|
|
#include "shellprv.h"
#include "propsht.h"
#include "sencrypt.h"
#include "datautil.h"
#define IDM_ENCRYPT 0
#define IDM_DECRYPT 1
#define BOOL_UNINIT 5
// Local fns to this .cpp file
STDAPI CEncryptionContextMenuHandler_CreateInstance(IUnknown *punk, REFIID riid, void **ppv); BOOL InitSinglePrshtNoDlg(FILEPROPSHEETPAGE * pfpsp); BOOL InitMultiplePrshtNoDlg(FILEPROPSHEETPAGE* pfpsp);
// Class definition
class CEncryptionContextMenu : public IShellExtInit, public IContextMenu { public: CEncryptionContextMenu(); HRESULT Init_FolderContentsInfo(); // IUnknown
STDMETHODIMP QueryInterface(REFIID riid, void **ppv); STDMETHODIMP_(ULONG) AddRef(void); STDMETHODIMP_(ULONG) Release(void); // IContextMenu
STDMETHODIMP QueryContextMenu(HMENU hmenu, UINT indexMenu, UINT idCmdFirst, UINT idCmdLast, UINT uFlags); STDMETHODIMP InvokeCommand(LPCMINVOKECOMMANDINFO pici); STDMETHODIMP GetCommandString(UINT_PTR idCmd, UINT uType, UINT *pRes, LPSTR pszName, UINT cchMax); // IShellExtInit
STDMETHODIMP Initialize(LPCITEMIDLIST pidlFolder, IDataObject *pdtobj, HKEY hkeyProgID);
private: virtual ~CEncryptionContextMenu(); static DWORD CALLBACK EncryptThreadProc(void *pv) { return ((CEncryptionContextMenu *) pv)->_Encrypt(); }; DWORD _Encrypt(); BOOL _InitPrsht(FILEPROPSHEETPAGE * pfpsp); BOOL _AreFilesEncryptable(IDataObject *pdtobj);
LONG _cRef; // Reference count
UINT _uFileCount; // number of files selected
HWND _hwnd; // Window that we're working over
BOOL _fEncrypt; // If true, do encrypt; if false, do decrypt
FILEPROPSHEETPAGE _fpsp; // Prop sheet page to be filled in and run through properties funcs
BOOL _fEncryptAllowed; // True iff we are allowed to encrypt
IDataObject *_pdtobj; // Our data object. Keep in orig. thread
TCHAR _szPath[MAX_PATH]; // Path of first thing clicked on
};
// Constructor & Destructor
CEncryptionContextMenu::CEncryptionContextMenu() : _cRef(1) { DllAddRef();
_fEncryptAllowed = FALSE; // compute this at ::Initialize() time
_uFileCount = 0; _hwnd = 0; _fEncrypt = FALSE; _pdtobj = NULL; ZeroMemory(&_fpsp, sizeof(_fpsp)); }
CEncryptionContextMenu::~CEncryptionContextMenu() { ATOMICRELEASE(_pdtobj); if (_fpsp.pfci) { Release_FolderContentsInfo(_fpsp.pfci); } DllRelease(); }
HRESULT CEncryptionContextMenu::Init_FolderContentsInfo() { HRESULT hr = E_OUTOFMEMORY; _fpsp.pfci = Create_FolderContentsInfo(); if (_fpsp.pfci) { hr = S_OK; } return hr; }
// IUnknown implementation. Standard stuff, nothing fancy.
HRESULT CEncryptionContextMenu::QueryInterface(REFIID riid, void **ppvObj) { static const QITAB qit[] = { QITABENT(CEncryptionContextMenu, IShellExtInit), QITABENT(CEncryptionContextMenu, IContextMenu), { 0 }, }; return QISearch(this, qit, riid, ppvObj); }
ULONG CEncryptionContextMenu::AddRef() { return InterlockedIncrement(&_cRef); }
ULONG CEncryptionContextMenu::Release() { ASSERT( 0 != _cRef ); ULONG cRef = InterlockedDecrement(&_cRef); if ( 0 == cRef ) { delete this; } return cRef; }
// IShellExtInit implementation
STDMETHODIMP CEncryptionContextMenu::Initialize(LPCITEMIDLIST pidlFolder, IDataObject *pdtobj, HKEY hkeyProgID) { HRESULT hr = S_FALSE; // registry key that enables/disables this menu
BOOL fEnableEncryptMenu = SHRegGetBoolUSValue(TEXT("SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced"), TEXT("EncryptionContextMenu"), 0, 0);
if (fEnableEncryptMenu && !SHRestricted(REST_NOENCRYPTION) && !_fEncryptAllowed) { _fEncryptAllowed = _AreFilesEncryptable(pdtobj); if (_fEncryptAllowed) { IUnknown_Set((IUnknown **)&_pdtobj, pdtobj); hr = S_OK; } } return hr; }
// Checks the data object to see if we can encrypt here.
BOOL CEncryptionContextMenu::_AreFilesEncryptable(IDataObject *pdtobj) { BOOL fSuccess = FALSE; STGMEDIUM medium; FORMATETC fe = {CF_HDROP, NULL, DVASPECT_CONTENT, -1, TYMED_HGLOBAL}; if (SUCCEEDED(pdtobj->GetData(&fe, &medium))) { // Get the file name from the CF_HDROP.
_uFileCount = DragQueryFile((HDROP)medium.hGlobal, (UINT)-1, NULL, 0); if (_uFileCount) { if (DragQueryFile((HDROP)medium.hGlobal, 0, _szPath, ARRAYSIZE(_szPath))) { TCHAR szFileSys[MAX_PATH]; fSuccess = (FS_FILE_ENCRYPTION & GetVolumeFlags(_szPath, szFileSys, ARRAYSIZE(szFileSys))); } } ReleaseStgMedium(&medium); } return fSuccess; } // IContextMenuHandler impelementation
STDMETHODIMP CEncryptionContextMenu::QueryContextMenu(HMENU hmenu, UINT indexMenu, UINT idCmdFirst, UINT idCmdLast, UINT uFlags) { HRESULT hr = E_FAIL;
if ((uFlags & CMF_DEFAULTONLY) || !_fEncryptAllowed) { hr = MAKE_HRESULT(SEVERITY_SUCCESS, 0, USHORT(1)); //this menu only allows the defaults or we can't encrypt
} else { TCHAR szEncryptMsg[128], szDecryptMsg[128];
// If only one item is selected, display enc or dec as appropriate
if (_uFileCount == 1) { DWORD dwAttribs = GetFileAttributes(_szPath); if (dwAttribs != (DWORD)-1) { LoadString(HINST_THISDLL, IDS_ECM_ENCRYPT, szEncryptMsg, ARRAYSIZE(szEncryptMsg)); if (!(dwAttribs & FILE_ATTRIBUTE_ENCRYPTED)) { if (InsertMenu(hmenu, indexMenu, MF_STRING | MF_BYPOSITION, idCmdFirst + IDM_ENCRYPT, szEncryptMsg)) { hr = MAKE_HRESULT(SEVERITY_SUCCESS, 0, USHORT(IDM_ENCRYPT + 1)); } } else { LoadString(HINST_THISDLL, IDS_ECM_DECRYPT, szDecryptMsg, ARRAYSIZE(szDecryptMsg)); if (InsertMenu(hmenu, indexMenu, MF_STRING | MF_BYPOSITION, idCmdFirst + IDM_ENCRYPT + 1, szDecryptMsg)) { hr = MAKE_HRESULT(SEVERITY_SUCCESS, 0, USHORT(IDM_DECRYPT + 1)); } } } } else if (idCmdLast - idCmdFirst >= 2) { LoadString(HINST_THISDLL, IDS_ECM_ENCRYPT, szEncryptMsg, ARRAYSIZE(szDecryptMsg)); LoadString(HINST_THISDLL, IDS_ECM_DECRYPT, szDecryptMsg, ARRAYSIZE(szDecryptMsg));
// If more than one item is selected, display both enc and dec
if (InsertMenu(hmenu, indexMenu, MF_STRING | MF_BYPOSITION, idCmdFirst + IDM_ENCRYPT, szEncryptMsg)) { if (InsertMenu(hmenu, indexMenu + 1, MF_STRING | MF_BYPOSITION, idCmdFirst + IDM_DECRYPT, szDecryptMsg)) { hr = MAKE_HRESULT(SEVERITY_SUCCESS, 0, USHORT(IDM_DECRYPT + 1)); } else { // If you can't add both, add neither
RemoveMenu(hmenu, indexMenu, MF_BYPOSITION); } } } }
return hr; }
const ICIVERBTOIDMAP c_IDMap[] = { { L"encrypt", "encrypt", IDM_ENCRYPT, IDM_ENCRYPT, }, { L"decrypt", "decrypt", IDM_DECRYPT, IDM_DECRYPT, }, };
STDMETHODIMP CEncryptionContextMenu::InvokeCommand(LPCMINVOKECOMMANDINFO pici) { UINT uID; HRESULT hr = E_FAIL; if (_fEncryptAllowed) { hr = SHMapICIVerbToCmdID(pici, c_IDMap, ARRAYSIZE(c_IDMap), &uID); if (SUCCEEDED(hr)) { switch (uID) { case IDM_ENCRYPT: case IDM_DECRYPT: _fEncrypt = (IDM_ENCRYPT == uID); break;
default: ASSERTMSG(0, "Should never get commands we didn't put on the menu..."); break; }
_hwnd = pici->hwnd; // The handle to the explorer window that called us.
ASSERT(NULL == _fpsp.pfci->hida);
hr = DataObj_CopyHIDA(_pdtobj, &_fpsp.pfci->hida); if (SUCCEEDED(hr)) { AddRef(); // Give our background thread a ref
// Start the new thread here
if (SHCreateThread(EncryptThreadProc, this, CTF_COINIT | CTF_FREELIBANDEXIT, NULL)) { hr = S_OK; } else { Release(); // thread create failed
} } } }
// If we succeeded or not, we give up our data here
ATOMICRELEASE(_pdtobj); return hr; }
STDMETHODIMP CEncryptionContextMenu::GetCommandString(UINT_PTR idCommand, UINT uFlags, UINT *pRes, LPSTR pszName, UINT uMaxNameLen) { HRESULT hr = E_INVALIDARG;
// Note that because we can be specifically asked for
// UNICODE or ansi strings, we have to be ready to load all strings in
// either version.
if (idCommand == IDM_ENCRYPT || idCommand == IDM_DECRYPT) { switch(uFlags) { case GCS_HELPTEXTA: if (idCommand == IDM_ENCRYPT) { LoadStringA(HINST_THISDLL, IDS_ECM_ENCRYPT_HELP, pszName, uMaxNameLen); } else { LoadStringA(HINST_THISDLL, IDS_ECM_DECRYPT_HELP, pszName, uMaxNameLen); }
hr = S_OK; break; case GCS_HELPTEXTW: if (idCommand == IDM_ENCRYPT) { LoadStringW(HINST_THISDLL, IDS_ECM_ENCRYPT_HELP, (LPWSTR)pszName, uMaxNameLen); } else { LoadStringW(HINST_THISDLL, IDS_ECM_DECRYPT_HELP, (LPWSTR)pszName, uMaxNameLen); }
hr = S_OK; break; case GCS_VERBA: case GCS_VERBW: hr = SHMapCmdIDToVerb(idCommand, c_IDMap, ARRAYSIZE(c_IDMap), pszName, uMaxNameLen, GCS_VERBW == uFlags); break; default: hr = S_OK; break; } } return hr;
}
STDAPI CEncryptionContextMenuHandler_CreateInstance(IUnknown *punk, REFIID riid, void **ppv) { HRESULT hr;
*ppv = NULL; CEncryptionContextMenu *pdocp = new CEncryptionContextMenu(); if (pdocp) { hr = pdocp->Init_FolderContentsInfo(); if (SUCCEEDED(hr)) { hr = pdocp->QueryInterface(riid, ppv); } pdocp->Release(); } else { hr = E_OUTOFMEMORY; }
return hr; }
// Multithread code
// Proc for thread that does the encryption and manages the progress dialong.
// The passed parameter is a ptr hwnd to be made modal for the context menu
DWORD CEncryptionContextMenu::_Encrypt(void) { // Transfer ownership in case someone reenters our thread creator
// Init the property sheet
BOOL fSuccess = _InitPrsht(&_fpsp); if (fSuccess) { // Set encryption opts, turn off compression
if (_fEncrypt) { _fpsp.asCurrent.fCompress = FALSE; _fpsp.asCurrent.fEncrypt = TRUE; } else { _fpsp.asCurrent.fEncrypt = FALSE; } // See if the user wants to do this recursive-style
if (_fpsp.fIsDirectory) { // check to see if the user wants to apply the attribs recursively or not
fSuccess = (int)DialogBoxParam(HINST_THISDLL, MAKEINTRESOURCE(DLG_ATTRIBS_RECURSIVE), _hwnd, RecursivePromptDlgProc, (LPARAM)&_fpsp); } // Apply encryption, remember to turn off compression
if (fSuccess) { if (_fpsp.pfci->fMultipleFiles || _fpsp.fRecursive) { ApplyMultipleFileAttributes(&_fpsp); } else { ApplySingleFileAttributesNoDlg(&_fpsp, _hwnd); } } } // As far as I can tell, nothing in fpsp must be freed
// But, we give up the storage medium here
Release(); // Release our ref
return fSuccess; // Must give a ret value
}
// Helper to init the passed prsht
BOOL CEncryptionContextMenu::_InitPrsht(FILEPROPSHEETPAGE * pfpsp) { // Init the propsht properly
BOOL fSuccess = S_OK == InitCommonPrsht(pfpsp); if (fSuccess) { if (_uFileCount == 1) { fSuccess = InitSinglePrshtNoDlg(pfpsp); } else if (_uFileCount > 1) { fSuccess = InitMultiplePrshtNoDlg(pfpsp); } } return fSuccess; }
//
// Descriptions:
// This function fills fields of the multiple object property sheet,
// without getting the current state from the dialog.
//
BOOL InitMultiplePrshtNoDlg(FILEPROPSHEETPAGE* pfpsp) { SHFILEINFO sfi; TCHAR szBuffer[MAX_PATH+1]; TCHAR szType[MAX_PATH] = {0}; TCHAR szDirPath[MAX_PATH] = {0}; int iItem; BOOL fMultipleType = FALSE; BOOL fSameLocation = TRUE; DWORD dwFlagsOR = 0; // start all clear
DWORD dwFlagsAND = (DWORD)-1; // start all set
DWORD dwVolumeFlagsAND = (DWORD)-1; // start all set
// For all the selected files compare their types and get their attribs
for (iItem = 0; HIDA_FillFindData(pfpsp->pfci->hida, iItem, szBuffer, NULL, FALSE); iItem++) { DWORD dwFileAttributes = GetFileAttributes(szBuffer);
dwFlagsAND &= dwFileAttributes; dwFlagsOR |= dwFileAttributes;
// process types only if we haven't already found that there are several types
if (!fMultipleType) { SHGetFileInfo((LPTSTR)IDA_GetIDListPtr((LPIDA)GlobalLock(pfpsp->pfci->hida), iItem), 0, &sfi, sizeof(sfi), SHGFI_PIDL|SHGFI_TYPENAME);
if (szType[0] == TEXT('\0')) StringCchCopy(szType, ARRAYSIZE(szType), sfi.szTypeName); else fMultipleType = lstrcmp(szType, sfi.szTypeName) != 0; }
dwVolumeFlagsAND &= GetVolumeFlags(szBuffer, pfpsp->szFileSys, ARRAYSIZE(pfpsp->szFileSys)); // check to see if the files are in the same location
if (fSameLocation) { PathRemoveFileSpec(szBuffer);
if (szDirPath[0] == TEXT('\0')) StrCpyN(szDirPath, szBuffer, ARRAYSIZE(szDirPath)); else fSameLocation = (lstrcmpi(szDirPath, szBuffer) == 0); } }
if ((dwVolumeFlagsAND & FS_FILE_ENCRYPTION) && !SHRestricted(REST_NOENCRYPTION)) { // all the files are on volumes that support encryption (eg NTFS)
pfpsp->fIsEncryptionAvailable = TRUE; } if (dwVolumeFlagsAND & FS_FILE_COMPRESSION) { pfpsp->pfci->fIsCompressionAvailable = TRUE; }
//
// HACKHACK (reinerf) - we dont have a FS_SUPPORTS_INDEXING so we
// use the FILE_SUPPORTS_SPARSE_FILES flag, because native index support
// appeared first on NTFS5 volumes, at the same time sparse file support
// was implemented.
//
if (dwVolumeFlagsAND & FILE_SUPPORTS_SPARSE_FILES) { // yup, we are on NTFS5 or greater
pfpsp->fIsIndexAvailable = TRUE; }
// if any of the files was a directory, then we set this flag
if (dwFlagsOR & FILE_ATTRIBUTE_DIRECTORY) { pfpsp->fIsDirectory = TRUE; }
// setup all the flags based on what we found out
SetInitialFileAttribs(pfpsp, dwFlagsAND, dwFlagsOR);
// set the current attributes to the same as the initial
pfpsp->asCurrent = pfpsp->asInitial;
if (fSameLocation) { LoadString(HINST_THISDLL, IDS_ALLIN, szBuffer, ARRAYSIZE(szBuffer)); StrCatBuff(szBuffer, szDirPath, ARRAYSIZE(szBuffer)); StrCpyN(pfpsp->szPath, szDirPath, ARRAYSIZE(pfpsp->szPath)); }
UpdateSizeField(pfpsp, NULL);
return TRUE; }
//
// Descriptions:
// This function fills fields of the "general" dialog box (a page of
// a property sheet) with attributes of the associated file. Doesn't
// make calss to hDlg
//
BOOL InitSinglePrshtNoDlg(FILEPROPSHEETPAGE * pfpsp) { TCHAR szBuffer[MAX_PATH]; SHFILEINFO sfi;
// fd is filled in with info from the pidl, but this
// does not contain all the date/time information so hit the disk here.
HANDLE hfind = FindFirstFile(pfpsp->szPath, &pfpsp->fd); ASSERT(hfind != INVALID_HANDLE_VALUE); if (hfind == INVALID_HANDLE_VALUE) { // if this failed we should clear out some values as to not show garbage on the screen.
ZeroMemory(&pfpsp->fd, sizeof(pfpsp->fd)); } else { FindClose(hfind); }
// get info about the file.
SHGetFileInfo(pfpsp->szPath, pfpsp->fd.dwFileAttributes, &sfi, sizeof(sfi), SHGFI_ICON|SHGFI_LARGEICON| SHGFI_DISPLAYNAME| SHGFI_TYPENAME | SHGFI_ADDOVERLAYS);
// .ani cursor hack!
if (StrCmpI(PathFindExtension(pfpsp->szPath), TEXT(".ani")) == 0) { HICON hIcon = (HICON)LoadImage(NULL, pfpsp->szPath, IMAGE_ICON, 0, 0, LR_LOADFROMFILE); if (hIcon) { if (sfi.hIcon) DestroyIcon(sfi.hIcon);
sfi.hIcon = hIcon; } }
// set the initial rename state
pfpsp->fRename = FALSE;
// set the file type
if (pfpsp->fMountedDrive) { TCHAR szVolumeGUID[MAX_PATH]; TCHAR szVolumeLabel[MAX_PATH];
//Borrow szVolumeGUID
LoadString(HINST_THISDLL, IDS_MOUNTEDVOLUME, szVolumeGUID, ARRAYSIZE(szVolumeGUID));
//use szVolumeLabel temporarily
StringCchCopy(szVolumeLabel, ARRAYSIZE(szVolumeLabel), pfpsp->szPath); PathAddBackslash(szVolumeLabel); GetVolumeNameForVolumeMountPoint(szVolumeLabel, szVolumeGUID, ARRAYSIZE(szVolumeGUID));
if (!GetVolumeInformation(szVolumeGUID, szVolumeLabel, ARRAYSIZE(szVolumeLabel), NULL, NULL, NULL, pfpsp->szFileSys, ARRAYSIZE(pfpsp->szFileSys))) { *szVolumeLabel = 0; }
if (!(*szVolumeLabel)) LoadString(HINST_THISDLL, IDS_UNLABELEDVOLUME, szVolumeLabel, ARRAYSIZE(szVolumeLabel)); }
// save off the initial short filename, and set the "Name" edit box
StringCchCopy(pfpsp->szInitialName, ARRAYSIZE(pfpsp->szInitialName), sfi.szDisplayName);
// use a strcmp to see if we are showing the extension
if (lstrcmpi(sfi.szDisplayName, PathFindFileName(pfpsp->szPath)) == 0) { // since the strings are the same, we must be showing the extension
pfpsp->fShowExtension = TRUE; }
StringCchCopy(szBuffer, ARRAYSIZE(szBuffer), pfpsp->szPath); PathRemoveFileSpec(szBuffer); // Are we a folder shortcut?
if (!pfpsp->fFolderShortcut) { // set the initial attributes
SetInitialFileAttribs(pfpsp, pfpsp->fd.dwFileAttributes, pfpsp->fd.dwFileAttributes); // set the current attributes to the same as the initial
pfpsp->asCurrent = pfpsp->asInitial; UpdateSizeField(pfpsp, &pfpsp->fd); if (!(pfpsp->fd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY)) { // Check to see if the target file is a lnk, because if it is a lnk then
// we need to display the type information for the target, not the lnk itself.
if (PathIsShortcut(pfpsp->szPath, pfpsp->fd.dwFileAttributes)) { pfpsp->fIsLink = TRUE; } if (!(GetFileAttributes(pfpsp->szPath) & FILE_ATTRIBUTE_OFFLINE)) { UpdateOpensWithInfo(pfpsp); } } else { pfpsp->fIsDirectory = TRUE; } // get the full path to the folder that contains this file.
StrCpyN(szBuffer, pfpsp->szPath, ARRAYSIZE(szBuffer)); PathRemoveFileSpec(szBuffer); } return TRUE; }
STDAPI_(BOOL) ApplySingleFileAttributesNoDlg(FILEPROPSHEETPAGE* pfpsp, HWND hwnd) { BOOL bRet = TRUE; BOOL bSomethingChanged = FALSE;
if (!pfpsp->fRecursive) { bRet = ApplyFileAttributes(pfpsp->szPath, pfpsp, hwnd, &bSomethingChanged); if (bSomethingChanged) { // something changed, so generate a notification for the item
SHChangeNotify(SHCNE_UPDATEITEM, SHCNF_PATH, pfpsp->szPath, NULL); } } else { // We only should be doing a recursive operation if we have a directory!
ASSERT(pfpsp->fIsDirectory);
CreateAttributeProgressDlg(pfpsp);
// apply attribs to this folder & sub files/folders
bRet = ApplyRecursiveFolderAttribs(pfpsp->szPath, pfpsp); // send out a notification for the whole dir, regardless of the return value since
// something could have changed even if the user hit cancel
SHChangeNotify(SHCNE_UPDATEDIR, SHCNF_PATH, pfpsp->szPath, NULL); DestroyAttributeProgressDlg(pfpsp); }
if (bRet) { // since we just sucessfully applied attribs, reset any tri-state checkboxes as necessary
//UpdateTriStateCheckboxes(pfpsp);
// the user did NOT hit cancel, so update the prop sheet to reflect the new attribs
pfpsp->asInitial = pfpsp->asCurrent; }
// handle any events we may have generated
SHChangeNotifyHandleEvents();
return bRet; }
|