windows-nt/Source/XPSP1/NT/com/oleutest/channel/hook/sources
2020-09-26 16:20:57 +08:00

59 lines
1.5 KiB
Plaintext

MAJORCOMP = cairole
MINORCOMP = com
#
# This is the name of the target built from the source files specified
# below. The name should include neither the path nor the file extension.
#
TARGETNAME= hook
TARGETPATH= obj
#
# This specifies the type of the target, such as PROGRAM, DYNLINK, LIBRARY,
# etc.
#
TARGETTYPE= DYNLINK
DLLDEF= prxydll.def
DLLBASE= 0x40000000
DLLENTRY= DllMain
#LINKER_FLAGS=-DEF:prxydll.def
INCLUDES= ..\idl;..\app;$(BASEDIR)\private\dcomidl\daytona;$(BASEDIR)\private\dcomidl\obj
C_DEFINES= \
$(C_DEFINES) \
-DFLAT \
-DWIN32=100 \
-D_NT1X_=100 \
-DUNICODE \
-D_UNICODE \
-DNOEXCEPTIONS \
-DCAIROLE_DOWNLEVEL
#
SOURCES= \
hook.cxx
UMTYPE= console
TARGETLIBS= \
$(SDK_LIB_PATH)\uuid.lib \
$(SDK_LIB_PATH)\ole32.lib \
$(SDK_LIB_PATH)\rpcndr.lib \
$(SDK_LIB_PATH)\rpcrt4.lib \
$(SDK_LIB_PATH)\rpcns4.lib \
$(SDK_LIB_PATH)\mpr.lib \
$(SDK_LIB_PATH)\netapi32.lib \
$(SDK_LIB_PATH)\kernel32.lib \
$(SDK_LIB_PATH)\user32.lib \
$(SDK_LIB_PATH)\advapi32.lib \
$(SDK_LIB_PATH)\wsock32.lib \
$(SDK_LIB_PATH)\security.lib