Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1023 lines
25 KiB

/*==========================================================================
*
* Copyright (C) 1999-2002 Microsoft Corporation. All Rights Reserved.
*
* File: OSInd.cpp
* Content: OS indirection functions to abstract OS specific items.
*
* History:
* Date By Reason
* ==== == ======
* 07/12/99 jtk Created
* 09/21/99 rodtoll Fixed for retail builds
* 09/22/99 jtk Added callstacks to memory allocations
* 08/28/2000 masonb Voice Merge: Allow new and delete with size of 0
* 11/28/2000 rodtoll WinBug #206257 - Retail DPNET.DLL links to DebugBreak()
* 12/22/2000 aarono ManBug # 190380 use process heap for retail
* 10/16/2001 vanceo Add AssertNoCriticalSectionsTakenByThisThread capability
***************************************************************************/
#include "dncmni.h"
#define PROF_SECT _T("DirectPlay8")
//**********************************************************************
// Constant definitions
//**********************************************************************
//**********************************************************************
// Macro definitions
//**********************************************************************
//**********************************************************************
// Structure definitions
//**********************************************************************
//**********************************************************************
// Variable definitions
//**********************************************************************
//
// debug variable to make sure we're initialized before having any functions
// called
//
DEBUG_ONLY( static BOOL g_fOSIndirectionLayerInitialized = FALSE );
//
// OS items
//
#if ((! defined(WINCE)) && (! defined(_XBOX)))
static OSVERSIONINFO g_OSVersionInfo;
#endif // ! WINCE and ! _XBOX
#ifndef DPNBUILD_NOSERIALSP
static HINSTANCE g_hApplicationInstance;
#endif // ! DPNBUILD_NOSERIALSP
//
// Global Pools
//
#if ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY)))
CFixedPool g_fpClassFactories;
CFixedPool g_fpObjectDatas;
CFixedPool g_fpInterfaceLists;
#endif // ! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY
#ifdef WINNT
PSECURITY_ATTRIBUTES g_psa = NULL;
SECURITY_ATTRIBUTES g_sa;
BYTE g_pSD[SECURITY_DESCRIPTOR_MIN_LENGTH];
BOOL g_fDaclInited = FALSE;
PACL g_pEveryoneACL = NULL;
#endif // WINNT
#ifndef DPNBUILD_LIBINTERFACE
#define CLASSFAC_POOL_INITED 0x00000001
#define OBJDATA_POOL_INITED 0x00000002
#define INTLIST_POOL_INITED 0x00000004
#endif // ! DPNBUILD_LIBINTERFACE
#ifdef DBG
#define HANDLE_TRACKING_INITED 0x00000008
#endif // DBG
#if ((defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL)))
#define MEMORY_TRACKING_INITED 0x00000010
#endif // DBG or DPNBUILD_FIXEDMEMORYMODEL
#if ((defined(DBG)) && (! defined(DPNBUILD_ONLYONETHREAD)))
#define CRITSEC_TRACKING_INITED 0x00000020
#endif // DBG and ! DPNBUILD_ONLYONETHREAD
#if !defined(DPNBUILD_LIBINTERFACE) || defined(DBG) || defined(DPNBUILD_FIXEDMEMORYMODEL)
DWORD g_dwCommonInitFlags = 0;
#endif // !defined(DPNBUILD_LIBINTERFACE) || defined(DBG) || defined(DPNBUILD_FIXEDMEMORYMODEL)
//**********************************************************************
// Function prototypes
//**********************************************************************
//**********************************************************************
// Function definitions
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNOSIndirectionInit - initialize the OS indirection layer
//
// Entry: Nothing
//
// Exit: Boolean indicating success
// TRUE = initialization successful
// FALSE = initialization unsuccessful
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNOSIndirectionInit"
BOOL DNOSIndirectionInit( DWORD_PTR dwpMaxMemUsage )
{
BOOL fReturn;
#ifdef DBG
DNASSERT( g_fOSIndirectionLayerInitialized == FALSE );
#endif // DBG
//
// initialize
//
fReturn = TRUE;
#if ((! defined(WINCE)) && (! defined(_XBOX)))
//
// note OS version
//
memset( &g_OSVersionInfo, 0x00, sizeof( g_OSVersionInfo ) );
g_OSVersionInfo.dwOSVersionInfoSize = sizeof( g_OSVersionInfo );
if ( GetVersionEx( &g_OSVersionInfo ) == FALSE )
{
goto Failure;
}
#endif // ! WINCE and ! _XBOX
#ifndef DPNBUILD_NOSERIALSP
//
// note application instance
//
g_hApplicationInstance = GetModuleHandle( NULL );
if ( g_hApplicationInstance == NULL )
{
DWORD dwError;
dwError = GetLastError();
DPFX(DPFPREP, 0, "Failed to GetModuleHandle: 0x%x", dwError );
goto Failure;
}
#endif // ! DPNBUILD_NOSERIALSP
#if ((defined(DBG)) && (! defined(DPNBUILD_ONLYONETHREAD)))
//
// initialize critical section tracking code before anything else!
//
if ( DNCSTrackInitialize() == FALSE )
{
DPFX(DPFPREP, 0, "Failed to initialize critsec tracking code!" );
DNASSERT( FALSE );
goto Failure;
}
g_dwCommonInitFlags |= CRITSEC_TRACKING_INITED;
#endif // DBG and ! DPNBUILD_ONLYONETHREAD
#if ((defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL)))
//
// initialize memory tracking before creating new memory heap
//
if ( DNMemoryTrackInitialize(dwpMaxMemUsage) == FALSE )
{
DPFX(DPFPREP, 0, "Failed to initialize memory tracking code!" );
DNASSERT( FALSE );
goto Failure;
}
g_dwCommonInitFlags |= MEMORY_TRACKING_INITED;
#endif // DBG or DPNBUILD_FIXEDMEMORYMODEL
#ifdef DBG
//
// initialize handle tracking
//
if ( DNHandleTrackInitialize() == FALSE )
{
DPFX(DPFPREP, 0, "Failed to initialize handle tracking code!" );
DNASSERT( FALSE );
goto Failure;
}
g_dwCommonInitFlags |= HANDLE_TRACKING_INITED;
#endif // DBG
#if ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY)))
//
// Initialize global pools
//
if (!g_fpClassFactories.Initialize( sizeof( _IDirectPlayClassFactory ), NULL, NULL, NULL, NULL))
{
DPFX(DPFPREP, 0, "Failed to initialize class factory pool!" );
goto Failure;
}
g_dwCommonInitFlags |= CLASSFAC_POOL_INITED;
if (!g_fpObjectDatas.Initialize( sizeof( _OBJECT_DATA ), NULL, NULL, NULL, NULL))
{
DPFX(DPFPREP, 0, "Failed to initialize object data pool!" );
goto Failure;
}
g_dwCommonInitFlags |= OBJDATA_POOL_INITED;
if (!g_fpInterfaceLists.Initialize( sizeof( _INTERFACE_LIST ), NULL, NULL, NULL, NULL))
{
DPFX(DPFPREP, 0, "Failed to initialize interface list pool!" );
goto Failure;
}
g_dwCommonInitFlags |= INTLIST_POOL_INITED;
#endif // ! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY
srand(GETTIMESTAMP());
#if (((! defined(WINCE)) && (! defined(_XBOX))) || (! defined(DPNBUILD_NOSERIALSP)) || (defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL)) || ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY))) )
Exit:
#endif // (! WINCE and ! _XBOX) or ! DPNBUILD_NOSERIALSP or DBG or DPNBUILD_FIXEDMEMORYMODEL or (! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY)
if ( fReturn != FALSE )
{
DEBUG_ONLY( g_fOSIndirectionLayerInitialized = TRUE );
}
return fReturn;
#if (((! defined(WINCE)) && (! defined(_XBOX))) || (! defined(DPNBUILD_NOSERIALSP)) || (defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL)) || ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY))) )
Failure:
fReturn = FALSE;
DNOSIndirectionDeinit();
goto Exit;
#endif // (! WINCE and ! _XBOX) or ! DPNBUILD_NOSERIALSP or DBG or DPNBUILD_FIXEDMEMORYMODEL or (! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY)
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNOSIndirectionDeinit - deinitialize OS indirection layer
//
// Entry: Nothing
//
// Exit: Nothing
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNOSIndirectionDeinit"
void DNOSIndirectionDeinit( void )
{
#if ((! defined(DPNBUILD_LIBINTERFACE)) && (! defined(DPNBUILD_NOCLASSFACTORY)))
//
// DeInitialize global pools
//
if (g_dwCommonInitFlags & CLASSFAC_POOL_INITED)
{
g_fpClassFactories.DeInitialize();
}
if (g_dwCommonInitFlags & OBJDATA_POOL_INITED)
{
g_fpObjectDatas.DeInitialize();
}
if (g_dwCommonInitFlags & INTLIST_POOL_INITED)
{
g_fpInterfaceLists.DeInitialize();
}
#endif // ! DPNBUILD_LIBINTERFACE and ! DPNBUILD_NOCLASSFACTORY
#ifdef DBG
if (g_dwCommonInitFlags & HANDLE_TRACKING_INITED)
{
if (DNHandleTrackDumpLeaks())
{
// There were leaks, break so we can look at the log
DNASSERT(0);
}
DNHandleTrackDeinitialize();
}
#endif // DBG
#if ((defined(DBG)) && (! defined(DPNBUILD_ONLYONETHREAD)))
//
// Display CritSec leaks before displaying memory leaks, because displaying memory leaks
// may free the memory for the CritSec and corrupt the CritSec bilink
//
if (g_dwCommonInitFlags & CRITSEC_TRACKING_INITED)
{
if (DNCSTrackDumpLeaks())
{
// There were leaks, break so we can look at the log
DNASSERT(0);
}
DNCSTrackDeinitialize();
}
#endif // DBG and ! DPNBUILD_ONLYONETHREAD
#if ((defined(DBG)) || (defined(DPNBUILD_FIXEDMEMORYMODEL)))
if (g_dwCommonInitFlags & MEMORY_TRACKING_INITED)
{
#ifdef DBG
if (DNMemoryTrackDumpLeaks())
{
// There were leaks, break so we can look at the log
DNASSERT(0);
}
#endif // DBG
DNMemoryTrackDeinitialize();
}
#endif // DBG or DPNBUILD_FIXEDMEMORYMODEL
#ifdef WINNT
// This should be done after functions that use a Dacl will no longer be
// called (CreateMutex, CreateFile, etc).
if (g_pEveryoneACL)
{
HeapFree(GetProcessHeap(), 0, g_pEveryoneACL);
g_pEveryoneACL = NULL;
}
#endif // WINNT
DEBUG_ONLY( g_fOSIndirectionLayerInitialized = FALSE );
#if !defined(DPNBUILD_LIBINTERFACE) || defined(DBG)
g_dwCommonInitFlags = 0;
#endif // !defined(DPNBUILD_LIBINTERFACE) || defined(DBG)
}
//**********************************************************************
#undef DPF_MODNAME
#define DPF_MODNAME "DNinet_ntow"
void DNinet_ntow( IN_ADDR in, WCHAR* pwsz )
{
// NOTE: pwsz should be 16 characters (4 3-digit numbers + 3 '.' + \0)
swprintf(pwsz, L"%d.%d.%d.%d", in.s_net, in.s_host, in.s_lh, in.s_impno);
}
#undef DPF_MODNAME
#define DPF_MODNAME "DNGetRandomNumber"
DWORD DNGetRandomNumber()
{
return (rand() | (rand() << 16));
}
#if ((! defined(WINCE)) && (! defined(_XBOX)))
//**********************************************************************
// ------------------------------
// DNGetOSType - get OS type
//
// Entry: Nothing
//
// Exit: OS type
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNGetOSType"
UINT_PTR DNGetOSType( void )
{
#ifdef DBG
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
#endif // DBG
return g_OSVersionInfo.dwPlatformId;
}
#endif // ! WINCE and ! _XBOX
#ifdef WINNT
//**********************************************************************
// ------------------------------
// DNOSIsXPOrGreater - return TRUE if OS is WindowsXP or later or NT flavor
//
// Entry: Nothing
//
// Exit: BOOL
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNOSIsXPOrGreater"
BOOL DNOSIsXPOrGreater( void )
{
#ifdef DBG
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
#endif // DBG
return ((g_OSVersionInfo.dwPlatformId == VER_PLATFORM_WIN32_NT) &&
((g_OSVersionInfo.dwMajorVersion > 5) || ((g_OSVersionInfo.dwMajorVersion == 5) && (g_OSVersionInfo.dwMinorVersion >= 1)))
);
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNGetNullDacl - get a SECURITY_ATTRIBUTE structure that specifies a
// NULL DACL which is accesible by all users.
//
// Entry: Nothing
//
// Exit: PSECURITY_ATTRIBUTES
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNGetNullDacl"
PSECURITY_ATTRIBUTES DNGetNullDacl()
{
PSID psidEveryone = NULL;
SID_IDENTIFIER_AUTHORITY siaWorld = SECURITY_WORLD_SID_AUTHORITY;
DWORD dwAclSize;
// This is done to make this function independent of DNOSIndirectionInit so that the debug
// layer can call it before the indirection layer is initialized.
if (!g_fDaclInited)
{
if (!InitializeSecurityDescriptor((SECURITY_DESCRIPTOR*)g_pSD, SECURITY_DESCRIPTOR_REVISION))
{
DPFX(DPFPREP, 0, "Failed to initialize security descriptor" );
goto Error;
}
// Create SID for the Everyone group.
if (!AllocateAndInitializeSid(&siaWorld, 1, SECURITY_WORLD_RID, 0,
0, 0, 0, 0, 0, 0, &psidEveryone))
{
DPFX(DPFPREP, 0, "Failed to allocate Everyone SID" );
goto Error;
}
dwAclSize = sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + GetLengthSid(psidEveryone) - sizeof(DWORD);
// Allocate the ACL, this won't be a tracked allocation and we will let process cleanup destroy it
g_pEveryoneACL = (PACL)HeapAlloc(GetProcessHeap(), 0, dwAclSize);
if (g_pEveryoneACL == NULL)
{
DPFX(DPFPREP, 0, "Failed to allocate ACL buffer" );
goto Error;
}
// Intialize the ACL.
if (!InitializeAcl(g_pEveryoneACL, dwAclSize, ACL_REVISION))
{
DPFX(DPFPREP, 0, "Failed to initialize ACL" );
goto Error;
}
// Add the ACE.
if (!AddAccessAllowedAce(g_pEveryoneACL, ACL_REVISION, GENERIC_ALL, psidEveryone))
{
DPFX(DPFPREP, 0, "Failed to add ACE to ACL" );
goto Error;
}
// We no longer need the SID that was allocated.
FreeSid(psidEveryone);
psidEveryone = NULL;
// Add the ACL to the security descriptor..
if (!SetSecurityDescriptorDacl((SECURITY_DESCRIPTOR*)g_pSD, TRUE, g_pEveryoneACL, FALSE))
{
DPFX(DPFPREP, 0, "Failed to add ACL to security descriptor" );
goto Error;
}
g_sa.nLength = sizeof(SECURITY_ATTRIBUTES);
g_sa.lpSecurityDescriptor = g_pSD;
g_sa.bInheritHandle = FALSE;
g_psa = &g_sa;
g_fDaclInited = TRUE;
}
Error:
if (psidEveryone)
{
FreeSid(psidEveryone);
psidEveryone = NULL;
}
return g_psa;
}
//**********************************************************************
#endif // WINNT
#ifndef DPNBUILD_NOSERIALSP
//**********************************************************************
// ------------------------------
// DNGetApplicationInstance - application instance
//
// Entry: Nothing
//
// Exit: Application instance
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNGetApplicationInstance"
HINSTANCE DNGetApplicationInstance( void )
{
#ifdef DBG
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
#endif // DBG
return g_hApplicationInstance;
}
//**********************************************************************
#endif // ! DPNBUILD_NOSERIALSP
#ifndef DPNBUILD_ONLYONETHREAD
//**********************************************************************
// ------------------------------
// DNOSInitializeCriticalSection - initialize a critical section
//
// Entry: Pointer to critical section
//
// Exit: Boolean indicating success
// TRUE = success
// FALSE = failue
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNOSInitializeCriticalSection"
BOOL DNOSInitializeCriticalSection( CRITICAL_SECTION* pCriticalSection )
{
BOOL fReturn;
DNASSERT( pCriticalSection != NULL );
fReturn = TRUE;
//
// attempt to enter the critical section once
//
_try
{
#ifdef WINNT
// Pre-allocate the critsec event by setting the high bit of the spin count and set spin to 1000
// NT converts the spin to 0 for single proc machines.
fReturn = InitializeCriticalSectionAndSpinCount( pCriticalSection , 0x80000000 | 1000);
#else
InitializeCriticalSection( pCriticalSection );
#endif // WINNT
}
_except( EXCEPTION_EXECUTE_HANDLER )
{
fReturn = FALSE;
}
_try
{
if (fReturn)
{
EnterCriticalSection( pCriticalSection );
}
}
_except( EXCEPTION_EXECUTE_HANDLER )
{
DeleteCriticalSection(pCriticalSection);
fReturn = FALSE;
}
//
// if we didn't fail on entering the critical section, make sure
// we release it
//
if ( fReturn != FALSE )
{
LeaveCriticalSection( pCriticalSection );
}
return fReturn;
}
//**********************************************************************
#endif // !DPNBUILD_ONLYONETHREAD
#ifdef DBG
#ifdef WINCE
#undef DPF_MODNAME
#define DPF_MODNAME "DNGetProfileInt"
UINT DNGetProfileInt(LPCTSTR lpszSection, LPCTSTR lpszEntry, int nDefault)
{
DWORD dwResult;
CRegistry reg;
DNASSERT(_tcscmp(lpszSection, _T("DirectPlay8")) == 0);
if (!reg.Open(HKEY_LOCAL_MACHINE, _T("Software\\Microsoft\\DirectPlay8")))
{
// NOTE: This will occur during DllRegisterServer for the first time
return nDefault;
}
if (!reg.ReadDWORD(lpszEntry, &dwResult))
{
return nDefault;
}
return dwResult;
}
#else // ! WINCE
#if ((defined(_XBOX)) && (! defined(XBOX_ON_DESKTOP)))
#undef DPF_MODNAME
#define DPF_MODNAME "DNGetProfileInt"
UINT DNGetProfileInt(LPCTSTR lpszSection, LPCTSTR lpszEntry, int nDefault)
{
DWORD dwResult;
FILE * pFile = NULL;
TCHAR tszLine[256];
TCHAR * ptszTrimStart;
TCHAR * ptszTrimEnd;
BOOL fInSection = FALSE;
DNASSERT(_tcscmp(lpszSection, _T("DirectPlay8")) == 0);
//
// Populate the default return value.
//
dwResult = nDefault;
//
// Open a "win.ini" file in the root of the title's launch directory.
//
pFile = fopen(_T("D:\\win.ini"), "r");
if (pFile == NULL)
{
goto Exit;
}
//
// Look for the section and entry.
//
while (_fgetts(tszLine, (sizeof(tszLine) - sizeof(TCHAR)), pFile) != NULL)
{
//
// Trim whitespace from the beginning of the line.
//
ptszTrimStart = tszLine;
while (((*ptszTrimStart) == _T('\n')) ||
((*ptszTrimStart) == _T('\r')) ||
((*ptszTrimStart) == _T(' ')) ||
((*ptszTrimStart) == _T('\t')))
{
if ((*ptszTrimStart) == 0)
{
break;
}
ptszTrimStart++;
}
//
// Trim whitespace off the end of the line.
//
ptszTrimEnd = ptszTrimStart + _tcslen(ptszTrimStart) - 1;
while (((*ptszTrimEnd) == _T('\n')) ||
((*ptszTrimEnd) == _T('\r')) ||
((*ptszTrimEnd) == _T(' ')) ||
((*ptszTrimEnd) == _T('\t')))
{
if (ptszTrimEnd <= ptszTrimStart)
{
break;
}
ptszTrimEnd--;
}
//
// Ignore commented lines (starts with semicolon).
//
if ((*ptszTrimStart) != _T(';'))
{
//
// If it starts and ends with brackets, it's a section header.
//
if (((*ptszTrimStart) == _T('[')) && ((*ptszTrimEnd) == _T(']')))
{
//
// If we were in the section, then we've left it and we're
// done.
//
if (fInSection)
{
break;
}
//
// Trim whitespace from inside the start of the brackets.
//
*ptszTrimEnd = 0;
ptszTrimEnd--;
ptszTrimStart++;
while (((*ptszTrimStart) == _T('\n')) ||
((*ptszTrimStart) == _T('\r')) ||
((*ptszTrimStart) == _T(' ')) ||
((*ptszTrimStart) == _T('\t')))
{
if ((*ptszTrimStart) == 0)
{
break;
}
ptszTrimStart++;
}
while (((*ptszTrimEnd) == _T('\n')) ||
((*ptszTrimEnd) == _T('\r')) ||
((*ptszTrimEnd) == _T(' ')) ||
((*ptszTrimEnd) == _T('\t')))
{
if (ptszTrimEnd <= ptszTrimStart)
{
break;
}
ptszTrimEnd--;
}
*(ptszTrimEnd + 1) = 0;
//
// Is this the right section?
//
if (_tcsicmp(ptszTrimStart, lpszSection) == 0)
{
fInSection = TRUE;
}
}
else
{
//
// If we're in the section, determine the key
// name.
//
if (fInSection)
{
TCHAR * ptszKeyEnd;
TCHAR * ptszValue;
*(ptszTrimEnd + 1) = 0;
ptszKeyEnd = ptszTrimStart;
while ((ptszKeyEnd < ptszTrimEnd) &&
((*ptszKeyEnd) != _T('=')))
{
ptszKeyEnd++;
}
if ((*ptszKeyEnd) == _T('='))
{
ptszValue = ptszKeyEnd + 1;
ptszKeyEnd--;
while (((*ptszKeyEnd) == _T('\n')) ||
((*ptszKeyEnd) == _T('\r')) ||
((*ptszKeyEnd) == _T(' ')) ||
((*ptszKeyEnd) == _T('\t')))
{
if (ptszKeyEnd <= ptszTrimStart)
{
break;
}
ptszKeyEnd--;
}
*(ptszKeyEnd + 1) = 0;
//
// If we matched the key name, convert the
// value and bail.
//
if (_tcsicmp(ptszTrimStart, lpszEntry) == 0)
{
dwResult = _ttoi(ptszValue);
goto Exit;
}
}
}
else
{
//
// Not in section.
//
}
}
}
else
{
//
// Line is commented, ignore.
//
}
}
Exit:
if (pFile != NULL)
{
fclose(pFile);
pFile = NULL;
}
return dwResult;
}
#endif // _XBOX and ! XBOX_ON_DESKTOP
#endif // ! WINCE
#endif // DBG
#if defined(WINCE) && !defined(WINCE_ON_DESKTOP)
//**********************************************************************
//**
//** Begin CE layer. Here we implement functions we need that aren't on CE.
//**
//**********************************************************************
#undef DPF_MODNAME
#define DPF_MODNAME "OpenEvent"
HANDLE WINAPI OpenEvent(IN DWORD dwDesiredAccess, IN BOOL bInheritHandle, IN LPCWSTR lpName)
{
HANDLE h;
h = CreateEvent(0, 1, 0, lpName);
if (!h)
{
return NULL;
}
if (GetLastError() != ERROR_ALREADY_EXISTS)
{
CloseHandle(h);
return NULL;
}
return h;
}
#undef DPF_MODNAME
#define DPF_MODNAME "OpenFileMapping"
HANDLE WINAPI OpenFileMapping(IN DWORD dwDesiredAccess, IN BOOL bInheritHandle, IN LPCWSTR lpName)
{
HANDLE h;
DWORD dwFlags = 0;
if (dwDesiredAccess & FILE_MAP_WRITE)
{
// If they ask for FILE_MAP_ALL_ACCESS or FILE_MAP_WRITE, they get read and write
dwFlags = PAGE_READWRITE;
}
else
{
// If they only ask for FILE_MAP_READ, they get read only
dwFlags = PAGE_READONLY;
}
h = CreateFileMapping(INVALID_HANDLE_VALUE, 0, dwFlags, 0, 1, lpName);
if (!h)
{
return NULL;
}
if (GetLastError() != ERROR_ALREADY_EXISTS)
{
CloseHandle(h);
return NULL;
}
return h;
}
#undef DPF_MODNAME
#define DPF_MODNAME "OpenMutex"
HANDLE WINAPI OpenMutex(IN DWORD dwDesiredAccess, IN BOOL bInheritHandle, IN LPCWSTR lpName)
{
HANDLE h;
h = CreateMutex(0, 0, lpName);
if (!h)
{
return NULL;
}
if (GetLastError() != ERROR_ALREADY_EXISTS)
{
CloseHandle(h);
return NULL;
}
return h;
}
/*
#ifdef _X86_
__declspec(naked)
LONG WINAPI InterlockedExchangeAdd( LPLONG Addend, LONG Increment )
{
__asm
{
mov ecx, [esp + 4] ; get addend address
mov eax, [esp + 8] ; get increment value
lock xadd [ecx], eax ; exchange add}
ret
}
}
#endif // _X86
*/
#endif // WINCE
//**********************************************************************
//**
//** End CE layer. Here we implement functions we need that aren't on CE.
//**
//**********************************************************************
#if ((defined(WINCE)) || (defined(DPNBUILD_LIBINTERFACE)))
#undef DPF_MODNAME
#define DPF_MODNAME "DNCoCreateGuid"
HRESULT DNCoCreateGuid(GUID* pguid)
{
pguid->Data1 = (rand() << 16) | rand();
pguid->Data2 = (WORD)rand();
pguid->Data3 = (WORD)rand();
pguid->Data4[0] = (BYTE)rand();
pguid->Data4[1] = (BYTE)rand();
pguid->Data4[2] = (BYTE)rand();
pguid->Data4[3] = (BYTE)rand();
pguid->Data4[4] = (BYTE)rand();
pguid->Data4[5] = (BYTE)rand();
pguid->Data4[6] = (BYTE)rand();
pguid->Data4[7] = (BYTE)rand();
return S_OK;
}
#endif // WINCE or DPNBUILD_LIBINTERFACE
#ifndef DPNBUILD_NOPARAMVAL
BOOL IsValidStringA( const CHAR * const lpsz )
{
#ifndef WINCE
return (!IsBadStringPtrA( lpsz, 0xFFFF ) );
#else
const char* szTmpLoc = lpsz;
//
// If it is a NULL pointer just return FALSE, they are always bad
//
if (szTmpLoc == NULL)
{
return FALSE;
}
_try
{
for( ; *szTmpLoc ; szTmpLoc++ );
}
_except(EXCEPTION_EXECUTE_HANDLER)
{
return FALSE;
}
return TRUE;
#endif // WINCE
}
BOOL IsValidStringW( const WCHAR * const lpwsz )
{
#ifdef WINNT
//
// This function is only valid on NT.
// It exists for WIN9x, but only via the MS Layer for Unicode which requires us to jump through hoops when linking
//
return (!IsBadStringPtrW( lpwsz, 0xFFFF ) );
#else
const wchar_t *szTmpLoc = lpwsz;
//
// If it is a NULL pointer just return FALSE, they are always bad
//
if( szTmpLoc == NULL )
{
return FALSE;
}
_try
{
for( ; *szTmpLoc ; szTmpLoc++ );
}
_except( EXCEPTION_EXECUTE_HANDLER )
{
return FALSE;
}
return TRUE;
#endif // WINNT
}
#endif // !DPNBUILD_NOPARAMVAL