Wine disassembly and reverse engineering rules.
Jakob Eriksson
jakob at vmlinux.org
Sun Aug 5 10:26:27 CDT 2007
Peter Dons Tychsen wrote:
> By browsing MSDN, i found out that i can accomplish this by using the
> documented function StalkWalk64(), which can examine the call stack. I
> would then introduce this into the test system for DLLs like "user32".
> By running the test on original Windows we could know which messages we
> are incorrectly "posting" or "sending" where it should have been the
> opposite. This could fix some vital issues.
>
> I don't think there is a problem as i am just using documented APIs from
> MSDN, but since it includes looking at the call stack, i was curious if
> there might be a legal problem.
>
> I don't want to put the idea to use or release it if it in any way is
> illegal.
>
> Please think long and hard before you reply.
>
DMCA Reverse engineering exemption:
http://www.chillingeffects.org/reverse/faq.cgi#QID210
regards,
Jakob
More information about the wine-devel
mailing list