Add -DMULTIARCH (see change #3006).
[p5sagit/p5-mst-13.2.git] / win32 / win32.c
CommitLineData
68dc0745 1/* WIN32.C
2 *
3 * (c) 1995 Microsoft Corporation. All rights reserved.
4 * Developed by hip communications inc., http://info.hip.com/info/
5 * Portions (c) 1993 Intergraph Corporation. All rights reserved.
6 *
7 * You may distribute under the terms of either the GNU General Public
8 * License or the Artistic License, as specified in the README file.
9 */
0a753a76 10
11#define WIN32_LEAN_AND_MEAN
12#define WIN32IO_IS_STDIO
13#include <tchar.h>
a835ef8a 14#ifdef __GNUC__
15#define Win32_Winsock
16#endif
0a753a76 17#include <windows.h>
18
e56670dd 19#ifndef __MINGW32__
9404a519 20#include <lmcons.h>
21#include <lmerr.h>
22/* ugliness to work around a buggy struct definition in lmwksta.h */
23#undef LPTSTR
24#define LPTSTR LPWSTR
25#include <lmwksta.h>
26#undef LPTSTR
27#define LPTSTR LPSTR
e56670dd 28#include <lmapibuf.h>
29#endif /* __MINGW32__ */
9404a519 30
68dc0745 31/* #include "config.h" */
0a753a76 32
33#define PERLIO_NOT_STDIO 0
34#if !defined(PERLIO_IS_STDIO) && !defined(USE_SFIO)
35#define PerlIO FILE
36#endif
37
38#include "EXTERN.h"
39#include "perl.h"
c69f6586 40
41#define NO_XSLOCKS
42#ifdef PERL_OBJECT
43extern CPerlObj* pPerl;
44#endif
ad2e33dc 45#include "XSUB.h"
c69f6586 46
47#include "Win32iop.h"
0a753a76 48#include <fcntl.h>
49#include <sys/stat.h>
5b0d9cbe 50#ifndef __GNUC__
51/* assert.h conflicts with #define of assert in perl.h */
0a753a76 52#include <assert.h>
5b0d9cbe 53#endif
0a753a76 54#include <string.h>
55#include <stdarg.h>
ad2e33dc 56#include <float.h>
ad0751ec 57#include <time.h>
3730b96e 58#if defined(_MSC_VER) || defined(__MINGW32__)
ad0751ec 59#include <sys/utime.h>
60#else
61#include <utime.h>
62#endif
0a753a76 63
5b0d9cbe 64#ifdef __GNUC__
65/* Mingw32 defaults to globing command line
66 * So we turn it off like this:
67 */
68int _CRT_glob = 0;
69#endif
70
6890e559 71#define EXECF_EXEC 1
72#define EXECF_SPAWN 2
73#define EXECF_SPAWN_NOWAIT 3
74
c69f6586 75#if defined(PERL_OBJECT)
e5a95ffb 76#undef win32_get_privlib
77#define win32_get_privlib g_win32_get_privlib
00dc2f4f 78#undef win32_get_sitelib
79#define win32_get_sitelib g_win32_get_sitelib
c69f6586 80#undef do_aspawn
81#define do_aspawn g_do_aspawn
82#undef do_spawn
83#define do_spawn g_do_spawn
84#undef do_exec
85#define do_exec g_do_exec
c69f6586 86#undef getlogin
87#define getlogin g_getlogin
88#endif
89
2d7a9237 90static DWORD os_id(void);
ce1da67e 91static void get_shell(void);
92static long tokenize(char *str, char **dest, char ***destv);
c69f6586 93 int do_spawn2(char *cmd, int exectype);
e200fe59 94static BOOL has_shell_metachars(char *ptr);
2d7a9237 95static long filetime_to_clock(PFILETIME ft);
ad0751ec 96static BOOL filetime_from_time(PFILETIME ft, time_t t);
e5a95ffb 97static char * get_emd_part(char *leading, char *trailing, ...);
f55ee38a 98static void remove_dead_process(HANDLE deceased);
c69f6586 99
2d7a9237 100HANDLE w32_perldll_handle = INVALID_HANDLE_VALUE;
4b556e6c 101static DWORD w32_platform = (DWORD)-1;
50892819 102
26618a56 103#ifdef USE_THREADS
104# ifdef USE_DECLSPEC_THREAD
105__declspec(thread) char strerror_buffer[512];
e34ffe5a 106__declspec(thread) char getlogin_buffer[128];
4b556e6c 107__declspec(thread) char w32_perllib_root[MAX_PATH+1];
26618a56 108# ifdef HAVE_DES_FCRYPT
109__declspec(thread) char crypt_buffer[30];
110# endif
111# else
112# define strerror_buffer (thr->i.Wstrerror_buffer)
e34ffe5a 113# define getlogin_buffer (thr->i.Wgetlogin_buffer)
4b556e6c 114# define w32_perllib_root (thr->i.Ww32_perllib_root)
26618a56 115# define crypt_buffer (thr->i.Wcrypt_buffer)
116# endif
117#else
4b556e6c 118static char strerror_buffer[512];
119static char getlogin_buffer[128];
120static char w32_perllib_root[MAX_PATH+1];
26618a56 121# ifdef HAVE_DES_FCRYPT
4b556e6c 122static char crypt_buffer[30];
26618a56 123# endif
124#endif
125
3fe9a6f1 126int
127IsWin95(void) {
2d7a9237 128 return (os_id() == VER_PLATFORM_WIN32_WINDOWS);
3fe9a6f1 129}
130
131int
132IsWinNT(void) {
2d7a9237 133 return (os_id() == VER_PLATFORM_WIN32_NT);
3fe9a6f1 134}
0a753a76 135
00dc2f4f 136char*
137GetRegStrFromKey(HKEY hkey, const char *lpszValueName, char** ptr, DWORD* lpDataLen)
138{ /* Retrieve a REG_SZ or REG_EXPAND_SZ from the registry */
139 HKEY handle;
140 DWORD type;
141 const char *subkey = "Software\\Perl";
142 long retval;
143
144 retval = RegOpenKeyEx(hkey, subkey, 0, KEY_READ, &handle);
ba3eb2af 145 if (retval == ERROR_SUCCESS){
00dc2f4f 146 retval = RegQueryValueEx(handle, lpszValueName, 0, &type, NULL, lpDataLen);
ba3eb2af 147 if (retval == ERROR_SUCCESS && type == REG_SZ) {
c934e9d4 148 if (*ptr) {
00dc2f4f 149 Renew(*ptr, *lpDataLen, char);
150 }
151 else {
152 New(1312, *ptr, *lpDataLen, char);
153 }
154 retval = RegQueryValueEx(handle, lpszValueName, 0, NULL, (PBYTE)*ptr, lpDataLen);
ba3eb2af 155 if (retval != ERROR_SUCCESS) {
e5a95ffb 156 Safefree(*ptr);
c934e9d4 157 *ptr = Nullch;
00dc2f4f 158 }
159 }
160 RegCloseKey(handle);
161 }
162 return *ptr;
163}
164
165char*
166GetRegStr(const char *lpszValueName, char** ptr, DWORD* lpDataLen)
167{
168 *ptr = GetRegStrFromKey(HKEY_CURRENT_USER, lpszValueName, ptr, lpDataLen);
c934e9d4 169 if (*ptr == Nullch)
00dc2f4f 170 {
171 *ptr = GetRegStrFromKey(HKEY_LOCAL_MACHINE, lpszValueName, ptr, lpDataLen);
172 }
173 return *ptr;
174}
175
e5a95ffb 176static char *
177get_emd_part(char *prev_path, char *trailing_path, ...)
00dc2f4f 178{
dc9e4912 179 char base[10];
e5a95ffb 180 va_list ap;
e24c7c18 181 char mod_name[MAX_PATH+1];
00dc2f4f 182 char *ptr;
e5a95ffb 183 char *optr;
184 char *strip;
185 int oldsize, newsize;
186
187 va_start(ap, trailing_path);
188 strip = va_arg(ap, char *);
189
cceca5ed 190 sprintf(base, "%5.3f",
191 (double)PERL_REVISION + ((double)PERL_VERSION / (double)1000));
dc9e4912 192
80252599 193 GetModuleFileName((HMODULE)((w32_perldll_handle == INVALID_HANDLE_VALUE)
194 ? GetModuleHandle(NULL) : w32_perldll_handle),
195 mod_name, sizeof(mod_name));
e5a95ffb 196 ptr = strrchr(mod_name, '\\');
197 while (ptr && strip) {
198 /* look for directories to skip back */
199 optr = ptr;
00dc2f4f 200 *ptr = '\0';
e5a95ffb 201 ptr = strrchr(mod_name, '\\');
202 if (!ptr || stricmp(ptr+1, strip) != 0) {
80252599 203 if(!(*strip == '5' && *(ptr+1) == '5' && strncmp(strip, base, 5) == 0
204 && strncmp(ptr+1, base, 5) == 0)) {
205 *optr = '\\';
206 ptr = optr;
207 }
00dc2f4f 208 }
e5a95ffb 209 strip = va_arg(ap, char *);
00dc2f4f 210 }
e5a95ffb 211 if (!ptr) {
212 ptr = mod_name;
213 *ptr++ = '.';
00dc2f4f 214 *ptr = '\\';
215 }
e5a95ffb 216 va_end(ap);
217 strcpy(++ptr, trailing_path);
218
dc9e4912 219 /* only add directory if it exists */
220 if(GetFileAttributes(mod_name) != (DWORD) -1) {
221 /* directory exists */
222 newsize = strlen(mod_name) + 1;
223 if (prev_path) {
224 oldsize = strlen(prev_path) + 1;
225 newsize += oldsize; /* includes plus 1 for ';' */
226 Renew(prev_path, newsize, char);
227 prev_path[oldsize-1] = ';';
228 strcpy(&prev_path[oldsize], mod_name);
229 }
230 else {
231 New(1311, prev_path, newsize, char);
232 strcpy(prev_path, mod_name);
233 }
00dc2f4f 234 }
00dc2f4f 235
e5a95ffb 236 return prev_path;
00dc2f4f 237}
238
239char *
e5a95ffb 240win32_get_privlib(char *pl)
00dc2f4f 241{
e5a95ffb 242 char *stdlib = "lib";
243 char buffer[MAX_PATH+1];
244 char *path = Nullch;
245 DWORD datalen;
00dc2f4f 246
e5a95ffb 247 /* $stdlib = $HKCU{"lib-$]"} || $HKLM{"lib-$]"} || $HKCU{"lib"} || $HKLM{"lib"} || ""; */
248 sprintf(buffer, "%s-%s", stdlib, pl);
249 path = GetRegStr(buffer, &path, &datalen);
c934e9d4 250 if (!path)
e5a95ffb 251 path = GetRegStr(stdlib, &path, &datalen);
00dc2f4f 252
e5a95ffb 253 /* $stdlib .= ";$EMD/../../lib" */
254 return get_emd_part(path, stdlib, ARCHNAME, "bin", Nullch);
00dc2f4f 255}
256
68dc0745 257char *
00dc2f4f 258win32_get_sitelib(char *pl)
259{
e5a95ffb 260 char *sitelib = "sitelib";
261 char regstr[40];
e24c7c18 262 char pathstr[MAX_PATH+1];
e5a95ffb 263 DWORD datalen;
264 char *path1 = Nullch;
265 char *path2 = Nullch;
266 int len, newsize;
00dc2f4f 267
268 /* $HKCU{"sitelib-$]"} || $HKLM{"sitelib-$]"} . ---; */
e5a95ffb 269 sprintf(regstr, "%s-%s", sitelib, pl);
270 path1 = GetRegStr(regstr, &path1, &datalen);
271
272 /* $sitelib .=
273 * ";$EMD/" . ((-d $EMD/../../../$]) ? "../../.." : "../.."). "/site/$]/lib"; */
274 sprintf(pathstr, "site\\%s\\lib", pl);
275 path1 = get_emd_part(path1, pathstr, ARCHNAME, "bin", pl, Nullch);
00dc2f4f 276
277 /* $HKCU{'sitelib'} || $HKLM{'sitelib'} . ---; */
e5a95ffb 278 path2 = GetRegStr(sitelib, &path2, &datalen);
00dc2f4f 279
e5a95ffb 280 /* $sitelib .=
281 * ";$EMD/" . ((-d $EMD/../../../$]) ? "../../.." : "../.."). "/site/lib"; */
282 path2 = get_emd_part(path2, "site\\lib", ARCHNAME, "bin", pl, Nullch);
00dc2f4f 283
e5a95ffb 284 if (!path1)
285 return path2;
00dc2f4f 286
e5a95ffb 287 if (!path2)
288 return path1;
289
290 len = strlen(path1);
291 newsize = len + strlen(path2) + 2; /* plus one for ';' */
292
293 Renew(path1, newsize, char);
294 path1[len++] = ';';
295 strcpy(&path1[len], path2);
296
297 Safefree(path2);
298 return path1;
68dc0745 299}
0a753a76 300
b4793f7f 301
2d7a9237 302static BOOL
e200fe59 303has_shell_metachars(char *ptr)
68dc0745 304{
305 int inquote = 0;
306 char quote = '\0';
307
308 /*
309 * Scan string looking for redirection (< or >) or pipe
e200fe59 310 * characters (|) that are not in a quoted string.
311 * Shell variable interpolation (%VAR%) can also happen inside strings.
68dc0745 312 */
9404a519 313 while (*ptr) {
68dc0745 314 switch(*ptr) {
e200fe59 315 case '%':
316 return TRUE;
68dc0745 317 case '\'':
318 case '\"':
9404a519 319 if (inquote) {
320 if (quote == *ptr) {
68dc0745 321 inquote = 0;
322 quote = '\0';
0a753a76 323 }
68dc0745 324 }
325 else {
326 quote = *ptr;
327 inquote++;
328 }
329 break;
330 case '>':
331 case '<':
332 case '|':
9404a519 333 if (!inquote)
68dc0745 334 return TRUE;
335 default:
336 break;
0a753a76 337 }
68dc0745 338 ++ptr;
339 }
340 return FALSE;
0a753a76 341}
342
c69f6586 343#if !defined(PERL_OBJECT)
68dc0745 344/* since the current process environment is being updated in util.c
345 * the library functions will get the correct environment
346 */
347PerlIO *
348my_popen(char *cmd, char *mode)
0a753a76 349{
350#ifdef FIXCMD
68dc0745 351#define fixcmd(x) { \
352 char *pspace = strchr((x),' '); \
353 if (pspace) { \
354 char *p = (x); \
355 while (p < pspace) { \
356 if (*p == '/') \
357 *p = '\\'; \
358 p++; \
359 } \
360 } \
361 }
0a753a76 362#else
363#define fixcmd(x)
364#endif
68dc0745 365 fixcmd(cmd);
3e3baf6d 366 win32_fflush(stdout);
367 win32_fflush(stderr);
0a753a76 368 return win32_popen(cmd, mode);
0a753a76 369}
370
68dc0745 371long
372my_pclose(PerlIO *fp)
0a753a76 373{
374 return win32_pclose(fp);
375}
c69f6586 376#endif
0a753a76 377
8b10511d 378static DWORD
2d7a9237 379os_id(void)
0a753a76 380{
8b10511d 381 static OSVERSIONINFO osver;
0a753a76 382
2d7a9237 383 if (osver.dwPlatformId != w32_platform) {
8b10511d 384 memset(&osver, 0, sizeof(OSVERSIONINFO));
385 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
386 GetVersionEx(&osver);
2d7a9237 387 w32_platform = osver.dwPlatformId;
8b10511d 388 }
2d7a9237 389 return (w32_platform);
0a753a76 390}
391
ce1da67e 392/* Tokenize a string. Words are null-separated, and the list
393 * ends with a doubled null. Any character (except null and
394 * including backslash) may be escaped by preceding it with a
395 * backslash (the backslash will be stripped).
396 * Returns number of words in result buffer.
397 */
398static long
399tokenize(char *str, char **dest, char ***destv)
400{
401 char *retstart = Nullch;
402 char **retvstart = 0;
403 int items = -1;
404 if (str) {
405 int slen = strlen(str);
406 register char *ret;
407 register char **retv;
408 New(1307, ret, slen+2, char);
409 New(1308, retv, (slen+3)/2, char*);
410
411 retstart = ret;
412 retvstart = retv;
413 *retv = ret;
414 items = 0;
415 while (*str) {
416 *ret = *str++;
417 if (*ret == '\\' && *str)
418 *ret = *str++;
419 else if (*ret == ' ') {
420 while (*str == ' ')
421 str++;
422 if (ret == retstart)
423 ret--;
424 else {
425 *ret = '\0';
426 ++items;
427 if (*str)
428 *++retv = ret+1;
429 }
430 }
431 else if (!*str)
432 ++items;
433 ret++;
434 }
435 retvstart[items] = Nullch;
436 *ret++ = '\0';
437 *ret = '\0';
438 }
439 *dest = retstart;
440 *destv = retvstart;
441 return items;
442}
443
444static void
2d7a9237 445get_shell(void)
0a753a76 446{
ce1da67e 447 if (!w32_perlshell_tokens) {
174c211a 448 /* we don't use COMSPEC here for two reasons:
449 * 1. the same reason perl on UNIX doesn't use SHELL--rampant and
450 * uncontrolled unportability of the ensuing scripts.
451 * 2. PERL5SHELL could be set to a shell that may not be fit for
452 * interactive use (which is what most programs look in COMSPEC
453 * for).
454 */
ce1da67e 455 char* defaultshell = (IsWinNT() ? "cmd.exe /x/c" : "command.com /c");
456 char *usershell = getenv("PERL5SHELL");
457 w32_perlshell_items = tokenize(usershell ? usershell : defaultshell,
458 &w32_perlshell_tokens,
459 &w32_perlshell_vec);
68dc0745 460 }
0a753a76 461}
462
68dc0745 463int
2d7a9237 464do_aspawn(void *vreally, void **vmark, void **vsp)
0a753a76 465{
2d7a9237 466 SV *really = (SV*)vreally;
467 SV **mark = (SV**)vmark;
468 SV **sp = (SV**)vsp;
68dc0745 469 char **argv;
2d7a9237 470 char *str;
68dc0745 471 int status;
2d7a9237 472 int flag = P_WAIT;
68dc0745 473 int index = 0;
2d8e6c8d 474 STRLEN n_a;
68dc0745 475
2d7a9237 476 if (sp <= mark)
477 return -1;
68dc0745 478
ce1da67e 479 get_shell();
480 New(1306, argv, (sp - mark) + w32_perlshell_items + 2, char*);
2d7a9237 481
482 if (SvNIOKp(*(mark+1)) && !SvPOKp(*(mark+1))) {
483 ++mark;
484 flag = SvIVx(*mark);
68dc0745 485 }
486
9404a519 487 while (++mark <= sp) {
2d8e6c8d 488 if (*mark && (str = SvPV(*mark, n_a)))
2d7a9237 489 argv[index++] = str;
490 else
491 argv[index++] = "";
68dc0745 492 }
493 argv[index++] = 0;
494
2d7a9237 495 status = win32_spawnvp(flag,
2d8e6c8d 496 (const char*)(really ? SvPV(really,n_a) : argv[0]),
2d7a9237 497 (const char* const*)argv);
498
80252599 499 if (status < 0 && (errno == ENOEXEC || errno == ENOENT)) {
2d7a9237 500 /* possible shell-builtin, invoke with shell */
ce1da67e 501 int sh_items;
502 sh_items = w32_perlshell_items;
2d7a9237 503 while (--index >= 0)
504 argv[index+sh_items] = argv[index];
ce1da67e 505 while (--sh_items >= 0)
506 argv[sh_items] = w32_perlshell_vec[sh_items];
2d7a9237 507
508 status = win32_spawnvp(flag,
2d8e6c8d 509 (const char*)(really ? SvPV(really,n_a) : argv[0]),
2d7a9237 510 (const char* const*)argv);
511 }
68dc0745 512
50892819 513 if (flag != P_NOWAIT) {
514 if (status < 0) {
b28d0864 515 if (PL_dowarn)
50892819 516 warn("Can't spawn \"%s\": %s", argv[0], strerror(errno));
517 status = 255 * 256;
518 }
519 else
520 status *= 256;
b28d0864 521 PL_statusvalue = status;
5aabfad6 522 }
ce1da67e 523 Safefree(argv);
50892819 524 return (status);
68dc0745 525}
526
c69f6586 527int
6890e559 528do_spawn2(char *cmd, int exectype)
68dc0745 529{
530 char **a;
531 char *s;
532 char **argv;
533 int status = -1;
534 BOOL needToTry = TRUE;
2d7a9237 535 char *cmd2;
68dc0745 536
2d7a9237 537 /* Save an extra exec if possible. See if there are shell
538 * metacharacters in it */
e200fe59 539 if (!has_shell_metachars(cmd)) {
fc36a67e 540 New(1301,argv, strlen(cmd) / 2 + 2, char*);
541 New(1302,cmd2, strlen(cmd) + 1, char);
68dc0745 542 strcpy(cmd2, cmd);
543 a = argv;
544 for (s = cmd2; *s;) {
545 while (*s && isspace(*s))
546 s++;
547 if (*s)
548 *(a++) = s;
9404a519 549 while (*s && !isspace(*s))
68dc0745 550 s++;
9404a519 551 if (*s)
68dc0745 552 *s++ = '\0';
0a753a76 553 }
68dc0745 554 *a = Nullch;
ce1da67e 555 if (argv[0]) {
6890e559 556 switch (exectype) {
557 case EXECF_SPAWN:
558 status = win32_spawnvp(P_WAIT, argv[0],
559 (const char* const*)argv);
560 break;
561 case EXECF_SPAWN_NOWAIT:
562 status = win32_spawnvp(P_NOWAIT, argv[0],
563 (const char* const*)argv);
564 break;
565 case EXECF_EXEC:
566 status = win32_execvp(argv[0], (const char* const*)argv);
567 break;
568 }
2d7a9237 569 if (status != -1 || errno == 0)
68dc0745 570 needToTry = FALSE;
0a753a76 571 }
0a753a76 572 Safefree(argv);
68dc0745 573 Safefree(cmd2);
574 }
2d7a9237 575 if (needToTry) {
ce1da67e 576 char **argv;
577 int i = -1;
578 get_shell();
579 New(1306, argv, w32_perlshell_items + 2, char*);
580 while (++i < w32_perlshell_items)
581 argv[i] = w32_perlshell_vec[i];
2d7a9237 582 argv[i++] = cmd;
583 argv[i] = Nullch;
6890e559 584 switch (exectype) {
585 case EXECF_SPAWN:
586 status = win32_spawnvp(P_WAIT, argv[0],
587 (const char* const*)argv);
588 break;
589 case EXECF_SPAWN_NOWAIT:
590 status = win32_spawnvp(P_NOWAIT, argv[0],
591 (const char* const*)argv);
592 break;
593 case EXECF_EXEC:
594 status = win32_execvp(argv[0], (const char* const*)argv);
595 break;
596 }
ce1da67e 597 cmd = argv[0];
598 Safefree(argv);
68dc0745 599 }
50892819 600 if (exectype != EXECF_SPAWN_NOWAIT) {
601 if (status < 0) {
b28d0864 602 if (PL_dowarn)
50892819 603 warn("Can't %s \"%s\": %s",
604 (exectype == EXECF_EXEC ? "exec" : "spawn"),
605 cmd, strerror(errno));
606 status = 255 * 256;
607 }
608 else
609 status *= 256;
b28d0864 610 PL_statusvalue = status;
5aabfad6 611 }
50892819 612 return (status);
0a753a76 613}
614
6890e559 615int
616do_spawn(char *cmd)
617{
618 return do_spawn2(cmd, EXECF_SPAWN);
619}
620
2d7a9237 621int
622do_spawn_nowait(char *cmd)
623{
624 return do_spawn2(cmd, EXECF_SPAWN_NOWAIT);
625}
626
6890e559 627bool
628do_exec(char *cmd)
629{
630 do_spawn2(cmd, EXECF_EXEC);
631 return FALSE;
632}
633
68dc0745 634/* The idea here is to read all the directory names into a string table
635 * (separated by nulls) and when one of the other dir functions is called
636 * return the pointer to the current file name.
637 */
638DIR *
ce2e26e5 639win32_opendir(char *filename)
0a753a76 640{
9404a519 641 DIR *p;
642 long len;
643 long idx;
644 char scanname[MAX_PATH+3];
645 struct stat sbuf;
646 WIN32_FIND_DATA FindData;
647 HANDLE fh;
648
649 len = strlen(filename);
650 if (len > MAX_PATH)
651 return NULL;
68dc0745 652
653 /* check to see if filename is a directory */
69d3ab13 654 if (win32_stat(filename, &sbuf) < 0 || !S_ISDIR(sbuf.st_mode))
24caa93f 655 return NULL;
68dc0745 656
68dc0745 657 /* Get us a DIR structure */
fc36a67e 658 Newz(1303, p, 1, DIR);
9404a519 659 if (p == NULL)
68dc0745 660 return NULL;
661
662 /* Create the search pattern */
663 strcpy(scanname, filename);
9404a519 664 if (scanname[len-1] != '/' && scanname[len-1] != '\\')
665 scanname[len++] = '/';
666 scanname[len++] = '*';
667 scanname[len] = '\0';
68dc0745 668
669 /* do the FindFirstFile call */
670 fh = FindFirstFile(scanname, &FindData);
9404a519 671 if (fh == INVALID_HANDLE_VALUE) {
21e72512 672 /* FindFirstFile() fails on empty drives! */
673 if (GetLastError() == ERROR_FILE_NOT_FOUND)
674 return p;
675 Safefree( p);
68dc0745 676 return NULL;
677 }
678
679 /* now allocate the first part of the string table for
680 * the filenames that we find.
681 */
682 idx = strlen(FindData.cFileName)+1;
fc36a67e 683 New(1304, p->start, idx, char);
9404a519 684 if (p->start == NULL)
65e48ea9 685 croak("opendir: malloc failed!\n");
68dc0745 686 strcpy(p->start, FindData.cFileName);
68dc0745 687 p->nfiles++;
688
689 /* loop finding all the files that match the wildcard
690 * (which should be all of them in this directory!).
691 * the variable idx should point one past the null terminator
692 * of the previous string found.
693 */
694 while (FindNextFile(fh, &FindData)) {
695 len = strlen(FindData.cFileName);
696 /* bump the string table size by enough for the
697 * new name and it's null terminator
698 */
699 Renew(p->start, idx+len+1, char);
9404a519 700 if (p->start == NULL)
65e48ea9 701 croak("opendir: malloc failed!\n");
68dc0745 702 strcpy(&p->start[idx], FindData.cFileName);
9404a519 703 p->nfiles++;
704 idx += len+1;
705 }
706 FindClose(fh);
707 p->size = idx;
708 p->curr = p->start;
709 return p;
0a753a76 710}
711
712
68dc0745 713/* Readdir just returns the current string pointer and bumps the
714 * string pointer to the nDllExport entry.
715 */
716struct direct *
ce2e26e5 717win32_readdir(DIR *dirp)
0a753a76 718{
68dc0745 719 int len;
720 static int dummy = 0;
0a753a76 721
68dc0745 722 if (dirp->curr) {
723 /* first set up the structure to return */
724 len = strlen(dirp->curr);
725 strcpy(dirp->dirstr.d_name, dirp->curr);
726 dirp->dirstr.d_namlen = len;
0a753a76 727
68dc0745 728 /* Fake an inode */
729 dirp->dirstr.d_ino = dummy++;
0a753a76 730
68dc0745 731 /* Now set up for the nDllExport call to readdir */
732 dirp->curr += len + 1;
733 if (dirp->curr >= (dirp->start + dirp->size)) {
734 dirp->curr = NULL;
735 }
0a753a76 736
68dc0745 737 return &(dirp->dirstr);
738 }
739 else
740 return NULL;
0a753a76 741}
742
68dc0745 743/* Telldir returns the current string pointer position */
744long
ce2e26e5 745win32_telldir(DIR *dirp)
0a753a76 746{
747 return (long) dirp->curr;
748}
749
750
68dc0745 751/* Seekdir moves the string pointer to a previously saved position
752 *(Saved by telldir).
753 */
754void
ce2e26e5 755win32_seekdir(DIR *dirp, long loc)
0a753a76 756{
757 dirp->curr = (char *)loc;
758}
759
68dc0745 760/* Rewinddir resets the string pointer to the start */
761void
ce2e26e5 762win32_rewinddir(DIR *dirp)
0a753a76 763{
764 dirp->curr = dirp->start;
765}
766
68dc0745 767/* free the memory allocated by opendir */
768int
ce2e26e5 769win32_closedir(DIR *dirp)
0a753a76 770{
771 Safefree(dirp->start);
772 Safefree(dirp);
68dc0745 773 return 1;
0a753a76 774}
775
776
68dc0745 777/*
778 * various stubs
779 */
0a753a76 780
781
68dc0745 782/* Ownership
783 *
784 * Just pretend that everyone is a superuser. NT will let us know if
785 * we don\'t really have permission to do something.
786 */
0a753a76 787
788#define ROOT_UID ((uid_t)0)
789#define ROOT_GID ((gid_t)0)
790
68dc0745 791uid_t
792getuid(void)
0a753a76 793{
68dc0745 794 return ROOT_UID;
0a753a76 795}
796
68dc0745 797uid_t
798geteuid(void)
0a753a76 799{
68dc0745 800 return ROOT_UID;
0a753a76 801}
802
68dc0745 803gid_t
804getgid(void)
0a753a76 805{
68dc0745 806 return ROOT_GID;
0a753a76 807}
808
68dc0745 809gid_t
810getegid(void)
0a753a76 811{
68dc0745 812 return ROOT_GID;
0a753a76 813}
814
68dc0745 815int
22239a37 816setuid(uid_t auid)
0a753a76 817{
22239a37 818 return (auid == ROOT_UID ? 0 : -1);
0a753a76 819}
820
68dc0745 821int
22239a37 822setgid(gid_t agid)
0a753a76 823{
22239a37 824 return (agid == ROOT_GID ? 0 : -1);
0a753a76 825}
826
e34ffe5a 827char *
828getlogin(void)
829{
830 dTHR;
831 char *buf = getlogin_buffer;
832 DWORD size = sizeof(getlogin_buffer);
833 if (GetUserName(buf,&size))
834 return buf;
835 return (char*)NULL;
836}
837
b990f8c8 838int
839chown(const char *path, uid_t owner, gid_t group)
840{
841 /* XXX noop */
1c1c7f20 842 return 0;
b990f8c8 843}
844
f55ee38a 845static void
846remove_dead_process(HANDLE deceased)
0a753a76 847{
f55ee38a 848#ifndef USE_RTL_WAIT
849 int child;
850 for (child = 0 ; child < w32_num_children ; ++child) {
851 if (w32_child_pids[child] == deceased) {
852 Copy(&w32_child_pids[child+1], &w32_child_pids[child],
853 (w32_num_children-child-1), HANDLE);
854 w32_num_children--;
855 break;
856 }
857 }
858#endif
859}
860
861DllExport int
862win32_kill(int pid, int sig)
863{
864#ifdef USE_RTL_WAIT
68dc0745 865 HANDLE hProcess= OpenProcess(PROCESS_ALL_ACCESS, TRUE, pid);
f55ee38a 866#else
867 HANDLE hProcess = (HANDLE) pid;
868#endif
0a753a76 869
870 if (hProcess == NULL) {
65e48ea9 871 croak("kill process failed!\n");
68dc0745 872 }
873 else {
874 if (!TerminateProcess(hProcess, sig))
65e48ea9 875 croak("kill process failed!\n");
68dc0745 876 CloseHandle(hProcess);
f55ee38a 877
878 /* WaitForMultipleObjects() on a pid that was killed returns error
879 * so if we know the pid is gone we remove it from process list */
880 remove_dead_process(hProcess);
68dc0745 881 }
882 return 0;
0a753a76 883}
fbbbcc48 884
68dc0745 885/*
886 * File system stuff
887 */
0a753a76 888
f3986ebb 889DllExport unsigned int
890win32_sleep(unsigned int t)
0a753a76 891{
68dc0745 892 Sleep(t*1000);
893 return 0;
0a753a76 894}
895
68dc0745 896DllExport int
897win32_stat(const char *path, struct stat *buffer)
0a753a76 898{
24caa93f 899 char t[MAX_PATH+1];
68dc0745 900 const char *p = path;
901 int l = strlen(path);
67fbe06e 902 int res;
0a753a76 903
68dc0745 904 if (l > 1) {
905 switch(path[l - 1]) {
906 case '\\':
907 case '/':
908 if (path[l - 2] != ':') {
909 strncpy(t, path, l - 1);
910 t[l - 1] = 0;
911 p = t;
912 };
913 }
914 }
390b85e7 915 res = stat(p,buffer);
24caa93f 916 if (res < 0) {
917 /* CRT is buggy on sharenames, so make sure it really isn't.
918 * XXX using GetFileAttributesEx() will enable us to set
919 * buffer->st_*time (but note that's not available on the
920 * Windows of 1995) */
921 DWORD r = GetFileAttributes(p);
922 if (r != 0xffffffff && (r & FILE_ATTRIBUTE_DIRECTORY)) {
923 buffer->st_mode |= S_IFDIR | S_IREAD;
924 errno = 0;
925 if (!(r & FILE_ATTRIBUTE_READONLY))
926 buffer->st_mode |= S_IWRITE | S_IEXEC;
927 return 0;
928 }
929 }
24caa93f 930 else {
2293b0e9 931 if (l == 3 && path[l-2] == ':'
932 && (path[l-1] == '\\' || path[l-1] == '/'))
933 {
934 /* The drive can be inaccessible, some _stat()s are buggy */
935 if (!GetVolumeInformation(path,NULL,0,NULL,NULL,NULL,NULL,0)) {
936 errno = ENOENT;
937 return -1;
938 }
939 }
940#ifdef __BORLANDC__
67fbe06e 941 if (S_ISDIR(buffer->st_mode))
942 buffer->st_mode |= S_IWRITE | S_IEXEC;
943 else if (S_ISREG(buffer->st_mode)) {
944 if (l >= 4 && path[l-4] == '.') {
945 const char *e = path + l - 3;
946 if (strnicmp(e,"exe",3)
947 && strnicmp(e,"bat",3)
948 && strnicmp(e,"com",3)
949 && (IsWin95() || strnicmp(e,"cmd",3)))
950 buffer->st_mode &= ~S_IEXEC;
951 else
952 buffer->st_mode |= S_IEXEC;
953 }
954 else
955 buffer->st_mode &= ~S_IEXEC;
956 }
67fbe06e 957#endif
2293b0e9 958 }
67fbe06e 959 return res;
0a753a76 960}
961
0551aaa8 962#ifndef USE_WIN32_RTL_ENV
963
964DllExport char *
965win32_getenv(const char *name)
966{
c934e9d4 967 static char *curitem = Nullch; /* XXX threadead */
46124e9e 968 static DWORD curlen = 0; /* XXX threadead */
0551aaa8 969 DWORD needlen;
46124e9e 970 if (!curitem) {
971 curlen = 512;
0551aaa8 972 New(1305,curitem,curlen,char);
46124e9e 973 }
58a50f62 974
975 needlen = GetEnvironmentVariable(name,curitem,curlen);
976 if (needlen != 0) {
977 while (needlen > curlen) {
978 Renew(curitem,needlen,char);
979 curlen = needlen;
980 needlen = GetEnvironmentVariable(name,curitem,curlen);
981 }
0551aaa8 982 }
c934e9d4 983 else {
7a5f8e82 984 /* allow any environment variables that begin with 'PERL'
c934e9d4 985 to be stored in the registry */
986 if (curitem)
58a50f62 987 *curitem = '\0';
988
7a5f8e82 989 if (strncmp(name, "PERL", 4) == 0) {
c934e9d4 990 if (curitem) {
58a50f62 991 Safefree(curitem);
c934e9d4 992 curitem = Nullch;
46124e9e 993 curlen = 0;
58a50f62 994 }
00dc2f4f 995 curitem = GetRegStr(name, &curitem, &curlen);
58a50f62 996 }
c69f6586 997 }
c934e9d4 998 if (curitem && *curitem == '\0')
58a50f62 999 return Nullch;
1000
0551aaa8 1001 return curitem;
1002}
1003
ac5c734f 1004DllExport int
1005win32_putenv(const char *name)
1006{
1007 char* curitem;
1008 char* val;
1009 int relval = -1;
1010 if(name) {
1011 New(1309,curitem,strlen(name)+1,char);
1012 strcpy(curitem, name);
1013 val = strchr(curitem, '=');
1014 if(val) {
1015 /* The sane way to deal with the environment.
1016 * Has these advantages over putenv() & co.:
1017 * * enables us to store a truly empty value in the
1018 * environment (like in UNIX).
1019 * * we don't have to deal with RTL globals, bugs and leaks.
1020 * * Much faster.
1021 * Why you may want to enable USE_WIN32_RTL_ENV:
1022 * * environ[] and RTL functions will not reflect changes,
1023 * which might be an issue if extensions want to access
1024 * the env. via RTL. This cuts both ways, since RTL will
1025 * not see changes made by extensions that call the Win32
1026 * functions directly, either.
1027 * GSAR 97-06-07
1028 */
1029 *val++ = '\0';
1030 if(SetEnvironmentVariable(curitem, *val ? val : NULL))
1031 relval = 0;
1032 }
1033 Safefree(curitem);
1034 }
1035 return relval;
1036}
1037
0551aaa8 1038#endif
1039
d55594ae 1040static long
2d7a9237 1041filetime_to_clock(PFILETIME ft)
d55594ae 1042{
1043 __int64 qw = ft->dwHighDateTime;
1044 qw <<= 32;
1045 qw |= ft->dwLowDateTime;
1046 qw /= 10000; /* File time ticks at 0.1uS, clock at 1mS */
1047 return (long) qw;
1048}
1049
f3986ebb 1050DllExport int
1051win32_times(struct tms *timebuf)
0a753a76 1052{
d55594ae 1053 FILETIME user;
1054 FILETIME kernel;
1055 FILETIME dummy;
1056 if (GetProcessTimes(GetCurrentProcess(), &dummy, &dummy,
1057 &kernel,&user)) {
2d7a9237 1058 timebuf->tms_utime = filetime_to_clock(&user);
1059 timebuf->tms_stime = filetime_to_clock(&kernel);
d55594ae 1060 timebuf->tms_cutime = 0;
1061 timebuf->tms_cstime = 0;
1062
1063 } else {
1064 /* That failed - e.g. Win95 fallback to clock() */
1065 clock_t t = clock();
1066 timebuf->tms_utime = t;
1067 timebuf->tms_stime = 0;
1068 timebuf->tms_cutime = 0;
1069 timebuf->tms_cstime = 0;
1070 }
68dc0745 1071 return 0;
0a753a76 1072}
1073
ad0751ec 1074/* fix utime() so it works on directories in NT
1075 * thanks to Jan Dubois <jan.dubois@ibm.net>
1076 */
1077static BOOL
1078filetime_from_time(PFILETIME pFileTime, time_t Time)
1079{
1080 struct tm *pTM = gmtime(&Time);
1081 SYSTEMTIME SystemTime;
1082
1083 if (pTM == NULL)
1084 return FALSE;
1085
1086 SystemTime.wYear = pTM->tm_year + 1900;
1087 SystemTime.wMonth = pTM->tm_mon + 1;
1088 SystemTime.wDay = pTM->tm_mday;
1089 SystemTime.wHour = pTM->tm_hour;
1090 SystemTime.wMinute = pTM->tm_min;
1091 SystemTime.wSecond = pTM->tm_sec;
1092 SystemTime.wMilliseconds = 0;
1093
1094 return SystemTimeToFileTime(&SystemTime, pFileTime);
1095}
1096
1097DllExport int
3b405fc5 1098win32_utime(const char *filename, struct utimbuf *times)
ad0751ec 1099{
1100 HANDLE handle;
1101 FILETIME ftCreate;
1102 FILETIME ftAccess;
1103 FILETIME ftWrite;
1104 struct utimbuf TimeBuffer;
1105
1106 int rc = utime(filename,times);
1107 /* EACCES: path specifies directory or readonly file */
1108 if (rc == 0 || errno != EACCES /* || !IsWinNT() */)
1109 return rc;
1110
1111 if (times == NULL) {
1112 times = &TimeBuffer;
1113 time(&times->actime);
1114 times->modtime = times->actime;
1115 }
1116
1117 /* This will (and should) still fail on readonly files */
1118 handle = CreateFile(filename, GENERIC_READ | GENERIC_WRITE,
1119 FILE_SHARE_READ | FILE_SHARE_DELETE, NULL,
1120 OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL);
1121 if (handle == INVALID_HANDLE_VALUE)
1122 return rc;
1123
1124 if (GetFileTime(handle, &ftCreate, &ftAccess, &ftWrite) &&
1125 filetime_from_time(&ftAccess, times->actime) &&
1126 filetime_from_time(&ftWrite, times->modtime) &&
1127 SetFileTime(handle, &ftCreate, &ftAccess, &ftWrite))
1128 {
1129 rc = 0;
1130 }
1131
1132 CloseHandle(handle);
1133 return rc;
1134}
1135
2d7a9237 1136DllExport int
f55ee38a 1137win32_waitpid(int pid, int *status, int flags)
1138{
1139 int rc;
1140 if (pid == -1)
1141 return win32_wait(status);
1142 else {
1143 rc = cwait(status, pid, WAIT_CHILD);
8f1e745d 1144 /* cwait() returns "correctly" on Borland */
1145#ifndef __BORLANDC__
f55ee38a 1146 if (status)
8f1e745d 1147 *status *= 256;
f55ee38a 1148#endif
1149 remove_dead_process((HANDLE)pid);
1150 }
1151 return rc >= 0 ? pid : rc;
1152}
1153
1154DllExport int
2d7a9237 1155win32_wait(int *status)
1156{
4b556e6c 1157#ifdef USE_RTL_WAIT
2d7a9237 1158 return wait(status);
1159#else
1160 /* XXX this wait emulation only knows about processes
1161 * spawned via win32_spawnvp(P_NOWAIT, ...).
1162 */
1163 int i, retval;
1164 DWORD exitcode, waitcode;
1165
1166 if (!w32_num_children) {
1167 errno = ECHILD;
1168 return -1;
1169 }
1170
1171 /* if a child exists, wait for it to die */
1172 waitcode = WaitForMultipleObjects(w32_num_children,
1173 w32_child_pids,
1174 FALSE,
1175 INFINITE);
1176 if (waitcode != WAIT_FAILED) {
1177 if (waitcode >= WAIT_ABANDONED_0
1178 && waitcode < WAIT_ABANDONED_0 + w32_num_children)
1179 i = waitcode - WAIT_ABANDONED_0;
1180 else
1181 i = waitcode - WAIT_OBJECT_0;
1182 if (GetExitCodeProcess(w32_child_pids[i], &exitcode) ) {
1183 CloseHandle(w32_child_pids[i]);
1184 *status = (int)((exitcode & 0xff) << 8);
1185 retval = (int)w32_child_pids[i];
1186 Copy(&w32_child_pids[i+1], &w32_child_pids[i],
1187 (w32_num_children-i-1), HANDLE);
1188 w32_num_children--;
1189 return retval;
1190 }
1191 }
1192
1193FAILED:
1194 errno = GetLastError();
1195 return -1;
1196
1197#endif
1198}
d55594ae 1199
2d7a9237 1200static UINT timerid = 0;
d55594ae 1201
1202static VOID CALLBACK TimerProc(HWND win, UINT msg, UINT id, DWORD time)
1203{
1204 KillTimer(NULL,timerid);
1205 timerid=0;
1206 sighandler(14);
1207}
1208
f3986ebb 1209DllExport unsigned int
1210win32_alarm(unsigned int sec)
0a753a76 1211{
d55594ae 1212 /*
1213 * the 'obvious' implentation is SetTimer() with a callback
1214 * which does whatever receiving SIGALRM would do
1215 * we cannot use SIGALRM even via raise() as it is not
1216 * one of the supported codes in <signal.h>
1217 *
1218 * Snag is unless something is looking at the message queue
1219 * nothing happens :-(
1220 */
1221 if (sec)
1222 {
1223 timerid = SetTimer(NULL,timerid,sec*1000,(TIMERPROC)TimerProc);
1224 if (!timerid)
1225 croak("Cannot set timer");
1226 }
1227 else
1228 {
1229 if (timerid)
1230 {
1231 KillTimer(NULL,timerid);
1232 timerid=0;
1233 }
1234 }
68dc0745 1235 return 0;
0a753a76 1236}
1237
ff95b63e 1238#if defined(HAVE_DES_FCRYPT) || defined(PERL_OBJECT)
26618a56 1239#ifdef HAVE_DES_FCRYPT
2d77217b 1240extern char * des_fcrypt(const char *txt, const char *salt, char *cbuf);
ff95b63e 1241#endif
26618a56 1242
1243DllExport char *
1244win32_crypt(const char *txt, const char *salt)
1245{
ff95b63e 1246#ifdef HAVE_DES_FCRYPT
26618a56 1247 dTHR;
2d77217b 1248 return des_fcrypt(txt, salt, crypt_buffer);
ff95b63e 1249#else
1250 die("The crypt() function is unimplemented due to excessive paranoia.");
b8957cf1 1251 return Nullch;
ff95b63e 1252#endif
26618a56 1253}
1254#endif
1255
f3986ebb 1256#ifdef USE_FIXED_OSFHANDLE
390b85e7 1257
1258EXTERN_C int __cdecl _alloc_osfhnd(void);
1259EXTERN_C int __cdecl _set_osfhnd(int fh, long value);
1260EXTERN_C void __cdecl _lock_fhandle(int);
1261EXTERN_C void __cdecl _unlock_fhandle(int);
1262EXTERN_C void __cdecl _unlock(int);
1263
1264#if (_MSC_VER >= 1000)
1265typedef struct {
1266 long osfhnd; /* underlying OS file HANDLE */
1267 char osfile; /* attributes of file (e.g., open in text mode?) */
1268 char pipech; /* one char buffer for handles opened on pipes */
1269#if defined (_MT) && !defined (DLL_FOR_WIN32S)
1270 int lockinitflag;
1271 CRITICAL_SECTION lock;
1272#endif /* defined (_MT) && !defined (DLL_FOR_WIN32S) */
1273} ioinfo;
1274
1275EXTERN_C ioinfo * __pioinfo[];
1276
1277#define IOINFO_L2E 5
1278#define IOINFO_ARRAY_ELTS (1 << IOINFO_L2E)
1279#define _pioinfo(i) (__pioinfo[i >> IOINFO_L2E] + (i & (IOINFO_ARRAY_ELTS - 1)))
1280#define _osfile(i) (_pioinfo(i)->osfile)
1281
1282#else /* (_MSC_VER >= 1000) */
1283extern char _osfile[];
1284#endif /* (_MSC_VER >= 1000) */
1285
1286#define FOPEN 0x01 /* file handle open */
1287#define FAPPEND 0x20 /* file handle opened O_APPEND */
1288#define FDEV 0x40 /* file handle refers to device */
1289#define FTEXT 0x80 /* file handle is in text mode */
1290
1291#define _STREAM_LOCKS 26 /* Table of stream locks */
1292#define _LAST_STREAM_LOCK (_STREAM_LOCKS+_NSTREAM_-1) /* Last stream lock */
1293#define _FH_LOCKS (_LAST_STREAM_LOCK+1) /* Table of fh locks */
1294
1295/***
1296*int my_open_osfhandle(long osfhandle, int flags) - open C Runtime file handle
1297*
1298*Purpose:
1299* This function allocates a free C Runtime file handle and associates
1300* it with the Win32 HANDLE specified by the first parameter. This is a
1301* temperary fix for WIN95's brain damage GetFileType() error on socket
1302* we just bypass that call for socket
1303*
1304*Entry:
1305* long osfhandle - Win32 HANDLE to associate with C Runtime file handle.
1306* int flags - flags to associate with C Runtime file handle.
1307*
1308*Exit:
1309* returns index of entry in fh, if successful
1310* return -1, if no free entry is found
1311*
1312*Exceptions:
1313*
1314*******************************************************************************/
1315
1316static int
1317my_open_osfhandle(long osfhandle, int flags)
1318{
1319 int fh;
1320 char fileflags; /* _osfile flags */
1321
1322 /* copy relevant flags from second parameter */
1323 fileflags = FDEV;
1324
9404a519 1325 if (flags & O_APPEND)
390b85e7 1326 fileflags |= FAPPEND;
1327
9404a519 1328 if (flags & O_TEXT)
390b85e7 1329 fileflags |= FTEXT;
1330
1331 /* attempt to allocate a C Runtime file handle */
9404a519 1332 if ((fh = _alloc_osfhnd()) == -1) {
390b85e7 1333 errno = EMFILE; /* too many open files */
1334 _doserrno = 0L; /* not an OS error */
1335 return -1; /* return error to caller */
1336 }
1337
1338 /* the file is open. now, set the info in _osfhnd array */
1339 _set_osfhnd(fh, osfhandle);
1340
1341 fileflags |= FOPEN; /* mark as open */
1342
1343#if (_MSC_VER >= 1000)
1344 _osfile(fh) = fileflags; /* set osfile entry */
1345 _unlock_fhandle(fh);
1346#else
1347 _osfile[fh] = fileflags; /* set osfile entry */
1348 _unlock(fh+_FH_LOCKS); /* unlock handle */
1349#endif
1350
1351 return fh; /* return handle */
1352}
1353
1354#define _open_osfhandle my_open_osfhandle
f3986ebb 1355#endif /* USE_FIXED_OSFHANDLE */
390b85e7 1356
1357/* simulate flock by locking a range on the file */
1358
1359#define LK_ERR(f,i) ((f) ? (i = 0) : (errno = GetLastError()))
1360#define LK_LEN 0xffff0000
1361
f3986ebb 1362DllExport int
1363win32_flock(int fd, int oper)
390b85e7 1364{
1365 OVERLAPPED o;
1366 int i = -1;
1367 HANDLE fh;
1368
f3986ebb 1369 if (!IsWinNT()) {
1370 croak("flock() unimplemented on this platform");
1371 return -1;
1372 }
390b85e7 1373 fh = (HANDLE)_get_osfhandle(fd);
1374 memset(&o, 0, sizeof(o));
1375
1376 switch(oper) {
1377 case LOCK_SH: /* shared lock */
1378 LK_ERR(LockFileEx(fh, 0, 0, LK_LEN, 0, &o),i);
1379 break;
1380 case LOCK_EX: /* exclusive lock */
1381 LK_ERR(LockFileEx(fh, LOCKFILE_EXCLUSIVE_LOCK, 0, LK_LEN, 0, &o),i);
1382 break;
1383 case LOCK_SH|LOCK_NB: /* non-blocking shared lock */
1384 LK_ERR(LockFileEx(fh, LOCKFILE_FAIL_IMMEDIATELY, 0, LK_LEN, 0, &o),i);
1385 break;
1386 case LOCK_EX|LOCK_NB: /* non-blocking exclusive lock */
1387 LK_ERR(LockFileEx(fh,
1388 LOCKFILE_EXCLUSIVE_LOCK|LOCKFILE_FAIL_IMMEDIATELY,
1389 0, LK_LEN, 0, &o),i);
1390 break;
1391 case LOCK_UN: /* unlock lock */
1392 LK_ERR(UnlockFileEx(fh, 0, LK_LEN, 0, &o),i);
1393 break;
1394 default: /* unknown */
1395 errno = EINVAL;
1396 break;
1397 }
1398 return i;
1399}
1400
1401#undef LK_ERR
1402#undef LK_LEN
1403
68dc0745 1404/*
1405 * redirected io subsystem for all XS modules
1406 *
1407 */
0a753a76 1408
68dc0745 1409DllExport int *
1410win32_errno(void)
0a753a76 1411{
390b85e7 1412 return (&errno);
0a753a76 1413}
1414
dcb2879a 1415DllExport char ***
1416win32_environ(void)
1417{
390b85e7 1418 return (&(_environ));
dcb2879a 1419}
1420
68dc0745 1421/* the rest are the remapped stdio routines */
1422DllExport FILE *
1423win32_stderr(void)
0a753a76 1424{
390b85e7 1425 return (stderr);
0a753a76 1426}
1427
68dc0745 1428DllExport FILE *
1429win32_stdin(void)
0a753a76 1430{
390b85e7 1431 return (stdin);
0a753a76 1432}
1433
68dc0745 1434DllExport FILE *
1435win32_stdout()
0a753a76 1436{
390b85e7 1437 return (stdout);
0a753a76 1438}
1439
68dc0745 1440DllExport int
1441win32_ferror(FILE *fp)
0a753a76 1442{
390b85e7 1443 return (ferror(fp));
0a753a76 1444}
1445
1446
68dc0745 1447DllExport int
1448win32_feof(FILE *fp)
0a753a76 1449{
390b85e7 1450 return (feof(fp));
0a753a76 1451}
1452
68dc0745 1453/*
1454 * Since the errors returned by the socket error function
1455 * WSAGetLastError() are not known by the library routine strerror
1456 * we have to roll our own.
1457 */
0a753a76 1458
68dc0745 1459DllExport char *
1460win32_strerror(int e)
0a753a76 1461{
3e3baf6d 1462#ifndef __BORLANDC__ /* Borland intolerance */
68dc0745 1463 extern int sys_nerr;
3e3baf6d 1464#endif
68dc0745 1465 DWORD source = 0;
0a753a76 1466
9404a519 1467 if (e < 0 || e > sys_nerr) {
c53bd28a 1468 dTHR;
9404a519 1469 if (e < 0)
68dc0745 1470 e = GetLastError();
0a753a76 1471
9404a519 1472 if (FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, &source, e, 0,
68dc0745 1473 strerror_buffer, sizeof(strerror_buffer), NULL) == 0)
1474 strcpy(strerror_buffer, "Unknown Error");
0a753a76 1475
68dc0745 1476 return strerror_buffer;
1477 }
390b85e7 1478 return strerror(e);
0a753a76 1479}
1480
22fae026 1481DllExport void
3730b96e 1482win32_str_os_error(void *sv, DWORD dwErr)
22fae026 1483{
1484 DWORD dwLen;
1485 char *sMsg;
1486 dwLen = FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER
1487 |FORMAT_MESSAGE_IGNORE_INSERTS
1488 |FORMAT_MESSAGE_FROM_SYSTEM, NULL,
1489 dwErr, 0, (char *)&sMsg, 1, NULL);
1490 if (0 < dwLen) {
1491 while (0 < dwLen && isspace(sMsg[--dwLen]))
1492 ;
1493 if ('.' != sMsg[dwLen])
1494 dwLen++;
1495 sMsg[dwLen]= '\0';
1496 }
1497 if (0 == dwLen) {
c69f6586 1498 sMsg = (char*)LocalAlloc(0, 64/**sizeof(TCHAR)*/);
22fae026 1499 dwLen = sprintf(sMsg,
1500 "Unknown error #0x%lX (lookup 0x%lX)",
1501 dwErr, GetLastError());
1502 }
3730b96e 1503 sv_setpvn((SV*)sv, sMsg, dwLen);
22fae026 1504 LocalFree(sMsg);
1505}
1506
1507
68dc0745 1508DllExport int
1509win32_fprintf(FILE *fp, const char *format, ...)
0a753a76 1510{
68dc0745 1511 va_list marker;
1512 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1513
390b85e7 1514 return (vfprintf(fp, format, marker));
0a753a76 1515}
1516
68dc0745 1517DllExport int
1518win32_printf(const char *format, ...)
0a753a76 1519{
68dc0745 1520 va_list marker;
1521 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1522
390b85e7 1523 return (vprintf(format, marker));
0a753a76 1524}
1525
68dc0745 1526DllExport int
1527win32_vfprintf(FILE *fp, const char *format, va_list args)
0a753a76 1528{
390b85e7 1529 return (vfprintf(fp, format, args));
0a753a76 1530}
1531
96e4d5b1 1532DllExport int
1533win32_vprintf(const char *format, va_list args)
1534{
390b85e7 1535 return (vprintf(format, args));
96e4d5b1 1536}
1537
68dc0745 1538DllExport size_t
1539win32_fread(void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1540{
390b85e7 1541 return fread(buf, size, count, fp);
0a753a76 1542}
1543
68dc0745 1544DllExport size_t
1545win32_fwrite(const void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1546{
390b85e7 1547 return fwrite(buf, size, count, fp);
0a753a76 1548}
1549
68dc0745 1550DllExport FILE *
1551win32_fopen(const char *filename, const char *mode)
0a753a76 1552{
68dc0745 1553 if (stricmp(filename, "/dev/null")==0)
390b85e7 1554 return fopen("NUL", mode);
1555 return fopen(filename, mode);
0a753a76 1556}
1557
f3986ebb 1558#ifndef USE_SOCKETS_AS_HANDLES
1559#undef fdopen
1560#define fdopen my_fdopen
1561#endif
1562
68dc0745 1563DllExport FILE *
1564win32_fdopen( int handle, const char *mode)
0a753a76 1565{
390b85e7 1566 return fdopen(handle, (char *) mode);
0a753a76 1567}
1568
68dc0745 1569DllExport FILE *
1570win32_freopen( const char *path, const char *mode, FILE *stream)
0a753a76 1571{
68dc0745 1572 if (stricmp(path, "/dev/null")==0)
390b85e7 1573 return freopen("NUL", mode, stream);
1574 return freopen(path, mode, stream);
0a753a76 1575}
1576
68dc0745 1577DllExport int
1578win32_fclose(FILE *pf)
0a753a76 1579{
f3986ebb 1580 return my_fclose(pf); /* defined in win32sck.c */
0a753a76 1581}
1582
68dc0745 1583DllExport int
1584win32_fputs(const char *s,FILE *pf)
0a753a76 1585{
390b85e7 1586 return fputs(s, pf);
0a753a76 1587}
1588
68dc0745 1589DllExport int
1590win32_fputc(int c,FILE *pf)
0a753a76 1591{
390b85e7 1592 return fputc(c,pf);
0a753a76 1593}
1594
68dc0745 1595DllExport int
1596win32_ungetc(int c,FILE *pf)
0a753a76 1597{
390b85e7 1598 return ungetc(c,pf);
0a753a76 1599}
1600
68dc0745 1601DllExport int
1602win32_getc(FILE *pf)
0a753a76 1603{
390b85e7 1604 return getc(pf);
0a753a76 1605}
1606
68dc0745 1607DllExport int
1608win32_fileno(FILE *pf)
0a753a76 1609{
390b85e7 1610 return fileno(pf);
0a753a76 1611}
1612
68dc0745 1613DllExport void
1614win32_clearerr(FILE *pf)
0a753a76 1615{
390b85e7 1616 clearerr(pf);
68dc0745 1617 return;
0a753a76 1618}
1619
68dc0745 1620DllExport int
1621win32_fflush(FILE *pf)
0a753a76 1622{
390b85e7 1623 return fflush(pf);
0a753a76 1624}
1625
68dc0745 1626DllExport long
1627win32_ftell(FILE *pf)
0a753a76 1628{
390b85e7 1629 return ftell(pf);
0a753a76 1630}
1631
68dc0745 1632DllExport int
1633win32_fseek(FILE *pf,long offset,int origin)
0a753a76 1634{
390b85e7 1635 return fseek(pf, offset, origin);
0a753a76 1636}
1637
68dc0745 1638DllExport int
1639win32_fgetpos(FILE *pf,fpos_t *p)
0a753a76 1640{
390b85e7 1641 return fgetpos(pf, p);
0a753a76 1642}
1643
68dc0745 1644DllExport int
1645win32_fsetpos(FILE *pf,const fpos_t *p)
0a753a76 1646{
390b85e7 1647 return fsetpos(pf, p);
0a753a76 1648}
1649
68dc0745 1650DllExport void
1651win32_rewind(FILE *pf)
0a753a76 1652{
390b85e7 1653 rewind(pf);
68dc0745 1654 return;
0a753a76 1655}
1656
68dc0745 1657DllExport FILE*
1658win32_tmpfile(void)
0a753a76 1659{
390b85e7 1660 return tmpfile();
0a753a76 1661}
1662
68dc0745 1663DllExport void
1664win32_abort(void)
0a753a76 1665{
390b85e7 1666 abort();
68dc0745 1667 return;
0a753a76 1668}
1669
68dc0745 1670DllExport int
22239a37 1671win32_fstat(int fd,struct stat *sbufptr)
0a753a76 1672{
22239a37 1673 return fstat(fd,sbufptr);
0a753a76 1674}
1675
68dc0745 1676DllExport int
1677win32_pipe(int *pfd, unsigned int size, int mode)
0a753a76 1678{
390b85e7 1679 return _pipe(pfd, size, mode);
0a753a76 1680}
1681
50892819 1682/*
1683 * a popen() clone that respects PERL5SHELL
1684 */
1685
68dc0745 1686DllExport FILE*
1687win32_popen(const char *command, const char *mode)
0a753a76 1688{
4b556e6c 1689#ifdef USE_RTL_POPEN
390b85e7 1690 return _popen(command, mode);
50892819 1691#else
1692 int p[2];
1693 int parent, child;
1694 int stdfd, oldfd;
1695 int ourmode;
1696 int childpid;
1697
1698 /* establish which ends read and write */
1699 if (strchr(mode,'w')) {
1700 stdfd = 0; /* stdin */
1701 parent = 1;
1702 child = 0;
1703 }
1704 else if (strchr(mode,'r')) {
1705 stdfd = 1; /* stdout */
1706 parent = 0;
1707 child = 1;
1708 }
1709 else
1710 return NULL;
1711
1712 /* set the correct mode */
1713 if (strchr(mode,'b'))
1714 ourmode = O_BINARY;
1715 else if (strchr(mode,'t'))
1716 ourmode = O_TEXT;
1717 else
1718 ourmode = _fmode & (O_TEXT | O_BINARY);
1719
1720 /* the child doesn't inherit handles */
1721 ourmode |= O_NOINHERIT;
1722
1723 if (win32_pipe( p, 512, ourmode) == -1)
1724 return NULL;
1725
1726 /* save current stdfd */
1727 if ((oldfd = win32_dup(stdfd)) == -1)
1728 goto cleanup;
1729
1730 /* make stdfd go to child end of pipe (implicitly closes stdfd) */
1731 /* stdfd will be inherited by the child */
1732 if (win32_dup2(p[child], stdfd) == -1)
1733 goto cleanup;
1734
1735 /* close the child end in parent */
1736 win32_close(p[child]);
1737
1738 /* start the child */
1739 if ((childpid = do_spawn_nowait((char*)command)) == -1)
1740 goto cleanup;
1741
1742 /* revert stdfd to whatever it was before */
1743 if (win32_dup2(oldfd, stdfd) == -1)
1744 goto cleanup;
1745
1746 /* close saved handle */
1747 win32_close(oldfd);
1748
4b556e6c 1749 sv_setiv(*av_fetch(w32_fdpid, p[parent], TRUE), childpid);
50892819 1750
1751 /* we have an fd, return a file stream */
1752 return (win32_fdopen(p[parent], (char *)mode));
1753
1754cleanup:
1755 /* we don't need to check for errors here */
1756 win32_close(p[0]);
1757 win32_close(p[1]);
1758 if (oldfd != -1) {
1759 win32_dup2(oldfd, stdfd);
1760 win32_close(oldfd);
1761 }
1762 return (NULL);
1763
4b556e6c 1764#endif /* USE_RTL_POPEN */
0a753a76 1765}
1766
50892819 1767/*
1768 * pclose() clone
1769 */
1770
68dc0745 1771DllExport int
1772win32_pclose(FILE *pf)
0a753a76 1773{
4b556e6c 1774#ifdef USE_RTL_POPEN
390b85e7 1775 return _pclose(pf);
50892819 1776#else
50892819 1777
e17cb2a9 1778 int childpid, status;
1779 SV *sv;
1780
4b556e6c 1781 sv = *av_fetch(w32_fdpid, win32_fileno(pf), TRUE);
e17cb2a9 1782 if (SvIOK(sv))
1783 childpid = SvIVX(sv);
1784 else
1785 childpid = 0;
50892819 1786
1787 if (!childpid) {
1788 errno = EBADF;
1789 return -1;
1790 }
1791
1792 win32_fclose(pf);
e17cb2a9 1793 SvIVX(sv) = 0;
1794
f55ee38a 1795 remove_dead_process((HANDLE)childpid);
50892819 1796
1797 /* wait for the child */
1798 if (cwait(&status, childpid, WAIT_CHILD) == -1)
1799 return (-1);
8f1e745d 1800 /* cwait() returns "correctly" on Borland */
1801#ifndef __BORLANDC__
1802 status *= 256;
50892819 1803#endif
8f1e745d 1804 return (status);
50892819 1805
4b556e6c 1806#endif /* USE_RTL_POPEN */
0a753a76 1807}
1808
68dc0745 1809DllExport int
8d9b2e3c 1810win32_rename(const char *oname, const char *newname)
e24c7c18 1811{
80252599 1812 /* XXX despite what the documentation says about MoveFileEx(),
1813 * it doesn't work under Windows95!
1814 */
1815 if (IsWinNT()) {
1816 if (!MoveFileEx(oname,newname,
1817 MOVEFILE_COPY_ALLOWED|MOVEFILE_REPLACE_EXISTING)) {
1818 DWORD err = GetLastError();
1819 switch (err) {
1820 case ERROR_BAD_NET_NAME:
1821 case ERROR_BAD_NETPATH:
1822 case ERROR_BAD_PATHNAME:
1823 case ERROR_FILE_NOT_FOUND:
1824 case ERROR_FILENAME_EXCED_RANGE:
1825 case ERROR_INVALID_DRIVE:
1826 case ERROR_NO_MORE_FILES:
1827 case ERROR_PATH_NOT_FOUND:
1828 errno = ENOENT;
1829 break;
1830 default:
1831 errno = EACCES;
1832 break;
1833 }
1834 return -1;
1835 }
1836 return 0;
e24c7c18 1837 }
80252599 1838 else {
1839 int retval = 0;
1840 char tmpname[MAX_PATH+1];
1841 char dname[MAX_PATH+1];
1842 char *endname = Nullch;
1843 STRLEN tmplen = 0;
1844 DWORD from_attr, to_attr;
1845
1846 /* if oname doesn't exist, do nothing */
1847 from_attr = GetFileAttributes(oname);
1848 if (from_attr == 0xFFFFFFFF) {
1849 errno = ENOENT;
1850 return -1;
1851 }
1852
1853 /* if newname exists, rename it to a temporary name so that we
1854 * don't delete it in case oname happens to be the same file
1855 * (but perhaps accessed via a different path)
1856 */
1857 to_attr = GetFileAttributes(newname);
1858 if (to_attr != 0xFFFFFFFF) {
1859 /* if newname is a directory, we fail
1860 * XXX could overcome this with yet more convoluted logic */
1861 if (to_attr & FILE_ATTRIBUTE_DIRECTORY) {
1862 errno = EACCES;
1863 return -1;
1864 }
1865 tmplen = strlen(newname);
1866 strcpy(tmpname,newname);
1867 endname = tmpname+tmplen;
1868 for (; endname > tmpname ; --endname) {
1869 if (*endname == '/' || *endname == '\\') {
1870 *endname = '\0';
1871 break;
1872 }
1873 }
1874 if (endname > tmpname)
1875 endname = strcpy(dname,tmpname);
e24c7c18 1876 else
80252599 1877 endname = ".";
1878
1879 /* get a temporary filename in same directory
1880 * XXX is this really the best we can do? */
1881 if (!GetTempFileName((LPCTSTR)endname, "plr", 0, tmpname)) {
1882 errno = ENOENT;
1883 return -1;
1884 }
1885 DeleteFile(tmpname);
1886
1887 retval = rename(newname, tmpname);
1888 if (retval != 0) {
1889 errno = EACCES;
1890 return retval;
e24c7c18 1891 }
1892 }
80252599 1893
1894 /* rename oname to newname */
1895 retval = rename(oname, newname);
1896
1897 /* if we created a temporary file before ... */
1898 if (endname != Nullch) {
1899 /* ...and rename succeeded, delete temporary file/directory */
1900 if (retval == 0)
1901 DeleteFile(tmpname);
1902 /* else restore it to what it was */
1903 else
1904 (void)rename(tmpname, newname);
1905 }
1906 return retval;
e24c7c18 1907 }
e24c7c18 1908}
1909
1910DllExport int
68dc0745 1911win32_setmode(int fd, int mode)
0a753a76 1912{
390b85e7 1913 return setmode(fd, mode);
0a753a76 1914}
1915
96e4d5b1 1916DllExport long
1917win32_lseek(int fd, long offset, int origin)
1918{
390b85e7 1919 return lseek(fd, offset, origin);
96e4d5b1 1920}
1921
1922DllExport long
1923win32_tell(int fd)
1924{
390b85e7 1925 return tell(fd);
96e4d5b1 1926}
1927
68dc0745 1928DllExport int
1929win32_open(const char *path, int flag, ...)
0a753a76 1930{
68dc0745 1931 va_list ap;
1932 int pmode;
0a753a76 1933
1934 va_start(ap, flag);
1935 pmode = va_arg(ap, int);
1936 va_end(ap);
1937
68dc0745 1938 if (stricmp(path, "/dev/null")==0)
390b85e7 1939 return open("NUL", flag, pmode);
1940 return open(path,flag,pmode);
0a753a76 1941}
1942
68dc0745 1943DllExport int
1944win32_close(int fd)
0a753a76 1945{
390b85e7 1946 return close(fd);
0a753a76 1947}
1948
68dc0745 1949DllExport int
96e4d5b1 1950win32_eof(int fd)
1951{
390b85e7 1952 return eof(fd);
96e4d5b1 1953}
1954
1955DllExport int
68dc0745 1956win32_dup(int fd)
0a753a76 1957{
390b85e7 1958 return dup(fd);
0a753a76 1959}
1960
68dc0745 1961DllExport int
1962win32_dup2(int fd1,int fd2)
0a753a76 1963{
390b85e7 1964 return dup2(fd1,fd2);
0a753a76 1965}
1966
68dc0745 1967DllExport int
3e3baf6d 1968win32_read(int fd, void *buf, unsigned int cnt)
0a753a76 1969{
390b85e7 1970 return read(fd, buf, cnt);
0a753a76 1971}
1972
68dc0745 1973DllExport int
3e3baf6d 1974win32_write(int fd, const void *buf, unsigned int cnt)
0a753a76 1975{
390b85e7 1976 return write(fd, buf, cnt);
0a753a76 1977}
1978
68dc0745 1979DllExport int
5aabfad6 1980win32_mkdir(const char *dir, int mode)
1981{
390b85e7 1982 return mkdir(dir); /* just ignore mode */
5aabfad6 1983}
96e4d5b1 1984
5aabfad6 1985DllExport int
1986win32_rmdir(const char *dir)
1987{
390b85e7 1988 return rmdir(dir);
5aabfad6 1989}
96e4d5b1 1990
5aabfad6 1991DllExport int
1992win32_chdir(const char *dir)
1993{
390b85e7 1994 return chdir(dir);
5aabfad6 1995}
96e4d5b1 1996
5aabfad6 1997DllExport int
3e3baf6d 1998win32_spawnvp(int mode, const char *cmdname, const char *const *argv)
0a753a76 1999{
2d7a9237 2000 int status;
2001
4b556e6c 2002#ifndef USE_RTL_WAIT
e17cb2a9 2003 if (mode == P_NOWAIT && w32_num_children >= MAXIMUM_WAIT_OBJECTS)
2004 return -1;
2005#endif
2006
2d7a9237 2007 status = spawnvp(mode, cmdname, (char * const *) argv);
4b556e6c 2008#ifndef USE_RTL_WAIT
2d7a9237 2009 /* XXX For the P_NOWAIT case, Borland RTL returns pinfo.dwProcessId
2010 * while VC RTL returns pinfo.hProcess. For purposes of the custom
2011 * implementation of win32_wait(), we assume the latter.
2012 */
2013 if (mode == P_NOWAIT && status >= 0)
2014 w32_child_pids[w32_num_children++] = (HANDLE)status;
2015#endif
2016 return status;
0a753a76 2017}
2018
6890e559 2019DllExport int
eb62e965 2020win32_execv(const char *cmdname, const char *const *argv)
2021{
2022 return execv(cmdname, (char *const *)argv);
2023}
2024
2025DllExport int
6890e559 2026win32_execvp(const char *cmdname, const char *const *argv)
2027{
390b85e7 2028 return execvp(cmdname, (char *const *)argv);
6890e559 2029}
2030
84902520 2031DllExport void
2032win32_perror(const char *str)
2033{
390b85e7 2034 perror(str);
84902520 2035}
2036
2037DllExport void
2038win32_setbuf(FILE *pf, char *buf)
2039{
390b85e7 2040 setbuf(pf, buf);
84902520 2041}
2042
2043DllExport int
2044win32_setvbuf(FILE *pf, char *buf, int type, size_t size)
2045{
390b85e7 2046 return setvbuf(pf, buf, type, size);
84902520 2047}
2048
2049DllExport int
2050win32_flushall(void)
2051{
390b85e7 2052 return flushall();
84902520 2053}
2054
2055DllExport int
2056win32_fcloseall(void)
2057{
390b85e7 2058 return fcloseall();
84902520 2059}
2060
2061DllExport char*
2062win32_fgets(char *s, int n, FILE *pf)
2063{
390b85e7 2064 return fgets(s, n, pf);
84902520 2065}
2066
2067DllExport char*
2068win32_gets(char *s)
2069{
390b85e7 2070 return gets(s);
84902520 2071}
2072
2073DllExport int
2074win32_fgetc(FILE *pf)
2075{
390b85e7 2076 return fgetc(pf);
84902520 2077}
2078
2079DllExport int
2080win32_putc(int c, FILE *pf)
2081{
390b85e7 2082 return putc(c,pf);
84902520 2083}
2084
2085DllExport int
2086win32_puts(const char *s)
2087{
390b85e7 2088 return puts(s);
84902520 2089}
2090
2091DllExport int
2092win32_getchar(void)
2093{
390b85e7 2094 return getchar();
84902520 2095}
2096
2097DllExport int
2098win32_putchar(int c)
2099{
390b85e7 2100 return putchar(c);
84902520 2101}
2102
bbc8f9de 2103#ifdef MYMALLOC
2104
2105#ifndef USE_PERL_SBRK
2106
2107static char *committed = NULL;
2108static char *base = NULL;
2109static char *reserved = NULL;
2110static char *brk = NULL;
2111static DWORD pagesize = 0;
2112static DWORD allocsize = 0;
2113
2114void *
2115sbrk(int need)
2116{
2117 void *result;
2118 if (!pagesize)
2119 {SYSTEM_INFO info;
2120 GetSystemInfo(&info);
2121 /* Pretend page size is larger so we don't perpetually
2122 * call the OS to commit just one page ...
2123 */
2124 pagesize = info.dwPageSize << 3;
2125 allocsize = info.dwAllocationGranularity;
2126 }
2127 /* This scheme fails eventually if request for contiguous
2128 * block is denied so reserve big blocks - this is only
2129 * address space not memory ...
2130 */
2131 if (brk+need >= reserved)
2132 {
2133 DWORD size = 64*1024*1024;
2134 char *addr;
2135 if (committed && reserved && committed < reserved)
2136 {
2137 /* Commit last of previous chunk cannot span allocations */
161b471a 2138 addr = (char *) VirtualAlloc(committed,reserved-committed,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de 2139 if (addr)
2140 committed = reserved;
2141 }
2142 /* Reserve some (more) space
2143 * Note this is a little sneaky, 1st call passes NULL as reserved
2144 * so lets system choose where we start, subsequent calls pass
2145 * the old end address so ask for a contiguous block
2146 */
161b471a 2147 addr = (char *) VirtualAlloc(reserved,size,MEM_RESERVE,PAGE_NOACCESS);
bbc8f9de 2148 if (addr)
2149 {
2150 reserved = addr+size;
2151 if (!base)
2152 base = addr;
2153 if (!committed)
2154 committed = base;
2155 if (!brk)
2156 brk = committed;
2157 }
2158 else
2159 {
2160 return (void *) -1;
2161 }
2162 }
2163 result = brk;
2164 brk += need;
2165 if (brk > committed)
2166 {
2167 DWORD size = ((brk-committed + pagesize -1)/pagesize) * pagesize;
161b471a 2168 char *addr = (char *) VirtualAlloc(committed,size,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de 2169 if (addr)
2170 {
2171 committed += size;
2172 }
2173 else
2174 return (void *) -1;
2175 }
2176 return result;
2177}
2178
2179#endif
2180#endif
2181
84902520 2182DllExport void*
2183win32_malloc(size_t size)
2184{
390b85e7 2185 return malloc(size);
84902520 2186}
2187
2188DllExport void*
2189win32_calloc(size_t numitems, size_t size)
2190{
390b85e7 2191 return calloc(numitems,size);
84902520 2192}
2193
2194DllExport void*
2195win32_realloc(void *block, size_t size)
2196{
390b85e7 2197 return realloc(block,size);
84902520 2198}
2199
2200DllExport void
2201win32_free(void *block)
2202{
390b85e7 2203 free(block);
84902520 2204}
2205
bbc8f9de 2206
68dc0745 2207int
65e48ea9 2208win32_open_osfhandle(long handle, int flags)
0a753a76 2209{
390b85e7 2210 return _open_osfhandle(handle, flags);
0a753a76 2211}
2212
68dc0745 2213long
65e48ea9 2214win32_get_osfhandle(int fd)
0a753a76 2215{
390b85e7 2216 return _get_osfhandle(fd);
0a753a76 2217}
7bac28a0 2218
7bac28a0 2219/*
2220 * Extras.
2221 */
2222
ad2e33dc 2223static
2224XS(w32_GetCwd)
2225{
2226 dXSARGS;
2227 SV *sv = sv_newmortal();
2228 /* Make one call with zero size - return value is required size */
2229 DWORD len = GetCurrentDirectory((DWORD)0,NULL);
2230 SvUPGRADE(sv,SVt_PV);
2231 SvGROW(sv,len);
2232 SvCUR(sv) = GetCurrentDirectory((DWORD) SvLEN(sv), SvPVX(sv));
2233 /*
2234 * If result != 0
2235 * then it worked, set PV valid,
2236 * else leave it 'undef'
2237 */
2238 if (SvCUR(sv))
2239 SvPOK_on(sv);
50892819 2240 EXTEND(SP,1);
ad2e33dc 2241 ST(0) = sv;
2242 XSRETURN(1);
2243}
2244
2245static
2246XS(w32_SetCwd)
2247{
2248 dXSARGS;
2d8e6c8d 2249 STRLEN n_a;
ad2e33dc 2250 if (items != 1)
2251 croak("usage: Win32::SetCurrentDirectory($cwd)");
2d8e6c8d 2252 if (SetCurrentDirectory(SvPV(ST(0),n_a)))
ad2e33dc 2253 XSRETURN_YES;
2254
2255 XSRETURN_NO;
2256}
2257
2258static
2259XS(w32_GetNextAvailDrive)
2260{
2261 dXSARGS;
2262 char ix = 'C';
2263 char root[] = "_:\\";
2264 while (ix <= 'Z') {
2265 root[0] = ix++;
2266 if (GetDriveType(root) == 1) {
2267 root[2] = '\0';
2268 XSRETURN_PV(root);
2269 }
2270 }
2271 XSRETURN_UNDEF;
2272}
2273
2274static
2275XS(w32_GetLastError)
2276{
2277 dXSARGS;
2278 XSRETURN_IV(GetLastError());
2279}
2280
2281static
ca135624 2282XS(w32_SetLastError)
2283{
2284 dXSARGS;
2285 if (items != 1)
2286 croak("usage: Win32::SetLastError($error)");
2287 SetLastError(SvIV(ST(0)));
2288 XSRETURN_UNDEF;
2289}
2290
2291static
ad2e33dc 2292XS(w32_LoginName)
2293{
2294 dXSARGS;
e34ffe5a 2295 char *name = getlogin_buffer;
2296 DWORD size = sizeof(getlogin_buffer);
ad2e33dc 2297 if (GetUserName(name,&size)) {
2298 /* size includes NULL */
2299 ST(0) = sv_2mortal(newSVpv(name,size-1));
2300 XSRETURN(1);
2301 }
2302 XSRETURN_UNDEF;
2303}
2304
2305static
2306XS(w32_NodeName)
2307{
2308 dXSARGS;
2309 char name[MAX_COMPUTERNAME_LENGTH+1];
2310 DWORD size = sizeof(name);
2311 if (GetComputerName(name,&size)) {
2312 /* size does NOT include NULL :-( */
2313 ST(0) = sv_2mortal(newSVpv(name,size));
2314 XSRETURN(1);
2315 }
2316 XSRETURN_UNDEF;
2317}
2318
2319
2320static
2321XS(w32_DomainName)
2322{
2323 dXSARGS;
8c9208bc 2324#ifndef HAS_NETWKSTAGETINFO
2325 /* mingw32 (and Win95) don't have NetWksta*(), so do it the old way */
ad2e33dc 2326 char name[256];
2327 DWORD size = sizeof(name);
2328 if (GetUserName(name,&size)) {
2329 char sid[1024];
2330 DWORD sidlen = sizeof(sid);
2331 char dname[256];
2332 DWORD dnamelen = sizeof(dname);
2333 SID_NAME_USE snu;
db15561c 2334 if (LookupAccountName(NULL, name, (PSID)&sid, &sidlen,
ad2e33dc 2335 dname, &dnamelen, &snu)) {
2336 XSRETURN_PV(dname); /* all that for this */
2337 }
2338 }
e56670dd 2339#else
8c9208bc 2340 /* this way is more reliable, in case user has a local account.
2341 * XXX need dynamic binding of netapi32.dll symbols or this will fail on
2342 * Win95. Probably makes more sense to move it into libwin32. */
9404a519 2343 char dname[256];
2344 DWORD dnamelen = sizeof(dname);
0a2408cf 2345 PWKSTA_INFO_100 pwi;
2346 if (NERR_Success == NetWkstaGetInfo(NULL, 100, (LPBYTE*)&pwi)) {
2347 if (pwi->wki100_langroup && *(pwi->wki100_langroup)) {
2348 WideCharToMultiByte(CP_ACP, NULL, pwi->wki100_langroup,
2349 -1, (LPSTR)dname, dnamelen, NULL, NULL);
2350 }
2351 else {
2352 WideCharToMultiByte(CP_ACP, NULL, pwi->wki100_computername,
2353 -1, (LPSTR)dname, dnamelen, NULL, NULL);
2354 }
2355 NetApiBufferFree(pwi);
9404a519 2356 XSRETURN_PV(dname);
2357 }
e56670dd 2358#endif
ad2e33dc 2359 XSRETURN_UNDEF;
2360}
2361
2362static
2363XS(w32_FsType)
2364{
2365 dXSARGS;
2366 char fsname[256];
2367 DWORD flags, filecomplen;
2368 if (GetVolumeInformation(NULL, NULL, 0, NULL, &filecomplen,
2369 &flags, fsname, sizeof(fsname))) {
2370 if (GIMME == G_ARRAY) {
2371 XPUSHs(sv_2mortal(newSVpv(fsname,0)));
2372 XPUSHs(sv_2mortal(newSViv(flags)));
2373 XPUSHs(sv_2mortal(newSViv(filecomplen)));
2374 PUTBACK;
2375 return;
2376 }
2377 XSRETURN_PV(fsname);
2378 }
2379 XSRETURN_UNDEF;
2380}
2381
2382static
2383XS(w32_GetOSVersion)
2384{
2385 dXSARGS;
2386 OSVERSIONINFO osver;
2387
2388 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
2389 if (GetVersionEx(&osver)) {
2390 XPUSHs(newSVpv(osver.szCSDVersion, 0));
2391 XPUSHs(newSViv(osver.dwMajorVersion));
2392 XPUSHs(newSViv(osver.dwMinorVersion));
2393 XPUSHs(newSViv(osver.dwBuildNumber));
2394 XPUSHs(newSViv(osver.dwPlatformId));
2395 PUTBACK;
2396 return;
2397 }
2398 XSRETURN_UNDEF;
2399}
2400
2401static
2402XS(w32_IsWinNT)
2403{
2404 dXSARGS;
2405 XSRETURN_IV(IsWinNT());
2406}
2407
2408static
2409XS(w32_IsWin95)
2410{
2411 dXSARGS;
2412 XSRETURN_IV(IsWin95());
2413}
2414
2415static
2416XS(w32_FormatMessage)
2417{
2418 dXSARGS;
2419 DWORD source = 0;
2420 char msgbuf[1024];
2421
2422 if (items != 1)
2423 croak("usage: Win32::FormatMessage($errno)");
2424
2425 if (FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM,
2426 &source, SvIV(ST(0)), 0,
2427 msgbuf, sizeof(msgbuf)-1, NULL))
2428 XSRETURN_PV(msgbuf);
2429
2430 XSRETURN_UNDEF;
2431}
2432
2433static
2434XS(w32_Spawn)
2435{
2436 dXSARGS;
2437 char *cmd, *args;
2438 PROCESS_INFORMATION stProcInfo;
2439 STARTUPINFO stStartInfo;
2440 BOOL bSuccess = FALSE;
2d8e6c8d 2441 STRLEN n_a;
ad2e33dc 2442
9404a519 2443 if (items != 3)
ad2e33dc 2444 croak("usage: Win32::Spawn($cmdName, $args, $PID)");
2445
80252599 2446 cmd = SvPV(ST(0),n_a);
2d8e6c8d 2447 args = SvPV(ST(1), n_a);
ad2e33dc 2448
2449 memset(&stStartInfo, 0, sizeof(stStartInfo)); /* Clear the block */
2450 stStartInfo.cb = sizeof(stStartInfo); /* Set the structure size */
2451 stStartInfo.dwFlags = STARTF_USESHOWWINDOW; /* Enable wShowWindow control */
2452 stStartInfo.wShowWindow = SW_SHOWMINNOACTIVE; /* Start min (normal) */
2453
9404a519 2454 if (CreateProcess(
ad2e33dc 2455 cmd, /* Image path */
2456 args, /* Arguments for command line */
2457 NULL, /* Default process security */
2458 NULL, /* Default thread security */
2459 FALSE, /* Must be TRUE to use std handles */
2460 NORMAL_PRIORITY_CLASS, /* No special scheduling */
2461 NULL, /* Inherit our environment block */
2462 NULL, /* Inherit our currrent directory */
2463 &stStartInfo, /* -> Startup info */
2464 &stProcInfo)) /* <- Process info (if OK) */
2465 {
2466 CloseHandle(stProcInfo.hThread);/* library source code does this. */
2467 sv_setiv(ST(2), stProcInfo.dwProcessId);
2468 bSuccess = TRUE;
2469 }
2470 XSRETURN_IV(bSuccess);
2471}
2472
2473static
2474XS(w32_GetTickCount)
2475{
2476 dXSARGS;
2477 XSRETURN_IV(GetTickCount());
2478}
2479
2480static
2481XS(w32_GetShortPathName)
2482{
2483 dXSARGS;
2484 SV *shortpath;
e8bab181 2485 DWORD len;
ad2e33dc 2486
9404a519 2487 if (items != 1)
ad2e33dc 2488 croak("usage: Win32::GetShortPathName($longPathName)");
2489
2490 shortpath = sv_mortalcopy(ST(0));
2491 SvUPGRADE(shortpath, SVt_PV);
2492 /* src == target is allowed */
e8bab181 2493 do {
2494 len = GetShortPathName(SvPVX(shortpath),
2495 SvPVX(shortpath),
2496 SvLEN(shortpath));
2497 } while (len >= SvLEN(shortpath) && sv_grow(shortpath,len+1));
2498 if (len) {
2499 SvCUR_set(shortpath,len);
ad2e33dc 2500 ST(0) = shortpath;
e8bab181 2501 }
ad2e33dc 2502 else
6b88bc9c 2503 ST(0) = &PL_sv_undef;
ad2e33dc 2504 XSRETURN(1);
2505}
2506
ad0751ec 2507static
ca135624 2508XS(w32_GetFullPathName)
2509{
2510 dXSARGS;
2511 SV *filename;
2512 SV *fullpath;
2513 char *filepart;
2514 DWORD len;
2515
2516 if (items != 1)
2517 croak("usage: Win32::GetFullPathName($filename)");
2518
2519 filename = ST(0);
2520 fullpath = sv_mortalcopy(filename);
2521 SvUPGRADE(fullpath, SVt_PV);
2522 do {
2523 len = GetFullPathName(SvPVX(filename),
2524 SvLEN(fullpath),
2525 SvPVX(fullpath),
2526 &filepart);
2527 } while (len >= SvLEN(fullpath) && sv_grow(fullpath,len+1));
2528 if (len) {
2529 if (GIMME_V == G_ARRAY) {
2530 EXTEND(SP,1);
2531 ST(1) = sv_2mortal(newSVpv(filepart,0));
2532 len = filepart - SvPVX(fullpath);
2533 items = 2;
2534 }
2535 SvCUR_set(fullpath,len);
2536 ST(0) = fullpath;
2537 }
2538 else
2539 ST(0) = &PL_sv_undef;
2540 XSRETURN(items);
2541}
2542
2543static
ad0751ec 2544XS(w32_Sleep)
2545{
2546 dXSARGS;
2547 if (items != 1)
2548 croak("usage: Win32::Sleep($milliseconds)");
2549 Sleep(SvIV(ST(0)));
2550 XSRETURN_YES;
2551}
2552
ad2e33dc 2553void
f3986ebb 2554Perl_init_os_extras()
ad2e33dc 2555{
2556 char *file = __FILE__;
2557 dXSUB_SYS;
2558
4b556e6c 2559 w32_perlshell_tokens = Nullch;
2560 w32_perlshell_items = -1;
2561 w32_fdpid = newAV(); /* XXX needs to be in Perl_win32_init()? */
2562#ifndef USE_RTL_WAIT
2563 w32_num_children = 0;
2564#endif
2565
ad2e33dc 2566 /* these names are Activeware compatible */
2567 newXS("Win32::GetCwd", w32_GetCwd, file);
2568 newXS("Win32::SetCwd", w32_SetCwd, file);
2569 newXS("Win32::GetNextAvailDrive", w32_GetNextAvailDrive, file);
2570 newXS("Win32::GetLastError", w32_GetLastError, file);
ca135624 2571 newXS("Win32::SetLastError", w32_SetLastError, file);
ad2e33dc 2572 newXS("Win32::LoginName", w32_LoginName, file);
2573 newXS("Win32::NodeName", w32_NodeName, file);
2574 newXS("Win32::DomainName", w32_DomainName, file);
2575 newXS("Win32::FsType", w32_FsType, file);
2576 newXS("Win32::GetOSVersion", w32_GetOSVersion, file);
2577 newXS("Win32::IsWinNT", w32_IsWinNT, file);
2578 newXS("Win32::IsWin95", w32_IsWin95, file);
2579 newXS("Win32::FormatMessage", w32_FormatMessage, file);
2580 newXS("Win32::Spawn", w32_Spawn, file);
2581 newXS("Win32::GetTickCount", w32_GetTickCount, file);
2582 newXS("Win32::GetShortPathName", w32_GetShortPathName, file);
ca135624 2583 newXS("Win32::GetFullPathName", w32_GetFullPathName, file);
ad0751ec 2584 newXS("Win32::Sleep", w32_Sleep, file);
ad2e33dc 2585
2586 /* XXX Bloat Alert! The following Activeware preloads really
2587 * ought to be part of Win32::Sys::*, so they're not included
2588 * here.
2589 */
2590 /* LookupAccountName
2591 * LookupAccountSID
2592 * InitiateSystemShutdown
2593 * AbortSystemShutdown
2594 * ExpandEnvrironmentStrings
2595 */
2596}
2597
2598void
2599Perl_win32_init(int *argcp, char ***argvp)
2600{
2601 /* Disable floating point errors, Perl will trap the ones we
2602 * care about. VC++ RTL defaults to switching these off
2603 * already, but the Borland RTL doesn't. Since we don't
2604 * want to be at the vendor's whim on the default, we set
2605 * it explicitly here.
2606 */
a835ef8a 2607#if !defined(_ALPHA_) && !defined(__GNUC__)
ad2e33dc 2608 _control87(MCW_EM, MCW_EM);
3dc9191e 2609#endif
4b556e6c 2610 MALLOC_INIT;
ad2e33dc 2611}
d55594ae 2612
a868473f 2613#ifdef USE_BINMODE_SCRIPTS
2614
2615void
2616win32_strip_return(SV *sv)
2617{
2618 char *s = SvPVX(sv);
2619 char *e = s+SvCUR(sv);
2620 char *d = s;
2621 while (s < e)
2622 {
2623 if (*s == '\r' && s[1] == '\n')
2624 {
2625 *d++ = '\n';
2626 s += 2;
2627 }
2628 else
2629 {
2630 *d++ = *s++;
2631 }
2632 }
2633 SvCUR_set(sv,d-SvPVX(sv));
2634}
2635
2636#endif