Artifact 73049331b65677f82178b6f564e62452f060ceec
- File
src/win32/rpcnterr.d
-
2015-05-05 06:49:05
- part of checkin
[9b639cf2d6]
on branch trunk
- Working version for update to 2.067.
The problem was __gshared. Replacing it with TLS fixed the issue. Remaining problem is that "hack.d"'s CloseHandle hack is not working anymore.
(user: kinaba) [annotate]
-
2015-05-05 06:49:05
- part of checkin
[9b639cf2d6]
on branch trunk
- Working version for update to 2.067.
/***********************************************************************\ * rpcnterr.d * * * * Windows API header module * * * * Translated from MinGW Windows headers * * * * Placed into public domain * \***********************************************************************/ module win32.rpcnterr; import win32.winerror; enum : uint { RPC_S_OK = ERROR_SUCCESS, RPC_S_INVALID_ARG = ERROR_INVALID_PARAMETER, RPC_S_OUT_OF_MEMORY = ERROR_OUTOFMEMORY, RPC_S_OUT_OF_THREADS = ERROR_MAX_THRDS_REACHED, RPC_S_INVALID_LEVEL = ERROR_INVALID_PARAMETER, RPC_S_BUFFER_TOO_SMALL = ERROR_INSUFFICIENT_BUFFER, RPC_S_INVALID_SECURITY_DESC = ERROR_INVALID_SECURITY_DESCR, RPC_S_ACCESS_DENIED = ERROR_ACCESS_DENIED, RPC_S_SERVER_OUT_OF_MEMORY = ERROR_NOT_ENOUGH_SERVER_MEMORY, RPC_X_NO_MEMORY = RPC_S_OUT_OF_MEMORY, RPC_X_INVALID_BOUND = RPC_S_INVALID_BOUND, RPC_X_INVALID_TAG = RPC_S_INVALID_TAG, RPC_X_ENUM_VALUE_TOO_LARGE = RPC_X_ENUM_VALUE_OUT_OF_RANGE, RPC_X_SS_CONTEXT_MISMATCH = ERROR_INVALID_HANDLE, RPC_X_INVALID_BUFFER = ERROR_INVALID_USER_BUFFER, RPC_X_INVALID_PIPE_OPERATION = RPC_X_WRONG_PIPE_ORDER }