Leaked source code of windows server 2003
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
|
TARGETNAME=dload TARGETPATH=obj TARGETTYPE=LIBRARY
PASS0_PUBLISH={dloadexcept.h=$(BASE_INC_PATH)\dloadexcept.h} PASS1_PUBLISH={$(O)\dload.lib=$(BASE_LIB_PATH)\dload.lib}
INCLUDES=$(INCLUDES);$(BASE_INC_PATH)
C_DEFINES=-DWIN32 -DUNICODE -D_UNICODE PRECOMPILED_INCLUDE=pch.h MSC_WARNING_LEVEL=/W3 /WX UMTYPE=windows
SOURCES=\ advapi.c \ dllmap.c \ dload.c \ downlevel_dload.c \ lookup.c \ dloaddefaultbreak.c \ dloaddefaulttrace.c \ wmi.c
OBJLIBFILES=\ $(ADMIN_LIB_PATH)\dloadadmin.lib \ $(BASE_LIB_PATH)\dloadbase.lib \ $(COM_LIB_PATH)\dloadcom.lib \ $(DS_LIB_PATH)\dloadds.lib \ $(ENDUSER_LIB_PATH)\dloadenduser.lib \ $(INETCORE_LIB_PATH)\dloadinetcore.lib \ $(INETSRV_LIB_PATH)\dloadinetsrv.lib \ $(MULTIMEDIA_LIB_PATH)\dloadmultimedia.lib \ $(NET_LIB_PATH)\dloadnet.lib \ $(PRINTSCAN_LIB_PATH)\dloadprintscan.lib \ $(SDKTOOLS_LIB_PATH)\dloadsdktools.lib \ $(SHELL_LIB_PATH)\dloadshell.lib \ $(TERMSRV_LIB_PATH)\dloadtermsrv.lib \ $(WINDOWS_LIB_PATH)\dloadwindows.lib
# No overflow detection in kernel32.dll BUFFER_OVERFLOW_CHECKS=0
|