http://bugs.winehq.org/show_bug.cgi?id=29168
--- Comment #64 from Dorek Biglari dbiglari@gmail.com 2011-12-30 18:18:23 CST --- Created attachment 38190 --> http://bugs.winehq.org/attachment.cgi?id=38190 a list of all the ws2_32 calls in the swtor.exe process
This file was generated using a proxy ws2_32.dll that passes calls into ws2_32 on to the real ws2_32 in c:\windows\system32, and logs the calls and the returns and return types. I added *'s around the function name which can be ignored.
Running this file through cat, and grepping out the unique function names, I generated a list of all the functions used in swtor.exe:
cat ws2_32_pid_6024.calls | gawk ' { print $3 } ' | sort | uniq
*__WSAFDIsSet* *accept* *bind* *closesocket* *connect* *freeaddrinfo* *getaddrinfo* *gethostbyname* *gethostname* *getpeername* *getsockname* *getsockopt* *htonl* *htons* *inet_addr* *ioctlsocket* *listen* *ntohl* *ntohs* *select* *setsockopt* *shutdown* *WSAAddressToStringA* *WSAGetLastError* *WSARecv* *WSASend* *WSASetLastError* *WSASocketA* *WSASocketW* *WSAStartup*