1// MACHINE GENERATED BY 'go generate' COMMAND; DO NOT EDIT
2
3package windows
4
5import (
6	"syscall"
7	"unsafe"
8)
9
10var _ unsafe.Pointer
11
12// Do the interface allocations only once for common
13// Errno values.
14const (
15	errnoERROR_IO_PENDING = 997
16)
17
18var (
19	errERROR_IO_PENDING error = syscall.Errno(errnoERROR_IO_PENDING)
20)
21
22// errnoErr returns common boxed Errno values, to prevent
23// allocations at runtime.
24func errnoErr(e syscall.Errno) error {
25	switch e {
26	case 0:
27		return nil
28	case errnoERROR_IO_PENDING:
29		return errERROR_IO_PENDING
30	}
31	// TODO: add more here, after collecting data on the common
32	// error values see on Windows. (perhaps when running
33	// all.bat?)
34	return e
35}
36
37var (
38	modadvapi32 = NewLazySystemDLL("advapi32.dll")
39	modkernel32 = NewLazySystemDLL("kernel32.dll")
40	modshell32  = NewLazySystemDLL("shell32.dll")
41	modmswsock  = NewLazySystemDLL("mswsock.dll")
42	modcrypt32  = NewLazySystemDLL("crypt32.dll")
43	modws2_32   = NewLazySystemDLL("ws2_32.dll")
44	moddnsapi   = NewLazySystemDLL("dnsapi.dll")
45	modiphlpapi = NewLazySystemDLL("iphlpapi.dll")
46	modsecur32  = NewLazySystemDLL("secur32.dll")
47	modnetapi32 = NewLazySystemDLL("netapi32.dll")
48	moduserenv  = NewLazySystemDLL("userenv.dll")
49
50	procRegisterEventSourceW               = modadvapi32.NewProc("RegisterEventSourceW")
51	procDeregisterEventSource              = modadvapi32.NewProc("DeregisterEventSource")
52	procReportEventW                       = modadvapi32.NewProc("ReportEventW")
53	procOpenSCManagerW                     = modadvapi32.NewProc("OpenSCManagerW")
54	procCloseServiceHandle                 = modadvapi32.NewProc("CloseServiceHandle")
55	procCreateServiceW                     = modadvapi32.NewProc("CreateServiceW")
56	procOpenServiceW                       = modadvapi32.NewProc("OpenServiceW")
57	procDeleteService                      = modadvapi32.NewProc("DeleteService")
58	procStartServiceW                      = modadvapi32.NewProc("StartServiceW")
59	procQueryServiceStatus                 = modadvapi32.NewProc("QueryServiceStatus")
60	procControlService                     = modadvapi32.NewProc("ControlService")
61	procStartServiceCtrlDispatcherW        = modadvapi32.NewProc("StartServiceCtrlDispatcherW")
62	procSetServiceStatus                   = modadvapi32.NewProc("SetServiceStatus")
63	procChangeServiceConfigW               = modadvapi32.NewProc("ChangeServiceConfigW")
64	procQueryServiceConfigW                = modadvapi32.NewProc("QueryServiceConfigW")
65	procChangeServiceConfig2W              = modadvapi32.NewProc("ChangeServiceConfig2W")
66	procQueryServiceConfig2W               = modadvapi32.NewProc("QueryServiceConfig2W")
67	procEnumServicesStatusExW              = modadvapi32.NewProc("EnumServicesStatusExW")
68	procGetLastError                       = modkernel32.NewProc("GetLastError")
69	procLoadLibraryW                       = modkernel32.NewProc("LoadLibraryW")
70	procLoadLibraryExW                     = modkernel32.NewProc("LoadLibraryExW")
71	procFreeLibrary                        = modkernel32.NewProc("FreeLibrary")
72	procGetProcAddress                     = modkernel32.NewProc("GetProcAddress")
73	procGetVersion                         = modkernel32.NewProc("GetVersion")
74	procFormatMessageW                     = modkernel32.NewProc("FormatMessageW")
75	procExitProcess                        = modkernel32.NewProc("ExitProcess")
76	procCreateFileW                        = modkernel32.NewProc("CreateFileW")
77	procReadFile                           = modkernel32.NewProc("ReadFile")
78	procWriteFile                          = modkernel32.NewProc("WriteFile")
79	procSetFilePointer                     = modkernel32.NewProc("SetFilePointer")
80	procCloseHandle                        = modkernel32.NewProc("CloseHandle")
81	procGetStdHandle                       = modkernel32.NewProc("GetStdHandle")
82	procSetStdHandle                       = modkernel32.NewProc("SetStdHandle")
83	procFindFirstFileW                     = modkernel32.NewProc("FindFirstFileW")
84	procFindNextFileW                      = modkernel32.NewProc("FindNextFileW")
85	procFindClose                          = modkernel32.NewProc("FindClose")
86	procGetFileInformationByHandle         = modkernel32.NewProc("GetFileInformationByHandle")
87	procGetCurrentDirectoryW               = modkernel32.NewProc("GetCurrentDirectoryW")
88	procSetCurrentDirectoryW               = modkernel32.NewProc("SetCurrentDirectoryW")
89	procCreateDirectoryW                   = modkernel32.NewProc("CreateDirectoryW")
90	procRemoveDirectoryW                   = modkernel32.NewProc("RemoveDirectoryW")
91	procDeleteFileW                        = modkernel32.NewProc("DeleteFileW")
92	procMoveFileW                          = modkernel32.NewProc("MoveFileW")
93	procMoveFileExW                        = modkernel32.NewProc("MoveFileExW")
94	procGetComputerNameW                   = modkernel32.NewProc("GetComputerNameW")
95	procGetComputerNameExW                 = modkernel32.NewProc("GetComputerNameExW")
96	procSetEndOfFile                       = modkernel32.NewProc("SetEndOfFile")
97	procGetSystemTimeAsFileTime            = modkernel32.NewProc("GetSystemTimeAsFileTime")
98	procGetSystemTimePreciseAsFileTime     = modkernel32.NewProc("GetSystemTimePreciseAsFileTime")
99	procGetTimeZoneInformation             = modkernel32.NewProc("GetTimeZoneInformation")
100	procCreateIoCompletionPort             = modkernel32.NewProc("CreateIoCompletionPort")
101	procGetQueuedCompletionStatus          = modkernel32.NewProc("GetQueuedCompletionStatus")
102	procPostQueuedCompletionStatus         = modkernel32.NewProc("PostQueuedCompletionStatus")
103	procCancelIo                           = modkernel32.NewProc("CancelIo")
104	procCancelIoEx                         = modkernel32.NewProc("CancelIoEx")
105	procCreateProcessW                     = modkernel32.NewProc("CreateProcessW")
106	procOpenProcess                        = modkernel32.NewProc("OpenProcess")
107	procTerminateProcess                   = modkernel32.NewProc("TerminateProcess")
108	procGetExitCodeProcess                 = modkernel32.NewProc("GetExitCodeProcess")
109	procGetStartupInfoW                    = modkernel32.NewProc("GetStartupInfoW")
110	procGetCurrentProcess                  = modkernel32.NewProc("GetCurrentProcess")
111	procGetProcessTimes                    = modkernel32.NewProc("GetProcessTimes")
112	procDuplicateHandle                    = modkernel32.NewProc("DuplicateHandle")
113	procWaitForSingleObject                = modkernel32.NewProc("WaitForSingleObject")
114	procGetTempPathW                       = modkernel32.NewProc("GetTempPathW")
115	procCreatePipe                         = modkernel32.NewProc("CreatePipe")
116	procGetFileType                        = modkernel32.NewProc("GetFileType")
117	procCryptAcquireContextW               = modadvapi32.NewProc("CryptAcquireContextW")
118	procCryptReleaseContext                = modadvapi32.NewProc("CryptReleaseContext")
119	procCryptGenRandom                     = modadvapi32.NewProc("CryptGenRandom")
120	procGetEnvironmentStringsW             = modkernel32.NewProc("GetEnvironmentStringsW")
121	procFreeEnvironmentStringsW            = modkernel32.NewProc("FreeEnvironmentStringsW")
122	procGetEnvironmentVariableW            = modkernel32.NewProc("GetEnvironmentVariableW")
123	procSetEnvironmentVariableW            = modkernel32.NewProc("SetEnvironmentVariableW")
124	procSetFileTime                        = modkernel32.NewProc("SetFileTime")
125	procGetFileAttributesW                 = modkernel32.NewProc("GetFileAttributesW")
126	procSetFileAttributesW                 = modkernel32.NewProc("SetFileAttributesW")
127	procGetFileAttributesExW               = modkernel32.NewProc("GetFileAttributesExW")
128	procGetCommandLineW                    = modkernel32.NewProc("GetCommandLineW")
129	procCommandLineToArgvW                 = modshell32.NewProc("CommandLineToArgvW")
130	procLocalFree                          = modkernel32.NewProc("LocalFree")
131	procSetHandleInformation               = modkernel32.NewProc("SetHandleInformation")
132	procFlushFileBuffers                   = modkernel32.NewProc("FlushFileBuffers")
133	procGetFullPathNameW                   = modkernel32.NewProc("GetFullPathNameW")
134	procGetLongPathNameW                   = modkernel32.NewProc("GetLongPathNameW")
135	procGetShortPathNameW                  = modkernel32.NewProc("GetShortPathNameW")
136	procCreateFileMappingW                 = modkernel32.NewProc("CreateFileMappingW")
137	procMapViewOfFile                      = modkernel32.NewProc("MapViewOfFile")
138	procUnmapViewOfFile                    = modkernel32.NewProc("UnmapViewOfFile")
139	procFlushViewOfFile                    = modkernel32.NewProc("FlushViewOfFile")
140	procVirtualLock                        = modkernel32.NewProc("VirtualLock")
141	procVirtualUnlock                      = modkernel32.NewProc("VirtualUnlock")
142	procVirtualAlloc                       = modkernel32.NewProc("VirtualAlloc")
143	procVirtualFree                        = modkernel32.NewProc("VirtualFree")
144	procVirtualProtect                     = modkernel32.NewProc("VirtualProtect")
145	procTransmitFile                       = modmswsock.NewProc("TransmitFile")
146	procReadDirectoryChangesW              = modkernel32.NewProc("ReadDirectoryChangesW")
147	procCertOpenSystemStoreW               = modcrypt32.NewProc("CertOpenSystemStoreW")
148	procCertOpenStore                      = modcrypt32.NewProc("CertOpenStore")
149	procCertEnumCertificatesInStore        = modcrypt32.NewProc("CertEnumCertificatesInStore")
150	procCertAddCertificateContextToStore   = modcrypt32.NewProc("CertAddCertificateContextToStore")
151	procCertCloseStore                     = modcrypt32.NewProc("CertCloseStore")
152	procCertGetCertificateChain            = modcrypt32.NewProc("CertGetCertificateChain")
153	procCertFreeCertificateChain           = modcrypt32.NewProc("CertFreeCertificateChain")
154	procCertCreateCertificateContext       = modcrypt32.NewProc("CertCreateCertificateContext")
155	procCertFreeCertificateContext         = modcrypt32.NewProc("CertFreeCertificateContext")
156	procCertVerifyCertificateChainPolicy   = modcrypt32.NewProc("CertVerifyCertificateChainPolicy")
157	procRegOpenKeyExW                      = modadvapi32.NewProc("RegOpenKeyExW")
158	procRegCloseKey                        = modadvapi32.NewProc("RegCloseKey")
159	procRegQueryInfoKeyW                   = modadvapi32.NewProc("RegQueryInfoKeyW")
160	procRegEnumKeyExW                      = modadvapi32.NewProc("RegEnumKeyExW")
161	procRegQueryValueExW                   = modadvapi32.NewProc("RegQueryValueExW")
162	procGetCurrentProcessId                = modkernel32.NewProc("GetCurrentProcessId")
163	procGetConsoleMode                     = modkernel32.NewProc("GetConsoleMode")
164	procSetConsoleMode                     = modkernel32.NewProc("SetConsoleMode")
165	procGetConsoleScreenBufferInfo         = modkernel32.NewProc("GetConsoleScreenBufferInfo")
166	procWriteConsoleW                      = modkernel32.NewProc("WriteConsoleW")
167	procReadConsoleW                       = modkernel32.NewProc("ReadConsoleW")
168	procCreateToolhelp32Snapshot           = modkernel32.NewProc("CreateToolhelp32Snapshot")
169	procProcess32FirstW                    = modkernel32.NewProc("Process32FirstW")
170	procProcess32NextW                     = modkernel32.NewProc("Process32NextW")
171	procDeviceIoControl                    = modkernel32.NewProc("DeviceIoControl")
172	procCreateSymbolicLinkW                = modkernel32.NewProc("CreateSymbolicLinkW")
173	procCreateHardLinkW                    = modkernel32.NewProc("CreateHardLinkW")
174	procGetCurrentThreadId                 = modkernel32.NewProc("GetCurrentThreadId")
175	procCreateEventW                       = modkernel32.NewProc("CreateEventW")
176	procCreateEventExW                     = modkernel32.NewProc("CreateEventExW")
177	procOpenEventW                         = modkernel32.NewProc("OpenEventW")
178	procSetEvent                           = modkernel32.NewProc("SetEvent")
179	procResetEvent                         = modkernel32.NewProc("ResetEvent")
180	procPulseEvent                         = modkernel32.NewProc("PulseEvent")
181	procWSAStartup                         = modws2_32.NewProc("WSAStartup")
182	procWSACleanup                         = modws2_32.NewProc("WSACleanup")
183	procWSAIoctl                           = modws2_32.NewProc("WSAIoctl")
184	procsocket                             = modws2_32.NewProc("socket")
185	procsetsockopt                         = modws2_32.NewProc("setsockopt")
186	procgetsockopt                         = modws2_32.NewProc("getsockopt")
187	procbind                               = modws2_32.NewProc("bind")
188	procconnect                            = modws2_32.NewProc("connect")
189	procgetsockname                        = modws2_32.NewProc("getsockname")
190	procgetpeername                        = modws2_32.NewProc("getpeername")
191	proclisten                             = modws2_32.NewProc("listen")
192	procshutdown                           = modws2_32.NewProc("shutdown")
193	procclosesocket                        = modws2_32.NewProc("closesocket")
194	procAcceptEx                           = modmswsock.NewProc("AcceptEx")
195	procGetAcceptExSockaddrs               = modmswsock.NewProc("GetAcceptExSockaddrs")
196	procWSARecv                            = modws2_32.NewProc("WSARecv")
197	procWSASend                            = modws2_32.NewProc("WSASend")
198	procWSARecvFrom                        = modws2_32.NewProc("WSARecvFrom")
199	procWSASendTo                          = modws2_32.NewProc("WSASendTo")
200	procgethostbyname                      = modws2_32.NewProc("gethostbyname")
201	procgetservbyname                      = modws2_32.NewProc("getservbyname")
202	procntohs                              = modws2_32.NewProc("ntohs")
203	procgetprotobyname                     = modws2_32.NewProc("getprotobyname")
204	procDnsQuery_W                         = moddnsapi.NewProc("DnsQuery_W")
205	procDnsRecordListFree                  = moddnsapi.NewProc("DnsRecordListFree")
206	procDnsNameCompare_W                   = moddnsapi.NewProc("DnsNameCompare_W")
207	procGetAddrInfoW                       = modws2_32.NewProc("GetAddrInfoW")
208	procFreeAddrInfoW                      = modws2_32.NewProc("FreeAddrInfoW")
209	procGetIfEntry                         = modiphlpapi.NewProc("GetIfEntry")
210	procGetAdaptersInfo                    = modiphlpapi.NewProc("GetAdaptersInfo")
211	procSetFileCompletionNotificationModes = modkernel32.NewProc("SetFileCompletionNotificationModes")
212	procWSAEnumProtocolsW                  = modws2_32.NewProc("WSAEnumProtocolsW")
213	procGetAdaptersAddresses               = modiphlpapi.NewProc("GetAdaptersAddresses")
214	procGetACP                             = modkernel32.NewProc("GetACP")
215	procMultiByteToWideChar                = modkernel32.NewProc("MultiByteToWideChar")
216	procTranslateNameW                     = modsecur32.NewProc("TranslateNameW")
217	procGetUserNameExW                     = modsecur32.NewProc("GetUserNameExW")
218	procNetUserGetInfo                     = modnetapi32.NewProc("NetUserGetInfo")
219	procNetGetJoinInformation              = modnetapi32.NewProc("NetGetJoinInformation")
220	procNetApiBufferFree                   = modnetapi32.NewProc("NetApiBufferFree")
221	procLookupAccountSidW                  = modadvapi32.NewProc("LookupAccountSidW")
222	procLookupAccountNameW                 = modadvapi32.NewProc("LookupAccountNameW")
223	procConvertSidToStringSidW             = modadvapi32.NewProc("ConvertSidToStringSidW")
224	procConvertStringSidToSidW             = modadvapi32.NewProc("ConvertStringSidToSidW")
225	procGetLengthSid                       = modadvapi32.NewProc("GetLengthSid")
226	procCopySid                            = modadvapi32.NewProc("CopySid")
227	procAllocateAndInitializeSid           = modadvapi32.NewProc("AllocateAndInitializeSid")
228	procFreeSid                            = modadvapi32.NewProc("FreeSid")
229	procEqualSid                           = modadvapi32.NewProc("EqualSid")
230	procOpenProcessToken                   = modadvapi32.NewProc("OpenProcessToken")
231	procGetTokenInformation                = modadvapi32.NewProc("GetTokenInformation")
232	procGetUserProfileDirectoryW           = moduserenv.NewProc("GetUserProfileDirectoryW")
233)
234
235func RegisterEventSource(uncServerName *uint16, sourceName *uint16) (handle Handle, err error) {
236	r0, _, e1 := syscall.Syscall(procRegisterEventSourceW.Addr(), 2, uintptr(unsafe.Pointer(uncServerName)), uintptr(unsafe.Pointer(sourceName)), 0)
237	handle = Handle(r0)
238	if handle == 0 {
239		if e1 != 0 {
240			err = errnoErr(e1)
241		} else {
242			err = syscall.EINVAL
243		}
244	}
245	return
246}
247
248func DeregisterEventSource(handle Handle) (err error) {
249	r1, _, e1 := syscall.Syscall(procDeregisterEventSource.Addr(), 1, uintptr(handle), 0, 0)
250	if r1 == 0 {
251		if e1 != 0 {
252			err = errnoErr(e1)
253		} else {
254			err = syscall.EINVAL
255		}
256	}
257	return
258}
259
260func ReportEvent(log Handle, etype uint16, category uint16, eventId uint32, usrSId uintptr, numStrings uint16, dataSize uint32, strings **uint16, rawData *byte) (err error) {
261	r1, _, e1 := syscall.Syscall9(procReportEventW.Addr(), 9, uintptr(log), uintptr(etype), uintptr(category), uintptr(eventId), uintptr(usrSId), uintptr(numStrings), uintptr(dataSize), uintptr(unsafe.Pointer(strings)), uintptr(unsafe.Pointer(rawData)))
262	if r1 == 0 {
263		if e1 != 0 {
264			err = errnoErr(e1)
265		} else {
266			err = syscall.EINVAL
267		}
268	}
269	return
270}
271
272func OpenSCManager(machineName *uint16, databaseName *uint16, access uint32) (handle Handle, err error) {
273	r0, _, e1 := syscall.Syscall(procOpenSCManagerW.Addr(), 3, uintptr(unsafe.Pointer(machineName)), uintptr(unsafe.Pointer(databaseName)), uintptr(access))
274	handle = Handle(r0)
275	if handle == 0 {
276		if e1 != 0 {
277			err = errnoErr(e1)
278		} else {
279			err = syscall.EINVAL
280		}
281	}
282	return
283}
284
285func CloseServiceHandle(handle Handle) (err error) {
286	r1, _, e1 := syscall.Syscall(procCloseServiceHandle.Addr(), 1, uintptr(handle), 0, 0)
287	if r1 == 0 {
288		if e1 != 0 {
289			err = errnoErr(e1)
290		} else {
291			err = syscall.EINVAL
292		}
293	}
294	return
295}
296
297func CreateService(mgr Handle, serviceName *uint16, displayName *uint16, access uint32, srvType uint32, startType uint32, errCtl uint32, pathName *uint16, loadOrderGroup *uint16, tagId *uint32, dependencies *uint16, serviceStartName *uint16, password *uint16) (handle Handle, err error) {
298	r0, _, e1 := syscall.Syscall15(procCreateServiceW.Addr(), 13, uintptr(mgr), uintptr(unsafe.Pointer(serviceName)), uintptr(unsafe.Pointer(displayName)), uintptr(access), uintptr(srvType), uintptr(startType), uintptr(errCtl), uintptr(unsafe.Pointer(pathName)), uintptr(unsafe.Pointer(loadOrderGroup)), uintptr(unsafe.Pointer(tagId)), uintptr(unsafe.Pointer(dependencies)), uintptr(unsafe.Pointer(serviceStartName)), uintptr(unsafe.Pointer(password)), 0, 0)
299	handle = Handle(r0)
300	if handle == 0 {
301		if e1 != 0 {
302			err = errnoErr(e1)
303		} else {
304			err = syscall.EINVAL
305		}
306	}
307	return
308}
309
310func OpenService(mgr Handle, serviceName *uint16, access uint32) (handle Handle, err error) {
311	r0, _, e1 := syscall.Syscall(procOpenServiceW.Addr(), 3, uintptr(mgr), uintptr(unsafe.Pointer(serviceName)), uintptr(access))
312	handle = Handle(r0)
313	if handle == 0 {
314		if e1 != 0 {
315			err = errnoErr(e1)
316		} else {
317			err = syscall.EINVAL
318		}
319	}
320	return
321}
322
323func DeleteService(service Handle) (err error) {
324	r1, _, e1 := syscall.Syscall(procDeleteService.Addr(), 1, uintptr(service), 0, 0)
325	if r1 == 0 {
326		if e1 != 0 {
327			err = errnoErr(e1)
328		} else {
329			err = syscall.EINVAL
330		}
331	}
332	return
333}
334
335func StartService(service Handle, numArgs uint32, argVectors **uint16) (err error) {
336	r1, _, e1 := syscall.Syscall(procStartServiceW.Addr(), 3, uintptr(service), uintptr(numArgs), uintptr(unsafe.Pointer(argVectors)))
337	if r1 == 0 {
338		if e1 != 0 {
339			err = errnoErr(e1)
340		} else {
341			err = syscall.EINVAL
342		}
343	}
344	return
345}
346
347func QueryServiceStatus(service Handle, status *SERVICE_STATUS) (err error) {
348	r1, _, e1 := syscall.Syscall(procQueryServiceStatus.Addr(), 2, uintptr(service), uintptr(unsafe.Pointer(status)), 0)
349	if r1 == 0 {
350		if e1 != 0 {
351			err = errnoErr(e1)
352		} else {
353			err = syscall.EINVAL
354		}
355	}
356	return
357}
358
359func ControlService(service Handle, control uint32, status *SERVICE_STATUS) (err error) {
360	r1, _, e1 := syscall.Syscall(procControlService.Addr(), 3, uintptr(service), uintptr(control), uintptr(unsafe.Pointer(status)))
361	if r1 == 0 {
362		if e1 != 0 {
363			err = errnoErr(e1)
364		} else {
365			err = syscall.EINVAL
366		}
367	}
368	return
369}
370
371func StartServiceCtrlDispatcher(serviceTable *SERVICE_TABLE_ENTRY) (err error) {
372	r1, _, e1 := syscall.Syscall(procStartServiceCtrlDispatcherW.Addr(), 1, uintptr(unsafe.Pointer(serviceTable)), 0, 0)
373	if r1 == 0 {
374		if e1 != 0 {
375			err = errnoErr(e1)
376		} else {
377			err = syscall.EINVAL
378		}
379	}
380	return
381}
382
383func SetServiceStatus(service Handle, serviceStatus *SERVICE_STATUS) (err error) {
384	r1, _, e1 := syscall.Syscall(procSetServiceStatus.Addr(), 2, uintptr(service), uintptr(unsafe.Pointer(serviceStatus)), 0)
385	if r1 == 0 {
386		if e1 != 0 {
387			err = errnoErr(e1)
388		} else {
389			err = syscall.EINVAL
390		}
391	}
392	return
393}
394
395func ChangeServiceConfig(service Handle, serviceType uint32, startType uint32, errorControl uint32, binaryPathName *uint16, loadOrderGroup *uint16, tagId *uint32, dependencies *uint16, serviceStartName *uint16, password *uint16, displayName *uint16) (err error) {
396	r1, _, e1 := syscall.Syscall12(procChangeServiceConfigW.Addr(), 11, uintptr(service), uintptr(serviceType), uintptr(startType), uintptr(errorControl), uintptr(unsafe.Pointer(binaryPathName)), uintptr(unsafe.Pointer(loadOrderGroup)), uintptr(unsafe.Pointer(tagId)), uintptr(unsafe.Pointer(dependencies)), uintptr(unsafe.Pointer(serviceStartName)), uintptr(unsafe.Pointer(password)), uintptr(unsafe.Pointer(displayName)), 0)
397	if r1 == 0 {
398		if e1 != 0 {
399			err = errnoErr(e1)
400		} else {
401			err = syscall.EINVAL
402		}
403	}
404	return
405}
406
407func QueryServiceConfig(service Handle, serviceConfig *QUERY_SERVICE_CONFIG, bufSize uint32, bytesNeeded *uint32) (err error) {
408	r1, _, e1 := syscall.Syscall6(procQueryServiceConfigW.Addr(), 4, uintptr(service), uintptr(unsafe.Pointer(serviceConfig)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), 0, 0)
409	if r1 == 0 {
410		if e1 != 0 {
411			err = errnoErr(e1)
412		} else {
413			err = syscall.EINVAL
414		}
415	}
416	return
417}
418
419func ChangeServiceConfig2(service Handle, infoLevel uint32, info *byte) (err error) {
420	r1, _, e1 := syscall.Syscall(procChangeServiceConfig2W.Addr(), 3, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(info)))
421	if r1 == 0 {
422		if e1 != 0 {
423			err = errnoErr(e1)
424		} else {
425			err = syscall.EINVAL
426		}
427	}
428	return
429}
430
431func QueryServiceConfig2(service Handle, infoLevel uint32, buff *byte, buffSize uint32, bytesNeeded *uint32) (err error) {
432	r1, _, e1 := syscall.Syscall6(procQueryServiceConfig2W.Addr(), 5, uintptr(service), uintptr(infoLevel), uintptr(unsafe.Pointer(buff)), uintptr(buffSize), uintptr(unsafe.Pointer(bytesNeeded)), 0)
433	if r1 == 0 {
434		if e1 != 0 {
435			err = errnoErr(e1)
436		} else {
437			err = syscall.EINVAL
438		}
439	}
440	return
441}
442
443func EnumServicesStatusEx(mgr Handle, infoLevel uint32, serviceType uint32, serviceState uint32, services *byte, bufSize uint32, bytesNeeded *uint32, servicesReturned *uint32, resumeHandle *uint32, groupName *uint16) (err error) {
444	r1, _, e1 := syscall.Syscall12(procEnumServicesStatusExW.Addr(), 10, uintptr(mgr), uintptr(infoLevel), uintptr(serviceType), uintptr(serviceState), uintptr(unsafe.Pointer(services)), uintptr(bufSize), uintptr(unsafe.Pointer(bytesNeeded)), uintptr(unsafe.Pointer(servicesReturned)), uintptr(unsafe.Pointer(resumeHandle)), uintptr(unsafe.Pointer(groupName)), 0, 0)
445	if r1 == 0 {
446		if e1 != 0 {
447			err = errnoErr(e1)
448		} else {
449			err = syscall.EINVAL
450		}
451	}
452	return
453}
454
455func GetLastError() (lasterr error) {
456	r0, _, _ := syscall.Syscall(procGetLastError.Addr(), 0, 0, 0, 0)
457	if r0 != 0 {
458		lasterr = syscall.Errno(r0)
459	}
460	return
461}
462
463func LoadLibrary(libname string) (handle Handle, err error) {
464	var _p0 *uint16
465	_p0, err = syscall.UTF16PtrFromString(libname)
466	if err != nil {
467		return
468	}
469	return _LoadLibrary(_p0)
470}
471
472func _LoadLibrary(libname *uint16) (handle Handle, err error) {
473	r0, _, e1 := syscall.Syscall(procLoadLibraryW.Addr(), 1, uintptr(unsafe.Pointer(libname)), 0, 0)
474	handle = Handle(r0)
475	if handle == 0 {
476		if e1 != 0 {
477			err = errnoErr(e1)
478		} else {
479			err = syscall.EINVAL
480		}
481	}
482	return
483}
484
485func LoadLibraryEx(libname string, zero Handle, flags uintptr) (handle Handle, err error) {
486	var _p0 *uint16
487	_p0, err = syscall.UTF16PtrFromString(libname)
488	if err != nil {
489		return
490	}
491	return _LoadLibraryEx(_p0, zero, flags)
492}
493
494func _LoadLibraryEx(libname *uint16, zero Handle, flags uintptr) (handle Handle, err error) {
495	r0, _, e1 := syscall.Syscall(procLoadLibraryExW.Addr(), 3, uintptr(unsafe.Pointer(libname)), uintptr(zero), uintptr(flags))
496	handle = Handle(r0)
497	if handle == 0 {
498		if e1 != 0 {
499			err = errnoErr(e1)
500		} else {
501			err = syscall.EINVAL
502		}
503	}
504	return
505}
506
507func FreeLibrary(handle Handle) (err error) {
508	r1, _, e1 := syscall.Syscall(procFreeLibrary.Addr(), 1, uintptr(handle), 0, 0)
509	if r1 == 0 {
510		if e1 != 0 {
511			err = errnoErr(e1)
512		} else {
513			err = syscall.EINVAL
514		}
515	}
516	return
517}
518
519func GetProcAddress(module Handle, procname string) (proc uintptr, err error) {
520	var _p0 *byte
521	_p0, err = syscall.BytePtrFromString(procname)
522	if err != nil {
523		return
524	}
525	return _GetProcAddress(module, _p0)
526}
527
528func _GetProcAddress(module Handle, procname *byte) (proc uintptr, err error) {
529	r0, _, e1 := syscall.Syscall(procGetProcAddress.Addr(), 2, uintptr(module), uintptr(unsafe.Pointer(procname)), 0)
530	proc = uintptr(r0)
531	if proc == 0 {
532		if e1 != 0 {
533			err = errnoErr(e1)
534		} else {
535			err = syscall.EINVAL
536		}
537	}
538	return
539}
540
541func GetVersion() (ver uint32, err error) {
542	r0, _, e1 := syscall.Syscall(procGetVersion.Addr(), 0, 0, 0, 0)
543	ver = uint32(r0)
544	if ver == 0 {
545		if e1 != 0 {
546			err = errnoErr(e1)
547		} else {
548			err = syscall.EINVAL
549		}
550	}
551	return
552}
553
554func FormatMessage(flags uint32, msgsrc uintptr, msgid uint32, langid uint32, buf []uint16, args *byte) (n uint32, err error) {
555	var _p0 *uint16
556	if len(buf) > 0 {
557		_p0 = &buf[0]
558	}
559	r0, _, e1 := syscall.Syscall9(procFormatMessageW.Addr(), 7, uintptr(flags), uintptr(msgsrc), uintptr(msgid), uintptr(langid), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(args)), 0, 0)
560	n = uint32(r0)
561	if n == 0 {
562		if e1 != 0 {
563			err = errnoErr(e1)
564		} else {
565			err = syscall.EINVAL
566		}
567	}
568	return
569}
570
571func ExitProcess(exitcode uint32) {
572	syscall.Syscall(procExitProcess.Addr(), 1, uintptr(exitcode), 0, 0)
573	return
574}
575
576func CreateFile(name *uint16, access uint32, mode uint32, sa *SecurityAttributes, createmode uint32, attrs uint32, templatefile int32) (handle Handle, err error) {
577	r0, _, e1 := syscall.Syscall9(procCreateFileW.Addr(), 7, uintptr(unsafe.Pointer(name)), uintptr(access), uintptr(mode), uintptr(unsafe.Pointer(sa)), uintptr(createmode), uintptr(attrs), uintptr(templatefile), 0, 0)
578	handle = Handle(r0)
579	if handle == InvalidHandle {
580		if e1 != 0 {
581			err = errnoErr(e1)
582		} else {
583			err = syscall.EINVAL
584		}
585	}
586	return
587}
588
589func ReadFile(handle Handle, buf []byte, done *uint32, overlapped *Overlapped) (err error) {
590	var _p0 *byte
591	if len(buf) > 0 {
592		_p0 = &buf[0]
593	}
594	r1, _, e1 := syscall.Syscall6(procReadFile.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(done)), uintptr(unsafe.Pointer(overlapped)), 0)
595	if r1 == 0 {
596		if e1 != 0 {
597			err = errnoErr(e1)
598		} else {
599			err = syscall.EINVAL
600		}
601	}
602	return
603}
604
605func WriteFile(handle Handle, buf []byte, done *uint32, overlapped *Overlapped) (err error) {
606	var _p0 *byte
607	if len(buf) > 0 {
608		_p0 = &buf[0]
609	}
610	r1, _, e1 := syscall.Syscall6(procWriteFile.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(_p0)), uintptr(len(buf)), uintptr(unsafe.Pointer(done)), uintptr(unsafe.Pointer(overlapped)), 0)
611	if r1 == 0 {
612		if e1 != 0 {
613			err = errnoErr(e1)
614		} else {
615			err = syscall.EINVAL
616		}
617	}
618	return
619}
620
621func SetFilePointer(handle Handle, lowoffset int32, highoffsetptr *int32, whence uint32) (newlowoffset uint32, err error) {
622	r0, _, e1 := syscall.Syscall6(procSetFilePointer.Addr(), 4, uintptr(handle), uintptr(lowoffset), uintptr(unsafe.Pointer(highoffsetptr)), uintptr(whence), 0, 0)
623	newlowoffset = uint32(r0)
624	if newlowoffset == 0xffffffff {
625		if e1 != 0 {
626			err = errnoErr(e1)
627		} else {
628			err = syscall.EINVAL
629		}
630	}
631	return
632}
633
634func CloseHandle(handle Handle) (err error) {
635	r1, _, e1 := syscall.Syscall(procCloseHandle.Addr(), 1, uintptr(handle), 0, 0)
636	if r1 == 0 {
637		if e1 != 0 {
638			err = errnoErr(e1)
639		} else {
640			err = syscall.EINVAL
641		}
642	}
643	return
644}
645
646func GetStdHandle(stdhandle uint32) (handle Handle, err error) {
647	r0, _, e1 := syscall.Syscall(procGetStdHandle.Addr(), 1, uintptr(stdhandle), 0, 0)
648	handle = Handle(r0)
649	if handle == InvalidHandle {
650		if e1 != 0 {
651			err = errnoErr(e1)
652		} else {
653			err = syscall.EINVAL
654		}
655	}
656	return
657}
658
659func SetStdHandle(stdhandle uint32, handle Handle) (err error) {
660	r1, _, e1 := syscall.Syscall(procSetStdHandle.Addr(), 2, uintptr(stdhandle), uintptr(handle), 0)
661	if r1 == 0 {
662		if e1 != 0 {
663			err = errnoErr(e1)
664		} else {
665			err = syscall.EINVAL
666		}
667	}
668	return
669}
670
671func findFirstFile1(name *uint16, data *win32finddata1) (handle Handle, err error) {
672	r0, _, e1 := syscall.Syscall(procFindFirstFileW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(data)), 0)
673	handle = Handle(r0)
674	if handle == InvalidHandle {
675		if e1 != 0 {
676			err = errnoErr(e1)
677		} else {
678			err = syscall.EINVAL
679		}
680	}
681	return
682}
683
684func findNextFile1(handle Handle, data *win32finddata1) (err error) {
685	r1, _, e1 := syscall.Syscall(procFindNextFileW.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0)
686	if r1 == 0 {
687		if e1 != 0 {
688			err = errnoErr(e1)
689		} else {
690			err = syscall.EINVAL
691		}
692	}
693	return
694}
695
696func FindClose(handle Handle) (err error) {
697	r1, _, e1 := syscall.Syscall(procFindClose.Addr(), 1, uintptr(handle), 0, 0)
698	if r1 == 0 {
699		if e1 != 0 {
700			err = errnoErr(e1)
701		} else {
702			err = syscall.EINVAL
703		}
704	}
705	return
706}
707
708func GetFileInformationByHandle(handle Handle, data *ByHandleFileInformation) (err error) {
709	r1, _, e1 := syscall.Syscall(procGetFileInformationByHandle.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0)
710	if r1 == 0 {
711		if e1 != 0 {
712			err = errnoErr(e1)
713		} else {
714			err = syscall.EINVAL
715		}
716	}
717	return
718}
719
720func GetCurrentDirectory(buflen uint32, buf *uint16) (n uint32, err error) {
721	r0, _, e1 := syscall.Syscall(procGetCurrentDirectoryW.Addr(), 2, uintptr(buflen), uintptr(unsafe.Pointer(buf)), 0)
722	n = uint32(r0)
723	if n == 0 {
724		if e1 != 0 {
725			err = errnoErr(e1)
726		} else {
727			err = syscall.EINVAL
728		}
729	}
730	return
731}
732
733func SetCurrentDirectory(path *uint16) (err error) {
734	r1, _, e1 := syscall.Syscall(procSetCurrentDirectoryW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0)
735	if r1 == 0 {
736		if e1 != 0 {
737			err = errnoErr(e1)
738		} else {
739			err = syscall.EINVAL
740		}
741	}
742	return
743}
744
745func CreateDirectory(path *uint16, sa *SecurityAttributes) (err error) {
746	r1, _, e1 := syscall.Syscall(procCreateDirectoryW.Addr(), 2, uintptr(unsafe.Pointer(path)), uintptr(unsafe.Pointer(sa)), 0)
747	if r1 == 0 {
748		if e1 != 0 {
749			err = errnoErr(e1)
750		} else {
751			err = syscall.EINVAL
752		}
753	}
754	return
755}
756
757func RemoveDirectory(path *uint16) (err error) {
758	r1, _, e1 := syscall.Syscall(procRemoveDirectoryW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0)
759	if r1 == 0 {
760		if e1 != 0 {
761			err = errnoErr(e1)
762		} else {
763			err = syscall.EINVAL
764		}
765	}
766	return
767}
768
769func DeleteFile(path *uint16) (err error) {
770	r1, _, e1 := syscall.Syscall(procDeleteFileW.Addr(), 1, uintptr(unsafe.Pointer(path)), 0, 0)
771	if r1 == 0 {
772		if e1 != 0 {
773			err = errnoErr(e1)
774		} else {
775			err = syscall.EINVAL
776		}
777	}
778	return
779}
780
781func MoveFile(from *uint16, to *uint16) (err error) {
782	r1, _, e1 := syscall.Syscall(procMoveFileW.Addr(), 2, uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(to)), 0)
783	if r1 == 0 {
784		if e1 != 0 {
785			err = errnoErr(e1)
786		} else {
787			err = syscall.EINVAL
788		}
789	}
790	return
791}
792
793func MoveFileEx(from *uint16, to *uint16, flags uint32) (err error) {
794	r1, _, e1 := syscall.Syscall(procMoveFileExW.Addr(), 3, uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(to)), uintptr(flags))
795	if r1 == 0 {
796		if e1 != 0 {
797			err = errnoErr(e1)
798		} else {
799			err = syscall.EINVAL
800		}
801	}
802	return
803}
804
805func GetComputerName(buf *uint16, n *uint32) (err error) {
806	r1, _, e1 := syscall.Syscall(procGetComputerNameW.Addr(), 2, uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(n)), 0)
807	if r1 == 0 {
808		if e1 != 0 {
809			err = errnoErr(e1)
810		} else {
811			err = syscall.EINVAL
812		}
813	}
814	return
815}
816
817func GetComputerNameEx(nametype uint32, buf *uint16, n *uint32) (err error) {
818	r1, _, e1 := syscall.Syscall(procGetComputerNameExW.Addr(), 3, uintptr(nametype), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(n)))
819	if r1 == 0 {
820		if e1 != 0 {
821			err = errnoErr(e1)
822		} else {
823			err = syscall.EINVAL
824		}
825	}
826	return
827}
828
829func SetEndOfFile(handle Handle) (err error) {
830	r1, _, e1 := syscall.Syscall(procSetEndOfFile.Addr(), 1, uintptr(handle), 0, 0)
831	if r1 == 0 {
832		if e1 != 0 {
833			err = errnoErr(e1)
834		} else {
835			err = syscall.EINVAL
836		}
837	}
838	return
839}
840
841func GetSystemTimeAsFileTime(time *Filetime) {
842	syscall.Syscall(procGetSystemTimeAsFileTime.Addr(), 1, uintptr(unsafe.Pointer(time)), 0, 0)
843	return
844}
845
846func GetSystemTimePreciseAsFileTime(time *Filetime) {
847	syscall.Syscall(procGetSystemTimePreciseAsFileTime.Addr(), 1, uintptr(unsafe.Pointer(time)), 0, 0)
848	return
849}
850
851func GetTimeZoneInformation(tzi *Timezoneinformation) (rc uint32, err error) {
852	r0, _, e1 := syscall.Syscall(procGetTimeZoneInformation.Addr(), 1, uintptr(unsafe.Pointer(tzi)), 0, 0)
853	rc = uint32(r0)
854	if rc == 0xffffffff {
855		if e1 != 0 {
856			err = errnoErr(e1)
857		} else {
858			err = syscall.EINVAL
859		}
860	}
861	return
862}
863
864func CreateIoCompletionPort(filehandle Handle, cphandle Handle, key uint32, threadcnt uint32) (handle Handle, err error) {
865	r0, _, e1 := syscall.Syscall6(procCreateIoCompletionPort.Addr(), 4, uintptr(filehandle), uintptr(cphandle), uintptr(key), uintptr(threadcnt), 0, 0)
866	handle = Handle(r0)
867	if handle == 0 {
868		if e1 != 0 {
869			err = errnoErr(e1)
870		} else {
871			err = syscall.EINVAL
872		}
873	}
874	return
875}
876
877func GetQueuedCompletionStatus(cphandle Handle, qty *uint32, key *uint32, overlapped **Overlapped, timeout uint32) (err error) {
878	r1, _, e1 := syscall.Syscall6(procGetQueuedCompletionStatus.Addr(), 5, uintptr(cphandle), uintptr(unsafe.Pointer(qty)), uintptr(unsafe.Pointer(key)), uintptr(unsafe.Pointer(overlapped)), uintptr(timeout), 0)
879	if r1 == 0 {
880		if e1 != 0 {
881			err = errnoErr(e1)
882		} else {
883			err = syscall.EINVAL
884		}
885	}
886	return
887}
888
889func PostQueuedCompletionStatus(cphandle Handle, qty uint32, key uint32, overlapped *Overlapped) (err error) {
890	r1, _, e1 := syscall.Syscall6(procPostQueuedCompletionStatus.Addr(), 4, uintptr(cphandle), uintptr(qty), uintptr(key), uintptr(unsafe.Pointer(overlapped)), 0, 0)
891	if r1 == 0 {
892		if e1 != 0 {
893			err = errnoErr(e1)
894		} else {
895			err = syscall.EINVAL
896		}
897	}
898	return
899}
900
901func CancelIo(s Handle) (err error) {
902	r1, _, e1 := syscall.Syscall(procCancelIo.Addr(), 1, uintptr(s), 0, 0)
903	if r1 == 0 {
904		if e1 != 0 {
905			err = errnoErr(e1)
906		} else {
907			err = syscall.EINVAL
908		}
909	}
910	return
911}
912
913func CancelIoEx(s Handle, o *Overlapped) (err error) {
914	r1, _, e1 := syscall.Syscall(procCancelIoEx.Addr(), 2, uintptr(s), uintptr(unsafe.Pointer(o)), 0)
915	if r1 == 0 {
916		if e1 != 0 {
917			err = errnoErr(e1)
918		} else {
919			err = syscall.EINVAL
920		}
921	}
922	return
923}
924
925func CreateProcess(appName *uint16, commandLine *uint16, procSecurity *SecurityAttributes, threadSecurity *SecurityAttributes, inheritHandles bool, creationFlags uint32, env *uint16, currentDir *uint16, startupInfo *StartupInfo, outProcInfo *ProcessInformation) (err error) {
926	var _p0 uint32
927	if inheritHandles {
928		_p0 = 1
929	} else {
930		_p0 = 0
931	}
932	r1, _, e1 := syscall.Syscall12(procCreateProcessW.Addr(), 10, uintptr(unsafe.Pointer(appName)), uintptr(unsafe.Pointer(commandLine)), uintptr(unsafe.Pointer(procSecurity)), uintptr(unsafe.Pointer(threadSecurity)), uintptr(_p0), uintptr(creationFlags), uintptr(unsafe.Pointer(env)), uintptr(unsafe.Pointer(currentDir)), uintptr(unsafe.Pointer(startupInfo)), uintptr(unsafe.Pointer(outProcInfo)), 0, 0)
933	if r1 == 0 {
934		if e1 != 0 {
935			err = errnoErr(e1)
936		} else {
937			err = syscall.EINVAL
938		}
939	}
940	return
941}
942
943func OpenProcess(da uint32, inheritHandle bool, pid uint32) (handle Handle, err error) {
944	var _p0 uint32
945	if inheritHandle {
946		_p0 = 1
947	} else {
948		_p0 = 0
949	}
950	r0, _, e1 := syscall.Syscall(procOpenProcess.Addr(), 3, uintptr(da), uintptr(_p0), uintptr(pid))
951	handle = Handle(r0)
952	if handle == 0 {
953		if e1 != 0 {
954			err = errnoErr(e1)
955		} else {
956			err = syscall.EINVAL
957		}
958	}
959	return
960}
961
962func TerminateProcess(handle Handle, exitcode uint32) (err error) {
963	r1, _, e1 := syscall.Syscall(procTerminateProcess.Addr(), 2, uintptr(handle), uintptr(exitcode), 0)
964	if r1 == 0 {
965		if e1 != 0 {
966			err = errnoErr(e1)
967		} else {
968			err = syscall.EINVAL
969		}
970	}
971	return
972}
973
974func GetExitCodeProcess(handle Handle, exitcode *uint32) (err error) {
975	r1, _, e1 := syscall.Syscall(procGetExitCodeProcess.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(exitcode)), 0)
976	if r1 == 0 {
977		if e1 != 0 {
978			err = errnoErr(e1)
979		} else {
980			err = syscall.EINVAL
981		}
982	}
983	return
984}
985
986func GetStartupInfo(startupInfo *StartupInfo) (err error) {
987	r1, _, e1 := syscall.Syscall(procGetStartupInfoW.Addr(), 1, uintptr(unsafe.Pointer(startupInfo)), 0, 0)
988	if r1 == 0 {
989		if e1 != 0 {
990			err = errnoErr(e1)
991		} else {
992			err = syscall.EINVAL
993		}
994	}
995	return
996}
997
998func GetCurrentProcess() (pseudoHandle Handle, err error) {
999	r0, _, e1 := syscall.Syscall(procGetCurrentProcess.Addr(), 0, 0, 0, 0)
1000	pseudoHandle = Handle(r0)
1001	if pseudoHandle == 0 {
1002		if e1 != 0 {
1003			err = errnoErr(e1)
1004		} else {
1005			err = syscall.EINVAL
1006		}
1007	}
1008	return
1009}
1010
1011func GetProcessTimes(handle Handle, creationTime *Filetime, exitTime *Filetime, kernelTime *Filetime, userTime *Filetime) (err error) {
1012	r1, _, e1 := syscall.Syscall6(procGetProcessTimes.Addr(), 5, uintptr(handle), uintptr(unsafe.Pointer(creationTime)), uintptr(unsafe.Pointer(exitTime)), uintptr(unsafe.Pointer(kernelTime)), uintptr(unsafe.Pointer(userTime)), 0)
1013	if r1 == 0 {
1014		if e1 != 0 {
1015			err = errnoErr(e1)
1016		} else {
1017			err = syscall.EINVAL
1018		}
1019	}
1020	return
1021}
1022
1023func DuplicateHandle(hSourceProcessHandle Handle, hSourceHandle Handle, hTargetProcessHandle Handle, lpTargetHandle *Handle, dwDesiredAccess uint32, bInheritHandle bool, dwOptions uint32) (err error) {
1024	var _p0 uint32
1025	if bInheritHandle {
1026		_p0 = 1
1027	} else {
1028		_p0 = 0
1029	}
1030	r1, _, e1 := syscall.Syscall9(procDuplicateHandle.Addr(), 7, uintptr(hSourceProcessHandle), uintptr(hSourceHandle), uintptr(hTargetProcessHandle), uintptr(unsafe.Pointer(lpTargetHandle)), uintptr(dwDesiredAccess), uintptr(_p0), uintptr(dwOptions), 0, 0)
1031	if r1 == 0 {
1032		if e1 != 0 {
1033			err = errnoErr(e1)
1034		} else {
1035			err = syscall.EINVAL
1036		}
1037	}
1038	return
1039}
1040
1041func WaitForSingleObject(handle Handle, waitMilliseconds uint32) (event uint32, err error) {
1042	r0, _, e1 := syscall.Syscall(procWaitForSingleObject.Addr(), 2, uintptr(handle), uintptr(waitMilliseconds), 0)
1043	event = uint32(r0)
1044	if event == 0xffffffff {
1045		if e1 != 0 {
1046			err = errnoErr(e1)
1047		} else {
1048			err = syscall.EINVAL
1049		}
1050	}
1051	return
1052}
1053
1054func GetTempPath(buflen uint32, buf *uint16) (n uint32, err error) {
1055	r0, _, e1 := syscall.Syscall(procGetTempPathW.Addr(), 2, uintptr(buflen), uintptr(unsafe.Pointer(buf)), 0)
1056	n = uint32(r0)
1057	if n == 0 {
1058		if e1 != 0 {
1059			err = errnoErr(e1)
1060		} else {
1061			err = syscall.EINVAL
1062		}
1063	}
1064	return
1065}
1066
1067func CreatePipe(readhandle *Handle, writehandle *Handle, sa *SecurityAttributes, size uint32) (err error) {
1068	r1, _, e1 := syscall.Syscall6(procCreatePipe.Addr(), 4, uintptr(unsafe.Pointer(readhandle)), uintptr(unsafe.Pointer(writehandle)), uintptr(unsafe.Pointer(sa)), uintptr(size), 0, 0)
1069	if r1 == 0 {
1070		if e1 != 0 {
1071			err = errnoErr(e1)
1072		} else {
1073			err = syscall.EINVAL
1074		}
1075	}
1076	return
1077}
1078
1079func GetFileType(filehandle Handle) (n uint32, err error) {
1080	r0, _, e1 := syscall.Syscall(procGetFileType.Addr(), 1, uintptr(filehandle), 0, 0)
1081	n = uint32(r0)
1082	if n == 0 {
1083		if e1 != 0 {
1084			err = errnoErr(e1)
1085		} else {
1086			err = syscall.EINVAL
1087		}
1088	}
1089	return
1090}
1091
1092func CryptAcquireContext(provhandle *Handle, container *uint16, provider *uint16, provtype uint32, flags uint32) (err error) {
1093	r1, _, e1 := syscall.Syscall6(procCryptAcquireContextW.Addr(), 5, uintptr(unsafe.Pointer(provhandle)), uintptr(unsafe.Pointer(container)), uintptr(unsafe.Pointer(provider)), uintptr(provtype), uintptr(flags), 0)
1094	if r1 == 0 {
1095		if e1 != 0 {
1096			err = errnoErr(e1)
1097		} else {
1098			err = syscall.EINVAL
1099		}
1100	}
1101	return
1102}
1103
1104func CryptReleaseContext(provhandle Handle, flags uint32) (err error) {
1105	r1, _, e1 := syscall.Syscall(procCryptReleaseContext.Addr(), 2, uintptr(provhandle), uintptr(flags), 0)
1106	if r1 == 0 {
1107		if e1 != 0 {
1108			err = errnoErr(e1)
1109		} else {
1110			err = syscall.EINVAL
1111		}
1112	}
1113	return
1114}
1115
1116func CryptGenRandom(provhandle Handle, buflen uint32, buf *byte) (err error) {
1117	r1, _, e1 := syscall.Syscall(procCryptGenRandom.Addr(), 3, uintptr(provhandle), uintptr(buflen), uintptr(unsafe.Pointer(buf)))
1118	if r1 == 0 {
1119		if e1 != 0 {
1120			err = errnoErr(e1)
1121		} else {
1122			err = syscall.EINVAL
1123		}
1124	}
1125	return
1126}
1127
1128func GetEnvironmentStrings() (envs *uint16, err error) {
1129	r0, _, e1 := syscall.Syscall(procGetEnvironmentStringsW.Addr(), 0, 0, 0, 0)
1130	envs = (*uint16)(unsafe.Pointer(r0))
1131	if envs == nil {
1132		if e1 != 0 {
1133			err = errnoErr(e1)
1134		} else {
1135			err = syscall.EINVAL
1136		}
1137	}
1138	return
1139}
1140
1141func FreeEnvironmentStrings(envs *uint16) (err error) {
1142	r1, _, e1 := syscall.Syscall(procFreeEnvironmentStringsW.Addr(), 1, uintptr(unsafe.Pointer(envs)), 0, 0)
1143	if r1 == 0 {
1144		if e1 != 0 {
1145			err = errnoErr(e1)
1146		} else {
1147			err = syscall.EINVAL
1148		}
1149	}
1150	return
1151}
1152
1153func GetEnvironmentVariable(name *uint16, buffer *uint16, size uint32) (n uint32, err error) {
1154	r0, _, e1 := syscall.Syscall(procGetEnvironmentVariableW.Addr(), 3, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(buffer)), uintptr(size))
1155	n = uint32(r0)
1156	if n == 0 {
1157		if e1 != 0 {
1158			err = errnoErr(e1)
1159		} else {
1160			err = syscall.EINVAL
1161		}
1162	}
1163	return
1164}
1165
1166func SetEnvironmentVariable(name *uint16, value *uint16) (err error) {
1167	r1, _, e1 := syscall.Syscall(procSetEnvironmentVariableW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(value)), 0)
1168	if r1 == 0 {
1169		if e1 != 0 {
1170			err = errnoErr(e1)
1171		} else {
1172			err = syscall.EINVAL
1173		}
1174	}
1175	return
1176}
1177
1178func SetFileTime(handle Handle, ctime *Filetime, atime *Filetime, wtime *Filetime) (err error) {
1179	r1, _, e1 := syscall.Syscall6(procSetFileTime.Addr(), 4, uintptr(handle), uintptr(unsafe.Pointer(ctime)), uintptr(unsafe.Pointer(atime)), uintptr(unsafe.Pointer(wtime)), 0, 0)
1180	if r1 == 0 {
1181		if e1 != 0 {
1182			err = errnoErr(e1)
1183		} else {
1184			err = syscall.EINVAL
1185		}
1186	}
1187	return
1188}
1189
1190func GetFileAttributes(name *uint16) (attrs uint32, err error) {
1191	r0, _, e1 := syscall.Syscall(procGetFileAttributesW.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0)
1192	attrs = uint32(r0)
1193	if attrs == INVALID_FILE_ATTRIBUTES {
1194		if e1 != 0 {
1195			err = errnoErr(e1)
1196		} else {
1197			err = syscall.EINVAL
1198		}
1199	}
1200	return
1201}
1202
1203func SetFileAttributes(name *uint16, attrs uint32) (err error) {
1204	r1, _, e1 := syscall.Syscall(procSetFileAttributesW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(attrs), 0)
1205	if r1 == 0 {
1206		if e1 != 0 {
1207			err = errnoErr(e1)
1208		} else {
1209			err = syscall.EINVAL
1210		}
1211	}
1212	return
1213}
1214
1215func GetFileAttributesEx(name *uint16, level uint32, info *byte) (err error) {
1216	r1, _, e1 := syscall.Syscall(procGetFileAttributesExW.Addr(), 3, uintptr(unsafe.Pointer(name)), uintptr(level), uintptr(unsafe.Pointer(info)))
1217	if r1 == 0 {
1218		if e1 != 0 {
1219			err = errnoErr(e1)
1220		} else {
1221			err = syscall.EINVAL
1222		}
1223	}
1224	return
1225}
1226
1227func GetCommandLine() (cmd *uint16) {
1228	r0, _, _ := syscall.Syscall(procGetCommandLineW.Addr(), 0, 0, 0, 0)
1229	cmd = (*uint16)(unsafe.Pointer(r0))
1230	return
1231}
1232
1233func CommandLineToArgv(cmd *uint16, argc *int32) (argv *[8192]*[8192]uint16, err error) {
1234	r0, _, e1 := syscall.Syscall(procCommandLineToArgvW.Addr(), 2, uintptr(unsafe.Pointer(cmd)), uintptr(unsafe.Pointer(argc)), 0)
1235	argv = (*[8192]*[8192]uint16)(unsafe.Pointer(r0))
1236	if argv == nil {
1237		if e1 != 0 {
1238			err = errnoErr(e1)
1239		} else {
1240			err = syscall.EINVAL
1241		}
1242	}
1243	return
1244}
1245
1246func LocalFree(hmem Handle) (handle Handle, err error) {
1247	r0, _, e1 := syscall.Syscall(procLocalFree.Addr(), 1, uintptr(hmem), 0, 0)
1248	handle = Handle(r0)
1249	if handle != 0 {
1250		if e1 != 0 {
1251			err = errnoErr(e1)
1252		} else {
1253			err = syscall.EINVAL
1254		}
1255	}
1256	return
1257}
1258
1259func SetHandleInformation(handle Handle, mask uint32, flags uint32) (err error) {
1260	r1, _, e1 := syscall.Syscall(procSetHandleInformation.Addr(), 3, uintptr(handle), uintptr(mask), uintptr(flags))
1261	if r1 == 0 {
1262		if e1 != 0 {
1263			err = errnoErr(e1)
1264		} else {
1265			err = syscall.EINVAL
1266		}
1267	}
1268	return
1269}
1270
1271func FlushFileBuffers(handle Handle) (err error) {
1272	r1, _, e1 := syscall.Syscall(procFlushFileBuffers.Addr(), 1, uintptr(handle), 0, 0)
1273	if r1 == 0 {
1274		if e1 != 0 {
1275			err = errnoErr(e1)
1276		} else {
1277			err = syscall.EINVAL
1278		}
1279	}
1280	return
1281}
1282
1283func GetFullPathName(path *uint16, buflen uint32, buf *uint16, fname **uint16) (n uint32, err error) {
1284	r0, _, e1 := syscall.Syscall6(procGetFullPathNameW.Addr(), 4, uintptr(unsafe.Pointer(path)), uintptr(buflen), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(fname)), 0, 0)
1285	n = uint32(r0)
1286	if n == 0 {
1287		if e1 != 0 {
1288			err = errnoErr(e1)
1289		} else {
1290			err = syscall.EINVAL
1291		}
1292	}
1293	return
1294}
1295
1296func GetLongPathName(path *uint16, buf *uint16, buflen uint32) (n uint32, err error) {
1297	r0, _, e1 := syscall.Syscall(procGetLongPathNameW.Addr(), 3, uintptr(unsafe.Pointer(path)), uintptr(unsafe.Pointer(buf)), uintptr(buflen))
1298	n = uint32(r0)
1299	if n == 0 {
1300		if e1 != 0 {
1301			err = errnoErr(e1)
1302		} else {
1303			err = syscall.EINVAL
1304		}
1305	}
1306	return
1307}
1308
1309func GetShortPathName(longpath *uint16, shortpath *uint16, buflen uint32) (n uint32, err error) {
1310	r0, _, e1 := syscall.Syscall(procGetShortPathNameW.Addr(), 3, uintptr(unsafe.Pointer(longpath)), uintptr(unsafe.Pointer(shortpath)), uintptr(buflen))
1311	n = uint32(r0)
1312	if n == 0 {
1313		if e1 != 0 {
1314			err = errnoErr(e1)
1315		} else {
1316			err = syscall.EINVAL
1317		}
1318	}
1319	return
1320}
1321
1322func CreateFileMapping(fhandle Handle, sa *SecurityAttributes, prot uint32, maxSizeHigh uint32, maxSizeLow uint32, name *uint16) (handle Handle, err error) {
1323	r0, _, e1 := syscall.Syscall6(procCreateFileMappingW.Addr(), 6, uintptr(fhandle), uintptr(unsafe.Pointer(sa)), uintptr(prot), uintptr(maxSizeHigh), uintptr(maxSizeLow), uintptr(unsafe.Pointer(name)))
1324	handle = Handle(r0)
1325	if handle == 0 {
1326		if e1 != 0 {
1327			err = errnoErr(e1)
1328		} else {
1329			err = syscall.EINVAL
1330		}
1331	}
1332	return
1333}
1334
1335func MapViewOfFile(handle Handle, access uint32, offsetHigh uint32, offsetLow uint32, length uintptr) (addr uintptr, err error) {
1336	r0, _, e1 := syscall.Syscall6(procMapViewOfFile.Addr(), 5, uintptr(handle), uintptr(access), uintptr(offsetHigh), uintptr(offsetLow), uintptr(length), 0)
1337	addr = uintptr(r0)
1338	if addr == 0 {
1339		if e1 != 0 {
1340			err = errnoErr(e1)
1341		} else {
1342			err = syscall.EINVAL
1343		}
1344	}
1345	return
1346}
1347
1348func UnmapViewOfFile(addr uintptr) (err error) {
1349	r1, _, e1 := syscall.Syscall(procUnmapViewOfFile.Addr(), 1, uintptr(addr), 0, 0)
1350	if r1 == 0 {
1351		if e1 != 0 {
1352			err = errnoErr(e1)
1353		} else {
1354			err = syscall.EINVAL
1355		}
1356	}
1357	return
1358}
1359
1360func FlushViewOfFile(addr uintptr, length uintptr) (err error) {
1361	r1, _, e1 := syscall.Syscall(procFlushViewOfFile.Addr(), 2, uintptr(addr), uintptr(length), 0)
1362	if r1 == 0 {
1363		if e1 != 0 {
1364			err = errnoErr(e1)
1365		} else {
1366			err = syscall.EINVAL
1367		}
1368	}
1369	return
1370}
1371
1372func VirtualLock(addr uintptr, length uintptr) (err error) {
1373	r1, _, e1 := syscall.Syscall(procVirtualLock.Addr(), 2, uintptr(addr), uintptr(length), 0)
1374	if r1 == 0 {
1375		if e1 != 0 {
1376			err = errnoErr(e1)
1377		} else {
1378			err = syscall.EINVAL
1379		}
1380	}
1381	return
1382}
1383
1384func VirtualUnlock(addr uintptr, length uintptr) (err error) {
1385	r1, _, e1 := syscall.Syscall(procVirtualUnlock.Addr(), 2, uintptr(addr), uintptr(length), 0)
1386	if r1 == 0 {
1387		if e1 != 0 {
1388			err = errnoErr(e1)
1389		} else {
1390			err = syscall.EINVAL
1391		}
1392	}
1393	return
1394}
1395
1396func VirtualAlloc(address uintptr, size uintptr, alloctype uint32, protect uint32) (value uintptr, err error) {
1397	r0, _, e1 := syscall.Syscall6(procVirtualAlloc.Addr(), 4, uintptr(address), uintptr(size), uintptr(alloctype), uintptr(protect), 0, 0)
1398	value = uintptr(r0)
1399	if value == 0 {
1400		if e1 != 0 {
1401			err = errnoErr(e1)
1402		} else {
1403			err = syscall.EINVAL
1404		}
1405	}
1406	return
1407}
1408
1409func VirtualFree(address uintptr, size uintptr, freetype uint32) (err error) {
1410	r1, _, e1 := syscall.Syscall(procVirtualFree.Addr(), 3, uintptr(address), uintptr(size), uintptr(freetype))
1411	if r1 == 0 {
1412		if e1 != 0 {
1413			err = errnoErr(e1)
1414		} else {
1415			err = syscall.EINVAL
1416		}
1417	}
1418	return
1419}
1420
1421func VirtualProtect(address uintptr, size uintptr, newprotect uint32, oldprotect *uint32) (err error) {
1422	r1, _, e1 := syscall.Syscall6(procVirtualProtect.Addr(), 4, uintptr(address), uintptr(size), uintptr(newprotect), uintptr(unsafe.Pointer(oldprotect)), 0, 0)
1423	if r1 == 0 {
1424		if e1 != 0 {
1425			err = errnoErr(e1)
1426		} else {
1427			err = syscall.EINVAL
1428		}
1429	}
1430	return
1431}
1432
1433func TransmitFile(s Handle, handle Handle, bytesToWrite uint32, bytsPerSend uint32, overlapped *Overlapped, transmitFileBuf *TransmitFileBuffers, flags uint32) (err error) {
1434	r1, _, e1 := syscall.Syscall9(procTransmitFile.Addr(), 7, uintptr(s), uintptr(handle), uintptr(bytesToWrite), uintptr(bytsPerSend), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(transmitFileBuf)), uintptr(flags), 0, 0)
1435	if r1 == 0 {
1436		if e1 != 0 {
1437			err = errnoErr(e1)
1438		} else {
1439			err = syscall.EINVAL
1440		}
1441	}
1442	return
1443}
1444
1445func ReadDirectoryChanges(handle Handle, buf *byte, buflen uint32, watchSubTree bool, mask uint32, retlen *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) {
1446	var _p0 uint32
1447	if watchSubTree {
1448		_p0 = 1
1449	} else {
1450		_p0 = 0
1451	}
1452	r1, _, e1 := syscall.Syscall9(procReadDirectoryChangesW.Addr(), 8, uintptr(handle), uintptr(unsafe.Pointer(buf)), uintptr(buflen), uintptr(_p0), uintptr(mask), uintptr(unsafe.Pointer(retlen)), uintptr(unsafe.Pointer(overlapped)), uintptr(completionRoutine), 0)
1453	if r1 == 0 {
1454		if e1 != 0 {
1455			err = errnoErr(e1)
1456		} else {
1457			err = syscall.EINVAL
1458		}
1459	}
1460	return
1461}
1462
1463func CertOpenSystemStore(hprov Handle, name *uint16) (store Handle, err error) {
1464	r0, _, e1 := syscall.Syscall(procCertOpenSystemStoreW.Addr(), 2, uintptr(hprov), uintptr(unsafe.Pointer(name)), 0)
1465	store = Handle(r0)
1466	if store == 0 {
1467		if e1 != 0 {
1468			err = errnoErr(e1)
1469		} else {
1470			err = syscall.EINVAL
1471		}
1472	}
1473	return
1474}
1475
1476func CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) {
1477	r0, _, e1 := syscall.Syscall6(procCertOpenStore.Addr(), 5, uintptr(storeProvider), uintptr(msgAndCertEncodingType), uintptr(cryptProv), uintptr(flags), uintptr(para), 0)
1478	handle = Handle(r0)
1479	if handle == InvalidHandle {
1480		if e1 != 0 {
1481			err = errnoErr(e1)
1482		} else {
1483			err = syscall.EINVAL
1484		}
1485	}
1486	return
1487}
1488
1489func CertEnumCertificatesInStore(store Handle, prevContext *CertContext) (context *CertContext, err error) {
1490	r0, _, e1 := syscall.Syscall(procCertEnumCertificatesInStore.Addr(), 2, uintptr(store), uintptr(unsafe.Pointer(prevContext)), 0)
1491	context = (*CertContext)(unsafe.Pointer(r0))
1492	if context == nil {
1493		if e1 != 0 {
1494			err = errnoErr(e1)
1495		} else {
1496			err = syscall.EINVAL
1497		}
1498	}
1499	return
1500}
1501
1502func CertAddCertificateContextToStore(store Handle, certContext *CertContext, addDisposition uint32, storeContext **CertContext) (err error) {
1503	r1, _, e1 := syscall.Syscall6(procCertAddCertificateContextToStore.Addr(), 4, uintptr(store), uintptr(unsafe.Pointer(certContext)), uintptr(addDisposition), uintptr(unsafe.Pointer(storeContext)), 0, 0)
1504	if r1 == 0 {
1505		if e1 != 0 {
1506			err = errnoErr(e1)
1507		} else {
1508			err = syscall.EINVAL
1509		}
1510	}
1511	return
1512}
1513
1514func CertCloseStore(store Handle, flags uint32) (err error) {
1515	r1, _, e1 := syscall.Syscall(procCertCloseStore.Addr(), 2, uintptr(store), uintptr(flags), 0)
1516	if r1 == 0 {
1517		if e1 != 0 {
1518			err = errnoErr(e1)
1519		} else {
1520			err = syscall.EINVAL
1521		}
1522	}
1523	return
1524}
1525
1526func CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, additionalStore Handle, para *CertChainPara, flags uint32, reserved uintptr, chainCtx **CertChainContext) (err error) {
1527	r1, _, e1 := syscall.Syscall9(procCertGetCertificateChain.Addr(), 8, uintptr(engine), uintptr(unsafe.Pointer(leaf)), uintptr(unsafe.Pointer(time)), uintptr(additionalStore), uintptr(unsafe.Pointer(para)), uintptr(flags), uintptr(reserved), uintptr(unsafe.Pointer(chainCtx)), 0)
1528	if r1 == 0 {
1529		if e1 != 0 {
1530			err = errnoErr(e1)
1531		} else {
1532			err = syscall.EINVAL
1533		}
1534	}
1535	return
1536}
1537
1538func CertFreeCertificateChain(ctx *CertChainContext) {
1539	syscall.Syscall(procCertFreeCertificateChain.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0)
1540	return
1541}
1542
1543func CertCreateCertificateContext(certEncodingType uint32, certEncoded *byte, encodedLen uint32) (context *CertContext, err error) {
1544	r0, _, e1 := syscall.Syscall(procCertCreateCertificateContext.Addr(), 3, uintptr(certEncodingType), uintptr(unsafe.Pointer(certEncoded)), uintptr(encodedLen))
1545	context = (*CertContext)(unsafe.Pointer(r0))
1546	if context == nil {
1547		if e1 != 0 {
1548			err = errnoErr(e1)
1549		} else {
1550			err = syscall.EINVAL
1551		}
1552	}
1553	return
1554}
1555
1556func CertFreeCertificateContext(ctx *CertContext) (err error) {
1557	r1, _, e1 := syscall.Syscall(procCertFreeCertificateContext.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0)
1558	if r1 == 0 {
1559		if e1 != 0 {
1560			err = errnoErr(e1)
1561		} else {
1562			err = syscall.EINVAL
1563		}
1564	}
1565	return
1566}
1567
1568func CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext, para *CertChainPolicyPara, status *CertChainPolicyStatus) (err error) {
1569	r1, _, e1 := syscall.Syscall6(procCertVerifyCertificateChainPolicy.Addr(), 4, uintptr(policyOID), uintptr(unsafe.Pointer(chain)), uintptr(unsafe.Pointer(para)), uintptr(unsafe.Pointer(status)), 0, 0)
1570	if r1 == 0 {
1571		if e1 != 0 {
1572			err = errnoErr(e1)
1573		} else {
1574			err = syscall.EINVAL
1575		}
1576	}
1577	return
1578}
1579
1580func RegOpenKeyEx(key Handle, subkey *uint16, options uint32, desiredAccess uint32, result *Handle) (regerrno error) {
1581	r0, _, _ := syscall.Syscall6(procRegOpenKeyExW.Addr(), 5, uintptr(key), uintptr(unsafe.Pointer(subkey)), uintptr(options), uintptr(desiredAccess), uintptr(unsafe.Pointer(result)), 0)
1582	if r0 != 0 {
1583		regerrno = syscall.Errno(r0)
1584	}
1585	return
1586}
1587
1588func RegCloseKey(key Handle) (regerrno error) {
1589	r0, _, _ := syscall.Syscall(procRegCloseKey.Addr(), 1, uintptr(key), 0, 0)
1590	if r0 != 0 {
1591		regerrno = syscall.Errno(r0)
1592	}
1593	return
1594}
1595
1596func RegQueryInfoKey(key Handle, class *uint16, classLen *uint32, reserved *uint32, subkeysLen *uint32, maxSubkeyLen *uint32, maxClassLen *uint32, valuesLen *uint32, maxValueNameLen *uint32, maxValueLen *uint32, saLen *uint32, lastWriteTime *Filetime) (regerrno error) {
1597	r0, _, _ := syscall.Syscall12(procRegQueryInfoKeyW.Addr(), 12, uintptr(key), uintptr(unsafe.Pointer(class)), uintptr(unsafe.Pointer(classLen)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(subkeysLen)), uintptr(unsafe.Pointer(maxSubkeyLen)), uintptr(unsafe.Pointer(maxClassLen)), uintptr(unsafe.Pointer(valuesLen)), uintptr(unsafe.Pointer(maxValueNameLen)), uintptr(unsafe.Pointer(maxValueLen)), uintptr(unsafe.Pointer(saLen)), uintptr(unsafe.Pointer(lastWriteTime)))
1598	if r0 != 0 {
1599		regerrno = syscall.Errno(r0)
1600	}
1601	return
1602}
1603
1604func RegEnumKeyEx(key Handle, index uint32, name *uint16, nameLen *uint32, reserved *uint32, class *uint16, classLen *uint32, lastWriteTime *Filetime) (regerrno error) {
1605	r0, _, _ := syscall.Syscall9(procRegEnumKeyExW.Addr(), 8, uintptr(key), uintptr(index), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(nameLen)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(class)), uintptr(unsafe.Pointer(classLen)), uintptr(unsafe.Pointer(lastWriteTime)), 0)
1606	if r0 != 0 {
1607		regerrno = syscall.Errno(r0)
1608	}
1609	return
1610}
1611
1612func RegQueryValueEx(key Handle, name *uint16, reserved *uint32, valtype *uint32, buf *byte, buflen *uint32) (regerrno error) {
1613	r0, _, _ := syscall.Syscall6(procRegQueryValueExW.Addr(), 6, uintptr(key), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(reserved)), uintptr(unsafe.Pointer(valtype)), uintptr(unsafe.Pointer(buf)), uintptr(unsafe.Pointer(buflen)))
1614	if r0 != 0 {
1615		regerrno = syscall.Errno(r0)
1616	}
1617	return
1618}
1619
1620func getCurrentProcessId() (pid uint32) {
1621	r0, _, _ := syscall.Syscall(procGetCurrentProcessId.Addr(), 0, 0, 0, 0)
1622	pid = uint32(r0)
1623	return
1624}
1625
1626func GetConsoleMode(console Handle, mode *uint32) (err error) {
1627	r1, _, e1 := syscall.Syscall(procGetConsoleMode.Addr(), 2, uintptr(console), uintptr(unsafe.Pointer(mode)), 0)
1628	if r1 == 0 {
1629		if e1 != 0 {
1630			err = errnoErr(e1)
1631		} else {
1632			err = syscall.EINVAL
1633		}
1634	}
1635	return
1636}
1637
1638func SetConsoleMode(console Handle, mode uint32) (err error) {
1639	r1, _, e1 := syscall.Syscall(procSetConsoleMode.Addr(), 2, uintptr(console), uintptr(mode), 0)
1640	if r1 == 0 {
1641		if e1 != 0 {
1642			err = errnoErr(e1)
1643		} else {
1644			err = syscall.EINVAL
1645		}
1646	}
1647	return
1648}
1649
1650func GetConsoleScreenBufferInfo(console Handle, info *ConsoleScreenBufferInfo) (err error) {
1651	r1, _, e1 := syscall.Syscall(procGetConsoleScreenBufferInfo.Addr(), 2, uintptr(console), uintptr(unsafe.Pointer(info)), 0)
1652	if r1 == 0 {
1653		if e1 != 0 {
1654			err = errnoErr(e1)
1655		} else {
1656			err = syscall.EINVAL
1657		}
1658	}
1659	return
1660}
1661
1662func WriteConsole(console Handle, buf *uint16, towrite uint32, written *uint32, reserved *byte) (err error) {
1663	r1, _, e1 := syscall.Syscall6(procWriteConsoleW.Addr(), 5, uintptr(console), uintptr(unsafe.Pointer(buf)), uintptr(towrite), uintptr(unsafe.Pointer(written)), uintptr(unsafe.Pointer(reserved)), 0)
1664	if r1 == 0 {
1665		if e1 != 0 {
1666			err = errnoErr(e1)
1667		} else {
1668			err = syscall.EINVAL
1669		}
1670	}
1671	return
1672}
1673
1674func ReadConsole(console Handle, buf *uint16, toread uint32, read *uint32, inputControl *byte) (err error) {
1675	r1, _, e1 := syscall.Syscall6(procReadConsoleW.Addr(), 5, uintptr(console), uintptr(unsafe.Pointer(buf)), uintptr(toread), uintptr(unsafe.Pointer(read)), uintptr(unsafe.Pointer(inputControl)), 0)
1676	if r1 == 0 {
1677		if e1 != 0 {
1678			err = errnoErr(e1)
1679		} else {
1680			err = syscall.EINVAL
1681		}
1682	}
1683	return
1684}
1685
1686func CreateToolhelp32Snapshot(flags uint32, processId uint32) (handle Handle, err error) {
1687	r0, _, e1 := syscall.Syscall(procCreateToolhelp32Snapshot.Addr(), 2, uintptr(flags), uintptr(processId), 0)
1688	handle = Handle(r0)
1689	if handle == InvalidHandle {
1690		if e1 != 0 {
1691			err = errnoErr(e1)
1692		} else {
1693			err = syscall.EINVAL
1694		}
1695	}
1696	return
1697}
1698
1699func Process32First(snapshot Handle, procEntry *ProcessEntry32) (err error) {
1700	r1, _, e1 := syscall.Syscall(procProcess32FirstW.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(procEntry)), 0)
1701	if r1 == 0 {
1702		if e1 != 0 {
1703			err = errnoErr(e1)
1704		} else {
1705			err = syscall.EINVAL
1706		}
1707	}
1708	return
1709}
1710
1711func Process32Next(snapshot Handle, procEntry *ProcessEntry32) (err error) {
1712	r1, _, e1 := syscall.Syscall(procProcess32NextW.Addr(), 2, uintptr(snapshot), uintptr(unsafe.Pointer(procEntry)), 0)
1713	if r1 == 0 {
1714		if e1 != 0 {
1715			err = errnoErr(e1)
1716		} else {
1717			err = syscall.EINVAL
1718		}
1719	}
1720	return
1721}
1722
1723func DeviceIoControl(handle Handle, ioControlCode uint32, inBuffer *byte, inBufferSize uint32, outBuffer *byte, outBufferSize uint32, bytesReturned *uint32, overlapped *Overlapped) (err error) {
1724	r1, _, e1 := syscall.Syscall9(procDeviceIoControl.Addr(), 8, uintptr(handle), uintptr(ioControlCode), uintptr(unsafe.Pointer(inBuffer)), uintptr(inBufferSize), uintptr(unsafe.Pointer(outBuffer)), uintptr(outBufferSize), uintptr(unsafe.Pointer(bytesReturned)), uintptr(unsafe.Pointer(overlapped)), 0)
1725	if r1 == 0 {
1726		if e1 != 0 {
1727			err = errnoErr(e1)
1728		} else {
1729			err = syscall.EINVAL
1730		}
1731	}
1732	return
1733}
1734
1735func CreateSymbolicLink(symlinkfilename *uint16, targetfilename *uint16, flags uint32) (err error) {
1736	r1, _, e1 := syscall.Syscall(procCreateSymbolicLinkW.Addr(), 3, uintptr(unsafe.Pointer(symlinkfilename)), uintptr(unsafe.Pointer(targetfilename)), uintptr(flags))
1737	if r1&0xff == 0 {
1738		if e1 != 0 {
1739			err = errnoErr(e1)
1740		} else {
1741			err = syscall.EINVAL
1742		}
1743	}
1744	return
1745}
1746
1747func CreateHardLink(filename *uint16, existingfilename *uint16, reserved uintptr) (err error) {
1748	r1, _, e1 := syscall.Syscall(procCreateHardLinkW.Addr(), 3, uintptr(unsafe.Pointer(filename)), uintptr(unsafe.Pointer(existingfilename)), uintptr(reserved))
1749	if r1&0xff == 0 {
1750		if e1 != 0 {
1751			err = errnoErr(e1)
1752		} else {
1753			err = syscall.EINVAL
1754		}
1755	}
1756	return
1757}
1758
1759func GetCurrentThreadId() (id uint32) {
1760	r0, _, _ := syscall.Syscall(procGetCurrentThreadId.Addr(), 0, 0, 0, 0)
1761	id = uint32(r0)
1762	return
1763}
1764
1765func CreateEvent(eventAttrs *SecurityAttributes, manualReset uint32, initialState uint32, name *uint16) (handle Handle, err error) {
1766	r0, _, e1 := syscall.Syscall6(procCreateEventW.Addr(), 4, uintptr(unsafe.Pointer(eventAttrs)), uintptr(manualReset), uintptr(initialState), uintptr(unsafe.Pointer(name)), 0, 0)
1767	handle = Handle(r0)
1768	if handle == 0 {
1769		if e1 != 0 {
1770			err = errnoErr(e1)
1771		} else {
1772			err = syscall.EINVAL
1773		}
1774	}
1775	return
1776}
1777
1778func CreateEventEx(eventAttrs *SecurityAttributes, name *uint16, flags uint32, desiredAccess uint32) (handle Handle, err error) {
1779	r0, _, e1 := syscall.Syscall6(procCreateEventExW.Addr(), 4, uintptr(unsafe.Pointer(eventAttrs)), uintptr(unsafe.Pointer(name)), uintptr(flags), uintptr(desiredAccess), 0, 0)
1780	handle = Handle(r0)
1781	if handle == 0 {
1782		if e1 != 0 {
1783			err = errnoErr(e1)
1784		} else {
1785			err = syscall.EINVAL
1786		}
1787	}
1788	return
1789}
1790
1791func OpenEvent(desiredAccess uint32, inheritHandle bool, name *uint16) (handle Handle, err error) {
1792	var _p0 uint32
1793	if inheritHandle {
1794		_p0 = 1
1795	} else {
1796		_p0 = 0
1797	}
1798	r0, _, e1 := syscall.Syscall(procOpenEventW.Addr(), 3, uintptr(desiredAccess), uintptr(_p0), uintptr(unsafe.Pointer(name)))
1799	handle = Handle(r0)
1800	if handle == 0 {
1801		if e1 != 0 {
1802			err = errnoErr(e1)
1803		} else {
1804			err = syscall.EINVAL
1805		}
1806	}
1807	return
1808}
1809
1810func SetEvent(event Handle) (err error) {
1811	r1, _, e1 := syscall.Syscall(procSetEvent.Addr(), 1, uintptr(event), 0, 0)
1812	if r1 == 0 {
1813		if e1 != 0 {
1814			err = errnoErr(e1)
1815		} else {
1816			err = syscall.EINVAL
1817		}
1818	}
1819	return
1820}
1821
1822func ResetEvent(event Handle) (err error) {
1823	r1, _, e1 := syscall.Syscall(procResetEvent.Addr(), 1, uintptr(event), 0, 0)
1824	if r1 == 0 {
1825		if e1 != 0 {
1826			err = errnoErr(e1)
1827		} else {
1828			err = syscall.EINVAL
1829		}
1830	}
1831	return
1832}
1833
1834func PulseEvent(event Handle) (err error) {
1835	r1, _, e1 := syscall.Syscall(procPulseEvent.Addr(), 1, uintptr(event), 0, 0)
1836	if r1 == 0 {
1837		if e1 != 0 {
1838			err = errnoErr(e1)
1839		} else {
1840			err = syscall.EINVAL
1841		}
1842	}
1843	return
1844}
1845
1846func WSAStartup(verreq uint32, data *WSAData) (sockerr error) {
1847	r0, _, _ := syscall.Syscall(procWSAStartup.Addr(), 2, uintptr(verreq), uintptr(unsafe.Pointer(data)), 0)
1848	if r0 != 0 {
1849		sockerr = syscall.Errno(r0)
1850	}
1851	return
1852}
1853
1854func WSACleanup() (err error) {
1855	r1, _, e1 := syscall.Syscall(procWSACleanup.Addr(), 0, 0, 0, 0)
1856	if r1 == socket_error {
1857		if e1 != 0 {
1858			err = errnoErr(e1)
1859		} else {
1860			err = syscall.EINVAL
1861		}
1862	}
1863	return
1864}
1865
1866func WSAIoctl(s Handle, iocc uint32, inbuf *byte, cbif uint32, outbuf *byte, cbob uint32, cbbr *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) {
1867	r1, _, e1 := syscall.Syscall9(procWSAIoctl.Addr(), 9, uintptr(s), uintptr(iocc), uintptr(unsafe.Pointer(inbuf)), uintptr(cbif), uintptr(unsafe.Pointer(outbuf)), uintptr(cbob), uintptr(unsafe.Pointer(cbbr)), uintptr(unsafe.Pointer(overlapped)), uintptr(completionRoutine))
1868	if r1 == socket_error {
1869		if e1 != 0 {
1870			err = errnoErr(e1)
1871		} else {
1872			err = syscall.EINVAL
1873		}
1874	}
1875	return
1876}
1877
1878func socket(af int32, typ int32, protocol int32) (handle Handle, err error) {
1879	r0, _, e1 := syscall.Syscall(procsocket.Addr(), 3, uintptr(af), uintptr(typ), uintptr(protocol))
1880	handle = Handle(r0)
1881	if handle == InvalidHandle {
1882		if e1 != 0 {
1883			err = errnoErr(e1)
1884		} else {
1885			err = syscall.EINVAL
1886		}
1887	}
1888	return
1889}
1890
1891func Setsockopt(s Handle, level int32, optname int32, optval *byte, optlen int32) (err error) {
1892	r1, _, e1 := syscall.Syscall6(procsetsockopt.Addr(), 5, uintptr(s), uintptr(level), uintptr(optname), uintptr(unsafe.Pointer(optval)), uintptr(optlen), 0)
1893	if r1 == socket_error {
1894		if e1 != 0 {
1895			err = errnoErr(e1)
1896		} else {
1897			err = syscall.EINVAL
1898		}
1899	}
1900	return
1901}
1902
1903func Getsockopt(s Handle, level int32, optname int32, optval *byte, optlen *int32) (err error) {
1904	r1, _, e1 := syscall.Syscall6(procgetsockopt.Addr(), 5, uintptr(s), uintptr(level), uintptr(optname), uintptr(unsafe.Pointer(optval)), uintptr(unsafe.Pointer(optlen)), 0)
1905	if r1 == socket_error {
1906		if e1 != 0 {
1907			err = errnoErr(e1)
1908		} else {
1909			err = syscall.EINVAL
1910		}
1911	}
1912	return
1913}
1914
1915func bind(s Handle, name unsafe.Pointer, namelen int32) (err error) {
1916	r1, _, e1 := syscall.Syscall(procbind.Addr(), 3, uintptr(s), uintptr(name), uintptr(namelen))
1917	if r1 == socket_error {
1918		if e1 != 0 {
1919			err = errnoErr(e1)
1920		} else {
1921			err = syscall.EINVAL
1922		}
1923	}
1924	return
1925}
1926
1927func connect(s Handle, name unsafe.Pointer, namelen int32) (err error) {
1928	r1, _, e1 := syscall.Syscall(procconnect.Addr(), 3, uintptr(s), uintptr(name), uintptr(namelen))
1929	if r1 == socket_error {
1930		if e1 != 0 {
1931			err = errnoErr(e1)
1932		} else {
1933			err = syscall.EINVAL
1934		}
1935	}
1936	return
1937}
1938
1939func getsockname(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) {
1940	r1, _, e1 := syscall.Syscall(procgetsockname.Addr(), 3, uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen)))
1941	if r1 == socket_error {
1942		if e1 != 0 {
1943			err = errnoErr(e1)
1944		} else {
1945			err = syscall.EINVAL
1946		}
1947	}
1948	return
1949}
1950
1951func getpeername(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) {
1952	r1, _, e1 := syscall.Syscall(procgetpeername.Addr(), 3, uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen)))
1953	if r1 == socket_error {
1954		if e1 != 0 {
1955			err = errnoErr(e1)
1956		} else {
1957			err = syscall.EINVAL
1958		}
1959	}
1960	return
1961}
1962
1963func listen(s Handle, backlog int32) (err error) {
1964	r1, _, e1 := syscall.Syscall(proclisten.Addr(), 2, uintptr(s), uintptr(backlog), 0)
1965	if r1 == socket_error {
1966		if e1 != 0 {
1967			err = errnoErr(e1)
1968		} else {
1969			err = syscall.EINVAL
1970		}
1971	}
1972	return
1973}
1974
1975func shutdown(s Handle, how int32) (err error) {
1976	r1, _, e1 := syscall.Syscall(procshutdown.Addr(), 2, uintptr(s), uintptr(how), 0)
1977	if r1 == socket_error {
1978		if e1 != 0 {
1979			err = errnoErr(e1)
1980		} else {
1981			err = syscall.EINVAL
1982		}
1983	}
1984	return
1985}
1986
1987func Closesocket(s Handle) (err error) {
1988	r1, _, e1 := syscall.Syscall(procclosesocket.Addr(), 1, uintptr(s), 0, 0)
1989	if r1 == socket_error {
1990		if e1 != 0 {
1991			err = errnoErr(e1)
1992		} else {
1993			err = syscall.EINVAL
1994		}
1995	}
1996	return
1997}
1998
1999func AcceptEx(ls Handle, as Handle, buf *byte, rxdatalen uint32, laddrlen uint32, raddrlen uint32, recvd *uint32, overlapped *Overlapped) (err error) {
2000	r1, _, e1 := syscall.Syscall9(procAcceptEx.Addr(), 8, uintptr(ls), uintptr(as), uintptr(unsafe.Pointer(buf)), uintptr(rxdatalen), uintptr(laddrlen), uintptr(raddrlen), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(overlapped)), 0)
2001	if r1 == 0 {
2002		if e1 != 0 {
2003			err = errnoErr(e1)
2004		} else {
2005			err = syscall.EINVAL
2006		}
2007	}
2008	return
2009}
2010
2011func GetAcceptExSockaddrs(buf *byte, rxdatalen uint32, laddrlen uint32, raddrlen uint32, lrsa **RawSockaddrAny, lrsalen *int32, rrsa **RawSockaddrAny, rrsalen *int32) {
2012	syscall.Syscall9(procGetAcceptExSockaddrs.Addr(), 8, uintptr(unsafe.Pointer(buf)), uintptr(rxdatalen), uintptr(laddrlen), uintptr(raddrlen), uintptr(unsafe.Pointer(lrsa)), uintptr(unsafe.Pointer(lrsalen)), uintptr(unsafe.Pointer(rrsa)), uintptr(unsafe.Pointer(rrsalen)), 0)
2013	return
2014}
2015
2016func WSARecv(s Handle, bufs *WSABuf, bufcnt uint32, recvd *uint32, flags *uint32, overlapped *Overlapped, croutine *byte) (err error) {
2017	r1, _, e1 := syscall.Syscall9(procWSARecv.Addr(), 7, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(flags)), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)), 0, 0)
2018	if r1 == socket_error {
2019		if e1 != 0 {
2020			err = errnoErr(e1)
2021		} else {
2022			err = syscall.EINVAL
2023		}
2024	}
2025	return
2026}
2027
2028func WSASend(s Handle, bufs *WSABuf, bufcnt uint32, sent *uint32, flags uint32, overlapped *Overlapped, croutine *byte) (err error) {
2029	r1, _, e1 := syscall.Syscall9(procWSASend.Addr(), 7, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(sent)), uintptr(flags), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)), 0, 0)
2030	if r1 == socket_error {
2031		if e1 != 0 {
2032			err = errnoErr(e1)
2033		} else {
2034			err = syscall.EINVAL
2035		}
2036	}
2037	return
2038}
2039
2040func WSARecvFrom(s Handle, bufs *WSABuf, bufcnt uint32, recvd *uint32, flags *uint32, from *RawSockaddrAny, fromlen *int32, overlapped *Overlapped, croutine *byte) (err error) {
2041	r1, _, e1 := syscall.Syscall9(procWSARecvFrom.Addr(), 9, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(recvd)), uintptr(unsafe.Pointer(flags)), uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(fromlen)), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)))
2042	if r1 == socket_error {
2043		if e1 != 0 {
2044			err = errnoErr(e1)
2045		} else {
2046			err = syscall.EINVAL
2047		}
2048	}
2049	return
2050}
2051
2052func WSASendTo(s Handle, bufs *WSABuf, bufcnt uint32, sent *uint32, flags uint32, to *RawSockaddrAny, tolen int32, overlapped *Overlapped, croutine *byte) (err error) {
2053	r1, _, e1 := syscall.Syscall9(procWSASendTo.Addr(), 9, uintptr(s), uintptr(unsafe.Pointer(bufs)), uintptr(bufcnt), uintptr(unsafe.Pointer(sent)), uintptr(flags), uintptr(unsafe.Pointer(to)), uintptr(tolen), uintptr(unsafe.Pointer(overlapped)), uintptr(unsafe.Pointer(croutine)))
2054	if r1 == socket_error {
2055		if e1 != 0 {
2056			err = errnoErr(e1)
2057		} else {
2058			err = syscall.EINVAL
2059		}
2060	}
2061	return
2062}
2063
2064func GetHostByName(name string) (h *Hostent, err error) {
2065	var _p0 *byte
2066	_p0, err = syscall.BytePtrFromString(name)
2067	if err != nil {
2068		return
2069	}
2070	return _GetHostByName(_p0)
2071}
2072
2073func _GetHostByName(name *byte) (h *Hostent, err error) {
2074	r0, _, e1 := syscall.Syscall(procgethostbyname.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0)
2075	h = (*Hostent)(unsafe.Pointer(r0))
2076	if h == nil {
2077		if e1 != 0 {
2078			err = errnoErr(e1)
2079		} else {
2080			err = syscall.EINVAL
2081		}
2082	}
2083	return
2084}
2085
2086func GetServByName(name string, proto string) (s *Servent, err error) {
2087	var _p0 *byte
2088	_p0, err = syscall.BytePtrFromString(name)
2089	if err != nil {
2090		return
2091	}
2092	var _p1 *byte
2093	_p1, err = syscall.BytePtrFromString(proto)
2094	if err != nil {
2095		return
2096	}
2097	return _GetServByName(_p0, _p1)
2098}
2099
2100func _GetServByName(name *byte, proto *byte) (s *Servent, err error) {
2101	r0, _, e1 := syscall.Syscall(procgetservbyname.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(proto)), 0)
2102	s = (*Servent)(unsafe.Pointer(r0))
2103	if s == nil {
2104		if e1 != 0 {
2105			err = errnoErr(e1)
2106		} else {
2107			err = syscall.EINVAL
2108		}
2109	}
2110	return
2111}
2112
2113func Ntohs(netshort uint16) (u uint16) {
2114	r0, _, _ := syscall.Syscall(procntohs.Addr(), 1, uintptr(netshort), 0, 0)
2115	u = uint16(r0)
2116	return
2117}
2118
2119func GetProtoByName(name string) (p *Protoent, err error) {
2120	var _p0 *byte
2121	_p0, err = syscall.BytePtrFromString(name)
2122	if err != nil {
2123		return
2124	}
2125	return _GetProtoByName(_p0)
2126}
2127
2128func _GetProtoByName(name *byte) (p *Protoent, err error) {
2129	r0, _, e1 := syscall.Syscall(procgetprotobyname.Addr(), 1, uintptr(unsafe.Pointer(name)), 0, 0)
2130	p = (*Protoent)(unsafe.Pointer(r0))
2131	if p == nil {
2132		if e1 != 0 {
2133			err = errnoErr(e1)
2134		} else {
2135			err = syscall.EINVAL
2136		}
2137	}
2138	return
2139}
2140
2141func DnsQuery(name string, qtype uint16, options uint32, extra *byte, qrs **DNSRecord, pr *byte) (status error) {
2142	var _p0 *uint16
2143	_p0, status = syscall.UTF16PtrFromString(name)
2144	if status != nil {
2145		return
2146	}
2147	return _DnsQuery(_p0, qtype, options, extra, qrs, pr)
2148}
2149
2150func _DnsQuery(name *uint16, qtype uint16, options uint32, extra *byte, qrs **DNSRecord, pr *byte) (status error) {
2151	r0, _, _ := syscall.Syscall6(procDnsQuery_W.Addr(), 6, uintptr(unsafe.Pointer(name)), uintptr(qtype), uintptr(options), uintptr(unsafe.Pointer(extra)), uintptr(unsafe.Pointer(qrs)), uintptr(unsafe.Pointer(pr)))
2152	if r0 != 0 {
2153		status = syscall.Errno(r0)
2154	}
2155	return
2156}
2157
2158func DnsRecordListFree(rl *DNSRecord, freetype uint32) {
2159	syscall.Syscall(procDnsRecordListFree.Addr(), 2, uintptr(unsafe.Pointer(rl)), uintptr(freetype), 0)
2160	return
2161}
2162
2163func DnsNameCompare(name1 *uint16, name2 *uint16) (same bool) {
2164	r0, _, _ := syscall.Syscall(procDnsNameCompare_W.Addr(), 2, uintptr(unsafe.Pointer(name1)), uintptr(unsafe.Pointer(name2)), 0)
2165	same = r0 != 0
2166	return
2167}
2168
2169func GetAddrInfoW(nodename *uint16, servicename *uint16, hints *AddrinfoW, result **AddrinfoW) (sockerr error) {
2170	r0, _, _ := syscall.Syscall6(procGetAddrInfoW.Addr(), 4, uintptr(unsafe.Pointer(nodename)), uintptr(unsafe.Pointer(servicename)), uintptr(unsafe.Pointer(hints)), uintptr(unsafe.Pointer(result)), 0, 0)
2171	if r0 != 0 {
2172		sockerr = syscall.Errno(r0)
2173	}
2174	return
2175}
2176
2177func FreeAddrInfoW(addrinfo *AddrinfoW) {
2178	syscall.Syscall(procFreeAddrInfoW.Addr(), 1, uintptr(unsafe.Pointer(addrinfo)), 0, 0)
2179	return
2180}
2181
2182func GetIfEntry(pIfRow *MibIfRow) (errcode error) {
2183	r0, _, _ := syscall.Syscall(procGetIfEntry.Addr(), 1, uintptr(unsafe.Pointer(pIfRow)), 0, 0)
2184	if r0 != 0 {
2185		errcode = syscall.Errno(r0)
2186	}
2187	return
2188}
2189
2190func GetAdaptersInfo(ai *IpAdapterInfo, ol *uint32) (errcode error) {
2191	r0, _, _ := syscall.Syscall(procGetAdaptersInfo.Addr(), 2, uintptr(unsafe.Pointer(ai)), uintptr(unsafe.Pointer(ol)), 0)
2192	if r0 != 0 {
2193		errcode = syscall.Errno(r0)
2194	}
2195	return
2196}
2197
2198func SetFileCompletionNotificationModes(handle Handle, flags uint8) (err error) {
2199	r1, _, e1 := syscall.Syscall(procSetFileCompletionNotificationModes.Addr(), 2, uintptr(handle), uintptr(flags), 0)
2200	if r1 == 0 {
2201		if e1 != 0 {
2202			err = errnoErr(e1)
2203		} else {
2204			err = syscall.EINVAL
2205		}
2206	}
2207	return
2208}
2209
2210func WSAEnumProtocols(protocols *int32, protocolBuffer *WSAProtocolInfo, bufferLength *uint32) (n int32, err error) {
2211	r0, _, e1 := syscall.Syscall(procWSAEnumProtocolsW.Addr(), 3, uintptr(unsafe.Pointer(protocols)), uintptr(unsafe.Pointer(protocolBuffer)), uintptr(unsafe.Pointer(bufferLength)))
2212	n = int32(r0)
2213	if n == -1 {
2214		if e1 != 0 {
2215			err = errnoErr(e1)
2216		} else {
2217			err = syscall.EINVAL
2218		}
2219	}
2220	return
2221}
2222
2223func GetAdaptersAddresses(family uint32, flags uint32, reserved uintptr, adapterAddresses *IpAdapterAddresses, sizePointer *uint32) (errcode error) {
2224	r0, _, _ := syscall.Syscall6(procGetAdaptersAddresses.Addr(), 5, uintptr(family), uintptr(flags), uintptr(reserved), uintptr(unsafe.Pointer(adapterAddresses)), uintptr(unsafe.Pointer(sizePointer)), 0)
2225	if r0 != 0 {
2226		errcode = syscall.Errno(r0)
2227	}
2228	return
2229}
2230
2231func GetACP() (acp uint32) {
2232	r0, _, _ := syscall.Syscall(procGetACP.Addr(), 0, 0, 0, 0)
2233	acp = uint32(r0)
2234	return
2235}
2236
2237func MultiByteToWideChar(codePage uint32, dwFlags uint32, str *byte, nstr int32, wchar *uint16, nwchar int32) (nwrite int32, err error) {
2238	r0, _, e1 := syscall.Syscall6(procMultiByteToWideChar.Addr(), 6, uintptr(codePage), uintptr(dwFlags), uintptr(unsafe.Pointer(str)), uintptr(nstr), uintptr(unsafe.Pointer(wchar)), uintptr(nwchar))
2239	nwrite = int32(r0)
2240	if nwrite == 0 {
2241		if e1 != 0 {
2242			err = errnoErr(e1)
2243		} else {
2244			err = syscall.EINVAL
2245		}
2246	}
2247	return
2248}
2249
2250func TranslateName(accName *uint16, accNameFormat uint32, desiredNameFormat uint32, translatedName *uint16, nSize *uint32) (err error) {
2251	r1, _, e1 := syscall.Syscall6(procTranslateNameW.Addr(), 5, uintptr(unsafe.Pointer(accName)), uintptr(accNameFormat), uintptr(desiredNameFormat), uintptr(unsafe.Pointer(translatedName)), uintptr(unsafe.Pointer(nSize)), 0)
2252	if r1&0xff == 0 {
2253		if e1 != 0 {
2254			err = errnoErr(e1)
2255		} else {
2256			err = syscall.EINVAL
2257		}
2258	}
2259	return
2260}
2261
2262func GetUserNameEx(nameFormat uint32, nameBuffre *uint16, nSize *uint32) (err error) {
2263	r1, _, e1 := syscall.Syscall(procGetUserNameExW.Addr(), 3, uintptr(nameFormat), uintptr(unsafe.Pointer(nameBuffre)), uintptr(unsafe.Pointer(nSize)))
2264	if r1&0xff == 0 {
2265		if e1 != 0 {
2266			err = errnoErr(e1)
2267		} else {
2268			err = syscall.EINVAL
2269		}
2270	}
2271	return
2272}
2273
2274func NetUserGetInfo(serverName *uint16, userName *uint16, level uint32, buf **byte) (neterr error) {
2275	r0, _, _ := syscall.Syscall6(procNetUserGetInfo.Addr(), 4, uintptr(unsafe.Pointer(serverName)), uintptr(unsafe.Pointer(userName)), uintptr(level), uintptr(unsafe.Pointer(buf)), 0, 0)
2276	if r0 != 0 {
2277		neterr = syscall.Errno(r0)
2278	}
2279	return
2280}
2281
2282func NetGetJoinInformation(server *uint16, name **uint16, bufType *uint32) (neterr error) {
2283	r0, _, _ := syscall.Syscall(procNetGetJoinInformation.Addr(), 3, uintptr(unsafe.Pointer(server)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(bufType)))
2284	if r0 != 0 {
2285		neterr = syscall.Errno(r0)
2286	}
2287	return
2288}
2289
2290func NetApiBufferFree(buf *byte) (neterr error) {
2291	r0, _, _ := syscall.Syscall(procNetApiBufferFree.Addr(), 1, uintptr(unsafe.Pointer(buf)), 0, 0)
2292	if r0 != 0 {
2293		neterr = syscall.Errno(r0)
2294	}
2295	return
2296}
2297
2298func LookupAccountSid(systemName *uint16, sid *SID, name *uint16, nameLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) {
2299	r1, _, e1 := syscall.Syscall9(procLookupAccountSidW.Addr(), 7, uintptr(unsafe.Pointer(systemName)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(nameLen)), uintptr(unsafe.Pointer(refdDomainName)), uintptr(unsafe.Pointer(refdDomainNameLen)), uintptr(unsafe.Pointer(use)), 0, 0)
2300	if r1 == 0 {
2301		if e1 != 0 {
2302			err = errnoErr(e1)
2303		} else {
2304			err = syscall.EINVAL
2305		}
2306	}
2307	return
2308}
2309
2310func LookupAccountName(systemName *uint16, accountName *uint16, sid *SID, sidLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) {
2311	r1, _, e1 := syscall.Syscall9(procLookupAccountNameW.Addr(), 7, uintptr(unsafe.Pointer(systemName)), uintptr(unsafe.Pointer(accountName)), uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(sidLen)), uintptr(unsafe.Pointer(refdDomainName)), uintptr(unsafe.Pointer(refdDomainNameLen)), uintptr(unsafe.Pointer(use)), 0, 0)
2312	if r1 == 0 {
2313		if e1 != 0 {
2314			err = errnoErr(e1)
2315		} else {
2316			err = syscall.EINVAL
2317		}
2318	}
2319	return
2320}
2321
2322func ConvertSidToStringSid(sid *SID, stringSid **uint16) (err error) {
2323	r1, _, e1 := syscall.Syscall(procConvertSidToStringSidW.Addr(), 2, uintptr(unsafe.Pointer(sid)), uintptr(unsafe.Pointer(stringSid)), 0)
2324	if r1 == 0 {
2325		if e1 != 0 {
2326			err = errnoErr(e1)
2327		} else {
2328			err = syscall.EINVAL
2329		}
2330	}
2331	return
2332}
2333
2334func ConvertStringSidToSid(stringSid *uint16, sid **SID) (err error) {
2335	r1, _, e1 := syscall.Syscall(procConvertStringSidToSidW.Addr(), 2, uintptr(unsafe.Pointer(stringSid)), uintptr(unsafe.Pointer(sid)), 0)
2336	if r1 == 0 {
2337		if e1 != 0 {
2338			err = errnoErr(e1)
2339		} else {
2340			err = syscall.EINVAL
2341		}
2342	}
2343	return
2344}
2345
2346func GetLengthSid(sid *SID) (len uint32) {
2347	r0, _, _ := syscall.Syscall(procGetLengthSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0)
2348	len = uint32(r0)
2349	return
2350}
2351
2352func CopySid(destSidLen uint32, destSid *SID, srcSid *SID) (err error) {
2353	r1, _, e1 := syscall.Syscall(procCopySid.Addr(), 3, uintptr(destSidLen), uintptr(unsafe.Pointer(destSid)), uintptr(unsafe.Pointer(srcSid)))
2354	if r1 == 0 {
2355		if e1 != 0 {
2356			err = errnoErr(e1)
2357		} else {
2358			err = syscall.EINVAL
2359		}
2360	}
2361	return
2362}
2363
2364func AllocateAndInitializeSid(identAuth *SidIdentifierAuthority, subAuth byte, subAuth0 uint32, subAuth1 uint32, subAuth2 uint32, subAuth3 uint32, subAuth4 uint32, subAuth5 uint32, subAuth6 uint32, subAuth7 uint32, sid **SID) (err error) {
2365	r1, _, e1 := syscall.Syscall12(procAllocateAndInitializeSid.Addr(), 11, uintptr(unsafe.Pointer(identAuth)), uintptr(subAuth), uintptr(subAuth0), uintptr(subAuth1), uintptr(subAuth2), uintptr(subAuth3), uintptr(subAuth4), uintptr(subAuth5), uintptr(subAuth6), uintptr(subAuth7), uintptr(unsafe.Pointer(sid)), 0)
2366	if r1 == 0 {
2367		if e1 != 0 {
2368			err = errnoErr(e1)
2369		} else {
2370			err = syscall.EINVAL
2371		}
2372	}
2373	return
2374}
2375
2376func FreeSid(sid *SID) (err error) {
2377	r1, _, e1 := syscall.Syscall(procFreeSid.Addr(), 1, uintptr(unsafe.Pointer(sid)), 0, 0)
2378	if r1 != 0 {
2379		if e1 != 0 {
2380			err = errnoErr(e1)
2381		} else {
2382			err = syscall.EINVAL
2383		}
2384	}
2385	return
2386}
2387
2388func EqualSid(sid1 *SID, sid2 *SID) (isEqual bool) {
2389	r0, _, _ := syscall.Syscall(procEqualSid.Addr(), 2, uintptr(unsafe.Pointer(sid1)), uintptr(unsafe.Pointer(sid2)), 0)
2390	isEqual = r0 != 0
2391	return
2392}
2393
2394func OpenProcessToken(h Handle, access uint32, token *Token) (err error) {
2395	r1, _, e1 := syscall.Syscall(procOpenProcessToken.Addr(), 3, uintptr(h), uintptr(access), uintptr(unsafe.Pointer(token)))
2396	if r1 == 0 {
2397		if e1 != 0 {
2398			err = errnoErr(e1)
2399		} else {
2400			err = syscall.EINVAL
2401		}
2402	}
2403	return
2404}
2405
2406func GetTokenInformation(t Token, infoClass uint32, info *byte, infoLen uint32, returnedLen *uint32) (err error) {
2407	r1, _, e1 := syscall.Syscall6(procGetTokenInformation.Addr(), 5, uintptr(t), uintptr(infoClass), uintptr(unsafe.Pointer(info)), uintptr(infoLen), uintptr(unsafe.Pointer(returnedLen)), 0)
2408	if r1 == 0 {
2409		if e1 != 0 {
2410			err = errnoErr(e1)
2411		} else {
2412			err = syscall.EINVAL
2413		}
2414	}
2415	return
2416}
2417
2418func GetUserProfileDirectory(t Token, dir *uint16, dirLen *uint32) (err error) {
2419	r1, _, e1 := syscall.Syscall(procGetUserProfileDirectoryW.Addr(), 3, uintptr(t), uintptr(unsafe.Pointer(dir)), uintptr(unsafe.Pointer(dirLen)))
2420	if r1 == 0 {
2421		if e1 != 0 {
2422			err = errnoErr(e1)
2423		} else {
2424			err = syscall.EINVAL
2425		}
2426	}
2427	return
2428}
2429