Solved

Regarding Serialization ...

Posted on 1998-12-13
2
315 Views
Last Modified: 2013-11-20
hello everybody
I am going through MFC tutorials (Scribble). There is one object declared
as follows :

CTypePtrList<CObList, CStroke *> m_strokeList;

The serialise function in CScribbleDoc is declared as follows :

      if (ar.IsStoring())
      {
            // TODO: add storing code here
      }
      else
      {
            // TODO: add loading code here
      }

      m_strokeList.Serialize( ar );

And the serialise function for "CStroke" has been defined and implemented.
What i am unable to understand is that how does the serialise function
of "CStroke" is being called when i save the document.
What i understand is that m_strokeList.Serialise() calls the serialise
function of the base class "CObject". Now how does the base class knows
that the object being serialised is list of pointes which are to be
serialised one by one so that serialise function of CStroke is called
for all pointers in the m_strokeList.
 
The "DECLARE_SERIAL" and "IMPLEMENT_SERIAL" macros are present in CStroke.

0
Comment
Question by:aarya
2 Comments
 
LVL 15

Accepted Solution

by:
Tommy Hui earned 10 total points
Comment Utility
The CList is derived from CObject. Basically, every CObject-derived class has the ability to serialize itself. So in this case, when the CList container is asked to serialize itself, it knows to store information about itself into the document. It also knows that there are objects in the link and saves them into a stream.

There's a book called MFC Internals by Sheppard and Wingo. Take a look at it if you want to know more about the internals of MFC.
0
 

Author Comment

by:aarya
Comment Utility
Well, what i dont understand is that CObject derived class in this case CObList does not override the functionality of serialize function so how can CObject have knowledge to take care of the fact that each member of the CObList is to be serialized.

If CObList had been overriding the serialize function then i can understand how they would have implemented but otherwise how can u take care.

Any nice to have response from u.
 Thui it seems that u r point rich man. I have plenty of questions to ask but no points left. Can u do me a favor to lend few points.
 Thanks in advance.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

This is to be the first in a series of articles demonstrating the development of a complete windows based application using the MFC classes.  I’ll try to keep each article focused on one (or a couple) of the tasks that one may meet.   Introductio…
Introduction: Dynamic window placements and drawing on a form, simple usage of windows registry as a storage place for information. Continuing from the first article about sudoku.  There we have designed the application and put a lot of user int…
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now