From cc03f40d9fb1d68bfd945284a3ff5067dfd8475a Mon Sep 17 00:00:00 2001 From: Amlal EL Mahrouss Date: Sun, 4 Aug 2024 23:53:30 +0200 Subject: [IMP] [unstable] User password hashing, and renamed newoskrnl.dll to newoskrnl.lib. [IMP] [unstable] Using paths for usernames. Such as \Local\Super on 192.168.2.4 for example. Signed-off-by: Amlal EL Mahrouss --- Boot/Sources/HEL/AMD64/BootMain.cxx | 4 ++-- Boot/Sources/Root/bootloader.json | 2 +- Boot/amd64-efi.make | 4 ++-- 3 files changed, 5 insertions(+), 5 deletions(-) (limited to 'Boot') diff --git a/Boot/Sources/HEL/AMD64/BootMain.cxx b/Boot/Sources/HEL/AMD64/BootMain.cxx index 2bc2aca1..d2a478c6 100644 --- a/Boot/Sources/HEL/AMD64/BootMain.cxx +++ b/Boot/Sources/HEL/AMD64/BootMain.cxx @@ -201,7 +201,7 @@ EFI_EXTERN_C EFI_API Int Main(EfiHandlePtr ImageHandle, // format the disk. // ---------------------------------------------------- // - BFileReader readerKernel(L"newoskrnl.dll", ImageHandle); + BFileReader readerKernel(L"newoskrnl.lib", ImageHandle); readerKernel.ReadAll(0); @@ -214,7 +214,7 @@ EFI_EXTERN_C EFI_API Int Main(EfiHandlePtr ImageHandle, if (readerKernel.Blob()) { loader = new Boot::ProgramLoader(readerKernel.Blob()); - loader->SetName("\"newoskrnl.dll\" (64-bit SMP DLL)"); + loader->SetName("\"newoskrnl.lib\" (64-bit SMP DLL)"); } writer.Write("newosldr: Running: ").Write(loader->GetName()).Write("\r"); diff --git a/Boot/Sources/Root/bootloader.json b/Boot/Sources/Root/bootloader.json index fe1a57d4..51cb36b5 100644 --- a/Boot/Sources/Root/bootloader.json +++ b/Boot/Sources/Root/bootloader.json @@ -1,4 +1,4 @@ { - "newoskrnl.dll": "kernel", + "newoskrnl.lib": "kernel", "ZETA/fonts.json": "rsrc" } diff --git a/Boot/amd64-efi.make b/Boot/amd64-efi.make index b8d5b771..87235cc6 100644 --- a/Boot/amd64-efi.make +++ b/Boot/amd64-efi.make @@ -50,7 +50,7 @@ FLAG_GNU=-fshort-wchar -D__EFI_x86_64__ -D__NEWOS_OTA__ -mno-red-zone -D__NEWOSK -std=c++20 -D__HAVE_MAHROUSS_APIS__ -D__NEWOS_AMD64__ -D__MAHROUSS__ -D__BOOTLOADER__ -I../ BOOT_LOADER=newosldr.exe -KERNEL=newoskrnl.dll +KERNEL=newoskrnl.lib DDK=libDDK.lib SCI=libSCI.lib @@ -97,7 +97,7 @@ download-edk: $(HTTP_GET) https://retrage.github.io/edk2-nightly/bin/DEBUGX64_OVMF.fd -O OVMF.fd BINS=*.bin -EXECUTABLES=newosldr.exe newoskrnl.dll OVMF.fd +EXECUTABLES=newosldr.exe newoskrnl.lib OVMF.fd TARGETS=$(REM_FLAG) $(OBJ) $(BIN) $(IMG) $(IMG_2) $(EXECUTABLES) -- cgit v1.2.3