stefan pushed a commit to branch devs/stefan/mingw-hackery.

commit 4f2657cac618c06084f35512b7a97afedfe6f74b
Author: Stefan Schmidt <[email protected]>
Date:   Thu Mar 7 14:31:32 2013 +0000

    Lets see if we can go further if we ignore this for now
---
 src/lib/evil/evil_link_xp.cpp | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/src/lib/evil/evil_link_xp.cpp b/src/lib/evil/evil_link_xp.cpp
index 2b5b956..a026fe0 100644
--- a/src/lib/evil/evil_link_xp.cpp
+++ b/src/lib/evil/evil_link_xp.cpp
@@ -2,11 +2,13 @@
 # include "config.h"
 #endif /* HAVE_CONFIG_H */
 
+#if 0
 #include <errno.h>
 
 #include <shlobj.h>
 #include <objidl.h>
 #include <cstdio>
+#endif
 
 #include "Evil.h"
 
@@ -22,6 +24,7 @@
 int
 symlink(const char *oldpath, const char *newpath)
 {
+#if 0
    char          fullname[PATH_MAX];
    wchar_t      *wnewpath;
    IShellLink   *pISL;
@@ -78,11 +81,13 @@ symlink(const char *oldpath, const char *newpath)
  no_instance:
    CoUninitialize();
    return -1;
+#endif
 }
 
 ssize_t
 readlink(const char *path, char *buf, size_t bufsiz)
 {
+#if 0
    wchar_t      *wpath;
    char          new_path[PATH_MAX];
    IShellLink   *pISL;
@@ -146,4 +151,5 @@ readlink(const char *path, char *buf, size_t bufsiz)
  couninitialize:
    CoUninitialize();
    return -1;
+#endif
 }

-- 

------------------------------------------------------------------------------
Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester  
Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the  
endpoint security space. For insight on selecting the right partner to 
tackle endpoint security challenges, access the full report. 
http://p.sf.net/sfu/symantec-dev2dev

Reply via email to