blob: eb9f06296e42ea70f79edc5b94ae8cde56e1684c [file] [log] [blame]
sslobodrd046be82019-01-16 10:02:22 -05001// Code generated by 'go generate'; DO NOT EDIT.
2
3package windows
4
5import (
6 "syscall"
7 "unsafe"
8)
9
10var _ unsafe.Pointer
11
12// Do the interface allocations only once for common
13// Errno values.
14const (
15 errnoERROR_IO_PENDING = 997
16)
17
18var (
19 errERROR_IO_PENDING error = syscall.Errno(errnoERROR_IO_PENDING)
20)
21
22// errnoErr returns common boxed Errno values, to prevent
23// allocations at runtime.
24func errnoErr(e syscall.Errno) error {
25 switch e {
26 case 0:
27 return nil
28 case errnoERROR_IO_PENDING:
29 return errERROR_IO_PENDING
30 }
31 // TODO: add more here, after collecting data on the common
32 // error values see on Windows. (perhaps when running
33 // all.bat?)
34 return e
35}
36
37var (
38 modadvapi32 = NewLazySystemDLL("advapi32.dll")
39 modkernel32 = NewLazySystemDLL("kernel32.dll")
40 modshell32 = NewLazySystemDLL("shell32.dll")
41 modmswsock = NewLazySystemDLL("mswsock.dll")
42 modcrypt32 = NewLazySystemDLL("crypt32.dll")
43 modws2_32 = NewLazySystemDLL("ws2_32.dll")
44 moddnsapi = NewLazySystemDLL("dnsapi.dll")
45 modiphlpapi = NewLazySystemDLL("iphlpapi.dll")
46 modsecur32 = NewLazySystemDLL("secur32.dll")
47 modnetapi32 = NewLazySystemDLL("netapi32.dll")
48 moduserenv = NewLazySystemDLL("userenv.dll")
49
50 procRegisterEventSourceW = modadvapi32.NewProc("RegisterEventSourceW")
51 procDeregisterEventSource = modadvapi32.NewProc("DeregisterEventSource")
52 procReportEventW = modadvapi32.NewProc("ReportEventW")
53 procOpenSCManagerW = modadvapi32.NewProc("OpenSCManagerW")
54 procCloseServiceHandle = modadvapi32.NewProc("CloseServiceHandle")
55 procCreateServiceW = modadvapi32.NewProc("CreateServiceW")
56 procOpenServiceW = modadvapi32.NewProc("OpenServiceW")
57 procDeleteService = modadvapi32.NewProc("DeleteService")
58 procStartServiceW = modadvapi32.NewProc("StartServiceW")
59 procQueryServiceStatus = modadvapi32.NewProc("QueryServiceStatus")
60 procControlService = modadvapi32.NewProc("ControlService")
61 procStartServiceCtrlDispatcherW = modadvapi32.NewProc("StartServiceCtrlDispatcherW")
62 procSetServiceStatus = modadvapi32.NewProc("SetServiceStatus")
63 procChangeServiceConfigW = modadvapi32.NewProc("ChangeServiceConfigW")
64 procQueryServiceConfigW = modadvapi32.NewProc("QueryServiceConfigW")
65 procChangeServiceConfig2W = modadvapi32.NewProc("ChangeServiceConfig2W")
66 procQueryServiceConfig2W = modadvapi32.NewProc("QueryServiceConfig2W")
67 procEnumServicesStatusExW = modadvapi32.NewProc("EnumServicesStatusExW")
68 procQueryServiceStatusEx = modadvapi32.NewProc("QueryServiceStatusEx")
69 procGetLastError = modkernel32.NewProc("GetLastError")
70 procLoadLibraryW = modkernel32.NewProc("LoadLibraryW")
71 procLoadLibraryExW = modkernel32.NewProc("LoadLibraryExW")
72 procFreeLibrary = modkernel32.NewProc("FreeLibrary")
73 procGetProcAddress = modkernel32.NewProc("GetProcAddress")
74 procGetVersion = modkernel32.NewProc("GetVersion")
75 procFormatMessageW = modkernel32.NewProc("FormatMessageW")
76 procExitProcess = modkernel32.NewProc("ExitProcess")
77 procCreateFileW = modkernel32.NewProc("CreateFileW")
78 procReadFile = modkernel32.NewProc("ReadFile")
79 procWriteFile = modkernel32.NewProc("WriteFile")
William Kurkiandaa6bb22019-03-07 12:26:28 -050080 procGetOverlappedResult = modkernel32.NewProc("GetOverlappedResult")
sslobodrd046be82019-01-16 10:02:22 -050081 procSetFilePointer = modkernel32.NewProc("SetFilePointer")
82 procCloseHandle = modkernel32.NewProc("CloseHandle")
83 procGetStdHandle = modkernel32.NewProc("GetStdHandle")
84 procSetStdHandle = modkernel32.NewProc("SetStdHandle")
85 procFindFirstFileW = modkernel32.NewProc("FindFirstFileW")
86 procFindNextFileW = modkernel32.NewProc("FindNextFileW")
87 procFindClose = modkernel32.NewProc("FindClose")
88 procGetFileInformationByHandle = modkernel32.NewProc("GetFileInformationByHandle")
89 procGetCurrentDirectoryW = modkernel32.NewProc("GetCurrentDirectoryW")
90 procSetCurrentDirectoryW = modkernel32.NewProc("SetCurrentDirectoryW")
91 procCreateDirectoryW = modkernel32.NewProc("CreateDirectoryW")
92 procRemoveDirectoryW = modkernel32.NewProc("RemoveDirectoryW")
93 procDeleteFileW = modkernel32.NewProc("DeleteFileW")
94 procMoveFileW = modkernel32.NewProc("MoveFileW")
95 procMoveFileExW = modkernel32.NewProc("MoveFileExW")
96 procGetComputerNameW = modkernel32.NewProc("GetComputerNameW")
97 procGetComputerNameExW = modkernel32.NewProc("GetComputerNameExW")
98 procSetEndOfFile = modkernel32.NewProc("SetEndOfFile")
99 procGetSystemTimeAsFileTime = modkernel32.NewProc("GetSystemTimeAsFileTime")
100 procGetSystemTimePreciseAsFileTime = modkernel32.NewProc("GetSystemTimePreciseAsFileTime")
101 procGetTimeZoneInformation = modkernel32.NewProc("GetTimeZoneInformation")
102 procCreateIoCompletionPort = modkernel32.NewProc("CreateIoCompletionPort")
103 procGetQueuedCompletionStatus = modkernel32.NewProc("GetQueuedCompletionStatus")
104 procPostQueuedCompletionStatus = modkernel32.NewProc("PostQueuedCompletionStatus")
105 procCancelIo = modkernel32.NewProc("CancelIo")
106 procCancelIoEx = modkernel32.NewProc("CancelIoEx")
107 procCreateProcessW = modkernel32.NewProc("CreateProcessW")
108 procOpenProcess = modkernel32.NewProc("OpenProcess")
109 procTerminateProcess = modkernel32.NewProc("TerminateProcess")
110 procGetExitCodeProcess = modkernel32.NewProc("GetExitCodeProcess")
111 procGetStartupInfoW = modkernel32.NewProc("GetStartupInfoW")
112 procGetCurrentProcess = modkernel32.NewProc("GetCurrentProcess")
113 procGetProcessTimes = modkernel32.NewProc("GetProcessTimes")
114 procDuplicateHandle = modkernel32.NewProc("DuplicateHandle")
115 procWaitForSingleObject = modkernel32.NewProc("WaitForSingleObject")
Stephane Barbarie260a5632019-02-26 16:12:49 -0500116 procWaitForMultipleObjects = modkernel32.NewProc("WaitForMultipleObjects")
sslobodrd046be82019-01-16 10:02:22 -0500117 procGetTempPathW = modkernel32.NewProc("GetTempPathW")
118 procCreatePipe = modkernel32.NewProc("CreatePipe")
119 procGetFileType = modkernel32.NewProc("GetFileType")
120 procCryptAcquireContextW = modadvapi32.NewProc("CryptAcquireContextW")
121 procCryptReleaseContext = modadvapi32.NewProc("CryptReleaseContext")
122 procCryptGenRandom = modadvapi32.NewProc("CryptGenRandom")
123 procGetEnvironmentStringsW = modkernel32.NewProc("GetEnvironmentStringsW")
124 procFreeEnvironmentStringsW = modkernel32.NewProc("FreeEnvironmentStringsW")
125 procGetEnvironmentVariableW = modkernel32.NewProc("GetEnvironmentVariableW")
126 procSetEnvironmentVariableW = modkernel32.NewProc("SetEnvironmentVariableW")
127 procSetFileTime = modkernel32.NewProc("SetFileTime")
128 procGetFileAttributesW = modkernel32.NewProc("GetFileAttributesW")
129 procSetFileAttributesW = modkernel32.NewProc("SetFileAttributesW")
130 procGetFileAttributesExW = modkernel32.NewProc("GetFileAttributesExW")
131 procGetCommandLineW = modkernel32.NewProc("GetCommandLineW")
132 procCommandLineToArgvW = modshell32.NewProc("CommandLineToArgvW")
133 procLocalFree = modkernel32.NewProc("LocalFree")
134 procSetHandleInformation = modkernel32.NewProc("SetHandleInformation")
135 procFlushFileBuffers = modkernel32.NewProc("FlushFileBuffers")
136 procGetFullPathNameW = modkernel32.NewProc("GetFullPathNameW")
137 procGetLongPathNameW = modkernel32.NewProc("GetLongPathNameW")
138 procGetShortPathNameW = modkernel32.NewProc("GetShortPathNameW")
139 procCreateFileMappingW = modkernel32.NewProc("CreateFileMappingW")
140 procMapViewOfFile = modkernel32.NewProc("MapViewOfFile")
141 procUnmapViewOfFile = modkernel32.NewProc("UnmapViewOfFile")
142 procFlushViewOfFile = modkernel32.NewProc("FlushViewOfFile")
143 procVirtualLock = modkernel32.NewProc("VirtualLock")
144 procVirtualUnlock = modkernel32.NewProc("VirtualUnlock")
145 procVirtualAlloc = modkernel32.NewProc("VirtualAlloc")
146 procVirtualFree = modkernel32.NewProc("VirtualFree")
147 procVirtualProtect = modkernel32.NewProc("VirtualProtect")
148 procTransmitFile = modmswsock.NewProc("TransmitFile")
149 procReadDirectoryChangesW = modkernel32.NewProc("ReadDirectoryChangesW")
150 procCertOpenSystemStoreW = modcrypt32.NewProc("CertOpenSystemStoreW")
151 procCertOpenStore = modcrypt32.NewProc("CertOpenStore")
152 procCertEnumCertificatesInStore = modcrypt32.NewProc("CertEnumCertificatesInStore")
153 procCertAddCertificateContextToStore = modcrypt32.NewProc("CertAddCertificateContextToStore")
154 procCertCloseStore = modcrypt32.NewProc("CertCloseStore")
155 procCertGetCertificateChain = modcrypt32.NewProc("CertGetCertificateChain")
156 procCertFreeCertificateChain = modcrypt32.NewProc("CertFreeCertificateChain")
157 procCertCreateCertificateContext = modcrypt32.NewProc("CertCreateCertificateContext")
158 procCertFreeCertificateContext = modcrypt32.NewProc("CertFreeCertificateContext")
159 procCertVerifyCertificateChainPolicy = modcrypt32.NewProc("CertVerifyCertificateChainPolicy")
160 procRegOpenKeyExW = modadvapi32.NewProc("RegOpenKeyExW")
161 procRegCloseKey = modadvapi32.NewProc("RegCloseKey")
162 procRegQueryInfoKeyW = modadvapi32.NewProc("RegQueryInfoKeyW")
163 procRegEnumKeyExW = modadvapi32.NewProc("RegEnumKeyExW")
164 procRegQueryValueExW = modadvapi32.NewProc("RegQueryValueExW")
165 procGetCurrentProcessId = modkernel32.NewProc("GetCurrentProcessId")
166 procGetConsoleMode = modkernel32.NewProc("GetConsoleMode")
167 procSetConsoleMode = modkernel32.NewProc("SetConsoleMode")
168 procGetConsoleScreenBufferInfo = modkernel32.NewProc("GetConsoleScreenBufferInfo")
169 procWriteConsoleW = modkernel32.NewProc("WriteConsoleW")
170 procReadConsoleW = modkernel32.NewProc("ReadConsoleW")
171 procCreateToolhelp32Snapshot = modkernel32.NewProc("CreateToolhelp32Snapshot")
172 procProcess32FirstW = modkernel32.NewProc("Process32FirstW")
173 procProcess32NextW = modkernel32.NewProc("Process32NextW")
174 procDeviceIoControl = modkernel32.NewProc("DeviceIoControl")
175 procCreateSymbolicLinkW = modkernel32.NewProc("CreateSymbolicLinkW")
176 procCreateHardLinkW = modkernel32.NewProc("CreateHardLinkW")
177 procGetCurrentThreadId = modkernel32.NewProc("GetCurrentThreadId")
178 procCreateEventW = modkernel32.NewProc("CreateEventW")
179 procCreateEventExW = modkernel32.NewProc("CreateEventExW")
180 procOpenEventW = modkernel32.NewProc("OpenEventW")
181 procSetEvent = modkernel32.NewProc("SetEvent")
182 procResetEvent = modkernel32.NewProc("ResetEvent")
183 procPulseEvent = modkernel32.NewProc("PulseEvent")
184 procDefineDosDeviceW = modkernel32.NewProc("DefineDosDeviceW")
185 procDeleteVolumeMountPointW = modkernel32.NewProc("DeleteVolumeMountPointW")
186 procFindFirstVolumeW = modkernel32.NewProc("FindFirstVolumeW")
187 procFindFirstVolumeMountPointW = modkernel32.NewProc("FindFirstVolumeMountPointW")
188 procFindNextVolumeW = modkernel32.NewProc("FindNextVolumeW")
189 procFindNextVolumeMountPointW = modkernel32.NewProc("FindNextVolumeMountPointW")
190 procFindVolumeClose = modkernel32.NewProc("FindVolumeClose")
191 procFindVolumeMountPointClose = modkernel32.NewProc("FindVolumeMountPointClose")
192 procGetDriveTypeW = modkernel32.NewProc("GetDriveTypeW")
193 procGetLogicalDrives = modkernel32.NewProc("GetLogicalDrives")
194 procGetLogicalDriveStringsW = modkernel32.NewProc("GetLogicalDriveStringsW")
195 procGetVolumeInformationW = modkernel32.NewProc("GetVolumeInformationW")
196 procGetVolumeInformationByHandleW = modkernel32.NewProc("GetVolumeInformationByHandleW")
197 procGetVolumeNameForVolumeMountPointW = modkernel32.NewProc("GetVolumeNameForVolumeMountPointW")
198 procGetVolumePathNameW = modkernel32.NewProc("GetVolumePathNameW")
199 procGetVolumePathNamesForVolumeNameW = modkernel32.NewProc("GetVolumePathNamesForVolumeNameW")
200 procQueryDosDeviceW = modkernel32.NewProc("QueryDosDeviceW")
201 procSetVolumeLabelW = modkernel32.NewProc("SetVolumeLabelW")
202 procSetVolumeMountPointW = modkernel32.NewProc("SetVolumeMountPointW")
203 procWSAStartup = modws2_32.NewProc("WSAStartup")
204 procWSACleanup = modws2_32.NewProc("WSACleanup")
205 procWSAIoctl = modws2_32.NewProc("WSAIoctl")
206 procsocket = modws2_32.NewProc("socket")
207 procsetsockopt = modws2_32.NewProc("setsockopt")
208 procgetsockopt = modws2_32.NewProc("getsockopt")
209 procbind = modws2_32.NewProc("bind")
210 procconnect = modws2_32.NewProc("connect")
211 procgetsockname = modws2_32.NewProc("getsockname")
212 procgetpeername = modws2_32.NewProc("getpeername")
213 proclisten = modws2_32.NewProc("listen")
214 procshutdown = modws2_32.NewProc("shutdown")
215 procclosesocket = modws2_32.NewProc("closesocket")
216 procAcceptEx = modmswsock.NewProc("AcceptEx")
217 procGetAcceptExSockaddrs = modmswsock.NewProc("GetAcceptExSockaddrs")
218 procWSARecv = modws2_32.NewProc("WSARecv")
219 procWSASend = modws2_32.NewProc("WSASend")
220 procWSARecvFrom = modws2_32.NewProc("WSARecvFrom")
221 procWSASendTo = modws2_32.NewProc("WSASendTo")
222 procgethostbyname = modws2_32.NewProc("gethostbyname")
223 procgetservbyname = modws2_32.NewProc("getservbyname")
224 procntohs = modws2_32.NewProc("ntohs")
225 procgetprotobyname = modws2_32.NewProc("getprotobyname")
226 procDnsQuery_W = moddnsapi.NewProc("DnsQuery_W")
227 procDnsRecordListFree = moddnsapi.NewProc("DnsRecordListFree")
228 procDnsNameCompare_W = moddnsapi.NewProc("DnsNameCompare_W")
229 procGetAddrInfoW = modws2_32.NewProc("GetAddrInfoW")
230 procFreeAddrInfoW = modws2_32.NewProc("FreeAddrInfoW")
231 procGetIfEntry = modiphlpapi.NewProc("GetIfEntry")
232 procGetAdaptersInfo = modiphlpapi.NewProc("GetAdaptersInfo")
233 procSetFileCompletionNotificationModes = modkernel32.NewProc("SetFileCompletionNotificationModes")
234 procWSAEnumProtocolsW = modws2_32.NewProc("WSAEnumProtocolsW")
235 procGetAdaptersAddresses = modiphlpapi.NewProc("GetAdaptersAddresses")
236 procGetACP = modkernel32.NewProc("GetACP")
237 procMultiByteToWideChar = modkernel32.NewProc("MultiByteToWideChar")
238 procTranslateNameW = modsecur32.NewProc("TranslateNameW")
239 procGetUserNameExW = modsecur32.NewProc("GetUserNameExW")
240 procNetUserGetInfo = modnetapi32.NewProc("NetUserGetInfo")
241 procNetGetJoinInformation = modnetapi32.NewProc("NetGetJoinInformation")
242 procNetApiBufferFree = modnetapi32.NewProc("NetApiBufferFree")
243 procLookupAccountSidW = modadvapi32.NewProc("LookupAccountSidW")
244 procLookupAccountNameW = modadvapi32.NewProc("LookupAccountNameW")
245 procConvertSidToStringSidW = modadvapi32.NewProc("ConvertSidToStringSidW")
246 procConvertStringSidToSidW = modadvapi32.NewProc("ConvertStringSidToSidW")
247 procGetLengthSid = modadvapi32.NewProc("GetLengthSid")
248 procCopySid = modadvapi32.NewProc("CopySid")
249 procAllocateAndInitializeSid = modadvapi32.NewProc("AllocateAndInitializeSid")
William Kurkiandaa6bb22019-03-07 12:26:28 -0500250 procCreateWellKnownSid = modadvapi32.NewProc("CreateWellKnownSid")
sslobodrd046be82019-01-16 10:02:22 -0500251 procFreeSid = modadvapi32.NewProc("FreeSid")
252 procEqualSid = modadvapi32.NewProc("EqualSid")
253 procCheckTokenMembership = modadvapi32.NewProc("CheckTokenMembership")
254 procOpenProcessToken = modadvapi32.NewProc("OpenProcessToken")
255 procGetTokenInformation = modadvapi32.NewProc("GetTokenInformation")
256 procGetUserProfileDirectoryW = moduserenv.NewProc("GetUserProfileDirectoryW")
William Kurkiandaa6bb22019-03-07 12:26:28 -0500257 procGetSystemDirectoryW = modkernel32.NewProc("GetSystemDirectoryW")
sslobodrd046be82019-01-16 10:02:22 -0500258)
259
260func RegisterEventSource(uncServerName *uint16, sourceName *uint16) (handle Handle, err error) {
261 r0, _, e1 := syscall.Syscall(procRegisterEventSourceW.Addr(), 2, uintptr(unsafe.Pointer(uncServerName)), uintptr(unsafe.Pointer(sourceName)), 0)
262 handle = Handle(r0)
263 if handle == 0 {
264 if e1 != 0 {
265 err = errnoErr(e1)
266 } else {
267 err = syscall.EINVAL
268 }
269 }
270 return
271}
272
273func DeregisterEventSource(handle Handle) (err error) {
274 r1, _, e1 := syscall.Syscall(procDeregisterEventSource.Addr(), 1, uintptr(handle), 0, 0)
275 if r1 == 0 {
276 if e1 != 0 {
277 err = errnoErr(e1)
278 } else {
279 err = syscall.EINVAL
280 }
281 }
282 return
283}
284
285func ReportEvent(log Handle, etype uint16, category uint16, eventId uint32, usrSId uintptr, numStrings uint16, dataSize uint32, strings **uint16, rawData *byte) (err error) {
286 r1, _, e1 := syscall.Syscall9(procReportEventW.Addr(), 9, uintptr(log), uintptr(etype), uintptr(category), uintptr(eventId), uintptr(usrSId), uintptr(numStrings), uintptr(dataSize), uintptr(unsafe.Pointer(strings)), uintptr(unsafe.Pointer(rawData)))
287 if r1 == 0 {
288 if e1 != 0 {
289 err = errnoErr(e1)
290 } else {
291 err = syscall.EINVAL
292 }
293 }
294 return
295}
296
297func OpenSCManager(machineName *uint16, databaseName *uint16, access uint32) (handle Handle, err error) {
298 r0, _, e1 := syscall.Syscall(procOpenSCManagerW.Addr(), 3, uintptr(unsafe.Pointer(machineName)), uintptr(unsafe.Pointer(databaseName)), uintptr(access))
299 handle = Handle(r0)
300 if handle == 0 {
301 if e1 != 0 {
302 err = errnoErr(e1)
303 } else {
304 err = syscall.EINVAL
305 }
306 }
307 return
308}
309
310func CloseServiceHandle(handle Handle) (err error) {
311 r1, _, e1 := syscall.Syscall(procCloseServiceHandle.Addr(), 1, uintptr(handle), 0, 0)
312 if r1 == 0 {
313 if e1 != 0 {
314 err = errnoErr(e1)
315 } else {
316 err = syscall.EINVAL
317 }
318 }
319 return
320}
321
322func CreateService(mgr Handle, serviceName *uint16, displayName *uint16, access uint32, srvType uint32, startType uint32, errCtl uint32, pathName *uint16, loadOrderGroup *uint16, tagId *uint32, dependencies *uint16, serviceStartName *uint16, password *uint16) (handle Handle, err error) {
323 r0, _, e1 := syscall.Syscall15(procCreateServiceW.Addr(), 13, uintptr(mgr), uintptr(unsafe.Pointer(serviceName)), uintptr(unsafe.Pointer(displayName)), uintptr(access), uintptr(srvType), uintptr(startType), uintptr(errCtl), uintptr(unsafe.Pointer(pathName)), uintptr(unsafe.Pointer(loadOrderGroup)), uintptr(unsafe.Pointer(tagId)), uintptr(unsafe.Pointer(dependencies)), uintptr(unsafe.Pointer(serviceStartName)), uintptr(unsafe.Pointer(password)), 0, 0)
324 handle = Handle(r0)
325 if handle == 0 {
326 if e1 != 0 {
327 err = errnoErr(e1)
328 } else {
329 err = syscall.EINVAL
330 }
331 }
332 return
333}
334
335func OpenService(mgr Handle, serviceName *uint16, access uint32) (handle Handle, err error) {
336 r0, _, e1 := syscall.Syscall(procOpenServiceW.Addr(), 3, uintptr(mgr), uintptr(unsafe.Pointer(serviceName)), uintptr(access))
337 handle = Handle(r0)
338 if handle == 0 {
339 if e1 != 0 {
340 err = errnoErr(e1)
341 } else {
342 err = syscall.EINVAL
343 }
344 }
345 return
346}
347
348func DeleteService(service Handle) (err error) {
349 r1, _, e1 := syscall.Syscall(procDeleteService.Addr(), 1, uintptr(service), 0, 0)
350 if r1 == 0 {
351 if e1 != 0 {
352 err = errnoErr(e1)
353 } else {
354 err = syscall.EINVAL
355 }
356 }
357 return
358}
359
360func StartService(service Handle, numArgs uint32, argVectors **uint16) (err error) {
361 r1, _, e1 := syscall.Syscall(procStartServiceW.Addr(), 3, uintptr(service), uintptr(numArgs), uintptr(unsafe.Pointer(argVectors)))
362 if r1 == 0 {
363 if e1 != 0 {
364 err = errnoErr(e1)
365 } else {
366 err = syscall.EINVAL
367 }
368 }
369 return
370}
371
372func QueryServiceStatus(service Handle, status *SERVICE_STATUS) (err error) {
373 r1, _, e1 := syscall.Syscall(procQueryServiceStatus.Addr(), 2, uintptr(service), uintptr(unsafe.Pointer(status)), 0)
374 if r1 == 0 {
375 if e1 != 0 {
376 err = errnoErr(e1)
377 } else {
378 err = syscall.EINVAL
379 }
380 }
381 return
382}
383
384func ControlService(service Handle, control uint32, status *SERVICE_STATUS) (err error) {
385 r1, _, e1 := syscall.Syscall(procControlService.Addr(), 3, uintptr(service), uintptr(control), uintptr(unsafe.Pointer(status)))
386 if r1 == 0 {
387 if e1 != 0 {
388 err = errnoErr(e1)
389 } else {
390 err = syscall.EINVAL
391 }
392 }
393 return
394}
395
396func StartServiceCtrlDispatcher(serviceTable *SERVICE_TABLE_ENTRY) (err error) {
397 r1, _, e1 := syscall.Syscall(procStartServiceCtrlDispatcherW.Addr(), 1, uintptr(unsafe.Pointer(serviceTable)), 0, 0)
398 if r1 == 0 {
399 if e1 != 0 {
400 err = errnoErr(e1)
401 } else {
402 err = syscall.EINVAL
403 }
404 }
405 return
406}
407
408func SetServiceStatus(service Handle, serviceStatus *SERVICE_STATUS) (err error) {
409 r1, _, e1 := syscall.Syscall(procSetServiceStatus.Addr(), 2, uintptr(service), uintptr(unsafe.Pointer(serviceStatus)), 0)
410 if r1 == 0 {
411 if e1 != 0 {
412 err = errnoErr(e1)
413 } else {
414 err = syscall.EINVAL
415 }
416 }
417 return
418}
419
420func ChangeServiceConfig(service Handle, serviceType uint32, startType uint32, errorControl uint32, binaryPathName *uint16, loadOrderGroup *uint16, tagId *uint32, dependencies *uint16, serviceStartName *uint16, password *uint16, displayName *uint16) (err error) {
421 r1, _, e1 := syscall.Syscall12(procChangeServiceConfigW.Addr(), 11, uintptr(service), uintptr(serviceType), uintptr(startType), uintptr(errorControl), uintptr(unsafe.Pointer(binaryPathName)), uintptr(unsafe.Pointer(loadOrderGroup)), uintptr(unsafe.Pointer(tagId)), uintptr(unsafe.Pointer(dependencies)), uintptr(unsafe.Pointer(serviceStartName)), uintptr(unsafe.Pointer(password)), uintptr(unsafe.Pointer(displayName)), 0)
422 if r1 == 0 {
423 if e1 != 0 {
424 err = errnoErr(e1)
425 } else {
426 err = syscall.EINVAL
427 }
428 }
429 return
430}
431
432func QueryServiceConfig(service Handle, serviceConfig *QUERY_SERVICE_CONFIG, bufSize uint32, bytesNeeded *uint32) (err error) {
433 r1, _, e1 := syscall.Syscall6(procQueryServiceConfigW.Addr(), 4, uintptr(service), uintptr(unsafe.Pointer(serviceConfig)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), 0, 0)
434 if r1 == 0 {
435 if e1 != 0 {
436 err = errnoErr(e1)
437 } else {
438 err = syscall.EINVAL
439 }
440 }
441 return
442}
443
444func ChangeServiceConfig2(service Handle, infoLevel uint32, info *byte) (err error) {
445 r1, _, e1 := syscall.Syscall(procChangeServiceConfig2W.Addr(), 3, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(info)))
446 if r1 == 0 {
447 if e1 != 0 {
448 err = errnoErr(e1)
449 } else {
450 err = syscall.EINVAL
451 }
452 }
453 return
454}
455
456func QueryServiceConfig2(service Handle, infoLevel uint32, buff *byte, buffSize uint32, bytesNeeded *uint32) (err error) {
457 r1, _, e1 := syscall.Syscall6(procQueryServiceConfig2W.Addr(), 5, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(buff)), uintptr(buffSize), uintptr(unsafe.Pointer(bytesNeeded)), 0)
458 if r1 == 0 {
459 if e1 != 0 {
460 err = errnoErr(e1)
461 } else {
462 err = syscall.EINVAL
463 }
464 }
465 return
466}
467
468func EnumServicesStatusEx(mgr Handle, infoLevel uint32, serviceType uint32, serviceState uint32, services *byte, bufSize uint32, bytesNeeded *uint32, servicesReturned *uint32, resumeHandle *uint32, groupName *uint16) (err error) {
469 r1, _, e1 := syscall.Syscall12(procEnumServicesStatusExW.Addr(), 10, uintptr(mgr), uintptr(infoLevel), uintptr(serviceType), uintptr(serviceState), uintptr(unsafe.Pointer(services)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), uintptr(unsafe.Pointer(servicesReturned)), uintptr(unsafe.Pointer(resumeHandle)), uintptr(unsafe.Pointer(groupName)), 0, 0)
470 if r1 == 0 {
471 if e1 != 0 {
472 err = errnoErr(e1)
473 } else {
474 err = syscall.EINVAL
475 }
476 }
477 return
478}
479
480func QueryServiceStatusEx(service Handle, infoLevel uint32, buff *byte, buffSize uint32, bytesNeeded *uint32) (err error) {
481 r1, _, e1 := syscall.Syscall6(procQueryServiceStatusEx.Addr(), 5, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(buff)), uintptr(buffSize), uintptr(unsafe.Pointer(bytesNeeded)), 0)
482 if r1 == 0 {
483 if e1 != 0 {
484 err = errnoErr(e1)
485 } else {
486 err = syscall.EINVAL
487 }
488 }
489 return
490}
491
492func GetLastError() (lasterr error) {
493 r0, _, _ := syscall.Syscall(procGetLastError.Addr(), 0, 0, 0, 0)
494 if r0 != 0 {
495 lasterr = syscall.Errno(r0)
496 }
497 return
498}
499
500func LoadLibrary(libname string) (handle Handle, err error) {
501 var _p0 *uint16
502 _p0, err = syscall.UTF16PtrFromString(libname)
503 if err != nil {
504 return
505 }
506 return _LoadLibrary(_p0)
507}
508
509func _LoadLibrary(libname *uint16) (handle Handle, err error) {
510 r0, _, e1 := syscall.Syscall(procLoadLibraryW.Addr(), 1, uintptr(unsafe.Pointer(libname)), 0, 0)
511 handle = Handle(r0)
512 if handle == 0 {
513 if e1 != 0 {
514 err = errnoErr(e1)
515 } else {
516 err = syscall.EINVAL
517 }
518 }
519 return
520}
521
522func LoadLibraryEx(libname string, zero Handle, flags uintptr) (handle Handle, err error) {
523 var _p0 *uint16
524 _p0, err = syscall.UTF16PtrFromString(libname)
525 if err != nil {
526 return
527 }
528 return _LoadLibraryEx(_p0, zero, flags)
529}
530
531func _LoadLibraryEx(libname *uint16, zero Handle, flags uintptr) (handle Handle, err error) {
532 r0, _, e1 := syscall.Syscall(procLoadLibraryExW.Addr(), 3, uintptr(unsafe.Pointer(libname)), uintptr(zero), uintptr(flags))
533 handle = Handle(r0)
534 if handle == 0 {
535 if e1 != 0 {
536 err = errnoErr(e1)
537 } else {
538 err = syscall.EINVAL
539 }
540 }
541 return
542}
543
544func FreeLibrary(handle Handle) (err error) {
545 r1, _, e1 := syscall.Syscall(procFreeLibrary.Addr(), 1, uintptr(handle), 0, 0)
546 if r1 == 0 {
547 if e1 != 0 {
548 err = errnoErr(e1)
549 } else {
550 err = syscall.EINVAL
551 }
552 }
553 return
554}
555
556func GetProcAddress(module Handle, procname string) (proc uintptr, err error) {
557 var _p0 *byte
558 _p0, err = syscall.BytePtrFromString(procname)
559 if err != nil {
560 return
561 }
562 return _GetProcAddress(module, _p0)
563}
564
565func _GetProcAddress(module Handle, procname *byte) (proc uintptr, err error) {
566 r0, _, e1 := syscall.Syscall(procGetProcAddress.Addr(), 2, uintptr(module), uintptr(unsafe.Pointer(procname)), 0)
567 proc = uintptr(r0)
568 if proc == 0 {
569 if e1 != 0 {
570 err = errnoErr(e1)
571 } else {
572 err = syscall.EINVAL
573 }
574 }
575 return
576}
577
578func GetVersion() (ver uint32, err error) {
579 r0, _, e1 := syscall.Syscall(procGetVersion.Addr(), 0, 0, 0, 0)
580 ver = uint32(r0)
581 if ver == 0 {
582 if e1 != 0 {
583 err = errnoErr(e1)
584 } else {
585 err = syscall.EINVAL
586 }
587 }
588 return
589}
590
591func FormatMessage(flags uint32, msgsrc uintptr, msgid uint32, langid uint32, buf []uint16, args *byte) (n uint32, err error) {
592 var _p0 *uint16
593 if len(buf) > 0 {
594 _p0 = &buf[0]
595 }
596 r0, _, e1 := syscall.Syscall9(procFormatMessageW.Addr(), 7, uintptr(flags), uintptr(msgsrc), uintptr(msgid), uintptr(langid), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(args)), 0, 0)
597 n = uint32(r0)
598 if n == 0 {
599 if e1 != 0 {
600 err = errnoErr(e1)
601 } else {
602 err = syscall.EINVAL
603 }
604 }
605 return
606}
607
608func ExitProcess(exitcode uint32) {
609 syscall.Syscall(procExitProcess.Addr(), 1, uintptr(exitcode), 0, 0)
610 return
611}
612
613func CreateFile(name *uint16, access uint32, mode uint32, sa *SecurityAttributes, createmode uint32, attrs uint32, templatefile int32) (handle Handle, err error) {
614 r0, _, e1 := syscall.Syscall9(procCreateFileW.Addr(), 7, uintptr(unsafe.Pointer(name)), uintptr(access), uintptr(mode), uintptr(unsafe.Pointer(sa)), uintptr(createmode), uintptr(attrs), uintptr(templatefile), 0, 0)
615 handle = Handle(r0)
616 if handle == InvalidHandle {
617 if e1 != 0 {
618 err = errnoErr(e1)
619 } else {
620 err = syscall.EINVAL
621 }
622 }
623 return
624}
625
626func ReadFile(handle Handle, buf []byte, done *uint32, overlapped *Overlapped) (err error) {
627 var _p0 *byte
628 if len(buf) > 0 {
629 _p0 = &buf[0]
630 }
631 r1, _, e1 := syscall.Syscall6(procReadFile.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(done)), uintptr(unsafe.Pointer(overlapped)), 0)
632 if r1 == 0 {
633 if e1 != 0 {
634 err = errnoErr(e1)
635 } else {
636 err = syscall.EINVAL
637 }
638 }
639 return
640}
641
642func WriteFile(handle Handle, buf []byte, done *uint32, overlapped *Overlapped) (err error) {
643 var _p0 *byte
644 if len(buf) > 0 {
645 _p0 = &buf[0]
646 }
647 r1, _, e1 := syscall.Syscall6(procWriteFile.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(done)), uintptr(unsafe.Pointer(overlapped)), 0)
648 if r1 == 0 {
649 if e1 != 0 {
650 err = errnoErr(e1)
651 } else {
652 err = syscall.EINVAL
653 }
654 }
655 return
656}
657
William Kurkiandaa6bb22019-03-07 12:26:28 -0500658func GetOverlappedResult(handle Handle, overlapped *Overlapped, done *uint32, wait bool) (err error) {
659 var _p0 uint32
660 if wait {
661 _p0 = 1
662 } else {
663 _p0 = 0
664 }
665 r1, _, e1 := syscall.Syscall6(procGetOverlappedResult.Addr(), 4, uintptr(handle), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(done)), uintptr(_p0), 0, 0)
666 if r1 == 0 {
667 if e1 != 0 {
668 err = errnoErr(e1)
669 } else {
670 err = syscall.EINVAL
671 }
672 }
673 return
674}
675
sslobodrd046be82019-01-16 10:02:22 -0500676func SetFilePointer(handle Handle, lowoffset int32, highoffsetptr *int32, whence uint32) (newlowoffset uint32, err error) {
677 r0, _, e1 := syscall.Syscall6(procSetFilePointer.Addr(), 4, uintptr(handle), uintptr(lowoffset), uintptr(unsafe.Pointer(highoffsetptr)), uintptr(whence), 0, 0)
678 newlowoffset = uint32(r0)
679 if newlowoffset == 0xffffffff {
680 if e1 != 0 {
681 err = errnoErr(e1)
682 } else {
683 err = syscall.EINVAL
684 }
685 }
686 return
687}
688
689func CloseHandle(handle Handle) (err error) {
690 r1, _, e1 := syscall.Syscall(procCloseHandle.Addr(), 1, uintptr(handle), 0, 0)
691 if r1 == 0 {
692 if e1 != 0 {
693 err = errnoErr(e1)
694 } else {
695 err = syscall.EINVAL
696 }
697 }
698 return
699}
700
701func GetStdHandle(stdhandle uint32) (handle Handle, err error) {
702 r0, _, e1 := syscall.Syscall(procGetStdHandle.Addr(), 1, uintptr(stdhandle), 0, 0)
703 handle = Handle(r0)
704 if handle == InvalidHandle {
705 if e1 != 0 {
706 err = errnoErr(e1)
707 } else {
708 err = syscall.EINVAL
709 }
710 }
711 return
712}
713
714func SetStdHandle(stdhandle uint32, handle Handle) (err error) {
715 r1, _, e1 := syscall.Syscall(procSetStdHandle.Addr(), 2, uintptr(stdhandle), uintptr(handle), 0)
716 if r1 == 0 {
717 if e1 != 0 {
718 err = errnoErr(e1)
719 } else {
720 err = syscall.EINVAL
721 }
722 }
723 return
724}
725
726func findFirstFile1(name *uint16, data *win32finddata1) (handle Handle, err error) {
727 r0, _, e1 := syscall.Syscall(procFindFirstFileW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(data)), 0)
728 handle = Handle(r0)
729 if handle == InvalidHandle {
730 if e1 != 0 {
731 err = errnoErr(e1)
732 } else {
733 err = syscall.EINVAL
734 }
735 }
736 return
737}
738
739func findNextFile1(handle Handle, data *win32finddata1) (err error) {
740 r1, _, e1 := syscall.Syscall(procFindNextFileW.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0)
741 if r1 == 0 {
742 if e1 != 0 {
743 err = errnoErr(e1)
744 } else {
745 err = syscall.EINVAL
746 }
747 }
748 return
749}
750
751func FindClose(handle Handle) (err error) {
752 r1, _, e1 := syscall.Syscall(procFindClose.Addr(), 1, uintptr(handle), 0, 0)
753 if r1 == 0 {
754 if e1 != 0 {
755 err = errnoErr(e1)
756 } else {
757 err = syscall.EINVAL
758 }
759 }
760 return
761}
762
763func GetFileInformationByHandle(handle Handle, data *ByHandleFileInformation) (err error) {
764 r1, _, e1 := syscall.Syscall(procGetFileInformationByHandle.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0)
765 if r1 == 0 {
766 if e1 != 0 {
767 err = errnoErr(e1)
768 } else {
769 err = syscall.EINVAL
770 }
771 }
772 return
773}
774
775func GetCurrentDirectory(buflen uint32, buf *uint16) (n uint32, err error) {
776 r0, _, e1 := syscall.Syscall(procGetCurrentDirectoryW.Addr(), 2, uintptr(buflen), uintptr(unsafe.Pointer(buf)), 0)
777 n = uint32(r0)
778 if n == 0 {
779 if e1 != 0 {
780 err = errnoErr(e1)
781 } else {
782 err = syscall.EINVAL
783 }
784 }
785 return
786}
787
788func SetCurrentDirectory(path *uint16) (err error) {
789 r1, _, e1 := syscall.Syscall(procSetCurrentDirectoryW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0)
790 if r1 == 0 {
791 if e1 != 0 {
792 err = errnoErr(e1)
793 } else {
794 err = syscall.EINVAL
795 }
796 }
797 return
798}
799
800func CreateDirectory(path *uint16, sa *SecurityAttributes) (err error) {
801 r1, _, e1 := syscall.Syscall(procCreateDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(path)), uintptr(unsafe.Pointer(sa)), 0)
802 if r1 == 0 {
803 if e1 != 0 {
804 err = errnoErr(e1)
805 } else {
806 err = syscall.EINVAL
807 }
808 }
809 return
810}
811
812func RemoveDirectory(path *uint16) (err error) {
813 r1, _, e1 := syscall.Syscall(procRemoveDirectoryW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0)
814 if r1 == 0 {
815 if e1 != 0 {
816 err = errnoErr(e1)
817 } else {
818 err = syscall.EINVAL
819 }
820 }
821 return
822}
823
824func DeleteFile(path *uint16) (err error) {
825 r1, _, e1 := syscall.Syscall(procDeleteFileW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0)
826 if r1 == 0 {
827 if e1 != 0 {
828 err = errnoErr(e1)
829 } else {
830 err = syscall.EINVAL
831 }
832 }
833 return
834}
835
836func MoveFile(from *uint16, to *uint16) (err error) {
837 r1, _, e1 := syscall.Syscall(procMoveFileW.Addr(), 2, uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(to)), 0)
838 if r1 == 0 {
839 if e1 != 0 {
840 err = errnoErr(e1)
841 } else {
842 err = syscall.EINVAL
843 }
844 }
845 return
846}
847
848func MoveFileEx(from *uint16, to *uint16, flags uint32) (err error) {
849 r1, _, e1 := syscall.Syscall(procMoveFileExW.Addr(), 3, uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(to)), uintptr(flags))
850 if r1 == 0 {
851 if e1 != 0 {
852 err = errnoErr(e1)
853 } else {
854 err = syscall.EINVAL
855 }
856 }
857 return
858}
859
860func GetComputerName(buf *uint16, n *uint32) (err error) {
861 r1, _, e1 := syscall.Syscall(procGetComputerNameW.Addr(), 2, uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(n)), 0)
862 if r1 == 0 {
863 if e1 != 0 {
864 err = errnoErr(e1)
865 } else {
866 err = syscall.EINVAL
867 }
868 }
869 return
870}
871
872func GetComputerNameEx(nametype uint32, buf *uint16, n *uint32) (err error) {
873 r1, _, e1 := syscall.Syscall(procGetComputerNameExW.Addr(), 3, uintptr(nametype), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(n)))
874 if r1 == 0 {
875 if e1 != 0 {
876 err = errnoErr(e1)
877 } else {
878 err = syscall.EINVAL
879 }
880 }
881 return
882}
883
884func SetEndOfFile(handle Handle) (err error) {
885 r1, _, e1 := syscall.Syscall(procSetEndOfFile.Addr(), 1, uintptr(handle), 0, 0)
886 if r1 == 0 {
887 if e1 != 0 {
888 err = errnoErr(e1)
889 } else {
890 err = syscall.EINVAL
891 }
892 }
893 return
894}
895
896func GetSystemTimeAsFileTime(time *Filetime) {
897 syscall.Syscall(procGetSystemTimeAsFileTime.Addr(), 1, uintptr(unsafe.Pointer(time)), 0, 0)
898 return
899}
900
901func GetSystemTimePreciseAsFileTime(time *Filetime) {
902 syscall.Syscall(procGetSystemTimePreciseAsFileTime.Addr(), 1, uintptr(unsafe.Pointer(time)), 0, 0)
903 return
904}
905
906func GetTimeZoneInformation(tzi *Timezoneinformation) (rc uint32, err error) {
907 r0, _, e1 := syscall.Syscall(procGetTimeZoneInformation.Addr(), 1, uintptr(unsafe.Pointer(tzi)), 0, 0)
908 rc = uint32(r0)
909 if rc == 0xffffffff {
910 if e1 != 0 {
911 err = errnoErr(e1)
912 } else {
913 err = syscall.EINVAL
914 }
915 }
916 return
917}
918
919func CreateIoCompletionPort(filehandle Handle, cphandle Handle, key uint32, threadcnt uint32) (handle Handle, err error) {
920 r0, _, e1 := syscall.Syscall6(procCreateIoCompletionPort.Addr(), 4, uintptr(filehandle), uintptr(cphandle), uintptr(key), uintptr(threadcnt), 0, 0)
921 handle = Handle(r0)
922 if handle == 0 {
923 if e1 != 0 {
924 err = errnoErr(e1)
925 } else {
926 err = syscall.EINVAL
927 }
928 }
929 return
930}
931
932func GetQueuedCompletionStatus(cphandle Handle, qty *uint32, key *uint32, overlapped **Overlapped, timeout uint32) (err error) {
933 r1, _, e1 := syscall.Syscall6(procGetQueuedCompletionStatus.Addr(), 5, uintptr(cphandle), uintptr(unsafe.Pointer(qty)), uintptr(unsafe.Pointer(key)), uintptr(unsafe.Pointer(overlapped)), uintptr(timeout), 0)
934 if r1 == 0 {
935 if e1 != 0 {
936 err = errnoErr(e1)
937 } else {
938 err = syscall.EINVAL
939 }
940 }
941 return
942}
943
944func PostQueuedCompletionStatus(cphandle Handle, qty uint32, key uint32, overlapped *Overlapped) (err error) {
945 r1, _, e1 := syscall.Syscall6(procPostQueuedCompletionStatus.Addr(), 4, uintptr(cphandle), uintptr(qty), uintptr(key), uintptr(unsafe.Pointer(overlapped)), 0, 0)
946 if r1 == 0 {
947 if e1 != 0 {
948 err = errnoErr(e1)
949 } else {
950 err = syscall.EINVAL
951 }
952 }
953 return
954}
955
956func CancelIo(s Handle) (err error) {
957 r1, _, e1 := syscall.Syscall(procCancelIo.Addr(), 1, uintptr(s), 0, 0)
958 if r1 == 0 {
959 if e1 != 0 {
960 err = errnoErr(e1)
961 } else {
962 err = syscall.EINVAL
963 }
964 }
965 return
966}
967
968func CancelIoEx(s Handle, o *Overlapped) (err error) {
969 r1, _, e1 := syscall.Syscall(procCancelIoEx.Addr(), 2, uintptr(s), uintptr(unsafe.Pointer(o)), 0)
970 if r1 == 0 {
971 if e1 != 0 {
972 err = errnoErr(e1)
973 } else {
974 err = syscall.EINVAL
975 }
976 }
977 return
978}
979
980func CreateProcess(appName *uint16, commandLine *uint16, procSecurity *SecurityAttributes, threadSecurity *SecurityAttributes, inheritHandles bool, creationFlags uint32, env *uint16, currentDir *uint16, startupInfo *StartupInfo, outProcInfo *ProcessInformation) (err error) {
981 var _p0 uint32
982 if inheritHandles {
983 _p0 = 1
984 } else {
985 _p0 = 0
986 }
987 r1, _, e1 := syscall.Syscall12(procCreateProcessW.Addr(), 10, uintptr(unsafe.Pointer(appName)), uintptr(unsafe.Pointer(commandLine)), uintptr(unsafe.Pointer(procSecurity)), uintptr(unsafe.Pointer(threadSecurity)), uintptr(_p0), uintptr(creationFlags), uintptr(unsafe.Pointer(env)), uintptr(unsafe.Pointer(currentDir)), uintptr(unsafe.Pointer(startupInfo)), uintptr(unsafe.Pointer(outProcInfo)), 0, 0)
988 if r1 == 0 {
989 if e1 != 0 {
990 err = errnoErr(e1)
991 } else {
992 err = syscall.EINVAL
993 }
994 }
995 return
996}
997
998func OpenProcess(da uint32, inheritHandle bool, pid uint32) (handle Handle, err error) {
999 var _p0 uint32
1000 if inheritHandle {
1001 _p0 = 1
1002 } else {
1003 _p0 = 0
1004 }
1005 r0, _, e1 := syscall.Syscall(procOpenProcess.Addr(), 3, uintptr(da), uintptr(_p0), uintptr(pid))
1006 handle = Handle(r0)
1007 if handle == 0 {
1008 if e1 != 0 {
1009 err = errnoErr(e1)
1010 } else {
1011 err = syscall.EINVAL
1012 }
1013 }
1014 return
1015}
1016
1017func TerminateProcess(handle Handle, exitcode uint32) (err error) {
1018 r1, _, e1 := syscall.Syscall(procTerminateProcess.Addr(), 2, uintptr(handle), uintptr(exitcode), 0)
1019 if r1 == 0 {
1020 if e1 != 0 {
1021 err = errnoErr(e1)
1022 } else {
1023 err = syscall.EINVAL
1024 }
1025 }
1026 return
1027}
1028
1029func GetExitCodeProcess(handle Handle, exitcode *uint32) (err error) {
1030 r1, _, e1 := syscall.Syscall(procGetExitCodeProcess.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(exitcode)), 0)
1031 if r1 == 0 {
1032 if e1 != 0 {
1033 err = errnoErr(e1)
1034 } else {
1035 err = syscall.EINVAL
1036 }
1037 }
1038 return
1039}
1040
1041func GetStartupInfo(startupInfo *StartupInfo) (err error) {
1042 r1, _, e1 := syscall.Syscall(procGetStartupInfoW.Addr(), 1, uintptr(unsafe.Pointer(startupInfo)), 0, 0)
1043 if r1 == 0 {
1044 if e1 != 0 {
1045 err = errnoErr(e1)
1046 } else {
1047 err = syscall.EINVAL
1048 }
1049 }
1050 return
1051}
1052
1053func GetCurrentProcess() (pseudoHandle Handle, err error) {
1054 r0, _, e1 := syscall.Syscall(procGetCurrentProcess.Addr(), 0, 0, 0, 0)
1055 pseudoHandle = Handle(r0)
1056 if pseudoHandle == 0 {
1057 if e1 != 0 {
1058 err = errnoErr(e1)
1059 } else {
1060 err = syscall.EINVAL
1061 }
1062 }
1063 return
1064}
1065
1066func GetProcessTimes(handle Handle, creationTime *Filetime, exitTime *Filetime, kernelTime *Filetime, userTime *Filetime) (err error) {
1067 r1, _, e1 := syscall.Syscall6(procGetProcessTimes.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(creationTime)), uintptr(unsafe.Pointer(exitTime)), uintptr(unsafe.Pointer(kernelTime)), uintptr(unsafe.Pointer(userTime)), 0)
1068 if r1 == 0 {
1069 if e1 != 0 {
1070 err = errnoErr(e1)
1071 } else {
1072 err = syscall.EINVAL
1073 }
1074 }
1075 return
1076}
1077
1078func DuplicateHandle(hSourceProcessHandle Handle, hSourceHandle Handle, hTargetProcessHandle Handle, lpTargetHandle *Handle, dwDesiredAccess uint32, bInheritHandle bool, dwOptions uint32) (err error) {
1079 var _p0 uint32
1080 if bInheritHandle {
1081 _p0 = 1
1082 } else {
1083 _p0 = 0
1084 }
1085 r1, _, e1 := syscall.Syscall9(procDuplicateHandle.Addr(), 7, uintptr(hSourceProcessHandle), uintptr(hSourceHandle), uintptr(hTargetProcessHandle), uintptr(unsafe.Pointer(lpTargetHandle)), uintptr(dwDesiredAccess), uintptr(_p0), uintptr(dwOptions), 0, 0)
1086 if r1 == 0 {
1087 if e1 != 0 {
1088 err = errnoErr(e1)
1089 } else {
1090 err = syscall.EINVAL
1091 }
1092 }
1093 return
1094}
1095
1096func WaitForSingleObject(handle Handle, waitMilliseconds uint32) (event uint32, err error) {
1097 r0, _, e1 := syscall.Syscall(procWaitForSingleObject.Addr(), 2, uintptr(handle), uintptr(waitMilliseconds), 0)
1098 event = uint32(r0)
1099 if event == 0xffffffff {
1100 if e1 != 0 {
1101 err = errnoErr(e1)
1102 } else {
1103 err = syscall.EINVAL
1104 }
1105 }
1106 return
1107}
1108
Stephane Barbarie260a5632019-02-26 16:12:49 -05001109func waitForMultipleObjects(count uint32, handles uintptr, waitAll bool, waitMilliseconds uint32) (event uint32, err error) {
1110 var _p0 uint32
1111 if waitAll {
1112 _p0 = 1
1113 } else {
1114 _p0 = 0
1115 }
1116 r0, _, e1 := syscall.Syscall6(procWaitForMultipleObjects.Addr(), 4, uintptr(count), uintptr(handles), uintptr(_p0), uintptr(waitMilliseconds), 0, 0)
1117 event = uint32(r0)
1118 if event == 0xffffffff {
1119 if e1 != 0 {
1120 err = errnoErr(e1)
1121 } else {
1122 err = syscall.EINVAL
1123 }
1124 }
1125 return
1126}
1127
sslobodrd046be82019-01-16 10:02:22 -05001128func GetTempPath(buflen uint32, buf *uint16) (n uint32, err error) {
1129 r0, _, e1 := syscall.Syscall(procGetTempPathW.Addr(), 2, uintptr(buflen), uintptr(unsafe.Pointer(buf)), 0)
1130 n = uint32(r0)
1131 if n == 0 {
1132 if e1 != 0 {
1133 err = errnoErr(e1)
1134 } else {
1135 err = syscall.EINVAL
1136 }
1137 }
1138 return
1139}
1140
1141func CreatePipe(readhandle *Handle, writehandle *Handle, sa *SecurityAttributes, size uint32) (err error) {
1142 r1, _, e1 := syscall.Syscall6(procCreatePipe.Addr(), 4, uintptr(unsafe.Pointer(readhandle)), uintptr(unsafe.Pointer(writehandle)), uintptr(unsafe.Pointer(sa)), uintptr(size), 0, 0)
1143 if r1 == 0 {
1144 if e1 != 0 {
1145 err = errnoErr(e1)
1146 } else {
1147 err = syscall.EINVAL
1148 }
1149 }
1150 return
1151}
1152
1153func GetFileType(filehandle Handle) (n uint32, err error) {
1154 r0, _, e1 := syscall.Syscall(procGetFileType.Addr(), 1, uintptr(filehandle), 0, 0)
1155 n = uint32(r0)
1156 if n == 0 {
1157 if e1 != 0 {
1158 err = errnoErr(e1)
1159 } else {
1160 err = syscall.EINVAL
1161 }
1162 }
1163 return
1164}
1165
1166func CryptAcquireContext(provhandle *Handle, container *uint16, provider *uint16, provtype uint32, flags uint32) (err error) {
1167 r1, _, e1 := syscall.Syscall6(procCryptAcquireContextW.Addr(), 5, uintptr(unsafe.Pointer(provhandle)), uintptr(unsafe.Pointer(container)), uintptr(unsafe.Pointer(provider)), uintptr(provtype), uintptr(flags), 0)
1168 if r1 == 0 {
1169 if e1 != 0 {
1170 err = errnoErr(e1)
1171 } else {
1172 err = syscall.EINVAL
1173 }
1174 }
1175 return
1176}
1177
1178func CryptReleaseContext(provhandle Handle, flags uint32) (err error) {
1179 r1, _, e1 := syscall.Syscall(procCryptReleaseContext.Addr(), 2, uintptr(provhandle), uintptr(flags), 0)
1180 if r1 == 0 {
1181 if e1 != 0 {
1182 err = errnoErr(e1)
1183 } else {
1184 err = syscall.EINVAL
1185 }
1186 }
1187 return
1188}
1189
1190func CryptGenRandom(provhandle Handle, buflen uint32, buf *byte) (err error) {
1191 r1, _, e1 := syscall.Syscall(procCryptGenRandom.Addr(), 3, uintptr(provhandle), uintptr(buflen), uintptr(unsafe.Pointer(buf)))
1192 if r1 == 0 {
1193 if e1 != 0 {
1194 err = errnoErr(e1)
1195 } else {
1196 err = syscall.EINVAL
1197 }
1198 }
1199 return
1200}
1201
1202func GetEnvironmentStrings() (envs *uint16, err error) {
1203 r0, _, e1 := syscall.Syscall(procGetEnvironmentStringsW.Addr(), 0, 0, 0, 0)
1204 envs = (*uint16)(unsafe.Pointer(r0))
1205 if envs == nil {
1206 if e1 != 0 {
1207 err = errnoErr(e1)
1208 } else {
1209 err = syscall.EINVAL
1210 }
1211 }
1212 return
1213}
1214
1215func FreeEnvironmentStrings(envs *uint16) (err error) {
1216 r1, _, e1 := syscall.Syscall(procFreeEnvironmentStringsW.Addr(), 1, uintptr(unsafe.Pointer(envs)), 0, 0)
1217 if r1 == 0 {
1218 if e1 != 0 {
1219 err = errnoErr(e1)
1220 } else {
1221 err = syscall.EINVAL
1222 }
1223 }
1224 return
1225}
1226
1227func GetEnvironmentVariable(name *uint16, buffer *uint16, size uint32) (n uint32, err error) {
1228 r0, _, e1 := syscall.Syscall(procGetEnvironmentVariableW.Addr(), 3, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(buffer)), uintptr(size))
1229 n = uint32(r0)
1230 if n == 0 {
1231 if e1 != 0 {
1232 err = errnoErr(e1)
1233 } else {
1234 err = syscall.EINVAL
1235 }
1236 }
1237 return
1238}
1239
1240func SetEnvironmentVariable(name *uint16, value *uint16) (err error) {
1241 r1, _, e1 := syscall.Syscall(procSetEnvironmentVariableW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(value)), 0)
1242 if r1 == 0 {
1243 if e1 != 0 {
1244 err = errnoErr(e1)
1245 } else {
1246 err = syscall.EINVAL
1247 }
1248 }
1249 return
1250}
1251
1252func SetFileTime(handle Handle, ctime *Filetime, atime *Filetime, wtime *Filetime) (err error) {
1253 r1, _, e1 := syscall.Syscall6(procSetFileTime.Addr(), 4, uintptr(handle), uintptr(unsafe.Pointer(ctime)), uintptr(unsafe.Pointer(atime)), uintptr(unsafe.Pointer(wtime)), 0, 0)
1254 if r1 == 0 {
1255 if e1 != 0 {
1256 err = errnoErr(e1)
1257 } else {
1258 err = syscall.EINVAL
1259 }
1260 }
1261 return
1262}
1263
1264func GetFileAttributes(name *uint16) (attrs uint32, err error) {
1265 r0, _, e1 := syscall.Syscall(procGetFileAttributesW.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0)
1266 attrs = uint32(r0)
1267 if attrs == INVALID_FILE_ATTRIBUTES {
1268 if e1 != 0 {
1269 err = errnoErr(e1)
1270 } else {
1271 err = syscall.EINVAL
1272 }
1273 }
1274 return
1275}
1276
1277func SetFileAttributes(name *uint16, attrs uint32) (err error) {
1278 r1, _, e1 := syscall.Syscall(procSetFileAttributesW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(attrs), 0)
1279 if r1 == 0 {
1280 if e1 != 0 {
1281 err = errnoErr(e1)
1282 } else {
1283 err = syscall.EINVAL
1284 }
1285 }
1286 return
1287}
1288
1289func GetFileAttributesEx(name *uint16, level uint32, info *byte) (err error) {
1290 r1, _, e1 := syscall.Syscall(procGetFileAttributesExW.Addr(), 3, uintptr(unsafe.Pointer(name)), uintptr(level), uintptr(unsafe.Pointer(info)))
1291 if r1 == 0 {
1292 if e1 != 0 {
1293 err = errnoErr(e1)
1294 } else {
1295 err = syscall.EINVAL
1296 }
1297 }
1298 return
1299}
1300
1301func GetCommandLine() (cmd *uint16) {
1302 r0, _, _ := syscall.Syscall(procGetCommandLineW.Addr(), 0, 0, 0, 0)
1303 cmd = (*uint16)(unsafe.Pointer(r0))
1304 return
1305}
1306
1307func CommandLineToArgv(cmd *uint16, argc *int32) (argv *[8192]*[8192]uint16, err error) {
1308 r0, _, e1 := syscall.Syscall(procCommandLineToArgvW.Addr(), 2, uintptr(unsafe.Pointer(cmd)), uintptr(unsafe.Pointer(argc)), 0)
1309 argv = (*[8192]*[8192]uint16)(unsafe.Pointer(r0))
1310 if argv == nil {
1311 if e1 != 0 {
1312 err = errnoErr(e1)
1313 } else {
1314 err = syscall.EINVAL
1315 }
1316 }
1317 return
1318}
1319
1320func LocalFree(hmem Handle) (handle Handle, err error) {
1321 r0, _, e1 := syscall.Syscall(procLocalFree.Addr(), 1, uintptr(hmem), 0, 0)
1322 handle = Handle(r0)
1323 if handle != 0 {
1324 if e1 != 0 {
1325 err = errnoErr(e1)
1326 } else {
1327 err = syscall.EINVAL
1328 }
1329 }
1330 return
1331}
1332
1333func SetHandleInformation(handle Handle, mask uint32, flags uint32) (err error) {
1334 r1, _, e1 := syscall.Syscall(procSetHandleInformation.Addr(), 3, uintptr(handle), uintptr(mask), uintptr(flags))
1335 if r1 == 0 {
1336 if e1 != 0 {
1337 err = errnoErr(e1)
1338 } else {
1339 err = syscall.EINVAL
1340 }
1341 }
1342 return
1343}
1344
1345func FlushFileBuffers(handle Handle) (err error) {
1346 r1, _, e1 := syscall.Syscall(procFlushFileBuffers.Addr(), 1, uintptr(handle), 0, 0)
1347 if r1 == 0 {
1348 if e1 != 0 {
1349 err = errnoErr(e1)
1350 } else {
1351 err = syscall.EINVAL
1352 }
1353 }
1354 return
1355}
1356
1357func GetFullPathName(path *uint16, buflen uint32, buf *uint16, fname **uint16) (n uint32, err error) {
1358 r0, _, e1 := syscall.Syscall6(procGetFullPathNameW.Addr(), 4, uintptr(unsafe.Pointer(path)), uintptr(buflen), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(fname)), 0, 0)
1359 n = uint32(r0)
1360 if n == 0 {
1361 if e1 != 0 {
1362 err = errnoErr(e1)
1363 } else {
1364 err = syscall.EINVAL
1365 }
1366 }
1367 return
1368}
1369
1370func GetLongPathName(path *uint16, buf *uint16, buflen uint32) (n uint32, err error) {
1371 r0, _, e1 := syscall.Syscall(procGetLongPathNameW.Addr(), 3, uintptr(unsafe.Pointer(path)), uintptr(unsafe.Pointer(buf)), uintptr(buflen))
1372 n = uint32(r0)
1373 if n == 0 {
1374 if e1 != 0 {
1375 err = errnoErr(e1)
1376 } else {
1377 err = syscall.EINVAL
1378 }
1379 }
1380 return
1381}
1382
1383func GetShortPathName(longpath *uint16, shortpath *uint16, buflen uint32) (n uint32, err error) {
1384 r0, _, e1 := syscall.Syscall(procGetShortPathNameW.Addr(), 3, uintptr(unsafe.Pointer(longpath)), uintptr(unsafe.Pointer(shortpath)), uintptr(buflen))
1385 n = uint32(r0)
1386 if n == 0 {
1387 if e1 != 0 {
1388 err = errnoErr(e1)
1389 } else {
1390 err = syscall.EINVAL
1391 }
1392 }
1393 return
1394}
1395
1396func CreateFileMapping(fhandle Handle, sa *SecurityAttributes, prot uint32, maxSizeHigh uint32, maxSizeLow uint32, name *uint16) (handle Handle, err error) {
1397 r0, _, e1 := syscall.Syscall6(procCreateFileMappingW.Addr(), 6, uintptr(fhandle), uintptr(unsafe.Pointer(sa)), uintptr(prot), uintptr(maxSizeHigh), uintptr(maxSizeLow), uintptr(unsafe.Pointer(name)))
1398 handle = Handle(r0)
1399 if handle == 0 {
1400 if e1 != 0 {
1401 err = errnoErr(e1)
1402 } else {
1403 err = syscall.EINVAL
1404 }
1405 }
1406 return
1407}
1408
1409func MapViewOfFile(handle Handle, access uint32, offsetHigh uint32, offsetLow uint32, length uintptr) (addr uintptr, err error) {
1410 r0, _, e1 := syscall.Syscall6(procMapViewOfFile.Addr(), 5, uintptr(handle), uintptr(access), uintptr(offsetHigh), uintptr(offsetLow), uintptr(length), 0)
1411 addr = uintptr(r0)
1412 if addr == 0 {
1413 if e1 != 0 {
1414 err = errnoErr(e1)
1415 } else {
1416 err = syscall.EINVAL
1417 }
1418 }
1419 return
1420}
1421
1422func UnmapViewOfFile(addr uintptr) (err error) {
1423 r1, _, e1 := syscall.Syscall(procUnmapViewOfFile.Addr(), 1, uintptr(addr), 0, 0)
1424 if r1 == 0 {
1425 if e1 != 0 {
1426 err = errnoErr(e1)
1427 } else {
1428 err = syscall.EINVAL
1429 }
1430 }
1431 return
1432}
1433
1434func FlushViewOfFile(addr uintptr, length uintptr) (err error) {
1435 r1, _, e1 := syscall.Syscall(procFlushViewOfFile.Addr(), 2, uintptr(addr), uintptr(length), 0)
1436 if r1 == 0 {
1437 if e1 != 0 {
1438 err = errnoErr(e1)
1439 } else {
1440 err = syscall.EINVAL
1441 }
1442 }
1443 return
1444}
1445
1446func VirtualLock(addr uintptr, length uintptr) (err error) {
1447 r1, _, e1 := syscall.Syscall(procVirtualLock.Addr(), 2, uintptr(addr), uintptr(length), 0)
1448 if r1 == 0 {
1449 if e1 != 0 {
1450 err = errnoErr(e1)
1451 } else {
1452 err = syscall.EINVAL
1453 }
1454 }
1455 return
1456}
1457
1458func VirtualUnlock(addr uintptr, length uintptr) (err error) {
1459 r1, _, e1 := syscall.Syscall(procVirtualUnlock.Addr(), 2, uintptr(addr), uintptr(length), 0)
1460 if r1 == 0 {
1461 if e1 != 0 {
1462 err = errnoErr(e1)
1463 } else {
1464 err = syscall.EINVAL
1465 }
1466 }
1467 return
1468}
1469
1470func VirtualAlloc(address uintptr, size uintptr, alloctype uint32, protect uint32) (value uintptr, err error) {
1471 r0, _, e1 := syscall.Syscall6(procVirtualAlloc.Addr(), 4, uintptr(address), uintptr(size), uintptr(alloctype), uintptr(protect), 0, 0)
1472 value = uintptr(r0)
1473 if value == 0 {
1474 if e1 != 0 {
1475 err = errnoErr(e1)
1476 } else {
1477 err = syscall.EINVAL
1478 }
1479 }
1480 return
1481}
1482
1483func VirtualFree(address uintptr, size uintptr, freetype uint32) (err error) {
1484 r1, _, e1 := syscall.Syscall(procVirtualFree.Addr(), 3, uintptr(address), uintptr(size), uintptr(freetype))
1485 if r1 == 0 {
1486 if e1 != 0 {
1487 err = errnoErr(e1)
1488 } else {
1489 err = syscall.EINVAL
1490 }
1491 }
1492 return
1493}
1494
1495func VirtualProtect(address uintptr, size uintptr, newprotect uint32, oldprotect *uint32) (err error) {
1496 r1, _, e1 := syscall.Syscall6(procVirtualProtect.Addr(), 4, uintptr(address), uintptr(size), uintptr(newprotect), uintptr(unsafe.Pointer(oldprotect)), 0, 0)
1497 if r1 == 0 {
1498 if e1 != 0 {
1499 err = errnoErr(e1)
1500 } else {
1501 err = syscall.EINVAL
1502 }
1503 }
1504 return
1505}
1506
1507func TransmitFile(s Handle, handle Handle, bytesToWrite uint32, bytsPerSend uint32, overlapped *Overlapped, transmitFileBuf *TransmitFileBuffers, flags uint32) (err error) {
1508 r1, _, e1 := syscall.Syscall9(procTransmitFile.Addr(), 7, uintptr(s), uintptr(handle), uintptr(bytesToWrite), uintptr(bytsPerSend), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(transmitFileBuf)), uintptr(flags), 0, 0)
1509 if r1 == 0 {
1510 if e1 != 0 {
1511 err = errnoErr(e1)
1512 } else {
1513 err = syscall.EINVAL
1514 }
1515 }
1516 return
1517}
1518
1519func ReadDirectoryChanges(handle Handle, buf *byte, buflen uint32, watchSubTree bool, mask uint32, retlen *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) {
1520 var _p0 uint32
1521 if watchSubTree {
1522 _p0 = 1
1523 } else {
1524 _p0 = 0
1525 }
1526 r1, _, e1 := syscall.Syscall9(procReadDirectoryChangesW.Addr(), 8, uintptr(handle), uintptr(unsafe.Pointer(buf)), uintptr(buflen), uintptr(_p0), uintptr(mask), uintptr(unsafe.Pointer(retlen)), uintptr(unsafe.Pointer(overlapped)), uintptr(completionRoutine), 0)
1527 if r1 == 0 {
1528 if e1 != 0 {
1529 err = errnoErr(e1)
1530 } else {
1531 err = syscall.EINVAL
1532 }
1533 }
1534 return
1535}
1536
1537func CertOpenSystemStore(hprov Handle, name *uint16) (store Handle, err error) {
1538 r0, _, e1 := syscall.Syscall(procCertOpenSystemStoreW.Addr(), 2, uintptr(hprov), uintptr(unsafe.Pointer(name)), 0)
1539 store = Handle(r0)
1540 if store == 0 {
1541 if e1 != 0 {
1542 err = errnoErr(e1)
1543 } else {
1544 err = syscall.EINVAL
1545 }
1546 }
1547 return
1548}
1549
1550func CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) {
1551 r0, _, e1 := syscall.Syscall6(procCertOpenStore.Addr(), 5, uintptr(storeProvider), uintptr(msgAndCertEncodingType), uintptr(cryptProv), uintptr(flags), uintptr(para), 0)
1552 handle = Handle(r0)
1553 if handle == InvalidHandle {
1554 if e1 != 0 {
1555 err = errnoErr(e1)
1556 } else {
1557 err = syscall.EINVAL
1558 }
1559 }
1560 return
1561}
1562
1563func CertEnumCertificatesInStore(store Handle, prevContext *CertContext) (context *CertContext, err error) {
1564 r0, _, e1 := syscall.Syscall(procCertEnumCertificatesInStore.Addr(), 2, uintptr(store), uintptr(unsafe.Pointer(prevContext)), 0)
1565 context = (*CertContext)(unsafe.Pointer(r0))
1566 if context == nil {
1567 if e1 != 0 {
1568 err = errnoErr(e1)
1569 } else {
1570 err = syscall.EINVAL
1571 }
1572 }
1573 return
1574}
1575
1576func CertAddCertificateContextToStore(store Handle, certContext *CertContext, addDisposition uint32, storeContext **CertContext) (err error) {
1577 r1, _, e1 := syscall.Syscall6(procCertAddCertificateContextToStore.Addr(), 4, uintptr(store), uintptr(unsafe.Pointer(certContext)), uintptr(addDisposition), uintptr(unsafe.Pointer(storeContext)), 0, 0)
1578 if r1 == 0 {
1579 if e1 != 0 {
1580 err = errnoErr(e1)
1581 } else {
1582 err = syscall.EINVAL
1583 }
1584 }
1585 return
1586}
1587
1588func CertCloseStore(store Handle, flags uint32) (err error) {
1589 r1, _, e1 := syscall.Syscall(procCertCloseStore.Addr(), 2, uintptr(store), uintptr(flags), 0)
1590 if r1 == 0 {
1591 if e1 != 0 {
1592 err = errnoErr(e1)
1593 } else {
1594 err = syscall.EINVAL
1595 }
1596 }
1597 return
1598}
1599
1600func CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, additionalStore Handle, para *CertChainPara, flags uint32, reserved uintptr, chainCtx **CertChainContext) (err error) {
1601 r1, _, e1 := syscall.Syscall9(procCertGetCertificateChain.Addr(), 8, uintptr(engine), uintptr(unsafe.Pointer(leaf)), uintptr(unsafe.Pointer(time)), uintptr(additionalStore), uintptr(unsafe.Pointer(para)), uintptr(flags), uintptr(reserved), uintptr(unsafe.Pointer(chainCtx)), 0)
1602 if r1 == 0 {
1603 if e1 != 0 {
1604 err = errnoErr(e1)
1605 } else {
1606 err = syscall.EINVAL
1607 }
1608 }
1609 return
1610}
1611
1612func CertFreeCertificateChain(ctx *CertChainContext) {
1613 syscall.Syscall(procCertFreeCertificateChain.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0)
1614 return
1615}
1616
1617func CertCreateCertificateContext(certEncodingType uint32, certEncoded *byte, encodedLen uint32) (context *CertContext, err error) {
1618 r0, _, e1 := syscall.Syscall(procCertCreateCertificateContext.Addr(), 3, uintptr(certEncodingType), uintptr(unsafe.Pointer(certEncoded)), uintptr(encodedLen))
1619 context = (*CertContext)(unsafe.Pointer(r0))
1620 if context == nil {
1621 if e1 != 0 {
1622 err = errnoErr(e1)
1623 } else {
1624 err = syscall.EINVAL
1625 }
1626 }
1627 return
1628}
1629
1630func CertFreeCertificateContext(ctx *CertContext) (err error) {
1631 r1, _, e1 := syscall.Syscall(procCertFreeCertificateContext.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0)
1632 if r1 == 0 {
1633 if e1 != 0 {
1634 err = errnoErr(e1)
1635 } else {
1636 err = syscall.EINVAL
1637 }
1638 }
1639 return
1640}
1641
1642func CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext, para *CertChainPolicyPara, status *CertChainPolicyStatus) (err error) {
1643 r1, _, e1 := syscall.Syscall6(procCertVerifyCertificateChainPolicy.Addr(), 4, uintptr(policyOID), uintptr(unsafe.Pointer(chain)), uintptr(unsafe.Pointer(para)), uintptr(unsafe.Pointer(status)), 0, 0)
1644 if r1 == 0 {
1645 if e1 != 0 {
1646 err = errnoErr(e1)
1647 } else {
1648 err = syscall.EINVAL
1649 }
1650 }
1651 return
1652}
1653
1654func RegOpenKeyEx(key Handle, subkey *uint16, options uint32, desiredAccess uint32, result *Handle) (regerrno error) {
1655 r0, _, _ := syscall.Syscall6(procRegOpenKeyExW.Addr(), 5, uintptr(key), uintptr(unsafe.Pointer(subkey)), uintptr(options), uintptr(desiredAccess), uintptr(unsafe.Pointer(result)), 0)
1656 if r0 != 0 {
1657 regerrno = syscall.Errno(r0)
1658 }
1659 return
1660}
1661
1662func RegCloseKey(key Handle) (regerrno error) {
1663 r0, _, _ := syscall.Syscall(procRegCloseKey.Addr(), 1, uintptr(key), 0, 0)
1664 if r0 != 0 {
1665 regerrno = syscall.Errno(r0)
1666 }
1667 return
1668}
1669
1670func RegQueryInfoKey(key Handle, class *uint16, classLen *uint32, reserved *uint32, subkeysLen *uint32, maxSubkeyLen *uint32, maxClassLen *uint32, valuesLen *uint32, maxValueNameLen *uint32, maxValueLen *uint32, saLen *uint32, lastWriteTime *Filetime) (regerrno error) {
1671 r0, _, _ := syscall.Syscall12(procRegQueryInfoKeyW.Addr(), 12, uintptr(key), uintptr(unsafe.Pointer(class)), uintptr(unsafe.Pointer(classLen)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(subkeysLen)), uintptr(unsafe.Pointer(maxSubkeyLen)), uintptr(unsafe.Pointer(maxClassLen)), uintptr(unsafe.Pointer(valuesLen)), uintptr(unsafe.Pointer(maxValueNameLen)), uintptr(unsafe.Pointer(maxValueLen)), uintptr(unsafe.Pointer(saLen)), uintptr(unsafe.Pointer(lastWriteTime)))
1672 if r0 != 0 {
1673 regerrno = syscall.Errno(r0)
1674 }
1675 return
1676}
1677
1678func RegEnumKeyEx(key Handle, index uint32, name *uint16, nameLen *uint32, reserved *uint32, class *uint16, classLen *uint32, lastWriteTime *Filetime) (regerrno error) {
1679 r0, _, _ := syscall.Syscall9(procRegEnumKeyExW.Addr(), 8, uintptr(key), uintptr(index), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(nameLen)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(class)), uintptr(unsafe.Pointer(classLen)), uintptr(unsafe.Pointer(lastWriteTime)), 0)
1680 if r0 != 0 {
1681 regerrno = syscall.Errno(r0)
1682 }
1683 return
1684}
1685
1686func RegQueryValueEx(key Handle, name *uint16, reserved *uint32, valtype *uint32, buf *byte, buflen *uint32) (regerrno error) {
1687 r0, _, _ := syscall.Syscall6(procRegQueryValueExW.Addr(), 6, uintptr(key), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(valtype)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(buflen)))
1688 if r0 != 0 {
1689 regerrno = syscall.Errno(r0)
1690 }
1691 return
1692}
1693
1694func getCurrentProcessId() (pid uint32) {
1695 r0, _, _ := syscall.Syscall(procGetCurrentProcessId.Addr(), 0, 0, 0, 0)
1696 pid = uint32(r0)
1697 return
1698}
1699
1700func GetConsoleMode(console Handle, mode *uint32) (err error) {
1701 r1, _, e1 := syscall.Syscall(procGetConsoleMode.Addr(), 2, uintptr(console), uintptr(unsafe.Pointer(mode)), 0)
1702 if r1 == 0 {
1703 if e1 != 0 {
1704 err = errnoErr(e1)
1705 } else {
1706 err = syscall.EINVAL
1707 }
1708 }
1709 return
1710}
1711
1712func SetConsoleMode(console Handle, mode uint32) (err error) {
1713 r1, _, e1 := syscall.Syscall(procSetConsoleMode.Addr(), 2, uintptr(console), uintptr(mode), 0)
1714 if r1 == 0 {
1715 if e1 != 0 {
1716 err = errnoErr(e1)
1717 } else {
1718 err = syscall.EINVAL
1719 }
1720 }
1721 return
1722}
1723
1724func GetConsoleScreenBufferInfo(console Handle, info *ConsoleScreenBufferInfo) (err error) {
1725 r1, _, e1 := syscall.Syscall(procGetConsoleScreenBufferInfo.Addr(), 2, uintptr(console), uintptr(unsafe.Pointer(info)), 0)
1726 if r1 == 0 {
1727 if e1 != 0 {
1728 err = errnoErr(e1)
1729 } else {
1730 err = syscall.EINVAL
1731 }
1732 }
1733 return
1734}
1735
1736func WriteConsole(console Handle, buf *uint16, towrite uint32, written *uint32, reserved *byte) (err error) {
1737 r1, _, e1 := syscall.Syscall6(procWriteConsoleW.Addr(), 5, uintptr(console), uintptr(unsafe.Pointer(buf)), uintptr(towrite), uintptr(unsafe.Pointer(written)), uintptr(unsafe.Pointer(reserved)), 0)
1738 if r1 == 0 {
1739 if e1 != 0 {
1740 err = errnoErr(e1)
1741 } else {
1742 err = syscall.EINVAL
1743 }
1744 }
1745 return
1746}
1747
1748func ReadConsole(console Handle, buf *uint16, toread uint32, read *uint32, inputControl *byte) (err error) {
1749 r1, _, e1 := syscall.Syscall6(procReadConsoleW.Addr(), 5, uintptr(console), uintptr(unsafe.Pointer(buf)), uintptr(toread), uintptr(unsafe.Pointer(read)), uintptr(unsafe.Pointer(inputControl)), 0)
1750 if r1 == 0 {
1751 if e1 != 0 {
1752 err = errnoErr(e1)
1753 } else {
1754 err = syscall.EINVAL
1755 }
1756 }
1757 return
1758}
1759
1760func CreateToolhelp32Snapshot(flags uint32, processId uint32) (handle Handle, err error) {
1761 r0, _, e1 := syscall.Syscall(procCreateToolhelp32Snapshot.Addr(), 2, uintptr(flags), uintptr(processId), 0)
1762 handle = Handle(r0)
1763 if handle == InvalidHandle {
1764 if e1 != 0 {
1765 err = errnoErr(e1)
1766 } else {
1767 err = syscall.EINVAL
1768 }
1769 }
1770 return
1771}
1772
1773func Process32First(snapshot Handle, procEntry *ProcessEntry32) (err error) {
1774 r1, _, e1 := syscall.Syscall(procProcess32FirstW.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(procEntry)), 0)
1775 if r1 == 0 {
1776 if e1 != 0 {
1777 err = errnoErr(e1)
1778 } else {
1779 err = syscall.EINVAL
1780 }
1781 }
1782 return
1783}
1784
1785func Process32Next(snapshot Handle, procEntry *ProcessEntry32) (err error) {
1786 r1, _, e1 := syscall.Syscall(procProcess32NextW.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(procEntry)), 0)
1787 if r1 == 0 {
1788 if e1 != 0 {
1789 err = errnoErr(e1)
1790 } else {
1791 err = syscall.EINVAL
1792 }
1793 }
1794 return
1795}
1796
1797func DeviceIoControl(handle Handle, ioControlCode uint32, inBuffer *byte, inBufferSize uint32, outBuffer *byte, outBufferSize uint32, bytesReturned *uint32, overlapped *Overlapped) (err error) {
1798 r1, _, e1 := syscall.Syscall9(procDeviceIoControl.Addr(), 8, uintptr(handle), uintptr(ioControlCode), uintptr(unsafe.Pointer(inBuffer)), uintptr(inBufferSize), uintptr(unsafe.Pointer(outBuffer)), uintptr(outBufferSize), uintptr(unsafe.Pointer(bytesReturned)), uintptr(unsafe.Pointer(overlapped)), 0)
1799 if r1 == 0 {
1800 if e1 != 0 {
1801 err = errnoErr(e1)
1802 } else {
1803 err = syscall.EINVAL
1804 }
1805 }
1806 return
1807}
1808
1809func CreateSymbolicLink(symlinkfilename *uint16, targetfilename *uint16, flags uint32) (err error) {
1810 r1, _, e1 := syscall.Syscall(procCreateSymbolicLinkW.Addr(), 3, uintptr(unsafe.Pointer(symlinkfilename)), uintptr(unsafe.Pointer(targetfilename)), uintptr(flags))
1811 if r1&0xff == 0 {
1812 if e1 != 0 {
1813 err = errnoErr(e1)
1814 } else {
1815 err = syscall.EINVAL
1816 }
1817 }
1818 return
1819}
1820
1821func CreateHardLink(filename *uint16, existingfilename *uint16, reserved uintptr) (err error) {
1822 r1, _, e1 := syscall.Syscall(procCreateHardLinkW.Addr(), 3, uintptr(unsafe.Pointer(filename)), uintptr(unsafe.Pointer(existingfilename)), uintptr(reserved))
1823 if r1&0xff == 0 {
1824 if e1 != 0 {
1825 err = errnoErr(e1)
1826 } else {
1827 err = syscall.EINVAL
1828 }
1829 }
1830 return
1831}
1832
1833func GetCurrentThreadId() (id uint32) {
1834 r0, _, _ := syscall.Syscall(procGetCurrentThreadId.Addr(), 0, 0, 0, 0)
1835 id = uint32(r0)
1836 return
1837}
1838
1839func CreateEvent(eventAttrs *SecurityAttributes, manualReset uint32, initialState uint32, name *uint16) (handle Handle, err error) {
1840 r0, _, e1 := syscall.Syscall6(procCreateEventW.Addr(), 4, uintptr(unsafe.Pointer(eventAttrs)), uintptr(manualReset), uintptr(initialState), uintptr(unsafe.Pointer(name)), 0, 0)
1841 handle = Handle(r0)
1842 if handle == 0 {
1843 if e1 != 0 {
1844 err = errnoErr(e1)
1845 } else {
1846 err = syscall.EINVAL
1847 }
1848 }
1849 return
1850}
1851
1852func CreateEventEx(eventAttrs *SecurityAttributes, name *uint16, flags uint32, desiredAccess uint32) (handle Handle, err error) {
1853 r0, _, e1 := syscall.Syscall6(procCreateEventExW.Addr(), 4, uintptr(unsafe.Pointer(eventAttrs)), uintptr(unsafe.Pointer(name)), uintptr(flags), uintptr(desiredAccess), 0, 0)
1854 handle = Handle(r0)
1855 if handle == 0 {
1856 if e1 != 0 {
1857 err = errnoErr(e1)
1858 } else {
1859 err = syscall.EINVAL
1860 }
1861 }
1862 return
1863}
1864
1865func OpenEvent(desiredAccess uint32, inheritHandle bool, name *uint16) (handle Handle, err error) {
1866 var _p0 uint32
1867 if inheritHandle {
1868 _p0 = 1
1869 } else {
1870 _p0 = 0
1871 }
1872 r0, _, e1 := syscall.Syscall(procOpenEventW.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(unsafe.Pointer(name)))
1873 handle = Handle(r0)
1874 if handle == 0 {
1875 if e1 != 0 {
1876 err = errnoErr(e1)
1877 } else {
1878 err = syscall.EINVAL
1879 }
1880 }
1881 return
1882}
1883
1884func SetEvent(event Handle) (err error) {
1885 r1, _, e1 := syscall.Syscall(procSetEvent.Addr(), 1, uintptr(event), 0, 0)
1886 if r1 == 0 {
1887 if e1 != 0 {
1888 err = errnoErr(e1)
1889 } else {
1890 err = syscall.EINVAL
1891 }
1892 }
1893 return
1894}
1895
1896func ResetEvent(event Handle) (err error) {
1897 r1, _, e1 := syscall.Syscall(procResetEvent.Addr(), 1, uintptr(event), 0, 0)
1898 if r1 == 0 {
1899 if e1 != 0 {
1900 err = errnoErr(e1)
1901 } else {
1902 err = syscall.EINVAL
1903 }
1904 }
1905 return
1906}
1907
1908func PulseEvent(event Handle) (err error) {
1909 r1, _, e1 := syscall.Syscall(procPulseEvent.Addr(), 1, uintptr(event), 0, 0)
1910 if r1 == 0 {
1911 if e1 != 0 {
1912 err = errnoErr(e1)
1913 } else {
1914 err = syscall.EINVAL
1915 }
1916 }
1917 return
1918}
1919
1920func DefineDosDevice(flags uint32, deviceName *uint16, targetPath *uint16) (err error) {
1921 r1, _, e1 := syscall.Syscall(procDefineDosDeviceW.Addr(), 3, uintptr(flags), uintptr(unsafe.Pointer(deviceName)), uintptr(unsafe.Pointer(targetPath)))
1922 if r1 == 0 {
1923 if e1 != 0 {
1924 err = errnoErr(e1)
1925 } else {
1926 err = syscall.EINVAL
1927 }
1928 }
1929 return
1930}
1931
1932func DeleteVolumeMountPoint(volumeMountPoint *uint16) (err error) {
1933 r1, _, e1 := syscall.Syscall(procDeleteVolumeMountPointW.Addr(), 1, uintptr(unsafe.Pointer(volumeMountPoint)), 0, 0)
1934 if r1 == 0 {
1935 if e1 != 0 {
1936 err = errnoErr(e1)
1937 } else {
1938 err = syscall.EINVAL
1939 }
1940 }
1941 return
1942}
1943
1944func FindFirstVolume(volumeName *uint16, bufferLength uint32) (handle Handle, err error) {
1945 r0, _, e1 := syscall.Syscall(procFindFirstVolumeW.Addr(), 2, uintptr(unsafe.Pointer(volumeName)), uintptr(bufferLength), 0)
1946 handle = Handle(r0)
1947 if handle == InvalidHandle {
1948 if e1 != 0 {
1949 err = errnoErr(e1)
1950 } else {
1951 err = syscall.EINVAL
1952 }
1953 }
1954 return
1955}
1956
1957func FindFirstVolumeMountPoint(rootPathName *uint16, volumeMountPoint *uint16, bufferLength uint32) (handle Handle, err error) {
1958 r0, _, e1 := syscall.Syscall(procFindFirstVolumeMountPointW.Addr(), 3, uintptr(unsafe.Pointer(rootPathName)), uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(bufferLength))
1959 handle = Handle(r0)
1960 if handle == InvalidHandle {
1961 if e1 != 0 {
1962 err = errnoErr(e1)
1963 } else {
1964 err = syscall.EINVAL
1965 }
1966 }
1967 return
1968}
1969
1970func FindNextVolume(findVolume Handle, volumeName *uint16, bufferLength uint32) (err error) {
1971 r1, _, e1 := syscall.Syscall(procFindNextVolumeW.Addr(), 3, uintptr(findVolume), uintptr(unsafe.Pointer(volumeName)), uintptr(bufferLength))
1972 if r1 == 0 {
1973 if e1 != 0 {
1974 err = errnoErr(e1)
1975 } else {
1976 err = syscall.EINVAL
1977 }
1978 }
1979 return
1980}
1981
1982func FindNextVolumeMountPoint(findVolumeMountPoint Handle, volumeMountPoint *uint16, bufferLength uint32) (err error) {
1983 r1, _, e1 := syscall.Syscall(procFindNextVolumeMountPointW.Addr(), 3, uintptr(findVolumeMountPoint), uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(bufferLength))
1984 if r1 == 0 {
1985 if e1 != 0 {
1986 err = errnoErr(e1)
1987 } else {
1988 err = syscall.EINVAL
1989 }
1990 }
1991 return
1992}
1993
1994func FindVolumeClose(findVolume Handle) (err error) {
1995 r1, _, e1 := syscall.Syscall(procFindVolumeClose.Addr(), 1, uintptr(findVolume), 0, 0)
1996 if r1 == 0 {
1997 if e1 != 0 {
1998 err = errnoErr(e1)
1999 } else {
2000 err = syscall.EINVAL
2001 }
2002 }
2003 return
2004}
2005
2006func FindVolumeMountPointClose(findVolumeMountPoint Handle) (err error) {
2007 r1, _, e1 := syscall.Syscall(procFindVolumeMountPointClose.Addr(), 1, uintptr(findVolumeMountPoint), 0, 0)
2008 if r1 == 0 {
2009 if e1 != 0 {
2010 err = errnoErr(e1)
2011 } else {
2012 err = syscall.EINVAL
2013 }
2014 }
2015 return
2016}
2017
2018func GetDriveType(rootPathName *uint16) (driveType uint32) {
2019 r0, _, _ := syscall.Syscall(procGetDriveTypeW.Addr(), 1, uintptr(unsafe.Pointer(rootPathName)), 0, 0)
2020 driveType = uint32(r0)
2021 return
2022}
2023
2024func GetLogicalDrives() (drivesBitMask uint32, err error) {
2025 r0, _, e1 := syscall.Syscall(procGetLogicalDrives.Addr(), 0, 0, 0, 0)
2026 drivesBitMask = uint32(r0)
2027 if drivesBitMask == 0 {
2028 if e1 != 0 {
2029 err = errnoErr(e1)
2030 } else {
2031 err = syscall.EINVAL
2032 }
2033 }
2034 return
2035}
2036
2037func GetLogicalDriveStrings(bufferLength uint32, buffer *uint16) (n uint32, err error) {
2038 r0, _, e1 := syscall.Syscall(procGetLogicalDriveStringsW.Addr(), 2, uintptr(bufferLength), uintptr(unsafe.Pointer(buffer)), 0)
2039 n = uint32(r0)
2040 if n == 0 {
2041 if e1 != 0 {
2042 err = errnoErr(e1)
2043 } else {
2044 err = syscall.EINVAL
2045 }
2046 }
2047 return
2048}
2049
2050func GetVolumeInformation(rootPathName *uint16, volumeNameBuffer *uint16, volumeNameSize uint32, volumeNameSerialNumber *uint32, maximumComponentLength *uint32, fileSystemFlags *uint32, fileSystemNameBuffer *uint16, fileSystemNameSize uint32) (err error) {
2051 r1, _, e1 := syscall.Syscall9(procGetVolumeInformationW.Addr(), 8, uintptr(unsafe.Pointer(rootPathName)), uintptr(unsafe.Pointer(volumeNameBuffer)), uintptr(volumeNameSize), uintptr(unsafe.Pointer(volumeNameSerialNumber)), uintptr(unsafe.Pointer(maximumComponentLength)), uintptr(unsafe.Pointer(fileSystemFlags)), uintptr(unsafe.Pointer(fileSystemNameBuffer)), uintptr(fileSystemNameSize), 0)
2052 if r1 == 0 {
2053 if e1 != 0 {
2054 err = errnoErr(e1)
2055 } else {
2056 err = syscall.EINVAL
2057 }
2058 }
2059 return
2060}
2061
2062func GetVolumeInformationByHandle(file Handle, volumeNameBuffer *uint16, volumeNameSize uint32, volumeNameSerialNumber *uint32, maximumComponentLength *uint32, fileSystemFlags *uint32, fileSystemNameBuffer *uint16, fileSystemNameSize uint32) (err error) {
2063 r1, _, e1 := syscall.Syscall9(procGetVolumeInformationByHandleW.Addr(), 8, uintptr(file), uintptr(unsafe.Pointer(volumeNameBuffer)), uintptr(volumeNameSize), uintptr(unsafe.Pointer(volumeNameSerialNumber)), uintptr(unsafe.Pointer(maximumComponentLength)), uintptr(unsafe.Pointer(fileSystemFlags)), uintptr(unsafe.Pointer(fileSystemNameBuffer)), uintptr(fileSystemNameSize), 0)
2064 if r1 == 0 {
2065 if e1 != 0 {
2066 err = errnoErr(e1)
2067 } else {
2068 err = syscall.EINVAL
2069 }
2070 }
2071 return
2072}
2073
2074func GetVolumeNameForVolumeMountPoint(volumeMountPoint *uint16, volumeName *uint16, bufferlength uint32) (err error) {
2075 r1, _, e1 := syscall.Syscall(procGetVolumeNameForVolumeMountPointW.Addr(), 3, uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(unsafe.Pointer(volumeName)), uintptr(bufferlength))
2076 if r1 == 0 {
2077 if e1 != 0 {
2078 err = errnoErr(e1)
2079 } else {
2080 err = syscall.EINVAL
2081 }
2082 }
2083 return
2084}
2085
2086func GetVolumePathName(fileName *uint16, volumePathName *uint16, bufferLength uint32) (err error) {
2087 r1, _, e1 := syscall.Syscall(procGetVolumePathNameW.Addr(), 3, uintptr(unsafe.Pointer(fileName)), uintptr(unsafe.Pointer(volumePathName)), uintptr(bufferLength))
2088 if r1 == 0 {
2089 if e1 != 0 {
2090 err = errnoErr(e1)
2091 } else {
2092 err = syscall.EINVAL
2093 }
2094 }
2095 return
2096}
2097
2098func GetVolumePathNamesForVolumeName(volumeName *uint16, volumePathNames *uint16, bufferLength uint32, returnLength *uint32) (err error) {
2099 r1, _, e1 := syscall.Syscall6(procGetVolumePathNamesForVolumeNameW.Addr(), 4, uintptr(unsafe.Pointer(volumeName)), uintptr(unsafe.Pointer(volumePathNames)), uintptr(bufferLength), uintptr(unsafe.Pointer(returnLength)), 0, 0)
2100 if r1 == 0 {
2101 if e1 != 0 {
2102 err = errnoErr(e1)
2103 } else {
2104 err = syscall.EINVAL
2105 }
2106 }
2107 return
2108}
2109
2110func QueryDosDevice(deviceName *uint16, targetPath *uint16, max uint32) (n uint32, err error) {
2111 r0, _, e1 := syscall.Syscall(procQueryDosDeviceW.Addr(), 3, uintptr(unsafe.Pointer(deviceName)), uintptr(unsafe.Pointer(targetPath)), uintptr(max))
2112 n = uint32(r0)
2113 if n == 0 {
2114 if e1 != 0 {
2115 err = errnoErr(e1)
2116 } else {
2117 err = syscall.EINVAL
2118 }
2119 }
2120 return
2121}
2122
2123func SetVolumeLabel(rootPathName *uint16, volumeName *uint16) (err error) {
2124 r1, _, e1 := syscall.Syscall(procSetVolumeLabelW.Addr(), 2, uintptr(unsafe.Pointer(rootPathName)), uintptr(unsafe.Pointer(volumeName)), 0)
2125 if r1 == 0 {
2126 if e1 != 0 {
2127 err = errnoErr(e1)
2128 } else {
2129 err = syscall.EINVAL
2130 }
2131 }
2132 return
2133}
2134
2135func SetVolumeMountPoint(volumeMountPoint *uint16, volumeName *uint16) (err error) {
2136 r1, _, e1 := syscall.Syscall(procSetVolumeMountPointW.Addr(), 2, uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(unsafe.Pointer(volumeName)), 0)
2137 if r1 == 0 {
2138 if e1 != 0 {
2139 err = errnoErr(e1)
2140 } else {
2141 err = syscall.EINVAL
2142 }
2143 }
2144 return
2145}
2146
2147func WSAStartup(verreq uint32, data *WSAData) (sockerr error) {
2148 r0, _, _ := syscall.Syscall(procWSAStartup.Addr(), 2, uintptr(verreq), uintptr(unsafe.Pointer(data)), 0)
2149 if r0 != 0 {
2150 sockerr = syscall.Errno(r0)
2151 }
2152 return
2153}
2154
2155func WSACleanup() (err error) {
2156 r1, _, e1 := syscall.Syscall(procWSACleanup.Addr(), 0, 0, 0, 0)
2157 if r1 == socket_error {
2158 if e1 != 0 {
2159 err = errnoErr(e1)
2160 } else {
2161 err = syscall.EINVAL
2162 }
2163 }
2164 return
2165}
2166
2167func WSAIoctl(s Handle, iocc uint32, inbuf *byte, cbif uint32, outbuf *byte, cbob uint32, cbbr *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) {
2168 r1, _, e1 := syscall.Syscall9(procWSAIoctl.Addr(), 9, uintptr(s), uintptr(iocc), uintptr(unsafe.Pointer(inbuf)), uintptr(cbif), uintptr(unsafe.Pointer(outbuf)), uintptr(cbob), uintptr(unsafe.Pointer(cbbr)), uintptr(unsafe.Pointer(overlapped)), uintptr(completionRoutine))
2169 if r1 == socket_error {
2170 if e1 != 0 {
2171 err = errnoErr(e1)
2172 } else {
2173 err = syscall.EINVAL
2174 }
2175 }
2176 return
2177}
2178
2179func socket(af int32, typ int32, protocol int32) (handle Handle, err error) {
2180 r0, _, e1 := syscall.Syscall(procsocket.Addr(), 3, uintptr(af), uintptr(typ), uintptr(protocol))
2181 handle = Handle(r0)
2182 if handle == InvalidHandle {
2183 if e1 != 0 {
2184 err = errnoErr(e1)
2185 } else {
2186 err = syscall.EINVAL
2187 }
2188 }
2189 return
2190}
2191
2192func Setsockopt(s Handle, level int32, optname int32, optval *byte, optlen int32) (err error) {
2193 r1, _, e1 := syscall.Syscall6(procsetsockopt.Addr(), 5, uintptr(s), uintptr(level), uintptr(optname), uintptr(unsafe.Pointer(optval)), uintptr(optlen), 0)
2194 if r1 == socket_error {
2195 if e1 != 0 {
2196 err = errnoErr(e1)
2197 } else {
2198 err = syscall.EINVAL
2199 }
2200 }
2201 return
2202}
2203
2204func Getsockopt(s Handle, level int32, optname int32, optval *byte, optlen *int32) (err error) {
2205 r1, _, e1 := syscall.Syscall6(procgetsockopt.Addr(), 5, uintptr(s), uintptr(level), uintptr(optname), uintptr(unsafe.Pointer(optval)), uintptr(unsafe.Pointer(optlen)), 0)
2206 if r1 == socket_error {
2207 if e1 != 0 {
2208 err = errnoErr(e1)
2209 } else {
2210 err = syscall.EINVAL
2211 }
2212 }
2213 return
2214}
2215
2216func bind(s Handle, name unsafe.Pointer, namelen int32) (err error) {
2217 r1, _, e1 := syscall.Syscall(procbind.Addr(), 3, uintptr(s), uintptr(name), uintptr(namelen))
2218 if r1 == socket_error {
2219 if e1 != 0 {
2220 err = errnoErr(e1)
2221 } else {
2222 err = syscall.EINVAL
2223 }
2224 }
2225 return
2226}
2227
2228func connect(s Handle, name unsafe.Pointer, namelen int32) (err error) {
2229 r1, _, e1 := syscall.Syscall(procconnect.Addr(), 3, uintptr(s), uintptr(name), uintptr(namelen))
2230 if r1 == socket_error {
2231 if e1 != 0 {
2232 err = errnoErr(e1)
2233 } else {
2234 err = syscall.EINVAL
2235 }
2236 }
2237 return
2238}
2239
2240func getsockname(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) {
2241 r1, _, e1 := syscall.Syscall(procgetsockname.Addr(), 3, uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen)))
2242 if r1 == socket_error {
2243 if e1 != 0 {
2244 err = errnoErr(e1)
2245 } else {
2246 err = syscall.EINVAL
2247 }
2248 }
2249 return
2250}
2251
2252func getpeername(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) {
2253 r1, _, e1 := syscall.Syscall(procgetpeername.Addr(), 3, uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen)))
2254 if r1 == socket_error {
2255 if e1 != 0 {
2256 err = errnoErr(e1)
2257 } else {
2258 err = syscall.EINVAL
2259 }
2260 }
2261 return
2262}
2263
2264func listen(s Handle, backlog int32) (err error) {
2265 r1, _, e1 := syscall.Syscall(proclisten.Addr(), 2, uintptr(s), uintptr(backlog), 0)
2266 if r1 == socket_error {
2267 if e1 != 0 {
2268 err = errnoErr(e1)
2269 } else {
2270 err = syscall.EINVAL
2271 }
2272 }
2273 return
2274}
2275
2276func shutdown(s Handle, how int32) (err error) {
2277 r1, _, e1 := syscall.Syscall(procshutdown.Addr(), 2, uintptr(s), uintptr(how), 0)
2278 if r1 == socket_error {
2279 if e1 != 0 {
2280 err = errnoErr(e1)
2281 } else {
2282 err = syscall.EINVAL
2283 }
2284 }
2285 return
2286}
2287
2288func Closesocket(s Handle) (err error) {
2289 r1, _, e1 := syscall.Syscall(procclosesocket.Addr(), 1, uintptr(s), 0, 0)
2290 if r1 == socket_error {
2291 if e1 != 0 {
2292 err = errnoErr(e1)
2293 } else {
2294 err = syscall.EINVAL
2295 }
2296 }
2297 return
2298}
2299
2300func AcceptEx(ls Handle, as Handle, buf *byte, rxdatalen uint32, laddrlen uint32, raddrlen uint32, recvd *uint32, overlapped *Overlapped) (err error) {
2301 r1, _, e1 := syscall.Syscall9(procAcceptEx.Addr(), 8, uintptr(ls), uintptr(as), uintptr(unsafe.Pointer(buf)), uintptr(rxdatalen), uintptr(laddrlen), uintptr(raddrlen), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(overlapped)), 0)
2302 if r1 == 0 {
2303 if e1 != 0 {
2304 err = errnoErr(e1)
2305 } else {
2306 err = syscall.EINVAL
2307 }
2308 }
2309 return
2310}
2311
2312func GetAcceptExSockaddrs(buf *byte, rxdatalen uint32, laddrlen uint32, raddrlen uint32, lrsa **RawSockaddrAny, lrsalen *int32, rrsa **RawSockaddrAny, rrsalen *int32) {
2313 syscall.Syscall9(procGetAcceptExSockaddrs.Addr(), 8, uintptr(unsafe.Pointer(buf)), uintptr(rxdatalen), uintptr(laddrlen), uintptr(raddrlen), uintptr(unsafe.Pointer(lrsa)), uintptr(unsafe.Pointer(lrsalen)), uintptr(unsafe.Pointer(rrsa)), uintptr(unsafe.Pointer(rrsalen)), 0)
2314 return
2315}
2316
2317func WSARecv(s Handle, bufs *WSABuf, bufcnt uint32, recvd *uint32, flags *uint32, overlapped *Overlapped, croutine *byte) (err error) {
2318 r1, _, e1 := syscall.Syscall9(procWSARecv.Addr(), 7, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(flags)), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)), 0, 0)
2319 if r1 == socket_error {
2320 if e1 != 0 {
2321 err = errnoErr(e1)
2322 } else {
2323 err = syscall.EINVAL
2324 }
2325 }
2326 return
2327}
2328
2329func WSASend(s Handle, bufs *WSABuf, bufcnt uint32, sent *uint32, flags uint32, overlapped *Overlapped, croutine *byte) (err error) {
2330 r1, _, e1 := syscall.Syscall9(procWSASend.Addr(), 7, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(sent)), uintptr(flags), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)), 0, 0)
2331 if r1 == socket_error {
2332 if e1 != 0 {
2333 err = errnoErr(e1)
2334 } else {
2335 err = syscall.EINVAL
2336 }
2337 }
2338 return
2339}
2340
2341func WSARecvFrom(s Handle, bufs *WSABuf, bufcnt uint32, recvd *uint32, flags *uint32, from *RawSockaddrAny, fromlen *int32, overlapped *Overlapped, croutine *byte) (err error) {
2342 r1, _, e1 := syscall.Syscall9(procWSARecvFrom.Addr(), 9, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(flags)), uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(fromlen)), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)))
2343 if r1 == socket_error {
2344 if e1 != 0 {
2345 err = errnoErr(e1)
2346 } else {
2347 err = syscall.EINVAL
2348 }
2349 }
2350 return
2351}
2352
2353func WSASendTo(s Handle, bufs *WSABuf, bufcnt uint32, sent *uint32, flags uint32, to *RawSockaddrAny, tolen int32, overlapped *Overlapped, croutine *byte) (err error) {
2354 r1, _, e1 := syscall.Syscall9(procWSASendTo.Addr(), 9, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(sent)), uintptr(flags), uintptr(unsafe.Pointer(to)), uintptr(tolen), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)))
2355 if r1 == socket_error {
2356 if e1 != 0 {
2357 err = errnoErr(e1)
2358 } else {
2359 err = syscall.EINVAL
2360 }
2361 }
2362 return
2363}
2364
2365func GetHostByName(name string) (h *Hostent, err error) {
2366 var _p0 *byte
2367 _p0, err = syscall.BytePtrFromString(name)
2368 if err != nil {
2369 return
2370 }
2371 return _GetHostByName(_p0)
2372}
2373
2374func _GetHostByName(name *byte) (h *Hostent, err error) {
2375 r0, _, e1 := syscall.Syscall(procgethostbyname.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0)
2376 h = (*Hostent)(unsafe.Pointer(r0))
2377 if h == nil {
2378 if e1 != 0 {
2379 err = errnoErr(e1)
2380 } else {
2381 err = syscall.EINVAL
2382 }
2383 }
2384 return
2385}
2386
2387func GetServByName(name string, proto string) (s *Servent, err error) {
2388 var _p0 *byte
2389 _p0, err = syscall.BytePtrFromString(name)
2390 if err != nil {
2391 return
2392 }
2393 var _p1 *byte
2394 _p1, err = syscall.BytePtrFromString(proto)
2395 if err != nil {
2396 return
2397 }
2398 return _GetServByName(_p0, _p1)
2399}
2400
2401func _GetServByName(name *byte, proto *byte) (s *Servent, err error) {
2402 r0, _, e1 := syscall.Syscall(procgetservbyname.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(proto)), 0)
2403 s = (*Servent)(unsafe.Pointer(r0))
2404 if s == nil {
2405 if e1 != 0 {
2406 err = errnoErr(e1)
2407 } else {
2408 err = syscall.EINVAL
2409 }
2410 }
2411 return
2412}
2413
2414func Ntohs(netshort uint16) (u uint16) {
2415 r0, _, _ := syscall.Syscall(procntohs.Addr(), 1, uintptr(netshort), 0, 0)
2416 u = uint16(r0)
2417 return
2418}
2419
2420func GetProtoByName(name string) (p *Protoent, err error) {
2421 var _p0 *byte
2422 _p0, err = syscall.BytePtrFromString(name)
2423 if err != nil {
2424 return
2425 }
2426 return _GetProtoByName(_p0)
2427}
2428
2429func _GetProtoByName(name *byte) (p *Protoent, err error) {
2430 r0, _, e1 := syscall.Syscall(procgetprotobyname.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0)
2431 p = (*Protoent)(unsafe.Pointer(r0))
2432 if p == nil {
2433 if e1 != 0 {
2434 err = errnoErr(e1)
2435 } else {
2436 err = syscall.EINVAL
2437 }
2438 }
2439 return
2440}
2441
2442func DnsQuery(name string, qtype uint16, options uint32, extra *byte, qrs **DNSRecord, pr *byte) (status error) {
2443 var _p0 *uint16
2444 _p0, status = syscall.UTF16PtrFromString(name)
2445 if status != nil {
2446 return
2447 }
2448 return _DnsQuery(_p0, qtype, options, extra, qrs, pr)
2449}
2450
2451func _DnsQuery(name *uint16, qtype uint16, options uint32, extra *byte, qrs **DNSRecord, pr *byte) (status error) {
2452 r0, _, _ := syscall.Syscall6(procDnsQuery_W.Addr(), 6, uintptr(unsafe.Pointer(name)), uintptr(qtype), uintptr(options), uintptr(unsafe.Pointer(extra)), uintptr(unsafe.Pointer(qrs)), uintptr(unsafe.Pointer(pr)))
2453 if r0 != 0 {
2454 status = syscall.Errno(r0)
2455 }
2456 return
2457}
2458
2459func DnsRecordListFree(rl *DNSRecord, freetype uint32) {
2460 syscall.Syscall(procDnsRecordListFree.Addr(), 2, uintptr(unsafe.Pointer(rl)), uintptr(freetype), 0)
2461 return
2462}
2463
2464func DnsNameCompare(name1 *uint16, name2 *uint16) (same bool) {
2465 r0, _, _ := syscall.Syscall(procDnsNameCompare_W.Addr(), 2, uintptr(unsafe.Pointer(name1)), uintptr(unsafe.Pointer(name2)), 0)
2466 same = r0 != 0
2467 return
2468}
2469
2470func GetAddrInfoW(nodename *uint16, servicename *uint16, hints *AddrinfoW, result **AddrinfoW) (sockerr error) {
2471 r0, _, _ := syscall.Syscall6(procGetAddrInfoW.Addr(), 4, uintptr(unsafe.Pointer(nodename)), uintptr(unsafe.Pointer(servicename)), uintptr(unsafe.Pointer(hints)), uintptr(unsafe.Pointer(result)), 0, 0)
2472 if r0 != 0 {
2473 sockerr = syscall.Errno(r0)
2474 }
2475 return
2476}
2477
2478func FreeAddrInfoW(addrinfo *AddrinfoW) {
2479 syscall.Syscall(procFreeAddrInfoW.Addr(), 1, uintptr(unsafe.Pointer(addrinfo)), 0, 0)
2480 return
2481}
2482
2483func GetIfEntry(pIfRow *MibIfRow) (errcode error) {
2484 r0, _, _ := syscall.Syscall(procGetIfEntry.Addr(), 1, uintptr(unsafe.Pointer(pIfRow)), 0, 0)
2485 if r0 != 0 {
2486 errcode = syscall.Errno(r0)
2487 }
2488 return
2489}
2490
2491func GetAdaptersInfo(ai *IpAdapterInfo, ol *uint32) (errcode error) {
2492 r0, _, _ := syscall.Syscall(procGetAdaptersInfo.Addr(), 2, uintptr(unsafe.Pointer(ai)), uintptr(unsafe.Pointer(ol)), 0)
2493 if r0 != 0 {
2494 errcode = syscall.Errno(r0)
2495 }
2496 return
2497}
2498
2499func SetFileCompletionNotificationModes(handle Handle, flags uint8) (err error) {
2500 r1, _, e1 := syscall.Syscall(procSetFileCompletionNotificationModes.Addr(), 2, uintptr(handle), uintptr(flags), 0)
2501 if r1 == 0 {
2502 if e1 != 0 {
2503 err = errnoErr(e1)
2504 } else {
2505 err = syscall.EINVAL
2506 }
2507 }
2508 return
2509}
2510
2511func WSAEnumProtocols(protocols *int32, protocolBuffer *WSAProtocolInfo, bufferLength *uint32) (n int32, err error) {
2512 r0, _, e1 := syscall.Syscall(procWSAEnumProtocolsW.Addr(), 3, uintptr(unsafe.Pointer(protocols)), uintptr(unsafe.Pointer(protocolBuffer)), uintptr(unsafe.Pointer(bufferLength)))
2513 n = int32(r0)
2514 if n == -1 {
2515 if e1 != 0 {
2516 err = errnoErr(e1)
2517 } else {
2518 err = syscall.EINVAL
2519 }
2520 }
2521 return
2522}
2523
2524func GetAdaptersAddresses(family uint32, flags uint32, reserved uintptr, adapterAddresses *IpAdapterAddresses, sizePointer *uint32) (errcode error) {
2525 r0, _, _ := syscall.Syscall6(procGetAdaptersAddresses.Addr(), 5, uintptr(family), uintptr(flags), uintptr(reserved), uintptr(unsafe.Pointer(adapterAddresses)), uintptr(unsafe.Pointer(sizePointer)), 0)
2526 if r0 != 0 {
2527 errcode = syscall.Errno(r0)
2528 }
2529 return
2530}
2531
2532func GetACP() (acp uint32) {
2533 r0, _, _ := syscall.Syscall(procGetACP.Addr(), 0, 0, 0, 0)
2534 acp = uint32(r0)
2535 return
2536}
2537
2538func MultiByteToWideChar(codePage uint32, dwFlags uint32, str *byte, nstr int32, wchar *uint16, nwchar int32) (nwrite int32, err error) {
2539 r0, _, e1 := syscall.Syscall6(procMultiByteToWideChar.Addr(), 6, uintptr(codePage), uintptr(dwFlags), uintptr(unsafe.Pointer(str)), uintptr(nstr), uintptr(unsafe.Pointer(wchar)), uintptr(nwchar))
2540 nwrite = int32(r0)
2541 if nwrite == 0 {
2542 if e1 != 0 {
2543 err = errnoErr(e1)
2544 } else {
2545 err = syscall.EINVAL
2546 }
2547 }
2548 return
2549}
2550
2551func TranslateName(accName *uint16, accNameFormat uint32, desiredNameFormat uint32, translatedName *uint16, nSize *uint32) (err error) {
2552 r1, _, e1 := syscall.Syscall6(procTranslateNameW.Addr(), 5, uintptr(unsafe.Pointer(accName)), uintptr(accNameFormat), uintptr(desiredNameFormat), uintptr(unsafe.Pointer(translatedName)), uintptr(unsafe.Pointer(nSize)), 0)
2553 if r1&0xff == 0 {
2554 if e1 != 0 {
2555 err = errnoErr(e1)
2556 } else {
2557 err = syscall.EINVAL
2558 }
2559 }
2560 return
2561}
2562
2563func GetUserNameEx(nameFormat uint32, nameBuffre *uint16, nSize *uint32) (err error) {
2564 r1, _, e1 := syscall.Syscall(procGetUserNameExW.Addr(), 3, uintptr(nameFormat), uintptr(unsafe.Pointer(nameBuffre)), uintptr(unsafe.Pointer(nSize)))
2565 if r1&0xff == 0 {
2566 if e1 != 0 {
2567 err = errnoErr(e1)
2568 } else {
2569 err = syscall.EINVAL
2570 }
2571 }
2572 return
2573}
2574
2575func NetUserGetInfo(serverName *uint16, userName *uint16, level uint32, buf **byte) (neterr error) {
2576 r0, _, _ := syscall.Syscall6(procNetUserGetInfo.Addr(), 4, uintptr(unsafe.Pointer(serverName)), uintptr(unsafe.Pointer(userName)), uintptr(level), uintptr(unsafe.Pointer(buf)), 0, 0)
2577 if r0 != 0 {
2578 neterr = syscall.Errno(r0)
2579 }
2580 return
2581}
2582
2583func NetGetJoinInformation(server *uint16, name **uint16, bufType *uint32) (neterr error) {
2584 r0, _, _ := syscall.Syscall(procNetGetJoinInformation.Addr(), 3, uintptr(unsafe.Pointer(server)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(bufType)))
2585 if r0 != 0 {
2586 neterr = syscall.Errno(r0)
2587 }
2588 return
2589}
2590
2591func NetApiBufferFree(buf *byte) (neterr error) {
2592 r0, _, _ := syscall.Syscall(procNetApiBufferFree.Addr(), 1, uintptr(unsafe.Pointer(buf)), 0, 0)
2593 if r0 != 0 {
2594 neterr = syscall.Errno(r0)
2595 }
2596 return
2597}
2598
2599func LookupAccountSid(systemName *uint16, sid *SID, name *uint16, nameLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) {
2600 r1, _, e1 := syscall.Syscall9(procLookupAccountSidW.Addr(), 7, uintptr(unsafe.Pointer(systemName)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(nameLen)), uintptr(unsafe.Pointer(refdDomainName)), uintptr(unsafe.Pointer(refdDomainNameLen)), uintptr(unsafe.Pointer(use)), 0, 0)
2601 if r1 == 0 {
2602 if e1 != 0 {
2603 err = errnoErr(e1)
2604 } else {
2605 err = syscall.EINVAL
2606 }
2607 }
2608 return
2609}
2610
2611func LookupAccountName(systemName *uint16, accountName *uint16, sid *SID, sidLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) {
2612 r1, _, e1 := syscall.Syscall9(procLookupAccountNameW.Addr(), 7, uintptr(unsafe.Pointer(systemName)), uintptr(unsafe.Pointer(accountName)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(sidLen)), uintptr(unsafe.Pointer(refdDomainName)), uintptr(unsafe.Pointer(refdDomainNameLen)), uintptr(unsafe.Pointer(use)), 0, 0)
2613 if r1 == 0 {
2614 if e1 != 0 {
2615 err = errnoErr(e1)
2616 } else {
2617 err = syscall.EINVAL
2618 }
2619 }
2620 return
2621}
2622
2623func ConvertSidToStringSid(sid *SID, stringSid **uint16) (err error) {
2624 r1, _, e1 := syscall.Syscall(procConvertSidToStringSidW.Addr(), 2, uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(stringSid)), 0)
2625 if r1 == 0 {
2626 if e1 != 0 {
2627 err = errnoErr(e1)
2628 } else {
2629 err = syscall.EINVAL
2630 }
2631 }
2632 return
2633}
2634
2635func ConvertStringSidToSid(stringSid *uint16, sid **SID) (err error) {
2636 r1, _, e1 := syscall.Syscall(procConvertStringSidToSidW.Addr(), 2, uintptr(unsafe.Pointer(stringSid)), uintptr(unsafe.Pointer(sid)), 0)
2637 if r1 == 0 {
2638 if e1 != 0 {
2639 err = errnoErr(e1)
2640 } else {
2641 err = syscall.EINVAL
2642 }
2643 }
2644 return
2645}
2646
2647func GetLengthSid(sid *SID) (len uint32) {
2648 r0, _, _ := syscall.Syscall(procGetLengthSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0)
2649 len = uint32(r0)
2650 return
2651}
2652
2653func CopySid(destSidLen uint32, destSid *SID, srcSid *SID) (err error) {
2654 r1, _, e1 := syscall.Syscall(procCopySid.Addr(), 3, uintptr(destSidLen), uintptr(unsafe.Pointer(destSid)), uintptr(unsafe.Pointer(srcSid)))
2655 if r1 == 0 {
2656 if e1 != 0 {
2657 err = errnoErr(e1)
2658 } else {
2659 err = syscall.EINVAL
2660 }
2661 }
2662 return
2663}
2664
2665func AllocateAndInitializeSid(identAuth *SidIdentifierAuthority, subAuth byte, subAuth0 uint32, subAuth1 uint32, subAuth2 uint32, subAuth3 uint32, subAuth4 uint32, subAuth5 uint32, subAuth6 uint32, subAuth7 uint32, sid **SID) (err error) {
2666 r1, _, e1 := syscall.Syscall12(procAllocateAndInitializeSid.Addr(), 11, uintptr(unsafe.Pointer(identAuth)), uintptr(subAuth), uintptr(subAuth0), uintptr(subAuth1), uintptr(subAuth2), uintptr(subAuth3), uintptr(subAuth4), uintptr(subAuth5), uintptr(subAuth6), uintptr(subAuth7), uintptr(unsafe.Pointer(sid)), 0)
2667 if r1 == 0 {
2668 if e1 != 0 {
2669 err = errnoErr(e1)
2670 } else {
2671 err = syscall.EINVAL
2672 }
2673 }
2674 return
2675}
2676
William Kurkiandaa6bb22019-03-07 12:26:28 -05002677func createWellKnownSid(sidType WELL_KNOWN_SID_TYPE, domainSid *SID, sid *SID, sizeSid *uint32) (err error) {
2678 r1, _, e1 := syscall.Syscall6(procCreateWellKnownSid.Addr(), 4, uintptr(sidType), uintptr(unsafe.Pointer(domainSid)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(sizeSid)), 0, 0)
2679 if r1 == 0 {
2680 if e1 != 0 {
2681 err = errnoErr(e1)
2682 } else {
2683 err = syscall.EINVAL
2684 }
2685 }
2686 return
2687}
2688
sslobodrd046be82019-01-16 10:02:22 -05002689func FreeSid(sid *SID) (err error) {
2690 r1, _, e1 := syscall.Syscall(procFreeSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0)
2691 if r1 != 0 {
2692 if e1 != 0 {
2693 err = errnoErr(e1)
2694 } else {
2695 err = syscall.EINVAL
2696 }
2697 }
2698 return
2699}
2700
2701func EqualSid(sid1 *SID, sid2 *SID) (isEqual bool) {
2702 r0, _, _ := syscall.Syscall(procEqualSid.Addr(), 2, uintptr(unsafe.Pointer(sid1)), uintptr(unsafe.Pointer(sid2)), 0)
2703 isEqual = r0 != 0
2704 return
2705}
2706
2707func checkTokenMembership(tokenHandle Token, sidToCheck *SID, isMember *int32) (err error) {
2708 r1, _, e1 := syscall.Syscall(procCheckTokenMembership.Addr(), 3, uintptr(tokenHandle), uintptr(unsafe.Pointer(sidToCheck)), uintptr(unsafe.Pointer(isMember)))
2709 if r1 == 0 {
2710 if e1 != 0 {
2711 err = errnoErr(e1)
2712 } else {
2713 err = syscall.EINVAL
2714 }
2715 }
2716 return
2717}
2718
2719func OpenProcessToken(h Handle, access uint32, token *Token) (err error) {
2720 r1, _, e1 := syscall.Syscall(procOpenProcessToken.Addr(), 3, uintptr(h), uintptr(access), uintptr(unsafe.Pointer(token)))
2721 if r1 == 0 {
2722 if e1 != 0 {
2723 err = errnoErr(e1)
2724 } else {
2725 err = syscall.EINVAL
2726 }
2727 }
2728 return
2729}
2730
2731func GetTokenInformation(t Token, infoClass uint32, info *byte, infoLen uint32, returnedLen *uint32) (err error) {
2732 r1, _, e1 := syscall.Syscall6(procGetTokenInformation.Addr(), 5, uintptr(t), uintptr(infoClass), uintptr(unsafe.Pointer(info)), uintptr(infoLen), uintptr(unsafe.Pointer(returnedLen)), 0)
2733 if r1 == 0 {
2734 if e1 != 0 {
2735 err = errnoErr(e1)
2736 } else {
2737 err = syscall.EINVAL
2738 }
2739 }
2740 return
2741}
2742
2743func GetUserProfileDirectory(t Token, dir *uint16, dirLen *uint32) (err error) {
2744 r1, _, e1 := syscall.Syscall(procGetUserProfileDirectoryW.Addr(), 3, uintptr(t), uintptr(unsafe.Pointer(dir)), uintptr(unsafe.Pointer(dirLen)))
2745 if r1 == 0 {
2746 if e1 != 0 {
2747 err = errnoErr(e1)
2748 } else {
2749 err = syscall.EINVAL
2750 }
2751 }
2752 return
2753}
William Kurkiandaa6bb22019-03-07 12:26:28 -05002754
2755func getSystemDirectory(dir *uint16, dirLen uint32) (len uint32, err error) {
2756 r0, _, e1 := syscall.Syscall(procGetSystemDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(dir)), uintptr(dirLen), 0)
2757 len = uint32(r0)
2758 if len == 0 {
2759 if e1 != 0 {
2760 err = errnoErr(e1)
2761 } else {
2762 err = syscall.EINVAL
2763 }
2764 }
2765 return
2766}