in reply to Re: Named pipes on Win32
in thread Named pipes on Win32

I would have thought that the blocking issue would be resolved by the PARENT using the peek() method to see if there is something to get from the pipe?

Sockets have, sadly, become pretty useless in Win32 environments these days - certianly in end user ones. A selection of totally brain dead Windows firewall and security software interferes with sockets unmercifully. Anyone using a socket must be a hacker with ill intent after all, mustn't they?

Integrating into the Tk event loop isn't rocket science, the process is well documented.

jdtoronto

Replies are listed 'Best First'.
Re^3: Named pipes on Win32
by BrowserUk (Patriarch) on Jun 15, 2006 at 18:42 UTC

    You can also use Peek() on anonymous pipes, though you will need to access the underlying API PeekNamePipe() via Win32::API. Just pass the anonymous pipe handle in place of the named pipe handle and it works fine.

    It would not be a huge problem to use this to allow select work with anonymous pipes on Win32. It would just require someone who is prepared to jump through the p5p hoops to go in and implement it.

    My own experience of attempting to use Win32::Pipe has been less than satisfactory, mostly because of the limited set of the NamedPipe API set that it supports. I found it easier to use Win32::API to gain access to the underlying API's.


    Examine what is said, not who speaks -- Silence betokens consent -- Love the truth but pardon error.
    Lingua non convalesco, consenesco et abolesco. -- Rule 1 has a caveat! -- Who broke the cabal?
    "Science is about questioning the status quo. Questioning authority".
    In the absence of evidence, opinion is indistinguishable from prejudice.