mirror of
				https://gitea.com/Lydanne/buildx.git
				synced 2025-11-01 00:23:56 +08:00 
			
		
		
		
	vendor: update buildkit to 8effd45b
Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com>
This commit is contained in:
		
							
								
								
									
										29
									
								
								vendor/golang.org/x/sys/windows/syscall_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										29
									
								
								vendor/golang.org/x/sys/windows/syscall_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -22,6 +22,7 @@ type HWND uintptr | ||||
|  | ||||
| const ( | ||||
| 	InvalidHandle = ^Handle(0) | ||||
| 	InvalidHWND   = ^HWND(0) | ||||
|  | ||||
| 	// Flags for DefineDosDevice. | ||||
| 	DDD_EXACT_MATCH_ON_REMOVE = 0x00000004 | ||||
| @@ -215,7 +216,7 @@ func NewCallbackCDecl(fn interface{}) uintptr { | ||||
| //sys	CreateProcess(appName *uint16, commandLine *uint16, procSecurity *SecurityAttributes, threadSecurity *SecurityAttributes, inheritHandles bool, creationFlags uint32, env *uint16, currentDir *uint16, startupInfo *StartupInfo, outProcInfo *ProcessInformation) (err error) = CreateProcessW | ||||
| //sys	OpenProcess(desiredAccess uint32, inheritHandle bool, processId uint32) (handle Handle, err error) | ||||
| //sys	ShellExecute(hwnd Handle, verb *uint16, file *uint16, args *uint16, cwd *uint16, showCmd int32) (err error) [failretval<=32] = shell32.ShellExecuteW | ||||
| //sys	GetWindowThreadProcessId(hwnd HWND, pid *uint32) (tid uint32) = user32.GetWindowThreadProcessId | ||||
| //sys	GetWindowThreadProcessId(hwnd HWND, pid *uint32) (tid uint32, err error) = user32.GetWindowThreadProcessId | ||||
| //sys	GetShellWindow() (shellWindow HWND) = user32.GetShellWindow | ||||
| //sys	MessageBox(hwnd HWND, text *uint16, caption *uint16, boxtype uint32) (ret int32, err error) [failretval==0] = user32.MessageBoxW | ||||
| //sys	ExitWindowsEx(flags uint32, reason uint32) (err error) = user32.ExitWindowsEx | ||||
| @@ -264,19 +265,29 @@ func NewCallbackCDecl(fn interface{}) uintptr { | ||||
| //sys	VirtualProtect(address uintptr, size uintptr, newprotect uint32, oldprotect *uint32) (err error) = kernel32.VirtualProtect | ||||
| //sys	TransmitFile(s Handle, handle Handle, bytesToWrite uint32, bytsPerSend uint32, overlapped *Overlapped, transmitFileBuf *TransmitFileBuffers, flags uint32) (err error) = mswsock.TransmitFile | ||||
| //sys	ReadDirectoryChanges(handle Handle, buf *byte, buflen uint32, watchSubTree bool, mask uint32, retlen *uint32, overlapped *Overlapped, completionRoutine uintptr) (err error) = kernel32.ReadDirectoryChangesW | ||||
| //sys	FindFirstChangeNotification(path string, watchSubtree bool, notifyFilter uint32) (handle Handle, err error) [failretval==InvalidHandle] = kernel32.FindFirstChangeNotificationW | ||||
| //sys	FindNextChangeNotification(handle Handle) (err error) | ||||
| //sys	FindCloseChangeNotification(handle Handle) (err error) | ||||
| //sys	CertOpenSystemStore(hprov Handle, name *uint16) (store Handle, err error) = crypt32.CertOpenSystemStoreW | ||||
| //sys   CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) = crypt32.CertOpenStore | ||||
| //sys	CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) = crypt32.CertOpenStore | ||||
| //sys	CertEnumCertificatesInStore(store Handle, prevContext *CertContext) (context *CertContext, err error) [failretval==nil] = crypt32.CertEnumCertificatesInStore | ||||
| //sys   CertAddCertificateContextToStore(store Handle, certContext *CertContext, addDisposition uint32, storeContext **CertContext) (err error) = crypt32.CertAddCertificateContextToStore | ||||
| //sys	CertAddCertificateContextToStore(store Handle, certContext *CertContext, addDisposition uint32, storeContext **CertContext) (err error) = crypt32.CertAddCertificateContextToStore | ||||
| //sys	CertCloseStore(store Handle, flags uint32) (err error) = crypt32.CertCloseStore | ||||
| //sys	CertDeleteCertificateFromStore(certContext *CertContext) (err error) = crypt32.CertDeleteCertificateFromStore | ||||
| //sys	CertDuplicateCertificateContext(certContext *CertContext) (dupContext *CertContext) = crypt32.CertDuplicateCertificateContext | ||||
| //sys   PFXImportCertStore(pfx *CryptDataBlob, password *uint16, flags uint32) (store Handle, err error) = crypt32.PFXImportCertStore | ||||
| //sys   CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, additionalStore Handle, para *CertChainPara, flags uint32, reserved uintptr, chainCtx **CertChainContext) (err error) = crypt32.CertGetCertificateChain | ||||
| //sys   CertFreeCertificateChain(ctx *CertChainContext) = crypt32.CertFreeCertificateChain | ||||
| //sys   CertCreateCertificateContext(certEncodingType uint32, certEncoded *byte, encodedLen uint32) (context *CertContext, err error) [failretval==nil] = crypt32.CertCreateCertificateContext | ||||
| //sys   CertFreeCertificateContext(ctx *CertContext) (err error) = crypt32.CertFreeCertificateContext | ||||
| //sys   CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext, para *CertChainPolicyPara, status *CertChainPolicyStatus) (err error) = crypt32.CertVerifyCertificateChainPolicy | ||||
| //sys	PFXImportCertStore(pfx *CryptDataBlob, password *uint16, flags uint32) (store Handle, err error) = crypt32.PFXImportCertStore | ||||
| //sys	CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, additionalStore Handle, para *CertChainPara, flags uint32, reserved uintptr, chainCtx **CertChainContext) (err error) = crypt32.CertGetCertificateChain | ||||
| //sys	CertFreeCertificateChain(ctx *CertChainContext) = crypt32.CertFreeCertificateChain | ||||
| //sys	CertCreateCertificateContext(certEncodingType uint32, certEncoded *byte, encodedLen uint32) (context *CertContext, err error) [failretval==nil] = crypt32.CertCreateCertificateContext | ||||
| //sys	CertFreeCertificateContext(ctx *CertContext) (err error) = crypt32.CertFreeCertificateContext | ||||
| //sys	CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext, para *CertChainPolicyPara, status *CertChainPolicyStatus) (err error) = crypt32.CertVerifyCertificateChainPolicy | ||||
| //sys	CertGetNameString(certContext *CertContext, nameType uint32, flags uint32, typePara unsafe.Pointer, name *uint16, size uint32) (chars uint32) = crypt32.CertGetNameStringW | ||||
| //sys	CertFindExtension(objId *byte, countExtensions uint32, extensions *CertExtension) (ret *CertExtension) = crypt32.CertFindExtension | ||||
| //sys	CryptQueryObject(objectType uint32, object unsafe.Pointer, expectedContentTypeFlags uint32, expectedFormatTypeFlags uint32, flags uint32, msgAndCertEncodingType *uint32, contentType *uint32, formatType *uint32, certStore *Handle, msg *Handle, context *unsafe.Pointer) (err error) = crypt32.CryptQueryObject | ||||
| //sys	CryptDecodeObject(encodingType uint32, structType *byte, encodedBytes *byte, lenEncodedBytes uint32, flags uint32, decoded unsafe.Pointer, decodedLen *uint32) (err error) = crypt32.CryptDecodeObject | ||||
| //sys	CryptProtectData(dataIn *DataBlob, name *uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) = crypt32.CryptProtectData | ||||
| //sys	CryptUnprotectData(dataIn *DataBlob, name **uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) = crypt32.CryptUnprotectData | ||||
| //sys	WinVerifyTrustEx(hwnd HWND, actionId *GUID, data *WinTrustData) (ret error) = wintrust.WinVerifyTrustEx | ||||
| //sys	RegOpenKeyEx(key Handle, subkey *uint16, options uint32, desiredAccess uint32, result *Handle) (regerrno error) = advapi32.RegOpenKeyExW | ||||
| //sys	RegCloseKey(key Handle) (regerrno error) = advapi32.RegCloseKey | ||||
| //sys	RegQueryInfoKey(key Handle, class *uint16, classLen *uint32, reserved *uint32, subkeysLen *uint32, maxSubkeyLen *uint32, maxClassLen *uint32, valuesLen *uint32, maxValueNameLen *uint32, maxValueLen *uint32, saLen *uint32, lastWriteTime *Filetime) (regerrno error) = advapi32.RegQueryInfoKeyW | ||||
|   | ||||
							
								
								
									
										240
									
								
								vendor/golang.org/x/sys/windows/types_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										240
									
								
								vendor/golang.org/x/sys/windows/types_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -227,7 +227,7 @@ const ( | ||||
| ) | ||||
|  | ||||
| const ( | ||||
| 	// filters for ReadDirectoryChangesW | ||||
| 	// filters for ReadDirectoryChangesW and FindFirstChangeNotificationW | ||||
| 	FILE_NOTIFY_CHANGE_FILE_NAME   = 0x001 | ||||
| 	FILE_NOTIFY_CHANGE_DIR_NAME    = 0x002 | ||||
| 	FILE_NOTIFY_CHANGE_ATTRIBUTES  = 0x004 | ||||
| @@ -427,6 +427,67 @@ const ( | ||||
| 	CERT_CLOSE_STORE_FORCE_FLAG = 0x00000001 | ||||
| 	CERT_CLOSE_STORE_CHECK_FLAG = 0x00000002 | ||||
|  | ||||
| 	/* CryptQueryObject object type */ | ||||
| 	CERT_QUERY_OBJECT_FILE = 1 | ||||
| 	CERT_QUERY_OBJECT_BLOB = 2 | ||||
|  | ||||
| 	/* CryptQueryObject content type flags */ | ||||
| 	CERT_QUERY_CONTENT_CERT                    = 1 | ||||
| 	CERT_QUERY_CONTENT_CTL                     = 2 | ||||
| 	CERT_QUERY_CONTENT_CRL                     = 3 | ||||
| 	CERT_QUERY_CONTENT_SERIALIZED_STORE        = 4 | ||||
| 	CERT_QUERY_CONTENT_SERIALIZED_CERT         = 5 | ||||
| 	CERT_QUERY_CONTENT_SERIALIZED_CTL          = 6 | ||||
| 	CERT_QUERY_CONTENT_SERIALIZED_CRL          = 7 | ||||
| 	CERT_QUERY_CONTENT_PKCS7_SIGNED            = 8 | ||||
| 	CERT_QUERY_CONTENT_PKCS7_UNSIGNED          = 9 | ||||
| 	CERT_QUERY_CONTENT_PKCS7_SIGNED_EMBED      = 10 | ||||
| 	CERT_QUERY_CONTENT_PKCS10                  = 11 | ||||
| 	CERT_QUERY_CONTENT_PFX                     = 12 | ||||
| 	CERT_QUERY_CONTENT_CERT_PAIR               = 13 | ||||
| 	CERT_QUERY_CONTENT_PFX_AND_LOAD            = 14 | ||||
| 	CERT_QUERY_CONTENT_FLAG_CERT               = (1 << CERT_QUERY_CONTENT_CERT) | ||||
| 	CERT_QUERY_CONTENT_FLAG_CTL                = (1 << CERT_QUERY_CONTENT_CTL) | ||||
| 	CERT_QUERY_CONTENT_FLAG_CRL                = (1 << CERT_QUERY_CONTENT_CRL) | ||||
| 	CERT_QUERY_CONTENT_FLAG_SERIALIZED_STORE   = (1 << CERT_QUERY_CONTENT_SERIALIZED_STORE) | ||||
| 	CERT_QUERY_CONTENT_FLAG_SERIALIZED_CERT    = (1 << CERT_QUERY_CONTENT_SERIALIZED_CERT) | ||||
| 	CERT_QUERY_CONTENT_FLAG_SERIALIZED_CTL     = (1 << CERT_QUERY_CONTENT_SERIALIZED_CTL) | ||||
| 	CERT_QUERY_CONTENT_FLAG_SERIALIZED_CRL     = (1 << CERT_QUERY_CONTENT_SERIALIZED_CRL) | ||||
| 	CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED       = (1 << CERT_QUERY_CONTENT_PKCS7_SIGNED) | ||||
| 	CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED     = (1 << CERT_QUERY_CONTENT_PKCS7_UNSIGNED) | ||||
| 	CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED_EMBED = (1 << CERT_QUERY_CONTENT_PKCS7_SIGNED_EMBED) | ||||
| 	CERT_QUERY_CONTENT_FLAG_PKCS10             = (1 << CERT_QUERY_CONTENT_PKCS10) | ||||
| 	CERT_QUERY_CONTENT_FLAG_PFX                = (1 << CERT_QUERY_CONTENT_PFX) | ||||
| 	CERT_QUERY_CONTENT_FLAG_CERT_PAIR          = (1 << CERT_QUERY_CONTENT_CERT_PAIR) | ||||
| 	CERT_QUERY_CONTENT_FLAG_PFX_AND_LOAD       = (1 << CERT_QUERY_CONTENT_PFX_AND_LOAD) | ||||
| 	CERT_QUERY_CONTENT_FLAG_ALL                = (CERT_QUERY_CONTENT_FLAG_CERT | CERT_QUERY_CONTENT_FLAG_CTL | CERT_QUERY_CONTENT_FLAG_CRL | CERT_QUERY_CONTENT_FLAG_SERIALIZED_STORE | CERT_QUERY_CONTENT_FLAG_SERIALIZED_CERT | CERT_QUERY_CONTENT_FLAG_SERIALIZED_CTL | CERT_QUERY_CONTENT_FLAG_SERIALIZED_CRL | CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED | CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED | CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED_EMBED | CERT_QUERY_CONTENT_FLAG_PKCS10 | CERT_QUERY_CONTENT_FLAG_PFX | CERT_QUERY_CONTENT_FLAG_CERT_PAIR) | ||||
| 	CERT_QUERY_CONTENT_FLAG_ALL_ISSUER_CERT    = (CERT_QUERY_CONTENT_FLAG_CERT | CERT_QUERY_CONTENT_FLAG_SERIALIZED_STORE | CERT_QUERY_CONTENT_FLAG_SERIALIZED_CERT | CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED | CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED) | ||||
|  | ||||
| 	/* CryptQueryObject format type flags */ | ||||
| 	CERT_QUERY_FORMAT_BINARY                     = 1 | ||||
| 	CERT_QUERY_FORMAT_BASE64_ENCODED             = 2 | ||||
| 	CERT_QUERY_FORMAT_ASN_ASCII_HEX_ENCODED      = 3 | ||||
| 	CERT_QUERY_FORMAT_FLAG_BINARY                = (1 << CERT_QUERY_FORMAT_BINARY) | ||||
| 	CERT_QUERY_FORMAT_FLAG_BASE64_ENCODED        = (1 << CERT_QUERY_FORMAT_BASE64_ENCODED) | ||||
| 	CERT_QUERY_FORMAT_FLAG_ASN_ASCII_HEX_ENCODED = (1 << CERT_QUERY_FORMAT_ASN_ASCII_HEX_ENCODED) | ||||
| 	CERT_QUERY_FORMAT_FLAG_ALL                   = (CERT_QUERY_FORMAT_FLAG_BINARY | CERT_QUERY_FORMAT_FLAG_BASE64_ENCODED | CERT_QUERY_FORMAT_FLAG_ASN_ASCII_HEX_ENCODED) | ||||
|  | ||||
| 	/* CertGetNameString name types */ | ||||
| 	CERT_NAME_EMAIL_TYPE            = 1 | ||||
| 	CERT_NAME_RDN_TYPE              = 2 | ||||
| 	CERT_NAME_ATTR_TYPE             = 3 | ||||
| 	CERT_NAME_SIMPLE_DISPLAY_TYPE   = 4 | ||||
| 	CERT_NAME_FRIENDLY_DISPLAY_TYPE = 5 | ||||
| 	CERT_NAME_DNS_TYPE              = 6 | ||||
| 	CERT_NAME_URL_TYPE              = 7 | ||||
| 	CERT_NAME_UPN_TYPE              = 8 | ||||
|  | ||||
| 	/* CertGetNameString flags */ | ||||
| 	CERT_NAME_ISSUER_FLAG              = 0x1 | ||||
| 	CERT_NAME_DISABLE_IE4_UTF8_FLAG    = 0x10000 | ||||
| 	CERT_NAME_SEARCH_ALL_NAMES_FLAG    = 0x2 | ||||
| 	CERT_NAME_STR_ENABLE_PUNYCODE_FLAG = 0x00200000 | ||||
|  | ||||
| 	/* AuthType values for SSLExtraCertChainPolicyPara struct */ | ||||
| 	AUTHTYPE_CLIENT = 1 | ||||
| 	AUTHTYPE_SERVER = 2 | ||||
| @@ -437,6 +498,22 @@ const ( | ||||
| 	SECURITY_FLAG_IGNORE_WRONG_USAGE       = 0x00000200 | ||||
| 	SECURITY_FLAG_IGNORE_CERT_CN_INVALID   = 0x00001000 | ||||
| 	SECURITY_FLAG_IGNORE_CERT_DATE_INVALID = 0x00002000 | ||||
|  | ||||
| 	/* Flags for Crypt[Un]ProtectData */ | ||||
| 	CRYPTPROTECT_UI_FORBIDDEN      = 0x1 | ||||
| 	CRYPTPROTECT_LOCAL_MACHINE     = 0x4 | ||||
| 	CRYPTPROTECT_CRED_SYNC         = 0x8 | ||||
| 	CRYPTPROTECT_AUDIT             = 0x10 | ||||
| 	CRYPTPROTECT_NO_RECOVERY       = 0x20 | ||||
| 	CRYPTPROTECT_VERIFY_PROTECTION = 0x40 | ||||
| 	CRYPTPROTECT_CRED_REGENERATE   = 0x80 | ||||
|  | ||||
| 	/* Flags for CryptProtectPromptStruct */ | ||||
| 	CRYPTPROTECT_PROMPT_ON_UNPROTECT   = 1 | ||||
| 	CRYPTPROTECT_PROMPT_ON_PROTECT     = 2 | ||||
| 	CRYPTPROTECT_PROMPT_RESERVED       = 4 | ||||
| 	CRYPTPROTECT_PROMPT_STRONG         = 8 | ||||
| 	CRYPTPROTECT_PROMPT_REQUIRE_STRONG = 16 | ||||
| ) | ||||
|  | ||||
| const ( | ||||
| @@ -459,10 +536,58 @@ const ( | ||||
| 	REALTIME_PRIORITY_CLASS       = 0x00000100 | ||||
| ) | ||||
|  | ||||
| /* wintrust.h constants for WinVerifyTrustEx */ | ||||
| const ( | ||||
| 	WTD_UI_ALL    = 1 | ||||
| 	WTD_UI_NONE   = 2 | ||||
| 	WTD_UI_NOBAD  = 3 | ||||
| 	WTD_UI_NOGOOD = 4 | ||||
|  | ||||
| 	WTD_REVOKE_NONE       = 0 | ||||
| 	WTD_REVOKE_WHOLECHAIN = 1 | ||||
|  | ||||
| 	WTD_CHOICE_FILE    = 1 | ||||
| 	WTD_CHOICE_CATALOG = 2 | ||||
| 	WTD_CHOICE_BLOB    = 3 | ||||
| 	WTD_CHOICE_SIGNER  = 4 | ||||
| 	WTD_CHOICE_CERT    = 5 | ||||
|  | ||||
| 	WTD_STATEACTION_IGNORE           = 0x00000000 | ||||
| 	WTD_STATEACTION_VERIFY           = 0x00000010 | ||||
| 	WTD_STATEACTION_CLOSE            = 0x00000002 | ||||
| 	WTD_STATEACTION_AUTO_CACHE       = 0x00000003 | ||||
| 	WTD_STATEACTION_AUTO_CACHE_FLUSH = 0x00000004 | ||||
|  | ||||
| 	WTD_USE_IE4_TRUST_FLAG                  = 0x1 | ||||
| 	WTD_NO_IE4_CHAIN_FLAG                   = 0x2 | ||||
| 	WTD_NO_POLICY_USAGE_FLAG                = 0x4 | ||||
| 	WTD_REVOCATION_CHECK_NONE               = 0x10 | ||||
| 	WTD_REVOCATION_CHECK_END_CERT           = 0x20 | ||||
| 	WTD_REVOCATION_CHECK_CHAIN              = 0x40 | ||||
| 	WTD_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT = 0x80 | ||||
| 	WTD_SAFER_FLAG                          = 0x100 | ||||
| 	WTD_HASH_ONLY_FLAG                      = 0x200 | ||||
| 	WTD_USE_DEFAULT_OSVER_CHECK             = 0x400 | ||||
| 	WTD_LIFETIME_SIGNING_FLAG               = 0x800 | ||||
| 	WTD_CACHE_ONLY_URL_RETRIEVAL            = 0x1000 | ||||
| 	WTD_DISABLE_MD2_MD4                     = 0x2000 | ||||
| 	WTD_MOTW                                = 0x4000 | ||||
|  | ||||
| 	WTD_UICONTEXT_EXECUTE = 0 | ||||
| 	WTD_UICONTEXT_INSTALL = 1 | ||||
| ) | ||||
|  | ||||
| var ( | ||||
| 	OID_PKIX_KP_SERVER_AUTH = []byte("1.3.6.1.5.5.7.3.1\x00") | ||||
| 	OID_SERVER_GATED_CRYPTO = []byte("1.3.6.1.4.1.311.10.3.3\x00") | ||||
| 	OID_SGC_NETSCAPE        = []byte("2.16.840.1.113730.4.1\x00") | ||||
|  | ||||
| 	WINTRUST_ACTION_GENERIC_VERIFY_V2 = GUID{ | ||||
| 		Data1: 0xaac56b, | ||||
| 		Data2: 0xcd44, | ||||
| 		Data3: 0x11d0, | ||||
| 		Data4: [8]byte{0x8c, 0xc2, 0x0, 0xc0, 0x4f, 0xc2, 0x95, 0xee}, | ||||
| 	} | ||||
| ) | ||||
|  | ||||
| // Pointer represents a pointer to an arbitrary Windows type. | ||||
| @@ -1051,7 +1176,57 @@ type MibIfRow struct { | ||||
| } | ||||
|  | ||||
| type CertInfo struct { | ||||
| 	// Not implemented | ||||
| 	Version              uint32 | ||||
| 	SerialNumber         CryptIntegerBlob | ||||
| 	SignatureAlgorithm   CryptAlgorithmIdentifier | ||||
| 	Issuer               CertNameBlob | ||||
| 	NotBefore            Filetime | ||||
| 	NotAfter             Filetime | ||||
| 	Subject              CertNameBlob | ||||
| 	SubjectPublicKeyInfo CertPublicKeyInfo | ||||
| 	IssuerUniqueId       CryptBitBlob | ||||
| 	SubjectUniqueId      CryptBitBlob | ||||
| 	CountExtensions      uint32 | ||||
| 	Extensions           *CertExtension | ||||
| } | ||||
|  | ||||
| type CertExtension struct { | ||||
| 	ObjId    *byte | ||||
| 	Critical int32 | ||||
| 	Value    CryptObjidBlob | ||||
| } | ||||
|  | ||||
| type CryptAlgorithmIdentifier struct { | ||||
| 	ObjId      *byte | ||||
| 	Parameters CryptObjidBlob | ||||
| } | ||||
|  | ||||
| type CertPublicKeyInfo struct { | ||||
| 	Algorithm CryptAlgorithmIdentifier | ||||
| 	PublicKey CryptBitBlob | ||||
| } | ||||
|  | ||||
| type DataBlob struct { | ||||
| 	Size uint32 | ||||
| 	Data *byte | ||||
| } | ||||
| type CryptIntegerBlob DataBlob | ||||
| type CryptUintBlob DataBlob | ||||
| type CryptObjidBlob DataBlob | ||||
| type CertNameBlob DataBlob | ||||
| type CertRdnValueBlob DataBlob | ||||
| type CertBlob DataBlob | ||||
| type CrlBlob DataBlob | ||||
| type CryptDataBlob DataBlob | ||||
| type CryptHashBlob DataBlob | ||||
| type CryptDigestBlob DataBlob | ||||
| type CryptDerBlob DataBlob | ||||
| type CryptAttrBlob DataBlob | ||||
|  | ||||
| type CryptBitBlob struct { | ||||
| 	Size       uint32 | ||||
| 	Data       *byte | ||||
| 	UnusedBits uint32 | ||||
| } | ||||
|  | ||||
| type CertContext struct { | ||||
| @@ -1157,9 +1332,64 @@ type CertChainPolicyStatus struct { | ||||
| 	ExtraPolicyStatus Pointer | ||||
| } | ||||
|  | ||||
| type CryptDataBlob struct { | ||||
| 	Size uint32 | ||||
| 	Data *byte | ||||
| type CertPolicyInfo struct { | ||||
| 	Identifier      *byte | ||||
| 	CountQualifiers uint32 | ||||
| 	Qualifiers      *CertPolicyQualifierInfo | ||||
| } | ||||
|  | ||||
| type CertPoliciesInfo struct { | ||||
| 	Count       uint32 | ||||
| 	PolicyInfos *CertPolicyInfo | ||||
| } | ||||
|  | ||||
| type CertPolicyQualifierInfo struct { | ||||
| 	// Not implemented | ||||
| } | ||||
|  | ||||
| type CertStrongSignPara struct { | ||||
| 	Size                      uint32 | ||||
| 	InfoChoice                uint32 | ||||
| 	InfoOrSerializedInfoOrOID unsafe.Pointer | ||||
| } | ||||
|  | ||||
| type CryptProtectPromptStruct struct { | ||||
| 	Size        uint32 | ||||
| 	PromptFlags uint32 | ||||
| 	App         HWND | ||||
| 	Prompt      *uint16 | ||||
| } | ||||
|  | ||||
| type WinTrustData struct { | ||||
| 	Size                            uint32 | ||||
| 	PolicyCallbackData              uintptr | ||||
| 	SIPClientData                   uintptr | ||||
| 	UIChoice                        uint32 | ||||
| 	RevocationChecks                uint32 | ||||
| 	UnionChoice                     uint32 | ||||
| 	FileOrCatalogOrBlobOrSgnrOrCert unsafe.Pointer | ||||
| 	StateAction                     uint32 | ||||
| 	StateData                       Handle | ||||
| 	URLReference                    *uint16 | ||||
| 	ProvFlags                       uint32 | ||||
| 	UIContext                       uint32 | ||||
| 	SignatureSettings               *WinTrustSignatureSettings | ||||
| } | ||||
|  | ||||
| type WinTrustFileInfo struct { | ||||
| 	Size         uint32 | ||||
| 	FilePath     *uint16 | ||||
| 	File         Handle | ||||
| 	KnownSubject *GUID | ||||
| } | ||||
|  | ||||
| type WinTrustSignatureSettings struct { | ||||
| 	Size             uint32 | ||||
| 	Index            uint32 | ||||
| 	Flags            uint32 | ||||
| 	SecondarySigs    uint32 | ||||
| 	VerifiedSigIndex uint32 | ||||
| 	CryptoPolicy     *CertStrongSignPara | ||||
| } | ||||
|  | ||||
| const ( | ||||
|   | ||||
							
								
								
									
										108
									
								
								vendor/golang.org/x/sys/windows/zsyscall_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										108
									
								
								vendor/golang.org/x/sys/windows/zsyscall_windows.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -51,6 +51,7 @@ var ( | ||||
| 	modshell32  = NewLazySystemDLL("shell32.dll") | ||||
| 	moduser32   = NewLazySystemDLL("user32.dll") | ||||
| 	moduserenv  = NewLazySystemDLL("userenv.dll") | ||||
| 	modwintrust = NewLazySystemDLL("wintrust.dll") | ||||
| 	modws2_32   = NewLazySystemDLL("ws2_32.dll") | ||||
| 	modwtsapi32 = NewLazySystemDLL("wtsapi32.dll") | ||||
|  | ||||
| @@ -145,12 +146,18 @@ var ( | ||||
| 	procCertDeleteCertificateFromStore                       = modcrypt32.NewProc("CertDeleteCertificateFromStore") | ||||
| 	procCertDuplicateCertificateContext                      = modcrypt32.NewProc("CertDuplicateCertificateContext") | ||||
| 	procCertEnumCertificatesInStore                          = modcrypt32.NewProc("CertEnumCertificatesInStore") | ||||
| 	procCertFindExtension                                    = modcrypt32.NewProc("CertFindExtension") | ||||
| 	procCertFreeCertificateChain                             = modcrypt32.NewProc("CertFreeCertificateChain") | ||||
| 	procCertFreeCertificateContext                           = modcrypt32.NewProc("CertFreeCertificateContext") | ||||
| 	procCertGetCertificateChain                              = modcrypt32.NewProc("CertGetCertificateChain") | ||||
| 	procCertGetNameStringW                                   = modcrypt32.NewProc("CertGetNameStringW") | ||||
| 	procCertOpenStore                                        = modcrypt32.NewProc("CertOpenStore") | ||||
| 	procCertOpenSystemStoreW                                 = modcrypt32.NewProc("CertOpenSystemStoreW") | ||||
| 	procCertVerifyCertificateChainPolicy                     = modcrypt32.NewProc("CertVerifyCertificateChainPolicy") | ||||
| 	procCryptDecodeObject                                    = modcrypt32.NewProc("CryptDecodeObject") | ||||
| 	procCryptProtectData                                     = modcrypt32.NewProc("CryptProtectData") | ||||
| 	procCryptQueryObject                                     = modcrypt32.NewProc("CryptQueryObject") | ||||
| 	procCryptUnprotectData                                   = modcrypt32.NewProc("CryptUnprotectData") | ||||
| 	procPFXImportCertStore                                   = modcrypt32.NewProc("PFXImportCertStore") | ||||
| 	procDnsNameCompare_W                                     = moddnsapi.NewProc("DnsNameCompare_W") | ||||
| 	procDnsQuery_W                                           = moddnsapi.NewProc("DnsQuery_W") | ||||
| @@ -183,9 +190,12 @@ var ( | ||||
| 	procDuplicateHandle                                      = modkernel32.NewProc("DuplicateHandle") | ||||
| 	procExitProcess                                          = modkernel32.NewProc("ExitProcess") | ||||
| 	procFindClose                                            = modkernel32.NewProc("FindClose") | ||||
| 	procFindCloseChangeNotification                          = modkernel32.NewProc("FindCloseChangeNotification") | ||||
| 	procFindFirstChangeNotificationW                         = modkernel32.NewProc("FindFirstChangeNotificationW") | ||||
| 	procFindFirstFileW                                       = modkernel32.NewProc("FindFirstFileW") | ||||
| 	procFindFirstVolumeMountPointW                           = modkernel32.NewProc("FindFirstVolumeMountPointW") | ||||
| 	procFindFirstVolumeW                                     = modkernel32.NewProc("FindFirstVolumeW") | ||||
| 	procFindNextChangeNotification                           = modkernel32.NewProc("FindNextChangeNotification") | ||||
| 	procFindNextFileW                                        = modkernel32.NewProc("FindNextFileW") | ||||
| 	procFindNextVolumeMountPointW                            = modkernel32.NewProc("FindNextVolumeMountPointW") | ||||
| 	procFindNextVolumeW                                      = modkernel32.NewProc("FindNextVolumeW") | ||||
| @@ -347,6 +357,7 @@ var ( | ||||
| 	procCreateEnvironmentBlock                               = moduserenv.NewProc("CreateEnvironmentBlock") | ||||
| 	procDestroyEnvironmentBlock                              = moduserenv.NewProc("DestroyEnvironmentBlock") | ||||
| 	procGetUserProfileDirectoryW                             = moduserenv.NewProc("GetUserProfileDirectoryW") | ||||
| 	procWinVerifyTrustEx                                     = modwintrust.NewProc("WinVerifyTrustEx") | ||||
| 	procFreeAddrInfoW                                        = modws2_32.NewProc("FreeAddrInfoW") | ||||
| 	procGetAddrInfoW                                         = modws2_32.NewProc("GetAddrInfoW") | ||||
| 	procWSACleanup                                           = modws2_32.NewProc("WSACleanup") | ||||
| @@ -1199,6 +1210,12 @@ func CertEnumCertificatesInStore(store Handle, prevContext *CertContext) (contex | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func CertFindExtension(objId *byte, countExtensions uint32, extensions *CertExtension) (ret *CertExtension) { | ||||
| 	r0, _, _ := syscall.Syscall(procCertFindExtension.Addr(), 3, uintptr(unsafe.Pointer(objId)), uintptr(countExtensions), uintptr(unsafe.Pointer(extensions))) | ||||
| 	ret = (*CertExtension)(unsafe.Pointer(r0)) | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func CertFreeCertificateChain(ctx *CertChainContext) { | ||||
| 	syscall.Syscall(procCertFreeCertificateChain.Addr(), 1, uintptr(unsafe.Pointer(ctx)), 0, 0) | ||||
| 	return | ||||
| @@ -1220,6 +1237,12 @@ func CertGetCertificateChain(engine Handle, leaf *CertContext, time *Filetime, a | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func CertGetNameString(certContext *CertContext, nameType uint32, flags uint32, typePara unsafe.Pointer, name *uint16, size uint32) (chars uint32) { | ||||
| 	r0, _, _ := syscall.Syscall6(procCertGetNameStringW.Addr(), 6, uintptr(unsafe.Pointer(certContext)), uintptr(nameType), uintptr(flags), uintptr(typePara), uintptr(unsafe.Pointer(name)), uintptr(size)) | ||||
| 	chars = uint32(r0) | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func CertOpenStore(storeProvider uintptr, msgAndCertEncodingType uint32, cryptProv uintptr, flags uint32, para uintptr) (handle Handle, err error) { | ||||
| 	r0, _, e1 := syscall.Syscall6(procCertOpenStore.Addr(), 5, uintptr(storeProvider), uintptr(msgAndCertEncodingType), uintptr(cryptProv), uintptr(flags), uintptr(para), 0) | ||||
| 	handle = Handle(r0) | ||||
| @@ -1246,6 +1269,38 @@ func CertVerifyCertificateChainPolicy(policyOID uintptr, chain *CertChainContext | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func CryptDecodeObject(encodingType uint32, structType *byte, encodedBytes *byte, lenEncodedBytes uint32, flags uint32, decoded unsafe.Pointer, decodedLen *uint32) (err error) { | ||||
| 	r1, _, e1 := syscall.Syscall9(procCryptDecodeObject.Addr(), 7, uintptr(encodingType), uintptr(unsafe.Pointer(structType)), uintptr(unsafe.Pointer(encodedBytes)), uintptr(lenEncodedBytes), uintptr(flags), uintptr(decoded), uintptr(unsafe.Pointer(decodedLen)), 0, 0) | ||||
| 	if r1 == 0 { | ||||
| 		err = errnoErr(e1) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func CryptProtectData(dataIn *DataBlob, name *uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) { | ||||
| 	r1, _, e1 := syscall.Syscall9(procCryptProtectData.Addr(), 7, uintptr(unsafe.Pointer(dataIn)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(optionalEntropy)), uintptr(reserved), uintptr(unsafe.Pointer(promptStruct)), uintptr(flags), uintptr(unsafe.Pointer(dataOut)), 0, 0) | ||||
| 	if r1 == 0 { | ||||
| 		err = errnoErr(e1) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func CryptQueryObject(objectType uint32, object unsafe.Pointer, expectedContentTypeFlags uint32, expectedFormatTypeFlags uint32, flags uint32, msgAndCertEncodingType *uint32, contentType *uint32, formatType *uint32, certStore *Handle, msg *Handle, context *unsafe.Pointer) (err error) { | ||||
| 	r1, _, e1 := syscall.Syscall12(procCryptQueryObject.Addr(), 11, uintptr(objectType), uintptr(object), uintptr(expectedContentTypeFlags), uintptr(expectedFormatTypeFlags), uintptr(flags), uintptr(unsafe.Pointer(msgAndCertEncodingType)), uintptr(unsafe.Pointer(contentType)), uintptr(unsafe.Pointer(formatType)), uintptr(unsafe.Pointer(certStore)), uintptr(unsafe.Pointer(msg)), uintptr(unsafe.Pointer(context)), 0) | ||||
| 	if r1 == 0 { | ||||
| 		err = errnoErr(e1) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func CryptUnprotectData(dataIn *DataBlob, name **uint16, optionalEntropy *DataBlob, reserved uintptr, promptStruct *CryptProtectPromptStruct, flags uint32, dataOut *DataBlob) (err error) { | ||||
| 	r1, _, e1 := syscall.Syscall9(procCryptUnprotectData.Addr(), 7, uintptr(unsafe.Pointer(dataIn)), uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(optionalEntropy)), uintptr(reserved), uintptr(unsafe.Pointer(promptStruct)), uintptr(flags), uintptr(unsafe.Pointer(dataOut)), 0, 0) | ||||
| 	if r1 == 0 { | ||||
| 		err = errnoErr(e1) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func PFXImportCertStore(pfx *CryptDataBlob, password *uint16, flags uint32) (store Handle, err error) { | ||||
| 	r0, _, e1 := syscall.Syscall(procPFXImportCertStore.Addr(), 3, uintptr(unsafe.Pointer(pfx)), uintptr(unsafe.Pointer(password)), uintptr(flags)) | ||||
| 	store = Handle(r0) | ||||
| @@ -1525,6 +1580,36 @@ func FindClose(handle Handle) (err error) { | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func FindCloseChangeNotification(handle Handle) (err error) { | ||||
| 	r1, _, e1 := syscall.Syscall(procFindCloseChangeNotification.Addr(), 1, uintptr(handle), 0, 0) | ||||
| 	if r1 == 0 { | ||||
| 		err = errnoErr(e1) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func FindFirstChangeNotification(path string, watchSubtree bool, notifyFilter uint32) (handle Handle, err error) { | ||||
| 	var _p0 *uint16 | ||||
| 	_p0, err = syscall.UTF16PtrFromString(path) | ||||
| 	if err != nil { | ||||
| 		return | ||||
| 	} | ||||
| 	return _FindFirstChangeNotification(_p0, watchSubtree, notifyFilter) | ||||
| } | ||||
|  | ||||
| func _FindFirstChangeNotification(path *uint16, watchSubtree bool, notifyFilter uint32) (handle Handle, err error) { | ||||
| 	var _p1 uint32 | ||||
| 	if watchSubtree { | ||||
| 		_p1 = 1 | ||||
| 	} | ||||
| 	r0, _, e1 := syscall.Syscall(procFindFirstChangeNotificationW.Addr(), 3, uintptr(unsafe.Pointer(path)), uintptr(_p1), uintptr(notifyFilter)) | ||||
| 	handle = Handle(r0) | ||||
| 	if handle == InvalidHandle { | ||||
| 		err = errnoErr(e1) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func findFirstFile1(name *uint16, data *win32finddata1) (handle Handle, err error) { | ||||
| 	r0, _, e1 := syscall.Syscall(procFindFirstFileW.Addr(), 2, uintptr(unsafe.Pointer(name)), uintptr(unsafe.Pointer(data)), 0) | ||||
| 	handle = Handle(r0) | ||||
| @@ -1552,6 +1637,14 @@ func FindFirstVolume(volumeName *uint16, bufferLength uint32) (handle Handle, er | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func FindNextChangeNotification(handle Handle) (err error) { | ||||
| 	r1, _, e1 := syscall.Syscall(procFindNextChangeNotification.Addr(), 1, uintptr(handle), 0, 0) | ||||
| 	if r1 == 0 { | ||||
| 		err = errnoErr(e1) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func findNextFile1(handle Handle, data *win32finddata1) (err error) { | ||||
| 	r1, _, e1 := syscall.Syscall(procFindNextFileW.Addr(), 2, uintptr(handle), uintptr(unsafe.Pointer(data)), 0) | ||||
| 	if r1 == 0 { | ||||
| @@ -2904,9 +2997,12 @@ func GetShellWindow() (shellWindow HWND) { | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func GetWindowThreadProcessId(hwnd HWND, pid *uint32) (tid uint32) { | ||||
| 	r0, _, _ := syscall.Syscall(procGetWindowThreadProcessId.Addr(), 2, uintptr(hwnd), uintptr(unsafe.Pointer(pid)), 0) | ||||
| func GetWindowThreadProcessId(hwnd HWND, pid *uint32) (tid uint32, err error) { | ||||
| 	r0, _, e1 := syscall.Syscall(procGetWindowThreadProcessId.Addr(), 2, uintptr(hwnd), uintptr(unsafe.Pointer(pid)), 0) | ||||
| 	tid = uint32(r0) | ||||
| 	if tid == 0 { | ||||
| 		err = errnoErr(e1) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| @@ -2947,6 +3043,14 @@ func GetUserProfileDirectory(t Token, dir *uint16, dirLen *uint32) (err error) { | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func WinVerifyTrustEx(hwnd HWND, actionId *GUID, data *WinTrustData) (ret error) { | ||||
| 	r0, _, _ := syscall.Syscall(procWinVerifyTrustEx.Addr(), 3, uintptr(hwnd), uintptr(unsafe.Pointer(actionId)), uintptr(unsafe.Pointer(data))) | ||||
| 	if r0 != 0 { | ||||
| 		ret = syscall.Errno(r0) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| func FreeAddrInfoW(addrinfo *AddrinfoW) { | ||||
| 	syscall.Syscall(procFreeAddrInfoW.Addr(), 1, uintptr(unsafe.Pointer(addrinfo)), 0, 0) | ||||
| 	return | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Tonis Tiigi
					Tonis Tiigi