TORN@DO presents: cRACKER's n0TES
API Details for Registry Accesses


RegCreateKeyA / RegCreateKeyW
The RegCreateKey function creates the specified key. If the key already exists in the registry, the function opens it. This function is provided for compatibility with Windows version 3.1. Win32-based applications should use the RegCreateKeyEx function.
     LONG RegCreateKey(
      HKEY  hKey,	                       // handle of an open key 
      LPCTSTR  lpszSubKey,	               // address of name of subkey to open 
      PHKEY  phkResult 	                       // address of buffer for opened handle 
     );
Returns
If the function succeeds, the return value is ERROR_SUCCESS.

If the function fails, the return value is an error value.




RegCreateKeyExA / RegCreateKeyExW
The RegCreateKeyEx function creates the specified key. If the key already exists in the registry, the function opens it.
    LONG RegCreateKeyEx(
      HKEY  hKey,	                       // handle of an open key 
      LPCTSTR  lpszSubKey,	               // address of subkey name 
      DWORD  dwReserved,	               // reserved 
      LPTSTR  lpszClass,	               // address of class string 
      DWORD  fdwOptions,	               // special options flag 
      REGSAM  samDesired,	               // desired security access 
      LPSECURITY_ATTRIBUTES  lpSecurityAttributes, // address of key security structure 
      PHKEY  phkResult,	                       // address of buffer for opened handle  
      LPDWORD  lpdwDisposition 	               // address of disposition value buffer 
     );	
Returns
If the function succeeds, the return value is ERROR_SUCCESS.

If the function fails, the return value is an error value.




RegDeleteKeyA / RegDeleteKeyW
The RegDeleteKey function deletes a key and all its descendents.
     LONG RegDeleteKey(
      HKEY  hKey,	                      // handle of open key 
      LPCTSTR  lpszSubKey 	              // address of name of subkey to delete 
     );
Returns
If the function succeeds, the return value is ERROR_SUCCESS.

If the function fails, the return value is an error value.




RegDeleteValueA / RegDeleteValueW
The RegDeleteValue function removes a named value from the specified registry key.
     LONG RegDeleteValue(
      HKEY  hKey,	                       // handle of key 
      LPTSTR  lpszValue 	               // address of value name 
     );
Returns
If the function succeeds, the return value is ERROR_SUCCESS.

If the function fails, the return value is an error value.




RegOpenKeyA / RegOpenKeyW
The RegOpenKey function opens the specified key. This function is provided for compatibility with Windows version 3.1. Win32-based applications should use the RegOpenKeyEx function.
     LONG RegOpenKey(
      HKEY  hKey,	                      // handle of open key 
      LPCTSTR  lpszSubKey,	              // address of name of subkey to open 
      PHKEY  phkResult 	                      // address of handle of open key 
     );
Returns
If the function succeeds, the return value is ERROR_SUCCESS.

If the function fails, the return value is an error value.




RegOpenKeyExA / RegOpenKeyExW
The RegOpenKeyEx function opens the specified key.
     LONG RegOpenKeyEx(
      HKEY  hKey,	                       // handle of open key 
      LPCTSTR  lpszSubKey,	               // address of name of subkey to open 
      DWORD  dwReserved,	               // reserved 
      REGSAM  samDesired,	               // security access mask 
      PHKEY  phkResult 	                       // address of handle of open key 
     );
Returns
If the function succeeds, the return value is ERROR_SUCCESS.

If the function fails, the return value is an error value.




RegQueryValueA / RegQueryValueW
The RegQueryValue function retrieves the value associated with the unnamed value for a specified key in the registry. Values in the registry have name, type, and data components. This function retrieves the data for a key's first value that has a NULL name. This function is provided for compatibility with Windows version 3.1. Win32-based applications should use the RegQueryValueEx function.
     LONG RegQueryValue(
      HKEY  hKey,	                       // handle of key to query 
      LPCTSTR  lpszSubKey,	               // address of name of subkey to query 
      LPTSTR  lpszValue,	               // address of buffer for ret string
      PLONG  pcbValue 	                       // address of buffer for size of ret string 
     );
Returns
If the function succeeds, the return value is ERROR_SUCCESS.

If the function fails, the return value is an error value.




RegQueryValueExA / RegQueryValueExW
The RegQueryValueEx function retrieves the type and data for a specified value name associated with an open registry key.
    LONG RegQueryValueEx(
      HKEY  hKey,	                      // handle of key to query 
      LPTSTR  lpszValueName,	              // address of name of value to query 
      LPDWORD  lpdwReserved,	              // reserved 
      LPDWORD  lpdwType,	              // address of buffer for value type 
      LPBYTE  lpbData,	                      // address of data buffer 
      LPDWORD  lpcbData 	              // address of data buffer size 
    );
Returns
If the function succeeds, the return value is ERROR_SUCCESS.

If the function fails, the return value is an error value.





The cRACKER's n0tES are divided into 10 main parts:
 00. INDEX
 01. Assembly for Crackers (CoRN2)
 02. SoftICE (Boot Menu, Setup, Commands)
 03. Breakpoints & Win API Details
        1 Crippled Programs
        2 Dialog Boxes
        3 Drive Type Checks
        4 File Accesses
        5 Registry Accesses
        6 Serial Catching
        7 Time & Date Accesses
        8 Window Generating
 04. Jump Instructions
 05. SET Instructions
 06. Tips & Tricks for Cracking
 07. Window Messages For Crackers
 08. Identifying Functions, Arguments, and Variables (Rhayader)
 09. Commerical Protection Systems
 10. Bitmanipulation (Cruehead)
 11. General Cracking Theory
 12. FAQ

 +A. How to contact me
 +B. What's New?



The cRACKER's n0TES are Copyright © 1998-2000 by TORN@DO of ID. All Rights Reserved. Archived and Re-hosted by Werdstaff