|
|
/**********************************************************************/ /** Microsoft Windows/NT **/ /** Copyright(c) Microsoft Corporation, 1997 - 1999 **/ /**********************************************************************/
/*
rtrutil.cpp FILE HISTORY: */
#include "stdafx.h"
#include "rtrutilp.h"
#include "cnctdlg.h"
#include "cncting.h"
#include "rtrstr.h"
#include "ndisutil.h"
#include "netcfgx.h"
#include "register.h"
#include "raseapif.h"
#include "strings.h"
#include "reg.h" // IsNT4Machine
#include "ports.h"
#include "helper.h" // CStrParser
// Include headers needed for IP-specific infobase stuff
#include <rtinfo.h>
#include <fltdefs.h>
#include <ipinfoid.h>
#include <iprtrmib.h>
#include "iprtinfo.h"
// Headers needed for IPX-specific infobase stuff
#include "ipxrtdef.h"
#include <routprot.h> // protocol ids
#include <Wbemidl.h>
#define _PNP_POWER_
#include "ustringp.h"
#include "ntddip.h" // IP_PNP_RECONFIG_REQUEST
#include "ndispnp.h"
#include "globals.h" // structure defaults
#include "raserror.h"
#include "lsa.h" // RtlEncode/RtlDecode
#include "dsgetdc.h" // for DsGetDcName
#include "cmptrmgr.h" // for the computer management nodetype guid
extern "C" { #include "mprapip.h" // for MprAdminDomain functions
};
#include "rtutils.h" // Tracing functions
#include "rtrcomn.h" // CoCreateRouterConfig
#include "rrasutil.h"
//
// Timeouts used to control the behavior of ServiceStartPrompt/ServiceStop
//
#define TIMEOUT_START 5000
#define TIMEOUT_MAX 60000
#define TIMEOUT_POLL 5
#define MAX_WAIT_RESTART 60
extern "C" DWORD APIENTRY MprConfigCreateIpInterfaceInfo(DWORD dwIfType, PBYTE ExistingHeader, PBYTE* NewHeader );
//----------------------------------------------------------------------------
// Function: ConnectRouter
//
// Connects to the router on the specified machine
//----------------------------------------------------------------------------
TFSCORE_API(DWORD) ConnectRouter( IN LPCTSTR pszMachine, OUT MPR_SERVER_HANDLE * phrouter ) { USES_CONVERSION; //
// Connect to the router
//
Assert(*phrouter == NULL);
return ::MprAdminServerConnect( T2W((LPTSTR) pszMachine), phrouter ); }
TFSCORE_API(DWORD) GetRouterUpTime(IN LPCTSTR pszMachine, OUT DWORD * pdwUpTime ) { DWORD dwError = NO_ERROR; MPR_SERVER_HANDLE hMprServer = NULL; Assert(pdwUpTime);
dwError = ConnectRouter(pszMachine, &hMprServer);
if (NO_ERROR == dwError && hMprServer) { MPR_SERVER_0* pServer0 = NULL; dwError = MprAdminServerGetInfo(hMprServer, 0, (LPBYTE *) &pServer0);
if (NO_ERROR == dwError && pServer0) { *pdwUpTime = pServer0->dwUpTime; MprAdminBufferFree(pServer0); }
MprAdminServerDisconnect(hMprServer); }
return dwError; }
//----------------------------------------------------------------------------
// Function: GetRouterPhonebookPath
//
// Constructs the path to the router-phonebook file on the given machine.
//----------------------------------------------------------------------------
HRESULT GetRouterPhonebookPath( IN LPCTSTR pszMachine, IN CString * pstPath ) { HRESULT hr = hrOK;
if (!IsLocalMachine(pszMachine)) { // Assuming '\\\\' is appended before the call
Assert(StrnCmp(_T("\\\\"), pszMachine, 2) == 0); //
// Supply the path via the 'ADMIN' share
//
*pstPath = pszMachine; *pstPath += TEXT('\\'); *pstPath += c_szAdminShare; *pstPath += TEXT('\\'); *pstPath += c_szSystem32; *pstPath += TEXT('\\'); } else {
UINT i, j; TCHAR* pszDir;
//
// Supply the path on the local machine
//
if (!(i = GetSystemDirectory(NULL, 0))) return HResultFromWin32(GetLastError());
pszDir = new TCHAR[++i];
if (!GetSystemDirectory(pszDir, i)) { hr = HResultFromWin32(GetLastError()); delete [] pszDir; return hr; }
*pstPath = pszDir; *pstPath += TEXT('\\');
delete [] pszDir; }
*pstPath += c_szRAS; *pstPath += TEXT('\\'); *pstPath += c_szRouterPbk;
return hr; }
/*!--------------------------------------------------------------------------
DeleteRouterPhonebook Deletes the router.pbk of a machine Author: KennT ---------------------------------------------------------------------------*/ HRESULT DeleteRouterPhonebook(LPCTSTR pszMachine) { HRESULT hr = hrOK; CString stMachine, stPhonebookPath; // Setup the server. If this is not the local machine, it will
// need to have \\ as a prefix.
// ----------------------------------------------------------------
stMachine = pszMachine; if (!IsLocalMachine((LPCTSTR) stMachine)) { // add on the two slashes to the beginning of the machine name
// ------------------------------------------------------------
if (stMachine.Left(2) != _T("\\\\")) { stMachine = _T("\\\\"); stMachine += pszMachine; } }
if (FHrOK(GetRouterPhonebookPath(stMachine, &stPhonebookPath))) { // For bug 581673, Add synchronization to ras phonebook file
HANDLE hPbFile = NULL;
hPbFile = ::OpenMutexA( SYNCHRONIZE, FALSE, "RasPbFile" );
if( NULL == hPbFile ) { hr = HResultFromWin32( ::DeleteFile(stPhonebookPath) ); } else { ::WaitForSingleObject( hPbFile, INFINITE );
hr = HResultFromWin32( ::DeleteFile(stPhonebookPath) ); ::ReleaseMutex( hPbFile ); ::CloseHandle( hPbFile ); } } return hr; }
/*!--------------------------------------------------------------------------
GetLocalMachineName - Author: KennT ---------------------------------------------------------------------------*/ CString GetLocalMachineName() { CString stMachine; TCHAR szMachine[MAX_COMPUTERNAME_LENGTH + 1]; DWORD dwSize = MAX_COMPUTERNAME_LENGTH + 1;
Verify(GetComputerName(szMachine, &dwSize)); stMachine = szMachine; return stMachine; }
TFSCORE_API(DWORD) ConnectInterfaceEx( IN MPR_SERVER_HANDLE hRouter, IN HANDLE hInterface, IN BOOL bConnect, IN HWND hwndParent, IN LPCTSTR pszInterface) { DWORD dwErr;
Assert(hRouter); Assert(hInterface);
//
// Initiate the interface connection/disconnection
//
if (!bConnect) { dwErr = ::MprAdminInterfaceDisconnect(hRouter, hInterface); } else { dwErr = ::MprAdminInterfaceConnect(hRouter, hInterface, NULL, FALSE);
if (dwErr == PENDING) { dwErr = NO_ERROR; }
//
// Display a dialog so user knows connection is in progress
//
CInterfaceConnectDialog dlg(hRouter, hInterface, pszInterface, CWnd::FromHandle(hwndParent));
dlg.DoModal(); }
return dwErr; }
/*!--------------------------------------------------------------------------
ConnectInterface - Author: KennT ---------------------------------------------------------------------------*/ TFSCORE_API(DWORD) ConnectInterface( IN LPCTSTR pszMachine, IN LPCTSTR pszInterface, IN BOOL bConnect, IN HWND hwndParent) { DWORD dwErr; SPMprServerHandle sphRouter; MPR_SERVER_HANDLE hRouter = NULL; HANDLE hInterface; WCHAR wszInterface[MAX_INTERFACE_NAME_LEN+1];
//
// Connect to the specified machine, if necessary
//
dwErr = ConnectRouter(pszMachine, &hRouter); if (dwErr != NO_ERROR) return dwErr;
sphRouter.Attach(hRouter); // so that it gets released
//
// Retrieve the interface handle, if necessary
//
StrCpyWFromT(wszInterface, pszInterface);
dwErr = ::MprAdminInterfaceGetHandle( hRouter, wszInterface, &hInterface, FALSE );
if (dwErr != NO_ERROR) return dwErr;
return ConnectInterfaceEx(hRouter, hInterface, bConnect, hwndParent, pszInterface); }
/*---------------------------------------------------------------------------
CInterfaceConnectDialog ---------------------------------------------------------------------------*/
CInterfaceConnectDialog::CInterfaceConnectDialog( MPR_SERVER_HANDLE hServer, HANDLE hInterface, LPCTSTR pszInterface, CWnd* pParent ) : CDialog(IDD_CONNECTING, pParent), m_hServer(hServer), m_hInterface(hInterface), m_sInterface(pszInterface), m_dwTimeElapsed(0), m_dwConnectionState(ROUTER_IF_STATE_CONNECTING), m_nIDEvent(1) { }
void CInterfaceConnectDialog::DoDataExchange(CDataExchange* pDX) {
CDialog::DoDataExchange(pDX); //{{AFX_DATA_MAP(CInterfaceConnectDialog)
//}}AFX_DATA_MAP
}
BEGIN_MESSAGE_MAP(CInterfaceConnectDialog, CDialog) //{{AFX_MSG_MAP(CInterfaceConnectDialog)
ON_WM_TIMER() //}}AFX_MSG_MAP
END_MESSAGE_MAP()
BOOL CInterfaceConnectDialog::OnInitDialog() {
SetDlgItemText(IDC_EDIT_INTERFACENAME, m_sInterface);
OnTimer(m_nIDEvent);
m_nIDEvent = SetTimer(m_nIDEvent, 1000, NULL);
GetDlgItem(IDCANCEL)->SetFocus();
return FALSE; }
VOID CInterfaceConnectDialog::OnCancel() { ::MprAdminInterfaceDisconnect(m_hServer, m_hInterface); CDialog::OnCancel(); }
VOID CInterfaceConnectDialog::OnTimer( UINT nIDEvent ) {
DWORD dwErr; CString sTime, sPrompt; SPMprAdminBuffer spMprBuffer;
if (nIDEvent != m_nIDEvent) { CWnd::OnTimer(nIDEvent); return; }
++m_dwTimeElapsed;
if (!(m_dwTimeElapsed % TIMEOUT_POLL)) { MPR_INTERFACE_0* pInfo;
dwErr = ::MprAdminInterfaceGetInfo( m_hServer, m_hInterface, 0, (LPBYTE*)&spMprBuffer ); pInfo = (MPR_INTERFACE_0 *) (LPBYTE) spMprBuffer;
if (dwErr == NO_ERROR) { m_dwConnectionState = pInfo->dwConnectionState;
if (m_dwConnectionState == ROUTER_IF_STATE_CONNECTED) { KillTimer(m_nIDEvent); EndDialog(IDOK); } else if (m_dwConnectionState != ROUTER_IF_STATE_CONNECTING) { KillTimer(m_nIDEvent);
BringWindowToTop();
if (pInfo->dwLastError == NO_ERROR) { AfxMessageBox(IDS_ERR_IF_DISCONNECTED); } else { //Workaround for bugid: 96347. Change this once
//schannel has an alert for SEC_E_MULTIPLE_ACCOUNTS
if ( pInfo->dwLastError == SEC_E_CERT_UNKNOWN ) { pInfo->dwLastError = SEC_E_MULTIPLE_ACCOUNTS; } FormatSystemError(HResultFromWin32(pInfo->dwLastError), sPrompt.GetBuffer(1024), 1024, IDS_ERR_IF_CONNECTFAILED, FSEFLAG_ANYMESSAGE ); sPrompt.ReleaseBuffer(); AfxMessageBox(sPrompt); }
EndDialog(IDCANCEL); } } }
sPrompt = ConnectionStateToCString(m_dwConnectionState); SetDlgItemText(IDC_TEXT_IFSTATUS, sPrompt);
FormatNumber(m_dwTimeElapsed, sTime.GetBuffer(1024), 1024, FALSE); sTime.ReleaseBuffer(); AfxFormatString1(sPrompt, IDS_SECONDSFMT, sTime); SetDlgItemText(IDC_TEXT_ELAPSED, sPrompt); }
/*!--------------------------------------------------------------------------
PromptForCredentials - Author: KennT ---------------------------------------------------------------------------*/ TFSCORE_API(DWORD) PromptForCredentials(LPCTSTR pszMachine, LPCTSTR pszInterface, BOOL fNT4, BOOL fNewInterface, HWND hwndParent) { HRESULT hr; DWORD dwErr; ULONG_PTR uConnection = 0; SPMprServerHandle sphRouter; MPR_SERVER_HANDLE hRouter = NULL; HANDLE hInterface; PMPR_INTERFACE_2 pmprInterface = NULL; PMPR_CREDENTIALSEX_0 pmprCredentials = NULL; BYTE* pUserDataOut = NULL; WCHAR wszInterface[MAX_INTERFACE_NAME_LEN+1];
CIfCredentials dlg(pszMachine, pszInterface, fNewInterface, CWnd::FromHandle(hwndParent));
if (fNT4) { dlg.DoModal(); return NO_ERROR; }
//
// Connect to the specified machine
//
dwErr = ConnectRouter(pszMachine, &hRouter); if (dwErr != NO_ERROR) goto L_ERR;
//
// so that it gets released
//
sphRouter.Attach(hRouter);
//
// Retrieve the interface handle
//
StrCpyWFromT(wszInterface, pszInterface);
dwErr = ::MprAdminInterfaceGetHandle( hRouter, wszInterface, &hInterface, FALSE );
if (dwErr != NO_ERROR) goto L_ERR;
dwErr = ::MprAdminInterfaceGetInfo(hRouter, hInterface, 2, (LPBYTE*)&pmprInterface);
if (dwErr != NO_ERROR) goto L_ERR;
if (pmprInterface->dwfOptions & RASEO_RequireEAP) { GUID guid; RegKey regkeyEAP; RegKey regkeyEAPType; CString stConfigCLSID; DWORD dwInvokeUsername; DWORD dwId; DWORD dwSizeOfUserDataOut; CComPtr<IEAPProviderConfig> spEAPConfig;
dwId = pmprInterface->dwCustomAuthKey;
TCHAR szStr[40]; _ltot((LONG)dwId, szStr, 10); CString str(szStr);
dwErr = regkeyEAP.Open(HKEY_LOCAL_MACHINE, c_szEAPKey, KEY_ALL_ACCESS, pszMachine);
if (ERROR_SUCCESS != dwErr) goto L_ERR;
dwErr = regkeyEAPType.Open(regkeyEAP, str, KEY_READ);
if (ERROR_SUCCESS != dwErr) goto L_ERR;
dwErr = regkeyEAPType.QueryValue(c_szInvokeUsernameDialog, dwInvokeUsername);
if ((ERROR_SUCCESS == dwErr) && !dwInvokeUsername) { dwErr = ::MprAdminInterfaceGetCredentialsEx(hRouter, hInterface, 0, (LPBYTE*)&pmprCredentials);
if (dwErr != NO_ERROR) goto L_ERR;
dwErr = regkeyEAPType.QueryValue(c_szConfigCLSID, stConfigCLSID);
if (ERROR_SUCCESS != dwErr) goto L_ERR;
CHECK_HR(hr = CLSIDFromString((LPTSTR)(LPCTSTR)stConfigCLSID, &guid));
// Create the EAP provider object
CHECK_HR( hr = CoCreateInstance( guid, NULL, CLSCTX_INPROC_SERVER | CLSCTX_ENABLE_CODE_DOWNLOAD, IID_IEAPProviderConfig, (LPVOID *) &spEAPConfig) );
// Configure this EAP provider
hr = spEAPConfig->Initialize(pszMachine, dwId, &uConnection);
if ( !FAILED(hr) ) { hr = spEAPConfig->RouterInvokeCredentialsUI(dwId, uConnection, hwndParent, RAS_EAP_FLAG_ROUTER, pmprInterface->lpbCustomAuthData, pmprInterface->dwCustomAuthDataSize, pmprCredentials->lpbCredentialsInfo, pmprCredentials->dwSize, &pUserDataOut, &dwSizeOfUserDataOut);
spEAPConfig->Uninitialize(dwId, uConnection); // Ignore errors
}
if ( !FAILED(hr) ) { pmprCredentials->lpbCredentialsInfo = pUserDataOut; pmprCredentials->dwSize = dwSizeOfUserDataOut;
dwErr = ::MprAdminInterfaceSetCredentialsEx(hRouter, hInterface, 0, (LPBYTE)pmprCredentials);
if (dwErr != NO_ERROR) goto L_ERR; }
goto L_ERR; } }
dlg.DoModal();
L_ERR:
if (NULL != pmprInterface) { ::MprAdminBufferFree(pmprInterface); }
if (NULL != pmprCredentials) { ::MprAdminBufferFree(pmprCredentials); }
CoTaskMemFree(pUserDataOut);
return dwErr; }
/*---------------------------------------------------------------------------
CIfCredentials ---------------------------------------------------------------------------*/
BEGIN_MESSAGE_MAP(CIfCredentials, CBaseDialog) END_MESSAGE_MAP()
DWORD CIfCredentials::m_dwHelpMap[] = { IDC_EDIT_IC_USERNAME, 0, IDC_EDIT_IC_DOMAIN, 0, IDC_EDIT_IC_PASSWORD, 0, IDC_EDIT_IC_PASSWORD2, 0, 0,0 };
BOOL CIfCredentials::OnInitDialog( ) {
CBaseDialog::OnInitDialog();
((CEdit*)GetDlgItem(IDC_EDIT_IC_USERNAME))->LimitText(UNLEN); ((CEdit*)GetDlgItem(IDC_EDIT_IC_DOMAIN))->LimitText(DNLEN); ((CEdit*)GetDlgItem(IDC_EDIT_IC_PASSWORD))->LimitText(PWLEN); ((CEdit*)GetDlgItem(IDC_EDIT_IC_PASSWORD2))->LimitText(PWLEN);
//
// if you are editing a new interface, then you are done.
//
if ( m_bNewIf ) return FALSE;
//
// existing interface.
//
WCHAR wszPassword[PWLEN+1]; WCHAR wszPassword2[PWLEN+1];
do { DWORD dwErr = (DWORD) -1; CString sErr;
WCHAR wszUsername[UNLEN+1]; WCHAR wszDomain[DNLEN+1];
WCHAR *pswzMachine = NULL; WCHAR *pswzInterface = NULL;
//
// Retrieve its credentials
//
pswzMachine = (WCHAR *) alloca((m_sMachine.GetLength()+3) * sizeof(WCHAR)); StrCpyWFromT(pswzMachine, m_sMachine); pswzInterface = (WCHAR *) alloca((m_sInterface.GetLength()+1) * sizeof(WCHAR)); StrCpyWFromT(pswzInterface, m_sInterface);
::SecureZeroMemory( wszUsername, sizeof( wszUsername ) ); ::SecureZeroMemory( wszDomain, sizeof( wszDomain ) ); dwErr = MprAdminInterfaceGetCredentials( pswzMachine, pswzInterface, wszUsername, #if 1
NULL, #else
wszPassword, #endif
wszDomain );
//
// if credentials were not retrieved successfully do not pop
// up message. It might mean that credentials have never been
// set before.
// Fix for bug # 79607.
//
if ( dwErr != NO_ERROR ) { // FormatSystemError(dwErr, sErr, IDS_SET_CREDENTIALS_FAILED);
// AfxMessageBox(sErr);
break; }
//
// fill the edit boxes with the values retrieved.
//
SetDlgItemTextW( IDC_EDIT_IC_USERNAME, wszUsername ); SetDlgItemTextW( IDC_EDIT_IC_DOMAIN, wszDomain );
} while ( FALSE );
::SecureZeroMemory(wszPassword, sizeof(wszPassword)); ::SecureZeroMemory(wszPassword2, sizeof(wszPassword2)); // SetDlgItemText(IDC_EDIT_IC_USERNAME, m_sInterface);
return FALSE; }
VOID CIfCredentials::OnOK( ) {
DWORD dwErr; CString sErr; WCHAR wszMachine[MAX_COMPUTERNAME_LENGTH+3]; WCHAR wszInterface[MAX_INTERFACE_NAME_LEN+1]; WCHAR wszUsername[UNLEN+1]; WCHAR wszDomain[DNLEN+1]; WCHAR wszPassword[PWLEN+1]; WCHAR wszPassword2[PWLEN+1]; WCHAR* pwszPassword = NULL;
do {
//
// Retrieve the edit-controls' contents
//
wszUsername[0] = L'\0'; wszDomain[0] = L'\0'; wszPassword[0] = L'\0'; wszPassword2[0] = L'\0';
GetDlgItemTextW(IDC_EDIT_IC_USERNAME, wszUsername, UNLEN + 1); GetDlgItemTextW(IDC_EDIT_IC_DOMAIN, wszDomain, DNLEN + 1); GetDlgItemTextW(IDC_EDIT_IC_PASSWORD, wszPassword, PWLEN + 1); GetDlgItemTextW(IDC_EDIT_IC_PASSWORD2, wszPassword2, PWLEN + 1);
//
// Make sure the password matches its confirmation
//
if (lstrcmpW(wszPassword, wszPassword2)) {
AfxMessageBox(IDS_ERR_PASSWORD_MISMATCH); SetDlgItemText(IDC_EDIT_IC_PASSWORD, TEXT("")); SetDlgItemText(IDC_EDIT_IC_PASSWORD2, TEXT("")); GetDlgItem(IDC_EDIT_IC_PASSWORD)->SetFocus(); break; }
//
// If no Password is present, see if the user wants to remove
// the password or just leave it unreplaced
//
if (lstrlen(wszPassword)) {
pwszPassword = wszPassword; } else {
INT id;
id = AfxMessageBox(IDS_PROMPT_NOPASSWORD, MB_YESNOCANCEL|MB_DEFBUTTON2);
if (id == IDYES) { pwszPassword = wszPassword; } else if (id == IDCANCEL) { break; } }
//
// Save the credentials;
//
StrCpyWFromT(wszMachine, m_sMachine);
StrCpyWFromT(wszInterface, m_sInterface);
dwErr = MprAdminInterfaceSetCredentials( wszMachine, wszInterface, wszUsername, wszDomain, pwszPassword );
if (dwErr) { FormatSystemError(dwErr, sErr.GetBuffer(1024), 1024, IDS_ERR_SET_CREDENTIALS_FAILED, 0xFFFFFFFF); sErr.ReleaseBuffer(); AfxMessageBox(sErr); break; }
CBaseDialog::OnOK();
} while(FALSE);
//
// Erase the passwords from the stack.
//
::SecureZeroMemory(wszPassword, sizeof(wszPassword)); ::SecureZeroMemory(wszPassword2, sizeof(wszPassword2));
return; }
TFSCORE_API(DWORD) UpdateDDM(IInterfaceInfo *pIfInfo) {
BOOL bStatus = FALSE; DWORD dwErr = (DWORD) -1; CString sErr;
MPR_SERVER_HANDLE hServer = NULL; HANDLE hInterface = NULL;
WCHAR wszMachine[ MAX_COMPUTERNAME_LENGTH + 3 ]; WCHAR wszInterface[ MAX_INTERFACE_NAME_LEN + 1 ];
do { // Verify that the router service is running.
StrCpyWFromT( wszMachine, pIfInfo->GetMachineName() ); StrCpyWFromT( wszInterface, pIfInfo->GetId() ); bStatus = ::MprAdminIsServiceRunning( wszMachine ); if ( !bStatus ) { dwErr = NO_ERROR; break; }
dwErr = ConnectRouter( pIfInfo->GetMachineName(), &hServer ); if ( dwErr != NO_ERROR ) break;
dwErr = ::MprAdminInterfaceGetHandle( hServer, wszInterface, &hInterface, FALSE); if ( dwErr != NO_ERROR ) break;
// update phone book info. in DDM
dwErr = ::MprAdminInterfaceUpdatePhonebookInfo( hServer, hInterface ); if (dwErr != NO_ERROR ) break;
} while ( FALSE );
if (hServer) { ::MprAdminServerDisconnect(hServer); }
if ( dwErr != NO_ERROR && dwErr != ERROR_NO_SUCH_INTERFACE ) { FormatSystemError( dwErr, sErr.GetBuffer(1024), 1024, IDS_ERR_IF_CONNECTFAILED, 0xffffffff); sErr.ReleaseBuffer(); AfxMessageBox( sErr ); }
return dwErr; }
/*!--------------------------------------------------------------------------
UpdateRoutes Performs an autostatic update on the given machine's interface, for a specific transport.
Author: KennT ---------------------------------------------------------------------------*/ TFSCORE_API(DWORD) UpdateRoutesEx(IN MPR_SERVER_HANDLE hRouter, IN HANDLE hInterface, IN DWORD dwTransportId, IN HWND hwndParent, IN LPCTSTR pszInterface) { DWORD dwErr, dwState; MPR_INTERFACE_0* pmprif0=NULL;
do { // See if the interface is connected
dwErr = ::MprAdminInterfaceGetInfo(hRouter, hInterface, 0, (LPBYTE*)&pmprif0); if (dwErr != NO_ERROR || pmprif0 == NULL) { break; }
dwState = pmprif0->dwConnectionState; ::MprAdminBufferFree(pmprif0);
// Establish the connection if necessary
if (dwState != (DWORD)ROUTER_IF_STATE_CONNECTED) { // Connect the interface
dwErr = ::ConnectInterfaceEx(hRouter, hInterface, TRUE, hwndParent, pszInterface); if (dwErr != NO_ERROR) { break; } }
//
// Now perform the route-update
//
dwErr = ::MprAdminInterfaceUpdateRoutes( hRouter, hInterface, dwTransportId, NULL ); if (dwErr != NO_ERROR) { break; }
} while(FALSE);
return dwErr; }
TFSCORE_API(DWORD) UpdateRoutes(IN LPCTSTR pszMachine, IN LPCTSTR pszInterface, IN DWORD dwTransportId, IN HWND hwndParent) { DWORD dwErr, dwState; HANDLE hInterface = INVALID_HANDLE_VALUE; MPR_INTERFACE_0* pmprif0; SPMprServerHandle sphRouter; MPR_SERVER_HANDLE hMachine = NULL;;
//
// open a handle
//
dwErr = ConnectRouter(pszMachine, &hMachine); if (dwErr != NO_ERROR) return dwErr;
sphRouter.Attach(hMachine); // so that it gets released
do {
//
// open a handle to the interface
//
WCHAR wszInterface[MAX_INTERFACE_NAME_LEN + 1];
StrCpyWFromT(wszInterface, pszInterface);
dwErr = MprAdminInterfaceGetHandle( hMachine, wszInterface, &hInterface, FALSE ); if (dwErr != NO_ERROR) { break; }
dwErr = ::UpdateRoutesEx(hMachine, hInterface, dwTransportId, hwndParent, pszInterface); } while (FALSE);
return dwErr; }
/*!--------------------------------------------------------------------------
ConnectAsAdmin Connect to the remote machine as administrator with user-supplied credentials.
Returns S_OK - if a connection was established S_FALSE - if user cancelled out other - error condition Author: KennT ---------------------------------------------------------------------------*/ HRESULT ConnectAsAdmin( IN LPCTSTR szRouterName, IN IRouterInfo *pRouter) {
//
// allow user to specify credentials
//
DWORD dwRes = (DWORD) -1; HRESULT hr = hrOK; CConnectAsDlg caDlg; CString stIPCShare; CString stRouterName; CString stPassword;
stRouterName = szRouterName; //
// set message text in connect as dialog.
//
caDlg.m_sRouterName = szRouterName;
//
// loop till connect succeeds or user cancels
//
while ( TRUE ) {
// We need to ensure that this dialog is brought to
// the top (if it gets lost behind the main window, we
// are in trouble).
dwRes = caDlg.DoModal();
if ( dwRes == IDCANCEL ) { hr = S_FALSE; break; }
//
// Create remote resource name
//
stIPCShare.Empty(); if ( stRouterName.Left(2) != TEXT( "\\\\" ) ) { stIPCShare = TEXT( "\\\\" ); } stIPCShare += stRouterName; stIPCShare += TEXT( "\\" ); stIPCShare += c_szIPCShare;
NETRESOURCE nr;
nr.dwType = RESOURCETYPE_ANY; nr.lpLocalName = NULL; nr.lpRemoteName = (LPTSTR) (LPCTSTR) stIPCShare; nr.lpProvider = NULL;
//
// connect to \\router\ipc$ to try and establish credentials.
// May not be the best way to establish credentials but is
// the most expendient for now.
//
// Need to unencode the password in the ConnectAsDlg
stPassword = caDlg.m_sPassword;
RtlDecodeW(caDlg.m_ucSeed, stPassword.GetBuffer(0)); stPassword.ReleaseBuffer(); //Remove Net Connections if there are any present
RemoveNetConnection( stIPCShare); dwRes = WNetAddConnection2( &nr, (LPCTSTR) stPassword, (LPCTSTR) caDlg.m_sUserName, 0 );
// We need to save off the user name and password
if (dwRes == NO_ERROR) { // Parse out the user name, use an arbitrary key for
// the encoding.
SPIRouterAdminAccess spAdmin;
// For every connection that succeeds we have to ensure
// that the connection gets removed. Do this by storing
// the connections globally. This will get freed up in
// the IComponentData destructor.
// --------------------------------------------------------
AddNetConnection((LPCTSTR) stIPCShare);
spAdmin.HrQuery(pRouter); if (spAdmin) { UCHAR ucSeed = 0x83; CString stName; CString stUser; CString stDomain; LPCTSTR pszUser = NULL; LPCTSTR pszDomain = NULL; int iPos = 0; // Break the user name into domain\user
// look for the first forward slash
stName = caDlg.m_sUserName; if ((iPos = stName.FindOneOf(_T("\\"))) == -1) { // Couldn't find one, there is no domain info
pszUser = (LPCTSTR) stName; pszDomain = NULL; } else { stUser = stName.Right(stName.GetLength() - iPos - 1); stDomain = stName.Left(iPos); pszUser = (LPCTSTR) stUser; pszDomain = (LPCTSTR) stDomain; }
// Use the key 0x83 for the password
RtlEncodeW(&ucSeed, stPassword.GetBuffer(0)); stPassword.ReleaseBuffer(); spAdmin->SetInfo(pszUser, pszDomain, (BYTE *) (LPCTSTR) stPassword, stPassword.GetLength() * sizeof(WCHAR)); } }
::SecureZeroMemory(stPassword.GetBuffer(0), stPassword.GetLength() * sizeof(TCHAR)); stPassword.ReleaseBuffer();
if ( dwRes != NO_ERROR ) { PBYTE pbMsgBuf = NULL; ::FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM, NULL, dwRes, MAKELANGID( LANG_NEUTRAL, SUBLANG_DEFAULT ), // Default language
(LPTSTR) &pbMsgBuf, 0, NULL );
AfxMessageBox( (LPCTSTR) pbMsgBuf );
LocalFree( pbMsgBuf ); }
else { //
// connection succeeded
//
hr = hrOK; break; } }
return hr; } DWORD ValidateMachine(const CString &sName, BOOL bDisplayErr) { // We don't use this info just
// make the call to see if the server is out there. Hopefully
// this will be faster than the RegConnectRegistry call.
// We get info level 102 because this will also tell
// us if we have the correct permissions for the machine.
SERVER_INFO_102 *psvInfo102; DWORD dwr = NetServerGetInfo((LPTSTR)(LPCTSTR)sName, 102, (LPBYTE*)&psvInfo102); if (dwr == ERROR_SUCCESS) { NetApiBufferFree(psvInfo102);
} else if (bDisplayErr) { CString str; str.Format(IDS_ERR_THEREHASBEEN, sName); AfxMessageBox(str); } return dwr; }
/*!--------------------------------------------------------------------------
InitiateServerConnection - Author: KennT ---------------------------------------------------------------------------*/ HRESULT InitiateServerConnection(LPCTSTR pszMachine, HKEY *phkey, BOOL fNoConnectingUI, IRouterInfo *pRouter) { AFX_MANAGE_STATE(AfxGetStaticModuleState()); CConnectingDlg cnctingdlg; DWORD dwRes = IDOK; HRESULT hr = hrOK; COSERVERINFO csi; COAUTHINFO cai; COAUTHIDENTITY caid; IUnknown * punk = NULL;
Assert(phkey);
cnctingdlg.m_sName = pszMachine; // Display the connecting dialog if requested
if (fNoConnectingUI) { if (!cnctingdlg.Connect()) dwRes = 0; } else { dwRes = cnctingdlg.DoModal(); }
if ( !IsLocalMachine(pszMachine) ) { ZeroMemory(&csi, sizeof(csi)); ZeroMemory(&cai, sizeof(cai)); ZeroMemory(&caid, sizeof(caid)); csi.pAuthInfo = &cai; cai.pAuthIdentityData = &caid;
hr = CoCreateRouterConfig(pszMachine, pRouter, &csi, IID_IRemoteNetworkConfig, &punk) ; if ( hrOK != hr ) { cnctingdlg.m_dwr = ERROR_ACCESS_DENIED; dwRes = 0; } else { if ( punk ) punk->Release(); } } // check and see if we were successful
if (dwRes == IDCANCEL) { *phkey = NULL; hr = S_FALSE; goto Error; } else if (dwRes != IDOK) { DisplayConnectErrorMessage(cnctingdlg.m_dwr); hr = HResultFromWin32(cnctingdlg.m_dwr);
if ((cnctingdlg.m_dwr != ERROR_ACCESS_DENIED) && (cnctingdlg.m_dwr != ERROR_LOGON_FAILURE)) { hr = HResultFromWin32(cnctingdlg.m_dwr); goto Error; }
// If there was an access denied error, we ask the
// user to see if they can supply different credentials
hr = ConnectAsAdmin(pszMachine, pRouter);
if (!FHrOK(hr)) { *phkey = NULL; hr = HResultFromWin32(ERROR_CANCELLED); goto Error; }
// try it again with the new credentials
dwRes = cnctingdlg.DoModal(); if (dwRes != IDOK) { DisplayConnectErrorMessage(cnctingdlg.m_dwr); hr = HResultFromWin32(cnctingdlg.m_dwr); goto Error; } } // successful connection
if(phkey) *phkey = cnctingdlg.m_hkMachine; else DisconnectRegistry(cnctingdlg.m_hkMachine);
Error: return hr; }
void DisplayConnectErrorMessage(DWORD dwr) { switch (dwr) { case ERROR_ACCESS_DENIED: AfxMessageBox(IDS_ERR_ACCESSDENIED); break; case ERROR_BAD_NETPATH: AfxMessageBox(IDS_ERR_NETPATHNOTFOUND); break; default: DisplayIdErrorMessage2(NULL, IDS_ERR_ERRORCONNECT, HResultFromWin32(dwr)); break; } }
/*!--------------------------------------------------------------------------
IsRouterServiceRunning This will return hrOK if the service is running. This will return hrFalse if the service is stopped (and no error). Author: KennT ---------------------------------------------------------------------------*/ TFSCORE_API(HRESULT) IsRouterServiceRunning(IN LPCWSTR pszMachine, OUT DWORD *pdwErrorCode) { HRESULT hr = hrOK; DWORD dwServiceStatus = 0;
hr = GetRouterServiceStatus(pszMachine, &dwServiceStatus, pdwErrorCode);
if (FHrSucceeded(hr)) { hr = (dwServiceStatus == SERVICE_STOPPED) ? hrFalse : hrOK; } return hr; }
/*!--------------------------------------------------------------------------
GetRouterServiceStatus - Author: KennT ---------------------------------------------------------------------------*/ TFSCORE_API(HRESULT) GetRouterServiceStatus(LPCWSTR pszMachine, DWORD *pdwStatus, DWORD *pdwErrorCode) { HRESULT hr = hrOK; DWORD dwServiceStatus = 0;
Assert(pdwStatus);
// First check the Router service (for Steelhead)
// ----------------------------------------------------------------
hr = HResultFromWin32(TFSGetServiceStatus(pszMachine, c_szRouter, &dwServiceStatus, pdwErrorCode));
// If that failed, then we look at the RemoteAccess
// ----------------------------------------------------------------
if (!FHrSucceeded(hr) || (dwServiceStatus == SERVICE_STOPPED)) { hr = HResultFromWin32(TFSGetServiceStatus(pszMachine, c_szRemoteAccess, &dwServiceStatus, pdwErrorCode) ); }
if (FHrSucceeded(hr)) { *pdwStatus = dwServiceStatus; } return hr; }
TFSCORE_API(HRESULT) GetRouterServiceStartType(LPCWSTR pszMachine, DWORD *pdwStartType) { HRESULT hr = hrOK; DWORD dwStartType = 0;
Assert(pdwStartType);
// First check the Router service (for Steelhead)
// ----------------------------------------------------------------
hr = HResultFromWin32(TFSGetServiceStartType(pszMachine, c_szRouter, &dwStartType) );
// If that failed, then we look at the RemoteAccess service
// ----------------------------------------------------------------
if (!FHrSucceeded(hr)) { hr = HResultFromWin32(TFSGetServiceStartType(pszMachine, c_szRemoteAccess, &dwStartType) ); }
//Error:
if (FHrSucceeded(hr)) { *pdwStartType = dwStartType; } return hr; }
TFSCORE_API(HRESULT) SetRouterServiceStartType(LPCWSTR pszMachine, DWORD dwStartType) { HRESULT hr = hrOK;
// Set the start type for both the Router and RemoteAccess
// ----------------------------------------------------------------
hr = HResultFromWin32(TFSSetServiceStartType(pszMachine, c_szRouter, dwStartType) );
hr = HResultFromWin32(TFSSetServiceStartType(pszMachine, c_szRemoteAccess, dwStartType) ); return hr; }
TFSCORE_API(HRESULT) ErasePSK(LPCWSTR pszMachine ) { DWORD dwErr = ERROR_SUCCESS; HANDLE hMprServer = NULL; WCHAR szEmptyPSK[5] = {0}; HRESULT hr = hrOK; MPR_CREDENTIALSEX_0 MprCredentials;
dwErr = ::MprAdminServerConnect((LPWSTR)pszMachine , &hMprServer); if ( ERROR_SUCCESS != dwErr ) { hr = HRESULT_FROM_WIN32(dwErr); goto Error; }
::SecureZeroMemory(&MprCredentials, sizeof(MprCredentials)); //Setup the MprCredentials structure
MprCredentials.dwSize = 0; MprCredentials.lpbCredentialsInfo = (LPBYTE)szEmptyPSK; dwErr = MprAdminServerSetCredentials( hMprServer, 0, (LPBYTE)&MprCredentials ); if ( ERROR_SUCCESS != dwErr ) { //Special case! If 13011 is returned, ignore it.
//This is because, the ipsec filter is not yet loaded and
//we are making calls to remove it.
if ( ERROR_IPSEC_MM_AUTH_NOT_FOUND != dwErr ) { hr = HRESULT_FROM_WIN32(dwErr); goto Error; } }
Error:
if ( hMprServer ) ::MprAdminServerDisconnect(hMprServer); return hr; } /*!--------------------------------------------------------------------------
StartRouterService - Author: KennT ---------------------------------------------------------------------------*/ TFSCORE_API(HRESULT) StartRouterService(LPCWSTR pszMachine) { AFX_MANAGE_STATE(AfxGetStaticModuleState()); HRESULT hr = hrOK; CString stServiceDesc; DWORD dwErr; BOOL fNt4 = FALSE; LPCTSTR pszServiceName = NULL; HKEY hkeyMachine = NULL; DWORD dwErasePSK = 0;
COM_PROTECT_TRY { // Ignore the failure code, what else can we do?
// ------------------------------------------------------------
dwErr = ConnectRegistry(pszMachine, &hkeyMachine); if (dwErr == ERROR_SUCCESS) { IsNT4Machine(hkeyMachine, &fNt4); DisconnectRegistry(hkeyMachine); }
// Windows Nt Bug : 277121
// If this is an NT4 machine, try to start the Router service
// rather than the RemoteAccess service.
// ------------------------------------------------------------
// pszServiceName = (fNt4 ? c_szRouter : c_szRemoteAccess);
pszServiceName = c_szRemoteAccess; stServiceDesc.LoadString(IDS_RRAS_SERVICE_DESC); dwErr = TFSStartService(pszMachine, pszServiceName, stServiceDesc);
hr = HResultFromWin32(dwErr);
if (FHrOK(hr)) { BOOL fIsRunning = FALSE;
// Windows NT Bug : 254167
// Need to check to see if the service is running
// (an error could have occurred in the StartService).
// --------------------------------------------------------
dwErr = TFSIsServiceRunning(pszMachine, pszServiceName, &fIsRunning); if ((dwErr == ERROR_SUCCESS) && fIsRunning) { // Now we need to wait for the router to actually start
// running.
CString stText; CString stTitle; stText.LoadString(IDS_WAIT_FOR_RRAS); stTitle.LoadString(IDS_WAIT_FOR_RRAS_TITLE); CWaitForRemoteAccessDlg dlg(pszMachine, stText, stTitle, NULL); dlg.DoModal(); } //Now that the router service is started, check to see if PSK
//needs to be cleaned up
if ( FHrSucceeded (ReadErasePSKReg(pszMachine, &dwErasePSK) ) ) { if ( dwErasePSK ) { //What if the thing fails here. Cannot do much
if ( FHrSucceeded(ErasePSK (pszMachine)) ) { WriteErasePSKReg(pszMachine, 0 ); } } } } } COM_PROTECT_CATCH;
return hr; }
/*!--------------------------------------------------------------------------
StopRouterService - Author: KennT ---------------------------------------------------------------------------*/ TFSCORE_API(HRESULT) StopRouterService(LPCWSTR pszMachine) { AFX_MANAGE_STATE(AfxGetStaticModuleState()); HRESULT hr = hrOK; CString stServiceDesc; DWORD dwErr;
COM_PROTECT_TRY {
// Load the description for the SAP Agent
stServiceDesc.LoadString(IDS_SAPAGENT_SERVICE_DESC); // Stop the SAP Agent
// ------------------------------------------------------------
dwErr = TFSStopService(pszMachine, c_szNWSAPAgent, stServiceDesc);
// Load the description for the router
// ------------------------------------------------------------
stServiceDesc.LoadString(IDS_RRAS_SERVICE_DESC); // Stop the router service
// ------------------------------------------------------------
dwErr = TFSStopService(pszMachine, c_szRouter, stServiceDesc);
// Stop the RemoteAccess service
// ------------------------------------------------------------
dwErr = TFSStopService(pszMachine, c_szRemoteAccess, stServiceDesc);
// If we get the ERROR_SERVICE_NOT_ACTIVE, this is ok since
// we are trying to stop the service anyway.
// ------------------------------------------------------------
if (dwErr == ERROR_SERVICE_NOT_ACTIVE) hr = hrOK; else hr = HResultFromWin32(dwErr); } COM_PROTECT_CATCH;
return hr; }
/*!--------------------------------------------------------------------------
ForceGlobalRefresh - Author: KennT ---------------------------------------------------------------------------*/ TFSCORE_API(HRESULT) ForceGlobalRefresh(IRouterInfo *pRouter) { // Call through to the refresh object to start a refresh action
SPIRouterRefresh spRefresh; HRESULT hr = hrOK; DWORD dwSize; static TCHAR szName[MAX_PATH]; if (pRouter == NULL) CORg( E_INVALIDARG );
//
// In some timing windows/code paths, IRouterInfo.m_stMachine can be an
// empty string for local machines. This leads to protocol nodes like IGMP,
// NAT etc to either not appear, or appear twice when refreshing the IPSnap.
// So in case when the name is an empty string, we determine name of the
// local machine and call IRouterInfo.SetMachineName to update
// IRouterInfo.m_stMachine.
//
if (pRouter->GetMachineName() == NULL || !(lstrcmp(pRouter->GetMachineName(), TEXT(""))) ) {
dwSize = MAX_PATH; if ( GetComputerNameEx(ComputerNamePhysicalNetBIOS, szName, &dwSize) ) { pRouter->SetMachineName(szName); } else { dwSize = MAX_PATH; if ( GetComputerNameEx(ComputerNamePhysicalDnsHostname, szName, &dwSize) ) { pRouter->SetMachineName(szName); } } } CORg( pRouter->GetRefreshObject(&spRefresh) );
if (spRefresh) CORg( spRefresh->Refresh() ); Error: return hr; }
/*!--------------------------------------------------------------------------
FormatRasPortName - Author: KennT ---------------------------------------------------------------------------*/ void FormatRasPortName(BYTE *pRasPort0, LPTSTR pszBuffer, UINT cchMax) { RAS_PORT_0 * prp0 = (RAS_PORT_0 *) pRasPort0; CString stName; stName.Format(_T("%ls (%ls)"), prp0->wszDeviceName, prp0->wszPortName); StrnCpy(pszBuffer, (LPCTSTR) stName, cchMax); pszBuffer[cchMax-1] = 0; }
static CString s_PortNonOperational; static CString s_PortDisconnected; static CString s_PortCallingBack; static CString s_PortListening; static CString s_PortAuthenticating; static CString s_PortAuthenticated; static CString s_PortInitializing; static CString s_PortUnknown;
static const CStringMapEntry s_PortConditionMap[] = { { RAS_PORT_NON_OPERATIONAL, &s_PortNonOperational, IDS_PORT_NON_OPERATIONAL }, { RAS_PORT_DISCONNECTED, &s_PortDisconnected, IDS_PORT_DISCONNECTED }, { RAS_PORT_CALLING_BACK, &s_PortCallingBack, IDS_PORT_CALLING_BACK }, { RAS_PORT_LISTENING, &s_PortListening, IDS_PORT_LISTENING }, { RAS_PORT_AUTHENTICATING, &s_PortAuthenticating, IDS_PORT_AUTHENTICATING }, { RAS_PORT_AUTHENTICATED, &s_PortAuthenticated, IDS_PORT_AUTHENTICATED }, { RAS_PORT_INITIALIZING, &s_PortInitializing, IDS_PORT_INITIALIZING }, { -1, &s_PortUnknown, IDS_PORT_UNKNOWN }, };
/*!--------------------------------------------------------------------------
PortConditionToCString - Author: KennT ---------------------------------------------------------------------------*/ CString& PortConditionToCString(DWORD dwPortCondition) { return MapDWORDToCString(dwPortCondition, s_PortConditionMap); }
static CString s_stPortsDeviceTypeNoUsage; static CString s_stPortsDeviceTypeRouting; static CString s_stPortsDeviceTypeRas; static CString s_stPortsDeviceTypeRasRouting; static CString s_stPortsDeviceTypeUnknown;
static const CStringMapEntry s_PortsDeviceTypeMap[] = { { 0, &s_stPortsDeviceTypeNoUsage, IDS_PORTSDLG_COL_NOUSAGE }, { 1, &s_stPortsDeviceTypeRouting, IDS_PORTSDLG_COL_ROUTING }, { 2, &s_stPortsDeviceTypeRas, IDS_PORTSDLG_COL_RAS }, { 3, &s_stPortsDeviceTypeRasRouting, IDS_PORTSDLG_COL_RASROUTING }, { -1, &s_stPortsDeviceTypeUnknown, IDS_PORTSDLG_COL_UNKNOWN }, };
CString& PortsDeviceTypeToCString(DWORD dwRasRouter) { return MapDWORDToCString(dwRasRouter, s_PortsDeviceTypeMap); }
/*!--------------------------------------------------------------------------
RegFindInterfaceKey - This function returns the HKEY of the router interface with this ID.
Author: KennT ---------------------------------------------------------------------------*/ STDMETHODIMP RegFindInterfaceKey(LPCTSTR pszInterface, HKEY hkeyMachine, REGSAM regAccess, HKEY *pHKey) { HRESULT hr = hrFalse; HKEY hkey = 0; RegKey regkey; RegKey regkeyIf; RegKeyIterator regkeyIter; HRESULT hrIter; CString stValue; CString stKey; DWORD dwErr;
COM_PROTECT_TRY { // Open up the remoteaccess key
CWRg( regkey.Open(hkeyMachine, c_szInterfacesKey) );
// Now look for the key that matches this one
CORg( regkeyIter.Init(®key) );
for (hrIter = regkeyIter.Next(&stKey); hrIter == hrOK; hrIter = regkeyIter.Next(&stKey)) { regkeyIf.Close();
// Open the key
dwErr = regkeyIf.Open(regkey, stKey, regAccess); if (dwErr != ERROR_SUCCESS) continue;
CORg( regkeyIf.QueryValue(c_szInterfaceName, stValue) );
if (stValue.CompareNoCase(pszInterface) == 0) { // Ok, we found the key that we want
if (pHKey) { *pHKey = regkeyIf.Detach(); hr = hrOK; } } } COM_PROTECT_ERROR_LABEL; } COM_PROTECT_CATCH;
return hr; }
// hour map ( one bit for an hour of a week )
static BYTE s_bitSetting[8] = { 0x80, 0x40, 0x20, 0x10, 0x8, 0x4, 0x2, 0x1};
//====================================================
// convert a List of Strings to Hour Map
// Strings in following format: 0 1:00-12:00 15:00-17:00
// hour map: a bit for an hour, 7 * 24 hours = 7 * 3 bytes
void StrListToHourMap(CStringList& stList, BYTE* map) { CStrParser Parser; int sh, sm, eh, em = 0; // start hour, (min), end hour (min)
int day; BYTE* pHourMap; int i; POSITION pos;
pos = stList.GetHeadPosition(); memset(map, 0, sizeof(BYTE) * 21);
while (pos) { Parser.SetStr( stList.GetNext(pos) );
Parser.SkipBlank(); day = Parser.DayOfWeek(); Parser.SkipBlank(); if(day == -1) continue;
pHourMap = map + sizeof(BYTE) * 3 * day;
while(-1 != (sh = Parser.GetUINT())) // sh:sm-eh:em
{ Parser.GotoAfter(_T(':')); if(-1 == (sm = Parser.GetUINT())) // min
break; Parser.GotoAfter(_T('-')); if(-1 == (eh = Parser.GetUINT())) // hour
break; if(-1 == (sm = Parser.GetUINT())) // min
break; sm %= 60; sh %= 24; em %= 60; eh %= 25; // since we have end hour of 24:00
for(i = sh; i < eh; i++) { *(pHourMap + i / 8) |= s_bitSetting[i % 8]; } } } }
//=====================================================
// convert value from map to strings
void HourMapToStrList(BYTE* map, CStringList& stList) { int sh, eh; // start hour, (min), end hour (min)
BYTE* pHourMap; int i, j; CString* pStr; CString tmpStr;
// update the profile table
pHourMap = map; stList.RemoveAll();
for( i = 0; i < 7; i++) // for each day
{ // if any value for this day
if(*pHourMap || *(pHourMap + 1) || *(pHourMap + 2)) { // the string for this day
try{ pStr = NULL; pStr = new CString;
// Print out the day, the day of the week is
// represented by an integer (0-6)
pStr->Format(_T("%d"), i);
sh = -1; eh = -1; // not start yet
for(j = 0; j < 24; j++) // for every hour
{ int k = j / 8; int m = j % 8; if(*(pHourMap + k) & s_bitSetting[m]) // this hour is on
{ if(sh == -1) sh = j; // set start hour is empty
eh = j; // extend end hour
} else // this is not on
{ if(sh != -1) // some hours need to write out
{ tmpStr.Format(_T(" %02d:00-%02d:00"), sh, eh + 1); *pStr += tmpStr; sh = -1; eh = -1; } } } if(sh != -1) { tmpStr.Format(_T(" %02d:00-%02d:00"), sh, eh + 1); *pStr += tmpStr; sh = -1; eh = -1; } stList.AddTail(*pStr); } catch(CMemoryException* pException) { pException->Delete(); // AfxMessageBox(IDS_OUTOFMEMORY);
delete pStr; stList.RemoveAll(); return; } } pHourMap += 3; } }
/*!--------------------------------------------------------------------------
SetGlobalRegistrySettings hkeyMachine - HKEY of the local machine key fInstall - TRUE if we are installing fChangeEnableRouter - TRUE if we can change the router key (This is NOT the value of IpEnableRouter, but only if we are allowed to change the value of this key). - Author: KennT ---------------------------------------------------------------------------*/ HRESULT SetGlobalRegistrySettings(HKEY hkeyMachine, BOOL fInstall, BOOL fChangeEnableRouter) { HRESULT hr = hrOK; RegKey regkey; DWORD dwInstall = fInstall; DWORD dwNotInstall = !fInstall; DWORD dwErr;
// Open the TcpIp parmeters key
if (regkey.Open(hkeyMachine, c_szRegKeyTcpipParameters) != ERROR_SUCCESS) { // No need to set the error return code, if an error occurs
// assume that the key doesn't exist.
goto Error; }
// Set IPEnableRouter to (fInstall)
if (fChangeEnableRouter) CWRg( regkey.SetValue(c_szRegValIpEnableRouter, dwInstall) ); // regkey.SetValue(c_szRegValIpEnableRouterBackup, dwNotInstall);
// Set EnableICMPRedirect to (!fInstall)
CWRg( regkey.SetValue(c_szRegValEnableICMPRedirect, dwNotInstall) );
// Set the defaults for the new adapters
CWRg( regkey.SetValue(c_szRegValDeadGWDetectDefault, dwNotInstall) ); CWRg( regkey.SetValue(c_szRegValDontAddDefaultGatewayDefault, dwInstall) ); Error: return hr; }
/*!--------------------------------------------------------------------------
SetPerInterfaceRegistrySettings - Author: KennT ---------------------------------------------------------------------------*/ HRESULT SetPerInterfaceRegistrySettings(HKEY hkeyMachine, BOOL fInstall) { HRESULT hr = hrOK; DWORD dwInstall = fInstall; DWORD dwNotInstall = !fInstall; RegKey rkAdapters; RegKey rkAdapter; RegKeyIterator rkIter; HRESULT hrIter; CString stAdapter; CStringList stIfList; DWORD dwErr; POSITION posIf; RegKey rkIf; CString stKey; CString stIf;
// Get the key to the adapters section of TcpIp services
if (rkAdapters.Open(hkeyMachine, c_szRegKeyTcpipAdapters) != ERROR_SUCCESS) { // No need to set the error return code, if an error occurs
// assume that the key doesn't exist.
goto Error; } CORg( rkIter.Init(&rkAdapters) );
// Iterate through all of the adapters and set the key
for ( hrIter = rkIter.Next(&stAdapter); hrIter == hrOK; hrIter=rkIter.Next(&stAdapter) ) { rkAdapter.Close();
// Open the adapter key
// ------------------------------------------------------------
dwErr = rkAdapter.Open(rkAdapters, stAdapter); if (dwErr != ERROR_SUCCESS) { continue; }
// Now that we have the adapter, we open up the IpConfig key
// to get the list of interfaces that match up to this adapter.
// ------------------------------------------------------------
CWRg( rkAdapter.QueryValue(c_szRegValIpConfig, stIfList) );
// Iterate through the interface list and set these values
// on each interface
// ------------------------------------------------------------
posIf = stIfList.GetHeadPosition(); while (posIf) { stIf = stIfList.GetNext(posIf);
// Create the right key
// --------------------------------------------------------
stKey = c_szSystemCCSServices; stKey += _T('\\'); stKey += stIf;
rkIf.Close(); CWRg( rkIf.Open(hkeyMachine, stKey) );
// Set DeadGWDetect to (!fInstall) for each interface
// --------------------------------------------------------
dwErr = rkIf.SetValue(c_szRegValDeadGWDetect, dwNotInstall);
// Windows NT Bug: 168546
// Set DontAddDefaultGateway to (fInstall) only on Ndiswan adapters
// not ALL adapters.
// --------------------------------------------------------
if (stAdapter.Left(7).CompareNoCase(_T("NdisWan")) == 0) { dwErr = rkIf.SetValue(c_szRegValDontAddDefaultGateway, dwInstall); } } }
Error: return hr; }
/*!--------------------------------------------------------------------------
InstallGlobalSettings Sets the global settings (i.e. registry settings) on this machine when the router is installed.
For a specific description of the actions involved, look at the comments in the code. Author: KennT ---------------------------------------------------------------------------*/ HRESULT InstallGlobalSettings(LPCTSTR pszMachineName, IRouterInfo *pRouter) { HRESULT hr = hrOK; RouterVersionInfo routerVersion; BOOL fSetIPEnableRouter = FALSE;
// We can change the IPEnableRouter only if this is the right build.
// ----------------------------------------------------------------
if (pRouter) { pRouter->GetRouterVersionInfo(&routerVersion); } else { // Need to get the version info manually
// ------------------------------------------------------------
HKEY hkeyMachine = NULL; if (ERROR_SUCCESS == ConnectRegistry(pszMachineName, &hkeyMachine)) QueryRouterVersionInfo(hkeyMachine, &routerVersion); if (hkeyMachine) DisconnectRegistry(hkeyMachine); } if (routerVersion.dwOsBuildNo <= USE_IPENABLEROUTER_VERSION) fSetIPEnableRouter = TRUE;
CORg( SetRouterInstallRegistrySettings(pszMachineName, TRUE, fSetIPEnableRouter) );
NotifyTcpipOfChanges(pszMachineName, pRouter, fSetIPEnableRouter /*fEnableRouter*/, IP_IRDP_DISABLED /*uPerformRouterDiscovery*/);
Error: return hr; }
/*!--------------------------------------------------------------------------
UninstallGlobalSettings Clears the global settings (i.e. registry settings) on this machine when the router is installed.
Set fSnapinChanges to TRUE if you want to write out the various snapin changes.
For a specific description of the actions involved, look at the comments in the code. Author: KennT ---------------------------------------------------------------------------*/ HRESULT UninstallGlobalSettings(LPCTSTR pszMachineName, IRouterInfo *pRouter, BOOL fNt4, BOOL fSnapinChanges) { HRESULT hr = hrOK; DWORD dwStatus = SERVICE_RUNNING; DWORD dwErr = ERROR_SUCCESS; BOOL fChange;
// Windows NT Bug : 273047
// Check to see if the SharedAccess service is running.
// We need to check this only for NT4
// ----------------------------------------------------------------
if (!fNt4) { DWORD dwErrT; // Get the status of the SharedAccess service. If we cannot
// get the status of the service, we assume that the service
// is stopped.
// ------------------------------------------------------------
dwErrT = TFSGetServiceStatus(pszMachineName, c_szSharedAccess, &dwStatus, &dwErr);
// If we have a problem with the API, or if the API reported
// a service-specific error, we assume the service is stopped.
// ------------------------------------------------------------
if ((dwErrT != ERROR_SUCCESS) || (dwErr != ERROR_SUCCESS)) dwStatus = SERVICE_STOPPED; }
// If the SharedAccess service is running, then we do NOT want to
// change the IpEnableRouter key.
// ----------------------------------------------------------------
fChange = (dwStatus == SERVICE_RUNNING);
// This will ALWAYS set the IPEnableRouter key to 0, which is fine
// with us. (We do not need to check the version).
// ----------------------------------------------------------------
CORg( SetRouterInstallRegistrySettings(pszMachineName, FALSE, !fChange) );
if (fSnapinChanges) { CORg( WriteRouterConfiguredReg(pszMachineName, FALSE) );
CORg( WriteRRASExtendsComputerManagementKey(pszMachineName, FALSE) ); }
NotifyTcpipOfChanges(pszMachineName, pRouter, FALSE /* fEnableRouter */, IP_IRDP_DISABLED_USE_DHCP /* uPerformRouterDiscovery */); Error: return hr; }
/*!--------------------------------------------------------------------------
WriteErasePSKReg - Author: Vivekk ---------------------------------------------------------------------------*/
HRESULT WriteErasePSKReg (LPCTSTR pszServerName, DWORD dwErasePSK ) { HRESULT hr = hrOK; RegKey regkey;
if (ERROR_SUCCESS == regkey.Open(HKEY_LOCAL_MACHINE,c_szRemoteAccessKey,KEY_ALL_ACCESS, pszServerName) ) CWRg(regkey.SetValue( c_szRouterPSK, dwErasePSK));
Error: return hr;
} /*!--------------------------------------------------------------------------
ReadErasePSKReg - Author: Vivekk ---------------------------------------------------------------------------*/ HRESULT ReadErasePSKReg(LPCTSTR pszServerName, DWORD *pdwErasePSK) { HRESULT hr = hrOK; RegKey regkey;
Assert(pdwErasePSK);
CWRg( regkey.Open(HKEY_LOCAL_MACHINE, c_szRemoteAccessKey, KEY_ALL_ACCESS, pszServerName) );
CWRg( regkey.QueryValue( c_szRouterPSK, *pdwErasePSK) );
Error: // If we can't find the key, we assume that the router has not
// been configured.
// ----------------------------------------------------------------
if (hr == HResultFromWin32(ERROR_FILE_NOT_FOUND)) { hr = hrOK; *pdwErasePSK = FALSE; }
return hr; }
/*!--------------------------------------------------------------------------
WriteRouterConfiguredReg - Author: KennT ---------------------------------------------------------------------------*/ HRESULT WriteRouterConfiguredReg(LPCTSTR pszServerName, DWORD dwConfigured) { HRESULT hr = hrOK; RegKey regkey;
if (ERROR_SUCCESS == regkey.Open(HKEY_LOCAL_MACHINE,c_szRemoteAccessKey,KEY_ALL_ACCESS, pszServerName) ) CWRg(regkey.SetValue( c_szRtrConfigured, dwConfigured));
Error: return hr; }
/*!--------------------------------------------------------------------------
ReadRouterConfiguredReg - Author: KennT ---------------------------------------------------------------------------*/ HRESULT ReadRouterConfiguredReg(LPCTSTR pszServerName, DWORD *pdwConfigured) { HRESULT hr = hrOK; RegKey regkey;
Assert(pdwConfigured);
CWRg( regkey.Open(HKEY_LOCAL_MACHINE, c_szRemoteAccessKey, KEY_ALL_ACCESS, pszServerName) ); CWRg( regkey.QueryValue( c_szRtrConfigured, *pdwConfigured) );
Error: // If we can't find the key, we assume that the router has not
// been configured.
// ----------------------------------------------------------------
if (hr == HResultFromWin32(ERROR_FILE_NOT_FOUND)) { hr = hrOK; *pdwConfigured = FALSE; } return hr; }
/*!--------------------------------------------------------------------------
WriteRRASExtendsComputerManagement - Author: KennT ---------------------------------------------------------------------------*/ HRESULT WriteRRASExtendsComputerManagementKey(LPCTSTR pszServer, DWORD dwConfigured) { HRESULT hr = hrOK; RegKey rkMachine; TCHAR szGuid[128];
// Stringize the RRAS GUID
::StringFromGUID2(CLSID_RouterSnapinExtension, szGuid, DimensionOf(szGuid)); CWRg( rkMachine.Open(HKEY_LOCAL_MACHINE, c_szRegKeyServerApplications, KEY_ALL_ACCESS, pszServer) ); if (dwConfigured) { // Need to add the following key
// HKLM \ System \ CurrentControlSet \ Control \ Server Applications
// <GUID> : REG_SZ : some string
CWRg( rkMachine.SetValue(szGuid, _T("Remote Access and Routing")) ); } else { // Need to remove the following key
// HKLM \ System \ CurrentControlSet \ Control \ Server Applications
// <GUID> : REG_SZ : some string
CWRg( rkMachine.DeleteValue( szGuid ) ); }
Error: return hr; }
/*!--------------------------------------------------------------------------
NotifyTcpipOfChanges - Author: KennT ---------------------------------------------------------------------------*/ void NotifyTcpipOfChanges(LPCTSTR pszMachineName, IRouterInfo *pRouter, BOOL fEnableRouter, UCHAR uPerformRouterDiscovery) { HRESULT hr = hrOK; RegKey rkInterfaces; RegKey rkIf; RegKeyIterator rkIter; HRESULT hrIter; CString stKey; DWORD dwErr; COSERVERINFO csi; COAUTHINFO cai; COAUTHIDENTITY caid;
ZeroMemory(&csi, sizeof(csi)); ZeroMemory(&cai, sizeof(cai)); ZeroMemory(&caid, sizeof(caid)); csi.pAuthInfo = &cai; cai.pAuthIdentityData = &caid;
// For now, notify the user that they will have to
// reboot the machine locally.
if (!IsLocalMachine(pszMachineName)) {
SPIRemoteTCPIPChangeNotify spNotify; // Create the remote config object
// ----------------------------------------------------------------
hr = CoCreateRouterConfig(pszMachineName, pRouter, &csi, IID_IRemoteTCPIPChangeNotify, (IUnknown**)&spNotify); if (FAILED(hr)) goto Error;
// Upgrade the configuration (ensure that the registry keys
// are populated correctly).
// ------------------------------------------------------------
// Still do the notification for remote machines in case it is running
// an old build
Assert(spNotify); hr = spNotify->NotifyChanges(fEnableRouter, uPerformRouterDiscovery); spNotify.Release();
if (csi.pAuthInfo) delete csi.pAuthInfo->pAuthIdentityData->Password; } else { // For the local case,
// Don't need to do any notification after bug 405636 and 345700 got fixed
}
Error: if (!FHrSucceeded(hr)) { if (hr == NETCFG_S_REBOOT) AfxMessageBox(IDS_WRN_INSTALL_REBOOT_NOTIFICATION); else DisplayErrorMessage(NULL, hr); }
}
/*!--------------------------------------------------------------------------
AddIpPerInterfaceBlocks Setup this interface's infobase for IP. Author: KennT ---------------------------------------------------------------------------*/ HRESULT AddIpPerInterfaceBlocks(IInterfaceInfo *pIf, IInfoBase *pInfoBase) { HRESULT hr = hrOK; BYTE* pInfo; BYTE* pNewInfo = NULL; DWORD dwErr; DWORD dwSize;
CORg( pInfoBase->WriteTo(&pInfo, &dwSize) ); dwErr = MprConfigCreateIpInterfaceInfo( pIf->GetInterfaceType(), pInfo, &pNewInfo ); CoTaskMemFree(pInfo); if (dwErr != NO_ERROR) { return E_OUTOFMEMORY; } dwSize = ((RTR_INFO_BLOCK_HEADER*)pNewInfo)->Size; CORg( pInfoBase->LoadFrom(dwSize, pNewInfo) );
Error: if (pNewInfo) { MprInfoDelete(pNewInfo); } return hr; }
/*!--------------------------------------------------------------------------
MprConfigCreateIpInterfaceInfo Constructs an infobase containing required IP interface configuration. The infobase should freed by calling 'MprInfoDelete'. Author: AboladeG (based on AddIpPerInterfaceBlocks by KennT). ---------------------------------------------------------------------------*/ extern "C" DWORD APIENTRY MprConfigCreateIpInterfaceInfo(DWORD dwIfType, PBYTE ExistingHeader, PBYTE* NewHeader ) { DWORD dwErr; PBYTE Header = NULL;
if (ExistingHeader) { dwErr = MprInfoDuplicate(ExistingHeader, (VOID**)&Header); } else { dwErr = MprInfoCreate(RTR_INFO_BLOCK_VERSION, (VOID**)&Header); }
if (dwErr) { return dwErr; } do {
//
// Check that there is a block for interface-status in the info,
// and insert the default block if none is found.
//
if ( !MprInfoBlockExists(Header, IP_MCAST_HEARBEAT_INFO) ) { dwErr = MprInfoBlockAdd( Header, IP_MCAST_HEARBEAT_INFO, sizeof(MCAST_HBEAT_INFO), 1, g_pIpIfMulticastHeartbeatDefault, (VOID**)NewHeader ); if (dwErr) { break; }
MprInfoDelete(Header); Header = *NewHeader; } //
// Check that there is a block for multicast in the info,
// and insert the default block if none is found.
//
if ( !MprInfoBlockExists(Header, IP_INTERFACE_STATUS_INFO) ) { dwErr = MprInfoBlockAdd( Header, IP_INTERFACE_STATUS_INFO, sizeof(INTERFACE_STATUS_INFO), 1, g_pIpIfStatusDefault, (VOID**)NewHeader ); if (dwErr) { break; }
MprInfoDelete(Header); Header = *NewHeader; } //
// Check that there is a block for router-discovery,
// inserting the default block if none is found
//
if ( !MprInfoBlockExists(Header, IP_ROUTER_DISC_INFO) ) { //
// Select the default configuration which is appropriate
// for the type of interface being configured (LAN/WAN)
//
BYTE *pDefault; pDefault = (dwIfType == ROUTER_IF_TYPE_DEDICATED) ? g_pRtrDiscLanDefault : g_pRtrDiscWanDefault; dwErr = MprInfoBlockAdd( Header, IP_ROUTER_DISC_INFO, sizeof(RTR_DISC_INFO), 1, pDefault, (VOID**)NewHeader ); if (dwErr) { break; }
MprInfoDelete(Header); Header = *NewHeader; }
*NewHeader = Header;
} while(FALSE);
if (dwErr) { MprInfoDelete(Header); *NewHeader = NULL; }
return dwErr; }
/*!--------------------------------------------------------------------------
AddIpxPerInterfaceBlocks - Author: KennT ---------------------------------------------------------------------------*/ HRESULT AddIpxPerInterfaceBlocks(IInterfaceInfo *pIf, IInfoBase *pInfoBase) { HRESULT hr = hrOK; #ifdef DEBUG
InfoBlock * pTestBlock; #endif
//
// Check that there is a block for interface-status in the info,
// and insert the default block if none is found.
//
if (pInfoBase->BlockExists(IPX_INTERFACE_INFO_TYPE) == hrFalse) { IPX_IF_INFO ipx;
ipx.AdminState = ADMIN_STATE_ENABLED; ipx.NetbiosAccept = ADMIN_STATE_DISABLED; ipx.NetbiosDeliver = ADMIN_STATE_DISABLED; CORg( pInfoBase->AddBlock(IPX_INTERFACE_INFO_TYPE, sizeof(ipx), (PBYTE) &ipx, 1 /* count */, FALSE /* bRemoveFirst */) ); Assert( pInfoBase->GetBlock(IPX_INTERFACE_INFO_TYPE, &pTestBlock, 0) == hrOK); }
//
// Check that there is a block for WAN interface-status in the info,
// and insert the default block if none is found.
//
if (pInfoBase->BlockExists(IPXWAN_INTERFACE_INFO_TYPE) == hrFalse) { IPXWAN_IF_INFO ipxwan;
ipxwan.AdminState = ADMIN_STATE_DISABLED; CORg( pInfoBase->AddBlock(IPXWAN_INTERFACE_INFO_TYPE, sizeof(ipxwan), (PBYTE) &ipxwan, 1 /* count */, FALSE /* bRemoveFirst */) ); Assert( pInfoBase->GetBlock(IPXWAN_INTERFACE_INFO_TYPE, &pTestBlock, 0) == hrOK); }
// HACK! HACK!
// For IPX we have to add the RIP/SAP info blocks otherwise
// adding IPX to the interface will fail
// ----------------------------------------------------------------
if (!FHrOK(pInfoBase->BlockExists(IPX_PROTOCOL_RIP))) { // Add a RIP_IF_CONFIG block
BYTE * pDefault; if (pIf->GetInterfaceType() == ROUTER_IF_TYPE_DEDICATED) pDefault = g_pIpxRipLanInterfaceDefault; else pDefault = g_pIpxRipInterfaceDefault; pInfoBase->AddBlock(IPX_PROTOCOL_RIP, sizeof(RIP_IF_CONFIG), pDefault, 1, 0); }
if (!FHrOK(pInfoBase->BlockExists(IPX_PROTOCOL_SAP))) { // Add a SAP_IF_CONFIG block
BYTE * pDefault; if (pIf->GetInterfaceType() == ROUTER_IF_TYPE_DEDICATED) pDefault = g_pIpxSapLanInterfaceDefault; else pDefault = g_pIpxSapInterfaceDefault; pInfoBase->AddBlock(IPX_PROTOCOL_SAP, sizeof(SAP_IF_CONFIG), pDefault, 1, 0); }
Error: return hr; }
/*!--------------------------------------------------------------------------
UpdateLanaMapForDialinClients - Author: KennT ---------------------------------------------------------------------------*/ HRESULT UpdateLanaMapForDialinClients(LPCTSTR pszServerName, DWORD dwAllowNetworkAccess) { HRESULT hr = hrOK; DWORD dwErr; RegKey regkeyNetBIOS; CStringList rgstBindList; CByteArray rgLanaMap; int i, cEntries; UINT cchNdisWanNbfIn; POSITION pos; CString st; BYTE bValue; // Get to the NetBIOS key
// ----------------------------------------------------------------
dwErr = regkeyNetBIOS.Open(HKEY_LOCAL_MACHINE, c_szRegKeyNetBIOSLinkage, KEY_ALL_ACCESS, pszServerName); if (dwErr != ERROR_SUCCESS) { // Setup the registry error
// ------------------------------------------------------------
SetRegError(0, HResultFromWin32(dwErr), IDS_ERR_REG_OPEN_CALL_FAILED, c_szHKLM, c_szRegKeyNetBIOSLinkage, NULL); goto Error; }
// Get the BIND key (this is a multivalued string)
// ----------------------------------------------------------------
dwErr = regkeyNetBIOS.QueryValue(c_szBind, rgstBindList); if (dwErr != ERROR_SUCCESS) { SetRegError(0, HResultFromWin32(dwErr), IDS_ERR_REG_QUERYVALUE_CALL_FAILED, c_szHKLM, c_szRegKeyNetBIOSLinkage, c_szBind, NULL); goto Error; }
// Get the LanaMap key (this is a byte array)
// ----------------------------------------------------------------
dwErr = regkeyNetBIOS.QueryValue(c_szRegValLanaMap, rgLanaMap); if (dwErr != ERROR_SUCCESS) { SetRegError(0, HResultFromWin32(dwErr), IDS_ERR_REG_QUERYVALUE_CALL_FAILED, c_szHKLM, c_szRegKeyNetBIOSLinkage, c_szRegValLanaMap, NULL); goto Error; }
// Find the entries that prefix match the "Nbf_NdisWanNbfIn" string.
// Set the corresponding entries in the LanaMap key to
// 0 or 1 (entry value = !dwAllowNetworkAccess).
// ----------------------------------------------------------------
cEntries = rgstBindList.GetCount(); pos = rgstBindList.GetHeadPosition(); cchNdisWanNbfIn = StrLen(c_szDeviceNbfNdisWanNbfIn); for (i=0; i<cEntries; i++) { st = rgstBindList.GetNext(pos); if (st.IsEmpty()) continue;
if (StrnCmp((LPCTSTR) st, c_szDeviceNbfNdisWanNbfIn, cchNdisWanNbfIn) == 0) { // Set the appropriate bit in the byte array
// --------------------------------------------------------
// We set the value to the opposite of dwAllowNetworkAccess
// --------------------------------------------------------
bValue = (dwAllowNetworkAccess ? 0 : 1); rgLanaMap.SetAt(2*i, bValue); } }
// Write the info back out to the LanaMap key
// ----------------------------------------------------------------
dwErr = regkeyNetBIOS.SetValue(c_szRegValLanaMap, rgLanaMap); if (dwErr != ERROR_SUCCESS) { SetRegError(0, HResultFromWin32(dwErr), IDS_ERR_REG_SETVALUE_CALL_FAILED, c_szHKLM, c_szRegKeyNetBIOSLinkage, c_szRegValLanaMap, NULL); goto Error; }
Error: return hr; }
/*!--------------------------------------------------------------------------
HrIsProtocolSupported - Author: KennT ---------------------------------------------------------------------------*/ HRESULT HrIsProtocolSupported(LPCTSTR pszServerName, LPCTSTR pszServiceKey, LPCTSTR pszRasServiceKey, LPCTSTR pszExtraKey) { HRESULT hr = hrFalse; HRESULT hrTemp; DWORD dwErr; RegKey regkey; HKEY hkeyMachine = NULL;
COM_PROTECT_TRY { CWRg( ConnectRegistry(pszServerName, &hkeyMachine) );
// Try to open both keys, if both succeed, then we
// consider the protocol to be installed.
// ------------------------------------------------------------
dwErr = regkey.Open(hkeyMachine, pszServiceKey, KEY_READ); hrTemp = HResultFromWin32(dwErr); if (FHrOK(hrTemp)) { regkey.Close(); dwErr = regkey.Open(hkeyMachine, pszRasServiceKey, KEY_READ); hrTemp = HResultFromWin32(dwErr);
// If pszExtraKey == NULL, then there is no extra key
// for us to test.
if (FHrOK(hrTemp) && pszExtraKey) { regkey.Close(); dwErr = regkey.Open(hkeyMachine, pszExtraKey, KEY_READ); hrTemp = HResultFromWin32(dwErr); } }
// Both keys succeeded, so return hrOK
// ------------------------------------------------------------
if (FHrOK(hrTemp)) hr = hrOK; else hr = hrFalse;
COM_PROTECT_ERROR_LABEL; } COM_PROTECT_CATCH;
if (hkeyMachine) DisconnectRegistry(hkeyMachine);
return hr; }
/*!--------------------------------------------------------------------------
RegisterRouterInDomain - Author: KennT ---------------------------------------------------------------------------*/ HRESULT RegisterRouterInDomain(LPCTSTR pszRouterName, BOOL fRegister) { DOMAIN_CONTROLLER_INFO * pDcInfo = NULL; HRESULT hr = hrOK; HRESULT hrT = hrOK;
// If this fails, we assume this is standalone.
hrT = HrIsStandaloneServer(pszRouterName); if (hrT == S_FALSE) {
CWRg( DsGetDcName(pszRouterName, NULL, NULL, NULL, 0, &pDcInfo) ); CWRg( MprDomainRegisterRasServer(pDcInfo->DomainName, (LPTSTR) pszRouterName, fRegister) ); } Error: if (pDcInfo) NetApiBufferFree(pDcInfo); return hr; }
/*!--------------------------------------------------------------------------
SetDeviceType For the given machine, this API will set the ports for this machine accordingly (given the dwRouterType).
If dwTotalPorts is non-zero, then the max ports for L2TP/PPTP will be adjusted (each will get 1/2 of dwTotalPorts). Author: KennT ---------------------------------------------------------------------------*/ HRESULT SetDeviceType(LPCTSTR pszMachineName, DWORD dwRouterType, DWORD dwTotalPorts) { PortsDataEntry portsDataEntry; PortsDeviceList portsList; PortsDeviceEntry * pEntry = NULL; HRESULT hr = hrOK; POSITION pos;
CORg( portsDataEntry.Initialize(pszMachineName) );
CORg( portsDataEntry.LoadDevices( &portsList ) );
CORg( SetDeviceTypeEx( &portsList, dwRouterType ) );
if (dwTotalPorts) { // Set the port sizes for L2TP and PPTP
CORg( SetPortSize(&portsList, dwTotalPorts/2) ); }
// Save the data back
// ----------------------------------------------------------------
CORg( portsDataEntry.SaveDevices( &portsList ) );
Error: // Clear out the ports list, we don't need the data anymore
// ----------------------------------------------------------------
while (!portsList.IsEmpty()) delete portsList.RemoveHead(); return hr; }
/*!--------------------------------------------------------------------------
SetPortSize - Author: KennT ---------------------------------------------------------------------------*/ HRESULT SetPortSize(PortsDeviceList *pDeviceList, DWORD dwPorts) { HRESULT hr = hrOK; POSITION pos; PortsDeviceEntry * pEntry = NULL;
pos = pDeviceList->GetHeadPosition(); while (pos) { pEntry = pDeviceList->GetNext(pos); if ((RAS_DEVICE_TYPE(pEntry->m_eDeviceType) == RDT_Tunnel_Pptp) || (RAS_DEVICE_TYPE(pEntry->m_eDeviceType) == RDT_Tunnel_L2tp)) { pEntry->m_fModified = TRUE; pEntry->m_dwPorts = dwPorts; } } return hr; }
/*!--------------------------------------------------------------------------
SetDeviceTypeEx This is the core of the function above. Author: KennT ---------------------------------------------------------------------------*/ HRESULT SetDeviceTypeEx(PortsDeviceList *pDeviceList, DWORD dwRouterType) { PortsDeviceEntry * pEntry = NULL; HRESULT hr = hrOK; POSITION pos;
Assert(pDeviceList); Assert(dwRouterType);
// Ok now we go through and set the type of all of the devices
// ----------------------------------------------------------------
pos = pDeviceList->GetHeadPosition();
while (pos) { pEntry = pDeviceList->GetNext(pos);
// If we have enabled routing and if this port did not
// have routing enabled, enable routing.
// ------------------------------------------------------------
if ((dwRouterType & (ROUTER_TYPE_LAN | ROUTER_TYPE_WAN))) { if (!pEntry->m_dwEnableRouting) { pEntry->m_dwEnableRouting = TRUE; pEntry->m_fModified = TRUE; } } else { // If this port does NOT have routing enabled
// and routing is enabled, disable it.
// --------------------------------------------------------
if (pEntry->m_dwEnableRouting) { pEntry->m_dwEnableRouting = FALSE; pEntry->m_fModified = TRUE; } }
// Windows NT Bug : 292615
// If this is a parallel port, do not enable RAS.
// ------------------------------------------------------------
if (RAS_DEVICE_TYPE(pEntry->m_eDeviceType) == RDT_Parallel) { if (pEntry->m_dwEnableRas) { pEntry->m_dwEnableRas = FALSE; pEntry->m_fModified = TRUE; } continue; }
//
// For PPPoE devices disable Ras and Routing. Only outbound
// routing can be set for PPPoE devices
if (RAS_DEVICE_TYPE(pEntry->m_eDeviceType) == RDT_PPPoE) { if (pEntry->m_dwEnableRas) { pEntry->m_dwEnableRas = FALSE; pEntry->m_fModified = TRUE; }
if (pEntry->m_dwEnableRouting) { pEntry->m_dwEnableRouting = FALSE; pEntry->m_fModified = TRUE; }
//
// Enable outbound routing if this is a router
//
if (dwRouterType & (ROUTER_TYPE_WAN | ROUTER_TYPE_RAS)) { if (!pEntry->m_dwEnableOutboundRouting) { pEntry->m_dwEnableOutboundRouting = TRUE; pEntry->m_fModified = TRUE; } } continue; }
// Similarly for RAS
// ------------------------------------------------------------
if (dwRouterType & ROUTER_TYPE_RAS) { if (!pEntry->m_dwEnableRas) { pEntry->m_dwEnableRas = TRUE; pEntry->m_fModified = TRUE; } } else { if (pEntry->m_dwEnableRas) { pEntry->m_dwEnableRas = FALSE; pEntry->m_fModified = TRUE; } } }
return hr; }
HRESULT SetRouterInstallRegistrySettings(LPCWSTR pswzServer, BOOL fInstall, BOOL fChangeEnableRouter) { HRESULT hr = hrOK; HKEY hklm = NULL;
CWRg( ConnectRegistry(pswzServer, &hklm) );
// Write out the global registry settings
CORg( SetGlobalRegistrySettings(hklm, fInstall, fChangeEnableRouter) );
// Write the per-interface registry settings
CORg( SetPerInterfaceRegistrySettings(hklm, fInstall) );
Error:
if (hklm) { DisconnectRegistry(hklm); hklm = NULL; }
return hr; }
static CString s_PortDeviceTypeModem; static CString s_PortDeviceTypeX25; static CString s_PortDeviceTypeIsdn; static CString s_PortDeviceTypeSerial; static CString s_PortDeviceTypeFrameRelay; static CString s_PortDeviceTypeAtm; static CString s_PortDeviceTypeSonet; static CString s_PortDeviceTypeSw56; static CString s_PortDeviceTypePptp; static CString s_PortDeviceTypeL2tp; static CString s_PortDeviceTypeIrda; static CString s_PortDeviceTypeParallel; static CString s_PortDeviceTypePPPoE; static CString s_PortDeviceTypeOther;
static const CStringMapEntry s_PortTypeMap[] = { { RDT_Modem, &s_PortDeviceTypeModem, IDS_PORTSDLG_DEVTYPE_MODEM }, { RDT_X25, &s_PortDeviceTypeX25, IDS_PORTSDLG_DEVTYPE_X25 }, { RDT_Isdn, &s_PortDeviceTypeIsdn, IDS_PORTSDLG_DEVTYPE_ISDN }, { RDT_Serial, &s_PortDeviceTypeSerial, IDS_PORTSDLG_DEVTYPE_SERIAL }, { RDT_FrameRelay, &s_PortDeviceTypeFrameRelay, IDS_PORTSDLG_DEVTYPE_FRAMERELAY }, { RDT_Atm, &s_PortDeviceTypeAtm, IDS_PORTSDLG_DEVTYPE_ATM }, { RDT_Sonet, &s_PortDeviceTypeSonet, IDS_PORTSDLG_DEVTYPE_SONET }, { RDT_Sw56, &s_PortDeviceTypeSw56, IDS_PORTSDLG_DEVTYPE_SW56 }, { RDT_Tunnel_Pptp, &s_PortDeviceTypePptp, IDS_PORTSDLG_DEVTYPE_PPTP }, { RDT_Tunnel_L2tp, &s_PortDeviceTypeL2tp, IDS_PORTSDLG_DEVTYPE_L2TP }, { RDT_Irda, &s_PortDeviceTypeIrda, IDS_PORTSDLG_DEVTYPE_IRDA }, { RDT_Parallel, &s_PortDeviceTypeParallel, IDS_PORTSDLG_DEVTYPE_PARALLEL }, { RDT_PPPoE, &s_PortDeviceTypePPPoE, IDS_PORTSDLG_DEVTYPE_PPPOE }, { RDT_Other, &s_PortDeviceTypeOther, IDS_PORTSDLG_DEVTYPE_OTHER }, { -1, &s_PortUnknown, IDS_PORT_UNKNOWN }, };
/*!--------------------------------------------------------------------------
PortTypeToCString - Author: MikeG (a-migall) ---------------------------------------------------------------------------*/ CString& PortTypeToCString(DWORD dwPortType) { // Make sure that the class info has been "stripped" from the port
// type mask.
DWORD dw = static_cast<DWORD>(RAS_DEVICE_TYPE(dwPortType));
// For now, if we don't know what the type is we'll default to "Other"
// as an answer. FUTURE: Someone may want to change this in the future.
if (dw > RDT_Other) dw = RDT_Other;
return MapDWORDToCString(dwPortType, s_PortTypeMap); }
/*---------------------------------------------------------------------------
CWaitForRemoteAccessDlg implementation ---------------------------------------------------------------------------*/ CWaitForRemoteAccessDlg::CWaitForRemoteAccessDlg(LPCTSTR pszServerName, LPCTSTR pszText, LPCTSTR pszTitle, CWnd *pParent) : CWaitDlg(pszServerName, pszText, pszTitle, pParent) { } void CWaitForRemoteAccessDlg::OnTimerTick() { HRESULT hr = hrOK; DWORD dwErrorCode = ERROR_SUCCESS; // Windows NT Bug : 266364
// 266364 - If we got this far we assume that the service has
// already started, but it may then exit out after that point (due
// to some other configuration error). So we need to check to see
// if the service is running.
hr = IsRouterServiceRunning(m_strServerName, &dwErrorCode); if (FHrOK(hr)) { if (MprAdminIsServiceRunning(T2W((LPTSTR)(LPCTSTR) m_strServerName)) == TRUE) CDialog::OnOK(); // If the service is running, but MprAdmin is not finished yet,
// party on.
} else { // Stop the timer
CloseTimer(); CDialog::OnOK();
// Ensure that an error info was created
CreateTFSErrorInfo(NULL);
// The service is not running. We can exit out of this dialog.
// An error may have occurred, if we have the error code, report
// the error.
if (dwErrorCode != ERROR_SUCCESS) { TCHAR szBuffer[2048]; AddHighLevelErrorStringId(IDS_ERR_SERVICE_FAILED_TO_START);
FormatSystemError(dwErrorCode, szBuffer, DimensionOf(szBuffer), 0, FSEFLAG_SYSMESSAGE | FSEFLAG_MPRMESSAGE); FillTFSError(0, HResultFromWin32(dwErrorCode), FILLTFSERR_LOW, 0, szBuffer, 0);
DisplayTFSErrorMessage(GetSafeHwnd()); } else { AddHighLevelErrorStringId(IDS_ERR_SERVICE_FAILED_TO_START_UNKNOWN); } } }
/////////////////////////////////////////////////////////////////////////////
// CRestartRouterDlg dialog
CRestartRouterDlg::CRestartRouterDlg ( LPCTSTR pszServerName, LPCTSTR pszText, LPCTSTR pszTitle, CTime* pTimeStart, CWnd* pParent /*= NULL*/ ) : CWaitDlg(pszServerName, pszText, pszTitle, pParent) { m_pTimeStart = pTimeStart; m_dwTimeElapsed = 0; m_fTimeOut = FALSE; m_dwError = NO_ERROR; }
void CRestartRouterDlg::OnTimerTick() { AFX_MANAGE_STATE(AfxGetStaticModuleState());
m_dwTimeElapsed++; if (!(m_dwTimeElapsed % TIMEOUT_POLL)) { HRESULT hr = hrOK; DWORD dwError = NO_ERROR; DWORD dwServiceStatus = 0; BOOL fFinished = FALSE;
hr = GetRouterServiceStatus((LPCTSTR)m_strServerName, &dwServiceStatus, &dwError);
if (FHrSucceeded(hr) && SERVICE_RUNNING == dwServiceStatus) { USES_CONVERSION; if (MprAdminIsServiceRunning(T2W((LPTSTR)((LPCTSTR)m_strServerName)))) { DWORD dwUpTime; dwError = GetRouterUpTime(m_strServerName, &dwUpTime); if (NO_ERROR == dwError && dwUpTime <= (DWORD) ((CTime::GetCurrentTime() - *m_pTimeStart).GetTotalSeconds())) { CDialog::OnOK(); fFinished = TRUE; m_fTimeOut = FALSE; } } }
if (NO_ERROR != dwError) { CDialog::OnOK(); m_dwError = dwError; }
//NTBUG: ID=249775. The behavior of this dialog has to be same as the start
// dialog. So, timeout feature is disabled.
/*
//if the waiting time has been longer to 60 seconds, we assume someting is wrong
else if (!fFinished && (CTime::GetCurrentTime() - *m_pTimeStart).GetTotalSeconds() > MAX_WAIT_RESTART) { CDialog::OnOK(); m_fTimeOut = TRUE; } */ } }
TFSCORE_API(HRESULT) PauseRouterService(LPCWSTR pszMachine) { AFX_MANAGE_STATE(AfxGetStaticModuleState()); HRESULT hr = hrOK; CString stServiceDesc; DWORD dwErr;
COM_PROTECT_TRY {
// Load the description for the SAP Agent
stServiceDesc.LoadString(IDS_SAPAGENT_SERVICE_DESC); // Pause the SAP Agent
// ------------------------------------------------------------
dwErr = TFSPauseService(pszMachine, c_szNWSAPAgent, stServiceDesc); if ((dwErr == ERROR_SERVICE_NOT_ACTIVE) || (dwErr == ERROR_SERVICE_DOES_NOT_EXIST)) hr = hrOK; else CWRg( dwErr );
// Load the description for the router
// ------------------------------------------------------------
stServiceDesc.LoadString(IDS_RRAS_SERVICE_DESC);
// Pause the router service
// ------------------------------------------------------------
dwErr = TFSPauseService(pszMachine, c_szRouter, stServiceDesc); if ((dwErr == ERROR_SERVICE_NOT_ACTIVE) || (dwErr == ERROR_SERVICE_DOES_NOT_EXIST)) hr = hrOK; else CWRg( dwErr );
// Pause the RemoteAccess service
// ------------------------------------------------------------
dwErr = TFSPauseService(pszMachine, c_szRemoteAccess, stServiceDesc); if ((dwErr == ERROR_SERVICE_NOT_ACTIVE) || (dwErr == ERROR_SERVICE_DOES_NOT_EXIST)) hr = hrOK; else CWRg( dwErr );
COM_PROTECT_ERROR_LABEL; } COM_PROTECT_CATCH;
return hr; }
TFSCORE_API(HRESULT) ResumeRouterService(LPCWSTR pszMachine) { AFX_MANAGE_STATE(AfxGetStaticModuleState()); HRESULT hr = hrOK; CString stServiceDesc; DWORD dwErr;
COM_PROTECT_TRY {
// Load the description for the SAP Agent
stServiceDesc.LoadString(IDS_SAPAGENT_SERVICE_DESC); // Resume the SAP Agent
// ------------------------------------------------------------
dwErr = TFSResumeService(pszMachine, c_szNWSAPAgent, stServiceDesc); if (dwErr == ERROR_SERVICE_NOT_ACTIVE) hr = hrOK; else hr = HResultFromWin32(dwErr);
// Load the description for the router
// ------------------------------------------------------------
stServiceDesc.LoadString(IDS_RRAS_SERVICE_DESC); // Resume the router service
// ------------------------------------------------------------
dwErr = TFSResumeService(pszMachine, c_szRouter, stServiceDesc); if (dwErr == ERROR_SERVICE_NOT_ACTIVE) hr = hrOK; else hr = HResultFromWin32(dwErr);
// Resume the RemoteAccess service
// ------------------------------------------------------------
dwErr = TFSResumeService(pszMachine, c_szRemoteAccess, stServiceDesc); if (dwErr == ERROR_SERVICE_NOT_ACTIVE) hr = hrOK; else hr = HResultFromWin32(dwErr); } COM_PROTECT_CATCH;
return hr; }
/*---------------------------------------------------------------------------
CNetConnection ---------------------------------------------------------------------------*/
/*---------------------------------------------------------------------------
Class : CNetConnection
This class maintains a list of net connections (those connected using WNetAddConnection2).
When told, it will release all of its connections. ---------------------------------------------------------------------------*/
class CNetConnection { public: CNetConnection(); ~CNetConnection();
HRESULT Add(LPCTSTR pszConnection); HRESULT RemoveAll(); HRESULT Remove(LPCTSTR pszConnection); private: CStringList m_listConnections; };
CNetConnection::CNetConnection() { }
CNetConnection::~CNetConnection() { RemoveAll(); }
HRESULT CNetConnection::Add(LPCTSTR pszConnection) { HRESULT hr = hrOK;
COM_PROTECT_TRY { m_listConnections.AddTail(pszConnection); } COM_PROTECT_CATCH;
return hr; } HRESULT CNetConnection::Remove(LPCTSTR pszConnection) { HRESULT hr = hrOK; POSITION p; COM_PROTECT_TRY { p = m_listConnections.Find(pszConnection); if ( p ) { m_listConnections.RemoveAt(p); WNetCancelConnection2(pszConnection, 0 /* dwFlags */, TRUE /* fForce */); } } COM_PROTECT_CATCH; return hr; } HRESULT CNetConnection::RemoveAll() { HRESULT hr = hrOK;
COM_PROTECT_TRY { while (!m_listConnections.IsEmpty()) { CString st;
st = m_listConnections.RemoveHead(); WNetCancelConnection2((LPCTSTR) st, 0 /* dwFlags */, TRUE /* fForce */); } } COM_PROTECT_CATCH;
return hr; }
// Global functions to add/remove net connections
// --------------------------------------------------------------------
static CNetConnection g_NetConnections;
HRESULT AddNetConnection(LPCTSTR pszConnection) { return g_NetConnections.Add(pszConnection); }
HRESULT RemoveAllNetConnections() { return g_NetConnections.RemoveAll(); }
HRESULT RemoveNetConnection(LPCTSTR szServerName) { //Make the connection name
CString stIPCShare; CString stRouterName = szServerName; if ( stRouterName.Left(2) != TEXT( "\\\\" ) ) { stIPCShare = TEXT( "\\\\" ); }
stIPCShare += stRouterName; stIPCShare += TEXT( "\\" ); stIPCShare += c_szIPCShare; return g_NetConnections.Remove(stIPCShare); }
/*!--------------------------------------------------------------------------
RefreshMprConfig - Author: KennT ---------------------------------------------------------------------------*/ HRESULT RefreshMprConfig(LPCTSTR pszServerName) { HRESULT hr = hrOK; SPMprConfigHandle sphConfig;
CWRg( ::MprConfigServerConnect((LPWSTR) pszServerName, &sphConfig) );
MprConfigServerRefresh(sphConfig);
Error: return hr; }
HRESULT WINAPI IsWindows64Bit( LPCWSTR pwszMachine, LPCWSTR pwszUserName, LPCWSTR pwszPassword, LPCWSTR pwszDomain, BOOL * pf64Bit) { HRESULT hr = S_OK; RouterVersionInfo routerVersion; IWbemLocator * pIWbemLocator = NULL; IWbemServices * pIWbemServices = NULL; SEC_WINNT_AUTH_IDENTITY_W stAuthIdentity; HKEY hkeyMachine = NULL; *pf64Bit = FALSE;
//Check to see if the version is <= 2195. If yes then there is no 64 bit there...
if (ERROR_SUCCESS == ConnectRegistry(pwszMachine, &hkeyMachine)) QueryRouterVersionInfo(hkeyMachine, &routerVersion); if (hkeyMachine) DisconnectRegistry(hkeyMachine); if ( routerVersion.dwOsBuildNo <= RASMAN_PPP_KEY_LAST_WIN2k_VERSION ) { return hr; } hr = CoInitializeEx(NULL, COINIT_APARTMENTTHREADED | COINIT_DISABLE_OLE1DDE); if (FAILED(hr) && (RPC_E_CHANGED_MODE != hr)) { return hr; } // Create an instance of the WbemLocator interface.
hr = CoCreateInstance( CLSID_WbemLocator, NULL, CLSCTX_INPROC_SERVER, IID_IWbemLocator, (LPVOID *) &pIWbemLocator );
if (hrOK != hr) { return hr; }
// Using the locator, connect to CIMOM in the given namespace.
BSTR pNamespace; WCHAR szPath[MAX_PATH]; WCHAR szTemp[MAX_PATH]; BSTR bstrUserName = NULL, bstrPassword = NULL, bstrDomain = NULL; if ( pwszUserName ) { bstrUserName = SysAllocString(pwszUserName); if ( pwszPassword ) bstrPassword = SysAllocString(pwszPassword); if ( pwszDomain ) { wsprintf ( szTemp, L"NTLMDOMAIN:%s", pwszDomain ); bstrDomain = SysAllocString(szTemp); } } wsprintf(szPath, L"\\\\%s\\root\\cimv2", (!pwszMachine || (pwszMachine[0] ==0)) ? L"." : pwszMachine); pNamespace = SysAllocString(szPath);
hr = pIWbemLocator->ConnectServer( pNamespace, (pwszUserName?bstrUserName:NULL), //UserName
(pwszPassword?bstrPassword:NULL), //Password
0L, // locale
0L, // securityFlags
( pwszDomain?bstrDomain:NULL), // authority (domain for NTLM)
NULL, // context
&pIWbemServices); if (SUCCEEDED(hr)) { if ( pwszUserName ) { ::SecureZeroMemory ( &stAuthIdentity, sizeof(stAuthIdentity)); stAuthIdentity.User = (LPWSTR)pwszUserName; stAuthIdentity.UserLength = lstrlenW(pwszUserName );
stAuthIdentity.Password = (LPWSTR)pwszPassword; stAuthIdentity.PasswordLength = lstrlenW( pwszPassword );
if ( pwszDomain ) { stAuthIdentity.Domain = (LPWSTR)pwszDomain; stAuthIdentity.DomainLength = lstrlenW(pwszDomain); } stAuthIdentity.Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE;
} hr = CoSetProxyBlanket(pIWbemServices, RPC_C_AUTHN_WINNT, RPC_C_AUTHZ_NONE, NULL, RPC_C_AUTHN_LEVEL_CALL, RPC_C_IMP_LEVEL_IMPERSONATE, (pwszUserName?&stAuthIdentity:NULL), EOAC_NONE);
if (SUCCEEDED(hr)) {
IEnumWbemClassObject * pEnum = NULL; BSTR bstrWQL = SysAllocString(L"WQL"); VARIANT varArchitecture; BSTR bstrPath;
bstrPath = SysAllocString(L"select * from Win32_Processor"); hr = pIWbemServices->ExecQuery(bstrWQL, bstrPath, WBEM_FLAG_FORWARD_ONLY, NULL, &pEnum); if (SUCCEEDED(hr)) { hr = CoSetProxyBlanket(pEnum, RPC_C_AUTHN_WINNT, RPC_C_AUTHZ_NONE, NULL, RPC_C_AUTHN_LEVEL_CALL, RPC_C_IMP_LEVEL_IMPERSONATE, (pwszUserName?&stAuthIdentity:NULL), EOAC_NONE); if ( SUCCEEDED(hr) ) { IWbemClassObject *pNSClass; ULONG uReturned; pEnum->Next(WBEM_INFINITE, 1, &pNSClass, &uReturned ); if (SUCCEEDED(hr)) { if (uReturned) { CIMTYPE ctpeType; hr = pNSClass->Get(L"Architecture", NULL, &varArchitecture, &ctpeType, NULL); if (SUCCEEDED(hr)) { VariantChangeType(&varArchitecture, &varArchitecture, 0, VT_UINT); if ( varArchitecture.uintVal == 6 ) //64 bit
{ *pf64Bit = TRUE; } } } else { hr = E_UNEXPECTED; } pNSClass->Release(); } } pEnum->Release(); } SysFreeString(bstrPath); SysFreeString(bstrWQL); pIWbemServices->Release(); } pIWbemLocator->Release(); if ( bstrUserName ) SysFreeString(bstrUserName); if ( bstrPassword ) SysFreeString(bstrPassword); if ( bstrDomain ) SysFreeString(bstrDomain); } SysFreeString(pNamespace);
CoUninitialize(); // Translate any WMI errors into Win32 errors:
switch (hr) { case WBEM_E_NOT_FOUND: hr = HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND); break;
case WBEM_E_ACCESS_DENIED: hr = E_ACCESSDENIED; break;
case WBEM_E_PROVIDER_FAILURE: hr = E_FAIL; break;
case WBEM_E_TYPE_MISMATCH: case WBEM_E_INVALID_CONTEXT: case WBEM_E_INVALID_PARAMETER: hr = E_INVALIDARG; break;
case WBEM_E_OUT_OF_MEMORY: hr = E_OUTOFMEMORY; break;
} return hr;
}
HRESULT WINAPI TransferCredentials ( IRouterInfo * pRISource, IRouterInfo * pRIDest ) { HRESULT hr = S_OK; SPIRouterAdminAccess spAdminSrc; SPIRouterAdminAccess spAdminDest; SPIRouterInfo spRISource; SPIRouterInfo spRIDest; PBYTE pbPassword = NULL; int nPasswordLen = 0;
COM_PROTECT_TRY { spRISource.Set(pRISource); spRIDest.Set(pRIDest); spAdminSrc.HrQuery(spRISource); spAdminDest.HrQuery(spRIDest); if (spAdminSrc && spAdminSrc->IsAdminInfoSet() && spAdminDest) { spAdminSrc->GetUserPassword(NULL, &nPasswordLen );
pbPassword = (PBYTE) new BYTE [nPasswordLen]; spAdminSrc->GetUserPassword( pbPassword, &nPasswordLen ); spAdminDest->SetInfo( spAdminSrc->GetUserName(), spAdminSrc->GetDomainName(), pbPassword, nPasswordLen ); delete pbPassword; } } COM_PROTECT_CATCH;
return hr;
}
|