This is a live mirror of the Perl 5 development currently hosted at https://github.com/perl/perl5
[asperl] add AS patch#18
[perl5.git] / win32 / win32.c
CommitLineData
68dc0745 1/* WIN32.C
2 *
3 * (c) 1995 Microsoft Corporation. All rights reserved.
4 * Developed by hip communications inc., http://info.hip.com/info/
5 * Portions (c) 1993 Intergraph Corporation. All rights reserved.
6 *
7 * You may distribute under the terms of either the GNU General Public
8 * License or the Artistic License, as specified in the README file.
9 */
0a753a76 10
11#define WIN32_LEAN_AND_MEAN
12#define WIN32IO_IS_STDIO
13#include <tchar.h>
a835ef8a
NIS
14#ifdef __GNUC__
15#define Win32_Winsock
ac4c12e7
GS
16# ifdef __cplusplus
17#undef __attribute__ /* seems broken in 2.8.0 */
18#define __attribute__(p)
19# endif
a835ef8a 20#endif
0a753a76 21#include <windows.h>
22
e56670dd 23#ifndef __MINGW32__
9404a519
GS
24#include <lmcons.h>
25#include <lmerr.h>
26/* ugliness to work around a buggy struct definition in lmwksta.h */
27#undef LPTSTR
28#define LPTSTR LPWSTR
29#include <lmwksta.h>
30#undef LPTSTR
31#define LPTSTR LPSTR
e56670dd
GS
32#include <lmapibuf.h>
33#endif /* __MINGW32__ */
9404a519 34
68dc0745 35/* #include "config.h" */
0a753a76 36
37#define PERLIO_NOT_STDIO 0
38#if !defined(PERLIO_IS_STDIO) && !defined(USE_SFIO)
39#define PerlIO FILE
40#endif
41
42#include "EXTERN.h"
43#include "perl.h"
c69f6586
GS
44
45#define NO_XSLOCKS
46#ifdef PERL_OBJECT
47extern CPerlObj* pPerl;
48#endif
ad2e33dc 49#include "XSUB.h"
c69f6586
GS
50
51#include "Win32iop.h"
0a753a76 52#include <fcntl.h>
53#include <sys/stat.h>
5b0d9cbe
NIS
54#ifndef __GNUC__
55/* assert.h conflicts with #define of assert in perl.h */
0a753a76 56#include <assert.h>
5b0d9cbe 57#endif
0a753a76 58#include <string.h>
59#include <stdarg.h>
ad2e33dc 60#include <float.h>
ad0751ec 61#include <time.h>
3730b96e 62#if defined(_MSC_VER) || defined(__MINGW32__)
ad0751ec
GS
63#include <sys/utime.h>
64#else
65#include <utime.h>
66#endif
0a753a76 67
5b0d9cbe
NIS
68#ifdef __GNUC__
69/* Mingw32 defaults to globing command line
70 * So we turn it off like this:
71 */
72int _CRT_glob = 0;
73#endif
74
6890e559
GS
75#define EXECF_EXEC 1
76#define EXECF_SPAWN 2
77#define EXECF_SPAWN_NOWAIT 3
78
c69f6586 79#if defined(PERL_OBJECT)
00dc2f4f
GS
80#undef win32_get_stdlib
81#define win32_get_stdlib g_win32_get_stdlib
82#undef win32_get_sitelib
83#define win32_get_sitelib g_win32_get_sitelib
c69f6586
GS
84#undef do_aspawn
85#define do_aspawn g_do_aspawn
86#undef do_spawn
87#define do_spawn g_do_spawn
88#undef do_exec
89#define do_exec g_do_exec
90#undef opendir
91#define opendir g_opendir
92#undef readdir
93#define readdir g_readdir
94#undef telldir
95#define telldir g_telldir
96#undef seekdir
97#define seekdir g_seekdir
98#undef rewinddir
99#define rewinddir g_rewinddir
100#undef closedir
101#define closedir g_closedir
102#undef getlogin
103#define getlogin g_getlogin
104#endif
105
2d7a9237 106static DWORD os_id(void);
ce1da67e
GS
107static void get_shell(void);
108static long tokenize(char *str, char **dest, char ***destv);
c69f6586 109 int do_spawn2(char *cmd, int exectype);
2d7a9237
GS
110static BOOL has_redirection(char *ptr);
111static long filetime_to_clock(PFILETIME ft);
ad0751ec 112static BOOL filetime_from_time(PFILETIME ft, time_t t);
2d7a9237 113
c69f6586 114
ce1da67e
GS
115char * w32_perlshell_tokens = Nullch;
116char ** w32_perlshell_vec;
117long w32_perlshell_items = -1;
2d7a9237 118DWORD w32_platform = (DWORD)-1;
2d7a9237
GS
119char w32_perllib_root[MAX_PATH+1];
120HANDLE w32_perldll_handle = INVALID_HANDLE_VALUE;
121#ifndef __BORLANDC__
122long w32_num_children = 0;
123HANDLE w32_child_pids[MAXIMUM_WAIT_OBJECTS];
124#endif
0a753a76 125
50892819 126#ifndef FOPEN_MAX
6b35f0c3 127# if defined(_NSTREAM_)
50892819 128# define FOPEN_MAX _NSTREAM_
6b35f0c3 129# elsif defined(_NFILE_)
50892819 130# define FOPEN_MAX _NFILE_
6b35f0c3 131# elsif defined(_NFILE)
50892819
GS
132# define FOPEN_MAX _NFILE
133# endif
134#endif
135
136#ifndef USE_CRT_POPEN
137int w32_popen_pids[FOPEN_MAX];
138#endif
139
26618a56
GS
140#ifdef USE_THREADS
141# ifdef USE_DECLSPEC_THREAD
142__declspec(thread) char strerror_buffer[512];
e34ffe5a 143__declspec(thread) char getlogin_buffer[128];
26618a56
GS
144# ifdef HAVE_DES_FCRYPT
145__declspec(thread) char crypt_buffer[30];
146# endif
147# else
148# define strerror_buffer (thr->i.Wstrerror_buffer)
e34ffe5a 149# define getlogin_buffer (thr->i.Wgetlogin_buffer)
26618a56
GS
150# define crypt_buffer (thr->i.Wcrypt_buffer)
151# endif
152#else
153char strerror_buffer[512];
e34ffe5a 154char getlogin_buffer[128];
26618a56
GS
155# ifdef HAVE_DES_FCRYPT
156char crypt_buffer[30];
157# endif
158#endif
159
3fe9a6f1 160int
161IsWin95(void) {
2d7a9237 162 return (os_id() == VER_PLATFORM_WIN32_WINDOWS);
3fe9a6f1 163}
164
165int
166IsWinNT(void) {
2d7a9237 167 return (os_id() == VER_PLATFORM_WIN32_NT);
3fe9a6f1 168}
0a753a76 169
00dc2f4f
GS
170char*
171GetRegStrFromKey(HKEY hkey, const char *lpszValueName, char** ptr, DWORD* lpDataLen)
172{ /* Retrieve a REG_SZ or REG_EXPAND_SZ from the registry */
173 HKEY handle;
174 DWORD type;
175 const char *subkey = "Software\\Perl";
176 long retval;
177
178 retval = RegOpenKeyEx(hkey, subkey, 0, KEY_READ, &handle);
ba3eb2af 179 if (retval == ERROR_SUCCESS){
00dc2f4f 180 retval = RegQueryValueEx(handle, lpszValueName, 0, &type, NULL, lpDataLen);
ba3eb2af
GS
181 if (retval == ERROR_SUCCESS && type == REG_SZ) {
182 if (*ptr != NULL) {
00dc2f4f
GS
183 Renew(*ptr, *lpDataLen, char);
184 }
185 else {
186 New(1312, *ptr, *lpDataLen, char);
187 }
188 retval = RegQueryValueEx(handle, lpszValueName, 0, NULL, (PBYTE)*ptr, lpDataLen);
ba3eb2af 189 if (retval != ERROR_SUCCESS) {
00dc2f4f
GS
190 Safefree(ptr);
191 ptr = NULL;
192 }
193 }
194 RegCloseKey(handle);
195 }
196 return *ptr;
197}
198
199char*
200GetRegStr(const char *lpszValueName, char** ptr, DWORD* lpDataLen)
201{
202 *ptr = GetRegStrFromKey(HKEY_CURRENT_USER, lpszValueName, ptr, lpDataLen);
ba3eb2af 203 if (*ptr == NULL)
00dc2f4f
GS
204 {
205 *ptr = GetRegStrFromKey(HKEY_LOCAL_MACHINE, lpszValueName, ptr, lpDataLen);
206 }
207 return *ptr;
208}
209
210char *
211win32_get_stdlib(char *pl)
212{
213 static char szStdLib[] = "lib";
214 int len = 0, newSize;
215 char szBuffer[MAX_PATH+1];
216 char szModuleName[MAX_PATH];
217 int result;
218 DWORD dwDataLen;
219 char *lpPath = NULL;
220 char *ptr;
221
222 /* $stdlib = $HKCU{"lib-$]"} || $HKLM{"lib-$]"} || $HKCU{"lib"} || $HKLM{"lib"} || ""; */
223 sprintf(szBuffer, "%s-%s", szStdLib, pl);
224 lpPath = GetRegStr(szBuffer, &lpPath, &dwDataLen);
ba3eb2af 225 if (lpPath == NULL)
00dc2f4f
GS
226 lpPath = GetRegStr(szStdLib, &lpPath, &dwDataLen);
227
228 /* $stdlib .= ";$EMD/../../lib" */
229 GetModuleFileName(GetModuleHandle(NULL), szModuleName, sizeof(szModuleName));
230 ptr = strrchr(szModuleName, '\\');
ba3eb2af 231 if (ptr != NULL)
00dc2f4f
GS
232 {
233 *ptr = '\0';
234 ptr = strrchr(szModuleName, '\\');
ba3eb2af 235 if (ptr != NULL)
00dc2f4f
GS
236 {
237 *ptr = '\0';
238 ptr = strrchr(szModuleName, '\\');
239 }
240 }
ba3eb2af 241 if (ptr == NULL)
00dc2f4f
GS
242 {
243 ptr = szModuleName;
244 *ptr = '\\';
245 }
246 strcpy(++ptr, szStdLib);
247
248 /* check that this path exists */
249 GetCurrentDirectory(sizeof(szBuffer), szBuffer);
250 result = SetCurrentDirectory(szModuleName);
251 SetCurrentDirectory(szBuffer);
ba3eb2af 252 if (result == 0)
00dc2f4f
GS
253 {
254 GetModuleFileName(GetModuleHandle(NULL), szModuleName, sizeof(szModuleName));
255 ptr = strrchr(szModuleName, '\\');
ba3eb2af 256 if (ptr != NULL)
00dc2f4f
GS
257 strcpy(++ptr, szStdLib);
258 }
259
260 newSize = strlen(szModuleName) + 1;
ba3eb2af 261 if (lpPath != NULL)
00dc2f4f
GS
262 {
263 len = strlen(lpPath);
264 newSize += len + 1; /* plus 1 for ';' */
265 lpPath = Renew(lpPath, newSize, char);
266 }
267 else
268 New(1310, lpPath, newSize, char);
269
ba3eb2af 270 if (lpPath != NULL)
00dc2f4f 271 {
ba3eb2af 272 if (len != 0)
00dc2f4f
GS
273 lpPath[len++] = ';';
274 strcpy(&lpPath[len], szModuleName);
275 }
276 return lpPath;
277}
278
279char *
280get_sitelib_part(char* lpRegStr, char* lpPathStr)
281{
282 char szBuffer[MAX_PATH+1];
283 char szModuleName[MAX_PATH];
284 DWORD dwDataLen;
285 int len = 0;
286 int result;
287 char *lpPath = NULL;
288 char *ptr;
289
290 lpPath = GetRegStr(lpRegStr, &lpPath, &dwDataLen);
291
292 /* $sitelib .= ";$EMD/../../../<lpPathStr>" */
293 GetModuleFileName(GetModuleHandle(NULL), szModuleName, sizeof(szModuleName));
294 ptr = strrchr(szModuleName, '\\');
ba3eb2af 295 if (ptr != NULL)
00dc2f4f
GS
296 {
297 *ptr = '\0';
298 ptr = strrchr(szModuleName, '\\');
ba3eb2af 299 if (ptr != NULL)
00dc2f4f
GS
300 {
301 *ptr = '\0';
302 ptr = strrchr(szModuleName, '\\');
ba3eb2af 303 if (ptr != NULL)
00dc2f4f
GS
304 {
305 *ptr = '\0';
306 ptr = strrchr(szModuleName, '\\');
307 }
308 }
309 }
ba3eb2af 310 if (ptr == NULL)
00dc2f4f
GS
311 {
312 ptr = szModuleName;
313 *ptr = '\\';
314 }
315 strcpy(++ptr, lpPathStr);
316
317 /* check that this path exists */
318 GetCurrentDirectory(sizeof(szBuffer), szBuffer);
319 result = SetCurrentDirectory(szModuleName);
320 SetCurrentDirectory(szBuffer);
321
ba3eb2af 322 if (result)
00dc2f4f
GS
323 {
324 int newSize = strlen(szModuleName) + 1;
ba3eb2af 325 if (lpPath != NULL)
00dc2f4f
GS
326 {
327 len = strlen(lpPath);
328 newSize += len + 1; /* plus 1 for ';' */
329 lpPath = Renew(lpPath, newSize, char);
330 }
331 else
332 New(1311, lpPath, newSize, char);
333
ba3eb2af 334 if (lpPath != NULL)
00dc2f4f 335 {
ba3eb2af 336 if (len != 0)
00dc2f4f
GS
337 lpPath[len++] = ';';
338 strcpy(&lpPath[len], szModuleName);
339 }
340 }
341 return lpPath;
342}
343
68dc0745 344char *
00dc2f4f
GS
345win32_get_sitelib(char *pl)
346{
347 static char szSiteLib[] = "sitelib";
348 char szRegStr[40];
349 char szPathStr[MAX_PATH];
350 char *lpPath1;
351 char *lpPath2;
e3b8966e 352 int len, newSize;
00dc2f4f
GS
353
354 /* $HKCU{"sitelib-$]"} || $HKLM{"sitelib-$]"} . ---; */
355 sprintf(szRegStr, "%s-%s", szSiteLib, pl);
356 sprintf(szPathStr, "site\\%s\\lib", pl);
357 lpPath1 = get_sitelib_part(szRegStr, szPathStr);
358
359 /* $HKCU{'sitelib'} || $HKLM{'sitelib'} . ---; */
360 lpPath2 = get_sitelib_part(szSiteLib, "site\\lib");
ba3eb2af 361 if (lpPath1 == NULL)
00dc2f4f
GS
362 return lpPath2;
363
ba3eb2af 364 if (lpPath2 == NULL)
00dc2f4f
GS
365 return lpPath1;
366
e3b8966e
GS
367 len = strlen(lpPath1);
368 newSize = len + strlen(lpPath2) + 2; /* plus one for ';' */
00dc2f4f
GS
369
370 lpPath1 = Renew(lpPath1, newSize, char);
ba3eb2af 371 if (lpPath1 != NULL)
00dc2f4f
GS
372 {
373 lpPath1[len++] = ';';
374 strcpy(&lpPath1[len], lpPath2);
375 }
376 Safefree(lpPath2);
377 return lpPath1;
68dc0745 378}
0a753a76 379
b4793f7f 380
2d7a9237
GS
381static BOOL
382has_redirection(char *ptr)
68dc0745 383{
384 int inquote = 0;
385 char quote = '\0';
386
387 /*
388 * Scan string looking for redirection (< or >) or pipe
389 * characters (|) that are not in a quoted string
390 */
9404a519 391 while (*ptr) {
68dc0745 392 switch(*ptr) {
393 case '\'':
394 case '\"':
9404a519
GS
395 if (inquote) {
396 if (quote == *ptr) {
68dc0745 397 inquote = 0;
398 quote = '\0';
0a753a76 399 }
68dc0745 400 }
401 else {
402 quote = *ptr;
403 inquote++;
404 }
405 break;
406 case '>':
407 case '<':
408 case '|':
9404a519 409 if (!inquote)
68dc0745 410 return TRUE;
411 default:
412 break;
0a753a76 413 }
68dc0745 414 ++ptr;
415 }
416 return FALSE;
0a753a76 417}
418
c69f6586 419#if !defined(PERL_OBJECT)
68dc0745 420/* since the current process environment is being updated in util.c
421 * the library functions will get the correct environment
422 */
423PerlIO *
424my_popen(char *cmd, char *mode)
0a753a76 425{
426#ifdef FIXCMD
68dc0745 427#define fixcmd(x) { \
428 char *pspace = strchr((x),' '); \
429 if (pspace) { \
430 char *p = (x); \
431 while (p < pspace) { \
432 if (*p == '/') \
433 *p = '\\'; \
434 p++; \
435 } \
436 } \
437 }
0a753a76 438#else
439#define fixcmd(x)
440#endif
68dc0745 441 fixcmd(cmd);
3e3baf6d
TB
442 win32_fflush(stdout);
443 win32_fflush(stderr);
0a753a76 444 return win32_popen(cmd, mode);
0a753a76 445}
446
68dc0745 447long
448my_pclose(PerlIO *fp)
0a753a76 449{
450 return win32_pclose(fp);
451}
c69f6586 452#endif
0a753a76 453
8b10511d 454static DWORD
2d7a9237 455os_id(void)
0a753a76 456{
8b10511d 457 static OSVERSIONINFO osver;
0a753a76 458
2d7a9237 459 if (osver.dwPlatformId != w32_platform) {
8b10511d
GS
460 memset(&osver, 0, sizeof(OSVERSIONINFO));
461 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
462 GetVersionEx(&osver);
2d7a9237 463 w32_platform = osver.dwPlatformId;
8b10511d 464 }
2d7a9237 465 return (w32_platform);
0a753a76 466}
467
ce1da67e
GS
468/* Tokenize a string. Words are null-separated, and the list
469 * ends with a doubled null. Any character (except null and
470 * including backslash) may be escaped by preceding it with a
471 * backslash (the backslash will be stripped).
472 * Returns number of words in result buffer.
473 */
474static long
475tokenize(char *str, char **dest, char ***destv)
476{
477 char *retstart = Nullch;
478 char **retvstart = 0;
479 int items = -1;
480 if (str) {
481 int slen = strlen(str);
482 register char *ret;
483 register char **retv;
484 New(1307, ret, slen+2, char);
485 New(1308, retv, (slen+3)/2, char*);
486
487 retstart = ret;
488 retvstart = retv;
489 *retv = ret;
490 items = 0;
491 while (*str) {
492 *ret = *str++;
493 if (*ret == '\\' && *str)
494 *ret = *str++;
495 else if (*ret == ' ') {
496 while (*str == ' ')
497 str++;
498 if (ret == retstart)
499 ret--;
500 else {
501 *ret = '\0';
502 ++items;
503 if (*str)
504 *++retv = ret+1;
505 }
506 }
507 else if (!*str)
508 ++items;
509 ret++;
510 }
511 retvstart[items] = Nullch;
512 *ret++ = '\0';
513 *ret = '\0';
514 }
515 *dest = retstart;
516 *destv = retvstart;
517 return items;
518}
519
520static void
2d7a9237 521get_shell(void)
0a753a76 522{
ce1da67e 523 if (!w32_perlshell_tokens) {
174c211a
GS
524 /* we don't use COMSPEC here for two reasons:
525 * 1. the same reason perl on UNIX doesn't use SHELL--rampant and
526 * uncontrolled unportability of the ensuing scripts.
527 * 2. PERL5SHELL could be set to a shell that may not be fit for
528 * interactive use (which is what most programs look in COMSPEC
529 * for).
530 */
ce1da67e
GS
531 char* defaultshell = (IsWinNT() ? "cmd.exe /x/c" : "command.com /c");
532 char *usershell = getenv("PERL5SHELL");
533 w32_perlshell_items = tokenize(usershell ? usershell : defaultshell,
534 &w32_perlshell_tokens,
535 &w32_perlshell_vec);
68dc0745 536 }
0a753a76 537}
538
68dc0745 539int
2d7a9237 540do_aspawn(void *vreally, void **vmark, void **vsp)
0a753a76 541{
2d7a9237
GS
542 SV *really = (SV*)vreally;
543 SV **mark = (SV**)vmark;
544 SV **sp = (SV**)vsp;
68dc0745 545 char **argv;
2d7a9237 546 char *str;
68dc0745 547 int status;
2d7a9237 548 int flag = P_WAIT;
68dc0745 549 int index = 0;
68dc0745 550
2d7a9237
GS
551 if (sp <= mark)
552 return -1;
68dc0745 553
ce1da67e
GS
554 get_shell();
555 New(1306, argv, (sp - mark) + w32_perlshell_items + 2, char*);
2d7a9237
GS
556
557 if (SvNIOKp(*(mark+1)) && !SvPOKp(*(mark+1))) {
558 ++mark;
559 flag = SvIVx(*mark);
68dc0745 560 }
561
9404a519 562 while (++mark <= sp) {
2d7a9237
GS
563 if (*mark && (str = SvPV(*mark, na)))
564 argv[index++] = str;
565 else
566 argv[index++] = "";
68dc0745 567 }
568 argv[index++] = 0;
569
2d7a9237 570 status = win32_spawnvp(flag,
c69f6586 571 (const char*)(really ? SvPV(really,na) : argv[0]),
2d7a9237
GS
572 (const char* const*)argv);
573
574 if (status < 0 && errno == ENOEXEC) {
575 /* possible shell-builtin, invoke with shell */
ce1da67e
GS
576 int sh_items;
577 sh_items = w32_perlshell_items;
2d7a9237
GS
578 while (--index >= 0)
579 argv[index+sh_items] = argv[index];
ce1da67e
GS
580 while (--sh_items >= 0)
581 argv[sh_items] = w32_perlshell_vec[sh_items];
2d7a9237
GS
582
583 status = win32_spawnvp(flag,
c69f6586 584 (const char*)(really ? SvPV(really,na) : argv[0]),
2d7a9237
GS
585 (const char* const*)argv);
586 }
68dc0745 587
50892819
GS
588 if (flag != P_NOWAIT) {
589 if (status < 0) {
590 if (dowarn)
591 warn("Can't spawn \"%s\": %s", argv[0], strerror(errno));
592 status = 255 * 256;
593 }
594 else
595 status *= 256;
596 statusvalue = status;
5aabfad6 597 }
ce1da67e 598 Safefree(argv);
50892819 599 return (status);
68dc0745 600}
601
c69f6586 602int
6890e559 603do_spawn2(char *cmd, int exectype)
68dc0745 604{
605 char **a;
606 char *s;
607 char **argv;
608 int status = -1;
609 BOOL needToTry = TRUE;
2d7a9237 610 char *cmd2;
68dc0745 611
2d7a9237
GS
612 /* Save an extra exec if possible. See if there are shell
613 * metacharacters in it */
9404a519 614 if (!has_redirection(cmd)) {
fc36a67e 615 New(1301,argv, strlen(cmd) / 2 + 2, char*);
616 New(1302,cmd2, strlen(cmd) + 1, char);
68dc0745 617 strcpy(cmd2, cmd);
618 a = argv;
619 for (s = cmd2; *s;) {
620 while (*s && isspace(*s))
621 s++;
622 if (*s)
623 *(a++) = s;
9404a519 624 while (*s && !isspace(*s))
68dc0745 625 s++;
9404a519 626 if (*s)
68dc0745 627 *s++ = '\0';
0a753a76 628 }
68dc0745 629 *a = Nullch;
ce1da67e 630 if (argv[0]) {
6890e559
GS
631 switch (exectype) {
632 case EXECF_SPAWN:
633 status = win32_spawnvp(P_WAIT, argv[0],
634 (const char* const*)argv);
635 break;
636 case EXECF_SPAWN_NOWAIT:
637 status = win32_spawnvp(P_NOWAIT, argv[0],
638 (const char* const*)argv);
639 break;
640 case EXECF_EXEC:
641 status = win32_execvp(argv[0], (const char* const*)argv);
642 break;
643 }
2d7a9237 644 if (status != -1 || errno == 0)
68dc0745 645 needToTry = FALSE;
0a753a76 646 }
0a753a76 647 Safefree(argv);
68dc0745 648 Safefree(cmd2);
649 }
2d7a9237 650 if (needToTry) {
ce1da67e
GS
651 char **argv;
652 int i = -1;
653 get_shell();
654 New(1306, argv, w32_perlshell_items + 2, char*);
655 while (++i < w32_perlshell_items)
656 argv[i] = w32_perlshell_vec[i];
2d7a9237
GS
657 argv[i++] = cmd;
658 argv[i] = Nullch;
6890e559
GS
659 switch (exectype) {
660 case EXECF_SPAWN:
661 status = win32_spawnvp(P_WAIT, argv[0],
662 (const char* const*)argv);
663 break;
664 case EXECF_SPAWN_NOWAIT:
665 status = win32_spawnvp(P_NOWAIT, argv[0],
666 (const char* const*)argv);
667 break;
668 case EXECF_EXEC:
669 status = win32_execvp(argv[0], (const char* const*)argv);
670 break;
671 }
ce1da67e
GS
672 cmd = argv[0];
673 Safefree(argv);
68dc0745 674 }
50892819
GS
675 if (exectype != EXECF_SPAWN_NOWAIT) {
676 if (status < 0) {
677 if (dowarn)
678 warn("Can't %s \"%s\": %s",
679 (exectype == EXECF_EXEC ? "exec" : "spawn"),
680 cmd, strerror(errno));
681 status = 255 * 256;
682 }
683 else
684 status *= 256;
685 statusvalue = status;
5aabfad6 686 }
50892819 687 return (status);
0a753a76 688}
689
6890e559
GS
690int
691do_spawn(char *cmd)
692{
693 return do_spawn2(cmd, EXECF_SPAWN);
694}
695
2d7a9237
GS
696int
697do_spawn_nowait(char *cmd)
698{
699 return do_spawn2(cmd, EXECF_SPAWN_NOWAIT);
700}
701
6890e559
GS
702bool
703do_exec(char *cmd)
704{
705 do_spawn2(cmd, EXECF_EXEC);
706 return FALSE;
707}
708
68dc0745 709/* The idea here is to read all the directory names into a string table
710 * (separated by nulls) and when one of the other dir functions is called
711 * return the pointer to the current file name.
712 */
713DIR *
714opendir(char *filename)
0a753a76 715{
9404a519
GS
716 DIR *p;
717 long len;
718 long idx;
719 char scanname[MAX_PATH+3];
720 struct stat sbuf;
721 WIN32_FIND_DATA FindData;
722 HANDLE fh;
723
724 len = strlen(filename);
725 if (len > MAX_PATH)
726 return NULL;
68dc0745 727
728 /* check to see if filename is a directory */
d55594ae 729 if (win32_stat(filename, &sbuf) < 0 || (sbuf.st_mode & S_IFDIR) == 0) {
c6c1a8fd
GS
730 /* CRT is buggy on sharenames, so make sure it really isn't */
731 DWORD r = GetFileAttributes(filename);
732 if (r == 0xffffffff || !(r & FILE_ATTRIBUTE_DIRECTORY))
733 return NULL;
68dc0745 734 }
735
68dc0745 736 /* Get us a DIR structure */
fc36a67e 737 Newz(1303, p, 1, DIR);
9404a519 738 if (p == NULL)
68dc0745 739 return NULL;
740
741 /* Create the search pattern */
742 strcpy(scanname, filename);
9404a519
GS
743 if (scanname[len-1] != '/' && scanname[len-1] != '\\')
744 scanname[len++] = '/';
745 scanname[len++] = '*';
746 scanname[len] = '\0';
68dc0745 747
748 /* do the FindFirstFile call */
749 fh = FindFirstFile(scanname, &FindData);
9404a519 750 if (fh == INVALID_HANDLE_VALUE) {
68dc0745 751 return NULL;
752 }
753
754 /* now allocate the first part of the string table for
755 * the filenames that we find.
756 */
757 idx = strlen(FindData.cFileName)+1;
fc36a67e 758 New(1304, p->start, idx, char);
9404a519 759 if (p->start == NULL)
65e48ea9 760 croak("opendir: malloc failed!\n");
68dc0745 761 strcpy(p->start, FindData.cFileName);
68dc0745 762 p->nfiles++;
763
764 /* loop finding all the files that match the wildcard
765 * (which should be all of them in this directory!).
766 * the variable idx should point one past the null terminator
767 * of the previous string found.
768 */
769 while (FindNextFile(fh, &FindData)) {
770 len = strlen(FindData.cFileName);
771 /* bump the string table size by enough for the
772 * new name and it's null terminator
773 */
774 Renew(p->start, idx+len+1, char);
9404a519 775 if (p->start == NULL)
65e48ea9 776 croak("opendir: malloc failed!\n");
68dc0745 777 strcpy(&p->start[idx], FindData.cFileName);
9404a519
GS
778 p->nfiles++;
779 idx += len+1;
780 }
781 FindClose(fh);
782 p->size = idx;
783 p->curr = p->start;
784 return p;
0a753a76 785}
786
787
68dc0745 788/* Readdir just returns the current string pointer and bumps the
789 * string pointer to the nDllExport entry.
790 */
791struct direct *
792readdir(DIR *dirp)
0a753a76 793{
68dc0745 794 int len;
795 static int dummy = 0;
0a753a76 796
68dc0745 797 if (dirp->curr) {
798 /* first set up the structure to return */
799 len = strlen(dirp->curr);
800 strcpy(dirp->dirstr.d_name, dirp->curr);
801 dirp->dirstr.d_namlen = len;
0a753a76 802
68dc0745 803 /* Fake an inode */
804 dirp->dirstr.d_ino = dummy++;
0a753a76 805
68dc0745 806 /* Now set up for the nDllExport call to readdir */
807 dirp->curr += len + 1;
808 if (dirp->curr >= (dirp->start + dirp->size)) {
809 dirp->curr = NULL;
810 }
0a753a76 811
68dc0745 812 return &(dirp->dirstr);
813 }
814 else
815 return NULL;
0a753a76 816}
817
68dc0745 818/* Telldir returns the current string pointer position */
819long
820telldir(DIR *dirp)
0a753a76 821{
822 return (long) dirp->curr;
823}
824
825
68dc0745 826/* Seekdir moves the string pointer to a previously saved position
827 *(Saved by telldir).
828 */
829void
830seekdir(DIR *dirp, long loc)
0a753a76 831{
832 dirp->curr = (char *)loc;
833}
834
68dc0745 835/* Rewinddir resets the string pointer to the start */
836void
837rewinddir(DIR *dirp)
0a753a76 838{
839 dirp->curr = dirp->start;
840}
841
68dc0745 842/* free the memory allocated by opendir */
843int
844closedir(DIR *dirp)
0a753a76 845{
846 Safefree(dirp->start);
847 Safefree(dirp);
68dc0745 848 return 1;
0a753a76 849}
850
851
68dc0745 852/*
853 * various stubs
854 */
0a753a76 855
856
68dc0745 857/* Ownership
858 *
859 * Just pretend that everyone is a superuser. NT will let us know if
860 * we don\'t really have permission to do something.
861 */
0a753a76 862
863#define ROOT_UID ((uid_t)0)
864#define ROOT_GID ((gid_t)0)
865
68dc0745 866uid_t
867getuid(void)
0a753a76 868{
68dc0745 869 return ROOT_UID;
0a753a76 870}
871
68dc0745 872uid_t
873geteuid(void)
0a753a76 874{
68dc0745 875 return ROOT_UID;
0a753a76 876}
877
68dc0745 878gid_t
879getgid(void)
0a753a76 880{
68dc0745 881 return ROOT_GID;
0a753a76 882}
883
68dc0745 884gid_t
885getegid(void)
0a753a76 886{
68dc0745 887 return ROOT_GID;
0a753a76 888}
889
68dc0745 890int
22239a37 891setuid(uid_t auid)
0a753a76 892{
22239a37 893 return (auid == ROOT_UID ? 0 : -1);
0a753a76 894}
895
68dc0745 896int
22239a37 897setgid(gid_t agid)
0a753a76 898{
22239a37 899 return (agid == ROOT_GID ? 0 : -1);
0a753a76 900}
901
e34ffe5a
GS
902char *
903getlogin(void)
904{
905 dTHR;
906 char *buf = getlogin_buffer;
907 DWORD size = sizeof(getlogin_buffer);
908 if (GetUserName(buf,&size))
909 return buf;
910 return (char*)NULL;
911}
912
b990f8c8
GS
913int
914chown(const char *path, uid_t owner, gid_t group)
915{
916 /* XXX noop */
1c1c7f20 917 return 0;
b990f8c8
GS
918}
919
68dc0745 920int
921kill(int pid, int sig)
0a753a76 922{
68dc0745 923 HANDLE hProcess= OpenProcess(PROCESS_ALL_ACCESS, TRUE, pid);
0a753a76 924
925 if (hProcess == NULL) {
65e48ea9 926 croak("kill process failed!\n");
68dc0745 927 }
928 else {
929 if (!TerminateProcess(hProcess, sig))
65e48ea9 930 croak("kill process failed!\n");
68dc0745 931 CloseHandle(hProcess);
932 }
933 return 0;
0a753a76 934}
fbbbcc48 935
68dc0745 936/*
937 * File system stuff
938 */
0a753a76 939
f3986ebb
GS
940DllExport unsigned int
941win32_sleep(unsigned int t)
0a753a76 942{
68dc0745 943 Sleep(t*1000);
944 return 0;
0a753a76 945}
946
68dc0745 947DllExport int
948win32_stat(const char *path, struct stat *buffer)
0a753a76 949{
68dc0745 950 char t[MAX_PATH];
951 const char *p = path;
952 int l = strlen(path);
67fbe06e 953 int res;
0a753a76 954
68dc0745 955 if (l > 1) {
956 switch(path[l - 1]) {
957 case '\\':
958 case '/':
959 if (path[l - 2] != ':') {
960 strncpy(t, path, l - 1);
961 t[l - 1] = 0;
962 p = t;
963 };
964 }
965 }
390b85e7 966 res = stat(p,buffer);
67fbe06e
GS
967#ifdef __BORLANDC__
968 if (res == 0) {
969 if (S_ISDIR(buffer->st_mode))
970 buffer->st_mode |= S_IWRITE | S_IEXEC;
971 else if (S_ISREG(buffer->st_mode)) {
972 if (l >= 4 && path[l-4] == '.') {
973 const char *e = path + l - 3;
974 if (strnicmp(e,"exe",3)
975 && strnicmp(e,"bat",3)
976 && strnicmp(e,"com",3)
977 && (IsWin95() || strnicmp(e,"cmd",3)))
978 buffer->st_mode &= ~S_IEXEC;
979 else
980 buffer->st_mode |= S_IEXEC;
981 }
982 else
983 buffer->st_mode &= ~S_IEXEC;
984 }
985 }
986#endif
987 return res;
0a753a76 988}
989
0551aaa8
GS
990#ifndef USE_WIN32_RTL_ENV
991
992DllExport char *
993win32_getenv(const char *name)
994{
995 static char *curitem = Nullch;
996 static DWORD curlen = 512;
997 DWORD needlen;
998 if (!curitem)
999 New(1305,curitem,curlen,char);
1000 if (!(needlen = GetEnvironmentVariable(name,curitem,curlen)))
1001 return Nullch;
1002 while (needlen > curlen) {
1003 Renew(curitem,needlen,char);
1004 curlen = needlen;
1005 needlen = GetEnvironmentVariable(name,curitem,curlen);
1006 }
ba3eb2af 1007 if (curitem == NULL)
c69f6586 1008 {
ba3eb2af 1009 if (strcmp("PERL5DB", name) == 0)
00dc2f4f 1010 curitem = GetRegStr(name, &curitem, &curlen);
c69f6586 1011 }
0551aaa8
GS
1012 return curitem;
1013}
1014
1015#endif
1016
d55594ae 1017static long
2d7a9237 1018filetime_to_clock(PFILETIME ft)
d55594ae
GS
1019{
1020 __int64 qw = ft->dwHighDateTime;
1021 qw <<= 32;
1022 qw |= ft->dwLowDateTime;
1023 qw /= 10000; /* File time ticks at 0.1uS, clock at 1mS */
1024 return (long) qw;
1025}
1026
f3986ebb
GS
1027DllExport int
1028win32_times(struct tms *timebuf)
0a753a76 1029{
d55594ae
GS
1030 FILETIME user;
1031 FILETIME kernel;
1032 FILETIME dummy;
1033 if (GetProcessTimes(GetCurrentProcess(), &dummy, &dummy,
1034 &kernel,&user)) {
2d7a9237
GS
1035 timebuf->tms_utime = filetime_to_clock(&user);
1036 timebuf->tms_stime = filetime_to_clock(&kernel);
d55594ae
GS
1037 timebuf->tms_cutime = 0;
1038 timebuf->tms_cstime = 0;
1039
1040 } else {
1041 /* That failed - e.g. Win95 fallback to clock() */
1042 clock_t t = clock();
1043 timebuf->tms_utime = t;
1044 timebuf->tms_stime = 0;
1045 timebuf->tms_cutime = 0;
1046 timebuf->tms_cstime = 0;
1047 }
68dc0745 1048 return 0;
0a753a76 1049}
1050
ad0751ec
GS
1051/* fix utime() so it works on directories in NT
1052 * thanks to Jan Dubois <jan.dubois@ibm.net>
1053 */
1054static BOOL
1055filetime_from_time(PFILETIME pFileTime, time_t Time)
1056{
1057 struct tm *pTM = gmtime(&Time);
1058 SYSTEMTIME SystemTime;
1059
1060 if (pTM == NULL)
1061 return FALSE;
1062
1063 SystemTime.wYear = pTM->tm_year + 1900;
1064 SystemTime.wMonth = pTM->tm_mon + 1;
1065 SystemTime.wDay = pTM->tm_mday;
1066 SystemTime.wHour = pTM->tm_hour;
1067 SystemTime.wMinute = pTM->tm_min;
1068 SystemTime.wSecond = pTM->tm_sec;
1069 SystemTime.wMilliseconds = 0;
1070
1071 return SystemTimeToFileTime(&SystemTime, pFileTime);
1072}
1073
1074DllExport int
3b405fc5 1075win32_utime(const char *filename, struct utimbuf *times)
ad0751ec
GS
1076{
1077 HANDLE handle;
1078 FILETIME ftCreate;
1079 FILETIME ftAccess;
1080 FILETIME ftWrite;
1081 struct utimbuf TimeBuffer;
1082
1083 int rc = utime(filename,times);
1084 /* EACCES: path specifies directory or readonly file */
1085 if (rc == 0 || errno != EACCES /* || !IsWinNT() */)
1086 return rc;
1087
1088 if (times == NULL) {
1089 times = &TimeBuffer;
1090 time(&times->actime);
1091 times->modtime = times->actime;
1092 }
1093
1094 /* This will (and should) still fail on readonly files */
1095 handle = CreateFile(filename, GENERIC_READ | GENERIC_WRITE,
1096 FILE_SHARE_READ | FILE_SHARE_DELETE, NULL,
1097 OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL);
1098 if (handle == INVALID_HANDLE_VALUE)
1099 return rc;
1100
1101 if (GetFileTime(handle, &ftCreate, &ftAccess, &ftWrite) &&
1102 filetime_from_time(&ftAccess, times->actime) &&
1103 filetime_from_time(&ftWrite, times->modtime) &&
1104 SetFileTime(handle, &ftCreate, &ftAccess, &ftWrite))
1105 {
1106 rc = 0;
1107 }
1108
1109 CloseHandle(handle);
1110 return rc;
1111}
1112
2d7a9237
GS
1113DllExport int
1114win32_wait(int *status)
1115{
1116#ifdef __BORLANDC__
1117 return wait(status);
1118#else
1119 /* XXX this wait emulation only knows about processes
1120 * spawned via win32_spawnvp(P_NOWAIT, ...).
1121 */
1122 int i, retval;
1123 DWORD exitcode, waitcode;
1124
1125 if (!w32_num_children) {
1126 errno = ECHILD;
1127 return -1;
1128 }
1129
1130 /* if a child exists, wait for it to die */
1131 waitcode = WaitForMultipleObjects(w32_num_children,
1132 w32_child_pids,
1133 FALSE,
1134 INFINITE);
1135 if (waitcode != WAIT_FAILED) {
1136 if (waitcode >= WAIT_ABANDONED_0
1137 && waitcode < WAIT_ABANDONED_0 + w32_num_children)
1138 i = waitcode - WAIT_ABANDONED_0;
1139 else
1140 i = waitcode - WAIT_OBJECT_0;
1141 if (GetExitCodeProcess(w32_child_pids[i], &exitcode) ) {
1142 CloseHandle(w32_child_pids[i]);
1143 *status = (int)((exitcode & 0xff) << 8);
1144 retval = (int)w32_child_pids[i];
1145 Copy(&w32_child_pids[i+1], &w32_child_pids[i],
1146 (w32_num_children-i-1), HANDLE);
1147 w32_num_children--;
1148 return retval;
1149 }
1150 }
1151
1152FAILED:
1153 errno = GetLastError();
1154 return -1;
1155
1156#endif
1157}
d55594ae 1158
2d7a9237 1159static UINT timerid = 0;
d55594ae
GS
1160
1161static VOID CALLBACK TimerProc(HWND win, UINT msg, UINT id, DWORD time)
1162{
1163 KillTimer(NULL,timerid);
1164 timerid=0;
1165 sighandler(14);
1166}
1167
f3986ebb
GS
1168DllExport unsigned int
1169win32_alarm(unsigned int sec)
0a753a76 1170{
d55594ae
GS
1171 /*
1172 * the 'obvious' implentation is SetTimer() with a callback
1173 * which does whatever receiving SIGALRM would do
1174 * we cannot use SIGALRM even via raise() as it is not
1175 * one of the supported codes in <signal.h>
1176 *
1177 * Snag is unless something is looking at the message queue
1178 * nothing happens :-(
1179 */
1180 if (sec)
1181 {
1182 timerid = SetTimer(NULL,timerid,sec*1000,(TIMERPROC)TimerProc);
1183 if (!timerid)
1184 croak("Cannot set timer");
1185 }
1186 else
1187 {
1188 if (timerid)
1189 {
1190 KillTimer(NULL,timerid);
1191 timerid=0;
1192 }
1193 }
68dc0745 1194 return 0;
0a753a76 1195}
1196
26618a56
GS
1197#ifdef HAVE_DES_FCRYPT
1198extern char * des_fcrypt(char *cbuf, const char *txt, const char *salt);
1199
1200DllExport char *
1201win32_crypt(const char *txt, const char *salt)
1202{
1203 dTHR;
1204 return des_fcrypt(crypt_buffer, txt, salt);
1205}
1206#endif
1207
f3986ebb 1208#ifdef USE_FIXED_OSFHANDLE
390b85e7
GS
1209
1210EXTERN_C int __cdecl _alloc_osfhnd(void);
1211EXTERN_C int __cdecl _set_osfhnd(int fh, long value);
1212EXTERN_C void __cdecl _lock_fhandle(int);
1213EXTERN_C void __cdecl _unlock_fhandle(int);
1214EXTERN_C void __cdecl _unlock(int);
1215
1216#if (_MSC_VER >= 1000)
1217typedef struct {
1218 long osfhnd; /* underlying OS file HANDLE */
1219 char osfile; /* attributes of file (e.g., open in text mode?) */
1220 char pipech; /* one char buffer for handles opened on pipes */
1221#if defined (_MT) && !defined (DLL_FOR_WIN32S)
1222 int lockinitflag;
1223 CRITICAL_SECTION lock;
1224#endif /* defined (_MT) && !defined (DLL_FOR_WIN32S) */
1225} ioinfo;
1226
1227EXTERN_C ioinfo * __pioinfo[];
1228
1229#define IOINFO_L2E 5
1230#define IOINFO_ARRAY_ELTS (1 << IOINFO_L2E)
1231#define _pioinfo(i) (__pioinfo[i >> IOINFO_L2E] + (i & (IOINFO_ARRAY_ELTS - 1)))
1232#define _osfile(i) (_pioinfo(i)->osfile)
1233
1234#else /* (_MSC_VER >= 1000) */
1235extern char _osfile[];
1236#endif /* (_MSC_VER >= 1000) */
1237
1238#define FOPEN 0x01 /* file handle open */
1239#define FAPPEND 0x20 /* file handle opened O_APPEND */
1240#define FDEV 0x40 /* file handle refers to device */
1241#define FTEXT 0x80 /* file handle is in text mode */
1242
1243#define _STREAM_LOCKS 26 /* Table of stream locks */
1244#define _LAST_STREAM_LOCK (_STREAM_LOCKS+_NSTREAM_-1) /* Last stream lock */
1245#define _FH_LOCKS (_LAST_STREAM_LOCK+1) /* Table of fh locks */
1246
1247/***
1248*int my_open_osfhandle(long osfhandle, int flags) - open C Runtime file handle
1249*
1250*Purpose:
1251* This function allocates a free C Runtime file handle and associates
1252* it with the Win32 HANDLE specified by the first parameter. This is a
1253* temperary fix for WIN95's brain damage GetFileType() error on socket
1254* we just bypass that call for socket
1255*
1256*Entry:
1257* long osfhandle - Win32 HANDLE to associate with C Runtime file handle.
1258* int flags - flags to associate with C Runtime file handle.
1259*
1260*Exit:
1261* returns index of entry in fh, if successful
1262* return -1, if no free entry is found
1263*
1264*Exceptions:
1265*
1266*******************************************************************************/
1267
1268static int
1269my_open_osfhandle(long osfhandle, int flags)
1270{
1271 int fh;
1272 char fileflags; /* _osfile flags */
1273
1274 /* copy relevant flags from second parameter */
1275 fileflags = FDEV;
1276
9404a519 1277 if (flags & O_APPEND)
390b85e7
GS
1278 fileflags |= FAPPEND;
1279
9404a519 1280 if (flags & O_TEXT)
390b85e7
GS
1281 fileflags |= FTEXT;
1282
1283 /* attempt to allocate a C Runtime file handle */
9404a519 1284 if ((fh = _alloc_osfhnd()) == -1) {
390b85e7
GS
1285 errno = EMFILE; /* too many open files */
1286 _doserrno = 0L; /* not an OS error */
1287 return -1; /* return error to caller */
1288 }
1289
1290 /* the file is open. now, set the info in _osfhnd array */
1291 _set_osfhnd(fh, osfhandle);
1292
1293 fileflags |= FOPEN; /* mark as open */
1294
1295#if (_MSC_VER >= 1000)
1296 _osfile(fh) = fileflags; /* set osfile entry */
1297 _unlock_fhandle(fh);
1298#else
1299 _osfile[fh] = fileflags; /* set osfile entry */
1300 _unlock(fh+_FH_LOCKS); /* unlock handle */
1301#endif
1302
1303 return fh; /* return handle */
1304}
1305
1306#define _open_osfhandle my_open_osfhandle
f3986ebb 1307#endif /* USE_FIXED_OSFHANDLE */
390b85e7
GS
1308
1309/* simulate flock by locking a range on the file */
1310
1311#define LK_ERR(f,i) ((f) ? (i = 0) : (errno = GetLastError()))
1312#define LK_LEN 0xffff0000
1313
f3986ebb
GS
1314DllExport int
1315win32_flock(int fd, int oper)
390b85e7
GS
1316{
1317 OVERLAPPED o;
1318 int i = -1;
1319 HANDLE fh;
1320
f3986ebb
GS
1321 if (!IsWinNT()) {
1322 croak("flock() unimplemented on this platform");
1323 return -1;
1324 }
390b85e7
GS
1325 fh = (HANDLE)_get_osfhandle(fd);
1326 memset(&o, 0, sizeof(o));
1327
1328 switch(oper) {
1329 case LOCK_SH: /* shared lock */
1330 LK_ERR(LockFileEx(fh, 0, 0, LK_LEN, 0, &o),i);
1331 break;
1332 case LOCK_EX: /* exclusive lock */
1333 LK_ERR(LockFileEx(fh, LOCKFILE_EXCLUSIVE_LOCK, 0, LK_LEN, 0, &o),i);
1334 break;
1335 case LOCK_SH|LOCK_NB: /* non-blocking shared lock */
1336 LK_ERR(LockFileEx(fh, LOCKFILE_FAIL_IMMEDIATELY, 0, LK_LEN, 0, &o),i);
1337 break;
1338 case LOCK_EX|LOCK_NB: /* non-blocking exclusive lock */
1339 LK_ERR(LockFileEx(fh,
1340 LOCKFILE_EXCLUSIVE_LOCK|LOCKFILE_FAIL_IMMEDIATELY,
1341 0, LK_LEN, 0, &o),i);
1342 break;
1343 case LOCK_UN: /* unlock lock */
1344 LK_ERR(UnlockFileEx(fh, 0, LK_LEN, 0, &o),i);
1345 break;
1346 default: /* unknown */
1347 errno = EINVAL;
1348 break;
1349 }
1350 return i;
1351}
1352
1353#undef LK_ERR
1354#undef LK_LEN
1355
68dc0745 1356/*
1357 * redirected io subsystem for all XS modules
1358 *
1359 */
0a753a76 1360
68dc0745 1361DllExport int *
1362win32_errno(void)
0a753a76 1363{
390b85e7 1364 return (&errno);
0a753a76 1365}
1366
dcb2879a
GS
1367DllExport char ***
1368win32_environ(void)
1369{
390b85e7 1370 return (&(_environ));
dcb2879a
GS
1371}
1372
68dc0745 1373/* the rest are the remapped stdio routines */
1374DllExport FILE *
1375win32_stderr(void)
0a753a76 1376{
390b85e7 1377 return (stderr);
0a753a76 1378}
1379
68dc0745 1380DllExport FILE *
1381win32_stdin(void)
0a753a76 1382{
390b85e7 1383 return (stdin);
0a753a76 1384}
1385
68dc0745 1386DllExport FILE *
1387win32_stdout()
0a753a76 1388{
390b85e7 1389 return (stdout);
0a753a76 1390}
1391
68dc0745 1392DllExport int
1393win32_ferror(FILE *fp)
0a753a76 1394{
390b85e7 1395 return (ferror(fp));
0a753a76 1396}
1397
1398
68dc0745 1399DllExport int
1400win32_feof(FILE *fp)
0a753a76 1401{
390b85e7 1402 return (feof(fp));
0a753a76 1403}
1404
68dc0745 1405/*
1406 * Since the errors returned by the socket error function
1407 * WSAGetLastError() are not known by the library routine strerror
1408 * we have to roll our own.
1409 */
0a753a76 1410
68dc0745 1411DllExport char *
1412win32_strerror(int e)
0a753a76 1413{
3e3baf6d 1414#ifndef __BORLANDC__ /* Borland intolerance */
68dc0745 1415 extern int sys_nerr;
3e3baf6d 1416#endif
68dc0745 1417 DWORD source = 0;
0a753a76 1418
9404a519 1419 if (e < 0 || e > sys_nerr) {
c53bd28a 1420 dTHR;
9404a519 1421 if (e < 0)
68dc0745 1422 e = GetLastError();
0a753a76 1423
9404a519 1424 if (FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, &source, e, 0,
68dc0745 1425 strerror_buffer, sizeof(strerror_buffer), NULL) == 0)
1426 strcpy(strerror_buffer, "Unknown Error");
0a753a76 1427
68dc0745 1428 return strerror_buffer;
1429 }
390b85e7 1430 return strerror(e);
0a753a76 1431}
1432
22fae026 1433DllExport void
3730b96e 1434win32_str_os_error(void *sv, DWORD dwErr)
22fae026
TM
1435{
1436 DWORD dwLen;
1437 char *sMsg;
1438 dwLen = FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER
1439 |FORMAT_MESSAGE_IGNORE_INSERTS
1440 |FORMAT_MESSAGE_FROM_SYSTEM, NULL,
1441 dwErr, 0, (char *)&sMsg, 1, NULL);
1442 if (0 < dwLen) {
1443 while (0 < dwLen && isspace(sMsg[--dwLen]))
1444 ;
1445 if ('.' != sMsg[dwLen])
1446 dwLen++;
1447 sMsg[dwLen]= '\0';
1448 }
1449 if (0 == dwLen) {
c69f6586 1450 sMsg = (char*)LocalAlloc(0, 64/**sizeof(TCHAR)*/);
22fae026
TM
1451 dwLen = sprintf(sMsg,
1452 "Unknown error #0x%lX (lookup 0x%lX)",
1453 dwErr, GetLastError());
1454 }
3730b96e 1455 sv_setpvn((SV*)sv, sMsg, dwLen);
22fae026
TM
1456 LocalFree(sMsg);
1457}
1458
1459
68dc0745 1460DllExport int
1461win32_fprintf(FILE *fp, const char *format, ...)
0a753a76 1462{
68dc0745 1463 va_list marker;
1464 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1465
390b85e7 1466 return (vfprintf(fp, format, marker));
0a753a76 1467}
1468
68dc0745 1469DllExport int
1470win32_printf(const char *format, ...)
0a753a76 1471{
68dc0745 1472 va_list marker;
1473 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1474
390b85e7 1475 return (vprintf(format, marker));
0a753a76 1476}
1477
68dc0745 1478DllExport int
1479win32_vfprintf(FILE *fp, const char *format, va_list args)
0a753a76 1480{
390b85e7 1481 return (vfprintf(fp, format, args));
0a753a76 1482}
1483
96e4d5b1 1484DllExport int
1485win32_vprintf(const char *format, va_list args)
1486{
390b85e7 1487 return (vprintf(format, args));
96e4d5b1 1488}
1489
68dc0745 1490DllExport size_t
1491win32_fread(void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1492{
390b85e7 1493 return fread(buf, size, count, fp);
0a753a76 1494}
1495
68dc0745 1496DllExport size_t
1497win32_fwrite(const void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1498{
390b85e7 1499 return fwrite(buf, size, count, fp);
0a753a76 1500}
1501
68dc0745 1502DllExport FILE *
1503win32_fopen(const char *filename, const char *mode)
0a753a76 1504{
68dc0745 1505 if (stricmp(filename, "/dev/null")==0)
390b85e7
GS
1506 return fopen("NUL", mode);
1507 return fopen(filename, mode);
0a753a76 1508}
1509
f3986ebb
GS
1510#ifndef USE_SOCKETS_AS_HANDLES
1511#undef fdopen
1512#define fdopen my_fdopen
1513#endif
1514
68dc0745 1515DllExport FILE *
1516win32_fdopen( int handle, const char *mode)
0a753a76 1517{
390b85e7 1518 return fdopen(handle, (char *) mode);
0a753a76 1519}
1520
68dc0745 1521DllExport FILE *
1522win32_freopen( const char *path, const char *mode, FILE *stream)
0a753a76 1523{
68dc0745 1524 if (stricmp(path, "/dev/null")==0)
390b85e7
GS
1525 return freopen("NUL", mode, stream);
1526 return freopen(path, mode, stream);
0a753a76 1527}
1528
68dc0745 1529DllExport int
1530win32_fclose(FILE *pf)
0a753a76 1531{
f3986ebb 1532 return my_fclose(pf); /* defined in win32sck.c */
0a753a76 1533}
1534
68dc0745 1535DllExport int
1536win32_fputs(const char *s,FILE *pf)
0a753a76 1537{
390b85e7 1538 return fputs(s, pf);
0a753a76 1539}
1540
68dc0745 1541DllExport int
1542win32_fputc(int c,FILE *pf)
0a753a76 1543{
390b85e7 1544 return fputc(c,pf);
0a753a76 1545}
1546
68dc0745 1547DllExport int
1548win32_ungetc(int c,FILE *pf)
0a753a76 1549{
390b85e7 1550 return ungetc(c,pf);
0a753a76 1551}
1552
68dc0745 1553DllExport int
1554win32_getc(FILE *pf)
0a753a76 1555{
390b85e7 1556 return getc(pf);
0a753a76 1557}
1558
68dc0745 1559DllExport int
1560win32_fileno(FILE *pf)
0a753a76 1561{
390b85e7 1562 return fileno(pf);
0a753a76 1563}
1564
68dc0745 1565DllExport void
1566win32_clearerr(FILE *pf)
0a753a76 1567{
390b85e7 1568 clearerr(pf);
68dc0745 1569 return;
0a753a76 1570}
1571
68dc0745 1572DllExport int
1573win32_fflush(FILE *pf)
0a753a76 1574{
390b85e7 1575 return fflush(pf);
0a753a76 1576}
1577
68dc0745 1578DllExport long
1579win32_ftell(FILE *pf)
0a753a76 1580{
390b85e7 1581 return ftell(pf);
0a753a76 1582}
1583
68dc0745 1584DllExport int
1585win32_fseek(FILE *pf,long offset,int origin)
0a753a76 1586{
390b85e7 1587 return fseek(pf, offset, origin);
0a753a76 1588}
1589
68dc0745 1590DllExport int
1591win32_fgetpos(FILE *pf,fpos_t *p)
0a753a76 1592{
390b85e7 1593 return fgetpos(pf, p);
0a753a76 1594}
1595
68dc0745 1596DllExport int
1597win32_fsetpos(FILE *pf,const fpos_t *p)
0a753a76 1598{
390b85e7 1599 return fsetpos(pf, p);
0a753a76 1600}
1601
68dc0745 1602DllExport void
1603win32_rewind(FILE *pf)
0a753a76 1604{
390b85e7 1605 rewind(pf);
68dc0745 1606 return;
0a753a76 1607}
1608
68dc0745 1609DllExport FILE*
1610win32_tmpfile(void)
0a753a76 1611{
390b85e7 1612 return tmpfile();
0a753a76 1613}
1614
68dc0745 1615DllExport void
1616win32_abort(void)
0a753a76 1617{
390b85e7 1618 abort();
68dc0745 1619 return;
0a753a76 1620}
1621
68dc0745 1622DllExport int
22239a37 1623win32_fstat(int fd,struct stat *sbufptr)
0a753a76 1624{
22239a37 1625 return fstat(fd,sbufptr);
0a753a76 1626}
1627
68dc0745 1628DllExport int
1629win32_pipe(int *pfd, unsigned int size, int mode)
0a753a76 1630{
390b85e7 1631 return _pipe(pfd, size, mode);
0a753a76 1632}
1633
50892819
GS
1634/*
1635 * a popen() clone that respects PERL5SHELL
1636 */
1637
68dc0745 1638DllExport FILE*
1639win32_popen(const char *command, const char *mode)
0a753a76 1640{
50892819 1641#ifdef USE_CRT_POPEN
390b85e7 1642 return _popen(command, mode);
50892819
GS
1643#else
1644 int p[2];
1645 int parent, child;
1646 int stdfd, oldfd;
1647 int ourmode;
1648 int childpid;
1649
1650 /* establish which ends read and write */
1651 if (strchr(mode,'w')) {
1652 stdfd = 0; /* stdin */
1653 parent = 1;
1654 child = 0;
1655 }
1656 else if (strchr(mode,'r')) {
1657 stdfd = 1; /* stdout */
1658 parent = 0;
1659 child = 1;
1660 }
1661 else
1662 return NULL;
1663
1664 /* set the correct mode */
1665 if (strchr(mode,'b'))
1666 ourmode = O_BINARY;
1667 else if (strchr(mode,'t'))
1668 ourmode = O_TEXT;
1669 else
1670 ourmode = _fmode & (O_TEXT | O_BINARY);
1671
1672 /* the child doesn't inherit handles */
1673 ourmode |= O_NOINHERIT;
1674
1675 if (win32_pipe( p, 512, ourmode) == -1)
1676 return NULL;
1677
1678 /* save current stdfd */
1679 if ((oldfd = win32_dup(stdfd)) == -1)
1680 goto cleanup;
1681
1682 /* make stdfd go to child end of pipe (implicitly closes stdfd) */
1683 /* stdfd will be inherited by the child */
1684 if (win32_dup2(p[child], stdfd) == -1)
1685 goto cleanup;
1686
1687 /* close the child end in parent */
1688 win32_close(p[child]);
1689
1690 /* start the child */
1691 if ((childpid = do_spawn_nowait((char*)command)) == -1)
1692 goto cleanup;
1693
1694 /* revert stdfd to whatever it was before */
1695 if (win32_dup2(oldfd, stdfd) == -1)
1696 goto cleanup;
1697
1698 /* close saved handle */
1699 win32_close(oldfd);
1700
1701 w32_popen_pids[p[parent]] = childpid;
1702
1703 /* we have an fd, return a file stream */
1704 return (win32_fdopen(p[parent], (char *)mode));
1705
1706cleanup:
1707 /* we don't need to check for errors here */
1708 win32_close(p[0]);
1709 win32_close(p[1]);
1710 if (oldfd != -1) {
1711 win32_dup2(oldfd, stdfd);
1712 win32_close(oldfd);
1713 }
1714 return (NULL);
1715
1716#endif /* USE_CRT_POPEN */
0a753a76 1717}
1718
50892819
GS
1719/*
1720 * pclose() clone
1721 */
1722
68dc0745 1723DllExport int
1724win32_pclose(FILE *pf)
0a753a76 1725{
50892819 1726#ifdef USE_CRT_POPEN
390b85e7 1727 return _pclose(pf);
50892819
GS
1728#else
1729 int fd, childpid, status;
1730
1731 fd = win32_fileno(pf);
1732 childpid = w32_popen_pids[fd];
1733
1734 if (!childpid) {
1735 errno = EBADF;
1736 return -1;
1737 }
1738
1739 win32_fclose(pf);
1740 w32_popen_pids[fd] = 0;
1741
1742 /* wait for the child */
1743 if (cwait(&status, childpid, WAIT_CHILD) == -1)
1744 return (-1);
1745 /* cwait() returns differently on Borland */
1746#ifdef __BORLANDC__
1747 return (((status >> 8) & 0xff) | ((status << 8) & 0xff00));
1748#else
1749 return (status);
1750#endif
1751
1752#endif /* USE_CRT_OPEN */
0a753a76 1753}
1754
68dc0745 1755DllExport int
1756win32_setmode(int fd, int mode)
0a753a76 1757{
390b85e7 1758 return setmode(fd, mode);
0a753a76 1759}
1760
96e4d5b1 1761DllExport long
1762win32_lseek(int fd, long offset, int origin)
1763{
390b85e7 1764 return lseek(fd, offset, origin);
96e4d5b1 1765}
1766
1767DllExport long
1768win32_tell(int fd)
1769{
390b85e7 1770 return tell(fd);
96e4d5b1 1771}
1772
68dc0745 1773DllExport int
1774win32_open(const char *path, int flag, ...)
0a753a76 1775{
68dc0745 1776 va_list ap;
1777 int pmode;
0a753a76 1778
1779 va_start(ap, flag);
1780 pmode = va_arg(ap, int);
1781 va_end(ap);
1782
68dc0745 1783 if (stricmp(path, "/dev/null")==0)
390b85e7
GS
1784 return open("NUL", flag, pmode);
1785 return open(path,flag,pmode);
0a753a76 1786}
1787
68dc0745 1788DllExport int
1789win32_close(int fd)
0a753a76 1790{
390b85e7 1791 return close(fd);
0a753a76 1792}
1793
68dc0745 1794DllExport int
96e4d5b1 1795win32_eof(int fd)
1796{
390b85e7 1797 return eof(fd);
96e4d5b1 1798}
1799
1800DllExport int
68dc0745 1801win32_dup(int fd)
0a753a76 1802{
390b85e7 1803 return dup(fd);
0a753a76 1804}
1805
68dc0745 1806DllExport int
1807win32_dup2(int fd1,int fd2)
0a753a76 1808{
390b85e7 1809 return dup2(fd1,fd2);
0a753a76 1810}
1811
68dc0745 1812DllExport int
3e3baf6d 1813win32_read(int fd, void *buf, unsigned int cnt)
0a753a76 1814{
390b85e7 1815 return read(fd, buf, cnt);
0a753a76 1816}
1817
68dc0745 1818DllExport int
3e3baf6d 1819win32_write(int fd, const void *buf, unsigned int cnt)
0a753a76 1820{
390b85e7 1821 return write(fd, buf, cnt);
0a753a76 1822}
1823
68dc0745 1824DllExport int
5aabfad6 1825win32_mkdir(const char *dir, int mode)
1826{
390b85e7 1827 return mkdir(dir); /* just ignore mode */
5aabfad6 1828}
96e4d5b1 1829
5aabfad6 1830DllExport int
1831win32_rmdir(const char *dir)
1832{
390b85e7 1833 return rmdir(dir);
5aabfad6 1834}
96e4d5b1 1835
5aabfad6 1836DllExport int
1837win32_chdir(const char *dir)
1838{
390b85e7 1839 return chdir(dir);
5aabfad6 1840}
96e4d5b1 1841
5aabfad6 1842DllExport int
3e3baf6d 1843win32_spawnvp(int mode, const char *cmdname, const char *const *argv)
0a753a76 1844{
2d7a9237
GS
1845 int status;
1846
1847 status = spawnvp(mode, cmdname, (char * const *) argv);
1848#ifndef __BORLANDC__
1849 /* XXX For the P_NOWAIT case, Borland RTL returns pinfo.dwProcessId
1850 * while VC RTL returns pinfo.hProcess. For purposes of the custom
1851 * implementation of win32_wait(), we assume the latter.
1852 */
1853 if (mode == P_NOWAIT && status >= 0)
1854 w32_child_pids[w32_num_children++] = (HANDLE)status;
1855#endif
1856 return status;
0a753a76 1857}
1858
6890e559
GS
1859DllExport int
1860win32_execvp(const char *cmdname, const char *const *argv)
1861{
390b85e7 1862 return execvp(cmdname, (char *const *)argv);
6890e559
GS
1863}
1864
84902520
TB
1865DllExport void
1866win32_perror(const char *str)
1867{
390b85e7 1868 perror(str);
84902520
TB
1869}
1870
1871DllExport void
1872win32_setbuf(FILE *pf, char *buf)
1873{
390b85e7 1874 setbuf(pf, buf);
84902520
TB
1875}
1876
1877DllExport int
1878win32_setvbuf(FILE *pf, char *buf, int type, size_t size)
1879{
390b85e7 1880 return setvbuf(pf, buf, type, size);
84902520
TB
1881}
1882
1883DllExport int
1884win32_flushall(void)
1885{
390b85e7 1886 return flushall();
84902520
TB
1887}
1888
1889DllExport int
1890win32_fcloseall(void)
1891{
390b85e7 1892 return fcloseall();
84902520
TB
1893}
1894
1895DllExport char*
1896win32_fgets(char *s, int n, FILE *pf)
1897{
390b85e7 1898 return fgets(s, n, pf);
84902520
TB
1899}
1900
1901DllExport char*
1902win32_gets(char *s)
1903{
390b85e7 1904 return gets(s);
84902520
TB
1905}
1906
1907DllExport int
1908win32_fgetc(FILE *pf)
1909{
390b85e7 1910 return fgetc(pf);
84902520
TB
1911}
1912
1913DllExport int
1914win32_putc(int c, FILE *pf)
1915{
390b85e7 1916 return putc(c,pf);
84902520
TB
1917}
1918
1919DllExport int
1920win32_puts(const char *s)
1921{
390b85e7 1922 return puts(s);
84902520
TB
1923}
1924
1925DllExport int
1926win32_getchar(void)
1927{
390b85e7 1928 return getchar();
84902520
TB
1929}
1930
1931DllExport int
1932win32_putchar(int c)
1933{
390b85e7 1934 return putchar(c);
84902520
TB
1935}
1936
bbc8f9de
NIS
1937#ifdef MYMALLOC
1938
1939#ifndef USE_PERL_SBRK
1940
1941static char *committed = NULL;
1942static char *base = NULL;
1943static char *reserved = NULL;
1944static char *brk = NULL;
1945static DWORD pagesize = 0;
1946static DWORD allocsize = 0;
1947
1948void *
1949sbrk(int need)
1950{
1951 void *result;
1952 if (!pagesize)
1953 {SYSTEM_INFO info;
1954 GetSystemInfo(&info);
1955 /* Pretend page size is larger so we don't perpetually
1956 * call the OS to commit just one page ...
1957 */
1958 pagesize = info.dwPageSize << 3;
1959 allocsize = info.dwAllocationGranularity;
1960 }
1961 /* This scheme fails eventually if request for contiguous
1962 * block is denied so reserve big blocks - this is only
1963 * address space not memory ...
1964 */
1965 if (brk+need >= reserved)
1966 {
1967 DWORD size = 64*1024*1024;
1968 char *addr;
1969 if (committed && reserved && committed < reserved)
1970 {
1971 /* Commit last of previous chunk cannot span allocations */
161b471a 1972 addr = (char *) VirtualAlloc(committed,reserved-committed,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de
NIS
1973 if (addr)
1974 committed = reserved;
1975 }
1976 /* Reserve some (more) space
1977 * Note this is a little sneaky, 1st call passes NULL as reserved
1978 * so lets system choose where we start, subsequent calls pass
1979 * the old end address so ask for a contiguous block
1980 */
161b471a 1981 addr = (char *) VirtualAlloc(reserved,size,MEM_RESERVE,PAGE_NOACCESS);
bbc8f9de
NIS
1982 if (addr)
1983 {
1984 reserved = addr+size;
1985 if (!base)
1986 base = addr;
1987 if (!committed)
1988 committed = base;
1989 if (!brk)
1990 brk = committed;
1991 }
1992 else
1993 {
1994 return (void *) -1;
1995 }
1996 }
1997 result = brk;
1998 brk += need;
1999 if (brk > committed)
2000 {
2001 DWORD size = ((brk-committed + pagesize -1)/pagesize) * pagesize;
161b471a 2002 char *addr = (char *) VirtualAlloc(committed,size,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de
NIS
2003 if (addr)
2004 {
2005 committed += size;
2006 }
2007 else
2008 return (void *) -1;
2009 }
2010 return result;
2011}
2012
2013#endif
2014#endif
2015
84902520
TB
2016DllExport void*
2017win32_malloc(size_t size)
2018{
390b85e7 2019 return malloc(size);
84902520
TB
2020}
2021
2022DllExport void*
2023win32_calloc(size_t numitems, size_t size)
2024{
390b85e7 2025 return calloc(numitems,size);
84902520
TB
2026}
2027
2028DllExport void*
2029win32_realloc(void *block, size_t size)
2030{
390b85e7 2031 return realloc(block,size);
84902520
TB
2032}
2033
2034DllExport void
2035win32_free(void *block)
2036{
390b85e7 2037 free(block);
84902520
TB
2038}
2039
bbc8f9de 2040
68dc0745 2041int
65e48ea9 2042win32_open_osfhandle(long handle, int flags)
0a753a76 2043{
390b85e7 2044 return _open_osfhandle(handle, flags);
0a753a76 2045}
2046
68dc0745 2047long
65e48ea9 2048win32_get_osfhandle(int fd)
0a753a76 2049{
390b85e7 2050 return _get_osfhandle(fd);
0a753a76 2051}
7bac28a0 2052
7bac28a0 2053/*
2054 * Extras.
2055 */
2056
ad2e33dc
GS
2057static
2058XS(w32_GetCwd)
2059{
2060 dXSARGS;
2061 SV *sv = sv_newmortal();
2062 /* Make one call with zero size - return value is required size */
2063 DWORD len = GetCurrentDirectory((DWORD)0,NULL);
2064 SvUPGRADE(sv,SVt_PV);
2065 SvGROW(sv,len);
2066 SvCUR(sv) = GetCurrentDirectory((DWORD) SvLEN(sv), SvPVX(sv));
2067 /*
2068 * If result != 0
2069 * then it worked, set PV valid,
2070 * else leave it 'undef'
2071 */
2072 if (SvCUR(sv))
2073 SvPOK_on(sv);
50892819 2074 EXTEND(SP,1);
ad2e33dc
GS
2075 ST(0) = sv;
2076 XSRETURN(1);
2077}
2078
2079static
2080XS(w32_SetCwd)
2081{
2082 dXSARGS;
2083 if (items != 1)
2084 croak("usage: Win32::SetCurrentDirectory($cwd)");
2085 if (SetCurrentDirectory(SvPV(ST(0),na)))
2086 XSRETURN_YES;
2087
2088 XSRETURN_NO;
2089}
2090
2091static
2092XS(w32_GetNextAvailDrive)
2093{
2094 dXSARGS;
2095 char ix = 'C';
2096 char root[] = "_:\\";
2097 while (ix <= 'Z') {
2098 root[0] = ix++;
2099 if (GetDriveType(root) == 1) {
2100 root[2] = '\0';
2101 XSRETURN_PV(root);
2102 }
2103 }
2104 XSRETURN_UNDEF;
2105}
2106
2107static
2108XS(w32_GetLastError)
2109{
2110 dXSARGS;
2111 XSRETURN_IV(GetLastError());
2112}
2113
2114static
2115XS(w32_LoginName)
2116{
2117 dXSARGS;
e34ffe5a
GS
2118 char *name = getlogin_buffer;
2119 DWORD size = sizeof(getlogin_buffer);
ad2e33dc
GS
2120 if (GetUserName(name,&size)) {
2121 /* size includes NULL */
2122 ST(0) = sv_2mortal(newSVpv(name,size-1));
2123 XSRETURN(1);
2124 }
2125 XSRETURN_UNDEF;
2126}
2127
2128static
2129XS(w32_NodeName)
2130{
2131 dXSARGS;
2132 char name[MAX_COMPUTERNAME_LENGTH+1];
2133 DWORD size = sizeof(name);
2134 if (GetComputerName(name,&size)) {
2135 /* size does NOT include NULL :-( */
2136 ST(0) = sv_2mortal(newSVpv(name,size));
2137 XSRETURN(1);
2138 }
2139 XSRETURN_UNDEF;
2140}
2141
2142
2143static
2144XS(w32_DomainName)
2145{
2146 dXSARGS;
8c9208bc
GS
2147#ifndef HAS_NETWKSTAGETINFO
2148 /* mingw32 (and Win95) don't have NetWksta*(), so do it the old way */
ad2e33dc
GS
2149 char name[256];
2150 DWORD size = sizeof(name);
2151 if (GetUserName(name,&size)) {
2152 char sid[1024];
2153 DWORD sidlen = sizeof(sid);
2154 char dname[256];
2155 DWORD dnamelen = sizeof(dname);
2156 SID_NAME_USE snu;
e56670dd 2157 if (LookupAccountName(NULL, name, &sid, &sidlen,
ad2e33dc
GS
2158 dname, &dnamelen, &snu)) {
2159 XSRETURN_PV(dname); /* all that for this */
2160 }
2161 }
e56670dd 2162#else
8c9208bc
GS
2163 /* this way is more reliable, in case user has a local account.
2164 * XXX need dynamic binding of netapi32.dll symbols or this will fail on
2165 * Win95. Probably makes more sense to move it into libwin32. */
9404a519
GS
2166 char dname[256];
2167 DWORD dnamelen = sizeof(dname);
0a2408cf
GS
2168 PWKSTA_INFO_100 pwi;
2169 if (NERR_Success == NetWkstaGetInfo(NULL, 100, (LPBYTE*)&pwi)) {
2170 if (pwi->wki100_langroup && *(pwi->wki100_langroup)) {
2171 WideCharToMultiByte(CP_ACP, NULL, pwi->wki100_langroup,
2172 -1, (LPSTR)dname, dnamelen, NULL, NULL);
2173 }
2174 else {
2175 WideCharToMultiByte(CP_ACP, NULL, pwi->wki100_computername,
2176 -1, (LPSTR)dname, dnamelen, NULL, NULL);
2177 }
2178 NetApiBufferFree(pwi);
9404a519
GS
2179 XSRETURN_PV(dname);
2180 }
e56670dd 2181#endif
ad2e33dc
GS
2182 XSRETURN_UNDEF;
2183}
2184
2185static
2186XS(w32_FsType)
2187{
2188 dXSARGS;
2189 char fsname[256];
2190 DWORD flags, filecomplen;
2191 if (GetVolumeInformation(NULL, NULL, 0, NULL, &filecomplen,
2192 &flags, fsname, sizeof(fsname))) {
2193 if (GIMME == G_ARRAY) {
2194 XPUSHs(sv_2mortal(newSVpv(fsname,0)));
2195 XPUSHs(sv_2mortal(newSViv(flags)));
2196 XPUSHs(sv_2mortal(newSViv(filecomplen)));
2197 PUTBACK;
2198 return;
2199 }
2200 XSRETURN_PV(fsname);
2201 }
2202 XSRETURN_UNDEF;
2203}
2204
2205static
2206XS(w32_GetOSVersion)
2207{
2208 dXSARGS;
2209 OSVERSIONINFO osver;
2210
2211 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
2212 if (GetVersionEx(&osver)) {
2213 XPUSHs(newSVpv(osver.szCSDVersion, 0));
2214 XPUSHs(newSViv(osver.dwMajorVersion));
2215 XPUSHs(newSViv(osver.dwMinorVersion));
2216 XPUSHs(newSViv(osver.dwBuildNumber));
2217 XPUSHs(newSViv(osver.dwPlatformId));
2218 PUTBACK;
2219 return;
2220 }
2221 XSRETURN_UNDEF;
2222}
2223
2224static
2225XS(w32_IsWinNT)
2226{
2227 dXSARGS;
2228 XSRETURN_IV(IsWinNT());
2229}
2230
2231static
2232XS(w32_IsWin95)
2233{
2234 dXSARGS;
2235 XSRETURN_IV(IsWin95());
2236}
2237
2238static
2239XS(w32_FormatMessage)
2240{
2241 dXSARGS;
2242 DWORD source = 0;
2243 char msgbuf[1024];
2244
2245 if (items != 1)
2246 croak("usage: Win32::FormatMessage($errno)");
2247
2248 if (FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM,
2249 &source, SvIV(ST(0)), 0,
2250 msgbuf, sizeof(msgbuf)-1, NULL))
2251 XSRETURN_PV(msgbuf);
2252
2253 XSRETURN_UNDEF;
2254}
2255
2256static
2257XS(w32_Spawn)
2258{
2259 dXSARGS;
2260 char *cmd, *args;
2261 PROCESS_INFORMATION stProcInfo;
2262 STARTUPINFO stStartInfo;
2263 BOOL bSuccess = FALSE;
2264
9404a519 2265 if (items != 3)
ad2e33dc
GS
2266 croak("usage: Win32::Spawn($cmdName, $args, $PID)");
2267
2268 cmd = SvPV(ST(0),na);
2269 args = SvPV(ST(1), na);
2270
2271 memset(&stStartInfo, 0, sizeof(stStartInfo)); /* Clear the block */
2272 stStartInfo.cb = sizeof(stStartInfo); /* Set the structure size */
2273 stStartInfo.dwFlags = STARTF_USESHOWWINDOW; /* Enable wShowWindow control */
2274 stStartInfo.wShowWindow = SW_SHOWMINNOACTIVE; /* Start min (normal) */
2275
9404a519 2276 if (CreateProcess(
ad2e33dc
GS
2277 cmd, /* Image path */
2278 args, /* Arguments for command line */
2279 NULL, /* Default process security */
2280 NULL, /* Default thread security */
2281 FALSE, /* Must be TRUE to use std handles */
2282 NORMAL_PRIORITY_CLASS, /* No special scheduling */
2283 NULL, /* Inherit our environment block */
2284 NULL, /* Inherit our currrent directory */
2285 &stStartInfo, /* -> Startup info */
2286 &stProcInfo)) /* <- Process info (if OK) */
2287 {
2288 CloseHandle(stProcInfo.hThread);/* library source code does this. */
2289 sv_setiv(ST(2), stProcInfo.dwProcessId);
2290 bSuccess = TRUE;
2291 }
2292 XSRETURN_IV(bSuccess);
2293}
2294
2295static
2296XS(w32_GetTickCount)
2297{
2298 dXSARGS;
2299 XSRETURN_IV(GetTickCount());
2300}
2301
2302static
2303XS(w32_GetShortPathName)
2304{
2305 dXSARGS;
2306 SV *shortpath;
e8bab181 2307 DWORD len;
ad2e33dc 2308
9404a519 2309 if (items != 1)
ad2e33dc
GS
2310 croak("usage: Win32::GetShortPathName($longPathName)");
2311
2312 shortpath = sv_mortalcopy(ST(0));
2313 SvUPGRADE(shortpath, SVt_PV);
2314 /* src == target is allowed */
e8bab181
GS
2315 do {
2316 len = GetShortPathName(SvPVX(shortpath),
2317 SvPVX(shortpath),
2318 SvLEN(shortpath));
2319 } while (len >= SvLEN(shortpath) && sv_grow(shortpath,len+1));
2320 if (len) {
2321 SvCUR_set(shortpath,len);
ad2e33dc 2322 ST(0) = shortpath;
e8bab181 2323 }
ad2e33dc
GS
2324 else
2325 ST(0) = &sv_undef;
2326 XSRETURN(1);
2327}
2328
ad0751ec
GS
2329static
2330XS(w32_Sleep)
2331{
2332 dXSARGS;
2333 if (items != 1)
2334 croak("usage: Win32::Sleep($milliseconds)");
2335 Sleep(SvIV(ST(0)));
2336 XSRETURN_YES;
2337}
2338
c69f6586
GS
2339#define TMPBUFSZ 1024
2340#define MAX_LENGTH 2048
2341#define SUCCESSRETURNED(x) (x == ERROR_SUCCESS)
2342#define REGRETURN(x) XSRETURN_IV(SUCCESSRETURNED(x))
2343#define SvHKEY(index) (HKEY)((unsigned long)SvIV(index))
2344#define SETIV(index,value) sv_setiv(ST(index), value)
2345#define SETNV(index,value) sv_setnv(ST(index), value)
2346#define SETPV(index,string) sv_setpv(ST(index), string)
2347#define SETPVN(index, buffer, length) sv_setpvn(ST(index), (char*)buffer, length)
2348#define SETHKEY(index, hkey) SETIV(index,(long)hkey)
2349
2350static time_t ft2timet(FILETIME *ft)
2351{
2352 SYSTEMTIME st;
2353 struct tm tm;
2354
2355 FileTimeToSystemTime(ft, &st);
2356 tm.tm_sec = st.wSecond;
2357 tm.tm_min = st.wMinute;
2358 tm.tm_hour = st.wHour;
2359 tm.tm_mday = st.wDay;
2360 tm.tm_mon = st.wMonth - 1;
2361 tm.tm_year = st.wYear - 1900;
2362 tm.tm_wday = st.wDayOfWeek;
2363 tm.tm_yday = -1;
2364 tm.tm_isdst = -1;
2365 return mktime (&tm);
2366}
2367
2368static
2369XS(w32_RegCloseKey)
2370{
2371 dXSARGS;
2372
ba3eb2af 2373 if (items != 1)
c69f6586
GS
2374 {
2375 croak("usage: Win32::RegCloseKey($hkey);\n");
2376 }
2377
2378 REGRETURN(RegCloseKey(SvHKEY(ST(0))));
2379}
2380
2381static
2382XS(w32_RegConnectRegistry)
2383{
2384 dXSARGS;
2385 HKEY handle;
2386
ba3eb2af 2387 if (items != 3)
c69f6586
GS
2388 {
2389 croak("usage: Win32::RegConnectRegistry($machine, $hkey, $handle);\n");
2390 }
2391
ba3eb2af 2392 if (SUCCESSRETURNED(RegConnectRegistry((char *)SvPV(ST(0), na), SvHKEY(ST(1)), &handle)))
c69f6586
GS
2393 {
2394 SETHKEY(2,handle);
2395 XSRETURN_YES;
2396 }
2397 XSRETURN_NO;
2398}
2399
2400static
2401XS(w32_RegCreateKey)
2402{
2403 dXSARGS;
2404 HKEY handle;
2405 DWORD disposition;
2406 long retval;
2407
ba3eb2af 2408 if (items != 3)
c69f6586
GS
2409 {
2410 croak("usage: Win32::RegCreateKey($hkey, $subkey, $handle);\n");
2411 }
2412
2413 retval = RegCreateKeyEx(SvHKEY(ST(0)), (char *)SvPV(ST(1), na), 0, NULL, REG_OPTION_NON_VOLATILE, KEY_ALL_ACCESS,
2414 NULL, &handle, &disposition);
2415
ba3eb2af 2416 if (SUCCESSRETURNED(retval))
c69f6586
GS
2417 {
2418 SETHKEY(2,handle);
2419 XSRETURN_YES;
2420 }
2421 XSRETURN_NO;
2422}
2423
2424static
2425XS(w32_RegCreateKeyEx)
2426{
2427 dXSARGS;
2428
2429 unsigned int length;
2430 long retval;
2431 HKEY hkey, handle;
2432 char *subkey;
2433 char *keyclass;
2434 DWORD options, disposition;
2435 REGSAM sam;
2436 SECURITY_ATTRIBUTES sa, *psa;
2437
ba3eb2af 2438 if (items != 9)
c69f6586
GS
2439 {
2440 croak("usage: Win32::RegCreateKeyEx($hkey, $subkey, $reserved, $class, $options, $sam, "
2441 "$security, $handle, $disposition);\n");
2442 }
2443
2444 hkey = SvHKEY(ST(0));
2445 subkey = (char *)SvPV(ST(1), na);
2446 keyclass = (char *)SvPV(ST(3), na);
2447 options = (DWORD) ((unsigned long)SvIV(ST(4)));
2448 sam = (REGSAM) ((unsigned long)SvIV(ST(5)));
2449 psa = (SECURITY_ATTRIBUTES*)SvPV(ST(6), length);
ba3eb2af 2450 if (length != sizeof(SECURITY_ATTRIBUTES))
c69f6586
GS
2451 {
2452 psa = &sa;
2453 memset(&sa, 0, sizeof(SECURITY_ATTRIBUTES));
2454 sa.nLength = sizeof(SECURITY_ATTRIBUTES);
2455 }
2456
2457 retval = RegCreateKeyEx(hkey, subkey, 0, keyclass, options, sam,
2458 psa, &handle, &disposition);
2459
ba3eb2af 2460 if (SUCCESSRETURNED(retval))
c69f6586 2461 {
ba3eb2af 2462 if (psa == &sa)
c69f6586
GS
2463 SETPVN(6, &sa, sizeof(sa));
2464
2465 SETHKEY(7,handle);
2466 SETIV(8,disposition);
2467 XSRETURN_YES;
2468 }
2469 XSRETURN_NO;
2470}
2471
2472static
2473XS(w32_RegDeleteKey)
2474{
2475 dXSARGS;
2476
ba3eb2af 2477 if (items != 2)
c69f6586
GS
2478 {
2479 croak("usage: Win32::RegDeleteKey($hkey, $subkey);\n");
2480 }
2481
2482 REGRETURN(RegDeleteKey(SvHKEY(ST(0)), (char *)SvPV(ST(1), na)));
2483}
2484
2485static
2486XS(w32_RegDeleteValue)
2487{
2488 dXSARGS;
2489
ba3eb2af 2490 if (items != 2)
c69f6586
GS
2491 {
2492 croak("usage: Win32::RegDeleteValue($hkey, $valname);\n");
2493 }
2494
2495 REGRETURN(RegDeleteValue(SvHKEY(ST(0)), (char *)SvPV(ST(1), na)));
2496}
2497
2498static
2499XS(w32_RegEnumKey)
2500{
2501 dXSARGS;
2502
2503 char keybuffer[TMPBUFSZ];
2504
ba3eb2af 2505 if (items != 3)
c69f6586
GS
2506 {
2507 croak("usage: Win32::RegEnumKey($hkey, $idx, $subkeyname);\n");
2508 }
2509
ba3eb2af 2510 if (SUCCESSRETURNED(RegEnumKey(SvHKEY(ST(0)), SvIV(ST(1)), keybuffer, sizeof(keybuffer))))
c69f6586
GS
2511 {
2512 SETPV(2, keybuffer);
2513 XSRETURN_YES;
2514 }
2515 XSRETURN_NO;
2516}
2517
2518static
2519XS(w32_RegEnumKeyEx)
2520{
2521 dXSARGS;
2522 int length;
2523
2524 DWORD keysz, classsz;
2525 char keybuffer[TMPBUFSZ];
2526 char classbuffer[TMPBUFSZ];
2527 long retval;
2528 FILETIME filetime;
2529
ba3eb2af 2530 if (items != 6)
c69f6586
GS
2531 {
2532 croak("usage: Win32::RegEnumKeyEx($hkey, $idx, $subkeyname, $reserved, $class, $time);\n");
2533 }
2534
2535 keysz = sizeof(keybuffer);
2536 classsz = sizeof(classbuffer);
2537 retval = RegEnumKeyEx(SvHKEY(ST(0)), SvIV(ST(1)), keybuffer, &keysz, 0,
2538 classbuffer, &classsz, &filetime);
ba3eb2af 2539 if (SUCCESSRETURNED(retval))
c69f6586
GS
2540 {
2541 SETPV(2, keybuffer);
2542 SETPV(4, classbuffer);
2543 SETIV(5, ft2timet(&filetime));
2544 XSRETURN_YES;
2545 }
2546 XSRETURN_NO;
2547}
2548
2549static
2550XS(w32_RegEnumValue)
2551{
2552 dXSARGS;
2553 HKEY hkey;
2554 DWORD type, namesz, valsz;
2555 long retval;
2556 static HKEY last_hkey;
2557 char myvalbuf[MAX_LENGTH];
2558 char mynambuf[MAX_LENGTH];
2559
ba3eb2af 2560 if (items != 6)
c69f6586
GS
2561 {
2562 croak("usage: Win32::RegEnumValue($hkey, $i, $name, $reserved, $type, $value);\n");
2563 }
2564
2565 hkey = SvHKEY(ST(0));
2566
2567 // If this is a new key, find out how big the maximum name and value sizes are and
2568 // allocate space for them. Free any old storage and set the old key value to the
2569 // current key.
2570
ba3eb2af 2571 if (hkey != (HKEY)last_hkey)
c69f6586
GS
2572 {
2573 char keyclass[TMPBUFSZ];
2574 DWORD classsz, subkeys, maxsubkey, maxclass, values, salen, maxnamesz, maxvalsz;
2575 FILETIME ft;
2576 classsz = sizeof(keyclass);
2577 retval = RegQueryInfoKey(hkey, keyclass, &classsz, 0, &subkeys, &maxsubkey, &maxclass,
2578 &values, &maxnamesz, &maxvalsz, &salen, &ft);
2579
ba3eb2af 2580 if (!SUCCESSRETURNED(retval))
c69f6586
GS
2581 {
2582 XSRETURN_NO;
2583 }
2584 memset(myvalbuf, 0, MAX_LENGTH);
2585 memset(mynambuf, 0, MAX_LENGTH);
2586 last_hkey = hkey;
2587 }
2588
2589 namesz = MAX_LENGTH;
2590 valsz = MAX_LENGTH;
2591 retval = RegEnumValue(hkey, SvIV(ST(1)), mynambuf, &namesz, 0, &type, (LPBYTE) myvalbuf, &valsz);
ba3eb2af 2592 if (!SUCCESSRETURNED(retval))
c69f6586
GS
2593 {
2594 XSRETURN_NO;
2595 }
2596 else
2597 {
2598 SETPV(2, mynambuf);
2599 SETIV(4, type);
2600
2601 // return includes the null terminator so delete it if REG_SZ, REG_MULTI_SZ or REG_EXPAND_SZ
2602 switch(type)
2603 {
2604 case REG_SZ:
2605 case REG_MULTI_SZ:
2606 case REG_EXPAND_SZ:
ba3eb2af 2607 if (valsz)
c69f6586
GS
2608 --valsz;
2609 case REG_BINARY:
2610 SETPVN(5, myvalbuf, valsz);
2611 break;
2612
2613 case REG_DWORD_BIG_ENDIAN:
2614 {
2615 BYTE tmp = myvalbuf[0];
2616 myvalbuf[0] = myvalbuf[3];
2617 myvalbuf[3] = tmp;
2618 tmp = myvalbuf[1];
2619 myvalbuf[1] = myvalbuf[2];
2620 myvalbuf[2] = tmp;
2621 }
2622 case REG_DWORD_LITTLE_ENDIAN: // same as REG_DWORD
2623 SETNV(5, (double)*((DWORD*)myvalbuf));
2624 break;
2625
2626 default:
2627 break;
2628 }
2629
2630 XSRETURN_YES;
2631 }
2632}
2633
2634static
2635XS(w32_RegFlushKey)
2636{
2637 dXSARGS;
2638
ba3eb2af 2639 if (items != 1)
c69f6586
GS
2640 {
2641 croak("usage: Win32::RegFlushKey($hkey);\n");
2642 }
2643
2644 REGRETURN(RegFlushKey(SvHKEY(ST(0))));
2645}
2646
2647static
2648XS(w32_RegGetKeySecurity)
2649{
2650 dXSARGS;
2651 SECURITY_DESCRIPTOR sd;
2652 DWORD sdsz;
2653
ba3eb2af 2654 if (items != 3)
c69f6586
GS
2655 {
2656 croak("usage: Win32::RegGetKeySecurity($hkey, $security_info, $security_descriptor);\n");
2657 }
2658
ba3eb2af 2659 if (SUCCESSRETURNED(RegGetKeySecurity(SvHKEY(ST(0)), SvIV(ST(1)), &sd, &sdsz)))
c69f6586
GS
2660 {
2661 SETPVN(2, &sd, sdsz);
2662 XSRETURN_YES;
2663 }
2664 XSRETURN_NO;
2665}
2666
2667static
2668XS(w32_RegLoadKey)
2669{
2670 dXSARGS;
2671
ba3eb2af 2672 if (items != 3)
c69f6586
GS
2673 {
2674 croak("usage: Win32::RegLoadKey($hkey, $subkey, $filename);\n");
2675 }
2676
2677 REGRETURN(RegLoadKey(SvHKEY(ST(0)), (char *)SvPV(ST(1), na), (char *)SvPV(ST(2), na)));
2678}
2679
2680static
2681XS(w32_RegNotifyChangeKeyValue)
2682{
2683 croak("Win32::RegNotifyChangeKeyValue not yet implemented!\n");
2684}
2685
2686static
2687XS(w32_RegOpenKey)
2688{
2689 dXSARGS;
2690 HKEY handle;
2691
ba3eb2af 2692 if (items != 3)
c69f6586
GS
2693 {
2694 croak("usage: Win32::RegOpenKey($hkey, $subkey, $handle);\n");
2695 }
2696
ba3eb2af 2697 if (SUCCESSRETURNED(RegOpenKey(SvHKEY(ST(0)), (char *)SvPV(ST(1), na), &handle)))
c69f6586
GS
2698 {
2699 SETHKEY(2,handle);
2700 XSRETURN_YES;
2701 }
2702 XSRETURN_NO;
2703}
2704
2705static
2706XS(w32_RegOpenKeyEx)
2707{
2708 dXSARGS;
2709 HKEY handle;
2710
ba3eb2af 2711 if (items != 5)
c69f6586
GS
2712 {
2713 croak("usage: Win32::RegOpenKeyEx($hkey, $subkey, $reserved, $sam, $handle);\n");
2714 }
2715
ba3eb2af 2716 if (SUCCESSRETURNED(RegOpenKeyEx(SvHKEY(ST(0)), (char *)SvPV(ST(1), na),
c69f6586
GS
2717 0, (REGSAM) ((unsigned long)SvIV(ST(3))), &handle)))
2718 {
2719 SETHKEY(4,handle);
2720 XSRETURN_YES;
2721 }
2722 XSRETURN_NO;
2723}
2724
2725#pragma optimize("", off)
2726static
2727XS(w32_RegQueryInfoKey)
2728{
2729 dXSARGS;
2730 int length;
2731
2732 char keyclass[TMPBUFSZ];
2733 DWORD subkeys, maxsubkey, maxclass, values, maxvalname, maxvaldata;
2734 DWORD seclen, classsz;
2735 FILETIME ft;
2736 long retval;
2737
ba3eb2af 2738 if (items != 10)
c69f6586
GS
2739 {
2740 croak("usage: Win32::RegQueryInfoKey($hkey, $class, $numsubkeys, $maxsubkey,"
2741 "$maxclass, $values, $maxvalname, $maxvaldata, $secdesclen,"
2742 "$lastwritetime);\n");
2743 }
2744
2745 classsz = sizeof(keyclass);
2746 retval = RegQueryInfoKey(SvHKEY(ST(0)), keyclass, &classsz, 0, &subkeys, &maxsubkey,
2747 &maxclass, &values, &maxvalname, &maxvaldata,
2748 &seclen, &ft);
ba3eb2af 2749 if (SUCCESSRETURNED(retval))
c69f6586
GS
2750 {
2751 SETPV(1, keyclass);
2752 SETIV(2, subkeys);
2753 SETIV(3, maxsubkey);
2754 SETIV(4, maxclass);
2755 SETIV(5, values);
2756 SETIV(6, maxvalname);
2757 SETIV(7, maxvaldata);
2758 SETIV(8, seclen);
2759 SETIV(9, ft2timet(&ft));
2760 XSRETURN_YES;
2761 }
2762 XSRETURN_NO;
2763}
2764#pragma optimize("", on)
2765
2766static
2767XS(w32_RegQueryValue)
2768{
2769 dXSARGS;
2770
2771 unsigned char databuffer[TMPBUFSZ*2];
2772 long datasz = sizeof(databuffer);
2773
ba3eb2af 2774 if (items != 3)
c69f6586
GS
2775 {
2776 croak("usage: Win32::RegQueryValue($hkey, $valuename, $data);\n");
2777 }
2778
ba3eb2af 2779 if (SUCCESSRETURNED(RegQueryValue(SvHKEY(ST(0)), SvPV(ST(1), na), (char*)databuffer, &datasz)))
c69f6586
GS
2780 {
2781 // return includes the null terminator so delete it
2782 SETPVN(2, databuffer, --datasz);
2783 XSRETURN_YES;
2784 }
2785 XSRETURN_NO;
2786}
2787
2788static
2789XS(w32_RegQueryValueEx)
2790{
2791 dXSARGS;
2792
2793 unsigned char databuffer[TMPBUFSZ*2];
2794 DWORD datasz = sizeof(databuffer);
2795 DWORD type;
2796 LONG result;
2797 LPBYTE ptr = databuffer;
2798
ba3eb2af 2799 if (items != 5)
c69f6586
GS
2800 {
2801 croak("usage: Win32::RegQueryValueEx($hkey, $valuename, $reserved, $type, $data);\n");
2802 }
2803
2804 result = RegQueryValueEx(SvHKEY(ST(0)), SvPV(ST(1), na), 0, &type, ptr, &datasz);
ba3eb2af 2805 if (result == ERROR_MORE_DATA)
c69f6586
GS
2806 {
2807 New(0, ptr, datasz+1, BYTE);
2808 result = RegQueryValueEx(SvHKEY(ST(0)), SvPV(ST(1), na), 0, &type, ptr, &datasz);
2809 }
ba3eb2af 2810 if (SUCCESSRETURNED(result))
c69f6586
GS
2811 {
2812 SETIV(3, type);
2813
2814 // return includes the null terminator so delete it if REG_SZ, REG_MULTI_SZ or REG_EXPAND_SZ
2815 switch(type)
2816 {
2817 case REG_SZ:
2818 case REG_MULTI_SZ:
2819 case REG_EXPAND_SZ:
2820 --datasz;
2821 case REG_BINARY:
2822 SETPVN(4, ptr, datasz);
2823 break;
2824
2825 case REG_DWORD_BIG_ENDIAN:
2826 {
2827 BYTE tmp = ptr[0];
2828 ptr[0] = ptr[3];
2829 ptr[3] = tmp;
2830 tmp = ptr[1];
2831 ptr[1] = ptr[2];
2832 ptr[2] = tmp;
2833 }
2834 case REG_DWORD_LITTLE_ENDIAN: // same as REG_DWORD
2835 SETNV(4, (double)*((DWORD*)ptr));
2836 break;
2837
2838 default:
2839 break;
2840 }
2841
ba3eb2af 2842 if (ptr != databuffer)
c69f6586
GS
2843 safefree(ptr);
2844
2845 XSRETURN_YES;
2846 }
ba3eb2af 2847 if (ptr != databuffer)
c69f6586
GS
2848 safefree(ptr);
2849
2850 XSRETURN_NO;
2851}
2852
2853static
2854XS(w32_RegReplaceKey)
2855{
2856 dXSARGS;
2857
ba3eb2af 2858 if (items != 4)
c69f6586
GS
2859 {
2860 croak("usage: Win32::RegReplaceKey($hkey, $subkey, $newfile, $oldfile);\n");
2861 }
2862
2863 REGRETURN(RegReplaceKey(SvHKEY(ST(0)), (char *)SvPV(ST(1), na), (char *)SvPV(ST(2), na), (char *)SvPV(ST(3), na)));
2864}
2865
2866static
2867XS(w32_RegRestoreKey)
2868{
2869 dXSARGS;
2870
ba3eb2af 2871 if (items < 2 || items > 3)
c69f6586
GS
2872 {
2873 croak("usage: Win32::RegRestoreKey($hkey, $filename [, $flags]);\n");
2874 }
2875
2876 REGRETURN(RegRestoreKey(SvHKEY(ST(0)), (char*)SvPV(ST(1), na), (DWORD)((items == 3) ? SvIV(ST(2)) : 0)));
2877}
2878
2879static
2880XS(w32_RegSaveKey)
2881{
2882 dXSARGS;
2883
ba3eb2af 2884 if (items != 2)
c69f6586
GS
2885 {
2886 croak("usage: Win32::RegSaveKey($hkey, $filename);\n");
2887 }
2888
2889 REGRETURN(RegSaveKey(SvHKEY(ST(0)), (char *)SvPV(ST(1), na), NULL));
2890}
2891
2892static
2893XS(w32_RegSetKeySecurity)
2894{
2895 dXSARGS;
2896
ba3eb2af 2897 if (items != 3)
c69f6586
GS
2898 {
2899 croak("usage: Win32::RegSetKeySecurity($hkey, $security_info, $security_descriptor);\n");
2900 }
2901
2902 REGRETURN(RegSetKeySecurity(SvHKEY(ST(0)), SvIV(ST(1)), (SECURITY_DESCRIPTOR*)SvPV(ST(2), na)));
2903}
2904
2905static
2906XS(w32_RegSetValue)
2907{
2908 dXSARGS;
2909
2910 unsigned int size;
2911 char *buffer;
e3b8966e 2912 DWORD type;
c69f6586 2913
ba3eb2af 2914 if (items != 4)
c69f6586
GS
2915 {
2916 croak("usage: Win32::RegSetValue($hkey, $subKey, $type, $data);\n");
2917 }
2918
e3b8966e 2919 type = SvIV(ST(2));
ba3eb2af 2920 if (type != REG_SZ && type != REG_EXPAND_SZ)
c69f6586
GS
2921 {
2922 croak("Win32::RegSetValue: Type was not REG_SZ or REG_EXPAND_SZ, cannot set %s\n", (char *)SvPV(ST(1), na));
2923 }
2924
2925 buffer = (char *)SvPV(ST(3), size);
2926 REGRETURN(RegSetValue(SvHKEY(ST(0)), SvPV(ST(1), na), REG_SZ, buffer, size));
2927}
2928
2929static
2930XS(w32_RegSetValueEx)
2931{
2932 dXSARGS;
2933
2934 DWORD type;
2935 DWORD val;
2936 unsigned int size;
2937 char *buffer;
2938
ba3eb2af 2939 if (items != 5)
c69f6586
GS
2940 {
2941 croak("usage: Win32::RegSetValueEx($hkey, $valname, $reserved, $type, $data);\n");
2942 }
2943
2944 type = (DWORD)SvIV(ST(3));
2945 switch(type)
2946 {
2947 case REG_SZ:
2948 case REG_BINARY:
2949 case REG_MULTI_SZ:
2950 case REG_EXPAND_SZ:
2951 buffer = (char *)SvPV(ST(4), size);
ba3eb2af 2952 if (type != REG_BINARY)
c69f6586
GS
2953 size++; // include null terminator in size
2954
2955 REGRETURN(RegSetValueEx(SvHKEY(ST(0)), (char *)SvPV(ST(1), na), 0, type, (PBYTE) buffer, size));
2956 break;
2957
2958 case REG_DWORD_BIG_ENDIAN:
2959 case REG_DWORD_LITTLE_ENDIAN: // Same as REG_DWORD
2960 val = (DWORD)SvIV(ST(4));
2961 REGRETURN(RegSetValueEx(SvHKEY(ST(0)), (char *)SvPV(ST(1), na), 0, type, (PBYTE) &val, sizeof(DWORD)));
2962 break;
2963
2964 default:
2965 croak("Win32::RegSetValueEx: Type not specified, cannot set %s\n", (char *)SvPV(ST(1), na));
2966 }
2967}
2968
2969static
2970XS(w32_RegUnloadKey)
2971{
2972 dXSARGS;
2973
ba3eb2af 2974 if (items != 2)
c69f6586
GS
2975 {
2976 croak("usage: Win32::RegUnLoadKey($hkey, $subkey);\n");
2977 }
2978
2979 REGRETURN(RegUnLoadKey(SvHKEY(ST(0)), (char *)SvPV(ST(1), na)));
2980}
2981
2982static
2983XS(w32_RegisterServer)
2984{
2985 dXSARGS;
2986 BOOL bSuccess = FALSE;
2987 HINSTANCE hInstance;
2988 unsigned int length;
2989 FARPROC sFunc;
2990
ba3eb2af 2991 if (items != 1)
c69f6586
GS
2992 {
2993 croak("usage: Win32::RegisterServer($LibraryName)\n");
2994 }
2995
2996 hInstance = LoadLibrary((char *)SvPV(ST(0), length));
ba3eb2af 2997 if (hInstance != NULL)
c69f6586
GS
2998 {
2999 sFunc = GetProcAddress(hInstance, "DllRegisterServer");
ba3eb2af 3000 if (sFunc != NULL)
c69f6586
GS
3001 {
3002 bSuccess = (sFunc() == 0);
3003 }
3004 FreeLibrary(hInstance);
3005 }
3006
ba3eb2af 3007 if (bSuccess)
c69f6586
GS
3008 {
3009 XSRETURN_YES;
3010 }
3011 XSRETURN_NO;
3012}
3013
3014static
3015XS(w32_UnregisterServer)
3016{
3017 dXSARGS;
3018 BOOL bSuccess = FALSE;
3019 HINSTANCE hInstance;
3020 unsigned int length;
3021 FARPROC sFunc;
3022
ba3eb2af 3023 if (items != 1)
c69f6586
GS
3024 {
3025 croak("usage: Win32::UnregisterServer($LibraryName)\n");
3026 }
3027
3028 hInstance = LoadLibrary((char *)SvPV(ST(0), length));
ba3eb2af 3029 if (hInstance != NULL)
c69f6586
GS
3030 {
3031 sFunc = GetProcAddress(hInstance, "DllUnregisterServer");
ba3eb2af 3032 if (sFunc != NULL)
c69f6586
GS
3033 {
3034 bSuccess = (sFunc() == 0);
3035 }
3036 FreeLibrary(hInstance);
3037 }
3038
ba3eb2af 3039 if (bSuccess)
c69f6586
GS
3040 {
3041 XSRETURN_YES;
3042 }
3043 XSRETURN_NO;
3044}
3045
3046
ad2e33dc 3047void
f3986ebb 3048Perl_init_os_extras()
ad2e33dc
GS
3049{
3050 char *file = __FILE__;
3051 dXSUB_SYS;
3052
ad2e33dc
GS
3053 /* these names are Activeware compatible */
3054 newXS("Win32::GetCwd", w32_GetCwd, file);
3055 newXS("Win32::SetCwd", w32_SetCwd, file);
3056 newXS("Win32::GetNextAvailDrive", w32_GetNextAvailDrive, file);
3057 newXS("Win32::GetLastError", w32_GetLastError, file);
3058 newXS("Win32::LoginName", w32_LoginName, file);
3059 newXS("Win32::NodeName", w32_NodeName, file);
3060 newXS("Win32::DomainName", w32_DomainName, file);
3061 newXS("Win32::FsType", w32_FsType, file);
3062 newXS("Win32::GetOSVersion", w32_GetOSVersion, file);
3063 newXS("Win32::IsWinNT", w32_IsWinNT, file);
3064 newXS("Win32::IsWin95", w32_IsWin95, file);
3065 newXS("Win32::FormatMessage", w32_FormatMessage, file);
3066 newXS("Win32::Spawn", w32_Spawn, file);
3067 newXS("Win32::GetTickCount", w32_GetTickCount, file);
3068 newXS("Win32::GetShortPathName", w32_GetShortPathName, file);
ad0751ec 3069 newXS("Win32::Sleep", w32_Sleep, file);
ad2e33dc 3070
c69f6586
GS
3071 /* the following extensions are used interally and may be changed at any time */
3072 /* therefore no documentation is provided */
3073 newXS("Win32::RegCloseKey", w32_RegCloseKey, file);
3074 newXS("Win32::RegConnectRegistry", w32_RegConnectRegistry, file);
3075 newXS("Win32::RegCreateKey", w32_RegCreateKey, file);
3076 newXS("Win32::RegCreateKeyEx", w32_RegCreateKeyEx, file);
3077 newXS("Win32::RegDeleteKey", w32_RegDeleteKey, file);
3078 newXS("Win32::RegDeleteValue", w32_RegDeleteValue, file);
3079
3080 newXS("Win32::RegEnumKey", w32_RegEnumKey, file);
3081 newXS("Win32::RegEnumKeyEx", w32_RegEnumKeyEx, file);
3082 newXS("Win32::RegEnumValue", w32_RegEnumValue, file);
3083
3084 newXS("Win32::RegFlushKey", w32_RegFlushKey, file);
3085 newXS("Win32::RegGetKeySecurity", w32_RegGetKeySecurity, file);
3086
3087 newXS("Win32::RegLoadKey", w32_RegLoadKey, file);
3088 newXS("Win32::RegOpenKey", w32_RegOpenKey, file);
3089 newXS("Win32::RegOpenKeyEx", w32_RegOpenKeyEx, file);
3090 newXS("Win32::RegQueryInfoKey", w32_RegQueryInfoKey, file);
3091 newXS("Win32::RegQueryValue", w32_RegQueryValue, file);
3092 newXS("Win32::RegQueryValueEx", w32_RegQueryValueEx, file);
3093
3094 newXS("Win32::RegReplaceKey", w32_RegReplaceKey, file);
3095 newXS("Win32::RegRestoreKey", w32_RegRestoreKey, file);
3096 newXS("Win32::RegSaveKey", w32_RegSaveKey, file);
3097 newXS("Win32::RegSetKeySecurity", w32_RegSetKeySecurity, file);
3098 newXS("Win32::RegSetValue", w32_RegSetValue, file);
3099 newXS("Win32::RegSetValueEx", w32_RegSetValueEx, file);
3100 newXS("Win32::RegUnloadKey", w32_RegUnloadKey, file);
3101
3102 newXS("Win32::RegisterServer", w32_RegisterServer, file);
3103 newXS("Win32::UnregisterServer", w32_UnregisterServer, file);
3104
ad2e33dc
GS
3105 /* XXX Bloat Alert! The following Activeware preloads really
3106 * ought to be part of Win32::Sys::*, so they're not included
3107 * here.
3108 */
3109 /* LookupAccountName
3110 * LookupAccountSID
3111 * InitiateSystemShutdown
3112 * AbortSystemShutdown
3113 * ExpandEnvrironmentStrings
3114 */
3115}
3116
3117void
3118Perl_win32_init(int *argcp, char ***argvp)
3119{
3120 /* Disable floating point errors, Perl will trap the ones we
3121 * care about. VC++ RTL defaults to switching these off
3122 * already, but the Borland RTL doesn't. Since we don't
3123 * want to be at the vendor's whim on the default, we set
3124 * it explicitly here.
3125 */
a835ef8a 3126#if !defined(_ALPHA_) && !defined(__GNUC__)
ad2e33dc 3127 _control87(MCW_EM, MCW_EM);
3dc9191e 3128#endif
dc86dda3 3129 MALLOC_INIT;
ad2e33dc 3130}
d55594ae 3131
a868473f
NIS
3132#ifdef USE_BINMODE_SCRIPTS
3133
3134void
3135win32_strip_return(SV *sv)
3136{
3137 char *s = SvPVX(sv);
3138 char *e = s+SvCUR(sv);
3139 char *d = s;
3140 while (s < e)
3141 {
3142 if (*s == '\r' && s[1] == '\n')
3143 {
3144 *d++ = '\n';
3145 s += 2;
3146 }
3147 else
3148 {
3149 *d++ = *s++;
3150 }
3151 }
3152 SvCUR_set(sv,d-SvPVX(sv));
3153}
3154
3155#endif