Artifact 73049331b65677f82178b6f564e62452f060ceec
- File
src/win32/rpcnterr.d
-
2015-05-05 06:49:05
- part of checkin
[9b639cf2d6]
on branch trunk
- Working version for update to 2.067.
The problem was __gshared. Replacing it with TLS fixed the issue. Remaining problem is that "hack.d"'s CloseHandle hack is not working anymore.
(user: kinaba) [annotate]
-
2015-05-05 06:49:05
- part of checkin
[9b639cf2d6]
on branch trunk
- Working version for update to 2.067.
/***********************************************************************\
* rpcnterr.d *
* *
* Windows API header module *
* *
* Translated from MinGW Windows headers *
* *
* Placed into public domain *
\***********************************************************************/
module win32.rpcnterr;
import win32.winerror;
enum : uint {
RPC_S_OK = ERROR_SUCCESS,
RPC_S_INVALID_ARG = ERROR_INVALID_PARAMETER,
RPC_S_OUT_OF_MEMORY = ERROR_OUTOFMEMORY,
RPC_S_OUT_OF_THREADS = ERROR_MAX_THRDS_REACHED,
RPC_S_INVALID_LEVEL = ERROR_INVALID_PARAMETER,
RPC_S_BUFFER_TOO_SMALL = ERROR_INSUFFICIENT_BUFFER,
RPC_S_INVALID_SECURITY_DESC = ERROR_INVALID_SECURITY_DESCR,
RPC_S_ACCESS_DENIED = ERROR_ACCESS_DENIED,
RPC_S_SERVER_OUT_OF_MEMORY = ERROR_NOT_ENOUGH_SERVER_MEMORY,
RPC_X_NO_MEMORY = RPC_S_OUT_OF_MEMORY,
RPC_X_INVALID_BOUND = RPC_S_INVALID_BOUND,
RPC_X_INVALID_TAG = RPC_S_INVALID_TAG,
RPC_X_ENUM_VALUE_TOO_LARGE = RPC_X_ENUM_VALUE_OUT_OF_RANGE,
RPC_X_SS_CONTEXT_MISMATCH = ERROR_INVALID_HANDLE,
RPC_X_INVALID_BUFFER = ERROR_INVALID_USER_BUFFER,
RPC_X_INVALID_PIPE_OPERATION = RPC_X_WRONG_PIPE_ORDER
}