summaryrefslogtreecommitdiffstats
path: root/src/windows/identity/kcreddb/credential.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/windows/identity/kcreddb/credential.c')
-rw-r--r--src/windows/identity/kcreddb/credential.c90
1 files changed, 45 insertions, 45 deletions
diff --git a/src/windows/identity/kcreddb/credential.c b/src/windows/identity/kcreddb/credential.c
index c241943d04..12618f237a 100644
--- a/src/windows/identity/kcreddb/credential.c
+++ b/src/windows/identity/kcreddb/credential.c
@@ -59,11 +59,11 @@ void kcdb_cred_exit(void)
can be called by kcdb_cred_dup with a write lock on l_creds and in other
places with a read lock on l_creds. New credentials must be creatable while
holding either lock. */
-KHMEXP khm_int32 KHMAPI
-kcdb_cred_create(const wchar_t * name,
+KHMEXP khm_int32 KHMAPI
+kcdb_cred_create(const wchar_t * name,
khm_handle identity,
khm_int32 cred_type,
- khm_handle * result)
+ khm_handle * result)
{
kcdb_cred * cred;
size_t cb_name;
@@ -87,7 +87,7 @@ kcdb_cred_create(const wchar_t * name,
cred->type = cred_type;
cred->refcount = 1; /* initially held */
-
+
LINIT(cred);
kcdb_buf_new(&cred->buf, KCDB_ATTR_MAX_ID + 1);
@@ -218,7 +218,7 @@ KHMEXP khm_int32 KHMAPI kcdb_cred_dup(
if(KHM_FAILED(kcdb_cred_create(cred->name,
cred->identity,
cred->type,
- &vnewcred)))
+ &vnewcred)))
{
code = KHM_ERROR_UNKNOWN;
goto _exit;
@@ -317,9 +317,9 @@ KHMEXP khm_int32 KHMAPI kcdb_cred_get_type(
}
KHMEXP khm_int32 KHMAPI kcdb_cred_set_attrib(
- khm_handle cred,
- const wchar_t * name,
- void * buffer,
+ khm_handle cred,
+ const wchar_t * name,
+ void * buffer,
khm_size cbbuf)
{
khm_int32 attr_id = -1;
@@ -335,9 +335,9 @@ KHMEXP khm_int32 KHMAPI kcdb_cred_set_attrib(
}
KHMEXP khm_int32 KHMAPI kcdb_cred_set_attr(
- khm_handle vcred,
- khm_int32 attr_id,
- void * buffer,
+ khm_handle vcred,
+ khm_int32 attr_id,
+ void * buffer,
khm_size cbbuf)
{
kcdb_cred * cred;
@@ -400,7 +400,7 @@ KHMEXP khm_int32 KHMAPI kcdb_cred_set_attr(
}
if(KHM_FAILED(code =
- type->dup(buffer, cbbuf, kcdb_cred_buf_get(cred,attr_id), &cbdest)))
+ type->dup(buffer, cbbuf, kcdb_cred_buf_get(cred,attr_id), &cbdest)))
{
kcdb_buf_alloc(&cred->buf, attr_id, (khm_ui_2) attr_id, 0);
goto _exit;
@@ -420,11 +420,11 @@ _exit:
}
KHMEXP khm_int32 KHMAPI kcdb_cred_get_attrib(
- khm_handle cred,
- const wchar_t * name,
+ khm_handle cred,
+ const wchar_t * name,
khm_int32 * attr_type,
- void * buffer,
- khm_size * cbbuf)
+ void * buffer,
+ khm_size * cbbuf)
{
khm_int32 attr_id = -1;
@@ -440,11 +440,11 @@ KHMEXP khm_int32 KHMAPI kcdb_cred_get_attrib(
}
KHMEXP khm_int32 KHMAPI kcdb_cred_get_attrib_string(
- khm_handle cred,
- const wchar_t * name,
- wchar_t * buffer,
+ khm_handle cred,
+ const wchar_t * name,
+ wchar_t * buffer,
khm_size * cbbuf,
- khm_int32 flags)
+ khm_int32 flags)
{
khm_int32 attr_id = -1;
@@ -459,11 +459,11 @@ KHMEXP khm_int32 KHMAPI kcdb_cred_get_attrib_string(
flags);
}
-KHMEXP khm_int32 KHMAPI
-kcdb_cred_get_attr(khm_handle vcred,
+KHMEXP khm_int32 KHMAPI
+kcdb_cred_get_attr(khm_handle vcred,
khm_int32 attr_id,
khm_int32 * attr_type,
- void * buffer,
+ void * buffer,
khm_size * pcbbuf)
{
khm_int32 code = KHM_ERROR_SUCCESS;
@@ -530,9 +530,9 @@ _exit:
}
KHMEXP khm_int32 KHMAPI kcdb_cred_get_attr_string(
- khm_handle vcred,
+ khm_handle vcred,
khm_int32 attr_id,
- wchar_t * buffer,
+ wchar_t * buffer,
khm_size * pcbbuf,
khm_int32 flags)
{
@@ -627,8 +627,8 @@ KHMEXP khm_int32 KHMAPI kcdb_cred_get_attr_string(
KHMEXP khm_int32 KHMAPI kcdb_cred_get_name(
- khm_handle vcred,
- wchar_t * buffer,
+ khm_handle vcred,
+ wchar_t * buffer,
khm_size * cbbuf)
{
khm_int32 code = KHM_ERROR_SUCCESS;
@@ -639,7 +639,7 @@ KHMEXP khm_int32 KHMAPI kcdb_cred_get_name(
return KHM_ERROR_INVALID_PARAM;
kcdb_cred_lock_read();
-
+
if(!kcdb_cred_is_active_cred(vcred)) {
code = KHM_ERROR_INVALID_PARAM;
goto _exit;
@@ -671,7 +671,7 @@ _exit:
}
KHMEXP khm_int32 KHMAPI kcdb_cred_get_identity(
- khm_handle vcred,
+ khm_handle vcred,
khm_handle * identity)
{
khm_int32 code = KHM_ERROR_SUCCESS;
@@ -692,7 +692,7 @@ KHMEXP khm_int32 KHMAPI kcdb_cred_get_identity(
kcdb_identity_hold((khm_handle) cred->identity);
*identity = cred->identity;
-
+
_exit:
kcdb_cred_unlock_read();
return code;
@@ -739,7 +739,7 @@ _exit:
kcdb_cred_unlock_write();
kcdb_cred_check_and_delete(vcred);
-
+
return code;
}
@@ -809,9 +809,9 @@ _exit:
return code;
}
-KHMEXP khm_int32 KHMAPI
-kcdb_creds_comp_attrib(khm_handle cred1,
- khm_handle cred2,
+KHMEXP khm_int32 KHMAPI
+kcdb_creds_comp_attrib(khm_handle cred1,
+ khm_handle cred2,
const wchar_t * name)
{
khm_int32 attr_id;
@@ -822,9 +822,9 @@ kcdb_creds_comp_attrib(khm_handle cred1,
return kcdb_creds_comp_attr(cred1, cred2, attr_id);
}
-KHMEXP khm_int32 KHMAPI
-kcdb_creds_comp_attr(khm_handle vcred1,
- khm_handle vcred2,
+KHMEXP khm_int32 KHMAPI
+kcdb_creds_comp_attr(khm_handle vcred1,
+ khm_handle vcred2,
khm_int32 attr_id)
{
khm_int32 code = 0;
@@ -879,11 +879,11 @@ kcdb_creds_comp_attr(khm_handle vcred1,
code = 0;
- if(attrib->compute_cb(vcred1, attr_id,
+ if(attrib->compute_cb(vcred1, attr_id,
NULL, &cb1) != KHM_ERROR_TOO_LONG)
goto _exit_1;
- if(attrib->compute_cb(vcred2, attr_id,
+ if(attrib->compute_cb(vcred2, attr_id,
NULL, &cb2) != KHM_ERROR_TOO_LONG)
goto _exit_1;
@@ -910,7 +910,7 @@ kcdb_creds_comp_attr(khm_handle vcred1,
code = type->comp(buf1, cb1,
buf2, cb2);
_exit_1:
- if(buf1 && (buf1 < (void *)vbuf ||
+ if(buf1 && (buf1 < (void *)vbuf ||
buf1 >= (void*)(vbuf + sizeof(vbuf))))
PFREE(buf1);
if(buf2 && (buf2 < (void *)vbuf ||
@@ -933,7 +933,7 @@ _exit:
return code;
}
-KHMEXP khm_int32 KHMAPI
+KHMEXP khm_int32 KHMAPI
kcdb_creds_is_equal(khm_handle vcred1,
khm_handle vcred2)
{
@@ -982,7 +982,7 @@ _exit:
return code;
}
-KHMEXP khm_int32 KHMAPI
+KHMEXP khm_int32 KHMAPI
kcdb_cred_get_flags(khm_handle vcred,
khm_int32 * pflags)
{
@@ -1006,13 +1006,13 @@ kcdb_cred_get_flags(khm_handle vcred,
/* Update flags if necessary */
- if (!(f & KCDB_CRED_FLAG_EXPIRED) &&
+ if (!(f & KCDB_CRED_FLAG_EXPIRED) &&
kcdb_cred_buf_exist(cred, KCDB_ATTR_EXPIRE)) {
FILETIME ftc;
-
+
GetSystemTimeAsFileTime(&ftc);
- if (CompareFileTime(&ftc, ((FILETIME *)
+ if (CompareFileTime(&ftc, ((FILETIME *)
kcdb_cred_buf_get(cred, KCDB_ATTR_EXPIRE)))
>= 0)
f |= KCDB_CRED_FLAG_EXPIRED;