1// Code generated by 'go generate'; DO NOT EDIT. 2 3package windows 4 5import ( 6 "syscall" 7 "unsafe" 8) 9 10var _ unsafe.Pointer 11 12// Do the interface allocations only once for common 13// Errno values. 14const ( 15 errnoERROR_IO_PENDING = 997 16) 17 18var ( 19 errERROR_IO_PENDING error = syscall.Errno(errnoERROR_IO_PENDING) 20 errERROR_EINVAL error = syscall.EINVAL 21) 22 23// errnoErr returns common boxed Errno values, to prevent 24// allocations at runtime. 25func errnoErr(e syscall.Errno) error { 26 switch e { 27 case 0: 28 return errERROR_EINVAL 29 case errnoERROR_IO_PENDING: 30 return errERROR_IO_PENDING 31 } 32 // TODO: add more here, after collecting data on the common 33 // error values see on Windows. (perhaps when running 34 // all.bat?) 35 return e 36} 37 38var ( 39 modadvapi32 = NewLazySystemDLL("advapi32.dll") 40 modcrypt32 = NewLazySystemDLL("crypt32.dll") 41 moddnsapi = NewLazySystemDLL("dnsapi.dll") 42 modiphlpapi = NewLazySystemDLL("iphlpapi.dll") 43 modkernel32 = NewLazySystemDLL("kernel32.dll") 44 modmswsock = NewLazySystemDLL("mswsock.dll") 45 modnetapi32 = NewLazySystemDLL("netapi32.dll") 46 modntdll = NewLazySystemDLL("ntdll.dll") 47 modole32 = NewLazySystemDLL("ole32.dll") 48 modpsapi = NewLazySystemDLL("psapi.dll") 49 modsechost = NewLazySystemDLL("sechost.dll") 50 modsecur32 = NewLazySystemDLL("secur32.dll") 51 modshell32 = NewLazySystemDLL("shell32.dll") 52 moduser32 = NewLazySystemDLL("user32.dll") 53 moduserenv = NewLazySystemDLL("userenv.dll") 54 modwintrust = NewLazySystemDLL("wintrust.dll") 55 modws2_32 = NewLazySystemDLL("ws2_32.dll") 56 modwtsapi32 = NewLazySystemDLL("wtsapi32.dll") 57 58 procAdjustTokenGroups = modadvapi32.NewProc("AdjustTokenGroups") 59 procAdjustTokenPrivileges = modadvapi32.NewProc("AdjustTokenPrivileges") 60 procAllocateAndInitializeSid = modadvapi32.NewProc("AllocateAndInitializeSid") 61 procBuildSecurityDescriptorW = modadvapi32.NewProc("BuildSecurityDescriptorW") 62 procChangeServiceConfig2W = modadvapi32.NewProc("ChangeServiceConfig2W") 63 procChangeServiceConfigW = modadvapi32.NewProc("ChangeServiceConfigW") 64 procCheckTokenMembership = modadvapi32.NewProc("CheckTokenMembership") 65 procCloseServiceHandle = modadvapi32.NewProc("CloseServiceHandle") 66 procControlService = modadvapi32.NewProc("ControlService") 67 procConvertSecurityDescriptorToStringSecurityDescriptorW = modadvapi32.NewProc("ConvertSecurityDescriptorToStringSecurityDescriptorW") 68 procConvertSidToStringSidW = modadvapi32.NewProc("ConvertSidToStringSidW") 69 procConvertStringSecurityDescriptorToSecurityDescriptorW = modadvapi32.NewProc("ConvertStringSecurityDescriptorToSecurityDescriptorW") 70 procConvertStringSidToSidW = modadvapi32.NewProc("ConvertStringSidToSidW") 71 procCopySid = modadvapi32.NewProc("CopySid") 72 procCreateProcessAsUserW = modadvapi32.NewProc("CreateProcessAsUserW") 73 procCreateServiceW = modadvapi32.NewProc("CreateServiceW") 74 procCreateWellKnownSid = modadvapi32.NewProc("CreateWellKnownSid") 75 procCryptAcquireContextW = modadvapi32.NewProc("CryptAcquireContextW") 76 procCryptGenRandom = modadvapi32.NewProc("CryptGenRandom") 77 procCryptReleaseContext = modadvapi32.NewProc("CryptReleaseContext") 78 procDeleteService = modadvapi32.NewProc("DeleteService") 79 procDeregisterEventSource = modadvapi32.NewProc("DeregisterEventSource") 80 procDuplicateTokenEx = modadvapi32.NewProc("DuplicateTokenEx") 81 procEnumServicesStatusExW = modadvapi32.NewProc("EnumServicesStatusExW") 82 procEqualSid = modadvapi32.NewProc("EqualSid") 83 procFreeSid = modadvapi32.NewProc("FreeSid") 84 procGetLengthSid = modadvapi32.NewProc("GetLengthSid") 85 procGetNamedSecurityInfoW = modadvapi32.NewProc("GetNamedSecurityInfoW") 86 procGetSecurityDescriptorControl = modadvapi32.NewProc("GetSecurityDescriptorControl") 87 procGetSecurityDescriptorDacl = modadvapi32.NewProc("GetSecurityDescriptorDacl") 88 procGetSecurityDescriptorGroup = modadvapi32.NewProc("GetSecurityDescriptorGroup") 89 procGetSecurityDescriptorLength = modadvapi32.NewProc("GetSecurityDescriptorLength") 90 procGetSecurityDescriptorOwner = modadvapi32.NewProc("GetSecurityDescriptorOwner") 91 procGetSecurityDescriptorRMControl = modadvapi32.NewProc("GetSecurityDescriptorRMControl") 92 procGetSecurityDescriptorSacl = modadvapi32.NewProc("GetSecurityDescriptorSacl") 93 procGetSecurityInfo = modadvapi32.NewProc("GetSecurityInfo") 94 procGetSidIdentifierAuthority = modadvapi32.NewProc("GetSidIdentifierAuthority") 95 procGetSidSubAuthority = modadvapi32.NewProc("GetSidSubAuthority") 96 procGetSidSubAuthorityCount = modadvapi32.NewProc("GetSidSubAuthorityCount") 97 procGetTokenInformation = modadvapi32.NewProc("GetTokenInformation") 98 procImpersonateSelf = modadvapi32.NewProc("ImpersonateSelf") 99 procInitializeSecurityDescriptor = modadvapi32.NewProc("InitializeSecurityDescriptor") 100 procInitiateSystemShutdownExW = modadvapi32.NewProc("InitiateSystemShutdownExW") 101 procIsTokenRestricted = modadvapi32.NewProc("IsTokenRestricted") 102 procIsValidSecurityDescriptor = modadvapi32.NewProc("IsValidSecurityDescriptor") 103 procIsValidSid = modadvapi32.NewProc("IsValidSid") 104 procIsWellKnownSid = modadvapi32.NewProc("IsWellKnownSid") 105 procLookupAccountNameW = modadvapi32.NewProc("LookupAccountNameW") 106 procLookupAccountSidW = modadvapi32.NewProc("LookupAccountSidW") 107 procLookupPrivilegeValueW = modadvapi32.NewProc("LookupPrivilegeValueW") 108 procMakeAbsoluteSD = modadvapi32.NewProc("MakeAbsoluteSD") 109 procMakeSelfRelativeSD = modadvapi32.NewProc("MakeSelfRelativeSD") 110 procNotifyServiceStatusChangeW = modadvapi32.NewProc("NotifyServiceStatusChangeW") 111 procOpenProcessToken = modadvapi32.NewProc("OpenProcessToken") 112 procOpenSCManagerW = modadvapi32.NewProc("OpenSCManagerW") 113 procOpenServiceW = modadvapi32.NewProc("OpenServiceW") 114 procOpenThreadToken = modadvapi32.NewProc("OpenThreadToken") 115 procQueryServiceConfig2W = modadvapi32.NewProc("QueryServiceConfig2W") 116 procQueryServiceConfigW = modadvapi32.NewProc("QueryServiceConfigW") 117 procQueryServiceLockStatusW = modadvapi32.NewProc("QueryServiceLockStatusW") 118 procQueryServiceStatus = modadvapi32.NewProc("QueryServiceStatus") 119 procQueryServiceStatusEx = modadvapi32.NewProc("QueryServiceStatusEx") 120 procRegCloseKey = modadvapi32.NewProc("RegCloseKey") 121 procRegEnumKeyExW = modadvapi32.NewProc("RegEnumKeyExW") 122 procRegNotifyChangeKeyValue = modadvapi32.NewProc("RegNotifyChangeKeyValue") 123 procRegOpenKeyExW = modadvapi32.NewProc("RegOpenKeyExW") 124 procRegQueryInfoKeyW = modadvapi32.NewProc("RegQueryInfoKeyW") 125 procRegQueryValueExW = modadvapi32.NewProc("RegQueryValueExW") 126 procRegisterEventSourceW = modadvapi32.NewProc("RegisterEventSourceW") 127 procReportEventW = modadvapi32.NewProc("ReportEventW") 128 procRevertToSelf = modadvapi32.NewProc("RevertToSelf") 129 procSetEntriesInAclW = modadvapi32.NewProc("SetEntriesInAclW") 130 procSetKernelObjectSecurity = modadvapi32.NewProc("SetKernelObjectSecurity") 131 procSetNamedSecurityInfoW = modadvapi32.NewProc("SetNamedSecurityInfoW") 132 procSetSecurityDescriptorControl = modadvapi32.NewProc("SetSecurityDescriptorControl") 133 procSetSecurityDescriptorDacl = modadvapi32.NewProc("SetSecurityDescriptorDacl") 134 procSetSecurityDescriptorGroup = modadvapi32.NewProc("SetSecurityDescriptorGroup") 135 procSetSecurityDescriptorOwner = modadvapi32.NewProc("SetSecurityDescriptorOwner") 136 procSetSecurityDescriptorRMControl = modadvapi32.NewProc("SetSecurityDescriptorRMControl") 137 procSetSecurityDescriptorSacl = modadvapi32.NewProc("SetSecurityDescriptorSacl") 138 procSetSecurityInfo = modadvapi32.NewProc("SetSecurityInfo") 139 procSetServiceStatus = modadvapi32.NewProc("SetServiceStatus") 140 procSetThreadToken = modadvapi32.NewProc("SetThreadToken") 141 procSetTokenInformation = modadvapi32.NewProc("SetTokenInformation") 142 procStartServiceCtrlDispatcherW = modadvapi32.NewProc("StartServiceCtrlDispatcherW") 143 procStartServiceW = modadvapi32.NewProc("StartServiceW") 144 procCertAddCertificateContextToStore = modcrypt32.NewProc("CertAddCertificateContextToStore") 145 procCertCloseStore = modcrypt32.NewProc("CertCloseStore") 146 procCertCreateCertificateContext = modcrypt32.NewProc("CertCreateCertificateContext") 147 procCertDeleteCertificateFromStore = modcrypt32.NewProc("CertDeleteCertificateFromStore") 148 procCertDuplicateCertificateContext = modcrypt32.NewProc("CertDuplicateCertificateContext") 149 procCertEnumCertificatesInStore = modcrypt32.NewProc("CertEnumCertificatesInStore") 150 procCertFindCertificateInStore = modcrypt32.NewProc("CertFindCertificateInStore") 151 procCertFindChainInStore = modcrypt32.NewProc("CertFindChainInStore") 152 procCertFindExtension = modcrypt32.NewProc("CertFindExtension") 153 procCertFreeCertificateChain = modcrypt32.NewProc("CertFreeCertificateChain") 154 procCertFreeCertificateContext = modcrypt32.NewProc("CertFreeCertificateContext") 155 procCertGetCertificateChain = modcrypt32.NewProc("CertGetCertificateChain") 156 procCertGetNameStringW = modcrypt32.NewProc("CertGetNameStringW") 157 procCertOpenStore = modcrypt32.NewProc("CertOpenStore") 158 procCertOpenSystemStoreW = modcrypt32.NewProc("CertOpenSystemStoreW") 159 procCertVerifyCertificateChainPolicy = modcrypt32.NewProc("CertVerifyCertificateChainPolicy") 160 procCryptAcquireCertificatePrivateKey = modcrypt32.NewProc("CryptAcquireCertificatePrivateKey") 161 procCryptDecodeObject = modcrypt32.NewProc("CryptDecodeObject") 162 procCryptProtectData = modcrypt32.NewProc("CryptProtectData") 163 procCryptQueryObject = modcrypt32.NewProc("CryptQueryObject") 164 procCryptUnprotectData = modcrypt32.NewProc("CryptUnprotectData") 165 procPFXImportCertStore = modcrypt32.NewProc("PFXImportCertStore") 166 procDnsNameCompare_W = moddnsapi.NewProc("DnsNameCompare_W") 167 procDnsQuery_W = moddnsapi.NewProc("DnsQuery_W") 168 procDnsRecordListFree = moddnsapi.NewProc("DnsRecordListFree") 169 procGetAdaptersAddresses = modiphlpapi.NewProc("GetAdaptersAddresses") 170 procGetAdaptersInfo = modiphlpapi.NewProc("GetAdaptersInfo") 171 procGetIfEntry = modiphlpapi.NewProc("GetIfEntry") 172 procAssignProcessToJobObject = modkernel32.NewProc("AssignProcessToJobObject") 173 procCancelIo = modkernel32.NewProc("CancelIo") 174 procCancelIoEx = modkernel32.NewProc("CancelIoEx") 175 procCloseHandle = modkernel32.NewProc("CloseHandle") 176 procConnectNamedPipe = modkernel32.NewProc("ConnectNamedPipe") 177 procCreateDirectoryW = modkernel32.NewProc("CreateDirectoryW") 178 procCreateEventExW = modkernel32.NewProc("CreateEventExW") 179 procCreateEventW = modkernel32.NewProc("CreateEventW") 180 procCreateFileMappingW = modkernel32.NewProc("CreateFileMappingW") 181 procCreateFileW = modkernel32.NewProc("CreateFileW") 182 procCreateHardLinkW = modkernel32.NewProc("CreateHardLinkW") 183 procCreateIoCompletionPort = modkernel32.NewProc("CreateIoCompletionPort") 184 procCreateJobObjectW = modkernel32.NewProc("CreateJobObjectW") 185 procCreateMutexExW = modkernel32.NewProc("CreateMutexExW") 186 procCreateMutexW = modkernel32.NewProc("CreateMutexW") 187 procCreateNamedPipeW = modkernel32.NewProc("CreateNamedPipeW") 188 procCreatePipe = modkernel32.NewProc("CreatePipe") 189 procCreateProcessW = modkernel32.NewProc("CreateProcessW") 190 procCreateSymbolicLinkW = modkernel32.NewProc("CreateSymbolicLinkW") 191 procCreateToolhelp32Snapshot = modkernel32.NewProc("CreateToolhelp32Snapshot") 192 procDefineDosDeviceW = modkernel32.NewProc("DefineDosDeviceW") 193 procDeleteFileW = modkernel32.NewProc("DeleteFileW") 194 procDeleteProcThreadAttributeList = modkernel32.NewProc("DeleteProcThreadAttributeList") 195 procDeleteVolumeMountPointW = modkernel32.NewProc("DeleteVolumeMountPointW") 196 procDeviceIoControl = modkernel32.NewProc("DeviceIoControl") 197 procDuplicateHandle = modkernel32.NewProc("DuplicateHandle") 198 procExitProcess = modkernel32.NewProc("ExitProcess") 199 procFindClose = modkernel32.NewProc("FindClose") 200 procFindCloseChangeNotification = modkernel32.NewProc("FindCloseChangeNotification") 201 procFindFirstChangeNotificationW = modkernel32.NewProc("FindFirstChangeNotificationW") 202 procFindFirstFileW = modkernel32.NewProc("FindFirstFileW") 203 procFindFirstVolumeMountPointW = modkernel32.NewProc("FindFirstVolumeMountPointW") 204 procFindFirstVolumeW = modkernel32.NewProc("FindFirstVolumeW") 205 procFindNextChangeNotification = modkernel32.NewProc("FindNextChangeNotification") 206 procFindNextFileW = modkernel32.NewProc("FindNextFileW") 207 procFindNextVolumeMountPointW = modkernel32.NewProc("FindNextVolumeMountPointW") 208 procFindNextVolumeW = modkernel32.NewProc("FindNextVolumeW") 209 procFindResourceW = modkernel32.NewProc("FindResourceW") 210 procFindVolumeClose = modkernel32.NewProc("FindVolumeClose") 211 procFindVolumeMountPointClose = modkernel32.NewProc("FindVolumeMountPointClose") 212 procFlushFileBuffers = modkernel32.NewProc("FlushFileBuffers") 213 procFlushViewOfFile = modkernel32.NewProc("FlushViewOfFile") 214 procFormatMessageW = modkernel32.NewProc("FormatMessageW") 215 procFreeEnvironmentStringsW = modkernel32.NewProc("FreeEnvironmentStringsW") 216 procFreeLibrary = modkernel32.NewProc("FreeLibrary") 217 procGenerateConsoleCtrlEvent = modkernel32.NewProc("GenerateConsoleCtrlEvent") 218 procGetACP = modkernel32.NewProc("GetACP") 219 procGetCommTimeouts = modkernel32.NewProc("GetCommTimeouts") 220 procGetCommandLineW = modkernel32.NewProc("GetCommandLineW") 221 procGetComputerNameExW = modkernel32.NewProc("GetComputerNameExW") 222 procGetComputerNameW = modkernel32.NewProc("GetComputerNameW") 223 procGetConsoleMode = modkernel32.NewProc("GetConsoleMode") 224 procGetConsoleScreenBufferInfo = modkernel32.NewProc("GetConsoleScreenBufferInfo") 225 procGetCurrentDirectoryW = modkernel32.NewProc("GetCurrentDirectoryW") 226 procGetCurrentProcessId = modkernel32.NewProc("GetCurrentProcessId") 227 procGetCurrentThreadId = modkernel32.NewProc("GetCurrentThreadId") 228 procGetDiskFreeSpaceExW = modkernel32.NewProc("GetDiskFreeSpaceExW") 229 procGetDriveTypeW = modkernel32.NewProc("GetDriveTypeW") 230 procGetEnvironmentStringsW = modkernel32.NewProc("GetEnvironmentStringsW") 231 procGetEnvironmentVariableW = modkernel32.NewProc("GetEnvironmentVariableW") 232 procGetExitCodeProcess = modkernel32.NewProc("GetExitCodeProcess") 233 procGetFileAttributesExW = modkernel32.NewProc("GetFileAttributesExW") 234 procGetFileAttributesW = modkernel32.NewProc("GetFileAttributesW") 235 procGetFileInformationByHandle = modkernel32.NewProc("GetFileInformationByHandle") 236 procGetFileInformationByHandleEx = modkernel32.NewProc("GetFileInformationByHandleEx") 237 procGetFileType = modkernel32.NewProc("GetFileType") 238 procGetFinalPathNameByHandleW = modkernel32.NewProc("GetFinalPathNameByHandleW") 239 procGetFullPathNameW = modkernel32.NewProc("GetFullPathNameW") 240 procGetLastError = modkernel32.NewProc("GetLastError") 241 procGetLogicalDriveStringsW = modkernel32.NewProc("GetLogicalDriveStringsW") 242 procGetLogicalDrives = modkernel32.NewProc("GetLogicalDrives") 243 procGetLongPathNameW = modkernel32.NewProc("GetLongPathNameW") 244 procGetModuleFileNameW = modkernel32.NewProc("GetModuleFileNameW") 245 procGetModuleHandleExW = modkernel32.NewProc("GetModuleHandleExW") 246 procGetNamedPipeHandleStateW = modkernel32.NewProc("GetNamedPipeHandleStateW") 247 procGetNamedPipeInfo = modkernel32.NewProc("GetNamedPipeInfo") 248 procGetOverlappedResult = modkernel32.NewProc("GetOverlappedResult") 249 procGetPriorityClass = modkernel32.NewProc("GetPriorityClass") 250 procGetProcAddress = modkernel32.NewProc("GetProcAddress") 251 procGetProcessId = modkernel32.NewProc("GetProcessId") 252 procGetProcessPreferredUILanguages = modkernel32.NewProc("GetProcessPreferredUILanguages") 253 procGetProcessShutdownParameters = modkernel32.NewProc("GetProcessShutdownParameters") 254 procGetProcessTimes = modkernel32.NewProc("GetProcessTimes") 255 procGetProcessWorkingSetSizeEx = modkernel32.NewProc("GetProcessWorkingSetSizeEx") 256 procGetQueuedCompletionStatus = modkernel32.NewProc("GetQueuedCompletionStatus") 257 procGetShortPathNameW = modkernel32.NewProc("GetShortPathNameW") 258 procGetStartupInfoW = modkernel32.NewProc("GetStartupInfoW") 259 procGetStdHandle = modkernel32.NewProc("GetStdHandle") 260 procGetSystemDirectoryW = modkernel32.NewProc("GetSystemDirectoryW") 261 procGetSystemPreferredUILanguages = modkernel32.NewProc("GetSystemPreferredUILanguages") 262 procGetSystemTimeAsFileTime = modkernel32.NewProc("GetSystemTimeAsFileTime") 263 procGetSystemTimePreciseAsFileTime = modkernel32.NewProc("GetSystemTimePreciseAsFileTime") 264 procGetSystemWindowsDirectoryW = modkernel32.NewProc("GetSystemWindowsDirectoryW") 265 procGetTempPathW = modkernel32.NewProc("GetTempPathW") 266 procGetThreadPreferredUILanguages = modkernel32.NewProc("GetThreadPreferredUILanguages") 267 procGetTickCount64 = modkernel32.NewProc("GetTickCount64") 268 procGetTimeZoneInformation = modkernel32.NewProc("GetTimeZoneInformation") 269 procGetUserPreferredUILanguages = modkernel32.NewProc("GetUserPreferredUILanguages") 270 procGetVersion = modkernel32.NewProc("GetVersion") 271 procGetVolumeInformationByHandleW = modkernel32.NewProc("GetVolumeInformationByHandleW") 272 procGetVolumeInformationW = modkernel32.NewProc("GetVolumeInformationW") 273 procGetVolumeNameForVolumeMountPointW = modkernel32.NewProc("GetVolumeNameForVolumeMountPointW") 274 procGetVolumePathNameW = modkernel32.NewProc("GetVolumePathNameW") 275 procGetVolumePathNamesForVolumeNameW = modkernel32.NewProc("GetVolumePathNamesForVolumeNameW") 276 procGetWindowsDirectoryW = modkernel32.NewProc("GetWindowsDirectoryW") 277 procInitializeProcThreadAttributeList = modkernel32.NewProc("InitializeProcThreadAttributeList") 278 procIsWow64Process = modkernel32.NewProc("IsWow64Process") 279 procIsWow64Process2 = modkernel32.NewProc("IsWow64Process2") 280 procLoadLibraryExW = modkernel32.NewProc("LoadLibraryExW") 281 procLoadLibraryW = modkernel32.NewProc("LoadLibraryW") 282 procLoadResource = modkernel32.NewProc("LoadResource") 283 procLocalAlloc = modkernel32.NewProc("LocalAlloc") 284 procLocalFree = modkernel32.NewProc("LocalFree") 285 procLockFileEx = modkernel32.NewProc("LockFileEx") 286 procLockResource = modkernel32.NewProc("LockResource") 287 procMapViewOfFile = modkernel32.NewProc("MapViewOfFile") 288 procMoveFileExW = modkernel32.NewProc("MoveFileExW") 289 procMoveFileW = modkernel32.NewProc("MoveFileW") 290 procMultiByteToWideChar = modkernel32.NewProc("MultiByteToWideChar") 291 procOpenEventW = modkernel32.NewProc("OpenEventW") 292 procOpenMutexW = modkernel32.NewProc("OpenMutexW") 293 procOpenProcess = modkernel32.NewProc("OpenProcess") 294 procOpenThread = modkernel32.NewProc("OpenThread") 295 procPostQueuedCompletionStatus = modkernel32.NewProc("PostQueuedCompletionStatus") 296 procProcess32FirstW = modkernel32.NewProc("Process32FirstW") 297 procProcess32NextW = modkernel32.NewProc("Process32NextW") 298 procProcessIdToSessionId = modkernel32.NewProc("ProcessIdToSessionId") 299 procPulseEvent = modkernel32.NewProc("PulseEvent") 300 procQueryDosDeviceW = modkernel32.NewProc("QueryDosDeviceW") 301 procQueryFullProcessImageNameW = modkernel32.NewProc("QueryFullProcessImageNameW") 302 procQueryInformationJobObject = modkernel32.NewProc("QueryInformationJobObject") 303 procReadConsoleW = modkernel32.NewProc("ReadConsoleW") 304 procReadDirectoryChangesW = modkernel32.NewProc("ReadDirectoryChangesW") 305 procReadFile = modkernel32.NewProc("ReadFile") 306 procReleaseMutex = modkernel32.NewProc("ReleaseMutex") 307 procRemoveDirectoryW = modkernel32.NewProc("RemoveDirectoryW") 308 procResetEvent = modkernel32.NewProc("ResetEvent") 309 procResumeThread = modkernel32.NewProc("ResumeThread") 310 procSetCommTimeouts = modkernel32.NewProc("SetCommTimeouts") 311 procSetConsoleCursorPosition = modkernel32.NewProc("SetConsoleCursorPosition") 312 procSetConsoleMode = modkernel32.NewProc("SetConsoleMode") 313 procSetCurrentDirectoryW = modkernel32.NewProc("SetCurrentDirectoryW") 314 procSetDefaultDllDirectories = modkernel32.NewProc("SetDefaultDllDirectories") 315 procSetDllDirectoryW = modkernel32.NewProc("SetDllDirectoryW") 316 procSetEndOfFile = modkernel32.NewProc("SetEndOfFile") 317 procSetEnvironmentVariableW = modkernel32.NewProc("SetEnvironmentVariableW") 318 procSetErrorMode = modkernel32.NewProc("SetErrorMode") 319 procSetEvent = modkernel32.NewProc("SetEvent") 320 procSetFileAttributesW = modkernel32.NewProc("SetFileAttributesW") 321 procSetFileCompletionNotificationModes = modkernel32.NewProc("SetFileCompletionNotificationModes") 322 procSetFileInformationByHandle = modkernel32.NewProc("SetFileInformationByHandle") 323 procSetFilePointer = modkernel32.NewProc("SetFilePointer") 324 procSetFileTime = modkernel32.NewProc("SetFileTime") 325 procSetHandleInformation = modkernel32.NewProc("SetHandleInformation") 326 procSetInformationJobObject = modkernel32.NewProc("SetInformationJobObject") 327 procSetNamedPipeHandleState = modkernel32.NewProc("SetNamedPipeHandleState") 328 procSetPriorityClass = modkernel32.NewProc("SetPriorityClass") 329 procSetProcessPriorityBoost = modkernel32.NewProc("SetProcessPriorityBoost") 330 procSetProcessShutdownParameters = modkernel32.NewProc("SetProcessShutdownParameters") 331 procSetProcessWorkingSetSizeEx = modkernel32.NewProc("SetProcessWorkingSetSizeEx") 332 procSetStdHandle = modkernel32.NewProc("SetStdHandle") 333 procSetVolumeLabelW = modkernel32.NewProc("SetVolumeLabelW") 334 procSetVolumeMountPointW = modkernel32.NewProc("SetVolumeMountPointW") 335 procSizeofResource = modkernel32.NewProc("SizeofResource") 336 procSleepEx = modkernel32.NewProc("SleepEx") 337 procTerminateJobObject = modkernel32.NewProc("TerminateJobObject") 338 procTerminateProcess = modkernel32.NewProc("TerminateProcess") 339 procThread32First = modkernel32.NewProc("Thread32First") 340 procThread32Next = modkernel32.NewProc("Thread32Next") 341 procUnlockFileEx = modkernel32.NewProc("UnlockFileEx") 342 procUnmapViewOfFile = modkernel32.NewProc("UnmapViewOfFile") 343 procUpdateProcThreadAttribute = modkernel32.NewProc("UpdateProcThreadAttribute") 344 procVirtualAlloc = modkernel32.NewProc("VirtualAlloc") 345 procVirtualFree = modkernel32.NewProc("VirtualFree") 346 procVirtualLock = modkernel32.NewProc("VirtualLock") 347 procVirtualProtect = modkernel32.NewProc("VirtualProtect") 348 procVirtualUnlock = modkernel32.NewProc("VirtualUnlock") 349 procWTSGetActiveConsoleSessionId = modkernel32.NewProc("WTSGetActiveConsoleSessionId") 350 procWaitForMultipleObjects = modkernel32.NewProc("WaitForMultipleObjects") 351 procWaitForSingleObject = modkernel32.NewProc("WaitForSingleObject") 352 procWriteConsoleW = modkernel32.NewProc("WriteConsoleW") 353 procWriteFile = modkernel32.NewProc("WriteFile") 354 procAcceptEx = modmswsock.NewProc("AcceptEx") 355 procGetAcceptExSockaddrs = modmswsock.NewProc("GetAcceptExSockaddrs") 356 procTransmitFile = modmswsock.NewProc("TransmitFile") 357 procNetApiBufferFree = modnetapi32.NewProc("NetApiBufferFree") 358 procNetGetJoinInformation = modnetapi32.NewProc("NetGetJoinInformation") 359 procNetUserGetInfo = modnetapi32.NewProc("NetUserGetInfo") 360 procNtCreateFile = modntdll.NewProc("NtCreateFile") 361 procNtCreateNamedPipeFile = modntdll.NewProc("NtCreateNamedPipeFile") 362 procNtQueryInformationProcess = modntdll.NewProc("NtQueryInformationProcess") 363 procNtSetInformationProcess = modntdll.NewProc("NtSetInformationProcess") 364 procRtlDefaultNpAcl = modntdll.NewProc("RtlDefaultNpAcl") 365 procRtlDosPathNameToNtPathName_U_WithStatus = modntdll.NewProc("RtlDosPathNameToNtPathName_U_WithStatus") 366 procRtlDosPathNameToRelativeNtPathName_U_WithStatus = modntdll.NewProc("RtlDosPathNameToRelativeNtPathName_U_WithStatus") 367 procRtlGetCurrentPeb = modntdll.NewProc("RtlGetCurrentPeb") 368 procRtlGetNtVersionNumbers = modntdll.NewProc("RtlGetNtVersionNumbers") 369 procRtlGetVersion = modntdll.NewProc("RtlGetVersion") 370 procRtlInitString = modntdll.NewProc("RtlInitString") 371 procRtlInitUnicodeString = modntdll.NewProc("RtlInitUnicodeString") 372 procRtlNtStatusToDosErrorNoTeb = modntdll.NewProc("RtlNtStatusToDosErrorNoTeb") 373 procCLSIDFromString = modole32.NewProc("CLSIDFromString") 374 procCoCreateGuid = modole32.NewProc("CoCreateGuid") 375 procCoGetObject = modole32.NewProc("CoGetObject") 376 procCoInitializeEx = modole32.NewProc("CoInitializeEx") 377 procCoTaskMemFree = modole32.NewProc("CoTaskMemFree") 378 procCoUninitialize = modole32.NewProc("CoUninitialize") 379 procStringFromGUID2 = modole32.NewProc("StringFromGUID2") 380 procEnumProcessModules = modpsapi.NewProc("EnumProcessModules") 381 procEnumProcessModulesEx = modpsapi.NewProc("EnumProcessModulesEx") 382 procEnumProcesses = modpsapi.NewProc("EnumProcesses") 383 procGetModuleBaseNameW = modpsapi.NewProc("GetModuleBaseNameW") 384 procGetModuleFileNameExW = modpsapi.NewProc("GetModuleFileNameExW") 385 procGetModuleInformation = modpsapi.NewProc("GetModuleInformation") 386 procSubscribeServiceChangeNotifications = modsechost.NewProc("SubscribeServiceChangeNotifications") 387 procUnsubscribeServiceChangeNotifications = modsechost.NewProc("UnsubscribeServiceChangeNotifications") 388 procGetUserNameExW = modsecur32.NewProc("GetUserNameExW") 389 procTranslateNameW = modsecur32.NewProc("TranslateNameW") 390 procCommandLineToArgvW = modshell32.NewProc("CommandLineToArgvW") 391 procSHGetKnownFolderPath = modshell32.NewProc("SHGetKnownFolderPath") 392 procShellExecuteW = modshell32.NewProc("ShellExecuteW") 393 procExitWindowsEx = moduser32.NewProc("ExitWindowsEx") 394 procGetShellWindow = moduser32.NewProc("GetShellWindow") 395 procGetWindowThreadProcessId = moduser32.NewProc("GetWindowThreadProcessId") 396 procMessageBoxW = moduser32.NewProc("MessageBoxW") 397 procCreateEnvironmentBlock = moduserenv.NewProc("CreateEnvironmentBlock") 398 procDestroyEnvironmentBlock = moduserenv.NewProc("DestroyEnvironmentBlock") 399 procGetUserProfileDirectoryW = moduserenv.NewProc("GetUserProfileDirectoryW") 400 procWinVerifyTrustEx = modwintrust.NewProc("WinVerifyTrustEx") 401 procFreeAddrInfoW = modws2_32.NewProc("FreeAddrInfoW") 402 procGetAddrInfoW = modws2_32.NewProc("GetAddrInfoW") 403 procWSACleanup = modws2_32.NewProc("WSACleanup") 404 procWSAEnumProtocolsW = modws2_32.NewProc("WSAEnumProtocolsW") 405 procWSAGetOverlappedResult = modws2_32.NewProc("WSAGetOverlappedResult") 406 procWSAIoctl = modws2_32.NewProc("WSAIoctl") 407 procWSARecv = modws2_32.NewProc("WSARecv") 408 procWSARecvFrom = modws2_32.NewProc("WSARecvFrom") 409 procWSASend = modws2_32.NewProc("WSASend") 410 procWSASendTo = modws2_32.NewProc("WSASendTo") 411 procWSASocketW = modws2_32.NewProc("WSASocketW") 412 procWSAStartup = modws2_32.NewProc("WSAStartup") 413 procbind = modws2_32.NewProc("bind") 414 procclosesocket = modws2_32.NewProc("closesocket") 415 procconnect = modws2_32.NewProc("connect") 416 procgethostbyname = modws2_32.NewProc("gethostbyname") 417 procgetpeername = modws2_32.NewProc("getpeername") 418 procgetprotobyname = modws2_32.NewProc("getprotobyname") 419 procgetservbyname = modws2_32.NewProc("getservbyname") 420 procgetsockname = modws2_32.NewProc("getsockname") 421 procgetsockopt = modws2_32.NewProc("getsockopt") 422 proclisten = modws2_32.NewProc("listen") 423 procntohs = modws2_32.NewProc("ntohs") 424 procrecvfrom = modws2_32.NewProc("recvfrom") 425 procsendto = modws2_32.NewProc("sendto") 426 procsetsockopt = modws2_32.NewProc("setsockopt") 427 procshutdown = modws2_32.NewProc("shutdown") 428 procsocket = modws2_32.NewProc("socket") 429 procWTSEnumerateSessionsW = modwtsapi32.NewProc("WTSEnumerateSessionsW") 430 procWTSFreeMemory = modwtsapi32.NewProc("WTSFreeMemory") 431 procWTSQueryUserToken = modwtsapi32.NewProc("WTSQueryUserToken") 432) 433 434func AdjustTokenGroups(token Token, resetToDefault bool, newstate *Tokengroups, buflen uint32, prevstate *Tokengroups, returnlen *uint32) (err error) { 435 var _p0 uint32 436 if resetToDefault { 437 _p0 = 1 438 } 439 r1, _, e1 := syscall.Syscall6(procAdjustTokenGroups.Addr(), 6, uintptr(token), uintptr(_p0), uintptr(unsafe.Pointer(newstate)), uintptr(buflen), uintptr(unsafe.Pointer(prevstate)), uintptr(unsafe.Pointer(returnlen))) 440 if r1 == 0 { 441 err = errnoErr(e1) 442 } 443 return 444} 445 446func AdjustTokenPrivileges(token Token, disableAllPrivileges bool, newstate *Tokenprivileges, buflen uint32, prevstate *Tokenprivileges, returnlen *uint32) (err error) { 447 var _p0 uint32 448 if disableAllPrivileges { 449 _p0 = 1 450 } 451 r1, _, e1 := syscall.Syscall6(procAdjustTokenPrivileges.Addr(), 6, uintptr(token), uintptr(_p0), uintptr(unsafe.Pointer(newstate)), uintptr(buflen), uintptr(unsafe.Pointer(prevstate)), uintptr(unsafe.Pointer(returnlen))) 452 if r1 == 0 { 453 err = errnoErr(e1) 454 } 455 return 456} 457 458func AllocateAndInitializeSid(identAuth *SidIdentifierAuthority, subAuth byte, subAuth0 uint32, subAuth1 uint32, subAuth2 uint32, subAuth3 uint32, subAuth4 uint32, subAuth5 uint32, subAuth6 uint32, subAuth7 uint32, sid **SID) (err error) { 459 r1, _, e1 := syscall.Syscall12(procAllocateAndInitializeSid.Addr(), 11, uintptr(unsafe.Pointer(identAuth)), uintptr(subAuth), uintptr(subAuth0), uintptr(subAuth1), uintptr(subAuth2), uintptr(subAuth3), uintptr(subAuth4), uintptr(subAuth5), uintptr(subAuth6), uintptr(subAuth7), uintptr(unsafe.Pointer(sid)), 0) 460 if r1 == 0 { 461 err = errnoErr(e1) 462 } 463 return 464} 465 466func buildSecurityDescriptor(owner *TRUSTEE, group *TRUSTEE, countAccessEntries uint32, accessEntries *EXPLICIT_ACCESS, countAuditEntries uint32, auditEntries *EXPLICIT_ACCESS, oldSecurityDescriptor *SECURITY_DESCRIPTOR, sizeNewSecurityDescriptor *uint32, newSecurityDescriptor **SECURITY_DESCRIPTOR) (ret error) { 467 r0, _, _ := syscall.Syscall9(procBuildSecurityDescriptorW.Addr(), 9, uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(countAccessEntries), uintptr(unsafe.Pointer(accessEntries)), uintptr(countAuditEntries), uintptr(unsafe.Pointer(auditEntries)), uintptr(unsafe.Pointer(oldSecurityDescriptor)), uintptr(unsafe.Pointer(sizeNewSecurityDescriptor)), uintptr(unsafe.Pointer(newSecurityDescriptor))) 468 if r0 != 0 { 469 ret = syscall.Errno(r0) 470 } 471 return 472} 473 474func ChangeServiceConfig2(service Handle, infoLevel uint32, info *byte) (err error) { 475 r1, _, e1 := syscall.Syscall(procChangeServiceConfig2W.Addr(), 3, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(info))) 476 if r1 == 0 { 477 err = errnoErr(e1) 478 } 479 return 480} 481 482func ChangeServiceConfig(service Handle, serviceType uint32, startType uint32, errorControl uint32, binaryPathName *uint16, loadOrderGroup *uint16, tagId *uint32, dependencies *uint16, serviceStartName *uint16, password *uint16, displayName *uint16) (err error) { 483 r1, _, e1 := syscall.Syscall12(procChangeServiceConfigW.Addr(), 11, uintptr(service), uintptr(serviceType), uintptr(startType), uintptr(errorControl), uintptr(unsafe.Pointer(binaryPathName)), uintptr(unsafe.Pointer(loadOrderGroup)), uintptr(unsafe.Pointer(tagId)), uintptr(unsafe.Pointer(dependencies)), uintptr(unsafe.Pointer(serviceStartName)), uintptr(unsafe.Pointer(password)), uintptr(unsafe.Pointer(displayName)), 0) 484 if r1 == 0 { 485 err = errnoErr(e1) 486 } 487 return 488} 489 490func checkTokenMembership(tokenHandle Token, sidToCheck *SID, isMember *int32) (err error) { 491 r1, _, e1 := syscall.Syscall(procCheckTokenMembership.Addr(), 3, uintptr(tokenHandle), uintptr(unsafe.Pointer(sidToCheck)), uintptr(unsafe.Pointer(isMember))) 492 if r1 == 0 { 493 err = errnoErr(e1) 494 } 495 return 496} 497 498func CloseServiceHandle(handle Handle) (err error) { 499 r1, _, e1 := syscall.Syscall(procCloseServiceHandle.Addr(), 1, uintptr(handle), 0, 0) 500 if r1 == 0 { 501 err = errnoErr(e1) 502 } 503 return 504} 505 506func ControlService(service Handle, control uint32, status *SERVICE_STATUS) (err error) { 507 r1, _, e1 := syscall.Syscall(procControlService.Addr(), 3, uintptr(service), uintptr(control), uintptr(unsafe.Pointer(status))) 508 if r1 == 0 { 509 err = errnoErr(e1) 510 } 511 return 512} 513 514func convertSecurityDescriptorToStringSecurityDescriptor(sd *SECURITY_DESCRIPTOR, revision uint32, securityInformation SECURITY_INFORMATION, str **uint16, strLen *uint32) (err error) { 515 r1, _, e1 := syscall.Syscall6(procConvertSecurityDescriptorToStringSecurityDescriptorW.Addr(), 5, uintptr(unsafe.Pointer(sd)), uintptr(revision), uintptr(securityInformation), uintptr(unsafe.Pointer(str)), uintptr(unsafe.Pointer(strLen)), 0) 516 if r1 == 0 { 517 err = errnoErr(e1) 518 } 519 return 520} 521 522func ConvertSidToStringSid(sid *SID, stringSid **uint16) (err error) { 523 r1, _, e1 := syscall.Syscall(procConvertSidToStringSidW.Addr(), 2, uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(stringSid)), 0) 524 if r1 == 0 { 525 err = errnoErr(e1) 526 } 527 return 528} 529 530func convertStringSecurityDescriptorToSecurityDescriptor(str string, revision uint32, sd **SECURITY_DESCRIPTOR, size *uint32) (err error) { 531 var _p0 *uint16 532 _p0, err = syscall.UTF16PtrFromString(str) 533 if err != nil { 534 return 535 } 536 return _convertStringSecurityDescriptorToSecurityDescriptor(_p0, revision, sd, size) 537} 538 539func _convertStringSecurityDescriptorToSecurityDescriptor(str *uint16, revision uint32, sd **SECURITY_DESCRIPTOR, size *uint32) (err error) { 540 r1, _, e1 := syscall.Syscall6(procConvertStringSecurityDescriptorToSecurityDescriptorW.Addr(), 4, uintptr(unsafe.Pointer(str)), uintptr(revision), uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(size)), 0, 0) 541 if r1 == 0 { 542 err = errnoErr(e1) 543 } 544 return 545} 546 547func ConvertStringSidToSid(stringSid *uint16, sid **SID) (err error) { 548 r1, _, e1 := syscall.Syscall(procConvertStringSidToSidW.Addr(), 2, uintptr(unsafe.Pointer(stringSid)), uintptr(unsafe.Pointer(sid)), 0) 549 if r1 == 0 { 550 err = errnoErr(e1) 551 } 552 return 553} 554 555func CopySid(destSidLen uint32, destSid *SID, srcSid *SID) (err error) { 556 r1, _, e1 := syscall.Syscall(procCopySid.Addr(), 3, uintptr(destSidLen), uintptr(unsafe.Pointer(destSid)), uintptr(unsafe.Pointer(srcSid))) 557 if r1 == 0 { 558 err = errnoErr(e1) 559 } 560 return 561} 562 563func CreateProcessAsUser(token Token, appName *uint16, commandLine *uint16, procSecurity *SecurityAttributes, threadSecurity *SecurityAttributes, inheritHandles bool, creationFlags uint32, env *uint16, currentDir *uint16, startupInfo *StartupInfo, outProcInfo *ProcessInformation) (err error) { 564 var _p0 uint32 565 if inheritHandles { 566 _p0 = 1 567 } 568 r1, _, e1 := syscall.Syscall12(procCreateProcessAsUserW.Addr(), 11, uintptr(token), uintptr(unsafe.Pointer(appName)), uintptr(unsafe.Pointer(commandLine)), uintptr(unsafe.Pointer(procSecurity)), uintptr(unsafe.Pointer(threadSecurity)), uintptr(_p0), uintptr(creationFlags), uintptr(unsafe.Pointer(env)), uintptr(unsafe.Pointer(currentDir)), uintptr(unsafe.Pointer(startupInfo)), uintptr(unsafe.Pointer(outProcInfo)), 0) 569 if r1 == 0 { 570 err = errnoErr(e1) 571 } 572 return 573} 574 575func CreateService(mgr Handle, serviceName *uint16, displayName *uint16, access uint32, srvType uint32, startType uint32, errCtl uint32, pathName *uint16, loadOrderGroup *uint16, tagId *uint32, dependencies *uint16, serviceStartName *uint16, password *uint16) (handle Handle, err error) { 576 r0, _, e1 := syscall.Syscall15(procCreateServiceW.Addr(), 13, uintptr(mgr), uintptr(unsafe.Pointer(serviceName)), uintptr(unsafe.Pointer(displayName)), uintptr(access), uintptr(srvType), uintptr(startType), uintptr(errCtl), uintptr(unsafe.Pointer(pathName)), uintptr(unsafe.Pointer(loadOrderGroup)), uintptr(unsafe.Pointer(tagId)), uintptr(unsafe.Pointer(dependencies)), uintptr(unsafe.Pointer(serviceStartName)), uintptr(unsafe.Pointer(password)), 0, 0) 577 handle = Handle(r0) 578 if handle == 0 { 579 err = errnoErr(e1) 580 } 581 return 582} 583 584func createWellKnownSid(sidType WELL_KNOWN_SID_TYPE, domainSid *SID, sid *SID, sizeSid *uint32) (err error) { 585 r1, _, e1 := syscall.Syscall6(procCreateWellKnownSid.Addr(), 4, uintptr(sidType), uintptr(unsafe.Pointer(domainSid)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(sizeSid)), 0, 0) 586 if r1 == 0 { 587 err = errnoErr(e1) 588 } 589 return 590} 591 592func CryptAcquireContext(provhandle *Handle, container *uint16, provider *uint16, provtype uint32, flags uint32) (err error) { 593 r1, _, e1 := syscall.Syscall6(procCryptAcquireContextW.Addr(), 5, uintptr(unsafe.Pointer(provhandle)), uintptr(unsafe.Pointer(container)), uintptr(unsafe.Pointer(provider)), uintptr(provtype), uintptr(flags), 0) 594 if r1 == 0 { 595 err = errnoErr(e1) 596 } 597 return 598} 599 600func CryptGenRandom(provhandle Handle, buflen uint32, buf *byte) (err error) { 601 r1, _, e1 := syscall.Syscall(procCryptGenRandom.Addr(), 3, uintptr(provhandle), uintptr(buflen), uintptr(unsafe.Pointer(buf))) 602 if r1 == 0 { 603 err = errnoErr(e1) 604 } 605 return 606} 607 608func CryptReleaseContext(provhandle Handle, flags uint32) (err error) { 609 r1, _, e1 := syscall.Syscall(procCryptReleaseContext.Addr(), 2, uintptr(provhandle), uintptr(flags), 0) 610 if r1 == 0 { 611 err = errnoErr(e1) 612 } 613 return 614} 615 616func DeleteService(service Handle) (err error) { 617 r1, _, e1 := syscall.Syscall(procDeleteService.Addr(), 1, uintptr(service), 0, 0) 618 if r1 == 0 { 619 err = errnoErr(e1) 620 } 621 return 622} 623 624func DeregisterEventSource(handle Handle) (err error) { 625 r1, _, e1 := syscall.Syscall(procDeregisterEventSource.Addr(), 1, uintptr(handle), 0, 0) 626 if r1 == 0 { 627 err = errnoErr(e1) 628 } 629 return 630} 631 632func DuplicateTokenEx(existingToken Token, desiredAccess uint32, tokenAttributes *SecurityAttributes, impersonationLevel uint32, tokenType uint32, newToken *Token) (err error) { 633 r1, _, e1 := syscall.Syscall6(procDuplicateTokenEx.Addr(), 6, uintptr(existingToken), uintptr(desiredAccess), uintptr(unsafe.Pointer(tokenAttributes)), uintptr(impersonationLevel), uintptr(tokenType), uintptr(unsafe.Pointer(newToken))) 634 if r1 == 0 { 635 err = errnoErr(e1) 636 } 637 return 638} 639 640func EnumServicesStatusEx(mgr Handle, infoLevel uint32, serviceType uint32, serviceState uint32, services *byte, bufSize uint32, bytesNeeded *uint32, servicesReturned *uint32, resumeHandle *uint32, groupName *uint16) (err error) { 641 r1, _, e1 := syscall.Syscall12(procEnumServicesStatusExW.Addr(), 10, uintptr(mgr), uintptr(infoLevel), uintptr(serviceType), uintptr(serviceState), uintptr(unsafe.Pointer(services)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), uintptr(unsafe.Pointer(servicesReturned)), uintptr(unsafe.Pointer(resumeHandle)), uintptr(unsafe.Pointer(groupName)), 0, 0) 642 if r1 == 0 { 643 err = errnoErr(e1) 644 } 645 return 646} 647 648func EqualSid(sid1 *SID, sid2 *SID) (isEqual bool) { 649 r0, _, _ := syscall.Syscall(procEqualSid.Addr(), 2, uintptr(unsafe.Pointer(sid1)), uintptr(unsafe.Pointer(sid2)), 0) 650 isEqual = r0 != 0 651 return 652} 653 654func FreeSid(sid *SID) (err error) { 655 r1, _, e1 := syscall.Syscall(procFreeSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 656 if r1 != 0 { 657 err = errnoErr(e1) 658 } 659 return 660} 661 662func GetLengthSid(sid *SID) (len uint32) { 663 r0, _, _ := syscall.Syscall(procGetLengthSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 664 len = uint32(r0) 665 return 666} 667 668func getNamedSecurityInfo(objectName string, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner **SID, group **SID, dacl **ACL, sacl **ACL, sd **SECURITY_DESCRIPTOR) (ret error) { 669 var _p0 *uint16 670 _p0, ret = syscall.UTF16PtrFromString(objectName) 671 if ret != nil { 672 return 673 } 674 return _getNamedSecurityInfo(_p0, objectType, securityInformation, owner, group, dacl, sacl, sd) 675} 676 677func _getNamedSecurityInfo(objectName *uint16, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner **SID, group **SID, dacl **ACL, sacl **ACL, sd **SECURITY_DESCRIPTOR) (ret error) { 678 r0, _, _ := syscall.Syscall9(procGetNamedSecurityInfoW.Addr(), 8, uintptr(unsafe.Pointer(objectName)), uintptr(objectType), uintptr(securityInformation), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(sacl)), uintptr(unsafe.Pointer(sd)), 0) 679 if r0 != 0 { 680 ret = syscall.Errno(r0) 681 } 682 return 683} 684 685func getSecurityDescriptorControl(sd *SECURITY_DESCRIPTOR, control *SECURITY_DESCRIPTOR_CONTROL, revision *uint32) (err error) { 686 r1, _, e1 := syscall.Syscall(procGetSecurityDescriptorControl.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(control)), uintptr(unsafe.Pointer(revision))) 687 if r1 == 0 { 688 err = errnoErr(e1) 689 } 690 return 691} 692 693func getSecurityDescriptorDacl(sd *SECURITY_DESCRIPTOR, daclPresent *bool, dacl **ACL, daclDefaulted *bool) (err error) { 694 var _p0 uint32 695 if *daclPresent { 696 _p0 = 1 697 } 698 var _p1 uint32 699 if *daclDefaulted { 700 _p1 = 1 701 } 702 r1, _, e1 := syscall.Syscall6(procGetSecurityDescriptorDacl.Addr(), 4, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(&_p0)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(&_p1)), 0, 0) 703 *daclPresent = _p0 != 0 704 *daclDefaulted = _p1 != 0 705 if r1 == 0 { 706 err = errnoErr(e1) 707 } 708 return 709} 710 711func getSecurityDescriptorGroup(sd *SECURITY_DESCRIPTOR, group **SID, groupDefaulted *bool) (err error) { 712 var _p0 uint32 713 if *groupDefaulted { 714 _p0 = 1 715 } 716 r1, _, e1 := syscall.Syscall(procGetSecurityDescriptorGroup.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(&_p0))) 717 *groupDefaulted = _p0 != 0 718 if r1 == 0 { 719 err = errnoErr(e1) 720 } 721 return 722} 723 724func getSecurityDescriptorLength(sd *SECURITY_DESCRIPTOR) (len uint32) { 725 r0, _, _ := syscall.Syscall(procGetSecurityDescriptorLength.Addr(), 1, uintptr(unsafe.Pointer(sd)), 0, 0) 726 len = uint32(r0) 727 return 728} 729 730func getSecurityDescriptorOwner(sd *SECURITY_DESCRIPTOR, owner **SID, ownerDefaulted *bool) (err error) { 731 var _p0 uint32 732 if *ownerDefaulted { 733 _p0 = 1 734 } 735 r1, _, e1 := syscall.Syscall(procGetSecurityDescriptorOwner.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(&_p0))) 736 *ownerDefaulted = _p0 != 0 737 if r1 == 0 { 738 err = errnoErr(e1) 739 } 740 return 741} 742 743func getSecurityDescriptorRMControl(sd *SECURITY_DESCRIPTOR, rmControl *uint8) (ret error) { 744 r0, _, _ := syscall.Syscall(procGetSecurityDescriptorRMControl.Addr(), 2, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(rmControl)), 0) 745 if r0 != 0 { 746 ret = syscall.Errno(r0) 747 } 748 return 749} 750 751func getSecurityDescriptorSacl(sd *SECURITY_DESCRIPTOR, saclPresent *bool, sacl **ACL, saclDefaulted *bool) (err error) { 752 var _p0 uint32 753 if *saclPresent { 754 _p0 = 1 755 } 756 var _p1 uint32 757 if *saclDefaulted { 758 _p1 = 1 759 } 760 r1, _, e1 := syscall.Syscall6(procGetSecurityDescriptorSacl.Addr(), 4, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(&_p0)), uintptr(unsafe.Pointer(sacl)), uintptr(unsafe.Pointer(&_p1)), 0, 0) 761 *saclPresent = _p0 != 0 762 *saclDefaulted = _p1 != 0 763 if r1 == 0 { 764 err = errnoErr(e1) 765 } 766 return 767} 768 769func getSecurityInfo(handle Handle, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner **SID, group **SID, dacl **ACL, sacl **ACL, sd **SECURITY_DESCRIPTOR) (ret error) { 770 r0, _, _ := syscall.Syscall9(procGetSecurityInfo.Addr(), 8, uintptr(handle), uintptr(objectType), uintptr(securityInformation), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(sacl)), uintptr(unsafe.Pointer(sd)), 0) 771 if r0 != 0 { 772 ret = syscall.Errno(r0) 773 } 774 return 775} 776 777func getSidIdentifierAuthority(sid *SID) (authority *SidIdentifierAuthority) { 778 r0, _, _ := syscall.Syscall(procGetSidIdentifierAuthority.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 779 authority = (*SidIdentifierAuthority)(unsafe.Pointer(r0)) 780 return 781} 782 783func getSidSubAuthority(sid *SID, index uint32) (subAuthority *uint32) { 784 r0, _, _ := syscall.Syscall(procGetSidSubAuthority.Addr(), 2, uintptr(unsafe.Pointer(sid)), uintptr(index), 0) 785 subAuthority = (*uint32)(unsafe.Pointer(r0)) 786 return 787} 788 789func getSidSubAuthorityCount(sid *SID) (count *uint8) { 790 r0, _, _ := syscall.Syscall(procGetSidSubAuthorityCount.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 791 count = (*uint8)(unsafe.Pointer(r0)) 792 return 793} 794 795func GetTokenInformation(token Token, infoClass uint32, info *byte, infoLen uint32, returnedLen *uint32) (err error) { 796 r1, _, e1 := syscall.Syscall6(procGetTokenInformation.Addr(), 5, uintptr(token), uintptr(infoClass), uintptr(unsafe.Pointer(info)), uintptr(infoLen), uintptr(unsafe.Pointer(returnedLen)), 0) 797 if r1 == 0 { 798 err = errnoErr(e1) 799 } 800 return 801} 802 803func ImpersonateSelf(impersonationlevel uint32) (err error) { 804 r1, _, e1 := syscall.Syscall(procImpersonateSelf.Addr(), 1, uintptr(impersonationlevel), 0, 0) 805 if r1 == 0 { 806 err = errnoErr(e1) 807 } 808 return 809} 810 811func initializeSecurityDescriptor(absoluteSD *SECURITY_DESCRIPTOR, revision uint32) (err error) { 812 r1, _, e1 := syscall.Syscall(procInitializeSecurityDescriptor.Addr(), 2, uintptr(unsafe.Pointer(absoluteSD)), uintptr(revision), 0) 813 if r1 == 0 { 814 err = errnoErr(e1) 815 } 816 return 817} 818 819func InitiateSystemShutdownEx(machineName *uint16, message *uint16, timeout uint32, forceAppsClosed bool, rebootAfterShutdown bool, reason uint32) (err error) { 820 var _p0 uint32 821 if forceAppsClosed { 822 _p0 = 1 823 } 824 var _p1 uint32 825 if rebootAfterShutdown { 826 _p1 = 1 827 } 828 r1, _, e1 := syscall.Syscall6(procInitiateSystemShutdownExW.Addr(), 6, uintptr(unsafe.Pointer(machineName)), uintptr(unsafe.Pointer(message)), uintptr(timeout), uintptr(_p0), uintptr(_p1), uintptr(reason)) 829 if r1 == 0 { 830 err = errnoErr(e1) 831 } 832 return 833} 834 835func isTokenRestricted(tokenHandle Token) (ret bool, err error) { 836 r0, _, e1 := syscall.Syscall(procIsTokenRestricted.Addr(), 1, uintptr(tokenHandle), 0, 0) 837 ret = r0 != 0 838 if !ret { 839 err = errnoErr(e1) 840 } 841 return 842} 843 844func isValidSecurityDescriptor(sd *SECURITY_DESCRIPTOR) (isValid bool) { 845 r0, _, _ := syscall.Syscall(procIsValidSecurityDescriptor.Addr(), 1, uintptr(unsafe.Pointer(sd)), 0, 0) 846 isValid = r0 != 0 847 return 848} 849 850func isValidSid(sid *SID) (isValid bool) { 851 r0, _, _ := syscall.Syscall(procIsValidSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0) 852 isValid = r0 != 0 853 return 854} 855 856func isWellKnownSid(sid *SID, sidType WELL_KNOWN_SID_TYPE) (isWellKnown bool) { 857 r0, _, _ := syscall.Syscall(procIsWellKnownSid.Addr(), 2, uintptr(unsafe.Pointer(sid)), uintptr(sidType), 0) 858 isWellKnown = r0 != 0 859 return 860} 861 862func LookupAccountName(systemName *uint16, accountName *uint16, sid *SID, sidLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) { 863 r1, _, e1 := syscall.Syscall9(procLookupAccountNameW.Addr(), 7, uintptr(unsafe.Pointer(systemName)), uintptr(unsafe.Pointer(accountName)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(sidLen)), uintptr(unsafe.Pointer(refdDomainName)), uintptr(unsafe.Pointer(refdDomainNameLen)), uintptr(unsafe.Pointer(use)), 0, 0) 864 if r1 == 0 { 865 err = errnoErr(e1) 866 } 867 return 868} 869 870func LookupAccountSid(systemName *uint16, sid *SID, name *uint16, nameLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) { 871 r1, _, e1 := syscall.Syscall9(procLookupAccountSidW.Addr(), 7, uintptr(unsafe.Pointer(systemName)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(nameLen)), uintptr(unsafe.Pointer(refdDomainName)), uintptr(unsafe.Pointer(refdDomainNameLen)), uintptr(unsafe.Pointer(use)), 0, 0) 872 if r1 == 0 { 873 err = errnoErr(e1) 874 } 875 return 876} 877 878func LookupPrivilegeValue(systemname *uint16, name *uint16, luid *LUID) (err error) { 879 r1, _, e1 := syscall.Syscall(procLookupPrivilegeValueW.Addr(), 3, uintptr(unsafe.Pointer(systemname)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(luid))) 880 if r1 == 0 { 881 err = errnoErr(e1) 882 } 883 return 884} 885 886func makeAbsoluteSD(selfRelativeSD *SECURITY_DESCRIPTOR, absoluteSD *SECURITY_DESCRIPTOR, absoluteSDSize *uint32, dacl *ACL, daclSize *uint32, sacl *ACL, saclSize *uint32, owner *SID, ownerSize *uint32, group *SID, groupSize *uint32) (err error) { 887 r1, _, e1 := syscall.Syscall12(procMakeAbsoluteSD.Addr(), 11, uintptr(unsafe.Pointer(selfRelativeSD)), uintptr(unsafe.Pointer(absoluteSD)), uintptr(unsafe.Pointer(absoluteSDSize)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(daclSize)), uintptr(unsafe.Pointer(sacl)), uintptr(unsafe.Pointer(saclSize)), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(ownerSize)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(groupSize)), 0) 888 if r1 == 0 { 889 err = errnoErr(e1) 890 } 891 return 892} 893 894func makeSelfRelativeSD(absoluteSD *SECURITY_DESCRIPTOR, selfRelativeSD *SECURITY_DESCRIPTOR, selfRelativeSDSize *uint32) (err error) { 895 r1, _, e1 := syscall.Syscall(procMakeSelfRelativeSD.Addr(), 3, uintptr(unsafe.Pointer(absoluteSD)), uintptr(unsafe.Pointer(selfRelativeSD)), uintptr(unsafe.Pointer(selfRelativeSDSize))) 896 if r1 == 0 { 897 err = errnoErr(e1) 898 } 899 return 900} 901 902func NotifyServiceStatusChange(service Handle, notifyMask uint32, notifier *SERVICE_NOTIFY) (ret error) { 903 r0, _, _ := syscall.Syscall(procNotifyServiceStatusChangeW.Addr(), 3, uintptr(service), uintptr(notifyMask), uintptr(unsafe.Pointer(notifier))) 904 if r0 != 0 { 905 ret = syscall.Errno(r0) 906 } 907 return 908} 909 910func OpenProcessToken(process Handle, access uint32, token *Token) (err error) { 911 r1, _, e1 := syscall.Syscall(procOpenProcessToken.Addr(), 3, uintptr(process), uintptr(access), uintptr(unsafe.Pointer(token))) 912 if r1 == 0 { 913 err = errnoErr(e1) 914 } 915 return 916} 917 918func OpenSCManager(machineName *uint16, databaseName *uint16, access uint32) (handle Handle, err error) { 919 r0, _, e1 := syscall.Syscall(procOpenSCManagerW.Addr(), 3, uintptr(unsafe.Pointer(machineName)), uintptr(unsafe.Pointer(databaseName)), uintptr(access)) 920 handle = Handle(r0) 921 if handle == 0 { 922 err = errnoErr(e1) 923 } 924 return 925} 926 927func OpenService(mgr Handle, serviceName *uint16, access uint32) (handle Handle, err error) { 928 r0, _, e1 := syscall.Syscall(procOpenServiceW.Addr(), 3, uintptr(mgr), uintptr(unsafe.Pointer(serviceName)), uintptr(access)) 929 handle = Handle(r0) 930 if handle == 0 { 931 err = errnoErr(e1) 932 } 933 return 934} 935 936func OpenThreadToken(thread Handle, access uint32, openAsSelf bool, token *Token) (err error) { 937 var _p0 uint32 938 if openAsSelf { 939 _p0 = 1 940 } 941 r1, _, e1 := syscall.Syscall6(procOpenThreadToken.Addr(), 4, uintptr(thread), uintptr(access), uintptr(_p0), uintptr(unsafe.Pointer(token)), 0, 0) 942 if r1 == 0 { 943 err = errnoErr(e1) 944 } 945 return 946} 947 948func QueryServiceConfig2(service Handle, infoLevel uint32, buff *byte, buffSize uint32, bytesNeeded *uint32) (err error) { 949 r1, _, e1 := syscall.Syscall6(procQueryServiceConfig2W.Addr(), 5, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(buff)), uintptr(buffSize), uintptr(unsafe.Pointer(bytesNeeded)), 0) 950 if r1 == 0 { 951 err = errnoErr(e1) 952 } 953 return 954} 955 956func QueryServiceConfig(service Handle, serviceConfig *QUERY_SERVICE_CONFIG, bufSize uint32, bytesNeeded *uint32) (err error) { 957 r1, _, e1 := syscall.Syscall6(procQueryServiceConfigW.Addr(), 4, uintptr(service), uintptr(unsafe.Pointer(serviceConfig)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), 0, 0) 958 if r1 == 0 { 959 err = errnoErr(e1) 960 } 961 return 962} 963 964func QueryServiceLockStatus(mgr Handle, lockStatus *QUERY_SERVICE_LOCK_STATUS, bufSize uint32, bytesNeeded *uint32) (err error) { 965 r1, _, e1 := syscall.Syscall6(procQueryServiceLockStatusW.Addr(), 4, uintptr(mgr), uintptr(unsafe.Pointer(lockStatus)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), 0, 0) 966 if r1 == 0 { 967 err = errnoErr(e1) 968 } 969 return 970} 971 972func QueryServiceStatus(service Handle, status *SERVICE_STATUS) (err error) { 973 r1, _, e1 := syscall.Syscall(procQueryServiceStatus.Addr(), 2, uintptr(service), uintptr(unsafe.Pointer(status)), 0) 974 if r1 == 0 { 975 err = errnoErr(e1) 976 } 977 return 978} 979 980func QueryServiceStatusEx(service Handle, infoLevel uint32, buff *byte, buffSize uint32, bytesNeeded *uint32) (err error) { 981 r1, _, e1 := syscall.Syscall6(procQueryServiceStatusEx.Addr(), 5, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(buff)), uintptr(buffSize), uintptr(unsafe.Pointer(bytesNeeded)), 0) 982 if r1 == 0 { 983 err = errnoErr(e1) 984 } 985 return 986} 987 988func RegCloseKey(key Handle) (regerrno error) { 989 r0, _, _ := syscall.Syscall(procRegCloseKey.Addr(), 1, uintptr(key), 0, 0) 990 if r0 != 0 { 991 regerrno = syscall.Errno(r0) 992 } 993 return 994} 995 996func RegEnumKeyEx(key Handle, index uint32, name *uint16, nameLen *uint32, reserved *uint32, class *uint16, classLen *uint32, lastWriteTime *Filetime) (regerrno error) { 997 r0, _, _ := syscall.Syscall9(procRegEnumKeyExW.Addr(), 8, uintptr(key), uintptr(index), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(nameLen)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(class)), uintptr(unsafe.Pointer(classLen)), uintptr(unsafe.Pointer(lastWriteTime)), 0) 998 if r0 != 0 { 999 regerrno = syscall.Errno(r0) 1000 } 1001 return 1002} 1003 1004func RegNotifyChangeKeyValue(key Handle, watchSubtree bool, notifyFilter uint32, event Handle, asynchronous bool) (regerrno error) { 1005 var _p0 uint32 1006 if watchSubtree { 1007 _p0 = 1 1008 } 1009 var _p1 uint32 1010 if asynchronous { 1011 _p1 = 1 1012 } 1013 r0, _, _ := syscall.Syscall6(procRegNotifyChangeKeyValue.Addr(), 5, uintptr(key), uintptr(_p0), uintptr(notifyFilter), uintptr(event), uintptr(_p1), 0) 1014 if r0 != 0 { 1015 regerrno = syscall.Errno(r0) 1016 } 1017 return 1018} 1019 1020func RegOpenKeyEx(key Handle, subkey *uint16, options uint32, desiredAccess uint32, result *Handle) (regerrno error) { 1021 r0, _, _ := syscall.Syscall6(procRegOpenKeyExW.Addr(), 5, uintptr(key), uintptr(unsafe.Pointer(subkey)), uintptr(options), uintptr(desiredAccess), uintptr(unsafe.Pointer(result)), 0) 1022 if r0 != 0 { 1023 regerrno = syscall.Errno(r0) 1024 } 1025 return 1026} 1027 1028func RegQueryInfoKey(key Handle, class *uint16, classLen *uint32, reserved *uint32, subkeysLen *uint32, maxSubkeyLen *uint32, maxClassLen *uint32, valuesLen *uint32, maxValueNameLen *uint32, maxValueLen *uint32, saLen *uint32, lastWriteTime *Filetime) (regerrno error) { 1029 r0, _, _ := syscall.Syscall12(procRegQueryInfoKeyW.Addr(), 12, uintptr(key), uintptr(unsafe.Pointer(class)), uintptr(unsafe.Pointer(classLen)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(subkeysLen)), uintptr(unsafe.Pointer(maxSubkeyLen)), uintptr(unsafe.Pointer(maxClassLen)), uintptr(unsafe.Pointer(valuesLen)), uintptr(unsafe.Pointer(maxValueNameLen)), uintptr(unsafe.Pointer(maxValueLen)), uintptr(unsafe.Pointer(saLen)), uintptr(unsafe.Pointer(lastWriteTime))) 1030 if r0 != 0 { 1031 regerrno = syscall.Errno(r0) 1032 } 1033 return 1034} 1035 1036func RegQueryValueEx(key Handle, name *uint16, reserved *uint32, valtype *uint32, buf *byte, buflen *uint32) (regerrno error) { 1037 r0, _, _ := syscall.Syscall6(procRegQueryValueExW.Addr(), 6, uintptr(key), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(valtype)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(buflen))) 1038 if r0 != 0 { 1039 regerrno = syscall.Errno(r0) 1040 } 1041 return 1042} 1043 1044func RegisterEventSource(uncServerName *uint16, sourceName *uint16) (handle Handle, err error) { 1045 r0, _, e1 := syscall.Syscall(procRegisterEventSourceW.Addr(), 2, uintptr(unsafe.Pointer(uncServerName)), uintptr(unsafe.Pointer(sourceName)), 0) 1046 handle = Handle(r0) 1047 if handle == 0 { 1048 err = errnoErr(e1) 1049 } 1050 return 1051} 1052 1053func ReportEvent(log Handle, etype uint16, category uint16, eventId uint32, usrSId uintptr, numStrings uint16, dataSize uint32, strings **uint16, rawData *byte) (err error) { 1054 r1, _, e1 := syscall.Syscall9(procReportEventW.Addr(), 9, uintptr(log), uintptr(etype), uintptr(category), uintptr(eventId), uintptr(usrSId), uintptr(numStrings), uintptr(dataSize), uintptr(unsafe.Pointer(strings)), uintptr(unsafe.Pointer(rawData))) 1055 if r1 == 0 { 1056 err = errnoErr(e1) 1057 } 1058 return 1059} 1060 1061func RevertToSelf() (err error) { 1062 r1, _, e1 := syscall.Syscall(procRevertToSelf.Addr(), 0, 0, 0, 0) 1063 if r1 == 0 { 1064 err = errnoErr(e1) 1065 } 1066 return 1067} 1068 1069func setEntriesInAcl(countExplicitEntries uint32, explicitEntries *EXPLICIT_ACCESS, oldACL *ACL, newACL **ACL) (ret error) { 1070 r0, _, _ := syscall.Syscall6(procSetEntriesInAclW.Addr(), 4, uintptr(countExplicitEntries), uintptr(unsafe.Pointer(explicitEntries)), uintptr(unsafe.Pointer(oldACL)), uintptr(unsafe.Pointer(newACL)), 0, 0) 1071 if r0 != 0 { 1072 ret = syscall.Errno(r0) 1073 } 1074 return 1075} 1076 1077func SetKernelObjectSecurity(handle Handle, securityInformation SECURITY_INFORMATION, securityDescriptor *SECURITY_DESCRIPTOR) (err error) { 1078 r1, _, e1 := syscall.Syscall(procSetKernelObjectSecurity.Addr(), 3, uintptr(handle), uintptr(securityInformation), uintptr(unsafe.Pointer(securityDescriptor))) 1079 if r1 == 0 { 1080 err = errnoErr(e1) 1081 } 1082 return 1083} 1084 1085func SetNamedSecurityInfo(objectName string, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner *SID, group *SID, dacl *ACL, sacl *ACL) (ret error) { 1086 var _p0 *uint16 1087 _p0, ret = syscall.UTF16PtrFromString(objectName) 1088 if ret != nil { 1089 return 1090 } 1091 return _SetNamedSecurityInfo(_p0, objectType, securityInformation, owner, group, dacl, sacl) 1092} 1093 1094func _SetNamedSecurityInfo(objectName *uint16, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner *SID, group *SID, dacl *ACL, sacl *ACL) (ret error) { 1095 r0, _, _ := syscall.Syscall9(procSetNamedSecurityInfoW.Addr(), 7, uintptr(unsafe.Pointer(objectName)), uintptr(objectType), uintptr(securityInformation), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(sacl)), 0, 0) 1096 if r0 != 0 { 1097 ret = syscall.Errno(r0) 1098 } 1099 return 1100} 1101 1102func setSecurityDescriptorControl(sd *SECURITY_DESCRIPTOR, controlBitsOfInterest SECURITY_DESCRIPTOR_CONTROL, controlBitsToSet SECURITY_DESCRIPTOR_CONTROL) (err error) { 1103 r1, _, e1 := syscall.Syscall(procSetSecurityDescriptorControl.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(controlBitsOfInterest), uintptr(controlBitsToSet)) 1104 if r1 == 0 { 1105 err = errnoErr(e1) 1106 } 1107 return 1108} 1109 1110func setSecurityDescriptorDacl(sd *SECURITY_DESCRIPTOR, daclPresent bool, dacl *ACL, daclDefaulted bool) (err error) { 1111 var _p0 uint32 1112 if daclPresent { 1113 _p0 = 1 1114 } 1115 var _p1 uint32 1116 if daclDefaulted { 1117 _p1 = 1 1118 } 1119 r1, _, e1 := syscall.Syscall6(procSetSecurityDescriptorDacl.Addr(), 4, uintptr(unsafe.Pointer(sd)), uintptr(_p0), uintptr(unsafe.Pointer(dacl)), uintptr(_p1), 0, 0) 1120 if r1 == 0 { 1121 err = errnoErr(e1) 1122 } 1123 return 1124} 1125 1126func setSecurityDescriptorGroup(sd *SECURITY_DESCRIPTOR, group *SID, groupDefaulted bool) (err error) { 1127 var _p0 uint32 1128 if groupDefaulted { 1129 _p0 = 1 1130 } 1131 r1, _, e1 := syscall.Syscall(procSetSecurityDescriptorGroup.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(group)), uintptr(_p0)) 1132 if r1 == 0 { 1133 err = errnoErr(e1) 1134 } 1135 return 1136} 1137 1138func setSecurityDescriptorOwner(sd *SECURITY_DESCRIPTOR, owner *SID, ownerDefaulted bool) (err error) { 1139 var _p0 uint32 1140 if ownerDefaulted { 1141 _p0 = 1 1142 } 1143 r1, _, e1 := syscall.Syscall(procSetSecurityDescriptorOwner.Addr(), 3, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(owner)), uintptr(_p0)) 1144 if r1 == 0 { 1145 err = errnoErr(e1) 1146 } 1147 return 1148} 1149 1150func setSecurityDescriptorRMControl(sd *SECURITY_DESCRIPTOR, rmControl *uint8) { 1151 syscall.Syscall(procSetSecurityDescriptorRMControl.Addr(), 2, uintptr(unsafe.Pointer(sd)), uintptr(unsafe.Pointer(rmControl)), 0) 1152 return 1153} 1154 1155func setSecurityDescriptorSacl(sd *SECURITY_DESCRIPTOR, saclPresent bool, sacl *ACL, saclDefaulted bool) (err error) { 1156 var _p0 uint32 1157 if saclPresent { 1158 _p0 = 1 1159 } 1160 var _p1 uint32 1161 if saclDefaulted { 1162 _p1 = 1 1163 } 1164 r1, _, e1 := syscall.Syscall6(procSetSecurityDescriptorSacl.Addr(), 4, uintptr(unsafe.Pointer(sd)), uintptr(_p0), uintptr(unsafe.Pointer(sacl)), uintptr(_p1), 0, 0) 1165 if r1 == 0 { 1166 err = errnoErr(e1) 1167 } 1168 return 1169} 1170 1171func SetSecurityInfo(handle Handle, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner *SID, group *SID, dacl *ACL, sacl *ACL) (ret error) { 1172 r0, _, _ := syscall.Syscall9(procSetSecurityInfo.Addr(), 7, uintptr(handle), uintptr(objectType), uintptr(securityInformation), uintptr(unsafe.Pointer(owner)), uintptr(unsafe.Pointer(group)), uintptr(unsafe.Pointer(dacl)), uintptr(unsafe.Pointer(sacl)), 0, 0) 1173 if r0 != 0 { 1174 ret = syscall.Errno(r0) 1175 } 1176 return 1177} 1178 1179func SetServiceStatus(service Handle, serviceStatus *SERVICE_STATUS) (err error) { 1180 r1, _, e1 := syscall.Syscall(procSetServiceStatus.Addr(), 2, uintptr(service), uintptr(unsafe.Pointer(serviceStatus)), 0) 1181 if r1 == 0 { 1182 err = errnoErr(e1) 1183 } 1184 return 1185} 1186 1187func SetThreadToken(thread *Handle, token Token) (err error) { 1188 r1, _, e1 := syscall.Syscall(procSetThreadToken.Addr(), 2, uintptr(unsafe.Pointer(thread)), uintptr(token), 0) 1189 if r1 == 0 { 1190 err = errnoErr(e1) 1191 } 1192 return 1193} 1194 1195func SetTokenInformation(token Token, infoClass uint32, info *byte, infoLen uint32) (err error) { 1196 r1, _, e1 := syscall.Syscall6(procSetTokenInformation.Addr(), 4, uintptr(token), uintptr(infoClass), uintptr(unsafe.Pointer(info)), uintptr(infoLen), 0, 0) 1197 if r1 == 0 { 1198 err = errnoErr(e1) 1199 } 1200 return 1201} 1202 1203func StartServiceCtrlDispatcher(serviceTable *SERVICE_TABLE_ENTRY) (err error) { 1204 r1, _, e1 := syscall.Syscall(procStartServiceCtrlDispatcherW.Addr(), 1, uintptr(unsafe.Pointer(serviceTable)), 0, 0) 1205 if r1 == 0 { 1206 err = errnoErr(e1) 1207 } 1208 return 1209} 1210 1211func StartService(service Handle, numArgs uint32, argVectors **uint16) (err error) { 1212 r1, _, e1 := syscall.Syscall(procStartServiceW.Addr(), 3, uintptr(service), uintptr(numArgs), uintptr(unsafe.Pointer(argVectors))) 1213 if r1 == 0 { 1214 err = errnoErr(e1) 1215 } 1216 return 1217} 1218 1219func CertAddCertificateContextToStore(store Handle, certContext *CertContext, addDisposition uint32, storeContext **CertContext) (err error) { 1220 r1, _, e1 := syscall.Syscall6(procCertAddCertificateContextToStore.Addr(), 4, uintptr(store), uintptr(unsafe.Pointer(certContext)), uintptr(addDisposition), uintptr(unsafe.Pointer(storeContext)), 0, 0) 1221 if r1 == 0 { 1222 err = errnoErr(e1) 1223 } 1224 return 1225} 1226 1227func CertCloseStore(store Handle, flags uint32) (err error) { 1228 r1, _, e1 := syscall.Syscall(procCertCloseStore.Addr(), 2, uintptr(store), uintptr(flags), 0) 1229 if r1 == 0 { 1230 err = errnoErr(e1) 1231 } 1232 return 1233} 1234 1235func CertCreateCertificateContext(certEncodingType uint32, certEncoded *byte, encodedLen uint32) (context *CertContext, err error) { 1236 r0, _, e1 := syscall.Syscall(procCertCreateCertificateContext.Addr(), 3, uintptr(certEncodingType), uintptr(unsafe.Pointer(certEncoded)), uintptr(encodedLen)) 1237 context = (*CertContext)(unsafe.Pointer(r0)) 1238 if context == nil { 1239 err = errnoErr(e1) 1240 } 1241 return 1242} 1243 1244func CertDeleteCertificateFromStore(certContext *CertContext) (err error) { 1245 r1, _, e1 := syscall.Syscall(procCertDeleteCertificateFromStore.Addr(), 1, uintptr(unsafe.Pointer(certContext)), 0, 0) 1246 if r1 == 0 { 1247 err = errnoErr(e1) 1248 } 1249 return 1250} 1251 1252func CertDuplicateCertificateContext(certContext *CertContext) (dupContext *CertContext) { 1253 r0, _, _ := syscall.Syscall(procCertDuplicateCertificateContext.Addr(), 1, uintptr(unsafe.Pointer(certContext)), 0, 0) 1254 dupContext = (*CertContext)(unsafe.Pointer(r0)) 1255 return 1256} 1257 1258func CertEnumCertificatesInStore(store Handle, prevContext *CertContext) (context *CertContext, err error) { 1259 r0, _, e1 := syscall.Syscall(procCertEnumCertificatesInStore.Addr(), 2, uintptr(store), uintptr(unsafe.Pointer(prevContext)), 0) 1260 context = (*CertContext)(unsafe.Pointer(r0)) 1261 if context == nil { 1262 err = errnoErr(e1) 1263 } 1264 return 1265} 1266 1267func CertFindCertificateInStore(store Handle, certEncodingType uint32, findFlags uint32, findType uint32, findPara unsafe.Pointer, prevCertContext *CertContext) (cert *CertContext, err error) { 1268 r0, _, e1 := syscall.Syscall6(procCertFindCertificateInStore.Addr(), 6, uintptr(store), uintptr(certEncodingType), uintptr(findFlags), uintptr(findType), uintptr(findPara), uintptr(unsafe.Pointer(prevCertContext))) 1269 cert = (*CertContext)(unsafe.Pointer(r0)) 1270 if cert == nil { 1271 err = errnoErr(e1) 1272 } 1273 return 1274} 1275 1276func CertFindChainInStore(store Handle, certEncodingType uint32, findFlags uint32, findType uint32, findPara unsafe.Pointer, prevChainContext *CertChainContext) (certchain *CertChainContext, err error) { 1277 r0, _, e1 := syscall.Syscall6(procCertFindChainInStore.Addr(), 6, uintptr(store), uintptr(certEncodingType), uintptr(findFlags), uintptr(findType), uintptr(findPara), uintptr(unsafe.Pointer(prevChainContext))) 1278 certchain = (*CertChainContext)(unsafe.Pointer(r0)) 1279 if certchain == nil { 1280 err = errnoErr(e1) 1281 } 1282 return 1283} 1284 1285func CertFindExtension(objId *byte, countExtensions uint32, extensions *CertExtension) (ret *CertExtension) { 1286 r0, _, _ := syscall.Syscall(procCertFindExtension.Addr(), 3, uintptr(unsafe.Pointer(objId)), uintptr(countExtensions), uintptr(unsafe.Pointer(extensions))) 1287 ret = (*CertExtension)(unsafe.Pointer(r0)) 1288 return 1289} 1290 1291func CertFreeCertificateChain(ctx *CertChainContext) { 1292 syscall.Syscall(procCertFreeCertificateChain.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0) 1293 return 1294} 1295 1296func CertFreeCertificateContext(ctx *CertContext) (err error) { 1297 r1, _, e1 := syscall.Syscall(procCertFreeCertificateContext.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0) 1298 if r1 == 0 { 1299 err = errnoErr(e1) 1300 } 1301 return 1302} 1303 1304func CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, additionalStore Handle, para *CertChainPara, flags uint32, reserved uintptr, chainCtx **CertChainContext) (err error) { 1305 r1, _, e1 := syscall.Syscall9(procCertGetCertificateChain.Addr(), 8, uintptr(engine), uintptr(unsafe.Pointer(leaf)), uintptr(unsafe.Pointer(time)), uintptr(additionalStore), uintptr(unsafe.Pointer(para)), uintptr(flags), uintptr(reserved), uintptr(unsafe.Pointer(chainCtx)), 0) 1306 if r1 == 0 { 1307 err = errnoErr(e1) 1308 } 1309 return 1310} 1311 1312func CertGetNameString(certContext *CertContext, nameType uint32, flags uint32, typePara unsafe.Pointer, name *uint16, size uint32) (chars uint32) { 1313 r0, _, _ := syscall.Syscall6(procCertGetNameStringW.Addr(), 6, uintptr(unsafe.Pointer(certContext)), uintptr(nameType), uintptr(flags), uintptr(typePara), uintptr(unsafe.Pointer(name)), uintptr(size)) 1314 chars = uint32(r0) 1315 return 1316} 1317 1318func CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) { 1319 r0, _, e1 := syscall.Syscall6(procCertOpenStore.Addr(), 5, uintptr(storeProvider), uintptr(msgAndCertEncodingType), uintptr(cryptProv), uintptr(flags), uintptr(para), 0) 1320 handle = Handle(r0) 1321 if handle == 0 { 1322 err = errnoErr(e1) 1323 } 1324 return 1325} 1326 1327func CertOpenSystemStore(hprov Handle, name *uint16) (store Handle, err error) { 1328 r0, _, e1 := syscall.Syscall(procCertOpenSystemStoreW.Addr(), 2, uintptr(hprov), uintptr(unsafe.Pointer(name)), 0) 1329 store = Handle(r0) 1330 if store == 0 { 1331 err = errnoErr(e1) 1332 } 1333 return 1334} 1335 1336func CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext, para *CertChainPolicyPara, status *CertChainPolicyStatus) (err error) { 1337 r1, _, e1 := syscall.Syscall6(procCertVerifyCertificateChainPolicy.Addr(), 4, uintptr(policyOID), uintptr(unsafe.Pointer(chain)), uintptr(unsafe.Pointer(para)), uintptr(unsafe.Pointer(status)), 0, 0) 1338 if r1 == 0 { 1339 err = errnoErr(e1) 1340 } 1341 return 1342} 1343 1344func CryptAcquireCertificatePrivateKey(cert *CertContext, flags uint32, parameters unsafe.Pointer, cryptProvOrNCryptKey *Handle, keySpec *uint32, callerFreeProvOrNCryptKey *bool) (err error) { 1345 var _p0 uint32 1346 if *callerFreeProvOrNCryptKey { 1347 _p0 = 1 1348 } 1349 r1, _, e1 := syscall.Syscall6(procCryptAcquireCertificatePrivateKey.Addr(), 6, uintptr(unsafe.Pointer(cert)), uintptr(flags), uintptr(parameters), uintptr(unsafe.Pointer(cryptProvOrNCryptKey)), uintptr(unsafe.Pointer(keySpec)), uintptr(unsafe.Pointer(&_p0))) 1350 *callerFreeProvOrNCryptKey = _p0 != 0 1351 if r1 == 0 { 1352 err = errnoErr(e1) 1353 } 1354 return 1355} 1356 1357func CryptDecodeObject(encodingType uint32, structType *byte, encodedBytes *byte, lenEncodedBytes uint32, flags uint32, decoded unsafe.Pointer, decodedLen *uint32) (err error) { 1358 r1, _, e1 := syscall.Syscall9(procCryptDecodeObject.Addr(), 7, uintptr(encodingType), uintptr(unsafe.Pointer(structType)), uintptr(unsafe.Pointer(encodedBytes)), uintptr(lenEncodedBytes), uintptr(flags), uintptr(decoded), uintptr(unsafe.Pointer(decodedLen)), 0, 0) 1359 if r1 == 0 { 1360 err = errnoErr(e1) 1361 } 1362 return 1363} 1364 1365func CryptProtectData(dataIn *DataBlob, name *uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) { 1366 r1, _, e1 := syscall.Syscall9(procCryptProtectData.Addr(), 7, uintptr(unsafe.Pointer(dataIn)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(optionalEntropy)), uintptr(reserved), uintptr(unsafe.Pointer(promptStruct)), uintptr(flags), uintptr(unsafe.Pointer(dataOut)), 0, 0) 1367 if r1 == 0 { 1368 err = errnoErr(e1) 1369 } 1370 return 1371} 1372 1373func CryptQueryObject(objectType uint32, object unsafe.Pointer, expectedContentTypeFlags uint32, expectedFormatTypeFlags uint32, flags uint32, msgAndCertEncodingType *uint32, contentType *uint32, formatType *uint32, certStore *Handle, msg *Handle, context *unsafe.Pointer) (err error) { 1374 r1, _, e1 := syscall.Syscall12(procCryptQueryObject.Addr(), 11, uintptr(objectType), uintptr(object), uintptr(expectedContentTypeFlags), uintptr(expectedFormatTypeFlags), uintptr(flags), uintptr(unsafe.Pointer(msgAndCertEncodingType)), uintptr(unsafe.Pointer(contentType)), uintptr(unsafe.Pointer(formatType)), uintptr(unsafe.Pointer(certStore)), uintptr(unsafe.Pointer(msg)), uintptr(unsafe.Pointer(context)), 0) 1375 if r1 == 0 { 1376 err = errnoErr(e1) 1377 } 1378 return 1379} 1380 1381func CryptUnprotectData(dataIn *DataBlob, name **uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) { 1382 r1, _, e1 := syscall.Syscall9(procCryptUnprotectData.Addr(), 7, uintptr(unsafe.Pointer(dataIn)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(optionalEntropy)), uintptr(reserved), uintptr(unsafe.Pointer(promptStruct)), uintptr(flags), uintptr(unsafe.Pointer(dataOut)), 0, 0) 1383 if r1 == 0 { 1384 err = errnoErr(e1) 1385 } 1386 return 1387} 1388 1389func PFXImportCertStore(pfx *CryptDataBlob, password *uint16, flags uint32) (store Handle, err error) { 1390 r0, _, e1 := syscall.Syscall(procPFXImportCertStore.Addr(), 3, uintptr(unsafe.Pointer(pfx)), uintptr(unsafe.Pointer(password)), uintptr(flags)) 1391 store = Handle(r0) 1392 if store == 0 { 1393 err = errnoErr(e1) 1394 } 1395 return 1396} 1397 1398func DnsNameCompare(name1 *uint16, name2 *uint16) (same bool) { 1399 r0, _, _ := syscall.Syscall(procDnsNameCompare_W.Addr(), 2, uintptr(unsafe.Pointer(name1)), uintptr(unsafe.Pointer(name2)), 0) 1400 same = r0 != 0 1401 return 1402} 1403 1404func DnsQuery(name string, qtype uint16, options uint32, extra *byte, qrs **DNSRecord, pr *byte) (status error) { 1405 var _p0 *uint16 1406 _p0, status = syscall.UTF16PtrFromString(name) 1407 if status != nil { 1408 return 1409 } 1410 return _DnsQuery(_p0, qtype, options, extra, qrs, pr) 1411} 1412 1413func _DnsQuery(name *uint16, qtype uint16, options uint32, extra *byte, qrs **DNSRecord, pr *byte) (status error) { 1414 r0, _, _ := syscall.Syscall6(procDnsQuery_W.Addr(), 6, uintptr(unsafe.Pointer(name)), uintptr(qtype), uintptr(options), uintptr(unsafe.Pointer(extra)), uintptr(unsafe.Pointer(qrs)), uintptr(unsafe.Pointer(pr))) 1415 if r0 != 0 { 1416 status = syscall.Errno(r0) 1417 } 1418 return 1419} 1420 1421func DnsRecordListFree(rl *DNSRecord, freetype uint32) { 1422 syscall.Syscall(procDnsRecordListFree.Addr(), 2, uintptr(unsafe.Pointer(rl)), uintptr(freetype), 0) 1423 return 1424} 1425 1426func GetAdaptersAddresses(family uint32, flags uint32, reserved uintptr, adapterAddresses *IpAdapterAddresses, sizePointer *uint32) (errcode error) { 1427 r0, _, _ := syscall.Syscall6(procGetAdaptersAddresses.Addr(), 5, uintptr(family), uintptr(flags), uintptr(reserved), uintptr(unsafe.Pointer(adapterAddresses)), uintptr(unsafe.Pointer(sizePointer)), 0) 1428 if r0 != 0 { 1429 errcode = syscall.Errno(r0) 1430 } 1431 return 1432} 1433 1434func GetAdaptersInfo(ai *IpAdapterInfo, ol *uint32) (errcode error) { 1435 r0, _, _ := syscall.Syscall(procGetAdaptersInfo.Addr(), 2, uintptr(unsafe.Pointer(ai)), uintptr(unsafe.Pointer(ol)), 0) 1436 if r0 != 0 { 1437 errcode = syscall.Errno(r0) 1438 } 1439 return 1440} 1441 1442func GetIfEntry(pIfRow *MibIfRow) (errcode error) { 1443 r0, _, _ := syscall.Syscall(procGetIfEntry.Addr(), 1, uintptr(unsafe.Pointer(pIfRow)), 0, 0) 1444 if r0 != 0 { 1445 errcode = syscall.Errno(r0) 1446 } 1447 return 1448} 1449 1450func AssignProcessToJobObject(job Handle, process Handle) (err error) { 1451 r1, _, e1 := syscall.Syscall(procAssignProcessToJobObject.Addr(), 2, uintptr(job), uintptr(process), 0) 1452 if r1 == 0 { 1453 err = errnoErr(e1) 1454 } 1455 return 1456} 1457 1458func CancelIo(s Handle) (err error) { 1459 r1, _, e1 := syscall.Syscall(procCancelIo.Addr(), 1, uintptr(s), 0, 0) 1460 if r1 == 0 { 1461 err = errnoErr(e1) 1462 } 1463 return 1464} 1465 1466func CancelIoEx(s Handle, o *Overlapped) (err error) { 1467 r1, _, e1 := syscall.Syscall(procCancelIoEx.Addr(), 2, uintptr(s), uintptr(unsafe.Pointer(o)), 0) 1468 if r1 == 0 { 1469 err = errnoErr(e1) 1470 } 1471 return 1472} 1473 1474func CloseHandle(handle Handle) (err error) { 1475 r1, _, e1 := syscall.Syscall(procCloseHandle.Addr(), 1, uintptr(handle), 0, 0) 1476 if r1 == 0 { 1477 err = errnoErr(e1) 1478 } 1479 return 1480} 1481 1482func ConnectNamedPipe(pipe Handle, overlapped *Overlapped) (err error) { 1483 r1, _, e1 := syscall.Syscall(procConnectNamedPipe.Addr(), 2, uintptr(pipe), uintptr(unsafe.Pointer(overlapped)), 0) 1484 if r1 == 0 { 1485 err = errnoErr(e1) 1486 } 1487 return 1488} 1489 1490func CreateDirectory(path *uint16, sa *SecurityAttributes) (err error) { 1491 r1, _, e1 := syscall.Syscall(procCreateDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(path)), uintptr(unsafe.Pointer(sa)), 0) 1492 if r1 == 0 { 1493 err = errnoErr(e1) 1494 } 1495 return 1496} 1497 1498func CreateEventEx(eventAttrs *SecurityAttributes, name *uint16, flags uint32, desiredAccess uint32) (handle Handle, err error) { 1499 r0, _, e1 := syscall.Syscall6(procCreateEventExW.Addr(), 4, uintptr(unsafe.Pointer(eventAttrs)), uintptr(unsafe.Pointer(name)), uintptr(flags), uintptr(desiredAccess), 0, 0) 1500 handle = Handle(r0) 1501 if handle == 0 || e1 == ERROR_ALREADY_EXISTS { 1502 err = errnoErr(e1) 1503 } 1504 return 1505} 1506 1507func CreateEvent(eventAttrs *SecurityAttributes, manualReset uint32, initialState uint32, name *uint16) (handle Handle, err error) { 1508 r0, _, e1 := syscall.Syscall6(procCreateEventW.Addr(), 4, uintptr(unsafe.Pointer(eventAttrs)), uintptr(manualReset), uintptr(initialState), uintptr(unsafe.Pointer(name)), 0, 0) 1509 handle = Handle(r0) 1510 if handle == 0 || e1 == ERROR_ALREADY_EXISTS { 1511 err = errnoErr(e1) 1512 } 1513 return 1514} 1515 1516func CreateFileMapping(fhandle Handle, sa *SecurityAttributes, prot uint32, maxSizeHigh uint32, maxSizeLow uint32, name *uint16) (handle Handle, err error) { 1517 r0, _, e1 := syscall.Syscall6(procCreateFileMappingW.Addr(), 6, uintptr(fhandle), uintptr(unsafe.Pointer(sa)), uintptr(prot), uintptr(maxSizeHigh), uintptr(maxSizeLow), uintptr(unsafe.Pointer(name))) 1518 handle = Handle(r0) 1519 if handle == 0 || e1 == ERROR_ALREADY_EXISTS { 1520 err = errnoErr(e1) 1521 } 1522 return 1523} 1524 1525func CreateFile(name *uint16, access uint32, mode uint32, sa *SecurityAttributes, createmode uint32, attrs uint32, templatefile Handle) (handle Handle, err error) { 1526 r0, _, e1 := syscall.Syscall9(procCreateFileW.Addr(), 7, uintptr(unsafe.Pointer(name)), uintptr(access), uintptr(mode), uintptr(unsafe.Pointer(sa)), uintptr(createmode), uintptr(attrs), uintptr(templatefile), 0, 0) 1527 handle = Handle(r0) 1528 if handle == InvalidHandle { 1529 err = errnoErr(e1) 1530 } 1531 return 1532} 1533 1534func CreateHardLink(filename *uint16, existingfilename *uint16, reserved uintptr) (err error) { 1535 r1, _, e1 := syscall.Syscall(procCreateHardLinkW.Addr(), 3, uintptr(unsafe.Pointer(filename)), uintptr(unsafe.Pointer(existingfilename)), uintptr(reserved)) 1536 if r1&0xff == 0 { 1537 err = errnoErr(e1) 1538 } 1539 return 1540} 1541 1542func CreateIoCompletionPort(filehandle Handle, cphandle Handle, key uintptr, threadcnt uint32) (handle Handle, err error) { 1543 r0, _, e1 := syscall.Syscall6(procCreateIoCompletionPort.Addr(), 4, uintptr(filehandle), uintptr(cphandle), uintptr(key), uintptr(threadcnt), 0, 0) 1544 handle = Handle(r0) 1545 if handle == 0 { 1546 err = errnoErr(e1) 1547 } 1548 return 1549} 1550 1551func CreateJobObject(jobAttr *SecurityAttributes, name *uint16) (handle Handle, err error) { 1552 r0, _, e1 := syscall.Syscall(procCreateJobObjectW.Addr(), 2, uintptr(unsafe.Pointer(jobAttr)), uintptr(unsafe.Pointer(name)), 0) 1553 handle = Handle(r0) 1554 if handle == 0 { 1555 err = errnoErr(e1) 1556 } 1557 return 1558} 1559 1560func CreateMutexEx(mutexAttrs *SecurityAttributes, name *uint16, flags uint32, desiredAccess uint32) (handle Handle, err error) { 1561 r0, _, e1 := syscall.Syscall6(procCreateMutexExW.Addr(), 4, uintptr(unsafe.Pointer(mutexAttrs)), uintptr(unsafe.Pointer(name)), uintptr(flags), uintptr(desiredAccess), 0, 0) 1562 handle = Handle(r0) 1563 if handle == 0 || e1 == ERROR_ALREADY_EXISTS { 1564 err = errnoErr(e1) 1565 } 1566 return 1567} 1568 1569func CreateMutex(mutexAttrs *SecurityAttributes, initialOwner bool, name *uint16) (handle Handle, err error) { 1570 var _p0 uint32 1571 if initialOwner { 1572 _p0 = 1 1573 } 1574 r0, _, e1 := syscall.Syscall(procCreateMutexW.Addr(), 3, uintptr(unsafe.Pointer(mutexAttrs)), uintptr(_p0), uintptr(unsafe.Pointer(name))) 1575 handle = Handle(r0) 1576 if handle == 0 || e1 == ERROR_ALREADY_EXISTS { 1577 err = errnoErr(e1) 1578 } 1579 return 1580} 1581 1582func CreateNamedPipe(name *uint16, flags uint32, pipeMode uint32, maxInstances uint32, outSize uint32, inSize uint32, defaultTimeout uint32, sa *SecurityAttributes) (handle Handle, err error) { 1583 r0, _, e1 := syscall.Syscall9(procCreateNamedPipeW.Addr(), 8, uintptr(unsafe.Pointer(name)), uintptr(flags), uintptr(pipeMode), uintptr(maxInstances), uintptr(outSize), uintptr(inSize), uintptr(defaultTimeout), uintptr(unsafe.Pointer(sa)), 0) 1584 handle = Handle(r0) 1585 if handle == InvalidHandle { 1586 err = errnoErr(e1) 1587 } 1588 return 1589} 1590 1591func CreatePipe(readhandle *Handle, writehandle *Handle, sa *SecurityAttributes, size uint32) (err error) { 1592 r1, _, e1 := syscall.Syscall6(procCreatePipe.Addr(), 4, uintptr(unsafe.Pointer(readhandle)), uintptr(unsafe.Pointer(writehandle)), uintptr(unsafe.Pointer(sa)), uintptr(size), 0, 0) 1593 if r1 == 0 { 1594 err = errnoErr(e1) 1595 } 1596 return 1597} 1598 1599func CreateProcess(appName *uint16, commandLine *uint16, procSecurity *SecurityAttributes, threadSecurity *SecurityAttributes, inheritHandles bool, creationFlags uint32, env *uint16, currentDir *uint16, startupInfo *StartupInfo, outProcInfo *ProcessInformation) (err error) { 1600 var _p0 uint32 1601 if inheritHandles { 1602 _p0 = 1 1603 } 1604 r1, _, e1 := syscall.Syscall12(procCreateProcessW.Addr(), 10, uintptr(unsafe.Pointer(appName)), uintptr(unsafe.Pointer(commandLine)), uintptr(unsafe.Pointer(procSecurity)), uintptr(unsafe.Pointer(threadSecurity)), uintptr(_p0), uintptr(creationFlags), uintptr(unsafe.Pointer(env)), uintptr(unsafe.Pointer(currentDir)), uintptr(unsafe.Pointer(startupInfo)), uintptr(unsafe.Pointer(outProcInfo)), 0, 0) 1605 if r1 == 0 { 1606 err = errnoErr(e1) 1607 } 1608 return 1609} 1610 1611func CreateSymbolicLink(symlinkfilename *uint16, targetfilename *uint16, flags uint32) (err error) { 1612 r1, _, e1 := syscall.Syscall(procCreateSymbolicLinkW.Addr(), 3, uintptr(unsafe.Pointer(symlinkfilename)), uintptr(unsafe.Pointer(targetfilename)), uintptr(flags)) 1613 if r1&0xff == 0 { 1614 err = errnoErr(e1) 1615 } 1616 return 1617} 1618 1619func CreateToolhelp32Snapshot(flags uint32, processId uint32) (handle Handle, err error) { 1620 r0, _, e1 := syscall.Syscall(procCreateToolhelp32Snapshot.Addr(), 2, uintptr(flags), uintptr(processId), 0) 1621 handle = Handle(r0) 1622 if handle == InvalidHandle { 1623 err = errnoErr(e1) 1624 } 1625 return 1626} 1627 1628func DefineDosDevice(flags uint32, deviceName *uint16, targetPath *uint16) (err error) { 1629 r1, _, e1 := syscall.Syscall(procDefineDosDeviceW.Addr(), 3, uintptr(flags), uintptr(unsafe.Pointer(deviceName)), uintptr(unsafe.Pointer(targetPath))) 1630 if r1 == 0 { 1631 err = errnoErr(e1) 1632 } 1633 return 1634} 1635 1636func DeleteFile(path *uint16) (err error) { 1637 r1, _, e1 := syscall.Syscall(procDeleteFileW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0) 1638 if r1 == 0 { 1639 err = errnoErr(e1) 1640 } 1641 return 1642} 1643 1644func deleteProcThreadAttributeList(attrlist *ProcThreadAttributeList) { 1645 syscall.Syscall(procDeleteProcThreadAttributeList.Addr(), 1, uintptr(unsafe.Pointer(attrlist)), 0, 0) 1646 return 1647} 1648 1649func DeleteVolumeMountPoint(volumeMountPoint *uint16) (err error) { 1650 r1, _, e1 := syscall.Syscall(procDeleteVolumeMountPointW.Addr(), 1, uintptr(unsafe.Pointer(volumeMountPoint)), 0, 0) 1651 if r1 == 0 { 1652 err = errnoErr(e1) 1653 } 1654 return 1655} 1656 1657func DeviceIoControl(handle Handle, ioControlCode uint32, inBuffer *byte, inBufferSize uint32, outBuffer *byte, outBufferSize uint32, bytesReturned *uint32, overlapped *Overlapped) (err error) { 1658 r1, _, e1 := syscall.Syscall9(procDeviceIoControl.Addr(), 8, uintptr(handle), uintptr(ioControlCode), uintptr(unsafe.Pointer(inBuffer)), uintptr(inBufferSize), uintptr(unsafe.Pointer(outBuffer)), uintptr(outBufferSize), uintptr(unsafe.Pointer(bytesReturned)), uintptr(unsafe.Pointer(overlapped)), 0) 1659 if r1 == 0 { 1660 err = errnoErr(e1) 1661 } 1662 return 1663} 1664 1665func DuplicateHandle(hSourceProcessHandle Handle, hSourceHandle Handle, hTargetProcessHandle Handle, lpTargetHandle *Handle, dwDesiredAccess uint32, bInheritHandle bool, dwOptions uint32) (err error) { 1666 var _p0 uint32 1667 if bInheritHandle { 1668 _p0 = 1 1669 } 1670 r1, _, e1 := syscall.Syscall9(procDuplicateHandle.Addr(), 7, uintptr(hSourceProcessHandle), uintptr(hSourceHandle), uintptr(hTargetProcessHandle), uintptr(unsafe.Pointer(lpTargetHandle)), uintptr(dwDesiredAccess), uintptr(_p0), uintptr(dwOptions), 0, 0) 1671 if r1 == 0 { 1672 err = errnoErr(e1) 1673 } 1674 return 1675} 1676 1677func ExitProcess(exitcode uint32) { 1678 syscall.Syscall(procExitProcess.Addr(), 1, uintptr(exitcode), 0, 0) 1679 return 1680} 1681 1682func FindClose(handle Handle) (err error) { 1683 r1, _, e1 := syscall.Syscall(procFindClose.Addr(), 1, uintptr(handle), 0, 0) 1684 if r1 == 0 { 1685 err = errnoErr(e1) 1686 } 1687 return 1688} 1689 1690func FindCloseChangeNotification(handle Handle) (err error) { 1691 r1, _, e1 := syscall.Syscall(procFindCloseChangeNotification.Addr(), 1, uintptr(handle), 0, 0) 1692 if r1 == 0 { 1693 err = errnoErr(e1) 1694 } 1695 return 1696} 1697 1698func FindFirstChangeNotification(path string, watchSubtree bool, notifyFilter uint32) (handle Handle, err error) { 1699 var _p0 *uint16 1700 _p0, err = syscall.UTF16PtrFromString(path) 1701 if err != nil { 1702 return 1703 } 1704 return _FindFirstChangeNotification(_p0, watchSubtree, notifyFilter) 1705} 1706 1707func _FindFirstChangeNotification(path *uint16, watchSubtree bool, notifyFilter uint32) (handle Handle, err error) { 1708 var _p1 uint32 1709 if watchSubtree { 1710 _p1 = 1 1711 } 1712 r0, _, e1 := syscall.Syscall(procFindFirstChangeNotificationW.Addr(), 3, uintptr(unsafe.Pointer(path)), uintptr(_p1), uintptr(notifyFilter)) 1713 handle = Handle(r0) 1714 if handle == InvalidHandle { 1715 err = errnoErr(e1) 1716 } 1717 return 1718} 1719 1720func findFirstFile1(name *uint16, data *win32finddata1) (handle Handle, err error) { 1721 r0, _, e1 := syscall.Syscall(procFindFirstFileW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(data)), 0) 1722 handle = Handle(r0) 1723 if handle == InvalidHandle { 1724 err = errnoErr(e1) 1725 } 1726 return 1727} 1728 1729func FindFirstVolumeMountPoint(rootPathName *uint16, volumeMountPoint *uint16, bufferLength uint32) (handle Handle, err error) { 1730 r0, _, e1 := syscall.Syscall(procFindFirstVolumeMountPointW.Addr(), 3, uintptr(unsafe.Pointer(rootPathName)), uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(bufferLength)) 1731 handle = Handle(r0) 1732 if handle == InvalidHandle { 1733 err = errnoErr(e1) 1734 } 1735 return 1736} 1737 1738func FindFirstVolume(volumeName *uint16, bufferLength uint32) (handle Handle, err error) { 1739 r0, _, e1 := syscall.Syscall(procFindFirstVolumeW.Addr(), 2, uintptr(unsafe.Pointer(volumeName)), uintptr(bufferLength), 0) 1740 handle = Handle(r0) 1741 if handle == InvalidHandle { 1742 err = errnoErr(e1) 1743 } 1744 return 1745} 1746 1747func FindNextChangeNotification(handle Handle) (err error) { 1748 r1, _, e1 := syscall.Syscall(procFindNextChangeNotification.Addr(), 1, uintptr(handle), 0, 0) 1749 if r1 == 0 { 1750 err = errnoErr(e1) 1751 } 1752 return 1753} 1754 1755func findNextFile1(handle Handle, data *win32finddata1) (err error) { 1756 r1, _, e1 := syscall.Syscall(procFindNextFileW.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0) 1757 if r1 == 0 { 1758 err = errnoErr(e1) 1759 } 1760 return 1761} 1762 1763func FindNextVolumeMountPoint(findVolumeMountPoint Handle, volumeMountPoint *uint16, bufferLength uint32) (err error) { 1764 r1, _, e1 := syscall.Syscall(procFindNextVolumeMountPointW.Addr(), 3, uintptr(findVolumeMountPoint), uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(bufferLength)) 1765 if r1 == 0 { 1766 err = errnoErr(e1) 1767 } 1768 return 1769} 1770 1771func FindNextVolume(findVolume Handle, volumeName *uint16, bufferLength uint32) (err error) { 1772 r1, _, e1 := syscall.Syscall(procFindNextVolumeW.Addr(), 3, uintptr(findVolume), uintptr(unsafe.Pointer(volumeName)), uintptr(bufferLength)) 1773 if r1 == 0 { 1774 err = errnoErr(e1) 1775 } 1776 return 1777} 1778 1779func findResource(module Handle, name uintptr, resType uintptr) (resInfo Handle, err error) { 1780 r0, _, e1 := syscall.Syscall(procFindResourceW.Addr(), 3, uintptr(module), uintptr(name), uintptr(resType)) 1781 resInfo = Handle(r0) 1782 if resInfo == 0 { 1783 err = errnoErr(e1) 1784 } 1785 return 1786} 1787 1788func FindVolumeClose(findVolume Handle) (err error) { 1789 r1, _, e1 := syscall.Syscall(procFindVolumeClose.Addr(), 1, uintptr(findVolume), 0, 0) 1790 if r1 == 0 { 1791 err = errnoErr(e1) 1792 } 1793 return 1794} 1795 1796func FindVolumeMountPointClose(findVolumeMountPoint Handle) (err error) { 1797 r1, _, e1 := syscall.Syscall(procFindVolumeMountPointClose.Addr(), 1, uintptr(findVolumeMountPoint), 0, 0) 1798 if r1 == 0 { 1799 err = errnoErr(e1) 1800 } 1801 return 1802} 1803 1804func FlushFileBuffers(handle Handle) (err error) { 1805 r1, _, e1 := syscall.Syscall(procFlushFileBuffers.Addr(), 1, uintptr(handle), 0, 0) 1806 if r1 == 0 { 1807 err = errnoErr(e1) 1808 } 1809 return 1810} 1811 1812func FlushViewOfFile(addr uintptr, length uintptr) (err error) { 1813 r1, _, e1 := syscall.Syscall(procFlushViewOfFile.Addr(), 2, uintptr(addr), uintptr(length), 0) 1814 if r1 == 0 { 1815 err = errnoErr(e1) 1816 } 1817 return 1818} 1819 1820func FormatMessage(flags uint32, msgsrc uintptr, msgid uint32, langid uint32, buf []uint16, args *byte) (n uint32, err error) { 1821 var _p0 *uint16 1822 if len(buf) > 0 { 1823 _p0 = &buf[0] 1824 } 1825 r0, _, e1 := syscall.Syscall9(procFormatMessageW.Addr(), 7, uintptr(flags), uintptr(msgsrc), uintptr(msgid), uintptr(langid), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(args)), 0, 0) 1826 n = uint32(r0) 1827 if n == 0 { 1828 err = errnoErr(e1) 1829 } 1830 return 1831} 1832 1833func FreeEnvironmentStrings(envs *uint16) (err error) { 1834 r1, _, e1 := syscall.Syscall(procFreeEnvironmentStringsW.Addr(), 1, uintptr(unsafe.Pointer(envs)), 0, 0) 1835 if r1 == 0 { 1836 err = errnoErr(e1) 1837 } 1838 return 1839} 1840 1841func FreeLibrary(handle Handle) (err error) { 1842 r1, _, e1 := syscall.Syscall(procFreeLibrary.Addr(), 1, uintptr(handle), 0, 0) 1843 if r1 == 0 { 1844 err = errnoErr(e1) 1845 } 1846 return 1847} 1848 1849func GenerateConsoleCtrlEvent(ctrlEvent uint32, processGroupID uint32) (err error) { 1850 r1, _, e1 := syscall.Syscall(procGenerateConsoleCtrlEvent.Addr(), 2, uintptr(ctrlEvent), uintptr(processGroupID), 0) 1851 if r1 == 0 { 1852 err = errnoErr(e1) 1853 } 1854 return 1855} 1856 1857func GetACP() (acp uint32) { 1858 r0, _, _ := syscall.Syscall(procGetACP.Addr(), 0, 0, 0, 0) 1859 acp = uint32(r0) 1860 return 1861} 1862 1863func GetCommTimeouts(handle Handle, timeouts *CommTimeouts) (err error) { 1864 r1, _, e1 := syscall.Syscall(procGetCommTimeouts.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(timeouts)), 0) 1865 if r1 == 0 { 1866 err = errnoErr(e1) 1867 } 1868 return 1869} 1870 1871func GetCommandLine() (cmd *uint16) { 1872 r0, _, _ := syscall.Syscall(procGetCommandLineW.Addr(), 0, 0, 0, 0) 1873 cmd = (*uint16)(unsafe.Pointer(r0)) 1874 return 1875} 1876 1877func GetComputerNameEx(nametype uint32, buf *uint16, n *uint32) (err error) { 1878 r1, _, e1 := syscall.Syscall(procGetComputerNameExW.Addr(), 3, uintptr(nametype), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(n))) 1879 if r1 == 0 { 1880 err = errnoErr(e1) 1881 } 1882 return 1883} 1884 1885func GetComputerName(buf *uint16, n *uint32) (err error) { 1886 r1, _, e1 := syscall.Syscall(procGetComputerNameW.Addr(), 2, uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(n)), 0) 1887 if r1 == 0 { 1888 err = errnoErr(e1) 1889 } 1890 return 1891} 1892 1893func GetConsoleMode(console Handle, mode *uint32) (err error) { 1894 r1, _, e1 := syscall.Syscall(procGetConsoleMode.Addr(), 2, uintptr(console), uintptr(unsafe.Pointer(mode)), 0) 1895 if r1 == 0 { 1896 err = errnoErr(e1) 1897 } 1898 return 1899} 1900 1901func GetConsoleScreenBufferInfo(console Handle, info *ConsoleScreenBufferInfo) (err error) { 1902 r1, _, e1 := syscall.Syscall(procGetConsoleScreenBufferInfo.Addr(), 2, uintptr(console), uintptr(unsafe.Pointer(info)), 0) 1903 if r1 == 0 { 1904 err = errnoErr(e1) 1905 } 1906 return 1907} 1908 1909func GetCurrentDirectory(buflen uint32, buf *uint16) (n uint32, err error) { 1910 r0, _, e1 := syscall.Syscall(procGetCurrentDirectoryW.Addr(), 2, uintptr(buflen), uintptr(unsafe.Pointer(buf)), 0) 1911 n = uint32(r0) 1912 if n == 0 { 1913 err = errnoErr(e1) 1914 } 1915 return 1916} 1917 1918func GetCurrentProcessId() (pid uint32) { 1919 r0, _, _ := syscall.Syscall(procGetCurrentProcessId.Addr(), 0, 0, 0, 0) 1920 pid = uint32(r0) 1921 return 1922} 1923 1924func GetCurrentThreadId() (id uint32) { 1925 r0, _, _ := syscall.Syscall(procGetCurrentThreadId.Addr(), 0, 0, 0, 0) 1926 id = uint32(r0) 1927 return 1928} 1929 1930func GetDiskFreeSpaceEx(directoryName *uint16, freeBytesAvailableToCaller *uint64, totalNumberOfBytes *uint64, totalNumberOfFreeBytes *uint64) (err error) { 1931 r1, _, e1 := syscall.Syscall6(procGetDiskFreeSpaceExW.Addr(), 4, uintptr(unsafe.Pointer(directoryName)), uintptr(unsafe.Pointer(freeBytesAvailableToCaller)), uintptr(unsafe.Pointer(totalNumberOfBytes)), uintptr(unsafe.Pointer(totalNumberOfFreeBytes)), 0, 0) 1932 if r1 == 0 { 1933 err = errnoErr(e1) 1934 } 1935 return 1936} 1937 1938func GetDriveType(rootPathName *uint16) (driveType uint32) { 1939 r0, _, _ := syscall.Syscall(procGetDriveTypeW.Addr(), 1, uintptr(unsafe.Pointer(rootPathName)), 0, 0) 1940 driveType = uint32(r0) 1941 return 1942} 1943 1944func GetEnvironmentStrings() (envs *uint16, err error) { 1945 r0, _, e1 := syscall.Syscall(procGetEnvironmentStringsW.Addr(), 0, 0, 0, 0) 1946 envs = (*uint16)(unsafe.Pointer(r0)) 1947 if envs == nil { 1948 err = errnoErr(e1) 1949 } 1950 return 1951} 1952 1953func GetEnvironmentVariable(name *uint16, buffer *uint16, size uint32) (n uint32, err error) { 1954 r0, _, e1 := syscall.Syscall(procGetEnvironmentVariableW.Addr(), 3, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(buffer)), uintptr(size)) 1955 n = uint32(r0) 1956 if n == 0 { 1957 err = errnoErr(e1) 1958 } 1959 return 1960} 1961 1962func GetExitCodeProcess(handle Handle, exitcode *uint32) (err error) { 1963 r1, _, e1 := syscall.Syscall(procGetExitCodeProcess.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(exitcode)), 0) 1964 if r1 == 0 { 1965 err = errnoErr(e1) 1966 } 1967 return 1968} 1969 1970func GetFileAttributesEx(name *uint16, level uint32, info *byte) (err error) { 1971 r1, _, e1 := syscall.Syscall(procGetFileAttributesExW.Addr(), 3, uintptr(unsafe.Pointer(name)), uintptr(level), uintptr(unsafe.Pointer(info))) 1972 if r1 == 0 { 1973 err = errnoErr(e1) 1974 } 1975 return 1976} 1977 1978func GetFileAttributes(name *uint16) (attrs uint32, err error) { 1979 r0, _, e1 := syscall.Syscall(procGetFileAttributesW.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0) 1980 attrs = uint32(r0) 1981 if attrs == INVALID_FILE_ATTRIBUTES { 1982 err = errnoErr(e1) 1983 } 1984 return 1985} 1986 1987func GetFileInformationByHandle(handle Handle, data *ByHandleFileInformation) (err error) { 1988 r1, _, e1 := syscall.Syscall(procGetFileInformationByHandle.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0) 1989 if r1 == 0 { 1990 err = errnoErr(e1) 1991 } 1992 return 1993} 1994 1995func GetFileInformationByHandleEx(handle Handle, class uint32, outBuffer *byte, outBufferLen uint32) (err error) { 1996 r1, _, e1 := syscall.Syscall6(procGetFileInformationByHandleEx.Addr(), 4, uintptr(handle), uintptr(class), uintptr(unsafe.Pointer(outBuffer)), uintptr(outBufferLen), 0, 0) 1997 if r1 == 0 { 1998 err = errnoErr(e1) 1999 } 2000 return 2001} 2002 2003func GetFileType(filehandle Handle) (n uint32, err error) { 2004 r0, _, e1 := syscall.Syscall(procGetFileType.Addr(), 1, uintptr(filehandle), 0, 0) 2005 n = uint32(r0) 2006 if n == 0 { 2007 err = errnoErr(e1) 2008 } 2009 return 2010} 2011 2012func GetFinalPathNameByHandle(file Handle, filePath *uint16, filePathSize uint32, flags uint32) (n uint32, err error) { 2013 r0, _, e1 := syscall.Syscall6(procGetFinalPathNameByHandleW.Addr(), 4, uintptr(file), uintptr(unsafe.Pointer(filePath)), uintptr(filePathSize), uintptr(flags), 0, 0) 2014 n = uint32(r0) 2015 if n == 0 { 2016 err = errnoErr(e1) 2017 } 2018 return 2019} 2020 2021func GetFullPathName(path *uint16, buflen uint32, buf *uint16, fname **uint16) (n uint32, err error) { 2022 r0, _, e1 := syscall.Syscall6(procGetFullPathNameW.Addr(), 4, uintptr(unsafe.Pointer(path)), uintptr(buflen), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(fname)), 0, 0) 2023 n = uint32(r0) 2024 if n == 0 { 2025 err = errnoErr(e1) 2026 } 2027 return 2028} 2029 2030func GetLastError() (lasterr error) { 2031 r0, _, _ := syscall.Syscall(procGetLastError.Addr(), 0, 0, 0, 0) 2032 if r0 != 0 { 2033 lasterr = syscall.Errno(r0) 2034 } 2035 return 2036} 2037 2038func GetLogicalDriveStrings(bufferLength uint32, buffer *uint16) (n uint32, err error) { 2039 r0, _, e1 := syscall.Syscall(procGetLogicalDriveStringsW.Addr(), 2, uintptr(bufferLength), uintptr(unsafe.Pointer(buffer)), 0) 2040 n = uint32(r0) 2041 if n == 0 { 2042 err = errnoErr(e1) 2043 } 2044 return 2045} 2046 2047func GetLogicalDrives() (drivesBitMask uint32, err error) { 2048 r0, _, e1 := syscall.Syscall(procGetLogicalDrives.Addr(), 0, 0, 0, 0) 2049 drivesBitMask = uint32(r0) 2050 if drivesBitMask == 0 { 2051 err = errnoErr(e1) 2052 } 2053 return 2054} 2055 2056func GetLongPathName(path *uint16, buf *uint16, buflen uint32) (n uint32, err error) { 2057 r0, _, e1 := syscall.Syscall(procGetLongPathNameW.Addr(), 3, uintptr(unsafe.Pointer(path)), uintptr(unsafe.Pointer(buf)), uintptr(buflen)) 2058 n = uint32(r0) 2059 if n == 0 { 2060 err = errnoErr(e1) 2061 } 2062 return 2063} 2064 2065func GetModuleFileName(module Handle, filename *uint16, size uint32) (n uint32, err error) { 2066 r0, _, e1 := syscall.Syscall(procGetModuleFileNameW.Addr(), 3, uintptr(module), uintptr(unsafe.Pointer(filename)), uintptr(size)) 2067 n = uint32(r0) 2068 if n == 0 { 2069 err = errnoErr(e1) 2070 } 2071 return 2072} 2073 2074func GetModuleHandleEx(flags uint32, moduleName *uint16, module *Handle) (err error) { 2075 r1, _, e1 := syscall.Syscall(procGetModuleHandleExW.Addr(), 3, uintptr(flags), uintptr(unsafe.Pointer(moduleName)), uintptr(unsafe.Pointer(module))) 2076 if r1 == 0 { 2077 err = errnoErr(e1) 2078 } 2079 return 2080} 2081 2082func GetNamedPipeHandleState(pipe Handle, state *uint32, curInstances *uint32, maxCollectionCount *uint32, collectDataTimeout *uint32, userName *uint16, maxUserNameSize uint32) (err error) { 2083 r1, _, e1 := syscall.Syscall9(procGetNamedPipeHandleStateW.Addr(), 7, uintptr(pipe), uintptr(unsafe.Pointer(state)), uintptr(unsafe.Pointer(curInstances)), uintptr(unsafe.Pointer(maxCollectionCount)), uintptr(unsafe.Pointer(collectDataTimeout)), uintptr(unsafe.Pointer(userName)), uintptr(maxUserNameSize), 0, 0) 2084 if r1 == 0 { 2085 err = errnoErr(e1) 2086 } 2087 return 2088} 2089 2090func GetNamedPipeInfo(pipe Handle, flags *uint32, outSize *uint32, inSize *uint32, maxInstances *uint32) (err error) { 2091 r1, _, e1 := syscall.Syscall6(procGetNamedPipeInfo.Addr(), 5, uintptr(pipe), uintptr(unsafe.Pointer(flags)), uintptr(unsafe.Pointer(outSize)), uintptr(unsafe.Pointer(inSize)), uintptr(unsafe.Pointer(maxInstances)), 0) 2092 if r1 == 0 { 2093 err = errnoErr(e1) 2094 } 2095 return 2096} 2097 2098func GetOverlappedResult(handle Handle, overlapped *Overlapped, done *uint32, wait bool) (err error) { 2099 var _p0 uint32 2100 if wait { 2101 _p0 = 1 2102 } 2103 r1, _, e1 := syscall.Syscall6(procGetOverlappedResult.Addr(), 4, uintptr(handle), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(done)), uintptr(_p0), 0, 0) 2104 if r1 == 0 { 2105 err = errnoErr(e1) 2106 } 2107 return 2108} 2109 2110func GetPriorityClass(process Handle) (ret uint32, err error) { 2111 r0, _, e1 := syscall.Syscall(procGetPriorityClass.Addr(), 1, uintptr(process), 0, 0) 2112 ret = uint32(r0) 2113 if ret == 0 { 2114 err = errnoErr(e1) 2115 } 2116 return 2117} 2118 2119func GetProcAddress(module Handle, procname string) (proc uintptr, err error) { 2120 var _p0 *byte 2121 _p0, err = syscall.BytePtrFromString(procname) 2122 if err != nil { 2123 return 2124 } 2125 return _GetProcAddress(module, _p0) 2126} 2127 2128func _GetProcAddress(module Handle, procname *byte) (proc uintptr, err error) { 2129 r0, _, e1 := syscall.Syscall(procGetProcAddress.Addr(), 2, uintptr(module), uintptr(unsafe.Pointer(procname)), 0) 2130 proc = uintptr(r0) 2131 if proc == 0 { 2132 err = errnoErr(e1) 2133 } 2134 return 2135} 2136 2137func GetProcessId(process Handle) (id uint32, err error) { 2138 r0, _, e1 := syscall.Syscall(procGetProcessId.Addr(), 1, uintptr(process), 0, 0) 2139 id = uint32(r0) 2140 if id == 0 { 2141 err = errnoErr(e1) 2142 } 2143 return 2144} 2145 2146func getProcessPreferredUILanguages(flags uint32, numLanguages *uint32, buf *uint16, bufSize *uint32) (err error) { 2147 r1, _, e1 := syscall.Syscall6(procGetProcessPreferredUILanguages.Addr(), 4, uintptr(flags), uintptr(unsafe.Pointer(numLanguages)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(bufSize)), 0, 0) 2148 if r1 == 0 { 2149 err = errnoErr(e1) 2150 } 2151 return 2152} 2153 2154func GetProcessShutdownParameters(level *uint32, flags *uint32) (err error) { 2155 r1, _, e1 := syscall.Syscall(procGetProcessShutdownParameters.Addr(), 2, uintptr(unsafe.Pointer(level)), uintptr(unsafe.Pointer(flags)), 0) 2156 if r1 == 0 { 2157 err = errnoErr(e1) 2158 } 2159 return 2160} 2161 2162func GetProcessTimes(handle Handle, creationTime *Filetime, exitTime *Filetime, kernelTime *Filetime, userTime *Filetime) (err error) { 2163 r1, _, e1 := syscall.Syscall6(procGetProcessTimes.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(creationTime)), uintptr(unsafe.Pointer(exitTime)), uintptr(unsafe.Pointer(kernelTime)), uintptr(unsafe.Pointer(userTime)), 0) 2164 if r1 == 0 { 2165 err = errnoErr(e1) 2166 } 2167 return 2168} 2169 2170func GetProcessWorkingSetSizeEx(hProcess Handle, lpMinimumWorkingSetSize *uintptr, lpMaximumWorkingSetSize *uintptr, flags *uint32) { 2171 syscall.Syscall6(procGetProcessWorkingSetSizeEx.Addr(), 4, uintptr(hProcess), uintptr(unsafe.Pointer(lpMinimumWorkingSetSize)), uintptr(unsafe.Pointer(lpMaximumWorkingSetSize)), uintptr(unsafe.Pointer(flags)), 0, 0) 2172 return 2173} 2174 2175func GetQueuedCompletionStatus(cphandle Handle, qty *uint32, key *uintptr, overlapped **Overlapped, timeout uint32) (err error) { 2176 r1, _, e1 := syscall.Syscall6(procGetQueuedCompletionStatus.Addr(), 5, uintptr(cphandle), uintptr(unsafe.Pointer(qty)), uintptr(unsafe.Pointer(key)), uintptr(unsafe.Pointer(overlapped)), uintptr(timeout), 0) 2177 if r1 == 0 { 2178 err = errnoErr(e1) 2179 } 2180 return 2181} 2182 2183func GetShortPathName(longpath *uint16, shortpath *uint16, buflen uint32) (n uint32, err error) { 2184 r0, _, e1 := syscall.Syscall(procGetShortPathNameW.Addr(), 3, uintptr(unsafe.Pointer(longpath)), uintptr(unsafe.Pointer(shortpath)), uintptr(buflen)) 2185 n = uint32(r0) 2186 if n == 0 { 2187 err = errnoErr(e1) 2188 } 2189 return 2190} 2191 2192func GetStartupInfo(startupInfo *StartupInfo) (err error) { 2193 r1, _, e1 := syscall.Syscall(procGetStartupInfoW.Addr(), 1, uintptr(unsafe.Pointer(startupInfo)), 0, 0) 2194 if r1 == 0 { 2195 err = errnoErr(e1) 2196 } 2197 return 2198} 2199 2200func GetStdHandle(stdhandle uint32) (handle Handle, err error) { 2201 r0, _, e1 := syscall.Syscall(procGetStdHandle.Addr(), 1, uintptr(stdhandle), 0, 0) 2202 handle = Handle(r0) 2203 if handle == InvalidHandle { 2204 err = errnoErr(e1) 2205 } 2206 return 2207} 2208 2209func getSystemDirectory(dir *uint16, dirLen uint32) (len uint32, err error) { 2210 r0, _, e1 := syscall.Syscall(procGetSystemDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(dir)), uintptr(dirLen), 0) 2211 len = uint32(r0) 2212 if len == 0 { 2213 err = errnoErr(e1) 2214 } 2215 return 2216} 2217 2218func getSystemPreferredUILanguages(flags uint32, numLanguages *uint32, buf *uint16, bufSize *uint32) (err error) { 2219 r1, _, e1 := syscall.Syscall6(procGetSystemPreferredUILanguages.Addr(), 4, uintptr(flags), uintptr(unsafe.Pointer(numLanguages)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(bufSize)), 0, 0) 2220 if r1 == 0 { 2221 err = errnoErr(e1) 2222 } 2223 return 2224} 2225 2226func GetSystemTimeAsFileTime(time *Filetime) { 2227 syscall.Syscall(procGetSystemTimeAsFileTime.Addr(), 1, uintptr(unsafe.Pointer(time)), 0, 0) 2228 return 2229} 2230 2231func GetSystemTimePreciseAsFileTime(time *Filetime) { 2232 syscall.Syscall(procGetSystemTimePreciseAsFileTime.Addr(), 1, uintptr(unsafe.Pointer(time)), 0, 0) 2233 return 2234} 2235 2236func getSystemWindowsDirectory(dir *uint16, dirLen uint32) (len uint32, err error) { 2237 r0, _, e1 := syscall.Syscall(procGetSystemWindowsDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(dir)), uintptr(dirLen), 0) 2238 len = uint32(r0) 2239 if len == 0 { 2240 err = errnoErr(e1) 2241 } 2242 return 2243} 2244 2245func GetTempPath(buflen uint32, buf *uint16) (n uint32, err error) { 2246 r0, _, e1 := syscall.Syscall(procGetTempPathW.Addr(), 2, uintptr(buflen), uintptr(unsafe.Pointer(buf)), 0) 2247 n = uint32(r0) 2248 if n == 0 { 2249 err = errnoErr(e1) 2250 } 2251 return 2252} 2253 2254func getThreadPreferredUILanguages(flags uint32, numLanguages *uint32, buf *uint16, bufSize *uint32) (err error) { 2255 r1, _, e1 := syscall.Syscall6(procGetThreadPreferredUILanguages.Addr(), 4, uintptr(flags), uintptr(unsafe.Pointer(numLanguages)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(bufSize)), 0, 0) 2256 if r1 == 0 { 2257 err = errnoErr(e1) 2258 } 2259 return 2260} 2261 2262func getTickCount64() (ms uint64) { 2263 r0, _, _ := syscall.Syscall(procGetTickCount64.Addr(), 0, 0, 0, 0) 2264 ms = uint64(r0) 2265 return 2266} 2267 2268func GetTimeZoneInformation(tzi *Timezoneinformation) (rc uint32, err error) { 2269 r0, _, e1 := syscall.Syscall(procGetTimeZoneInformation.Addr(), 1, uintptr(unsafe.Pointer(tzi)), 0, 0) 2270 rc = uint32(r0) 2271 if rc == 0xffffffff { 2272 err = errnoErr(e1) 2273 } 2274 return 2275} 2276 2277func getUserPreferredUILanguages(flags uint32, numLanguages *uint32, buf *uint16, bufSize *uint32) (err error) { 2278 r1, _, e1 := syscall.Syscall6(procGetUserPreferredUILanguages.Addr(), 4, uintptr(flags), uintptr(unsafe.Pointer(numLanguages)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(bufSize)), 0, 0) 2279 if r1 == 0 { 2280 err = errnoErr(e1) 2281 } 2282 return 2283} 2284 2285func GetVersion() (ver uint32, err error) { 2286 r0, _, e1 := syscall.Syscall(procGetVersion.Addr(), 0, 0, 0, 0) 2287 ver = uint32(r0) 2288 if ver == 0 { 2289 err = errnoErr(e1) 2290 } 2291 return 2292} 2293 2294func GetVolumeInformationByHandle(file Handle, volumeNameBuffer *uint16, volumeNameSize uint32, volumeNameSerialNumber *uint32, maximumComponentLength *uint32, fileSystemFlags *uint32, fileSystemNameBuffer *uint16, fileSystemNameSize uint32) (err error) { 2295 r1, _, e1 := syscall.Syscall9(procGetVolumeInformationByHandleW.Addr(), 8, uintptr(file), uintptr(unsafe.Pointer(volumeNameBuffer)), uintptr(volumeNameSize), uintptr(unsafe.Pointer(volumeNameSerialNumber)), uintptr(unsafe.Pointer(maximumComponentLength)), uintptr(unsafe.Pointer(fileSystemFlags)), uintptr(unsafe.Pointer(fileSystemNameBuffer)), uintptr(fileSystemNameSize), 0) 2296 if r1 == 0 { 2297 err = errnoErr(e1) 2298 } 2299 return 2300} 2301 2302func GetVolumeInformation(rootPathName *uint16, volumeNameBuffer *uint16, volumeNameSize uint32, volumeNameSerialNumber *uint32, maximumComponentLength *uint32, fileSystemFlags *uint32, fileSystemNameBuffer *uint16, fileSystemNameSize uint32) (err error) { 2303 r1, _, e1 := syscall.Syscall9(procGetVolumeInformationW.Addr(), 8, uintptr(unsafe.Pointer(rootPathName)), uintptr(unsafe.Pointer(volumeNameBuffer)), uintptr(volumeNameSize), uintptr(unsafe.Pointer(volumeNameSerialNumber)), uintptr(unsafe.Pointer(maximumComponentLength)), uintptr(unsafe.Pointer(fileSystemFlags)), uintptr(unsafe.Pointer(fileSystemNameBuffer)), uintptr(fileSystemNameSize), 0) 2304 if r1 == 0 { 2305 err = errnoErr(e1) 2306 } 2307 return 2308} 2309 2310func GetVolumeNameForVolumeMountPoint(volumeMountPoint *uint16, volumeName *uint16, bufferlength uint32) (err error) { 2311 r1, _, e1 := syscall.Syscall(procGetVolumeNameForVolumeMountPointW.Addr(), 3, uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(unsafe.Pointer(volumeName)), uintptr(bufferlength)) 2312 if r1 == 0 { 2313 err = errnoErr(e1) 2314 } 2315 return 2316} 2317 2318func GetVolumePathName(fileName *uint16, volumePathName *uint16, bufferLength uint32) (err error) { 2319 r1, _, e1 := syscall.Syscall(procGetVolumePathNameW.Addr(), 3, uintptr(unsafe.Pointer(fileName)), uintptr(unsafe.Pointer(volumePathName)), uintptr(bufferLength)) 2320 if r1 == 0 { 2321 err = errnoErr(e1) 2322 } 2323 return 2324} 2325 2326func GetVolumePathNamesForVolumeName(volumeName *uint16, volumePathNames *uint16, bufferLength uint32, returnLength *uint32) (err error) { 2327 r1, _, e1 := syscall.Syscall6(procGetVolumePathNamesForVolumeNameW.Addr(), 4, uintptr(unsafe.Pointer(volumeName)), uintptr(unsafe.Pointer(volumePathNames)), uintptr(bufferLength), uintptr(unsafe.Pointer(returnLength)), 0, 0) 2328 if r1 == 0 { 2329 err = errnoErr(e1) 2330 } 2331 return 2332} 2333 2334func getWindowsDirectory(dir *uint16, dirLen uint32) (len uint32, err error) { 2335 r0, _, e1 := syscall.Syscall(procGetWindowsDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(dir)), uintptr(dirLen), 0) 2336 len = uint32(r0) 2337 if len == 0 { 2338 err = errnoErr(e1) 2339 } 2340 return 2341} 2342 2343func initializeProcThreadAttributeList(attrlist *ProcThreadAttributeList, attrcount uint32, flags uint32, size *uintptr) (err error) { 2344 r1, _, e1 := syscall.Syscall6(procInitializeProcThreadAttributeList.Addr(), 4, uintptr(unsafe.Pointer(attrlist)), uintptr(attrcount), uintptr(flags), uintptr(unsafe.Pointer(size)), 0, 0) 2345 if r1 == 0 { 2346 err = errnoErr(e1) 2347 } 2348 return 2349} 2350 2351func IsWow64Process(handle Handle, isWow64 *bool) (err error) { 2352 var _p0 uint32 2353 if *isWow64 { 2354 _p0 = 1 2355 } 2356 r1, _, e1 := syscall.Syscall(procIsWow64Process.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(&_p0)), 0) 2357 *isWow64 = _p0 != 0 2358 if r1 == 0 { 2359 err = errnoErr(e1) 2360 } 2361 return 2362} 2363 2364func IsWow64Process2(handle Handle, processMachine *uint16, nativeMachine *uint16) (err error) { 2365 err = procIsWow64Process2.Find() 2366 if err != nil { 2367 return 2368 } 2369 r1, _, e1 := syscall.Syscall(procIsWow64Process2.Addr(), 3, uintptr(handle), uintptr(unsafe.Pointer(processMachine)), uintptr(unsafe.Pointer(nativeMachine))) 2370 if r1 == 0 { 2371 err = errnoErr(e1) 2372 } 2373 return 2374} 2375 2376func LoadLibraryEx(libname string, zero Handle, flags uintptr) (handle Handle, err error) { 2377 var _p0 *uint16 2378 _p0, err = syscall.UTF16PtrFromString(libname) 2379 if err != nil { 2380 return 2381 } 2382 return _LoadLibraryEx(_p0, zero, flags) 2383} 2384 2385func _LoadLibraryEx(libname *uint16, zero Handle, flags uintptr) (handle Handle, err error) { 2386 r0, _, e1 := syscall.Syscall(procLoadLibraryExW.Addr(), 3, uintptr(unsafe.Pointer(libname)), uintptr(zero), uintptr(flags)) 2387 handle = Handle(r0) 2388 if handle == 0 { 2389 err = errnoErr(e1) 2390 } 2391 return 2392} 2393 2394func LoadLibrary(libname string) (handle Handle, err error) { 2395 var _p0 *uint16 2396 _p0, err = syscall.UTF16PtrFromString(libname) 2397 if err != nil { 2398 return 2399 } 2400 return _LoadLibrary(_p0) 2401} 2402 2403func _LoadLibrary(libname *uint16) (handle Handle, err error) { 2404 r0, _, e1 := syscall.Syscall(procLoadLibraryW.Addr(), 1, uintptr(unsafe.Pointer(libname)), 0, 0) 2405 handle = Handle(r0) 2406 if handle == 0 { 2407 err = errnoErr(e1) 2408 } 2409 return 2410} 2411 2412func LoadResource(module Handle, resInfo Handle) (resData Handle, err error) { 2413 r0, _, e1 := syscall.Syscall(procLoadResource.Addr(), 2, uintptr(module), uintptr(resInfo), 0) 2414 resData = Handle(r0) 2415 if resData == 0 { 2416 err = errnoErr(e1) 2417 } 2418 return 2419} 2420 2421func LocalAlloc(flags uint32, length uint32) (ptr uintptr, err error) { 2422 r0, _, e1 := syscall.Syscall(procLocalAlloc.Addr(), 2, uintptr(flags), uintptr(length), 0) 2423 ptr = uintptr(r0) 2424 if ptr == 0 { 2425 err = errnoErr(e1) 2426 } 2427 return 2428} 2429 2430func LocalFree(hmem Handle) (handle Handle, err error) { 2431 r0, _, e1 := syscall.Syscall(procLocalFree.Addr(), 1, uintptr(hmem), 0, 0) 2432 handle = Handle(r0) 2433 if handle != 0 { 2434 err = errnoErr(e1) 2435 } 2436 return 2437} 2438 2439func LockFileEx(file Handle, flags uint32, reserved uint32, bytesLow uint32, bytesHigh uint32, overlapped *Overlapped) (err error) { 2440 r1, _, e1 := syscall.Syscall6(procLockFileEx.Addr(), 6, uintptr(file), uintptr(flags), uintptr(reserved), uintptr(bytesLow), uintptr(bytesHigh), uintptr(unsafe.Pointer(overlapped))) 2441 if r1 == 0 { 2442 err = errnoErr(e1) 2443 } 2444 return 2445} 2446 2447func LockResource(resData Handle) (addr uintptr, err error) { 2448 r0, _, e1 := syscall.Syscall(procLockResource.Addr(), 1, uintptr(resData), 0, 0) 2449 addr = uintptr(r0) 2450 if addr == 0 { 2451 err = errnoErr(e1) 2452 } 2453 return 2454} 2455 2456func MapViewOfFile(handle Handle, access uint32, offsetHigh uint32, offsetLow uint32, length uintptr) (addr uintptr, err error) { 2457 r0, _, e1 := syscall.Syscall6(procMapViewOfFile.Addr(), 5, uintptr(handle), uintptr(access), uintptr(offsetHigh), uintptr(offsetLow), uintptr(length), 0) 2458 addr = uintptr(r0) 2459 if addr == 0 { 2460 err = errnoErr(e1) 2461 } 2462 return 2463} 2464 2465func MoveFileEx(from *uint16, to *uint16, flags uint32) (err error) { 2466 r1, _, e1 := syscall.Syscall(procMoveFileExW.Addr(), 3, uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(to)), uintptr(flags)) 2467 if r1 == 0 { 2468 err = errnoErr(e1) 2469 } 2470 return 2471} 2472 2473func MoveFile(from *uint16, to *uint16) (err error) { 2474 r1, _, e1 := syscall.Syscall(procMoveFileW.Addr(), 2, uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(to)), 0) 2475 if r1 == 0 { 2476 err = errnoErr(e1) 2477 } 2478 return 2479} 2480 2481func MultiByteToWideChar(codePage uint32, dwFlags uint32, str *byte, nstr int32, wchar *uint16, nwchar int32) (nwrite int32, err error) { 2482 r0, _, e1 := syscall.Syscall6(procMultiByteToWideChar.Addr(), 6, uintptr(codePage), uintptr(dwFlags), uintptr(unsafe.Pointer(str)), uintptr(nstr), uintptr(unsafe.Pointer(wchar)), uintptr(nwchar)) 2483 nwrite = int32(r0) 2484 if nwrite == 0 { 2485 err = errnoErr(e1) 2486 } 2487 return 2488} 2489 2490func OpenEvent(desiredAccess uint32, inheritHandle bool, name *uint16) (handle Handle, err error) { 2491 var _p0 uint32 2492 if inheritHandle { 2493 _p0 = 1 2494 } 2495 r0, _, e1 := syscall.Syscall(procOpenEventW.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(unsafe.Pointer(name))) 2496 handle = Handle(r0) 2497 if handle == 0 { 2498 err = errnoErr(e1) 2499 } 2500 return 2501} 2502 2503func OpenMutex(desiredAccess uint32, inheritHandle bool, name *uint16) (handle Handle, err error) { 2504 var _p0 uint32 2505 if inheritHandle { 2506 _p0 = 1 2507 } 2508 r0, _, e1 := syscall.Syscall(procOpenMutexW.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(unsafe.Pointer(name))) 2509 handle = Handle(r0) 2510 if handle == 0 { 2511 err = errnoErr(e1) 2512 } 2513 return 2514} 2515 2516func OpenProcess(desiredAccess uint32, inheritHandle bool, processId uint32) (handle Handle, err error) { 2517 var _p0 uint32 2518 if inheritHandle { 2519 _p0 = 1 2520 } 2521 r0, _, e1 := syscall.Syscall(procOpenProcess.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(processId)) 2522 handle = Handle(r0) 2523 if handle == 0 { 2524 err = errnoErr(e1) 2525 } 2526 return 2527} 2528 2529func OpenThread(desiredAccess uint32, inheritHandle bool, threadId uint32) (handle Handle, err error) { 2530 var _p0 uint32 2531 if inheritHandle { 2532 _p0 = 1 2533 } 2534 r0, _, e1 := syscall.Syscall(procOpenThread.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(threadId)) 2535 handle = Handle(r0) 2536 if handle == 0 { 2537 err = errnoErr(e1) 2538 } 2539 return 2540} 2541 2542func PostQueuedCompletionStatus(cphandle Handle, qty uint32, key uintptr, overlapped *Overlapped) (err error) { 2543 r1, _, e1 := syscall.Syscall6(procPostQueuedCompletionStatus.Addr(), 4, uintptr(cphandle), uintptr(qty), uintptr(key), uintptr(unsafe.Pointer(overlapped)), 0, 0) 2544 if r1 == 0 { 2545 err = errnoErr(e1) 2546 } 2547 return 2548} 2549 2550func Process32First(snapshot Handle, procEntry *ProcessEntry32) (err error) { 2551 r1, _, e1 := syscall.Syscall(procProcess32FirstW.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(procEntry)), 0) 2552 if r1 == 0 { 2553 err = errnoErr(e1) 2554 } 2555 return 2556} 2557 2558func Process32Next(snapshot Handle, procEntry *ProcessEntry32) (err error) { 2559 r1, _, e1 := syscall.Syscall(procProcess32NextW.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(procEntry)), 0) 2560 if r1 == 0 { 2561 err = errnoErr(e1) 2562 } 2563 return 2564} 2565 2566func ProcessIdToSessionId(pid uint32, sessionid *uint32) (err error) { 2567 r1, _, e1 := syscall.Syscall(procProcessIdToSessionId.Addr(), 2, uintptr(pid), uintptr(unsafe.Pointer(sessionid)), 0) 2568 if r1 == 0 { 2569 err = errnoErr(e1) 2570 } 2571 return 2572} 2573 2574func PulseEvent(event Handle) (err error) { 2575 r1, _, e1 := syscall.Syscall(procPulseEvent.Addr(), 1, uintptr(event), 0, 0) 2576 if r1 == 0 { 2577 err = errnoErr(e1) 2578 } 2579 return 2580} 2581 2582func QueryDosDevice(deviceName *uint16, targetPath *uint16, max uint32) (n uint32, err error) { 2583 r0, _, e1 := syscall.Syscall(procQueryDosDeviceW.Addr(), 3, uintptr(unsafe.Pointer(deviceName)), uintptr(unsafe.Pointer(targetPath)), uintptr(max)) 2584 n = uint32(r0) 2585 if n == 0 { 2586 err = errnoErr(e1) 2587 } 2588 return 2589} 2590 2591func QueryFullProcessImageName(proc Handle, flags uint32, exeName *uint16, size *uint32) (err error) { 2592 r1, _, e1 := syscall.Syscall6(procQueryFullProcessImageNameW.Addr(), 4, uintptr(proc), uintptr(flags), uintptr(unsafe.Pointer(exeName)), uintptr(unsafe.Pointer(size)), 0, 0) 2593 if r1 == 0 { 2594 err = errnoErr(e1) 2595 } 2596 return 2597} 2598 2599func QueryInformationJobObject(job Handle, JobObjectInformationClass int32, JobObjectInformation uintptr, JobObjectInformationLength uint32, retlen *uint32) (err error) { 2600 r1, _, e1 := syscall.Syscall6(procQueryInformationJobObject.Addr(), 5, uintptr(job), uintptr(JobObjectInformationClass), uintptr(JobObjectInformation), uintptr(JobObjectInformationLength), uintptr(unsafe.Pointer(retlen)), 0) 2601 if r1 == 0 { 2602 err = errnoErr(e1) 2603 } 2604 return 2605} 2606 2607func ReadConsole(console Handle, buf *uint16, toread uint32, read *uint32, inputControl *byte) (err error) { 2608 r1, _, e1 := syscall.Syscall6(procReadConsoleW.Addr(), 5, uintptr(console), uintptr(unsafe.Pointer(buf)), uintptr(toread), uintptr(unsafe.Pointer(read)), uintptr(unsafe.Pointer(inputControl)), 0) 2609 if r1 == 0 { 2610 err = errnoErr(e1) 2611 } 2612 return 2613} 2614 2615func ReadDirectoryChanges(handle Handle, buf *byte, buflen uint32, watchSubTree bool, mask uint32, retlen *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) { 2616 var _p0 uint32 2617 if watchSubTree { 2618 _p0 = 1 2619 } 2620 r1, _, e1 := syscall.Syscall9(procReadDirectoryChangesW.Addr(), 8, uintptr(handle), uintptr(unsafe.Pointer(buf)), uintptr(buflen), uintptr(_p0), uintptr(mask), uintptr(unsafe.Pointer(retlen)), uintptr(unsafe.Pointer(overlapped)), uintptr(completionRoutine), 0) 2621 if r1 == 0 { 2622 err = errnoErr(e1) 2623 } 2624 return 2625} 2626 2627func ReadFile(handle Handle, buf []byte, done *uint32, overlapped *Overlapped) (err error) { 2628 var _p0 *byte 2629 if len(buf) > 0 { 2630 _p0 = &buf[0] 2631 } 2632 r1, _, e1 := syscall.Syscall6(procReadFile.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(done)), uintptr(unsafe.Pointer(overlapped)), 0) 2633 if r1 == 0 { 2634 err = errnoErr(e1) 2635 } 2636 return 2637} 2638 2639func ReleaseMutex(mutex Handle) (err error) { 2640 r1, _, e1 := syscall.Syscall(procReleaseMutex.Addr(), 1, uintptr(mutex), 0, 0) 2641 if r1 == 0 { 2642 err = errnoErr(e1) 2643 } 2644 return 2645} 2646 2647func RemoveDirectory(path *uint16) (err error) { 2648 r1, _, e1 := syscall.Syscall(procRemoveDirectoryW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0) 2649 if r1 == 0 { 2650 err = errnoErr(e1) 2651 } 2652 return 2653} 2654 2655func ResetEvent(event Handle) (err error) { 2656 r1, _, e1 := syscall.Syscall(procResetEvent.Addr(), 1, uintptr(event), 0, 0) 2657 if r1 == 0 { 2658 err = errnoErr(e1) 2659 } 2660 return 2661} 2662 2663func ResumeThread(thread Handle) (ret uint32, err error) { 2664 r0, _, e1 := syscall.Syscall(procResumeThread.Addr(), 1, uintptr(thread), 0, 0) 2665 ret = uint32(r0) 2666 if ret == 0xffffffff { 2667 err = errnoErr(e1) 2668 } 2669 return 2670} 2671 2672func SetCommTimeouts(handle Handle, timeouts *CommTimeouts) (err error) { 2673 r1, _, e1 := syscall.Syscall(procSetCommTimeouts.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(timeouts)), 0) 2674 if r1 == 0 { 2675 err = errnoErr(e1) 2676 } 2677 return 2678} 2679 2680func setConsoleCursorPosition(console Handle, position uint32) (err error) { 2681 r1, _, e1 := syscall.Syscall(procSetConsoleCursorPosition.Addr(), 2, uintptr(console), uintptr(position), 0) 2682 if r1 == 0 { 2683 err = errnoErr(e1) 2684 } 2685 return 2686} 2687 2688func SetConsoleMode(console Handle, mode uint32) (err error) { 2689 r1, _, e1 := syscall.Syscall(procSetConsoleMode.Addr(), 2, uintptr(console), uintptr(mode), 0) 2690 if r1 == 0 { 2691 err = errnoErr(e1) 2692 } 2693 return 2694} 2695 2696func SetCurrentDirectory(path *uint16) (err error) { 2697 r1, _, e1 := syscall.Syscall(procSetCurrentDirectoryW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0) 2698 if r1 == 0 { 2699 err = errnoErr(e1) 2700 } 2701 return 2702} 2703 2704func SetDefaultDllDirectories(directoryFlags uint32) (err error) { 2705 r1, _, e1 := syscall.Syscall(procSetDefaultDllDirectories.Addr(), 1, uintptr(directoryFlags), 0, 0) 2706 if r1 == 0 { 2707 err = errnoErr(e1) 2708 } 2709 return 2710} 2711 2712func SetDllDirectory(path string) (err error) { 2713 var _p0 *uint16 2714 _p0, err = syscall.UTF16PtrFromString(path) 2715 if err != nil { 2716 return 2717 } 2718 return _SetDllDirectory(_p0) 2719} 2720 2721func _SetDllDirectory(path *uint16) (err error) { 2722 r1, _, e1 := syscall.Syscall(procSetDllDirectoryW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0) 2723 if r1 == 0 { 2724 err = errnoErr(e1) 2725 } 2726 return 2727} 2728 2729func SetEndOfFile(handle Handle) (err error) { 2730 r1, _, e1 := syscall.Syscall(procSetEndOfFile.Addr(), 1, uintptr(handle), 0, 0) 2731 if r1 == 0 { 2732 err = errnoErr(e1) 2733 } 2734 return 2735} 2736 2737func SetEnvironmentVariable(name *uint16, value *uint16) (err error) { 2738 r1, _, e1 := syscall.Syscall(procSetEnvironmentVariableW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(value)), 0) 2739 if r1 == 0 { 2740 err = errnoErr(e1) 2741 } 2742 return 2743} 2744 2745func SetErrorMode(mode uint32) (ret uint32) { 2746 r0, _, _ := syscall.Syscall(procSetErrorMode.Addr(), 1, uintptr(mode), 0, 0) 2747 ret = uint32(r0) 2748 return 2749} 2750 2751func SetEvent(event Handle) (err error) { 2752 r1, _, e1 := syscall.Syscall(procSetEvent.Addr(), 1, uintptr(event), 0, 0) 2753 if r1 == 0 { 2754 err = errnoErr(e1) 2755 } 2756 return 2757} 2758 2759func SetFileAttributes(name *uint16, attrs uint32) (err error) { 2760 r1, _, e1 := syscall.Syscall(procSetFileAttributesW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(attrs), 0) 2761 if r1 == 0 { 2762 err = errnoErr(e1) 2763 } 2764 return 2765} 2766 2767func SetFileCompletionNotificationModes(handle Handle, flags uint8) (err error) { 2768 r1, _, e1 := syscall.Syscall(procSetFileCompletionNotificationModes.Addr(), 2, uintptr(handle), uintptr(flags), 0) 2769 if r1 == 0 { 2770 err = errnoErr(e1) 2771 } 2772 return 2773} 2774 2775func SetFileInformationByHandle(handle Handle, class uint32, inBuffer *byte, inBufferLen uint32) (err error) { 2776 r1, _, e1 := syscall.Syscall6(procSetFileInformationByHandle.Addr(), 4, uintptr(handle), uintptr(class), uintptr(unsafe.Pointer(inBuffer)), uintptr(inBufferLen), 0, 0) 2777 if r1 == 0 { 2778 err = errnoErr(e1) 2779 } 2780 return 2781} 2782 2783func SetFilePointer(handle Handle, lowoffset int32, highoffsetptr *int32, whence uint32) (newlowoffset uint32, err error) { 2784 r0, _, e1 := syscall.Syscall6(procSetFilePointer.Addr(), 4, uintptr(handle), uintptr(lowoffset), uintptr(unsafe.Pointer(highoffsetptr)), uintptr(whence), 0, 0) 2785 newlowoffset = uint32(r0) 2786 if newlowoffset == 0xffffffff { 2787 err = errnoErr(e1) 2788 } 2789 return 2790} 2791 2792func SetFileTime(handle Handle, ctime *Filetime, atime *Filetime, wtime *Filetime) (err error) { 2793 r1, _, e1 := syscall.Syscall6(procSetFileTime.Addr(), 4, uintptr(handle), uintptr(unsafe.Pointer(ctime)), uintptr(unsafe.Pointer(atime)), uintptr(unsafe.Pointer(wtime)), 0, 0) 2794 if r1 == 0 { 2795 err = errnoErr(e1) 2796 } 2797 return 2798} 2799 2800func SetHandleInformation(handle Handle, mask uint32, flags uint32) (err error) { 2801 r1, _, e1 := syscall.Syscall(procSetHandleInformation.Addr(), 3, uintptr(handle), uintptr(mask), uintptr(flags)) 2802 if r1 == 0 { 2803 err = errnoErr(e1) 2804 } 2805 return 2806} 2807 2808func SetInformationJobObject(job Handle, JobObjectInformationClass uint32, JobObjectInformation uintptr, JobObjectInformationLength uint32) (ret int, err error) { 2809 r0, _, e1 := syscall.Syscall6(procSetInformationJobObject.Addr(), 4, uintptr(job), uintptr(JobObjectInformationClass), uintptr(JobObjectInformation), uintptr(JobObjectInformationLength), 0, 0) 2810 ret = int(r0) 2811 if ret == 0 { 2812 err = errnoErr(e1) 2813 } 2814 return 2815} 2816 2817func SetNamedPipeHandleState(pipe Handle, state *uint32, maxCollectionCount *uint32, collectDataTimeout *uint32) (err error) { 2818 r1, _, e1 := syscall.Syscall6(procSetNamedPipeHandleState.Addr(), 4, uintptr(pipe), uintptr(unsafe.Pointer(state)), uintptr(unsafe.Pointer(maxCollectionCount)), uintptr(unsafe.Pointer(collectDataTimeout)), 0, 0) 2819 if r1 == 0 { 2820 err = errnoErr(e1) 2821 } 2822 return 2823} 2824 2825func SetPriorityClass(process Handle, priorityClass uint32) (err error) { 2826 r1, _, e1 := syscall.Syscall(procSetPriorityClass.Addr(), 2, uintptr(process), uintptr(priorityClass), 0) 2827 if r1 == 0 { 2828 err = errnoErr(e1) 2829 } 2830 return 2831} 2832 2833func SetProcessPriorityBoost(process Handle, disable bool) (err error) { 2834 var _p0 uint32 2835 if disable { 2836 _p0 = 1 2837 } 2838 r1, _, e1 := syscall.Syscall(procSetProcessPriorityBoost.Addr(), 2, uintptr(process), uintptr(_p0), 0) 2839 if r1 == 0 { 2840 err = errnoErr(e1) 2841 } 2842 return 2843} 2844 2845func SetProcessShutdownParameters(level uint32, flags uint32) (err error) { 2846 r1, _, e1 := syscall.Syscall(procSetProcessShutdownParameters.Addr(), 2, uintptr(level), uintptr(flags), 0) 2847 if r1 == 0 { 2848 err = errnoErr(e1) 2849 } 2850 return 2851} 2852 2853func SetProcessWorkingSetSizeEx(hProcess Handle, dwMinimumWorkingSetSize uintptr, dwMaximumWorkingSetSize uintptr, flags uint32) (err error) { 2854 r1, _, e1 := syscall.Syscall6(procSetProcessWorkingSetSizeEx.Addr(), 4, uintptr(hProcess), uintptr(dwMinimumWorkingSetSize), uintptr(dwMaximumWorkingSetSize), uintptr(flags), 0, 0) 2855 if r1 == 0 { 2856 err = errnoErr(e1) 2857 } 2858 return 2859} 2860 2861func SetStdHandle(stdhandle uint32, handle Handle) (err error) { 2862 r1, _, e1 := syscall.Syscall(procSetStdHandle.Addr(), 2, uintptr(stdhandle), uintptr(handle), 0) 2863 if r1 == 0 { 2864 err = errnoErr(e1) 2865 } 2866 return 2867} 2868 2869func SetVolumeLabel(rootPathName *uint16, volumeName *uint16) (err error) { 2870 r1, _, e1 := syscall.Syscall(procSetVolumeLabelW.Addr(), 2, uintptr(unsafe.Pointer(rootPathName)), uintptr(unsafe.Pointer(volumeName)), 0) 2871 if r1 == 0 { 2872 err = errnoErr(e1) 2873 } 2874 return 2875} 2876 2877func SetVolumeMountPoint(volumeMountPoint *uint16, volumeName *uint16) (err error) { 2878 r1, _, e1 := syscall.Syscall(procSetVolumeMountPointW.Addr(), 2, uintptr(unsafe.Pointer(volumeMountPoint)), uintptr(unsafe.Pointer(volumeName)), 0) 2879 if r1 == 0 { 2880 err = errnoErr(e1) 2881 } 2882 return 2883} 2884 2885func SizeofResource(module Handle, resInfo Handle) (size uint32, err error) { 2886 r0, _, e1 := syscall.Syscall(procSizeofResource.Addr(), 2, uintptr(module), uintptr(resInfo), 0) 2887 size = uint32(r0) 2888 if size == 0 { 2889 err = errnoErr(e1) 2890 } 2891 return 2892} 2893 2894func SleepEx(milliseconds uint32, alertable bool) (ret uint32) { 2895 var _p0 uint32 2896 if alertable { 2897 _p0 = 1 2898 } 2899 r0, _, _ := syscall.Syscall(procSleepEx.Addr(), 2, uintptr(milliseconds), uintptr(_p0), 0) 2900 ret = uint32(r0) 2901 return 2902} 2903 2904func TerminateJobObject(job Handle, exitCode uint32) (err error) { 2905 r1, _, e1 := syscall.Syscall(procTerminateJobObject.Addr(), 2, uintptr(job), uintptr(exitCode), 0) 2906 if r1 == 0 { 2907 err = errnoErr(e1) 2908 } 2909 return 2910} 2911 2912func TerminateProcess(handle Handle, exitcode uint32) (err error) { 2913 r1, _, e1 := syscall.Syscall(procTerminateProcess.Addr(), 2, uintptr(handle), uintptr(exitcode), 0) 2914 if r1 == 0 { 2915 err = errnoErr(e1) 2916 } 2917 return 2918} 2919 2920func Thread32First(snapshot Handle, threadEntry *ThreadEntry32) (err error) { 2921 r1, _, e1 := syscall.Syscall(procThread32First.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(threadEntry)), 0) 2922 if r1 == 0 { 2923 err = errnoErr(e1) 2924 } 2925 return 2926} 2927 2928func Thread32Next(snapshot Handle, threadEntry *ThreadEntry32) (err error) { 2929 r1, _, e1 := syscall.Syscall(procThread32Next.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(threadEntry)), 0) 2930 if r1 == 0 { 2931 err = errnoErr(e1) 2932 } 2933 return 2934} 2935 2936func UnlockFileEx(file Handle, reserved uint32, bytesLow uint32, bytesHigh uint32, overlapped *Overlapped) (err error) { 2937 r1, _, e1 := syscall.Syscall6(procUnlockFileEx.Addr(), 5, uintptr(file), uintptr(reserved), uintptr(bytesLow), uintptr(bytesHigh), uintptr(unsafe.Pointer(overlapped)), 0) 2938 if r1 == 0 { 2939 err = errnoErr(e1) 2940 } 2941 return 2942} 2943 2944func UnmapViewOfFile(addr uintptr) (err error) { 2945 r1, _, e1 := syscall.Syscall(procUnmapViewOfFile.Addr(), 1, uintptr(addr), 0, 0) 2946 if r1 == 0 { 2947 err = errnoErr(e1) 2948 } 2949 return 2950} 2951 2952func updateProcThreadAttribute(attrlist *ProcThreadAttributeList, flags uint32, attr uintptr, value unsafe.Pointer, size uintptr, prevvalue unsafe.Pointer, returnedsize *uintptr) (err error) { 2953 r1, _, e1 := syscall.Syscall9(procUpdateProcThreadAttribute.Addr(), 7, uintptr(unsafe.Pointer(attrlist)), uintptr(flags), uintptr(attr), uintptr(value), uintptr(size), uintptr(prevvalue), uintptr(unsafe.Pointer(returnedsize)), 0, 0) 2954 if r1 == 0 { 2955 err = errnoErr(e1) 2956 } 2957 return 2958} 2959 2960func VirtualAlloc(address uintptr, size uintptr, alloctype uint32, protect uint32) (value uintptr, err error) { 2961 r0, _, e1 := syscall.Syscall6(procVirtualAlloc.Addr(), 4, uintptr(address), uintptr(size), uintptr(alloctype), uintptr(protect), 0, 0) 2962 value = uintptr(r0) 2963 if value == 0 { 2964 err = errnoErr(e1) 2965 } 2966 return 2967} 2968 2969func VirtualFree(address uintptr, size uintptr, freetype uint32) (err error) { 2970 r1, _, e1 := syscall.Syscall(procVirtualFree.Addr(), 3, uintptr(address), uintptr(size), uintptr(freetype)) 2971 if r1 == 0 { 2972 err = errnoErr(e1) 2973 } 2974 return 2975} 2976 2977func VirtualLock(addr uintptr, length uintptr) (err error) { 2978 r1, _, e1 := syscall.Syscall(procVirtualLock.Addr(), 2, uintptr(addr), uintptr(length), 0) 2979 if r1 == 0 { 2980 err = errnoErr(e1) 2981 } 2982 return 2983} 2984 2985func VirtualProtect(address uintptr, size uintptr, newprotect uint32, oldprotect *uint32) (err error) { 2986 r1, _, e1 := syscall.Syscall6(procVirtualProtect.Addr(), 4, uintptr(address), uintptr(size), uintptr(newprotect), uintptr(unsafe.Pointer(oldprotect)), 0, 0) 2987 if r1 == 0 { 2988 err = errnoErr(e1) 2989 } 2990 return 2991} 2992 2993func VirtualUnlock(addr uintptr, length uintptr) (err error) { 2994 r1, _, e1 := syscall.Syscall(procVirtualUnlock.Addr(), 2, uintptr(addr), uintptr(length), 0) 2995 if r1 == 0 { 2996 err = errnoErr(e1) 2997 } 2998 return 2999} 3000 3001func WTSGetActiveConsoleSessionId() (sessionID uint32) { 3002 r0, _, _ := syscall.Syscall(procWTSGetActiveConsoleSessionId.Addr(), 0, 0, 0, 0) 3003 sessionID = uint32(r0) 3004 return 3005} 3006 3007func waitForMultipleObjects(count uint32, handles uintptr, waitAll bool, waitMilliseconds uint32) (event uint32, err error) { 3008 var _p0 uint32 3009 if waitAll { 3010 _p0 = 1 3011 } 3012 r0, _, e1 := syscall.Syscall6(procWaitForMultipleObjects.Addr(), 4, uintptr(count), uintptr(handles), uintptr(_p0), uintptr(waitMilliseconds), 0, 0) 3013 event = uint32(r0) 3014 if event == 0xffffffff { 3015 err = errnoErr(e1) 3016 } 3017 return 3018} 3019 3020func WaitForSingleObject(handle Handle, waitMilliseconds uint32) (event uint32, err error) { 3021 r0, _, e1 := syscall.Syscall(procWaitForSingleObject.Addr(), 2, uintptr(handle), uintptr(waitMilliseconds), 0) 3022 event = uint32(r0) 3023 if event == 0xffffffff { 3024 err = errnoErr(e1) 3025 } 3026 return 3027} 3028 3029func WriteConsole(console Handle, buf *uint16, towrite uint32, written *uint32, reserved *byte) (err error) { 3030 r1, _, e1 := syscall.Syscall6(procWriteConsoleW.Addr(), 5, uintptr(console), uintptr(unsafe.Pointer(buf)), uintptr(towrite), uintptr(unsafe.Pointer(written)), uintptr(unsafe.Pointer(reserved)), 0) 3031 if r1 == 0 { 3032 err = errnoErr(e1) 3033 } 3034 return 3035} 3036 3037func WriteFile(handle Handle, buf []byte, done *uint32, overlapped *Overlapped) (err error) { 3038 var _p0 *byte 3039 if len(buf) > 0 { 3040 _p0 = &buf[0] 3041 } 3042 r1, _, e1 := syscall.Syscall6(procWriteFile.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(done)), uintptr(unsafe.Pointer(overlapped)), 0) 3043 if r1 == 0 { 3044 err = errnoErr(e1) 3045 } 3046 return 3047} 3048 3049func AcceptEx(ls Handle, as Handle, buf *byte, rxdatalen uint32, laddrlen uint32, raddrlen uint32, recvd *uint32, overlapped *Overlapped) (err error) { 3050 r1, _, e1 := syscall.Syscall9(procAcceptEx.Addr(), 8, uintptr(ls), uintptr(as), uintptr(unsafe.Pointer(buf)), uintptr(rxdatalen), uintptr(laddrlen), uintptr(raddrlen), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(overlapped)), 0) 3051 if r1 == 0 { 3052 err = errnoErr(e1) 3053 } 3054 return 3055} 3056 3057func GetAcceptExSockaddrs(buf *byte, rxdatalen uint32, laddrlen uint32, raddrlen uint32, lrsa **RawSockaddrAny, lrsalen *int32, rrsa **RawSockaddrAny, rrsalen *int32) { 3058 syscall.Syscall9(procGetAcceptExSockaddrs.Addr(), 8, uintptr(unsafe.Pointer(buf)), uintptr(rxdatalen), uintptr(laddrlen), uintptr(raddrlen), uintptr(unsafe.Pointer(lrsa)), uintptr(unsafe.Pointer(lrsalen)), uintptr(unsafe.Pointer(rrsa)), uintptr(unsafe.Pointer(rrsalen)), 0) 3059 return 3060} 3061 3062func TransmitFile(s Handle, handle Handle, bytesToWrite uint32, bytsPerSend uint32, overlapped *Overlapped, transmitFileBuf *TransmitFileBuffers, flags uint32) (err error) { 3063 r1, _, e1 := syscall.Syscall9(procTransmitFile.Addr(), 7, uintptr(s), uintptr(handle), uintptr(bytesToWrite), uintptr(bytsPerSend), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(transmitFileBuf)), uintptr(flags), 0, 0) 3064 if r1 == 0 { 3065 err = errnoErr(e1) 3066 } 3067 return 3068} 3069 3070func NetApiBufferFree(buf *byte) (neterr error) { 3071 r0, _, _ := syscall.Syscall(procNetApiBufferFree.Addr(), 1, uintptr(unsafe.Pointer(buf)), 0, 0) 3072 if r0 != 0 { 3073 neterr = syscall.Errno(r0) 3074 } 3075 return 3076} 3077 3078func NetGetJoinInformation(server *uint16, name **uint16, bufType *uint32) (neterr error) { 3079 r0, _, _ := syscall.Syscall(procNetGetJoinInformation.Addr(), 3, uintptr(unsafe.Pointer(server)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(bufType))) 3080 if r0 != 0 { 3081 neterr = syscall.Errno(r0) 3082 } 3083 return 3084} 3085 3086func NetUserGetInfo(serverName *uint16, userName *uint16, level uint32, buf **byte) (neterr error) { 3087 r0, _, _ := syscall.Syscall6(procNetUserGetInfo.Addr(), 4, uintptr(unsafe.Pointer(serverName)), uintptr(unsafe.Pointer(userName)), uintptr(level), uintptr(unsafe.Pointer(buf)), 0, 0) 3088 if r0 != 0 { 3089 neterr = syscall.Errno(r0) 3090 } 3091 return 3092} 3093 3094func NtCreateFile(handle *Handle, access uint32, oa *OBJECT_ATTRIBUTES, iosb *IO_STATUS_BLOCK, allocationSize *int64, attributes uint32, share uint32, disposition uint32, options uint32, eabuffer uintptr, ealength uint32) (ntstatus error) { 3095 r0, _, _ := syscall.Syscall12(procNtCreateFile.Addr(), 11, uintptr(unsafe.Pointer(handle)), uintptr(access), uintptr(unsafe.Pointer(oa)), uintptr(unsafe.Pointer(iosb)), uintptr(unsafe.Pointer(allocationSize)), uintptr(attributes), uintptr(share), uintptr(disposition), uintptr(options), uintptr(eabuffer), uintptr(ealength), 0) 3096 if r0 != 0 { 3097 ntstatus = NTStatus(r0) 3098 } 3099 return 3100} 3101 3102func NtCreateNamedPipeFile(pipe *Handle, access uint32, oa *OBJECT_ATTRIBUTES, iosb *IO_STATUS_BLOCK, share uint32, disposition uint32, options uint32, typ uint32, readMode uint32, completionMode uint32, maxInstances uint32, inboundQuota uint32, outputQuota uint32, timeout *int64) (ntstatus error) { 3103 r0, _, _ := syscall.Syscall15(procNtCreateNamedPipeFile.Addr(), 14, uintptr(unsafe.Pointer(pipe)), uintptr(access), uintptr(unsafe.Pointer(oa)), uintptr(unsafe.Pointer(iosb)), uintptr(share), uintptr(disposition), uintptr(options), uintptr(typ), uintptr(readMode), uintptr(completionMode), uintptr(maxInstances), uintptr(inboundQuota), uintptr(outputQuota), uintptr(unsafe.Pointer(timeout)), 0) 3104 if r0 != 0 { 3105 ntstatus = NTStatus(r0) 3106 } 3107 return 3108} 3109 3110func NtQueryInformationProcess(proc Handle, procInfoClass int32, procInfo unsafe.Pointer, procInfoLen uint32, retLen *uint32) (ntstatus error) { 3111 r0, _, _ := syscall.Syscall6(procNtQueryInformationProcess.Addr(), 5, uintptr(proc), uintptr(procInfoClass), uintptr(procInfo), uintptr(procInfoLen), uintptr(unsafe.Pointer(retLen)), 0) 3112 if r0 != 0 { 3113 ntstatus = NTStatus(r0) 3114 } 3115 return 3116} 3117 3118func NtSetInformationProcess(proc Handle, procInfoClass int32, procInfo unsafe.Pointer, procInfoLen uint32) (ntstatus error) { 3119 r0, _, _ := syscall.Syscall6(procNtSetInformationProcess.Addr(), 4, uintptr(proc), uintptr(procInfoClass), uintptr(procInfo), uintptr(procInfoLen), 0, 0) 3120 if r0 != 0 { 3121 ntstatus = NTStatus(r0) 3122 } 3123 return 3124} 3125 3126func RtlDefaultNpAcl(acl **ACL) (ntstatus error) { 3127 r0, _, _ := syscall.Syscall(procRtlDefaultNpAcl.Addr(), 1, uintptr(unsafe.Pointer(acl)), 0, 0) 3128 if r0 != 0 { 3129 ntstatus = NTStatus(r0) 3130 } 3131 return 3132} 3133 3134func RtlDosPathNameToNtPathName(dosName *uint16, ntName *NTUnicodeString, ntFileNamePart *uint16, relativeName *RTL_RELATIVE_NAME) (ntstatus error) { 3135 r0, _, _ := syscall.Syscall6(procRtlDosPathNameToNtPathName_U_WithStatus.Addr(), 4, uintptr(unsafe.Pointer(dosName)), uintptr(unsafe.Pointer(ntName)), uintptr(unsafe.Pointer(ntFileNamePart)), uintptr(unsafe.Pointer(relativeName)), 0, 0) 3136 if r0 != 0 { 3137 ntstatus = NTStatus(r0) 3138 } 3139 return 3140} 3141 3142func RtlDosPathNameToRelativeNtPathName(dosName *uint16, ntName *NTUnicodeString, ntFileNamePart *uint16, relativeName *RTL_RELATIVE_NAME) (ntstatus error) { 3143 r0, _, _ := syscall.Syscall6(procRtlDosPathNameToRelativeNtPathName_U_WithStatus.Addr(), 4, uintptr(unsafe.Pointer(dosName)), uintptr(unsafe.Pointer(ntName)), uintptr(unsafe.Pointer(ntFileNamePart)), uintptr(unsafe.Pointer(relativeName)), 0, 0) 3144 if r0 != 0 { 3145 ntstatus = NTStatus(r0) 3146 } 3147 return 3148} 3149 3150func RtlGetCurrentPeb() (peb *PEB) { 3151 r0, _, _ := syscall.Syscall(procRtlGetCurrentPeb.Addr(), 0, 0, 0, 0) 3152 peb = (*PEB)(unsafe.Pointer(r0)) 3153 return 3154} 3155 3156func rtlGetNtVersionNumbers(majorVersion *uint32, minorVersion *uint32, buildNumber *uint32) { 3157 syscall.Syscall(procRtlGetNtVersionNumbers.Addr(), 3, uintptr(unsafe.Pointer(majorVersion)), uintptr(unsafe.Pointer(minorVersion)), uintptr(unsafe.Pointer(buildNumber))) 3158 return 3159} 3160 3161func rtlGetVersion(info *OsVersionInfoEx) (ntstatus error) { 3162 r0, _, _ := syscall.Syscall(procRtlGetVersion.Addr(), 1, uintptr(unsafe.Pointer(info)), 0, 0) 3163 if r0 != 0 { 3164 ntstatus = NTStatus(r0) 3165 } 3166 return 3167} 3168 3169func RtlInitString(destinationString *NTString, sourceString *byte) { 3170 syscall.Syscall(procRtlInitString.Addr(), 2, uintptr(unsafe.Pointer(destinationString)), uintptr(unsafe.Pointer(sourceString)), 0) 3171 return 3172} 3173 3174func RtlInitUnicodeString(destinationString *NTUnicodeString, sourceString *uint16) { 3175 syscall.Syscall(procRtlInitUnicodeString.Addr(), 2, uintptr(unsafe.Pointer(destinationString)), uintptr(unsafe.Pointer(sourceString)), 0) 3176 return 3177} 3178 3179func rtlNtStatusToDosErrorNoTeb(ntstatus NTStatus) (ret syscall.Errno) { 3180 r0, _, _ := syscall.Syscall(procRtlNtStatusToDosErrorNoTeb.Addr(), 1, uintptr(ntstatus), 0, 0) 3181 ret = syscall.Errno(r0) 3182 return 3183} 3184 3185func clsidFromString(lpsz *uint16, pclsid *GUID) (ret error) { 3186 r0, _, _ := syscall.Syscall(procCLSIDFromString.Addr(), 2, uintptr(unsafe.Pointer(lpsz)), uintptr(unsafe.Pointer(pclsid)), 0) 3187 if r0 != 0 { 3188 ret = syscall.Errno(r0) 3189 } 3190 return 3191} 3192 3193func coCreateGuid(pguid *GUID) (ret error) { 3194 r0, _, _ := syscall.Syscall(procCoCreateGuid.Addr(), 1, uintptr(unsafe.Pointer(pguid)), 0, 0) 3195 if r0 != 0 { 3196 ret = syscall.Errno(r0) 3197 } 3198 return 3199} 3200 3201func CoGetObject(name *uint16, bindOpts *BIND_OPTS3, guid *GUID, functionTable **uintptr) (ret error) { 3202 r0, _, _ := syscall.Syscall6(procCoGetObject.Addr(), 4, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(bindOpts)), uintptr(unsafe.Pointer(guid)), uintptr(unsafe.Pointer(functionTable)), 0, 0) 3203 if r0 != 0 { 3204 ret = syscall.Errno(r0) 3205 } 3206 return 3207} 3208 3209func CoInitializeEx(reserved uintptr, coInit uint32) (ret error) { 3210 r0, _, _ := syscall.Syscall(procCoInitializeEx.Addr(), 2, uintptr(reserved), uintptr(coInit), 0) 3211 if r0 != 0 { 3212 ret = syscall.Errno(r0) 3213 } 3214 return 3215} 3216 3217func CoTaskMemFree(address unsafe.Pointer) { 3218 syscall.Syscall(procCoTaskMemFree.Addr(), 1, uintptr(address), 0, 0) 3219 return 3220} 3221 3222func CoUninitialize() { 3223 syscall.Syscall(procCoUninitialize.Addr(), 0, 0, 0, 0) 3224 return 3225} 3226 3227func stringFromGUID2(rguid *GUID, lpsz *uint16, cchMax int32) (chars int32) { 3228 r0, _, _ := syscall.Syscall(procStringFromGUID2.Addr(), 3, uintptr(unsafe.Pointer(rguid)), uintptr(unsafe.Pointer(lpsz)), uintptr(cchMax)) 3229 chars = int32(r0) 3230 return 3231} 3232 3233func EnumProcessModules(process Handle, module *Handle, cb uint32, cbNeeded *uint32) (err error) { 3234 r1, _, e1 := syscall.Syscall6(procEnumProcessModules.Addr(), 4, uintptr(process), uintptr(unsafe.Pointer(module)), uintptr(cb), uintptr(unsafe.Pointer(cbNeeded)), 0, 0) 3235 if r1 == 0 { 3236 err = errnoErr(e1) 3237 } 3238 return 3239} 3240 3241func EnumProcessModulesEx(process Handle, module *Handle, cb uint32, cbNeeded *uint32, filterFlag uint32) (err error) { 3242 r1, _, e1 := syscall.Syscall6(procEnumProcessModulesEx.Addr(), 5, uintptr(process), uintptr(unsafe.Pointer(module)), uintptr(cb), uintptr(unsafe.Pointer(cbNeeded)), uintptr(filterFlag), 0) 3243 if r1 == 0 { 3244 err = errnoErr(e1) 3245 } 3246 return 3247} 3248 3249func EnumProcesses(processIds []uint32, bytesReturned *uint32) (err error) { 3250 var _p0 *uint32 3251 if len(processIds) > 0 { 3252 _p0 = &processIds[0] 3253 } 3254 r1, _, e1 := syscall.Syscall(procEnumProcesses.Addr(), 3, uintptr(unsafe.Pointer(_p0)), uintptr(len(processIds)), uintptr(unsafe.Pointer(bytesReturned))) 3255 if r1 == 0 { 3256 err = errnoErr(e1) 3257 } 3258 return 3259} 3260 3261func GetModuleBaseName(process Handle, module Handle, baseName *uint16, size uint32) (err error) { 3262 r1, _, e1 := syscall.Syscall6(procGetModuleBaseNameW.Addr(), 4, uintptr(process), uintptr(module), uintptr(unsafe.Pointer(baseName)), uintptr(size), 0, 0) 3263 if r1 == 0 { 3264 err = errnoErr(e1) 3265 } 3266 return 3267} 3268 3269func GetModuleFileNameEx(process Handle, module Handle, filename *uint16, size uint32) (err error) { 3270 r1, _, e1 := syscall.Syscall6(procGetModuleFileNameExW.Addr(), 4, uintptr(process), uintptr(module), uintptr(unsafe.Pointer(filename)), uintptr(size), 0, 0) 3271 if r1 == 0 { 3272 err = errnoErr(e1) 3273 } 3274 return 3275} 3276 3277func GetModuleInformation(process Handle, module Handle, modinfo *ModuleInfo, cb uint32) (err error) { 3278 r1, _, e1 := syscall.Syscall6(procGetModuleInformation.Addr(), 4, uintptr(process), uintptr(module), uintptr(unsafe.Pointer(modinfo)), uintptr(cb), 0, 0) 3279 if r1 == 0 { 3280 err = errnoErr(e1) 3281 } 3282 return 3283} 3284 3285func SubscribeServiceChangeNotifications(service Handle, eventType uint32, callback uintptr, callbackCtx uintptr, subscription *uintptr) (ret error) { 3286 ret = procSubscribeServiceChangeNotifications.Find() 3287 if ret != nil { 3288 return 3289 } 3290 r0, _, _ := syscall.Syscall6(procSubscribeServiceChangeNotifications.Addr(), 5, uintptr(service), uintptr(eventType), uintptr(callback), uintptr(callbackCtx), uintptr(unsafe.Pointer(subscription)), 0) 3291 if r0 != 0 { 3292 ret = syscall.Errno(r0) 3293 } 3294 return 3295} 3296 3297func UnsubscribeServiceChangeNotifications(subscription uintptr) (err error) { 3298 err = procUnsubscribeServiceChangeNotifications.Find() 3299 if err != nil { 3300 return 3301 } 3302 syscall.Syscall(procUnsubscribeServiceChangeNotifications.Addr(), 1, uintptr(subscription), 0, 0) 3303 return 3304} 3305 3306func GetUserNameEx(nameFormat uint32, nameBuffre *uint16, nSize *uint32) (err error) { 3307 r1, _, e1 := syscall.Syscall(procGetUserNameExW.Addr(), 3, uintptr(nameFormat), uintptr(unsafe.Pointer(nameBuffre)), uintptr(unsafe.Pointer(nSize))) 3308 if r1&0xff == 0 { 3309 err = errnoErr(e1) 3310 } 3311 return 3312} 3313 3314func TranslateName(accName *uint16, accNameFormat uint32, desiredNameFormat uint32, translatedName *uint16, nSize *uint32) (err error) { 3315 r1, _, e1 := syscall.Syscall6(procTranslateNameW.Addr(), 5, uintptr(unsafe.Pointer(accName)), uintptr(accNameFormat), uintptr(desiredNameFormat), uintptr(unsafe.Pointer(translatedName)), uintptr(unsafe.Pointer(nSize)), 0) 3316 if r1&0xff == 0 { 3317 err = errnoErr(e1) 3318 } 3319 return 3320} 3321 3322func CommandLineToArgv(cmd *uint16, argc *int32) (argv *[8192]*[8192]uint16, err error) { 3323 r0, _, e1 := syscall.Syscall(procCommandLineToArgvW.Addr(), 2, uintptr(unsafe.Pointer(cmd)), uintptr(unsafe.Pointer(argc)), 0) 3324 argv = (*[8192]*[8192]uint16)(unsafe.Pointer(r0)) 3325 if argv == nil { 3326 err = errnoErr(e1) 3327 } 3328 return 3329} 3330 3331func shGetKnownFolderPath(id *KNOWNFOLDERID, flags uint32, token Token, path **uint16) (ret error) { 3332 r0, _, _ := syscall.Syscall6(procSHGetKnownFolderPath.Addr(), 4, uintptr(unsafe.Pointer(id)), uintptr(flags), uintptr(token), uintptr(unsafe.Pointer(path)), 0, 0) 3333 if r0 != 0 { 3334 ret = syscall.Errno(r0) 3335 } 3336 return 3337} 3338 3339func ShellExecute(hwnd Handle, verb *uint16, file *uint16, args *uint16, cwd *uint16, showCmd int32) (err error) { 3340 r1, _, e1 := syscall.Syscall6(procShellExecuteW.Addr(), 6, uintptr(hwnd), uintptr(unsafe.Pointer(verb)), uintptr(unsafe.Pointer(file)), uintptr(unsafe.Pointer(args)), uintptr(unsafe.Pointer(cwd)), uintptr(showCmd)) 3341 if r1 <= 32 { 3342 err = errnoErr(e1) 3343 } 3344 return 3345} 3346 3347func ExitWindowsEx(flags uint32, reason uint32) (err error) { 3348 r1, _, e1 := syscall.Syscall(procExitWindowsEx.Addr(), 2, uintptr(flags), uintptr(reason), 0) 3349 if r1 == 0 { 3350 err = errnoErr(e1) 3351 } 3352 return 3353} 3354 3355func GetShellWindow() (shellWindow HWND) { 3356 r0, _, _ := syscall.Syscall(procGetShellWindow.Addr(), 0, 0, 0, 0) 3357 shellWindow = HWND(r0) 3358 return 3359} 3360 3361func GetWindowThreadProcessId(hwnd HWND, pid *uint32) (tid uint32, err error) { 3362 r0, _, e1 := syscall.Syscall(procGetWindowThreadProcessId.Addr(), 2, uintptr(hwnd), uintptr(unsafe.Pointer(pid)), 0) 3363 tid = uint32(r0) 3364 if tid == 0 { 3365 err = errnoErr(e1) 3366 } 3367 return 3368} 3369 3370func MessageBox(hwnd HWND, text *uint16, caption *uint16, boxtype uint32) (ret int32, err error) { 3371 r0, _, e1 := syscall.Syscall6(procMessageBoxW.Addr(), 4, uintptr(hwnd), uintptr(unsafe.Pointer(text)), uintptr(unsafe.Pointer(caption)), uintptr(boxtype), 0, 0) 3372 ret = int32(r0) 3373 if ret == 0 { 3374 err = errnoErr(e1) 3375 } 3376 return 3377} 3378 3379func CreateEnvironmentBlock(block **uint16, token Token, inheritExisting bool) (err error) { 3380 var _p0 uint32 3381 if inheritExisting { 3382 _p0 = 1 3383 } 3384 r1, _, e1 := syscall.Syscall(procCreateEnvironmentBlock.Addr(), 3, uintptr(unsafe.Pointer(block)), uintptr(token), uintptr(_p0)) 3385 if r1 == 0 { 3386 err = errnoErr(e1) 3387 } 3388 return 3389} 3390 3391func DestroyEnvironmentBlock(block *uint16) (err error) { 3392 r1, _, e1 := syscall.Syscall(procDestroyEnvironmentBlock.Addr(), 1, uintptr(unsafe.Pointer(block)), 0, 0) 3393 if r1 == 0 { 3394 err = errnoErr(e1) 3395 } 3396 return 3397} 3398 3399func GetUserProfileDirectory(t Token, dir *uint16, dirLen *uint32) (err error) { 3400 r1, _, e1 := syscall.Syscall(procGetUserProfileDirectoryW.Addr(), 3, uintptr(t), uintptr(unsafe.Pointer(dir)), uintptr(unsafe.Pointer(dirLen))) 3401 if r1 == 0 { 3402 err = errnoErr(e1) 3403 } 3404 return 3405} 3406 3407func WinVerifyTrustEx(hwnd HWND, actionId *GUID, data *WinTrustData) (ret error) { 3408 r0, _, _ := syscall.Syscall(procWinVerifyTrustEx.Addr(), 3, uintptr(hwnd), uintptr(unsafe.Pointer(actionId)), uintptr(unsafe.Pointer(data))) 3409 if r0 != 0 { 3410 ret = syscall.Errno(r0) 3411 } 3412 return 3413} 3414 3415func FreeAddrInfoW(addrinfo *AddrinfoW) { 3416 syscall.Syscall(procFreeAddrInfoW.Addr(), 1, uintptr(unsafe.Pointer(addrinfo)), 0, 0) 3417 return 3418} 3419 3420func GetAddrInfoW(nodename *uint16, servicename *uint16, hints *AddrinfoW, result **AddrinfoW) (sockerr error) { 3421 r0, _, _ := syscall.Syscall6(procGetAddrInfoW.Addr(), 4, uintptr(unsafe.Pointer(nodename)), uintptr(unsafe.Pointer(servicename)), uintptr(unsafe.Pointer(hints)), uintptr(unsafe.Pointer(result)), 0, 0) 3422 if r0 != 0 { 3423 sockerr = syscall.Errno(r0) 3424 } 3425 return 3426} 3427 3428func WSACleanup() (err error) { 3429 r1, _, e1 := syscall.Syscall(procWSACleanup.Addr(), 0, 0, 0, 0) 3430 if r1 == socket_error { 3431 err = errnoErr(e1) 3432 } 3433 return 3434} 3435 3436func WSAEnumProtocols(protocols *int32, protocolBuffer *WSAProtocolInfo, bufferLength *uint32) (n int32, err error) { 3437 r0, _, e1 := syscall.Syscall(procWSAEnumProtocolsW.Addr(), 3, uintptr(unsafe.Pointer(protocols)), uintptr(unsafe.Pointer(protocolBuffer)), uintptr(unsafe.Pointer(bufferLength))) 3438 n = int32(r0) 3439 if n == -1 { 3440 err = errnoErr(e1) 3441 } 3442 return 3443} 3444 3445func WSAGetOverlappedResult(h Handle, o *Overlapped, bytes *uint32, wait bool, flags *uint32) (err error) { 3446 var _p0 uint32 3447 if wait { 3448 _p0 = 1 3449 } 3450 r1, _, e1 := syscall.Syscall6(procWSAGetOverlappedResult.Addr(), 5, uintptr(h), uintptr(unsafe.Pointer(o)), uintptr(unsafe.Pointer(bytes)), uintptr(_p0), uintptr(unsafe.Pointer(flags)), 0) 3451 if r1 == 0 { 3452 err = errnoErr(e1) 3453 } 3454 return 3455} 3456 3457func WSAIoctl(s Handle, iocc uint32, inbuf *byte, cbif uint32, outbuf *byte, cbob uint32, cbbr *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) { 3458 r1, _, e1 := syscall.Syscall9(procWSAIoctl.Addr(), 9, uintptr(s), uintptr(iocc), uintptr(unsafe.Pointer(inbuf)), uintptr(cbif), uintptr(unsafe.Pointer(outbuf)), uintptr(cbob), uintptr(unsafe.Pointer(cbbr)), uintptr(unsafe.Pointer(overlapped)), uintptr(completionRoutine)) 3459 if r1 == socket_error { 3460 err = errnoErr(e1) 3461 } 3462 return 3463} 3464 3465func WSARecv(s Handle, bufs *WSABuf, bufcnt uint32, recvd *uint32, flags *uint32, overlapped *Overlapped, croutine *byte) (err error) { 3466 r1, _, e1 := syscall.Syscall9(procWSARecv.Addr(), 7, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(flags)), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)), 0, 0) 3467 if r1 == socket_error { 3468 err = errnoErr(e1) 3469 } 3470 return 3471} 3472 3473func WSARecvFrom(s Handle, bufs *WSABuf, bufcnt uint32, recvd *uint32, flags *uint32, from *RawSockaddrAny, fromlen *int32, overlapped *Overlapped, croutine *byte) (err error) { 3474 r1, _, e1 := syscall.Syscall9(procWSARecvFrom.Addr(), 9, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(flags)), uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(fromlen)), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine))) 3475 if r1 == socket_error { 3476 err = errnoErr(e1) 3477 } 3478 return 3479} 3480 3481func WSASend(s Handle, bufs *WSABuf, bufcnt uint32, sent *uint32, flags uint32, overlapped *Overlapped, croutine *byte) (err error) { 3482 r1, _, e1 := syscall.Syscall9(procWSASend.Addr(), 7, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(sent)), uintptr(flags), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)), 0, 0) 3483 if r1 == socket_error { 3484 err = errnoErr(e1) 3485 } 3486 return 3487} 3488 3489func WSASendTo(s Handle, bufs *WSABuf, bufcnt uint32, sent *uint32, flags uint32, to *RawSockaddrAny, tolen int32, overlapped *Overlapped, croutine *byte) (err error) { 3490 r1, _, e1 := syscall.Syscall9(procWSASendTo.Addr(), 9, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(sent)), uintptr(flags), uintptr(unsafe.Pointer(to)), uintptr(tolen), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine))) 3491 if r1 == socket_error { 3492 err = errnoErr(e1) 3493 } 3494 return 3495} 3496 3497func WSASocket(af int32, typ int32, protocol int32, protoInfo *WSAProtocolInfo, group uint32, flags uint32) (handle Handle, err error) { 3498 r0, _, e1 := syscall.Syscall6(procWSASocketW.Addr(), 6, uintptr(af), uintptr(typ), uintptr(protocol), uintptr(unsafe.Pointer(protoInfo)), uintptr(group), uintptr(flags)) 3499 handle = Handle(r0) 3500 if handle == InvalidHandle { 3501 err = errnoErr(e1) 3502 } 3503 return 3504} 3505 3506func WSAStartup(verreq uint32, data *WSAData) (sockerr error) { 3507 r0, _, _ := syscall.Syscall(procWSAStartup.Addr(), 2, uintptr(verreq), uintptr(unsafe.Pointer(data)), 0) 3508 if r0 != 0 { 3509 sockerr = syscall.Errno(r0) 3510 } 3511 return 3512} 3513 3514func bind(s Handle, name unsafe.Pointer, namelen int32) (err error) { 3515 r1, _, e1 := syscall.Syscall(procbind.Addr(), 3, uintptr(s), uintptr(name), uintptr(namelen)) 3516 if r1 == socket_error { 3517 err = errnoErr(e1) 3518 } 3519 return 3520} 3521 3522func Closesocket(s Handle) (err error) { 3523 r1, _, e1 := syscall.Syscall(procclosesocket.Addr(), 1, uintptr(s), 0, 0) 3524 if r1 == socket_error { 3525 err = errnoErr(e1) 3526 } 3527 return 3528} 3529 3530func connect(s Handle, name unsafe.Pointer, namelen int32) (err error) { 3531 r1, _, e1 := syscall.Syscall(procconnect.Addr(), 3, uintptr(s), uintptr(name), uintptr(namelen)) 3532 if r1 == socket_error { 3533 err = errnoErr(e1) 3534 } 3535 return 3536} 3537 3538func GetHostByName(name string) (h *Hostent, err error) { 3539 var _p0 *byte 3540 _p0, err = syscall.BytePtrFromString(name) 3541 if err != nil { 3542 return 3543 } 3544 return _GetHostByName(_p0) 3545} 3546 3547func _GetHostByName(name *byte) (h *Hostent, err error) { 3548 r0, _, e1 := syscall.Syscall(procgethostbyname.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0) 3549 h = (*Hostent)(unsafe.Pointer(r0)) 3550 if h == nil { 3551 err = errnoErr(e1) 3552 } 3553 return 3554} 3555 3556func getpeername(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) { 3557 r1, _, e1 := syscall.Syscall(procgetpeername.Addr(), 3, uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen))) 3558 if r1 == socket_error { 3559 err = errnoErr(e1) 3560 } 3561 return 3562} 3563 3564func GetProtoByName(name string) (p *Protoent, err error) { 3565 var _p0 *byte 3566 _p0, err = syscall.BytePtrFromString(name) 3567 if err != nil { 3568 return 3569 } 3570 return _GetProtoByName(_p0) 3571} 3572 3573func _GetProtoByName(name *byte) (p *Protoent, err error) { 3574 r0, _, e1 := syscall.Syscall(procgetprotobyname.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0) 3575 p = (*Protoent)(unsafe.Pointer(r0)) 3576 if p == nil { 3577 err = errnoErr(e1) 3578 } 3579 return 3580} 3581 3582func GetServByName(name string, proto string) (s *Servent, err error) { 3583 var _p0 *byte 3584 _p0, err = syscall.BytePtrFromString(name) 3585 if err != nil { 3586 return 3587 } 3588 var _p1 *byte 3589 _p1, err = syscall.BytePtrFromString(proto) 3590 if err != nil { 3591 return 3592 } 3593 return _GetServByName(_p0, _p1) 3594} 3595 3596func _GetServByName(name *byte, proto *byte) (s *Servent, err error) { 3597 r0, _, e1 := syscall.Syscall(procgetservbyname.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(proto)), 0) 3598 s = (*Servent)(unsafe.Pointer(r0)) 3599 if s == nil { 3600 err = errnoErr(e1) 3601 } 3602 return 3603} 3604 3605func getsockname(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) { 3606 r1, _, e1 := syscall.Syscall(procgetsockname.Addr(), 3, uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen))) 3607 if r1 == socket_error { 3608 err = errnoErr(e1) 3609 } 3610 return 3611} 3612 3613func Getsockopt(s Handle, level int32, optname int32, optval *byte, optlen *int32) (err error) { 3614 r1, _, e1 := syscall.Syscall6(procgetsockopt.Addr(), 5, uintptr(s), uintptr(level), uintptr(optname), uintptr(unsafe.Pointer(optval)), uintptr(unsafe.Pointer(optlen)), 0) 3615 if r1 == socket_error { 3616 err = errnoErr(e1) 3617 } 3618 return 3619} 3620 3621func listen(s Handle, backlog int32) (err error) { 3622 r1, _, e1 := syscall.Syscall(proclisten.Addr(), 2, uintptr(s), uintptr(backlog), 0) 3623 if r1 == socket_error { 3624 err = errnoErr(e1) 3625 } 3626 return 3627} 3628 3629func Ntohs(netshort uint16) (u uint16) { 3630 r0, _, _ := syscall.Syscall(procntohs.Addr(), 1, uintptr(netshort), 0, 0) 3631 u = uint16(r0) 3632 return 3633} 3634 3635func recvfrom(s Handle, buf []byte, flags int32, from *RawSockaddrAny, fromlen *int32) (n int32, err error) { 3636 var _p0 *byte 3637 if len(buf) > 0 { 3638 _p0 = &buf[0] 3639 } 3640 r0, _, e1 := syscall.Syscall6(procrecvfrom.Addr(), 6, uintptr(s), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(flags), uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(fromlen))) 3641 n = int32(r0) 3642 if n == -1 { 3643 err = errnoErr(e1) 3644 } 3645 return 3646} 3647 3648func sendto(s Handle, buf []byte, flags int32, to unsafe.Pointer, tolen int32) (err error) { 3649 var _p0 *byte 3650 if len(buf) > 0 { 3651 _p0 = &buf[0] 3652 } 3653 r1, _, e1 := syscall.Syscall6(procsendto.Addr(), 6, uintptr(s), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(flags), uintptr(to), uintptr(tolen)) 3654 if r1 == socket_error { 3655 err = errnoErr(e1) 3656 } 3657 return 3658} 3659 3660func Setsockopt(s Handle, level int32, optname int32, optval *byte, optlen int32) (err error) { 3661 r1, _, e1 := syscall.Syscall6(procsetsockopt.Addr(), 5, uintptr(s), uintptr(level), uintptr(optname), uintptr(unsafe.Pointer(optval)), uintptr(optlen), 0) 3662 if r1 == socket_error { 3663 err = errnoErr(e1) 3664 } 3665 return 3666} 3667 3668func shutdown(s Handle, how int32) (err error) { 3669 r1, _, e1 := syscall.Syscall(procshutdown.Addr(), 2, uintptr(s), uintptr(how), 0) 3670 if r1 == socket_error { 3671 err = errnoErr(e1) 3672 } 3673 return 3674} 3675 3676func socket(af int32, typ int32, protocol int32) (handle Handle, err error) { 3677 r0, _, e1 := syscall.Syscall(procsocket.Addr(), 3, uintptr(af), uintptr(typ), uintptr(protocol)) 3678 handle = Handle(r0) 3679 if handle == InvalidHandle { 3680 err = errnoErr(e1) 3681 } 3682 return 3683} 3684 3685func WTSEnumerateSessions(handle Handle, reserved uint32, version uint32, sessions **WTS_SESSION_INFO, count *uint32) (err error) { 3686 r1, _, e1 := syscall.Syscall6(procWTSEnumerateSessionsW.Addr(), 5, uintptr(handle), uintptr(reserved), uintptr(version), uintptr(unsafe.Pointer(sessions)), uintptr(unsafe.Pointer(count)), 0) 3687 if r1 == 0 { 3688 err = errnoErr(e1) 3689 } 3690 return 3691} 3692 3693func WTSFreeMemory(ptr uintptr) { 3694 syscall.Syscall(procWTSFreeMemory.Addr(), 1, uintptr(ptr), 0, 0) 3695 return 3696} 3697 3698func WTSQueryUserToken(session uint32, token *Token) (err error) { 3699 r1, _, e1 := syscall.Syscall(procWTSQueryUserToken.Addr(), 2, uintptr(session), uintptr(unsafe.Pointer(token)), 0) 3700 if r1 == 0 { 3701 err = errnoErr(e1) 3702 } 3703 return 3704} 3705