Files
ueforth/site/windows.html
2025-07-04 16:18:03 -07:00

96 lines
2.3 KiB
HTML

<!DOCTYPE html>
<!--
Copyright 2021 Bradley D. Nelson
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<head>
#include "head.html"
<title>µEforth for Windows</title>
</head>
<body>
<h1>µEforth for Windows</h1>
#include "menu.html"
<div class="wrapper">
<h2>Download</h2>
<p>
µEforth for Windows</h1>
Unfortunately, Window Defender's heuristics falsely identify uEforth.exe builds as malware.
And recently Google Cloud also started identifying them as abuse.
As a result, I've removed hosting of them.
</p>
<p>
Instead build as follows (using the Windows Subsystem for Linux):
<pre>
sudo apt install ninja-build
git clone https://github.com/flagxor/ueforth
cd ueforth
./configure.py
ninja
</pre>
</p>
<hr/>
<h2>µEforth</h2>
<h3>µEforth Words</h3>
#include "common.html"
#include "files_common.html"
<h3>Windows</h3>
<h4>Windows Opcodes</h4>
<p>
The wealth of Windows .DLL and system functionality can be
accessed via the dynamic loading interface.
A handle to a library is obtained with <code>LOADLIBRARYA</code>,
and then individual symbols are accessed with <code>GETPROCADDRESS</code>.
</p>
<pre>
LOADLIBRARYA ( dllname-z -- module )
GETPROCADDRESS ( module name-z -- fn )
</pre>
<p>
And assembly version of <code>*/MOD</code> is provided to allow the EXE to build without
including MSVCRT.
</p>
<p>
See <a href="https://github.com/flagxor/ueforth/blob/main/windows/windows_main.c">windows_main.c</a>.
</p>
<p>
Native functions all called with CALL(n) (see Windows &amp; Linux Calling below).
</p>
<h4>Windows Imports</h4>
<p>
Various Win32 calls are imported in
<a href="https://github.com/flagxor/ueforth/blob/main/windows/windows.fs">windows.fs</a>.
In addition, a terminal that responds to ANSI escape codes is created and connected to
<code>TYPE</code> and <code>KEY</code>.
</p>
#include "desktop_common.html"