stefan pushed a commit to branch devs/stefan/mingw-hackery.
commit 4f2657cac618c06084f35512b7a97afedfe6f74b
Author: Stefan Schmidt <[email protected]>
Date: Thu Mar 7 14:31:32 2013 +0000
Lets see if we can go further if we ignore this for now
---
src/lib/evil/evil_link_xp.cpp | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/src/lib/evil/evil_link_xp.cpp b/src/lib/evil/evil_link_xp.cpp
index 2b5b956..a026fe0 100644
--- a/src/lib/evil/evil_link_xp.cpp
+++ b/src/lib/evil/evil_link_xp.cpp
@@ -2,11 +2,13 @@
# include "config.h"
#endif /* HAVE_CONFIG_H */
+#if 0
#include <errno.h>
#include <shlobj.h>
#include <objidl.h>
#include <cstdio>
+#endif
#include "Evil.h"
@@ -22,6 +24,7 @@
int
symlink(const char *oldpath, const char *newpath)
{
+#if 0
char fullname[PATH_MAX];
wchar_t *wnewpath;
IShellLink *pISL;
@@ -78,11 +81,13 @@ symlink(const char *oldpath, const char *newpath)
no_instance:
CoUninitialize();
return -1;
+#endif
}
ssize_t
readlink(const char *path, char *buf, size_t bufsiz)
{
+#if 0
wchar_t *wpath;
char new_path[PATH_MAX];
IShellLink *pISL;
@@ -146,4 +151,5 @@ readlink(const char *path, char *buf, size_t bufsiz)
couninitialize:
CoUninitialize();
return -1;
+#endif
}
--
------------------------------------------------------------------------------
Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester
Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the
endpoint security space. For insight on selecting the right partner to
tackle endpoint security challenges, access the full report.
http://p.sf.net/sfu/symantec-dev2dev