Add uncleaned start of internal ntdll header
Added: trunk/reactos/lib/ntdll/inc/ntdllp.h
_____
Added: trunk/reactos/lib/ntdll/inc/ntdllp.h
--- trunk/reactos/lib/ntdll/inc/ntdllp.h 2005-06-21 02:08:42 UTC
(rev 16199)
+++ trunk/reactos/lib/ntdll/inc/ntdllp.h 2005-06-21 02:11:45 UTC
(rev 16200)
@@ -0,0 +1,78 @@
+/*
+ * COPYRIGHT: See COPYING in the top level directory
+ * PROJECT: ReactOS System Libraries
+ * FILE: lib/ntdll/inc/ntdllp.h
+ * PURPOSE: Native Libary Internal Header
+ * PROGRAMMER: Alex Ionescu (alex(a)relsoft.net)
+ */
+
+/* INCLUDES
******************************************************************/
+
+/* FIXME: Cleanup this mess */
+//typedef NTSTATUS (STDCALL *PEPFUNC)(PPEB);
+NTSTATUS LdrMapSections(HANDLE ProcessHandle,
+ PVOID ImageBase,
+ HANDLE SectionHandle,
+ PIMAGE_NT_HEADERS NTHeaders);
+NTSTATUS LdrMapNTDllForProcess(HANDLE ProcessHandle,
+ PHANDLE NTDllSectionHandle);
+BOOLEAN LdrMappedAsDataFile(PVOID *BaseAddress);
+ULONG
+LdrpGetResidentSize(PIMAGE_NT_HEADERS NTHeaders);
+PEPFUNC LdrPEStartup (PVOID ImageBase,
+ HANDLE SectionHandle,
+ PLDR_MODULE* Module,
+ PWSTR FullDosName);
+#if 0
+typedef BOOL
+(STDCALL *PDLLMAIN_FUNC)(HANDLE hInst,
+ ULONG ul_reason_for_call,
+ LPVOID lpReserved);
+#endif
+VOID
+STDCALL
+RtlpInitDeferedCriticalSection(
+ VOID
+);
+#if defined(KDBG) || defined(DBG)
+VOID
+LdrpLoadUserModuleSymbols(PLDR_MODULE LdrModule);
+#endif
+extern HANDLE WindowsApiPort;
+
+NTSTATUS
+STDCALL
+RtlpWaitForCriticalSection(
+ PRTL_CRITICAL_SECTION CriticalSection
+);
+
+VOID
+STDCALL
+RtlpUnWaitCriticalSection(
+ PRTL_CRITICAL_SECTION CriticalSection
+);
+
+VOID
+STDCALL
+RtlpCreateCriticalSectionSem(
+ PRTL_CRITICAL_SECTION CriticalSection
+);
+
+VOID
+STDCALL
+RtlpInitDeferedCriticalSection(
+ VOID
+);
+
+VOID
+STDCALL
+RtlpFreeDebugInfo(
+ PRTL_CRITICAL_SECTION_DEBUG DebugInfo
+);
+
+PRTL_CRITICAL_SECTION_DEBUG
+STDCALL
+RtlpAllocateDebugInfo(
+ VOID
+);
+/* EOF */