/*========================================================================== * * Copyright (C) 1999-2002 Microsoft Corporation. All Rights Reserved. * * File: OSInd.cpp * Content: OS indirection functions to abstract OS specific items. * * History: * Date By Reason * ==== == ====== * 07/12/99 jtk Created * 09/21/99 rodtoll Fixed for retail builds * 09/22/99 jtk Added callstacks to memory allocations * 08/28/2000 masonb Voice Merge: Allow new and delete with size of 0 * 11/28/2000 rodtoll WinBug #206257 - Retail DPNET.DLL links to DebugBreak() * 12/22/2000 aarono ManBug # 190380 use process heap for retail * 10/16/2001 vanceo Add AssertNoCriticalSectionsTakenByThisThread capability ***************************************************************************/ #include "dncmni.h" #define PROF_SECT _T("DirectPlay8") //********************************************************************** // Constant definitions //********************************************************************** //********************************************************************** // Macro definitions //********************************************************************** //********************************************************************** // Structure definitions //********************************************************************** //********************************************************************** // Variable definitions //********************************************************************** // // debug variable to make sure we're initialized before having any functions // called // DEBUG_ONLY( static BOOL g_fOSIndirectionLayerInitialized = FALSE ); // // OS items // #if ((! defined(WINCE)) && (! defined(_XBOX))) static OSVERSIONINFO g_OSVersionInfo; #endif // ! WINCE and ! _XBOX #ifndef DPNBUILD_NOSERIALSP static HINSTANCE g_hApplicationInstance; #endif // ! DPNBUILD_NOSERIALSP // // Global Pools // #if ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY))) CFixedPool g_fpClassFactories; CFixedPool g_fpObjectDatas; CFixedPool g_fpInterfaceLists; #endif // ! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY #ifdef WINNT PSECURITY_ATTRIBUTES g_psa = NULL; SECURITY_ATTRIBUTES g_sa; BYTE g_pSD[SECURITY_DESCRIPTOR_MIN_LENGTH]; BOOL g_fDaclInited = FALSE; PACL g_pEveryoneACL = NULL; #endif // WINNT #ifndef DPNBUILD_LIBINTERFACE #define CLASSFAC_POOL_INITED 0x00000001 #define OBJDATA_POOL_INITED 0x00000002 #define INTLIST_POOL_INITED 0x00000004 #endif // ! DPNBUILD_LIBINTERFACE #ifdef DBG #define HANDLE_TRACKING_INITED 0x00000008 #endif // DBG #if ((defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL))) #define MEMORY_TRACKING_INITED 0x00000010 #endif // DBG or DPNBUILD_FIXEDMEMORYMODEL #if ((defined(DBG)) && (! defined(DPNBUILD_ONLYONETHREAD))) #define CRITSEC_TRACKING_INITED 0x00000020 #endif // DBG and ! DPNBUILD_ONLYONETHREAD #if !defined(DPNBUILD_LIBINTERFACE) || defined(DBG) || defined(DPNBUILD_FIXEDMEMORYMODEL) DWORD g_dwCommonInitFlags = 0; #endif // !defined(DPNBUILD_LIBINTERFACE) || defined(DBG) || defined(DPNBUILD_FIXEDMEMORYMODEL) //********************************************************************** // Function prototypes //********************************************************************** //********************************************************************** // Function definitions //********************************************************************** //********************************************************************** // ------------------------------ // DNOSIndirectionInit - initialize the OS indirection layer // // Entry: Nothing // // Exit: Boolean indicating success // TRUE = initialization successful // FALSE = initialization unsuccessful // ------------------------------ #undef DPF_MODNAME #define DPF_MODNAME "DNOSIndirectionInit" BOOL DNOSIndirectionInit( DWORD_PTR dwpMaxMemUsage ) { BOOL fReturn; #ifdef DBG DNASSERT( g_fOSIndirectionLayerInitialized == FALSE ); #endif // DBG // // initialize // fReturn = TRUE; #if ((! defined(WINCE)) && (! defined(_XBOX))) // // note OS version // memset( &g_OSVersionInfo, 0x00, sizeof( g_OSVersionInfo ) ); g_OSVersionInfo.dwOSVersionInfoSize = sizeof( g_OSVersionInfo ); if ( GetVersionEx( &g_OSVersionInfo ) == FALSE ) { goto Failure; } #endif // ! WINCE and ! _XBOX #ifndef DPNBUILD_NOSERIALSP // // note application instance // g_hApplicationInstance = GetModuleHandle( NULL ); if ( g_hApplicationInstance == NULL ) { DWORD dwError; dwError = GetLastError(); DPFX(DPFPREP, 0, "Failed to GetModuleHandle: 0x%x", dwError ); goto Failure; } #endif // ! DPNBUILD_NOSERIALSP #if ((defined(DBG)) && (! defined(DPNBUILD_ONLYONETHREAD))) // // initialize critical section tracking code before anything else! // if ( DNCSTrackInitialize() == FALSE ) { DPFX(DPFPREP, 0, "Failed to initialize critsec tracking code!" ); DNASSERT( FALSE ); goto Failure; } g_dwCommonInitFlags |= CRITSEC_TRACKING_INITED; #endif // DBG and ! DPNBUILD_ONLYONETHREAD #if ((defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL))) // // initialize memory tracking before creating new memory heap // if ( DNMemoryTrackInitialize(dwpMaxMemUsage) == FALSE ) { DPFX(DPFPREP, 0, "Failed to initialize memory tracking code!" ); DNASSERT( FALSE ); goto Failure; } g_dwCommonInitFlags |= MEMORY_TRACKING_INITED; #endif // DBG or DPNBUILD_FIXEDMEMORYMODEL #ifdef DBG // // initialize handle tracking // if ( DNHandleTrackInitialize() == FALSE ) { DPFX(DPFPREP, 0, "Failed to initialize handle tracking code!" ); DNASSERT( FALSE ); goto Failure; } g_dwCommonInitFlags |= HANDLE_TRACKING_INITED; #endif // DBG #if ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY))) // // Initialize global pools // if (!g_fpClassFactories.Initialize( sizeof( _IDirectPlayClassFactory ), NULL, NULL, NULL, NULL)) { DPFX(DPFPREP, 0, "Failed to initialize class factory pool!" ); goto Failure; } g_dwCommonInitFlags |= CLASSFAC_POOL_INITED; if (!g_fpObjectDatas.Initialize( sizeof( _OBJECT_DATA ), NULL, NULL, NULL, NULL)) { DPFX(DPFPREP, 0, "Failed to initialize object data pool!" ); goto Failure; } g_dwCommonInitFlags |= OBJDATA_POOL_INITED; if (!g_fpInterfaceLists.Initialize( sizeof( _INTERFACE_LIST ), NULL, NULL, NULL, NULL)) { DPFX(DPFPREP, 0, "Failed to initialize interface list pool!" ); goto Failure; } g_dwCommonInitFlags |= INTLIST_POOL_INITED; #endif // ! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY srand(GETTIMESTAMP()); #if (((! defined(WINCE)) && (! defined(_XBOX))) || (! defined(DPNBUILD_NOSERIALSP)) || (defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL)) || ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY))) ) Exit: #endif // (! WINCE and ! _XBOX) or ! DPNBUILD_NOSERIALSP or DBG or DPNBUILD_FIXEDMEMORYMODEL or (! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY) if ( fReturn != FALSE ) { DEBUG_ONLY( g_fOSIndirectionLayerInitialized = TRUE ); } return fReturn; #if (((! defined(WINCE)) && (! defined(_XBOX))) || (! defined(DPNBUILD_NOSERIALSP)) || (defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL)) || ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY))) ) Failure: fReturn = FALSE; DNOSIndirectionDeinit(); goto Exit; #endif // (! WINCE and ! _XBOX) or ! DPNBUILD_NOSERIALSP or DBG or DPNBUILD_FIXEDMEMORYMODEL or (! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY) } //********************************************************************** //********************************************************************** // ------------------------------ // DNOSIndirectionDeinit - deinitialize OS indirection layer // // Entry: Nothing // // Exit: Nothing // ------------------------------ #undef DPF_MODNAME #define DPF_MODNAME "DNOSIndirectionDeinit" void DNOSIndirectionDeinit( void ) { #if ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY))) // // DeInitialize global pools // if (g_dwCommonInitFlags & CLASSFAC_POOL_INITED) { g_fpClassFactories.DeInitialize(); } if (g_dwCommonInitFlags & OBJDATA_POOL_INITED) { g_fpObjectDatas.DeInitialize(); } if (g_dwCommonInitFlags & INTLIST_POOL_INITED) { g_fpInterfaceLists.DeInitialize(); } #endif // ! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY #ifdef DBG if (g_dwCommonInitFlags & HANDLE_TRACKING_INITED) { if (DNHandleTrackDumpLeaks()) { // There were leaks, break so we can look at the log DNASSERT(0); } DNHandleTrackDeinitialize(); } #endif // DBG #if ((defined(DBG)) && (! defined(DPNBUILD_ONLYONETHREAD))) // // Display CritSec leaks before displaying memory leaks, because displaying memory leaks // may free the memory for the CritSec and corrupt the CritSec bilink // if (g_dwCommonInitFlags & CRITSEC_TRACKING_INITED) { if (DNCSTrackDumpLeaks()) { // There were leaks, break so we can look at the log DNASSERT(0); } DNCSTrackDeinitialize(); } #endif // DBG and ! DPNBUILD_ONLYONETHREAD #if ((defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL))) if (g_dwCommonInitFlags & MEMORY_TRACKING_INITED) { #ifdef DBG if (DNMemoryTrackDumpLeaks()) { // There were leaks, break so we can look at the log DNASSERT(0); } #endif // DBG DNMemoryTrackDeinitialize(); } #endif // DBG or DPNBUILD_FIXEDMEMORYMODEL #ifdef WINNT // This should be done after functions that use a Dacl will no longer be // called (CreateMutex, CreateFile, etc). if (g_pEveryoneACL) { HeapFree(GetProcessHeap(), 0, g_pEveryoneACL); g_pEveryoneACL = NULL; } #endif // WINNT DEBUG_ONLY( g_fOSIndirectionLayerInitialized = FALSE ); #if !defined(DPNBUILD_LIBINTERFACE) || defined(DBG) g_dwCommonInitFlags = 0; #endif // !defined(DPNBUILD_LIBINTERFACE) || defined(DBG) } //********************************************************************** #undef DPF_MODNAME #define DPF_MODNAME "DNinet_ntow" void DNinet_ntow( IN_ADDR in, WCHAR* pwsz ) { // NOTE: pwsz should be 16 characters (4 3-digit numbers + 3 '.' + \0) swprintf(pwsz, L"%d.%d.%d.%d", in.s_net, in.s_host, in.s_lh, in.s_impno); } #undef DPF_MODNAME #define DPF_MODNAME "DNGetRandomNumber" DWORD DNGetRandomNumber() { return (rand() | (rand() << 16)); } #if ((! defined(WINCE)) && (! defined(_XBOX))) //********************************************************************** // ------------------------------ // DNGetOSType - get OS type // // Entry: Nothing // // Exit: OS type // ------------------------------ #undef DPF_MODNAME #define DPF_MODNAME "DNGetOSType" UINT_PTR DNGetOSType( void ) { #ifdef DBG DNASSERT( g_fOSIndirectionLayerInitialized != FALSE ); #endif // DBG return g_OSVersionInfo.dwPlatformId; } #endif // ! WINCE and ! _XBOX #ifdef WINNT //********************************************************************** // ------------------------------ // DNOSIsXPOrGreater - return TRUE if OS is WindowsXP or later or NT flavor // // Entry: Nothing // // Exit: BOOL // ------------------------------ #undef DPF_MODNAME #define DPF_MODNAME "DNOSIsXPOrGreater" BOOL DNOSIsXPOrGreater( void ) { #ifdef DBG DNASSERT( g_fOSIndirectionLayerInitialized != FALSE ); #endif // DBG return ((g_OSVersionInfo.dwPlatformId == VER_PLATFORM_WIN32_NT) && ((g_OSVersionInfo.dwMajorVersion > 5) || ((g_OSVersionInfo.dwMajorVersion == 5) && (g_OSVersionInfo.dwMinorVersion >= 1))) ); } //********************************************************************** //********************************************************************** // ------------------------------ // DNGetNullDacl - get a SECURITY_ATTRIBUTE structure that specifies a // NULL DACL which is accesible by all users. // // Entry: Nothing // // Exit: PSECURITY_ATTRIBUTES // ------------------------------ #undef DPF_MODNAME #define DPF_MODNAME "DNGetNullDacl" PSECURITY_ATTRIBUTES DNGetNullDacl() { PSID psidEveryone = NULL; SID_IDENTIFIER_AUTHORITY siaWorld = SECURITY_WORLD_SID_AUTHORITY; DWORD dwAclSize; // This is done to make this function independent of DNOSIndirectionInit so that the debug // layer can call it before the indirection layer is initialized. if (!g_fDaclInited) { if (!InitializeSecurityDescriptor((SECURITY_DESCRIPTOR*)g_pSD, SECURITY_DESCRIPTOR_REVISION)) { DPFX(DPFPREP, 0, "Failed to initialize security descriptor" ); goto Error; } // Create SID for the Everyone group. if (!AllocateAndInitializeSid(&siaWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &psidEveryone)) { DPFX(DPFPREP, 0, "Failed to allocate Everyone SID" ); goto Error; } dwAclSize = sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + GetLengthSid(psidEveryone) - sizeof(DWORD); // Allocate the ACL, this won't be a tracked allocation and we will let process cleanup destroy it g_pEveryoneACL = (PACL)HeapAlloc(GetProcessHeap(), 0, dwAclSize); if (g_pEveryoneACL == NULL) { DPFX(DPFPREP, 0, "Failed to allocate ACL buffer" ); goto Error; } // Intialize the ACL. if (!InitializeAcl(g_pEveryoneACL, dwAclSize, ACL_REVISION)) { DPFX(DPFPREP, 0, "Failed to initialize ACL" ); goto Error; } // Add the ACE. if (!AddAccessAllowedAce(g_pEveryoneACL, ACL_REVISION, GENERIC_ALL, psidEveryone)) { DPFX(DPFPREP, 0, "Failed to add ACE to ACL" ); goto Error; } // We no longer need the SID that was allocated. FreeSid(psidEveryone); psidEveryone = NULL; // Add the ACL to the security descriptor.. if (!SetSecurityDescriptorDacl((SECURITY_DESCRIPTOR*)g_pSD, TRUE, g_pEveryoneACL, FALSE)) { DPFX(DPFPREP, 0, "Failed to add ACL to security descriptor" ); goto Error; } g_sa.nLength = sizeof(SECURITY_ATTRIBUTES); g_sa.lpSecurityDescriptor = g_pSD; g_sa.bInheritHandle = FALSE; g_psa = &g_sa; g_fDaclInited = TRUE; } Error: if (psidEveryone) { FreeSid(psidEveryone); psidEveryone = NULL; } return g_psa; } //********************************************************************** #endif // WINNT #ifndef DPNBUILD_NOSERIALSP //********************************************************************** // ------------------------------ // DNGetApplicationInstance - application instance // // Entry: Nothing // // Exit: Application instance // ------------------------------ #undef DPF_MODNAME #define DPF_MODNAME "DNGetApplicationInstance" HINSTANCE DNGetApplicationInstance( void ) { #ifdef DBG DNASSERT( g_fOSIndirectionLayerInitialized != FALSE ); #endif // DBG return g_hApplicationInstance; } //********************************************************************** #endif // ! DPNBUILD_NOSERIALSP #ifndef DPNBUILD_ONLYONETHREAD //********************************************************************** // ------------------------------ // DNOSInitializeCriticalSection - initialize a critical section // // Entry: Pointer to critical section // // Exit: Boolean indicating success // TRUE = success // FALSE = failue // ------------------------------ #undef DPF_MODNAME #define DPF_MODNAME "DNOSInitializeCriticalSection" BOOL DNOSInitializeCriticalSection( CRITICAL_SECTION* pCriticalSection ) { BOOL fReturn; DNASSERT( pCriticalSection != NULL ); fReturn = TRUE; // // attempt to enter the critical section once // _try { #ifdef WINNT // Pre-allocate the critsec event by setting the high bit of the spin count and set spin to 1000 // NT converts the spin to 0 for single proc machines. fReturn = InitializeCriticalSectionAndSpinCount( pCriticalSection , 0x80000000 | 1000); #else InitializeCriticalSection( pCriticalSection ); #endif // WINNT } _except( EXCEPTION_EXECUTE_HANDLER ) { fReturn = FALSE; } _try { if (fReturn) { EnterCriticalSection( pCriticalSection ); } } _except( EXCEPTION_EXECUTE_HANDLER ) { DeleteCriticalSection(pCriticalSection); fReturn = FALSE; } // // if we didn't fail on entering the critical section, make sure // we release it // if ( fReturn != FALSE ) { LeaveCriticalSection( pCriticalSection ); } return fReturn; } //********************************************************************** #endif // !DPNBUILD_ONLYONETHREAD #ifdef DBG #ifdef WINCE #undef DPF_MODNAME #define DPF_MODNAME "DNGetProfileInt" UINT DNGetProfileInt(LPCTSTR lpszSection, LPCTSTR lpszEntry, int nDefault) { DWORD dwResult; CRegistry reg; DNASSERT(_tcscmp(lpszSection, _T("DirectPlay8")) == 0); if (!reg.Open(HKEY_LOCAL_MACHINE, _T("Software\\Microsoft\\DirectPlay8"))) { // NOTE: This will occur during DllRegisterServer for the first time return nDefault; } if (!reg.ReadDWORD(lpszEntry, &dwResult)) { return nDefault; } return dwResult; } #else // ! WINCE #if ((defined(_XBOX)) && (! defined(XBOX_ON_DESKTOP))) #undef DPF_MODNAME #define DPF_MODNAME "DNGetProfileInt" UINT DNGetProfileInt(LPCTSTR lpszSection, LPCTSTR lpszEntry, int nDefault) { DWORD dwResult; FILE * pFile = NULL; TCHAR tszLine[256]; TCHAR * ptszTrimStart; TCHAR * ptszTrimEnd; BOOL fInSection = FALSE; DNASSERT(_tcscmp(lpszSection, _T("DirectPlay8")) == 0); // // Populate the default return value. // dwResult = nDefault; // // Open a "win.ini" file in the root of the title's launch directory. // pFile = fopen(_T("D:\\win.ini"), "r"); if (pFile == NULL) { goto Exit; } // // Look for the section and entry. // while (_fgetts(tszLine, (sizeof(tszLine) - sizeof(TCHAR)), pFile) != NULL) { // // Trim whitespace from the beginning of the line. // ptszTrimStart = tszLine; while (((*ptszTrimStart) == _T('\n')) || ((*ptszTrimStart) == _T('\r')) || ((*ptszTrimStart) == _T(' ')) || ((*ptszTrimStart) == _T('\t'))) { if ((*ptszTrimStart) == 0) { break; } ptszTrimStart++; } // // Trim whitespace off the end of the line. // ptszTrimEnd = ptszTrimStart + _tcslen(ptszTrimStart) - 1; while (((*ptszTrimEnd) == _T('\n')) || ((*ptszTrimEnd) == _T('\r')) || ((*ptszTrimEnd) == _T(' ')) || ((*ptszTrimEnd) == _T('\t'))) { if (ptszTrimEnd <= ptszTrimStart) { break; } ptszTrimEnd--; } // // Ignore commented lines (starts with semicolon). // if ((*ptszTrimStart) != _T(';')) { // // If it starts and ends with brackets, it's a section header. // if (((*ptszTrimStart) == _T('[')) && ((*ptszTrimEnd) == _T(']'))) { // // If we were in the section, then we've left it and we're // done. // if (fInSection) { break; } // // Trim whitespace from inside the start of the brackets. // *ptszTrimEnd = 0; ptszTrimEnd--; ptszTrimStart++; while (((*ptszTrimStart) == _T('\n')) || ((*ptszTrimStart) == _T('\r')) || ((*ptszTrimStart) == _T(' ')) || ((*ptszTrimStart) == _T('\t'))) { if ((*ptszTrimStart) == 0) { break; } ptszTrimStart++; } while (((*ptszTrimEnd) == _T('\n')) || ((*ptszTrimEnd) == _T('\r')) || ((*ptszTrimEnd) == _T(' ')) || ((*ptszTrimEnd) == _T('\t'))) { if (ptszTrimEnd <= ptszTrimStart) { break; } ptszTrimEnd--; } *(ptszTrimEnd + 1) = 0; // // Is this the right section? // if (_tcsicmp(ptszTrimStart, lpszSection) == 0) { fInSection = TRUE; } } else { // // If we're in the section, determine the key // name. // if (fInSection) { TCHAR * ptszKeyEnd; TCHAR * ptszValue; *(ptszTrimEnd + 1) = 0; ptszKeyEnd = ptszTrimStart; while ((ptszKeyEnd < ptszTrimEnd) && ((*ptszKeyEnd) != _T('='))) { ptszKeyEnd++; } if ((*ptszKeyEnd) == _T('=')) { ptszValue = ptszKeyEnd + 1; ptszKeyEnd--; while (((*ptszKeyEnd) == _T('\n')) || ((*ptszKeyEnd) == _T('\r')) || ((*ptszKeyEnd) == _T(' ')) || ((*ptszKeyEnd) == _T('\t'))) { if (ptszKeyEnd <= ptszTrimStart) { break; } ptszKeyEnd--; } *(ptszKeyEnd + 1) = 0; // // If we matched the key name, convert the // value and bail. // if (_tcsicmp(ptszTrimStart, lpszEntry) == 0) { dwResult = _ttoi(ptszValue); goto Exit; } } } else { // // Not in section. // } } } else { // // Line is commented, ignore. // } } Exit: if (pFile != NULL) { fclose(pFile); pFile = NULL; } return dwResult; } #endif // _XBOX and ! XBOX_ON_DESKTOP #endif // ! WINCE #endif // DBG #if defined(WINCE) && !defined(WINCE_ON_DESKTOP) //********************************************************************** //** //** Begin CE layer. Here we implement functions we need that aren't on CE. //** //********************************************************************** #undef DPF_MODNAME #define DPF_MODNAME "OpenEvent" HANDLE WINAPI OpenEvent(IN DWORD dwDesiredAccess, IN BOOL bInheritHandle, IN LPCWSTR lpName) { HANDLE h; h = CreateEvent(0, 1, 0, lpName); if (!h) { return NULL; } if (GetLastError() != ERROR_ALREADY_EXISTS) { CloseHandle(h); return NULL; } return h; } #undef DPF_MODNAME #define DPF_MODNAME "OpenFileMapping" HANDLE WINAPI OpenFileMapping(IN DWORD dwDesiredAccess, IN BOOL bInheritHandle, IN LPCWSTR lpName) { HANDLE h; DWORD dwFlags = 0; if (dwDesiredAccess & FILE_MAP_WRITE) { // If they ask for FILE_MAP_ALL_ACCESS or FILE_MAP_WRITE, they get read and write dwFlags = PAGE_READWRITE; } else { // If they only ask for FILE_MAP_READ, they get read only dwFlags = PAGE_READONLY; } h = CreateFileMapping(INVALID_HANDLE_VALUE, 0, dwFlags, 0, 1, lpName); if (!h) { return NULL; } if (GetLastError() != ERROR_ALREADY_EXISTS) { CloseHandle(h); return NULL; } return h; } #undef DPF_MODNAME #define DPF_MODNAME "OpenMutex" HANDLE WINAPI OpenMutex(IN DWORD dwDesiredAccess, IN BOOL bInheritHandle, IN LPCWSTR lpName) { HANDLE h; h = CreateMutex(0, 0, lpName); if (!h) { return NULL; } if (GetLastError() != ERROR_ALREADY_EXISTS) { CloseHandle(h); return NULL; } return h; } /* #ifdef _X86_ __declspec(naked) LONG WINAPI InterlockedExchangeAdd( LPLONG Addend, LONG Increment ) { __asm { mov ecx, [esp + 4] ; get addend address mov eax, [esp + 8] ; get increment value lock xadd [ecx], eax ; exchange add} ret } } #endif // _X86 */ #endif // WINCE //********************************************************************** //** //** End CE layer. Here we implement functions we need that aren't on CE. //** //********************************************************************** #if ((defined(WINCE)) || (defined(DPNBUILD_LIBINTERFACE))) #undef DPF_MODNAME #define DPF_MODNAME "DNCoCreateGuid" HRESULT DNCoCreateGuid(GUID* pguid) { pguid->Data1 = (rand() << 16) | rand(); pguid->Data2 = (WORD)rand(); pguid->Data3 = (WORD)rand(); pguid->Data4[0] = (BYTE)rand(); pguid->Data4[1] = (BYTE)rand(); pguid->Data4[2] = (BYTE)rand(); pguid->Data4[3] = (BYTE)rand(); pguid->Data4[4] = (BYTE)rand(); pguid->Data4[5] = (BYTE)rand(); pguid->Data4[6] = (BYTE)rand(); pguid->Data4[7] = (BYTE)rand(); return S_OK; } #endif // WINCE or DPNBUILD_LIBINTERFACE #ifndef DPNBUILD_NOPARAMVAL BOOL IsValidStringA( const CHAR * const lpsz ) { #ifndef WINCE return (!IsBadStringPtrA( lpsz, 0xFFFF ) ); #else const char* szTmpLoc = lpsz; // // If it is a NULL pointer just return FALSE, they are always bad // if (szTmpLoc == NULL) { return FALSE; } _try { for( ; *szTmpLoc ; szTmpLoc++ ); } _except(EXCEPTION_EXECUTE_HANDLER) { return FALSE; } return TRUE; #endif // WINCE } BOOL IsValidStringW( const WCHAR * const lpwsz ) { #ifdef WINNT // // This function is only valid on NT. // It exists for WIN9x, but only via the MS Layer for Unicode which requires us to jump through hoops when linking // return (!IsBadStringPtrW( lpwsz, 0xFFFF ) ); #else const wchar_t *szTmpLoc = lpwsz; // // If it is a NULL pointer just return FALSE, they are always bad // if( szTmpLoc == NULL ) { return FALSE; } _try { for( ; *szTmpLoc ; szTmpLoc++ ); } _except( EXCEPTION_EXECUTE_HANDLER ) { return FALSE; } return TRUE; #endif // WINNT } #endif // !DPNBUILD_NOPARAMVAL