This is a live mirror of the Perl 5 development currently hosted at https://github.com/perl/perl5
[win32] misc small tweaks
[perl5.git] / win32 / win32.c
CommitLineData
68dc0745 1/* WIN32.C
2 *
3 * (c) 1995 Microsoft Corporation. All rights reserved.
4 * Developed by hip communications inc., http://info.hip.com/info/
5 * Portions (c) 1993 Intergraph Corporation. All rights reserved.
6 *
7 * You may distribute under the terms of either the GNU General Public
8 * License or the Artistic License, as specified in the README file.
9 */
0a753a76 10
11#define WIN32_LEAN_AND_MEAN
12#define WIN32IO_IS_STDIO
13#include <tchar.h>
a835ef8a
NIS
14#ifdef __GNUC__
15#define Win32_Winsock
16#endif
0a753a76 17#include <windows.h>
18
68dc0745 19/* #include "config.h" */
0a753a76 20
21#define PERLIO_NOT_STDIO 0
22#if !defined(PERLIO_IS_STDIO) && !defined(USE_SFIO)
23#define PerlIO FILE
24#endif
25
26#include "EXTERN.h"
27#include "perl.h"
ad2e33dc 28#include "XSUB.h"
0a753a76 29#include <fcntl.h>
30#include <sys/stat.h>
5b0d9cbe
NIS
31#ifndef __GNUC__
32/* assert.h conflicts with #define of assert in perl.h */
0a753a76 33#include <assert.h>
5b0d9cbe 34#endif
0a753a76 35#include <string.h>
36#include <stdarg.h>
ad2e33dc 37#include <float.h>
ad0751ec 38#include <time.h>
3730b96e 39#if defined(_MSC_VER) || defined(__MINGW32__)
ad0751ec
GS
40#include <sys/utime.h>
41#else
42#include <utime.h>
43#endif
0a753a76 44
5b0d9cbe
NIS
45#ifdef __GNUC__
46/* Mingw32 defaults to globing command line
47 * So we turn it off like this:
48 */
49int _CRT_glob = 0;
50#endif
51
6890e559
GS
52#define EXECF_EXEC 1
53#define EXECF_SPAWN 2
54#define EXECF_SPAWN_NOWAIT 3
55
2d7a9237 56static DWORD os_id(void);
ce1da67e
GS
57static void get_shell(void);
58static long tokenize(char *str, char **dest, char ***destv);
2d7a9237
GS
59static int do_spawn2(char *cmd, int exectype);
60static BOOL has_redirection(char *ptr);
61static long filetime_to_clock(PFILETIME ft);
ad0751ec 62static BOOL filetime_from_time(PFILETIME ft, time_t t);
2d7a9237 63
ce1da67e
GS
64char * w32_perlshell_tokens = Nullch;
65char ** w32_perlshell_vec;
66long w32_perlshell_items = -1;
2d7a9237 67DWORD w32_platform = (DWORD)-1;
2d7a9237
GS
68char w32_perllib_root[MAX_PATH+1];
69HANDLE w32_perldll_handle = INVALID_HANDLE_VALUE;
70#ifndef __BORLANDC__
71long w32_num_children = 0;
72HANDLE w32_child_pids[MAXIMUM_WAIT_OBJECTS];
73#endif
0a753a76 74
26618a56
GS
75#ifdef USE_THREADS
76# ifdef USE_DECLSPEC_THREAD
77__declspec(thread) char strerror_buffer[512];
e34ffe5a 78__declspec(thread) char getlogin_buffer[128];
26618a56
GS
79# ifdef HAVE_DES_FCRYPT
80__declspec(thread) char crypt_buffer[30];
81# endif
82# else
83# define strerror_buffer (thr->i.Wstrerror_buffer)
e34ffe5a 84# define getlogin_buffer (thr->i.Wgetlogin_buffer)
26618a56
GS
85# define crypt_buffer (thr->i.Wcrypt_buffer)
86# endif
87#else
88char strerror_buffer[512];
e34ffe5a 89char getlogin_buffer[128];
26618a56
GS
90# ifdef HAVE_DES_FCRYPT
91char crypt_buffer[30];
92# endif
93#endif
94
3fe9a6f1 95int
96IsWin95(void) {
2d7a9237 97 return (os_id() == VER_PLATFORM_WIN32_WINDOWS);
3fe9a6f1 98}
99
100int
101IsWinNT(void) {
2d7a9237 102 return (os_id() == VER_PLATFORM_WIN32_NT);
3fe9a6f1 103}
0a753a76 104
68dc0745 105char *
2d7a9237 106win32_perllib_path(char *sfx,...)
68dc0745 107{
acbc2db6 108 va_list ap;
68dc0745 109 char *end;
acbc2db6 110 va_start(ap,sfx);
2d7a9237 111 GetModuleFileName((w32_perldll_handle == INVALID_HANDLE_VALUE)
68dc0745 112 ? GetModuleHandle(NULL)
2d7a9237
GS
113 : w32_perldll_handle,
114 w32_perllib_root,
115 sizeof(w32_perllib_root));
116 *(end = strrchr(w32_perllib_root, '\\')) = '\0';
68dc0745 117 if (stricmp(end-4,"\\bin") == 0)
118 end -= 4;
119 strcpy(end,"\\lib");
acbc2db6
NIS
120 while (sfx)
121 {
122 strcat(end,"\\");
123 strcat(end,sfx);
124 sfx = va_arg(ap,char *);
125 }
126 va_end(ap);
2d7a9237 127 return (w32_perllib_root);
68dc0745 128}
0a753a76 129
b4793f7f 130
2d7a9237
GS
131static BOOL
132has_redirection(char *ptr)
68dc0745 133{
134 int inquote = 0;
135 char quote = '\0';
136
137 /*
138 * Scan string looking for redirection (< or >) or pipe
139 * characters (|) that are not in a quoted string
140 */
141 while(*ptr) {
142 switch(*ptr) {
143 case '\'':
144 case '\"':
145 if(inquote) {
146 if(quote == *ptr) {
147 inquote = 0;
148 quote = '\0';
0a753a76 149 }
68dc0745 150 }
151 else {
152 quote = *ptr;
153 inquote++;
154 }
155 break;
156 case '>':
157 case '<':
158 case '|':
159 if(!inquote)
160 return TRUE;
161 default:
162 break;
0a753a76 163 }
68dc0745 164 ++ptr;
165 }
166 return FALSE;
0a753a76 167}
168
68dc0745 169/* since the current process environment is being updated in util.c
170 * the library functions will get the correct environment
171 */
172PerlIO *
173my_popen(char *cmd, char *mode)
0a753a76 174{
175#ifdef FIXCMD
68dc0745 176#define fixcmd(x) { \
177 char *pspace = strchr((x),' '); \
178 if (pspace) { \
179 char *p = (x); \
180 while (p < pspace) { \
181 if (*p == '/') \
182 *p = '\\'; \
183 p++; \
184 } \
185 } \
186 }
0a753a76 187#else
188#define fixcmd(x)
189#endif
68dc0745 190 fixcmd(cmd);
3e3baf6d
TB
191#ifdef __BORLANDC__ /* workaround a Borland stdio bug */
192 win32_fflush(stdout);
193 win32_fflush(stderr);
194#endif
0a753a76 195 return win32_popen(cmd, mode);
0a753a76 196}
197
68dc0745 198long
199my_pclose(PerlIO *fp)
0a753a76 200{
201 return win32_pclose(fp);
202}
203
8b10511d 204static DWORD
2d7a9237 205os_id(void)
0a753a76 206{
8b10511d 207 static OSVERSIONINFO osver;
0a753a76 208
2d7a9237 209 if (osver.dwPlatformId != w32_platform) {
8b10511d
GS
210 memset(&osver, 0, sizeof(OSVERSIONINFO));
211 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
212 GetVersionEx(&osver);
2d7a9237 213 w32_platform = osver.dwPlatformId;
8b10511d 214 }
2d7a9237 215 return (w32_platform);
0a753a76 216}
217
ce1da67e
GS
218/* Tokenize a string. Words are null-separated, and the list
219 * ends with a doubled null. Any character (except null and
220 * including backslash) may be escaped by preceding it with a
221 * backslash (the backslash will be stripped).
222 * Returns number of words in result buffer.
223 */
224static long
225tokenize(char *str, char **dest, char ***destv)
226{
227 char *retstart = Nullch;
228 char **retvstart = 0;
229 int items = -1;
230 if (str) {
231 int slen = strlen(str);
232 register char *ret;
233 register char **retv;
234 New(1307, ret, slen+2, char);
235 New(1308, retv, (slen+3)/2, char*);
236
237 retstart = ret;
238 retvstart = retv;
239 *retv = ret;
240 items = 0;
241 while (*str) {
242 *ret = *str++;
243 if (*ret == '\\' && *str)
244 *ret = *str++;
245 else if (*ret == ' ') {
246 while (*str == ' ')
247 str++;
248 if (ret == retstart)
249 ret--;
250 else {
251 *ret = '\0';
252 ++items;
253 if (*str)
254 *++retv = ret+1;
255 }
256 }
257 else if (!*str)
258 ++items;
259 ret++;
260 }
261 retvstart[items] = Nullch;
262 *ret++ = '\0';
263 *ret = '\0';
264 }
265 *dest = retstart;
266 *destv = retvstart;
267 return items;
268}
269
270static void
2d7a9237 271get_shell(void)
0a753a76 272{
ce1da67e 273 if (!w32_perlshell_tokens) {
174c211a
GS
274 /* we don't use COMSPEC here for two reasons:
275 * 1. the same reason perl on UNIX doesn't use SHELL--rampant and
276 * uncontrolled unportability of the ensuing scripts.
277 * 2. PERL5SHELL could be set to a shell that may not be fit for
278 * interactive use (which is what most programs look in COMSPEC
279 * for).
280 */
ce1da67e
GS
281 char* defaultshell = (IsWinNT() ? "cmd.exe /x/c" : "command.com /c");
282 char *usershell = getenv("PERL5SHELL");
283 w32_perlshell_items = tokenize(usershell ? usershell : defaultshell,
284 &w32_perlshell_tokens,
285 &w32_perlshell_vec);
68dc0745 286 }
0a753a76 287}
288
68dc0745 289int
2d7a9237 290do_aspawn(void *vreally, void **vmark, void **vsp)
0a753a76 291{
2d7a9237
GS
292 SV *really = (SV*)vreally;
293 SV **mark = (SV**)vmark;
294 SV **sp = (SV**)vsp;
68dc0745 295 char **argv;
2d7a9237 296 char *str;
68dc0745 297 int status;
2d7a9237 298 int flag = P_WAIT;
68dc0745 299 int index = 0;
68dc0745 300
2d7a9237
GS
301 if (sp <= mark)
302 return -1;
68dc0745 303
ce1da67e
GS
304 get_shell();
305 New(1306, argv, (sp - mark) + w32_perlshell_items + 2, char*);
2d7a9237
GS
306
307 if (SvNIOKp(*(mark+1)) && !SvPOKp(*(mark+1))) {
308 ++mark;
309 flag = SvIVx(*mark);
68dc0745 310 }
311
2d7a9237
GS
312 while(++mark <= sp) {
313 if (*mark && (str = SvPV(*mark, na)))
314 argv[index++] = str;
315 else
316 argv[index++] = "";
68dc0745 317 }
318 argv[index++] = 0;
319
2d7a9237
GS
320 status = win32_spawnvp(flag,
321 (really ? SvPV(really,na) : argv[0]),
322 (const char* const*)argv);
323
324 if (status < 0 && errno == ENOEXEC) {
325 /* possible shell-builtin, invoke with shell */
ce1da67e
GS
326 int sh_items;
327 sh_items = w32_perlshell_items;
2d7a9237
GS
328 while (--index >= 0)
329 argv[index+sh_items] = argv[index];
ce1da67e
GS
330 while (--sh_items >= 0)
331 argv[sh_items] = w32_perlshell_vec[sh_items];
2d7a9237
GS
332
333 status = win32_spawnvp(flag,
334 (really ? SvPV(really,na) : argv[0]),
335 (const char* const*)argv);
336 }
68dc0745 337
5aabfad6 338 if (status < 0) {
339 if (dowarn)
2d7a9237
GS
340 warn("Can't spawn \"%s\": %s", argv[0], strerror(errno));
341 status = 255 * 256;
5aabfad6 342 }
2d7a9237
GS
343 else if (flag != P_NOWAIT)
344 status *= 256;
ce1da67e 345 Safefree(argv);
2d7a9237 346 return (statusvalue = status);
68dc0745 347}
348
2d7a9237 349static int
6890e559 350do_spawn2(char *cmd, int exectype)
68dc0745 351{
352 char **a;
353 char *s;
354 char **argv;
355 int status = -1;
356 BOOL needToTry = TRUE;
2d7a9237 357 char *cmd2;
68dc0745 358
2d7a9237
GS
359 /* Save an extra exec if possible. See if there are shell
360 * metacharacters in it */
361 if(!has_redirection(cmd)) {
fc36a67e 362 New(1301,argv, strlen(cmd) / 2 + 2, char*);
363 New(1302,cmd2, strlen(cmd) + 1, char);
68dc0745 364 strcpy(cmd2, cmd);
365 a = argv;
366 for (s = cmd2; *s;) {
367 while (*s && isspace(*s))
368 s++;
369 if (*s)
370 *(a++) = s;
371 while(*s && !isspace(*s))
372 s++;
373 if(*s)
374 *s++ = '\0';
0a753a76 375 }
68dc0745 376 *a = Nullch;
ce1da67e 377 if (argv[0]) {
6890e559
GS
378 switch (exectype) {
379 case EXECF_SPAWN:
380 status = win32_spawnvp(P_WAIT, argv[0],
381 (const char* const*)argv);
382 break;
383 case EXECF_SPAWN_NOWAIT:
384 status = win32_spawnvp(P_NOWAIT, argv[0],
385 (const char* const*)argv);
386 break;
387 case EXECF_EXEC:
388 status = win32_execvp(argv[0], (const char* const*)argv);
389 break;
390 }
2d7a9237 391 if (status != -1 || errno == 0)
68dc0745 392 needToTry = FALSE;
0a753a76 393 }
0a753a76 394 Safefree(argv);
68dc0745 395 Safefree(cmd2);
396 }
2d7a9237 397 if (needToTry) {
ce1da67e
GS
398 char **argv;
399 int i = -1;
400 get_shell();
401 New(1306, argv, w32_perlshell_items + 2, char*);
402 while (++i < w32_perlshell_items)
403 argv[i] = w32_perlshell_vec[i];
2d7a9237
GS
404 argv[i++] = cmd;
405 argv[i] = Nullch;
6890e559
GS
406 switch (exectype) {
407 case EXECF_SPAWN:
408 status = win32_spawnvp(P_WAIT, argv[0],
409 (const char* const*)argv);
410 break;
411 case EXECF_SPAWN_NOWAIT:
412 status = win32_spawnvp(P_NOWAIT, argv[0],
413 (const char* const*)argv);
414 break;
415 case EXECF_EXEC:
416 status = win32_execvp(argv[0], (const char* const*)argv);
417 break;
418 }
ce1da67e
GS
419 cmd = argv[0];
420 Safefree(argv);
68dc0745 421 }
5aabfad6 422 if (status < 0) {
423 if (dowarn)
6890e559
GS
424 warn("Can't %s \"%s\": %s",
425 (exectype == EXECF_EXEC ? "exec" : "spawn"),
ce1da67e 426 cmd, strerror(errno));
2d7a9237 427 status = 255 * 256;
5aabfad6 428 }
2d7a9237
GS
429 else if (exectype != EXECF_SPAWN_NOWAIT)
430 status *= 256;
431 return (statusvalue = status);
0a753a76 432}
433
6890e559
GS
434int
435do_spawn(char *cmd)
436{
437 return do_spawn2(cmd, EXECF_SPAWN);
438}
439
2d7a9237
GS
440int
441do_spawn_nowait(char *cmd)
442{
443 return do_spawn2(cmd, EXECF_SPAWN_NOWAIT);
444}
445
6890e559
GS
446bool
447do_exec(char *cmd)
448{
449 do_spawn2(cmd, EXECF_EXEC);
450 return FALSE;
451}
452
0a753a76 453
454#define PATHLEN 1024
455
68dc0745 456/* The idea here is to read all the directory names into a string table
457 * (separated by nulls) and when one of the other dir functions is called
458 * return the pointer to the current file name.
459 */
460DIR *
461opendir(char *filename)
0a753a76 462{
463 DIR *p;
68dc0745 464 long len;
465 long idx;
466 char scannamespc[PATHLEN];
467 char *scanname = scannamespc;
468 struct stat sbuf;
469 WIN32_FIND_DATA FindData;
470 HANDLE fh;
471/* char root[_MAX_PATH];*/
472/* char volname[_MAX_PATH];*/
473/* DWORD serial, maxname, flags;*/
474/* BOOL downcase;*/
475/* char *dummy;*/
476
477 /* check to see if filename is a directory */
d55594ae 478 if (win32_stat(filename, &sbuf) < 0 || (sbuf.st_mode & S_IFDIR) == 0) {
c6c1a8fd
GS
479 /* CRT is buggy on sharenames, so make sure it really isn't */
480 DWORD r = GetFileAttributes(filename);
481 if (r == 0xffffffff || !(r & FILE_ATTRIBUTE_DIRECTORY))
482 return NULL;
68dc0745 483 }
484
485 /* get the file system characteristics */
486/* if(GetFullPathName(filename, MAX_PATH, root, &dummy)) {
487 * if(dummy = strchr(root, '\\'))
488 * *++dummy = '\0';
489 * if(GetVolumeInformation(root, volname, MAX_PATH, &serial,
490 * &maxname, &flags, 0, 0)) {
491 * downcase = !(flags & FS_CASE_IS_PRESERVED);
492 * }
493 * }
494 * else {
495 * downcase = TRUE;
496 * }
497 */
498 /* Get us a DIR structure */
fc36a67e 499 Newz(1303, p, 1, DIR);
68dc0745 500 if(p == NULL)
501 return NULL;
502
503 /* Create the search pattern */
504 strcpy(scanname, filename);
505
506 if(index("/\\", *(scanname + strlen(scanname) - 1)) == NULL)
507 strcat(scanname, "/*");
508 else
509 strcat(scanname, "*");
510
511 /* do the FindFirstFile call */
512 fh = FindFirstFile(scanname, &FindData);
513 if(fh == INVALID_HANDLE_VALUE) {
514 return NULL;
515 }
516
517 /* now allocate the first part of the string table for
518 * the filenames that we find.
519 */
520 idx = strlen(FindData.cFileName)+1;
fc36a67e 521 New(1304, p->start, idx, char);
68dc0745 522 if(p->start == NULL) {
65e48ea9 523 croak("opendir: malloc failed!\n");
68dc0745 524 }
525 strcpy(p->start, FindData.cFileName);
526/* if(downcase)
527 * strlwr(p->start);
528 */
529 p->nfiles++;
530
531 /* loop finding all the files that match the wildcard
532 * (which should be all of them in this directory!).
533 * the variable idx should point one past the null terminator
534 * of the previous string found.
535 */
536 while (FindNextFile(fh, &FindData)) {
537 len = strlen(FindData.cFileName);
538 /* bump the string table size by enough for the
539 * new name and it's null terminator
540 */
541 Renew(p->start, idx+len+1, char);
542 if(p->start == NULL) {
65e48ea9 543 croak("opendir: malloc failed!\n");
0a753a76 544 }
68dc0745 545 strcpy(&p->start[idx], FindData.cFileName);
546/* if (downcase)
547 * strlwr(&p->start[idx]);
548 */
0a753a76 549 p->nfiles++;
550 idx += len+1;
551 }
552 FindClose(fh);
553 p->size = idx;
554 p->curr = p->start;
555 return p;
556}
557
558
68dc0745 559/* Readdir just returns the current string pointer and bumps the
560 * string pointer to the nDllExport entry.
561 */
562struct direct *
563readdir(DIR *dirp)
0a753a76 564{
68dc0745 565 int len;
566 static int dummy = 0;
0a753a76 567
68dc0745 568 if (dirp->curr) {
569 /* first set up the structure to return */
570 len = strlen(dirp->curr);
571 strcpy(dirp->dirstr.d_name, dirp->curr);
572 dirp->dirstr.d_namlen = len;
0a753a76 573
68dc0745 574 /* Fake an inode */
575 dirp->dirstr.d_ino = dummy++;
0a753a76 576
68dc0745 577 /* Now set up for the nDllExport call to readdir */
578 dirp->curr += len + 1;
579 if (dirp->curr >= (dirp->start + dirp->size)) {
580 dirp->curr = NULL;
581 }
0a753a76 582
68dc0745 583 return &(dirp->dirstr);
584 }
585 else
586 return NULL;
0a753a76 587}
588
68dc0745 589/* Telldir returns the current string pointer position */
590long
591telldir(DIR *dirp)
0a753a76 592{
593 return (long) dirp->curr;
594}
595
596
68dc0745 597/* Seekdir moves the string pointer to a previously saved position
598 *(Saved by telldir).
599 */
600void
601seekdir(DIR *dirp, long loc)
0a753a76 602{
603 dirp->curr = (char *)loc;
604}
605
68dc0745 606/* Rewinddir resets the string pointer to the start */
607void
608rewinddir(DIR *dirp)
0a753a76 609{
610 dirp->curr = dirp->start;
611}
612
68dc0745 613/* free the memory allocated by opendir */
614int
615closedir(DIR *dirp)
0a753a76 616{
617 Safefree(dirp->start);
618 Safefree(dirp);
68dc0745 619 return 1;
0a753a76 620}
621
622
68dc0745 623/*
624 * various stubs
625 */
0a753a76 626
627
68dc0745 628/* Ownership
629 *
630 * Just pretend that everyone is a superuser. NT will let us know if
631 * we don\'t really have permission to do something.
632 */
0a753a76 633
634#define ROOT_UID ((uid_t)0)
635#define ROOT_GID ((gid_t)0)
636
68dc0745 637uid_t
638getuid(void)
0a753a76 639{
68dc0745 640 return ROOT_UID;
0a753a76 641}
642
68dc0745 643uid_t
644geteuid(void)
0a753a76 645{
68dc0745 646 return ROOT_UID;
0a753a76 647}
648
68dc0745 649gid_t
650getgid(void)
0a753a76 651{
68dc0745 652 return ROOT_GID;
0a753a76 653}
654
68dc0745 655gid_t
656getegid(void)
0a753a76 657{
68dc0745 658 return ROOT_GID;
0a753a76 659}
660
68dc0745 661int
22239a37 662setuid(uid_t auid)
0a753a76 663{
22239a37 664 return (auid == ROOT_UID ? 0 : -1);
0a753a76 665}
666
68dc0745 667int
22239a37 668setgid(gid_t agid)
0a753a76 669{
22239a37 670 return (agid == ROOT_GID ? 0 : -1);
0a753a76 671}
672
e34ffe5a
GS
673char *
674getlogin(void)
675{
676 dTHR;
677 char *buf = getlogin_buffer;
678 DWORD size = sizeof(getlogin_buffer);
679 if (GetUserName(buf,&size))
680 return buf;
681 return (char*)NULL;
682}
683
b990f8c8
GS
684int
685chown(const char *path, uid_t owner, gid_t group)
686{
687 /* XXX noop */
1c1c7f20 688 return 0;
b990f8c8
GS
689}
690
68dc0745 691int
692kill(int pid, int sig)
0a753a76 693{
68dc0745 694 HANDLE hProcess= OpenProcess(PROCESS_ALL_ACCESS, TRUE, pid);
0a753a76 695
696 if (hProcess == NULL) {
65e48ea9 697 croak("kill process failed!\n");
68dc0745 698 }
699 else {
700 if (!TerminateProcess(hProcess, sig))
65e48ea9 701 croak("kill process failed!\n");
68dc0745 702 CloseHandle(hProcess);
703 }
704 return 0;
0a753a76 705}
706
68dc0745 707/*
708 * File system stuff
709 */
0a753a76 710
f3986ebb
GS
711DllExport unsigned int
712win32_sleep(unsigned int t)
0a753a76 713{
68dc0745 714 Sleep(t*1000);
715 return 0;
0a753a76 716}
717
68dc0745 718DllExport int
719win32_stat(const char *path, struct stat *buffer)
0a753a76 720{
68dc0745 721 char t[MAX_PATH];
722 const char *p = path;
723 int l = strlen(path);
67fbe06e 724 int res;
0a753a76 725
68dc0745 726 if (l > 1) {
727 switch(path[l - 1]) {
728 case '\\':
729 case '/':
730 if (path[l - 2] != ':') {
731 strncpy(t, path, l - 1);
732 t[l - 1] = 0;
733 p = t;
734 };
735 }
736 }
390b85e7 737 res = stat(p,buffer);
67fbe06e
GS
738#ifdef __BORLANDC__
739 if (res == 0) {
740 if (S_ISDIR(buffer->st_mode))
741 buffer->st_mode |= S_IWRITE | S_IEXEC;
742 else if (S_ISREG(buffer->st_mode)) {
743 if (l >= 4 && path[l-4] == '.') {
744 const char *e = path + l - 3;
745 if (strnicmp(e,"exe",3)
746 && strnicmp(e,"bat",3)
747 && strnicmp(e,"com",3)
748 && (IsWin95() || strnicmp(e,"cmd",3)))
749 buffer->st_mode &= ~S_IEXEC;
750 else
751 buffer->st_mode |= S_IEXEC;
752 }
753 else
754 buffer->st_mode &= ~S_IEXEC;
755 }
756 }
757#endif
758 return res;
0a753a76 759}
760
0551aaa8
GS
761#ifndef USE_WIN32_RTL_ENV
762
763DllExport char *
764win32_getenv(const char *name)
765{
766 static char *curitem = Nullch;
767 static DWORD curlen = 512;
768 DWORD needlen;
769 if (!curitem)
770 New(1305,curitem,curlen,char);
771 if (!(needlen = GetEnvironmentVariable(name,curitem,curlen)))
772 return Nullch;
773 while (needlen > curlen) {
774 Renew(curitem,needlen,char);
775 curlen = needlen;
776 needlen = GetEnvironmentVariable(name,curitem,curlen);
777 }
778 return curitem;
779}
780
781#endif
782
d55594ae 783static long
2d7a9237 784filetime_to_clock(PFILETIME ft)
d55594ae
GS
785{
786 __int64 qw = ft->dwHighDateTime;
787 qw <<= 32;
788 qw |= ft->dwLowDateTime;
789 qw /= 10000; /* File time ticks at 0.1uS, clock at 1mS */
790 return (long) qw;
791}
792
f3986ebb
GS
793DllExport int
794win32_times(struct tms *timebuf)
0a753a76 795{
d55594ae
GS
796 FILETIME user;
797 FILETIME kernel;
798 FILETIME dummy;
799 if (GetProcessTimes(GetCurrentProcess(), &dummy, &dummy,
800 &kernel,&user)) {
2d7a9237
GS
801 timebuf->tms_utime = filetime_to_clock(&user);
802 timebuf->tms_stime = filetime_to_clock(&kernel);
d55594ae
GS
803 timebuf->tms_cutime = 0;
804 timebuf->tms_cstime = 0;
805
806 } else {
807 /* That failed - e.g. Win95 fallback to clock() */
808 clock_t t = clock();
809 timebuf->tms_utime = t;
810 timebuf->tms_stime = 0;
811 timebuf->tms_cutime = 0;
812 timebuf->tms_cstime = 0;
813 }
68dc0745 814 return 0;
0a753a76 815}
816
ad0751ec
GS
817/* fix utime() so it works on directories in NT
818 * thanks to Jan Dubois <jan.dubois@ibm.net>
819 */
820static BOOL
821filetime_from_time(PFILETIME pFileTime, time_t Time)
822{
823 struct tm *pTM = gmtime(&Time);
824 SYSTEMTIME SystemTime;
825
826 if (pTM == NULL)
827 return FALSE;
828
829 SystemTime.wYear = pTM->tm_year + 1900;
830 SystemTime.wMonth = pTM->tm_mon + 1;
831 SystemTime.wDay = pTM->tm_mday;
832 SystemTime.wHour = pTM->tm_hour;
833 SystemTime.wMinute = pTM->tm_min;
834 SystemTime.wSecond = pTM->tm_sec;
835 SystemTime.wMilliseconds = 0;
836
837 return SystemTimeToFileTime(&SystemTime, pFileTime);
838}
839
840DllExport int
3b405fc5 841win32_utime(const char *filename, struct utimbuf *times)
ad0751ec
GS
842{
843 HANDLE handle;
844 FILETIME ftCreate;
845 FILETIME ftAccess;
846 FILETIME ftWrite;
847 struct utimbuf TimeBuffer;
848
849 int rc = utime(filename,times);
850 /* EACCES: path specifies directory or readonly file */
851 if (rc == 0 || errno != EACCES /* || !IsWinNT() */)
852 return rc;
853
854 if (times == NULL) {
855 times = &TimeBuffer;
856 time(&times->actime);
857 times->modtime = times->actime;
858 }
859
860 /* This will (and should) still fail on readonly files */
861 handle = CreateFile(filename, GENERIC_READ | GENERIC_WRITE,
862 FILE_SHARE_READ | FILE_SHARE_DELETE, NULL,
863 OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL);
864 if (handle == INVALID_HANDLE_VALUE)
865 return rc;
866
867 if (GetFileTime(handle, &ftCreate, &ftAccess, &ftWrite) &&
868 filetime_from_time(&ftAccess, times->actime) &&
869 filetime_from_time(&ftWrite, times->modtime) &&
870 SetFileTime(handle, &ftCreate, &ftAccess, &ftWrite))
871 {
872 rc = 0;
873 }
874
875 CloseHandle(handle);
876 return rc;
877}
878
2d7a9237
GS
879DllExport int
880win32_wait(int *status)
881{
882#ifdef __BORLANDC__
883 return wait(status);
884#else
885 /* XXX this wait emulation only knows about processes
886 * spawned via win32_spawnvp(P_NOWAIT, ...).
887 */
888 int i, retval;
889 DWORD exitcode, waitcode;
890
891 if (!w32_num_children) {
892 errno = ECHILD;
893 return -1;
894 }
895
896 /* if a child exists, wait for it to die */
897 waitcode = WaitForMultipleObjects(w32_num_children,
898 w32_child_pids,
899 FALSE,
900 INFINITE);
901 if (waitcode != WAIT_FAILED) {
902 if (waitcode >= WAIT_ABANDONED_0
903 && waitcode < WAIT_ABANDONED_0 + w32_num_children)
904 i = waitcode - WAIT_ABANDONED_0;
905 else
906 i = waitcode - WAIT_OBJECT_0;
907 if (GetExitCodeProcess(w32_child_pids[i], &exitcode) ) {
908 CloseHandle(w32_child_pids[i]);
909 *status = (int)((exitcode & 0xff) << 8);
910 retval = (int)w32_child_pids[i];
911 Copy(&w32_child_pids[i+1], &w32_child_pids[i],
912 (w32_num_children-i-1), HANDLE);
913 w32_num_children--;
914 return retval;
915 }
916 }
917
918FAILED:
919 errno = GetLastError();
920 return -1;
921
922#endif
923}
d55594ae 924
2d7a9237 925static UINT timerid = 0;
d55594ae
GS
926
927static VOID CALLBACK TimerProc(HWND win, UINT msg, UINT id, DWORD time)
928{
929 KillTimer(NULL,timerid);
930 timerid=0;
931 sighandler(14);
932}
933
f3986ebb
GS
934DllExport unsigned int
935win32_alarm(unsigned int sec)
0a753a76 936{
d55594ae
GS
937 /*
938 * the 'obvious' implentation is SetTimer() with a callback
939 * which does whatever receiving SIGALRM would do
940 * we cannot use SIGALRM even via raise() as it is not
941 * one of the supported codes in <signal.h>
942 *
943 * Snag is unless something is looking at the message queue
944 * nothing happens :-(
945 */
946 if (sec)
947 {
948 timerid = SetTimer(NULL,timerid,sec*1000,(TIMERPROC)TimerProc);
949 if (!timerid)
950 croak("Cannot set timer");
951 }
952 else
953 {
954 if (timerid)
955 {
956 KillTimer(NULL,timerid);
957 timerid=0;
958 }
959 }
68dc0745 960 return 0;
0a753a76 961}
962
26618a56
GS
963#ifdef HAVE_DES_FCRYPT
964extern char * des_fcrypt(char *cbuf, const char *txt, const char *salt);
965
966DllExport char *
967win32_crypt(const char *txt, const char *salt)
968{
969 dTHR;
970 return des_fcrypt(crypt_buffer, txt, salt);
971}
972#endif
973
f3986ebb 974#ifdef USE_FIXED_OSFHANDLE
390b85e7
GS
975
976EXTERN_C int __cdecl _alloc_osfhnd(void);
977EXTERN_C int __cdecl _set_osfhnd(int fh, long value);
978EXTERN_C void __cdecl _lock_fhandle(int);
979EXTERN_C void __cdecl _unlock_fhandle(int);
980EXTERN_C void __cdecl _unlock(int);
981
982#if (_MSC_VER >= 1000)
983typedef struct {
984 long osfhnd; /* underlying OS file HANDLE */
985 char osfile; /* attributes of file (e.g., open in text mode?) */
986 char pipech; /* one char buffer for handles opened on pipes */
987#if defined (_MT) && !defined (DLL_FOR_WIN32S)
988 int lockinitflag;
989 CRITICAL_SECTION lock;
990#endif /* defined (_MT) && !defined (DLL_FOR_WIN32S) */
991} ioinfo;
992
993EXTERN_C ioinfo * __pioinfo[];
994
995#define IOINFO_L2E 5
996#define IOINFO_ARRAY_ELTS (1 << IOINFO_L2E)
997#define _pioinfo(i) (__pioinfo[i >> IOINFO_L2E] + (i & (IOINFO_ARRAY_ELTS - 1)))
998#define _osfile(i) (_pioinfo(i)->osfile)
999
1000#else /* (_MSC_VER >= 1000) */
1001extern char _osfile[];
1002#endif /* (_MSC_VER >= 1000) */
1003
1004#define FOPEN 0x01 /* file handle open */
1005#define FAPPEND 0x20 /* file handle opened O_APPEND */
1006#define FDEV 0x40 /* file handle refers to device */
1007#define FTEXT 0x80 /* file handle is in text mode */
1008
1009#define _STREAM_LOCKS 26 /* Table of stream locks */
1010#define _LAST_STREAM_LOCK (_STREAM_LOCKS+_NSTREAM_-1) /* Last stream lock */
1011#define _FH_LOCKS (_LAST_STREAM_LOCK+1) /* Table of fh locks */
1012
1013/***
1014*int my_open_osfhandle(long osfhandle, int flags) - open C Runtime file handle
1015*
1016*Purpose:
1017* This function allocates a free C Runtime file handle and associates
1018* it with the Win32 HANDLE specified by the first parameter. This is a
1019* temperary fix for WIN95's brain damage GetFileType() error on socket
1020* we just bypass that call for socket
1021*
1022*Entry:
1023* long osfhandle - Win32 HANDLE to associate with C Runtime file handle.
1024* int flags - flags to associate with C Runtime file handle.
1025*
1026*Exit:
1027* returns index of entry in fh, if successful
1028* return -1, if no free entry is found
1029*
1030*Exceptions:
1031*
1032*******************************************************************************/
1033
1034static int
1035my_open_osfhandle(long osfhandle, int flags)
1036{
1037 int fh;
1038 char fileflags; /* _osfile flags */
1039
1040 /* copy relevant flags from second parameter */
1041 fileflags = FDEV;
1042
1043 if(flags & O_APPEND)
1044 fileflags |= FAPPEND;
1045
1046 if(flags & O_TEXT)
1047 fileflags |= FTEXT;
1048
1049 /* attempt to allocate a C Runtime file handle */
1050 if((fh = _alloc_osfhnd()) == -1) {
1051 errno = EMFILE; /* too many open files */
1052 _doserrno = 0L; /* not an OS error */
1053 return -1; /* return error to caller */
1054 }
1055
1056 /* the file is open. now, set the info in _osfhnd array */
1057 _set_osfhnd(fh, osfhandle);
1058
1059 fileflags |= FOPEN; /* mark as open */
1060
1061#if (_MSC_VER >= 1000)
1062 _osfile(fh) = fileflags; /* set osfile entry */
1063 _unlock_fhandle(fh);
1064#else
1065 _osfile[fh] = fileflags; /* set osfile entry */
1066 _unlock(fh+_FH_LOCKS); /* unlock handle */
1067#endif
1068
1069 return fh; /* return handle */
1070}
1071
1072#define _open_osfhandle my_open_osfhandle
f3986ebb 1073#endif /* USE_FIXED_OSFHANDLE */
390b85e7
GS
1074
1075/* simulate flock by locking a range on the file */
1076
1077#define LK_ERR(f,i) ((f) ? (i = 0) : (errno = GetLastError()))
1078#define LK_LEN 0xffff0000
1079
f3986ebb
GS
1080DllExport int
1081win32_flock(int fd, int oper)
390b85e7
GS
1082{
1083 OVERLAPPED o;
1084 int i = -1;
1085 HANDLE fh;
1086
f3986ebb
GS
1087 if (!IsWinNT()) {
1088 croak("flock() unimplemented on this platform");
1089 return -1;
1090 }
390b85e7
GS
1091 fh = (HANDLE)_get_osfhandle(fd);
1092 memset(&o, 0, sizeof(o));
1093
1094 switch(oper) {
1095 case LOCK_SH: /* shared lock */
1096 LK_ERR(LockFileEx(fh, 0, 0, LK_LEN, 0, &o),i);
1097 break;
1098 case LOCK_EX: /* exclusive lock */
1099 LK_ERR(LockFileEx(fh, LOCKFILE_EXCLUSIVE_LOCK, 0, LK_LEN, 0, &o),i);
1100 break;
1101 case LOCK_SH|LOCK_NB: /* non-blocking shared lock */
1102 LK_ERR(LockFileEx(fh, LOCKFILE_FAIL_IMMEDIATELY, 0, LK_LEN, 0, &o),i);
1103 break;
1104 case LOCK_EX|LOCK_NB: /* non-blocking exclusive lock */
1105 LK_ERR(LockFileEx(fh,
1106 LOCKFILE_EXCLUSIVE_LOCK|LOCKFILE_FAIL_IMMEDIATELY,
1107 0, LK_LEN, 0, &o),i);
1108 break;
1109 case LOCK_UN: /* unlock lock */
1110 LK_ERR(UnlockFileEx(fh, 0, LK_LEN, 0, &o),i);
1111 break;
1112 default: /* unknown */
1113 errno = EINVAL;
1114 break;
1115 }
1116 return i;
1117}
1118
1119#undef LK_ERR
1120#undef LK_LEN
1121
68dc0745 1122/*
1123 * redirected io subsystem for all XS modules
1124 *
1125 */
0a753a76 1126
68dc0745 1127DllExport int *
1128win32_errno(void)
0a753a76 1129{
390b85e7 1130 return (&errno);
0a753a76 1131}
1132
dcb2879a
GS
1133DllExport char ***
1134win32_environ(void)
1135{
390b85e7 1136 return (&(_environ));
dcb2879a
GS
1137}
1138
68dc0745 1139/* the rest are the remapped stdio routines */
1140DllExport FILE *
1141win32_stderr(void)
0a753a76 1142{
390b85e7 1143 return (stderr);
0a753a76 1144}
1145
68dc0745 1146DllExport FILE *
1147win32_stdin(void)
0a753a76 1148{
390b85e7 1149 return (stdin);
0a753a76 1150}
1151
68dc0745 1152DllExport FILE *
1153win32_stdout()
0a753a76 1154{
390b85e7 1155 return (stdout);
0a753a76 1156}
1157
68dc0745 1158DllExport int
1159win32_ferror(FILE *fp)
0a753a76 1160{
390b85e7 1161 return (ferror(fp));
0a753a76 1162}
1163
1164
68dc0745 1165DllExport int
1166win32_feof(FILE *fp)
0a753a76 1167{
390b85e7 1168 return (feof(fp));
0a753a76 1169}
1170
68dc0745 1171/*
1172 * Since the errors returned by the socket error function
1173 * WSAGetLastError() are not known by the library routine strerror
1174 * we have to roll our own.
1175 */
0a753a76 1176
68dc0745 1177DllExport char *
1178win32_strerror(int e)
0a753a76 1179{
3e3baf6d 1180#ifndef __BORLANDC__ /* Borland intolerance */
68dc0745 1181 extern int sys_nerr;
3e3baf6d 1182#endif
68dc0745 1183 DWORD source = 0;
0a753a76 1184
68dc0745 1185 if(e < 0 || e > sys_nerr) {
c53bd28a 1186 dTHR;
68dc0745 1187 if(e < 0)
1188 e = GetLastError();
0a753a76 1189
68dc0745 1190 if(FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, &source, e, 0,
1191 strerror_buffer, sizeof(strerror_buffer), NULL) == 0)
1192 strcpy(strerror_buffer, "Unknown Error");
0a753a76 1193
68dc0745 1194 return strerror_buffer;
1195 }
390b85e7 1196 return strerror(e);
0a753a76 1197}
1198
22fae026 1199DllExport void
3730b96e 1200win32_str_os_error(void *sv, DWORD dwErr)
22fae026
TM
1201{
1202 DWORD dwLen;
1203 char *sMsg;
1204 dwLen = FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER
1205 |FORMAT_MESSAGE_IGNORE_INSERTS
1206 |FORMAT_MESSAGE_FROM_SYSTEM, NULL,
1207 dwErr, 0, (char *)&sMsg, 1, NULL);
1208 if (0 < dwLen) {
1209 while (0 < dwLen && isspace(sMsg[--dwLen]))
1210 ;
1211 if ('.' != sMsg[dwLen])
1212 dwLen++;
1213 sMsg[dwLen]= '\0';
1214 }
1215 if (0 == dwLen) {
1216 sMsg = LocalAlloc(0, 64/**sizeof(TCHAR)*/);
1217 dwLen = sprintf(sMsg,
1218 "Unknown error #0x%lX (lookup 0x%lX)",
1219 dwErr, GetLastError());
1220 }
3730b96e 1221 sv_setpvn((SV*)sv, sMsg, dwLen);
22fae026
TM
1222 LocalFree(sMsg);
1223}
1224
1225
68dc0745 1226DllExport int
1227win32_fprintf(FILE *fp, const char *format, ...)
0a753a76 1228{
68dc0745 1229 va_list marker;
1230 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1231
390b85e7 1232 return (vfprintf(fp, format, marker));
0a753a76 1233}
1234
68dc0745 1235DllExport int
1236win32_printf(const char *format, ...)
0a753a76 1237{
68dc0745 1238 va_list marker;
1239 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1240
390b85e7 1241 return (vprintf(format, marker));
0a753a76 1242}
1243
68dc0745 1244DllExport int
1245win32_vfprintf(FILE *fp, const char *format, va_list args)
0a753a76 1246{
390b85e7 1247 return (vfprintf(fp, format, args));
0a753a76 1248}
1249
96e4d5b1 1250DllExport int
1251win32_vprintf(const char *format, va_list args)
1252{
390b85e7 1253 return (vprintf(format, args));
96e4d5b1 1254}
1255
68dc0745 1256DllExport size_t
1257win32_fread(void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1258{
390b85e7 1259 return fread(buf, size, count, fp);
0a753a76 1260}
1261
68dc0745 1262DllExport size_t
1263win32_fwrite(const void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1264{
390b85e7 1265 return fwrite(buf, size, count, fp);
0a753a76 1266}
1267
68dc0745 1268DllExport FILE *
1269win32_fopen(const char *filename, const char *mode)
0a753a76 1270{
68dc0745 1271 if (stricmp(filename, "/dev/null")==0)
390b85e7
GS
1272 return fopen("NUL", mode);
1273 return fopen(filename, mode);
0a753a76 1274}
1275
f3986ebb
GS
1276#ifndef USE_SOCKETS_AS_HANDLES
1277#undef fdopen
1278#define fdopen my_fdopen
1279#endif
1280
68dc0745 1281DllExport FILE *
1282win32_fdopen( int handle, const char *mode)
0a753a76 1283{
390b85e7 1284 return fdopen(handle, (char *) mode);
0a753a76 1285}
1286
68dc0745 1287DllExport FILE *
1288win32_freopen( const char *path, const char *mode, FILE *stream)
0a753a76 1289{
68dc0745 1290 if (stricmp(path, "/dev/null")==0)
390b85e7
GS
1291 return freopen("NUL", mode, stream);
1292 return freopen(path, mode, stream);
0a753a76 1293}
1294
68dc0745 1295DllExport int
1296win32_fclose(FILE *pf)
0a753a76 1297{
f3986ebb 1298 return my_fclose(pf); /* defined in win32sck.c */
0a753a76 1299}
1300
68dc0745 1301DllExport int
1302win32_fputs(const char *s,FILE *pf)
0a753a76 1303{
390b85e7 1304 return fputs(s, pf);
0a753a76 1305}
1306
68dc0745 1307DllExport int
1308win32_fputc(int c,FILE *pf)
0a753a76 1309{
390b85e7 1310 return fputc(c,pf);
0a753a76 1311}
1312
68dc0745 1313DllExport int
1314win32_ungetc(int c,FILE *pf)
0a753a76 1315{
390b85e7 1316 return ungetc(c,pf);
0a753a76 1317}
1318
68dc0745 1319DllExport int
1320win32_getc(FILE *pf)
0a753a76 1321{
390b85e7 1322 return getc(pf);
0a753a76 1323}
1324
68dc0745 1325DllExport int
1326win32_fileno(FILE *pf)
0a753a76 1327{
390b85e7 1328 return fileno(pf);
0a753a76 1329}
1330
68dc0745 1331DllExport void
1332win32_clearerr(FILE *pf)
0a753a76 1333{
390b85e7 1334 clearerr(pf);
68dc0745 1335 return;
0a753a76 1336}
1337
68dc0745 1338DllExport int
1339win32_fflush(FILE *pf)
0a753a76 1340{
390b85e7 1341 return fflush(pf);
0a753a76 1342}
1343
68dc0745 1344DllExport long
1345win32_ftell(FILE *pf)
0a753a76 1346{
390b85e7 1347 return ftell(pf);
0a753a76 1348}
1349
68dc0745 1350DllExport int
1351win32_fseek(FILE *pf,long offset,int origin)
0a753a76 1352{
390b85e7 1353 return fseek(pf, offset, origin);
0a753a76 1354}
1355
68dc0745 1356DllExport int
1357win32_fgetpos(FILE *pf,fpos_t *p)
0a753a76 1358{
390b85e7 1359 return fgetpos(pf, p);
0a753a76 1360}
1361
68dc0745 1362DllExport int
1363win32_fsetpos(FILE *pf,const fpos_t *p)
0a753a76 1364{
390b85e7 1365 return fsetpos(pf, p);
0a753a76 1366}
1367
68dc0745 1368DllExport void
1369win32_rewind(FILE *pf)
0a753a76 1370{
390b85e7 1371 rewind(pf);
68dc0745 1372 return;
0a753a76 1373}
1374
68dc0745 1375DllExport FILE*
1376win32_tmpfile(void)
0a753a76 1377{
390b85e7 1378 return tmpfile();
0a753a76 1379}
1380
68dc0745 1381DllExport void
1382win32_abort(void)
0a753a76 1383{
390b85e7 1384 abort();
68dc0745 1385 return;
0a753a76 1386}
1387
68dc0745 1388DllExport int
22239a37 1389win32_fstat(int fd,struct stat *sbufptr)
0a753a76 1390{
22239a37 1391 return fstat(fd,sbufptr);
0a753a76 1392}
1393
68dc0745 1394DllExport int
1395win32_pipe(int *pfd, unsigned int size, int mode)
0a753a76 1396{
390b85e7 1397 return _pipe(pfd, size, mode);
0a753a76 1398}
1399
68dc0745 1400DllExport FILE*
1401win32_popen(const char *command, const char *mode)
0a753a76 1402{
390b85e7 1403 return _popen(command, mode);
0a753a76 1404}
1405
68dc0745 1406DllExport int
1407win32_pclose(FILE *pf)
0a753a76 1408{
390b85e7 1409 return _pclose(pf);
0a753a76 1410}
1411
68dc0745 1412DllExport int
1413win32_setmode(int fd, int mode)
0a753a76 1414{
390b85e7 1415 return setmode(fd, mode);
0a753a76 1416}
1417
96e4d5b1 1418DllExport long
1419win32_lseek(int fd, long offset, int origin)
1420{
390b85e7 1421 return lseek(fd, offset, origin);
96e4d5b1 1422}
1423
1424DllExport long
1425win32_tell(int fd)
1426{
390b85e7 1427 return tell(fd);
96e4d5b1 1428}
1429
68dc0745 1430DllExport int
1431win32_open(const char *path, int flag, ...)
0a753a76 1432{
68dc0745 1433 va_list ap;
1434 int pmode;
0a753a76 1435
1436 va_start(ap, flag);
1437 pmode = va_arg(ap, int);
1438 va_end(ap);
1439
68dc0745 1440 if (stricmp(path, "/dev/null")==0)
390b85e7
GS
1441 return open("NUL", flag, pmode);
1442 return open(path,flag,pmode);
0a753a76 1443}
1444
68dc0745 1445DllExport int
1446win32_close(int fd)
0a753a76 1447{
390b85e7 1448 return close(fd);
0a753a76 1449}
1450
68dc0745 1451DllExport int
96e4d5b1 1452win32_eof(int fd)
1453{
390b85e7 1454 return eof(fd);
96e4d5b1 1455}
1456
1457DllExport int
68dc0745 1458win32_dup(int fd)
0a753a76 1459{
390b85e7 1460 return dup(fd);
0a753a76 1461}
1462
68dc0745 1463DllExport int
1464win32_dup2(int fd1,int fd2)
0a753a76 1465{
390b85e7 1466 return dup2(fd1,fd2);
0a753a76 1467}
1468
68dc0745 1469DllExport int
3e3baf6d 1470win32_read(int fd, void *buf, unsigned int cnt)
0a753a76 1471{
390b85e7 1472 return read(fd, buf, cnt);
0a753a76 1473}
1474
68dc0745 1475DllExport int
3e3baf6d 1476win32_write(int fd, const void *buf, unsigned int cnt)
0a753a76 1477{
390b85e7 1478 return write(fd, buf, cnt);
0a753a76 1479}
1480
68dc0745 1481DllExport int
5aabfad6 1482win32_mkdir(const char *dir, int mode)
1483{
390b85e7 1484 return mkdir(dir); /* just ignore mode */
5aabfad6 1485}
96e4d5b1 1486
5aabfad6 1487DllExport int
1488win32_rmdir(const char *dir)
1489{
390b85e7 1490 return rmdir(dir);
5aabfad6 1491}
96e4d5b1 1492
5aabfad6 1493DllExport int
1494win32_chdir(const char *dir)
1495{
390b85e7 1496 return chdir(dir);
5aabfad6 1497}
96e4d5b1 1498
5aabfad6 1499DllExport int
3e3baf6d 1500win32_spawnvp(int mode, const char *cmdname, const char *const *argv)
0a753a76 1501{
2d7a9237
GS
1502 int status;
1503
1504 status = spawnvp(mode, cmdname, (char * const *) argv);
1505#ifndef __BORLANDC__
1506 /* XXX For the P_NOWAIT case, Borland RTL returns pinfo.dwProcessId
1507 * while VC RTL returns pinfo.hProcess. For purposes of the custom
1508 * implementation of win32_wait(), we assume the latter.
1509 */
1510 if (mode == P_NOWAIT && status >= 0)
1511 w32_child_pids[w32_num_children++] = (HANDLE)status;
1512#endif
1513 return status;
0a753a76 1514}
1515
6890e559
GS
1516DllExport int
1517win32_execvp(const char *cmdname, const char *const *argv)
1518{
390b85e7 1519 return execvp(cmdname, (char *const *)argv);
6890e559
GS
1520}
1521
84902520
TB
1522DllExport void
1523win32_perror(const char *str)
1524{
390b85e7 1525 perror(str);
84902520
TB
1526}
1527
1528DllExport void
1529win32_setbuf(FILE *pf, char *buf)
1530{
390b85e7 1531 setbuf(pf, buf);
84902520
TB
1532}
1533
1534DllExport int
1535win32_setvbuf(FILE *pf, char *buf, int type, size_t size)
1536{
390b85e7 1537 return setvbuf(pf, buf, type, size);
84902520
TB
1538}
1539
1540DllExport int
1541win32_flushall(void)
1542{
390b85e7 1543 return flushall();
84902520
TB
1544}
1545
1546DllExport int
1547win32_fcloseall(void)
1548{
390b85e7 1549 return fcloseall();
84902520
TB
1550}
1551
1552DllExport char*
1553win32_fgets(char *s, int n, FILE *pf)
1554{
390b85e7 1555 return fgets(s, n, pf);
84902520
TB
1556}
1557
1558DllExport char*
1559win32_gets(char *s)
1560{
390b85e7 1561 return gets(s);
84902520
TB
1562}
1563
1564DllExport int
1565win32_fgetc(FILE *pf)
1566{
390b85e7 1567 return fgetc(pf);
84902520
TB
1568}
1569
1570DllExport int
1571win32_putc(int c, FILE *pf)
1572{
390b85e7 1573 return putc(c,pf);
84902520
TB
1574}
1575
1576DllExport int
1577win32_puts(const char *s)
1578{
390b85e7 1579 return puts(s);
84902520
TB
1580}
1581
1582DllExport int
1583win32_getchar(void)
1584{
390b85e7 1585 return getchar();
84902520
TB
1586}
1587
1588DllExport int
1589win32_putchar(int c)
1590{
390b85e7 1591 return putchar(c);
84902520
TB
1592}
1593
bbc8f9de
NIS
1594#ifdef MYMALLOC
1595
1596#ifndef USE_PERL_SBRK
1597
1598static char *committed = NULL;
1599static char *base = NULL;
1600static char *reserved = NULL;
1601static char *brk = NULL;
1602static DWORD pagesize = 0;
1603static DWORD allocsize = 0;
1604
1605void *
1606sbrk(int need)
1607{
1608 void *result;
1609 if (!pagesize)
1610 {SYSTEM_INFO info;
1611 GetSystemInfo(&info);
1612 /* Pretend page size is larger so we don't perpetually
1613 * call the OS to commit just one page ...
1614 */
1615 pagesize = info.dwPageSize << 3;
1616 allocsize = info.dwAllocationGranularity;
1617 }
1618 /* This scheme fails eventually if request for contiguous
1619 * block is denied so reserve big blocks - this is only
1620 * address space not memory ...
1621 */
1622 if (brk+need >= reserved)
1623 {
1624 DWORD size = 64*1024*1024;
1625 char *addr;
1626 if (committed && reserved && committed < reserved)
1627 {
1628 /* Commit last of previous chunk cannot span allocations */
161b471a 1629 addr = (char *) VirtualAlloc(committed,reserved-committed,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de
NIS
1630 if (addr)
1631 committed = reserved;
1632 }
1633 /* Reserve some (more) space
1634 * Note this is a little sneaky, 1st call passes NULL as reserved
1635 * so lets system choose where we start, subsequent calls pass
1636 * the old end address so ask for a contiguous block
1637 */
161b471a 1638 addr = (char *) VirtualAlloc(reserved,size,MEM_RESERVE,PAGE_NOACCESS);
bbc8f9de
NIS
1639 if (addr)
1640 {
1641 reserved = addr+size;
1642 if (!base)
1643 base = addr;
1644 if (!committed)
1645 committed = base;
1646 if (!brk)
1647 brk = committed;
1648 }
1649 else
1650 {
1651 return (void *) -1;
1652 }
1653 }
1654 result = brk;
1655 brk += need;
1656 if (brk > committed)
1657 {
1658 DWORD size = ((brk-committed + pagesize -1)/pagesize) * pagesize;
161b471a 1659 char *addr = (char *) VirtualAlloc(committed,size,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de
NIS
1660 if (addr)
1661 {
1662 committed += size;
1663 }
1664 else
1665 return (void *) -1;
1666 }
1667 return result;
1668}
1669
1670#endif
1671#endif
1672
84902520
TB
1673DllExport void*
1674win32_malloc(size_t size)
1675{
390b85e7 1676 return malloc(size);
84902520
TB
1677}
1678
1679DllExport void*
1680win32_calloc(size_t numitems, size_t size)
1681{
390b85e7 1682 return calloc(numitems,size);
84902520
TB
1683}
1684
1685DllExport void*
1686win32_realloc(void *block, size_t size)
1687{
390b85e7 1688 return realloc(block,size);
84902520
TB
1689}
1690
1691DllExport void
1692win32_free(void *block)
1693{
390b85e7 1694 free(block);
84902520
TB
1695}
1696
bbc8f9de 1697
68dc0745 1698int
65e48ea9 1699win32_open_osfhandle(long handle, int flags)
0a753a76 1700{
390b85e7 1701 return _open_osfhandle(handle, flags);
0a753a76 1702}
1703
68dc0745 1704long
65e48ea9 1705win32_get_osfhandle(int fd)
0a753a76 1706{
390b85e7 1707 return _get_osfhandle(fd);
0a753a76 1708}
7bac28a0 1709
7bac28a0 1710/*
1711 * Extras.
1712 */
1713
ad2e33dc
GS
1714static
1715XS(w32_GetCwd)
1716{
1717 dXSARGS;
1718 SV *sv = sv_newmortal();
1719 /* Make one call with zero size - return value is required size */
1720 DWORD len = GetCurrentDirectory((DWORD)0,NULL);
1721 SvUPGRADE(sv,SVt_PV);
1722 SvGROW(sv,len);
1723 SvCUR(sv) = GetCurrentDirectory((DWORD) SvLEN(sv), SvPVX(sv));
1724 /*
1725 * If result != 0
1726 * then it worked, set PV valid,
1727 * else leave it 'undef'
1728 */
1729 if (SvCUR(sv))
1730 SvPOK_on(sv);
1731 EXTEND(sp,1);
1732 ST(0) = sv;
1733 XSRETURN(1);
1734}
1735
1736static
1737XS(w32_SetCwd)
1738{
1739 dXSARGS;
1740 if (items != 1)
1741 croak("usage: Win32::SetCurrentDirectory($cwd)");
1742 if (SetCurrentDirectory(SvPV(ST(0),na)))
1743 XSRETURN_YES;
1744
1745 XSRETURN_NO;
1746}
1747
1748static
1749XS(w32_GetNextAvailDrive)
1750{
1751 dXSARGS;
1752 char ix = 'C';
1753 char root[] = "_:\\";
1754 while (ix <= 'Z') {
1755 root[0] = ix++;
1756 if (GetDriveType(root) == 1) {
1757 root[2] = '\0';
1758 XSRETURN_PV(root);
1759 }
1760 }
1761 XSRETURN_UNDEF;
1762}
1763
1764static
1765XS(w32_GetLastError)
1766{
1767 dXSARGS;
1768 XSRETURN_IV(GetLastError());
1769}
1770
1771static
1772XS(w32_LoginName)
1773{
1774 dXSARGS;
e34ffe5a
GS
1775 char *name = getlogin_buffer;
1776 DWORD size = sizeof(getlogin_buffer);
ad2e33dc
GS
1777 if (GetUserName(name,&size)) {
1778 /* size includes NULL */
1779 ST(0) = sv_2mortal(newSVpv(name,size-1));
1780 XSRETURN(1);
1781 }
1782 XSRETURN_UNDEF;
1783}
1784
1785static
1786XS(w32_NodeName)
1787{
1788 dXSARGS;
1789 char name[MAX_COMPUTERNAME_LENGTH+1];
1790 DWORD size = sizeof(name);
1791 if (GetComputerName(name,&size)) {
1792 /* size does NOT include NULL :-( */
1793 ST(0) = sv_2mortal(newSVpv(name,size));
1794 XSRETURN(1);
1795 }
1796 XSRETURN_UNDEF;
1797}
1798
1799
1800static
1801XS(w32_DomainName)
1802{
1803 dXSARGS;
1804 char name[256];
1805 DWORD size = sizeof(name);
1806 if (GetUserName(name,&size)) {
1807 char sid[1024];
1808 DWORD sidlen = sizeof(sid);
1809 char dname[256];
1810 DWORD dnamelen = sizeof(dname);
1811 SID_NAME_USE snu;
1812 if (LookupAccountName(NULL, name, &sid, &sidlen,
1813 dname, &dnamelen, &snu)) {
1814 XSRETURN_PV(dname); /* all that for this */
1815 }
1816 }
1817 XSRETURN_UNDEF;
1818}
1819
1820static
1821XS(w32_FsType)
1822{
1823 dXSARGS;
1824 char fsname[256];
1825 DWORD flags, filecomplen;
1826 if (GetVolumeInformation(NULL, NULL, 0, NULL, &filecomplen,
1827 &flags, fsname, sizeof(fsname))) {
1828 if (GIMME == G_ARRAY) {
1829 XPUSHs(sv_2mortal(newSVpv(fsname,0)));
1830 XPUSHs(sv_2mortal(newSViv(flags)));
1831 XPUSHs(sv_2mortal(newSViv(filecomplen)));
1832 PUTBACK;
1833 return;
1834 }
1835 XSRETURN_PV(fsname);
1836 }
1837 XSRETURN_UNDEF;
1838}
1839
1840static
1841XS(w32_GetOSVersion)
1842{
1843 dXSARGS;
1844 OSVERSIONINFO osver;
1845
1846 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
1847 if (GetVersionEx(&osver)) {
1848 XPUSHs(newSVpv(osver.szCSDVersion, 0));
1849 XPUSHs(newSViv(osver.dwMajorVersion));
1850 XPUSHs(newSViv(osver.dwMinorVersion));
1851 XPUSHs(newSViv(osver.dwBuildNumber));
1852 XPUSHs(newSViv(osver.dwPlatformId));
1853 PUTBACK;
1854 return;
1855 }
1856 XSRETURN_UNDEF;
1857}
1858
1859static
1860XS(w32_IsWinNT)
1861{
1862 dXSARGS;
1863 XSRETURN_IV(IsWinNT());
1864}
1865
1866static
1867XS(w32_IsWin95)
1868{
1869 dXSARGS;
1870 XSRETURN_IV(IsWin95());
1871}
1872
1873static
1874XS(w32_FormatMessage)
1875{
1876 dXSARGS;
1877 DWORD source = 0;
1878 char msgbuf[1024];
1879
1880 if (items != 1)
1881 croak("usage: Win32::FormatMessage($errno)");
1882
1883 if (FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM,
1884 &source, SvIV(ST(0)), 0,
1885 msgbuf, sizeof(msgbuf)-1, NULL))
1886 XSRETURN_PV(msgbuf);
1887
1888 XSRETURN_UNDEF;
1889}
1890
1891static
1892XS(w32_Spawn)
1893{
1894 dXSARGS;
1895 char *cmd, *args;
1896 PROCESS_INFORMATION stProcInfo;
1897 STARTUPINFO stStartInfo;
1898 BOOL bSuccess = FALSE;
1899
1900 if(items != 3)
1901 croak("usage: Win32::Spawn($cmdName, $args, $PID)");
1902
1903 cmd = SvPV(ST(0),na);
1904 args = SvPV(ST(1), na);
1905
1906 memset(&stStartInfo, 0, sizeof(stStartInfo)); /* Clear the block */
1907 stStartInfo.cb = sizeof(stStartInfo); /* Set the structure size */
1908 stStartInfo.dwFlags = STARTF_USESHOWWINDOW; /* Enable wShowWindow control */
1909 stStartInfo.wShowWindow = SW_SHOWMINNOACTIVE; /* Start min (normal) */
1910
1911 if(CreateProcess(
1912 cmd, /* Image path */
1913 args, /* Arguments for command line */
1914 NULL, /* Default process security */
1915 NULL, /* Default thread security */
1916 FALSE, /* Must be TRUE to use std handles */
1917 NORMAL_PRIORITY_CLASS, /* No special scheduling */
1918 NULL, /* Inherit our environment block */
1919 NULL, /* Inherit our currrent directory */
1920 &stStartInfo, /* -> Startup info */
1921 &stProcInfo)) /* <- Process info (if OK) */
1922 {
1923 CloseHandle(stProcInfo.hThread);/* library source code does this. */
1924 sv_setiv(ST(2), stProcInfo.dwProcessId);
1925 bSuccess = TRUE;
1926 }
1927 XSRETURN_IV(bSuccess);
1928}
1929
1930static
1931XS(w32_GetTickCount)
1932{
1933 dXSARGS;
1934 XSRETURN_IV(GetTickCount());
1935}
1936
1937static
1938XS(w32_GetShortPathName)
1939{
1940 dXSARGS;
1941 SV *shortpath;
e8bab181 1942 DWORD len;
ad2e33dc
GS
1943
1944 if(items != 1)
1945 croak("usage: Win32::GetShortPathName($longPathName)");
1946
1947 shortpath = sv_mortalcopy(ST(0));
1948 SvUPGRADE(shortpath, SVt_PV);
1949 /* src == target is allowed */
e8bab181
GS
1950 do {
1951 len = GetShortPathName(SvPVX(shortpath),
1952 SvPVX(shortpath),
1953 SvLEN(shortpath));
1954 } while (len >= SvLEN(shortpath) && sv_grow(shortpath,len+1));
1955 if (len) {
1956 SvCUR_set(shortpath,len);
ad2e33dc 1957 ST(0) = shortpath;
e8bab181 1958 }
ad2e33dc
GS
1959 else
1960 ST(0) = &sv_undef;
1961 XSRETURN(1);
1962}
1963
ad0751ec
GS
1964static
1965XS(w32_Sleep)
1966{
1967 dXSARGS;
1968 if (items != 1)
1969 croak("usage: Win32::Sleep($milliseconds)");
1970 Sleep(SvIV(ST(0)));
1971 XSRETURN_YES;
1972}
1973
ad2e33dc 1974void
f3986ebb 1975Perl_init_os_extras()
ad2e33dc
GS
1976{
1977 char *file = __FILE__;
1978 dXSUB_SYS;
1979
ad2e33dc
GS
1980 /* these names are Activeware compatible */
1981 newXS("Win32::GetCwd", w32_GetCwd, file);
1982 newXS("Win32::SetCwd", w32_SetCwd, file);
1983 newXS("Win32::GetNextAvailDrive", w32_GetNextAvailDrive, file);
1984 newXS("Win32::GetLastError", w32_GetLastError, file);
1985 newXS("Win32::LoginName", w32_LoginName, file);
1986 newXS("Win32::NodeName", w32_NodeName, file);
1987 newXS("Win32::DomainName", w32_DomainName, file);
1988 newXS("Win32::FsType", w32_FsType, file);
1989 newXS("Win32::GetOSVersion", w32_GetOSVersion, file);
1990 newXS("Win32::IsWinNT", w32_IsWinNT, file);
1991 newXS("Win32::IsWin95", w32_IsWin95, file);
1992 newXS("Win32::FormatMessage", w32_FormatMessage, file);
1993 newXS("Win32::Spawn", w32_Spawn, file);
1994 newXS("Win32::GetTickCount", w32_GetTickCount, file);
1995 newXS("Win32::GetShortPathName", w32_GetShortPathName, file);
ad0751ec 1996 newXS("Win32::Sleep", w32_Sleep, file);
ad2e33dc
GS
1997
1998 /* XXX Bloat Alert! The following Activeware preloads really
1999 * ought to be part of Win32::Sys::*, so they're not included
2000 * here.
2001 */
2002 /* LookupAccountName
2003 * LookupAccountSID
2004 * InitiateSystemShutdown
2005 * AbortSystemShutdown
2006 * ExpandEnvrironmentStrings
2007 */
2008}
2009
2010void
2011Perl_win32_init(int *argcp, char ***argvp)
2012{
2013 /* Disable floating point errors, Perl will trap the ones we
2014 * care about. VC++ RTL defaults to switching these off
2015 * already, but the Borland RTL doesn't. Since we don't
2016 * want to be at the vendor's whim on the default, we set
2017 * it explicitly here.
2018 */
a835ef8a 2019#if !defined(_ALPHA_) && !defined(__GNUC__)
ad2e33dc 2020 _control87(MCW_EM, MCW_EM);
3dc9191e 2021#endif
dc86dda3 2022 MALLOC_INIT;
ad2e33dc 2023}
d55594ae 2024
a868473f
NIS
2025#ifdef USE_BINMODE_SCRIPTS
2026
2027void
2028win32_strip_return(SV *sv)
2029{
2030 char *s = SvPVX(sv);
2031 char *e = s+SvCUR(sv);
2032 char *d = s;
2033 while (s < e)
2034 {
2035 if (*s == '\r' && s[1] == '\n')
2036 {
2037 *d++ = '\n';
2038 s += 2;
2039 }
2040 else
2041 {
2042 *d++ = *s++;
2043 }
2044 }
2045 SvCUR_set(sv,d-SvPVX(sv));
2046}
2047
2048#endif