摘要:
1. Introduction.1.1 In parts 1 through 3 of this series of articles, I have thoroughly discussed the techniques for exchanging arrays between managed and unmanaged code by way of SAFEARRAYs.1.2 The kn... 阅读全文
摘要:
1. Introduction.1.1 In part 1 of this series of articles, I demonstrated how to transfer managed arrays to unmanaged code as SAFEARRAYs. The transfer was single-directional “into” the unmanaged functi... 阅读全文
摘要:
1. Introduction.1.1 In part 1 of this series of articles, I explained how managed arrays may be transferred to unmanaged code as a SAFEARRAY.1.2 In part 1, the SAFEARRAY was passed to unmanaged code a... 阅读全文
摘要:
1. Introduction.1.1 I have previously written about exchanging SAFEARRAYs of managed structures with unmanaged code via COM interop.1.2 In this new series of articles, I shall expound on the exchange ... 阅读全文
摘要:
1. Introduction.1.1 In part 1 of this series of blogs we studied how to pass a managed structure (which contains strings) to unmanaged code. The structure was passed as an “in” (by-value) parameter, i... 阅读全文
摘要:
1. Introduction.1.1 In part 1 of this series of blogs we studied how to pass a managed structure (which contains strings) to unmanaged code. The structure was passed as an “in” (by-value) parameter, i... 阅读全文
摘要:
1. Introduction.1.1 Managed structures that contain strings are a common sight. The trouble is that managed strings are non-blittable. This means that they do not have a single common representation i... 阅读全文