This is a live mirror of the Perl 5 development currently hosted at https://github.com/perl/perl5
perldelta.pod changes for Win32::* functions
[perl5.git] / win32 / win32.c
CommitLineData
68dc0745
PP
1/* WIN32.C
2 *
3 * (c) 1995 Microsoft Corporation. All rights reserved.
4 * Developed by hip communications inc., http://info.hip.com/info/
5 * Portions (c) 1993 Intergraph Corporation. All rights reserved.
6 *
7 * You may distribute under the terms of either the GNU General Public
8 * License or the Artistic License, as specified in the README file.
9 */
0a753a76
PP
10
11#define WIN32_LEAN_AND_MEAN
12#define WIN32IO_IS_STDIO
13#include <tchar.h>
a835ef8a
NIS
14#ifdef __GNUC__
15#define Win32_Winsock
16#endif
0a753a76
PP
17#include <windows.h>
18
e56670dd 19#ifndef __MINGW32__
9404a519
GS
20#include <lmcons.h>
21#include <lmerr.h>
22/* ugliness to work around a buggy struct definition in lmwksta.h */
23#undef LPTSTR
24#define LPTSTR LPWSTR
25#include <lmwksta.h>
26#undef LPTSTR
27#define LPTSTR LPSTR
e56670dd
GS
28#include <lmapibuf.h>
29#endif /* __MINGW32__ */
9404a519 30
68dc0745 31/* #include "config.h" */
0a753a76
PP
32
33#define PERLIO_NOT_STDIO 0
34#if !defined(PERLIO_IS_STDIO) && !defined(USE_SFIO)
35#define PerlIO FILE
36#endif
37
38#include "EXTERN.h"
39#include "perl.h"
c69f6586
GS
40
41#define NO_XSLOCKS
42#ifdef PERL_OBJECT
43extern CPerlObj* pPerl;
44#endif
ad2e33dc 45#include "XSUB.h"
c69f6586
GS
46
47#include "Win32iop.h"
0a753a76
PP
48#include <fcntl.h>
49#include <sys/stat.h>
5b0d9cbe
NIS
50#ifndef __GNUC__
51/* assert.h conflicts with #define of assert in perl.h */
0a753a76 52#include <assert.h>
5b0d9cbe 53#endif
0a753a76
PP
54#include <string.h>
55#include <stdarg.h>
ad2e33dc 56#include <float.h>
ad0751ec 57#include <time.h>
3730b96e 58#if defined(_MSC_VER) || defined(__MINGW32__)
ad0751ec
GS
59#include <sys/utime.h>
60#else
61#include <utime.h>
62#endif
0a753a76 63
5b0d9cbe
NIS
64#ifdef __GNUC__
65/* Mingw32 defaults to globing command line
66 * So we turn it off like this:
67 */
68int _CRT_glob = 0;
69#endif
70
6890e559
GS
71#define EXECF_EXEC 1
72#define EXECF_SPAWN 2
73#define EXECF_SPAWN_NOWAIT 3
74
c69f6586 75#if defined(PERL_OBJECT)
e5a95ffb
GS
76#undef win32_get_privlib
77#define win32_get_privlib g_win32_get_privlib
00dc2f4f
GS
78#undef win32_get_sitelib
79#define win32_get_sitelib g_win32_get_sitelib
c69f6586
GS
80#undef do_aspawn
81#define do_aspawn g_do_aspawn
82#undef do_spawn
83#define do_spawn g_do_spawn
84#undef do_exec
85#define do_exec g_do_exec
c69f6586
GS
86#undef getlogin
87#define getlogin g_getlogin
88#endif
89
2d7a9237 90static DWORD os_id(void);
ce1da67e
GS
91static void get_shell(void);
92static long tokenize(char *str, char **dest, char ***destv);
c69f6586 93 int do_spawn2(char *cmd, int exectype);
e200fe59 94static BOOL has_shell_metachars(char *ptr);
2d7a9237 95static long filetime_to_clock(PFILETIME ft);
ad0751ec 96static BOOL filetime_from_time(PFILETIME ft, time_t t);
e5a95ffb 97static char * get_emd_part(char *leading, char *trailing, ...);
0aaad0ff
GS
98static void remove_dead_process(long deceased);
99static long find_pid(int pid);
100static char * qualified_path(const char *cmd);
c69f6586 101
2d7a9237 102HANDLE w32_perldll_handle = INVALID_HANDLE_VALUE;
4b556e6c 103static DWORD w32_platform = (DWORD)-1;
50892819 104
26618a56
GS
105#ifdef USE_THREADS
106# ifdef USE_DECLSPEC_THREAD
107__declspec(thread) char strerror_buffer[512];
e34ffe5a 108__declspec(thread) char getlogin_buffer[128];
4b556e6c 109__declspec(thread) char w32_perllib_root[MAX_PATH+1];
26618a56
GS
110# ifdef HAVE_DES_FCRYPT
111__declspec(thread) char crypt_buffer[30];
112# endif
113# else
114# define strerror_buffer (thr->i.Wstrerror_buffer)
e34ffe5a 115# define getlogin_buffer (thr->i.Wgetlogin_buffer)
4b556e6c 116# define w32_perllib_root (thr->i.Ww32_perllib_root)
26618a56
GS
117# define crypt_buffer (thr->i.Wcrypt_buffer)
118# endif
119#else
4b556e6c
JD
120static char strerror_buffer[512];
121static char getlogin_buffer[128];
122static char w32_perllib_root[MAX_PATH+1];
26618a56 123# ifdef HAVE_DES_FCRYPT
4b556e6c 124static char crypt_buffer[30];
26618a56
GS
125# endif
126#endif
127
3fe9a6f1
PP
128int
129IsWin95(void) {
2d7a9237 130 return (os_id() == VER_PLATFORM_WIN32_WINDOWS);
3fe9a6f1
PP
131}
132
133int
134IsWinNT(void) {
2d7a9237 135 return (os_id() == VER_PLATFORM_WIN32_NT);
3fe9a6f1 136}
0a753a76 137
00dc2f4f
GS
138char*
139GetRegStrFromKey(HKEY hkey, const char *lpszValueName, char** ptr, DWORD* lpDataLen)
140{ /* Retrieve a REG_SZ or REG_EXPAND_SZ from the registry */
141 HKEY handle;
142 DWORD type;
143 const char *subkey = "Software\\Perl";
144 long retval;
145
146 retval = RegOpenKeyEx(hkey, subkey, 0, KEY_READ, &handle);
ba3eb2af 147 if (retval == ERROR_SUCCESS){
00dc2f4f 148 retval = RegQueryValueEx(handle, lpszValueName, 0, &type, NULL, lpDataLen);
ba3eb2af 149 if (retval == ERROR_SUCCESS && type == REG_SZ) {
c934e9d4 150 if (*ptr) {
00dc2f4f
GS
151 Renew(*ptr, *lpDataLen, char);
152 }
153 else {
154 New(1312, *ptr, *lpDataLen, char);
155 }
156 retval = RegQueryValueEx(handle, lpszValueName, 0, NULL, (PBYTE)*ptr, lpDataLen);
ba3eb2af 157 if (retval != ERROR_SUCCESS) {
e5a95ffb 158 Safefree(*ptr);
c934e9d4 159 *ptr = Nullch;
00dc2f4f
GS
160 }
161 }
162 RegCloseKey(handle);
163 }
164 return *ptr;
165}
166
167char*
168GetRegStr(const char *lpszValueName, char** ptr, DWORD* lpDataLen)
169{
170 *ptr = GetRegStrFromKey(HKEY_CURRENT_USER, lpszValueName, ptr, lpDataLen);
c934e9d4 171 if (*ptr == Nullch)
00dc2f4f
GS
172 {
173 *ptr = GetRegStrFromKey(HKEY_LOCAL_MACHINE, lpszValueName, ptr, lpDataLen);
174 }
175 return *ptr;
176}
177
e5a95ffb
GS
178static char *
179get_emd_part(char *prev_path, char *trailing_path, ...)
00dc2f4f 180{
dc9e4912 181 char base[10];
e5a95ffb 182 va_list ap;
e24c7c18 183 char mod_name[MAX_PATH+1];
00dc2f4f 184 char *ptr;
e5a95ffb
GS
185 char *optr;
186 char *strip;
187 int oldsize, newsize;
188
189 va_start(ap, trailing_path);
190 strip = va_arg(ap, char *);
191
cceca5ed
GS
192 sprintf(base, "%5.3f",
193 (double)PERL_REVISION + ((double)PERL_VERSION / (double)1000));
dc9e4912 194
80252599
GS
195 GetModuleFileName((HMODULE)((w32_perldll_handle == INVALID_HANDLE_VALUE)
196 ? GetModuleHandle(NULL) : w32_perldll_handle),
197 mod_name, sizeof(mod_name));
e5a95ffb
GS
198 ptr = strrchr(mod_name, '\\');
199 while (ptr && strip) {
200 /* look for directories to skip back */
201 optr = ptr;
00dc2f4f 202 *ptr = '\0';
e5a95ffb
GS
203 ptr = strrchr(mod_name, '\\');
204 if (!ptr || stricmp(ptr+1, strip) != 0) {
80252599
GS
205 if(!(*strip == '5' && *(ptr+1) == '5' && strncmp(strip, base, 5) == 0
206 && strncmp(ptr+1, base, 5) == 0)) {
207 *optr = '\\';
208 ptr = optr;
209 }
00dc2f4f 210 }
e5a95ffb 211 strip = va_arg(ap, char *);
00dc2f4f 212 }
e5a95ffb
GS
213 if (!ptr) {
214 ptr = mod_name;
215 *ptr++ = '.';
00dc2f4f
GS
216 *ptr = '\\';
217 }
e5a95ffb
GS
218 va_end(ap);
219 strcpy(++ptr, trailing_path);
220
dc9e4912
GS
221 /* only add directory if it exists */
222 if(GetFileAttributes(mod_name) != (DWORD) -1) {
223 /* directory exists */
224 newsize = strlen(mod_name) + 1;
225 if (prev_path) {
226 oldsize = strlen(prev_path) + 1;
227 newsize += oldsize; /* includes plus 1 for ';' */
228 Renew(prev_path, newsize, char);
229 prev_path[oldsize-1] = ';';
230 strcpy(&prev_path[oldsize], mod_name);
231 }
232 else {
233 New(1311, prev_path, newsize, char);
234 strcpy(prev_path, mod_name);
235 }
00dc2f4f 236 }
00dc2f4f 237
e5a95ffb 238 return prev_path;
00dc2f4f
GS
239}
240
241char *
e5a95ffb 242win32_get_privlib(char *pl)
00dc2f4f 243{
e5a95ffb
GS
244 char *stdlib = "lib";
245 char buffer[MAX_PATH+1];
246 char *path = Nullch;
247 DWORD datalen;
00dc2f4f 248
e5a95ffb
GS
249 /* $stdlib = $HKCU{"lib-$]"} || $HKLM{"lib-$]"} || $HKCU{"lib"} || $HKLM{"lib"} || ""; */
250 sprintf(buffer, "%s-%s", stdlib, pl);
251 path = GetRegStr(buffer, &path, &datalen);
c934e9d4 252 if (!path)
e5a95ffb 253 path = GetRegStr(stdlib, &path, &datalen);
00dc2f4f 254
e5a95ffb
GS
255 /* $stdlib .= ";$EMD/../../lib" */
256 return get_emd_part(path, stdlib, ARCHNAME, "bin", Nullch);
00dc2f4f
GS
257}
258
68dc0745 259char *
00dc2f4f
GS
260win32_get_sitelib(char *pl)
261{
e5a95ffb
GS
262 char *sitelib = "sitelib";
263 char regstr[40];
e24c7c18 264 char pathstr[MAX_PATH+1];
e5a95ffb
GS
265 DWORD datalen;
266 char *path1 = Nullch;
267 char *path2 = Nullch;
268 int len, newsize;
00dc2f4f
GS
269
270 /* $HKCU{"sitelib-$]"} || $HKLM{"sitelib-$]"} . ---; */
e5a95ffb
GS
271 sprintf(regstr, "%s-%s", sitelib, pl);
272 path1 = GetRegStr(regstr, &path1, &datalen);
273
274 /* $sitelib .=
275 * ";$EMD/" . ((-d $EMD/../../../$]) ? "../../.." : "../.."). "/site/$]/lib"; */
276 sprintf(pathstr, "site\\%s\\lib", pl);
277 path1 = get_emd_part(path1, pathstr, ARCHNAME, "bin", pl, Nullch);
00dc2f4f
GS
278
279 /* $HKCU{'sitelib'} || $HKLM{'sitelib'} . ---; */
e5a95ffb 280 path2 = GetRegStr(sitelib, &path2, &datalen);
00dc2f4f 281
e5a95ffb
GS
282 /* $sitelib .=
283 * ";$EMD/" . ((-d $EMD/../../../$]) ? "../../.." : "../.."). "/site/lib"; */
284 path2 = get_emd_part(path2, "site\\lib", ARCHNAME, "bin", pl, Nullch);
00dc2f4f 285
e5a95ffb
GS
286 if (!path1)
287 return path2;
00dc2f4f 288
e5a95ffb
GS
289 if (!path2)
290 return path1;
291
292 len = strlen(path1);
293 newsize = len + strlen(path2) + 2; /* plus one for ';' */
294
295 Renew(path1, newsize, char);
296 path1[len++] = ';';
297 strcpy(&path1[len], path2);
298
299 Safefree(path2);
300 return path1;
68dc0745 301}
0a753a76 302
b4793f7f 303
2d7a9237 304static BOOL
e200fe59 305has_shell_metachars(char *ptr)
68dc0745
PP
306{
307 int inquote = 0;
308 char quote = '\0';
309
310 /*
311 * Scan string looking for redirection (< or >) or pipe
e200fe59
JD
312 * characters (|) that are not in a quoted string.
313 * Shell variable interpolation (%VAR%) can also happen inside strings.
68dc0745 314 */
9404a519 315 while (*ptr) {
68dc0745 316 switch(*ptr) {
e200fe59
JD
317 case '%':
318 return TRUE;
68dc0745
PP
319 case '\'':
320 case '\"':
9404a519
GS
321 if (inquote) {
322 if (quote == *ptr) {
68dc0745
PP
323 inquote = 0;
324 quote = '\0';
0a753a76 325 }
68dc0745
PP
326 }
327 else {
328 quote = *ptr;
329 inquote++;
330 }
331 break;
332 case '>':
333 case '<':
334 case '|':
9404a519 335 if (!inquote)
68dc0745
PP
336 return TRUE;
337 default:
338 break;
0a753a76 339 }
68dc0745
PP
340 ++ptr;
341 }
342 return FALSE;
0a753a76
PP
343}
344
c69f6586 345#if !defined(PERL_OBJECT)
68dc0745
PP
346/* since the current process environment is being updated in util.c
347 * the library functions will get the correct environment
348 */
349PerlIO *
350my_popen(char *cmd, char *mode)
0a753a76
PP
351{
352#ifdef FIXCMD
68dc0745
PP
353#define fixcmd(x) { \
354 char *pspace = strchr((x),' '); \
355 if (pspace) { \
356 char *p = (x); \
357 while (p < pspace) { \
358 if (*p == '/') \
359 *p = '\\'; \
360 p++; \
361 } \
362 } \
363 }
0a753a76
PP
364#else
365#define fixcmd(x)
366#endif
68dc0745 367 fixcmd(cmd);
3e3baf6d
TB
368 win32_fflush(stdout);
369 win32_fflush(stderr);
0a753a76 370 return win32_popen(cmd, mode);
0a753a76
PP
371}
372
68dc0745
PP
373long
374my_pclose(PerlIO *fp)
0a753a76
PP
375{
376 return win32_pclose(fp);
377}
c69f6586 378#endif
0a753a76 379
8b10511d 380static DWORD
2d7a9237 381os_id(void)
0a753a76 382{
8b10511d 383 static OSVERSIONINFO osver;
0a753a76 384
2d7a9237 385 if (osver.dwPlatformId != w32_platform) {
8b10511d
GS
386 memset(&osver, 0, sizeof(OSVERSIONINFO));
387 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
388 GetVersionEx(&osver);
2d7a9237 389 w32_platform = osver.dwPlatformId;
8b10511d 390 }
2d7a9237 391 return (w32_platform);
0a753a76
PP
392}
393
ce1da67e
GS
394/* Tokenize a string. Words are null-separated, and the list
395 * ends with a doubled null. Any character (except null and
396 * including backslash) may be escaped by preceding it with a
397 * backslash (the backslash will be stripped).
398 * Returns number of words in result buffer.
399 */
400static long
401tokenize(char *str, char **dest, char ***destv)
402{
403 char *retstart = Nullch;
404 char **retvstart = 0;
405 int items = -1;
406 if (str) {
407 int slen = strlen(str);
408 register char *ret;
409 register char **retv;
410 New(1307, ret, slen+2, char);
411 New(1308, retv, (slen+3)/2, char*);
412
413 retstart = ret;
414 retvstart = retv;
415 *retv = ret;
416 items = 0;
417 while (*str) {
418 *ret = *str++;
419 if (*ret == '\\' && *str)
420 *ret = *str++;
421 else if (*ret == ' ') {
422 while (*str == ' ')
423 str++;
424 if (ret == retstart)
425 ret--;
426 else {
427 *ret = '\0';
428 ++items;
429 if (*str)
430 *++retv = ret+1;
431 }
432 }
433 else if (!*str)
434 ++items;
435 ret++;
436 }
437 retvstart[items] = Nullch;
438 *ret++ = '\0';
439 *ret = '\0';
440 }
441 *dest = retstart;
442 *destv = retvstart;
443 return items;
444}
445
446static void
2d7a9237 447get_shell(void)
0a753a76 448{
ce1da67e 449 if (!w32_perlshell_tokens) {
174c211a
GS
450 /* we don't use COMSPEC here for two reasons:
451 * 1. the same reason perl on UNIX doesn't use SHELL--rampant and
452 * uncontrolled unportability of the ensuing scripts.
453 * 2. PERL5SHELL could be set to a shell that may not be fit for
454 * interactive use (which is what most programs look in COMSPEC
455 * for).
456 */
ce1da67e
GS
457 char* defaultshell = (IsWinNT() ? "cmd.exe /x/c" : "command.com /c");
458 char *usershell = getenv("PERL5SHELL");
459 w32_perlshell_items = tokenize(usershell ? usershell : defaultshell,
460 &w32_perlshell_tokens,
461 &w32_perlshell_vec);
68dc0745 462 }
0a753a76
PP
463}
464
68dc0745 465int
2d7a9237 466do_aspawn(void *vreally, void **vmark, void **vsp)
0a753a76 467{
2d7a9237
GS
468 SV *really = (SV*)vreally;
469 SV **mark = (SV**)vmark;
470 SV **sp = (SV**)vsp;
68dc0745 471 char **argv;
2d7a9237 472 char *str;
68dc0745 473 int status;
2d7a9237 474 int flag = P_WAIT;
68dc0745 475 int index = 0;
68dc0745 476
2d7a9237
GS
477 if (sp <= mark)
478 return -1;
68dc0745 479
ce1da67e
GS
480 get_shell();
481 New(1306, argv, (sp - mark) + w32_perlshell_items + 2, char*);
2d7a9237
GS
482
483 if (SvNIOKp(*(mark+1)) && !SvPOKp(*(mark+1))) {
484 ++mark;
485 flag = SvIVx(*mark);
68dc0745
PP
486 }
487
9404a519 488 while (++mark <= sp) {
bb897dfc 489 if (*mark && (str = SvPV_nolen(*mark)))
2d7a9237
GS
490 argv[index++] = str;
491 else
492 argv[index++] = "";
68dc0745
PP
493 }
494 argv[index++] = 0;
495
2d7a9237 496 status = win32_spawnvp(flag,
bb897dfc 497 (const char*)(really ? SvPV_nolen(really) : argv[0]),
2d7a9237
GS
498 (const char* const*)argv);
499
80252599 500 if (status < 0 && (errno == ENOEXEC || errno == ENOENT)) {
2d7a9237 501 /* possible shell-builtin, invoke with shell */
ce1da67e
GS
502 int sh_items;
503 sh_items = w32_perlshell_items;
2d7a9237
GS
504 while (--index >= 0)
505 argv[index+sh_items] = argv[index];
ce1da67e
GS
506 while (--sh_items >= 0)
507 argv[sh_items] = w32_perlshell_vec[sh_items];
2d7a9237
GS
508
509 status = win32_spawnvp(flag,
bb897dfc 510 (const char*)(really ? SvPV_nolen(really) : argv[0]),
2d7a9237
GS
511 (const char* const*)argv);
512 }
68dc0745 513
50892819
GS
514 if (flag != P_NOWAIT) {
515 if (status < 0) {
b28d0864 516 if (PL_dowarn)
50892819
GS
517 warn("Can't spawn \"%s\": %s", argv[0], strerror(errno));
518 status = 255 * 256;
519 }
520 else
521 status *= 256;
b28d0864 522 PL_statusvalue = status;
5aabfad6 523 }
ce1da67e 524 Safefree(argv);
50892819 525 return (status);
68dc0745
PP
526}
527
c69f6586 528int
6890e559 529do_spawn2(char *cmd, int exectype)
68dc0745
PP
530{
531 char **a;
532 char *s;
533 char **argv;
534 int status = -1;
535 BOOL needToTry = TRUE;
2d7a9237 536 char *cmd2;
68dc0745 537
2d7a9237
GS
538 /* Save an extra exec if possible. See if there are shell
539 * metacharacters in it */
e200fe59 540 if (!has_shell_metachars(cmd)) {
fc36a67e
PP
541 New(1301,argv, strlen(cmd) / 2 + 2, char*);
542 New(1302,cmd2, strlen(cmd) + 1, char);
68dc0745
PP
543 strcpy(cmd2, cmd);
544 a = argv;
545 for (s = cmd2; *s;) {
546 while (*s && isspace(*s))
547 s++;
548 if (*s)
549 *(a++) = s;
9404a519 550 while (*s && !isspace(*s))
68dc0745 551 s++;
9404a519 552 if (*s)
68dc0745 553 *s++ = '\0';
0a753a76 554 }
68dc0745 555 *a = Nullch;
ce1da67e 556 if (argv[0]) {
6890e559
GS
557 switch (exectype) {
558 case EXECF_SPAWN:
559 status = win32_spawnvp(P_WAIT, argv[0],
560 (const char* const*)argv);
561 break;
562 case EXECF_SPAWN_NOWAIT:
563 status = win32_spawnvp(P_NOWAIT, argv[0],
564 (const char* const*)argv);
565 break;
566 case EXECF_EXEC:
567 status = win32_execvp(argv[0], (const char* const*)argv);
568 break;
569 }
2d7a9237 570 if (status != -1 || errno == 0)
68dc0745 571 needToTry = FALSE;
0a753a76 572 }
0a753a76 573 Safefree(argv);
68dc0745
PP
574 Safefree(cmd2);
575 }
2d7a9237 576 if (needToTry) {
ce1da67e
GS
577 char **argv;
578 int i = -1;
579 get_shell();
580 New(1306, argv, w32_perlshell_items + 2, char*);
581 while (++i < w32_perlshell_items)
582 argv[i] = w32_perlshell_vec[i];
2d7a9237
GS
583 argv[i++] = cmd;
584 argv[i] = Nullch;
6890e559
GS
585 switch (exectype) {
586 case EXECF_SPAWN:
587 status = win32_spawnvp(P_WAIT, argv[0],
588 (const char* const*)argv);
589 break;
590 case EXECF_SPAWN_NOWAIT:
591 status = win32_spawnvp(P_NOWAIT, argv[0],
592 (const char* const*)argv);
593 break;
594 case EXECF_EXEC:
595 status = win32_execvp(argv[0], (const char* const*)argv);
596 break;
597 }
ce1da67e
GS
598 cmd = argv[0];
599 Safefree(argv);
68dc0745 600 }
50892819
GS
601 if (exectype != EXECF_SPAWN_NOWAIT) {
602 if (status < 0) {
b28d0864 603 if (PL_dowarn)
50892819
GS
604 warn("Can't %s \"%s\": %s",
605 (exectype == EXECF_EXEC ? "exec" : "spawn"),
606 cmd, strerror(errno));
607 status = 255 * 256;
608 }
609 else
610 status *= 256;
b28d0864 611 PL_statusvalue = status;
5aabfad6 612 }
50892819 613 return (status);
0a753a76
PP
614}
615
6890e559
GS
616int
617do_spawn(char *cmd)
618{
619 return do_spawn2(cmd, EXECF_SPAWN);
620}
621
2d7a9237
GS
622int
623do_spawn_nowait(char *cmd)
624{
625 return do_spawn2(cmd, EXECF_SPAWN_NOWAIT);
626}
627
6890e559
GS
628bool
629do_exec(char *cmd)
630{
631 do_spawn2(cmd, EXECF_EXEC);
632 return FALSE;
633}
634
68dc0745
PP
635/* The idea here is to read all the directory names into a string table
636 * (separated by nulls) and when one of the other dir functions is called
637 * return the pointer to the current file name.
638 */
639DIR *
ce2e26e5 640win32_opendir(char *filename)
0a753a76 641{
9404a519
GS
642 DIR *p;
643 long len;
644 long idx;
645 char scanname[MAX_PATH+3];
646 struct stat sbuf;
647 WIN32_FIND_DATA FindData;
648 HANDLE fh;
649
650 len = strlen(filename);
651 if (len > MAX_PATH)
652 return NULL;
68dc0745
PP
653
654 /* check to see if filename is a directory */
69d3ab13 655 if (win32_stat(filename, &sbuf) < 0 || !S_ISDIR(sbuf.st_mode))
24caa93f 656 return NULL;
68dc0745 657
68dc0745 658 /* Get us a DIR structure */
fc36a67e 659 Newz(1303, p, 1, DIR);
9404a519 660 if (p == NULL)
68dc0745
PP
661 return NULL;
662
663 /* Create the search pattern */
664 strcpy(scanname, filename);
9404a519
GS
665 if (scanname[len-1] != '/' && scanname[len-1] != '\\')
666 scanname[len++] = '/';
667 scanname[len++] = '*';
668 scanname[len] = '\0';
68dc0745
PP
669
670 /* do the FindFirstFile call */
671 fh = FindFirstFile(scanname, &FindData);
9404a519 672 if (fh == INVALID_HANDLE_VALUE) {
21e72512
AB
673 /* FindFirstFile() fails on empty drives! */
674 if (GetLastError() == ERROR_FILE_NOT_FOUND)
675 return p;
676 Safefree( p);
68dc0745
PP
677 return NULL;
678 }
679
680 /* now allocate the first part of the string table for
681 * the filenames that we find.
682 */
683 idx = strlen(FindData.cFileName)+1;
fc36a67e 684 New(1304, p->start, idx, char);
9404a519 685 if (p->start == NULL)
65e48ea9 686 croak("opendir: malloc failed!\n");
68dc0745 687 strcpy(p->start, FindData.cFileName);
68dc0745
PP
688 p->nfiles++;
689
690 /* loop finding all the files that match the wildcard
691 * (which should be all of them in this directory!).
692 * the variable idx should point one past the null terminator
693 * of the previous string found.
694 */
695 while (FindNextFile(fh, &FindData)) {
696 len = strlen(FindData.cFileName);
697 /* bump the string table size by enough for the
698 * new name and it's null terminator
699 */
700 Renew(p->start, idx+len+1, char);
9404a519 701 if (p->start == NULL)
65e48ea9 702 croak("opendir: malloc failed!\n");
68dc0745 703 strcpy(&p->start[idx], FindData.cFileName);
9404a519
GS
704 p->nfiles++;
705 idx += len+1;
706 }
707 FindClose(fh);
708 p->size = idx;
709 p->curr = p->start;
710 return p;
0a753a76
PP
711}
712
713
68dc0745
PP
714/* Readdir just returns the current string pointer and bumps the
715 * string pointer to the nDllExport entry.
716 */
717struct direct *
ce2e26e5 718win32_readdir(DIR *dirp)
0a753a76 719{
68dc0745
PP
720 int len;
721 static int dummy = 0;
0a753a76 722
68dc0745
PP
723 if (dirp->curr) {
724 /* first set up the structure to return */
725 len = strlen(dirp->curr);
726 strcpy(dirp->dirstr.d_name, dirp->curr);
727 dirp->dirstr.d_namlen = len;
0a753a76 728
68dc0745
PP
729 /* Fake an inode */
730 dirp->dirstr.d_ino = dummy++;
0a753a76 731
68dc0745
PP
732 /* Now set up for the nDllExport call to readdir */
733 dirp->curr += len + 1;
734 if (dirp->curr >= (dirp->start + dirp->size)) {
735 dirp->curr = NULL;
736 }
0a753a76 737
68dc0745
PP
738 return &(dirp->dirstr);
739 }
740 else
741 return NULL;
0a753a76
PP
742}
743
68dc0745
PP
744/* Telldir returns the current string pointer position */
745long
ce2e26e5 746win32_telldir(DIR *dirp)
0a753a76
PP
747{
748 return (long) dirp->curr;
749}
750
751
68dc0745
PP
752/* Seekdir moves the string pointer to a previously saved position
753 *(Saved by telldir).
754 */
755void
ce2e26e5 756win32_seekdir(DIR *dirp, long loc)
0a753a76
PP
757{
758 dirp->curr = (char *)loc;
759}
760
68dc0745
PP
761/* Rewinddir resets the string pointer to the start */
762void
ce2e26e5 763win32_rewinddir(DIR *dirp)
0a753a76
PP
764{
765 dirp->curr = dirp->start;
766}
767
68dc0745
PP
768/* free the memory allocated by opendir */
769int
ce2e26e5 770win32_closedir(DIR *dirp)
0a753a76
PP
771{
772 Safefree(dirp->start);
773 Safefree(dirp);
68dc0745 774 return 1;
0a753a76
PP
775}
776
777
68dc0745
PP
778/*
779 * various stubs
780 */
0a753a76
PP
781
782
68dc0745
PP
783/* Ownership
784 *
785 * Just pretend that everyone is a superuser. NT will let us know if
786 * we don\'t really have permission to do something.
787 */
0a753a76
PP
788
789#define ROOT_UID ((uid_t)0)
790#define ROOT_GID ((gid_t)0)
791
68dc0745
PP
792uid_t
793getuid(void)
0a753a76 794{
68dc0745 795 return ROOT_UID;
0a753a76
PP
796}
797
68dc0745
PP
798uid_t
799geteuid(void)
0a753a76 800{
68dc0745 801 return ROOT_UID;
0a753a76
PP
802}
803
68dc0745
PP
804gid_t
805getgid(void)
0a753a76 806{
68dc0745 807 return ROOT_GID;
0a753a76
PP
808}
809
68dc0745
PP
810gid_t
811getegid(void)
0a753a76 812{
68dc0745 813 return ROOT_GID;
0a753a76
PP
814}
815
68dc0745 816int
22239a37 817setuid(uid_t auid)
0a753a76 818{
22239a37 819 return (auid == ROOT_UID ? 0 : -1);
0a753a76
PP
820}
821
68dc0745 822int
22239a37 823setgid(gid_t agid)
0a753a76 824{
22239a37 825 return (agid == ROOT_GID ? 0 : -1);
0a753a76
PP
826}
827
e34ffe5a
GS
828char *
829getlogin(void)
830{
831 dTHR;
832 char *buf = getlogin_buffer;
833 DWORD size = sizeof(getlogin_buffer);
834 if (GetUserName(buf,&size))
835 return buf;
836 return (char*)NULL;
837}
838
b990f8c8
GS
839int
840chown(const char *path, uid_t owner, gid_t group)
841{
842 /* XXX noop */
1c1c7f20 843 return 0;
b990f8c8
GS
844}
845
0aaad0ff
GS
846static long
847find_pid(int pid)
0a753a76 848{
0aaad0ff 849 long child;
f55ee38a 850 for (child = 0 ; child < w32_num_children ; ++child) {
0aaad0ff
GS
851 if (w32_child_pids[child] == pid)
852 return child;
853 }
854 return -1;
855}
856
857static void
858remove_dead_process(long child)
859{
860 if (child >= 0) {
861 CloseHandle(w32_child_handles[child]);
862 Copy(&w32_child_handles[child+1], &w32_child_handles[child],
863 (w32_num_children-child-1), HANDLE);
864 Copy(&w32_child_pids[child+1], &w32_child_pids[child],
865 (w32_num_children-child-1), DWORD);
866 w32_num_children--;
f55ee38a 867 }
f55ee38a
GS
868}
869
870DllExport int
871win32_kill(int pid, int sig)
872{
0aaad0ff
GS
873 HANDLE hProcess;
874 hProcess = OpenProcess(PROCESS_ALL_ACCESS, TRUE, pid);
875 if (hProcess && TerminateProcess(hProcess, sig))
68dc0745 876 CloseHandle(hProcess);
0aaad0ff
GS
877 else {
878 errno = EINVAL;
879 return -1;
68dc0745
PP
880 }
881 return 0;
0a753a76 882}
fbbbcc48 883
68dc0745
PP
884/*
885 * File system stuff
886 */
0a753a76 887
f3986ebb
GS
888DllExport unsigned int
889win32_sleep(unsigned int t)
0a753a76 890{
68dc0745
PP
891 Sleep(t*1000);
892 return 0;
0a753a76
PP
893}
894
68dc0745
PP
895DllExport int
896win32_stat(const char *path, struct stat *buffer)
0a753a76 897{
24caa93f 898 char t[MAX_PATH+1];
68dc0745
PP
899 const char *p = path;
900 int l = strlen(path);
67fbe06e 901 int res;
0a753a76 902
68dc0745
PP
903 if (l > 1) {
904 switch(path[l - 1]) {
905 case '\\':
906 case '/':
907 if (path[l - 2] != ':') {
908 strncpy(t, path, l - 1);
909 t[l - 1] = 0;
910 p = t;
911 };
912 }
913 }
390b85e7 914 res = stat(p,buffer);
24caa93f
GS
915 if (res < 0) {
916 /* CRT is buggy on sharenames, so make sure it really isn't.
917 * XXX using GetFileAttributesEx() will enable us to set
918 * buffer->st_*time (but note that's not available on the
919 * Windows of 1995) */
920 DWORD r = GetFileAttributes(p);
921 if (r != 0xffffffff && (r & FILE_ATTRIBUTE_DIRECTORY)) {
922 buffer->st_mode |= S_IFDIR | S_IREAD;
923 errno = 0;
924 if (!(r & FILE_ATTRIBUTE_READONLY))
925 buffer->st_mode |= S_IWRITE | S_IEXEC;
926 return 0;
927 }
928 }
24caa93f 929 else {
2293b0e9
AB
930 if (l == 3 && path[l-2] == ':'
931 && (path[l-1] == '\\' || path[l-1] == '/'))
932 {
933 /* The drive can be inaccessible, some _stat()s are buggy */
934 if (!GetVolumeInformation(path,NULL,0,NULL,NULL,NULL,NULL,0)) {
935 errno = ENOENT;
936 return -1;
937 }
938 }
939#ifdef __BORLANDC__
67fbe06e
GS
940 if (S_ISDIR(buffer->st_mode))
941 buffer->st_mode |= S_IWRITE | S_IEXEC;
942 else if (S_ISREG(buffer->st_mode)) {
943 if (l >= 4 && path[l-4] == '.') {
944 const char *e = path + l - 3;
945 if (strnicmp(e,"exe",3)
946 && strnicmp(e,"bat",3)
947 && strnicmp(e,"com",3)
948 && (IsWin95() || strnicmp(e,"cmd",3)))
949 buffer->st_mode &= ~S_IEXEC;
950 else
951 buffer->st_mode |= S_IEXEC;
952 }
953 else
954 buffer->st_mode &= ~S_IEXEC;
955 }
67fbe06e 956#endif
2293b0e9 957 }
67fbe06e 958 return res;
0a753a76
PP
959}
960
0551aaa8
GS
961#ifndef USE_WIN32_RTL_ENV
962
963DllExport char *
964win32_getenv(const char *name)
965{
c934e9d4 966 static char *curitem = Nullch; /* XXX threadead */
46124e9e 967 static DWORD curlen = 0; /* XXX threadead */
0551aaa8 968 DWORD needlen;
46124e9e
GS
969 if (!curitem) {
970 curlen = 512;
0551aaa8 971 New(1305,curitem,curlen,char);
46124e9e 972 }
58a50f62
GS
973
974 needlen = GetEnvironmentVariable(name,curitem,curlen);
975 if (needlen != 0) {
976 while (needlen > curlen) {
977 Renew(curitem,needlen,char);
978 curlen = needlen;
979 needlen = GetEnvironmentVariable(name,curitem,curlen);
980 }
0551aaa8 981 }
c934e9d4 982 else {
7a5f8e82 983 /* allow any environment variables that begin with 'PERL'
c934e9d4
GS
984 to be stored in the registry */
985 if (curitem)
58a50f62
GS
986 *curitem = '\0';
987
7a5f8e82 988 if (strncmp(name, "PERL", 4) == 0) {
c934e9d4 989 if (curitem) {
58a50f62 990 Safefree(curitem);
c934e9d4 991 curitem = Nullch;
46124e9e 992 curlen = 0;
58a50f62 993 }
00dc2f4f 994 curitem = GetRegStr(name, &curitem, &curlen);
58a50f62 995 }
c69f6586 996 }
c934e9d4 997 if (curitem && *curitem == '\0')
58a50f62
GS
998 return Nullch;
999
0551aaa8
GS
1000 return curitem;
1001}
1002
ac5c734f
GS
1003DllExport int
1004win32_putenv(const char *name)
1005{
1006 char* curitem;
1007 char* val;
1008 int relval = -1;
1009 if(name) {
1010 New(1309,curitem,strlen(name)+1,char);
1011 strcpy(curitem, name);
1012 val = strchr(curitem, '=');
1013 if(val) {
1014 /* The sane way to deal with the environment.
1015 * Has these advantages over putenv() & co.:
1016 * * enables us to store a truly empty value in the
1017 * environment (like in UNIX).
1018 * * we don't have to deal with RTL globals, bugs and leaks.
1019 * * Much faster.
1020 * Why you may want to enable USE_WIN32_RTL_ENV:
1021 * * environ[] and RTL functions will not reflect changes,
1022 * which might be an issue if extensions want to access
1023 * the env. via RTL. This cuts both ways, since RTL will
1024 * not see changes made by extensions that call the Win32
1025 * functions directly, either.
1026 * GSAR 97-06-07
1027 */
1028 *val++ = '\0';
1029 if(SetEnvironmentVariable(curitem, *val ? val : NULL))
1030 relval = 0;
1031 }
1032 Safefree(curitem);
1033 }
1034 return relval;
1035}
1036
0551aaa8
GS
1037#endif
1038
d55594ae 1039static long
2d7a9237 1040filetime_to_clock(PFILETIME ft)
d55594ae
GS
1041{
1042 __int64 qw = ft->dwHighDateTime;
1043 qw <<= 32;
1044 qw |= ft->dwLowDateTime;
1045 qw /= 10000; /* File time ticks at 0.1uS, clock at 1mS */
1046 return (long) qw;
1047}
1048
f3986ebb
GS
1049DllExport int
1050win32_times(struct tms *timebuf)
0a753a76 1051{
d55594ae
GS
1052 FILETIME user;
1053 FILETIME kernel;
1054 FILETIME dummy;
1055 if (GetProcessTimes(GetCurrentProcess(), &dummy, &dummy,
1056 &kernel,&user)) {
2d7a9237
GS
1057 timebuf->tms_utime = filetime_to_clock(&user);
1058 timebuf->tms_stime = filetime_to_clock(&kernel);
d55594ae
GS
1059 timebuf->tms_cutime = 0;
1060 timebuf->tms_cstime = 0;
1061
1062 } else {
1063 /* That failed - e.g. Win95 fallback to clock() */
1064 clock_t t = clock();
1065 timebuf->tms_utime = t;
1066 timebuf->tms_stime = 0;
1067 timebuf->tms_cutime = 0;
1068 timebuf->tms_cstime = 0;
1069 }
68dc0745 1070 return 0;
0a753a76
PP
1071}
1072
ad0751ec
GS
1073/* fix utime() so it works on directories in NT
1074 * thanks to Jan Dubois <jan.dubois@ibm.net>
1075 */
1076static BOOL
1077filetime_from_time(PFILETIME pFileTime, time_t Time)
1078{
1079 struct tm *pTM = gmtime(&Time);
1080 SYSTEMTIME SystemTime;
1081
1082 if (pTM == NULL)
1083 return FALSE;
1084
1085 SystemTime.wYear = pTM->tm_year + 1900;
1086 SystemTime.wMonth = pTM->tm_mon + 1;
1087 SystemTime.wDay = pTM->tm_mday;
1088 SystemTime.wHour = pTM->tm_hour;
1089 SystemTime.wMinute = pTM->tm_min;
1090 SystemTime.wSecond = pTM->tm_sec;
1091 SystemTime.wMilliseconds = 0;
1092
1093 return SystemTimeToFileTime(&SystemTime, pFileTime);
1094}
1095
1096DllExport int
3b405fc5 1097win32_utime(const char *filename, struct utimbuf *times)
ad0751ec
GS
1098{
1099 HANDLE handle;
1100 FILETIME ftCreate;
1101 FILETIME ftAccess;
1102 FILETIME ftWrite;
1103 struct utimbuf TimeBuffer;
1104
1105 int rc = utime(filename,times);
1106 /* EACCES: path specifies directory or readonly file */
1107 if (rc == 0 || errno != EACCES /* || !IsWinNT() */)
1108 return rc;
1109
1110 if (times == NULL) {
1111 times = &TimeBuffer;
1112 time(&times->actime);
1113 times->modtime = times->actime;
1114 }
1115
1116 /* This will (and should) still fail on readonly files */
1117 handle = CreateFile(filename, GENERIC_READ | GENERIC_WRITE,
1118 FILE_SHARE_READ | FILE_SHARE_DELETE, NULL,
1119 OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL);
1120 if (handle == INVALID_HANDLE_VALUE)
1121 return rc;
1122
1123 if (GetFileTime(handle, &ftCreate, &ftAccess, &ftWrite) &&
1124 filetime_from_time(&ftAccess, times->actime) &&
1125 filetime_from_time(&ftWrite, times->modtime) &&
1126 SetFileTime(handle, &ftCreate, &ftAccess, &ftWrite))
1127 {
1128 rc = 0;
1129 }
1130
1131 CloseHandle(handle);
1132 return rc;
1133}
1134
2d7a9237 1135DllExport int
f55ee38a
GS
1136win32_waitpid(int pid, int *status, int flags)
1137{
0aaad0ff 1138 int retval = -1;
f55ee38a 1139 if (pid == -1)
0aaad0ff 1140 return win32_wait(status);
f55ee38a 1141 else {
0aaad0ff
GS
1142 long child = find_pid(pid);
1143 if (child >= 0) {
1144 HANDLE hProcess = w32_child_handles[child];
1145 DWORD waitcode = WaitForSingleObject(hProcess, INFINITE);
1146 if (waitcode != WAIT_FAILED) {
1147 if (GetExitCodeProcess(hProcess, &waitcode)) {
1148 *status = (int)((waitcode & 0xff) << 8);
1149 retval = (int)w32_child_pids[child];
1150 remove_dead_process(child);
1151 return retval;
1152 }
1153 }
1154 else
1155 errno = ECHILD;
1156 }
1157 else {
1158 retval = cwait(status, pid, WAIT_CHILD);
1159 /* cwait() returns "correctly" on Borland */
8f1e745d 1160#ifndef __BORLANDC__
0aaad0ff
GS
1161 if (status)
1162 *status *= 256;
f55ee38a 1163#endif
0aaad0ff 1164 }
f55ee38a 1165 }
0aaad0ff 1166 return retval >= 0 ? pid : retval;
f55ee38a
GS
1167}
1168
1169DllExport int
2d7a9237
GS
1170win32_wait(int *status)
1171{
2d7a9237
GS
1172 /* XXX this wait emulation only knows about processes
1173 * spawned via win32_spawnvp(P_NOWAIT, ...).
1174 */
1175 int i, retval;
1176 DWORD exitcode, waitcode;
1177
1178 if (!w32_num_children) {
1179 errno = ECHILD;
1180 return -1;
1181 }
1182
1183 /* if a child exists, wait for it to die */
1184 waitcode = WaitForMultipleObjects(w32_num_children,
0aaad0ff 1185 w32_child_handles,
2d7a9237
GS
1186 FALSE,
1187 INFINITE);
1188 if (waitcode != WAIT_FAILED) {
1189 if (waitcode >= WAIT_ABANDONED_0
1190 && waitcode < WAIT_ABANDONED_0 + w32_num_children)
1191 i = waitcode - WAIT_ABANDONED_0;
1192 else
1193 i = waitcode - WAIT_OBJECT_0;
0aaad0ff 1194 if (GetExitCodeProcess(w32_child_handles[i], &exitcode) ) {
2d7a9237
GS
1195 *status = (int)((exitcode & 0xff) << 8);
1196 retval = (int)w32_child_pids[i];
0aaad0ff 1197 remove_dead_process(i);
2d7a9237
GS
1198 return retval;
1199 }
1200 }
1201
1202FAILED:
1203 errno = GetLastError();
1204 return -1;
2d7a9237 1205}
d55594ae 1206
2d7a9237 1207static UINT timerid = 0;
d55594ae
GS
1208
1209static VOID CALLBACK TimerProc(HWND win, UINT msg, UINT id, DWORD time)
1210{
1211 KillTimer(NULL,timerid);
1212 timerid=0;
1213 sighandler(14);
1214}
1215
f3986ebb
GS
1216DllExport unsigned int
1217win32_alarm(unsigned int sec)
0a753a76 1218{
d55594ae
GS
1219 /*
1220 * the 'obvious' implentation is SetTimer() with a callback
1221 * which does whatever receiving SIGALRM would do
1222 * we cannot use SIGALRM even via raise() as it is not
1223 * one of the supported codes in <signal.h>
1224 *
1225 * Snag is unless something is looking at the message queue
1226 * nothing happens :-(
1227 */
1228 if (sec)
1229 {
1230 timerid = SetTimer(NULL,timerid,sec*1000,(TIMERPROC)TimerProc);
1231 if (!timerid)
1232 croak("Cannot set timer");
1233 }
1234 else
1235 {
1236 if (timerid)
1237 {
1238 KillTimer(NULL,timerid);
1239 timerid=0;
1240 }
1241 }
68dc0745 1242 return 0;
0a753a76
PP
1243}
1244
ff95b63e 1245#if defined(HAVE_DES_FCRYPT) || defined(PERL_OBJECT)
26618a56 1246#ifdef HAVE_DES_FCRYPT
2d77217b 1247extern char * des_fcrypt(const char *txt, const char *salt, char *cbuf);
ff95b63e 1248#endif
26618a56
GS
1249
1250DllExport char *
1251win32_crypt(const char *txt, const char *salt)
1252{
ff95b63e 1253#ifdef HAVE_DES_FCRYPT
26618a56 1254 dTHR;
2d77217b 1255 return des_fcrypt(txt, salt, crypt_buffer);
ff95b63e
DL
1256#else
1257 die("The crypt() function is unimplemented due to excessive paranoia.");
b8957cf1 1258 return Nullch;
ff95b63e 1259#endif
26618a56
GS
1260}
1261#endif
1262
f3986ebb 1263#ifdef USE_FIXED_OSFHANDLE
390b85e7
GS
1264
1265EXTERN_C int __cdecl _alloc_osfhnd(void);
1266EXTERN_C int __cdecl _set_osfhnd(int fh, long value);
1267EXTERN_C void __cdecl _lock_fhandle(int);
1268EXTERN_C void __cdecl _unlock_fhandle(int);
1269EXTERN_C void __cdecl _unlock(int);
1270
1271#if (_MSC_VER >= 1000)
1272typedef struct {
1273 long osfhnd; /* underlying OS file HANDLE */
1274 char osfile; /* attributes of file (e.g., open in text mode?) */
1275 char pipech; /* one char buffer for handles opened on pipes */
1276#if defined (_MT) && !defined (DLL_FOR_WIN32S)
1277 int lockinitflag;
1278 CRITICAL_SECTION lock;
1279#endif /* defined (_MT) && !defined (DLL_FOR_WIN32S) */
1280} ioinfo;
1281
1282EXTERN_C ioinfo * __pioinfo[];
1283
1284#define IOINFO_L2E 5
1285#define IOINFO_ARRAY_ELTS (1 << IOINFO_L2E)
1286#define _pioinfo(i) (__pioinfo[i >> IOINFO_L2E] + (i & (IOINFO_ARRAY_ELTS - 1)))
1287#define _osfile(i) (_pioinfo(i)->osfile)
1288
1289#else /* (_MSC_VER >= 1000) */
1290extern char _osfile[];
1291#endif /* (_MSC_VER >= 1000) */
1292
1293#define FOPEN 0x01 /* file handle open */
1294#define FAPPEND 0x20 /* file handle opened O_APPEND */
1295#define FDEV 0x40 /* file handle refers to device */
1296#define FTEXT 0x80 /* file handle is in text mode */
1297
1298#define _STREAM_LOCKS 26 /* Table of stream locks */
1299#define _LAST_STREAM_LOCK (_STREAM_LOCKS+_NSTREAM_-1) /* Last stream lock */
1300#define _FH_LOCKS (_LAST_STREAM_LOCK+1) /* Table of fh locks */
1301
1302/***
1303*int my_open_osfhandle(long osfhandle, int flags) - open C Runtime file handle
1304*
1305*Purpose:
1306* This function allocates a free C Runtime file handle and associates
1307* it with the Win32 HANDLE specified by the first parameter. This is a
1308* temperary fix for WIN95's brain damage GetFileType() error on socket
1309* we just bypass that call for socket
1310*
1311*Entry:
1312* long osfhandle - Win32 HANDLE to associate with C Runtime file handle.
1313* int flags - flags to associate with C Runtime file handle.
1314*
1315*Exit:
1316* returns index of entry in fh, if successful
1317* return -1, if no free entry is found
1318*
1319*Exceptions:
1320*
1321*******************************************************************************/
1322
1323static int
1324my_open_osfhandle(long osfhandle, int flags)
1325{
1326 int fh;
1327 char fileflags; /* _osfile flags */
1328
1329 /* copy relevant flags from second parameter */
1330 fileflags = FDEV;
1331
9404a519 1332 if (flags & O_APPEND)
390b85e7
GS
1333 fileflags |= FAPPEND;
1334
9404a519 1335 if (flags & O_TEXT)
390b85e7
GS
1336 fileflags |= FTEXT;
1337
1338 /* attempt to allocate a C Runtime file handle */
9404a519 1339 if ((fh = _alloc_osfhnd()) == -1) {
390b85e7
GS
1340 errno = EMFILE; /* too many open files */
1341 _doserrno = 0L; /* not an OS error */
1342 return -1; /* return error to caller */
1343 }
1344
1345 /* the file is open. now, set the info in _osfhnd array */
1346 _set_osfhnd(fh, osfhandle);
1347
1348 fileflags |= FOPEN; /* mark as open */
1349
1350#if (_MSC_VER >= 1000)
1351 _osfile(fh) = fileflags; /* set osfile entry */
1352 _unlock_fhandle(fh);
1353#else
1354 _osfile[fh] = fileflags; /* set osfile entry */
1355 _unlock(fh+_FH_LOCKS); /* unlock handle */
1356#endif
1357
1358 return fh; /* return handle */
1359}
1360
1361#define _open_osfhandle my_open_osfhandle
f3986ebb 1362#endif /* USE_FIXED_OSFHANDLE */
390b85e7
GS
1363
1364/* simulate flock by locking a range on the file */
1365
1366#define LK_ERR(f,i) ((f) ? (i = 0) : (errno = GetLastError()))
1367#define LK_LEN 0xffff0000
1368
f3986ebb
GS
1369DllExport int
1370win32_flock(int fd, int oper)
390b85e7
GS
1371{
1372 OVERLAPPED o;
1373 int i = -1;
1374 HANDLE fh;
1375
f3986ebb
GS
1376 if (!IsWinNT()) {
1377 croak("flock() unimplemented on this platform");
1378 return -1;
1379 }
390b85e7
GS
1380 fh = (HANDLE)_get_osfhandle(fd);
1381 memset(&o, 0, sizeof(o));
1382
1383 switch(oper) {
1384 case LOCK_SH: /* shared lock */
1385 LK_ERR(LockFileEx(fh, 0, 0, LK_LEN, 0, &o),i);
1386 break;
1387 case LOCK_EX: /* exclusive lock */
1388 LK_ERR(LockFileEx(fh, LOCKFILE_EXCLUSIVE_LOCK, 0, LK_LEN, 0, &o),i);
1389 break;
1390 case LOCK_SH|LOCK_NB: /* non-blocking shared lock */
1391 LK_ERR(LockFileEx(fh, LOCKFILE_FAIL_IMMEDIATELY, 0, LK_LEN, 0, &o),i);
1392 break;
1393 case LOCK_EX|LOCK_NB: /* non-blocking exclusive lock */
1394 LK_ERR(LockFileEx(fh,
1395 LOCKFILE_EXCLUSIVE_LOCK|LOCKFILE_FAIL_IMMEDIATELY,
1396 0, LK_LEN, 0, &o),i);
1397 break;
1398 case LOCK_UN: /* unlock lock */
1399 LK_ERR(UnlockFileEx(fh, 0, LK_LEN, 0, &o),i);
1400 break;
1401 default: /* unknown */
1402 errno = EINVAL;
1403 break;
1404 }
1405 return i;
1406}
1407
1408#undef LK_ERR
1409#undef LK_LEN
1410
68dc0745
PP
1411/*
1412 * redirected io subsystem for all XS modules
1413 *
1414 */
0a753a76 1415
68dc0745
PP
1416DllExport int *
1417win32_errno(void)
0a753a76 1418{
390b85e7 1419 return (&errno);
0a753a76
PP
1420}
1421
dcb2879a
GS
1422DllExport char ***
1423win32_environ(void)
1424{
390b85e7 1425 return (&(_environ));
dcb2879a
GS
1426}
1427
68dc0745
PP
1428/* the rest are the remapped stdio routines */
1429DllExport FILE *
1430win32_stderr(void)
0a753a76 1431{
390b85e7 1432 return (stderr);
0a753a76
PP
1433}
1434
68dc0745
PP
1435DllExport FILE *
1436win32_stdin(void)
0a753a76 1437{
390b85e7 1438 return (stdin);
0a753a76
PP
1439}
1440
68dc0745
PP
1441DllExport FILE *
1442win32_stdout()
0a753a76 1443{
390b85e7 1444 return (stdout);
0a753a76
PP
1445}
1446
68dc0745
PP
1447DllExport int
1448win32_ferror(FILE *fp)
0a753a76 1449{
390b85e7 1450 return (ferror(fp));
0a753a76
PP
1451}
1452
1453
68dc0745
PP
1454DllExport int
1455win32_feof(FILE *fp)
0a753a76 1456{
390b85e7 1457 return (feof(fp));
0a753a76
PP
1458}
1459
68dc0745
PP
1460/*
1461 * Since the errors returned by the socket error function
1462 * WSAGetLastError() are not known by the library routine strerror
1463 * we have to roll our own.
1464 */
0a753a76 1465
68dc0745
PP
1466DllExport char *
1467win32_strerror(int e)
0a753a76 1468{
3e3baf6d 1469#ifndef __BORLANDC__ /* Borland intolerance */
68dc0745 1470 extern int sys_nerr;
3e3baf6d 1471#endif
68dc0745 1472 DWORD source = 0;
0a753a76 1473
9404a519 1474 if (e < 0 || e > sys_nerr) {
c53bd28a 1475 dTHR;
9404a519 1476 if (e < 0)
68dc0745 1477 e = GetLastError();
0a753a76 1478
9404a519 1479 if (FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, &source, e, 0,
68dc0745
PP
1480 strerror_buffer, sizeof(strerror_buffer), NULL) == 0)
1481 strcpy(strerror_buffer, "Unknown Error");
0a753a76 1482
68dc0745
PP
1483 return strerror_buffer;
1484 }
390b85e7 1485 return strerror(e);
0a753a76
PP
1486}
1487
22fae026 1488DllExport void
3730b96e 1489win32_str_os_error(void *sv, DWORD dwErr)
22fae026
TM
1490{
1491 DWORD dwLen;
1492 char *sMsg;
1493 dwLen = FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER
1494 |FORMAT_MESSAGE_IGNORE_INSERTS
1495 |FORMAT_MESSAGE_FROM_SYSTEM, NULL,
1496 dwErr, 0, (char *)&sMsg, 1, NULL);
1497 if (0 < dwLen) {
1498 while (0 < dwLen && isspace(sMsg[--dwLen]))
1499 ;
1500 if ('.' != sMsg[dwLen])
1501 dwLen++;
1502 sMsg[dwLen]= '\0';
1503 }
1504 if (0 == dwLen) {
c69f6586 1505 sMsg = (char*)LocalAlloc(0, 64/**sizeof(TCHAR)*/);
22fae026
TM
1506 dwLen = sprintf(sMsg,
1507 "Unknown error #0x%lX (lookup 0x%lX)",
1508 dwErr, GetLastError());
1509 }
3730b96e 1510 sv_setpvn((SV*)sv, sMsg, dwLen);
22fae026
TM
1511 LocalFree(sMsg);
1512}
1513
1514
68dc0745
PP
1515DllExport int
1516win32_fprintf(FILE *fp, const char *format, ...)
0a753a76 1517{
68dc0745
PP
1518 va_list marker;
1519 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1520
390b85e7 1521 return (vfprintf(fp, format, marker));
0a753a76
PP
1522}
1523
68dc0745
PP
1524DllExport int
1525win32_printf(const char *format, ...)
0a753a76 1526{
68dc0745
PP
1527 va_list marker;
1528 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1529
390b85e7 1530 return (vprintf(format, marker));
0a753a76
PP
1531}
1532
68dc0745
PP
1533DllExport int
1534win32_vfprintf(FILE *fp, const char *format, va_list args)
0a753a76 1535{
390b85e7 1536 return (vfprintf(fp, format, args));
0a753a76
PP
1537}
1538
96e4d5b1
PP
1539DllExport int
1540win32_vprintf(const char *format, va_list args)
1541{
390b85e7 1542 return (vprintf(format, args));
96e4d5b1
PP
1543}
1544
68dc0745
PP
1545DllExport size_t
1546win32_fread(void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1547{
390b85e7 1548 return fread(buf, size, count, fp);
0a753a76
PP
1549}
1550
68dc0745
PP
1551DllExport size_t
1552win32_fwrite(const void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1553{
390b85e7 1554 return fwrite(buf, size, count, fp);
0a753a76
PP
1555}
1556
68dc0745
PP
1557DllExport FILE *
1558win32_fopen(const char *filename, const char *mode)
0a753a76 1559{
68dc0745 1560 if (stricmp(filename, "/dev/null")==0)
390b85e7
GS
1561 return fopen("NUL", mode);
1562 return fopen(filename, mode);
0a753a76
PP
1563}
1564
f3986ebb
GS
1565#ifndef USE_SOCKETS_AS_HANDLES
1566#undef fdopen
1567#define fdopen my_fdopen
1568#endif
1569
68dc0745
PP
1570DllExport FILE *
1571win32_fdopen( int handle, const char *mode)
0a753a76 1572{
390b85e7 1573 return fdopen(handle, (char *) mode);
0a753a76
PP
1574}
1575
68dc0745
PP
1576DllExport FILE *
1577win32_freopen( const char *path, const char *mode, FILE *stream)
0a753a76 1578{
68dc0745 1579 if (stricmp(path, "/dev/null")==0)
390b85e7
GS
1580 return freopen("NUL", mode, stream);
1581 return freopen(path, mode, stream);
0a753a76
PP
1582}
1583
68dc0745
PP
1584DllExport int
1585win32_fclose(FILE *pf)
0a753a76 1586{
f3986ebb 1587 return my_fclose(pf); /* defined in win32sck.c */
0a753a76
PP
1588}
1589
68dc0745
PP
1590DllExport int
1591win32_fputs(const char *s,FILE *pf)
0a753a76 1592{
390b85e7 1593 return fputs(s, pf);
0a753a76
PP
1594}
1595
68dc0745
PP
1596DllExport int
1597win32_fputc(int c,FILE *pf)
0a753a76 1598{
390b85e7 1599 return fputc(c,pf);
0a753a76
PP
1600}
1601
68dc0745
PP
1602DllExport int
1603win32_ungetc(int c,FILE *pf)
0a753a76 1604{
390b85e7 1605 return ungetc(c,pf);
0a753a76
PP
1606}
1607
68dc0745
PP
1608DllExport int
1609win32_getc(FILE *pf)
0a753a76 1610{
390b85e7 1611 return getc(pf);
0a753a76
PP
1612}
1613
68dc0745
PP
1614DllExport int
1615win32_fileno(FILE *pf)
0a753a76 1616{
390b85e7 1617 return fileno(pf);
0a753a76
PP
1618}
1619
68dc0745
PP
1620DllExport void
1621win32_clearerr(FILE *pf)
0a753a76 1622{
390b85e7 1623 clearerr(pf);
68dc0745 1624 return;
0a753a76
PP
1625}
1626
68dc0745
PP
1627DllExport int
1628win32_fflush(FILE *pf)
0a753a76 1629{
390b85e7 1630 return fflush(pf);
0a753a76
PP
1631}
1632
68dc0745
PP
1633DllExport long
1634win32_ftell(FILE *pf)
0a753a76 1635{
390b85e7 1636 return ftell(pf);
0a753a76
PP
1637}
1638
68dc0745
PP
1639DllExport int
1640win32_fseek(FILE *pf,long offset,int origin)
0a753a76 1641{
390b85e7 1642 return fseek(pf, offset, origin);
0a753a76
PP
1643}
1644
68dc0745
PP
1645DllExport int
1646win32_fgetpos(FILE *pf,fpos_t *p)
0a753a76 1647{
390b85e7 1648 return fgetpos(pf, p);
0a753a76
PP
1649}
1650
68dc0745
PP
1651DllExport int
1652win32_fsetpos(FILE *pf,const fpos_t *p)
0a753a76 1653{
390b85e7 1654 return fsetpos(pf, p);
0a753a76
PP
1655}
1656
68dc0745
PP
1657DllExport void
1658win32_rewind(FILE *pf)
0a753a76 1659{
390b85e7 1660 rewind(pf);
68dc0745 1661 return;
0a753a76
PP
1662}
1663
68dc0745
PP
1664DllExport FILE*
1665win32_tmpfile(void)
0a753a76 1666{
390b85e7 1667 return tmpfile();
0a753a76
PP
1668}
1669
68dc0745
PP
1670DllExport void
1671win32_abort(void)
0a753a76 1672{
390b85e7 1673 abort();
68dc0745 1674 return;
0a753a76
PP
1675}
1676
68dc0745 1677DllExport int
22239a37 1678win32_fstat(int fd,struct stat *sbufptr)
0a753a76 1679{
22239a37 1680 return fstat(fd,sbufptr);
0a753a76
PP
1681}
1682
68dc0745
PP
1683DllExport int
1684win32_pipe(int *pfd, unsigned int size, int mode)
0a753a76 1685{
390b85e7 1686 return _pipe(pfd, size, mode);
0a753a76
PP
1687}
1688
50892819
GS
1689/*
1690 * a popen() clone that respects PERL5SHELL
1691 */
1692
68dc0745
PP
1693DllExport FILE*
1694win32_popen(const char *command, const char *mode)
0a753a76 1695{
4b556e6c 1696#ifdef USE_RTL_POPEN
390b85e7 1697 return _popen(command, mode);
50892819
GS
1698#else
1699 int p[2];
1700 int parent, child;
1701 int stdfd, oldfd;
1702 int ourmode;
1703 int childpid;
1704
1705 /* establish which ends read and write */
1706 if (strchr(mode,'w')) {
1707 stdfd = 0; /* stdin */
1708 parent = 1;
1709 child = 0;
1710 }
1711 else if (strchr(mode,'r')) {
1712 stdfd = 1; /* stdout */
1713 parent = 0;
1714 child = 1;
1715 }
1716 else
1717 return NULL;
1718
1719 /* set the correct mode */
1720 if (strchr(mode,'b'))
1721 ourmode = O_BINARY;
1722 else if (strchr(mode,'t'))
1723 ourmode = O_TEXT;
1724 else
1725 ourmode = _fmode & (O_TEXT | O_BINARY);
1726
1727 /* the child doesn't inherit handles */
1728 ourmode |= O_NOINHERIT;
1729
1730 if (win32_pipe( p, 512, ourmode) == -1)
1731 return NULL;
1732
1733 /* save current stdfd */
1734 if ((oldfd = win32_dup(stdfd)) == -1)
1735 goto cleanup;
1736
1737 /* make stdfd go to child end of pipe (implicitly closes stdfd) */
1738 /* stdfd will be inherited by the child */
1739 if (win32_dup2(p[child], stdfd) == -1)
1740 goto cleanup;
1741
1742 /* close the child end in parent */
1743 win32_close(p[child]);
1744
1745 /* start the child */
1746 if ((childpid = do_spawn_nowait((char*)command)) == -1)
1747 goto cleanup;
1748
1749 /* revert stdfd to whatever it was before */
1750 if (win32_dup2(oldfd, stdfd) == -1)
1751 goto cleanup;
1752
1753 /* close saved handle */
1754 win32_close(oldfd);
1755
4b556e6c 1756 sv_setiv(*av_fetch(w32_fdpid, p[parent], TRUE), childpid);
50892819
GS
1757
1758 /* we have an fd, return a file stream */
1759 return (win32_fdopen(p[parent], (char *)mode));
1760
1761cleanup:
1762 /* we don't need to check for errors here */
1763 win32_close(p[0]);
1764 win32_close(p[1]);
1765 if (oldfd != -1) {
1766 win32_dup2(oldfd, stdfd);
1767 win32_close(oldfd);
1768 }
1769 return (NULL);
1770
4b556e6c 1771#endif /* USE_RTL_POPEN */
0a753a76
PP
1772}
1773
50892819
GS
1774/*
1775 * pclose() clone
1776 */
1777
68dc0745
PP
1778DllExport int
1779win32_pclose(FILE *pf)
0a753a76 1780{
4b556e6c 1781#ifdef USE_RTL_POPEN
390b85e7 1782 return _pclose(pf);
50892819 1783#else
50892819 1784
e17cb2a9
JD
1785 int childpid, status;
1786 SV *sv;
1787
4b556e6c 1788 sv = *av_fetch(w32_fdpid, win32_fileno(pf), TRUE);
e17cb2a9
JD
1789 if (SvIOK(sv))
1790 childpid = SvIVX(sv);
1791 else
1792 childpid = 0;
50892819
GS
1793
1794 if (!childpid) {
1795 errno = EBADF;
1796 return -1;
1797 }
1798
1799 win32_fclose(pf);
e17cb2a9
JD
1800 SvIVX(sv) = 0;
1801
0aaad0ff
GS
1802 if (win32_waitpid(childpid, &status, 0) == -1)
1803 return -1;
50892819 1804
0aaad0ff 1805 return status;
50892819 1806
4b556e6c 1807#endif /* USE_RTL_POPEN */
0a753a76
PP
1808}
1809
68dc0745 1810DllExport int
8d9b2e3c 1811win32_rename(const char *oname, const char *newname)
e24c7c18 1812{
80252599
GS
1813 /* XXX despite what the documentation says about MoveFileEx(),
1814 * it doesn't work under Windows95!
1815 */
1816 if (IsWinNT()) {
1817 if (!MoveFileEx(oname,newname,
1818 MOVEFILE_COPY_ALLOWED|MOVEFILE_REPLACE_EXISTING)) {
1819 DWORD err = GetLastError();
1820 switch (err) {
1821 case ERROR_BAD_NET_NAME:
1822 case ERROR_BAD_NETPATH:
1823 case ERROR_BAD_PATHNAME:
1824 case ERROR_FILE_NOT_FOUND:
1825 case ERROR_FILENAME_EXCED_RANGE:
1826 case ERROR_INVALID_DRIVE:
1827 case ERROR_NO_MORE_FILES:
1828 case ERROR_PATH_NOT_FOUND:
1829 errno = ENOENT;
1830 break;
1831 default:
1832 errno = EACCES;
1833 break;
1834 }
1835 return -1;
1836 }
1837 return 0;
e24c7c18 1838 }
80252599
GS
1839 else {
1840 int retval = 0;
1841 char tmpname[MAX_PATH+1];
1842 char dname[MAX_PATH+1];
1843 char *endname = Nullch;
1844 STRLEN tmplen = 0;
1845 DWORD from_attr, to_attr;
1846
1847 /* if oname doesn't exist, do nothing */
1848 from_attr = GetFileAttributes(oname);
1849 if (from_attr == 0xFFFFFFFF) {
1850 errno = ENOENT;
1851 return -1;
1852 }
1853
1854 /* if newname exists, rename it to a temporary name so that we
1855 * don't delete it in case oname happens to be the same file
1856 * (but perhaps accessed via a different path)
1857 */
1858 to_attr = GetFileAttributes(newname);
1859 if (to_attr != 0xFFFFFFFF) {
1860 /* if newname is a directory, we fail
1861 * XXX could overcome this with yet more convoluted logic */
1862 if (to_attr & FILE_ATTRIBUTE_DIRECTORY) {
1863 errno = EACCES;
1864 return -1;
1865 }
1866 tmplen = strlen(newname);
1867 strcpy(tmpname,newname);
1868 endname = tmpname+tmplen;
1869 for (; endname > tmpname ; --endname) {
1870 if (*endname == '/' || *endname == '\\') {
1871 *endname = '\0';
1872 break;
1873 }
1874 }
1875 if (endname > tmpname)
1876 endname = strcpy(dname,tmpname);
e24c7c18 1877 else
80252599
GS
1878 endname = ".";
1879
1880 /* get a temporary filename in same directory
1881 * XXX is this really the best we can do? */
1882 if (!GetTempFileName((LPCTSTR)endname, "plr", 0, tmpname)) {
1883 errno = ENOENT;
1884 return -1;
1885 }
1886 DeleteFile(tmpname);
1887
1888 retval = rename(newname, tmpname);
1889 if (retval != 0) {
1890 errno = EACCES;
1891 return retval;
e24c7c18
GS
1892 }
1893 }
80252599
GS
1894
1895 /* rename oname to newname */
1896 retval = rename(oname, newname);
1897
1898 /* if we created a temporary file before ... */
1899 if (endname != Nullch) {
1900 /* ...and rename succeeded, delete temporary file/directory */
1901 if (retval == 0)
1902 DeleteFile(tmpname);
1903 /* else restore it to what it was */
1904 else
1905 (void)rename(tmpname, newname);
1906 }
1907 return retval;
e24c7c18 1908 }
e24c7c18
GS
1909}
1910
1911DllExport int
68dc0745 1912win32_setmode(int fd, int mode)
0a753a76 1913{
390b85e7 1914 return setmode(fd, mode);
0a753a76
PP
1915}
1916
96e4d5b1
PP
1917DllExport long
1918win32_lseek(int fd, long offset, int origin)
1919{
390b85e7 1920 return lseek(fd, offset, origin);
96e4d5b1
PP
1921}
1922
1923DllExport long
1924win32_tell(int fd)
1925{
390b85e7 1926 return tell(fd);
96e4d5b1
PP
1927}
1928
68dc0745
PP
1929DllExport int
1930win32_open(const char *path, int flag, ...)
0a753a76 1931{
68dc0745
PP
1932 va_list ap;
1933 int pmode;
0a753a76
PP
1934
1935 va_start(ap, flag);
1936 pmode = va_arg(ap, int);
1937 va_end(ap);
1938
68dc0745 1939 if (stricmp(path, "/dev/null")==0)
390b85e7
GS
1940 return open("NUL", flag, pmode);
1941 return open(path,flag,pmode);
0a753a76
PP
1942}
1943
68dc0745
PP
1944DllExport int
1945win32_close(int fd)
0a753a76 1946{
390b85e7 1947 return close(fd);
0a753a76
PP
1948}
1949
68dc0745 1950DllExport int
96e4d5b1
PP
1951win32_eof(int fd)
1952{
390b85e7 1953 return eof(fd);
96e4d5b1
PP
1954}
1955
1956DllExport int
68dc0745 1957win32_dup(int fd)
0a753a76 1958{
390b85e7 1959 return dup(fd);
0a753a76
PP
1960}
1961
68dc0745
PP
1962DllExport int
1963win32_dup2(int fd1,int fd2)
0a753a76 1964{
390b85e7 1965 return dup2(fd1,fd2);
0a753a76
PP
1966}
1967
68dc0745 1968DllExport int
3e3baf6d 1969win32_read(int fd, void *buf, unsigned int cnt)
0a753a76 1970{
390b85e7 1971 return read(fd, buf, cnt);
0a753a76
PP
1972}
1973
68dc0745 1974DllExport int
3e3baf6d 1975win32_write(int fd, const void *buf, unsigned int cnt)
0a753a76 1976{
390b85e7 1977 return write(fd, buf, cnt);
0a753a76
PP
1978}
1979
68dc0745 1980DllExport int
5aabfad6
PP
1981win32_mkdir(const char *dir, int mode)
1982{
390b85e7 1983 return mkdir(dir); /* just ignore mode */
5aabfad6 1984}
96e4d5b1 1985
5aabfad6
PP
1986DllExport int
1987win32_rmdir(const char *dir)
1988{
390b85e7 1989 return rmdir(dir);
5aabfad6 1990}
96e4d5b1 1991
5aabfad6
PP
1992DllExport int
1993win32_chdir(const char *dir)
1994{
390b85e7 1995 return chdir(dir);
5aabfad6 1996}
96e4d5b1 1997
0aaad0ff
GS
1998static char *
1999create_command_line(const char* command, const char * const *args)
2000{
2001 int index;
2002 char *cmd, *ptr, *arg;
2003 STRLEN len = strlen(command) + 1;
2004
2005 for (index = 0; (ptr = (char*)args[index]) != NULL; ++index)
2006 len += strlen(ptr) + 1;
2007
2008 New(1310, cmd, len, char);
2009 ptr = cmd;
2010 strcpy(ptr, command);
2011 ptr += strlen(ptr);
2012 *ptr++ = ' ';
2013
2014 for (index = 0; (arg = (char*)args[index]) != NULL; ++index) {
2015 strcpy(ptr, arg);
2016 ptr += strlen(ptr);
2017 if ((char*)args[index+1] != NULL)
2018 *ptr++ = ' ';
2019 }
2020
2021 return cmd;
2022}
2023
2024static char *
2025qualified_path(const char *cmd)
2026{
2027 char *pathstr;
2028 char *fullcmd, *curfullcmd;
2029 STRLEN cmdlen = 0;
2030 int has_slash = 0;
2031
2032 if (!cmd)
2033 return Nullch;
2034 fullcmd = (char*)cmd;
2035 while (*fullcmd) {
2036 if (*fullcmd == '/' || *fullcmd == '\\')
2037 has_slash++;
2038 fullcmd++;
2039 cmdlen++;
2040 }
2041
2042 /* look in PATH */
2043 pathstr = win32_getenv("PATH");
2044 New(0, fullcmd, MAX_PATH+1, char);
2045 curfullcmd = fullcmd;
2046
2047 while (1) {
2048 DWORD res;
2049
2050 /* start by appending the name to the current prefix */
2051 strcpy(curfullcmd, cmd);
2052 curfullcmd += cmdlen;
2053
2054 /* if it doesn't end with '.', or has no extension, try adding
2055 * a trailing .exe first */
2056 if (cmd[cmdlen-1] != '.'
2057 && (cmdlen < 4 || cmd[cmdlen-4] != '.'))
2058 {
2059 strcpy(curfullcmd, ".exe");
2060 res = GetFileAttributes(fullcmd);
2061 if (res != 0xFFFFFFFF && !(res & FILE_ATTRIBUTE_DIRECTORY))
2062 return fullcmd;
2063 *curfullcmd = '\0';
2064 }
2065
2066 /* that failed, try the bare name */
2067 res = GetFileAttributes(fullcmd);
2068 if (res != 0xFFFFFFFF && !(res & FILE_ATTRIBUTE_DIRECTORY))
2069 return fullcmd;
2070
2071 /* quit if no other path exists, or if cmd already has path */
2072 if (!pathstr || !*pathstr || has_slash)
2073 break;
2074
2075 /* skip leading semis */
2076 while (*pathstr == ';')
2077 pathstr++;
2078
2079 /* build a new prefix from scratch */
2080 curfullcmd = fullcmd;
2081 while (*pathstr && *pathstr != ';') {
2082 if (*pathstr == '"') { /* foo;"baz;etc";bar */
2083 pathstr++; /* skip initial '"' */
2084 while (*pathstr && *pathstr != '"') {
2085 if (curfullcmd-fullcmd < MAX_PATH-cmdlen-5)
2086 *curfullcmd++ = *pathstr;
2087 pathstr++;
2088 }
2089 if (*pathstr)
2090 pathstr++; /* skip trailing '"' */
2091 }
2092 else {
2093 if (curfullcmd-fullcmd < MAX_PATH-cmdlen-5)
2094 *curfullcmd++ = *pathstr;
2095 pathstr++;
2096 }
2097 }
2098 if (*pathstr)
2099 pathstr++; /* skip trailing semi */
2100 if (curfullcmd > fullcmd /* append a dir separator */
2101 && curfullcmd[-1] != '/' && curfullcmd[-1] != '\\')
2102 {
2103 *curfullcmd++ = '\\';
2104 }
2105 }
2106GIVE_UP:
2107 Safefree(fullcmd);
2108 return Nullch;
2109}
2110
2111/* XXX this needs to be made more compatible with the spawnvp()
2112 * provided by the various RTLs. In particular, searching for
2113 * *.{com,bat,cmd} files (as done by the RTLs) is unimplemented.
2114 * This doesn't significantly affect perl itself, because we
2115 * always invoke things using PERL5SHELL if a direct attempt to
2116 * spawn the executable fails.
2117 *
2118 * XXX splitting and rejoining the commandline between do_aspawn()
2119 * and win32_spawnvp() could also be avoided.
2120 */
2121
5aabfad6 2122DllExport int
3e3baf6d 2123win32_spawnvp(int mode, const char *cmdname, const char *const *argv)
0a753a76 2124{
0aaad0ff
GS
2125#ifdef USE_RTL_SPAWNVP
2126 return spawnvp(mode, cmdname, (char * const *)argv);
2127#else
2128 DWORD ret;
2129 STARTUPINFO StartupInfo;
2130 PROCESS_INFORMATION ProcessInformation;
2131 DWORD create = 0;
2132
2133 char *cmd = create_command_line(cmdname, strcmp(cmdname, argv[0]) == 0
2134 ? &argv[1] : argv);
2135 char *fullcmd = Nullch;
2136
2137 switch(mode) {
2138 case P_NOWAIT: /* asynch + remember result */
2139 if (w32_num_children >= MAXIMUM_WAIT_OBJECTS) {
2140 errno = EAGAIN;
2141 ret = -1;
2142 goto RETVAL;
2143 }
2144 /* FALL THROUGH */
2145 case P_WAIT: /* synchronous execution */
2146 break;
2147 default: /* invalid mode */
2148 errno = EINVAL;
2149 ret = -1;
2150 goto RETVAL;
2151 }
2152 memset(&StartupInfo,0,sizeof(StartupInfo));
2153 StartupInfo.cb = sizeof(StartupInfo);
2154 StartupInfo.wShowWindow = SW_SHOWDEFAULT;
2155
2156RETRY:
2157 if (!CreateProcess(cmdname, /* search PATH to find executable */
2158 cmd, /* executable, and its arguments */
2159 NULL, /* process attributes */
2160 NULL, /* thread attributes */
2161 TRUE, /* inherit handles */
2162 create, /* creation flags */
2163 NULL, /* inherit environment */
2164 NULL, /* inherit cwd */
2165 &StartupInfo,
2166 &ProcessInformation))
2167 {
2168 /* initial NULL argument to CreateProcess() does a PATH
2169 * search, but it always first looks in the directory
2170 * where the current process was started, which behavior
2171 * is undesirable for backward compatibility. So we
2172 * jump through our own hoops by picking out the path
2173 * we really want it to use. */
2174 if (!fullcmd) {
2175 fullcmd = qualified_path(cmdname);
2176 if (fullcmd) {
2177 cmdname = fullcmd;
2178 goto RETRY;
2179 }
2180 }
2181 errno = ENOENT;
2182 ret = -1;
2183 goto RETVAL;
2184 }
2d7a9237 2185
0aaad0ff
GS
2186 if (mode == P_NOWAIT) {
2187 /* asynchronous spawn -- store handle, return PID */
2188 w32_child_handles[w32_num_children] = ProcessInformation.hProcess;
2189 ret = w32_child_pids[w32_num_children] = ProcessInformation.dwProcessId;
2190 ++w32_num_children;
2191 }
2192 else {
2193 WaitForSingleObject(ProcessInformation.hProcess, INFINITE);
2194 GetExitCodeProcess(ProcessInformation.hProcess, &ret);
2195 CloseHandle(ProcessInformation.hProcess);
2196 }
e17cb2a9 2197
0aaad0ff
GS
2198 CloseHandle(ProcessInformation.hThread);
2199RETVAL:
2200 Safefree(cmd);
2201 Safefree(fullcmd);
2202 return (int)ret;
2d7a9237 2203#endif
0a753a76
PP
2204}
2205
6890e559 2206DllExport int
eb62e965
JD
2207win32_execv(const char *cmdname, const char *const *argv)
2208{
2209 return execv(cmdname, (char *const *)argv);
2210}
2211
2212DllExport int
6890e559
GS
2213win32_execvp(const char *cmdname, const char *const *argv)
2214{
390b85e7 2215 return execvp(cmdname, (char *const *)argv);
6890e559
GS
2216}
2217
84902520
TB
2218DllExport void
2219win32_perror(const char *str)
2220{
390b85e7 2221 perror(str);
84902520
TB
2222}
2223
2224DllExport void
2225win32_setbuf(FILE *pf, char *buf)
2226{
390b85e7 2227 setbuf(pf, buf);
84902520
TB
2228}
2229
2230DllExport int
2231win32_setvbuf(FILE *pf, char *buf, int type, size_t size)
2232{
390b85e7 2233 return setvbuf(pf, buf, type, size);
84902520
TB
2234}
2235
2236DllExport int
2237win32_flushall(void)
2238{
390b85e7 2239 return flushall();
84902520
TB
2240}
2241
2242DllExport int
2243win32_fcloseall(void)
2244{
390b85e7 2245 return fcloseall();
84902520
TB
2246}
2247
2248DllExport char*
2249win32_fgets(char *s, int n, FILE *pf)
2250{
390b85e7 2251 return fgets(s, n, pf);
84902520
TB
2252}
2253
2254DllExport char*
2255win32_gets(char *s)
2256{
390b85e7 2257 return gets(s);
84902520
TB
2258}
2259
2260DllExport int
2261win32_fgetc(FILE *pf)
2262{
390b85e7 2263 return fgetc(pf);
84902520
TB
2264}
2265
2266DllExport int
2267win32_putc(int c, FILE *pf)
2268{
390b85e7 2269 return putc(c,pf);
84902520
TB
2270}
2271
2272DllExport int
2273win32_puts(const char *s)
2274{
390b85e7 2275 return puts(s);
84902520
TB
2276}
2277
2278DllExport int
2279win32_getchar(void)
2280{
390b85e7 2281 return getchar();
84902520
TB
2282}
2283
2284DllExport int
2285win32_putchar(int c)
2286{
390b85e7 2287 return putchar(c);
84902520
TB
2288}
2289
bbc8f9de
NIS
2290#ifdef MYMALLOC
2291
2292#ifndef USE_PERL_SBRK
2293
2294static char *committed = NULL;
2295static char *base = NULL;
2296static char *reserved = NULL;
2297static char *brk = NULL;
2298static DWORD pagesize = 0;
2299static DWORD allocsize = 0;
2300
2301void *
2302sbrk(int need)
2303{
2304 void *result;
2305 if (!pagesize)
2306 {SYSTEM_INFO info;
2307 GetSystemInfo(&info);
2308 /* Pretend page size is larger so we don't perpetually
2309 * call the OS to commit just one page ...
2310 */
2311 pagesize = info.dwPageSize << 3;
2312 allocsize = info.dwAllocationGranularity;
2313 }
2314 /* This scheme fails eventually if request for contiguous
2315 * block is denied so reserve big blocks - this is only
2316 * address space not memory ...
2317 */
2318 if (brk+need >= reserved)
2319 {
2320 DWORD size = 64*1024*1024;
2321 char *addr;
2322 if (committed && reserved && committed < reserved)
2323 {
2324 /* Commit last of previous chunk cannot span allocations */
161b471a 2325 addr = (char *) VirtualAlloc(committed,reserved-committed,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de
NIS
2326 if (addr)
2327 committed = reserved;
2328 }
2329 /* Reserve some (more) space
2330 * Note this is a little sneaky, 1st call passes NULL as reserved
2331 * so lets system choose where we start, subsequent calls pass
2332 * the old end address so ask for a contiguous block
2333 */
161b471a 2334 addr = (char *) VirtualAlloc(reserved,size,MEM_RESERVE,PAGE_NOACCESS);
bbc8f9de
NIS
2335 if (addr)
2336 {
2337 reserved = addr+size;
2338 if (!base)
2339 base = addr;
2340 if (!committed)
2341 committed = base;
2342 if (!brk)
2343 brk = committed;
2344 }
2345 else
2346 {
2347 return (void *) -1;
2348 }
2349 }
2350 result = brk;
2351 brk += need;
2352 if (brk > committed)
2353 {
2354 DWORD size = ((brk-committed + pagesize -1)/pagesize) * pagesize;
161b471a 2355 char *addr = (char *) VirtualAlloc(committed,size,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de
NIS
2356 if (addr)
2357 {
2358 committed += size;
2359 }
2360 else
2361 return (void *) -1;
2362 }
2363 return result;
2364}
2365
2366#endif
2367#endif
2368
84902520
TB
2369DllExport void*
2370win32_malloc(size_t size)
2371{
390b85e7 2372 return malloc(size);
84902520
TB
2373}
2374
2375DllExport void*
2376win32_calloc(size_t numitems, size_t size)
2377{
390b85e7 2378 return calloc(numitems,size);
84902520
TB
2379}
2380
2381DllExport void*
2382win32_realloc(void *block, size_t size)
2383{
390b85e7 2384 return realloc(block,size);
84902520
TB
2385}
2386
2387DllExport void
2388win32_free(void *block)
2389{
390b85e7 2390 free(block);
84902520
TB
2391}
2392
bbc8f9de 2393
68dc0745 2394int
65e48ea9 2395win32_open_osfhandle(long handle, int flags)
0a753a76 2396{
390b85e7 2397 return _open_osfhandle(handle, flags);
0a753a76
PP
2398}
2399
68dc0745 2400long
65e48ea9 2401win32_get_osfhandle(int fd)
0a753a76 2402{
390b85e7 2403 return _get_osfhandle(fd);
0a753a76 2404}
7bac28a0 2405
7bac28a0
PP
2406/*
2407 * Extras.
2408 */
2409
ad2e33dc
GS
2410static
2411XS(w32_GetCwd)
2412{
2413 dXSARGS;
2414 SV *sv = sv_newmortal();
2415 /* Make one call with zero size - return value is required size */
2416 DWORD len = GetCurrentDirectory((DWORD)0,NULL);
2417 SvUPGRADE(sv,SVt_PV);
2418 SvGROW(sv,len);
2419 SvCUR(sv) = GetCurrentDirectory((DWORD) SvLEN(sv), SvPVX(sv));
2420 /*
2421 * If result != 0
2422 * then it worked, set PV valid,
2423 * else leave it 'undef'
2424 */
3467312b 2425 EXTEND(SP,1);
bb897dfc 2426 if (SvCUR(sv)) {
ad2e33dc 2427 SvPOK_on(sv);
bb897dfc
JD
2428 ST(0) = sv;
2429 XSRETURN(1);
2430 }
3467312b 2431 XSRETURN_UNDEF;
ad2e33dc
GS
2432}
2433
2434static
2435XS(w32_SetCwd)
2436{
2437 dXSARGS;
2438 if (items != 1)
2439 croak("usage: Win32::SetCurrentDirectory($cwd)");
bb897dfc 2440 if (SetCurrentDirectory(SvPV_nolen(ST(0))))
ad2e33dc
GS
2441 XSRETURN_YES;
2442
2443 XSRETURN_NO;
2444}
2445
2446static
2447XS(w32_GetNextAvailDrive)
2448{
2449 dXSARGS;
2450 char ix = 'C';
2451 char root[] = "_:\\";
3467312b
JD
2452
2453 EXTEND(SP,1);
ad2e33dc
GS
2454 while (ix <= 'Z') {
2455 root[0] = ix++;
2456 if (GetDriveType(root) == 1) {
2457 root[2] = '\0';
2458 XSRETURN_PV(root);
2459 }
2460 }
3467312b 2461 XSRETURN_UNDEF;
ad2e33dc
GS
2462}
2463
2464static
2465XS(w32_GetLastError)
2466{
2467 dXSARGS;
bb897dfc 2468 EXTEND(SP,1);
ad2e33dc
GS
2469 XSRETURN_IV(GetLastError());
2470}
2471
2472static
ca135624
JD
2473XS(w32_SetLastError)
2474{
2475 dXSARGS;
2476 if (items != 1)
2477 croak("usage: Win32::SetLastError($error)");
2478 SetLastError(SvIV(ST(0)));
bb897dfc 2479 XSRETURN_EMPTY;
ca135624
JD
2480}
2481
2482static
ad2e33dc
GS
2483XS(w32_LoginName)
2484{
2485 dXSARGS;
e34ffe5a
GS
2486 char *name = getlogin_buffer;
2487 DWORD size = sizeof(getlogin_buffer);
3467312b 2488 EXTEND(SP,1);
ad2e33dc
GS
2489 if (GetUserName(name,&size)) {
2490 /* size includes NULL */
2491 ST(0) = sv_2mortal(newSVpv(name,size-1));
2492 XSRETURN(1);
2493 }
3467312b 2494 XSRETURN_UNDEF;
ad2e33dc
GS
2495}
2496
2497static
2498XS(w32_NodeName)
2499{
2500 dXSARGS;
2501 char name[MAX_COMPUTERNAME_LENGTH+1];
2502 DWORD size = sizeof(name);
3467312b 2503 EXTEND(SP,1);
ad2e33dc
GS
2504 if (GetComputerName(name,&size)) {
2505 /* size does NOT include NULL :-( */
2506 ST(0) = sv_2mortal(newSVpv(name,size));
2507 XSRETURN(1);
2508 }
3467312b 2509 XSRETURN_UNDEF;
ad2e33dc
GS
2510}
2511
2512
2513static
2514XS(w32_DomainName)
2515{
2516 dXSARGS;
8c9208bc
GS
2517#ifndef HAS_NETWKSTAGETINFO
2518 /* mingw32 (and Win95) don't have NetWksta*(), so do it the old way */
ad2e33dc
GS
2519 char name[256];
2520 DWORD size = sizeof(name);
3467312b 2521 EXTEND(SP,1);
ad2e33dc
GS
2522 if (GetUserName(name,&size)) {
2523 char sid[1024];
2524 DWORD sidlen = sizeof(sid);
2525 char dname[256];
2526 DWORD dnamelen = sizeof(dname);
2527 SID_NAME_USE snu;
db15561c 2528 if (LookupAccountName(NULL, name, (PSID)&sid, &sidlen,
ad2e33dc
GS
2529 dname, &dnamelen, &snu)) {
2530 XSRETURN_PV(dname); /* all that for this */
2531 }
2532 }
e56670dd 2533#else
8c9208bc
GS
2534 /* this way is more reliable, in case user has a local account.
2535 * XXX need dynamic binding of netapi32.dll symbols or this will fail on
2536 * Win95. Probably makes more sense to move it into libwin32. */
9404a519
GS
2537 char dname[256];
2538 DWORD dnamelen = sizeof(dname);
0a2408cf 2539 PWKSTA_INFO_100 pwi;
3467312b 2540 EXTEND(SP,1);
0a2408cf
GS
2541 if (NERR_Success == NetWkstaGetInfo(NULL, 100, (LPBYTE*)&pwi)) {
2542 if (pwi->wki100_langroup && *(pwi->wki100_langroup)) {
2543 WideCharToMultiByte(CP_ACP, NULL, pwi->wki100_langroup,
2544 -1, (LPSTR)dname, dnamelen, NULL, NULL);
2545 }
2546 else {
2547 WideCharToMultiByte(CP_ACP, NULL, pwi->wki100_computername,
2548 -1, (LPSTR)dname, dnamelen, NULL, NULL);
2549 }
2550 NetApiBufferFree(pwi);
9404a519
GS
2551 XSRETURN_PV(dname);
2552 }
e56670dd 2553#endif
3467312b 2554 XSRETURN_UNDEF;
ad2e33dc
GS
2555}
2556
2557static
2558XS(w32_FsType)
2559{
2560 dXSARGS;
2561 char fsname[256];
2562 DWORD flags, filecomplen;
2563 if (GetVolumeInformation(NULL, NULL, 0, NULL, &filecomplen,
2564 &flags, fsname, sizeof(fsname))) {
bb897dfc 2565 if (GIMME_V == G_ARRAY) {
ad2e33dc
GS
2566 XPUSHs(sv_2mortal(newSVpv(fsname,0)));
2567 XPUSHs(sv_2mortal(newSViv(flags)));
2568 XPUSHs(sv_2mortal(newSViv(filecomplen)));
2569 PUTBACK;
2570 return;
2571 }
bb897dfc 2572 EXTEND(SP,1);
ad2e33dc
GS
2573 XSRETURN_PV(fsname);
2574 }
bb897dfc 2575 XSRETURN_EMPTY;
ad2e33dc
GS
2576}
2577
2578static
2579XS(w32_GetOSVersion)
2580{
2581 dXSARGS;
2582 OSVERSIONINFO osver;
2583
2584 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
2585 if (GetVersionEx(&osver)) {
2586 XPUSHs(newSVpv(osver.szCSDVersion, 0));
2587 XPUSHs(newSViv(osver.dwMajorVersion));
2588 XPUSHs(newSViv(osver.dwMinorVersion));
2589 XPUSHs(newSViv(osver.dwBuildNumber));
2590 XPUSHs(newSViv(osver.dwPlatformId));
2591 PUTBACK;
2592 return;
2593 }
bb897dfc 2594 XSRETURN_EMPTY;
ad2e33dc
GS
2595}
2596
2597static
2598XS(w32_IsWinNT)
2599{
2600 dXSARGS;
bb897dfc 2601 EXTEND(SP,1);
ad2e33dc
GS
2602 XSRETURN_IV(IsWinNT());
2603}
2604
2605static
2606XS(w32_IsWin95)
2607{
2608 dXSARGS;
bb897dfc 2609 EXTEND(SP,1);
ad2e33dc
GS
2610 XSRETURN_IV(IsWin95());
2611}
2612
2613static
2614XS(w32_FormatMessage)
2615{
2616 dXSARGS;
2617 DWORD source = 0;
2618 char msgbuf[1024];
2619
2620 if (items != 1)
2621 croak("usage: Win32::FormatMessage($errno)");
2622
2623 if (FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM,
2624 &source, SvIV(ST(0)), 0,
2625 msgbuf, sizeof(msgbuf)-1, NULL))
2626 XSRETURN_PV(msgbuf);
2627
3467312b 2628 XSRETURN_UNDEF;
ad2e33dc
GS
2629}
2630
2631static
2632XS(w32_Spawn)
2633{
2634 dXSARGS;
2635 char *cmd, *args;
2636 PROCESS_INFORMATION stProcInfo;
2637 STARTUPINFO stStartInfo;
2638 BOOL bSuccess = FALSE;
2639
9404a519 2640 if (items != 3)
ad2e33dc
GS
2641 croak("usage: Win32::Spawn($cmdName, $args, $PID)");
2642
bb897dfc
JD
2643 cmd = SvPV_nolen(ST(0));
2644 args = SvPV_nolen(ST(1));
ad2e33dc
GS
2645
2646 memset(&stStartInfo, 0, sizeof(stStartInfo)); /* Clear the block */
2647 stStartInfo.cb = sizeof(stStartInfo); /* Set the structure size */
2648 stStartInfo.dwFlags = STARTF_USESHOWWINDOW; /* Enable wShowWindow control */
2649 stStartInfo.wShowWindow = SW_SHOWMINNOACTIVE; /* Start min (normal) */
2650
9404a519 2651 if (CreateProcess(
ad2e33dc
GS
2652 cmd, /* Image path */
2653 args, /* Arguments for command line */
2654 NULL, /* Default process security */
2655 NULL, /* Default thread security */
2656 FALSE, /* Must be TRUE to use std handles */
2657 NORMAL_PRIORITY_CLASS, /* No special scheduling */
2658 NULL, /* Inherit our environment block */
2659 NULL, /* Inherit our currrent directory */
2660 &stStartInfo, /* -> Startup info */
2661 &stProcInfo)) /* <- Process info (if OK) */
2662 {
2663 CloseHandle(stProcInfo.hThread);/* library source code does this. */
2664 sv_setiv(ST(2), stProcInfo.dwProcessId);
2665 bSuccess = TRUE;
2666 }
2667 XSRETURN_IV(bSuccess);
2668}
2669
2670static
2671XS(w32_GetTickCount)
2672{
2673 dXSARGS;
bb897dfc 2674 EXTEND(SP,1);
ad2e33dc
GS
2675 XSRETURN_IV(GetTickCount());
2676}
2677
2678static
2679XS(w32_GetShortPathName)
2680{
2681 dXSARGS;
2682 SV *shortpath;
e8bab181 2683 DWORD len;
ad2e33dc 2684
9404a519 2685 if (items != 1)
ad2e33dc
GS
2686 croak("usage: Win32::GetShortPathName($longPathName)");
2687
2688 shortpath = sv_mortalcopy(ST(0));
2689 SvUPGRADE(shortpath, SVt_PV);
2690 /* src == target is allowed */
e8bab181
GS
2691 do {
2692 len = GetShortPathName(SvPVX(shortpath),
2693 SvPVX(shortpath),
2694 SvLEN(shortpath));
2695 } while (len >= SvLEN(shortpath) && sv_grow(shortpath,len+1));
2696 if (len) {
2697 SvCUR_set(shortpath,len);
ad2e33dc 2698 ST(0) = shortpath;
bb897dfc 2699 XSRETURN(1);
e8bab181 2700 }
3467312b 2701 XSRETURN_UNDEF;
ad2e33dc
GS
2702}
2703
ad0751ec 2704static
ca135624
JD
2705XS(w32_GetFullPathName)
2706{
2707 dXSARGS;
2708 SV *filename;
2709 SV *fullpath;
2710 char *filepart;
2711 DWORD len;
2712
2713 if (items != 1)
2714 croak("usage: Win32::GetFullPathName($filename)");
2715
2716 filename = ST(0);
2717 fullpath = sv_mortalcopy(filename);
2718 SvUPGRADE(fullpath, SVt_PV);
2719 do {
2720 len = GetFullPathName(SvPVX(filename),
2721 SvLEN(fullpath),
2722 SvPVX(fullpath),
2723 &filepart);
2724 } while (len >= SvLEN(fullpath) && sv_grow(fullpath,len+1));
2725 if (len) {
2726 if (GIMME_V == G_ARRAY) {
2727 EXTEND(SP,1);
bb897dfc 2728 XST_mPV(1,filepart);
ca135624
JD
2729 len = filepart - SvPVX(fullpath);
2730 items = 2;
2731 }
2732 SvCUR_set(fullpath,len);
2733 ST(0) = fullpath;
bb897dfc 2734 XSRETURN(items);
ca135624 2735 }
bb897dfc 2736 XSRETURN_EMPTY;
ca135624
JD
2737}
2738
2739static
ad0751ec
GS
2740XS(w32_Sleep)
2741{
2742 dXSARGS;
2743 if (items != 1)
2744 croak("usage: Win32::Sleep($milliseconds)");
2745 Sleep(SvIV(ST(0)));
2746 XSRETURN_YES;
2747}
2748
ad2e33dc 2749void
f3986ebb 2750Perl_init_os_extras()
ad2e33dc
GS
2751{
2752 char *file = __FILE__;
2753 dXSUB_SYS;
2754
4b556e6c
JD
2755 w32_perlshell_tokens = Nullch;
2756 w32_perlshell_items = -1;
2757 w32_fdpid = newAV(); /* XXX needs to be in Perl_win32_init()? */
0aaad0ff 2758 New(1313, w32_children, 1, child_tab);
4b556e6c 2759 w32_num_children = 0;
4b556e6c 2760
ad2e33dc
GS
2761 /* these names are Activeware compatible */
2762 newXS("Win32::GetCwd", w32_GetCwd, file);
2763 newXS("Win32::SetCwd", w32_SetCwd, file);
2764 newXS("Win32::GetNextAvailDrive", w32_GetNextAvailDrive, file);
2765 newXS("Win32::GetLastError", w32_GetLastError, file);
ca135624 2766 newXS("Win32::SetLastError", w32_SetLastError, file);
ad2e33dc
GS
2767 newXS("Win32::LoginName", w32_LoginName, file);
2768 newXS("Win32::NodeName", w32_NodeName, file);
2769 newXS("Win32::DomainName", w32_DomainName, file);
2770 newXS("Win32::FsType", w32_FsType, file);
2771 newXS("Win32::GetOSVersion", w32_GetOSVersion, file);
2772 newXS("Win32::IsWinNT", w32_IsWinNT, file);
2773 newXS("Win32::IsWin95", w32_IsWin95, file);
2774 newXS("Win32::FormatMessage", w32_FormatMessage, file);
2775 newXS("Win32::Spawn", w32_Spawn, file);
2776 newXS("Win32::GetTickCount", w32_GetTickCount, file);
2777 newXS("Win32::GetShortPathName", w32_GetShortPathName, file);
ca135624 2778 newXS("Win32::GetFullPathName", w32_GetFullPathName, file);
ad0751ec 2779 newXS("Win32::Sleep", w32_Sleep, file);
ad2e33dc
GS
2780
2781 /* XXX Bloat Alert! The following Activeware preloads really
2782 * ought to be part of Win32::Sys::*, so they're not included
2783 * here.
2784 */
2785 /* LookupAccountName
2786 * LookupAccountSID
2787 * InitiateSystemShutdown
2788 * AbortSystemShutdown
2789 * ExpandEnvrironmentStrings
2790 */
2791}
2792
2793void
2794Perl_win32_init(int *argcp, char ***argvp)
2795{
2796 /* Disable floating point errors, Perl will trap the ones we
2797 * care about. VC++ RTL defaults to switching these off
2798 * already, but the Borland RTL doesn't. Since we don't
2799 * want to be at the vendor's whim on the default, we set
2800 * it explicitly here.
2801 */
a835ef8a 2802#if !defined(_ALPHA_) && !defined(__GNUC__)
ad2e33dc 2803 _control87(MCW_EM, MCW_EM);
3dc9191e 2804#endif
4b556e6c 2805 MALLOC_INIT;
ad2e33dc 2806}
d55594ae 2807
a868473f
NIS
2808#ifdef USE_BINMODE_SCRIPTS
2809
2810void
2811win32_strip_return(SV *sv)
2812{
2813 char *s = SvPVX(sv);
2814 char *e = s+SvCUR(sv);
2815 char *d = s;
2816 while (s < e)
2817 {
2818 if (*s == '\r' && s[1] == '\n')
2819 {
2820 *d++ = '\n';
2821 s += 2;
2822 }
2823 else
2824 {
2825 *d++ = *s++;
2826 }
2827 }
2828 SvCUR_set(sv,d-SvPVX(sv));
2829}
2830
2831#endif