static Errcode rnd_read_first_frame(Image_file *ifile, Rcel *screen) /* Now that we know the rnd file has a depth <= 8 bits draw it in the * screen */ { Rfile *rf = (Rfile *)ifile; if(rf->lasterr < Success) /* open and scan must have failed */ return(rf->lasterr); cleanup_buffers(rf); if((rf->pktbuf = malloc(PKT_BUFSIZE+rf->ainfo.width)) == NULL) return(Err_no_memory); rf->pixbuf = OPTR(rf->pktbuf,PKT_BUFSIZE); rewind(rf->file); /* clear errors and re-init */ rf->lasterr = Success; rf->screen = screen; if(rf_seek(rf,sizeof(Rndhdr),SEEK_SET) < Success) goto error; return(read_256_color_frame(rf)); error: return(rf->lasterr); }
void vl_compositor_cleanup(struct vl_compositor *compositor) { assert(compositor); cleanup_buffers(compositor); cleanup_shaders(compositor); cleanup_pipe_state(compositor); }
void vl_compositor_cleanup(struct vl_compositor *c) { assert(c); u_upload_destroy(c->upload); cleanup_buffers(c); cleanup_shaders(c); cleanup_pipe_state(c); }
static void close_rnd_file(Image_file **pif) /* Close file handle if open and deallocate all buffers */ { Rfile *rf; if((rf = *((Rfile **)pif)) == NULL) return; if(rf->file) fclose(rf->file); cleanup_buffers(rf); free(rf); *pif = NULL; }
//----------------------------------------------------------------------------- // Main... process command line parameters, and then setup our listening // sockets and event loop. int main(int argc, char **argv) { system_data_t sysdata; ///============================================================================ /// Initialization. ///============================================================================ init_sysdata(&sysdata); init_settings(&sysdata); get_options(sysdata.settings, argc, argv); init_maxconns(&sysdata); init_daemon(&sysdata); init_events(&sysdata); init_logging(&sysdata); logger(sysdata.logging, 1, "System starting up"); init_signals(&sysdata); init_buffers(&sysdata); init_servers(&sysdata); init_stats(&sysdata); init_risp(&sysdata); init_nodes(&sysdata); init_msglist(&sysdata); init_queues(&sysdata); init_controllers(&sysdata); ///============================================================================ /// Main Event Loop. ///============================================================================ // enter the event loop. logger(sysdata.logging, 1, "Starting Event Loop"); assert(sysdata.evbase); event_base_loop(sysdata.evbase, 0); logger(sysdata.logging, 1, "Shutdown preparations complete. Shutting down now."); ///============================================================================ /// Shutdown ///============================================================================ cleanup_events(&sysdata); cleanup_controllers(&sysdata); cleanup_queues(&sysdata); cleanup_msglist(&sysdata); cleanup_nodes(&sysdata); cleanup_risp(&sysdata); cleanup_stats(&sysdata); cleanup_servers(&sysdata); cleanup_buffers(&sysdata); cleanup_signals(&sysdata); logger(sysdata.logging, 1, "Shutdown complete.\n"); cleanup_logging(&sysdata); cleanup_daemon(&sysdata); cleanup_maxconns(&sysdata); cleanup_settings(&sysdata); cleanup_sysdata(&sysdata); // good-bye. return 0; }
static void test_authentication(void) { SECURITY_STATUS status_c = SEC_I_CONTINUE_NEEDED, status_s = SEC_I_CONTINUE_NEEDED, status; struct sspi_data client, server; SEC_WINNT_AUTH_IDENTITY_A id; SecPkgContext_NegotiationInfoA info; SecPkgContext_Sizes sizes; SecPkgInfoA *pi; BOOL first = TRUE; memset(&client, 0, sizeof(client)); memset(&server, 0, sizeof(server)); id.User = (unsigned char *)"user"; id.UserLength = strlen( "user" ); id.Domain = (unsigned char *)"domain"; id.DomainLength = strlen( "domain" ); id.Password = (unsigned char *)"password"; id.PasswordLength = strlen( "password" ); id.Flags = SEC_WINNT_AUTH_IDENTITY_ANSI; client.id = &id; if ((status = setup_client( &client, (SEC_CHAR *)"Negotiate" ))) { skip( "setup_client returned %08x, skipping test\n", status ); return; } if ((status = setup_server( &server, (SEC_CHAR *)"Negotiate" ))) { skip( "setup_server returned %08x, skipping test\n", status ); pFreeCredentialsHandle( &client.cred ); return; } while (status_c == SEC_I_CONTINUE_NEEDED && status_s == SEC_I_CONTINUE_NEEDED) { status_c = run_client( &client, first ); ok( status_c == SEC_E_OK || status_c == SEC_I_CONTINUE_NEEDED, "client returned %08x, more tests will fail\n", status_c ); communicate( &client, &server ); status_s = run_server( &server, first ); ok( status_s == SEC_E_OK || status_s == SEC_I_CONTINUE_NEEDED || status_s == SEC_E_LOGON_DENIED, "server returned %08x, more tests will fail\n", status_s ); communicate( &server, &client ); trace( "looping\n"); first = FALSE; } if (status_c != SEC_E_OK) { skip( "authentication failed, skipping remaining tests\n" ); goto done; } sizes.cbMaxToken = 0xdeadbeef; sizes.cbMaxSignature = 0xdeadbeef; sizes.cbSecurityTrailer = 0xdeadbeef; sizes.cbBlockSize = 0xdeadbeef; status_c = pQueryContextAttributesA( &client.ctxt, SECPKG_ATTR_SIZES, &sizes ); ok( status_c == SEC_E_OK, "pQueryContextAttributesA returned %08x\n", status_c ); ok( sizes.cbMaxToken == 2888 || sizes.cbMaxToken == 1904, "expected 2888 or 1904, got %u\n", sizes.cbMaxToken ); ok( sizes.cbMaxSignature == 16, "expected 16, got %u\n", sizes.cbMaxSignature ); ok( sizes.cbSecurityTrailer == 16, "expected 16, got %u\n", sizes.cbSecurityTrailer ); ok( !sizes.cbBlockSize, "expected 0, got %u\n", sizes.cbBlockSize ); memset( &info, 0, sizeof(info) ); status_c = pQueryContextAttributesA( &client.ctxt, SECPKG_ATTR_NEGOTIATION_INFO, &info ); ok( status_c == SEC_E_OK, "pQueryContextAttributesA returned %08x\n", status_c ); pi = info.PackageInfo; ok( info.NegotiationState == SECPKG_NEGOTIATION_COMPLETE, "got %u\n", info.NegotiationState ); ok( pi != NULL, "expected non-NULL PackageInfo\n" ); if (pi) { ok( pi->fCapabilities == NTLM_BASE_CAPS || pi->fCapabilities == (NTLM_BASE_CAPS|SECPKG_FLAG_READONLY_WITH_CHECKSUM) || pi->fCapabilities == (NTLM_BASE_CAPS|SECPKG_FLAG_RESTRICTED_TOKENS) || pi->fCapabilities == (NTLM_BASE_CAPS|SECPKG_FLAG_RESTRICTED_TOKENS| SECPKG_FLAG_APPCONTAINER_CHECKS), "got %08x\n", pi->fCapabilities ); ok( pi->wVersion == 1, "got %u\n", pi->wVersion ); ok( pi->wRPCID == RPC_C_AUTHN_WINNT, "got %u\n", pi->wRPCID ); ok( !lstrcmpA( pi->Name, "NTLM" ), "got %s\n", pi->Name ); } done: cleanup_buffers( &client ); cleanup_buffers( &server ); if (client.ctxt.dwLower || client.ctxt.dwUpper) { status_c = pDeleteSecurityContext( &client.ctxt ); ok( status_c == SEC_E_OK, "DeleteSecurityContext returned %08x\n", status_c ); } if (server.ctxt.dwLower || server.ctxt.dwUpper) { status_s = pDeleteSecurityContext( &server.ctxt ); ok( status_s == SEC_E_OK, "DeleteSecurityContext returned %08x\n", status_s ); } if (client.cred.dwLower || client.cred.dwUpper) { status_c = pFreeCredentialsHandle( &client.cred ); ok( status_c == SEC_E_OK, "FreeCredentialsHandle returned %08x\n", status_c ); } if (server.cred.dwLower || server.cred.dwUpper) { status_s = pFreeCredentialsHandle(&server.cred); ok( status_s == SEC_E_OK, "FreeCredentialsHandle returned %08x\n", status_s ); } }
void cleanup_header_handling() { free_head_filter(&head); cleanup_buffers(); }