[asperl] integrate latest win32 branch
[p5sagit/p5-mst-13.2.git] / win32 / win32.c
CommitLineData
68dc0745 1/* WIN32.C
2 *
3 * (c) 1995 Microsoft Corporation. All rights reserved.
4 * Developed by hip communications inc., http://info.hip.com/info/
5 * Portions (c) 1993 Intergraph Corporation. All rights reserved.
6 *
7 * You may distribute under the terms of either the GNU General Public
8 * License or the Artistic License, as specified in the README file.
9 */
0a753a76 10
11#define WIN32_LEAN_AND_MEAN
12#define WIN32IO_IS_STDIO
13#include <tchar.h>
a835ef8a 14#ifdef __GNUC__
15#define Win32_Winsock
16#endif
0a753a76 17#include <windows.h>
18
68dc0745 19/* #include "config.h" */
0a753a76 20
21#define PERLIO_NOT_STDIO 0
22#if !defined(PERLIO_IS_STDIO) && !defined(USE_SFIO)
23#define PerlIO FILE
24#endif
25
26#include "EXTERN.h"
27#include "perl.h"
ad2e33dc 28#include "XSUB.h"
0a753a76 29#include <fcntl.h>
30#include <sys/stat.h>
5b0d9cbe 31#ifndef __GNUC__
32/* assert.h conflicts with #define of assert in perl.h */
0a753a76 33#include <assert.h>
5b0d9cbe 34#endif
0a753a76 35#include <string.h>
36#include <stdarg.h>
ad2e33dc 37#include <float.h>
ad0751ec 38#include <time.h>
3730b96e 39#if defined(_MSC_VER) || defined(__MINGW32__)
ad0751ec 40#include <sys/utime.h>
41#else
42#include <utime.h>
43#endif
0a753a76 44
5b0d9cbe 45#ifdef __GNUC__
46/* Mingw32 defaults to globing command line
47 * So we turn it off like this:
48 */
49int _CRT_glob = 0;
50#endif
51
6890e559 52#define EXECF_EXEC 1
53#define EXECF_SPAWN 2
54#define EXECF_SPAWN_NOWAIT 3
55
2d7a9237 56static DWORD os_id(void);
ce1da67e 57static void get_shell(void);
58static long tokenize(char *str, char **dest, char ***destv);
2d7a9237 59static int do_spawn2(char *cmd, int exectype);
60static BOOL has_redirection(char *ptr);
61static long filetime_to_clock(PFILETIME ft);
ad0751ec 62static BOOL filetime_from_time(PFILETIME ft, time_t t);
2d7a9237 63
ce1da67e 64char * w32_perlshell_tokens = Nullch;
65char ** w32_perlshell_vec;
66long w32_perlshell_items = -1;
2d7a9237 67DWORD w32_platform = (DWORD)-1;
2d7a9237 68char w32_perllib_root[MAX_PATH+1];
69HANDLE w32_perldll_handle = INVALID_HANDLE_VALUE;
70#ifndef __BORLANDC__
71long w32_num_children = 0;
72HANDLE w32_child_pids[MAXIMUM_WAIT_OBJECTS];
73#endif
0a753a76 74
26618a56 75#ifdef USE_THREADS
76# ifdef USE_DECLSPEC_THREAD
77__declspec(thread) char strerror_buffer[512];
e34ffe5a 78__declspec(thread) char getlogin_buffer[128];
26618a56 79# ifdef HAVE_DES_FCRYPT
80__declspec(thread) char crypt_buffer[30];
81# endif
82# else
83# define strerror_buffer (thr->i.Wstrerror_buffer)
e34ffe5a 84# define getlogin_buffer (thr->i.Wgetlogin_buffer)
26618a56 85# define crypt_buffer (thr->i.Wcrypt_buffer)
86# endif
87#else
88char strerror_buffer[512];
e34ffe5a 89char getlogin_buffer[128];
26618a56 90# ifdef HAVE_DES_FCRYPT
91char crypt_buffer[30];
92# endif
93#endif
94
3fe9a6f1 95int
96IsWin95(void) {
2d7a9237 97 return (os_id() == VER_PLATFORM_WIN32_WINDOWS);
3fe9a6f1 98}
99
100int
101IsWinNT(void) {
2d7a9237 102 return (os_id() == VER_PLATFORM_WIN32_NT);
3fe9a6f1 103}
0a753a76 104
68dc0745 105char *
2d7a9237 106win32_perllib_path(char *sfx,...)
68dc0745 107{
acbc2db6 108 va_list ap;
68dc0745 109 char *end;
acbc2db6 110 va_start(ap,sfx);
2d7a9237 111 GetModuleFileName((w32_perldll_handle == INVALID_HANDLE_VALUE)
68dc0745 112 ? GetModuleHandle(NULL)
2d7a9237 113 : w32_perldll_handle,
114 w32_perllib_root,
115 sizeof(w32_perllib_root));
116 *(end = strrchr(w32_perllib_root, '\\')) = '\0';
68dc0745 117 if (stricmp(end-4,"\\bin") == 0)
118 end -= 4;
119 strcpy(end,"\\lib");
acbc2db6 120 while (sfx)
121 {
122 strcat(end,"\\");
123 strcat(end,sfx);
124 sfx = va_arg(ap,char *);
125 }
126 va_end(ap);
2d7a9237 127 return (w32_perllib_root);
68dc0745 128}
0a753a76 129
b4793f7f 130
2d7a9237 131static BOOL
132has_redirection(char *ptr)
68dc0745 133{
134 int inquote = 0;
135 char quote = '\0';
136
137 /*
138 * Scan string looking for redirection (< or >) or pipe
139 * characters (|) that are not in a quoted string
140 */
141 while(*ptr) {
142 switch(*ptr) {
143 case '\'':
144 case '\"':
145 if(inquote) {
146 if(quote == *ptr) {
147 inquote = 0;
148 quote = '\0';
0a753a76 149 }
68dc0745 150 }
151 else {
152 quote = *ptr;
153 inquote++;
154 }
155 break;
156 case '>':
157 case '<':
158 case '|':
159 if(!inquote)
160 return TRUE;
161 default:
162 break;
0a753a76 163 }
68dc0745 164 ++ptr;
165 }
166 return FALSE;
0a753a76 167}
168
68dc0745 169/* since the current process environment is being updated in util.c
170 * the library functions will get the correct environment
171 */
172PerlIO *
173my_popen(char *cmd, char *mode)
0a753a76 174{
175#ifdef FIXCMD
68dc0745 176#define fixcmd(x) { \
177 char *pspace = strchr((x),' '); \
178 if (pspace) { \
179 char *p = (x); \
180 while (p < pspace) { \
181 if (*p == '/') \
182 *p = '\\'; \
183 p++; \
184 } \
185 } \
186 }
0a753a76 187#else
188#define fixcmd(x)
189#endif
68dc0745 190 fixcmd(cmd);
3e3baf6d 191#ifdef __BORLANDC__ /* workaround a Borland stdio bug */
192 win32_fflush(stdout);
193 win32_fflush(stderr);
194#endif
0a753a76 195 return win32_popen(cmd, mode);
0a753a76 196}
197
68dc0745 198long
199my_pclose(PerlIO *fp)
0a753a76 200{
201 return win32_pclose(fp);
202}
203
8b10511d 204static DWORD
2d7a9237 205os_id(void)
0a753a76 206{
8b10511d 207 static OSVERSIONINFO osver;
0a753a76 208
2d7a9237 209 if (osver.dwPlatformId != w32_platform) {
8b10511d 210 memset(&osver, 0, sizeof(OSVERSIONINFO));
211 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
212 GetVersionEx(&osver);
2d7a9237 213 w32_platform = osver.dwPlatformId;
8b10511d 214 }
2d7a9237 215 return (w32_platform);
0a753a76 216}
217
ce1da67e 218/* Tokenize a string. Words are null-separated, and the list
219 * ends with a doubled null. Any character (except null and
220 * including backslash) may be escaped by preceding it with a
221 * backslash (the backslash will be stripped).
222 * Returns number of words in result buffer.
223 */
224static long
225tokenize(char *str, char **dest, char ***destv)
226{
227 char *retstart = Nullch;
228 char **retvstart = 0;
229 int items = -1;
230 if (str) {
231 int slen = strlen(str);
232 register char *ret;
233 register char **retv;
234 New(1307, ret, slen+2, char);
235 New(1308, retv, (slen+3)/2, char*);
236
237 retstart = ret;
238 retvstart = retv;
239 *retv = ret;
240 items = 0;
241 while (*str) {
242 *ret = *str++;
243 if (*ret == '\\' && *str)
244 *ret = *str++;
245 else if (*ret == ' ') {
246 while (*str == ' ')
247 str++;
248 if (ret == retstart)
249 ret--;
250 else {
251 *ret = '\0';
252 ++items;
253 if (*str)
254 *++retv = ret+1;
255 }
256 }
257 else if (!*str)
258 ++items;
259 ret++;
260 }
261 retvstart[items] = Nullch;
262 *ret++ = '\0';
263 *ret = '\0';
264 }
265 *dest = retstart;
266 *destv = retvstart;
267 return items;
268}
269
270static void
2d7a9237 271get_shell(void)
0a753a76 272{
ce1da67e 273 if (!w32_perlshell_tokens) {
174c211a 274 /* we don't use COMSPEC here for two reasons:
275 * 1. the same reason perl on UNIX doesn't use SHELL--rampant and
276 * uncontrolled unportability of the ensuing scripts.
277 * 2. PERL5SHELL could be set to a shell that may not be fit for
278 * interactive use (which is what most programs look in COMSPEC
279 * for).
280 */
ce1da67e 281 char* defaultshell = (IsWinNT() ? "cmd.exe /x/c" : "command.com /c");
282 char *usershell = getenv("PERL5SHELL");
283 w32_perlshell_items = tokenize(usershell ? usershell : defaultshell,
284 &w32_perlshell_tokens,
285 &w32_perlshell_vec);
68dc0745 286 }
0a753a76 287}
288
68dc0745 289int
2d7a9237 290do_aspawn(void *vreally, void **vmark, void **vsp)
0a753a76 291{
2d7a9237 292 SV *really = (SV*)vreally;
293 SV **mark = (SV**)vmark;
294 SV **sp = (SV**)vsp;
68dc0745 295 char **argv;
2d7a9237 296 char *str;
68dc0745 297 int status;
2d7a9237 298 int flag = P_WAIT;
68dc0745 299 int index = 0;
68dc0745 300
2d7a9237 301 if (sp <= mark)
302 return -1;
68dc0745 303
ce1da67e 304 get_shell();
305 New(1306, argv, (sp - mark) + w32_perlshell_items + 2, char*);
2d7a9237 306
307 if (SvNIOKp(*(mark+1)) && !SvPOKp(*(mark+1))) {
308 ++mark;
309 flag = SvIVx(*mark);
68dc0745 310 }
311
2d7a9237 312 while(++mark <= sp) {
313 if (*mark && (str = SvPV(*mark, na)))
314 argv[index++] = str;
315 else
316 argv[index++] = "";
68dc0745 317 }
318 argv[index++] = 0;
319
2d7a9237 320 status = win32_spawnvp(flag,
321 (really ? SvPV(really,na) : argv[0]),
322 (const char* const*)argv);
323
324 if (status < 0 && errno == ENOEXEC) {
325 /* possible shell-builtin, invoke with shell */
ce1da67e 326 int sh_items;
327 sh_items = w32_perlshell_items;
2d7a9237 328 while (--index >= 0)
329 argv[index+sh_items] = argv[index];
ce1da67e 330 while (--sh_items >= 0)
331 argv[sh_items] = w32_perlshell_vec[sh_items];
2d7a9237 332
333 status = win32_spawnvp(flag,
334 (really ? SvPV(really,na) : argv[0]),
335 (const char* const*)argv);
336 }
68dc0745 337
5aabfad6 338 if (status < 0) {
339 if (dowarn)
2d7a9237 340 warn("Can't spawn \"%s\": %s", argv[0], strerror(errno));
341 status = 255 * 256;
5aabfad6 342 }
2d7a9237 343 else if (flag != P_NOWAIT)
344 status *= 256;
ce1da67e 345 Safefree(argv);
2d7a9237 346 return (statusvalue = status);
68dc0745 347}
348
2d7a9237 349static int
6890e559 350do_spawn2(char *cmd, int exectype)
68dc0745 351{
352 char **a;
353 char *s;
354 char **argv;
355 int status = -1;
356 BOOL needToTry = TRUE;
2d7a9237 357 char *cmd2;
68dc0745 358
2d7a9237 359 /* Save an extra exec if possible. See if there are shell
360 * metacharacters in it */
361 if(!has_redirection(cmd)) {
fc36a67e 362 New(1301,argv, strlen(cmd) / 2 + 2, char*);
363 New(1302,cmd2, strlen(cmd) + 1, char);
68dc0745 364 strcpy(cmd2, cmd);
365 a = argv;
366 for (s = cmd2; *s;) {
367 while (*s && isspace(*s))
368 s++;
369 if (*s)
370 *(a++) = s;
371 while(*s && !isspace(*s))
372 s++;
373 if(*s)
374 *s++ = '\0';
0a753a76 375 }
68dc0745 376 *a = Nullch;
ce1da67e 377 if (argv[0]) {
6890e559 378 switch (exectype) {
379 case EXECF_SPAWN:
380 status = win32_spawnvp(P_WAIT, argv[0],
381 (const char* const*)argv);
382 break;
383 case EXECF_SPAWN_NOWAIT:
384 status = win32_spawnvp(P_NOWAIT, argv[0],
385 (const char* const*)argv);
386 break;
387 case EXECF_EXEC:
388 status = win32_execvp(argv[0], (const char* const*)argv);
389 break;
390 }
2d7a9237 391 if (status != -1 || errno == 0)
68dc0745 392 needToTry = FALSE;
0a753a76 393 }
0a753a76 394 Safefree(argv);
68dc0745 395 Safefree(cmd2);
396 }
2d7a9237 397 if (needToTry) {
ce1da67e 398 char **argv;
399 int i = -1;
400 get_shell();
401 New(1306, argv, w32_perlshell_items + 2, char*);
402 while (++i < w32_perlshell_items)
403 argv[i] = w32_perlshell_vec[i];
2d7a9237 404 argv[i++] = cmd;
405 argv[i] = Nullch;
6890e559 406 switch (exectype) {
407 case EXECF_SPAWN:
408 status = win32_spawnvp(P_WAIT, argv[0],
409 (const char* const*)argv);
410 break;
411 case EXECF_SPAWN_NOWAIT:
412 status = win32_spawnvp(P_NOWAIT, argv[0],
413 (const char* const*)argv);
414 break;
415 case EXECF_EXEC:
416 status = win32_execvp(argv[0], (const char* const*)argv);
417 break;
418 }
ce1da67e 419 cmd = argv[0];
420 Safefree(argv);
68dc0745 421 }
5aabfad6 422 if (status < 0) {
423 if (dowarn)
6890e559 424 warn("Can't %s \"%s\": %s",
425 (exectype == EXECF_EXEC ? "exec" : "spawn"),
ce1da67e 426 cmd, strerror(errno));
2d7a9237 427 status = 255 * 256;
5aabfad6 428 }
2d7a9237 429 else if (exectype != EXECF_SPAWN_NOWAIT)
430 status *= 256;
431 return (statusvalue = status);
0a753a76 432}
433
6890e559 434int
435do_spawn(char *cmd)
436{
437 return do_spawn2(cmd, EXECF_SPAWN);
438}
439
2d7a9237 440int
441do_spawn_nowait(char *cmd)
442{
443 return do_spawn2(cmd, EXECF_SPAWN_NOWAIT);
444}
445
6890e559 446bool
447do_exec(char *cmd)
448{
449 do_spawn2(cmd, EXECF_EXEC);
450 return FALSE;
451}
452
0a753a76 453
454#define PATHLEN 1024
455
68dc0745 456/* The idea here is to read all the directory names into a string table
457 * (separated by nulls) and when one of the other dir functions is called
458 * return the pointer to the current file name.
459 */
460DIR *
461opendir(char *filename)
0a753a76 462{
463 DIR *p;
68dc0745 464 long len;
465 long idx;
466 char scannamespc[PATHLEN];
467 char *scanname = scannamespc;
468 struct stat sbuf;
469 WIN32_FIND_DATA FindData;
470 HANDLE fh;
471/* char root[_MAX_PATH];*/
472/* char volname[_MAX_PATH];*/
473/* DWORD serial, maxname, flags;*/
474/* BOOL downcase;*/
475/* char *dummy;*/
476
477 /* check to see if filename is a directory */
d55594ae 478 if (win32_stat(filename, &sbuf) < 0 || (sbuf.st_mode & S_IFDIR) == 0) {
c6c1a8fd 479 /* CRT is buggy on sharenames, so make sure it really isn't */
480 DWORD r = GetFileAttributes(filename);
481 if (r == 0xffffffff || !(r & FILE_ATTRIBUTE_DIRECTORY))
482 return NULL;
68dc0745 483 }
484
485 /* get the file system characteristics */
486/* if(GetFullPathName(filename, MAX_PATH, root, &dummy)) {
487 * if(dummy = strchr(root, '\\'))
488 * *++dummy = '\0';
489 * if(GetVolumeInformation(root, volname, MAX_PATH, &serial,
490 * &maxname, &flags, 0, 0)) {
491 * downcase = !(flags & FS_CASE_IS_PRESERVED);
492 * }
493 * }
494 * else {
495 * downcase = TRUE;
496 * }
497 */
498 /* Get us a DIR structure */
fc36a67e 499 Newz(1303, p, 1, DIR);
68dc0745 500 if(p == NULL)
501 return NULL;
502
503 /* Create the search pattern */
504 strcpy(scanname, filename);
505
506 if(index("/\\", *(scanname + strlen(scanname) - 1)) == NULL)
507 strcat(scanname, "/*");
508 else
509 strcat(scanname, "*");
510
511 /* do the FindFirstFile call */
512 fh = FindFirstFile(scanname, &FindData);
513 if(fh == INVALID_HANDLE_VALUE) {
514 return NULL;
515 }
516
517 /* now allocate the first part of the string table for
518 * the filenames that we find.
519 */
520 idx = strlen(FindData.cFileName)+1;
fc36a67e 521 New(1304, p->start, idx, char);
68dc0745 522 if(p->start == NULL) {
65e48ea9 523 croak("opendir: malloc failed!\n");
68dc0745 524 }
525 strcpy(p->start, FindData.cFileName);
526/* if(downcase)
527 * strlwr(p->start);
528 */
529 p->nfiles++;
530
531 /* loop finding all the files that match the wildcard
532 * (which should be all of them in this directory!).
533 * the variable idx should point one past the null terminator
534 * of the previous string found.
535 */
536 while (FindNextFile(fh, &FindData)) {
537 len = strlen(FindData.cFileName);
538 /* bump the string table size by enough for the
539 * new name and it's null terminator
540 */
541 Renew(p->start, idx+len+1, char);
542 if(p->start == NULL) {
65e48ea9 543 croak("opendir: malloc failed!\n");
0a753a76 544 }
68dc0745 545 strcpy(&p->start[idx], FindData.cFileName);
546/* if (downcase)
547 * strlwr(&p->start[idx]);
548 */
0a753a76 549 p->nfiles++;
550 idx += len+1;
551 }
552 FindClose(fh);
553 p->size = idx;
554 p->curr = p->start;
555 return p;
556}
557
558
68dc0745 559/* Readdir just returns the current string pointer and bumps the
560 * string pointer to the nDllExport entry.
561 */
562struct direct *
563readdir(DIR *dirp)
0a753a76 564{
68dc0745 565 int len;
566 static int dummy = 0;
0a753a76 567
68dc0745 568 if (dirp->curr) {
569 /* first set up the structure to return */
570 len = strlen(dirp->curr);
571 strcpy(dirp->dirstr.d_name, dirp->curr);
572 dirp->dirstr.d_namlen = len;
0a753a76 573
68dc0745 574 /* Fake an inode */
575 dirp->dirstr.d_ino = dummy++;
0a753a76 576
68dc0745 577 /* Now set up for the nDllExport call to readdir */
578 dirp->curr += len + 1;
579 if (dirp->curr >= (dirp->start + dirp->size)) {
580 dirp->curr = NULL;
581 }
0a753a76 582
68dc0745 583 return &(dirp->dirstr);
584 }
585 else
586 return NULL;
0a753a76 587}
588
68dc0745 589/* Telldir returns the current string pointer position */
590long
591telldir(DIR *dirp)
0a753a76 592{
593 return (long) dirp->curr;
594}
595
596
68dc0745 597/* Seekdir moves the string pointer to a previously saved position
598 *(Saved by telldir).
599 */
600void
601seekdir(DIR *dirp, long loc)
0a753a76 602{
603 dirp->curr = (char *)loc;
604}
605
68dc0745 606/* Rewinddir resets the string pointer to the start */
607void
608rewinddir(DIR *dirp)
0a753a76 609{
610 dirp->curr = dirp->start;
611}
612
68dc0745 613/* free the memory allocated by opendir */
614int
615closedir(DIR *dirp)
0a753a76 616{
617 Safefree(dirp->start);
618 Safefree(dirp);
68dc0745 619 return 1;
0a753a76 620}
621
622
68dc0745 623/*
624 * various stubs
625 */
0a753a76 626
627
68dc0745 628/* Ownership
629 *
630 * Just pretend that everyone is a superuser. NT will let us know if
631 * we don\'t really have permission to do something.
632 */
0a753a76 633
634#define ROOT_UID ((uid_t)0)
635#define ROOT_GID ((gid_t)0)
636
68dc0745 637uid_t
638getuid(void)
0a753a76 639{
68dc0745 640 return ROOT_UID;
0a753a76 641}
642
68dc0745 643uid_t
644geteuid(void)
0a753a76 645{
68dc0745 646 return ROOT_UID;
0a753a76 647}
648
68dc0745 649gid_t
650getgid(void)
0a753a76 651{
68dc0745 652 return ROOT_GID;
0a753a76 653}
654
68dc0745 655gid_t
656getegid(void)
0a753a76 657{
68dc0745 658 return ROOT_GID;
0a753a76 659}
660
68dc0745 661int
22239a37 662setuid(uid_t auid)
0a753a76 663{
22239a37 664 return (auid == ROOT_UID ? 0 : -1);
0a753a76 665}
666
68dc0745 667int
22239a37 668setgid(gid_t agid)
0a753a76 669{
22239a37 670 return (agid == ROOT_GID ? 0 : -1);
0a753a76 671}
672
e34ffe5a 673char *
674getlogin(void)
675{
676 dTHR;
677 char *buf = getlogin_buffer;
678 DWORD size = sizeof(getlogin_buffer);
679 if (GetUserName(buf,&size))
680 return buf;
681 return (char*)NULL;
682}
683
68dc0745 684/*
685 * pretended kill
686 */
687int
688kill(int pid, int sig)
0a753a76 689{
68dc0745 690 HANDLE hProcess= OpenProcess(PROCESS_ALL_ACCESS, TRUE, pid);
0a753a76 691
692 if (hProcess == NULL) {
65e48ea9 693 croak("kill process failed!\n");
68dc0745 694 }
695 else {
696 if (!TerminateProcess(hProcess, sig))
65e48ea9 697 croak("kill process failed!\n");
68dc0745 698 CloseHandle(hProcess);
699 }
700 return 0;
0a753a76 701}
702
68dc0745 703/*
704 * File system stuff
705 */
0a753a76 706
f3986ebb 707DllExport unsigned int
708win32_sleep(unsigned int t)
0a753a76 709{
68dc0745 710 Sleep(t*1000);
711 return 0;
0a753a76 712}
713
68dc0745 714DllExport int
715win32_stat(const char *path, struct stat *buffer)
0a753a76 716{
68dc0745 717 char t[MAX_PATH];
718 const char *p = path;
719 int l = strlen(path);
67fbe06e 720 int res;
0a753a76 721
68dc0745 722 if (l > 1) {
723 switch(path[l - 1]) {
724 case '\\':
725 case '/':
726 if (path[l - 2] != ':') {
727 strncpy(t, path, l - 1);
728 t[l - 1] = 0;
729 p = t;
730 };
731 }
732 }
390b85e7 733 res = stat(p,buffer);
67fbe06e 734#ifdef __BORLANDC__
735 if (res == 0) {
736 if (S_ISDIR(buffer->st_mode))
737 buffer->st_mode |= S_IWRITE | S_IEXEC;
738 else if (S_ISREG(buffer->st_mode)) {
739 if (l >= 4 && path[l-4] == '.') {
740 const char *e = path + l - 3;
741 if (strnicmp(e,"exe",3)
742 && strnicmp(e,"bat",3)
743 && strnicmp(e,"com",3)
744 && (IsWin95() || strnicmp(e,"cmd",3)))
745 buffer->st_mode &= ~S_IEXEC;
746 else
747 buffer->st_mode |= S_IEXEC;
748 }
749 else
750 buffer->st_mode &= ~S_IEXEC;
751 }
752 }
753#endif
754 return res;
0a753a76 755}
756
0551aaa8 757#ifndef USE_WIN32_RTL_ENV
758
759DllExport char *
760win32_getenv(const char *name)
761{
762 static char *curitem = Nullch;
763 static DWORD curlen = 512;
764 DWORD needlen;
765 if (!curitem)
766 New(1305,curitem,curlen,char);
767 if (!(needlen = GetEnvironmentVariable(name,curitem,curlen)))
768 return Nullch;
769 while (needlen > curlen) {
770 Renew(curitem,needlen,char);
771 curlen = needlen;
772 needlen = GetEnvironmentVariable(name,curitem,curlen);
773 }
774 return curitem;
775}
776
777#endif
778
d55594ae 779static long
2d7a9237 780filetime_to_clock(PFILETIME ft)
d55594ae 781{
782 __int64 qw = ft->dwHighDateTime;
783 qw <<= 32;
784 qw |= ft->dwLowDateTime;
785 qw /= 10000; /* File time ticks at 0.1uS, clock at 1mS */
786 return (long) qw;
787}
788
f3986ebb 789DllExport int
790win32_times(struct tms *timebuf)
0a753a76 791{
d55594ae 792 FILETIME user;
793 FILETIME kernel;
794 FILETIME dummy;
795 if (GetProcessTimes(GetCurrentProcess(), &dummy, &dummy,
796 &kernel,&user)) {
2d7a9237 797 timebuf->tms_utime = filetime_to_clock(&user);
798 timebuf->tms_stime = filetime_to_clock(&kernel);
d55594ae 799 timebuf->tms_cutime = 0;
800 timebuf->tms_cstime = 0;
801
802 } else {
803 /* That failed - e.g. Win95 fallback to clock() */
804 clock_t t = clock();
805 timebuf->tms_utime = t;
806 timebuf->tms_stime = 0;
807 timebuf->tms_cutime = 0;
808 timebuf->tms_cstime = 0;
809 }
68dc0745 810 return 0;
0a753a76 811}
812
ad0751ec 813/* fix utime() so it works on directories in NT
814 * thanks to Jan Dubois <jan.dubois@ibm.net>
815 */
816static BOOL
817filetime_from_time(PFILETIME pFileTime, time_t Time)
818{
819 struct tm *pTM = gmtime(&Time);
820 SYSTEMTIME SystemTime;
821
822 if (pTM == NULL)
823 return FALSE;
824
825 SystemTime.wYear = pTM->tm_year + 1900;
826 SystemTime.wMonth = pTM->tm_mon + 1;
827 SystemTime.wDay = pTM->tm_mday;
828 SystemTime.wHour = pTM->tm_hour;
829 SystemTime.wMinute = pTM->tm_min;
830 SystemTime.wSecond = pTM->tm_sec;
831 SystemTime.wMilliseconds = 0;
832
833 return SystemTimeToFileTime(&SystemTime, pFileTime);
834}
835
836DllExport int
3b405fc5 837win32_utime(const char *filename, struct utimbuf *times)
ad0751ec 838{
839 HANDLE handle;
840 FILETIME ftCreate;
841 FILETIME ftAccess;
842 FILETIME ftWrite;
843 struct utimbuf TimeBuffer;
844
845 int rc = utime(filename,times);
846 /* EACCES: path specifies directory or readonly file */
847 if (rc == 0 || errno != EACCES /* || !IsWinNT() */)
848 return rc;
849
850 if (times == NULL) {
851 times = &TimeBuffer;
852 time(&times->actime);
853 times->modtime = times->actime;
854 }
855
856 /* This will (and should) still fail on readonly files */
857 handle = CreateFile(filename, GENERIC_READ | GENERIC_WRITE,
858 FILE_SHARE_READ | FILE_SHARE_DELETE, NULL,
859 OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL);
860 if (handle == INVALID_HANDLE_VALUE)
861 return rc;
862
863 if (GetFileTime(handle, &ftCreate, &ftAccess, &ftWrite) &&
864 filetime_from_time(&ftAccess, times->actime) &&
865 filetime_from_time(&ftWrite, times->modtime) &&
866 SetFileTime(handle, &ftCreate, &ftAccess, &ftWrite))
867 {
868 rc = 0;
869 }
870
871 CloseHandle(handle);
872 return rc;
873}
874
2d7a9237 875DllExport int
876win32_wait(int *status)
877{
878#ifdef __BORLANDC__
879 return wait(status);
880#else
881 /* XXX this wait emulation only knows about processes
882 * spawned via win32_spawnvp(P_NOWAIT, ...).
883 */
884 int i, retval;
885 DWORD exitcode, waitcode;
886
887 if (!w32_num_children) {
888 errno = ECHILD;
889 return -1;
890 }
891
892 /* if a child exists, wait for it to die */
893 waitcode = WaitForMultipleObjects(w32_num_children,
894 w32_child_pids,
895 FALSE,
896 INFINITE);
897 if (waitcode != WAIT_FAILED) {
898 if (waitcode >= WAIT_ABANDONED_0
899 && waitcode < WAIT_ABANDONED_0 + w32_num_children)
900 i = waitcode - WAIT_ABANDONED_0;
901 else
902 i = waitcode - WAIT_OBJECT_0;
903 if (GetExitCodeProcess(w32_child_pids[i], &exitcode) ) {
904 CloseHandle(w32_child_pids[i]);
905 *status = (int)((exitcode & 0xff) << 8);
906 retval = (int)w32_child_pids[i];
907 Copy(&w32_child_pids[i+1], &w32_child_pids[i],
908 (w32_num_children-i-1), HANDLE);
909 w32_num_children--;
910 return retval;
911 }
912 }
913
914FAILED:
915 errno = GetLastError();
916 return -1;
917
918#endif
919}
d55594ae 920
2d7a9237 921static UINT timerid = 0;
d55594ae 922
923static VOID CALLBACK TimerProc(HWND win, UINT msg, UINT id, DWORD time)
924{
925 KillTimer(NULL,timerid);
926 timerid=0;
927 sighandler(14);
928}
929
f3986ebb 930DllExport unsigned int
931win32_alarm(unsigned int sec)
0a753a76 932{
d55594ae 933 /*
934 * the 'obvious' implentation is SetTimer() with a callback
935 * which does whatever receiving SIGALRM would do
936 * we cannot use SIGALRM even via raise() as it is not
937 * one of the supported codes in <signal.h>
938 *
939 * Snag is unless something is looking at the message queue
940 * nothing happens :-(
941 */
942 if (sec)
943 {
944 timerid = SetTimer(NULL,timerid,sec*1000,(TIMERPROC)TimerProc);
945 if (!timerid)
946 croak("Cannot set timer");
947 }
948 else
949 {
950 if (timerid)
951 {
952 KillTimer(NULL,timerid);
953 timerid=0;
954 }
955 }
68dc0745 956 return 0;
0a753a76 957}
958
26618a56 959#ifdef HAVE_DES_FCRYPT
960extern char * des_fcrypt(char *cbuf, const char *txt, const char *salt);
961
962DllExport char *
963win32_crypt(const char *txt, const char *salt)
964{
965 dTHR;
966 return des_fcrypt(crypt_buffer, txt, salt);
967}
968#endif
969
f3986ebb 970#ifdef USE_FIXED_OSFHANDLE
390b85e7 971
972EXTERN_C int __cdecl _alloc_osfhnd(void);
973EXTERN_C int __cdecl _set_osfhnd(int fh, long value);
974EXTERN_C void __cdecl _lock_fhandle(int);
975EXTERN_C void __cdecl _unlock_fhandle(int);
976EXTERN_C void __cdecl _unlock(int);
977
978#if (_MSC_VER >= 1000)
979typedef struct {
980 long osfhnd; /* underlying OS file HANDLE */
981 char osfile; /* attributes of file (e.g., open in text mode?) */
982 char pipech; /* one char buffer for handles opened on pipes */
983#if defined (_MT) && !defined (DLL_FOR_WIN32S)
984 int lockinitflag;
985 CRITICAL_SECTION lock;
986#endif /* defined (_MT) && !defined (DLL_FOR_WIN32S) */
987} ioinfo;
988
989EXTERN_C ioinfo * __pioinfo[];
990
991#define IOINFO_L2E 5
992#define IOINFO_ARRAY_ELTS (1 << IOINFO_L2E)
993#define _pioinfo(i) (__pioinfo[i >> IOINFO_L2E] + (i & (IOINFO_ARRAY_ELTS - 1)))
994#define _osfile(i) (_pioinfo(i)->osfile)
995
996#else /* (_MSC_VER >= 1000) */
997extern char _osfile[];
998#endif /* (_MSC_VER >= 1000) */
999
1000#define FOPEN 0x01 /* file handle open */
1001#define FAPPEND 0x20 /* file handle opened O_APPEND */
1002#define FDEV 0x40 /* file handle refers to device */
1003#define FTEXT 0x80 /* file handle is in text mode */
1004
1005#define _STREAM_LOCKS 26 /* Table of stream locks */
1006#define _LAST_STREAM_LOCK (_STREAM_LOCKS+_NSTREAM_-1) /* Last stream lock */
1007#define _FH_LOCKS (_LAST_STREAM_LOCK+1) /* Table of fh locks */
1008
1009/***
1010*int my_open_osfhandle(long osfhandle, int flags) - open C Runtime file handle
1011*
1012*Purpose:
1013* This function allocates a free C Runtime file handle and associates
1014* it with the Win32 HANDLE specified by the first parameter. This is a
1015* temperary fix for WIN95's brain damage GetFileType() error on socket
1016* we just bypass that call for socket
1017*
1018*Entry:
1019* long osfhandle - Win32 HANDLE to associate with C Runtime file handle.
1020* int flags - flags to associate with C Runtime file handle.
1021*
1022*Exit:
1023* returns index of entry in fh, if successful
1024* return -1, if no free entry is found
1025*
1026*Exceptions:
1027*
1028*******************************************************************************/
1029
1030static int
1031my_open_osfhandle(long osfhandle, int flags)
1032{
1033 int fh;
1034 char fileflags; /* _osfile flags */
1035
1036 /* copy relevant flags from second parameter */
1037 fileflags = FDEV;
1038
1039 if(flags & O_APPEND)
1040 fileflags |= FAPPEND;
1041
1042 if(flags & O_TEXT)
1043 fileflags |= FTEXT;
1044
1045 /* attempt to allocate a C Runtime file handle */
1046 if((fh = _alloc_osfhnd()) == -1) {
1047 errno = EMFILE; /* too many open files */
1048 _doserrno = 0L; /* not an OS error */
1049 return -1; /* return error to caller */
1050 }
1051
1052 /* the file is open. now, set the info in _osfhnd array */
1053 _set_osfhnd(fh, osfhandle);
1054
1055 fileflags |= FOPEN; /* mark as open */
1056
1057#if (_MSC_VER >= 1000)
1058 _osfile(fh) = fileflags; /* set osfile entry */
1059 _unlock_fhandle(fh);
1060#else
1061 _osfile[fh] = fileflags; /* set osfile entry */
1062 _unlock(fh+_FH_LOCKS); /* unlock handle */
1063#endif
1064
1065 return fh; /* return handle */
1066}
1067
1068#define _open_osfhandle my_open_osfhandle
f3986ebb 1069#endif /* USE_FIXED_OSFHANDLE */
390b85e7 1070
1071/* simulate flock by locking a range on the file */
1072
1073#define LK_ERR(f,i) ((f) ? (i = 0) : (errno = GetLastError()))
1074#define LK_LEN 0xffff0000
1075
f3986ebb 1076DllExport int
1077win32_flock(int fd, int oper)
390b85e7 1078{
1079 OVERLAPPED o;
1080 int i = -1;
1081 HANDLE fh;
1082
f3986ebb 1083 if (!IsWinNT()) {
1084 croak("flock() unimplemented on this platform");
1085 return -1;
1086 }
390b85e7 1087 fh = (HANDLE)_get_osfhandle(fd);
1088 memset(&o, 0, sizeof(o));
1089
1090 switch(oper) {
1091 case LOCK_SH: /* shared lock */
1092 LK_ERR(LockFileEx(fh, 0, 0, LK_LEN, 0, &o),i);
1093 break;
1094 case LOCK_EX: /* exclusive lock */
1095 LK_ERR(LockFileEx(fh, LOCKFILE_EXCLUSIVE_LOCK, 0, LK_LEN, 0, &o),i);
1096 break;
1097 case LOCK_SH|LOCK_NB: /* non-blocking shared lock */
1098 LK_ERR(LockFileEx(fh, LOCKFILE_FAIL_IMMEDIATELY, 0, LK_LEN, 0, &o),i);
1099 break;
1100 case LOCK_EX|LOCK_NB: /* non-blocking exclusive lock */
1101 LK_ERR(LockFileEx(fh,
1102 LOCKFILE_EXCLUSIVE_LOCK|LOCKFILE_FAIL_IMMEDIATELY,
1103 0, LK_LEN, 0, &o),i);
1104 break;
1105 case LOCK_UN: /* unlock lock */
1106 LK_ERR(UnlockFileEx(fh, 0, LK_LEN, 0, &o),i);
1107 break;
1108 default: /* unknown */
1109 errno = EINVAL;
1110 break;
1111 }
1112 return i;
1113}
1114
1115#undef LK_ERR
1116#undef LK_LEN
1117
68dc0745 1118/*
1119 * redirected io subsystem for all XS modules
1120 *
1121 */
0a753a76 1122
68dc0745 1123DllExport int *
1124win32_errno(void)
0a753a76 1125{
390b85e7 1126 return (&errno);
0a753a76 1127}
1128
dcb2879a 1129DllExport char ***
1130win32_environ(void)
1131{
390b85e7 1132 return (&(_environ));
dcb2879a 1133}
1134
68dc0745 1135/* the rest are the remapped stdio routines */
1136DllExport FILE *
1137win32_stderr(void)
0a753a76 1138{
390b85e7 1139 return (stderr);
0a753a76 1140}
1141
68dc0745 1142DllExport FILE *
1143win32_stdin(void)
0a753a76 1144{
390b85e7 1145 return (stdin);
0a753a76 1146}
1147
68dc0745 1148DllExport FILE *
1149win32_stdout()
0a753a76 1150{
390b85e7 1151 return (stdout);
0a753a76 1152}
1153
68dc0745 1154DllExport int
1155win32_ferror(FILE *fp)
0a753a76 1156{
390b85e7 1157 return (ferror(fp));
0a753a76 1158}
1159
1160
68dc0745 1161DllExport int
1162win32_feof(FILE *fp)
0a753a76 1163{
390b85e7 1164 return (feof(fp));
0a753a76 1165}
1166
68dc0745 1167/*
1168 * Since the errors returned by the socket error function
1169 * WSAGetLastError() are not known by the library routine strerror
1170 * we have to roll our own.
1171 */
0a753a76 1172
68dc0745 1173DllExport char *
1174win32_strerror(int e)
0a753a76 1175{
3e3baf6d 1176#ifndef __BORLANDC__ /* Borland intolerance */
68dc0745 1177 extern int sys_nerr;
3e3baf6d 1178#endif
68dc0745 1179 DWORD source = 0;
0a753a76 1180
68dc0745 1181 if(e < 0 || e > sys_nerr) {
c53bd28a 1182 dTHR;
68dc0745 1183 if(e < 0)
1184 e = GetLastError();
0a753a76 1185
68dc0745 1186 if(FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, &source, e, 0,
1187 strerror_buffer, sizeof(strerror_buffer), NULL) == 0)
1188 strcpy(strerror_buffer, "Unknown Error");
0a753a76 1189
68dc0745 1190 return strerror_buffer;
1191 }
390b85e7 1192 return strerror(e);
0a753a76 1193}
1194
22fae026 1195DllExport void
3730b96e 1196win32_str_os_error(void *sv, DWORD dwErr)
22fae026 1197{
1198 DWORD dwLen;
1199 char *sMsg;
1200 dwLen = FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER
1201 |FORMAT_MESSAGE_IGNORE_INSERTS
1202 |FORMAT_MESSAGE_FROM_SYSTEM, NULL,
1203 dwErr, 0, (char *)&sMsg, 1, NULL);
1204 if (0 < dwLen) {
1205 while (0 < dwLen && isspace(sMsg[--dwLen]))
1206 ;
1207 if ('.' != sMsg[dwLen])
1208 dwLen++;
1209 sMsg[dwLen]= '\0';
1210 }
1211 if (0 == dwLen) {
1212 sMsg = LocalAlloc(0, 64/**sizeof(TCHAR)*/);
1213 dwLen = sprintf(sMsg,
1214 "Unknown error #0x%lX (lookup 0x%lX)",
1215 dwErr, GetLastError());
1216 }
3730b96e 1217 sv_setpvn((SV*)sv, sMsg, dwLen);
22fae026 1218 LocalFree(sMsg);
1219}
1220
1221
68dc0745 1222DllExport int
1223win32_fprintf(FILE *fp, const char *format, ...)
0a753a76 1224{
68dc0745 1225 va_list marker;
1226 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1227
390b85e7 1228 return (vfprintf(fp, format, marker));
0a753a76 1229}
1230
68dc0745 1231DllExport int
1232win32_printf(const char *format, ...)
0a753a76 1233{
68dc0745 1234 va_list marker;
1235 va_start(marker, format); /* Initialize variable arguments. */
0a753a76 1236
390b85e7 1237 return (vprintf(format, marker));
0a753a76 1238}
1239
68dc0745 1240DllExport int
1241win32_vfprintf(FILE *fp, const char *format, va_list args)
0a753a76 1242{
390b85e7 1243 return (vfprintf(fp, format, args));
0a753a76 1244}
1245
96e4d5b1 1246DllExport int
1247win32_vprintf(const char *format, va_list args)
1248{
390b85e7 1249 return (vprintf(format, args));
96e4d5b1 1250}
1251
68dc0745 1252DllExport size_t
1253win32_fread(void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1254{
390b85e7 1255 return fread(buf, size, count, fp);
0a753a76 1256}
1257
68dc0745 1258DllExport size_t
1259win32_fwrite(const void *buf, size_t size, size_t count, FILE *fp)
0a753a76 1260{
390b85e7 1261 return fwrite(buf, size, count, fp);
0a753a76 1262}
1263
68dc0745 1264DllExport FILE *
1265win32_fopen(const char *filename, const char *mode)
0a753a76 1266{
68dc0745 1267 if (stricmp(filename, "/dev/null")==0)
390b85e7 1268 return fopen("NUL", mode);
1269 return fopen(filename, mode);
0a753a76 1270}
1271
f3986ebb 1272#ifndef USE_SOCKETS_AS_HANDLES
1273#undef fdopen
1274#define fdopen my_fdopen
1275#endif
1276
68dc0745 1277DllExport FILE *
1278win32_fdopen( int handle, const char *mode)
0a753a76 1279{
390b85e7 1280 return fdopen(handle, (char *) mode);
0a753a76 1281}
1282
68dc0745 1283DllExport FILE *
1284win32_freopen( const char *path, const char *mode, FILE *stream)
0a753a76 1285{
68dc0745 1286 if (stricmp(path, "/dev/null")==0)
390b85e7 1287 return freopen("NUL", mode, stream);
1288 return freopen(path, mode, stream);
0a753a76 1289}
1290
68dc0745 1291DllExport int
1292win32_fclose(FILE *pf)
0a753a76 1293{
f3986ebb 1294 return my_fclose(pf); /* defined in win32sck.c */
0a753a76 1295}
1296
68dc0745 1297DllExport int
1298win32_fputs(const char *s,FILE *pf)
0a753a76 1299{
390b85e7 1300 return fputs(s, pf);
0a753a76 1301}
1302
68dc0745 1303DllExport int
1304win32_fputc(int c,FILE *pf)
0a753a76 1305{
390b85e7 1306 return fputc(c,pf);
0a753a76 1307}
1308
68dc0745 1309DllExport int
1310win32_ungetc(int c,FILE *pf)
0a753a76 1311{
390b85e7 1312 return ungetc(c,pf);
0a753a76 1313}
1314
68dc0745 1315DllExport int
1316win32_getc(FILE *pf)
0a753a76 1317{
390b85e7 1318 return getc(pf);
0a753a76 1319}
1320
68dc0745 1321DllExport int
1322win32_fileno(FILE *pf)
0a753a76 1323{
390b85e7 1324 return fileno(pf);
0a753a76 1325}
1326
68dc0745 1327DllExport void
1328win32_clearerr(FILE *pf)
0a753a76 1329{
390b85e7 1330 clearerr(pf);
68dc0745 1331 return;
0a753a76 1332}
1333
68dc0745 1334DllExport int
1335win32_fflush(FILE *pf)
0a753a76 1336{
390b85e7 1337 return fflush(pf);
0a753a76 1338}
1339
68dc0745 1340DllExport long
1341win32_ftell(FILE *pf)
0a753a76 1342{
390b85e7 1343 return ftell(pf);
0a753a76 1344}
1345
68dc0745 1346DllExport int
1347win32_fseek(FILE *pf,long offset,int origin)
0a753a76 1348{
390b85e7 1349 return fseek(pf, offset, origin);
0a753a76 1350}
1351
68dc0745 1352DllExport int
1353win32_fgetpos(FILE *pf,fpos_t *p)
0a753a76 1354{
390b85e7 1355 return fgetpos(pf, p);
0a753a76 1356}
1357
68dc0745 1358DllExport int
1359win32_fsetpos(FILE *pf,const fpos_t *p)
0a753a76 1360{
390b85e7 1361 return fsetpos(pf, p);
0a753a76 1362}
1363
68dc0745 1364DllExport void
1365win32_rewind(FILE *pf)
0a753a76 1366{
390b85e7 1367 rewind(pf);
68dc0745 1368 return;
0a753a76 1369}
1370
68dc0745 1371DllExport FILE*
1372win32_tmpfile(void)
0a753a76 1373{
390b85e7 1374 return tmpfile();
0a753a76 1375}
1376
68dc0745 1377DllExport void
1378win32_abort(void)
0a753a76 1379{
390b85e7 1380 abort();
68dc0745 1381 return;
0a753a76 1382}
1383
68dc0745 1384DllExport int
22239a37 1385win32_fstat(int fd,struct stat *sbufptr)
0a753a76 1386{
22239a37 1387 return fstat(fd,sbufptr);
0a753a76 1388}
1389
68dc0745 1390DllExport int
1391win32_pipe(int *pfd, unsigned int size, int mode)
0a753a76 1392{
390b85e7 1393 return _pipe(pfd, size, mode);
0a753a76 1394}
1395
68dc0745 1396DllExport FILE*
1397win32_popen(const char *command, const char *mode)
0a753a76 1398{
390b85e7 1399 return _popen(command, mode);
0a753a76 1400}
1401
68dc0745 1402DllExport int
1403win32_pclose(FILE *pf)
0a753a76 1404{
390b85e7 1405 return _pclose(pf);
0a753a76 1406}
1407
68dc0745 1408DllExport int
1409win32_setmode(int fd, int mode)
0a753a76 1410{
390b85e7 1411 return setmode(fd, mode);
0a753a76 1412}
1413
96e4d5b1 1414DllExport long
1415win32_lseek(int fd, long offset, int origin)
1416{
390b85e7 1417 return lseek(fd, offset, origin);
96e4d5b1 1418}
1419
1420DllExport long
1421win32_tell(int fd)
1422{
390b85e7 1423 return tell(fd);
96e4d5b1 1424}
1425
68dc0745 1426DllExport int
1427win32_open(const char *path, int flag, ...)
0a753a76 1428{
68dc0745 1429 va_list ap;
1430 int pmode;
0a753a76 1431
1432 va_start(ap, flag);
1433 pmode = va_arg(ap, int);
1434 va_end(ap);
1435
68dc0745 1436 if (stricmp(path, "/dev/null")==0)
390b85e7 1437 return open("NUL", flag, pmode);
1438 return open(path,flag,pmode);
0a753a76 1439}
1440
68dc0745 1441DllExport int
1442win32_close(int fd)
0a753a76 1443{
390b85e7 1444 return close(fd);
0a753a76 1445}
1446
68dc0745 1447DllExport int
96e4d5b1 1448win32_eof(int fd)
1449{
390b85e7 1450 return eof(fd);
96e4d5b1 1451}
1452
1453DllExport int
68dc0745 1454win32_dup(int fd)
0a753a76 1455{
390b85e7 1456 return dup(fd);
0a753a76 1457}
1458
68dc0745 1459DllExport int
1460win32_dup2(int fd1,int fd2)
0a753a76 1461{
390b85e7 1462 return dup2(fd1,fd2);
0a753a76 1463}
1464
68dc0745 1465DllExport int
3e3baf6d 1466win32_read(int fd, void *buf, unsigned int cnt)
0a753a76 1467{
390b85e7 1468 return read(fd, buf, cnt);
0a753a76 1469}
1470
68dc0745 1471DllExport int
3e3baf6d 1472win32_write(int fd, const void *buf, unsigned int cnt)
0a753a76 1473{
390b85e7 1474 return write(fd, buf, cnt);
0a753a76 1475}
1476
68dc0745 1477DllExport int
5aabfad6 1478win32_mkdir(const char *dir, int mode)
1479{
390b85e7 1480 return mkdir(dir); /* just ignore mode */
5aabfad6 1481}
96e4d5b1 1482
5aabfad6 1483DllExport int
1484win32_rmdir(const char *dir)
1485{
390b85e7 1486 return rmdir(dir);
5aabfad6 1487}
96e4d5b1 1488
5aabfad6 1489DllExport int
1490win32_chdir(const char *dir)
1491{
390b85e7 1492 return chdir(dir);
5aabfad6 1493}
96e4d5b1 1494
5aabfad6 1495DllExport int
3e3baf6d 1496win32_spawnvp(int mode, const char *cmdname, const char *const *argv)
0a753a76 1497{
2d7a9237 1498 int status;
1499
1500 status = spawnvp(mode, cmdname, (char * const *) argv);
1501#ifndef __BORLANDC__
1502 /* XXX For the P_NOWAIT case, Borland RTL returns pinfo.dwProcessId
1503 * while VC RTL returns pinfo.hProcess. For purposes of the custom
1504 * implementation of win32_wait(), we assume the latter.
1505 */
1506 if (mode == P_NOWAIT && status >= 0)
1507 w32_child_pids[w32_num_children++] = (HANDLE)status;
1508#endif
1509 return status;
0a753a76 1510}
1511
6890e559 1512DllExport int
1513win32_execvp(const char *cmdname, const char *const *argv)
1514{
390b85e7 1515 return execvp(cmdname, (char *const *)argv);
6890e559 1516}
1517
84902520 1518DllExport void
1519win32_perror(const char *str)
1520{
390b85e7 1521 perror(str);
84902520 1522}
1523
1524DllExport void
1525win32_setbuf(FILE *pf, char *buf)
1526{
390b85e7 1527 setbuf(pf, buf);
84902520 1528}
1529
1530DllExport int
1531win32_setvbuf(FILE *pf, char *buf, int type, size_t size)
1532{
390b85e7 1533 return setvbuf(pf, buf, type, size);
84902520 1534}
1535
1536DllExport int
1537win32_flushall(void)
1538{
390b85e7 1539 return flushall();
84902520 1540}
1541
1542DllExport int
1543win32_fcloseall(void)
1544{
390b85e7 1545 return fcloseall();
84902520 1546}
1547
1548DllExport char*
1549win32_fgets(char *s, int n, FILE *pf)
1550{
390b85e7 1551 return fgets(s, n, pf);
84902520 1552}
1553
1554DllExport char*
1555win32_gets(char *s)
1556{
390b85e7 1557 return gets(s);
84902520 1558}
1559
1560DllExport int
1561win32_fgetc(FILE *pf)
1562{
390b85e7 1563 return fgetc(pf);
84902520 1564}
1565
1566DllExport int
1567win32_putc(int c, FILE *pf)
1568{
390b85e7 1569 return putc(c,pf);
84902520 1570}
1571
1572DllExport int
1573win32_puts(const char *s)
1574{
390b85e7 1575 return puts(s);
84902520 1576}
1577
1578DllExport int
1579win32_getchar(void)
1580{
390b85e7 1581 return getchar();
84902520 1582}
1583
1584DllExport int
1585win32_putchar(int c)
1586{
390b85e7 1587 return putchar(c);
84902520 1588}
1589
bbc8f9de 1590#ifdef MYMALLOC
1591
1592#ifndef USE_PERL_SBRK
1593
1594static char *committed = NULL;
1595static char *base = NULL;
1596static char *reserved = NULL;
1597static char *brk = NULL;
1598static DWORD pagesize = 0;
1599static DWORD allocsize = 0;
1600
1601void *
1602sbrk(int need)
1603{
1604 void *result;
1605 if (!pagesize)
1606 {SYSTEM_INFO info;
1607 GetSystemInfo(&info);
1608 /* Pretend page size is larger so we don't perpetually
1609 * call the OS to commit just one page ...
1610 */
1611 pagesize = info.dwPageSize << 3;
1612 allocsize = info.dwAllocationGranularity;
1613 }
1614 /* This scheme fails eventually if request for contiguous
1615 * block is denied so reserve big blocks - this is only
1616 * address space not memory ...
1617 */
1618 if (brk+need >= reserved)
1619 {
1620 DWORD size = 64*1024*1024;
1621 char *addr;
1622 if (committed && reserved && committed < reserved)
1623 {
1624 /* Commit last of previous chunk cannot span allocations */
161b471a 1625 addr = (char *) VirtualAlloc(committed,reserved-committed,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de 1626 if (addr)
1627 committed = reserved;
1628 }
1629 /* Reserve some (more) space
1630 * Note this is a little sneaky, 1st call passes NULL as reserved
1631 * so lets system choose where we start, subsequent calls pass
1632 * the old end address so ask for a contiguous block
1633 */
161b471a 1634 addr = (char *) VirtualAlloc(reserved,size,MEM_RESERVE,PAGE_NOACCESS);
bbc8f9de 1635 if (addr)
1636 {
1637 reserved = addr+size;
1638 if (!base)
1639 base = addr;
1640 if (!committed)
1641 committed = base;
1642 if (!brk)
1643 brk = committed;
1644 }
1645 else
1646 {
1647 return (void *) -1;
1648 }
1649 }
1650 result = brk;
1651 brk += need;
1652 if (brk > committed)
1653 {
1654 DWORD size = ((brk-committed + pagesize -1)/pagesize) * pagesize;
161b471a 1655 char *addr = (char *) VirtualAlloc(committed,size,MEM_COMMIT,PAGE_READWRITE);
bbc8f9de 1656 if (addr)
1657 {
1658 committed += size;
1659 }
1660 else
1661 return (void *) -1;
1662 }
1663 return result;
1664}
1665
1666#endif
1667#endif
1668
84902520 1669DllExport void*
1670win32_malloc(size_t size)
1671{
390b85e7 1672 return malloc(size);
84902520 1673}
1674
1675DllExport void*
1676win32_calloc(size_t numitems, size_t size)
1677{
390b85e7 1678 return calloc(numitems,size);
84902520 1679}
1680
1681DllExport void*
1682win32_realloc(void *block, size_t size)
1683{
390b85e7 1684 return realloc(block,size);
84902520 1685}
1686
1687DllExport void
1688win32_free(void *block)
1689{
390b85e7 1690 free(block);
84902520 1691}
1692
bbc8f9de 1693
68dc0745 1694int
65e48ea9 1695win32_open_osfhandle(long handle, int flags)
0a753a76 1696{
390b85e7 1697 return _open_osfhandle(handle, flags);
0a753a76 1698}
1699
68dc0745 1700long
65e48ea9 1701win32_get_osfhandle(int fd)
0a753a76 1702{
390b85e7 1703 return _get_osfhandle(fd);
0a753a76 1704}
7bac28a0 1705
7bac28a0 1706/*
1707 * Extras.
1708 */
1709
ad2e33dc 1710static
1711XS(w32_GetCwd)
1712{
1713 dXSARGS;
1714 SV *sv = sv_newmortal();
1715 /* Make one call with zero size - return value is required size */
1716 DWORD len = GetCurrentDirectory((DWORD)0,NULL);
1717 SvUPGRADE(sv,SVt_PV);
1718 SvGROW(sv,len);
1719 SvCUR(sv) = GetCurrentDirectory((DWORD) SvLEN(sv), SvPVX(sv));
1720 /*
1721 * If result != 0
1722 * then it worked, set PV valid,
1723 * else leave it 'undef'
1724 */
1725 if (SvCUR(sv))
1726 SvPOK_on(sv);
1727 EXTEND(sp,1);
1728 ST(0) = sv;
1729 XSRETURN(1);
1730}
1731
1732static
1733XS(w32_SetCwd)
1734{
1735 dXSARGS;
1736 if (items != 1)
1737 croak("usage: Win32::SetCurrentDirectory($cwd)");
1738 if (SetCurrentDirectory(SvPV(ST(0),na)))
1739 XSRETURN_YES;
1740
1741 XSRETURN_NO;
1742}
1743
1744static
1745XS(w32_GetNextAvailDrive)
1746{
1747 dXSARGS;
1748 char ix = 'C';
1749 char root[] = "_:\\";
1750 while (ix <= 'Z') {
1751 root[0] = ix++;
1752 if (GetDriveType(root) == 1) {
1753 root[2] = '\0';
1754 XSRETURN_PV(root);
1755 }
1756 }
1757 XSRETURN_UNDEF;
1758}
1759
1760static
1761XS(w32_GetLastError)
1762{
1763 dXSARGS;
1764 XSRETURN_IV(GetLastError());
1765}
1766
1767static
1768XS(w32_LoginName)
1769{
1770 dXSARGS;
e34ffe5a 1771 char *name = getlogin_buffer;
1772 DWORD size = sizeof(getlogin_buffer);
ad2e33dc 1773 if (GetUserName(name,&size)) {
1774 /* size includes NULL */
1775 ST(0) = sv_2mortal(newSVpv(name,size-1));
1776 XSRETURN(1);
1777 }
1778 XSRETURN_UNDEF;
1779}
1780
1781static
1782XS(w32_NodeName)
1783{
1784 dXSARGS;
1785 char name[MAX_COMPUTERNAME_LENGTH+1];
1786 DWORD size = sizeof(name);
1787 if (GetComputerName(name,&size)) {
1788 /* size does NOT include NULL :-( */
1789 ST(0) = sv_2mortal(newSVpv(name,size));
1790 XSRETURN(1);
1791 }
1792 XSRETURN_UNDEF;
1793}
1794
1795
1796static
1797XS(w32_DomainName)
1798{
1799 dXSARGS;
1800 char name[256];
1801 DWORD size = sizeof(name);
1802 if (GetUserName(name,&size)) {
1803 char sid[1024];
1804 DWORD sidlen = sizeof(sid);
1805 char dname[256];
1806 DWORD dnamelen = sizeof(dname);
1807 SID_NAME_USE snu;
1808 if (LookupAccountName(NULL, name, &sid, &sidlen,
1809 dname, &dnamelen, &snu)) {
1810 XSRETURN_PV(dname); /* all that for this */
1811 }
1812 }
1813 XSRETURN_UNDEF;
1814}
1815
1816static
1817XS(w32_FsType)
1818{
1819 dXSARGS;
1820 char fsname[256];
1821 DWORD flags, filecomplen;
1822 if (GetVolumeInformation(NULL, NULL, 0, NULL, &filecomplen,
1823 &flags, fsname, sizeof(fsname))) {
1824 if (GIMME == G_ARRAY) {
1825 XPUSHs(sv_2mortal(newSVpv(fsname,0)));
1826 XPUSHs(sv_2mortal(newSViv(flags)));
1827 XPUSHs(sv_2mortal(newSViv(filecomplen)));
1828 PUTBACK;
1829 return;
1830 }
1831 XSRETURN_PV(fsname);
1832 }
1833 XSRETURN_UNDEF;
1834}
1835
1836static
1837XS(w32_GetOSVersion)
1838{
1839 dXSARGS;
1840 OSVERSIONINFO osver;
1841
1842 osver.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
1843 if (GetVersionEx(&osver)) {
1844 XPUSHs(newSVpv(osver.szCSDVersion, 0));
1845 XPUSHs(newSViv(osver.dwMajorVersion));
1846 XPUSHs(newSViv(osver.dwMinorVersion));
1847 XPUSHs(newSViv(osver.dwBuildNumber));
1848 XPUSHs(newSViv(osver.dwPlatformId));
1849 PUTBACK;
1850 return;
1851 }
1852 XSRETURN_UNDEF;
1853}
1854
1855static
1856XS(w32_IsWinNT)
1857{
1858 dXSARGS;
1859 XSRETURN_IV(IsWinNT());
1860}
1861
1862static
1863XS(w32_IsWin95)
1864{
1865 dXSARGS;
1866 XSRETURN_IV(IsWin95());
1867}
1868
1869static
1870XS(w32_FormatMessage)
1871{
1872 dXSARGS;
1873 DWORD source = 0;
1874 char msgbuf[1024];
1875
1876 if (items != 1)
1877 croak("usage: Win32::FormatMessage($errno)");
1878
1879 if (FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM,
1880 &source, SvIV(ST(0)), 0,
1881 msgbuf, sizeof(msgbuf)-1, NULL))
1882 XSRETURN_PV(msgbuf);
1883
1884 XSRETURN_UNDEF;
1885}
1886
1887static
1888XS(w32_Spawn)
1889{
1890 dXSARGS;
1891 char *cmd, *args;
1892 PROCESS_INFORMATION stProcInfo;
1893 STARTUPINFO stStartInfo;
1894 BOOL bSuccess = FALSE;
1895
1896 if(items != 3)
1897 croak("usage: Win32::Spawn($cmdName, $args, $PID)");
1898
1899 cmd = SvPV(ST(0),na);
1900 args = SvPV(ST(1), na);
1901
1902 memset(&stStartInfo, 0, sizeof(stStartInfo)); /* Clear the block */
1903 stStartInfo.cb = sizeof(stStartInfo); /* Set the structure size */
1904 stStartInfo.dwFlags = STARTF_USESHOWWINDOW; /* Enable wShowWindow control */
1905 stStartInfo.wShowWindow = SW_SHOWMINNOACTIVE; /* Start min (normal) */
1906
1907 if(CreateProcess(
1908 cmd, /* Image path */
1909 args, /* Arguments for command line */
1910 NULL, /* Default process security */
1911 NULL, /* Default thread security */
1912 FALSE, /* Must be TRUE to use std handles */
1913 NORMAL_PRIORITY_CLASS, /* No special scheduling */
1914 NULL, /* Inherit our environment block */
1915 NULL, /* Inherit our currrent directory */
1916 &stStartInfo, /* -> Startup info */
1917 &stProcInfo)) /* <- Process info (if OK) */
1918 {
1919 CloseHandle(stProcInfo.hThread);/* library source code does this. */
1920 sv_setiv(ST(2), stProcInfo.dwProcessId);
1921 bSuccess = TRUE;
1922 }
1923 XSRETURN_IV(bSuccess);
1924}
1925
1926static
1927XS(w32_GetTickCount)
1928{
1929 dXSARGS;
1930 XSRETURN_IV(GetTickCount());
1931}
1932
1933static
1934XS(w32_GetShortPathName)
1935{
1936 dXSARGS;
1937 SV *shortpath;
e8bab181 1938 DWORD len;
ad2e33dc 1939
1940 if(items != 1)
1941 croak("usage: Win32::GetShortPathName($longPathName)");
1942
1943 shortpath = sv_mortalcopy(ST(0));
1944 SvUPGRADE(shortpath, SVt_PV);
1945 /* src == target is allowed */
e8bab181 1946 do {
1947 len = GetShortPathName(SvPVX(shortpath),
1948 SvPVX(shortpath),
1949 SvLEN(shortpath));
1950 } while (len >= SvLEN(shortpath) && sv_grow(shortpath,len+1));
1951 if (len) {
1952 SvCUR_set(shortpath,len);
ad2e33dc 1953 ST(0) = shortpath;
e8bab181 1954 }
ad2e33dc 1955 else
1956 ST(0) = &sv_undef;
1957 XSRETURN(1);
1958}
1959
ad0751ec 1960static
1961XS(w32_Sleep)
1962{
1963 dXSARGS;
1964 if (items != 1)
1965 croak("usage: Win32::Sleep($milliseconds)");
1966 Sleep(SvIV(ST(0)));
1967 XSRETURN_YES;
1968}
1969
ad2e33dc 1970void
f3986ebb 1971Perl_init_os_extras()
ad2e33dc 1972{
1973 char *file = __FILE__;
1974 dXSUB_SYS;
1975
ad2e33dc 1976 /* these names are Activeware compatible */
1977 newXS("Win32::GetCwd", w32_GetCwd, file);
1978 newXS("Win32::SetCwd", w32_SetCwd, file);
1979 newXS("Win32::GetNextAvailDrive", w32_GetNextAvailDrive, file);
1980 newXS("Win32::GetLastError", w32_GetLastError, file);
1981 newXS("Win32::LoginName", w32_LoginName, file);
1982 newXS("Win32::NodeName", w32_NodeName, file);
1983 newXS("Win32::DomainName", w32_DomainName, file);
1984 newXS("Win32::FsType", w32_FsType, file);
1985 newXS("Win32::GetOSVersion", w32_GetOSVersion, file);
1986 newXS("Win32::IsWinNT", w32_IsWinNT, file);
1987 newXS("Win32::IsWin95", w32_IsWin95, file);
1988 newXS("Win32::FormatMessage", w32_FormatMessage, file);
1989 newXS("Win32::Spawn", w32_Spawn, file);
1990 newXS("Win32::GetTickCount", w32_GetTickCount, file);
1991 newXS("Win32::GetShortPathName", w32_GetShortPathName, file);
ad0751ec 1992 newXS("Win32::Sleep", w32_Sleep, file);
ad2e33dc 1993
1994 /* XXX Bloat Alert! The following Activeware preloads really
1995 * ought to be part of Win32::Sys::*, so they're not included
1996 * here.
1997 */
1998 /* LookupAccountName
1999 * LookupAccountSID
2000 * InitiateSystemShutdown
2001 * AbortSystemShutdown
2002 * ExpandEnvrironmentStrings
2003 */
2004}
2005
2006void
2007Perl_win32_init(int *argcp, char ***argvp)
2008{
2009 /* Disable floating point errors, Perl will trap the ones we
2010 * care about. VC++ RTL defaults to switching these off
2011 * already, but the Borland RTL doesn't. Since we don't
2012 * want to be at the vendor's whim on the default, we set
2013 * it explicitly here.
2014 */
a835ef8a 2015#if !defined(_ALPHA_) && !defined(__GNUC__)
ad2e33dc 2016 _control87(MCW_EM, MCW_EM);
3dc9191e 2017#endif
dc86dda3 2018 MALLOC_INIT;
ad2e33dc 2019}
d55594ae 2020
a868473f 2021#ifdef USE_BINMODE_SCRIPTS
2022
2023void
2024win32_strip_return(SV *sv)
2025{
2026 char *s = SvPVX(sv);
2027 char *e = s+SvCUR(sv);
2028 char *d = s;
2029 while (s < e)
2030 {
2031 if (*s == '\r' && s[1] == '\n')
2032 {
2033 *d++ = '\n';
2034 s += 2;
2035 }
2036 else
2037 {
2038 *d++ = *s++;
2039 }
2040 }
2041 SvCUR_set(sv,d-SvPVX(sv));
2042}
2043
2044#endif