageInfoFlatWToA(PSecPkgInfoW infoW)
|
||||
static PSecPkgInfoA _copyPackageInfoFlatWToA(const SecPkgInfoW *infoW)
|
||||
{
|
||||
PSecPkgInfoA ret;
|
||||
|
||||
|
@ -576,7 +576,7 @@ SECURITY_STATUS SEC_ENTRY thunk_QueryContextAttributesA(PCtxtHandle phContext,
|
|||
return ret;
|
||||
}
|
||||
|
||||
static PSecPkgInfoW _copyPackageInfoFlatAToW(PSecPkgInfoA infoA)
|
||||
static PSecPkgInfoW _copyPackageInfoFlatAToW(const SecPkgInfoA *infoA)
|
||||
{
|
||||
PSecPkgInfoW ret;
|
||||
|
||||
|
|
|
@ -143,7 +143,7 @@ SECURITY_STATUS SECUR32_CreateNTLMv1SessionKey(PBYTE password, int len, PBYTE se
|
|||
return SEC_E_OK;
|
||||
}
|
||||
|
||||
static void SECUR32_CalcNTLMv2Subkey(PBYTE session_key, const char *magic, PBYTE subkey)
|
||||
static void SECUR32_CalcNTLMv2Subkey(const BYTE *session_key, const char *magic, PBYTE subkey)
|
||||
{
|
||||
MD5_CTX ctx;
|
||||
|
||||
|
|
Loading…
Reference in New Issue