Recursive Directory Copying

Using CopyFile and FindFirstFile win32 base API to recursively copy a directory in code.

.

Environment: Tested on VC6 for 2000 sp3:

I always needed something similar to the xcopy command in code. I finally got around to writing something. This code consists of four functions that reproduce the results of using the following xcopy command:

xcopy /s /e source_directory destination_directory

The win32 CopyFile and FindFirst/NextFile functions are also used. For discerning directories from files the WIN32_FIND_DATA structure are analyzed.

There are a few points to note about the code. Firstly, the FindFirstFile function is used to enumerate through a directories contents (even though it is designed for finding a file if it is given wildcards it can find all files that fit a wildcard—*.* in this example).

tstring tSourceFile, tDestinationFile, tPath = lpszSource;
tPath+=_T("\\*.*");
HANDLE hFind = ::FindFirstFile(tPath.c_str(), 
                               &Fil! eInfo);

Secondly, the WIN32_FIND_DATA structure is analyzed to determine whether the current item is a directory using a mask:

if(FileInfo.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY)

The "." and ".." items exist in all directories and serve the exact purpose they do on the command line. Namely, if you call FindFirstFile with some path ending in "." it will give you a listing of files in the current directory. This is why the "." and ".." are ignored in the recursive helper.

Downloads

No longer available.



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be "the most devastating" due to the amount of damage privileged users can inflict and the type of data they can …

  • Companies undertaking an IT project need to find the right balance between cost and functionality. It's important to start by determining whether to build a solution from scratch, buy an out-of-the-box solution, or a combination of both. In reality, most projects will require some system tailoring to meet business requirements. Decision-makers must understand how much software development is enough and craft a detailed implementation plan to ensure the project's success. This white paper examines the different …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date