Recursive Directory Copying

Using CopyFile and FindFirstFile win32 base API to recursively copy a directory in code.

.

Environment: Tested on VC6 for 2000 sp3:

I always needed something similar to the xcopy command in code. I finally got around to writing something. This code consists of four functions that reproduce the results of using the following xcopy command:

xcopy /s /e source_directory destination_directory

The win32 CopyFile and FindFirst/NextFile functions are also used. For discerning directories from files the WIN32_FIND_DATA structure are analyzed.

There are a few points to note about the code. Firstly, the FindFirstFile function is used to enumerate through a directories contents (even though it is designed for finding a file if it is given wildcards it can find all files that fit a wildcard—*.* in this example).

tstring tSourceFile, tDestinationFile, tPath = lpszSource;
tPath+=_T("\\*.*");
HANDLE hFind = ::FindFirstFile(tPath.c_str(), 
                               &Fil! eInfo);

Secondly, the WIN32_FIND_DATA structure is analyzed to determine whether the current item is a directory using a mask:

if(FileInfo.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY)

The "." and ".." items exist in all directories and serve the exact purpose they do on the command line. Namely, if you call FindFirstFile with some path ending in "." it will give you a listing of files in the current directory. This is why the "." and ".." are ignored in the recursive helper.

Downloads

No longer available.



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Thanks to wide spread cloud hosting and innovations small businesses can meet and exceed the legacy systems of goliath corporations. Explore the freedom to work how you want, with a phone system that will adapt to your evolving needs and actually save you lots of expense—read Get an Enterprise Phone System without High Cost and Complexity. The article clearly illustrates: The only hardware you'll need is phone equipment for advanced voice and fax. How to join all your employees, mobile devices, …

  • Do you spend a lot of time thinking about your enemies? Attacker attribution - figuring out who's out to get you - is one of the most important things an organization can do to protect itself.  Because you have no hope of defending yourself if you don't understand who the attackers are. Good news? Every organization isn't targeted by all the attackers. Bad news? No one can identify your potential attackers as well as you. Read this graphics-rich threat summary for 2014 to determine who might be your next …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date