This article describes an issue that occurs when the AcquireCredentialsHandle function of Security Support Provider Interface (SSPI) is called on a Windows Embedded Compact 7-based device. An update is available to resolve this issue. Before you install this update, all previously issued updates for this product must be installed.

Symptoms

When the AcquireCredentialsHandle function of SSPI is called to obtain the existing user credentials on a Windows Embedded Compact 7-based device, the system crashes.

Resolution

Download information

The Windows Embedded Compact 7 Monthly Update (December 2014) is now available from Microsoft. To download this Windows Embedded Compact 7 monthly update, go to the following Microsoft Download Center website:

Windows Embedded Compact 7 updates The kind of processor that each file applies to is visible in the name of each file in the "File information" section.

More Information

Restart requirement

After you apply this update, you must perform a clean build of the whole platform. To do this, use one of the following methods:

  • On the Build menu, click Clean Solution, and then click Build Solution.

  • On the Build menu, click Rebuild Solution.

You do not have to restart the computer after you apply this software update.

Update replacement information

This update does not replace any other updates.

The English version of this software update package has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.

Files that are included in this hotfix package

File name

File size

Date

Time

Path

Netbios.dll

49,152

23-Dec-2014

15:44

Public\Common\Oak\Target\X86\Retail

Netbios.dll

122,880

23-Dec-2014

10:20

Public\Common\Oak\Target\X86\Debug

Netbios.dll

90,112

23-Dec-2014

10:20

Public\Common\Oak\Target\X86\Checked

Netbios.dll

61,440

23-Dec-2014

10:21

Public\Common\Oak\Target\Armv5\Retail

Netbios.dll

159,744

23-Dec-2014

10:20

Public\Common\Oak\Target\Armv5\Debug

Netbios.dll

110,592

23-Dec-2014

10:21

Public\Common\Oak\Target\Armv5\Checked

Netbios.dll

61,440

23-Dec-2014

10:22

Public\Common\Oak\Target\Armv6\Retail

Netbios.dll

159,744

23-Dec-2014

10:20

Public\Common\Oak\Target\Armv6\Debug

Netbios.dll

110,592

23-Dec-2014

10:21

Public\Common\Oak\Target\Armv6\Checked

Netbios.dll

61,440

23-Dec-2014

10:21

Public\Common\Oak\Target\Armv7\Retail

Netbios.dll

159,744

23-Dec-2014

10:20

Public\Common\Oak\Target\Armv7\Debug

Netbios.dll

110,592

23-Dec-2014

10:21

Public\Common\Oak\Target\Armv7\Checked

Netbios.dll

73,728

23-Dec-2014

10:21

Public\Common\Oak\Target\Mipsii\Retail

Netbios.dll

184,320

23-Dec-2014

10:20

Public\Common\Oak\Target\Mipsii\Debug

Netbios.dll

135,168

23-Dec-2014

10:20

Public\Common\Oak\Target\Mipsii\Checked

Netbios.dll

73,728

23-Dec-2014

10:21

Public\Common\Oak\Target\Mipsii_fp\Retail

Netbios.dll

184,320

23-Dec-2014

10:20

Public\Common\Oak\Target\Mipsii_fp\Debug

Netbios.dll

135,168

23-Dec-2014

10:20

Public\Common\Oak\Target\Mipsii_fp\Checked

Netbios.dll

57,344

23-Dec-2014

10:20

Public\Common\Oak\Target\Sh4\Retail

Netbios.dll

135,168

23-Dec-2014

10:21

Public\Common\Oak\Target\Sh4\Debug

Netbios.dll

106,496

23-Dec-2014

10:21

Public\Common\Oak\Target\Sh4\Checked

Status

Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.

References

For more information about software update terminology, see Description of the standard terminology that is used to describe Microsoft software updates.

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.