This is a live mirror of the Perl 5 development currently hosted at https://github.com/perl/perl5
[win32] Support case-tolerant %ENV
[perl5.git] / win32 / win32.c
CommitLineData
68dc0745
PP
1/* WIN32.C
2 *
3 * (c) 1995 Microsoft Corporation. All rights reserved.
4 * Developed by hip communications inc., http://info.hip.com/info/
5 * Portions (c) 1993 Intergraph Corporation. All rights reserved.
6 *
7 * You may distribute under the terms of either the GNU General Public
8 * License or the Artistic License, as specified in the README file.
9 */
0a753a76
PP
10
11#define WIN32_LEAN_AND_MEAN
12#define WIN32IO_IS_STDIO
13#include <tchar.h>
a835ef8a
NIS
14#ifdef __GNUC__
15#define Win32_Winsock
16#endif
0a753a76
PP
17#include <windows.h>
18
68dc0745 19/* #include "config.h" */
0a753a76
PP
20
21#define PERLIO_NOT_STDIO 0
22#if !defined(PERLIO_IS_STDIO) && !defined(USE_SFIO)
23#define PerlIO FILE
24#endif
25
26#include "EXTERN.h"
27#include "perl.h"
ad2e33dc 28#include "XSUB.h"
0a753a76
PP
29#include <fcntl.h>
30#include <sys/stat.h>
5b0d9cbe
NIS
31#ifndef __GNUC__
32/* assert.h conflicts with #define of assert in perl.h */
0a753a76 33#include <assert.h>
5b0d9cbe 34#endif
0a753a76
PP
35#include <string.h>
36#include <stdarg.h>
ad2e33dc 37#include <float.h>
0a753a76 38
5b0d9cbe
NIS
39#ifdef __GNUC__
40/* Mingw32 defaults to globing command line
41 * So we turn it off like this:
42 */
43int _CRT_glob = 0;
44#endif
45
6890e559
GS
46#define EXECF_EXEC 1
47#define EXECF_SPAWN 2
48#define EXECF_SPAWN_NOWAIT 3
49
2d7a9237
GS
50static DWORD os_id(void);
51static char * get_shell(void);
52static int do_spawn2(char *cmd, int exectype);
53static BOOL has_redirection(char *ptr);
54static long filetime_to_clock(PFILETIME ft);
55
56BOOL w32_env_probed = FALSE;
57DWORD w32_platform = (DWORD)-1;
58char w32_shellpath[MAX_PATH+1];
59char w32_perllib_root[MAX_PATH+1];
60HANDLE w32_perldll_handle = INVALID_HANDLE_VALUE;
61#ifndef __BORLANDC__
62long w32_num_children = 0;
63HANDLE w32_child_pids[MAXIMUM_WAIT_OBJECTS];
64#endif
0a753a76 65
26618a56
GS
66#ifdef USE_THREADS
67# ifdef USE_DECLSPEC_THREAD
68__declspec(thread) char strerror_buffer[512];
e34ffe5a 69__declspec(thread) char getlogin_buffer[128];
26618a56
GS
70# ifdef HAVE_DES_FCRYPT
71__declspec(thread) char crypt_buffer[30];
72# endif
73# else
74# define strerror_buffer (thr->i.Wstrerror_buffer)
e34ffe5a 75# define getlogin_buffer (thr->i.Wgetlogin_buffer)
26618a56
GS
76# define crypt_buffer (thr->i.Wcrypt_buffer)
77# endif
78#else
79char strerror_buffer[512];
e34ffe5a 80char getlogin_buffer[128];
26618a56
GS
81# ifdef HAVE_DES_FCRYPT
82char crypt_buffer[30];
83# endif
84#endif
85
3fe9a6f1
PP
86int
87IsWin95(void) {
2d7a9237 88 return (os_id() == VER_PLATFORM_WIN32_WINDOWS);
3fe9a6f1
PP
89}
90
91int
92IsWinNT(void) {
2d7a9237 93 return (os_id() == VER_PLATFORM_WIN32_NT);
3fe9a6f1 94}
0a753a76 95
68dc0745 96char *
2d7a9237 97win32_perllib_path(char *sfx,...)
68dc0745 98{
acbc2db6 99 va_list ap;
68dc0745 100 char *end;
acbc2db6 101 va_start(ap,sfx);
2d7a9237 102 GetModuleFileName((w32_perldll_handle == INVALID_HANDLE_VALUE)
68dc0745 103 ? GetModuleHandle(NULL)
2d7a9237
GS
104 : w32_perldll_handle,
105 w32_perllib_root,
106 sizeof(w32_perllib_root));
107 *(end = strrchr(w32_perllib_root, '\\')) = '\0';
68dc0745
PP
108 if (stricmp(end-4,"\\bin") == 0)
109 end -= 4;
110 strcpy(end,"\\lib");
acbc2db6
NIS
111 while (sfx)
112 {
113 strcat(end,"\\");
114 strcat(end,sfx);
115 sfx = va_arg(ap,char *);
116 }
117 va_end(ap);
2d7a9237 118 return (w32_perllib_root);
68dc0745 119}
0a753a76 120
b4793f7f 121
2d7a9237
GS
122static BOOL
123has_redirection(char *ptr)
68dc0745
PP
124{
125 int inquote = 0;
126 char quote = '\0';
127
128 /*
129 * Scan string looking for redirection (< or >) or pipe
130 * characters (|) that are not in a quoted string
131 */
132 while(*ptr) {
133 switch(*ptr) {
134 case '\'':
135 case '\"':
136 if(inquote) {
137 if(quote == *ptr) {
138 inquote = 0;
139 quote = '\0';
0a753a76 140 }
68dc0745
PP
141 }
142 else {
143 quote = *ptr;
144 inquote++;
145 }
146 break;
147 case '>':
148 case '<':
149 case '|':
150 if(!inquote)
151 return TRUE;
152 default:
153 break;
0a753a76 154 }
68dc0745
PP
155 ++ptr;
156 }
157 return FALSE;
0a753a76
PP
158}
159
68dc0745
PP
160/* since the current process environment is being updated in util.c
161 * the library functions will get the correct environment
162 */
163PerlIO *
164my_popen(char *cmd, char *mode)
0a753a76
PP
165{
166#ifdef FIXCMD
68dc0745
PP
167#define fixcmd(x) { \
168 char *pspace = strchr((x),' '); \
169 if (pspace) { \
170 char *p = (x); \
171 while (p < pspace) { \
172 if (*p == '/') \
173 *p = '\\'; \
174 p++; \
175 } \
176 } \
177 }
0a753a76
PP
178#else
179#define fixcmd(x)
180#endif
68dc0745 181 fixcmd(cmd);
3e3baf6d
TB
182#ifdef __BORLANDC__ /* workaround a Borland stdio bug */
183 win32_fflush(stdout);
184 win32_fflush(stderr);
185#endif
0a753a76 186 return win32_popen(cmd, mode);
0a753a76
PP
187}
188
68dc0745
PP
189long
190my_pclose(PerlIO *fp)
0a753a76
PP
191{
192 return win32_pclose(fp);
193}
194
8b10511d 195static DWORD
2d7a9237 196os_id(void)
0a753a76 197{
8b10511d 198 static OSVERSIONINFO osver;
0a753a76 199
2d7a9237 200 if (osver.dwPlatformId != w32_platform) {
8b10511d
GS
201 memset(&osver, 0, sizeof(OSVERSIONINFO));
202 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
203 GetVersionEx(&osver);
2d7a9237 204 w32_platform = osver.dwPlatformId;
8b10511d 205 }
2d7a9237 206 return (w32_platform);
0a753a76
PP
207}
208
2d7a9237 209/* XXX PERL5SHELL must be tokenized to allow switches to be passed */
68dc0745 210static char *
2d7a9237 211get_shell(void)
0a753a76 212{
2d7a9237 213 if (!w32_env_probed) {
174c211a
GS
214 char* defaultshell = (IsWinNT() ? "cmd.exe" : "command.com");
215 /* we don't use COMSPEC here for two reasons:
216 * 1. the same reason perl on UNIX doesn't use SHELL--rampant and
217 * uncontrolled unportability of the ensuing scripts.
218 * 2. PERL5SHELL could be set to a shell that may not be fit for
219 * interactive use (which is what most programs look in COMSPEC
220 * for).
221 */
222 char *usershell = getenv("PERL5SHELL");
223
2d7a9237
GS
224 w32_env_probed = TRUE;
225 strcpy(w32_shellpath, usershell ? usershell : defaultshell);
68dc0745 226 }
2d7a9237 227 return w32_shellpath;
0a753a76
PP
228}
229
68dc0745 230int
2d7a9237 231do_aspawn(void *vreally, void **vmark, void **vsp)
0a753a76 232{
2d7a9237
GS
233 SV *really = (SV*)vreally;
234 SV **mark = (SV**)vmark;
235 SV **sp = (SV**)vsp;
68dc0745 236 char **argv;
2d7a9237 237 char *str;
68dc0745 238 int status;
2d7a9237 239 int flag = P_WAIT;
68dc0745 240 int index = 0;
68dc0745 241
2d7a9237
GS
242 if (sp <= mark)
243 return -1;
68dc0745 244
2d7a9237
GS
245 New(1301, argv, (sp - mark) + 4, char*);
246
247 if (SvNIOKp(*(mark+1)) && !SvPOKp(*(mark+1))) {
248 ++mark;
249 flag = SvIVx(*mark);
68dc0745
PP
250 }
251
2d7a9237
GS
252 while(++mark <= sp) {
253 if (*mark && (str = SvPV(*mark, na)))
254 argv[index++] = str;
255 else
256 argv[index++] = "";
68dc0745
PP
257 }
258 argv[index++] = 0;
259
2d7a9237
GS
260 status = win32_spawnvp(flag,
261 (really ? SvPV(really,na) : argv[0]),
262 (const char* const*)argv);
263
264 if (status < 0 && errno == ENOEXEC) {
265 /* possible shell-builtin, invoke with shell */
266 int sh_items = 2;
267 while (--index >= 0)
268 argv[index+sh_items] = argv[index];
269 if (IsWinNT())
270 argv[--sh_items] = "/x/c"; /* always enable command extensions */
271 else
272 argv[--sh_items] = "/c";
273 argv[--sh_items] = get_shell();
274
275 status = win32_spawnvp(flag,
276 (really ? SvPV(really,na) : argv[0]),
277 (const char* const*)argv);
278 }
68dc0745
PP
279
280 Safefree(argv);
5aabfad6
PP
281 if (status < 0) {
282 if (dowarn)
2d7a9237
GS
283 warn("Can't spawn \"%s\": %s", argv[0], strerror(errno));
284 status = 255 * 256;
5aabfad6 285 }
2d7a9237
GS
286 else if (flag != P_NOWAIT)
287 status *= 256;
288 return (statusvalue = status);
68dc0745
PP
289}
290
2d7a9237 291static int
6890e559 292do_spawn2(char *cmd, int exectype)
68dc0745
PP
293{
294 char **a;
295 char *s;
296 char **argv;
297 int status = -1;
298 BOOL needToTry = TRUE;
2d7a9237 299 char *cmd2;
68dc0745 300
2d7a9237
GS
301 /* Save an extra exec if possible. See if there are shell
302 * metacharacters in it */
303 if(!has_redirection(cmd)) {
fc36a67e
PP
304 New(1301,argv, strlen(cmd) / 2 + 2, char*);
305 New(1302,cmd2, strlen(cmd) + 1, char);
68dc0745
PP
306 strcpy(cmd2, cmd);
307 a = argv;
308 for (s = cmd2; *s;) {
309 while (*s && isspace(*s))
310 s++;
311 if (*s)
312 *(a++) = s;
313 while(*s && !isspace(*s))
314 s++;
315 if(*s)
316 *s++ = '\0';
0a753a76 317 }
68dc0745
PP
318 *a = Nullch;
319 if(argv[0]) {
6890e559
GS
320 switch (exectype) {
321 case EXECF_SPAWN:
322 status = win32_spawnvp(P_WAIT, argv[0],
323 (const char* const*)argv);
324 break;
325 case EXECF_SPAWN_NOWAIT:
326 status = win32_spawnvp(P_NOWAIT, argv[0],
327 (const char* const*)argv);
328 break;
329 case EXECF_EXEC:
330 status = win32_execvp(argv[0], (const char* const*)argv);
331 break;
332 }
2d7a9237 333 if (status != -1 || errno == 0)
68dc0745 334 needToTry = FALSE;
0a753a76 335 }
0a753a76 336 Safefree(argv);
68dc0745
PP
337 Safefree(cmd2);
338 }
2d7a9237
GS
339 if (needToTry) {
340 char *argv[4];
0a9a032c 341 int i = 0;
2d7a9237 342 argv[i++] = get_shell();
0a9a032c 343 if (IsWinNT())
2d7a9237
GS
344 argv[i++] = "/x/c";
345 else
346 argv[i++] = "/c";
347 argv[i++] = cmd;
348 argv[i] = Nullch;
6890e559
GS
349 switch (exectype) {
350 case EXECF_SPAWN:
351 status = win32_spawnvp(P_WAIT, argv[0],
352 (const char* const*)argv);
353 break;
354 case EXECF_SPAWN_NOWAIT:
355 status = win32_spawnvp(P_NOWAIT, argv[0],
356 (const char* const*)argv);
357 break;
358 case EXECF_EXEC:
359 status = win32_execvp(argv[0], (const char* const*)argv);
360 break;
361 }
68dc0745 362 }
5aabfad6
PP
363 if (status < 0) {
364 if (dowarn)
6890e559
GS
365 warn("Can't %s \"%s\": %s",
366 (exectype == EXECF_EXEC ? "exec" : "spawn"),
2d7a9237
GS
367 argv[0], strerror(errno));
368 status = 255 * 256;
5aabfad6 369 }
2d7a9237
GS
370 else if (exectype != EXECF_SPAWN_NOWAIT)
371 status *= 256;
372 return (statusvalue = status);
0a753a76
PP
373}
374
6890e559
GS
375int
376do_spawn(char *cmd)
377{
378 return do_spawn2(cmd, EXECF_SPAWN);
379}
380
2d7a9237
GS
381int
382do_spawn_nowait(char *cmd)
383{
384 return do_spawn2(cmd, EXECF_SPAWN_NOWAIT);
385}
386
6890e559
GS
387bool
388do_exec(char *cmd)
389{
390 do_spawn2(cmd, EXECF_EXEC);
391 return FALSE;
392}
393
0a753a76
PP
394
395#define PATHLEN 1024
396
68dc0745
PP
397/* The idea here is to read all the directory names into a string table
398 * (separated by nulls) and when one of the other dir functions is called
399 * return the pointer to the current file name.
400 */
401DIR *
402opendir(char *filename)
0a753a76
PP
403{
404 DIR *p;
68dc0745
PP
405 long len;
406 long idx;
407 char scannamespc[PATHLEN];
408 char *scanname = scannamespc;
409 struct stat sbuf;
410 WIN32_FIND_DATA FindData;
411 HANDLE fh;
412/* char root[_MAX_PATH];*/
413/* char volname[_MAX_PATH];*/
414/* DWORD serial, maxname, flags;*/
415/* BOOL downcase;*/
416/* char *dummy;*/
417
418 /* check to see if filename is a directory */
d55594ae 419 if (win32_stat(filename, &sbuf) < 0 || (sbuf.st_mode & S_IFDIR) == 0) {
68dc0745
PP
420 return NULL;
421 }
422
423 /* get the file system characteristics */
424/* if(GetFullPathName(filename, MAX_PATH, root, &dummy)) {
425 * if(dummy = strchr(root, '\\'))
426 * *++dummy = '\0';
427 * if(GetVolumeInformation(root, volname, MAX_PATH, &serial,
428 * &maxname, &flags, 0, 0)) {
429 * downcase = !(flags & FS_CASE_IS_PRESERVED);
430 * }
431 * }
432 * else {
433 * downcase = TRUE;
434 * }
435 */
436 /* Get us a DIR structure */
fc36a67e 437 Newz(1303, p, 1, DIR);
68dc0745
PP
438 if(p == NULL)
439 return NULL;
440
441 /* Create the search pattern */
442 strcpy(scanname, filename);
443
444 if(index("/\\", *(scanname + strlen(scanname) - 1)) == NULL)
445 strcat(scanname, "/*");
446 else
447 strcat(scanname, "*");
448
449 /* do the FindFirstFile call */
450 fh = FindFirstFile(scanname, &FindData);
451 if(fh == INVALID_HANDLE_VALUE) {
452 return NULL;
453 }
454
455 /* now allocate the first part of the string table for
456 * the filenames that we find.
457 */
458 idx = strlen(FindData.cFileName)+1;
fc36a67e 459 New(1304, p->start, idx, char);
68dc0745 460 if(p->start == NULL) {
65e48ea9 461 croak("opendir: malloc failed!\n");
68dc0745
PP
462 }
463 strcpy(p->start, FindData.cFileName);
464/* if(downcase)
465 * strlwr(p->start);
466 */
467 p->nfiles++;
468
469 /* loop finding all the files that match the wildcard
470 * (which should be all of them in this directory!).
471 * the variable idx should point one past the null terminator
472 * of the previous string found.
473 */
474 while (FindNextFile(fh, &FindData)) {
475 len = strlen(FindData.cFileName);
476 /* bump the string table size by enough for the
477 * new name and it's null terminator
478 */
479 Renew(p->start, idx+len+1, char);
480 if(p->start == NULL) {
65e48ea9 481 croak("opendir: malloc failed!\n");
0a753a76 482 }
68dc0745
PP
483 strcpy(&p->start[idx], FindData.cFileName);
484/* if (downcase)
485 * strlwr(&p->start[idx]);
486 */
0a753a76
PP
487 p->nfiles++;
488 idx += len+1;
489 }
490 FindClose(fh);
491 p->size = idx;
492 p->curr = p->start;
493 return p;
494}
495
496
68dc0745
PP
497/* Readdir just returns the current string pointer and bumps the
498 * string pointer to the nDllExport entry.
499 */
500struct direct *
501readdir(DIR *dirp)
0a753a76 502{
68dc0745
PP
503 int len;
504 static int dummy = 0;
0a753a76 505
68dc0745
PP
506 if (dirp->curr) {
507 /* first set up the structure to return */
508 len = strlen(dirp->curr);
509 strcpy(dirp->dirstr.d_name, dirp->curr);
510 dirp->dirstr.d_namlen = len;
0a753a76 511
68dc0745
PP
512 /* Fake an inode */
513 dirp->dirstr.d_ino = dummy++;
0a753a76 514
68dc0745
PP
515 /* Now set up for the nDllExport call to readdir */
516 dirp->curr += len + 1;
517 if (dirp->curr >= (dirp->start + dirp->size)) {
518 dirp->curr = NULL;
519 }
0a753a76 520
68dc0745
PP
521 return &(dirp->dirstr);
522 }
523 else
524 return NULL;
0a753a76
PP
525}
526
68dc0745
PP
527/* Telldir returns the current string pointer position */
528long
529telldir(DIR *dirp)
0a753a76
PP
530{
531 return (long) dirp->curr;
532}
533
534
68dc0745
PP
535/* Seekdir moves the string pointer to a previously saved position
536 *(Saved by telldir).
537 */
538void
539seekdir(DIR *dirp, long loc)
0a753a76
PP
540{
541 dirp->curr = (char *)loc;
542}
543
68dc0745
PP
544/* Rewinddir resets the string pointer to the start */
545void
546rewinddir(DIR *dirp)
0a753a76
PP
547{
548 dirp->curr = dirp->start;
549}
550
68dc0745
PP
551/* free the memory allocated by opendir */
552int
553closedir(DIR *dirp)
0a753a76
PP
554{
555 Safefree(dirp->start);
556 Safefree(dirp);
68dc0745 557 return 1;
0a753a76
PP
558}
559
560
68dc0745
PP
561/*
562 * various stubs
563 */
0a753a76
PP
564
565
68dc0745
PP
566/* Ownership
567 *
568 * Just pretend that everyone is a superuser. NT will let us know if
569 * we don\'t really have permission to do something.
570 */
0a753a76
PP
571
572#define ROOT_UID ((uid_t)0)
573#define ROOT_GID ((gid_t)0)
574
68dc0745
PP
575uid_t
576getuid(void)
0a753a76 577{
68dc0745 578 return ROOT_UID;
0a753a76
PP
579}
580
68dc0745
PP
581uid_t
582geteuid(void)
0a753a76 583{
68dc0745 584 return ROOT_UID;
0a753a76
PP
585}
586
68dc0745
PP
587gid_t
588getgid(void)
0a753a76 589{
68dc0745 590 return ROOT_GID;
0a753a76
PP
591}
592
68dc0745
PP
593gid_t
594getegid(void)
0a753a76 595{
68dc0745 596 return ROOT_GID;
0a753a76
PP
597}
598
68dc0745 599int
22239a37 600setuid(uid_t auid)
0a753a76 601{
22239a37 602 return (auid == ROOT_UID ? 0 : -1);
0a753a76
PP
603}
604
68dc0745 605int
22239a37 606setgid(gid_t agid)
0a753a76 607{
22239a37 608 return (agid == ROOT_GID ? 0 : -1);
0a753a76
PP
609}
610
e34ffe5a
GS
611char *
612getlogin(void)
613{
614 dTHR;
615 char *buf = getlogin_buffer;
616 DWORD size = sizeof(getlogin_buffer);
617 if (GetUserName(buf,&size))
618 return buf;
619 return (char*)NULL;
620}
621
68dc0745
PP
622/*
623 * pretended kill
624 */
625int
626kill(int pid, int sig)
0a753a76 627{
68dc0745 628 HANDLE hProcess= OpenProcess(PROCESS_ALL_ACCESS, TRUE, pid);
0a753a76
PP
629
630 if (hProcess == NULL) {
65e48ea9 631 croak("kill process failed!\n");
68dc0745
PP
632 }
633 else {
634 if (!TerminateProcess(hProcess, sig))
65e48ea9 635 croak("kill process failed!\n");
68dc0745
PP
636 CloseHandle(hProcess);
637 }
638 return 0;
0a753a76
PP
639}
640
68dc0745
PP
641/*
642 * File system stuff
643 */
0a753a76 644
f3986ebb
GS
645DllExport unsigned int
646win32_sleep(unsigned int t)
0a753a76 647{
68dc0745
PP
648 Sleep(t*1000);
649 return 0;
0a753a76
PP
650}
651
68dc0745
PP
652DllExport int
653win32_stat(const char *path, struct stat *buffer)
0a753a76 654{
68dc0745
PP
655 char t[MAX_PATH];
656 const char *p = path;
657 int l = strlen(path);
67fbe06e 658 int res;
0a753a76 659
68dc0745
PP
660 if (l > 1) {
661 switch(path[l - 1]) {
662 case '\\':
663 case '/':
664 if (path[l - 2] != ':') {
665 strncpy(t, path, l - 1);
666 t[l - 1] = 0;
667 p = t;
668 };
669 }
670 }
390b85e7 671 res = stat(p,buffer);
67fbe06e
GS
672#ifdef __BORLANDC__
673 if (res == 0) {
674 if (S_ISDIR(buffer->st_mode))
675 buffer->st_mode |= S_IWRITE | S_IEXEC;
676 else if (S_ISREG(buffer->st_mode)) {
677 if (l >= 4 && path[l-4] == '.') {
678 const char *e = path + l - 3;
679 if (strnicmp(e,"exe",3)
680 && strnicmp(e,"bat",3)
681 && strnicmp(e,"com",3)
682 && (IsWin95() || strnicmp(e,"cmd",3)))
683 buffer->st_mode &= ~S_IEXEC;
684 else
685 buffer->st_mode |= S_IEXEC;
686 }
687 else
688 buffer->st_mode &= ~S_IEXEC;
689 }
690 }
691#endif
692 return res;
0a753a76
PP
693}
694
0551aaa8
GS
695#ifndef USE_WIN32_RTL_ENV
696
697DllExport char *
698win32_getenv(const char *name)
699{
700 static char *curitem = Nullch;
701 static DWORD curlen = 512;
702 DWORD needlen;
703 if (!curitem)
704 New(1305,curitem,curlen,char);
705 if (!(needlen = GetEnvironmentVariable(name,curitem,curlen)))
706 return Nullch;
707 while (needlen > curlen) {
708 Renew(curitem,needlen,char);
709 curlen = needlen;
710 needlen = GetEnvironmentVariable(name,curitem,curlen);
711 }
712 return curitem;
713}
714
715#endif
716
d55594ae 717static long
2d7a9237 718filetime_to_clock(PFILETIME ft)
d55594ae
GS
719{
720 __int64 qw = ft->dwHighDateTime;
721 qw <<= 32;
722 qw |= ft->dwLowDateTime;
723 qw /= 10000; /* File time ticks at 0.1uS, clock at 1mS */
724 return (long) qw;
725}
726
f3986ebb
GS
727DllExport int
728win32_times(struct tms *timebuf)
0a753a76 729{
d55594ae
GS
730 FILETIME user;
731 FILETIME kernel;
732 FILETIME dummy;
733 if (GetProcessTimes(GetCurrentProcess(), &dummy, &dummy,
734 &kernel,&user)) {
2d7a9237
GS
735 timebuf->tms_utime = filetime_to_clock(&user);
736 timebuf->tms_stime = filetime_to_clock(&kernel);
d55594ae
GS
737 timebuf->tms_cutime = 0;
738 timebuf->tms_cstime = 0;
739
740 } else {
741 /* That failed - e.g. Win95 fallback to clock() */
742 clock_t t = clock();
743 timebuf->tms_utime = t;
744 timebuf->tms_stime = 0;
745 timebuf->tms_cutime = 0;
746 timebuf->tms_cstime = 0;
747 }
68dc0745 748 return 0;
0a753a76
PP
749}
750
2d7a9237
GS
751DllExport int
752win32_wait(int *status)
753{
754#ifdef __BORLANDC__
755 return wait(status);
756#else
757 /* XXX this wait emulation only knows about processes
758 * spawned via win32_spawnvp(P_NOWAIT, ...).
759 */
760 int i, retval;
761 DWORD exitcode, waitcode;
762
763 if (!w32_num_children) {
764 errno = ECHILD;
765 return -1;
766 }
767
768 /* if a child exists, wait for it to die */
769 waitcode = WaitForMultipleObjects(w32_num_children,
770 w32_child_pids,
771 FALSE,
772 INFINITE);
773 if (waitcode != WAIT_FAILED) {
774 if (waitcode >= WAIT_ABANDONED_0
775 && waitcode < WAIT_ABANDONED_0 + w32_num_children)
776 i = waitcode - WAIT_ABANDONED_0;
777 else
778 i = waitcode - WAIT_OBJECT_0;
779 if (GetExitCodeProcess(w32_child_pids[i], &exitcode) ) {
780 CloseHandle(w32_child_pids[i]);
781 *status = (int)((exitcode & 0xff) << 8);
782 retval = (int)w32_child_pids[i];
783 Copy(&w32_child_pids[i+1], &w32_child_pids[i],
784 (w32_num_children-i-1), HANDLE);
785 w32_num_children--;
786 return retval;
787 }
788 }
789
790FAILED:
791 errno = GetLastError();
792 return -1;
793
794#endif
795}
d55594ae 796
2d7a9237 797static UINT timerid = 0;
d55594ae
GS
798
799static VOID CALLBACK TimerProc(HWND win, UINT msg, UINT id, DWORD time)
800{
801 KillTimer(NULL,timerid);
802 timerid=0;
803 sighandler(14);
804}
805
f3986ebb
GS
806DllExport unsigned int
807win32_alarm(unsigned int sec)
0a753a76 808{
d55594ae
GS
809 /*
810 * the 'obvious' implentation is SetTimer() with a callback
811 * which does whatever receiving SIGALRM would do
812 * we cannot use SIGALRM even via raise() as it is not
813 * one of the supported codes in <signal.h>
814 *
815 * Snag is unless something is looking at the message queue
816 * nothing happens :-(
817 */
818 if (sec)
819 {
820 timerid = SetTimer(NULL,timerid,sec*1000,(TIMERPROC)TimerProc);
821 if (!timerid)
822 croak("Cannot set timer");
823 }
824 else
825 {
826 if (timerid)
827 {
828 KillTimer(NULL,timerid);
829 timerid=0;
830 }
831 }
68dc0745 832 return 0;
0a753a76
PP
833}
834
26618a56
GS
835#ifdef HAVE_DES_FCRYPT
836extern char * des_fcrypt(char *cbuf, const char *txt, const char *salt);
837
838DllExport char *
839win32_crypt(const char *txt, const char *salt)
840{
841 dTHR;
842 return des_fcrypt(crypt_buffer, txt, salt);
843}
844#endif
845
f3986ebb 846#ifdef USE_FIXED_OSFHANDLE
390b85e7
GS
847
848EXTERN_C int __cdecl _alloc_osfhnd(void);
849EXTERN_C int __cdecl _set_osfhnd(int fh, long value);
850EXTERN_C void __cdecl _lock_fhandle(int);
851EXTERN_C void __cdecl _unlock_fhandle(int);
852EXTERN_C void __cdecl _unlock(int);
853
854#if (_MSC_VER >= 1000)
855typedef struct {
856 long osfhnd; /* underlying OS file HANDLE */
857 char osfile; /* attributes of file (e.g., open in text mode?) */
858 char pipech; /* one char buffer for handles opened on pipes */
859#if defined (_MT) && !defined (DLL_FOR_WIN32S)
860 int lockinitflag;
861 CRITICAL_SECTION lock;
862#endif /* defined (_MT) && !defined (DLL_FOR_WIN32S) */
863} ioinfo;
864
865EXTERN_C ioinfo * __pioinfo[];
866
867#define IOINFO_L2E 5
868#define IOINFO_ARRAY_ELTS (1 << IOINFO_L2E)
869#define _pioinfo(i) (__pioinfo[i >> IOINFO_L2E] + (i & (IOINFO_ARRAY_ELTS - 1)))
870#define _osfile(i) (_pioinfo(i)->osfile)
871
872#else /* (_MSC_VER >= 1000) */
873extern char _osfile[];
874#endif /* (_MSC_VER >= 1000) */
875
876#define FOPEN 0x01 /* file handle open */
877#define FAPPEND 0x20 /* file handle opened O_APPEND */
878#define FDEV 0x40 /* file handle refers to device */
879#define FTEXT 0x80 /* file handle is in text mode */
880
881#define _STREAM_LOCKS 26 /* Table of stream locks */
882#define _LAST_STREAM_LOCK (_STREAM_LOCKS+_NSTREAM_-1) /* Last stream lock */
883#define _FH_LOCKS (_LAST_STREAM_LOCK+1) /* Table of fh locks */
884
885/***
886*int my_open_osfhandle(long osfhandle, int flags) - open C Runtime file handle
887*
888*Purpose:
889* This function allocates a free C Runtime file handle and associates
890* it with the Win32 HANDLE specified by the first parameter. This is a
891* temperary fix for WIN95's brain damage GetFileType() error on socket
892* we just bypass that call for socket
893*
894*Entry:
895* long osfhandle - Win32 HANDLE to associate with C Runtime file handle.
896* int flags - flags to associate with C Runtime file handle.
897*
898*Exit:
899* returns index of entry in fh, if successful
900* return -1, if no free entry is found
901*
902*Exceptions:
903*
904*******************************************************************************/
905
906static int
907my_open_osfhandle(long osfhandle, int flags)
908{
909 int fh;
910 char fileflags; /* _osfile flags */
911
912 /* copy relevant flags from second parameter */
913 fileflags = FDEV;
914
915 if(flags & O_APPEND)
916 fileflags |= FAPPEND;
917
918 if(flags & O_TEXT)
919 fileflags |= FTEXT;
920
921 /* attempt to allocate a C Runtime file handle */
922 if((fh = _alloc_osfhnd()) == -1) {
923 errno = EMFILE; /* too many open files */
924 _doserrno = 0L; /* not an OS error */
925 return -1; /* return error to caller */
926 }
927
928 /* the file is open. now, set the info in _osfhnd array */
929 _set_osfhnd(fh, osfhandle);
930
931 fileflags |= FOPEN; /* mark as open */
932
933#if (_MSC_VER >= 1000)
934 _osfile(fh) = fileflags; /* set osfile entry */
935 _unlock_fhandle(fh);
936#else
937 _osfile[fh] = fileflags; /* set osfile entry */
938 _unlock(fh+_FH_LOCKS); /* unlock handle */
939#endif
940
941 return fh; /* return handle */
942}
943
944#define _open_osfhandle my_open_osfhandle
f3986ebb 945#endif /* USE_FIXED_OSFHANDLE */
390b85e7
GS
946
947/* simulate flock by locking a range on the file */
948
949#define LK_ERR(f,i) ((f) ? (i = 0) : (errno = GetLastError()))
950#define LK_LEN 0xffff0000
951
f3986ebb
GS
952DllExport int
953win32_flock(int fd, int oper)
390b85e7
GS
954{
955 OVERLAPPED o;
956 int i = -1;
957 HANDLE fh;
958
f3986ebb
GS
959 if (!IsWinNT()) {
960 croak("flock() unimplemented on this platform");
961 return -1;
962 }
390b85e7
GS
963 fh = (HANDLE)_get_osfhandle(fd);
964 memset(&o, 0, sizeof(o));
965
966 switch(oper) {
967 case LOCK_SH: /* shared lock */
968 LK_ERR(LockFileEx(fh, 0, 0, LK_LEN, 0, &o),i);
969 break;
970 case LOCK_EX: /* exclusive lock */
971 LK_ERR(LockFileEx(fh, LOCKFILE_EXCLUSIVE_LOCK, 0, LK_LEN, 0, &o),i);
972 break;
973 case LOCK_SH|LOCK_NB: /* non-blocking shared lock */
974 LK_ERR(LockFileEx(fh, LOCKFILE_FAIL_IMMEDIATELY, 0, LK_LEN, 0, &o),i);
975 break;
976 case LOCK_EX|LOCK_NB: /* non-blocking exclusive lock */
977 LK_ERR(LockFileEx(fh,
978 LOCKFILE_EXCLUSIVE_LOCK|LOCKFILE_FAIL_IMMEDIATELY,
979 0, LK_LEN, 0, &o),i);
980 break;
981 case LOCK_UN: /* unlock lock */
982 LK_ERR(UnlockFileEx(fh, 0, LK_LEN, 0, &o),i);
983 break;
984 default: /* unknown */
985 errno = EINVAL;
986 break;
987 }
988 return i;
989}
990
991#undef LK_ERR
992#undef LK_LEN
993
68dc0745
PP
994/*
995 * redirected io subsystem for all XS modules
996 *
997 */
0a753a76 998
68dc0745
PP
999DllExport int *
1000win32_errno(void)
0a753a76 1001{
390b85e7 1002 return (&errno);
0a753a76
PP
1003}
1004
dcb2879a
GS
1005DllExport char ***
1006win32_environ(void)
1007{
390b85e7 1008 return (&(_environ));
dcb2879a
GS
1009}
1010
68dc0745
PP
1011/* the rest are the remapped stdio routines */
1012DllExport FILE *
1013win32_stderr(void)
0a753a76 1014{
390b85e7 1015 return (stderr);
0a753a76
PP
1016}
1017
68dc0745
PP
1018DllExport FILE *
1019win32_stdin(void)
0a753a76 1020{
390b85e7 1021 return (stdin);
0a753a76
PP
1022}
1023
68dc0745
PP
1024DllExport FILE *
1025win32_stdout()
0a753a76 1026{
390b85e7 1027 return (stdout);
0a753a76
PP
1028}
1029
68dc0745
PP
1030DllExport int
1031win32_ferror(FILE *fp)
0a753a76 1032{
390b85e7 1033 return (ferror(fp));
0a753a76
PP
1034}
1035
1036
68dc0745
PP
1037DllExport int
1038win32_feof(FILE *fp)
0a753a76 1039{
390b85e7 1040 return (feof(fp));
0a753a76
PP
1041}
1042
68dc0745
PP
1043/*
1044 * Since the errors returned by the socket error function
1045 * WSAGetLastError() are not known by the library routine strerror
1046 * we have to roll our own.
1047 */
0a753a76 1048
68dc0745
PP
1049DllExport char *
1050win32_strerror(int e)
0a753a76 1051{
3e3baf6d 1052#ifndef __BORLANDC__ /* Borland intolerance */
68dc0745 1053 extern int sys_nerr;
3e3baf6d 1054#endif
68dc0745 1055 DWORD source = 0;
0a753a76 1056
68dc0745 1057 if(e < 0 || e > sys_nerr) {
c53bd28a 1058 dTHR;
68dc0745
PP
1059 if(e < 0)
1060 e = GetLastError();
0a753a76 1061
68dc0745
PP
1062 if(FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, &source, e, 0,
1063 strerror_buffer, sizeof(strerror_buffer), NULL) == 0)
1064 strcpy(strerror_buffer, "Unknown Error");
0a753a76 1065
68dc0745
PP
1066 return strerror_buffer;
1067 }
390b85e7 1068 return strerror(e);
0a753a76
PP
1069}
1070
22fae026
TM
1071DllExport void
1072win32_str_os_error(SV *sv, unsigned long dwErr)
1073{
1074 DWORD dwLen;
1075 char *sMsg;
1076 dwLen = FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER
1077 |FORMAT_MESSAGE_IGNORE_INSERTS
1078 |FORMAT_MESSAGE_FROM_SYSTEM, NULL,
1079 dwErr, 0, (char *)&sMsg, 1, NULL);
1080 if (0 < dwLen) {
1081 while (0 < dwLen && isspace(sMsg[--dwLen]))
1082 ;
1083 if ('.' != sMsg[dwLen])
1084 dwLen++;
1085 sMsg[dwLen]= '\0';
1086 }
1087 if (0 == dwLen) {
1088 sMsg = LocalAlloc(0, 64/**sizeof(TCHAR)*/);
1089 dwLen = sprintf(sMsg,
1090 "Unknown error #0x%lX (lookup 0x%lX)",
1091 dwErr, GetLastError());
1092 }
1093 sv_setpvn(sv, sMsg, dwLen);
1094 LocalFree(sMsg);
1095}
1096
1097
68dc0745
PP
1098DllExport int
1099win32_fprintf(FILE *fp, const char *format, ...)
0a753a76 1100{
68dc0745
PP
1101 va_list marker;
1102 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1103
390b85e7 1104 return (vfprintf(fp, format, marker));
0a753a76
PP
1105}
1106
68dc0745
PP
1107DllExport int
1108win32_printf(const char *format, ...)
0a753a76 1109{
68dc0745
PP
1110 va_list marker;
1111 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1112
390b85e7 1113 return (vprintf(format, marker));
0a753a76
PP
1114}
1115
68dc0745
PP
1116DllExport int
1117win32_vfprintf(FILE *fp, const char *format, va_list args)
0a753a76 1118{
390b85e7 1119 return (vfprintf(fp, format, args));
0a753a76
PP
1120}
1121
96e4d5b1
PP
1122DllExport int
1123win32_vprintf(const char *format, va_list args)
1124{
390b85e7 1125 return (vprintf(format, args));
96e4d5b1
PP
1126}
1127
68dc0745
PP
1128DllExport size_t
1129win32_fread(void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1130{
390b85e7 1131 return fread(buf, size, count, fp);
0a753a76
PP
1132}
1133
68dc0745
PP
1134DllExport size_t
1135win32_fwrite(const void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1136{
390b85e7 1137 return fwrite(buf, size, count, fp);
0a753a76
PP
1138}
1139
68dc0745
PP
1140DllExport FILE *
1141win32_fopen(const char *filename, const char *mode)
0a753a76 1142{
68dc0745 1143 if (stricmp(filename, "/dev/null")==0)
390b85e7
GS
1144 return fopen("NUL", mode);
1145 return fopen(filename, mode);
0a753a76
PP
1146}
1147
f3986ebb
GS
1148#ifndef USE_SOCKETS_AS_HANDLES
1149#undef fdopen
1150#define fdopen my_fdopen
1151#endif
1152
68dc0745
PP
1153DllExport FILE *
1154win32_fdopen( int handle, const char *mode)
0a753a76 1155{
390b85e7 1156 return fdopen(handle, (char *) mode);
0a753a76
PP
1157}
1158
68dc0745
PP
1159DllExport FILE *
1160win32_freopen( const char *path, const char *mode, FILE *stream)
0a753a76 1161{
68dc0745 1162 if (stricmp(path, "/dev/null")==0)
390b85e7
GS
1163 return freopen("NUL", mode, stream);
1164 return freopen(path, mode, stream);
0a753a76
PP
1165}
1166
68dc0745
PP
1167DllExport int
1168win32_fclose(FILE *pf)
0a753a76 1169{
f3986ebb 1170 return my_fclose(pf); /* defined in win32sck.c */
0a753a76
PP
1171}
1172
68dc0745
PP
1173DllExport int
1174win32_fputs(const char *s,FILE *pf)
0a753a76 1175{
390b85e7 1176 return fputs(s, pf);
0a753a76
PP
1177}
1178
68dc0745
PP
1179DllExport int
1180win32_fputc(int c,FILE *pf)
0a753a76 1181{
390b85e7 1182 return fputc(c,pf);
0a753a76
PP
1183}
1184
68dc0745
PP
1185DllExport int
1186win32_ungetc(int c,FILE *pf)
0a753a76 1187{
390b85e7 1188 return ungetc(c,pf);
0a753a76
PP
1189}
1190
68dc0745
PP
1191DllExport int
1192win32_getc(FILE *pf)
0a753a76 1193{
390b85e7 1194 return getc(pf);
0a753a76
PP
1195}
1196
68dc0745
PP
1197DllExport int
1198win32_fileno(FILE *pf)
0a753a76 1199{
390b85e7 1200 return fileno(pf);
0a753a76
PP
1201}
1202
68dc0745
PP
1203DllExport void
1204win32_clearerr(FILE *pf)
0a753a76 1205{
390b85e7 1206 clearerr(pf);
68dc0745 1207 return;
0a753a76
PP
1208}
1209
68dc0745
PP
1210DllExport int
1211win32_fflush(FILE *pf)
0a753a76 1212{
390b85e7 1213 return fflush(pf);
0a753a76
PP
1214}
1215
68dc0745
PP
1216DllExport long
1217win32_ftell(FILE *pf)
0a753a76 1218{
390b85e7 1219 return ftell(pf);
0a753a76
PP
1220}
1221
68dc0745
PP
1222DllExport int
1223win32_fseek(FILE *pf,long offset,int origin)
0a753a76 1224{
390b85e7 1225 return fseek(pf, offset, origin);
0a753a76
PP
1226}
1227
68dc0745
PP
1228DllExport int
1229win32_fgetpos(FILE *pf,fpos_t *p)
0a753a76 1230{
390b85e7 1231 return fgetpos(pf, p);
0a753a76
PP
1232}
1233
68dc0745
PP
1234DllExport int
1235win32_fsetpos(FILE *pf,const fpos_t *p)
0a753a76 1236{
390b85e7 1237 return fsetpos(pf, p);
0a753a76
PP
1238}
1239
68dc0745
PP
1240DllExport void
1241win32_rewind(FILE *pf)
0a753a76 1242{
390b85e7 1243 rewind(pf);
68dc0745 1244 return;
0a753a76
PP
1245}
1246
68dc0745
PP
1247DllExport FILE*
1248win32_tmpfile(void)
0a753a76 1249{
390b85e7 1250 return tmpfile();
0a753a76
PP
1251}
1252
68dc0745
PP
1253DllExport void
1254win32_abort(void)
0a753a76 1255{
390b85e7 1256 abort();
68dc0745 1257 return;
0a753a76
PP
1258}
1259
68dc0745 1260DllExport int
22239a37 1261win32_fstat(int fd,struct stat *sbufptr)
0a753a76 1262{
22239a37 1263 return fstat(fd,sbufptr);
0a753a76
PP
1264}
1265
68dc0745
PP
1266DllExport int
1267win32_pipe(int *pfd, unsigned int size, int mode)
0a753a76 1268{
390b85e7 1269 return _pipe(pfd, size, mode);
0a753a76
PP
1270}
1271
68dc0745
PP
1272DllExport FILE*
1273win32_popen(const char *command, const char *mode)
0a753a76 1274{
390b85e7 1275 return _popen(command, mode);
0a753a76
PP
1276}
1277
68dc0745
PP
1278DllExport int
1279win32_pclose(FILE *pf)
0a753a76 1280{
390b85e7 1281 return _pclose(pf);
0a753a76
PP
1282}
1283
68dc0745
PP
1284DllExport int
1285win32_setmode(int fd, int mode)
0a753a76 1286{
390b85e7 1287 return setmode(fd, mode);
0a753a76
PP
1288}
1289
96e4d5b1
PP
1290DllExport long
1291win32_lseek(int fd, long offset, int origin)
1292{
390b85e7 1293 return lseek(fd, offset, origin);
96e4d5b1
PP
1294}
1295
1296DllExport long
1297win32_tell(int fd)
1298{
390b85e7 1299 return tell(fd);
96e4d5b1
PP
1300}
1301
68dc0745
PP
1302DllExport int
1303win32_open(const char *path, int flag, ...)
0a753a76 1304{
68dc0745
PP
1305 va_list ap;
1306 int pmode;
0a753a76
PP
1307
1308 va_start(ap, flag);
1309 pmode = va_arg(ap, int);
1310 va_end(ap);
1311
68dc0745 1312 if (stricmp(path, "/dev/null")==0)
390b85e7
GS
1313 return open("NUL", flag, pmode);
1314 return open(path,flag,pmode);
0a753a76
PP
1315}
1316
68dc0745
PP
1317DllExport int
1318win32_close(int fd)
0a753a76 1319{
390b85e7 1320 return close(fd);
0a753a76
PP
1321}
1322
68dc0745 1323DllExport int
96e4d5b1
PP
1324win32_eof(int fd)
1325{
390b85e7 1326 return eof(fd);
96e4d5b1
PP
1327}
1328
1329DllExport int
68dc0745 1330win32_dup(int fd)
0a753a76 1331{
390b85e7 1332 return dup(fd);
0a753a76
PP
1333}
1334
68dc0745
PP
1335DllExport int
1336win32_dup2(int fd1,int fd2)
0a753a76 1337{
390b85e7 1338 return dup2(fd1,fd2);
0a753a76
PP
1339}
1340
68dc0745 1341DllExport int
3e3baf6d 1342win32_read(int fd, void *buf, unsigned int cnt)
0a753a76 1343{
390b85e7 1344 return read(fd, buf, cnt);
0a753a76
PP
1345}
1346
68dc0745 1347DllExport int
3e3baf6d 1348win32_write(int fd, const void *buf, unsigned int cnt)
0a753a76 1349{
390b85e7 1350 return write(fd, buf, cnt);
0a753a76
PP
1351}
1352
68dc0745 1353DllExport int
5aabfad6
PP
1354win32_mkdir(const char *dir, int mode)
1355{
390b85e7 1356 return mkdir(dir); /* just ignore mode */
5aabfad6 1357}
96e4d5b1 1358
5aabfad6
PP
1359DllExport int
1360win32_rmdir(const char *dir)
1361{
390b85e7 1362 return rmdir(dir);
5aabfad6 1363}
96e4d5b1 1364
5aabfad6
PP
1365DllExport int
1366win32_chdir(const char *dir)
1367{
390b85e7 1368 return chdir(dir);
5aabfad6 1369}
96e4d5b1 1370
5aabfad6 1371DllExport int
3e3baf6d 1372win32_spawnvp(int mode, const char *cmdname, const char *const *argv)
0a753a76 1373{
2d7a9237
GS
1374 int status;
1375
1376 status = spawnvp(mode, cmdname, (char * const *) argv);
1377#ifndef __BORLANDC__
1378 /* XXX For the P_NOWAIT case, Borland RTL returns pinfo.dwProcessId
1379 * while VC RTL returns pinfo.hProcess. For purposes of the custom
1380 * implementation of win32_wait(), we assume the latter.
1381 */
1382 if (mode == P_NOWAIT && status >= 0)
1383 w32_child_pids[w32_num_children++] = (HANDLE)status;
1384#endif
1385 return status;
0a753a76
PP
1386}
1387
6890e559
GS
1388DllExport int
1389win32_execvp(const char *cmdname, const char *const *argv)
1390{
390b85e7 1391 return execvp(cmdname, (char *const *)argv);
6890e559
GS
1392}
1393
84902520
TB
1394DllExport void
1395win32_perror(const char *str)
1396{
390b85e7 1397 perror(str);
84902520
TB
1398}
1399
1400DllExport void
1401win32_setbuf(FILE *pf, char *buf)
1402{
390b85e7 1403 setbuf(pf, buf);
84902520
TB
1404}
1405
1406DllExport int
1407win32_setvbuf(FILE *pf, char *buf, int type, size_t size)
1408{
390b85e7 1409 return setvbuf(pf, buf, type, size);
84902520
TB
1410}
1411
1412DllExport int
1413win32_flushall(void)
1414{
390b85e7 1415 return flushall();
84902520
TB
1416}
1417
1418DllExport int
1419win32_fcloseall(void)
1420{
390b85e7 1421 return fcloseall();
84902520
TB
1422}
1423
1424DllExport char*
1425win32_fgets(char *s, int n, FILE *pf)
1426{
390b85e7 1427 return fgets(s, n, pf);
84902520
TB
1428}
1429
1430DllExport char*
1431win32_gets(char *s)
1432{
390b85e7 1433 return gets(s);
84902520
TB
1434}
1435
1436DllExport int
1437win32_fgetc(FILE *pf)
1438{
390b85e7 1439 return fgetc(pf);
84902520
TB
1440}
1441
1442DllExport int
1443win32_putc(int c, FILE *pf)
1444{
390b85e7 1445 return putc(c,pf);
84902520
TB
1446}
1447
1448DllExport int
1449win32_puts(const char *s)
1450{
390b85e7 1451 return puts(s);
84902520
TB
1452}
1453
1454DllExport int
1455win32_getchar(void)
1456{
390b85e7 1457 return getchar();
84902520
TB
1458}
1459
1460DllExport int
1461win32_putchar(int c)
1462{
390b85e7 1463 return putchar(c);
84902520
TB
1464}
1465
bbc8f9de
NIS
1466#ifdef MYMALLOC
1467
1468#ifndef USE_PERL_SBRK
1469
1470static char *committed = NULL;
1471static char *base = NULL;
1472static char *reserved = NULL;
1473static char *brk = NULL;
1474static DWORD pagesize = 0;
1475static DWORD allocsize = 0;
1476
1477void *
1478sbrk(int need)
1479{
1480 void *result;
1481 if (!pagesize)
1482 {SYSTEM_INFO info;
1483 GetSystemInfo(&info);
1484 /* Pretend page size is larger so we don't perpetually
1485 * call the OS to commit just one page ...
1486 */
1487 pagesize = info.dwPageSize << 3;
1488 allocsize = info.dwAllocationGranularity;
1489 }
1490 /* This scheme fails eventually if request for contiguous
1491 * block is denied so reserve big blocks - this is only
1492 * address space not memory ...
1493 */
1494 if (brk+need >= reserved)
1495 {
1496 DWORD size = 64*1024*1024;
1497 char *addr;
1498 if (committed && reserved && committed < reserved)
1499 {
1500 /* Commit last of previous chunk cannot span allocations */
161b471a 1501 addr = (char *) VirtualAlloc(committed,reserved-committed,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de
NIS
1502 if (addr)
1503 committed = reserved;
1504 }
1505 /* Reserve some (more) space
1506 * Note this is a little sneaky, 1st call passes NULL as reserved
1507 * so lets system choose where we start, subsequent calls pass
1508 * the old end address so ask for a contiguous block
1509 */
161b471a 1510 addr = (char *) VirtualAlloc(reserved,size,MEM_RESERVE,PAGE_NOACCESS);
bbc8f9de
NIS
1511 if (addr)
1512 {
1513 reserved = addr+size;
1514 if (!base)
1515 base = addr;
1516 if (!committed)
1517 committed = base;
1518 if (!brk)
1519 brk = committed;
1520 }
1521 else
1522 {
1523 return (void *) -1;
1524 }
1525 }
1526 result = brk;
1527 brk += need;
1528 if (brk > committed)
1529 {
1530 DWORD size = ((brk-committed + pagesize -1)/pagesize) * pagesize;
161b471a 1531 char *addr = (char *) VirtualAlloc(committed,size,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de
NIS
1532 if (addr)
1533 {
1534 committed += size;
1535 }
1536 else
1537 return (void *) -1;
1538 }
1539 return result;
1540}
1541
1542#endif
1543#endif
1544
84902520
TB
1545DllExport void*
1546win32_malloc(size_t size)
1547{
390b85e7 1548 return malloc(size);
84902520
TB
1549}
1550
1551DllExport void*
1552win32_calloc(size_t numitems, size_t size)
1553{
390b85e7 1554 return calloc(numitems,size);
84902520
TB
1555}
1556
1557DllExport void*
1558win32_realloc(void *block, size_t size)
1559{
390b85e7 1560 return realloc(block,size);
84902520
TB
1561}
1562
1563DllExport void
1564win32_free(void *block)
1565{
390b85e7 1566 free(block);
84902520
TB
1567}
1568
bbc8f9de 1569
68dc0745 1570int
65e48ea9 1571win32_open_osfhandle(long handle, int flags)
0a753a76 1572{
390b85e7 1573 return _open_osfhandle(handle, flags);
0a753a76
PP
1574}
1575
68dc0745 1576long
65e48ea9 1577win32_get_osfhandle(int fd)
0a753a76 1578{
390b85e7 1579 return _get_osfhandle(fd);
0a753a76 1580}
7bac28a0 1581
7bac28a0
PP
1582/*
1583 * Extras.
1584 */
1585
ad2e33dc
GS
1586static
1587XS(w32_GetCwd)
1588{
1589 dXSARGS;
1590 SV *sv = sv_newmortal();
1591 /* Make one call with zero size - return value is required size */
1592 DWORD len = GetCurrentDirectory((DWORD)0,NULL);
1593 SvUPGRADE(sv,SVt_PV);
1594 SvGROW(sv,len);
1595 SvCUR(sv) = GetCurrentDirectory((DWORD) SvLEN(sv), SvPVX(sv));
1596 /*
1597 * If result != 0
1598 * then it worked, set PV valid,
1599 * else leave it 'undef'
1600 */
1601 if (SvCUR(sv))
1602 SvPOK_on(sv);
1603 EXTEND(sp,1);
1604 ST(0) = sv;
1605 XSRETURN(1);
1606}
1607
1608static
1609XS(w32_SetCwd)
1610{
1611 dXSARGS;
1612 if (items != 1)
1613 croak("usage: Win32::SetCurrentDirectory($cwd)");
1614 if (SetCurrentDirectory(SvPV(ST(0),na)))
1615 XSRETURN_YES;
1616
1617 XSRETURN_NO;
1618}
1619
1620static
1621XS(w32_GetNextAvailDrive)
1622{
1623 dXSARGS;
1624 char ix = 'C';
1625 char root[] = "_:\\";
1626 while (ix <= 'Z') {
1627 root[0] = ix++;
1628 if (GetDriveType(root) == 1) {
1629 root[2] = '\0';
1630 XSRETURN_PV(root);
1631 }
1632 }
1633 XSRETURN_UNDEF;
1634}
1635
1636static
1637XS(w32_GetLastError)
1638{
1639 dXSARGS;
1640 XSRETURN_IV(GetLastError());
1641}
1642
1643static
1644XS(w32_LoginName)
1645{
1646 dXSARGS;
e34ffe5a
GS
1647 char *name = getlogin_buffer;
1648 DWORD size = sizeof(getlogin_buffer);
ad2e33dc
GS
1649 if (GetUserName(name,&size)) {
1650 /* size includes NULL */
1651 ST(0) = sv_2mortal(newSVpv(name,size-1));
1652 XSRETURN(1);
1653 }
1654 XSRETURN_UNDEF;
1655}
1656
1657static
1658XS(w32_NodeName)
1659{
1660 dXSARGS;
1661 char name[MAX_COMPUTERNAME_LENGTH+1];
1662 DWORD size = sizeof(name);
1663 if (GetComputerName(name,&size)) {
1664 /* size does NOT include NULL :-( */
1665 ST(0) = sv_2mortal(newSVpv(name,size));
1666 XSRETURN(1);
1667 }
1668 XSRETURN_UNDEF;
1669}
1670
1671
1672static
1673XS(w32_DomainName)
1674{
1675 dXSARGS;
1676 char name[256];
1677 DWORD size = sizeof(name);
1678 if (GetUserName(name,&size)) {
1679 char sid[1024];
1680 DWORD sidlen = sizeof(sid);
1681 char dname[256];
1682 DWORD dnamelen = sizeof(dname);
1683 SID_NAME_USE snu;
1684 if (LookupAccountName(NULL, name, &sid, &sidlen,
1685 dname, &dnamelen, &snu)) {
1686 XSRETURN_PV(dname); /* all that for this */
1687 }
1688 }
1689 XSRETURN_UNDEF;
1690}
1691
1692static
1693XS(w32_FsType)
1694{
1695 dXSARGS;
1696 char fsname[256];
1697 DWORD flags, filecomplen;
1698 if (GetVolumeInformation(NULL, NULL, 0, NULL, &filecomplen,
1699 &flags, fsname, sizeof(fsname))) {
1700 if (GIMME == G_ARRAY) {
1701 XPUSHs(sv_2mortal(newSVpv(fsname,0)));
1702 XPUSHs(sv_2mortal(newSViv(flags)));
1703 XPUSHs(sv_2mortal(newSViv(filecomplen)));
1704 PUTBACK;
1705 return;
1706 }
1707 XSRETURN_PV(fsname);
1708 }
1709 XSRETURN_UNDEF;
1710}
1711
1712static
1713XS(w32_GetOSVersion)
1714{
1715 dXSARGS;
1716 OSVERSIONINFO osver;
1717
1718 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
1719 if (GetVersionEx(&osver)) {
1720 XPUSHs(newSVpv(osver.szCSDVersion, 0));
1721 XPUSHs(newSViv(osver.dwMajorVersion));
1722 XPUSHs(newSViv(osver.dwMinorVersion));
1723 XPUSHs(newSViv(osver.dwBuildNumber));
1724 XPUSHs(newSViv(osver.dwPlatformId));
1725 PUTBACK;
1726 return;
1727 }
1728 XSRETURN_UNDEF;
1729}
1730
1731static
1732XS(w32_IsWinNT)
1733{
1734 dXSARGS;
1735 XSRETURN_IV(IsWinNT());
1736}
1737
1738static
1739XS(w32_IsWin95)
1740{
1741 dXSARGS;
1742 XSRETURN_IV(IsWin95());
1743}
1744
1745static
1746XS(w32_FormatMessage)
1747{
1748 dXSARGS;
1749 DWORD source = 0;
1750 char msgbuf[1024];
1751
1752 if (items != 1)
1753 croak("usage: Win32::FormatMessage($errno)");
1754
1755 if (FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM,
1756 &source, SvIV(ST(0)), 0,
1757 msgbuf, sizeof(msgbuf)-1, NULL))
1758 XSRETURN_PV(msgbuf);
1759
1760 XSRETURN_UNDEF;
1761}
1762
1763static
1764XS(w32_Spawn)
1765{
1766 dXSARGS;
1767 char *cmd, *args;
1768 PROCESS_INFORMATION stProcInfo;
1769 STARTUPINFO stStartInfo;
1770 BOOL bSuccess = FALSE;
1771
1772 if(items != 3)
1773 croak("usage: Win32::Spawn($cmdName, $args, $PID)");
1774
1775 cmd = SvPV(ST(0),na);
1776 args = SvPV(ST(1), na);
1777
1778 memset(&stStartInfo, 0, sizeof(stStartInfo)); /* Clear the block */
1779 stStartInfo.cb = sizeof(stStartInfo); /* Set the structure size */
1780 stStartInfo.dwFlags = STARTF_USESHOWWINDOW; /* Enable wShowWindow control */
1781 stStartInfo.wShowWindow = SW_SHOWMINNOACTIVE; /* Start min (normal) */
1782
1783 if(CreateProcess(
1784 cmd, /* Image path */
1785 args, /* Arguments for command line */
1786 NULL, /* Default process security */
1787 NULL, /* Default thread security */
1788 FALSE, /* Must be TRUE to use std handles */
1789 NORMAL_PRIORITY_CLASS, /* No special scheduling */
1790 NULL, /* Inherit our environment block */
1791 NULL, /* Inherit our currrent directory */
1792 &stStartInfo, /* -> Startup info */
1793 &stProcInfo)) /* <- Process info (if OK) */
1794 {
1795 CloseHandle(stProcInfo.hThread);/* library source code does this. */
1796 sv_setiv(ST(2), stProcInfo.dwProcessId);
1797 bSuccess = TRUE;
1798 }
1799 XSRETURN_IV(bSuccess);
1800}
1801
1802static
1803XS(w32_GetTickCount)
1804{
1805 dXSARGS;
1806 XSRETURN_IV(GetTickCount());
1807}
1808
1809static
1810XS(w32_GetShortPathName)
1811{
1812 dXSARGS;
1813 SV *shortpath;
e8bab181 1814 DWORD len;
ad2e33dc
GS
1815
1816 if(items != 1)
1817 croak("usage: Win32::GetShortPathName($longPathName)");
1818
1819 shortpath = sv_mortalcopy(ST(0));
1820 SvUPGRADE(shortpath, SVt_PV);
1821 /* src == target is allowed */
e8bab181
GS
1822 do {
1823 len = GetShortPathName(SvPVX(shortpath),
1824 SvPVX(shortpath),
1825 SvLEN(shortpath));
1826 } while (len >= SvLEN(shortpath) && sv_grow(shortpath,len+1));
1827 if (len) {
1828 SvCUR_set(shortpath,len);
ad2e33dc 1829 ST(0) = shortpath;
e8bab181 1830 }
ad2e33dc
GS
1831 else
1832 ST(0) = &sv_undef;
1833 XSRETURN(1);
1834}
1835
1836void
f3986ebb 1837Perl_init_os_extras()
ad2e33dc
GS
1838{
1839 char *file = __FILE__;
1840 dXSUB_SYS;
1841
1842 /* XXX should be removed after checking with Nick */
1843 newXS("Win32::GetCurrentDirectory", w32_GetCwd, file);
1844
1845 /* these names are Activeware compatible */
1846 newXS("Win32::GetCwd", w32_GetCwd, file);
1847 newXS("Win32::SetCwd", w32_SetCwd, file);
1848 newXS("Win32::GetNextAvailDrive", w32_GetNextAvailDrive, file);
1849 newXS("Win32::GetLastError", w32_GetLastError, file);
1850 newXS("Win32::LoginName", w32_LoginName, file);
1851 newXS("Win32::NodeName", w32_NodeName, file);
1852 newXS("Win32::DomainName", w32_DomainName, file);
1853 newXS("Win32::FsType", w32_FsType, file);
1854 newXS("Win32::GetOSVersion", w32_GetOSVersion, file);
1855 newXS("Win32::IsWinNT", w32_IsWinNT, file);
1856 newXS("Win32::IsWin95", w32_IsWin95, file);
1857 newXS("Win32::FormatMessage", w32_FormatMessage, file);
1858 newXS("Win32::Spawn", w32_Spawn, file);
1859 newXS("Win32::GetTickCount", w32_GetTickCount, file);
1860 newXS("Win32::GetShortPathName", w32_GetShortPathName, file);
1861
1862 /* XXX Bloat Alert! The following Activeware preloads really
1863 * ought to be part of Win32::Sys::*, so they're not included
1864 * here.
1865 */
1866 /* LookupAccountName
1867 * LookupAccountSID
1868 * InitiateSystemShutdown
1869 * AbortSystemShutdown
1870 * ExpandEnvrironmentStrings
1871 */
1872}
1873
1874void
1875Perl_win32_init(int *argcp, char ***argvp)
1876{
1877 /* Disable floating point errors, Perl will trap the ones we
1878 * care about. VC++ RTL defaults to switching these off
1879 * already, but the Borland RTL doesn't. Since we don't
1880 * want to be at the vendor's whim on the default, we set
1881 * it explicitly here.
1882 */
a835ef8a 1883#if !defined(_ALPHA_) && !defined(__GNUC__)
ad2e33dc 1884 _control87(MCW_EM, MCW_EM);
3dc9191e 1885#endif
dc86dda3 1886 MALLOC_INIT;
ad2e33dc 1887}
d55594ae 1888
a868473f
NIS
1889#ifdef USE_BINMODE_SCRIPTS
1890
1891void
1892win32_strip_return(SV *sv)
1893{
1894 char *s = SvPVX(sv);
1895 char *e = s+SvCUR(sv);
1896 char *d = s;
1897 while (s < e)
1898 {
1899 if (*s == '\r' && s[1] == '\n')
1900 {
1901 *d++ = '\n';
1902 s += 2;
1903 }
1904 else
1905 {
1906 *d++ = *s++;
1907 }
1908 }
1909 SvCUR_set(sv,d-SvPVX(sv));
1910}
1911
1912#endif
1913
1914
d55594ae
GS
1915
1916
1917
161b471a 1918
a835ef8a 1919
22239a37 1920