Solved

TObject.Destroy

Posted on 2000-04-10
7
195 Views
Last Modified: 2010-04-04
Is anybody out there willing to let me have the source code for TObject.Destroy from Delphi 3?

There might be a question about copyright infringement, but I don't know how valid it is about an outdated product. All I need is that one method.
0
Comment
Question by:HorridMan
  • 3
  • 3
7 Comments
 
LVL 6

Expert Comment

by:DrDelphi
ID: 2702840
Well, Delphi 3 is hardly obsolete... maybe not as used as other, newer versions, but not quite a relic yet. <g> As for the copyright infringements... I doubt that there would be any considering Borland ships its source with the Client/Server versions of Delphi. Now how much this is going to men to you when you see the destructor, welllll.....




TObject.Destroy
begin
end;


Of course there is the TObject.Free method which contains some assembler code...


procedure TObject.Free;
asm
        TEST    EAX,EAX
        JE      @@exit
        MOV     ECX,[EAX]
        MOV     DL,1
        CALL    dword ptr [ECX].vmtDestroy
@@exit:
end;



Good luck!!
0
 
LVL 20

Expert Comment

by:Madshi
ID: 2703045
In D5 (don't know about D3 right now) there are the methods CleanupInstance and FreeInstance. Both methods must not be called directly. Instead they are called automatically after all (overwritten) destructors have been executed.
0
 

Author Comment

by:HorridMan
ID: 2714036
This question has a deletion request Pending
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:HorridMan
ID: 2714046
This question is perhaps not justifiable, and has not received a serious answer.
0
 
LVL 6

Expert Comment

by:DrDelphi
ID: 2714544
This question no longer is pending deletion
0
 
LVL 6

Accepted Solution

by:
DrDelphi earned 20 total points
ID: 2714545
"This question is perhaps not justifiable, and has not received a serious answer."....

Poppycock! The question has recieved not one, but two serious answers. Methinks that the points were never meant to be awarded. Truly a Horrid Man!

 
0
 

Author Comment

by:HorridMan
ID: 2718671
Let's have a contest to see who's most horrid!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now