mirror of
				https://gitea.com/Lydanne/buildx.git
				synced 2025-11-04 10:03:42 +08:00 
			
		
		
		
	vendor: update buildkit to 8effd45b
Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com>
This commit is contained in:
		
							
								
								
									
										29
									
								
								vendor/golang.org/x/sys/windows/syscall_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										29
									
								
								vendor/golang.org/x/sys/windows/syscall_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -22,6 +22,7 @@ type HWND uintptr
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	InvalidHandle = ^Handle(0)
 | 
			
		||||
	InvalidHWND   = ^HWND(0)
 | 
			
		||||
 | 
			
		||||
	// Flags for DefineDosDevice.
 | 
			
		||||
	DDD_EXACT_MATCH_ON_REMOVE = 0x00000004
 | 
			
		||||
@@ -215,7 +216,7 @@ func NewCallbackCDecl(fn interface{}) uintptr {
 | 
			
		||||
//sys	CreateProcess(appName *uint16, commandLine *uint16, procSecurity *SecurityAttributes, threadSecurity *SecurityAttributes, inheritHandles bool, creationFlags uint32, env *uint16, currentDir *uint16, startupInfo *StartupInfo, outProcInfo *ProcessInformation) (err error) = CreateProcessW
 | 
			
		||||
//sys	OpenProcess(desiredAccess uint32, inheritHandle bool, processId uint32) (handle Handle, err error)
 | 
			
		||||
//sys	ShellExecute(hwnd Handle, verb *uint16, file *uint16, args *uint16, cwd *uint16, showCmd int32) (err error) [failretval<=32] = shell32.ShellExecuteW
 | 
			
		||||
//sys	GetWindowThreadProcessId(hwnd HWND, pid *uint32) (tid uint32) = user32.GetWindowThreadProcessId
 | 
			
		||||
//sys	GetWindowThreadProcessId(hwnd HWND, pid *uint32) (tid uint32, err error) = user32.GetWindowThreadProcessId
 | 
			
		||||
//sys	GetShellWindow() (shellWindow HWND) = user32.GetShellWindow
 | 
			
		||||
//sys	MessageBox(hwnd HWND, text *uint16, caption *uint16, boxtype uint32) (ret int32, err error) [failretval==0] = user32.MessageBoxW
 | 
			
		||||
//sys	ExitWindowsEx(flags uint32, reason uint32) (err error) = user32.ExitWindowsEx
 | 
			
		||||
@@ -264,19 +265,29 @@ func NewCallbackCDecl(fn interface{}) uintptr {
 | 
			
		||||
//sys	VirtualProtect(address uintptr, size uintptr, newprotect uint32, oldprotect *uint32) (err error) = kernel32.VirtualProtect
 | 
			
		||||
//sys	TransmitFile(s Handle, handle Handle, bytesToWrite uint32, bytsPerSend uint32, overlapped *Overlapped, transmitFileBuf *TransmitFileBuffers, flags uint32) (err error) = mswsock.TransmitFile
 | 
			
		||||
//sys	ReadDirectoryChanges(handle Handle, buf *byte, buflen uint32, watchSubTree bool, mask uint32, retlen *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) = kernel32.ReadDirectoryChangesW
 | 
			
		||||
//sys	FindFirstChangeNotification(path string, watchSubtree bool, notifyFilter uint32) (handle Handle, err error) [failretval==InvalidHandle] = kernel32.FindFirstChangeNotificationW
 | 
			
		||||
//sys	FindNextChangeNotification(handle Handle) (err error)
 | 
			
		||||
//sys	FindCloseChangeNotification(handle Handle) (err error)
 | 
			
		||||
//sys	CertOpenSystemStore(hprov Handle, name *uint16) (store Handle, err error) = crypt32.CertOpenSystemStoreW
 | 
			
		||||
//sys   CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) = crypt32.CertOpenStore
 | 
			
		||||
//sys	CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) = crypt32.CertOpenStore
 | 
			
		||||
//sys	CertEnumCertificatesInStore(store Handle, prevContext *CertContext) (context *CertContext, err error) [failretval==nil] = crypt32.CertEnumCertificatesInStore
 | 
			
		||||
//sys   CertAddCertificateContextToStore(store Handle, certContext *CertContext, addDisposition uint32, storeContext **CertContext) (err error) = crypt32.CertAddCertificateContextToStore
 | 
			
		||||
//sys	CertAddCertificateContextToStore(store Handle, certContext *CertContext, addDisposition uint32, storeContext **CertContext) (err error) = crypt32.CertAddCertificateContextToStore
 | 
			
		||||
//sys	CertCloseStore(store Handle, flags uint32) (err error) = crypt32.CertCloseStore
 | 
			
		||||
//sys	CertDeleteCertificateFromStore(certContext *CertContext) (err error) = crypt32.CertDeleteCertificateFromStore
 | 
			
		||||
//sys	CertDuplicateCertificateContext(certContext *CertContext) (dupContext *CertContext) = crypt32.CertDuplicateCertificateContext
 | 
			
		||||
//sys   PFXImportCertStore(pfx *CryptDataBlob, password *uint16, flags uint32) (store Handle, err error) = crypt32.PFXImportCertStore
 | 
			
		||||
//sys   CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, additionalStore Handle, para *CertChainPara, flags uint32, reserved uintptr, chainCtx **CertChainContext) (err error) = crypt32.CertGetCertificateChain
 | 
			
		||||
//sys   CertFreeCertificateChain(ctx *CertChainContext) = crypt32.CertFreeCertificateChain
 | 
			
		||||
//sys   CertCreateCertificateContext(certEncodingType uint32, certEncoded *byte, encodedLen uint32) (context *CertContext, err error) [failretval==nil] = crypt32.CertCreateCertificateContext
 | 
			
		||||
//sys   CertFreeCertificateContext(ctx *CertContext) (err error) = crypt32.CertFreeCertificateContext
 | 
			
		||||
//sys   CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext, para *CertChainPolicyPara, status *CertChainPolicyStatus) (err error) = crypt32.CertVerifyCertificateChainPolicy
 | 
			
		||||
//sys	PFXImportCertStore(pfx *CryptDataBlob, password *uint16, flags uint32) (store Handle, err error) = crypt32.PFXImportCertStore
 | 
			
		||||
//sys	CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, additionalStore Handle, para *CertChainPara, flags uint32, reserved uintptr, chainCtx **CertChainContext) (err error) = crypt32.CertGetCertificateChain
 | 
			
		||||
//sys	CertFreeCertificateChain(ctx *CertChainContext) = crypt32.CertFreeCertificateChain
 | 
			
		||||
//sys	CertCreateCertificateContext(certEncodingType uint32, certEncoded *byte, encodedLen uint32) (context *CertContext, err error) [failretval==nil] = crypt32.CertCreateCertificateContext
 | 
			
		||||
//sys	CertFreeCertificateContext(ctx *CertContext) (err error) = crypt32.CertFreeCertificateContext
 | 
			
		||||
//sys	CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext, para *CertChainPolicyPara, status *CertChainPolicyStatus) (err error) = crypt32.CertVerifyCertificateChainPolicy
 | 
			
		||||
//sys	CertGetNameString(certContext *CertContext, nameType uint32, flags uint32, typePara unsafe.Pointer, name *uint16, size uint32) (chars uint32) = crypt32.CertGetNameStringW
 | 
			
		||||
//sys	CertFindExtension(objId *byte, countExtensions uint32, extensions *CertExtension) (ret *CertExtension) = crypt32.CertFindExtension
 | 
			
		||||
//sys	CryptQueryObject(objectType uint32, object unsafe.Pointer, expectedContentTypeFlags uint32, expectedFormatTypeFlags uint32, flags uint32, msgAndCertEncodingType *uint32, contentType *uint32, formatType *uint32, certStore *Handle, msg *Handle, context *unsafe.Pointer) (err error) = crypt32.CryptQueryObject
 | 
			
		||||
//sys	CryptDecodeObject(encodingType uint32, structType *byte, encodedBytes *byte, lenEncodedBytes uint32, flags uint32, decoded unsafe.Pointer, decodedLen *uint32) (err error) = crypt32.CryptDecodeObject
 | 
			
		||||
//sys	CryptProtectData(dataIn *DataBlob, name *uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) = crypt32.CryptProtectData
 | 
			
		||||
//sys	CryptUnprotectData(dataIn *DataBlob, name **uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) = crypt32.CryptUnprotectData
 | 
			
		||||
//sys	WinVerifyTrustEx(hwnd HWND, actionId *GUID, data *WinTrustData) (ret error) = wintrust.WinVerifyTrustEx
 | 
			
		||||
//sys	RegOpenKeyEx(key Handle, subkey *uint16, options uint32, desiredAccess uint32, result *Handle) (regerrno error) = advapi32.RegOpenKeyExW
 | 
			
		||||
//sys	RegCloseKey(key Handle) (regerrno error) = advapi32.RegCloseKey
 | 
			
		||||
//sys	RegQueryInfoKey(key Handle, class *uint16, classLen *uint32, reserved *uint32, subkeysLen *uint32, maxSubkeyLen *uint32, maxClassLen *uint32, valuesLen *uint32, maxValueNameLen *uint32, maxValueLen *uint32, saLen *uint32, lastWriteTime *Filetime) (regerrno error) = advapi32.RegQueryInfoKeyW
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										240
									
								
								vendor/golang.org/x/sys/windows/types_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										240
									
								
								vendor/golang.org/x/sys/windows/types_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -227,7 +227,7 @@ const (
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	// filters for ReadDirectoryChangesW
 | 
			
		||||
	// filters for ReadDirectoryChangesW and FindFirstChangeNotificationW
 | 
			
		||||
	FILE_NOTIFY_CHANGE_FILE_NAME   = 0x001
 | 
			
		||||
	FILE_NOTIFY_CHANGE_DIR_NAME    = 0x002
 | 
			
		||||
	FILE_NOTIFY_CHANGE_ATTRIBUTES  = 0x004
 | 
			
		||||
@@ -427,6 +427,67 @@ const (
 | 
			
		||||
	CERT_CLOSE_STORE_FORCE_FLAG = 0x00000001
 | 
			
		||||
	CERT_CLOSE_STORE_CHECK_FLAG = 0x00000002
 | 
			
		||||
 | 
			
		||||
	/* CryptQueryObject object type */
 | 
			
		||||
	CERT_QUERY_OBJECT_FILE = 1
 | 
			
		||||
	CERT_QUERY_OBJECT_BLOB = 2
 | 
			
		||||
 | 
			
		||||
	/* CryptQueryObject content type flags */
 | 
			
		||||
	CERT_QUERY_CONTENT_CERT                    = 1
 | 
			
		||||
	CERT_QUERY_CONTENT_CTL                     = 2
 | 
			
		||||
	CERT_QUERY_CONTENT_CRL                     = 3
 | 
			
		||||
	CERT_QUERY_CONTENT_SERIALIZED_STORE        = 4
 | 
			
		||||
	CERT_QUERY_CONTENT_SERIALIZED_CERT         = 5
 | 
			
		||||
	CERT_QUERY_CONTENT_SERIALIZED_CTL          = 6
 | 
			
		||||
	CERT_QUERY_CONTENT_SERIALIZED_CRL          = 7
 | 
			
		||||
	CERT_QUERY_CONTENT_PKCS7_SIGNED            = 8
 | 
			
		||||
	CERT_QUERY_CONTENT_PKCS7_UNSIGNED          = 9
 | 
			
		||||
	CERT_QUERY_CONTENT_PKCS7_SIGNED_EMBED      = 10
 | 
			
		||||
	CERT_QUERY_CONTENT_PKCS10                  = 11
 | 
			
		||||
	CERT_QUERY_CONTENT_PFX                     = 12
 | 
			
		||||
	CERT_QUERY_CONTENT_CERT_PAIR               = 13
 | 
			
		||||
	CERT_QUERY_CONTENT_PFX_AND_LOAD            = 14
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_CERT               = (1 << CERT_QUERY_CONTENT_CERT)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_CTL                = (1 << CERT_QUERY_CONTENT_CTL)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_CRL                = (1 << CERT_QUERY_CONTENT_CRL)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_SERIALIZED_STORE   = (1 << CERT_QUERY_CONTENT_SERIALIZED_STORE)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_SERIALIZED_CERT    = (1 << CERT_QUERY_CONTENT_SERIALIZED_CERT)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_SERIALIZED_CTL     = (1 << CERT_QUERY_CONTENT_SERIALIZED_CTL)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_SERIALIZED_CRL     = (1 << CERT_QUERY_CONTENT_SERIALIZED_CRL)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED       = (1 << CERT_QUERY_CONTENT_PKCS7_SIGNED)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED     = (1 << CERT_QUERY_CONTENT_PKCS7_UNSIGNED)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED_EMBED = (1 << CERT_QUERY_CONTENT_PKCS7_SIGNED_EMBED)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_PKCS10             = (1 << CERT_QUERY_CONTENT_PKCS10)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_PFX                = (1 << CERT_QUERY_CONTENT_PFX)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_CERT_PAIR          = (1 << CERT_QUERY_CONTENT_CERT_PAIR)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_PFX_AND_LOAD       = (1 << CERT_QUERY_CONTENT_PFX_AND_LOAD)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_ALL                = (CERT_QUERY_CONTENT_FLAG_CERT | CERT_QUERY_CONTENT_FLAG_CTL | CERT_QUERY_CONTENT_FLAG_CRL | CERT_QUERY_CONTENT_FLAG_SERIALIZED_STORE | CERT_QUERY_CONTENT_FLAG_SERIALIZED_CERT | CERT_QUERY_CONTENT_FLAG_SERIALIZED_CTL | CERT_QUERY_CONTENT_FLAG_SERIALIZED_CRL | CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED | CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED | CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED_EMBED | CERT_QUERY_CONTENT_FLAG_PKCS10 | CERT_QUERY_CONTENT_FLAG_PFX | CERT_QUERY_CONTENT_FLAG_CERT_PAIR)
 | 
			
		||||
	CERT_QUERY_CONTENT_FLAG_ALL_ISSUER_CERT    = (CERT_QUERY_CONTENT_FLAG_CERT | CERT_QUERY_CONTENT_FLAG_SERIALIZED_STORE | CERT_QUERY_CONTENT_FLAG_SERIALIZED_CERT | CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED | CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED)
 | 
			
		||||
 | 
			
		||||
	/* CryptQueryObject format type flags */
 | 
			
		||||
	CERT_QUERY_FORMAT_BINARY                     = 1
 | 
			
		||||
	CERT_QUERY_FORMAT_BASE64_ENCODED             = 2
 | 
			
		||||
	CERT_QUERY_FORMAT_ASN_ASCII_HEX_ENCODED      = 3
 | 
			
		||||
	CERT_QUERY_FORMAT_FLAG_BINARY                = (1 << CERT_QUERY_FORMAT_BINARY)
 | 
			
		||||
	CERT_QUERY_FORMAT_FLAG_BASE64_ENCODED        = (1 << CERT_QUERY_FORMAT_BASE64_ENCODED)
 | 
			
		||||
	CERT_QUERY_FORMAT_FLAG_ASN_ASCII_HEX_ENCODED = (1 << CERT_QUERY_FORMAT_ASN_ASCII_HEX_ENCODED)
 | 
			
		||||
	CERT_QUERY_FORMAT_FLAG_ALL                   = (CERT_QUERY_FORMAT_FLAG_BINARY | CERT_QUERY_FORMAT_FLAG_BASE64_ENCODED | CERT_QUERY_FORMAT_FLAG_ASN_ASCII_HEX_ENCODED)
 | 
			
		||||
 | 
			
		||||
	/* CertGetNameString name types */
 | 
			
		||||
	CERT_NAME_EMAIL_TYPE            = 1
 | 
			
		||||
	CERT_NAME_RDN_TYPE              = 2
 | 
			
		||||
	CERT_NAME_ATTR_TYPE             = 3
 | 
			
		||||
	CERT_NAME_SIMPLE_DISPLAY_TYPE   = 4
 | 
			
		||||
	CERT_NAME_FRIENDLY_DISPLAY_TYPE = 5
 | 
			
		||||
	CERT_NAME_DNS_TYPE              = 6
 | 
			
		||||
	CERT_NAME_URL_TYPE              = 7
 | 
			
		||||
	CERT_NAME_UPN_TYPE              = 8
 | 
			
		||||
 | 
			
		||||
	/* CertGetNameString flags */
 | 
			
		||||
	CERT_NAME_ISSUER_FLAG              = 0x1
 | 
			
		||||
	CERT_NAME_DISABLE_IE4_UTF8_FLAG    = 0x10000
 | 
			
		||||
	CERT_NAME_SEARCH_ALL_NAMES_FLAG    = 0x2
 | 
			
		||||
	CERT_NAME_STR_ENABLE_PUNYCODE_FLAG = 0x00200000
 | 
			
		||||
 | 
			
		||||
	/* AuthType values for SSLExtraCertChainPolicyPara struct */
 | 
			
		||||
	AUTHTYPE_CLIENT = 1
 | 
			
		||||
	AUTHTYPE_SERVER = 2
 | 
			
		||||
@@ -437,6 +498,22 @@ const (
 | 
			
		||||
	SECURITY_FLAG_IGNORE_WRONG_USAGE       = 0x00000200
 | 
			
		||||
	SECURITY_FLAG_IGNORE_CERT_CN_INVALID   = 0x00001000
 | 
			
		||||
	SECURITY_FLAG_IGNORE_CERT_DATE_INVALID = 0x00002000
 | 
			
		||||
 | 
			
		||||
	/* Flags for Crypt[Un]ProtectData */
 | 
			
		||||
	CRYPTPROTECT_UI_FORBIDDEN      = 0x1
 | 
			
		||||
	CRYPTPROTECT_LOCAL_MACHINE     = 0x4
 | 
			
		||||
	CRYPTPROTECT_CRED_SYNC         = 0x8
 | 
			
		||||
	CRYPTPROTECT_AUDIT             = 0x10
 | 
			
		||||
	CRYPTPROTECT_NO_RECOVERY       = 0x20
 | 
			
		||||
	CRYPTPROTECT_VERIFY_PROTECTION = 0x40
 | 
			
		||||
	CRYPTPROTECT_CRED_REGENERATE   = 0x80
 | 
			
		||||
 | 
			
		||||
	/* Flags for CryptProtectPromptStruct */
 | 
			
		||||
	CRYPTPROTECT_PROMPT_ON_UNPROTECT   = 1
 | 
			
		||||
	CRYPTPROTECT_PROMPT_ON_PROTECT     = 2
 | 
			
		||||
	CRYPTPROTECT_PROMPT_RESERVED       = 4
 | 
			
		||||
	CRYPTPROTECT_PROMPT_STRONG         = 8
 | 
			
		||||
	CRYPTPROTECT_PROMPT_REQUIRE_STRONG = 16
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
@@ -459,10 +536,58 @@ const (
 | 
			
		||||
	REALTIME_PRIORITY_CLASS       = 0x00000100
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
/* wintrust.h constants for WinVerifyTrustEx */
 | 
			
		||||
const (
 | 
			
		||||
	WTD_UI_ALL    = 1
 | 
			
		||||
	WTD_UI_NONE   = 2
 | 
			
		||||
	WTD_UI_NOBAD  = 3
 | 
			
		||||
	WTD_UI_NOGOOD = 4
 | 
			
		||||
 | 
			
		||||
	WTD_REVOKE_NONE       = 0
 | 
			
		||||
	WTD_REVOKE_WHOLECHAIN = 1
 | 
			
		||||
 | 
			
		||||
	WTD_CHOICE_FILE    = 1
 | 
			
		||||
	WTD_CHOICE_CATALOG = 2
 | 
			
		||||
	WTD_CHOICE_BLOB    = 3
 | 
			
		||||
	WTD_CHOICE_SIGNER  = 4
 | 
			
		||||
	WTD_CHOICE_CERT    = 5
 | 
			
		||||
 | 
			
		||||
	WTD_STATEACTION_IGNORE           = 0x00000000
 | 
			
		||||
	WTD_STATEACTION_VERIFY           = 0x00000010
 | 
			
		||||
	WTD_STATEACTION_CLOSE            = 0x00000002
 | 
			
		||||
	WTD_STATEACTION_AUTO_CACHE       = 0x00000003
 | 
			
		||||
	WTD_STATEACTION_AUTO_CACHE_FLUSH = 0x00000004
 | 
			
		||||
 | 
			
		||||
	WTD_USE_IE4_TRUST_FLAG                  = 0x1
 | 
			
		||||
	WTD_NO_IE4_CHAIN_FLAG                   = 0x2
 | 
			
		||||
	WTD_NO_POLICY_USAGE_FLAG                = 0x4
 | 
			
		||||
	WTD_REVOCATION_CHECK_NONE               = 0x10
 | 
			
		||||
	WTD_REVOCATION_CHECK_END_CERT           = 0x20
 | 
			
		||||
	WTD_REVOCATION_CHECK_CHAIN              = 0x40
 | 
			
		||||
	WTD_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT = 0x80
 | 
			
		||||
	WTD_SAFER_FLAG                          = 0x100
 | 
			
		||||
	WTD_HASH_ONLY_FLAG                      = 0x200
 | 
			
		||||
	WTD_USE_DEFAULT_OSVER_CHECK             = 0x400
 | 
			
		||||
	WTD_LIFETIME_SIGNING_FLAG               = 0x800
 | 
			
		||||
	WTD_CACHE_ONLY_URL_RETRIEVAL            = 0x1000
 | 
			
		||||
	WTD_DISABLE_MD2_MD4                     = 0x2000
 | 
			
		||||
	WTD_MOTW                                = 0x4000
 | 
			
		||||
 | 
			
		||||
	WTD_UICONTEXT_EXECUTE = 0
 | 
			
		||||
	WTD_UICONTEXT_INSTALL = 1
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var (
 | 
			
		||||
	OID_PKIX_KP_SERVER_AUTH = []byte("1.3.6.1.5.5.7.3.1\x00")
 | 
			
		||||
	OID_SERVER_GATED_CRYPTO = []byte("1.3.6.1.4.1.311.10.3.3\x00")
 | 
			
		||||
	OID_SGC_NETSCAPE        = []byte("2.16.840.1.113730.4.1\x00")
 | 
			
		||||
 | 
			
		||||
	WINTRUST_ACTION_GENERIC_VERIFY_V2 = GUID{
 | 
			
		||||
		Data1: 0xaac56b,
 | 
			
		||||
		Data2: 0xcd44,
 | 
			
		||||
		Data3: 0x11d0,
 | 
			
		||||
		Data4: [8]byte{0x8c, 0xc2, 0x0, 0xc0, 0x4f, 0xc2, 0x95, 0xee},
 | 
			
		||||
	}
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Pointer represents a pointer to an arbitrary Windows type.
 | 
			
		||||
@@ -1051,7 +1176,57 @@ type MibIfRow struct {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CertInfo struct {
 | 
			
		||||
	// Not implemented
 | 
			
		||||
	Version              uint32
 | 
			
		||||
	SerialNumber         CryptIntegerBlob
 | 
			
		||||
	SignatureAlgorithm   CryptAlgorithmIdentifier
 | 
			
		||||
	Issuer               CertNameBlob
 | 
			
		||||
	NotBefore            Filetime
 | 
			
		||||
	NotAfter             Filetime
 | 
			
		||||
	Subject              CertNameBlob
 | 
			
		||||
	SubjectPublicKeyInfo CertPublicKeyInfo
 | 
			
		||||
	IssuerUniqueId       CryptBitBlob
 | 
			
		||||
	SubjectUniqueId      CryptBitBlob
 | 
			
		||||
	CountExtensions      uint32
 | 
			
		||||
	Extensions           *CertExtension
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CertExtension struct {
 | 
			
		||||
	ObjId    *byte
 | 
			
		||||
	Critical int32
 | 
			
		||||
	Value    CryptObjidBlob
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CryptAlgorithmIdentifier struct {
 | 
			
		||||
	ObjId      *byte
 | 
			
		||||
	Parameters CryptObjidBlob
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CertPublicKeyInfo struct {
 | 
			
		||||
	Algorithm CryptAlgorithmIdentifier
 | 
			
		||||
	PublicKey CryptBitBlob
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type DataBlob struct {
 | 
			
		||||
	Size uint32
 | 
			
		||||
	Data *byte
 | 
			
		||||
}
 | 
			
		||||
type CryptIntegerBlob DataBlob
 | 
			
		||||
type CryptUintBlob DataBlob
 | 
			
		||||
type CryptObjidBlob DataBlob
 | 
			
		||||
type CertNameBlob DataBlob
 | 
			
		||||
type CertRdnValueBlob DataBlob
 | 
			
		||||
type CertBlob DataBlob
 | 
			
		||||
type CrlBlob DataBlob
 | 
			
		||||
type CryptDataBlob DataBlob
 | 
			
		||||
type CryptHashBlob DataBlob
 | 
			
		||||
type CryptDigestBlob DataBlob
 | 
			
		||||
type CryptDerBlob DataBlob
 | 
			
		||||
type CryptAttrBlob DataBlob
 | 
			
		||||
 | 
			
		||||
type CryptBitBlob struct {
 | 
			
		||||
	Size       uint32
 | 
			
		||||
	Data       *byte
 | 
			
		||||
	UnusedBits uint32
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CertContext struct {
 | 
			
		||||
@@ -1157,9 +1332,64 @@ type CertChainPolicyStatus struct {
 | 
			
		||||
	ExtraPolicyStatus Pointer
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CryptDataBlob struct {
 | 
			
		||||
	Size uint32
 | 
			
		||||
	Data *byte
 | 
			
		||||
type CertPolicyInfo struct {
 | 
			
		||||
	Identifier      *byte
 | 
			
		||||
	CountQualifiers uint32
 | 
			
		||||
	Qualifiers      *CertPolicyQualifierInfo
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CertPoliciesInfo struct {
 | 
			
		||||
	Count       uint32
 | 
			
		||||
	PolicyInfos *CertPolicyInfo
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CertPolicyQualifierInfo struct {
 | 
			
		||||
	// Not implemented
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CertStrongSignPara struct {
 | 
			
		||||
	Size                      uint32
 | 
			
		||||
	InfoChoice                uint32
 | 
			
		||||
	InfoOrSerializedInfoOrOID unsafe.Pointer
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type CryptProtectPromptStruct struct {
 | 
			
		||||
	Size        uint32
 | 
			
		||||
	PromptFlags uint32
 | 
			
		||||
	App         HWND
 | 
			
		||||
	Prompt      *uint16
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type WinTrustData struct {
 | 
			
		||||
	Size                            uint32
 | 
			
		||||
	PolicyCallbackData              uintptr
 | 
			
		||||
	SIPClientData                   uintptr
 | 
			
		||||
	UIChoice                        uint32
 | 
			
		||||
	RevocationChecks                uint32
 | 
			
		||||
	UnionChoice                     uint32
 | 
			
		||||
	FileOrCatalogOrBlobOrSgnrOrCert unsafe.Pointer
 | 
			
		||||
	StateAction                     uint32
 | 
			
		||||
	StateData                       Handle
 | 
			
		||||
	URLReference                    *uint16
 | 
			
		||||
	ProvFlags                       uint32
 | 
			
		||||
	UIContext                       uint32
 | 
			
		||||
	SignatureSettings               *WinTrustSignatureSettings
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type WinTrustFileInfo struct {
 | 
			
		||||
	Size         uint32
 | 
			
		||||
	FilePath     *uint16
 | 
			
		||||
	File         Handle
 | 
			
		||||
	KnownSubject *GUID
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type WinTrustSignatureSettings struct {
 | 
			
		||||
	Size             uint32
 | 
			
		||||
	Index            uint32
 | 
			
		||||
	Flags            uint32
 | 
			
		||||
	SecondarySigs    uint32
 | 
			
		||||
	VerifiedSigIndex uint32
 | 
			
		||||
	CryptoPolicy     *CertStrongSignPara
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										108
									
								
								vendor/golang.org/x/sys/windows/zsyscall_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										108
									
								
								vendor/golang.org/x/sys/windows/zsyscall_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -51,6 +51,7 @@ var (
 | 
			
		||||
	modshell32  = NewLazySystemDLL("shell32.dll")
 | 
			
		||||
	moduser32   = NewLazySystemDLL("user32.dll")
 | 
			
		||||
	moduserenv  = NewLazySystemDLL("userenv.dll")
 | 
			
		||||
	modwintrust = NewLazySystemDLL("wintrust.dll")
 | 
			
		||||
	modws2_32   = NewLazySystemDLL("ws2_32.dll")
 | 
			
		||||
	modwtsapi32 = NewLazySystemDLL("wtsapi32.dll")
 | 
			
		||||
 | 
			
		||||
@@ -145,12 +146,18 @@ var (
 | 
			
		||||
	procCertDeleteCertificateFromStore                       = modcrypt32.NewProc("CertDeleteCertificateFromStore")
 | 
			
		||||
	procCertDuplicateCertificateContext                      = modcrypt32.NewProc("CertDuplicateCertificateContext")
 | 
			
		||||
	procCertEnumCertificatesInStore                          = modcrypt32.NewProc("CertEnumCertificatesInStore")
 | 
			
		||||
	procCertFindExtension                                    = modcrypt32.NewProc("CertFindExtension")
 | 
			
		||||
	procCertFreeCertificateChain                             = modcrypt32.NewProc("CertFreeCertificateChain")
 | 
			
		||||
	procCertFreeCertificateContext                           = modcrypt32.NewProc("CertFreeCertificateContext")
 | 
			
		||||
	procCertGetCertificateChain                              = modcrypt32.NewProc("CertGetCertificateChain")
 | 
			
		||||
	procCertGetNameStringW                                   = modcrypt32.NewProc("CertGetNameStringW")
 | 
			
		||||
	procCertOpenStore                                        = modcrypt32.NewProc("CertOpenStore")
 | 
			
		||||
	procCertOpenSystemStoreW                                 = modcrypt32.NewProc("CertOpenSystemStoreW")
 | 
			
		||||
	procCertVerifyCertificateChainPolicy                     = modcrypt32.NewProc("CertVerifyCertificateChainPolicy")
 | 
			
		||||
	procCryptDecodeObject                                    = modcrypt32.NewProc("CryptDecodeObject")
 | 
			
		||||
	procCryptProtectData                                     = modcrypt32.NewProc("CryptProtectData")
 | 
			
		||||
	procCryptQueryObject                                     = modcrypt32.NewProc("CryptQueryObject")
 | 
			
		||||
	procCryptUnprotectData                                   = modcrypt32.NewProc("CryptUnprotectData")
 | 
			
		||||
	procPFXImportCertStore                                   = modcrypt32.NewProc("PFXImportCertStore")
 | 
			
		||||
	procDnsNameCompare_W                                     = moddnsapi.NewProc("DnsNameCompare_W")
 | 
			
		||||
	procDnsQuery_W                                           = moddnsapi.NewProc("DnsQuery_W")
 | 
			
		||||
@@ -183,9 +190,12 @@ var (
 | 
			
		||||
	procDuplicateHandle                                      = modkernel32.NewProc("DuplicateHandle")
 | 
			
		||||
	procExitProcess                                          = modkernel32.NewProc("ExitProcess")
 | 
			
		||||
	procFindClose                                            = modkernel32.NewProc("FindClose")
 | 
			
		||||
	procFindCloseChangeNotification                          = modkernel32.NewProc("FindCloseChangeNotification")
 | 
			
		||||
	procFindFirstChangeNotificationW                         = modkernel32.NewProc("FindFirstChangeNotificationW")
 | 
			
		||||
	procFindFirstFileW                                       = modkernel32.NewProc("FindFirstFileW")
 | 
			
		||||
	procFindFirstVolumeMountPointW                           = modkernel32.NewProc("FindFirstVolumeMountPointW")
 | 
			
		||||
	procFindFirstVolumeW                                     = modkernel32.NewProc("FindFirstVolumeW")
 | 
			
		||||
	procFindNextChangeNotification                           = modkernel32.NewProc("FindNextChangeNotification")
 | 
			
		||||
	procFindNextFileW                                        = modkernel32.NewProc("FindNextFileW")
 | 
			
		||||
	procFindNextVolumeMountPointW                            = modkernel32.NewProc("FindNextVolumeMountPointW")
 | 
			
		||||
	procFindNextVolumeW                                      = modkernel32.NewProc("FindNextVolumeW")
 | 
			
		||||
@@ -347,6 +357,7 @@ var (
 | 
			
		||||
	procCreateEnvironmentBlock                               = moduserenv.NewProc("CreateEnvironmentBlock")
 | 
			
		||||
	procDestroyEnvironmentBlock                              = moduserenv.NewProc("DestroyEnvironmentBlock")
 | 
			
		||||
	procGetUserProfileDirectoryW                             = moduserenv.NewProc("GetUserProfileDirectoryW")
 | 
			
		||||
	procWinVerifyTrustEx                                     = modwintrust.NewProc("WinVerifyTrustEx")
 | 
			
		||||
	procFreeAddrInfoW                                        = modws2_32.NewProc("FreeAddrInfoW")
 | 
			
		||||
	procGetAddrInfoW                                         = modws2_32.NewProc("GetAddrInfoW")
 | 
			
		||||
	procWSACleanup                                           = modws2_32.NewProc("WSACleanup")
 | 
			
		||||
@@ -1199,6 +1210,12 @@ func CertEnumCertificatesInStore(store Handle, prevContext *CertContext) (contex
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func CertFindExtension(objId *byte, countExtensions uint32, extensions *CertExtension) (ret *CertExtension) {
 | 
			
		||||
	r0, _, _ := syscall.Syscall(procCertFindExtension.Addr(), 3, uintptr(unsafe.Pointer(objId)), uintptr(countExtensions), uintptr(unsafe.Pointer(extensions)))
 | 
			
		||||
	ret = (*CertExtension)(unsafe.Pointer(r0))
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func CertFreeCertificateChain(ctx *CertChainContext) {
 | 
			
		||||
	syscall.Syscall(procCertFreeCertificateChain.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0)
 | 
			
		||||
	return
 | 
			
		||||
@@ -1220,6 +1237,12 @@ func CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, a
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func CertGetNameString(certContext *CertContext, nameType uint32, flags uint32, typePara unsafe.Pointer, name *uint16, size uint32) (chars uint32) {
 | 
			
		||||
	r0, _, _ := syscall.Syscall6(procCertGetNameStringW.Addr(), 6, uintptr(unsafe.Pointer(certContext)), uintptr(nameType), uintptr(flags), uintptr(typePara), uintptr(unsafe.Pointer(name)), uintptr(size))
 | 
			
		||||
	chars = uint32(r0)
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) {
 | 
			
		||||
	r0, _, e1 := syscall.Syscall6(procCertOpenStore.Addr(), 5, uintptr(storeProvider), uintptr(msgAndCertEncodingType), uintptr(cryptProv), uintptr(flags), uintptr(para), 0)
 | 
			
		||||
	handle = Handle(r0)
 | 
			
		||||
@@ -1246,6 +1269,38 @@ func CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func CryptDecodeObject(encodingType uint32, structType *byte, encodedBytes *byte, lenEncodedBytes uint32, flags uint32, decoded unsafe.Pointer, decodedLen *uint32) (err error) {
 | 
			
		||||
	r1, _, e1 := syscall.Syscall9(procCryptDecodeObject.Addr(), 7, uintptr(encodingType), uintptr(unsafe.Pointer(structType)), uintptr(unsafe.Pointer(encodedBytes)), uintptr(lenEncodedBytes), uintptr(flags), uintptr(decoded), uintptr(unsafe.Pointer(decodedLen)), 0, 0)
 | 
			
		||||
	if r1 == 0 {
 | 
			
		||||
		err = errnoErr(e1)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func CryptProtectData(dataIn *DataBlob, name *uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) {
 | 
			
		||||
	r1, _, e1 := syscall.Syscall9(procCryptProtectData.Addr(), 7, uintptr(unsafe.Pointer(dataIn)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(optionalEntropy)), uintptr(reserved), uintptr(unsafe.Pointer(promptStruct)), uintptr(flags), uintptr(unsafe.Pointer(dataOut)), 0, 0)
 | 
			
		||||
	if r1 == 0 {
 | 
			
		||||
		err = errnoErr(e1)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func CryptQueryObject(objectType uint32, object unsafe.Pointer, expectedContentTypeFlags uint32, expectedFormatTypeFlags uint32, flags uint32, msgAndCertEncodingType *uint32, contentType *uint32, formatType *uint32, certStore *Handle, msg *Handle, context *unsafe.Pointer) (err error) {
 | 
			
		||||
	r1, _, e1 := syscall.Syscall12(procCryptQueryObject.Addr(), 11, uintptr(objectType), uintptr(object), uintptr(expectedContentTypeFlags), uintptr(expectedFormatTypeFlags), uintptr(flags), uintptr(unsafe.Pointer(msgAndCertEncodingType)), uintptr(unsafe.Pointer(contentType)), uintptr(unsafe.Pointer(formatType)), uintptr(unsafe.Pointer(certStore)), uintptr(unsafe.Pointer(msg)), uintptr(unsafe.Pointer(context)), 0)
 | 
			
		||||
	if r1 == 0 {
 | 
			
		||||
		err = errnoErr(e1)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func CryptUnprotectData(dataIn *DataBlob, name **uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) {
 | 
			
		||||
	r1, _, e1 := syscall.Syscall9(procCryptUnprotectData.Addr(), 7, uintptr(unsafe.Pointer(dataIn)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(optionalEntropy)), uintptr(reserved), uintptr(unsafe.Pointer(promptStruct)), uintptr(flags), uintptr(unsafe.Pointer(dataOut)), 0, 0)
 | 
			
		||||
	if r1 == 0 {
 | 
			
		||||
		err = errnoErr(e1)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func PFXImportCertStore(pfx *CryptDataBlob, password *uint16, flags uint32) (store Handle, err error) {
 | 
			
		||||
	r0, _, e1 := syscall.Syscall(procPFXImportCertStore.Addr(), 3, uintptr(unsafe.Pointer(pfx)), uintptr(unsafe.Pointer(password)), uintptr(flags))
 | 
			
		||||
	store = Handle(r0)
 | 
			
		||||
@@ -1525,6 +1580,36 @@ func FindClose(handle Handle) (err error) {
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func FindCloseChangeNotification(handle Handle) (err error) {
 | 
			
		||||
	r1, _, e1 := syscall.Syscall(procFindCloseChangeNotification.Addr(), 1, uintptr(handle), 0, 0)
 | 
			
		||||
	if r1 == 0 {
 | 
			
		||||
		err = errnoErr(e1)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func FindFirstChangeNotification(path string, watchSubtree bool, notifyFilter uint32) (handle Handle, err error) {
 | 
			
		||||
	var _p0 *uint16
 | 
			
		||||
	_p0, err = syscall.UTF16PtrFromString(path)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	return _FindFirstChangeNotification(_p0, watchSubtree, notifyFilter)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func _FindFirstChangeNotification(path *uint16, watchSubtree bool, notifyFilter uint32) (handle Handle, err error) {
 | 
			
		||||
	var _p1 uint32
 | 
			
		||||
	if watchSubtree {
 | 
			
		||||
		_p1 = 1
 | 
			
		||||
	}
 | 
			
		||||
	r0, _, e1 := syscall.Syscall(procFindFirstChangeNotificationW.Addr(), 3, uintptr(unsafe.Pointer(path)), uintptr(_p1), uintptr(notifyFilter))
 | 
			
		||||
	handle = Handle(r0)
 | 
			
		||||
	if handle == InvalidHandle {
 | 
			
		||||
		err = errnoErr(e1)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func findFirstFile1(name *uint16, data *win32finddata1) (handle Handle, err error) {
 | 
			
		||||
	r0, _, e1 := syscall.Syscall(procFindFirstFileW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(data)), 0)
 | 
			
		||||
	handle = Handle(r0)
 | 
			
		||||
@@ -1552,6 +1637,14 @@ func FindFirstVolume(volumeName *uint16, bufferLength uint32) (handle Handle, er
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func FindNextChangeNotification(handle Handle) (err error) {
 | 
			
		||||
	r1, _, e1 := syscall.Syscall(procFindNextChangeNotification.Addr(), 1, uintptr(handle), 0, 0)
 | 
			
		||||
	if r1 == 0 {
 | 
			
		||||
		err = errnoErr(e1)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func findNextFile1(handle Handle, data *win32finddata1) (err error) {
 | 
			
		||||
	r1, _, e1 := syscall.Syscall(procFindNextFileW.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0)
 | 
			
		||||
	if r1 == 0 {
 | 
			
		||||
@@ -2904,9 +2997,12 @@ func GetShellWindow() (shellWindow HWND) {
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func GetWindowThreadProcessId(hwnd HWND, pid *uint32) (tid uint32) {
 | 
			
		||||
	r0, _, _ := syscall.Syscall(procGetWindowThreadProcessId.Addr(), 2, uintptr(hwnd), uintptr(unsafe.Pointer(pid)), 0)
 | 
			
		||||
func GetWindowThreadProcessId(hwnd HWND, pid *uint32) (tid uint32, err error) {
 | 
			
		||||
	r0, _, e1 := syscall.Syscall(procGetWindowThreadProcessId.Addr(), 2, uintptr(hwnd), uintptr(unsafe.Pointer(pid)), 0)
 | 
			
		||||
	tid = uint32(r0)
 | 
			
		||||
	if tid == 0 {
 | 
			
		||||
		err = errnoErr(e1)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@@ -2947,6 +3043,14 @@ func GetUserProfileDirectory(t Token, dir *uint16, dirLen *uint32) (err error) {
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func WinVerifyTrustEx(hwnd HWND, actionId *GUID, data *WinTrustData) (ret error) {
 | 
			
		||||
	r0, _, _ := syscall.Syscall(procWinVerifyTrustEx.Addr(), 3, uintptr(hwnd), uintptr(unsafe.Pointer(actionId)), uintptr(unsafe.Pointer(data)))
 | 
			
		||||
	if r0 != 0 {
 | 
			
		||||
		ret = syscall.Errno(r0)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func FreeAddrInfoW(addrinfo *AddrinfoW) {
 | 
			
		||||
	syscall.Syscall(procFreeAddrInfoW.Addr(), 1, uintptr(unsafe.Pointer(addrinfo)), 0, 0)
 | 
			
		||||
	return
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user