Wine disassembly and reverse engineering rules.

Jakob Eriksson jakob at vmlinux.org
Sun Aug 5 10:26:27 CDT 2007


Peter Dons Tychsen wrote:
> By browsing MSDN, i found out that i can accomplish this by using the
> documented function StalkWalk64(), which can examine the call stack. I
> would then introduce this into the test system for DLLs like "user32".
> By running the test on original Windows we could know which messages we
> are incorrectly "posting" or "sending" where it should have been the
> opposite. This could fix some vital issues.
>
> I don't think there is a problem as i am just using documented APIs from
> MSDN, but since it includes looking at the call stack, i was curious if
> there might be a legal problem.
>
> I don't want to put the idea to use or release it if it in any way is
> illegal.
>
> Please think long and hard before you reply.
>   

DMCA Reverse engineering exemption:

http://www.chillingeffects.org/reverse/faq.cgi#QID210



regards,
Jakob




More information about the wine-devel mailing list