1// Code generated by 'go generate'; DO NOT EDIT. 2 3package windows 4 5import ( 6 "syscall" 7 "unsafe" 8) 9 10var _ unsafe.Pointer 11 12// Do the interface allocations only once for common 13// Errno values. 14const ( 15 errnoERROR_IO_PENDING = 997 16) 17 18var ( 19 errERROR_IO_PENDING error = syscall.Errno(errnoERROR_IO_PENDING) 20) 21 22// errnoErr returns common boxed Errno values, to prevent 23// allocations at runtime. 24func errnoErr(e syscall.Errno) error { 25 switch e { 26 case 0: 27 return syscall.EINVAL 28 case errnoERROR_IO_PENDING: 29 return errERROR_IO_PENDING 30 } 31 // TODO: add more here, after collecting data on the common 32 // error values see on Windows. (perhaps when running 33 // all.bat?) 34 return e 35} 36 37var ( 38 modadvapi32 = NewLazySystemDLL("advapi32.dll") 39 modcrypt32 = NewLazySystemDLL("crypt32.dll") 40 moddnsapi = NewLazySystemDLL("dnsapi.dll") 41 modiphlpapi = NewLazySystemDLL("iphlpapi.dll") 42 modkernel32 = NewLazySystemDLL("kernel32.dll") 43 modmswsock = NewLazySystemDLL("mswsock.dll") 44 modnetapi32 = NewLazySystemDLL("netapi32.dll") 45 modntdll = NewLazySystemDLL("ntdll.dll") 46 modole32 = NewLazySystemDLL("ole32.dll") 47 modpsapi = NewLazySystemDLL("psapi.dll") 48 modsecur32 = NewLazySystemDLL("secur32.dll") 49 modshell32 = NewLazySystemDLL("shell32.dll") 50 moduser32 = NewLazySystemDLL("user32.dll") 51 moduserenv = NewLazySystemDLL("userenv.dll") 52 modws2_32 = NewLazySystemDLL("ws2_32.dll") 53 modwtsapi32 = NewLazySystemDLL("wtsapi32.dll") 54 55 procAdjustTokenGroups = modadvapi32.NewProc("AdjustTokenGroups") 56 procAdjustTokenPrivileges = modadvapi32.NewProc("AdjustTokenPrivileges") 57 procAllocateAndInitializeSid = modadvapi32.NewProc("AllocateAndInitializeSid") 58 procBuildSecurityDescriptorW = modadvapi32.NewProc("BuildSecurityDescriptorW") 59 procChangeServiceConfig2W = modadvapi32.NewProc("ChangeServiceConfig2W") 60 procChangeServiceConfigW = modadvapi32.NewProc("ChangeServiceConfigW") 61 procCheckTokenMembership = modadvapi32.NewProc("CheckTokenMembership") 62 procCloseServiceHandle = modadvapi32.NewProc("CloseServiceHandle") 63 procControlService = modadvapi32.NewProc("ControlService") 64 procConvertSecurityDescriptorToStringSecurityDescriptorW = modadvapi32.NewProc("ConvertSecurityDescriptorToStringSecurityDescriptorW") 65 procConvertSidToStringSidW = modadvapi32.NewProc("ConvertSidToStringSidW") 66 procConvertStringSecurityDescriptorToSecurityDescriptorW = modadvapi32.NewProc("ConvertStringSecurityDescriptorToSecurityDescriptorW") 67 procConvertStringSidToSidW = modadvapi32.NewProc("ConvertStringSidToSidW") 68 procCopySid = modadvapi32.NewProc("CopySid") 69 procCreateServiceW = modadvapi32.NewProc("CreateServiceW") 70 procCreateWellKnownSid = modadvapi32.NewProc("CreateWellKnownSid") 71 procCryptAcquireContextW = modadvapi32.NewProc("CryptAcquireContextW") 72 procCryptGenRandom = modadvapi32.NewProc("CryptGenRandom") 73 procCryptReleaseContext = modadvapi32.NewProc("CryptReleaseContext") 74 procDeleteService = modadvapi32.NewProc("DeleteService") 75 procDeregisterEventSource = modadvapi32.NewProc("DeregisterEventSource") 76 procDuplicateTokenEx = modadvapi32.NewProc("DuplicateTokenEx") 77 procEnumServicesStatusExW = modadvapi32.NewProc("EnumServicesStatusExW") 78 procEqualSid = modadvapi32.NewProc("EqualSid") 79 procFreeSid = modadvapi32.NewProc("FreeSid") 80 procGetLengthSid = modadvapi32.NewProc("GetLengthSid") 81 procGetNamedSecurityInfoW = modadvapi32.NewProc("GetNamedSecurityInfoW") 82 procGetSecurityDescriptorControl = modadvapi32.NewProc("GetSecurityDescriptorControl") 83 procGetSecurityDescriptorDacl = modadvapi32.NewProc("GetSecurityDescriptorDacl") 84 procGetSecurityDescriptorGroup = modadvapi32.NewProc("GetSecurityDescriptorGroup") 85 procGetSecurityDescriptorLength = modadvapi32.NewProc("GetSecurityDescriptorLength") 86 procGetSecurityDescriptorOwner = modadvapi32.NewProc("GetSecurityDescriptorOwner") 87 procGetSecurityDescriptorRMControl = modadvapi32.NewProc("GetSecurityDescriptorRMControl") 88 procGetSecurityDescriptorSacl = modadvapi32.NewProc("GetSecurityDescriptorSacl") 89 procGetSecurityInfo = modadvapi32.NewProc("GetSecurityInfo") 90 procGetSidIdentifierAuthority = modadvapi32.NewProc("GetSidIdentifierAuthority") 91 procGetSidSubAuthority = modadvapi32.NewProc("GetSidSubAuthority") 92 procGetSidSubAuthorityCount = modadvapi32.NewProc("GetSidSubAuthorityCount") 93 procGetTokenInformation = modadvapi32.NewProc("GetTokenInformation") 94 procImpersonateSelf = modadvapi32.NewProc("ImpersonateSelf") 95 procInitializeSecurityDescriptor = modadvapi32.NewProc("InitializeSecurityDescriptor") 96 procInitiateSystemShutdownExW = modadvapi32.NewProc("InitiateSystemShutdownExW") 97 procIsValidSecurityDescriptor = modadvapi32.NewProc("IsValidSecurityDescriptor") 98 procIsValidSid = modadvapi32.NewProc("IsValidSid") 99 procIsWellKnownSid = modadvapi32.NewProc("IsWellKnownSid") 100 procLookupAccountNameW = modadvapi32.NewProc("LookupAccountNameW") 101 procLookupAccountSidW = modadvapi32.NewProc("LookupAccountSidW") 102 procLookupPrivilegeValueW = modadvapi32.NewProc("LookupPrivilegeValueW") 103 procMakeAbsoluteSD = modadvapi32.NewProc("MakeAbsoluteSD") 104 procMakeSelfRelativeSD = modadvapi32.NewProc("MakeSelfRelativeSD") 105 procNotifyServiceStatusChangeW = modadvapi32.NewProc("NotifyServiceStatusChangeW") 106 procOpenProcessToken = modadvapi32.NewProc("OpenProcessToken") 107 procOpenSCManagerW = modadvapi32.NewProc("OpenSCManagerW") 108 procOpenServiceW = modadvapi32.NewProc("OpenServiceW") 109 procOpenThreadToken = modadvapi32.NewProc("OpenThreadToken") 110 procQueryServiceConfig2W = modadvapi32.NewProc("QueryServiceConfig2W") 111 procQueryServiceConfigW = modadvapi32.NewProc("QueryServiceConfigW") 112 procQueryServiceLockStatusW = modadvapi32.NewProc("QueryServiceLockStatusW") 113 procQueryServiceStatus = modadvapi32.NewProc("QueryServiceStatus") 114 procQueryServiceStatusEx = modadvapi32.NewProc("QueryServiceStatusEx") 115 procRegCloseKey = modadvapi32.NewProc("RegCloseKey") 116 procRegEnumKeyExW = modadvapi32.NewProc("RegEnumKeyExW") 117 procRegOpenKeyExW = modadvapi32.NewProc("RegOpenKeyExW") 118 procRegQueryInfoKeyW = modadvapi32.NewProc("RegQueryInfoKeyW") 119 procRegQueryValueExW = modadvapi32.NewProc("RegQueryValueExW") 120 procRegisterEventSourceW = modadvapi32.NewProc("RegisterEventSourceW") 121 procReportEventW = modadvapi32.NewProc("ReportEventW") 122 procRevertToSelf = modadvapi32.NewProc("RevertToSelf") 123 procSetEntriesInAclW = modadvapi32.NewProc("SetEntriesInAclW") 124 procSetNamedSecurityInfoW = modadvapi32.NewProc("SetNamedSecurityInfoW") 125 procSetSecurityDescriptorControl = modadvapi32.NewProc("SetSecurityDescriptorControl") 126 procSetSecurityDescriptorDacl = modadvapi32.NewProc("SetSecurityDescriptorDacl") 127 procSetSecurityDescriptorGroup = modadvapi32.NewProc("SetSecurityDescriptorGroup") 128 procSetSecurityDescriptorOwner = modadvapi32.NewProc("SetSecurityDescriptorOwner") 129 procSetSecurityDescriptorRMControl = modadvapi32.NewProc("SetSecurityDescriptorRMControl") 130 procSetSecurityDescriptorSacl = modadvapi32.NewProc("SetSecurityDescriptorSacl") 131 procSetSecurityInfo = modadvapi32.NewProc("SetSecurityInfo") 132 procSetServiceStatus = modadvapi32.NewProc("SetServiceStatus") 133 procSetThreadToken = modadvapi32.NewProc("SetThreadToken") 134 procSetTokenInformation = modadvapi32.NewProc("SetTokenInformation") 135 procStartServiceCtrlDispatcherW = modadvapi32.NewProc("StartServiceCtrlDispatcherW") 136 procStartServiceW = modadvapi32.NewProc("StartServiceW") 137 procCertAddCertificateContextToStore = modcrypt32.NewProc("CertAddCertificateContextToStore") 138 procCertCloseStore = modcrypt32.NewProc("CertCloseStore") 139 procCertCreateCertificateContext = modcrypt32.NewProc("CertCreateCertificateContext") 140 procCertEnumCertificatesInStore = modcrypt32.NewProc("CertEnumCertificatesInStore") 141 procCertFreeCertificateChain = modcrypt32.NewProc("CertFreeCertificateChain") 142 procCertFreeCertificateContext = modcrypt32.NewProc("CertFreeCertificateContext") 143 procCertGetCertificateChain = modcrypt32.NewProc("CertGetCertificateChain") 144 procCertOpenStore = modcrypt32.NewProc("CertOpenStore") 145 procCertOpenSystemStoreW = modcrypt32.NewProc("CertOpenSystemStoreW") 146 procCertVerifyCertificateChainPolicy = modcrypt32.NewProc("CertVerifyCertificateChainPolicy") 147 procDnsNameCompare_W = moddnsapi.NewProc("DnsNameCompare_W") 148 procDnsQuery_W = moddnsapi.NewProc("DnsQuery_W") 149 procDnsRecordListFree = moddnsapi.NewProc("DnsRecordListFree") 150 procGetAdaptersAddresses = modiphlpapi.NewProc("GetAdaptersAddresses") 151 procGetAdaptersInfo = modiphlpapi.NewProc("GetAdaptersInfo") 152 procGetIfEntry = modiphlpapi.NewProc("GetIfEntry") 153 procAssignProcessToJobObject = modkernel32.NewProc("AssignProcessToJobObject") 154 procCancelIo = modkernel32.NewProc("CancelIo") 155 procCancelIoEx = modkernel32.NewProc("CancelIoEx") 156 procCloseHandle = modkernel32.NewProc("CloseHandle") 157 procCreateDirectoryW = modkernel32.NewProc("CreateDirectoryW") 158 procCreateEventExW = modkernel32.NewProc("CreateEventExW") 159 procCreateEventW = modkernel32.NewProc("CreateEventW") 160 procCreateFileMappingW = modkernel32.NewProc("CreateFileMappingW") 161 procCreateFileW = modkernel32.NewProc("CreateFileW") 162 procCreateHardLinkW = modkernel32.NewProc("CreateHardLinkW") 163 procCreateIoCompletionPort = modkernel32.NewProc("CreateIoCompletionPort") 164 procCreateJobObjectW = modkernel32.NewProc("CreateJobObjectW") 165 procCreateMutexExW = modkernel32.NewProc("CreateMutexExW") 166 procCreateMutexW = modkernel32.NewProc("CreateMutexW") 167 procCreatePipe = modkernel32.NewProc("CreatePipe") 168 procCreateProcessW = modkernel32.NewProc("CreateProcessW") 169 procCreateSymbolicLinkW = modkernel32.NewProc("CreateSymbolicLinkW") 170 procCreateToolhelp32Snapshot = modkernel32.NewProc("CreateToolhelp32Snapshot") 171 procDefineDosDeviceW = modkernel32.NewProc("DefineDosDeviceW") 172 procDeleteFileW = modkernel32.NewProc("DeleteFileW") 173 procDeleteVolumeMountPointW = modkernel32.NewProc("DeleteVolumeMountPointW") 174 procDeviceIoControl = modkernel32.NewProc("DeviceIoControl") 175 procDuplicateHandle = modkernel32.NewProc("DuplicateHandle") 176 procExitProcess = modkernel32.NewProc("ExitProcess") 177 procFindClose = modkernel32.NewProc("FindClose") 178 procFindFirstFileW = modkernel32.NewProc("FindFirstFileW") 179 procFindFirstVolumeMountPointW = modkernel32.NewProc("FindFirstVolumeMountPointW") 180 procFindFirstVolumeW = modkernel32.NewProc("FindFirstVolumeW") 181 procFindNextFileW = modkernel32.NewProc("FindNextFileW") 182 procFindNextVolumeMountPointW = modkernel32.NewProc("FindNextVolumeMountPointW") 183 procFindNextVolumeW = modkernel32.NewProc("FindNextVolumeW") 184 procFindVolumeClose = modkernel32.NewProc("FindVolumeClose") 185 procFindVolumeMountPointClose = modkernel32.NewProc("FindVolumeMountPointClose") 186 procFlushFileBuffers = modkernel32.NewProc("FlushFileBuffers") 187 procFlushViewOfFile = modkernel32.NewProc("FlushViewOfFile") 188 procFormatMessageW = modkernel32.NewProc("FormatMessageW") 189 procFreeEnvironmentStringsW = modkernel32.NewProc("FreeEnvironmentStringsW") 190 procFreeLibrary = modkernel32.NewProc("FreeLibrary") 191 procGenerateConsoleCtrlEvent = modkernel32.NewProc("GenerateConsoleCtrlEvent") 192 procGetACP = modkernel32.NewProc("GetACP") 193 procGetCommandLineW = modkernel32.NewProc("GetCommandLineW") 194 procGetComputerNameExW = modkernel32.NewProc("GetComputerNameExW") 195 procGetComputerNameW = modkernel32.NewProc("GetComputerNameW") 196 procGetConsoleMode = modkernel32.NewProc("GetConsoleMode") 197 procGetConsoleScreenBufferInfo = modkernel32.NewProc("GetConsoleScreenBufferInfo") 198 procGetCurrentDirectoryW = modkernel32.NewProc("GetCurrentDirectoryW") 199 procGetCurrentProcessId = modkernel32.NewProc("GetCurrentProcessId") 200 procGetCurrentThreadId = modkernel32.NewProc("GetCurrentThreadId") 201 procGetDiskFreeSpaceExW = modkernel32.NewProc("GetDiskFreeSpaceExW") 202 procGetDriveTypeW = modkernel32.NewProc("GetDriveTypeW") 203 procGetEnvironmentStringsW = modkernel32.NewProc("GetEnvironmentStringsW") 204 procGetEnvironmentVariableW = modkernel32.NewProc("GetEnvironmentVariableW") 205 procGetExitCodeProcess = modkernel32.NewProc("GetExitCodeProcess") 206 procGetFileAttributesExW = modkernel32.NewProc("GetFileAttributesExW") 207 procGetFileAttributesW = modkernel32.NewProc("GetFileAttributesW") 208 procGetFileInformationByHandle = modkernel32.NewProc("GetFileInformationByHandle") 209 procGetFileInformationByHandleEx = modkernel32.NewProc("GetFileInformationByHandleEx") 210 procGetFileType = modkernel32.NewProc("GetFileType") 211 procGetFullPathNameW = modkernel32.NewProc("GetFullPathNameW") 212 procGetLastError = modkernel32.NewProc("GetLastError") 213 procGetLogicalDriveStringsW = modkernel32.NewProc("GetLogicalDriveStringsW") 214 procGetLogicalDrives = modkernel32.NewProc("GetLogicalDrives") 215 procGetLongPathNameW = modkernel32.NewProc("GetLongPathNameW") 216 procGetModuleFileNameW = modkernel32.NewProc("GetModuleFileNameW") 217 procGetModuleHandleExW = modkernel32.NewProc("GetModuleHandleExW") 218 procGetOverlappedResult = modkernel32.NewProc("GetOverlappedResult") 219 procGetPriorityClass = modkernel32.NewProc("GetPriorityClass") 220 procGetProcAddress = modkernel32.NewProc("GetProcAddress") 221 procGetProcessId = modkernel32.NewProc("GetProcessId") 222 procGetProcessPreferredUILanguages = modkernel32.NewProc("GetProcessPreferredUILanguages") 223 procGetProcessShutdownParameters = modkernel32.NewProc("GetProcessShutdownParameters") 224 procGetProcessTimes = modkernel32.NewProc("GetProcessTimes") 225 procGetProcessWorkingSetSizeEx = modkernel32.NewProc("GetProcessWorkingSetSizeEx") 226 procGetQueuedCompletionStatus = modkernel32.NewProc("GetQueuedCompletionStatus") 227 procGetShortPathNameW = modkernel32.NewProc("GetShortPathNameW") 228 procGetStartupInfoW = modkernel32.NewProc("GetStartupInfoW") 229 procGetStdHandle = modkernel32.NewProc("GetStdHandle") 230 procGetSystemDirectoryW = modkernel32.NewProc("GetSystemDirectoryW") 231 procGetSystemPreferredUILanguages = modkernel32.NewProc("GetSystemPreferredUILanguages") 232 procGetSystemTimeAsFileTime = modkernel32.NewProc("GetSystemTimeAsFileTime") 233 procGetSystemTimePreciseAsFileTime = modkernel32.NewProc("GetSystemTimePreciseAsFileTime") 234 procGetSystemWindowsDirectoryW = modkernel32.NewProc("GetSystemWindowsDirectoryW") 235 procGetTempPathW = modkernel32.NewProc("GetTempPathW") 236 procGetThreadPreferredUILanguages = modkernel32.NewProc("GetThreadPreferredUILanguages") 237 procGetTickCount64 = modkernel32.NewProc("GetTickCount64") 238 procGetTimeZoneInformation = modkernel32.NewProc("GetTimeZoneInformation") 239 procGetUserPreferredUILanguages = modkernel32.NewProc("GetUserPreferredUILanguages") 240 procGetVersion = modkernel32.NewProc("GetVersion") 241 procGetVolumeInformationByHandleW = modkernel32.NewProc("GetVolumeInformationByHandleW") 242 procGetVolumeInformationW = modkernel32.NewProc("GetVolumeInformationW") 243 procGetVolumeNameForVolumeMountPointW = modkernel32.NewProc("GetVolumeNameForVolumeMountPointW") 244 procGetVolumePathNameW = modkernel32.NewProc("GetVolumePathNameW") 245 procGetVolumePathNamesForVolumeNameW = modkernel32.NewProc("GetVolumePathNamesForVolumeNameW") 246 procGetWindowsDirectoryW = modkernel32.NewProc("GetWindowsDirectoryW") 247 procIsWow64Process = modkernel32.NewProc("IsWow64Process") 248 procLoadLibraryExW = modkernel32.NewProc("LoadLibraryExW") 249 procLoadLibraryW = modkernel32.NewProc("LoadLibraryW") 250 procLocalFree = modkernel32.NewProc("LocalFree") 251 procLockFileEx = modkernel32.NewProc("LockFileEx") 252 procMapViewOfFile = modkernel32.NewProc("MapViewOfFile") 253 procMoveFileExW = modkernel32.NewProc("MoveFileExW") 254 procMoveFileW = modkernel32.NewProc("MoveFileW") 255 procMultiByteToWideChar = modkernel32.NewProc("MultiByteToWideChar") 256 procOpenEventW = modkernel32.NewProc("OpenEventW") 257 procOpenMutexW = modkernel32.NewProc("OpenMutexW") 258 procOpenProcess = modkernel32.NewProc("OpenProcess") 259 procOpenThread = modkernel32.NewProc("OpenThread") 260 procPostQueuedCompletionStatus = modkernel32.NewProc("PostQueuedCompletionStatus") 261 procProcess32FirstW = modkernel32.NewProc("Process32FirstW") 262 procProcess32NextW = modkernel32.NewProc("Process32NextW") 263 procProcessIdToSessionId = modkernel32.NewProc("ProcessIdToSessionId") 264 procPulseEvent = modkernel32.NewProc("PulseEvent") 265 procQueryDosDeviceW = modkernel32.NewProc("QueryDosDeviceW") 266 procQueryInformationJobObject = modkernel32.NewProc("QueryInformationJobObject") 267 procReadConsoleW = modkernel32.NewProc("ReadConsoleW") 268 procReadDirectoryChangesW = modkernel32.NewProc("ReadDirectoryChangesW") 269 procReadFile = modkernel32.NewProc("ReadFile") 270 procReleaseMutex = modkernel32.NewProc("ReleaseMutex") 271 procRemoveDirectoryW = modkernel32.NewProc("RemoveDirectoryW") 272 procResetEvent = modkernel32.NewProc("ResetEvent") 273 procResumeThread = modkernel32.NewProc("ResumeThread") 274 procSetConsoleCursorPosition = modkernel32.NewProc("SetConsoleCursorPosition") 275 procSetConsoleMode = modkernel32.NewProc("SetConsoleMode") 276 procSetCurrentDirectoryW = modkernel32.NewProc("SetCurrentDirectoryW") 277 procSetEndOfFile = modkernel32.NewProc("SetEndOfFile") 278 procSetEnvironmentVariableW = modkernel32.NewProc("SetEnvironmentVariableW") 279 procSetErrorMode = modkernel32.NewProc("SetErrorMode") 280 procSetEvent = modkernel32.NewProc("SetEvent") 281 procSetFileAttributesW = modkernel32.NewProc("SetFileAttributesW") 282 procSetFileCompletionNotificationModes = modkernel32.NewProc("SetFileCompletionNotificationModes") 283 procSetFilePointer = modkernel32.NewProc("SetFilePointer") 284 procSetFileTime = modkernel32.NewProc("SetFileTime") 285 procSetHandleInformation = modkernel32.NewProc("SetHandleInformation") 286 procSetInformationJobObject = modkernel32.NewProc("SetInformationJobObject") 287 procSetPriorityClass = modkernel32.NewProc("SetPriorityClass") 288 procSetProcessPriorityBoost = modkernel32.NewProc("SetProcessPriorityBoost") 289 procSetProcessShutdownParameters = modkernel32.NewProc("SetProcessShutdownParameters") 290 procSetProcessWorkingSetSizeEx = modkernel32.NewProc("SetProcessWorkingSetSizeEx") 291 procSetStdHandle = modkernel32.NewProc("SetStdHandle") 292 procSetVolumeLabelW = modkernel32.NewProc("SetVolumeLabelW") 293 procSetVolumeMountPointW = modkernel32.NewProc("SetVolumeMountPointW") 294 procSleepEx = modkernel32.NewProc("SleepEx") 295 procTerminateJobObject = modkernel32.NewProc("TerminateJobObject") 296 procTerminateProcess = modkernel32.NewProc("TerminateProcess") 297 procThread32First = modkernel32.NewProc("Thread32First") 298 procThread32Next = modkernel32.NewProc("Thread32Next") 299 procUnlockFileEx = modkernel32.NewProc("UnlockFileEx") 300 procUnmapViewOfFile = modkernel32.NewProc("UnmapViewOfFile") 301 procVirtualAlloc = modkernel32.NewProc("VirtualAlloc") 302 procVirtualFree = modkernel32.NewProc("VirtualFree") 303 procVirtualLock = modkernel32.NewProc("VirtualLock") 304 procVirtualProtect = modkernel32.NewProc("VirtualProtect") 305 procVirtualUnlock = modkernel32.NewProc("VirtualUnlock") 306 procWaitForMultipleObjects = modkernel32.NewProc("WaitForMultipleObjects") 307 procWaitForSingleObject = modkernel32.NewProc("WaitForSingleObject") 308 procWriteConsoleW = modkernel32.NewProc("WriteConsoleW") 309 procWriteFile = modkernel32.NewProc("WriteFile") 310 procAcceptEx = modmswsock.NewProc("AcceptEx") 311 procGetAcceptExSockaddrs = modmswsock.NewProc("GetAcceptExSockaddrs") 312 procTransmitFile = modmswsock.NewProc("TransmitFile") 313 procNetApiBufferFree = modnetapi32.NewProc("NetApiBufferFree") 314 procNetGetJoinInformation = modnetapi32.NewProc("NetGetJoinInformation") 315 procNetUserGetInfo = modnetapi32.NewProc("NetUserGetInfo") 316 procRtlGetNtVersionNumbers = modntdll.NewProc("RtlGetNtVersionNumbers") 317 procRtlGetVersion = modntdll.NewProc("RtlGetVersion") 318 procCLSIDFromString = modole32.NewProc("CLSIDFromString") 319 procCoCreateGuid = modole32.NewProc("CoCreateGuid") 320 procCoTaskMemFree = modole32.NewProc("CoTaskMemFree") 321 procStringFromGUID2 = modole32.NewProc("StringFromGUID2") 322 procEnumProcesses = modpsapi.NewProc("EnumProcesses") 323 procGetUserNameExW = modsecur32.NewProc("GetUserNameExW") 324 procTranslateNameW = modsecur32.NewProc("TranslateNameW") 325 procCommandLineToArgvW = modshell32.NewProc("CommandLineToArgvW") 326 procSHGetKnownFolderPath = modshell32.NewProc("SHGetKnownFolderPath") 327 procShellExecuteW = modshell32.NewProc("ShellExecuteW") 328 procExitWindowsEx = moduser32.NewProc("ExitWindowsEx") 329 procMessageBoxW = moduser32.NewProc("MessageBoxW") 330 procCreateEnvironmentBlock = moduserenv.NewProc("CreateEnvironmentBlock") 331 procDestroyEnvironmentBlock = moduserenv.NewProc("DestroyEnvironmentBlock") 332 procGetUserProfileDirectoryW = moduserenv.NewProc("GetUserProfileDirectoryW") 333 procFreeAddrInfoW = modws2_32.NewProc("FreeAddrInfoW") 334 procGetAddrInfoW = modws2_32.NewProc("GetAddrInfoW") 335 procWSACleanup = modws2_32.NewProc("WSACleanup") 336 procWSAEnumProtocolsW = modws2_32.NewProc("WSAEnumProtocolsW") 337 procWSAIoctl = modws2_32.NewProc("WSAIoctl") 338 procWSARecv = modws2_32.NewProc("WSARecv") 339 procWSARecvFrom = modws2_32.NewProc("WSARecvFrom") 340 procWSASend = modws2_32.NewProc("WSASend") 341 procWSASendTo = modws2_32.NewProc("WSASendTo") 342 procWSAStartup = modws2_32.NewProc("WSAStartup") 343 procbind = modws2_32.NewProc("bind") 344 procclosesocket = modws2_32.NewProc("closesocket") 345 procconnect = modws2_32.NewProc("connect") 346 procgethostbyname = modws2_32.NewProc("gethostbyname") 347 procgetpeername = modws2_32.NewProc("getpeername") 348 procgetprotobyname = modws2_32.NewProc("getprotobyname") 349 procgetservbyname = modws2_32.NewProc("getservbyname") 350 procgetsockname = modws2_32.NewProc("getsockname") 351 procgetsockopt = modws2_32.NewProc("getsockopt") 352 proclisten = modws2_32.NewProc("listen") 353 procntohs = modws2_32.NewProc("ntohs") 354 procrecvfrom = modws2_32.NewProc("recvfrom") 355 procsendto = modws2_32.NewProc("sendto") 356 procsetsockopt = modws2_32.NewProc("setsockopt") 357 procshutdown = modws2_32.NewProc("shutdown") 358 procsocket = modws2_32.NewProc("socket") 359 procWTSEnumerateSessionsW = modwtsapi32.NewProc("WTSEnumerateSessionsW") 360 procWTSFreeMemory = modwtsapi32.NewProc("WTSFreeMemory") 361 procWTSQueryUserToken = modwtsapi32.NewProc("WTSQueryUserToken") 362) 363 364func AdjustTokenGroups(token Token, resetToDefault bool, newstate *Tokengroups, buflen uint32, prevstate *Tokengroups, returnlen *uint32) (err error) { 365 var _p0 uint32 366 if resetToDefault { 367 _p0 = 1 368 } 369 r1, _, e1 := syscall.Syscall6(procAdjustTokenGroups.Addr(), 6, uintptr(token), uintptr(_p0), uintptr(unsafe.Pointer(newstate)), uintptr(buflen), uintptr(unsafe.Pointer(prevstate)), uintptr(unsafe.Pointer(returnlen))) 370 if r1 == 0 { 371 err = errnoErr(e1) 372 } 373 return 374} 375 376func AdjustTokenPrivileges(token Token, disableAllPrivileges bool, newstate *Tokenprivileges, buflen uint32, prevstate *Tokenprivileges, returnlen *uint32) (err error) { 377 var _p0 uint32 378 if disableAllPrivileges { 379 _p0 = 1 380 } 381 r1, _, e1 := syscall.Syscall6(procAdjustTokenPrivileges.Addr(), 6, uintptr(token), uintptr(_p0), uintptr(unsafe.Pointer(newstate)), uintptr(buflen), uintptr(unsafe.Pointer(prevstate)), uintptr(unsafe.Pointer(returnlen))) 382 if r1 == 0 { 383 err = errnoErr(e1) 384 } 385 return 386} 387 388func AllocateAndInitializeSid(identAuth *SidIdentifierAuthority, subAuth byte, subAuth0 uint32, subAuth1 uint32, subAuth2 uint32, subAuth3 uint32, subAuth4 uint32, subAuth5 uint32, subAuth6 uint32, subAuth7 uint32, sid **SID) (err error) { 389 r1, _, e1 := syscall.Syscall12(procAllocateAndInitializeSid.Addr(), 11, uintptr(unsafe.Pointer(identAuth)), uintptr(subAuth), uintptr(subAuth0), uintptr(subAuth1), uintptr(subAuth2), uintptr(subAuth3), uintptr(subAuth4), uintptr(subAuth5), uintptr(subAuth6), uintptr(subAuth7), uintptr(unsafe.Pointer(sid)), 0) 390 if r1 == 0 { 391 err = errnoErr(e1) 392 } 393 return 394} 395 396func buildSecurityDescriptor(owner *TRUSTEE, group *TRUSTEE, countAccessEntries uint32, accessEntries *EXPLICIT_ACCESS, countAuditEntries uint32, auditEntries *EXPLICIT_ACCESS, oldSecurityDescriptor *SECURITY_DESCRIPTOR, sizeNewSecurityDescriptor *uint32, newSecurityDescriptor **SECURITY_DESCRIPTOR) (ret error) { 397 r0, _, _ := syscall.Syscall9(procBuildSecurityDescriptorW.Addr(), 9, uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(countAccessEntries), uintptr(unsafe.Pointer(accessEntries)), uintptr(countAuditEntries), uintptr(unsafe.Pointer(auditEntries)), uintptr(unsafe.Pointer(oldSecurityDescriptor)), uintptr(unsafe.Pointer(sizeNewSecurityDescriptor)), uintptr(unsafe.Pointer(newSecurityDescriptor))) 398 if r0 != 0 { 399 ret = syscall.Errno(r0) 400 } 401 return 402} 403 404func ChangeServiceConfig2(service Handle, infoLevel uint32, info *byte) (err error) { 405 r1, _, e1 := syscall.Syscall(procChangeServiceConfig2W.Addr(), 3, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(info))) 406 if r1 == 0 { 407 err = errnoErr(e1) 408 } 409 return 410} 411 412func ChangeServiceConfig(service Handle, serviceType uint32, startType uint32, errorControl uint32, binaryPathName *uint16, loadOrderGroup *uint16, tagId *uint32, dependencies *uint16, serviceStartName *uint16, password *uint16, displayName *uint16) (err error) { 413 r1, _, e1 := syscall.Syscall12(procChangeServiceConfigW.Addr(), 11, uintptr(service), uintptr(serviceType), uintptr(startType), uintptr(errorControl), uintptr(unsafe.Pointer(binaryPathName)), uintptr(unsafe.Pointer(loadOrderGroup)), uintptr(unsafe.Pointer(tagId)), uintptr(unsafe.Pointer(dependencies)), uintptr(unsafe.Pointer(serviceStartName)), uintptr(unsafe.Pointer(password)), uintptr(unsafe.Pointer(displayName)), 0) 414 if r1 == 0 { 415 err = errnoErr(e1) 416 } 417 return 418} 419 420func checkTokenMembership(tokenHandle Token, sidToCheck *SID, isMember *int32) (err error) { 421 r1, _, e1 := syscall.Syscall(procCheckTokenMembership.Addr(), 3, uintptr(tokenHandle), uintptr(unsafe.Pointer(sidToCheck)), uintptr(unsafe.Pointer(isMember))) 422 if r1 == 0 { 423 err = errnoErr(e1) 424 } 425 return 426} 427 428func CloseServiceHandle(handle Handle) (err error) { 429 r1, _, e1 := syscall.Syscall(procCloseServiceHandle.Addr(), 1, uintptr(handle), 0, 0) 430 if r1 == 0 { 431 err = errnoErr(e1) 432 } 433 return 434} 435 436func ControlService(service Handle, control uint32, status *SERVICE_STATUS) (err error) { 437 r1, _, e1 := syscall.Syscall(procControlService.Addr(), 3, uintptr(service), uintptr(control), uintptr(unsafe.Pointer(status))) 438 if r1 == 0 { 439 err = errnoErr(e1) 440 } 441 return 442} 443 444func convertSecurityDescriptorToStringSecurityDescriptor(sd *SECURITY_DESCRIPTOR, revision uint32, securityInformation SECURITY_INFORMATION, str **uint16, strLen *uint32) (err error) { 445 r1, _, e1 := syscall.Syscall6(procConvertSecurityDescriptorToStringSecurityDescriptorW.Addr(), 5, uintptr(unsafe.Pointer(sd)), uintptr(revision), uintptr(securityInformation), uintptr(unsafe.Pointer(str)), uintptr(unsafe.Pointer(strLen)), 0) 446 if r1 == 0 { 447 err = errnoErr(e1) 448 } 449 return 450} 451 452func ConvertSidToStringSid(sid *SID, stringSid **uint16) (err error) { 453 r1, _, e1 := syscall.Syscall(procConvertSidToStringSidW.Addr(), 2, uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(stringSid)), 0) 454 if r1 == 0 { 455 err = errnoErr(e1) 456 } 457 return 458} 459 460func convertStringSecurityDescriptorToSecurityDescriptor(str string, revision uint32, sd **SECURITY_DESCRIPTOR, size *uint32) (err error) { 461 var _p0 *uint16 462 _p0, err = syscall.UTF16PtrFromString(str) 463 if err != nil { 464 return 465 } 466 return _convertStringSecurityDescriptorToSecurityDescriptor(_p0, revision, sd, size) 467} 468 469func _convertStringSecurityDescriptorToSecurityDescriptor(str *uint16, revision uint32, sd **SECURITY_DESCRIPTOR, size *uint32) (err error) { 470 r1, _, e1 := syscall.Syscall6(procConvertStringSecurityDescriptorToSecurityDescriptorW.Addr(), 4, uintptr(unsafe.Pointer(str)), uintptr(revision), uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(size)), 0, 0) 471 if r1 == 0 { 472 err = errnoErr(e1) 473 } 474 return 475} 476 477func ConvertStringSidToSid(stringSid *uint16, sid **SID) (err error) { 478 r1, _, e1 := syscall.Syscall(procConvertStringSidToSidW.Addr(), 2, uintptr(unsafe.Pointer(stringSid)), uintptr(unsafe.Pointer(sid)), 0) 479 if r1 == 0 { 480 err = errnoErr(e1) 481 } 482 return 483} 484 485func CopySid(destSidLen uint32, destSid *SID, srcSid *SID) (err error) { 486 r1, _, e1 := syscall.Syscall(procCopySid.Addr(), 3, uintptr(destSidLen), uintptr(unsafe.Pointer(destSid)), uintptr(unsafe.Pointer(srcSid))) 487 if r1 == 0 { 488 err = errnoErr(e1) 489 } 490 return 491} 492 493func CreateService(mgr Handle, serviceName *uint16, displayName *uint16, access uint32, srvType uint32, startType uint32, errCtl uint32, pathName *uint16, loadOrderGroup *uint16, tagId *uint32, dependencies *uint16, serviceStartName *uint16, password *uint16) (handle Handle, err error) { 494 r0, _, e1 := syscall.Syscall15(procCreateServiceW.Addr(), 13, uintptr(mgr), uintptr(unsafe.Pointer(serviceName)), uintptr(unsafe.Pointer(displayName)), uintptr(access), uintptr(srvType), uintptr(startType), uintptr(errCtl), uintptr(unsafe.Pointer(pathName)), uintptr(unsafe.Pointer(loadOrderGroup)), uintptr(unsafe.Pointer(tagId)), uintptr(unsafe.Pointer(dependencies)), uintptr(unsafe.Pointer(serviceStartName)), uintptr(unsafe.Pointer(password)), 0, 0) 495 handle = Handle(r0) 496 if handle == 0 { 497 err = errnoErr(e1) 498 } 499 return 500} 501 502func createWellKnownSid(sidType WELL_KNOWN_SID_TYPE, domainSid *SID, sid *SID, sizeSid *uint32) (err error) { 503 r1, _, e1 := syscall.Syscall6(procCreateWellKnownSid.Addr(), 4, uintptr(sidType), uintptr(unsafe.Pointer(domainSid)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(sizeSid)), 0, 0) 504 if r1 == 0 { 505 err = errnoErr(e1) 506 } 507 return 508} 509 510func CryptAcquireContext(provhandle *Handle, container *uint16, provider *uint16, provtype uint32, flags uint32) (err error) { 511 r1, _, e1 := syscall.Syscall6(procCryptAcquireContextW.Addr(), 5, uintptr(unsafe.Pointer(provhandle)), uintptr(unsafe.Pointer(container)), uintptr(unsafe.Pointer(provider)), uintptr(provtype), uintptr(flags), 0) 512 if r1 == 0 { 513 err = errnoErr(e1) 514 } 515 return 516} 517 518func CryptGenRandom(provhandle Handle, buflen uint32, buf *byte) (err error) { 519 r1, _, e1 := syscall.Syscall(procCryptGenRandom.Addr(), 3, uintptr(provhandle), uintptr(buflen), uintptr(unsafe.Pointer(buf))) 520 if r1 == 0 { 521 err = errnoErr(e1) 522 } 523 return 524} 525 526func CryptReleaseContext(provhandle Handle, flags uint32) (err error) { 527 r1, _, e1 := syscall.Syscall(procCryptReleaseContext.Addr(), 2, uintptr(provhandle), uintptr(flags), 0) 528 if r1 == 0 { 529 err = errnoErr(e1) 530 } 531 return 532} 533 534func DeleteService(service Handle) (err error) { 535 r1, _, e1 := syscall.Syscall(procDeleteService.Addr(), 1, uintptr(service), 0, 0) 536 if r1 == 0 { 537 err = errnoErr(e1) 538 } 539 return 540} 541 542func DeregisterEventSource(handle Handle) (err error) { 543 r1, _, e1 := syscall.Syscall(procDeregisterEventSource.Addr(), 1, uintptr(handle), 0, 0) 544 if r1 == 0 { 545 err = errnoErr(e1) 546 } 547 return 548} 549 550func DuplicateTokenEx(existingToken Token, desiredAccess uint32, tokenAttributes *SecurityAttributes, impersonationLevel uint32, tokenType uint32, newToken *Token) (err error) { 551 r1, _, e1 := syscall.Syscall6(procDuplicateTokenEx.Addr(), 6, uintptr(existingToken), uintptr(desiredAccess), uintptr(unsafe.Pointer(tokenAttributes)), uintptr(impersonationLevel), uintptr(tokenType), uintptr(unsafe.Pointer(newToken))) 552 if r1 == 0 { 553 err = errnoErr(e1) 554 } 555 return 556} 557 558func EnumServicesStatusEx(mgr Handle, infoLevel uint32, serviceType uint32, serviceState uint32, services *byte, bufSize uint32, bytesNeeded *uint32, servicesReturned *uint32, resumeHandle *uint32, groupName *uint16) (err error) { 559 r1, _, e1 := syscall.Syscall12(procEnumServicesStatusExW.Addr(), 10, uintptr(mgr), uintptr(infoLevel), uintptr(serviceType), uintptr(serviceState), uintptr(unsafe.Pointer(services)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), uintptr(unsafe.Pointer(servicesReturned)), uintptr(unsafe.Pointer(resumeHandle)), uintptr(unsafe.Pointer(groupName)), 0, 0) 560 if r1 == 0 { 561 err = errnoErr(e1) 562 } 563 return 564} 565 566func EqualSid(sid1 *SID, sid2 *SID) (isEqual bool) { 567 r0, _, _ := syscall.Syscall(procEqualSid.Addr(), 2, uintptr(unsafe.Pointer(sid1)), uintptr(unsafe.Pointer(sid2)), 0) 568 isEqual = r0 != 0 569 return 570} 571 572func FreeSid(sid *SID) (err error) { 573 r1, _, e1 := syscall.Syscall(procFreeSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 574 if r1 != 0 { 575 err = errnoErr(e1) 576 } 577 return 578} 579 580func GetLengthSid(sid *SID) (len uint32) { 581 r0, _, _ := syscall.Syscall(procGetLengthSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 582 len = uint32(r0) 583 return 584} 585 586func getNamedSecurityInfo(objectName string, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner **SID, group **SID, dacl **ACL, sacl **ACL, sd **SECURITY_DESCRIPTOR) (ret error) { 587 var _p0 *uint16 588 _p0, ret = syscall.UTF16PtrFromString(objectName) 589 if ret != nil { 590 return 591 } 592 return _getNamedSecurityInfo(_p0, objectType, securityInformation, owner, group, dacl, sacl, sd) 593} 594 595func _getNamedSecurityInfo(objectName *uint16, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner **SID, group **SID, dacl **ACL, sacl **ACL, sd **SECURITY_DESCRIPTOR) (ret error) { 596 r0, _, _ := syscall.Syscall9(procGetNamedSecurityInfoW.Addr(), 8, uintptr(unsafe.Pointer(objectName)), uintptr(objectType), uintptr(securityInformation), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(sacl)), uintptr(unsafe.Pointer(sd)), 0) 597 if r0 != 0 { 598 ret = syscall.Errno(r0) 599 } 600 return 601} 602 603func getSecurityDescriptorControl(sd *SECURITY_DESCRIPTOR, control *SECURITY_DESCRIPTOR_CONTROL, revision *uint32) (err error) { 604 r1, _, e1 := syscall.Syscall(procGetSecurityDescriptorControl.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(control)), uintptr(unsafe.Pointer(revision))) 605 if r1 == 0 { 606 err = errnoErr(e1) 607 } 608 return 609} 610 611func getSecurityDescriptorDacl(sd *SECURITY_DESCRIPTOR, daclPresent *bool, dacl **ACL, daclDefaulted *bool) (err error) { 612 var _p0 uint32 613 if *daclPresent { 614 _p0 = 1 615 } 616 var _p1 uint32 617 if *daclDefaulted { 618 _p1 = 1 619 } 620 r1, _, e1 := syscall.Syscall6(procGetSecurityDescriptorDacl.Addr(), 4, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(&_p0)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(&_p1)), 0, 0) 621 *daclPresent = _p0 != 0 622 *daclDefaulted = _p1 != 0 623 if r1 == 0 { 624 err = errnoErr(e1) 625 } 626 return 627} 628 629func getSecurityDescriptorGroup(sd *SECURITY_DESCRIPTOR, group **SID, groupDefaulted *bool) (err error) { 630 var _p0 uint32 631 if *groupDefaulted { 632 _p0 = 1 633 } 634 r1, _, e1 := syscall.Syscall(procGetSecurityDescriptorGroup.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(&_p0))) 635 *groupDefaulted = _p0 != 0 636 if r1 == 0 { 637 err = errnoErr(e1) 638 } 639 return 640} 641 642func getSecurityDescriptorLength(sd *SECURITY_DESCRIPTOR) (len uint32) { 643 r0, _, _ := syscall.Syscall(procGetSecurityDescriptorLength.Addr(), 1, uintptr(unsafe.Pointer(sd)), 0, 0) 644 len = uint32(r0) 645 return 646} 647 648func getSecurityDescriptorOwner(sd *SECURITY_DESCRIPTOR, owner **SID, ownerDefaulted *bool) (err error) { 649 var _p0 uint32 650 if *ownerDefaulted { 651 _p0 = 1 652 } 653 r1, _, e1 := syscall.Syscall(procGetSecurityDescriptorOwner.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(&_p0))) 654 *ownerDefaulted = _p0 != 0 655 if r1 == 0 { 656 err = errnoErr(e1) 657 } 658 return 659} 660 661func getSecurityDescriptorRMControl(sd *SECURITY_DESCRIPTOR, rmControl *uint8) (ret error) { 662 r0, _, _ := syscall.Syscall(procGetSecurityDescriptorRMControl.Addr(), 2, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(rmControl)), 0) 663 if r0 != 0 { 664 ret = syscall.Errno(r0) 665 } 666 return 667} 668 669func getSecurityDescriptorSacl(sd *SECURITY_DESCRIPTOR, saclPresent *bool, sacl **ACL, saclDefaulted *bool) (err error) { 670 var _p0 uint32 671 if *saclPresent { 672 _p0 = 1 673 } 674 var _p1 uint32 675 if *saclDefaulted { 676 _p1 = 1 677 } 678 r1, _, e1 := syscall.Syscall6(procGetSecurityDescriptorSacl.Addr(), 4, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(&_p0)), uintptr(unsafe.Pointer(sacl)), uintptr(unsafe.Pointer(&_p1)), 0, 0) 679 *saclPresent = _p0 != 0 680 *saclDefaulted = _p1 != 0 681 if r1 == 0 { 682 err = errnoErr(e1) 683 } 684 return 685} 686 687func getSecurityInfo(handle Handle, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner **SID, group **SID, dacl **ACL, sacl **ACL, sd **SECURITY_DESCRIPTOR) (ret error) { 688 r0, _, _ := syscall.Syscall9(procGetSecurityInfo.Addr(), 8, uintptr(handle), uintptr(objectType), uintptr(securityInformation), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(sacl)), uintptr(unsafe.Pointer(sd)), 0) 689 if r0 != 0 { 690 ret = syscall.Errno(r0) 691 } 692 return 693} 694 695func getSidIdentifierAuthority(sid *SID) (authority *SidIdentifierAuthority) { 696 r0, _, _ := syscall.Syscall(procGetSidIdentifierAuthority.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 697 authority = (*SidIdentifierAuthority)(unsafe.Pointer(r0)) 698 return 699} 700 701func getSidSubAuthority(sid *SID, index uint32) (subAuthority *uint32) { 702 r0, _, _ := syscall.Syscall(procGetSidSubAuthority.Addr(), 2, uintptr(unsafe.Pointer(sid)), uintptr(index), 0) 703 subAuthority = (*uint32)(unsafe.Pointer(r0)) 704 return 705} 706 707func getSidSubAuthorityCount(sid *SID) (count *uint8) { 708 r0, _, _ := syscall.Syscall(procGetSidSubAuthorityCount.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 709 count = (*uint8)(unsafe.Pointer(r0)) 710 return 711} 712 713func GetTokenInformation(token Token, infoClass uint32, info *byte, infoLen uint32, returnedLen *uint32) (err error) { 714 r1, _, e1 := syscall.Syscall6(procGetTokenInformation.Addr(), 5, uintptr(token), uintptr(infoClass), uintptr(unsafe.Pointer(info)), uintptr(infoLen), uintptr(unsafe.Pointer(returnedLen)), 0) 715 if r1 == 0 { 716 err = errnoErr(e1) 717 } 718 return 719} 720 721func ImpersonateSelf(impersonationlevel uint32) (err error) { 722 r1, _, e1 := syscall.Syscall(procImpersonateSelf.Addr(), 1, uintptr(impersonationlevel), 0, 0) 723 if r1 == 0 { 724 err = errnoErr(e1) 725 } 726 return 727} 728 729func initializeSecurityDescriptor(absoluteSD *SECURITY_DESCRIPTOR, revision uint32) (err error) { 730 r1, _, e1 := syscall.Syscall(procInitializeSecurityDescriptor.Addr(), 2, uintptr(unsafe.Pointer(absoluteSD)), uintptr(revision), 0) 731 if r1 == 0 { 732 err = errnoErr(e1) 733 } 734 return 735} 736 737func InitiateSystemShutdownEx(machineName *uint16, message *uint16, timeout uint32, forceAppsClosed bool, rebootAfterShutdown bool, reason uint32) (err error) { 738 var _p0 uint32 739 if forceAppsClosed { 740 _p0 = 1 741 } 742 var _p1 uint32 743 if rebootAfterShutdown { 744 _p1 = 1 745 } 746 r1, _, e1 := syscall.Syscall6(procInitiateSystemShutdownExW.Addr(), 6, uintptr(unsafe.Pointer(machineName)), uintptr(unsafe.Pointer(message)), uintptr(timeout), uintptr(_p0), uintptr(_p1), uintptr(reason)) 747 if r1 == 0 { 748 err = errnoErr(e1) 749 } 750 return 751} 752 753func isValidSecurityDescriptor(sd *SECURITY_DESCRIPTOR) (isValid bool) { 754 r0, _, _ := syscall.Syscall(procIsValidSecurityDescriptor.Addr(), 1, uintptr(unsafe.Pointer(sd)), 0, 0) 755 isValid = r0 != 0 756 return 757} 758 759func isValidSid(sid *SID) (isValid bool) { 760 r0, _, _ := syscall.Syscall(procIsValidSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 761 isValid = r0 != 0 762 return 763} 764 765func isWellKnownSid(sid *SID, sidType WELL_KNOWN_SID_TYPE) (isWellKnown bool) { 766 r0, _, _ := syscall.Syscall(procIsWellKnownSid.Addr(), 2, uintptr(unsafe.Pointer(sid)), uintptr(sidType), 0) 767 isWellKnown = r0 != 0 768 return 769} 770 771func LookupAccountName(systemName *uint16, accountName *uint16, sid *SID, sidLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) { 772 r1, _, e1 := syscall.Syscall9(procLookupAccountNameW.Addr(), 7, uintptr(unsafe.Pointer(systemName)), uintptr(unsafe.Pointer(accountName)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(sidLen)), uintptr(unsafe.Pointer(refdDomainName)), uintptr(unsafe.Pointer(refdDomainNameLen)), uintptr(unsafe.Pointer(use)), 0, 0) 773 if r1 == 0 { 774 err = errnoErr(e1) 775 } 776 return 777} 778 779func LookupAccountSid(systemName *uint16, sid *SID, name *uint16, nameLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) { 780 r1, _, e1 := syscall.Syscall9(procLookupAccountSidW.Addr(), 7, uintptr(unsafe.Pointer(systemName)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(nameLen)), uintptr(unsafe.Pointer(refdDomainName)), uintptr(unsafe.Pointer(refdDomainNameLen)), uintptr(unsafe.Pointer(use)), 0, 0) 781 if r1 == 0 { 782 err = errnoErr(e1) 783 } 784 return 785} 786 787func LookupPrivilegeValue(systemname *uint16, name *uint16, luid *LUID) (err error) { 788 r1, _, e1 := syscall.Syscall(procLookupPrivilegeValueW.Addr(), 3, uintptr(unsafe.Pointer(systemname)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(luid))) 789 if r1 == 0 { 790 err = errnoErr(e1) 791 } 792 return 793} 794 795func makeAbsoluteSD(selfRelativeSD *SECURITY_DESCRIPTOR, absoluteSD *SECURITY_DESCRIPTOR, absoluteSDSize *uint32, dacl *ACL, daclSize *uint32, sacl *ACL, saclSize *uint32, owner *SID, ownerSize *uint32, group *SID, groupSize *uint32) (err error) { 796 r1, _, e1 := syscall.Syscall12(procMakeAbsoluteSD.Addr(), 11, uintptr(unsafe.Pointer(selfRelativeSD)), uintptr(unsafe.Pointer(absoluteSD)), uintptr(unsafe.Pointer(absoluteSDSize)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(daclSize)), uintptr(unsafe.Pointer(sacl)), uintptr(unsafe.Pointer(saclSize)), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(ownerSize)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(groupSize)), 0) 797 if r1 == 0 { 798 err = errnoErr(e1) 799 } 800 return 801} 802 803func makeSelfRelativeSD(absoluteSD *SECURITY_DESCRIPTOR, selfRelativeSD *SECURITY_DESCRIPTOR, selfRelativeSDSize *uint32) (err error) { 804 r1, _, e1 := syscall.Syscall(procMakeSelfRelativeSD.Addr(), 3, uintptr(unsafe.Pointer(absoluteSD)), uintptr(unsafe.Pointer(selfRelativeSD)), uintptr(unsafe.Pointer(selfRelativeSDSize))) 805 if r1 == 0 { 806 err = errnoErr(e1) 807 } 808 return 809} 810 811func NotifyServiceStatusChange(service Handle, notifyMask uint32, notifier *SERVICE_NOTIFY) (ret error) { 812 r0, _, _ := syscall.Syscall(procNotifyServiceStatusChangeW.Addr(), 3, uintptr(service), uintptr(notifyMask), uintptr(unsafe.Pointer(notifier))) 813 if r0 != 0 { 814 ret = syscall.Errno(r0) 815 } 816 return 817} 818 819func OpenProcessToken(process Handle, access uint32, token *Token) (err error) { 820 r1, _, e1 := syscall.Syscall(procOpenProcessToken.Addr(), 3, uintptr(process), uintptr(access), uintptr(unsafe.Pointer(token))) 821 if r1 == 0 { 822 err = errnoErr(e1) 823 } 824 return 825} 826 827func OpenSCManager(machineName *uint16, databaseName *uint16, access uint32) (handle Handle, err error) { 828 r0, _, e1 := syscall.Syscall(procOpenSCManagerW.Addr(), 3, uintptr(unsafe.Pointer(machineName)), uintptr(unsafe.Pointer(databaseName)), uintptr(access)) 829 handle = Handle(r0) 830 if handle == 0 { 831 err = errnoErr(e1) 832 } 833 return 834} 835 836func OpenService(mgr Handle, serviceName *uint16, access uint32) (handle Handle, err error) { 837 r0, _, e1 := syscall.Syscall(procOpenServiceW.Addr(), 3, uintptr(mgr), uintptr(unsafe.Pointer(serviceName)), uintptr(access)) 838 handle = Handle(r0) 839 if handle == 0 { 840 err = errnoErr(e1) 841 } 842 return 843} 844 845func OpenThreadToken(thread Handle, access uint32, openAsSelf bool, token *Token) (err error) { 846 var _p0 uint32 847 if openAsSelf { 848 _p0 = 1 849 } 850 r1, _, e1 := syscall.Syscall6(procOpenThreadToken.Addr(), 4, uintptr(thread), uintptr(access), uintptr(_p0), uintptr(unsafe.Pointer(token)), 0, 0) 851 if r1 == 0 { 852 err = errnoErr(e1) 853 } 854 return 855} 856 857func QueryServiceConfig2(service Handle, infoLevel uint32, buff *byte, buffSize uint32, bytesNeeded *uint32) (err error) { 858 r1, _, e1 := syscall.Syscall6(procQueryServiceConfig2W.Addr(), 5, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(buff)), uintptr(buffSize), uintptr(unsafe.Pointer(bytesNeeded)), 0) 859 if r1 == 0 { 860 err = errnoErr(e1) 861 } 862 return 863} 864 865func QueryServiceConfig(service Handle, serviceConfig *QUERY_SERVICE_CONFIG, bufSize uint32, bytesNeeded *uint32) (err error) { 866 r1, _, e1 := syscall.Syscall6(procQueryServiceConfigW.Addr(), 4, uintptr(service), uintptr(unsafe.Pointer(serviceConfig)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), 0, 0) 867 if r1 == 0 { 868 err = errnoErr(e1) 869 } 870 return 871} 872 873func QueryServiceLockStatus(mgr Handle, lockStatus *QUERY_SERVICE_LOCK_STATUS, bufSize uint32, bytesNeeded *uint32) (err error) { 874 r1, _, e1 := syscall.Syscall6(procQueryServiceLockStatusW.Addr(), 4, uintptr(mgr), uintptr(unsafe.Pointer(lockStatus)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), 0, 0) 875 if r1 == 0 { 876 err = errnoErr(e1) 877 } 878 return 879} 880 881func QueryServiceStatus(service Handle, status *SERVICE_STATUS) (err error) { 882 r1, _, e1 := syscall.Syscall(procQueryServiceStatus.Addr(), 2, uintptr(service), uintptr(unsafe.Pointer(status)), 0) 883 if r1 == 0 { 884 err = errnoErr(e1) 885 } 886 return 887} 888 889func QueryServiceStatusEx(service Handle, infoLevel uint32, buff *byte, buffSize uint32, bytesNeeded *uint32) (err error) { 890 r1, _, e1 := syscall.Syscall6(procQueryServiceStatusEx.Addr(), 5, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(buff)), uintptr(buffSize), uintptr(unsafe.Pointer(bytesNeeded)), 0) 891 if r1 == 0 { 892 err = errnoErr(e1) 893 } 894 return 895} 896 897func RegCloseKey(key Handle) (regerrno error) { 898 r0, _, _ := syscall.Syscall(procRegCloseKey.Addr(), 1, uintptr(key), 0, 0) 899 if r0 != 0 { 900 regerrno = syscall.Errno(r0) 901 } 902 return 903} 904 905func RegEnumKeyEx(key Handle, index uint32, name *uint16, nameLen *uint32, reserved *uint32, class *uint16, classLen *uint32, lastWriteTime *Filetime) (regerrno error) { 906 r0, _, _ := syscall.Syscall9(procRegEnumKeyExW.Addr(), 8, uintptr(key), uintptr(index), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(nameLen)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(class)), uintptr(unsafe.Pointer(classLen)), uintptr(unsafe.Pointer(lastWriteTime)), 0) 907 if r0 != 0 { 908 regerrno = syscall.Errno(r0) 909 } 910 return 911} 912 913func RegOpenKeyEx(key Handle, subkey *uint16, options uint32, desiredAccess uint32, result *Handle) (regerrno error) { 914 r0, _, _ := syscall.Syscall6(procRegOpenKeyExW.Addr(), 5, uintptr(key), uintptr(unsafe.Pointer(subkey)), uintptr(options), uintptr(desiredAccess), uintptr(unsafe.Pointer(result)), 0) 915 if r0 != 0 { 916 regerrno = syscall.Errno(r0) 917 } 918 return 919} 920 921func RegQueryInfoKey(key Handle, class *uint16, classLen *uint32, reserved *uint32, subkeysLen *uint32, maxSubkeyLen *uint32, maxClassLen *uint32, valuesLen *uint32, maxValueNameLen *uint32, maxValueLen *uint32, saLen *uint32, lastWriteTime *Filetime) (regerrno error) { 922 r0, _, _ := syscall.Syscall12(procRegQueryInfoKeyW.Addr(), 12, uintptr(key), uintptr(unsafe.Pointer(class)), uintptr(unsafe.Pointer(classLen)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(subkeysLen)), uintptr(unsafe.Pointer(maxSubkeyLen)), uintptr(unsafe.Pointer(maxClassLen)), uintptr(unsafe.Pointer(valuesLen)), uintptr(unsafe.Pointer(maxValueNameLen)), uintptr(unsafe.Pointer(maxValueLen)), uintptr(unsafe.Pointer(saLen)), uintptr(unsafe.Pointer(lastWriteTime))) 923 if r0 != 0 { 924 regerrno = syscall.Errno(r0) 925 } 926 return 927} 928 929func RegQueryValueEx(key Handle, name *uint16, reserved *uint32, valtype *uint32, buf *byte, buflen *uint32) (regerrno error) { 930 r0, _, _ := syscall.Syscall6(procRegQueryValueExW.Addr(), 6, uintptr(key), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(valtype)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(buflen))) 931 if r0 != 0 { 932 regerrno = syscall.Errno(r0) 933 } 934 return 935} 936 937func RegisterEventSource(uncServerName *uint16, sourceName *uint16) (handle Handle, err error) { 938 r0, _, e1 := syscall.Syscall(procRegisterEventSourceW.Addr(), 2, uintptr(unsafe.Pointer(uncServerName)), uintptr(unsafe.Pointer(sourceName)), 0) 939 handle = Handle(r0) 940 if handle == 0 { 941 err = errnoErr(e1) 942 } 943 return 944} 945 946func ReportEvent(log Handle, etype uint16, category uint16, eventId uint32, usrSId uintptr, numStrings uint16, dataSize uint32, strings **uint16, rawData *byte) (err error) { 947 r1, _, e1 := syscall.Syscall9(procReportEventW.Addr(), 9, uintptr(log), uintptr(etype), uintptr(category), uintptr(eventId), uintptr(usrSId), uintptr(numStrings), uintptr(dataSize), uintptr(unsafe.Pointer(strings)), uintptr(unsafe.Pointer(rawData))) 948 if r1 == 0 { 949 err = errnoErr(e1) 950 } 951 return 952} 953 954func RevertToSelf() (err error) { 955 r1, _, e1 := syscall.Syscall(procRevertToSelf.Addr(), 0, 0, 0, 0) 956 if r1 == 0 { 957 err = errnoErr(e1) 958 } 959 return 960} 961 962func setEntriesInAcl(countExplicitEntries uint32, explicitEntries *EXPLICIT_ACCESS, oldACL *ACL, newACL **ACL) (ret error) { 963 r0, _, _ := syscall.Syscall6(procSetEntriesInAclW.Addr(), 4, uintptr(countExplicitEntries), uintptr(unsafe.Pointer(explicitEntries)), uintptr(unsafe.Pointer(oldACL)), uintptr(unsafe.Pointer(newACL)), 0, 0) 964 if r0 != 0 { 965 ret = syscall.Errno(r0) 966 } 967 return 968} 969 970func SetNamedSecurityInfo(objectName string, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner *SID, group *SID, dacl *ACL, sacl *ACL) (ret error) { 971 var _p0 *uint16 972 _p0, ret = syscall.UTF16PtrFromString(objectName) 973 if ret != nil { 974 return 975 } 976 return _SetNamedSecurityInfo(_p0, objectType, securityInformation, owner, group, dacl, sacl) 977} 978 979func _SetNamedSecurityInfo(objectName *uint16, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner *SID, group *SID, dacl *ACL, sacl *ACL) (ret error) { 980 r0, _, _ := syscall.Syscall9(procSetNamedSecurityInfoW.Addr(), 7, uintptr(unsafe.Pointer(objectName)), uintptr(objectType), uintptr(securityInformation), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(sacl)), 0, 0) 981 if r0 != 0 { 982 ret = syscall.Errno(r0) 983 } 984 return 985} 986 987func setSecurityDescriptorControl(sd *SECURITY_DESCRIPTOR, controlBitsOfInterest SECURITY_DESCRIPTOR_CONTROL, controlBitsToSet SECURITY_DESCRIPTOR_CONTROL) (err error) { 988 r1, _, e1 := syscall.Syscall(procSetSecurityDescriptorControl.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(controlBitsOfInterest), uintptr(controlBitsToSet)) 989 if r1 == 0 { 990 err = errnoErr(e1) 991 } 992 return 993} 994 995func setSecurityDescriptorDacl(sd *SECURITY_DESCRIPTOR, daclPresent bool, dacl *ACL, daclDefaulted bool) (err error) { 996 var _p0 uint32 997 if daclPresent { 998 _p0 = 1 999 } 1000 var _p1 uint32 1001 if daclDefaulted { 1002 _p1 = 1 1003 } 1004 r1, _, e1 := syscall.Syscall6(procSetSecurityDescriptorDacl.Addr(), 4, uintptr(unsafe.Pointer(sd)), uintptr(_p0), uintptr(unsafe.Pointer(dacl)), uintptr(_p1), 0, 0) 1005 if r1 == 0 { 1006 err = errnoErr(e1) 1007 } 1008 return 1009} 1010 1011func setSecurityDescriptorGroup(sd *SECURITY_DESCRIPTOR, group *SID, groupDefaulted bool) (err error) { 1012 var _p0 uint32 1013 if groupDefaulted { 1014 _p0 = 1 1015 } 1016 r1, _, e1 := syscall.Syscall(procSetSecurityDescriptorGroup.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(group)), uintptr(_p0)) 1017 if r1 == 0 { 1018 err = errnoErr(e1) 1019 } 1020 return 1021} 1022 1023func setSecurityDescriptorOwner(sd *SECURITY_DESCRIPTOR, owner *SID, ownerDefaulted bool) (err error) { 1024 var _p0 uint32 1025 if ownerDefaulted { 1026 _p0 = 1 1027 } 1028 r1, _, e1 := syscall.Syscall(procSetSecurityDescriptorOwner.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(owner)), uintptr(_p0)) 1029 if r1 == 0 { 1030 err = errnoErr(e1) 1031 } 1032 return 1033} 1034 1035func setSecurityDescriptorRMControl(sd *SECURITY_DESCRIPTOR, rmControl *uint8) { 1036 syscall.Syscall(procSetSecurityDescriptorRMControl.Addr(), 2, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(rmControl)), 0) 1037 return 1038} 1039 1040func setSecurityDescriptorSacl(sd *SECURITY_DESCRIPTOR, saclPresent bool, sacl *ACL, saclDefaulted bool) (err error) { 1041 var _p0 uint32 1042 if saclPresent { 1043 _p0 = 1 1044 } 1045 var _p1 uint32 1046 if saclDefaulted { 1047 _p1 = 1 1048 } 1049 r1, _, e1 := syscall.Syscall6(procSetSecurityDescriptorSacl.Addr(), 4, uintptr(unsafe.Pointer(sd)), uintptr(_p0), uintptr(unsafe.Pointer(sacl)), uintptr(_p1), 0, 0) 1050 if r1 == 0 { 1051 err = errnoErr(e1) 1052 } 1053 return 1054} 1055 1056func SetSecurityInfo(handle Handle, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner *SID, group *SID, dacl *ACL, sacl *ACL) { 1057 syscall.Syscall9(procSetSecurityInfo.Addr(), 7, uintptr(handle), uintptr(objectType), uintptr(securityInformation), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(sacl)), 0, 0) 1058 return 1059} 1060 1061func SetServiceStatus(service Handle, serviceStatus *SERVICE_STATUS) (err error) { 1062 r1, _, e1 := syscall.Syscall(procSetServiceStatus.Addr(), 2, uintptr(service), uintptr(unsafe.Pointer(serviceStatus)), 0) 1063 if r1 == 0 { 1064 err = errnoErr(e1) 1065 } 1066 return 1067} 1068 1069func SetThreadToken(thread *Handle, token Token) (err error) { 1070 r1, _, e1 := syscall.Syscall(procSetThreadToken.Addr(), 2, uintptr(unsafe.Pointer(thread)), uintptr(token), 0) 1071 if r1 == 0 { 1072 err = errnoErr(e1) 1073 } 1074 return 1075} 1076 1077func SetTokenInformation(token Token, infoClass uint32, info *byte, infoLen uint32) (err error) { 1078 r1, _, e1 := syscall.Syscall6(procSetTokenInformation.Addr(), 4, uintptr(token), uintptr(infoClass), uintptr(unsafe.Pointer(info)), uintptr(infoLen), 0, 0) 1079 if r1 == 0 { 1080 err = errnoErr(e1) 1081 } 1082 return 1083} 1084 1085func StartServiceCtrlDispatcher(serviceTable *SERVICE_TABLE_ENTRY) (err error) { 1086 r1, _, e1 := syscall.Syscall(procStartServiceCtrlDispatcherW.Addr(), 1, uintptr(unsafe.Pointer(serviceTable)), 0, 0) 1087 if r1 == 0 { 1088 err = errnoErr(e1) 1089 } 1090 return 1091} 1092 1093func StartService(service Handle, numArgs uint32, argVectors **uint16) (err error) { 1094 r1, _, e1 := syscall.Syscall(procStartServiceW.Addr(), 3, uintptr(service), uintptr(numArgs), uintptr(unsafe.Pointer(argVectors))) 1095 if r1 == 0 { 1096 err = errnoErr(e1) 1097 } 1098 return 1099} 1100 1101func CertAddCertificateContextToStore(store Handle, certContext *CertContext, addDisposition uint32, storeContext **CertContext) (err error) { 1102 r1, _, e1 := syscall.Syscall6(procCertAddCertificateContextToStore.Addr(), 4, uintptr(store), uintptr(unsafe.Pointer(certContext)), uintptr(addDisposition), uintptr(unsafe.Pointer(storeContext)), 0, 0) 1103 if r1 == 0 { 1104 err = errnoErr(e1) 1105 } 1106 return 1107} 1108 1109func CertCloseStore(store Handle, flags uint32) (err error) { 1110 r1, _, e1 := syscall.Syscall(procCertCloseStore.Addr(), 2, uintptr(store), uintptr(flags), 0) 1111 if r1 == 0 { 1112 err = errnoErr(e1) 1113 } 1114 return 1115} 1116 1117func CertCreateCertificateContext(certEncodingType uint32, certEncoded *byte, encodedLen uint32) (context *CertContext, err error) { 1118 r0, _, e1 := syscall.Syscall(procCertCreateCertificateContext.Addr(), 3, uintptr(certEncodingType), uintptr(unsafe.Pointer(certEncoded)), uintptr(encodedLen)) 1119 context = (*CertContext)(unsafe.Pointer(r0)) 1120 if context == nil { 1121 err = errnoErr(e1) 1122 } 1123 return 1124} 1125 1126func CertEnumCertificatesInStore(store Handle, prevContext *CertContext) (context *CertContext, err error) { 1127 r0, _, e1 := syscall.Syscall(procCertEnumCertificatesInStore.Addr(), 2, uintptr(store), uintptr(unsafe.Pointer(prevContext)), 0) 1128 context = (*CertContext)(unsafe.Pointer(r0)) 1129 if context == nil { 1130 err = errnoErr(e1) 1131 } 1132 return 1133} 1134 1135func CertFreeCertificateChain(ctx *CertChainContext) { 1136 syscall.Syscall(procCertFreeCertificateChain.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0) 1137 return 1138} 1139 1140func CertFreeCertificateContext(ctx *CertContext) (err error) { 1141 r1, _, e1 := syscall.Syscall(procCertFreeCertificateContext.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0) 1142 if r1 == 0 { 1143 err = errnoErr(e1) 1144 } 1145 return 1146} 1147 1148func CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, additionalStore Handle, para *CertChainPara, flags uint32, reserved uintptr, chainCtx **CertChainContext) (err error) { 1149 r1, _, e1 := syscall.Syscall9(procCertGetCertificateChain.Addr(), 8, uintptr(engine), uintptr(unsafe.Pointer(leaf)), uintptr(unsafe.Pointer(time)), uintptr(additionalStore), uintptr(unsafe.Pointer(para)), uintptr(flags), uintptr(reserved), uintptr(unsafe.Pointer(chainCtx)), 0) 1150 if r1 == 0 { 1151 err = errnoErr(e1) 1152 } 1153 return 1154} 1155 1156func CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) { 1157 r0, _, e1 := syscall.Syscall6(procCertOpenStore.Addr(), 5, uintptr(storeProvider), uintptr(msgAndCertEncodingType), uintptr(cryptProv), uintptr(flags), uintptr(para), 0) 1158 handle = Handle(r0) 1159 if handle == InvalidHandle { 1160 err = errnoErr(e1) 1161 } 1162 return 1163} 1164 1165func CertOpenSystemStore(hprov Handle, name *uint16) (store Handle, err error) { 1166 r0, _, e1 := syscall.Syscall(procCertOpenSystemStoreW.Addr(), 2, uintptr(hprov), uintptr(unsafe.Pointer(name)), 0) 1167 store = Handle(r0) 1168 if store == 0 { 1169 err = errnoErr(e1) 1170 } 1171 return 1172} 1173 1174func CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext, para *CertChainPolicyPara, status *CertChainPolicyStatus) (err error) { 1175 r1, _, e1 := syscall.Syscall6(procCertVerifyCertificateChainPolicy.Addr(), 4, uintptr(policyOID), uintptr(unsafe.Pointer(chain)), uintptr(unsafe.Pointer(para)), uintptr(unsafe.Pointer(status)), 0, 0) 1176 if r1 == 0 { 1177 err = errnoErr(e1) 1178 } 1179 return 1180} 1181 1182func DnsNameCompare(name1 *uint16, name2 *uint16) (same bool) { 1183 r0, _, _ := syscall.Syscall(procDnsNameCompare_W.Addr(), 2, uintptr(unsafe.Pointer(name1)), uintptr(unsafe.Pointer(name2)), 0) 1184 same = r0 != 0 1185 return 1186} 1187 1188func DnsQuery(name string, qtype uint16, options uint32, extra *byte, qrs **DNSRecord, pr *byte) (status error) { 1189 var _p0 *uint16 1190 _p0, status = syscall.UTF16PtrFromString(name) 1191 if status != nil { 1192 return 1193 } 1194 return _DnsQuery(_p0, qtype, options, extra, qrs, pr) 1195} 1196 1197func _DnsQuery(name *uint16, qtype uint16, options uint32, extra *byte, qrs **DNSRecord, pr *byte) (status error) { 1198 r0, _, _ := syscall.Syscall6(procDnsQuery_W.Addr(), 6, uintptr(unsafe.Pointer(name)), uintptr(qtype), uintptr(options), uintptr(unsafe.Pointer(extra)), uintptr(unsafe.Pointer(qrs)), uintptr(unsafe.Pointer(pr))) 1199 if r0 != 0 { 1200 status = syscall.Errno(r0) 1201 } 1202 return 1203} 1204 1205func DnsRecordListFree(rl *DNSRecord, freetype uint32) { 1206 syscall.Syscall(procDnsRecordListFree.Addr(), 2, uintptr(unsafe.Pointer(rl)), uintptr(freetype), 0) 1207 return 1208} 1209 1210func GetAdaptersAddresses(family uint32, flags uint32, reserved uintptr, adapterAddresses *IpAdapterAddresses, sizePointer *uint32) (errcode error) { 1211 r0, _, _ := syscall.Syscall6(procGetAdaptersAddresses.Addr(), 5, uintptr(family), uintptr(flags), uintptr(reserved), uintptr(unsafe.Pointer(adapterAddresses)), uintptr(unsafe.Pointer(sizePointer)), 0) 1212 if r0 != 0 { 1213 errcode = syscall.Errno(r0) 1214 } 1215 return 1216} 1217 1218func GetAdaptersInfo(ai *IpAdapterInfo, ol *uint32) (errcode error) { 1219 r0, _, _ := syscall.Syscall(procGetAdaptersInfo.Addr(), 2, uintptr(unsafe.Pointer(ai)), uintptr(unsafe.Pointer(ol)), 0) 1220 if r0 != 0 { 1221 errcode = syscall.Errno(r0) 1222 } 1223 return 1224} 1225 1226func GetIfEntry(pIfRow *MibIfRow) (errcode error) { 1227 r0, _, _ := syscall.Syscall(procGetIfEntry.Addr(), 1, uintptr(unsafe.Pointer(pIfRow)), 0, 0) 1228 if r0 != 0 { 1229 errcode = syscall.Errno(r0) 1230 } 1231 return 1232} 1233 1234func AssignProcessToJobObject(job Handle, process Handle) (err error) { 1235 r1, _, e1 := syscall.Syscall(procAssignProcessToJobObject.Addr(), 2, uintptr(job), uintptr(process), 0) 1236 if r1 == 0 { 1237 err = errnoErr(e1) 1238 } 1239 return 1240} 1241 1242func CancelIo(s Handle) (err error) { 1243 r1, _, e1 := syscall.Syscall(procCancelIo.Addr(), 1, uintptr(s), 0, 0) 1244 if r1 == 0 { 1245 err = errnoErr(e1) 1246 } 1247 return 1248} 1249 1250func CancelIoEx(s Handle, o *Overlapped) (err error) { 1251 r1, _, e1 := syscall.Syscall(procCancelIoEx.Addr(), 2, uintptr(s), uintptr(unsafe.Pointer(o)), 0) 1252 if r1 == 0 { 1253 err = errnoErr(e1) 1254 } 1255 return 1256} 1257 1258func CloseHandle(handle Handle) (err error) { 1259 r1, _, e1 := syscall.Syscall(procCloseHandle.Addr(), 1, uintptr(handle), 0, 0) 1260 if r1 == 0 { 1261 err = errnoErr(e1) 1262 } 1263 return 1264} 1265 1266func CreateDirectory(path *uint16, sa *SecurityAttributes) (err error) { 1267 r1, _, e1 := syscall.Syscall(procCreateDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(path)), uintptr(unsafe.Pointer(sa)), 0) 1268 if r1 == 0 { 1269 err = errnoErr(e1) 1270 } 1271 return 1272} 1273 1274func CreateEventEx(eventAttrs *SecurityAttributes, name *uint16, flags uint32, desiredAccess uint32) (handle Handle, err error) { 1275 r0, _, e1 := syscall.Syscall6(procCreateEventExW.Addr(), 4, uintptr(unsafe.Pointer(eventAttrs)), uintptr(unsafe.Pointer(name)), uintptr(flags), uintptr(desiredAccess), 0, 0) 1276 handle = Handle(r0) 1277 if handle == 0 { 1278 err = errnoErr(e1) 1279 } 1280 return 1281} 1282 1283func CreateEvent(eventAttrs *SecurityAttributes, manualReset uint32, initialState uint32, name *uint16) (handle Handle, err error) { 1284 r0, _, e1 := syscall.Syscall6(procCreateEventW.Addr(), 4, uintptr(unsafe.Pointer(eventAttrs)), uintptr(manualReset), uintptr(initialState), uintptr(unsafe.Pointer(name)), 0, 0) 1285 handle = Handle(r0) 1286 if handle == 0 { 1287 err = errnoErr(e1) 1288 } 1289 return 1290} 1291 1292func CreateFileMapping(fhandle Handle, sa *SecurityAttributes, prot uint32, maxSizeHigh uint32, maxSizeLow uint32, name *uint16) (handle Handle, err error) { 1293 r0, _, e1 := syscall.Syscall6(procCreateFileMappingW.Addr(), 6, uintptr(fhandle), uintptr(unsafe.Pointer(sa)), uintptr(prot), uintptr(maxSizeHigh), uintptr(maxSizeLow), uintptr(unsafe.Pointer(name))) 1294 handle = Handle(r0) 1295 if handle == 0 { 1296 err = errnoErr(e1) 1297 } 1298 return 1299} 1300 1301func CreateFile(name *uint16, access uint32, mode uint32, sa *SecurityAttributes, createmode uint32, attrs uint32, templatefile Handle) (handle Handle, err error) { 1302 r0, _, e1 := syscall.Syscall9(procCreateFileW.Addr(), 7, uintptr(unsafe.Pointer(name)), uintptr(access), uintptr(mode), uintptr(unsafe.Pointer(sa)), uintptr(createmode), uintptr(attrs), uintptr(templatefile), 0, 0) 1303 handle = Handle(r0) 1304 if handle == InvalidHandle { 1305 err = errnoErr(e1) 1306 } 1307 return 1308} 1309 1310func CreateHardLink(filename *uint16, existingfilename *uint16, reserved uintptr) (err error) { 1311 r1, _, e1 := syscall.Syscall(procCreateHardLinkW.Addr(), 3, uintptr(unsafe.Pointer(filename)), uintptr(unsafe.Pointer(existingfilename)), uintptr(reserved)) 1312 if r1&0xff == 0 { 1313 err = errnoErr(e1) 1314 } 1315 return 1316} 1317 1318func CreateIoCompletionPort(filehandle Handle, cphandle Handle, key uint32, threadcnt uint32) (handle Handle, err error) { 1319 r0, _, e1 := syscall.Syscall6(procCreateIoCompletionPort.Addr(), 4, uintptr(filehandle), uintptr(cphandle), uintptr(key), uintptr(threadcnt), 0, 0) 1320 handle = Handle(r0) 1321 if handle == 0 { 1322 err = errnoErr(e1) 1323 } 1324 return 1325} 1326 1327func CreateJobObject(jobAttr *SecurityAttributes, name *uint16) (handle Handle, err error) { 1328 r0, _, e1 := syscall.Syscall(procCreateJobObjectW.Addr(), 2, uintptr(unsafe.Pointer(jobAttr)), uintptr(unsafe.Pointer(name)), 0) 1329 handle = Handle(r0) 1330 if handle == 0 { 1331 err = errnoErr(e1) 1332 } 1333 return 1334} 1335 1336func CreateMutexEx(mutexAttrs *SecurityAttributes, name *uint16, flags uint32, desiredAccess uint32) (handle Handle, err error) { 1337 r0, _, e1 := syscall.Syscall6(procCreateMutexExW.Addr(), 4, uintptr(unsafe.Pointer(mutexAttrs)), uintptr(unsafe.Pointer(name)), uintptr(flags), uintptr(desiredAccess), 0, 0) 1338 handle = Handle(r0) 1339 if handle == 0 { 1340 err = errnoErr(e1) 1341 } 1342 return 1343} 1344 1345func CreateMutex(mutexAttrs *SecurityAttributes, initialOwner bool, name *uint16) (handle Handle, err error) { 1346 var _p0 uint32 1347 if initialOwner { 1348 _p0 = 1 1349 } 1350 r0, _, e1 := syscall.Syscall(procCreateMutexW.Addr(), 3, uintptr(unsafe.Pointer(mutexAttrs)), uintptr(_p0), uintptr(unsafe.Pointer(name))) 1351 handle = Handle(r0) 1352 if handle == 0 { 1353 err = errnoErr(e1) 1354 } 1355 return 1356} 1357 1358func CreatePipe(readhandle *Handle, writehandle *Handle, sa *SecurityAttributes, size uint32) (err error) { 1359 r1, _, e1 := syscall.Syscall6(procCreatePipe.Addr(), 4, uintptr(unsafe.Pointer(readhandle)), uintptr(unsafe.Pointer(writehandle)), uintptr(unsafe.Pointer(sa)), uintptr(size), 0, 0) 1360 if r1 == 0 { 1361 err = errnoErr(e1) 1362 } 1363 return 1364} 1365 1366func CreateProcess(appName *uint16, commandLine *uint16, procSecurity *SecurityAttributes, threadSecurity *SecurityAttributes, inheritHandles bool, creationFlags uint32, env *uint16, currentDir *uint16, startupInfo *StartupInfo, outProcInfo *ProcessInformation) (err error) { 1367 var _p0 uint32 1368 if inheritHandles { 1369 _p0 = 1 1370 } 1371 r1, _, e1 := syscall.Syscall12(procCreateProcessW.Addr(), 10, uintptr(unsafe.Pointer(appName)), uintptr(unsafe.Pointer(commandLine)), uintptr(unsafe.Pointer(procSecurity)), uintptr(unsafe.Pointer(threadSecurity)), uintptr(_p0), uintptr(creationFlags), uintptr(unsafe.Pointer(env)), uintptr(unsafe.Pointer(currentDir)), uintptr(unsafe.Pointer(startupInfo)), uintptr(unsafe.Pointer(outProcInfo)), 0, 0) 1372 if r1 == 0 { 1373 err = errnoErr(e1) 1374 } 1375 return 1376} 1377 1378func CreateSymbolicLink(symlinkfilename *uint16, targetfilename *uint16, flags uint32) (err error) { 1379 r1, _, e1 := syscall.Syscall(procCreateSymbolicLinkW.Addr(), 3, uintptr(unsafe.Pointer(symlinkfilename)), uintptr(unsafe.Pointer(targetfilename)), uintptr(flags)) 1380 if r1&0xff == 0 { 1381 err = errnoErr(e1) 1382 } 1383 return 1384} 1385 1386func CreateToolhelp32Snapshot(flags uint32, processId uint32) (handle Handle, err error) { 1387 r0, _, e1 := syscall.Syscall(procCreateToolhelp32Snapshot.Addr(), 2, uintptr(flags), uintptr(processId), 0) 1388 handle = Handle(r0) 1389 if handle == InvalidHandle { 1390 err = errnoErr(e1) 1391 } 1392 return 1393} 1394 1395func DefineDosDevice(flags uint32, deviceName *uint16, targetPath *uint16) (err error) { 1396 r1, _, e1 := syscall.Syscall(procDefineDosDeviceW.Addr(), 3, uintptr(flags), uintptr(unsafe.Pointer(deviceName)), uintptr(unsafe.Pointer(targetPath))) 1397 if r1 == 0 { 1398 err = errnoErr(e1) 1399 } 1400 return 1401} 1402 1403func DeleteFile(path *uint16) (err error) { 1404 r1, _, e1 := syscall.Syscall(procDeleteFileW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0) 1405 if r1 == 0 { 1406 err = errnoErr(e1) 1407 } 1408 return 1409} 1410 1411func DeleteVolumeMountPoint(volumeMountPoint *uint16) (err error) { 1412 r1, _, e1 := syscall.Syscall(procDeleteVolumeMountPointW.Addr(), 1, uintptr(unsafe.Pointer(volumeMountPoint)), 0, 0) 1413 if r1 == 0 { 1414 err = errnoErr(e1) 1415 } 1416 return 1417} 1418 1419func DeviceIoControl(handle Handle, ioControlCode uint32, inBuffer *byte, inBufferSize uint32, outBuffer *byte, outBufferSize uint32, bytesReturned *uint32, overlapped *Overlapped) (err error) { 1420 r1, _, e1 := syscall.Syscall9(procDeviceIoControl.Addr(), 8, uintptr(handle), uintptr(ioControlCode), uintptr(unsafe.Pointer(inBuffer)), uintptr(inBufferSize), uintptr(unsafe.Pointer(outBuffer)), uintptr(outBufferSize), uintptr(unsafe.Pointer(bytesReturned)), uintptr(unsafe.Pointer(overlapped)), 0) 1421 if r1 == 0 { 1422 err = errnoErr(e1) 1423 } 1424 return 1425} 1426 1427func DuplicateHandle(hSourceProcessHandle Handle, hSourceHandle Handle, hTargetProcessHandle Handle, lpTargetHandle *Handle, dwDesiredAccess uint32, bInheritHandle bool, dwOptions uint32) (err error) { 1428 var _p0 uint32 1429 if bInheritHandle { 1430 _p0 = 1 1431 } 1432 r1, _, e1 := syscall.Syscall9(procDuplicateHandle.Addr(), 7, uintptr(hSourceProcessHandle), uintptr(hSourceHandle), uintptr(hTargetProcessHandle), uintptr(unsafe.Pointer(lpTargetHandle)), uintptr(dwDesiredAccess), uintptr(_p0), uintptr(dwOptions), 0, 0) 1433 if r1 == 0 { 1434 err = errnoErr(e1) 1435 } 1436 return 1437} 1438 1439func ExitProcess(exitcode uint32) { 1440 syscall.Syscall(procExitProcess.Addr(), 1, uintptr(exitcode), 0, 0) 1441 return 1442} 1443 1444func FindClose(handle Handle) (err error) { 1445 r1, _, e1 := syscall.Syscall(procFindClose.Addr(), 1, uintptr(handle), 0, 0) 1446 if r1 == 0 { 1447 err = errnoErr(e1) 1448 } 1449 return 1450} 1451 1452func findFirstFile1(name *uint16, data *win32finddata1) (handle Handle, err error) { 1453 r0, _, e1 := syscall.Syscall(procFindFirstFileW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(data)), 0) 1454 handle = Handle(r0) 1455 if handle == InvalidHandle { 1456 err = errnoErr(e1) 1457 } 1458 return 1459} 1460 1461func FindFirstVolumeMountPoint(rootPathName *uint16, volumeMountPoint *uint16, bufferLength uint32) (handle Handle, err error) { 1462 r0, _, e1 := syscall.Syscall(procFindFirstVolumeMountPointW.Addr(), 3, uintptr(unsafe.Pointer(rootPathName)), uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(bufferLength)) 1463 handle = Handle(r0) 1464 if handle == InvalidHandle { 1465 err = errnoErr(e1) 1466 } 1467 return 1468} 1469 1470func FindFirstVolume(volumeName *uint16, bufferLength uint32) (handle Handle, err error) { 1471 r0, _, e1 := syscall.Syscall(procFindFirstVolumeW.Addr(), 2, uintptr(unsafe.Pointer(volumeName)), uintptr(bufferLength), 0) 1472 handle = Handle(r0) 1473 if handle == InvalidHandle { 1474 err = errnoErr(e1) 1475 } 1476 return 1477} 1478 1479func findNextFile1(handle Handle, data *win32finddata1) (err error) { 1480 r1, _, e1 := syscall.Syscall(procFindNextFileW.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0) 1481 if r1 == 0 { 1482 err = errnoErr(e1) 1483 } 1484 return 1485} 1486 1487func FindNextVolumeMountPoint(findVolumeMountPoint Handle, volumeMountPoint *uint16, bufferLength uint32) (err error) { 1488 r1, _, e1 := syscall.Syscall(procFindNextVolumeMountPointW.Addr(), 3, uintptr(findVolumeMountPoint), uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(bufferLength)) 1489 if r1 == 0 { 1490 err = errnoErr(e1) 1491 } 1492 return 1493} 1494 1495func FindNextVolume(findVolume Handle, volumeName *uint16, bufferLength uint32) (err error) { 1496 r1, _, e1 := syscall.Syscall(procFindNextVolumeW.Addr(), 3, uintptr(findVolume), uintptr(unsafe.Pointer(volumeName)), uintptr(bufferLength)) 1497 if r1 == 0 { 1498 err = errnoErr(e1) 1499 } 1500 return 1501} 1502 1503func FindVolumeClose(findVolume Handle) (err error) { 1504 r1, _, e1 := syscall.Syscall(procFindVolumeClose.Addr(), 1, uintptr(findVolume), 0, 0) 1505 if r1 == 0 { 1506 err = errnoErr(e1) 1507 } 1508 return 1509} 1510 1511func FindVolumeMountPointClose(findVolumeMountPoint Handle) (err error) { 1512 r1, _, e1 := syscall.Syscall(procFindVolumeMountPointClose.Addr(), 1, uintptr(findVolumeMountPoint), 0, 0) 1513 if r1 == 0 { 1514 err = errnoErr(e1) 1515 } 1516 return 1517} 1518 1519func FlushFileBuffers(handle Handle) (err error) { 1520 r1, _, e1 := syscall.Syscall(procFlushFileBuffers.Addr(), 1, uintptr(handle), 0, 0) 1521 if r1 == 0 { 1522 err = errnoErr(e1) 1523 } 1524 return 1525} 1526 1527func FlushViewOfFile(addr uintptr, length uintptr) (err error) { 1528 r1, _, e1 := syscall.Syscall(procFlushViewOfFile.Addr(), 2, uintptr(addr), uintptr(length), 0) 1529 if r1 == 0 { 1530 err = errnoErr(e1) 1531 } 1532 return 1533} 1534 1535func FormatMessage(flags uint32, msgsrc uintptr, msgid uint32, langid uint32, buf []uint16, args *byte) (n uint32, err error) { 1536 var _p0 *uint16 1537 if len(buf) > 0 { 1538 _p0 = &buf[0] 1539 } 1540 r0, _, e1 := syscall.Syscall9(procFormatMessageW.Addr(), 7, uintptr(flags), uintptr(msgsrc), uintptr(msgid), uintptr(langid), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(args)), 0, 0) 1541 n = uint32(r0) 1542 if n == 0 { 1543 err = errnoErr(e1) 1544 } 1545 return 1546} 1547 1548func FreeEnvironmentStrings(envs *uint16) (err error) { 1549 r1, _, e1 := syscall.Syscall(procFreeEnvironmentStringsW.Addr(), 1, uintptr(unsafe.Pointer(envs)), 0, 0) 1550 if r1 == 0 { 1551 err = errnoErr(e1) 1552 } 1553 return 1554} 1555 1556func FreeLibrary(handle Handle) (err error) { 1557 r1, _, e1 := syscall.Syscall(procFreeLibrary.Addr(), 1, uintptr(handle), 0, 0) 1558 if r1 == 0 { 1559 err = errnoErr(e1) 1560 } 1561 return 1562} 1563 1564func GenerateConsoleCtrlEvent(ctrlEvent uint32, processGroupID uint32) (err error) { 1565 r1, _, e1 := syscall.Syscall(procGenerateConsoleCtrlEvent.Addr(), 2, uintptr(ctrlEvent), uintptr(processGroupID), 0) 1566 if r1 == 0 { 1567 err = errnoErr(e1) 1568 } 1569 return 1570} 1571 1572func GetACP() (acp uint32) { 1573 r0, _, _ := syscall.Syscall(procGetACP.Addr(), 0, 0, 0, 0) 1574 acp = uint32(r0) 1575 return 1576} 1577 1578func GetCommandLine() (cmd *uint16) { 1579 r0, _, _ := syscall.Syscall(procGetCommandLineW.Addr(), 0, 0, 0, 0) 1580 cmd = (*uint16)(unsafe.Pointer(r0)) 1581 return 1582} 1583 1584func GetComputerNameEx(nametype uint32, buf *uint16, n *uint32) (err error) { 1585 r1, _, e1 := syscall.Syscall(procGetComputerNameExW.Addr(), 3, uintptr(nametype), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(n))) 1586 if r1 == 0 { 1587 err = errnoErr(e1) 1588 } 1589 return 1590} 1591 1592func GetComputerName(buf *uint16, n *uint32) (err error) { 1593 r1, _, e1 := syscall.Syscall(procGetComputerNameW.Addr(), 2, uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(n)), 0) 1594 if r1 == 0 { 1595 err = errnoErr(e1) 1596 } 1597 return 1598} 1599 1600func GetConsoleMode(console Handle, mode *uint32) (err error) { 1601 r1, _, e1 := syscall.Syscall(procGetConsoleMode.Addr(), 2, uintptr(console), uintptr(unsafe.Pointer(mode)), 0) 1602 if r1 == 0 { 1603 err = errnoErr(e1) 1604 } 1605 return 1606} 1607 1608func GetConsoleScreenBufferInfo(console Handle, info *ConsoleScreenBufferInfo) (err error) { 1609 r1, _, e1 := syscall.Syscall(procGetConsoleScreenBufferInfo.Addr(), 2, uintptr(console), uintptr(unsafe.Pointer(info)), 0) 1610 if r1 == 0 { 1611 err = errnoErr(e1) 1612 } 1613 return 1614} 1615 1616func GetCurrentDirectory(buflen uint32, buf *uint16) (n uint32, err error) { 1617 r0, _, e1 := syscall.Syscall(procGetCurrentDirectoryW.Addr(), 2, uintptr(buflen), uintptr(unsafe.Pointer(buf)), 0) 1618 n = uint32(r0) 1619 if n == 0 { 1620 err = errnoErr(e1) 1621 } 1622 return 1623} 1624 1625func GetCurrentProcessId() (pid uint32) { 1626 r0, _, _ := syscall.Syscall(procGetCurrentProcessId.Addr(), 0, 0, 0, 0) 1627 pid = uint32(r0) 1628 return 1629} 1630 1631func GetCurrentThreadId() (id uint32) { 1632 r0, _, _ := syscall.Syscall(procGetCurrentThreadId.Addr(), 0, 0, 0, 0) 1633 id = uint32(r0) 1634 return 1635} 1636 1637func GetDiskFreeSpaceEx(directoryName *uint16, freeBytesAvailableToCaller *uint64, totalNumberOfBytes *uint64, totalNumberOfFreeBytes *uint64) (err error) { 1638 r1, _, e1 := syscall.Syscall6(procGetDiskFreeSpaceExW.Addr(), 4, uintptr(unsafe.Pointer(directoryName)), uintptr(unsafe.Pointer(freeBytesAvailableToCaller)), uintptr(unsafe.Pointer(totalNumberOfBytes)), uintptr(unsafe.Pointer(totalNumberOfFreeBytes)), 0, 0) 1639 if r1 == 0 { 1640 err = errnoErr(e1) 1641 } 1642 return 1643} 1644 1645func GetDriveType(rootPathName *uint16) (driveType uint32) { 1646 r0, _, _ := syscall.Syscall(procGetDriveTypeW.Addr(), 1, uintptr(unsafe.Pointer(rootPathName)), 0, 0) 1647 driveType = uint32(r0) 1648 return 1649} 1650 1651func GetEnvironmentStrings() (envs *uint16, err error) { 1652 r0, _, e1 := syscall.Syscall(procGetEnvironmentStringsW.Addr(), 0, 0, 0, 0) 1653 envs = (*uint16)(unsafe.Pointer(r0)) 1654 if envs == nil { 1655 err = errnoErr(e1) 1656 } 1657 return 1658} 1659 1660func GetEnvironmentVariable(name *uint16, buffer *uint16, size uint32) (n uint32, err error) { 1661 r0, _, e1 := syscall.Syscall(procGetEnvironmentVariableW.Addr(), 3, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(buffer)), uintptr(size)) 1662 n = uint32(r0) 1663 if n == 0 { 1664 err = errnoErr(e1) 1665 } 1666 return 1667} 1668 1669func GetExitCodeProcess(handle Handle, exitcode *uint32) (err error) { 1670 r1, _, e1 := syscall.Syscall(procGetExitCodeProcess.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(exitcode)), 0) 1671 if r1 == 0 { 1672 err = errnoErr(e1) 1673 } 1674 return 1675} 1676 1677func GetFileAttributesEx(name *uint16, level uint32, info *byte) (err error) { 1678 r1, _, e1 := syscall.Syscall(procGetFileAttributesExW.Addr(), 3, uintptr(unsafe.Pointer(name)), uintptr(level), uintptr(unsafe.Pointer(info))) 1679 if r1 == 0 { 1680 err = errnoErr(e1) 1681 } 1682 return 1683} 1684 1685func GetFileAttributes(name *uint16) (attrs uint32, err error) { 1686 r0, _, e1 := syscall.Syscall(procGetFileAttributesW.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0) 1687 attrs = uint32(r0) 1688 if attrs == INVALID_FILE_ATTRIBUTES { 1689 err = errnoErr(e1) 1690 } 1691 return 1692} 1693 1694func GetFileInformationByHandle(handle Handle, data *ByHandleFileInformation) (err error) { 1695 r1, _, e1 := syscall.Syscall(procGetFileInformationByHandle.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0) 1696 if r1 == 0 { 1697 err = errnoErr(e1) 1698 } 1699 return 1700} 1701 1702func GetFileInformationByHandleEx(handle Handle, class uint32, outBuffer *byte, outBufferLen uint32) (err error) { 1703 r1, _, e1 := syscall.Syscall6(procGetFileInformationByHandleEx.Addr(), 4, uintptr(handle), uintptr(class), uintptr(unsafe.Pointer(outBuffer)), uintptr(outBufferLen), 0, 0) 1704 if r1 == 0 { 1705 err = errnoErr(e1) 1706 } 1707 return 1708} 1709 1710func GetFileType(filehandle Handle) (n uint32, err error) { 1711 r0, _, e1 := syscall.Syscall(procGetFileType.Addr(), 1, uintptr(filehandle), 0, 0) 1712 n = uint32(r0) 1713 if n == 0 { 1714 err = errnoErr(e1) 1715 } 1716 return 1717} 1718 1719func GetFullPathName(path *uint16, buflen uint32, buf *uint16, fname **uint16) (n uint32, err error) { 1720 r0, _, e1 := syscall.Syscall6(procGetFullPathNameW.Addr(), 4, uintptr(unsafe.Pointer(path)), uintptr(buflen), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(fname)), 0, 0) 1721 n = uint32(r0) 1722 if n == 0 { 1723 err = errnoErr(e1) 1724 } 1725 return 1726} 1727 1728func GetLastError() (lasterr error) { 1729 r0, _, _ := syscall.Syscall(procGetLastError.Addr(), 0, 0, 0, 0) 1730 if r0 != 0 { 1731 lasterr = syscall.Errno(r0) 1732 } 1733 return 1734} 1735 1736func GetLogicalDriveStrings(bufferLength uint32, buffer *uint16) (n uint32, err error) { 1737 r0, _, e1 := syscall.Syscall(procGetLogicalDriveStringsW.Addr(), 2, uintptr(bufferLength), uintptr(unsafe.Pointer(buffer)), 0) 1738 n = uint32(r0) 1739 if n == 0 { 1740 err = errnoErr(e1) 1741 } 1742 return 1743} 1744 1745func GetLogicalDrives() (drivesBitMask uint32, err error) { 1746 r0, _, e1 := syscall.Syscall(procGetLogicalDrives.Addr(), 0, 0, 0, 0) 1747 drivesBitMask = uint32(r0) 1748 if drivesBitMask == 0 { 1749 err = errnoErr(e1) 1750 } 1751 return 1752} 1753 1754func GetLongPathName(path *uint16, buf *uint16, buflen uint32) (n uint32, err error) { 1755 r0, _, e1 := syscall.Syscall(procGetLongPathNameW.Addr(), 3, uintptr(unsafe.Pointer(path)), uintptr(unsafe.Pointer(buf)), uintptr(buflen)) 1756 n = uint32(r0) 1757 if n == 0 { 1758 err = errnoErr(e1) 1759 } 1760 return 1761} 1762 1763func GetModuleFileName(module Handle, filename *uint16, size uint32) (n uint32, err error) { 1764 r0, _, e1 := syscall.Syscall(procGetModuleFileNameW.Addr(), 3, uintptr(module), uintptr(unsafe.Pointer(filename)), uintptr(size)) 1765 n = uint32(r0) 1766 if n == 0 { 1767 err = errnoErr(e1) 1768 } 1769 return 1770} 1771 1772func GetModuleHandleEx(flags uint32, moduleName *uint16, module *Handle) (err error) { 1773 r1, _, e1 := syscall.Syscall(procGetModuleHandleExW.Addr(), 3, uintptr(flags), uintptr(unsafe.Pointer(moduleName)), uintptr(unsafe.Pointer(module))) 1774 if r1 == 0 { 1775 err = errnoErr(e1) 1776 } 1777 return 1778} 1779 1780func GetOverlappedResult(handle Handle, overlapped *Overlapped, done *uint32, wait bool) (err error) { 1781 var _p0 uint32 1782 if wait { 1783 _p0 = 1 1784 } 1785 r1, _, e1 := syscall.Syscall6(procGetOverlappedResult.Addr(), 4, uintptr(handle), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(done)), uintptr(_p0), 0, 0) 1786 if r1 == 0 { 1787 err = errnoErr(e1) 1788 } 1789 return 1790} 1791 1792func GetPriorityClass(process Handle) (ret uint32, err error) { 1793 r0, _, e1 := syscall.Syscall(procGetPriorityClass.Addr(), 1, uintptr(process), 0, 0) 1794 ret = uint32(r0) 1795 if ret == 0 { 1796 err = errnoErr(e1) 1797 } 1798 return 1799} 1800 1801func GetProcAddress(module Handle, procname string) (proc uintptr, err error) { 1802 var _p0 *byte 1803 _p0, err = syscall.BytePtrFromString(procname) 1804 if err != nil { 1805 return 1806 } 1807 return _GetProcAddress(module, _p0) 1808} 1809 1810func _GetProcAddress(module Handle, procname *byte) (proc uintptr, err error) { 1811 r0, _, e1 := syscall.Syscall(procGetProcAddress.Addr(), 2, uintptr(module), uintptr(unsafe.Pointer(procname)), 0) 1812 proc = uintptr(r0) 1813 if proc == 0 { 1814 err = errnoErr(e1) 1815 } 1816 return 1817} 1818 1819func GetProcessId(process Handle) (id uint32, err error) { 1820 r0, _, e1 := syscall.Syscall(procGetProcessId.Addr(), 1, uintptr(process), 0, 0) 1821 id = uint32(r0) 1822 if id == 0 { 1823 err = errnoErr(e1) 1824 } 1825 return 1826} 1827 1828func getProcessPreferredUILanguages(flags uint32, numLanguages *uint32, buf *uint16, bufSize *uint32) (err error) { 1829 r1, _, e1 := syscall.Syscall6(procGetProcessPreferredUILanguages.Addr(), 4, uintptr(flags), uintptr(unsafe.Pointer(numLanguages)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(bufSize)), 0, 0) 1830 if r1 == 0 { 1831 err = errnoErr(e1) 1832 } 1833 return 1834} 1835 1836func GetProcessShutdownParameters(level *uint32, flags *uint32) (err error) { 1837 r1, _, e1 := syscall.Syscall(procGetProcessShutdownParameters.Addr(), 2, uintptr(unsafe.Pointer(level)), uintptr(unsafe.Pointer(flags)), 0) 1838 if r1 == 0 { 1839 err = errnoErr(e1) 1840 } 1841 return 1842} 1843 1844func GetProcessTimes(handle Handle, creationTime *Filetime, exitTime *Filetime, kernelTime *Filetime, userTime *Filetime) (err error) { 1845 r1, _, e1 := syscall.Syscall6(procGetProcessTimes.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(creationTime)), uintptr(unsafe.Pointer(exitTime)), uintptr(unsafe.Pointer(kernelTime)), uintptr(unsafe.Pointer(userTime)), 0) 1846 if r1 == 0 { 1847 err = errnoErr(e1) 1848 } 1849 return 1850} 1851 1852func GetProcessWorkingSetSizeEx(hProcess Handle, lpMinimumWorkingSetSize *uintptr, lpMaximumWorkingSetSize *uintptr, flags *uint32) { 1853 syscall.Syscall6(procGetProcessWorkingSetSizeEx.Addr(), 4, uintptr(hProcess), uintptr(unsafe.Pointer(lpMinimumWorkingSetSize)), uintptr(unsafe.Pointer(lpMaximumWorkingSetSize)), uintptr(unsafe.Pointer(flags)), 0, 0) 1854 return 1855} 1856 1857func GetQueuedCompletionStatus(cphandle Handle, qty *uint32, key *uint32, overlapped **Overlapped, timeout uint32) (err error) { 1858 r1, _, e1 := syscall.Syscall6(procGetQueuedCompletionStatus.Addr(), 5, uintptr(cphandle), uintptr(unsafe.Pointer(qty)), uintptr(unsafe.Pointer(key)), uintptr(unsafe.Pointer(overlapped)), uintptr(timeout), 0) 1859 if r1 == 0 { 1860 err = errnoErr(e1) 1861 } 1862 return 1863} 1864 1865func GetShortPathName(longpath *uint16, shortpath *uint16, buflen uint32) (n uint32, err error) { 1866 r0, _, e1 := syscall.Syscall(procGetShortPathNameW.Addr(), 3, uintptr(unsafe.Pointer(longpath)), uintptr(unsafe.Pointer(shortpath)), uintptr(buflen)) 1867 n = uint32(r0) 1868 if n == 0 { 1869 err = errnoErr(e1) 1870 } 1871 return 1872} 1873 1874func GetStartupInfo(startupInfo *StartupInfo) (err error) { 1875 r1, _, e1 := syscall.Syscall(procGetStartupInfoW.Addr(), 1, uintptr(unsafe.Pointer(startupInfo)), 0, 0) 1876 if r1 == 0 { 1877 err = errnoErr(e1) 1878 } 1879 return 1880} 1881 1882func GetStdHandle(stdhandle uint32) (handle Handle, err error) { 1883 r0, _, e1 := syscall.Syscall(procGetStdHandle.Addr(), 1, uintptr(stdhandle), 0, 0) 1884 handle = Handle(r0) 1885 if handle == InvalidHandle { 1886 err = errnoErr(e1) 1887 } 1888 return 1889} 1890 1891func getSystemDirectory(dir *uint16, dirLen uint32) (len uint32, err error) { 1892 r0, _, e1 := syscall.Syscall(procGetSystemDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(dir)), uintptr(dirLen), 0) 1893 len = uint32(r0) 1894 if len == 0 { 1895 err = errnoErr(e1) 1896 } 1897 return 1898} 1899 1900func getSystemPreferredUILanguages(flags uint32, numLanguages *uint32, buf *uint16, bufSize *uint32) (err error) { 1901 r1, _, e1 := syscall.Syscall6(procGetSystemPreferredUILanguages.Addr(), 4, uintptr(flags), uintptr(unsafe.Pointer(numLanguages)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(bufSize)), 0, 0) 1902 if r1 == 0 { 1903 err = errnoErr(e1) 1904 } 1905 return 1906} 1907 1908func GetSystemTimeAsFileTime(time *Filetime) { 1909 syscall.Syscall(procGetSystemTimeAsFileTime.Addr(), 1, uintptr(unsafe.Pointer(time)), 0, 0) 1910 return 1911} 1912 1913func GetSystemTimePreciseAsFileTime(time *Filetime) { 1914 syscall.Syscall(procGetSystemTimePreciseAsFileTime.Addr(), 1, uintptr(unsafe.Pointer(time)), 0, 0) 1915 return 1916} 1917 1918func getSystemWindowsDirectory(dir *uint16, dirLen uint32) (len uint32, err error) { 1919 r0, _, e1 := syscall.Syscall(procGetSystemWindowsDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(dir)), uintptr(dirLen), 0) 1920 len = uint32(r0) 1921 if len == 0 { 1922 err = errnoErr(e1) 1923 } 1924 return 1925} 1926 1927func GetTempPath(buflen uint32, buf *uint16) (n uint32, err error) { 1928 r0, _, e1 := syscall.Syscall(procGetTempPathW.Addr(), 2, uintptr(buflen), uintptr(unsafe.Pointer(buf)), 0) 1929 n = uint32(r0) 1930 if n == 0 { 1931 err = errnoErr(e1) 1932 } 1933 return 1934} 1935 1936func getThreadPreferredUILanguages(flags uint32, numLanguages *uint32, buf *uint16, bufSize *uint32) (err error) { 1937 r1, _, e1 := syscall.Syscall6(procGetThreadPreferredUILanguages.Addr(), 4, uintptr(flags), uintptr(unsafe.Pointer(numLanguages)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(bufSize)), 0, 0) 1938 if r1 == 0 { 1939 err = errnoErr(e1) 1940 } 1941 return 1942} 1943 1944func getTickCount64() (ms uint64) { 1945 r0, _, _ := syscall.Syscall(procGetTickCount64.Addr(), 0, 0, 0, 0) 1946 ms = uint64(r0) 1947 return 1948} 1949 1950func GetTimeZoneInformation(tzi *Timezoneinformation) (rc uint32, err error) { 1951 r0, _, e1 := syscall.Syscall(procGetTimeZoneInformation.Addr(), 1, uintptr(unsafe.Pointer(tzi)), 0, 0) 1952 rc = uint32(r0) 1953 if rc == 0xffffffff { 1954 err = errnoErr(e1) 1955 } 1956 return 1957} 1958 1959func getUserPreferredUILanguages(flags uint32, numLanguages *uint32, buf *uint16, bufSize *uint32) (err error) { 1960 r1, _, e1 := syscall.Syscall6(procGetUserPreferredUILanguages.Addr(), 4, uintptr(flags), uintptr(unsafe.Pointer(numLanguages)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(bufSize)), 0, 0) 1961 if r1 == 0 { 1962 err = errnoErr(e1) 1963 } 1964 return 1965} 1966 1967func GetVersion() (ver uint32, err error) { 1968 r0, _, e1 := syscall.Syscall(procGetVersion.Addr(), 0, 0, 0, 0) 1969 ver = uint32(r0) 1970 if ver == 0 { 1971 err = errnoErr(e1) 1972 } 1973 return 1974} 1975 1976func GetVolumeInformationByHandle(file Handle, volumeNameBuffer *uint16, volumeNameSize uint32, volumeNameSerialNumber *uint32, maximumComponentLength *uint32, fileSystemFlags *uint32, fileSystemNameBuffer *uint16, fileSystemNameSize uint32) (err error) { 1977 r1, _, e1 := syscall.Syscall9(procGetVolumeInformationByHandleW.Addr(), 8, uintptr(file), uintptr(unsafe.Pointer(volumeNameBuffer)), uintptr(volumeNameSize), uintptr(unsafe.Pointer(volumeNameSerialNumber)), uintptr(unsafe.Pointer(maximumComponentLength)), uintptr(unsafe.Pointer(fileSystemFlags)), uintptr(unsafe.Pointer(fileSystemNameBuffer)), uintptr(fileSystemNameSize), 0) 1978 if r1 == 0 { 1979 err = errnoErr(e1) 1980 } 1981 return 1982} 1983 1984func GetVolumeInformation(rootPathName *uint16, volumeNameBuffer *uint16, volumeNameSize uint32, volumeNameSerialNumber *uint32, maximumComponentLength *uint32, fileSystemFlags *uint32, fileSystemNameBuffer *uint16, fileSystemNameSize uint32) (err error) { 1985 r1, _, e1 := syscall.Syscall9(procGetVolumeInformationW.Addr(), 8, uintptr(unsafe.Pointer(rootPathName)), uintptr(unsafe.Pointer(volumeNameBuffer)), uintptr(volumeNameSize), uintptr(unsafe.Pointer(volumeNameSerialNumber)), uintptr(unsafe.Pointer(maximumComponentLength)), uintptr(unsafe.Pointer(fileSystemFlags)), uintptr(unsafe.Pointer(fileSystemNameBuffer)), uintptr(fileSystemNameSize), 0) 1986 if r1 == 0 { 1987 err = errnoErr(e1) 1988 } 1989 return 1990} 1991 1992func GetVolumeNameForVolumeMountPoint(volumeMountPoint *uint16, volumeName *uint16, bufferlength uint32) (err error) { 1993 r1, _, e1 := syscall.Syscall(procGetVolumeNameForVolumeMountPointW.Addr(), 3, uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(unsafe.Pointer(volumeName)), uintptr(bufferlength)) 1994 if r1 == 0 { 1995 err = errnoErr(e1) 1996 } 1997 return 1998} 1999 2000func GetVolumePathName(fileName *uint16, volumePathName *uint16, bufferLength uint32) (err error) { 2001 r1, _, e1 := syscall.Syscall(procGetVolumePathNameW.Addr(), 3, uintptr(unsafe.Pointer(fileName)), uintptr(unsafe.Pointer(volumePathName)), uintptr(bufferLength)) 2002 if r1 == 0 { 2003 err = errnoErr(e1) 2004 } 2005 return 2006} 2007 2008func GetVolumePathNamesForVolumeName(volumeName *uint16, volumePathNames *uint16, bufferLength uint32, returnLength *uint32) (err error) { 2009 r1, _, e1 := syscall.Syscall6(procGetVolumePathNamesForVolumeNameW.Addr(), 4, uintptr(unsafe.Pointer(volumeName)), uintptr(unsafe.Pointer(volumePathNames)), uintptr(bufferLength), uintptr(unsafe.Pointer(returnLength)), 0, 0) 2010 if r1 == 0 { 2011 err = errnoErr(e1) 2012 } 2013 return 2014} 2015 2016func getWindowsDirectory(dir *uint16, dirLen uint32) (len uint32, err error) { 2017 r0, _, e1 := syscall.Syscall(procGetWindowsDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(dir)), uintptr(dirLen), 0) 2018 len = uint32(r0) 2019 if len == 0 { 2020 err = errnoErr(e1) 2021 } 2022 return 2023} 2024 2025func IsWow64Process(handle Handle, isWow64 *bool) (err error) { 2026 var _p0 uint32 2027 if *isWow64 { 2028 _p0 = 1 2029 } 2030 r1, _, e1 := syscall.Syscall(procIsWow64Process.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(&_p0)), 0) 2031 *isWow64 = _p0 != 0 2032 if r1 == 0 { 2033 err = errnoErr(e1) 2034 } 2035 return 2036} 2037 2038func LoadLibraryEx(libname string, zero Handle, flags uintptr) (handle Handle, err error) { 2039 var _p0 *uint16 2040 _p0, err = syscall.UTF16PtrFromString(libname) 2041 if err != nil { 2042 return 2043 } 2044 return _LoadLibraryEx(_p0, zero, flags) 2045} 2046 2047func _LoadLibraryEx(libname *uint16, zero Handle, flags uintptr) (handle Handle, err error) { 2048 r0, _, e1 := syscall.Syscall(procLoadLibraryExW.Addr(), 3, uintptr(unsafe.Pointer(libname)), uintptr(zero), uintptr(flags)) 2049 handle = Handle(r0) 2050 if handle == 0 { 2051 err = errnoErr(e1) 2052 } 2053 return 2054} 2055 2056func LoadLibrary(libname string) (handle Handle, err error) { 2057 var _p0 *uint16 2058 _p0, err = syscall.UTF16PtrFromString(libname) 2059 if err != nil { 2060 return 2061 } 2062 return _LoadLibrary(_p0) 2063} 2064 2065func _LoadLibrary(libname *uint16) (handle Handle, err error) { 2066 r0, _, e1 := syscall.Syscall(procLoadLibraryW.Addr(), 1, uintptr(unsafe.Pointer(libname)), 0, 0) 2067 handle = Handle(r0) 2068 if handle == 0 { 2069 err = errnoErr(e1) 2070 } 2071 return 2072} 2073 2074func LocalFree(hmem Handle) (handle Handle, err error) { 2075 r0, _, e1 := syscall.Syscall(procLocalFree.Addr(), 1, uintptr(hmem), 0, 0) 2076 handle = Handle(r0) 2077 if handle != 0 { 2078 err = errnoErr(e1) 2079 } 2080 return 2081} 2082 2083func LockFileEx(file Handle, flags uint32, reserved uint32, bytesLow uint32, bytesHigh uint32, overlapped *Overlapped) (err error) { 2084 r1, _, e1 := syscall.Syscall6(procLockFileEx.Addr(), 6, uintptr(file), uintptr(flags), uintptr(reserved), uintptr(bytesLow), uintptr(bytesHigh), uintptr(unsafe.Pointer(overlapped))) 2085 if r1 == 0 { 2086 err = errnoErr(e1) 2087 } 2088 return 2089} 2090 2091func MapViewOfFile(handle Handle, access uint32, offsetHigh uint32, offsetLow uint32, length uintptr) (addr uintptr, err error) { 2092 r0, _, e1 := syscall.Syscall6(procMapViewOfFile.Addr(), 5, uintptr(handle), uintptr(access), uintptr(offsetHigh), uintptr(offsetLow), uintptr(length), 0) 2093 addr = uintptr(r0) 2094 if addr == 0 { 2095 err = errnoErr(e1) 2096 } 2097 return 2098} 2099 2100func MoveFileEx(from *uint16, to *uint16, flags uint32) (err error) { 2101 r1, _, e1 := syscall.Syscall(procMoveFileExW.Addr(), 3, uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(to)), uintptr(flags)) 2102 if r1 == 0 { 2103 err = errnoErr(e1) 2104 } 2105 return 2106} 2107 2108func MoveFile(from *uint16, to *uint16) (err error) { 2109 r1, _, e1 := syscall.Syscall(procMoveFileW.Addr(), 2, uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(to)), 0) 2110 if r1 == 0 { 2111 err = errnoErr(e1) 2112 } 2113 return 2114} 2115 2116func MultiByteToWideChar(codePage uint32, dwFlags uint32, str *byte, nstr int32, wchar *uint16, nwchar int32) (nwrite int32, err error) { 2117 r0, _, e1 := syscall.Syscall6(procMultiByteToWideChar.Addr(), 6, uintptr(codePage), uintptr(dwFlags), uintptr(unsafe.Pointer(str)), uintptr(nstr), uintptr(unsafe.Pointer(wchar)), uintptr(nwchar)) 2118 nwrite = int32(r0) 2119 if nwrite == 0 { 2120 err = errnoErr(e1) 2121 } 2122 return 2123} 2124 2125func OpenEvent(desiredAccess uint32, inheritHandle bool, name *uint16) (handle Handle, err error) { 2126 var _p0 uint32 2127 if inheritHandle { 2128 _p0 = 1 2129 } 2130 r0, _, e1 := syscall.Syscall(procOpenEventW.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(unsafe.Pointer(name))) 2131 handle = Handle(r0) 2132 if handle == 0 { 2133 err = errnoErr(e1) 2134 } 2135 return 2136} 2137 2138func OpenMutex(desiredAccess uint32, inheritHandle bool, name *uint16) (handle Handle, err error) { 2139 var _p0 uint32 2140 if inheritHandle { 2141 _p0 = 1 2142 } 2143 r0, _, e1 := syscall.Syscall(procOpenMutexW.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(unsafe.Pointer(name))) 2144 handle = Handle(r0) 2145 if handle == 0 { 2146 err = errnoErr(e1) 2147 } 2148 return 2149} 2150 2151func OpenProcess(desiredAccess uint32, inheritHandle bool, processId uint32) (handle Handle, err error) { 2152 var _p0 uint32 2153 if inheritHandle { 2154 _p0 = 1 2155 } 2156 r0, _, e1 := syscall.Syscall(procOpenProcess.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(processId)) 2157 handle = Handle(r0) 2158 if handle == 0 { 2159 err = errnoErr(e1) 2160 } 2161 return 2162} 2163 2164func OpenThread(desiredAccess uint32, inheritHandle bool, threadId uint32) (handle Handle, err error) { 2165 var _p0 uint32 2166 if inheritHandle { 2167 _p0 = 1 2168 } 2169 r0, _, e1 := syscall.Syscall(procOpenThread.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(threadId)) 2170 handle = Handle(r0) 2171 if handle == 0 { 2172 err = errnoErr(e1) 2173 } 2174 return 2175} 2176 2177func PostQueuedCompletionStatus(cphandle Handle, qty uint32, key uint32, overlapped *Overlapped) (err error) { 2178 r1, _, e1 := syscall.Syscall6(procPostQueuedCompletionStatus.Addr(), 4, uintptr(cphandle), uintptr(qty), uintptr(key), uintptr(unsafe.Pointer(overlapped)), 0, 0) 2179 if r1 == 0 { 2180 err = errnoErr(e1) 2181 } 2182 return 2183} 2184 2185func Process32First(snapshot Handle, procEntry *ProcessEntry32) (err error) { 2186 r1, _, e1 := syscall.Syscall(procProcess32FirstW.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(procEntry)), 0) 2187 if r1 == 0 { 2188 err = errnoErr(e1) 2189 } 2190 return 2191} 2192 2193func Process32Next(snapshot Handle, procEntry *ProcessEntry32) (err error) { 2194 r1, _, e1 := syscall.Syscall(procProcess32NextW.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(procEntry)), 0) 2195 if r1 == 0 { 2196 err = errnoErr(e1) 2197 } 2198 return 2199} 2200 2201func ProcessIdToSessionId(pid uint32, sessionid *uint32) (err error) { 2202 r1, _, e1 := syscall.Syscall(procProcessIdToSessionId.Addr(), 2, uintptr(pid), uintptr(unsafe.Pointer(sessionid)), 0) 2203 if r1 == 0 { 2204 err = errnoErr(e1) 2205 } 2206 return 2207} 2208 2209func PulseEvent(event Handle) (err error) { 2210 r1, _, e1 := syscall.Syscall(procPulseEvent.Addr(), 1, uintptr(event), 0, 0) 2211 if r1 == 0 { 2212 err = errnoErr(e1) 2213 } 2214 return 2215} 2216 2217func QueryDosDevice(deviceName *uint16, targetPath *uint16, max uint32) (n uint32, err error) { 2218 r0, _, e1 := syscall.Syscall(procQueryDosDeviceW.Addr(), 3, uintptr(unsafe.Pointer(deviceName)), uintptr(unsafe.Pointer(targetPath)), uintptr(max)) 2219 n = uint32(r0) 2220 if n == 0 { 2221 err = errnoErr(e1) 2222 } 2223 return 2224} 2225 2226func QueryInformationJobObject(job Handle, JobObjectInformationClass int32, JobObjectInformation uintptr, JobObjectInformationLength uint32, retlen *uint32) (err error) { 2227 r1, _, e1 := syscall.Syscall6(procQueryInformationJobObject.Addr(), 5, uintptr(job), uintptr(JobObjectInformationClass), uintptr(JobObjectInformation), uintptr(JobObjectInformationLength), uintptr(unsafe.Pointer(retlen)), 0) 2228 if r1 == 0 { 2229 err = errnoErr(e1) 2230 } 2231 return 2232} 2233 2234func ReadConsole(console Handle, buf *uint16, toread uint32, read *uint32, inputControl *byte) (err error) { 2235 r1, _, e1 := syscall.Syscall6(procReadConsoleW.Addr(), 5, uintptr(console), uintptr(unsafe.Pointer(buf)), uintptr(toread), uintptr(unsafe.Pointer(read)), uintptr(unsafe.Pointer(inputControl)), 0) 2236 if r1 == 0 { 2237 err = errnoErr(e1) 2238 } 2239 return 2240} 2241 2242func ReadDirectoryChanges(handle Handle, buf *byte, buflen uint32, watchSubTree bool, mask uint32, retlen *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) { 2243 var _p0 uint32 2244 if watchSubTree { 2245 _p0 = 1 2246 } 2247 r1, _, e1 := syscall.Syscall9(procReadDirectoryChangesW.Addr(), 8, uintptr(handle), uintptr(unsafe.Pointer(buf)), uintptr(buflen), uintptr(_p0), uintptr(mask), uintptr(unsafe.Pointer(retlen)), uintptr(unsafe.Pointer(overlapped)), uintptr(completionRoutine), 0) 2248 if r1 == 0 { 2249 err = errnoErr(e1) 2250 } 2251 return 2252} 2253 2254func ReadFile(handle Handle, buf []byte, done *uint32, overlapped *Overlapped) (err error) { 2255 var _p0 *byte 2256 if len(buf) > 0 { 2257 _p0 = &buf[0] 2258 } 2259 r1, _, e1 := syscall.Syscall6(procReadFile.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(done)), uintptr(unsafe.Pointer(overlapped)), 0) 2260 if r1 == 0 { 2261 err = errnoErr(e1) 2262 } 2263 return 2264} 2265 2266func ReleaseMutex(mutex Handle) (err error) { 2267 r1, _, e1 := syscall.Syscall(procReleaseMutex.Addr(), 1, uintptr(mutex), 0, 0) 2268 if r1 == 0 { 2269 err = errnoErr(e1) 2270 } 2271 return 2272} 2273 2274func RemoveDirectory(path *uint16) (err error) { 2275 r1, _, e1 := syscall.Syscall(procRemoveDirectoryW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0) 2276 if r1 == 0 { 2277 err = errnoErr(e1) 2278 } 2279 return 2280} 2281 2282func ResetEvent(event Handle) (err error) { 2283 r1, _, e1 := syscall.Syscall(procResetEvent.Addr(), 1, uintptr(event), 0, 0) 2284 if r1 == 0 { 2285 err = errnoErr(e1) 2286 } 2287 return 2288} 2289 2290func ResumeThread(thread Handle) (ret uint32, err error) { 2291 r0, _, e1 := syscall.Syscall(procResumeThread.Addr(), 1, uintptr(thread), 0, 0) 2292 ret = uint32(r0) 2293 if ret == 0xffffffff { 2294 err = errnoErr(e1) 2295 } 2296 return 2297} 2298 2299func SetConsoleCursorPosition(console Handle, position Coord) (err error) { 2300 r1, _, e1 := syscall.Syscall(procSetConsoleCursorPosition.Addr(), 2, uintptr(console), uintptr(*((*uint32)(unsafe.Pointer(&position)))), 0) 2301 if r1 == 0 { 2302 err = errnoErr(e1) 2303 } 2304 return 2305} 2306 2307func SetConsoleMode(console Handle, mode uint32) (err error) { 2308 r1, _, e1 := syscall.Syscall(procSetConsoleMode.Addr(), 2, uintptr(console), uintptr(mode), 0) 2309 if r1 == 0 { 2310 err = errnoErr(e1) 2311 } 2312 return 2313} 2314 2315func SetCurrentDirectory(path *uint16) (err error) { 2316 r1, _, e1 := syscall.Syscall(procSetCurrentDirectoryW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0) 2317 if r1 == 0 { 2318 err = errnoErr(e1) 2319 } 2320 return 2321} 2322 2323func SetEndOfFile(handle Handle) (err error) { 2324 r1, _, e1 := syscall.Syscall(procSetEndOfFile.Addr(), 1, uintptr(handle), 0, 0) 2325 if r1 == 0 { 2326 err = errnoErr(e1) 2327 } 2328 return 2329} 2330 2331func SetEnvironmentVariable(name *uint16, value *uint16) (err error) { 2332 r1, _, e1 := syscall.Syscall(procSetEnvironmentVariableW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(value)), 0) 2333 if r1 == 0 { 2334 err = errnoErr(e1) 2335 } 2336 return 2337} 2338 2339func SetErrorMode(mode uint32) (ret uint32) { 2340 r0, _, _ := syscall.Syscall(procSetErrorMode.Addr(), 1, uintptr(mode), 0, 0) 2341 ret = uint32(r0) 2342 return 2343} 2344 2345func SetEvent(event Handle) (err error) { 2346 r1, _, e1 := syscall.Syscall(procSetEvent.Addr(), 1, uintptr(event), 0, 0) 2347 if r1 == 0 { 2348 err = errnoErr(e1) 2349 } 2350 return 2351} 2352 2353func SetFileAttributes(name *uint16, attrs uint32) (err error) { 2354 r1, _, e1 := syscall.Syscall(procSetFileAttributesW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(attrs), 0) 2355 if r1 == 0 { 2356 err = errnoErr(e1) 2357 } 2358 return 2359} 2360 2361func SetFileCompletionNotificationModes(handle Handle, flags uint8) (err error) { 2362 r1, _, e1 := syscall.Syscall(procSetFileCompletionNotificationModes.Addr(), 2, uintptr(handle), uintptr(flags), 0) 2363 if r1 == 0 { 2364 err = errnoErr(e1) 2365 } 2366 return 2367} 2368 2369func SetFilePointer(handle Handle, lowoffset int32, highoffsetptr *int32, whence uint32) (newlowoffset uint32, err error) { 2370 r0, _, e1 := syscall.Syscall6(procSetFilePointer.Addr(), 4, uintptr(handle), uintptr(lowoffset), uintptr(unsafe.Pointer(highoffsetptr)), uintptr(whence), 0, 0) 2371 newlowoffset = uint32(r0) 2372 if newlowoffset == 0xffffffff { 2373 err = errnoErr(e1) 2374 } 2375 return 2376} 2377 2378func SetFileTime(handle Handle, ctime *Filetime, atime *Filetime, wtime *Filetime) (err error) { 2379 r1, _, e1 := syscall.Syscall6(procSetFileTime.Addr(), 4, uintptr(handle), uintptr(unsafe.Pointer(ctime)), uintptr(unsafe.Pointer(atime)), uintptr(unsafe.Pointer(wtime)), 0, 0) 2380 if r1 == 0 { 2381 err = errnoErr(e1) 2382 } 2383 return 2384} 2385 2386func SetHandleInformation(handle Handle, mask uint32, flags uint32) (err error) { 2387 r1, _, e1 := syscall.Syscall(procSetHandleInformation.Addr(), 3, uintptr(handle), uintptr(mask), uintptr(flags)) 2388 if r1 == 0 { 2389 err = errnoErr(e1) 2390 } 2391 return 2392} 2393 2394func SetInformationJobObject(job Handle, JobObjectInformationClass uint32, JobObjectInformation uintptr, JobObjectInformationLength uint32) (ret int, err error) { 2395 r0, _, e1 := syscall.Syscall6(procSetInformationJobObject.Addr(), 4, uintptr(job), uintptr(JobObjectInformationClass), uintptr(JobObjectInformation), uintptr(JobObjectInformationLength), 0, 0) 2396 ret = int(r0) 2397 if ret == 0 { 2398 err = errnoErr(e1) 2399 } 2400 return 2401} 2402 2403func SetPriorityClass(process Handle, priorityClass uint32) (err error) { 2404 r1, _, e1 := syscall.Syscall(procSetPriorityClass.Addr(), 2, uintptr(process), uintptr(priorityClass), 0) 2405 if r1 == 0 { 2406 err = errnoErr(e1) 2407 } 2408 return 2409} 2410 2411func SetProcessPriorityBoost(process Handle, disable bool) (err error) { 2412 var _p0 uint32 2413 if disable { 2414 _p0 = 1 2415 } 2416 r1, _, e1 := syscall.Syscall(procSetProcessPriorityBoost.Addr(), 2, uintptr(process), uintptr(_p0), 0) 2417 if r1 == 0 { 2418 err = errnoErr(e1) 2419 } 2420 return 2421} 2422 2423func SetProcessShutdownParameters(level uint32, flags uint32) (err error) { 2424 r1, _, e1 := syscall.Syscall(procSetProcessShutdownParameters.Addr(), 2, uintptr(level), uintptr(flags), 0) 2425 if r1 == 0 { 2426 err = errnoErr(e1) 2427 } 2428 return 2429} 2430 2431func SetProcessWorkingSetSizeEx(hProcess Handle, dwMinimumWorkingSetSize uintptr, dwMaximumWorkingSetSize uintptr, flags uint32) (err error) { 2432 r1, _, e1 := syscall.Syscall6(procSetProcessWorkingSetSizeEx.Addr(), 4, uintptr(hProcess), uintptr(dwMinimumWorkingSetSize), uintptr(dwMaximumWorkingSetSize), uintptr(flags), 0, 0) 2433 if r1 == 0 { 2434 err = errnoErr(e1) 2435 } 2436 return 2437} 2438 2439func SetStdHandle(stdhandle uint32, handle Handle) (err error) { 2440 r1, _, e1 := syscall.Syscall(procSetStdHandle.Addr(), 2, uintptr(stdhandle), uintptr(handle), 0) 2441 if r1 == 0 { 2442 err = errnoErr(e1) 2443 } 2444 return 2445} 2446 2447func SetVolumeLabel(rootPathName *uint16, volumeName *uint16) (err error) { 2448 r1, _, e1 := syscall.Syscall(procSetVolumeLabelW.Addr(), 2, uintptr(unsafe.Pointer(rootPathName)), uintptr(unsafe.Pointer(volumeName)), 0) 2449 if r1 == 0 { 2450 err = errnoErr(e1) 2451 } 2452 return 2453} 2454 2455func SetVolumeMountPoint(volumeMountPoint *uint16, volumeName *uint16) (err error) { 2456 r1, _, e1 := syscall.Syscall(procSetVolumeMountPointW.Addr(), 2, uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(unsafe.Pointer(volumeName)), 0) 2457 if r1 == 0 { 2458 err = errnoErr(e1) 2459 } 2460 return 2461} 2462 2463func SleepEx(milliseconds uint32, alertable bool) (ret uint32) { 2464 var _p0 uint32 2465 if alertable { 2466 _p0 = 1 2467 } 2468 r0, _, _ := syscall.Syscall(procSleepEx.Addr(), 2, uintptr(milliseconds), uintptr(_p0), 0) 2469 ret = uint32(r0) 2470 return 2471} 2472 2473func TerminateJobObject(job Handle, exitCode uint32) (err error) { 2474 r1, _, e1 := syscall.Syscall(procTerminateJobObject.Addr(), 2, uintptr(job), uintptr(exitCode), 0) 2475 if r1 == 0 { 2476 err = errnoErr(e1) 2477 } 2478 return 2479} 2480 2481func TerminateProcess(handle Handle, exitcode uint32) (err error) { 2482 r1, _, e1 := syscall.Syscall(procTerminateProcess.Addr(), 2, uintptr(handle), uintptr(exitcode), 0) 2483 if r1 == 0 { 2484 err = errnoErr(e1) 2485 } 2486 return 2487} 2488 2489func Thread32First(snapshot Handle, threadEntry *ThreadEntry32) (err error) { 2490 r1, _, e1 := syscall.Syscall(procThread32First.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(threadEntry)), 0) 2491 if r1 == 0 { 2492 err = errnoErr(e1) 2493 } 2494 return 2495} 2496 2497func Thread32Next(snapshot Handle, threadEntry *ThreadEntry32) (err error) { 2498 r1, _, e1 := syscall.Syscall(procThread32Next.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(threadEntry)), 0) 2499 if r1 == 0 { 2500 err = errnoErr(e1) 2501 } 2502 return 2503} 2504 2505func UnlockFileEx(file Handle, reserved uint32, bytesLow uint32, bytesHigh uint32, overlapped *Overlapped) (err error) { 2506 r1, _, e1 := syscall.Syscall6(procUnlockFileEx.Addr(), 5, uintptr(file), uintptr(reserved), uintptr(bytesLow), uintptr(bytesHigh), uintptr(unsafe.Pointer(overlapped)), 0) 2507 if r1 == 0 { 2508 err = errnoErr(e1) 2509 } 2510 return 2511} 2512 2513func UnmapViewOfFile(addr uintptr) (err error) { 2514 r1, _, e1 := syscall.Syscall(procUnmapViewOfFile.Addr(), 1, uintptr(addr), 0, 0) 2515 if r1 == 0 { 2516 err = errnoErr(e1) 2517 } 2518 return 2519} 2520 2521func VirtualAlloc(address uintptr, size uintptr, alloctype uint32, protect uint32) (value uintptr, err error) { 2522 r0, _, e1 := syscall.Syscall6(procVirtualAlloc.Addr(), 4, uintptr(address), uintptr(size), uintptr(alloctype), uintptr(protect), 0, 0) 2523 value = uintptr(r0) 2524 if value == 0 { 2525 err = errnoErr(e1) 2526 } 2527 return 2528} 2529 2530func VirtualFree(address uintptr, size uintptr, freetype uint32) (err error) { 2531 r1, _, e1 := syscall.Syscall(procVirtualFree.Addr(), 3, uintptr(address), uintptr(size), uintptr(freetype)) 2532 if r1 == 0 { 2533 err = errnoErr(e1) 2534 } 2535 return 2536} 2537 2538func VirtualLock(addr uintptr, length uintptr) (err error) { 2539 r1, _, e1 := syscall.Syscall(procVirtualLock.Addr(), 2, uintptr(addr), uintptr(length), 0) 2540 if r1 == 0 { 2541 err = errnoErr(e1) 2542 } 2543 return 2544} 2545 2546func VirtualProtect(address uintptr, size uintptr, newprotect uint32, oldprotect *uint32) (err error) { 2547 r1, _, e1 := syscall.Syscall6(procVirtualProtect.Addr(), 4, uintptr(address), uintptr(size), uintptr(newprotect), uintptr(unsafe.Pointer(oldprotect)), 0, 0) 2548 if r1 == 0 { 2549 err = errnoErr(e1) 2550 } 2551 return 2552} 2553 2554func VirtualUnlock(addr uintptr, length uintptr) (err error) { 2555 r1, _, e1 := syscall.Syscall(procVirtualUnlock.Addr(), 2, uintptr(addr), uintptr(length), 0) 2556 if r1 == 0 { 2557 err = errnoErr(e1) 2558 } 2559 return 2560} 2561 2562func waitForMultipleObjects(count uint32, handles uintptr, waitAll bool, waitMilliseconds uint32) (event uint32, err error) { 2563 var _p0 uint32 2564 if waitAll { 2565 _p0 = 1 2566 } 2567 r0, _, e1 := syscall.Syscall6(procWaitForMultipleObjects.Addr(), 4, uintptr(count), uintptr(handles), uintptr(_p0), uintptr(waitMilliseconds), 0, 0) 2568 event = uint32(r0) 2569 if event == 0xffffffff { 2570 err = errnoErr(e1) 2571 } 2572 return 2573} 2574 2575func WaitForSingleObject(handle Handle, waitMilliseconds uint32) (event uint32, err error) { 2576 r0, _, e1 := syscall.Syscall(procWaitForSingleObject.Addr(), 2, uintptr(handle), uintptr(waitMilliseconds), 0) 2577 event = uint32(r0) 2578 if event == 0xffffffff { 2579 err = errnoErr(e1) 2580 } 2581 return 2582} 2583 2584func WriteConsole(console Handle, buf *uint16, towrite uint32, written *uint32, reserved *byte) (err error) { 2585 r1, _, e1 := syscall.Syscall6(procWriteConsoleW.Addr(), 5, uintptr(console), uintptr(unsafe.Pointer(buf)), uintptr(towrite), uintptr(unsafe.Pointer(written)), uintptr(unsafe.Pointer(reserved)), 0) 2586 if r1 == 0 { 2587 err = errnoErr(e1) 2588 } 2589 return 2590} 2591 2592func WriteFile(handle Handle, buf []byte, done *uint32, overlapped *Overlapped) (err error) { 2593 var _p0 *byte 2594 if len(buf) > 0 { 2595 _p0 = &buf[0] 2596 } 2597 r1, _, e1 := syscall.Syscall6(procWriteFile.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(done)), uintptr(unsafe.Pointer(overlapped)), 0) 2598 if r1 == 0 { 2599 err = errnoErr(e1) 2600 } 2601 return 2602} 2603 2604func AcceptEx(ls Handle, as Handle, buf *byte, rxdatalen uint32, laddrlen uint32, raddrlen uint32, recvd *uint32, overlapped *Overlapped) (err error) { 2605 r1, _, e1 := syscall.Syscall9(procAcceptEx.Addr(), 8, uintptr(ls), uintptr(as), uintptr(unsafe.Pointer(buf)), uintptr(rxdatalen), uintptr(laddrlen), uintptr(raddrlen), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(overlapped)), 0) 2606 if r1 == 0 { 2607 err = errnoErr(e1) 2608 } 2609 return 2610} 2611 2612func GetAcceptExSockaddrs(buf *byte, rxdatalen uint32, laddrlen uint32, raddrlen uint32, lrsa **RawSockaddrAny, lrsalen *int32, rrsa **RawSockaddrAny, rrsalen *int32) { 2613 syscall.Syscall9(procGetAcceptExSockaddrs.Addr(), 8, uintptr(unsafe.Pointer(buf)), uintptr(rxdatalen), uintptr(laddrlen), uintptr(raddrlen), uintptr(unsafe.Pointer(lrsa)), uintptr(unsafe.Pointer(lrsalen)), uintptr(unsafe.Pointer(rrsa)), uintptr(unsafe.Pointer(rrsalen)), 0) 2614 return 2615} 2616 2617func TransmitFile(s Handle, handle Handle, bytesToWrite uint32, bytsPerSend uint32, overlapped *Overlapped, transmitFileBuf *TransmitFileBuffers, flags uint32) (err error) { 2618 r1, _, e1 := syscall.Syscall9(procTransmitFile.Addr(), 7, uintptr(s), uintptr(handle), uintptr(bytesToWrite), uintptr(bytsPerSend), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(transmitFileBuf)), uintptr(flags), 0, 0) 2619 if r1 == 0 { 2620 err = errnoErr(e1) 2621 } 2622 return 2623} 2624 2625func NetApiBufferFree(buf *byte) (neterr error) { 2626 r0, _, _ := syscall.Syscall(procNetApiBufferFree.Addr(), 1, uintptr(unsafe.Pointer(buf)), 0, 0) 2627 if r0 != 0 { 2628 neterr = syscall.Errno(r0) 2629 } 2630 return 2631} 2632 2633func NetGetJoinInformation(server *uint16, name **uint16, bufType *uint32) (neterr error) { 2634 r0, _, _ := syscall.Syscall(procNetGetJoinInformation.Addr(), 3, uintptr(unsafe.Pointer(server)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(bufType))) 2635 if r0 != 0 { 2636 neterr = syscall.Errno(r0) 2637 } 2638 return 2639} 2640 2641func NetUserGetInfo(serverName *uint16, userName *uint16, level uint32, buf **byte) (neterr error) { 2642 r0, _, _ := syscall.Syscall6(procNetUserGetInfo.Addr(), 4, uintptr(unsafe.Pointer(serverName)), uintptr(unsafe.Pointer(userName)), uintptr(level), uintptr(unsafe.Pointer(buf)), 0, 0) 2643 if r0 != 0 { 2644 neterr = syscall.Errno(r0) 2645 } 2646 return 2647} 2648 2649func rtlGetNtVersionNumbers(majorVersion *uint32, minorVersion *uint32, buildNumber *uint32) { 2650 syscall.Syscall(procRtlGetNtVersionNumbers.Addr(), 3, uintptr(unsafe.Pointer(majorVersion)), uintptr(unsafe.Pointer(minorVersion)), uintptr(unsafe.Pointer(buildNumber))) 2651 return 2652} 2653 2654func rtlGetVersion(info *OsVersionInfoEx) (ret error) { 2655 r0, _, _ := syscall.Syscall(procRtlGetVersion.Addr(), 1, uintptr(unsafe.Pointer(info)), 0, 0) 2656 if r0 != 0 { 2657 ret = syscall.Errno(r0) 2658 } 2659 return 2660} 2661 2662func clsidFromString(lpsz *uint16, pclsid *GUID) (ret error) { 2663 r0, _, _ := syscall.Syscall(procCLSIDFromString.Addr(), 2, uintptr(unsafe.Pointer(lpsz)), uintptr(unsafe.Pointer(pclsid)), 0) 2664 if r0 != 0 { 2665 ret = syscall.Errno(r0) 2666 } 2667 return 2668} 2669 2670func coCreateGuid(pguid *GUID) (ret error) { 2671 r0, _, _ := syscall.Syscall(procCoCreateGuid.Addr(), 1, uintptr(unsafe.Pointer(pguid)), 0, 0) 2672 if r0 != 0 { 2673 ret = syscall.Errno(r0) 2674 } 2675 return 2676} 2677 2678func CoTaskMemFree(address unsafe.Pointer) { 2679 syscall.Syscall(procCoTaskMemFree.Addr(), 1, uintptr(address), 0, 0) 2680 return 2681} 2682 2683func stringFromGUID2(rguid *GUID, lpsz *uint16, cchMax int32) (chars int32) { 2684 r0, _, _ := syscall.Syscall(procStringFromGUID2.Addr(), 3, uintptr(unsafe.Pointer(rguid)), uintptr(unsafe.Pointer(lpsz)), uintptr(cchMax)) 2685 chars = int32(r0) 2686 return 2687} 2688 2689func EnumProcesses(processIds []uint32, bytesReturned *uint32) (err error) { 2690 var _p0 *uint32 2691 if len(processIds) > 0 { 2692 _p0 = &processIds[0] 2693 } 2694 r1, _, e1 := syscall.Syscall(procEnumProcesses.Addr(), 3, uintptr(unsafe.Pointer(_p0)), uintptr(len(processIds)), uintptr(unsafe.Pointer(bytesReturned))) 2695 if r1 == 0 { 2696 err = errnoErr(e1) 2697 } 2698 return 2699} 2700 2701func GetUserNameEx(nameFormat uint32, nameBuffre *uint16, nSize *uint32) (err error) { 2702 r1, _, e1 := syscall.Syscall(procGetUserNameExW.Addr(), 3, uintptr(nameFormat), uintptr(unsafe.Pointer(nameBuffre)), uintptr(unsafe.Pointer(nSize))) 2703 if r1&0xff == 0 { 2704 err = errnoErr(e1) 2705 } 2706 return 2707} 2708 2709func TranslateName(accName *uint16, accNameFormat uint32, desiredNameFormat uint32, translatedName *uint16, nSize *uint32) (err error) { 2710 r1, _, e1 := syscall.Syscall6(procTranslateNameW.Addr(), 5, uintptr(unsafe.Pointer(accName)), uintptr(accNameFormat), uintptr(desiredNameFormat), uintptr(unsafe.Pointer(translatedName)), uintptr(unsafe.Pointer(nSize)), 0) 2711 if r1&0xff == 0 { 2712 err = errnoErr(e1) 2713 } 2714 return 2715} 2716 2717func CommandLineToArgv(cmd *uint16, argc *int32) (argv *[8192]*[8192]uint16, err error) { 2718 r0, _, e1 := syscall.Syscall(procCommandLineToArgvW.Addr(), 2, uintptr(unsafe.Pointer(cmd)), uintptr(unsafe.Pointer(argc)), 0) 2719 argv = (*[8192]*[8192]uint16)(unsafe.Pointer(r0)) 2720 if argv == nil { 2721 err = errnoErr(e1) 2722 } 2723 return 2724} 2725 2726func shGetKnownFolderPath(id *KNOWNFOLDERID, flags uint32, token Token, path **uint16) (ret error) { 2727 r0, _, _ := syscall.Syscall6(procSHGetKnownFolderPath.Addr(), 4, uintptr(unsafe.Pointer(id)), uintptr(flags), uintptr(token), uintptr(unsafe.Pointer(path)), 0, 0) 2728 if r0 != 0 { 2729 ret = syscall.Errno(r0) 2730 } 2731 return 2732} 2733 2734func ShellExecute(hwnd Handle, verb *uint16, file *uint16, args *uint16, cwd *uint16, showCmd int32) (err error) { 2735 r1, _, e1 := syscall.Syscall6(procShellExecuteW.Addr(), 6, uintptr(hwnd), uintptr(unsafe.Pointer(verb)), uintptr(unsafe.Pointer(file)), uintptr(unsafe.Pointer(args)), uintptr(unsafe.Pointer(cwd)), uintptr(showCmd)) 2736 if r1 <= 32 { 2737 err = errnoErr(e1) 2738 } 2739 return 2740} 2741 2742func ExitWindowsEx(flags uint32, reason uint32) (err error) { 2743 r1, _, e1 := syscall.Syscall(procExitWindowsEx.Addr(), 2, uintptr(flags), uintptr(reason), 0) 2744 if r1 == 0 { 2745 err = errnoErr(e1) 2746 } 2747 return 2748} 2749 2750func MessageBox(hwnd Handle, text *uint16, caption *uint16, boxtype uint32) (ret int32, err error) { 2751 r0, _, e1 := syscall.Syscall6(procMessageBoxW.Addr(), 4, uintptr(hwnd), uintptr(unsafe.Pointer(text)), uintptr(unsafe.Pointer(caption)), uintptr(boxtype), 0, 0) 2752 ret = int32(r0) 2753 if ret == 0 { 2754 err = errnoErr(e1) 2755 } 2756 return 2757} 2758 2759func CreateEnvironmentBlock(block **uint16, token Token, inheritExisting bool) (err error) { 2760 var _p0 uint32 2761 if inheritExisting { 2762 _p0 = 1 2763 } 2764 r1, _, e1 := syscall.Syscall(procCreateEnvironmentBlock.Addr(), 3, uintptr(unsafe.Pointer(block)), uintptr(token), uintptr(_p0)) 2765 if r1 == 0 { 2766 err = errnoErr(e1) 2767 } 2768 return 2769} 2770 2771func DestroyEnvironmentBlock(block *uint16) (err error) { 2772 r1, _, e1 := syscall.Syscall(procDestroyEnvironmentBlock.Addr(), 1, uintptr(unsafe.Pointer(block)), 0, 0) 2773 if r1 == 0 { 2774 err = errnoErr(e1) 2775 } 2776 return 2777} 2778 2779func GetUserProfileDirectory(t Token, dir *uint16, dirLen *uint32) (err error) { 2780 r1, _, e1 := syscall.Syscall(procGetUserProfileDirectoryW.Addr(), 3, uintptr(t), uintptr(unsafe.Pointer(dir)), uintptr(unsafe.Pointer(dirLen))) 2781 if r1 == 0 { 2782 err = errnoErr(e1) 2783 } 2784 return 2785} 2786 2787func FreeAddrInfoW(addrinfo *AddrinfoW) { 2788 syscall.Syscall(procFreeAddrInfoW.Addr(), 1, uintptr(unsafe.Pointer(addrinfo)), 0, 0) 2789 return 2790} 2791 2792func GetAddrInfoW(nodename *uint16, servicename *uint16, hints *AddrinfoW, result **AddrinfoW) (sockerr error) { 2793 r0, _, _ := syscall.Syscall6(procGetAddrInfoW.Addr(), 4, uintptr(unsafe.Pointer(nodename)), uintptr(unsafe.Pointer(servicename)), uintptr(unsafe.Pointer(hints)), uintptr(unsafe.Pointer(result)), 0, 0) 2794 if r0 != 0 { 2795 sockerr = syscall.Errno(r0) 2796 } 2797 return 2798} 2799 2800func WSACleanup() (err error) { 2801 r1, _, e1 := syscall.Syscall(procWSACleanup.Addr(), 0, 0, 0, 0) 2802 if r1 == socket_error { 2803 err = errnoErr(e1) 2804 } 2805 return 2806} 2807 2808func WSAEnumProtocols(protocols *int32, protocolBuffer *WSAProtocolInfo, bufferLength *uint32) (n int32, err error) { 2809 r0, _, e1 := syscall.Syscall(procWSAEnumProtocolsW.Addr(), 3, uintptr(unsafe.Pointer(protocols)), uintptr(unsafe.Pointer(protocolBuffer)), uintptr(unsafe.Pointer(bufferLength))) 2810 n = int32(r0) 2811 if n == -1 { 2812 err = errnoErr(e1) 2813 } 2814 return 2815} 2816 2817func WSAIoctl(s Handle, iocc uint32, inbuf *byte, cbif uint32, outbuf *byte, cbob uint32, cbbr *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) { 2818 r1, _, e1 := syscall.Syscall9(procWSAIoctl.Addr(), 9, uintptr(s), uintptr(iocc), uintptr(unsafe.Pointer(inbuf)), uintptr(cbif), uintptr(unsafe.Pointer(outbuf)), uintptr(cbob), uintptr(unsafe.Pointer(cbbr)), uintptr(unsafe.Pointer(overlapped)), uintptr(completionRoutine)) 2819 if r1 == socket_error { 2820 err = errnoErr(e1) 2821 } 2822 return 2823} 2824 2825func WSARecv(s Handle, bufs *WSABuf, bufcnt uint32, recvd *uint32, flags *uint32, overlapped *Overlapped, croutine *byte) (err error) { 2826 r1, _, e1 := syscall.Syscall9(procWSARecv.Addr(), 7, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(flags)), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)), 0, 0) 2827 if r1 == socket_error { 2828 err = errnoErr(e1) 2829 } 2830 return 2831} 2832 2833func WSARecvFrom(s Handle, bufs *WSABuf, bufcnt uint32, recvd *uint32, flags *uint32, from *RawSockaddrAny, fromlen *int32, overlapped *Overlapped, croutine *byte) (err error) { 2834 r1, _, e1 := syscall.Syscall9(procWSARecvFrom.Addr(), 9, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(flags)), uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(fromlen)), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine))) 2835 if r1 == socket_error { 2836 err = errnoErr(e1) 2837 } 2838 return 2839} 2840 2841func WSASend(s Handle, bufs *WSABuf, bufcnt uint32, sent *uint32, flags uint32, overlapped *Overlapped, croutine *byte) (err error) { 2842 r1, _, e1 := syscall.Syscall9(procWSASend.Addr(), 7, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(sent)), uintptr(flags), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)), 0, 0) 2843 if r1 == socket_error { 2844 err = errnoErr(e1) 2845 } 2846 return 2847} 2848 2849func WSASendTo(s Handle, bufs *WSABuf, bufcnt uint32, sent *uint32, flags uint32, to *RawSockaddrAny, tolen int32, overlapped *Overlapped, croutine *byte) (err error) { 2850 r1, _, e1 := syscall.Syscall9(procWSASendTo.Addr(), 9, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(sent)), uintptr(flags), uintptr(unsafe.Pointer(to)), uintptr(tolen), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine))) 2851 if r1 == socket_error { 2852 err = errnoErr(e1) 2853 } 2854 return 2855} 2856 2857func WSAStartup(verreq uint32, data *WSAData) (sockerr error) { 2858 r0, _, _ := syscall.Syscall(procWSAStartup.Addr(), 2, uintptr(verreq), uintptr(unsafe.Pointer(data)), 0) 2859 if r0 != 0 { 2860 sockerr = syscall.Errno(r0) 2861 } 2862 return 2863} 2864 2865func bind(s Handle, name unsafe.Pointer, namelen int32) (err error) { 2866 r1, _, e1 := syscall.Syscall(procbind.Addr(), 3, uintptr(s), uintptr(name), uintptr(namelen)) 2867 if r1 == socket_error { 2868 err = errnoErr(e1) 2869 } 2870 return 2871} 2872 2873func Closesocket(s Handle) (err error) { 2874 r1, _, e1 := syscall.Syscall(procclosesocket.Addr(), 1, uintptr(s), 0, 0) 2875 if r1 == socket_error { 2876 err = errnoErr(e1) 2877 } 2878 return 2879} 2880 2881func connect(s Handle, name unsafe.Pointer, namelen int32) (err error) { 2882 r1, _, e1 := syscall.Syscall(procconnect.Addr(), 3, uintptr(s), uintptr(name), uintptr(namelen)) 2883 if r1 == socket_error { 2884 err = errnoErr(e1) 2885 } 2886 return 2887} 2888 2889func GetHostByName(name string) (h *Hostent, err error) { 2890 var _p0 *byte 2891 _p0, err = syscall.BytePtrFromString(name) 2892 if err != nil { 2893 return 2894 } 2895 return _GetHostByName(_p0) 2896} 2897 2898func _GetHostByName(name *byte) (h *Hostent, err error) { 2899 r0, _, e1 := syscall.Syscall(procgethostbyname.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0) 2900 h = (*Hostent)(unsafe.Pointer(r0)) 2901 if h == nil { 2902 err = errnoErr(e1) 2903 } 2904 return 2905} 2906 2907func getpeername(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) { 2908 r1, _, e1 := syscall.Syscall(procgetpeername.Addr(), 3, uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen))) 2909 if r1 == socket_error { 2910 err = errnoErr(e1) 2911 } 2912 return 2913} 2914 2915func GetProtoByName(name string) (p *Protoent, err error) { 2916 var _p0 *byte 2917 _p0, err = syscall.BytePtrFromString(name) 2918 if err != nil { 2919 return 2920 } 2921 return _GetProtoByName(_p0) 2922} 2923 2924func _GetProtoByName(name *byte) (p *Protoent, err error) { 2925 r0, _, e1 := syscall.Syscall(procgetprotobyname.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0) 2926 p = (*Protoent)(unsafe.Pointer(r0)) 2927 if p == nil { 2928 err = errnoErr(e1) 2929 } 2930 return 2931} 2932 2933func GetServByName(name string, proto string) (s *Servent, err error) { 2934 var _p0 *byte 2935 _p0, err = syscall.BytePtrFromString(name) 2936 if err != nil { 2937 return 2938 } 2939 var _p1 *byte 2940 _p1, err = syscall.BytePtrFromString(proto) 2941 if err != nil { 2942 return 2943 } 2944 return _GetServByName(_p0, _p1) 2945} 2946 2947func _GetServByName(name *byte, proto *byte) (s *Servent, err error) { 2948 r0, _, e1 := syscall.Syscall(procgetservbyname.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(proto)), 0) 2949 s = (*Servent)(unsafe.Pointer(r0)) 2950 if s == nil { 2951 err = errnoErr(e1) 2952 } 2953 return 2954} 2955 2956func getsockname(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) { 2957 r1, _, e1 := syscall.Syscall(procgetsockname.Addr(), 3, uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen))) 2958 if r1 == socket_error { 2959 err = errnoErr(e1) 2960 } 2961 return 2962} 2963 2964func Getsockopt(s Handle, level int32, optname int32, optval *byte, optlen *int32) (err error) { 2965 r1, _, e1 := syscall.Syscall6(procgetsockopt.Addr(), 5, uintptr(s), uintptr(level), uintptr(optname), uintptr(unsafe.Pointer(optval)), uintptr(unsafe.Pointer(optlen)), 0) 2966 if r1 == socket_error { 2967 err = errnoErr(e1) 2968 } 2969 return 2970} 2971 2972func listen(s Handle, backlog int32) (err error) { 2973 r1, _, e1 := syscall.Syscall(proclisten.Addr(), 2, uintptr(s), uintptr(backlog), 0) 2974 if r1 == socket_error { 2975 err = errnoErr(e1) 2976 } 2977 return 2978} 2979 2980func Ntohs(netshort uint16) (u uint16) { 2981 r0, _, _ := syscall.Syscall(procntohs.Addr(), 1, uintptr(netshort), 0, 0) 2982 u = uint16(r0) 2983 return 2984} 2985 2986func recvfrom(s Handle, buf []byte, flags int32, from *RawSockaddrAny, fromlen *int32) (n int32, err error) { 2987 var _p0 *byte 2988 if len(buf) > 0 { 2989 _p0 = &buf[0] 2990 } 2991 r0, _, e1 := syscall.Syscall6(procrecvfrom.Addr(), 6, uintptr(s), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(flags), uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(fromlen))) 2992 n = int32(r0) 2993 if n == -1 { 2994 err = errnoErr(e1) 2995 } 2996 return 2997} 2998 2999func sendto(s Handle, buf []byte, flags int32, to unsafe.Pointer, tolen int32) (err error) { 3000 var _p0 *byte 3001 if len(buf) > 0 { 3002 _p0 = &buf[0] 3003 } 3004 r1, _, e1 := syscall.Syscall6(procsendto.Addr(), 6, uintptr(s), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(flags), uintptr(to), uintptr(tolen)) 3005 if r1 == socket_error { 3006 err = errnoErr(e1) 3007 } 3008 return 3009} 3010 3011func Setsockopt(s Handle, level int32, optname int32, optval *byte, optlen int32) (err error) { 3012 r1, _, e1 := syscall.Syscall6(procsetsockopt.Addr(), 5, uintptr(s), uintptr(level), uintptr(optname), uintptr(unsafe.Pointer(optval)), uintptr(optlen), 0) 3013 if r1 == socket_error { 3014 err = errnoErr(e1) 3015 } 3016 return 3017} 3018 3019func shutdown(s Handle, how int32) (err error) { 3020 r1, _, e1 := syscall.Syscall(procshutdown.Addr(), 2, uintptr(s), uintptr(how), 0) 3021 if r1 == socket_error { 3022 err = errnoErr(e1) 3023 } 3024 return 3025} 3026 3027func socket(af int32, typ int32, protocol int32) (handle Handle, err error) { 3028 r0, _, e1 := syscall.Syscall(procsocket.Addr(), 3, uintptr(af), uintptr(typ), uintptr(protocol)) 3029 handle = Handle(r0) 3030 if handle == InvalidHandle { 3031 err = errnoErr(e1) 3032 } 3033 return 3034} 3035 3036func WTSEnumerateSessions(handle Handle, reserved uint32, version uint32, sessions **WTS_SESSION_INFO, count *uint32) (err error) { 3037 r1, _, e1 := syscall.Syscall6(procWTSEnumerateSessionsW.Addr(), 5, uintptr(handle), uintptr(reserved), uintptr(version), uintptr(unsafe.Pointer(sessions)), uintptr(unsafe.Pointer(count)), 0) 3038 if r1 == 0 { 3039 err = errnoErr(e1) 3040 } 3041 return 3042} 3043 3044func WTSFreeMemory(ptr uintptr) { 3045 syscall.Syscall(procWTSFreeMemory.Addr(), 1, uintptr(ptr), 0, 0) 3046 return 3047} 3048 3049func WTSQueryUserToken(session uint32, token *Token) (err error) { 3050 r1, _, e1 := syscall.Syscall(procWTSQueryUserToken.Addr(), 2, uintptr(session), uintptr(unsafe.Pointer(token)), 0) 3051 if r1 == 0 { 3052 err = errnoErr(e1) 3053 } 3054 return 3055} 3056