//+--------------------------------------------------------------------------- // // Microsoft Windows // Copyright (C) Microsoft Corporation, 2000. // // File: I C S U P G R D . CPP // // Contents: Functions that is related to // o upgrade of ICS from Win98 SE, WinMe and Win2K to Whistler // o unattended clean install of Homenet on Whistler or later // // Date: 20-Sept-2000 // //---------------------------------------------------------------------------- #include "pch.h" #pragma hdrstop #include #include #include #include #include #include extern CComModule _Module; // required by atlcom.h #include #include "ncatl.h" #include "ncui.h" #include "ncstring.h" #include "ncnetcfg.h" #include "kkutils.h" #include "kkcwinf.h" #include "nslog.h" #include "afilexp.h" #include "ncras.h" #include "ncreg.h" extern "C" { // Fix IA64 conflict with Shell Macro #undef IS_ALIGNED #include } #include "IcsUpgrd.h" #include "resource.h" // need to use string resource ids /*++ Routine Description: This function drives the FIcsUpgrade call by passing a init'ed and opened CWInfFile object. Arguments: None Returns: TRUE if succeeded Notes: --*/ BOOL FDoIcsUpgradeIfNecessary() { BOOL fRet = FALSE; HRESULT hr; tstring strAnswerFileName; hr = HrGetAnswerFileName(&strAnswerFileName); if (S_OK == hr) { CWInfFile wifIcsAnswerFile; // initialize answer file if (wifIcsAnswerFile.Init()) { if (wifIcsAnswerFile.Open(strAnswerFileName.c_str())) { TraceTag(ttidNetSetup, "calling FIcsUpgrade now..."); fRet = FIcsUpgrade(&wifIcsAnswerFile); wifIcsAnswerFile.Close(); } else { TraceTag(ttidNetSetup, "wifIcsAnswerFile.Open failed"); } } else { TraceTag(ttidNetSetup, "wifIcsAnswerFile.Init failed"); } } else { TraceTag(ttidNetSetup, "HrGetAnswerFileName failed"); } return fRet; } /*++ Routine Description: Perform the upgrade of o ICS from Win98 SE, WinMe and Win2K o Unattended Homenet clean install Arguments: [in] pwifAnswerFile The answer-file contains upgrade info from Win9x or Windows XP unattended clean install. Returns: TRUE if succeeded Notes: --*/ BOOL FIcsUpgrade(CWInfFile* pwifAnswerFile) { HRESULT hr = S_OK; ICS_UPGRADE_SETTINGS iusSettings; BOOL fUpgradeIcsToRrasNat = FALSE; BOOL fCoUninitialize = FALSE; DefineFunctionName("FIcsUpgrade"); TraceFunctionEntry(ttidNetSetup); hr = CoInitialize(NULL); if (SUCCEEDED(hr)) { fCoUninitialize = TRUE; } else { if (RPC_E_CHANGED_MODE == hr) { hr = S_OK; } else { TraceTag(ttidError, "%s: CoInitialize failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevError, SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS)); return FALSE; } } do { SetIcsDefaultSettings(&iusSettings); // check if we are upgrading from Windows 2000 if (FNeedIcsUpgradeFromWin2K()) { hr = BuildIcsUpgradeSettingsFromWin2K(&iusSettings); if (FAILED(hr)) { TraceTag(ttidError, "%s: BuildIcsUpgradeSettingsFromWin2K failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS)); break; } // ICS installed on Win2K if we are here if (FOsIsUnsupported()) { TraceTag(ttidNetSetup, "%s: We're running an Unsupported SKU, won't upgrade ICS from Win2K.", __FUNCNAME__); fUpgradeIcsToRrasNat = TRUE; break; } // OS version is less than Advanced Server if we are here } else { // we need to check if we are doing ICS upgrade from Win9x or // doing unattended Homenet install on Windows XP or later if (NULL == pwifAnswerFile) { TraceTag(ttidNetSetup, "%s: Not an ICS Upgrade from Win2K and no answer-file.", __FUNCNAME__); break; } // Try to load "Homenet" section data from Answer-File hr = LoadIcsSettingsFromAnswerFile(pwifAnswerFile, &iusSettings); if (S_FALSE == hr) { // no Homenet section hr = S_OK; break; } if (FAILED(hr)) { TraceTag(ttidNetSetup, "%s: LoadIcsSettingsFromAnswerFile failed: 0x%lx", __FUNCNAME__, hr); // this may not be an error because of bug# 253074 in Win9x // OEM ICS upgrade // I'm not going to log this to setup log if (iusSettings.fEnableICS && iusSettings.fWin9xUpgrade) { hr = S_OK; // ICS enabled but no internal/external adapters. } break; } // Assert: Answer file has valid [Homenet] section. // make sure OS SKU is less than Advanced Server if (FOsIsUnsupported()) { TraceTag(ttidNetSetup, "%s: We're running an Unsupported SKU, won't do any homenet unattended setup.", __FUNCNAME__); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS_ADS_DTC)); break; } } // upgrade ics settings to XP or do unattended Homenet if we // can reach here hr = UpgradeIcsSettings(&iusSettings); if (S_OK != hr) { TraceTag(ttidError, "%s: UpgradeIcsSettings failed : 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS)); } } while (FALSE); if (fUpgradeIcsToRrasNat) { // If we are here, ICS installed on Win2K and this is an upgrade of OS // to ADS/DTC SKUs. We won't upgrade ICS on ADS/DTC SKUs TraceTag(ttidNetSetup, "%s: We are not upgrading ICS on ADS/DTC SKUs", __FUNCNAME__); // During the "Report System Compatiblilty" stage (winnt32.exe) of this // OS upgrade process, user has already been notified that we're not // upgrading ICS on ADS/DTC SKUs. // we will still log a message to setupact.log file. NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS_ADS_DTC)); // we need to delete and backup the old ICS registry settings hr = BackupAndDelIcsRegistryValuesOnWin2k(); if (FAILED(hr)) { TraceTag(ttidNetSetup, "%s: BackupAndDelIcsRegistryValuesOnWin2k failed: 0x%lx", __FUNCNAME__, hr); } } // Free iusSettings contents if needed FreeIcsUpgradeSettings(&iusSettings); if (fCoUninitialize) { CoUninitialize(); } return (S_OK == hr? TRUE : FALSE); } //--------- ICS Upgrade helpers begin---------------------------- /*++ Routine Description: Gets the current shared ICS connection On Win2K Arguments: [out] pConnection The shared connection information Returns: S_OK if succeeded Notes: Returns the interface connected to the internet --*/ HRESULT GetSharedConnectionOnWin2k(LPRASSHARECONN pConnection) { HKEY hKey = NULL; HRESULT hr = S_OK; DefineFunctionName("GetSharedConnectionOnWin2k"); TraceFunctionEntry(ttidNetSetup); Assert(pConnection); hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, c_wszRegKeySharedAccessParams, KEY_ALL_ACCESS, &hKey); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrRegOpenKeyEx failed: 0x%lx", __FUNCNAME__, hr); return hr; } Assert(hKey); DWORD dwType = REG_BINARY; PBYTE pByte = NULL; DWORD dwValueSize = 0; hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedConnection, &dwType, &pByte, &dwValueSize); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrRegQueryValueWithAlloc %S failed: 0x%lx", __FUNCNAME__, c_wszRegValSharedConnection, hr); goto Exit; } if (dwValueSize > sizeof(RASSHARECONN)) { TraceTag(ttidError, "%s: RASSHARECONN size too big: 0x%lx bytes", __FUNCNAME__, dwValueSize); hr = E_FAIL; goto Exit; } // transfer value memcpy(pConnection, pByte, dwValueSize); Exit: // Close the key, if opened RegSafeCloseKey(hKey); // Clean up the registry buffer if (pByte) { MemFree(pByte); } return hr; } /*++ Routine Description: Gets the current private LAN connection on Win2K Arguments: [out] pGuid The private LAN information Returns: S_OK if succeeded Notes: Returns the interface connected to the private LAN On Win2K, there is only 1 private LAN connection --*/ HRESULT GetSharedPrivateLanOnWin2K(GUID *pGuid) { HKEY hKey = NULL; HRESULT hr = S_OK; DefineFunctionName("GetSharedPrivateLanOnWin2K"); TraceFunctionEntry(ttidNetSetup); Assert(pGuid); hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, c_wszRegKeySharedAccessParams, KEY_ALL_ACCESS, &hKey); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrRegOpenKeyEx failed: 0x%lx", __FUNCNAME__, hr); return hr; } Assert(hKey); DWORD dwType = REG_SZ; PBYTE pByte = NULL; DWORD dwValueSize = 0; hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedPrivateLan, &dwType, &pByte, &dwValueSize); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrRegQueryValueWithAlloc %S failed: 0x%lx", __FUNCNAME__, c_wszRegValSharedPrivateLan, hr); goto Exit; } // SharedPrivateLan is of type REG_SZ, pByte should have included // the terminating null character. hr = CLSIDFromString(reinterpret_cast(pByte), pGuid); Exit: // Close the key, if opened RegSafeCloseKey(hKey); // Clean up the registry buffer if (pByte) { MemFree(pByte); } return hr; } /*++ Routine Description: Delete and backup SharedConnection and SharedPrivateLan registry values Arguments: none Returns: S_OK if succeeded Notes: --*/ HRESULT BackupAndDelIcsRegistryValuesOnWin2k() { HKEY hKey = NULL; HRESULT hr = S_OK; DefineFunctionName("BackupAndDelIcsRegistryValuesOnWin2k"); TraceFunctionEntry(ttidNetSetup); hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, c_wszRegKeySharedAccessParams, KEY_ALL_ACCESS, &hKey); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrRegOpenKeyEx failed: 0x%lx", __FUNCNAME__, hr); return hr; } Assert(hKey); DWORD dwType = REG_BINARY; PBYTE pByte = NULL; DWORD dwValueSize = 0; // backup SharedConnection hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedConnection, &dwType, &pByte, &dwValueSize); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrRegQueryValueWithAlloc %S failed: 0x%lx", __FUNCNAME__, c_wszRegValSharedConnection, hr); goto Exit; } hr = HrRegSetValueEx(hKey, c_wszRegValBackupSharedConnection, dwType, pByte, dwValueSize); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrRegSetValueEx %S failed: 0x%lx", __FUNCNAME__, c_wszRegValBackupSharedConnection, hr); goto Exit; } if (pByte) { MemFree(pByte); } // Reset values pByte = NULL; dwValueSize = 0; dwType = REG_SZ; // backup SharedPrivateLan hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedPrivateLan, &dwType, &pByte, &dwValueSize); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrRegQueryValueWithAlloc %S failed: 0x%lx", __FUNCNAME__, c_wszRegValSharedPrivateLan, hr); goto Exit; } hr = HrRegSetValueEx(hKey, c_wszRegValBackupSharedPrivateLan, dwType, pByte, dwValueSize); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrRegSetValueEx %S failed: 0x%lx", __FUNCNAME__, c_wszRegValBackupSharedPrivateLan, hr); goto Exit; } Exit: // Delete SharedConnection and ShardPrivateLan named values, ignore any errors HrRegDeleteValue(hKey, c_wszRegValSharedConnection); HrRegDeleteValue(hKey, c_wszRegValSharedPrivateLan); RegSafeCloseKey(hKey); if (pByte) { MemFree(pByte); } return hr; } /*++ Routine Description: Gets the RAS phonebook directory Arguments: [out] pszPathBuf The phone book path Returns: S_OK if succeeded Notes: --*/ HRESULT GetPhonebookDirectory(WCHAR* pwszPathBuf) // Loads caller's 'pszPathBuf' (should have length MAX_PATH + 1) with the // path to the directory containing phonebook files for the given mode, // e.g. c:\nt\system32\ras\" for mode PBM_Router. Note the // trailing backslash. // // Returns true if successful, false otherwise. Caller is guaranteed that // an 8.3 filename will fit on the end of the directory without exceeding // MAX_PATH. // { DefineFunctionName("GetPhonebookDirectory"); TraceFunctionEntry(ttidNetSetup); HANDLE hToken = NULL; PFNSHGETFOLDERPATHW pfnSHGetFolderPathW; HINSTANCE Hinstance; // // Load ShFolder.dll, which contains the 'SHGetFolderPath' entrypoint // that we will use to get the Application data for all users path if (!(Hinstance = LoadLibraryW(c_wszShFolder)) || !(pfnSHGetFolderPathW = (PFNSHGETFOLDERPATHW) GetProcAddress(Hinstance, c_szSHGetFolderPathW))) { if (Hinstance) { FreeLibrary(Hinstance); } return E_FAIL; } if ((OpenThreadToken( GetCurrentThread(), TOKEN_QUERY | TOKEN_IMPERSONATE, TRUE, &hToken) || OpenProcessToken( GetCurrentProcess(), TOKEN_QUERY | TOKEN_IMPERSONATE, &hToken))) { HRESULT hr; INT csidl = CSIDL_COMMON_APPDATA; hr = pfnSHGetFolderPathW(NULL, csidl, hToken, 0, pwszPathBuf); if (SUCCEEDED(hr)) { if(lstrlen(pwszPathBuf) <= (MAX_PATH - (lstrlen(c_wszPhoneBookPath)))) { lstrcat(pwszPathBuf, c_wszPhoneBookPath); CloseHandle(hToken); FreeLibrary(Hinstance); return S_OK; } } else { TraceTag(ttidError, "%s: SHGetFolderPath failed: 0x%lx", __FUNCNAME__, hr); } CloseHandle(hToken); } FreeLibrary(Hinstance); return E_FAIL; } /*++ Routine Description: CSharedAccessServer::CSharedAccessServer() Constructor Arguments: none Return Value: none Notes: --*/ CSharedAccessServer::CSharedAccessServer() { m_wPort = 0; m_wInternalPort = 0; m_bBuiltIn = FALSE; m_bSelected = FALSE; m_dwSectionNum = 0; }; /*++ Routine Description: Returns the current list of Shared Access Servers Arguments: [in,out] lstSharedAccessServers List of SharedAccessServers Returns: S_OK if succeeded Notes: Reads the sharedaccess.ini phonebook file for server mappings. --*/ HRESULT GetServerMappings(list &lstSharedAccessServers) { WCHAR wszPathBuf[MAX_PATH + 1]; HRESULT hr = GetPhonebookDirectory(wszPathBuf); if FAILED(hr) return hr; tstring strIniFile; // full pathname to sharedaccess.ini strIniFile = wszPathBuf; strIniFile += c_wszFileSharedAccess; const DWORD dwBufSize = 32768; // limit the section buffer size to the same value as Win9x max. buffer size PWCHAR wszLargeReturnedString = new WCHAR[dwBufSize]; if (NULL == wszLargeReturnedString) { return E_OUTOFMEMORY; } DWORD dwResult; dwResult = GetPrivateProfileSection(c_wszContentsServer, wszLargeReturnedString, dwBufSize-1, strIniFile.c_str()); if (dwResult) { PWCHAR wszEnd = wszLargeReturnedString + dwResult; for (PWCHAR wszServer = wszLargeReturnedString; (*wszServer) && (wszServer < wszEnd); wszServer += wcslen(wszServer) + 1) { WCHAR wszReturnedString[MAX_PATH]; PWCHAR wszSectionNum = NULL; PWCHAR wszEnabled; // prefix bug# 295834 wszSectionNum = new WCHAR[wcslen(wszServer)+1]; if (NULL == wszSectionNum) { delete [] wszLargeReturnedString; return E_OUTOFMEMORY; } wcscpy(wszSectionNum, wszServer); PWCHAR wszAssign = wcschr(wszSectionNum, L'='); if (wszAssign) { *wszAssign = NULL; wszEnabled = wszAssign + 1; } else { wszEnabled = FALSE; } tstring strSectionName; strSectionName = c_wszServerPrefix; // prefix bug# 295835 strSectionName += wszSectionNum; // prefix bug# 295836 CSharedAccessServer SharedAccessServer; SharedAccessServer.m_dwSectionNum = _wtoi(wszSectionNum); SharedAccessServer.m_bSelected = _wtoi(wszEnabled); dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszInternalName, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessServer.m_szInternalName = wszReturnedString; } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszTitle, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessServer.m_szTitle = wszReturnedString; } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszInternalPort, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessServer.m_wInternalPort = static_cast(_wtoi(wszReturnedString)); } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszPort, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessServer.m_wPort = static_cast(_wtoi(wszReturnedString)); } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszReservedAddress, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessServer.m_szReservedAddress = wszReturnedString; } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszProtocol, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessServer.m_szProtocol = wszReturnedString; } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszBuiltIn, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessServer.m_bBuiltIn = static_cast(_wtoi(wszReturnedString)); } lstSharedAccessServers.insert(lstSharedAccessServers.end(), SharedAccessServer); delete [] wszSectionNum; wszSectionNum = NULL; } } delete [] wszLargeReturnedString; return S_OK; } /*++ Routine Description: Returns the current list of Shared Access Applications Arguments: [in,out] lstSharedAccessApplications List of SharedAccessApplications Returns: S_OK if succeeded Notes: Reads the sharedaccess.ini phonebook file for application mappings. --*/ HRESULT GetApplicationMappings(list &lstSharedAccessApplications) { WCHAR wszPathBuf[MAX_PATH + 1]; HRESULT hr = GetPhonebookDirectory(wszPathBuf); if FAILED(hr) return hr; tstring strIniFile; // full pathname to sharedaccess.ini strIniFile = wszPathBuf; strIniFile += c_wszFileSharedAccess; const DWORD dwBufSize = 32768; // limit the section buffer size to the same value as Win9x max. buffer size PWCHAR wszLargeReturnedString = new WCHAR[dwBufSize]; if (NULL == wszLargeReturnedString) { return E_OUTOFMEMORY; } DWORD dwResult; dwResult = GetPrivateProfileSection(c_wszContentsApplication, wszLargeReturnedString, dwBufSize-1, strIniFile.c_str()); if (dwResult) { PWCHAR wszEnd = wszLargeReturnedString + dwResult; for (PWCHAR wszApplication = wszLargeReturnedString; (*wszApplication) && (wszApplication < wszEnd); wszApplication += wcslen(wszApplication) + 1) { WCHAR wszReturnedString[MAX_PATH]; PWCHAR wszSectionNum = NULL; PWCHAR wszEnabled; // prefix bug# 295838 wszSectionNum = new WCHAR[wcslen(wszApplication)+1]; if (NULL == wszSectionNum) { delete [] wszLargeReturnedString; return E_OUTOFMEMORY; } wcscpy(wszSectionNum, wszApplication); PWCHAR wszAssign = wcschr(wszSectionNum, L'='); if (wszAssign) { *wszAssign = NULL; wszEnabled = wszAssign + 1; } else { wszEnabled = FALSE; } tstring strSectionName; strSectionName = c_wszApplicationPrefix; // prefix bug# 295839 strSectionName += wszSectionNum; // prefix bug# 295840 CSharedAccessApplication SharedAccessApplication; SharedAccessApplication.m_dwSectionNum = _wtoi(wszSectionNum); SharedAccessApplication.m_bSelected = _wtoi(wszEnabled); dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszTitle, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessApplication.m_szTitle = wszReturnedString; } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszProtocol, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessApplication.m_szProtocol = wszReturnedString; } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszPort, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessApplication.m_wPort = static_cast(_wtoi(wszReturnedString)); } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszTcpResponseList, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessApplication.m_szTcpResponseList = wszReturnedString; } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszUdpResponseList, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessApplication.m_szUdpResponseList = wszReturnedString; } dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszBuiltIn, L"", wszReturnedString, MAX_PATH, strIniFile.c_str()); if (dwResult) { SharedAccessApplication.m_bBuiltIn = static_cast(_wtoi(wszReturnedString)); } lstSharedAccessApplications.insert(lstSharedAccessApplications.end(), SharedAccessApplication); delete [] wszSectionNum; wszSectionNum = NULL; } } delete [] wszLargeReturnedString; return S_OK; } /*++ Routine Description: Add ResponseList string into vector of HNET_RESPONSE_RANGE Arguments: [in] rssaAppProt - ref. to the CSharedAccessApplication obj. [in] ucProtocol - NAT_PROTOCOL_TCP or NAT_PROTOCOL_UDP [out] rvecResponseRange - add new HNET_RESPONSE_RANGE(s) to this vector Returns: S_OK if succeeded Notes: In case of failure, contents of rvecResponseRange will be erased. Design by contract: ucProtocol could only be NAT_PROTOCOL_TCP or NAT_PROTOCOL_UDP --*/ HRESULT AddResponseStringToVector( CSharedAccessApplication& rsaaAppProt, UCHAR ucProtocol, vector& rvecResponseRange // vector of response range ) { WCHAR* Endp; USHORT EndPort; // the End port # in the range of response port # USHORT StartPort; // the starting port # in the range of response port # const WCHAR* pwszValue = NULL; // the tcp or udp ResponseString to be converted. // (e.g "1300-1310,1450" or "1245") HNET_RESPONSE_RANGE hnrrResponseRange; // the response range HRESULT hr = S_OK; // select the ResponseList to be added if (NAT_PROTOCOL_TCP == ucProtocol) { pwszValue = rsaaAppProt.m_szTcpResponseList.c_str(); } else if (NAT_PROTOCOL_UDP == ucProtocol) { pwszValue = rsaaAppProt.m_szUdpResponseList.c_str(); } if (NULL == pwszValue) { // no operation goto Exit; } while (*pwszValue) { // Read either a single port or a range of ports. if (!(StartPort = (USHORT)wcstoul(pwszValue, &Endp, 10))) { hr = E_FAIL; goto Exit; } else if (!*Endp || *Endp == L',') { EndPort = StartPort; pwszValue = (!*Endp ? Endp : Endp + 1); } else if (*Endp != L'-') { hr = E_FAIL; goto Exit; } else if (!(EndPort = (USHORT)wcstoul(++Endp, (WCHAR**)&pwszValue, 10))) { hr = E_FAIL; goto Exit; } else if (EndPort < StartPort) { hr = E_FAIL; goto Exit; } else if (*pwszValue && *pwszValue++ != L',') { hr = E_FAIL; goto Exit; } // transfer values hnrrResponseRange.ucIPProtocol = ucProtocol; hnrrResponseRange.usStartPort = HTONS(StartPort); hnrrResponseRange.usEndPort = HTONS(EndPort); rvecResponseRange.push_back(hnrrResponseRange); } Exit: if (FAILED(hr)) { rvecResponseRange.erase(rvecResponseRange.begin(), rvecResponseRange.end()); } return hr; } /*++ Routine Description: Converts ResponseList string into array of HNET_RESPONSE_RANGE Arguments: [in] rssaAppProt - ref. to the CSharedAccessApplication obj. [out] puscResponse - number of HNET_RESPONSE_RANGE converted [out] pphnrrResponseRange - array of HNET_RESPONSE_RANGE converted Returns: S_OK if succeeded Notes: User is responsible to free pphnrrResponseRange by "delete [] (BYTE*)(*pphnrrResponseRange)" if *puscResponse > 0 --*/ HRESULT PutResponseStringIntoArray( CSharedAccessApplication& rsaaAppProt, // Application Protocol USHORT* puscResponse, HNET_RESPONSE_RANGE** pphnrrResponseRange ) { HRESULT hr; DWORD dwIdx = 0; Assert(pphnrrResponseRange != NULL); Assert(puscResponse != NULL); *pphnrrResponseRange = NULL; *puscResponse = 0; vector vecResponseRange; // vector of response range if (! rsaaAppProt.m_szTcpResponseList.empty()) { //TcpResponseList is not empty hr = AddResponseStringToVector(rsaaAppProt, NAT_PROTOCOL_TCP, vecResponseRange); if (FAILED(hr)) { return hr; } } if (! rsaaAppProt.m_szUdpResponseList.empty()) { // UdpResponseList is not empty hr = AddResponseStringToVector(rsaaAppProt, NAT_PROTOCOL_UDP, vecResponseRange); if (FAILED(hr)) { return hr; } } HNET_RESPONSE_RANGE* phnrrResponseRange = NULL; USHORT uscResponseRange = (USHORT) vecResponseRange.size(); if (1 > uscResponseRange) { // we should have at least 1 ReponseRange hr = E_FAIL; goto Exit; } phnrrResponseRange = (HNET_RESPONSE_RANGE*) new BYTE[sizeof(HNET_RESPONSE_RANGE) * uscResponseRange]; if (phnrrResponseRange == NULL) { hr = E_OUTOFMEMORY; goto Exit; } for (vector::iterator iter = vecResponseRange.begin(); iter != vecResponseRange.end(); ++iter, ++dwIdx) { phnrrResponseRange[dwIdx] = *iter; } // transfer values *pphnrrResponseRange = phnrrResponseRange; *puscResponse = uscResponseRange; Exit: vecResponseRange.erase(vecResponseRange.begin(), vecResponseRange.end()); return hr; } /*++ Routine Description: Check if we need to upgrade ICS from Win2K Returns: TRUE or FALSE Notes: 1. Check if registry value names (SharedConnection and SharedPrivateLan) exist. 2. Check if sharedaccess.ini file exists After upgrade, the registry names should be deleted because ICS will use settings from WMI repository. We don't Check if the IPNATHLP service exists, because it is removed in ADS and DTC SKUs --*/ BOOL FNeedIcsUpgradeFromWin2K() { // 1. Check if registry key values exist HKEY hKey = NULL; HRESULT hr = S_OK; hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, c_wszRegKeySharedAccessParams, KEY_ALL_ACCESS, &hKey); if (FAILED(hr)) { return FALSE; } Assert(hKey); DWORD dwType = REG_BINARY; PBYTE pByte = NULL; DWORD dwValueSize = 0; hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedConnection, &dwType, &pByte, &dwValueSize); if (FAILED(hr)) { RegSafeCloseKey(hKey); return FALSE; } if (pByte) { MemFree(pByte); } // Reset values pByte = NULL; dwValueSize = 0; dwType = REG_SZ; hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedPrivateLan, &dwType, &pByte, &dwValueSize); if (FAILED(hr)) { RegSafeCloseKey(hKey); return FALSE; } if (pByte) { MemFree(pByte); } // 2. Check if sharedaccess.ini file exists WCHAR wszPathBuf[MAX_PATH + 1]; hr = GetPhonebookDirectory(wszPathBuf); if FAILED(hr) return FALSE; tstring strShareAccessFile; strShareAccessFile = wszPathBuf; strShareAccessFile += c_wszFileSharedAccess; HANDLE hOpenFile = CreateFileW(strShareAccessFile.c_str(), // open file GENERIC_READ, // open for reading FILE_SHARE_READ, // share for reading NULL, // no security OPEN_EXISTING, // existing file only FILE_ATTRIBUTE_NORMAL, // normal file NULL); // no attr. template if (INVALID_HANDLE_VALUE == hOpenFile) { return FALSE; } CloseHandle(hOpenFile); return TRUE; } /*++ Routine Description: Upgrade ICS Settings Arguments: [in] pIcsUpgradeSettings - the ICS UPGRADE SETTINGS Returns: standard HRESULT Notes: --*/ HRESULT UpgradeIcsSettings(ICS_UPGRADE_SETTINGS * pIcsUpgrdSettings) { HRESULT hr; DefineFunctionName("UpgradeIcsSettings"); TraceFunctionEntry(ttidNetSetup); CIcsUpgrade IcsUpgradeObj; hr = IcsUpgradeObj.Init(pIcsUpgrdSettings); if (S_OK != hr) { TraceTag(ttidError, "%s: IcsUpgradeObj.Init failed: 0x%lx", __FUNCNAME__, hr); return hr; } return IcsUpgradeObj.StartUpgrade(); } /*++ Routine Description: Build the ICS_UPGRADE_SETTINGS struct from Win2K ICS settings Arguments: [in] pIcsUpgrdSettings - pointer to the ICS_UPGRADE_SETTINGS Return Value: standard HRESULT Notes: --*/ HRESULT BuildIcsUpgradeSettingsFromWin2K(ICS_UPGRADE_SETTINGS* pIcsUpgrdSettings) { HRESULT hr; DefineFunctionName("BuildIcsUpgradeSettingsFromWin2K"); TraceFunctionEntry(ttidNetSetup); Assert(pIcsUpgrdSettings != NULL); GUID guid; hr = GetSharedPrivateLanOnWin2K(&guid); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetSharedPrivateLanOnWin2K failed: 0x%lx", __FUNCNAME__, hr); return hr; } hr = GetSharedConnectionOnWin2k(&(pIcsUpgrdSettings->rscExternal)); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetSharedConnectionOnWin2k failed: 0x%lx", __FUNCNAME__, hr); return hr; } hr = GetServerMappings(pIcsUpgrdSettings->listSvrPortmappings); if (FAILED(hr)) { TraceTag(ttidError, "%s: Ignore error from GetServerMappings : 0x%lx", __FUNCNAME__, hr); } hr = GetApplicationMappings(pIcsUpgrdSettings->listAppPortmappings); if (FAILED(hr)) { TraceTag(ttidError, "%s: Ignore error from GetApplicationMappings : 0x%lx", __FUNCNAME__, hr); } // transfer values pIcsUpgrdSettings->guidInternal = guid; pIcsUpgrdSettings->fInternalAdapterFound = TRUE; pIcsUpgrdSettings->fDialOnDemand = TRUE; pIcsUpgrdSettings->fEnableICS = TRUE; pIcsUpgrdSettings->fShowTrayIcon = TRUE; pIcsUpgrdSettings->fWin2KUpgrade = TRUE; return S_OK; } /*++ Routine Description: Free resources inside the ICS_UPGRADE_SETTINGS Arguments: [in] pIcsUpgrdSettings - pointer to the ICS_UPGRADE_SETTINGS Return Value: none Note. --*/ void FreeIcsUpgradeSettings(ICS_UPGRADE_SETTINGS* pIcsUpgrdSettings) { Assert(pIcsUpgrdSettings != NULL); list& rlistPersonalFirewall = pIcsUpgrdSettings->listPersonalFirewall; list& rlistBridge = pIcsUpgrdSettings->listBridge; list& rlistSvrPortmappings = pIcsUpgrdSettings->listSvrPortmappings; list& rlistAppPortmappings = pIcsUpgrdSettings->listAppPortmappings; rlistPersonalFirewall.erase(rlistPersonalFirewall.begin(), rlistPersonalFirewall.end()); rlistBridge.erase(rlistBridge.begin(), rlistBridge.end()); rlistSvrPortmappings.erase(rlistSvrPortmappings.begin(), rlistSvrPortmappings.end()); rlistAppPortmappings.erase(rlistAppPortmappings.begin(), rlistAppPortmappings.end()); } /*++ Routine Description: convert a list of adapter strings into a list of its corresponding GUID Arguments: [in] rslAdapters - reference to the list of adapter strings [in out] rlistGuid - a list of the converted GUIDs Return Value: S_OK - if either all of the adapter strings converted to its corresponding GUIDs or the input is an empty list of adapter strings. S_FALSE - if it can convert at least one of the adaper strings. E_FAIL - if none of the adapter strings could be converted to its corresponding GUIDs --*/ HRESULT ConvertAdapterStringListToGuidList(IN TStringList& rslAdapters, IN OUT list& rlistGuid) { HRESULT hr = S_OK; GUID guidTemp = {0}; tstring* pstrTemp = NULL; TStringList::iterator iter; if (rslAdapters.empty()) return hr; // init the [in out] parameter first rlistGuid.erase(rlistGuid.begin(), rlistGuid.end()); for (iter = rslAdapters.begin(); iter != rslAdapters.end(); ++iter) { pstrTemp = *iter; Assert(pstrTemp); if (!FGetInstanceGuidOfComponentFromAnswerFileMap(pstrTemp->c_str(), &guidTemp)) { TraceTag(ttidError, "FGetInstanceGuidOfComponentFromAnswerFileMap failed to match GUID for adapter %S", pstrTemp->c_str()); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_E_ADAPTER_TO_GUID), pstrTemp->c_str()); } else { rlistGuid.push_back(guidTemp); } } if (rlistGuid.empty()) { hr = E_FAIL; } if (rlistGuid.size() < rslAdapters.size()) { hr = S_FALSE; } return hr; } /*++ Routine Description: remove duplicates in a TStringList Arguments: [in, out] sl - the string list contains duplicates to be removed Return Value: none --*/ void RemoveDupsInTStringList(IN OUT TStringList& sl) { for (list::iterator i = sl.begin(); i != sl.end(); ++i) { list::iterator tmpI = i; for (list::iterator j = ++tmpI; j != sl.end(); ++j) { list::iterator tmpJ = j; list::iterator k = --tmpJ; if (!_wcsicmp((*i)->c_str(), (*j)->c_str())) { TraceTag(ttidNetSetup, "RemoveDupsInTStringList: found duplicated string %S", (*i)->c_str()); delete *j; // free the resource sl.erase(j); // erase the list item j = k; // adjust the iterator to the previous one } } } } /*++ Routine Description: remove items in slDest if the item is also in slSrc Arguments: [in] slSrc - the source string list contains items to be matched [in, out] slDest - the string list where equal items are removed Return Value: none Note : Both slSrc and slDest MUST not contain duplicated items. --*/ void RemoveEqualItems(IN const TStringList& slSrc, IN OUT TStringList& slDest) { list::iterator _F = slSrc.begin(), _L = slSrc.end(), pos; if (slDest.empty()) return; while (_F != _L) { if (FIsInStringList(slDest, (*_F)->c_str(), &pos)) { TraceTag(ttidNetSetup, "RemoveEqualItems: '%S' appeared in both slSrc and slDest lists, remove it from slDest.", (*_F)->c_str()); // found a matched item. delete *pos; slDest.erase(pos); if (slDest.empty()) return; } ++_F; } } /*++ Routine Description: remove item in slDest if the item is the same as pstrSrc Arguments: [in] strSrc - the source string to be matched [in, out] slDest - the string list where equal item is removed Return Value: none Note : Both slDest MUST not contain duplicated items. --*/ void RemoveEqualItems(IN const tstring& strSrc, IN OUT TStringList& slDest) { list::iterator pos; if (FIsInStringList(slDest, strSrc.c_str(), &pos)) { TraceTag(ttidNetSetup, "RemoveEqualItems: remove '%S' from slDest.", strSrc.c_str()); // found a matched item. delete *pos; slDest.erase(pos); if (slDest.empty()) return; } } /*++ Routine Description: Load Homenet settings from the answer file and put the settings into the ICS_UPGRADE_SETTINGS structure Arguments: [in] pwifAnswerFile the access point of the answer file [in/out] pSettings it contains the settings when the routine returns S_OK Returns: S_OK if there are Homenet settings in the answer file S_FALSE: no Homenet settings present in the answer file otherwise the failure code Notes: Bug# 253047, the Answer-File for a Win9x ICS upgrade will look like the following (if Clean install WinMe, selecting custom installation, and select ICS as an optional component.): [Homenet] IsW9xUpgrade='1' EnableICS="1" ShowTrayIcon="1" Bug# 304474, in this case, Answer-File for a Win9x ICS upgrade will look like (There is no value for ExternalAdapter or ExternalConnectionName key.): [Homenet] IsW9xUpgrade='1' InternalAdapter="Adapter2" DialOnDemand="0" EnableICS="1" ShowTrayIcon="1" More notes regarding validation of Answer File: 1. if adapter found in both the PersonalFirewall list and Bridge list, remove that adaper from the PersonalFirewall list. 2. if ICS public LAN found in Bridge list, it will be removed from the Bridge list. 3. if ICS private found in Firewall list, remove that adapter from the PersonalFirewall list. --*/ HRESULT LoadIcsSettingsFromAnswerFile( CWInfFile* pwifAnswerFile, PICS_UPGRADE_SETTINGS pSettings ) { HRESULT hr = S_OK; BOOL fRet; PCWInfSection pwifSection = NULL; //BOOL fInternalAdapterFound = FALSE; DefineFunctionName("LoadIcsSettingsFromAnswerFile"); TraceFunctionEntry(ttidNetSetup); Assert(pwifAnswerFile); Assert(pSettings); pwifSection = pwifAnswerFile->FindSection(c_wszHomenetSection); if (NULL == pwifSection) return S_FALSE; tstring strTemp; TStringList slICF, slBridge; // hold comma-delimited string into a list GUID guidTemp = {0}; BOOL fTemp = FALSE; do { // ICS Upgrade from Win9x or Unattended Homenet clean install // determine if this answer file is for Win9x upgrade or // Homenet unattended clean install pSettings->fWin9xUpgrade = pwifSection->GetBoolValue(c_wszIsW9xUpgrade, FALSE); pSettings->fXpUnattended = !pSettings->fWin9xUpgrade; // default value for EnableICS is FALSE pSettings->fEnableICS = pwifSection->GetBoolValue(c_wszICSEnabled, FALSE); // default value for InternalIsBridge is FALSE pSettings->fInternalIsBridge = pwifSection->GetBoolValue(c_wszInternalIsBridge, FALSE); TraceTag(ttidNetSetup, "IsW9xUpgrade: %S, EnableICS: %S, InternalIsBridge: %S", pSettings->fWin9xUpgrade ? L"Yes" : L"No", pSettings->fEnableICS ? L"Yes" : L"No", pSettings->fInternalIsBridge ? L"Yes" : L"No"); // // get a list of interface GUID for the Internet Connection Firewall // (ICF) and a list of interface GUID that forms the bridge. We'll also // do validation before converting adapter names to interface GUID // fRet = pwifSection->GetStringListValue(c_wszPersonalFirewall, slICF); if (fRet) { // remove duplicates within slICF RemoveDupsInTStringList(slICF); } fRet = pwifSection->GetStringListValue(c_wszBridge, slBridge); if (fRet) { // remove duplicates within slBridge RemoveDupsInTStringList(slBridge); } if (!slICF.empty() && !slBridge.empty()) { // remove items in slICF if the item is also in slBridge RemoveEqualItems(slBridge, slICF); } // if ICS is enabled, get the share connection. // If the share connection is a LAN connection, make sure it is // not a member of the bridge. if (pSettings->fEnableICS) { fRet = pwifSection->GetStringValue(c_wszExternalAdapter, strTemp); if (fRet) { if (!FGetInstanceGuidOfComponentFromAnswerFileMap(strTemp.c_str(), &guidTemp)) { TraceTag(ttidError, "FGetInstanceGuidOfComponentFromAnswerFileMap failed to match GUID for adapter %S", strTemp.c_str()); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_E_ADAPTER_TO_GUID), strTemp.c_str()); hr = E_FAIL; break; } pSettings->rscExternal.fIsLanConnection = TRUE; pSettings->rscExternal.guid = guidTemp; // Another validation: // ICS public LAN adapter couldn't be a member of a bridge if (! slBridge.empty()) { RemoveEqualItems(strTemp, slBridge); } } else { // Can't find "ExternalAdapter" key in answer-file. // We'll try the "ExternalConnectionName" key. TraceTag(ttidNetSetup, "pwifSection->GetStringValue failed to get %S, we will try to get %S", c_wszExternalAdapter, c_wszExternalConnectionName); fRet = pwifSection->GetStringValue(c_wszExternalConnectionName, strTemp); if (! fRet) { if (pSettings->fWin9xUpgrade) { TraceTag(ttidNetSetup, "pwifSection->GetStringValue failed to get %S too.", c_wszExternalConnectionName); TraceTag(ttidNetSetup, "We will try to look for a WAN connectoid as the ExternalConnectionName."); // Bug# 304474 // Cook up a fake WAN connectoid name, the code in // GetINetConnectionByName will later try to resolve it // to a WAN connectoid if there is *only 1* WAN // connectoid left on the system. WAN connectoid has // media types of either NCM_PHONE, NCM_ISDN or // NCM_TUNNEL. lstrcpynW(pSettings->rscExternal.name.szEntryName, L"X1-2Bogus-3WAN-4Conn-5Name", celems(pSettings->rscExternal.name.szEntryName)); } else { TraceTag(ttidError, "pwifSection->GetStringValue failed to get %S too.", c_wszExternalConnectionName); hr = E_FAIL; break; } } else { lstrcpynW(pSettings->rscExternal.name.szEntryName, strTemp.c_str(), celems(pSettings->rscExternal.name.szEntryName)); } pSettings->rscExternal.fIsLanConnection = FALSE; } } // convert bridge adapter names to interface GUID if (!slBridge.empty()) { hr = ConvertAdapterStringListToGuidList(slBridge, pSettings->listBridge); if (FAILED(hr)) { TraceTag( ttidError, "Error in converting Personal Firewall string list to GUID list"); break; } if (S_FALSE == hr) { hr = S_OK; // convert any S_FALSE to S_OK } } // we will convert the slICF list later because we need to check if // ICS private adapter is also in slICF, if yes, we need to remove it // from the slICF list. // // get the internal adapter GUID // fRet = pwifSection->GetStringValue(c_wszInternalAdapter, strTemp); if (fRet && !pSettings->fInternalIsBridge && !pSettings->fEnableICS) { // invalid parameters from answer file (AF) TraceTag(ttidError, "Invalid AF settings: InternalAdapter=%S, InternalIsBridge='0', EnableICS='0'.", strTemp.c_str()); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_HOMENET_INVALID_AF_SETTINGS)); hr = E_FAIL; break; } if (fRet && pSettings->fInternalIsBridge) { TraceTag(ttidError, "Invalid AF settings: InternalAdapter=%S, InternalIsBridge='1'.", strTemp.c_str()); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_HOMENET_INVALID_AF_SETTINGS)); hr = E_FAIL; break; } if (fRet) { // get the internal adapter GUID if InternalIsBridge is '0' Assert(!pSettings->fInternalIsBridge); if (!FGetInstanceGuidOfComponentFromAnswerFileMap(strTemp.c_str(), &guidTemp)) { TraceTag(ttidError, "FGetInstanceGuidOfComponentFromAnswerFileMap failed to match GUID for adapter %S", strTemp.c_str()); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_E_ADAPTER_TO_GUID), strTemp.c_str()); hr = E_FAIL; break; } else { pSettings->fInternalAdapterFound = TRUE; pSettings->guidInternal = guidTemp; // another validation: // remove ICS private from the firewall list (slICF) // if necessary. if (!slICF.empty()) { RemoveEqualItems(strTemp, slICF); } } } // check for other answer file errors if (pSettings->fWin9xUpgrade && !pSettings->fEnableICS) { TraceTag( ttidError, "Invalid AF settings: IsW9xUpgrade='1', EnableICS='0'"); hr = E_FAIL; break; } // special case for Win9x ICS upgrade. if ( pSettings->fWin9xUpgrade) { // Bug# 315265 if ( pSettings->fInternalIsBridge && 1 == (pSettings->listBridge).size() ) { // for Win9x ICS upgrade, one of the 2 internal adapters is // broken, we will continue to do the upgrade without creating // the internal bridge. // adjust answer file parameters pSettings->fWin9xUpgradeAtLeastOneInternalAdapterBroken = TRUE; pSettings->fInternalAdapterFound = TRUE; pSettings->guidInternal = *((pSettings->listBridge).begin()); // note: On Win9x ICS upgrade, there will be no firewall list, // so, we don't try to remove this ICS private from the // firewall list (slICF). pSettings->fInternalIsBridge = FALSE; pSettings->listBridge.erase(pSettings->listBridge.begin(), pSettings->listBridge.end()); TraceTag( ttidNetSetup, "On Win9x ICS upgrade, one internal adapter couldn't be upgraded."); } } if ( (pSettings->fInternalIsBridge && (pSettings->listBridge).size() < 2) || (1 == (pSettings->listBridge).size()) ) { TraceTag( ttidError, "Invalid setting: fInternalIsBridge: %S, size of listBridge: %d", pSettings->fInternalIsBridge ? L"TRUE" : L"FALSE", (pSettings->listBridge).size()); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_HOMENET_INVALID_AF_SETTINGS)); hr = E_FAIL; break; } if ( pSettings->fEnableICS && !pSettings->fInternalIsBridge && !pSettings->fInternalAdapterFound) { // Bug# 304474 falls under this case TraceTag( ttidError, "Invalid AF settings: no InternalAdapter, InternalIsBridge='0', EnableICS='1'."); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_HOMENET_INVALID_AF_SETTINGS)); hr = E_FAIL; break; } // convert firewall adapter names to interface GUID if (!slICF.empty()) { hr = ConvertAdapterStringListToGuidList(slICF, pSettings->listPersonalFirewall); if (FAILED(hr)) { TraceTag( ttidError, "Error in converting Personal Firewall string list to GUID list"); break; } if (S_FALSE == hr) { hr = S_OK; // convert any S_FALSE to S_OK } } // default value for DialOnDemand is FALSE pSettings->fDialOnDemand = pwifSection->GetBoolValue(c_wszDialOnDemand, FALSE); // default value for ShowTrayIcon is TRUE pSettings->fShowTrayIcon = pwifSection->GetBoolValue(c_wszShowTrayIcon, TRUE); } while(FALSE); // free resource if necessary EraseAndDeleteAll(&slICF); EraseAndDeleteAll(&slBridge); return hr; } /*++ Routine Description: Set some default values into ICS_UPGRADE_SETTINGS Arguments: [in] pIcsUpgrdSettings - pointer to the ICS_UPGRADE_SETTINGS Return Value: none Note. --*/ void SetIcsDefaultSettings(ICS_UPGRADE_SETTINGS * pSettings) { //initialize the settings here pSettings->fDialOnDemand = FALSE; pSettings->fEnableICS = FALSE; pSettings->fShowTrayIcon = TRUE; pSettings->fWin9xUpgrade = FALSE; pSettings->fWin9xUpgradeAtLeastOneInternalAdapterBroken = FALSE; pSettings->fWin2KUpgrade = FALSE; pSettings->fXpUnattended = FALSE; pSettings->fInternalIsBridge = FALSE; pSettings->fInternalAdapterFound = FALSE; } BOOL FOsIsUnsupported() /*++ Routine Description: Check current OS version. billi: I am modifying the version check to synchronize it with the home networking version check. We want to prevent upgrages on specific sku's and server suites higher than Advanced Server. Arguments: None Return Value: returns TRUE if current OS version is Adv. Server or higher Note. --*/ { OSVERSIONINFOEXW verInfo = {0}; ULONGLONG ConditionMask = 0; verInfo.dwOSVersionInfoSize = sizeof(verInfo); verInfo.wSuiteMask = VER_SUITE_DATACENTER | // VER_SUITE_BACKOFFICE | VER_SUITE_SMALLBUSINESS_RESTRICTED | VER_SUITE_SMALLBUSINESS | VER_SUITE_BLADE; VER_SET_CONDITION(ConditionMask, VER_SUITENAME, VER_OR); return VerifyVersionInfo(&verInfo, VER_SUITENAME, ConditionMask); } //--------- ICS Upgrade helpers end ----------------------------- //--------- HNet helpers begin ---------------------------------- // extract from %sdxroot%\net\rras\ras\ui\common\nouiutil\noui.c DWORD IpPszToHostAddr( IN LPCTSTR cp ) // Converts an IP address represented as a string to // host byte order. // { DWORD val, base, n; TCHAR c; DWORD parts[4], *pp = parts; again: // Collect number up to ``.''. // Values are specified as for C: // 0x=hex, 0=octal, other=decimal. // val = 0; base = 10; if (*cp == TEXT('0')) base = 8, cp++; if (*cp == TEXT('x') || *cp == TEXT('X')) base = 16, cp++; while (c = *cp) { if ((c >= TEXT('0')) && (c <= TEXT('9'))) { val = (val * base) + (c - TEXT('0')); cp++; continue; } if ((base == 16) && ( ((c >= TEXT('0')) && (c <= TEXT('9'))) || ((c >= TEXT('A')) && (c <= TEXT('F'))) || ((c >= TEXT('a')) && (c <= TEXT('f'))) )) { val = (val << 4) + (c + 10 - ( ((c >= TEXT('a')) && (c <= TEXT('f'))) ? TEXT('a') : TEXT('A') ) ); cp++; continue; } break; } if (*cp == TEXT('.')) { // Internet format: // a.b.c.d // a.b.c (with c treated as 16-bits) // a.b (with b treated as 24 bits) // if (pp >= parts + 3) return (DWORD) -1; *pp++ = val, cp++; goto again; } // Check for trailing characters. // if (*cp && (*cp != TEXT(' '))) return 0xffffffff; *pp++ = val; // Concoct the address according to // the number of parts specified. // n = (DWORD) (pp - parts); switch (n) { case 1: // a -- 32 bits val = parts[0]; break; case 2: // a.b -- 8.24 bits val = (parts[0] << 24) | (parts[1] & 0xffffff); break; case 3: // a.b.c -- 8.8.16 bits val = (parts[0] << 24) | ((parts[1] & 0xff) << 16) | (parts[2] & 0xffff); break; case 4: // a.b.c.d -- 8.8.8.8 bits val = (parts[0] << 24) | ((parts[1] & 0xff) << 16) | ((parts[2] & 0xff) << 8) | (parts[3] & 0xff); break; default: return 0xffffffff; } return val; } /*++ Routine Description: Sets the standard COM security settings on the proxy for an object. Arguments: pUnk - the object to set the proxy blanket on Return Value: Note. Even if the CoSetProxyBlanket calls fail, pUnk remains in a usable state. Failure is expected in certain contexts, such as when, for example, we're being called w/in the netman process -- in this case, we have direct pointers to the netman objects, instead of going through a proxy. --*/ VOID SetProxyBlanket(IUnknown *pUnk) { HRESULT hr; Assert(pUnk); hr = CoSetProxyBlanket( pUnk, RPC_C_AUTHN_WINNT, // use NT default security RPC_C_AUTHZ_NONE, // use NT default authentication NULL, // must be null if default RPC_C_AUTHN_LEVEL_CALL, // call RPC_C_IMP_LEVEL_IMPERSONATE, NULL, // use process token EOAC_NONE ); if (SUCCEEDED(hr)) { IUnknown * pUnkSet = NULL; hr = pUnk->QueryInterface(&pUnkSet); if (SUCCEEDED(hr)) { hr = CoSetProxyBlanket( pUnkSet, RPC_C_AUTHN_WINNT, // use NT default security RPC_C_AUTHZ_NONE, // use NT default authentication NULL, // must be null if default RPC_C_AUTHN_LEVEL_CALL, // call RPC_C_IMP_LEVEL_IMPERSONATE, NULL, // use process token EOAC_NONE ); pUnkSet->Release(); } } } ///////////////////////////////////////////////////////////////////////////// // CIcsUpgrade public methods ///////////////////////////////////////////////////////////////////////////// /*++ Routine Description: Init ourself with the pIcsUpgradeSettings, we also cache the IEnumNetConnection object in our m_spEnum. Arguments: [in] pIcsUpgradeSettings - the ICS UPGRADE SETTINGS Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::Init(ICS_UPGRADE_SETTINGS * pIcsUpgradeSettings) { HRESULT hr; if (!pIcsUpgradeSettings) { return E_INVALIDARG; } if (pIcsUpgradeSettings->fWin9xUpgrade) { // validate parameters for Win9x ICS upgrade if (!pIcsUpgradeSettings->fEnableICS) { return E_INVALIDARG; } if (pIcsUpgradeSettings->fInternalIsBridge) { // internal is a bridge if ( (pIcsUpgradeSettings->listBridge).size() < 2 ) { return E_INVALIDARG; } } else { if (!pIcsUpgradeSettings->fInternalAdapterFound) { return E_INVALIDARG; } } } else if (pIcsUpgradeSettings->fWin2KUpgrade) { // validate parameters for Win2K ICS upgrade if (pIcsUpgradeSettings->fInternalIsBridge || !pIcsUpgradeSettings->fEnableICS || !pIcsUpgradeSettings->fInternalAdapterFound) { return E_INVALIDARG; } } if (!m_fInited) { // Get the net connection manager INetConnectionManager *pConnMan; hr = CoCreateInstance(CLSID_ConnectionManager, NULL, CLSCTX_ALL, IID_INetConnectionManager, (LPVOID *)&pConnMan); if (S_OK == hr) { // Get the enumeration of connections SetProxyBlanket(pConnMan); hr = pConnMan->EnumConnections(NCME_DEFAULT, &m_spEnum); pConnMan->Release(); } else { return E_FAIL; } if (S_OK == hr) { SetProxyBlanket(m_spEnum); m_fInited = TRUE; } else { return E_FAIL; } } m_pIcsUpgradeSettings = pIcsUpgradeSettings; return S_OK; } /*++ Routine Description: Enable ICS on external adapter and internal adapters. Enable personal firewall on the external adapter. Migrating the server and application port mappings. Arguments: None Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::StartUpgrade() { HRESULT hr; DefineFunctionName("CIcsUpgrade::StartUpGrade"); TraceFunctionEntry(ttidNetSetup); if (m_fInited) { if (m_pIcsUpgradeSettings->fWin2KUpgrade) { // we need to delete Win2K registry named value hr = BackupAndDelIcsRegistryValuesOnWin2k(); if (FAILED(hr)) { TraceTag(ttidError, "%s: Ignore BackupAndDelIcsRegistryValuesOnWin2k failed: 0x%lx", __FUNCNAME__, hr); } hr = SetupApplicationProtocol(); if (FAILED(hr)) { TraceTag(ttidError, "%s: SetupApplicationProtocol failed: 0x%lx", __FUNCNAME__, hr); return hr; } hr = SetupServerPortMapping(); if (FAILED(hr)) { TraceTag(ttidError, "%s: SetupServerPortMapping failed: 0x%lx", __FUNCNAME__, hr); return hr; } } hr = SetupHomenetConnections(); if (FAILED(hr)) { TraceTag(ttidError, "%s: SetupHomenetConnections failed: 0x%lx", __FUNCNAME__, hr); return hr; } hr = SetupIcsMiscItems(); if (FAILED(hr)) { TraceTag(ttidError, "%s: Ignore SetupIcsMiscItems failed: 0x%lx", __FUNCNAME__, hr); } } return S_OK; } ///////////////////////////////////////////////////////////////////////////// // CIcsUpgrade private methods ///////////////////////////////////////////////////////////////////////////// /*++ Routine Description: Free all cached resources, CComPtr smart pointer will be released when this object is out of scope or being deleted. Arguments: None Return Value: None --*/ void CIcsUpgrade::FinalRelease() { if (m_pExternalNetConn) { m_pExternalNetConn->Release(); m_pExternalNetConn = NULL; } if (m_hIcsUpgradeEvent) { CloseHandle(m_hIcsUpgradeEvent); m_hIcsUpgradeEvent = NULL; } } /*++ Routine Description: Setup Homenet connections based on parameters from m_pIcsUpgradeSettings. Arguments: None Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::SetupHomenetConnections() { DefineFunctionName("CIcsUpgrade::SetupHomenetConnections"); TraceFunctionEntry(ttidNetSetup); HRESULT hr = S_OK; INetConnection** prgINetConn = NULL; // array of INetConnection* DWORD cINetConn = 0; // number of INetConnection* in the array INetConnection* pExternalNetConn = NULL; INetConnection* pInternalNetConn = NULL; // Create a named event to notify other components that we're // in GUI Mode ICS Upgrade. Reason: sharedaccess service // fails to start during the GUI Mode Setup. hr = CreateIcsUpgradeNamedEvent(); if (FAILED(hr)) { TraceTag(ttidError, "%s: CreateIcsUpgradeNamedEvent failed: 0x%lx", __FUNCNAME__, hr); return hr; } // create a bridge if we have more than 1 adapter guid if ( (m_pIcsUpgradeSettings->listBridge).size() > 1 ) { do { hr = GetINetConnectionArray(m_pIcsUpgradeSettings->listBridge, &prgINetConn, &cINetConn); TraceTag(ttidNetSetup, "after GetINetConnectionArray for bridge."); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetINetConnectionArray failed: 0x%lx line: %d", __FUNCNAME__, hr, __LINE__); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_CREATE_BRIDGE)); break; } TraceTag(ttidNetSetup, "calling HNetCreateBridge."); hr = HNetCreateBridge(prgINetConn, NULL); if (FAILED(hr)) { TraceTag(ttidError, "%s: HNetCreateBridge failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_CREATE_BRIDGE)); break; } } while (FALSE); // free resource if necessary for (DWORD i = 0; i < cINetConn ; ++i) { if (prgINetConn[i]) prgINetConn[i]->Release(); } if (prgINetConn) { delete [] (BYTE*)prgINetConn; } prgINetConn = NULL; cINetConn = 0; } // create ICS if (m_pIcsUpgradeSettings->fEnableICS) { do { if (m_pExternalNetConn == NULL) { // no cached copy hr = GetExternalINetConnection(&pExternalNetConn); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetExternalINetConnection failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_CREATE_ICS)); break; } } else { pExternalNetConn = m_pExternalNetConn; // use the cached copy } if (m_pIcsUpgradeSettings->fInternalIsBridge) { hr = GetBridgeINetConn(&pInternalNetConn); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetBridgeINetConn failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_CREATE_ICS)); break; } } else { hr = GetINetConnectionByGuid( &m_pIcsUpgradeSettings->guidInternal, &pInternalNetConn); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetINetConnectionByGuid failed: 0x%lx line: %d", __FUNCNAME__, hr, __LINE__); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_CREATE_ICS)); break; } } TraceTag(ttidNetSetup, "calling HrCreateICS."); hr = HrCreateICS(pExternalNetConn, pInternalNetConn); if (FAILED(hr)) { TraceTag(ttidError, "%s: HNetCreateBridge failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_CREATE_ICS)); break; } m_fICSCreated = TRUE; } while (FALSE); // cleanup if necessary if (pInternalNetConn) { pInternalNetConn->Release(); } if (FAILED(hr)) { if (pExternalNetConn && !m_pExternalNetConn) { pExternalNetConn->Release(); } } else { // cache External INetConnections if necessary if (!m_pExternalNetConn) { m_pExternalNetConn = pExternalNetConn; } } } // enable firewall on each connection specified from answer file // note: ICS private couldn't be firewalled, bridge couldn't be firewalled. if ( (m_pIcsUpgradeSettings->listPersonalFirewall).size() > 0 ) { do { hr = GetINetConnectionArray( m_pIcsUpgradeSettings->listPersonalFirewall, &prgINetConn, &cINetConn); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetINetConnectionArray failed: 0x%lx line: %d", __FUNCNAME__, hr, __LINE__); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_FIREWALL)); break; } TraceTag(ttidNetSetup, "calling HrEnablePersonalFirewall."); hr = HrEnablePersonalFirewall(prgINetConn); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrEnablePersonalFirewall failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_FIREWALL)); break; } } while(FALSE); // free resource if necessary for (DWORD i = 0; i < cINetConn ; ++i) { if (prgINetConn[i]) prgINetConn[i]->Release(); } if (prgINetConn) { delete [] (BYTE*)prgINetConn; } prgINetConn = NULL; cINetConn = 0; } return hr; } /*++ Routine Description: Get an array of INetConnection interface pointers corresponds to a list of GUID in rlistGuid. Arguments: [in] rlistGuid - a list of interface Guid. [in, out] pprgInternalNetConn - an array of INetConnection* [in, out] pcInternalNetConn - number of INetConnection* in the array Return Value: standard HRESULT Note : -User needs to release the returned INetConnection interface pointers in the array. -User needs to free the memory allocated for the array by using "delete [] (BYTE*)prgInternalNetConn". -The array is NULL terminated (similar to "char** argv" argument in main()) --*/ HRESULT CIcsUpgrade::GetINetConnectionArray( IN list& rlistGuid, IN OUT INetConnection*** pprgINetConn, IN OUT DWORD* pcINetConn) { DefineFunctionName("CIcsUpgrade::GetINetConnectionArray"); TraceFunctionEntry(ttidNetSetup); HRESULT hr; Assert(pprgINetConn); Assert(pcINetConn); *pprgINetConn = NULL; *pcINetConn = 0; DWORD cConnections = rlistGuid.size(); if (cConnections < 1) { return E_FAIL; } // Note that we allocated an extra entry since this is a null-terminated // array DWORD dwSize = (cConnections + 1) * sizeof(INetConnection*); INetConnection** prgINetConn = (INetConnection**) new BYTE[dwSize]; if (prgINetConn) { ZeroMemory((PVOID) prgINetConn, dwSize); DWORD i = 0; for (list::iterator iter = rlistGuid.begin(); iter != rlistGuid.end(); ++iter, ++i) { hr = GetINetConnectionByGuid( &(*iter), &prgINetConn[i]); if (FAILED(hr)) { for (DWORD j = 0; j < i; ++j) { if (prgINetConn[j]) { prgINetConn[j]->Release(); } } delete [] (BYTE*)prgINetConn; return hr; } } } else { hr = E_OUTOFMEMORY; } if (SUCCEEDED(hr)) { *pcINetConn = cConnections; *pprgINetConn = prgINetConn; } return hr; } /*++ Routine Description: Retrieves the INetConnection that corresponds to the LPRASSHARECONN in m_pIcsUpgradeSettings->pExternal. Arguments: [out] ppNetConn - receives the interface Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::GetExternalINetConnection(INetConnection** ppNetConn) { LPRASSHARECONN pRasShareConn = &(m_pIcsUpgradeSettings->rscExternal); if (pRasShareConn->fIsLanConnection) { return GetINetConnectionByGuid(&(pRasShareConn->guid), ppNetConn); } else { return GetINetConnectionByName((pRasShareConn->name).szEntryName, ppNetConn); } } /*++ Routine Description: Retrieves the INetConnection that corresponds to the given GUID. We will enumerate the INetConnection using our cached m_spEnum. Arguments: [in] pGuid - the guid of the connection [out] ppNetCon - receives the interface Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::GetINetConnectionByGuid( GUID* pGuid, INetConnection** ppNetCon) { HRESULT hr; INetConnection* pConn; Assert(NULL != pGuid); Assert(NULL != ppNetCon); *ppNetCon = NULL; // Search for the connection with the correct guid ULONG ulCount; BOOLEAN fFound = FALSE; #if DBG WCHAR szGuid[c_cchGuidWithTerm]; if (SUCCEEDED(StringFromGUID2(*pGuid, szGuid, c_cchGuidWithTerm))) { TraceTag(ttidNetSetup, "GetINetConnectionByGuid: pGuid is: %S", szGuid); } #endif // reset our cache m_spEnum m_spEnum->Reset(); do { NETCON_PROPERTIES* pProps; hr = m_spEnum->Next(1, &pConn, &ulCount); if (SUCCEEDED(hr) && 1 == ulCount) { SetProxyBlanket(pConn); hr = pConn->GetProperties(&pProps); if (S_OK == hr) { if (IsEqualGUID(pProps->guidId, *pGuid)) { fFound = TRUE; *ppNetCon = pConn; (*ppNetCon)->AddRef(); } NcFreeNetconProperties(pProps); } pConn->Release(); } } while (FALSE == fFound && SUCCEEDED(hr) && 1 == ulCount); // Normalize hr hr = (fFound ? S_OK : E_FAIL); return hr; } /*++ Routine Description: Retrieves the INetConnection that corresponds to the given Name of the Connection Icon in Network Connection Folder. We will enumerate the INetConnection using our cached m_spEnum. Arguments: [in] pwszConnName - the connection name to search [out] ppNetCon - receives the interface Return Value: standard HRESULT Note: Bug# 304474: If we couldn't find the INetConnection corresponding to the given name from the pwszConnName parameter and there is exactly one WAN MediaType connection left, we'll return the INetconnection for that WAN connection. WAN media types are either NCM_PHONE, NCM_ISDN or NCM_TUNNEL. --*/ HRESULT CIcsUpgrade::GetINetConnectionByName( WCHAR* pwszConnName, INetConnection** ppNetCon) { HRESULT hr; INetConnection* pConn; Assert(NULL != pwszConnName); Assert(NULL != ppNetCon); *ppNetCon = NULL; TraceTag(ttidNetSetup, "GetINetConnectionByName: pwszConnName: %S", pwszConnName); // Search for the connection with the correct connection name ULONG ulCount; BOOLEAN fFound = FALSE; INetConnection* pWANConn = NULL; ULONG ulcWANConn = 0; // reset our cache m_spEnum m_spEnum->Reset(); do { NETCON_PROPERTIES* pProps; hr = m_spEnum->Next(1, &pConn, &ulCount); if (SUCCEEDED(hr) && 1 == ulCount) { SetProxyBlanket(pConn); hr = pConn->GetProperties(&pProps); if (S_OK == hr) { TraceTag(ttidNetSetup, "GetINetConnectionByName: Connection Name: %S", pProps->pszwName); if ( (NCM_PHONE == pProps->MediaType) || (NCM_ISDN == pProps->MediaType) || (NCM_TUNNEL == pProps->MediaType) ) { TraceTag( ttidNetSetup, "GetINetConnectionByName: Connection Name: %S is WAN, MediaType is %d", pProps->pszwName, pProps->MediaType); ulcWANConn++; if (1 == ulcWANConn) { // save the 1st WAN connection found TraceTag(ttidNetSetup, "GetINetConnectionByName: Connection Name: %S is 1st WAN found", pProps->pszwName); pWANConn = pConn; pWANConn->AddRef(); } } if (wcscmp(pProps->pszwName, pwszConnName) == 0) { fFound = TRUE; *ppNetCon = pConn; (*ppNetCon)->AddRef(); } NcFreeNetconProperties(pProps); } pConn->Release(); } } while (FALSE == fFound && SUCCEEDED(hr) && 1 == ulCount); if (fFound) { if (pWANConn) { // No matter how many WAN connections we have, // release the saved WAN connection. pWANConn->Release(); } } else { TraceTag(ttidNetSetup, "GetINetConnectionByName: Can't find pwszConnName: %S", pwszConnName); // no connection has the name specified by the pwszConnName [in] parameter if (1 == ulcWANConn && pWANConn) { // There is exactly ONE WAN connection left on the sysetm. // Transfer this as the INetConnection output. TraceTag(ttidNetSetup, "GetINetConnectionByName: will use the only one WAN connectoid left"); *ppNetCon = pWANConn; fFound = TRUE; } else if (ulcWANConn > 1 && pWANConn) { // not found and there are more than 1 WAN connections TraceTag(ttidNetSetup, "GetINetConnectionByName: more than one WAN connectoid found"); pWANConn->Release(); } } // Normalize hr hr = (fFound ? S_OK : E_FAIL); return hr; } /*++ Routine Description: Setup the global Application Protocol Arguments: None Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::SetupApplicationProtocol() { DefineFunctionName("CIcsUpgrade::SetupApplicationProtocol"); TraceFunctionEntry(ttidNetSetup); HRESULT hr; list& rListAppProt = m_pIcsUpgradeSettings->listAppPortmappings; if ( rListAppProt.size() == 0) { // no Application Protocol to set return S_OK; } // 1. Get the INetProtocolSettings interface to control system-wide // ICS and firewall settings (i.e port mappings and applications). // Create Homenet Configuration Manager COM Instance CComPtr spIHNetCfgMgr; hr = CoCreateInstance(CLSID_HNetCfgMgr, NULL, CLSCTX_ALL, IID_IHNetCfgMgr, (LPVOID *)&spIHNetCfgMgr); if (FAILED(hr)) { TraceTag(ttidError, "%s: CoCreateInstance CLSID_HNetCfgMgr failed: 0x%lx", __FUNCNAME__, hr); return hr; } // Get the IHNetProtocolSettings CComPtr spHNetProtocolSettings; hr = spIHNetCfgMgr->QueryInterface(IID_IHNetProtocolSettings, (LPVOID *)&spHNetProtocolSettings); if (FAILED(hr)) { TraceTag(ttidError, "%s: QueryInterface IID_IHNetProtocolSettings failed: 0x%lx", __FUNCNAME__, hr); return hr; } // 2. For each enabled CSharedAccessApplication // if (there is no existing matching ApplicationProtocol // invoke INetProtocolSettings::CreateApplicationProtocol // else // update the existing ApplicaitonProtocol for (list::iterator iter = rListAppProt.begin(); iter != rListAppProt.end(); ++iter) { HNET_RESPONSE_RANGE* pHNetResponseArray = NULL; USHORT uscResponseRange = 0; // number of HNET_RESPONSE_RANGE returned if ((*iter).m_bSelected) { // migrate the enabled one only UCHAR ucProtocol; if (lstrcmpiW( ((*iter).m_szProtocol).c_str(), c_wszTCP) == 0) { ucProtocol = NAT_PROTOCOL_TCP; } else if (lstrcmpiW( ((*iter).m_szProtocol).c_str(), c_wszUDP) == 0) { ucProtocol = NAT_PROTOCOL_UDP; } else { // ignore others continue; } USHORT usPort = HTONS((*iter).m_wPort); WCHAR* pwszTitle = (WCHAR*)((*iter).m_szTitle).c_str(); hr = PutResponseStringIntoArray(*iter, &uscResponseRange, &pHNetResponseArray); if (FAILED(hr)) { TraceTag(ttidError, "%s: Ignore error in PutResponseStringIntoArray : 0x%lx", __FUNCNAME__, hr); } if (S_OK == hr) { Assert(pHNetResponseArray != NULL); CComPtr spHNetAppProt; hr = FindMatchingApplicationProtocol( spHNetProtocolSettings, ucProtocol, usPort, &spHNetAppProt); if (S_OK == hr) { TraceTag(ttidNetSetup, "%s: Update existing ApplicationProtocol for %S", __FUNCNAME__, pwszTitle); // there is existing ApplicatonProtocol hr = spHNetAppProt->SetName(pwszTitle); if (S_OK != hr) { TraceTag(ttidError, "%s: spHNetAppProt->SetName failed: 0x%lx", __FUNCNAME__, hr); } hr = spHNetAppProt->SetResponseRanges(uscResponseRange, pHNetResponseArray); if (S_OK != hr) { TraceTag(ttidError, "%s: spHNetAppProt->SetResponseRanges failed: 0x%lx", __FUNCNAME__, hr); } hr = spHNetAppProt->SetEnabled(TRUE); if (S_OK != hr) { TraceTag(ttidError, "%s: spHNetAppProt->SetEnabled failed: 0x%lx", __FUNCNAME__, hr); } } else { // no existing ApplicationProtocol, create a new one hr = spHNetProtocolSettings->CreateApplicationProtocol( pwszTitle, ucProtocol, usPort, uscResponseRange, pHNetResponseArray, &spHNetAppProt); if (S_OK != hr) { TraceTag(ttidError, "%s: CreateApplicationProtocol failed: 0x%lx", __FUNCNAME__, hr); } else { hr = spHNetAppProt->SetEnabled(TRUE); if (S_OK != hr) { TraceTag(ttidError, "%s: spHNetAppProt->SetEnabled failed: 0x%lx", __FUNCNAME__, hr); } } } delete [] (BYTE*) pHNetResponseArray; pHNetResponseArray = NULL; uscResponseRange = 0; } } } //end for return S_OK; } /*++ Routine Description: Setup the Server Port Mapping Protocol on the external connection. Arguments: None Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::SetupServerPortMapping() { HRESULT hr; list& rListSvrPortMappings = m_pIcsUpgradeSettings->listSvrPortmappings; DefineFunctionName("CIcsUpgrade::SetupServerPortMapping"); TraceFunctionEntry(ttidNetSetup); if ( rListSvrPortMappings.size() == 0 ) { // no Server Port Mappings to set return S_OK; } // 1. Get the INetProtocolSettings interface to control system-wide // ICS and firewall settings (i.e port mappings and applications). // Create Homenet Configuration Manager COM Instance CComPtr spIHNetCfgMgr; hr = CoCreateInstance(CLSID_HNetCfgMgr, NULL, CLSCTX_ALL, IID_IHNetCfgMgr, (LPVOID *)&spIHNetCfgMgr); if (FAILED(hr)) { TraceTag(ttidError, "%s: CoCreateInstance CLSID_HNetCfgMgr failed: 0x%lx", __FUNCNAME__, hr); return hr; } // Get the IHNetProtocolSettings CComPtr spHNetProtocolSettings; hr = spIHNetCfgMgr->QueryInterface(IID_IHNetProtocolSettings, (LPVOID *)&spHNetProtocolSettings); if (FAILED(hr)) { TraceTag(ttidError, "%s: QueryInterface IID_IHNetProtocolSettings failed: 0x%lx", __FUNCNAME__, hr); return hr; } // 2. For each enabled CSharedAccessServer x // if (there is no PortMapping Protocol corresponding to the // x.m_szProtocol and x.m_wInternalPort) // call INetProtocolSettings::CreatePortMappingProtocol // to get an IHNetPortMappingProtocol interface ptr; // else // get an existing IHNetPortMappingProtocol interface ptr // // Get IHNetPortMappingBinding interface ptr by calling // IHNetConnection::GetBindingForPortMappingProtocol by passing the // IHNetPortMappingProtocol iface ptr on the public IHNetConnection; // call IHNetPortMappingBinding::SetTargetComputerName; for (list::iterator iter = rListSvrPortMappings.begin(); iter != rListSvrPortMappings.end(); ++iter) { // migrate the enabled one only if ((*iter).m_bSelected) { UCHAR ucProtocol; if (lstrcmpiW( ((*iter).m_szProtocol).c_str(), c_wszTCP) == 0) { ucProtocol = NAT_PROTOCOL_TCP; } else if (lstrcmpiW( ((*iter).m_szProtocol).c_str(), c_wszUDP) == 0) { ucProtocol = NAT_PROTOCOL_UDP; } else { // ignore others continue; } USHORT usPort = HTONS((*iter).m_wInternalPort); WCHAR* pwszTitle = (WCHAR*) ((*iter).m_szTitle).c_str(); // get the IHNetPortMappingProtocol iface ptr CComPtr spHNetPortMappingProt; hr = FindMatchingPortMappingProtocol( spHNetProtocolSettings, ucProtocol, usPort, &spHNetPortMappingProt); if (S_OK == hr) { TraceTag(ttidNetSetup, "%s: Update existing PortMappingProtocol for %S", __FUNCNAME__, pwszTitle); // change the name of the title hr= spHNetPortMappingProt->SetName(pwszTitle); if (FAILED(hr)) { TraceTag(ttidError, "%s: spHNetPortMappingProt->SetName failed: 0x%lx", __FUNCNAME__, hr); hr = S_OK; // we still want to invoke // IHNetPortMappingBinding::SetEnabled() below. } } else { TraceTag(ttidNetSetup, "%s: CreatePortMappingProtocol for %S", __FUNCNAME__, pwszTitle); // no existing PortMappingProtocol, create a new one hr = spHNetProtocolSettings->CreatePortMappingProtocol( pwszTitle, // Title ucProtocol, // Protocol usPort, // InternalPort &spHNetPortMappingProt); // returned iface ptr if (FAILED(hr)) { TraceTag(ttidError, "%s: CreatePortMappingProtocol failed: 0x%lx", __FUNCNAME__, hr); } } if (S_OK == hr) { CComPtr spExternalHNetConn; if (m_pExternalNetConn == NULL) { hr = GetExternalINetConnection(&m_pExternalNetConn); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetExternalINetConnection failed: 0x%lx", __FUNCNAME__, hr); return hr; // fatal return } } // get the external/public IHNetConnection iface ptr hr = spIHNetCfgMgr->GetIHNetConnectionForINetConnection( m_pExternalNetConn, &spExternalHNetConn); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetIHNetConnectionForINetConnection failed: 0x%lx", __FUNCNAME__, hr); } if (S_OK == hr) { // Get IHNetPortMappingBinding interface ptr CComPtr spHNetPortMappingBinding; hr = spExternalHNetConn->GetBindingForPortMappingProtocol( spHNetPortMappingProt, &spHNetPortMappingBinding); if (FAILED(hr)) { TraceTag(ttidError, "%s: GetBindingForPortMappingProtocol failed: 0x%lx", __FUNCNAME__, hr); return hr; } if (S_OK == hr) { ULONG ulAddress = INADDR_NONE; WCHAR* pwszInternalName = (OLECHAR *)((*iter).m_szInternalName).c_str(); if ( ((*iter).m_szInternalName).length() > 7) { // 1.2.3.4 -- minimum of 7 characters ulAddress = IpPszToHostAddr(pwszInternalName); } if (INADDR_NONE == ulAddress) { hr = spHNetPortMappingBinding->SetTargetComputerName( pwszInternalName); if (FAILED(hr)) { TraceTag(ttidError, "%s: SetTargetComputerName failed: 0x%lx", __FUNCNAME__, hr); } } else { hr = spHNetPortMappingBinding->SetTargetComputerAddress( HTONL(ulAddress)); if (FAILED(hr)) { TraceTag(ttidError, "%s: SetTargetComputerAddress failed: 0x%lx", __FUNCNAME__, hr); } } if (S_OK == hr) { hr = spHNetPortMappingBinding->SetEnabled(TRUE); if (FAILED(hr)) { TraceTag(ttidError, "%s: SetEnabled failed: 0x%lx", __FUNCNAME__, hr); } } } } } } // end if ((*iter).m_bSelected) } //end for return S_OK; } /*++ Routine Description: retrive a matching IHNetPortMappingProtocol object which matches the given protocol (ucProtocol) and port number (usPort) Arguments: [in] pHNetProtocolSettings - IHNetProtocolSettings iface ptr [in] ucProtocol - NAT_PROTOCOL_TCP or NAT_PROTOCOL_UDP [in] usPort - port number used by this server PortMapping Protocol [out] ppHNetPortMappingProtocol - return the matching IHNetPortMappingProtocol Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::FindMatchingPortMappingProtocol( IHNetProtocolSettings* pHNetProtocolSettings, UCHAR ucProtocol, USHORT usPort, IHNetPortMappingProtocol** ppHNetPortMappingProtocol) { HRESULT hr; Assert(pHNetProtocolSettings != NULL); Assert(ppHNetPortMappingProtocol != NULL); DefineFunctionName("CIcsUpgrade::FindMatchingPortMappingProtocol"); TraceFunctionEntry(ttidNetSetup); *ppHNetPortMappingProtocol = NULL; CComPtr spServerEnum; hr = pHNetProtocolSettings->EnumPortMappingProtocols( &spServerEnum); if (FAILED(hr)) { return hr; } IHNetPortMappingProtocol* pServer; ULONG ulCount; do { UCHAR ucFoundProtocol; USHORT usFoundPort; hr = spServerEnum->Next( 1, &pServer, &ulCount ); if (SUCCEEDED(hr) && 1 == ulCount) { hr = pServer->GetIPProtocol(&ucFoundProtocol); if (FAILED(hr)) { pServer->Release(); return hr; } hr = pServer->GetPort(&usFoundPort); if (FAILED(hr)) { pServer->Release(); return hr; } if (ucFoundProtocol == ucProtocol && usFoundPort == usPort) { // found mathcing one, transfer value *ppHNetPortMappingProtocol = pServer; return S_OK; } pServer->Release(); } } while (SUCCEEDED(hr) && 1 == ulCount); return E_FAIL; // not found } /*++ Routine Description: retrive a matching IHNetApplicationProtocol object which matches the given protocol (ucProtocol) and port number (usPort) Arguments: [in] pHNetProtocolSettings - IHNetProtocolSettings iface ptr [in] ucProtocol - NAT_PROTOCOL_TCP or NAT_PROTOCOL_UDP [in] usPort - port number used by this server PortMapping Protocol [out] ppHNetApplicationProtocol - return the matching IHNetApplicationProtocol Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::FindMatchingApplicationProtocol( IHNetProtocolSettings* pHNetProtocolSettings, UCHAR ucProtocol, USHORT usPort, IHNetApplicationProtocol** ppHNetApplicationProtocol) { HRESULT hr; Assert(pHNetProtocolSettings != NULL); Assert(ppHNetApplicationProtocol != NULL); DefineFunctionName("CIcsUpgrade::FindMatchingApplicationProtocol"); TraceFunctionEntry(ttidNetSetup); *ppHNetApplicationProtocol = NULL; CComPtr spAppEnum; hr = pHNetProtocolSettings->EnumApplicationProtocols( FALSE, &spAppEnum); if (FAILED(hr)) { return hr; } IHNetApplicationProtocol* pApp; ULONG ulCount; do { UCHAR ucFoundProtocol; USHORT usFoundPort; hr = spAppEnum->Next( 1, &pApp, &ulCount ); if (SUCCEEDED(hr) && 1 == ulCount) { hr = pApp->GetOutgoingIPProtocol(&ucFoundProtocol); if (FAILED(hr)) { pApp->Release(); return hr; } hr = pApp->GetOutgoingPort(&usFoundPort); if (FAILED(hr)) { pApp->Release(); return hr; } if (ucFoundProtocol == ucProtocol && usFoundPort == usPort) { // found mathcing one, transfer value *ppHNetApplicationProtocol = pApp; return S_OK; } pApp->Release(); } } while (SUCCEEDED(hr) && 1 == ulCount); return E_FAIL; // not found } /*++ Routine Description: Setup ICS misc. settings from m_pIcsUpgradeSettings Arguments: Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::SetupIcsMiscItems() { HRESULT hr = S_OK; if (NULL == m_pIcsUpgradeSettings) { return E_UNEXPECTED; } DefineFunctionName("CIcsUpgrade::SetupIcsMiscItems"); TraceFunctionEntry(ttidNetSetup); if (!m_fICSCreated) { // no need to continue if ICS has not been created return hr; } // If Win9x/Win2K ICS upgrade, firewall the ICS public connection if (m_pIcsUpgradeSettings->fWin9xUpgrade || m_pIcsUpgradeSettings->fWin2KUpgrade) { INetConnection* rgINetConn[2] = {0, 0}; if (m_pExternalNetConn) { rgINetConn[0] = m_pExternalNetConn; hr = HrEnablePersonalFirewall(rgINetConn); if (FAILED(hr)) { TraceTag(ttidError, "%s: HrEnablePersonalFirewall failed: 0x%lx line: %d", __FUNCNAME__, hr, __LINE__); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_FIREWALL)); hr = S_OK; // continue with the rest. } } } // Bug# 315265, 315242 // post-processing to fix up IP Configuration on private connection // (1) if there is at least one internal adapter couldn't be upgraded from // Win9x ICS upgrade, we have to make sure the survival internal adapter // has static IP address 192.168.0.1, subnet mask 255.255.255.0 // (2) if we create a bridge for Win9x ICS upgrade, we need to set static // IP address 192.168.0.1, subnet mask 255.255.255.0 for TcpIp bound to // the bridge. // Note: (1) and (2) are exclusive. // // For WinXP Unattended clean install, // (3) if an internal ICS adapter is found, set static IP address // 192.168.0.1, subnet mask 255.255.255.0 for the TCPIP bound to the // internal adapter. // (4) if ICS is enabled and the bridge is the ICS private connection. // Set static IP address 192.168.0.1, subnet mask 255.255.255.0 for // TcpIp bound to the bridge. // Note: (3) and (4) are exclusive. if ( m_pIcsUpgradeSettings->fInternalAdapterFound && (m_pIcsUpgradeSettings->fWin9xUpgradeAtLeastOneInternalAdapterBroken || m_pIcsUpgradeSettings->fXpUnattended) ) { hr = SetPrivateIpConfiguration(m_pIcsUpgradeSettings->guidInternal); if (FAILED(hr)) { // logging, but we'll continue to do the rest of the ICS upgrade though. TraceTag(ttidError, "%s: SetPrivateIpConfiguration on private adapter failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS)); } } else if ( ((m_pIcsUpgradeSettings->listBridge).size() >= 2) && !m_pIcsUpgradeSettings->fInternalAdapterFound) { // A bridge was created as ICS private. // We need to setup its static IP Configuration since // these settings are not configured when it was created a while ago. GUID guidBridge; hr = GetBridgeGuid(guidBridge); if (SUCCEEDED(hr)) { hr = SetPrivateIpConfiguration(guidBridge); if (FAILED(hr)) { // logging, but we'll continue to do the rest of the ICS upgrade though. TraceTag(ttidError, "%s: SetPrivateIpConfiguration for bridge failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS)); } } else { // logging, but we'll continue to do the rest of the ICS upgrade though. TraceTag(ttidError, "%s: GetBridgeGuid failed: 0x%lx", __FUNCNAME__, hr); NetSetupLogStatusV( LogSevInformation, SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS)); } } LPRASSHARECONN pRasShareConn = &(m_pIcsUpgradeSettings->rscExternal); // set the fShowTrayIcon to the external INetConnection // note: this property has already migrated for Win2K upgrade if ( (m_pExternalNetConn) && (m_pIcsUpgradeSettings->fWin9xUpgrade || m_pIcsUpgradeSettings->fXpUnattended) ) { if (pRasShareConn->fIsLanConnection) { INetLanConnection* pLanConn = NULL; hr = HrQIAndSetProxyBlanket(m_pExternalNetConn, &pLanConn); if (SUCCEEDED(hr) && pLanConn) { LANCON_INFO linfo = {0}; linfo.fShowIcon = m_pIcsUpgradeSettings->fShowTrayIcon; // Set new value of show icon property hr = pLanConn->SetInfo(LCIF_ICON, &linfo); if (FAILED(hr)) { TraceTag(ttidError, "%s: pLanConn->SetInfo failed: 0x%lx", __FUNCNAME__, hr); } pLanConn->Release(); } else { TraceTag( ttidError, "%s: HrQIAndSetProxyBlanket for INetLanConnection failed: 0x%lx", __FUNCNAME__, hr); } } else { // this is a WAN connection RASCON_INFO rci; LPRASENTRY pRasEntry = NULL; DWORD dwRasEntrySize; hr = HrRciGetRasConnectionInfo(m_pExternalNetConn, &rci); if (SUCCEEDED(hr)) { hr = HrRasGetEntryProperties(rci.pszwPbkFile, rci.pszwEntryName, &pRasEntry, &dwRasEntrySize); if (SUCCEEDED(hr) && pRasEntry) { DWORD dwRet; if (m_pIcsUpgradeSettings->fShowTrayIcon) pRasEntry->dwfOptions |= RASEO_ModemLights; else pRasEntry->dwfOptions &= (~RASEO_ModemLights); dwRet = RasSetEntryProperties(rci.pszwPbkFile, rci.pszwEntryName, pRasEntry, dwRasEntrySize, 0, 0); if (0 != dwRet) { TraceTag( ttidError, "%s: RasSetEntryProperties failed: 0x%lx", __FUNCNAME__, GetLastError()); hr = HRESULT_FROM_WIN32(GetLastError()); } MemFree(pRasEntry); } else { TraceTag( ttidError, "%s: HrRasGetEntryProperties failed: 0x%lx", __FUNCNAME__, hr); } RciFree (&rci); } else { TraceTag( ttidError, "%s: HrRciGetRasConnectionInfo failed: 0x%lx", __FUNCNAME__, hr); } } } // Set the dial on demand setting. // We don't need to do it for 2 cases: // 1. Win2K ICS upgrade because the registry settings is already migrated. // 2. the ICS public is a LAN connection. if (pRasShareConn->fIsLanConnection || m_pIcsUpgradeSettings->fWin2KUpgrade) { // no need to set dial on-demand for external lan connection return hr; } // Get the IHNetIcsSettings interface to control system-wide // ICS settings // Create Homenet Configuration Manager COM Instance CComPtr spIHNetCfgMgr; hr = CoCreateInstance(CLSID_HNetCfgMgr, NULL, CLSCTX_ALL, IID_IHNetCfgMgr, (LPVOID *)&spIHNetCfgMgr); if (FAILED(hr)) { TraceTag(ttidError, "%s: CoCreateInstance CLSID_HNetCfgMgr failed: 0x%lx", __FUNCNAME__, hr); return hr; } // Get the IHNetIcsSettings CComPtr spHNetIcsSettings; hr = spIHNetCfgMgr->QueryInterface(IID_IHNetIcsSettings, (LPVOID *)&spHNetIcsSettings); if (FAILED(hr)) { TraceTag(ttidError, "%s: QueryInterface IID_IHNetIcsSettings failed: 0x%lx", __FUNCNAME__, hr); return hr; } hr = spHNetIcsSettings->SetAutodialSettings(!!(m_pIcsUpgradeSettings->fDialOnDemand)); if (FAILED(hr)) { TraceTag(ttidError, "%s: Ignore SetAutodialSettings failed: 0x%lx", __FUNCNAME__, hr); hr = S_OK; } return hr; } /*++ Routine Description: The interface given by rAdapterGuid will be configured to use ICS static IP 192.168.0.1, subnet mask 255.255.255.0 Arguments: [in] rInterfaceGuid -- the Guid of the TcpIp interface Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::SetPrivateIpConfiguration(IN GUID& rInterfaceGuid) { HRESULT hr = S_OK; HKEY hkeyTcpipInterface = NULL; DefineFunctionName("CIcsUpgrade::SetPrivateIpConfiguration"); TraceFunctionEntry(ttidNetSetup); hr = OpenTcpipInterfaceKey(rInterfaceGuid, &hkeyTcpipInterface); if (FAILED(hr)) { TraceTag(ttidError, "%s: OpenTcpipInterfaceKey failed: 0x%lx", __FUNCNAME__, hr); return hr; } Assert(hkeyTcpipInterface); // IPAddress hr = HrRegSetMultiSz(hkeyTcpipInterface, c_wszIPAddress, c_mszScopeAddress); if(FAILED(hr)) { TraceTag(ttidError, "%s: failed to set %S to the registry. hr = 0x%lx.", __FUNCNAME__, c_wszIPAddress, hr); goto Error; } // SubnetMask hr = HrRegSetMultiSz(hkeyTcpipInterface, c_wszSubnetMask, c_mszScopeMask); if(FAILED(hr)) { TraceTag(ttidError, "%s: failed to set %S to the registry. hr = 0x%lx.", __FUNCNAME__, c_wszIPAddress, hr); goto Error; } // EnableDHCP hr = HrRegSetDword(hkeyTcpipInterface, c_wszEnableDHCP, 0); if(FAILED(hr)) { TraceTag(ttidError, "%s: failed to set %S to the registry. hr = 0x%lx.", __FUNCNAME__, c_wszEnableDHCP, hr); goto Error; } Error: RegSafeCloseKey(hkeyTcpipInterface); return hr; } /*++ Routine Description: Get the interface guid of a bridge. Arguments: [out] rInterfaceGuid -- receive the Guid from the bridge interface Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::GetBridgeGuid(OUT GUID& rInterfaceGuid) { HRESULT hr = S_OK; BOOLEAN fFound = FALSE; INetConnection* pConn = NULL; ULONG ulCount = 0; DefineFunctionName("CIcsUpgrade::GetBridgeGuid"); TraceFunctionEntry(ttidNetSetup); // we don't use the cached m_spEnum because it may be in a stale // state (a bridge has just been created). CComPtr spEnum; // Get the net connection manager INetConnectionManager* pConnMan = NULL; hr = CoCreateInstance(CLSID_ConnectionManager, NULL, CLSCTX_ALL, IID_INetConnectionManager, (LPVOID *)&pConnMan); if (SUCCEEDED(hr)) { // Get the enumeration of connections SetProxyBlanket(pConnMan); hr = pConnMan->EnumConnections(NCME_DEFAULT, &spEnum); pConnMan->Release(); // don't need this anymore if (SUCCEEDED(hr)) { SetProxyBlanket(spEnum); } else { TraceTag(ttidError, "%s: EnumConnections failed: 0x%lx.", __FUNCNAME__, hr); return hr; } } else { TraceTag(ttidError, "%s: CoCreateInstance failed: 0x%lx.", __FUNCNAME__, hr); return hr; } hr = spEnum->Reset(); if (FAILED(hr)) { TraceTag(ttidError, "%s: Reset failed: 0x%lx.", __FUNCNAME__, hr); return hr; } do { NETCON_PROPERTIES* pProps; hr = spEnum->Next(1, &pConn, &ulCount); if (SUCCEEDED(hr) && 1 == ulCount) { SetProxyBlanket(pConn); hr = pConn->GetProperties(&pProps); if (SUCCEEDED(hr)) { if (NCM_BRIDGE == pProps->MediaType) { // transfer value rInterfaceGuid = pProps->guidId; fFound = TRUE; } NcFreeNetconProperties(pProps); } pConn->Release(); } } while (FALSE == fFound && SUCCEEDED(hr) && 1 == ulCount); // Normalize hr hr = (fFound ? S_OK : E_FAIL); return hr; } /*++ Routine Description: Get the INetConnection of a bridge. Arguments: [out] ppINetConn -- receive the INetConnection from the bridge interface Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::GetBridgeINetConn(OUT INetConnection** ppINetConn) { HRESULT hr = S_OK; BOOLEAN fFound = FALSE; INetConnection* pConn = NULL; ULONG ulCount = 0; DefineFunctionName("CIcsUpgrade::GetBridgeINetConn"); TraceFunctionEntry(ttidNetSetup); Assert(ppINetConn); *ppINetConn = NULL; // we don't use the cached m_spEnum because it may be in a stale // state (a bridge has just been created). CComPtr spEnum; // Get the net connection manager INetConnectionManager* pConnMan = NULL; hr = CoCreateInstance(CLSID_ConnectionManager, NULL, CLSCTX_ALL, IID_INetConnectionManager, (LPVOID *)&pConnMan); if (SUCCEEDED(hr)) { // Get the enumeration of connections SetProxyBlanket(pConnMan); hr = pConnMan->EnumConnections(NCME_DEFAULT, &spEnum); pConnMan->Release(); // don't need this anymore if (SUCCEEDED(hr)) { SetProxyBlanket(spEnum); } else { TraceTag(ttidError, "%s: EnumConnections failed: 0x%lx.", __FUNCNAME__, hr); return hr; } } else { TraceTag(ttidError, "%s: CoCreateInstance failed: 0x%lx.", __FUNCNAME__, hr); return hr; } hr = spEnum->Reset(); if (FAILED(hr)) { TraceTag(ttidError, "%s: Reset failed: 0x%lx.", __FUNCNAME__, hr); return hr; } do { NETCON_PROPERTIES* pProps; hr = spEnum->Next(1, &pConn, &ulCount); if (SUCCEEDED(hr) && 1 == ulCount) { SetProxyBlanket(pConn); hr = pConn->GetProperties(&pProps); if (SUCCEEDED(hr)) { if (NCM_BRIDGE == pProps->MediaType) { // transfer value *ppINetConn = pConn; fFound = TRUE; } NcFreeNetconProperties(pProps); } if (!fFound) { pConn->Release(); } } } while (FALSE == fFound && SUCCEEDED(hr) && 1 == ulCount); // Normalize hr hr = (fFound ? S_OK : E_FAIL); return hr; } /*++ Routine Description: Open the Ip Configuration registry Key of an interface Arguments: [in] rGuid -- the Guid of the TcpIp interface [out] phKey -- receives the opened key Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::OpenTcpipInterfaceKey( IN GUID& rGuid, OUT PHKEY phKey) { HRESULT hr; LPWSTR wszSubKeyName; ULONG ulSubKeyNameLength; LPWSTR wszGuid; Assert(phKey); hr = StringFromCLSID(rGuid, &wszGuid); if (SUCCEEDED(hr)) { ulSubKeyNameLength = wcslen(c_wszTcpipParametersKey) + 1 + wcslen(c_wszInterfaces) + 1 + wcslen(wszGuid) + 2; wszSubKeyName = new WCHAR[ulSubKeyNameLength]; if (NULL != wszSubKeyName) { swprintf( wszSubKeyName, L"%ls\\%ls\\%ls", c_wszTcpipParametersKey, c_wszInterfaces, wszGuid ); } else { hr = E_OUTOFMEMORY; } CoTaskMemFree(wszGuid); } if (SUCCEEDED(hr)) { hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, wszSubKeyName, KEY_ALL_ACCESS, phKey); delete [] wszSubKeyName; } return hr; } /*++ Routine Description: Create a named event to notify other components that we're in GUI Mode Setup of Win2K ICS Upgrade Arguments: Return Value: standard HRESULT --*/ HRESULT CIcsUpgrade::CreateIcsUpgradeNamedEvent() { DefineFunctionName("CIcsUpgrade::CreateIcsUpgradeNamedEvent"); TraceFunctionEntry(ttidNetSetup); // create an auto-reset, nonsingaled, named event m_hIcsUpgradeEvent = CreateEvent(NULL, FALSE, FALSE, c_wszIcsUpgradeEventName); if (NULL == m_hIcsUpgradeEvent) { TraceTag(ttidError, "%s: CreateEvent failed: 0x%lx", __FUNCNAME__, GetLastError()); NetSetupLogStatusV( LogSevError, SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS)); return HRESULT_FROM_WIN32(GetLastError()); } return S_OK; } //--------- HNet helpers end ------------------------------------