1// Code generated by 'go generate'; DO NOT EDIT. 2 3package windows 4 5import ( 6 "internal/syscall/windows/sysdll" 7 "syscall" 8 "unsafe" 9) 10 11var _ unsafe.Pointer 12 13// Do the interface allocations only once for common 14// Errno values. 15const ( 16 errnoERROR_IO_PENDING = 997 17) 18 19var ( 20 errERROR_IO_PENDING error = syscall.Errno(errnoERROR_IO_PENDING) 21) 22 23// errnoErr returns common boxed Errno values, to prevent 24// allocations at runtime. 25func errnoErr(e syscall.Errno) error { 26 switch e { 27 case 0: 28 return nil 29 case errnoERROR_IO_PENDING: 30 return errERROR_IO_PENDING 31 } 32 // TODO: add more here, after collecting data on the common 33 // error values see on Windows. (perhaps when running 34 // all.bat?) 35 return e 36} 37 38var ( 39 modiphlpapi = syscall.NewLazyDLL(sysdll.Add("iphlpapi.dll")) 40 modkernel32 = syscall.NewLazyDLL(sysdll.Add("kernel32.dll")) 41 modws2_32 = syscall.NewLazyDLL(sysdll.Add("ws2_32.dll")) 42 modnetapi32 = syscall.NewLazyDLL(sysdll.Add("netapi32.dll")) 43 modadvapi32 = syscall.NewLazyDLL(sysdll.Add("advapi32.dll")) 44 moduserenv = syscall.NewLazyDLL(sysdll.Add("userenv.dll")) 45 modpsapi = syscall.NewLazyDLL(sysdll.Add("psapi.dll")) 46 47 procGetAdaptersAddresses = modiphlpapi.NewProc("GetAdaptersAddresses") 48 procGetComputerNameExW = modkernel32.NewProc("GetComputerNameExW") 49 procMoveFileExW = modkernel32.NewProc("MoveFileExW") 50 procGetModuleFileNameW = modkernel32.NewProc("GetModuleFileNameW") 51 procWSASocketW = modws2_32.NewProc("WSASocketW") 52 procLockFileEx = modkernel32.NewProc("LockFileEx") 53 procUnlockFileEx = modkernel32.NewProc("UnlockFileEx") 54 procGetACP = modkernel32.NewProc("GetACP") 55 procGetConsoleCP = modkernel32.NewProc("GetConsoleCP") 56 procMultiByteToWideChar = modkernel32.NewProc("MultiByteToWideChar") 57 procGetCurrentThread = modkernel32.NewProc("GetCurrentThread") 58 procNetShareAdd = modnetapi32.NewProc("NetShareAdd") 59 procNetShareDel = modnetapi32.NewProc("NetShareDel") 60 procGetFinalPathNameByHandleW = modkernel32.NewProc("GetFinalPathNameByHandleW") 61 procImpersonateSelf = modadvapi32.NewProc("ImpersonateSelf") 62 procRevertToSelf = modadvapi32.NewProc("RevertToSelf") 63 procOpenThreadToken = modadvapi32.NewProc("OpenThreadToken") 64 procLookupPrivilegeValueW = modadvapi32.NewProc("LookupPrivilegeValueW") 65 procAdjustTokenPrivileges = modadvapi32.NewProc("AdjustTokenPrivileges") 66 procDuplicateTokenEx = modadvapi32.NewProc("DuplicateTokenEx") 67 procSetTokenInformation = modadvapi32.NewProc("SetTokenInformation") 68 procGetProfilesDirectoryW = moduserenv.NewProc("GetProfilesDirectoryW") 69 procNetUserGetLocalGroups = modnetapi32.NewProc("NetUserGetLocalGroups") 70 procGetProcessMemoryInfo = modpsapi.NewProc("GetProcessMemoryInfo") 71 procGetFileInformationByHandleEx = modkernel32.NewProc("GetFileInformationByHandleEx") 72) 73 74func GetAdaptersAddresses(family uint32, flags uint32, reserved uintptr, adapterAddresses *IpAdapterAddresses, sizePointer *uint32) (errcode error) { 75 r0, _, _ := syscall.Syscall6(procGetAdaptersAddresses.Addr(), 5, uintptr(family), uintptr(flags), uintptr(reserved), uintptr(unsafe.Pointer(adapterAddresses)), uintptr(unsafe.Pointer(sizePointer)), 0) 76 if r0 != 0 { 77 errcode = syscall.Errno(r0) 78 } 79 return 80} 81 82func GetComputerNameEx(nameformat uint32, buf *uint16, n *uint32) (err error) { 83 r1, _, e1 := syscall.Syscall(procGetComputerNameExW.Addr(), 3, uintptr(nameformat), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(n))) 84 if r1 == 0 { 85 if e1 != 0 { 86 err = errnoErr(e1) 87 } else { 88 err = syscall.EINVAL 89 } 90 } 91 return 92} 93 94func MoveFileEx(from *uint16, to *uint16, flags uint32) (err error) { 95 r1, _, e1 := syscall.Syscall(procMoveFileExW.Addr(), 3, uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(to)), uintptr(flags)) 96 if r1 == 0 { 97 if e1 != 0 { 98 err = errnoErr(e1) 99 } else { 100 err = syscall.EINVAL 101 } 102 } 103 return 104} 105 106func GetModuleFileName(module syscall.Handle, fn *uint16, len uint32) (n uint32, err error) { 107 r0, _, e1 := syscall.Syscall(procGetModuleFileNameW.Addr(), 3, uintptr(module), uintptr(unsafe.Pointer(fn)), uintptr(len)) 108 n = uint32(r0) 109 if n == 0 { 110 if e1 != 0 { 111 err = errnoErr(e1) 112 } else { 113 err = syscall.EINVAL 114 } 115 } 116 return 117} 118 119func WSASocket(af int32, typ int32, protocol int32, protinfo *syscall.WSAProtocolInfo, group uint32, flags uint32) (handle syscall.Handle, err error) { 120 r0, _, e1 := syscall.Syscall6(procWSASocketW.Addr(), 6, uintptr(af), uintptr(typ), uintptr(protocol), uintptr(unsafe.Pointer(protinfo)), uintptr(group), uintptr(flags)) 121 handle = syscall.Handle(r0) 122 if handle == syscall.InvalidHandle { 123 if e1 != 0 { 124 err = errnoErr(e1) 125 } else { 126 err = syscall.EINVAL 127 } 128 } 129 return 130} 131 132func LockFileEx(file syscall.Handle, flags uint32, reserved uint32, bytesLow uint32, bytesHigh uint32, overlapped *syscall.Overlapped) (err error) { 133 r1, _, e1 := syscall.Syscall6(procLockFileEx.Addr(), 6, uintptr(file), uintptr(flags), uintptr(reserved), uintptr(bytesLow), uintptr(bytesHigh), uintptr(unsafe.Pointer(overlapped))) 134 if r1 == 0 { 135 if e1 != 0 { 136 err = errnoErr(e1) 137 } else { 138 err = syscall.EINVAL 139 } 140 } 141 return 142} 143 144func UnlockFileEx(file syscall.Handle, reserved uint32, bytesLow uint32, bytesHigh uint32, overlapped *syscall.Overlapped) (err error) { 145 r1, _, e1 := syscall.Syscall6(procUnlockFileEx.Addr(), 5, uintptr(file), uintptr(reserved), uintptr(bytesLow), uintptr(bytesHigh), uintptr(unsafe.Pointer(overlapped)), 0) 146 if r1 == 0 { 147 if e1 != 0 { 148 err = errnoErr(e1) 149 } else { 150 err = syscall.EINVAL 151 } 152 } 153 return 154} 155 156func GetACP() (acp uint32) { 157 r0, _, _ := syscall.Syscall(procGetACP.Addr(), 0, 0, 0, 0) 158 acp = uint32(r0) 159 return 160} 161 162func GetConsoleCP() (ccp uint32) { 163 r0, _, _ := syscall.Syscall(procGetConsoleCP.Addr(), 0, 0, 0, 0) 164 ccp = uint32(r0) 165 return 166} 167 168func MultiByteToWideChar(codePage uint32, dwFlags uint32, str *byte, nstr int32, wchar *uint16, nwchar int32) (nwrite int32, err error) { 169 r0, _, e1 := syscall.Syscall6(procMultiByteToWideChar.Addr(), 6, uintptr(codePage), uintptr(dwFlags), uintptr(unsafe.Pointer(str)), uintptr(nstr), uintptr(unsafe.Pointer(wchar)), uintptr(nwchar)) 170 nwrite = int32(r0) 171 if nwrite == 0 { 172 if e1 != 0 { 173 err = errnoErr(e1) 174 } else { 175 err = syscall.EINVAL 176 } 177 } 178 return 179} 180 181func GetCurrentThread() (pseudoHandle syscall.Handle, err error) { 182 r0, _, e1 := syscall.Syscall(procGetCurrentThread.Addr(), 0, 0, 0, 0) 183 pseudoHandle = syscall.Handle(r0) 184 if pseudoHandle == 0 { 185 if e1 != 0 { 186 err = errnoErr(e1) 187 } else { 188 err = syscall.EINVAL 189 } 190 } 191 return 192} 193 194func NetShareAdd(serverName *uint16, level uint32, buf *byte, parmErr *uint16) (neterr error) { 195 r0, _, _ := syscall.Syscall6(procNetShareAdd.Addr(), 4, uintptr(unsafe.Pointer(serverName)), uintptr(level), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(parmErr)), 0, 0) 196 if r0 != 0 { 197 neterr = syscall.Errno(r0) 198 } 199 return 200} 201 202func NetShareDel(serverName *uint16, netName *uint16, reserved uint32) (neterr error) { 203 r0, _, _ := syscall.Syscall(procNetShareDel.Addr(), 3, uintptr(unsafe.Pointer(serverName)), uintptr(unsafe.Pointer(netName)), uintptr(reserved)) 204 if r0 != 0 { 205 neterr = syscall.Errno(r0) 206 } 207 return 208} 209 210func GetFinalPathNameByHandle(file syscall.Handle, filePath *uint16, filePathSize uint32, flags uint32) (n uint32, err error) { 211 r0, _, e1 := syscall.Syscall6(procGetFinalPathNameByHandleW.Addr(), 4, uintptr(file), uintptr(unsafe.Pointer(filePath)), uintptr(filePathSize), uintptr(flags), 0, 0) 212 n = uint32(r0) 213 if n == 0 { 214 if e1 != 0 { 215 err = errnoErr(e1) 216 } else { 217 err = syscall.EINVAL 218 } 219 } 220 return 221} 222 223func ImpersonateSelf(impersonationlevel uint32) (err error) { 224 r1, _, e1 := syscall.Syscall(procImpersonateSelf.Addr(), 1, uintptr(impersonationlevel), 0, 0) 225 if r1 == 0 { 226 if e1 != 0 { 227 err = errnoErr(e1) 228 } else { 229 err = syscall.EINVAL 230 } 231 } 232 return 233} 234 235func RevertToSelf() (err error) { 236 r1, _, e1 := syscall.Syscall(procRevertToSelf.Addr(), 0, 0, 0, 0) 237 if r1 == 0 { 238 if e1 != 0 { 239 err = errnoErr(e1) 240 } else { 241 err = syscall.EINVAL 242 } 243 } 244 return 245} 246 247func OpenThreadToken(h syscall.Handle, access uint32, openasself bool, token *syscall.Token) (err error) { 248 var _p0 uint32 249 if openasself { 250 _p0 = 1 251 } else { 252 _p0 = 0 253 } 254 r1, _, e1 := syscall.Syscall6(procOpenThreadToken.Addr(), 4, uintptr(h), uintptr(access), uintptr(_p0), uintptr(unsafe.Pointer(token)), 0, 0) 255 if r1 == 0 { 256 if e1 != 0 { 257 err = errnoErr(e1) 258 } else { 259 err = syscall.EINVAL 260 } 261 } 262 return 263} 264 265func LookupPrivilegeValue(systemname *uint16, name *uint16, luid *LUID) (err error) { 266 r1, _, e1 := syscall.Syscall(procLookupPrivilegeValueW.Addr(), 3, uintptr(unsafe.Pointer(systemname)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(luid))) 267 if r1 == 0 { 268 if e1 != 0 { 269 err = errnoErr(e1) 270 } else { 271 err = syscall.EINVAL 272 } 273 } 274 return 275} 276 277func adjustTokenPrivileges(token syscall.Token, disableAllPrivileges bool, newstate *TOKEN_PRIVILEGES, buflen uint32, prevstate *TOKEN_PRIVILEGES, returnlen *uint32) (ret uint32, err error) { 278 var _p0 uint32 279 if disableAllPrivileges { 280 _p0 = 1 281 } else { 282 _p0 = 0 283 } 284 r0, _, e1 := syscall.Syscall6(procAdjustTokenPrivileges.Addr(), 6, uintptr(token), uintptr(_p0), uintptr(unsafe.Pointer(newstate)), uintptr(buflen), uintptr(unsafe.Pointer(prevstate)), uintptr(unsafe.Pointer(returnlen))) 285 ret = uint32(r0) 286 if true { 287 if e1 != 0 { 288 err = errnoErr(e1) 289 } else { 290 err = syscall.EINVAL 291 } 292 } 293 return 294} 295 296func DuplicateTokenEx(hExistingToken syscall.Token, dwDesiredAccess uint32, lpTokenAttributes *syscall.SecurityAttributes, impersonationLevel uint32, tokenType TokenType, phNewToken *syscall.Token) (err error) { 297 r1, _, e1 := syscall.Syscall6(procDuplicateTokenEx.Addr(), 6, uintptr(hExistingToken), uintptr(dwDesiredAccess), uintptr(unsafe.Pointer(lpTokenAttributes)), uintptr(impersonationLevel), uintptr(tokenType), uintptr(unsafe.Pointer(phNewToken))) 298 if r1 == 0 { 299 if e1 != 0 { 300 err = errnoErr(e1) 301 } else { 302 err = syscall.EINVAL 303 } 304 } 305 return 306} 307 308func SetTokenInformation(tokenHandle syscall.Token, tokenInformationClass uint32, tokenInformation uintptr, tokenInformationLength uint32) (err error) { 309 r1, _, e1 := syscall.Syscall6(procSetTokenInformation.Addr(), 4, uintptr(tokenHandle), uintptr(tokenInformationClass), uintptr(tokenInformation), uintptr(tokenInformationLength), 0, 0) 310 if r1 == 0 { 311 if e1 != 0 { 312 err = errnoErr(e1) 313 } else { 314 err = syscall.EINVAL 315 } 316 } 317 return 318} 319 320func GetProfilesDirectory(dir *uint16, dirLen *uint32) (err error) { 321 r1, _, e1 := syscall.Syscall(procGetProfilesDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(dir)), uintptr(unsafe.Pointer(dirLen)), 0) 322 if r1 == 0 { 323 if e1 != 0 { 324 err = errnoErr(e1) 325 } else { 326 err = syscall.EINVAL 327 } 328 } 329 return 330} 331 332func NetUserGetLocalGroups(serverName *uint16, userName *uint16, level uint32, flags uint32, buf **byte, prefMaxLen uint32, entriesRead *uint32, totalEntries *uint32) (neterr error) { 333 r0, _, _ := syscall.Syscall9(procNetUserGetLocalGroups.Addr(), 8, uintptr(unsafe.Pointer(serverName)), uintptr(unsafe.Pointer(userName)), uintptr(level), uintptr(flags), uintptr(unsafe.Pointer(buf)), uintptr(prefMaxLen), uintptr(unsafe.Pointer(entriesRead)), uintptr(unsafe.Pointer(totalEntries)), 0) 334 if r0 != 0 { 335 neterr = syscall.Errno(r0) 336 } 337 return 338} 339 340func GetProcessMemoryInfo(handle syscall.Handle, memCounters *PROCESS_MEMORY_COUNTERS, cb uint32) (err error) { 341 r1, _, e1 := syscall.Syscall(procGetProcessMemoryInfo.Addr(), 3, uintptr(handle), uintptr(unsafe.Pointer(memCounters)), uintptr(cb)) 342 if r1 == 0 { 343 if e1 != 0 { 344 err = errnoErr(e1) 345 } else { 346 err = syscall.EINVAL 347 } 348 } 349 return 350} 351 352func GetFileInformationByHandleEx(handle syscall.Handle, class uint32, info *byte, bufsize uint32) (err error) { 353 r1, _, e1 := syscall.Syscall6(procGetFileInformationByHandleEx.Addr(), 4, uintptr(handle), uintptr(class), uintptr(unsafe.Pointer(info)), uintptr(bufsize), 0, 0) 354 if r1 == 0 { 355 if e1 != 0 { 356 err = errnoErr(e1) 357 } else { 358 err = syscall.EINVAL 359 } 360 } 361 return 362} 363