You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
3664 lines
105 KiB
3664 lines
105 KiB
//+--------------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
// Copyright (C) Microsoft Corporation, 1996 - 1998.
|
|
//
|
|
// File: util.cpp
|
|
//
|
|
// Contents: Miscellaneous utility functions
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
|
|
#include "stdafx.h"
|
|
#include "util.h"
|
|
#include "wrapper.h"
|
|
#include "defvals.h"
|
|
#include "resource.h"
|
|
#include <io.h>
|
|
#include "snapmgr.h"
|
|
extern "C" {
|
|
#include "getuser.h"
|
|
}
|
|
|
|
|
|
#define ILLEGAL_FILENAME_CHARS L"\"+,;<=>"
|
|
#define ILLEGAL_FILENAME_CHARS1 L"\\\\ \\/ // /\\"
|
|
#define ILLEGAL_FILENAME_CHARS2 L"\\ /"
|
|
//////////////////////////////////////////////////////////////////////////////////////////
|
|
// CWriteHmtlFile body.
|
|
//
|
|
|
|
//+-------------------------------------------------------------------------------------------
|
|
// CWriteHtmlFile::CWriteHtmlFile
|
|
//
|
|
// Initialize the class.
|
|
//
|
|
//--------------------------------------------------------------------------------------------
|
|
CWriteHtmlFile::CWriteHtmlFile()
|
|
{
|
|
m_hFileHandle = INVALID_HANDLE_VALUE;
|
|
m_bErrored = FALSE;
|
|
}
|
|
|
|
//+-------------------------------------------------------------------------------------------
|
|
// CWriteHtmlFile::~CWriteHtmlFile
|
|
//
|
|
// Write the end of the html file and close the handle.
|
|
//
|
|
//--------------------------------------------------------------------------------------------
|
|
CWriteHtmlFile::~CWriteHtmlFile()
|
|
{
|
|
//
|
|
// Close the file handle, but don't delete the HTML file, unless there was an
|
|
// error during some write proccess.
|
|
//
|
|
Close(m_bErrored);
|
|
}
|
|
|
|
//+-------------------------------------------------------------------------------------------
|
|
// CWriteHtmlFile::Close
|
|
//
|
|
// Closes the HTML file handle, if [bDelete] is true then the file is deleted.
|
|
//
|
|
// Arguments: [bDelete] - Close and delete the file.
|
|
//
|
|
// Returns: ERROR_SUCCESS;
|
|
//--------------------------------------------------------------------------------------------
|
|
DWORD
|
|
CWriteHtmlFile::Close( BOOL bDelete )
|
|
{
|
|
if(m_hFileHandle == INVALID_HANDLE_VALUE){
|
|
return ERROR_SUCCESS;
|
|
}
|
|
|
|
if(bDelete){
|
|
CloseHandle(m_hFileHandle);
|
|
DeleteFile(m_strFileName );
|
|
} else {
|
|
Write( IDS_HTMLERR_END );
|
|
CloseHandle( m_hFileHandle );
|
|
}
|
|
|
|
m_hFileHandle = INVALID_HANDLE_VALUE;
|
|
return ERROR_SUCCESS;
|
|
}
|
|
|
|
|
|
|
|
//+-------------------------------------------------------------------------------------------
|
|
// CWriteHtmlFile::GetFileName
|
|
//
|
|
// Copies the file name associated with this class to [pstrFileName].
|
|
//
|
|
// Arguments: [pstrFileName] - A CString object which will contain the file name
|
|
// on return.
|
|
//
|
|
// Returns: 0 - If Create has not been called, or the HTML file is invalid for
|
|
// some reason. This could be caused by a bad write.
|
|
// The size in characters of the file name.
|
|
//
|
|
//--------------------------------------------------------------------------------------------
|
|
int CWriteHtmlFile::GetFileName( LPTSTR pszFileName, UINT nSize )
|
|
{
|
|
if(m_strFileName.IsEmpty() || m_hFileHandle == INVALID_HANDLE_VALUE || m_bErrored){
|
|
return 0;
|
|
}
|
|
|
|
if(pszFileName && (int)nSize > m_strFileName.GetLength()){
|
|
//This is a safe usage.
|
|
lstrcpy(pszFileName, m_strFileName);
|
|
}
|
|
|
|
return m_strFileName.GetLength();
|
|
}
|
|
|
|
|
|
//+-------------------------------------------------------------------------------------------
|
|
// CWriteHtmlFile::Write
|
|
//
|
|
// Writes a string resource to the html file at the current file position.
|
|
//
|
|
// Arguments: [uRes] - The String resource to load and write to the html.
|
|
//
|
|
// Returns: If the string can't be loaded then an error will be returned.
|
|
// See CWriteHtmlFile::Write( LPCTSTR ) for other errors.
|
|
//--------------------------------------------------------------------------------------------
|
|
DWORD
|
|
CWriteHtmlFile::Write( UINT uRes )
|
|
{
|
|
AFX_MANAGE_STATE(AfxGetStaticModuleState());
|
|
|
|
CString str;
|
|
if( !str.LoadString(uRes) ){
|
|
return GetLastError();
|
|
}
|
|
|
|
#if defined(UNICODE) || defined(_UNICODE)
|
|
if ( uRes == IDS_HTMLERR_HEADER ){
|
|
WCHAR wszByteOrderMark[2] = {0xFEFF, 0x0000};
|
|
CString strByteOrderMark = wszByteOrderMark;
|
|
return Write( strByteOrderMark + str );
|
|
} else
|
|
#endif
|
|
return Write( str );
|
|
}
|
|
|
|
//+-------------------------------------------------------------------------------------------
|
|
// CWriteHtmlFile::Write
|
|
//
|
|
// Writes a string to an html file.
|
|
//
|
|
// Arguments: [pszString] - The string to write.
|
|
//
|
|
// Returns: ERROR_NOT_READ - if Create has not been called, or the file could not
|
|
// not be created.
|
|
// Other errors returned by WriteFile();
|
|
//--------------------------------------------------------------------------------------------
|
|
DWORD
|
|
CWriteHtmlFile::Write(LPCTSTR pszString, ... )
|
|
{
|
|
if(m_hFileHandle == INVALID_HANDLE_VALUE)
|
|
{
|
|
return ERROR_NOT_READY;
|
|
}
|
|
|
|
CString szWrite;
|
|
|
|
va_list marker;
|
|
va_start(marker, pszString);
|
|
|
|
//This is not a safe usage. Avoid using vswprintf(). Raid #555867. Yanggao.
|
|
szWrite.FormatV(pszString, marker);
|
|
|
|
va_end(marker);
|
|
|
|
DWORD dwRight;
|
|
if( !WriteFile( m_hFileHandle, szWrite, sizeof(TCHAR) * szWrite.GetLength(), &dwRight, NULL) )
|
|
{
|
|
//
|
|
// Check the error state of the right. Set m_bErrored if there was something wrong
|
|
// with the write.
|
|
//
|
|
dwRight = GetLastError();
|
|
if(dwRight != ERROR_SUCCESS)
|
|
{
|
|
m_bErrored = TRUE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
dwRight = ERROR_SUCCESS;
|
|
}
|
|
|
|
return dwRight;
|
|
}
|
|
|
|
DWORD
|
|
CWriteHtmlFile::CopyTextFile(
|
|
LPCTSTR pszFile,
|
|
DWORD dwPosLow,
|
|
BOOL bInterpret
|
|
)
|
|
{
|
|
HANDLE handle;
|
|
|
|
//
|
|
// Try to open the file for reading.
|
|
//
|
|
handle = ExpandAndCreateFile( pszFile, GENERIC_READ, 0, NULL, OPEN_EXISTING, 0, NULL );
|
|
if(handle == INVALID_HANDLE_VALUE)
|
|
{
|
|
return GetLastError();
|
|
}
|
|
|
|
LONG dwPosHigh = 0;
|
|
WCHAR szText[256];
|
|
char szRead[256];
|
|
|
|
BOOL IsMulti;
|
|
DWORD isUnicode;
|
|
|
|
//
|
|
// Determine if the file is a unicode text file.
|
|
//
|
|
if( ReadFile(handle, szText, 100 * sizeof(WCHAR), (DWORD *)&dwPosHigh, NULL ) == 0 ) //Raid #prefast
|
|
{
|
|
CloseHandle(handle );
|
|
return GetLastError();
|
|
}
|
|
if(dwPosHigh )
|
|
{
|
|
isUnicode = IsTextUnicode( szText, dwPosHigh, NULL );
|
|
}
|
|
|
|
//
|
|
// Set the pos we want to start from
|
|
//
|
|
dwPosHigh = 0;
|
|
SetFilePointer( handle, dwPosLow, &dwPosHigh, FILE_BEGIN );
|
|
if( GetLastError() != ERROR_SUCCESS )
|
|
{
|
|
CloseHandle(handle );
|
|
return GetLastError();
|
|
}
|
|
|
|
DWORD dwErr = ERROR_SUCCESS;
|
|
do
|
|
{
|
|
start:
|
|
//
|
|
// Read 254 total bytes from the file. We don't care about the error returned
|
|
// by read, as long as read does not set dwPosHigh to something.
|
|
//
|
|
dwPosHigh = 0;
|
|
if( ReadFile( handle, szRead, 254, (DWORD *)&dwPosHigh, NULL ) == 0 || dwPosHigh == 0) //Raid #prefast
|
|
{
|
|
CloseHandle(handle );
|
|
return GetLastError();
|
|
}
|
|
|
|
//
|
|
// If the file is not considered unicode then convert it to a unicode file.
|
|
//
|
|
ZeroMemory(szText, sizeof(WCHAR) * 256);
|
|
if(!isUnicode)
|
|
{
|
|
//This is a safe usage.
|
|
dwPosHigh = MultiByteToWideChar(CP_ACP, MB_PRECOMPOSED, szRead, dwPosHigh, szText, 255 );
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Just copy the text to the szText buffer and get the number of UNICODE
|
|
// characters.
|
|
//
|
|
//This is a safe usage.
|
|
memcpy(szText, szRead, dwPosHigh);
|
|
dwPosHigh = wcslen(szText);
|
|
}
|
|
|
|
PWSTR pszWrite = szText;
|
|
LONG i = 0;
|
|
if( bInterpret )
|
|
{
|
|
//
|
|
// Write out line breaks.
|
|
//
|
|
for(;i < dwPosHigh; i++)
|
|
{
|
|
//Bug 141526, Yanggao, 3/20/2001
|
|
if( L'<' == szText[i] )
|
|
{
|
|
szText[i] = 0;
|
|
Write(pszWrite);
|
|
Write(L"<");
|
|
pszWrite = &(szText[i + 1]);
|
|
}
|
|
if( L'%' == szText[i] ) //Raid #624384,Yanggao
|
|
{
|
|
szText[i] = 0;
|
|
Write(pszWrite);
|
|
Write(L"%%");
|
|
pszWrite = &(szText[i + 1]);
|
|
}
|
|
|
|
if( L'\r' == szText[i] || L'\n' == szText[i] )
|
|
{
|
|
if( i + 1 >= dwPosHigh )
|
|
{
|
|
szText[i] = 0;
|
|
Write(pszWrite);
|
|
|
|
SetFilePointer( handle, -(isUnicode ? 2:1), NULL, FILE_CURRENT);
|
|
//
|
|
// Read once again.
|
|
//
|
|
goto start;
|
|
}
|
|
|
|
//
|
|
// Check to see if this is a valid line break
|
|
//
|
|
i++;
|
|
if( L'\r' == szText[i] || L'\n' == szText[i] &&
|
|
szText[i] != szText[i - 1] )
|
|
{
|
|
szText[i - 1] = 0;
|
|
|
|
dwErr = Write( pszWrite );
|
|
if( dwErr != ERROR_SUCCESS)
|
|
{
|
|
break;
|
|
}
|
|
dwErr = Write( L"<BR>" );
|
|
if( dwErr != ERROR_SUCCESS)
|
|
{
|
|
break;
|
|
}
|
|
|
|
pszWrite = &(szText[i + 1]);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// This is not a valid line break, contintue with check with next character
|
|
//
|
|
i--;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Write the rest of the text.
|
|
//
|
|
if(dwErr == ERROR_SUCCESS)
|
|
{
|
|
Write( pszWrite );
|
|
}
|
|
else
|
|
{
|
|
break;
|
|
}
|
|
|
|
} while( dwPosHigh );
|
|
|
|
CloseHandle(handle );
|
|
return ERROR_SUCCESS;
|
|
}
|
|
|
|
//+-------------------------------------------------------------------------------------------
|
|
// CWriteHtmlFile::Create
|
|
//
|
|
// Creates an html file, and starts the write proccess. If [pszFile] is null, then
|
|
// this function creates a temporary file in the GetTempPath() directory with a name
|
|
// like SCE###.HTM
|
|
//
|
|
// Arguments: [pszFile] - Optional parameter for file name
|
|
//
|
|
// returns: ERROR_SUCCESS - If creating the file was successful.
|
|
// If the file exists then ERROR_FILE_EXISTS is returned.
|
|
//
|
|
//--------------------------------------------------------------------------------------------
|
|
DWORD CWriteHtmlFile::Create(LPCTSTR pszFile )
|
|
{
|
|
if(!pszFile){
|
|
//
|
|
// Create a temporary file name.
|
|
//
|
|
DWORD dwSize = GetTempPath(0, NULL);
|
|
if(dwSize){
|
|
TCHAR szTempFile[512];
|
|
|
|
//
|
|
// Get the temp path.
|
|
//
|
|
LPTSTR pszPath = (LPTSTR)LocalAlloc( 0, (dwSize + 1) * sizeof(TCHAR));
|
|
if(!pszPath){
|
|
return ERROR_OUTOFMEMORY;
|
|
}
|
|
GetTempPath( dwSize + 1, pszPath );
|
|
|
|
pszPath[dwSize - 1] = 0;
|
|
if( GetTempFileName( pszPath, TEXT("SCE"), 0, szTempFile) ){ //This is not safe usage. Raid #555912, yanggao.
|
|
LocalFree(pszPath);
|
|
|
|
//
|
|
// Create the temporary file.
|
|
//
|
|
DeleteFile( szTempFile );
|
|
int i = lstrlen(szTempFile);
|
|
while(i--){
|
|
if( szTempFile[i] == L'.' ){
|
|
break;
|
|
}
|
|
}
|
|
|
|
if(i + 3 >= lstrlen(szTempFile)){
|
|
return ERROR_OUTOFMEMORY;
|
|
}
|
|
|
|
//
|
|
// We want to create an html file.
|
|
//
|
|
i++;
|
|
szTempFile[i] = L'h';
|
|
szTempFile[i + 1] = L't';
|
|
szTempFile[i + 2] = L'm';
|
|
|
|
m_strFileName = szTempFile;
|
|
} else {
|
|
LocalFree(pszPath);
|
|
}
|
|
}
|
|
} else {
|
|
m_strFileName = pszFile;
|
|
}
|
|
|
|
if(m_strFileName.IsEmpty()){
|
|
return ERROR_FILE_NOT_FOUND;
|
|
}
|
|
|
|
//
|
|
// Open the file for writing
|
|
//
|
|
m_hFileHandle = ExpandAndCreateFile( m_strFileName,
|
|
GENERIC_WRITE,
|
|
FILE_SHARE_READ,
|
|
NULL,
|
|
CREATE_ALWAYS,
|
|
FILE_ATTRIBUTE_TEMPORARY,
|
|
NULL
|
|
);
|
|
if(m_hFileHandle == INVALID_HANDLE_VALUE){
|
|
return GetLastError();
|
|
}
|
|
|
|
//
|
|
// Write HTML header
|
|
//
|
|
return Write( IDS_HTMLERR_HEADER );
|
|
}
|
|
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: MyRegQueryValue
|
|
//
|
|
// Synopsis: Reads a registry value into [*Value]
|
|
//
|
|
//
|
|
// Arguments: [hKeyRoot] -
|
|
// [SubKey] -
|
|
// [ValueName] -
|
|
// [Value] -
|
|
// [pRegType] -
|
|
//
|
|
// Modifies: *[Value]
|
|
// *[pRegType]
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
|
|
DWORD MyRegQueryValue( HKEY hKeyRoot,
|
|
LPCTSTR SubKey,
|
|
LPCTSTR ValueName,
|
|
PVOID *Value,
|
|
LPDWORD pRegType )
|
|
{
|
|
DWORD Rcode;
|
|
DWORD dSize=0;
|
|
HKEY hKey=NULL;
|
|
BOOL FreeMem=FALSE;
|
|
|
|
if (( Rcode = RegOpenKeyEx(hKeyRoot, SubKey, 0,
|
|
KEY_READ, &hKey )) == ERROR_SUCCESS ) {
|
|
//This is a safe usage. It only queries data type.
|
|
if (( Rcode = RegQueryValueEx(hKey, ValueName, 0,
|
|
pRegType, NULL,
|
|
&dSize )) == ERROR_SUCCESS ) {
|
|
switch (*pRegType) {
|
|
case REG_DWORD:
|
|
case REG_DWORD_BIG_ENDIAN:
|
|
//This is a safe usage. The data type is not REG_SZ.
|
|
Rcode = RegQueryValueEx(hKey, ValueName, 0,
|
|
pRegType, (BYTE *)(*Value),
|
|
&dSize );
|
|
if ( Rcode != ERROR_SUCCESS ) {
|
|
|
|
if ( *Value != NULL )
|
|
*((BYTE *)(*Value)) = 0;
|
|
}
|
|
break;
|
|
|
|
case REG_SZ:
|
|
case REG_EXPAND_SZ:
|
|
case REG_MULTI_SZ:
|
|
if ( *Value == NULL ) {
|
|
*Value = (PVOID)LocalAlloc( LPTR, (dSize+1)*sizeof(TCHAR));
|
|
FreeMem = TRUE;
|
|
}
|
|
|
|
if ( *Value == NULL ) {
|
|
Rcode = ERROR_NOT_ENOUGH_MEMORY;
|
|
} else {
|
|
//This is not a safe usage. make sure *Value is terminated. Raid #555873. yanggao.
|
|
Rcode = RegQueryValueEx(hKey,ValueName,0,
|
|
pRegType,(BYTE *)(*Value),
|
|
&dSize );
|
|
|
|
if ( (Rcode != ERROR_SUCCESS) && FreeMem ) {
|
|
LocalFree(*Value);
|
|
*Value = NULL;
|
|
}
|
|
}
|
|
|
|
break;
|
|
default:
|
|
|
|
Rcode = ERROR_INVALID_DATATYPE;
|
|
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if ( hKey ) {
|
|
RegCloseKey( hKey );
|
|
}
|
|
|
|
return(Rcode);
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: MyRegSetValue
|
|
//
|
|
// Synopsis: Writes a registry value into [*Value]
|
|
//
|
|
//
|
|
// Arguments: [hKeyRoot] -
|
|
// [SubKey] -
|
|
// [ValueName] -
|
|
// [Value] -
|
|
// [cbValue] -
|
|
// [pRegType] -
|
|
//
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
|
|
DWORD MyRegSetValue( HKEY hKeyRoot,
|
|
LPCTSTR SubKey,
|
|
LPCTSTR ValueName,
|
|
const BYTE *Value,
|
|
const DWORD cbValue,
|
|
const DWORD pRegType )
|
|
{
|
|
DWORD Rcode=0;
|
|
HKEY hKey=NULL;
|
|
BOOL FreeMem=FALSE;
|
|
|
|
|
|
if (( Rcode = RegCreateKeyEx(hKeyRoot,
|
|
SubKey,
|
|
0,
|
|
0,
|
|
0,
|
|
KEY_READ|KEY_SET_VALUE|KEY_CREATE_SUB_KEY,
|
|
NULL,
|
|
&hKey,
|
|
NULL)) == ERROR_SUCCESS ) {
|
|
Rcode = RegSetValueEx(hKey,
|
|
ValueName,
|
|
0,
|
|
pRegType,
|
|
Value,
|
|
cbValue );
|
|
}
|
|
|
|
if ( hKey ) {
|
|
RegCloseKey( hKey );
|
|
}
|
|
|
|
return(Rcode);
|
|
}
|
|
|
|
BOOL FilePathExist(LPCTSTR Name, BOOL IsPath, int Flag)
|
|
// Flag = 0 - check file, Flag = 1 - check path
|
|
{
|
|
// TODO:
|
|
struct _wfinddata_t FileInfo;
|
|
intptr_t hFile;
|
|
BOOL bExist = FALSE;
|
|
|
|
if ( (IsPath && Flag == 1) ||
|
|
(!IsPath && Flag == 0) ) {
|
|
// must be exact match
|
|
hFile = _wfindfirst((LPTSTR)Name, &FileInfo);
|
|
if ( hFile != -1 ) {// find it
|
|
if ( FileInfo.attrib & _A_SUBDIR ) {
|
|
if ( Flag == 1)
|
|
bExist = TRUE;
|
|
} else if ( Flag == 0 )
|
|
bExist = TRUE;
|
|
}
|
|
_findclose(hFile);
|
|
return bExist;
|
|
}
|
|
|
|
if ( IsPath && Flag == 0 ) {
|
|
// invalid parameter
|
|
return bExist;
|
|
}
|
|
|
|
// IsPath = FALSE and Flag == 1 (a file name is passed in and search for its path)
|
|
CString tmpstr = CString(Name);
|
|
int nPos = tmpstr.ReverseFind(L'\\');
|
|
|
|
if ( nPos > 2 ) {
|
|
hFile = _wfindfirst(tmpstr.GetBufferSetLength(nPos), &FileInfo);
|
|
if ( hFile != -1 && FileInfo.attrib & _A_SUBDIR )
|
|
bExist = TRUE;
|
|
|
|
_findclose(hFile);
|
|
} else if ( nPos == 2 && Name[1] == L':')
|
|
bExist = TRUE;
|
|
|
|
return bExist;
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: MyFormatResMessage
|
|
//
|
|
// Synopsis: Creates an error message combining a description of an error
|
|
// returned from an SCE function (in rc), the extended description
|
|
// of that error (in errBuf), and a custom error message
|
|
// (in residMessage)
|
|
//
|
|
// Arguments: [rc] - The return code of an SCE function
|
|
// [residMessage] - the resource id of the base error message
|
|
// [errBuf] - Extended error info returned from an SCE function
|
|
// [strOut] - A CString to hold the formatted message
|
|
//
|
|
// Modifies: [strOut]
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
void
|
|
MyFormatResMessage(SCESTATUS rc, // in
|
|
UINT residMessage, // in
|
|
PSCE_ERROR_LOG_INFO errBuf,// in, optional
|
|
CString& strOut) // out
|
|
{
|
|
CString strMessage;
|
|
|
|
AFX_MANAGE_STATE(AfxGetStaticModuleState());
|
|
|
|
//
|
|
// If the LoadResource fails then strMessage will be empty
|
|
// It'll still be better to format the rest of the message than
|
|
// to return an empty strOut.
|
|
//
|
|
strMessage.LoadString(residMessage);
|
|
|
|
MyFormatMessage(rc,strMessage,errBuf,strOut);
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: MyFormatMessage
|
|
//
|
|
// Synopsis: Creates an error message combining a description of an error
|
|
// returned from an SCE function (in rc), the extended description
|
|
// of that error (in errBuf), and a custom error message (in mes)
|
|
//
|
|
// Arguments: [rc] - The return code of an SCE function
|
|
// [mes] - The base message
|
|
// [errBuf] - Extended error info returned from an SCE function
|
|
// [strOut] - A CString to hold the formatted message
|
|
//
|
|
// Modifies: [strOut]
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
void
|
|
MyFormatMessage(SCESTATUS rc, // in
|
|
LPCTSTR mes, // in
|
|
PSCE_ERROR_LOG_INFO errBuf, // in, optional
|
|
CString& strOut) // out
|
|
{
|
|
LPVOID lpMsgBuf=NULL;
|
|
|
|
if ( rc != SCESTATUS_SUCCESS ) {
|
|
|
|
//
|
|
// translate SCESTATUS into DWORD
|
|
//
|
|
DWORD win32 = SceStatusToDosError(rc);
|
|
|
|
//
|
|
// get error description of rc
|
|
//
|
|
//This is a safe usage. The function is responsible to allocate memery.
|
|
FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM,
|
|
NULL,
|
|
win32,
|
|
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), // Default language
|
|
(LPTSTR)&lpMsgBuf,
|
|
0,
|
|
NULL
|
|
);
|
|
}
|
|
|
|
if ( lpMsgBuf != NULL ) {
|
|
strOut = (LPTSTR)lpMsgBuf;
|
|
LocalFree(lpMsgBuf);
|
|
lpMsgBuf = NULL;
|
|
} else {
|
|
strOut.Empty();
|
|
}
|
|
|
|
CString strEx; //Raid #485372, yanggao, 11/30/2001
|
|
switch(rc)
|
|
{
|
|
case SCESTATUS_INVALID_PARAMETER:
|
|
case SCESTATUS_RECORD_NOT_FOUND:
|
|
case SCESTATUS_INVALID_DATA:
|
|
case SCESTATUS_OBJECT_EXIST:
|
|
case SCESTATUS_PROFILE_NOT_FOUND:
|
|
strEx.LoadString(IDS_OBJECT_FAILED_NOTE);
|
|
break;
|
|
case SCESTATUS_ACCESS_DENIED:
|
|
case SCESTATUS_CANT_DELETE:
|
|
strEx.LoadString(IDS_SAVE_FAILED_NOTE);
|
|
break;
|
|
case SCESTATUS_PREFIX_OVERFLOW:
|
|
case SCESTATUS_ALREADY_RUNNING:
|
|
case SCESTATUS_OTHER_ERROR:
|
|
case SCESTATUS_BUFFER_TOO_SMALL:
|
|
case SCESTATUS_BAD_FORMAT:
|
|
case SCESTATUS_NOT_ENOUGH_RESOURCE:
|
|
default:
|
|
strEx.Empty();
|
|
break;
|
|
}
|
|
|
|
if( strEx.IsEmpty() )
|
|
{
|
|
strOut += mes;
|
|
}
|
|
else
|
|
{
|
|
strOut = strOut + mes + L" " + strEx;
|
|
}
|
|
strOut += L"\n";
|
|
|
|
//
|
|
// Loop through the error buffers and append each of them to strOut
|
|
//
|
|
for (PSCE_ERROR_LOG_INFO pErr = errBuf;
|
|
pErr != NULL;
|
|
pErr = pErr->next) {
|
|
|
|
if (NULL == pErr) {
|
|
continue;
|
|
}
|
|
if ( pErr->rc != NO_ERROR) {
|
|
//This is a safe usage. The function is responsible to allocate memery.
|
|
FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM,
|
|
NULL,
|
|
pErr->rc,
|
|
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), // Default language
|
|
(LPTSTR)&lpMsgBuf,
|
|
0,
|
|
NULL
|
|
);
|
|
if ( lpMsgBuf ) {
|
|
strOut += (LPTSTR)lpMsgBuf;
|
|
LocalFree(lpMsgBuf);
|
|
lpMsgBuf = NULL;
|
|
}
|
|
}
|
|
if (pErr->buffer) {
|
|
strOut += pErr->buffer;
|
|
strOut += L"\n";
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
DWORD
|
|
FormatDBErrorMessage(
|
|
SCESTATUS sceStatus,
|
|
LPCTSTR pszDatabase,
|
|
CString &strOut
|
|
)
|
|
{
|
|
AFX_MANAGE_STATE(AfxGetStaticModuleState());
|
|
UINT uErr = 0;
|
|
|
|
switch (sceStatus) {
|
|
case SCESTATUS_SUCCESS:
|
|
return ERROR_INVALID_PARAMETER;
|
|
case SCESTATUS_INVALID_DATA:
|
|
uErr = IDS_DBERR_INVALID_DATA;
|
|
break;
|
|
case SCESTATUS_PROFILE_NOT_FOUND:
|
|
uErr = IDS_DBERR5_PROFILE_NOT_FOUND;
|
|
break;
|
|
case SCESTATUS_BAD_FORMAT:
|
|
uErr = IDS_DBERR_BAD_FORMAT;
|
|
break;
|
|
case SCESTATUS_BUFFER_TOO_SMALL:
|
|
case SCESTATUS_NOT_ENOUGH_RESOURCE:
|
|
uErr = IDS_DBERR_NOT_ENOUGH_RESOURCE;
|
|
break;
|
|
case SCESTATUS_ACCESS_DENIED:
|
|
uErr = IDS_DBERR5_ACCESS_DENIED;
|
|
break;
|
|
case SCESTATUS_NO_TEMPLATE_GIVEN:
|
|
uErr = IDS_DBERR_NO_TEMPLATE_GIVEN;
|
|
break;
|
|
case SCESTATUS_SPECIAL_ACCOUNT: //Raid #589139, DCR, yanggao, 4/10/2002.
|
|
uErr = IDS_ERR_PRIVILEGE; //.Net use IDS_ERR_PRIVILEGE instead of IDS_DBERR5_ACCESS_DENIED which is used for XPSP1.
|
|
break;
|
|
case ERROR_NONE_MAPPED: //Raid #625342
|
|
uErr = IDS_NO_ACCOUNT_MAP;
|
|
break;
|
|
default:
|
|
uErr = IDS_DBERR_OTHER_ERROR;
|
|
}
|
|
|
|
if ( strOut.LoadString(uErr) ) {
|
|
return ERROR_SUCCESS;
|
|
}
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
DWORD SceStatusToDosError(SCESTATUS SceStatus)
|
|
{
|
|
switch (SceStatus) {
|
|
|
|
case SCESTATUS_SUCCESS:
|
|
return(NO_ERROR);
|
|
|
|
case SCESTATUS_OTHER_ERROR:
|
|
return(ERROR_EXTENDED_ERROR);
|
|
|
|
case SCESTATUS_INVALID_PARAMETER:
|
|
return(ERROR_INVALID_PARAMETER);
|
|
|
|
case SCESTATUS_RECORD_NOT_FOUND:
|
|
return(ERROR_RESOURCE_DATA_NOT_FOUND);
|
|
|
|
case SCESTATUS_INVALID_DATA:
|
|
return(ERROR_INVALID_DATA);
|
|
|
|
case SCESTATUS_OBJECT_EXIST:
|
|
return(ERROR_FILE_EXISTS);
|
|
|
|
case SCESTATUS_BUFFER_TOO_SMALL:
|
|
return(ERROR_INSUFFICIENT_BUFFER);
|
|
|
|
case SCESTATUS_PROFILE_NOT_FOUND:
|
|
return(ERROR_FILE_NOT_FOUND);
|
|
|
|
case SCESTATUS_BAD_FORMAT:
|
|
return(ERROR_BAD_FORMAT);
|
|
|
|
case SCESTATUS_NOT_ENOUGH_RESOURCE:
|
|
return(ERROR_NOT_ENOUGH_MEMORY);
|
|
|
|
case SCESTATUS_ACCESS_DENIED:
|
|
case SCESTATUS_SPECIAL_ACCOUNT: //Raid #589139, DCR, yanggao, 4/10/2002.
|
|
return(ERROR_ACCESS_DENIED);
|
|
|
|
case SCESTATUS_CANT_DELETE:
|
|
return(ERROR_CURRENT_DIRECTORY);
|
|
|
|
case SCESTATUS_PREFIX_OVERFLOW:
|
|
return(ERROR_BUFFER_OVERFLOW);
|
|
|
|
case SCESTATUS_ALREADY_RUNNING:
|
|
return(ERROR_SERVICE_ALREADY_RUNNING);
|
|
|
|
default:
|
|
return(ERROR_EXTENDED_ERROR);
|
|
}
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: CreateNewProfile
|
|
//
|
|
// Synopsis: Create a new tempate with default values in the ProfileName location
|
|
//
|
|
// Returns: TRUE if a template ends up in the ProfileName file
|
|
// FALSE otherwise
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
BOOL CreateNewProfile(CString ProfileName,PSCE_PROFILE_INFO *ppspi)
|
|
{
|
|
SCESTATUS status;
|
|
SCE_PROFILE_INFO *pTemplate;
|
|
//
|
|
// profile name must end with .inf
|
|
//
|
|
int nLen = ProfileName.GetLength ();
|
|
// start searching at the last 4 position
|
|
if ( ProfileName.Find (L".inf", nLen-4) != nLen-4 )
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// if the profile already exists then we don't need to do anything
|
|
//
|
|
if ( FilePathExist( (LPCTSTR)ProfileName, FALSE, 0) ) {
|
|
return TRUE;
|
|
}
|
|
|
|
//
|
|
// Make sure the directory for the profile exists
|
|
//
|
|
status = SceCreateDirectory(ProfileName,FALSE,NULL);
|
|
if (SCESTATUS_SUCCESS != status) {
|
|
return FALSE;
|
|
}
|
|
|
|
pTemplate = (SCE_PROFILE_INFO*)LocalAlloc(LPTR,sizeof(SCE_PROFILE_INFO));
|
|
if (!pTemplate) {
|
|
return FALSE;
|
|
}
|
|
|
|
#ifdef FILL_WITH_DEFAULT_VALUES
|
|
SCE_PROFILE_INFO *pDefault = GetDefaultTemplate();
|
|
//
|
|
// Fill with default values
|
|
//
|
|
pTemplate->Type = SCE_ENGINE_SCP;
|
|
|
|
#define CD(X) pTemplate->X = pDefault->X;
|
|
#else // !FILL_WITH_DEFAULT_VALUES
|
|
#define CD(X) pTemplate->X = SCE_NO_VALUE;
|
|
#endif // !FILL_WITH_DEFAULT_VALUES
|
|
|
|
CD(MinimumPasswordAge);
|
|
CD(MaximumPasswordAge);
|
|
CD(MinimumPasswordLength);
|
|
CD(PasswordComplexity);
|
|
CD(PasswordHistorySize);
|
|
CD(LockoutBadCount);
|
|
CD(ResetLockoutCount);
|
|
CD(LockoutDuration);
|
|
CD(RequireLogonToChangePassword);
|
|
CD(ForceLogoffWhenHourExpire);
|
|
CD(EnableAdminAccount);
|
|
CD(EnableGuestAccount);
|
|
|
|
// These members aren't declared in NT4
|
|
CD(ClearTextPassword);
|
|
CD(AuditDSAccess);
|
|
CD(AuditAccountLogon);
|
|
CD(LSAAnonymousNameLookup);
|
|
|
|
CD(MaximumLogSize[0]);
|
|
CD(MaximumLogSize[1]);
|
|
CD(MaximumLogSize[2]);
|
|
CD(AuditLogRetentionPeriod[0]);
|
|
CD(AuditLogRetentionPeriod[1]);
|
|
CD(AuditLogRetentionPeriod[2]);
|
|
CD(RetentionDays[0]);
|
|
CD(RetentionDays[1]);
|
|
CD(RetentionDays[2]);
|
|
CD(RestrictGuestAccess[0]);
|
|
CD(RestrictGuestAccess[1]);
|
|
CD(RestrictGuestAccess[2]);
|
|
CD(AuditSystemEvents);
|
|
CD(AuditLogonEvents);
|
|
CD(AuditObjectAccess);
|
|
CD(AuditPrivilegeUse);
|
|
CD(AuditPolicyChange);
|
|
CD(AuditAccountManage);
|
|
CD(AuditProcessTracking);
|
|
|
|
#ifdef FILL_WITH_DEFAULT_VALUES
|
|
//
|
|
// These two are strings rather than DWORDs
|
|
//
|
|
if (pDefault->NewAdministratorName) {
|
|
pTemplate->NewAdministratorName =
|
|
(LPTSTR) LocalAlloc(LPTR,(lstrlen(pDefault->NewAdministratorName)+1)*sizeof(TCHAR));
|
|
if (pTemplate->NewAdministratorName) {
|
|
//This may not be a safe usage. pTemplate->NewAdministratorName and pDefault->NewAdministratorName are both PWSTR. Consider fix.
|
|
lstrcpy(pTemplate->NewAdministratorName,
|
|
pDefault->NewAdministratorName);
|
|
}
|
|
}
|
|
if (pDefault->NewGuestName) {
|
|
pTemplate->NewGuestName =
|
|
(LPTSTR) LocalAlloc(LPTR,(lstrlen(pDefault->NewGuestName)+1)*sizeof(TCHAR));
|
|
if (pTemplate->NewGuestName) {
|
|
//This may not be a safe usage. pTemplate->NewGuestName and pDefault->NewGuestName are both PWSTR. Consider fix.
|
|
lstrcpy(pTemplate->NewGuestName,
|
|
pDefault->NewGuestName);
|
|
}
|
|
}
|
|
#endif // FILL_WITH_DEFAULT_VALUES
|
|
|
|
#undef CD
|
|
status = SceWriteSecurityProfileInfo(ProfileName,
|
|
AREA_ALL,
|
|
pTemplate,
|
|
NULL);
|
|
if (ppspi) {
|
|
*ppspi = pTemplate;
|
|
} else {
|
|
SceFreeProfileMemory(pTemplate);
|
|
}
|
|
|
|
return (SCESTATUS_SUCCESS == status);
|
|
}
|
|
|
|
BOOL
|
|
VerifyKerberosInfo(PSCE_PROFILE_INFO pspi) {
|
|
if (pspi->pKerberosInfo) {
|
|
return TRUE;
|
|
}
|
|
pspi->pKerberosInfo = (PSCE_KERBEROS_TICKET_INFO)
|
|
LocalAlloc(LPTR,sizeof(SCE_KERBEROS_TICKET_INFO));
|
|
|
|
if (pspi->pKerberosInfo) {
|
|
pspi->pKerberosInfo->MaxTicketAge = SCE_NO_VALUE;
|
|
pspi->pKerberosInfo->MaxRenewAge = SCE_NO_VALUE;
|
|
pspi->pKerberosInfo->MaxServiceAge = SCE_NO_VALUE;
|
|
pspi->pKerberosInfo->MaxClockSkew = SCE_NO_VALUE;
|
|
pspi->pKerberosInfo->TicketValidateClient = SCE_NO_VALUE;
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
BOOL
|
|
SetProfileInfo(LONG_PTR dwItem,LONG_PTR dwNew,PEDITTEMPLATE pEdit) {
|
|
if (!pEdit) {
|
|
return FALSE;
|
|
}
|
|
pEdit->SetDirty(AREA_SECURITY_POLICY);
|
|
|
|
switch (dwItem) {
|
|
case IDS_MAX_PAS_AGE:
|
|
pEdit->pTemplate->MaximumPasswordAge = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_MIN_PAS_AGE:
|
|
pEdit->pTemplate->MinimumPasswordAge = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_MIN_PAS_LEN:
|
|
pEdit->pTemplate->MinimumPasswordLength = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_PAS_UNIQUENESS:
|
|
pEdit->pTemplate->PasswordHistorySize = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_PAS_COMPLEX:
|
|
pEdit->pTemplate->PasswordComplexity = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_REQ_LOGON:
|
|
pEdit->pTemplate->RequireLogonToChangePassword = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_LOCK_COUNT:
|
|
pEdit->pTemplate->LockoutBadCount = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_LOCK_RESET_COUNT:
|
|
pEdit->pTemplate->ResetLockoutCount = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_LOCK_DURATION:
|
|
pEdit->pTemplate->LockoutDuration = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_FORCE_LOGOFF:
|
|
pEdit->pTemplate->ForceLogoffWhenHourExpire = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_ENABLE_ADMIN:
|
|
pEdit->pTemplate->EnableAdminAccount = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_ENABLE_GUEST:
|
|
pEdit->pTemplate->EnableGuestAccount = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_LSA_ANON_LOOKUP:
|
|
pEdit->pTemplate->LSAAnonymousNameLookup = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_NEW_ADMIN:
|
|
if (pEdit->pTemplate->NewAdministratorName) {
|
|
LocalFree(pEdit->pTemplate->NewAdministratorName);
|
|
}
|
|
if (dwNew && (dwNew != (LONG_PTR)ULongToPtr(SCE_NO_VALUE))) {
|
|
pEdit->pTemplate->NewAdministratorName = (PWSTR)LocalAlloc(LPTR,(lstrlen((PWSTR)dwNew)+1)*sizeof(WCHAR));
|
|
if (pEdit->pTemplate->NewAdministratorName) {
|
|
//This may not be a safe usage. pTemplate->NewAdministratorName and dwNew are both PWSTR. Consider fix.
|
|
lstrcpy(pEdit->pTemplate->NewAdministratorName,(PWSTR)dwNew);
|
|
}
|
|
} else {
|
|
pEdit->pTemplate->NewAdministratorName = NULL;
|
|
}
|
|
break;
|
|
case IDS_NEW_GUEST:
|
|
if (pEdit->pTemplate->NewGuestName) {
|
|
LocalFree(pEdit->pTemplate->NewGuestName);
|
|
}
|
|
if (dwNew && (dwNew != (LONG_PTR)ULongToPtr(SCE_NO_VALUE))) {
|
|
pEdit->pTemplate->NewGuestName = (PWSTR)LocalAlloc(LPTR,(lstrlen((PWSTR)dwNew)+1)*sizeof(WCHAR));
|
|
if (pEdit->pTemplate->NewGuestName) {
|
|
//This may not be a safe usage. pTemplate->NewGuestName and dwNew are both PWSTR. Consider fix.
|
|
lstrcpy(pEdit->pTemplate->NewGuestName,(PWSTR)dwNew);
|
|
}
|
|
} else {
|
|
pEdit->pTemplate->NewGuestName = NULL;
|
|
}
|
|
break;
|
|
case IDS_SYS_LOG_MAX:
|
|
pEdit->pTemplate->MaximumLogSize[EVENT_TYPE_SYSTEM] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_SYS_LOG_RET:
|
|
pEdit->pTemplate->AuditLogRetentionPeriod[EVENT_TYPE_SYSTEM] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_SYS_LOG_DAYS:
|
|
pEdit->pTemplate->RetentionDays[EVENT_TYPE_SYSTEM] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_SEC_LOG_MAX:
|
|
pEdit->pTemplate->MaximumLogSize[EVENT_TYPE_SECURITY] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_SEC_LOG_RET:
|
|
pEdit->pTemplate->AuditLogRetentionPeriod[EVENT_TYPE_SECURITY] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_SEC_LOG_DAYS:
|
|
pEdit->pTemplate->RetentionDays[EVENT_TYPE_SECURITY] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_APP_LOG_MAX:
|
|
pEdit->pTemplate->MaximumLogSize[EVENT_TYPE_APP] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_APP_LOG_RET:
|
|
pEdit->pTemplate->AuditLogRetentionPeriod[EVENT_TYPE_APP] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_APP_LOG_DAYS:
|
|
pEdit->pTemplate->RetentionDays[EVENT_TYPE_APP] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_SYSTEM_EVENT:
|
|
pEdit->pTemplate->AuditSystemEvents = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_LOGON_EVENT:
|
|
pEdit->pTemplate->AuditLogonEvents = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_OBJECT_ACCESS:
|
|
pEdit->pTemplate->AuditObjectAccess = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_PRIVILEGE_USE:
|
|
pEdit->pTemplate->AuditPrivilegeUse = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_POLICY_CHANGE:
|
|
pEdit->pTemplate->AuditPolicyChange = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_ACCOUNT_MANAGE:
|
|
pEdit->pTemplate->AuditAccountManage = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_PROCESS_TRACK:
|
|
pEdit->pTemplate->AuditProcessTracking = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_DIRECTORY_ACCESS:
|
|
pEdit->pTemplate->AuditDSAccess = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_ACCOUNT_LOGON:
|
|
pEdit->pTemplate->AuditAccountLogon = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_SYS_LOG_GUEST:
|
|
pEdit->pTemplate->RestrictGuestAccess[EVENT_TYPE_SYSTEM] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_SEC_LOG_GUEST:
|
|
pEdit->pTemplate->RestrictGuestAccess[EVENT_TYPE_SECURITY] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_APP_LOG_GUEST:
|
|
pEdit->pTemplate->RestrictGuestAccess[EVENT_TYPE_APP] = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
case IDS_CLEAR_PASSWORD:
|
|
pEdit->pTemplate->ClearTextPassword = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
break;
|
|
|
|
case IDS_KERBEROS_MAX_SERVICE:
|
|
if (VerifyKerberosInfo(pEdit->pTemplate)) {
|
|
pEdit->pTemplate->pKerberosInfo->MaxServiceAge = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
}
|
|
break;
|
|
case IDS_KERBEROS_MAX_CLOCK:
|
|
if (VerifyKerberosInfo( pEdit->pTemplate)) {
|
|
pEdit->pTemplate->pKerberosInfo->MaxClockSkew = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
}
|
|
break;
|
|
case IDS_KERBEROS_VALIDATE_CLIENT:
|
|
if (VerifyKerberosInfo( pEdit->pTemplate)) {
|
|
pEdit->pTemplate->pKerberosInfo->TicketValidateClient = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
}
|
|
break;
|
|
|
|
case IDS_KERBEROS_MAX_AGE:
|
|
if (VerifyKerberosInfo( pEdit->pTemplate)) {
|
|
pEdit->pTemplate->pKerberosInfo->MaxTicketAge = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
}
|
|
break;
|
|
case IDS_KERBEROS_RENEWAL:
|
|
if (VerifyKerberosInfo( pEdit->pTemplate)) {
|
|
pEdit->pTemplate->pKerberosInfo->MaxRenewAge = (DWORD)PtrToUlong((PVOID)dwNew);
|
|
}
|
|
break;
|
|
default:
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
//
|
|
// FUNCTION: ErrorHandlerEx(WORD, LPSTR)
|
|
//
|
|
// PURPOSE: Calls GetLastError() and uses FormatMessage() to display the
|
|
// textual information of the error code along with the file
|
|
// and line number.
|
|
//
|
|
// PARAMETERS:
|
|
// wLine - line number where the error occured
|
|
// lpszFile - file where the error occured
|
|
//
|
|
// RETURN VALUE:
|
|
// none
|
|
//
|
|
// COMMENTS:
|
|
// This function has a macro ErrorHandler() which handles filling in
|
|
// the line number and file name where the error occured. ErrorHandler()
|
|
// is always used instead of calling this function directly.
|
|
//
|
|
|
|
void ErrorHandlerEx( WORD wLine, LPTSTR lpszFile )
|
|
{
|
|
LPVOID lpvMessage;
|
|
DWORD dwError;
|
|
CString szBuffer;
|
|
|
|
// The the text of the error message
|
|
//This is a safe usage.
|
|
dwError = FormatMessage(FORMAT_MESSAGE_ALLOCATE_BUFFER |
|
|
FORMAT_MESSAGE_FROM_SYSTEM,
|
|
NULL,
|
|
GetLastError(),
|
|
MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US),
|
|
(LPTSTR)&lpvMessage,
|
|
0,
|
|
NULL);
|
|
|
|
// Check to see if an error occured calling FormatMessage()
|
|
if (0 == dwError) {
|
|
//This is not a safe usage. avoid using wsprintf. Raid #555867. Yanggao.
|
|
szBuffer.Format(TEXT("An error occured calling FormatMessage().")
|
|
TEXT("Error Code %d"), GetLastError());
|
|
MessageBox(NULL, szBuffer, TEXT("Security Configuration Editor"), MB_ICONSTOP |
|
|
MB_ICONEXCLAMATION);
|
|
return;
|
|
}
|
|
|
|
// Display the error message
|
|
//This is not a safe usage. avoid using wsprinf. Raid #555867. Yanggao.
|
|
szBuffer.Format(TEXT("Generic, Line=%d, File=%s"), wLine, lpszFile);
|
|
MessageBox(NULL, (LPTSTR)lpvMessage, szBuffer, MB_ICONEXCLAMATION | MB_OK);
|
|
|
|
return;
|
|
}
|
|
|
|
BOOL
|
|
GetSceStatusString(SCESTATUS status, CString *strStatus) {
|
|
AFX_MANAGE_STATE(AfxGetStaticModuleState( ));
|
|
if (!strStatus || (status > SCESTATUS_SERVICE_NOT_SUPPORT)) {
|
|
return false;
|
|
}
|
|
return strStatus->LoadString(status + IDS_SCESTATUS_SUCCESS);
|
|
}
|
|
|
|
|
|
//+---------------------------------------------------------------------------------------------
|
|
// EnumLangProc
|
|
//
|
|
// Creates the lanuage ID for the resource attached to the DLL. The function only enumerates
|
|
// on lanuage.
|
|
//
|
|
// Arguments: - See help on EnumResLangProc in the SDK Doc.
|
|
//
|
|
// Returns: - Returns FALSE because we only want the very first lanuage enumerated.
|
|
//
|
|
//+---------------------------------------------------------------------------------------------
|
|
BOOL CALLBACK EnumLangProc(
|
|
HMODULE hMod,
|
|
LPCTSTR pszType,
|
|
LPCTSTR pszName,
|
|
WORD wIDLanguage,
|
|
LONG_PTR lParam
|
|
)
|
|
{
|
|
//
|
|
// We only want the very first enumerated type, so create the language ID
|
|
// and exit this enumeration.
|
|
//
|
|
*((DWORD *)lParam) = wIDLanguage;
|
|
return FALSE;
|
|
}
|
|
|
|
bool
|
|
GetRightDisplayName(LPCTSTR szSystemName, LPCTSTR szName, LPTSTR szDisp, LPDWORD lpcbDisp) {
|
|
LPTSTR szLCName;
|
|
DWORD dwLang;
|
|
int i;
|
|
|
|
if (!szDisp || !szName) {
|
|
return false;
|
|
}
|
|
|
|
//
|
|
// Enumerate our resource to find out what language the resource is in.
|
|
//
|
|
DWORD dwDefaultLang;
|
|
|
|
dwDefaultLang = GetUserDefaultUILanguage();
|
|
LCID localeID = MAKELCID(dwDefaultLang, SORT_DEFAULT);
|
|
|
|
LCID langDefault = GetThreadLocale();
|
|
SetThreadLocale( localeID );
|
|
|
|
*lpcbDisp = dwDefaultLang;
|
|
|
|
DWORD cBufSize=*lpcbDisp;
|
|
BOOL bFound;
|
|
|
|
bFound = LookupPrivilegeDisplayName(szSystemName,szName,szDisp,lpcbDisp,&dwLang);
|
|
if ( bFound && dwDefaultLang != dwLang && szSystemName ) {
|
|
// not the language I am looking for
|
|
// search on local system
|
|
*lpcbDisp = cBufSize;
|
|
bFound = LookupPrivilegeDisplayName(NULL,szName,szDisp,lpcbDisp,&dwLang);
|
|
}
|
|
SetThreadLocale(langDefault);
|
|
|
|
//Prefast warning 400: Using 'lstrcmpiW' to perform a case-insensitive compare to constant string.
|
|
//Yields unexpected result in non-English locales. Currently they are always English locale.
|
|
if (!bFound) {
|
|
if (0 == _wcsicmp(szName,L"senetworklogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_SE_NETWORK_LOGON_RIGHT,szDisp,*lpcbDisp);
|
|
} else if (0 == _wcsicmp(szName,L"seinteractivelogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_SE_INTERACTIVE_LOGON_RIGHT,szDisp,*lpcbDisp);
|
|
} else if (0 == _wcsicmp(szName,L"sebatchlogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_SE_BATCH_LOGON_RIGHT,szDisp,*lpcbDisp);
|
|
} else if (0 == _wcsicmp(szName,L"seservicelogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_SE_SERVICE_LOGON_RIGHT,szDisp,*lpcbDisp);
|
|
} else if (0 == _wcsicmp(szName,L"sedenyinteractivelogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_DENY_LOGON_LOCALLY,szDisp,*lpcbDisp);
|
|
} else if (0 == _wcsicmp(szName,L"sedenynetworklogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_DENY_LOGON_NETWORK,szDisp,*lpcbDisp);
|
|
} else if (0 == _wcsicmp(szName,L"sedenyservicelogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_DENY_LOGON_SERVICE,szDisp,*lpcbDisp);
|
|
} else if (0 == _wcsicmp(szName,L"sedenybatchlogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_DENY_LOGON_BATCH,szDisp,*lpcbDisp);
|
|
} else if (0 == _wcsicmp(szName,L"sedenyremoteinteractivelogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_DENY_REMOTE_INTERACTIVE_LOGON,szDisp,*lpcbDisp);
|
|
} else if (0 == _wcsicmp(szName,L"seremoteinteractivelogonright")) {
|
|
LoadString(AfxGetInstanceHandle(),IDS_REMOTE_INTERACTIVE_LOGON,szDisp,*lpcbDisp);
|
|
} else {
|
|
//This is not a safe usage. Make sure szDisp is terminated. Raid #553113, yanggao
|
|
lstrcpyn(szDisp,szName,*lpcbDisp-1);
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
#define DPI(X) {str.Format(L"%S: %d\n",#X,pInfo->X);OutputDebugString(str);}
|
|
void DumpProfileInfo(PSCE_PROFILE_INFO pInfo) {
|
|
CString str;
|
|
PSCE_PRIVILEGE_ASSIGNMENT ppa;
|
|
PSCE_NAME_LIST pName;
|
|
PSCE_GROUP_MEMBERSHIP pgm;
|
|
|
|
if (!pInfo) {
|
|
return;
|
|
}
|
|
|
|
DPI(MinimumPasswordAge);
|
|
DPI(MaximumPasswordAge);
|
|
DPI(MinimumPasswordLength);
|
|
DPI(PasswordComplexity);
|
|
DPI(PasswordHistorySize);
|
|
DPI(LockoutBadCount);
|
|
DPI(ResetLockoutCount);
|
|
DPI(LockoutDuration);
|
|
DPI(RequireLogonToChangePassword);
|
|
DPI(ForceLogoffWhenHourExpire);
|
|
DPI(EnableAdminAccount);
|
|
DPI(EnableGuestAccount);
|
|
DPI(ClearTextPassword);
|
|
DPI(AuditDSAccess);
|
|
DPI(AuditAccountLogon);
|
|
DPI(LSAAnonymousNameLookup);
|
|
// DPI(EventAuditingOnOff);
|
|
DPI(AuditSystemEvents);
|
|
DPI(AuditLogonEvents);
|
|
DPI(AuditObjectAccess);
|
|
DPI(AuditPrivilegeUse);
|
|
DPI(AuditPolicyChange);
|
|
DPI(AuditAccountManage);
|
|
DPI(AuditProcessTracking);
|
|
|
|
if (pInfo->NewGuestName) {
|
|
OutputDebugString(L"NewGuestName: ");
|
|
if ((DWORD_PTR)ULongToPtr(SCE_NO_VALUE) == (DWORD_PTR)pInfo->NewGuestName) {
|
|
OutputDebugString(L"[[undefined]]");
|
|
} else {
|
|
OutputDebugString(pInfo->NewGuestName);
|
|
}
|
|
OutputDebugString(L"\n");
|
|
} else {
|
|
OutputDebugString(L"NewGuestName: [[absent]]\n");
|
|
}
|
|
if (pInfo->NewAdministratorName) {
|
|
OutputDebugString(L"NewAdministratorName: ");
|
|
if ((DWORD_PTR)ULongToPtr(SCE_NO_VALUE) == (DWORD_PTR)pInfo->NewAdministratorName) {
|
|
OutputDebugString(L"[[undefined]]");
|
|
} else {
|
|
OutputDebugString(pInfo->NewAdministratorName);
|
|
}
|
|
OutputDebugString(L"\n");
|
|
} else {
|
|
OutputDebugString(L"NewGuestName: [[absent]]\n");
|
|
}
|
|
|
|
|
|
OutputDebugString(L"\n");
|
|
|
|
switch(pInfo->Type) {
|
|
case SCE_ENGINE_SCP:
|
|
ppa = pInfo->OtherInfo.scp.u.pInfPrivilegeAssignedTo;
|
|
break;
|
|
case SCE_ENGINE_SAP:
|
|
ppa = pInfo->OtherInfo.sap.pPrivilegeAssignedTo;
|
|
break;
|
|
case SCE_ENGINE_SMP:
|
|
ppa = pInfo->OtherInfo.smp.pPrivilegeAssignedTo;
|
|
break;
|
|
case SCE_ENGINE_SYSTEM:
|
|
ppa = NULL;
|
|
break;
|
|
default:
|
|
OutputDebugString(L"!!!Unknown Template Type!!!\n");
|
|
ppa = NULL;
|
|
break;
|
|
}
|
|
while(ppa) {
|
|
OutputDebugString(ppa->Name);
|
|
OutputDebugString(L":");
|
|
pName = ppa->AssignedTo;
|
|
while(pName) {
|
|
OutputDebugString(pName->Name);
|
|
OutputDebugString(L",");
|
|
pName = pName->Next;
|
|
}
|
|
ppa = ppa->Next;
|
|
OutputDebugString(L"\n");
|
|
}
|
|
OutputDebugString(L"\n");
|
|
|
|
PSCE_REGISTRY_VALUE_INFO aRegValues;
|
|
for(DWORD i = 0; i< pInfo->RegValueCount;i++) {
|
|
OutputDebugString(pInfo->aRegValues[i].FullValueName);
|
|
OutputDebugString(L":");
|
|
switch(pInfo->aRegValues[i].ValueType) {
|
|
case SCE_REG_DISPLAY_STRING:
|
|
OutputDebugString(pInfo->aRegValues[i].Value);
|
|
break;
|
|
default:
|
|
str.Format(L"%d",(ULONG_PTR)pInfo->aRegValues[i].Value);
|
|
OutputDebugString(str);
|
|
}
|
|
OutputDebugString(L"\n");
|
|
}
|
|
OutputDebugString(L"\n");
|
|
|
|
pgm = pInfo->pGroupMembership;
|
|
while(pgm) {
|
|
OutputDebugString(L"\nGROUP: ");
|
|
OutputDebugString(pgm->GroupName);
|
|
OutputDebugString(L"\nMembers: ");
|
|
pName = pgm->pMembers;
|
|
while(pName) {
|
|
OutputDebugString(pName->Name);
|
|
OutputDebugString(L",");
|
|
pName = pName->Next;
|
|
}
|
|
OutputDebugString(L"\nMember Of: ");
|
|
pName = pgm->pMemberOf;
|
|
while(pName) {
|
|
OutputDebugString(pName->Name);
|
|
OutputDebugString(L",");
|
|
pName = pName->Next;
|
|
}
|
|
OutputDebugString(L"\n");
|
|
pgm = pgm->Next;
|
|
}
|
|
OutputDebugString(L"\nGROUP: ");
|
|
}
|
|
|
|
HRESULT MyMakeSelfRelativeSD(
|
|
PSECURITY_DESCRIPTOR psdOriginal,
|
|
PSECURITY_DESCRIPTOR* ppsdNew )
|
|
{
|
|
ASSERT( NULL != psdOriginal );
|
|
|
|
if ( NULL == psdOriginal || NULL == ppsdNew ) {
|
|
return E_INVALIDARG;
|
|
}
|
|
|
|
// we have to find out whether the original is already self-relative
|
|
SECURITY_DESCRIPTOR_CONTROL sdc = 0;
|
|
DWORD dwRevision = 0;
|
|
if ( !GetSecurityDescriptorControl( psdOriginal, &sdc, &dwRevision ) ) {
|
|
ASSERT( FALSE );
|
|
DWORD err = GetLastError();
|
|
return HRESULT_FROM_WIN32( err );
|
|
}
|
|
|
|
DWORD cb = GetSecurityDescriptorLength( psdOriginal ) + 20;
|
|
PSECURITY_DESCRIPTOR psdSelfRelativeCopy = (PSECURITY_DESCRIPTOR)LocalAlloc( LMEM_ZEROINIT, cb );
|
|
if (NULL == psdSelfRelativeCopy) {
|
|
return E_UNEXPECTED; // just in case the exception is ignored
|
|
}
|
|
|
|
if ( sdc & SE_SELF_RELATIVE )
|
|
// the original is in self-relative format, just byte-copy it
|
|
{
|
|
//This is a safe usage.
|
|
memcpy( psdSelfRelativeCopy, psdOriginal, cb - 20 );
|
|
} else if ( !MakeSelfRelativeSD( psdOriginal, psdSelfRelativeCopy, &cb ) )
|
|
// the original is in absolute format, convert-copy it
|
|
{
|
|
ASSERT( FALSE );
|
|
VERIFY( NULL == LocalFree( psdSelfRelativeCopy ) );
|
|
DWORD err = GetLastError();
|
|
return HRESULT_FROM_WIN32( err );
|
|
}
|
|
*ppsdNew = psdSelfRelativeCopy;
|
|
return S_OK;
|
|
}
|
|
|
|
PSCE_NAME_STATUS_LIST
|
|
MergeNameStatusList(PSCE_NAME_LIST pTemplate, PSCE_NAME_LIST pInspect)
|
|
{
|
|
PSCE_NAME_LIST pTemp1;
|
|
PSCE_NAME_STATUS_LIST plMerge=NULL, pTemp2;
|
|
SCESTATUS rc=SCESTATUS_SUCCESS;
|
|
|
|
for ( pTemp1=pTemplate; pTemp1; pTemp1=pTemp1->Next ) {
|
|
|
|
rc = SceAddToNameStatusList(&plMerge, pTemp1->Name, 0, MERGED_TEMPLATE );
|
|
if ( SCESTATUS_SUCCESS != rc )
|
|
break;
|
|
}
|
|
if ( SCESTATUS_SUCCESS == rc ) {
|
|
for ( pTemp1=pInspect; pTemp1; pTemp1=pTemp1->Next ) {
|
|
|
|
for ( pTemp2=plMerge; pTemp2 != NULL ; pTemp2=pTemp2->Next ) {
|
|
if ( pTemp2->Status & MERGED_INSPECT ) {
|
|
// this one is processed
|
|
continue;
|
|
} else if ( _wcsicmp(pTemp1->Name, pTemp2->Name) == 0 ) {
|
|
// find a match
|
|
pTemp2->Status = MERGED_TEMPLATE | MERGED_INSPECT;
|
|
break;
|
|
}
|
|
}
|
|
if ( !pTemp2 ) {
|
|
// did not find the match, add this one in
|
|
rc = SceAddToNameStatusList(&plMerge, pTemp1->Name, 0, MERGED_INSPECT );
|
|
if ( SCESTATUS_SUCCESS != rc )
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if ( SCESTATUS_SUCCESS == rc ) {
|
|
return plMerge;
|
|
} else {
|
|
SceFreeMemory(plMerge, SCE_STRUCT_NAME_STATUS_LIST);
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
|
|
SCESTATUS
|
|
ConvertMultiSzToDelim(
|
|
IN PWSTR pValue,
|
|
IN DWORD Len,
|
|
IN WCHAR DelimFrom,
|
|
IN WCHAR Delim
|
|
)
|
|
/*
|
|
Convert the multi-sz delimiter \0 to space
|
|
*/
|
|
{
|
|
DWORD i;
|
|
|
|
for ( i=0; i<Len && pValue; i++) {
|
|
// if ( *(pValue+i) == L'\0' && *(pValue+i+1) != L'\0') {
|
|
if ( *(pValue+i) == DelimFrom && i+1 < Len &&
|
|
*(pValue+i+1) != L'\0' ) {
|
|
//
|
|
// a NULL delimiter is encounted and it's not the end (double NULL)
|
|
//
|
|
*(pValue+i) = Delim;
|
|
}
|
|
}
|
|
|
|
return(SCESTATUS_SUCCESS);
|
|
}
|
|
|
|
DWORD
|
|
SceRegEnumAllValues(
|
|
IN OUT PDWORD pCount,
|
|
IN OUT PSCE_REGISTRY_VALUE_INFO *paRegValues
|
|
)
|
|
/*
|
|
*/
|
|
{
|
|
DWORD Win32Rc;
|
|
HKEY hKey=NULL;
|
|
PSCE_NAME_STATUS_LIST pnsList=NULL;
|
|
DWORD nAdded=0;
|
|
|
|
|
|
Win32Rc = RegOpenKeyEx(
|
|
HKEY_LOCAL_MACHINE,
|
|
SCE_ROOT_REGVALUE_PATH,
|
|
0,
|
|
KEY_READ,
|
|
&hKey
|
|
);
|
|
|
|
DWORD cSubKeys = 0;
|
|
DWORD nMaxLen;
|
|
|
|
if ( Win32Rc == ERROR_SUCCESS ) {
|
|
|
|
//
|
|
// enumerate all subkeys of the key
|
|
//
|
|
|
|
Win32Rc = RegQueryInfoKey (
|
|
hKey,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
&cSubKeys,
|
|
&nMaxLen,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL
|
|
);
|
|
}
|
|
|
|
if ( Win32Rc == ERROR_SUCCESS && cSubKeys > 0 ) {
|
|
|
|
PWSTR szName = (PWSTR)LocalAlloc(0, (nMaxLen+2)*sizeof(WCHAR));
|
|
|
|
if ( !szName ) {
|
|
Win32Rc = ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
} else {
|
|
|
|
DWORD BufSize;
|
|
DWORD index = 0;
|
|
DWORD RegType;
|
|
|
|
do {
|
|
|
|
BufSize = nMaxLen+1;
|
|
Win32Rc = RegEnumKeyEx(
|
|
hKey,
|
|
index,
|
|
szName,
|
|
&BufSize,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL);
|
|
|
|
if ( ERROR_SUCCESS == Win32Rc ) {
|
|
|
|
index++;
|
|
|
|
//
|
|
// get the full registry key name and Valuetype
|
|
//
|
|
cSubKeys = REG_SZ;
|
|
PDWORD pType = &cSubKeys;
|
|
|
|
//
|
|
// query ValueType, if error, default REG_SZ
|
|
//
|
|
MyRegQueryValue( hKey,
|
|
szName,
|
|
SCE_REG_VALUE_TYPE,
|
|
(PVOID *)&pType,
|
|
&RegType );
|
|
|
|
if ( cSubKeys < REG_SZ || cSubKeys > REG_MULTI_SZ ) {
|
|
cSubKeys = REG_SZ;
|
|
}
|
|
|
|
//
|
|
// convert the path name
|
|
//
|
|
ConvertMultiSzToDelim(szName, BufSize, L'/', L'\\');
|
|
|
|
//
|
|
// compare with the input array, if not exist,
|
|
// add it
|
|
//
|
|
for ( DWORD i=0; i<*pCount; i++ ) {
|
|
if ( (*paRegValues)[i].FullValueName &&
|
|
_wcsicmp(szName, (*paRegValues)[i].FullValueName) == 0 ) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
if ( i >= *pCount ) {
|
|
//
|
|
// did not find a match, add it
|
|
//
|
|
if ( SCESTATUS_SUCCESS != SceAddToNameStatusList(&pnsList,
|
|
szName,
|
|
BufSize,
|
|
cSubKeys) ) {
|
|
|
|
Win32Rc = ERROR_NOT_ENOUGH_MEMORY;
|
|
break;
|
|
}
|
|
nAdded++;
|
|
}
|
|
|
|
} else if ( ERROR_NO_MORE_ITEMS != Win32Rc ) {
|
|
break;
|
|
}
|
|
|
|
} while ( Win32Rc != ERROR_NO_MORE_ITEMS );
|
|
|
|
if ( Win32Rc == ERROR_NO_MORE_ITEMS ) {
|
|
Win32Rc = ERROR_SUCCESS;
|
|
}
|
|
|
|
|
|
//
|
|
// free the enumeration buffer
|
|
//
|
|
LocalFree(szName);
|
|
}
|
|
}
|
|
|
|
if ( hKey ) {
|
|
|
|
RegCloseKey(hKey);
|
|
}
|
|
|
|
|
|
if ( ERROR_SUCCESS == Win32Rc ) {
|
|
//
|
|
// add the name list to the output arrays
|
|
//
|
|
DWORD nNewCount = *pCount + nAdded;
|
|
PSCE_REGISTRY_VALUE_INFO aNewArray;
|
|
|
|
if ( nNewCount ) {
|
|
|
|
aNewArray = (PSCE_REGISTRY_VALUE_INFO)LocalAlloc(0, nNewCount*sizeof(SCE_REGISTRY_VALUE_INFO));
|
|
if ( aNewArray ) {
|
|
ZeroMemory(aNewArray, nNewCount * sizeof(SCE_REGISTRY_VALUE_INFO));
|
|
//This is a safe usage.
|
|
memcpy( aNewArray, *paRegValues, *pCount * sizeof( SCE_REGISTRY_VALUE_INFO ) );
|
|
DWORD i;
|
|
|
|
i=0;
|
|
for ( PSCE_NAME_STATUS_LIST pns=pnsList;
|
|
pns; pns=pns->Next ) {
|
|
|
|
if ( pns->Name && i < nAdded ) {
|
|
|
|
aNewArray[*pCount+i].FullValueName = pns->Name;
|
|
pns->Name = NULL;
|
|
aNewArray[*pCount+i].Value = NULL;
|
|
aNewArray[*pCount+i].ValueType = pns->Status;
|
|
aNewArray[*pCount+i].Status = SCE_STATUS_NOT_CONFIGURED;
|
|
i++;
|
|
|
|
}
|
|
}
|
|
|
|
//
|
|
// free the original array
|
|
// all components in the array are already transferred to the new array
|
|
//
|
|
LocalFree(*paRegValues);
|
|
*pCount = nNewCount;
|
|
*paRegValues = aNewArray;
|
|
|
|
} else {
|
|
|
|
Win32Rc = ERROR_NOT_ENOUGH_MEMORY;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// free the name status list
|
|
//
|
|
SceFreeMemory(pnsList, SCE_STRUCT_NAME_STATUS_LIST);
|
|
|
|
return( Win32Rc );
|
|
|
|
}
|
|
|
|
|
|
DWORD
|
|
GetGroupStatus(
|
|
DWORD status,
|
|
int flag
|
|
)
|
|
{
|
|
|
|
DWORD NewStatus;
|
|
|
|
switch ( flag ) {
|
|
case STATUS_GROUP_RECORD:
|
|
if (status & SCE_GROUP_STATUS_NC_MEMBERS) {
|
|
|
|
NewStatus = SCE_STATUS_NOT_CONFIGURED;
|
|
|
|
} else if ( (status & SCE_GROUP_STATUS_MEMBERS_MISMATCH) ||
|
|
(status & SCE_GROUP_STATUS_MEMBEROF_MISMATCH)) {
|
|
|
|
NewStatus = SCE_STATUS_MISMATCH;
|
|
|
|
} else if (status & SCE_GROUP_STATUS_NOT_ANALYZED) {
|
|
|
|
NewStatus = SCE_STATUS_NOT_ANALYZED;
|
|
|
|
} else if (status & SCE_GROUP_STATUS_ERROR_ANALYZED) {
|
|
|
|
NewStatus = SCE_STATUS_ERROR_NOT_AVAILABLE;
|
|
|
|
} else {
|
|
NewStatus = SCE_STATUS_GOOD;
|
|
}
|
|
break;
|
|
|
|
case STATUS_GROUP_MEMBERS:
|
|
|
|
if ( status & SCE_GROUP_STATUS_NOT_ANALYZED ) {
|
|
|
|
NewStatus = SCE_STATUS_NOT_ANALYZED; //do not display any status;
|
|
|
|
} else {
|
|
if ( status & SCE_GROUP_STATUS_NC_MEMBERS ) {
|
|
|
|
NewStatus = SCE_STATUS_NOT_CONFIGURED;
|
|
|
|
} else if ( status & SCE_GROUP_STATUS_MEMBERS_MISMATCH ) {
|
|
NewStatus = SCE_STATUS_MISMATCH;
|
|
} else if (status & SCE_GROUP_STATUS_ERROR_ANALYZED) {
|
|
NewStatus = SCE_STATUS_ERROR_NOT_AVAILABLE;
|
|
|
|
} else {
|
|
NewStatus = SCE_STATUS_GOOD;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case STATUS_GROUP_MEMBEROF:
|
|
|
|
if ( status & SCE_GROUP_STATUS_NOT_ANALYZED ) {
|
|
|
|
NewStatus = SCE_STATUS_NOT_ANALYZED; // do not display any status;
|
|
|
|
} else {
|
|
if ( status & SCE_GROUP_STATUS_NC_MEMBEROF ) {
|
|
|
|
NewStatus = SCE_STATUS_NOT_CONFIGURED;
|
|
|
|
} else if ( status & SCE_GROUP_STATUS_MEMBEROF_MISMATCH ) {
|
|
NewStatus = SCE_STATUS_MISMATCH;
|
|
} else if (status & SCE_GROUP_STATUS_ERROR_ANALYZED) {
|
|
NewStatus = SCE_STATUS_ERROR_NOT_AVAILABLE;
|
|
} else {
|
|
NewStatus = SCE_STATUS_GOOD;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
NewStatus = 0;
|
|
break;
|
|
}
|
|
|
|
return NewStatus;
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: AllocGetTempFileName
|
|
//
|
|
// Synopsis: Allocate and return a string with a temporary file name.
|
|
//
|
|
// Returns: The temporary file name, or 0 if a temp file can't be found
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
LPTSTR
|
|
AllocGetTempFileName() {
|
|
DWORD dw;
|
|
CString strPath;
|
|
CString strFile;
|
|
LPTSTR szPath;
|
|
LPTSTR szFile;
|
|
|
|
//
|
|
// Get a temporary directory path in strPath
|
|
// If our buffer isn't large enough then keep reallocating until it is
|
|
//
|
|
dw = MAX_PATH;
|
|
do {
|
|
szPath = strPath.GetBuffer(dw);
|
|
dw = GetTempPath(MAX_PATH,szPath);
|
|
strPath.ReleaseBuffer();
|
|
} while (dw > (DWORD)strPath.GetLength() );
|
|
|
|
//
|
|
// Can't get a path to the temporary directory
|
|
//
|
|
if (!dw) {
|
|
return 0;
|
|
}
|
|
|
|
//
|
|
// Get a temporary file in that directory
|
|
//
|
|
szFile = strFile.GetBuffer(dw+MAX_PATH);
|
|
if (!GetTempFileName(szPath,L"SCE",0,szFile)) {
|
|
return 0;
|
|
}
|
|
strFile.ReleaseBuffer();
|
|
|
|
szFile = (LPTSTR)LocalAlloc(LPTR,(strFile.GetLength()+1)*sizeof(TCHAR));
|
|
if (!szFile) {
|
|
return 0;
|
|
}
|
|
//This is a safe usage.
|
|
lstrcpy(szFile,(LPCTSTR)strFile);
|
|
return szFile;
|
|
}
|
|
|
|
// If the given environment variable exists as the first part of the path,
|
|
// then the environment variable is inserted into the output buffer.
|
|
//
|
|
// Returns TRUE if pszResult is filled in.
|
|
//
|
|
// Example: Input -- C:\WINNT\SYSTEM32\FOO.TXT -and- lpEnvVar = %SYSTEMROOT%
|
|
// Output -- %SYSTEMROOT%\SYSTEM32\FOO.TXT
|
|
|
|
BOOL UnExpandEnvironmentString(LPCTSTR pszPath, LPCTSTR pszEnvVar, LPTSTR pszResult, UINT cbResult)
|
|
{
|
|
TCHAR szEnvVar[MAX_PATH];
|
|
if( !pszPath || !pszEnvVar || !pszResult ) //Raid #553113, yanggao.
|
|
return FALSE;
|
|
//This is not a safe usage. Make sure szEnvVar is terminated. Raid #553113, Yanggao.
|
|
memset(szEnvVar, '\0', (MAX_PATH)*sizeof(TCHAR));
|
|
DWORD dwEnvVar = ExpandEnvironmentStrings(pszEnvVar, szEnvVar, ARRAYSIZE(szEnvVar)) - 1; // don't count the NULL
|
|
|
|
if (CompareString(LOCALE_SYSTEM_DEFAULT, NORM_IGNORECASE,
|
|
szEnvVar, dwEnvVar, pszPath, dwEnvVar) == 2) {
|
|
if (lstrlen(pszPath) + dwEnvVar < cbResult) {
|
|
//This is not a safe usage. validate pszPath, dwEnvVar, pszResult.
|
|
lstrcpy(pszResult, pszEnvVar);
|
|
lstrcat(pszResult, pszPath + dwEnvVar);
|
|
return TRUE;
|
|
}
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: UnexpandEnvironmentVariables
|
|
//
|
|
// Synopsis: Given a path, contract any leading members to use matching
|
|
// environment variables, if any
|
|
//
|
|
// Arguments:
|
|
// [szPath] - The path to expand
|
|
//
|
|
// Returns: The newly allocated path (NULL if no changes are made)
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
LPTSTR
|
|
UnexpandEnvironmentVariables(LPCTSTR szPath) {
|
|
UINT cbNew;
|
|
LPTSTR szNew;
|
|
LPTSTR mszEnvVars;
|
|
LPTSTR szEnvVar;
|
|
DWORD dwEnvType;
|
|
BOOL bExpanded;
|
|
CString strKey;
|
|
CString strValueName;
|
|
|
|
CString str;
|
|
|
|
AFX_MANAGE_STATE(AfxGetStaticModuleState());
|
|
|
|
|
|
if (!strKey.LoadString(IDS_SECEDIT_KEY) ||
|
|
!strValueName.LoadString(IDS_ENV_VARS_REG_VALUE)) {
|
|
return NULL;
|
|
}
|
|
|
|
//
|
|
// Allocate memory for the new path
|
|
//
|
|
cbNew = lstrlen(szPath)+MAX_PATH+1;
|
|
szNew = (LPTSTR) LocalAlloc(LPTR,cbNew * sizeof(TCHAR));
|
|
if (!szNew) {
|
|
return NULL;
|
|
}
|
|
|
|
|
|
//
|
|
// Get Vars to expand from the registry
|
|
//
|
|
mszEnvVars = NULL;
|
|
if (ERROR_SUCCESS != MyRegQueryValue(HKEY_LOCAL_MACHINE, // hKeyRoot
|
|
strKey, // SubKey
|
|
strValueName, // ValueName
|
|
(LPVOID *)&mszEnvVars, // Value
|
|
&dwEnvType)) { // Reg Type
|
|
//
|
|
// Can't get any variables to expand
|
|
//
|
|
LocalFree(szNew);
|
|
return NULL;
|
|
}
|
|
|
|
//
|
|
// We need a multi-sz with the variables to replace in it
|
|
//
|
|
if (REG_MULTI_SZ != dwEnvType || mszEnvVars == NULL) //Bug350194, Yang Gao, 3/23/2001
|
|
{
|
|
LocalFree(szNew);
|
|
return NULL;
|
|
}
|
|
|
|
bExpanded = FALSE;
|
|
|
|
//
|
|
// Start at the beginning of the multi-sz block
|
|
//
|
|
szEnvVar = mszEnvVars;
|
|
while (*szEnvVar) {
|
|
if (UnExpandEnvironmentString(szPath,szEnvVar,szNew,cbNew)) {
|
|
//
|
|
// We can only unexpand (successfully) once
|
|
//
|
|
bExpanded = TRUE;
|
|
break;
|
|
}
|
|
//
|
|
// Advance szEnvVar to the end of this string
|
|
//
|
|
while (*szEnvVar) {
|
|
szEnvVar++;
|
|
}
|
|
//
|
|
// And the beginning of the next
|
|
//
|
|
szEnvVar++;
|
|
}
|
|
|
|
|
|
if (mszEnvVars) {
|
|
LocalFree(mszEnvVars);
|
|
}
|
|
|
|
if (!bExpanded) {
|
|
LocalFree(szNew);
|
|
szNew = NULL;
|
|
}
|
|
|
|
|
|
return szNew;
|
|
}
|
|
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: IsSystemDatabase
|
|
//
|
|
// Synopsis: Determine if a specific databse is the system database or a private one
|
|
//
|
|
// Arguments:
|
|
// [szDBPath] - The database path to check
|
|
//
|
|
// Returns: True if szDBPath is the system database, false otherwise
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
BOOL
|
|
IsSystemDatabase(LPCTSTR szDBPath) {
|
|
CString szSysDB;
|
|
BOOL bIsSysDB;
|
|
DWORD rc;
|
|
DWORD RegType;
|
|
|
|
if (!szDBPath) {
|
|
return FALSE;
|
|
}
|
|
|
|
//Raid bug 261450, Yang Gao, 3/30/2001
|
|
if (FAILED(GetSystemDatabase(&szSysDB))) {
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// We found an appropriate szSysDB, so compare it with szDBPath
|
|
//
|
|
if (lstrcmp(szDBPath,szSysDB) == 0) {
|
|
bIsSysDB = TRUE;
|
|
} else {
|
|
bIsSysDB = FALSE;
|
|
}
|
|
|
|
return bIsSysDB;
|
|
}
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: GetSystemDatabase
|
|
//
|
|
// Synopsis: Get the name of the current system database
|
|
//
|
|
// Arguments:
|
|
// [szDBPath] - [in/out] a pointer for the name of the system database
|
|
// The caller is responsible for freeing it.
|
|
//
|
|
//
|
|
// Returns: S_OK if the system database is found, otherwise an error
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
HRESULT
|
|
GetSystemDatabase(CString *szDBPath)
|
|
{
|
|
if (!szDBPath)
|
|
{
|
|
return E_INVALIDARG;
|
|
}
|
|
|
|
//Raid bug 261450, Yang Gao, 3/30/2001
|
|
CString sAppend;
|
|
sAppend.LoadString( IDS_DB_DEFAULT );
|
|
|
|
PWSTR pszPath = (LPTSTR)LocalAlloc( 0, (MAX_PATH + sAppend.GetLength() + 1) * sizeof(WCHAR));
|
|
if ( pszPath == NULL ) //Raid bug 427956, Yanggao, 7/2/2001
|
|
{
|
|
return E_FAIL;
|
|
}
|
|
if (SUCCEEDED(SHGetFolderPath(NULL, CSIDL_WINDOWS, NULL, 0, pszPath)))
|
|
{
|
|
//This is a safe usage.
|
|
wcscpy( &(pszPath[lstrlen(pszPath)]), sAppend );
|
|
*szDBPath = pszPath;
|
|
if (pszPath)
|
|
{
|
|
LocalFree(pszPath);
|
|
pszPath = NULL;
|
|
}
|
|
return S_OK;
|
|
}
|
|
|
|
if (pszPath)
|
|
{
|
|
LocalFree(pszPath);
|
|
pszPath = NULL;
|
|
}
|
|
return E_FAIL;
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: ObjectStatusToString
|
|
//
|
|
// Synopsis: Convert an object status value to a printable string
|
|
//
|
|
// Arguments:
|
|
// [status] - [in] The status value to convert
|
|
// [str] - [out] The string to store the value in
|
|
//
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
UINT
|
|
ObjectStatusToString(DWORD status, CString *strStatus) {
|
|
AFX_MANAGE_STATE(AfxGetStaticModuleState());
|
|
|
|
if ( status & SCE_STATUS_PERMISSION_MISMATCH ) {
|
|
status = IDS_MISMATCH;
|
|
} else if (status & SCE_STATUS_AUDIT_MISMATCH) {
|
|
status = IDS_MISMATCH;
|
|
} else {
|
|
status &= 0x0F;
|
|
switch(status){
|
|
case SCE_STATUS_NOT_ANALYZED:
|
|
status = IDS_NOT_ANALYZED;
|
|
break;
|
|
case SCE_STATUS_GOOD:
|
|
status = IDS_OK ;
|
|
break;
|
|
case SCE_STATUS_MISMATCH:
|
|
status = IDS_MISMATCH;
|
|
break;
|
|
case SCE_STATUS_NOT_CONFIGURED:
|
|
//
|
|
// BUG 119215: The Analysis UI should never show "Not Defined"
|
|
// for the security of existing system objects
|
|
//
|
|
status = IDS_NOT_ANALYZED;
|
|
break;
|
|
case SCE_STATUS_CHILDREN_CONFIGURED:
|
|
status = IDS_CHILDREN_CONFIGURED;
|
|
break;
|
|
case SCE_STATUS_ERROR_NOT_AVAILABLE:
|
|
status = IDS_NOT_AVAILABLE;
|
|
break;
|
|
case SCE_STATUS_NEW_SERVICE:
|
|
status = IDS_NEW_SERVICE;
|
|
break;
|
|
default:
|
|
//
|
|
// We shouldn't get here, but for some reason we keep doing so
|
|
//
|
|
status = IDS_MISMATCH;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if(strStatus){
|
|
strStatus->LoadString(status);
|
|
}
|
|
return status;
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: IsSecurityTemplate
|
|
//
|
|
// Synopsis: Validates a file to see if the file is a security template.
|
|
//
|
|
// Arguments: [pszFileName] - The full path to the file to check.
|
|
//
|
|
// Returns: FALSE if the file does not exist or is not a valid
|
|
// security template.
|
|
//
|
|
// TRUE if successful.
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
BOOL
|
|
IsSecurityTemplate(
|
|
LPCTSTR pszFileName
|
|
)
|
|
{
|
|
if(!pszFileName){
|
|
return FALSE;
|
|
}
|
|
|
|
HANDLE hProfile;
|
|
SCESTATUS rc;
|
|
|
|
//
|
|
// Open the profile.
|
|
//
|
|
rc = SceOpenProfile(
|
|
pszFileName,
|
|
SCE_INF_FORMAT,
|
|
&hProfile
|
|
);
|
|
if(rc == SCESTATUS_SUCCESS && hProfile){
|
|
|
|
PSCE_PROFILE_INFO ProfileInfo = NULL;
|
|
PSCE_ERROR_LOG_INFO ErrBuf = NULL;
|
|
|
|
//
|
|
// The profile will be validated by trying to load all the security areas.
|
|
//
|
|
rc = SceGetSecurityProfileInfo(hProfile,
|
|
SCE_ENGINE_SCP,
|
|
AREA_ALL,
|
|
&ProfileInfo,
|
|
&ErrBuf);
|
|
if(ErrBuf){
|
|
rc = SCESTATUS_INVALID_DATA;
|
|
}
|
|
|
|
//
|
|
// Free up the memory.
|
|
//
|
|
SceFreeMemory((PVOID)ErrBuf, SCE_STRUCT_ERROR_LOG_INFO);
|
|
ErrBuf = NULL;
|
|
|
|
if ( ProfileInfo != NULL ) {
|
|
SceFreeMemory((PVOID)ProfileInfo, AREA_ALL);
|
|
LocalFree(ProfileInfo);
|
|
}
|
|
SceCloseProfile(&hProfile);
|
|
|
|
//
|
|
// return TRUE if everything is successful.
|
|
//
|
|
if(rc != SCESTATUS_INVALID_DATA){
|
|
return TRUE;
|
|
}
|
|
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: WriteSprintf
|
|
//
|
|
// Synopsis: Writes formated [pszStr] to [pStm].
|
|
//
|
|
// Arguments: [pStm] - Stream to write to.
|
|
// [pszStr] - Format string to write.
|
|
// [...] - printf formating
|
|
//
|
|
// Returns: The total number of bytes written.
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
int WriteSprintf( IStream *pStm, LPCTSTR pszStr, ...)
|
|
{
|
|
TCHAR szWrite[512];
|
|
va_list marker;
|
|
va_start(marker, pszStr);
|
|
|
|
vswprintf(szWrite, pszStr, marker);
|
|
va_end(marker);
|
|
|
|
ULONG nBytesWritten;
|
|
int iLen = lstrlen(szWrite);
|
|
|
|
if(pStm){
|
|
pStm->Write( szWrite, iLen * sizeof(TCHAR), &nBytesWritten );
|
|
return nBytesWritten;
|
|
}
|
|
return iLen;
|
|
}
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: ReadSprintf
|
|
//
|
|
// Synopsis: Reads formated [pszStr] from [pStm].
|
|
// supported character switches are
|
|
// 'd' - integer pointer.
|
|
//
|
|
// Arguments: [pStm] - Stream to read from.
|
|
// [pszStr] - Format string to test.
|
|
// [...] - pointer to the types defined by format
|
|
// specification types.
|
|
//
|
|
// Returns: Total number of bytes read from the stream
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
int
|
|
ReadSprintf( IStream *pStm, LPCTSTR pszStr, ...)
|
|
{
|
|
|
|
if(!pStm || !pszStr){
|
|
return -1;
|
|
}
|
|
|
|
va_list marker;
|
|
va_start(marker, pszStr);
|
|
|
|
TCHAR szRead[256];
|
|
TCHAR szConv[512];
|
|
ULONG uRead = 0;
|
|
|
|
int i = 0;
|
|
LPCTSTR pszNext = szRead;
|
|
int iTotalRead = 0;
|
|
|
|
// Get the current seek position.
|
|
ULARGE_INTEGER liBack = { 0 };
|
|
LARGE_INTEGER liCur = { 0 };
|
|
pStm->Seek( liCur, STREAM_SEEK_CUR, &liBack);
|
|
|
|
#define INCBUFFER(sz)\
|
|
if(uRead){\
|
|
(sz)++;\
|
|
uRead--;\
|
|
} else {\
|
|
pStm->Read(szRead, 256 * sizeof(TCHAR), &uRead);\
|
|
uRead = uRead/sizeof(TCHAR);\
|
|
(sz) = szRead;\
|
|
}\
|
|
iTotalRead++;
|
|
|
|
while(*pszStr){
|
|
if(!uRead){
|
|
// Read information into buffer.
|
|
pStm->Read( szRead, 256 * sizeof(TCHAR), &uRead);
|
|
pszNext = szRead;
|
|
|
|
uRead = uRead/sizeof(TCHAR);
|
|
if(!uRead){
|
|
iTotalRead = -1;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if(*pszStr == '%'){
|
|
pszStr++;
|
|
switch( *pszStr ){
|
|
case 'd':
|
|
// read integer.
|
|
pszStr++;
|
|
i = 0;
|
|
|
|
// copy number to our own buffer.
|
|
while( (*pszNext >= L'0' && *pszNext <= L'9') ){
|
|
szConv[i++] = *pszNext;
|
|
INCBUFFER( pszNext );
|
|
}
|
|
|
|
szConv[i] = 0;
|
|
|
|
// convert string to integer.
|
|
*(va_arg(marker, int *)) = _wtol(szConv);
|
|
continue;
|
|
case 's':
|
|
pszStr++;
|
|
i = 0;
|
|
// we have to have some kind of terminating character se we will use the
|
|
// next value in pszStr.
|
|
while( *pszNext && (*pszNext != *pszStr) ){
|
|
szConv[i++] = *pszNext;
|
|
|
|
INCBUFFER( pszNext );
|
|
}
|
|
|
|
if(*pszNext == *pszStr){
|
|
INCBUFFER( pszNext );
|
|
}
|
|
|
|
// copy the string value.
|
|
szConv[i] = 0;
|
|
if( i ){
|
|
LPTSTR pNew = (LPTSTR)LocalAlloc(0, sizeof(TCHAR) * (i + 1));
|
|
if(NULL != pNew){
|
|
//This is a safe usage.
|
|
lstrcpy(pNew, szConv);
|
|
}
|
|
|
|
LPTSTR *pArg;
|
|
pArg = (va_arg(marker, LPTSTR *));
|
|
if (pArg) {
|
|
*pArg = pNew;
|
|
}
|
|
} else {
|
|
LPTSTR *pArg = va_arg(marker, LPTSTR *); //Prefast warning 269: Incorrect order of operations: dereference ignored. Comments: It is not necessary.
|
|
}
|
|
pszStr++;
|
|
continue;
|
|
}
|
|
}
|
|
// check to make sure we are at the correct position in the file.
|
|
if(*pszStr != *pszNext){
|
|
iTotalRead = -1;
|
|
break;
|
|
}
|
|
pszStr++;
|
|
|
|
// increment buffer pointer.
|
|
INCBUFFER( pszNext );
|
|
}
|
|
|
|
va_end(marker);
|
|
|
|
// Reset streem seek pointer.
|
|
liCur.LowPart = liBack.LowPart;
|
|
if(iTotalRead >= 0){
|
|
liCur.LowPart += iTotalRead * sizeof(TCHAR);
|
|
}
|
|
liCur.HighPart = liBack.HighPart;
|
|
pStm->Seek(liCur, STREAM_SEEK_SET, NULL);
|
|
|
|
return iTotalRead;
|
|
#undef INCBUFFER
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------------
|
|
// FileCreateError
|
|
//
|
|
// This function tries to create a new file use [pszFile]. It will display a
|
|
// message to the user if the file cannot be created.
|
|
//
|
|
// Arguments: [pszFile] - Full path of file to create.
|
|
// [dwFlags] - Flags
|
|
// FCE_IGNORE_FILEEXISTS - Ignore File exists error, and
|
|
// delete the file.
|
|
//
|
|
// Returns: IDYES the file can be created
|
|
// IDNo The file cannot be created
|
|
DWORD
|
|
FileCreateError(
|
|
LPCTSTR pszFile,
|
|
DWORD dwFlags
|
|
)
|
|
{
|
|
if(!pszFile){
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
HANDLE hFile;
|
|
DWORD dwErr = IDNO;
|
|
//
|
|
// Try to create the file.
|
|
//
|
|
hFile = ExpandAndCreateFile(
|
|
pszFile,
|
|
GENERIC_WRITE,
|
|
0,
|
|
NULL,
|
|
CREATE_NEW,
|
|
FILE_ATTRIBUTE_ARCHIVE,
|
|
NULL
|
|
);
|
|
if(hFile == INVALID_HANDLE_VALUE){
|
|
//
|
|
// Post error message to user.
|
|
//
|
|
dwErr = GetLastError();
|
|
LPTSTR pszErr;
|
|
CString strErr;
|
|
//This is a safe usage.
|
|
FormatMessage(
|
|
FORMAT_MESSAGE_ALLOCATE_BUFFER |
|
|
FORMAT_MESSAGE_FROM_SYSTEM,
|
|
NULL,
|
|
dwErr,
|
|
0,
|
|
(LPTSTR)&pszErr,
|
|
0,
|
|
NULL
|
|
);
|
|
|
|
strErr = pszErr;
|
|
strErr += pszFile;
|
|
|
|
if(pszErr){
|
|
LocalFree(pszErr);
|
|
}
|
|
|
|
switch(dwErr){
|
|
case ERROR_ALREADY_EXISTS:
|
|
case ERROR_FILE_EXISTS:
|
|
if( dwFlags & FCE_IGNORE_FILEEXISTS ){
|
|
dwErr = IDYES;
|
|
break;
|
|
}
|
|
//
|
|
// Confirm overwrite.
|
|
//
|
|
strErr.Format(IDS_FILE_EXISTS_FMT, pszFile);
|
|
dwErr = AfxMessageBox(
|
|
strErr,
|
|
MB_YESNO
|
|
);
|
|
break;
|
|
default:
|
|
//
|
|
// The file cannot be created.
|
|
//
|
|
AfxMessageBox(
|
|
strErr,
|
|
MB_OK
|
|
);
|
|
dwErr = IDNO;
|
|
break;
|
|
}
|
|
|
|
} else {
|
|
//
|
|
// It's OK to create the file.
|
|
//
|
|
::CloseHandle( hFile );
|
|
DeleteFile(pszFile);
|
|
|
|
dwErr = IDYES;
|
|
}
|
|
|
|
return dwErr;
|
|
}
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: IsDBCSPath
|
|
//
|
|
// Synopsis: Check if a path contains DBCS characters
|
|
//
|
|
// Arguments: [pszFile] - [in] The path to check
|
|
//
|
|
// Returns: TRUE if pszFile contains characters that can't be
|
|
// represented by a LPSTR
|
|
//
|
|
// FALSE if pszFile only contains characters that can
|
|
// be represented by a LPSTR
|
|
//
|
|
//
|
|
//+--------------------------------------------------------------------------
|
|
BOOL
|
|
IsDBCSPath(LPCTSTR szWideFile) {
|
|
while(*szWideFile) {
|
|
if (*szWideFile >= 256) {
|
|
return TRUE;
|
|
}
|
|
szWideFile++;
|
|
}
|
|
return FALSE;
|
|
|
|
/*
|
|
LPSTR szMBFile;
|
|
int nMBFile;
|
|
BOOL bUsedDefaultChar = FALSE;
|
|
|
|
nMBFile = sizeof(LPSTR)*(lstrlen(szWideFile));
|
|
szMBFile = (LPSTR)LocalAlloc(LPTR,nMBFile+1);
|
|
|
|
if (szMBFile) {
|
|
WideCharToMultiByte( CP_ACP,
|
|
0,
|
|
szWideFile,
|
|
-1,
|
|
szMBFile,
|
|
nMBFile,
|
|
NULL,
|
|
&bUsedDefaultChar);
|
|
|
|
LocalFree(szMBFile);
|
|
}
|
|
|
|
return bUsedDefaultChar;
|
|
*/
|
|
}
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: GetSeceditHelpFilename
|
|
//
|
|
// Synopsis: Return the fully qualified path the help file for Secedit
|
|
//
|
|
// Arguments: None
|
|
//
|
|
// Returns: a CString containing the fully qualified help file name.
|
|
//
|
|
//
|
|
//+--------------------------------------------------------------------------
|
|
CString GetSeceditHelpFilename()
|
|
{
|
|
static CString helpFileName;
|
|
|
|
if ( helpFileName.IsEmpty () )
|
|
{
|
|
UINT result = ::GetSystemWindowsDirectory (
|
|
helpFileName.GetBufferSetLength (MAX_PATH+1), MAX_PATH);
|
|
ASSERT(result != 0 && result <= MAX_PATH); //Bogus assert. Yanggao.
|
|
helpFileName.ReleaseBuffer ();
|
|
|
|
helpFileName += L"\\help\\wsecedit.hlp";
|
|
}
|
|
|
|
return helpFileName;
|
|
}
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: GetGpeditHelpFilename
|
|
//
|
|
// Synopsis: Return the fully qualified path the help file for Secedit
|
|
//
|
|
// Arguments: None
|
|
//
|
|
// Returns: a CString containing the fully qualified help file name.
|
|
//
|
|
//
|
|
//+--------------------------------------------------------------------------
|
|
CString GetGpeditHelpFilename()
|
|
{
|
|
static CString helpFileName;
|
|
|
|
if ( helpFileName.IsEmpty () )
|
|
{
|
|
UINT result = ::GetSystemWindowsDirectory (
|
|
helpFileName.GetBufferSetLength (MAX_PATH+1), MAX_PATH);
|
|
ASSERT(result != 0 && result <= MAX_PATH); //Bogus Assert. Yanggao.
|
|
helpFileName.ReleaseBuffer ();
|
|
|
|
helpFileName += L"\\help\\gpedit.hlp";
|
|
}
|
|
|
|
return helpFileName;
|
|
}
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: ExpandEnvironmentStringWrapper
|
|
//
|
|
// Synopsis: Takes an LPTSTR and expands the enviroment variables in it
|
|
//
|
|
// Arguments: Pointer to the string to expand.
|
|
//
|
|
// Returns: a CString containing the fully expanded string.
|
|
//
|
|
//+--------------------------------------------------------------------------
|
|
CString ExpandEnvironmentStringWrapper(LPCTSTR psz)
|
|
{
|
|
LPTSTR pszBuffer = NULL;
|
|
DWORD dwExpanded = 0;
|
|
CString sz;
|
|
|
|
dwExpanded = ExpandEnvironmentStrings(psz, NULL, 0);
|
|
|
|
pszBuffer = sz.GetBuffer(dwExpanded);
|
|
ExpandEnvironmentStrings(psz, pszBuffer, dwExpanded);
|
|
sz.ReleaseBuffer();
|
|
|
|
return (sz);
|
|
}
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: ExpandAndCreateFile
|
|
//
|
|
// Synopsis: Just does a normal CreateFile(), but expands the filename before
|
|
// creating the file.
|
|
//
|
|
// Arguments: Same as CreateFile().
|
|
//
|
|
// Returns: HANDLE to the created file.
|
|
//
|
|
//+--------------------------------------------------------------------------
|
|
HANDLE WINAPI ExpandAndCreateFile (
|
|
LPCTSTR lpFileName,
|
|
DWORD dwDesiredAccess,
|
|
DWORD dwShareMode,
|
|
LPSECURITY_ATTRIBUTES lpSecurityAttributes,
|
|
DWORD dwCreationDisposition,
|
|
DWORD dwFlagsAndAttributes,
|
|
HANDLE hTemplateFile
|
|
)
|
|
{
|
|
HANDLE hRet = INVALID_HANDLE_VALUE;
|
|
CString sz;
|
|
|
|
sz = ExpandEnvironmentStringWrapper(lpFileName);
|
|
//This is a safe usage. sz is full path.
|
|
return (CreateFile(
|
|
sz,
|
|
dwDesiredAccess,
|
|
dwShareMode,
|
|
lpSecurityAttributes,
|
|
dwCreationDisposition,
|
|
dwFlagsAndAttributes,
|
|
hTemplateFile));
|
|
}
|
|
|
|
//**********************************************************************
|
|
//
|
|
// FUNCTION: IsAdmin - This function checks the token of the
|
|
// calling thread to see if the caller belongs to
|
|
// the Administrators group.
|
|
//
|
|
// PARAMETERS: none
|
|
//
|
|
// RETURN VALUE: TRUE if the caller is an administrator on the local
|
|
// machine. Otherwise, FALSE.
|
|
//
|
|
//**********************************************************************
|
|
|
|
BOOL IsAdmin(void) {
|
|
|
|
HANDLE hAccessToken = NULL;
|
|
PTOKEN_GROUPS ptgGroups = NULL;
|
|
DWORD cbGroups = 0;
|
|
PSID psidAdmin = NULL;
|
|
UINT i;
|
|
|
|
SID_IDENTIFIER_AUTHORITY siaNtAuthority = SECURITY_NT_AUTHORITY;
|
|
|
|
// assume the caller is not an administrator
|
|
BOOL bIsAdmin = FALSE;
|
|
|
|
__try {
|
|
|
|
if (!OpenThreadToken(GetCurrentThread(), TOKEN_QUERY, TRUE,
|
|
&hAccessToken)) {
|
|
|
|
if (GetLastError() != ERROR_NO_TOKEN)
|
|
__leave;
|
|
|
|
// retry against process token if no thread token exists
|
|
if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY,
|
|
&hAccessToken))
|
|
__leave;
|
|
}
|
|
|
|
// determine required size of buffer for token information
|
|
if (GetTokenInformation(hAccessToken, TokenGroups, NULL, 0,
|
|
&cbGroups)) {
|
|
|
|
// call should have failed due to zero-length buffer
|
|
__leave;
|
|
|
|
} else {
|
|
|
|
// call should have failed due to zero-length buffer
|
|
if (GetLastError() != ERROR_INSUFFICIENT_BUFFER)
|
|
__leave;
|
|
}
|
|
|
|
// allocate a buffer to hold the token groups
|
|
ptgGroups = (PTOKEN_GROUPS) HeapAlloc(GetProcessHeap(), 0,
|
|
cbGroups);
|
|
if (!ptgGroups)
|
|
__leave;
|
|
|
|
// call GetTokenInformation() again to actually retrieve the groups
|
|
if (!GetTokenInformation(hAccessToken, TokenGroups, ptgGroups,
|
|
cbGroups, &cbGroups))
|
|
__leave;
|
|
|
|
// create a SID for the local administrators group
|
|
// This is a safe usage.
|
|
if (!AllocateAndInitializeSid(&siaNtAuthority, 2,
|
|
SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS,
|
|
0, 0, 0, 0, 0, 0, &psidAdmin))
|
|
__leave;
|
|
|
|
// scan the token's groups and compare the SIDs to the admin SID
|
|
for (i = 0; i < ptgGroups->GroupCount; i++) {
|
|
//This is a safe usage. psidAdmin is a local admin SID.
|
|
if (EqualSid(psidAdmin, ptgGroups->Groups[i].Sid)) {
|
|
bIsAdmin = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
} __finally {
|
|
|
|
// free resources
|
|
if (hAccessToken)
|
|
CloseHandle(hAccessToken);
|
|
|
|
if (ptgGroups)
|
|
HeapFree(GetProcessHeap(), 0, ptgGroups);
|
|
|
|
if (psidAdmin)
|
|
FreeSid(psidAdmin);
|
|
}
|
|
|
|
return bIsAdmin;
|
|
}
|
|
|
|
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: MultiSZToSZ
|
|
//
|
|
// Synopsis: Converts a multiline string to a comma delimited normal string
|
|
//
|
|
// Returns: The converted string
|
|
//
|
|
//+--------------------------------------------------------------------------
|
|
PWSTR MultiSZToSZ(PCWSTR sz)
|
|
{
|
|
PWSTR szOut = NULL;
|
|
|
|
ASSERT(sz);
|
|
if (!sz)
|
|
{
|
|
return NULL;
|
|
}
|
|
//Bug 349000, Yang Gao, 3/23/2001
|
|
long i = 0;
|
|
long j = 0;
|
|
while( L'\0' != sz[i] )
|
|
{
|
|
if( L',' == sz[i] )
|
|
j++;
|
|
i++;
|
|
}
|
|
|
|
szOut = (PWSTR) LocalAlloc(LPTR,(lstrlen(sz)+j*2+1)*sizeof(wchar_t)); //Raid #376228, 4/25/2001
|
|
if (!szOut)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
BOOL newline = FALSE; //raid #464335, Yang Gao, 9/7/2001
|
|
for(i=0,j=0; sz[i] != L'\0'; i++)
|
|
{
|
|
if( L'\n' == sz[i] )
|
|
{
|
|
if( newline )
|
|
{
|
|
szOut[j++] = MULTISZ_DELIMITER;
|
|
}
|
|
newline = FALSE;
|
|
continue;
|
|
}
|
|
|
|
if( L'\r' == sz[i] )
|
|
{
|
|
continue; // ignore it
|
|
}
|
|
|
|
if( L' ' == sz[i] && !newline ) //raid #464335, Yang Gao, 9/7/2001
|
|
{
|
|
continue; //delete it if it occurs before any char of each line.
|
|
}
|
|
newline = TRUE;
|
|
|
|
if( L',' == sz[i] )
|
|
{
|
|
szOut[j++] = MULTISZ_QUOTE;
|
|
szOut[j++] = sz[i];
|
|
szOut[j++] = MULTISZ_QUOTE;
|
|
continue;
|
|
}
|
|
|
|
szOut[j++] = sz[i];
|
|
}
|
|
|
|
return szOut;
|
|
}
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: SZToMultiSZ
|
|
//
|
|
// Synopsis: Converts a comma delimited string to a multiline string
|
|
//
|
|
// Returns: The converted string
|
|
//
|
|
//+--------------------------------------------------------------------------
|
|
PWSTR SZToMultiSZ(PCWSTR sz)
|
|
{
|
|
PWSTR szOut = NULL;
|
|
|
|
ASSERT(sz);
|
|
if (!sz)
|
|
{
|
|
return NULL;
|
|
}
|
|
//
|
|
// Calculate the length of the expanded string
|
|
//
|
|
int cSZ = 0;
|
|
for (int i = 0;sz[i] != L'\0'; i++)
|
|
{
|
|
if (MULTISZ_DELIMITER == sz[i])
|
|
{
|
|
//
|
|
// Delimiter expands into an extra character so count it twice
|
|
//
|
|
cSZ++;
|
|
}
|
|
cSZ++;
|
|
}
|
|
|
|
szOut = (PWSTR) LocalAlloc(LPTR,(cSZ+1)*sizeof(wchar_t));
|
|
if (!szOut)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
BOOL qflag = FALSE;
|
|
for(int i=0, c=0; sz[i] != L'\0'; i++)
|
|
{
|
|
//Bug 349000, Yang Gao, 3/23/2001
|
|
if( MULTISZ_QUOTE == sz[i] && MULTISZ_DELIMITER == sz[i+1] )
|
|
{
|
|
qflag = TRUE;
|
|
continue;
|
|
}
|
|
if( MULTISZ_DELIMITER == sz[i] && MULTISZ_QUOTE == sz[i+1] && qflag )
|
|
{
|
|
szOut[c++] = sz[i];
|
|
i++;
|
|
qflag = FALSE;
|
|
continue;
|
|
}
|
|
qflag = FALSE;
|
|
if (MULTISZ_DELIMITER == sz[i])
|
|
{
|
|
szOut[c++] = L'\r';
|
|
szOut[c++] = L'\n';
|
|
}
|
|
else
|
|
{
|
|
szOut[c++] = sz[i];
|
|
}
|
|
}
|
|
|
|
return szOut;
|
|
}
|
|
|
|
//+--------------------------------------------------------------------------
|
|
//
|
|
// Function: MultiSZToDisp
|
|
//
|
|
// Synopsis: Converts a comma delimited multiline string to a display string
|
|
//
|
|
// Returns: The converted string
|
|
// Bug 349000, Yang Gao, 3/23/2001
|
|
//+--------------------------------------------------------------------------
|
|
void MultiSZToDisp(PCWSTR sz, CString &pszOut)
|
|
{
|
|
|
|
ASSERT(sz);
|
|
if (!sz)
|
|
{
|
|
return;
|
|
}
|
|
//
|
|
// Calculate the length of the expanded string
|
|
//
|
|
int cSZ = 0;
|
|
for (int i = 0;sz[i] != L'\0'; i++)
|
|
{
|
|
if (MULTISZ_DELIMITER == sz[i])
|
|
{
|
|
//
|
|
// Delimiter expands into an extra character so count it twice
|
|
//
|
|
cSZ++;
|
|
}
|
|
cSZ++;
|
|
}
|
|
|
|
PWSTR szOut;
|
|
szOut = (PWSTR) LocalAlloc(LPTR,(cSZ+1)*sizeof(wchar_t));
|
|
if (!szOut)
|
|
{
|
|
return;
|
|
}
|
|
|
|
BOOL qflag = FALSE;
|
|
for(int i=0, c=0; sz[i] != L'\0'; i++)
|
|
{
|
|
if( MULTISZ_QUOTE == sz[i] && MULTISZ_DELIMITER == sz[i+1] )
|
|
{
|
|
qflag = TRUE;
|
|
continue;
|
|
}
|
|
if( MULTISZ_DELIMITER == sz[i] && MULTISZ_QUOTE == sz[i+1] && qflag )
|
|
{
|
|
szOut[c++] = sz[i];
|
|
i++;
|
|
qflag = FALSE;
|
|
continue;
|
|
}
|
|
qflag = FALSE;
|
|
szOut[c++] = sz[i];
|
|
}
|
|
|
|
pszOut = szOut;
|
|
LocalFree(szOut);
|
|
|
|
return;
|
|
}
|
|
|
|
SCE_PROFILE_INFO *g_pDefaultTemplate = NULL;
|
|
|
|
SCE_PROFILE_INFO *
|
|
GetDefaultTemplate() {
|
|
SCE_PROFILE_INFO *pspi = NULL;
|
|
DWORD RegType = 0;
|
|
SCESTATUS rc = 0;
|
|
LPTSTR szInfFile = NULL;
|
|
PVOID pHandle = NULL;
|
|
|
|
if (g_pDefaultTemplate) {
|
|
return g_pDefaultTemplate;
|
|
}
|
|
|
|
rc = MyRegQueryValue(HKEY_LOCAL_MACHINE,
|
|
SCE_REGISTRY_KEY,
|
|
SCE_REGISTRY_DEFAULT_TEMPLATE,
|
|
(PVOID *)&szInfFile,
|
|
&RegType );
|
|
|
|
if (ERROR_SUCCESS != rc) {
|
|
if (szInfFile) {
|
|
LocalFree(szInfFile);
|
|
szInfFile = NULL;
|
|
}
|
|
return NULL;
|
|
}
|
|
if (EngineOpenProfile(szInfFile,OPEN_PROFILE_CONFIGURE,&pHandle) != SCESTATUS_SUCCESS) {
|
|
LocalFree(szInfFile);
|
|
szInfFile = NULL;
|
|
return NULL;
|
|
}
|
|
LocalFree(szInfFile);
|
|
szInfFile = NULL;
|
|
rc = SceGetSecurityProfileInfo(pHandle,
|
|
SCE_ENGINE_SCP,
|
|
AREA_ALL,
|
|
&pspi,
|
|
NULL
|
|
);
|
|
|
|
SceCloseProfile(&pHandle);
|
|
if (SCESTATUS_SUCCESS != rc) {
|
|
//
|
|
// expand registry value section based on registry values list on local machine
|
|
//
|
|
|
|
SceRegEnumAllValues(
|
|
&(pspi->RegValueCount),
|
|
&(pspi->aRegValues)
|
|
);
|
|
|
|
|
|
#define PD(X,Y) if (pspi->X == SCE_NO_VALUE) { pspi->X = Y; }
|
|
PD(MaximumPasswordAge,MAX_PASS_AGE_DEFAULT)
|
|
PD(MinimumPasswordAge,MIN_PASS_AGE_DEFAULT)
|
|
PD(MinimumPasswordLength,MIN_PASS_LENGTH_DEFAULT)
|
|
PD(PasswordHistorySize,PASS_HISTORY_SIZE_DEFAULT)
|
|
PD(PasswordComplexity,PASS_COMPLEXITY_DEFAULT)
|
|
PD(RequireLogonToChangePassword,REQUIRE_LOGIN_DEFAULT)
|
|
PD(LockoutBadCount,LOCKOUT_BAD_COUNT_DEFAULT)
|
|
PD(ResetLockoutCount,RESET_LOCKOUT_COUNT_DEFAULT)
|
|
PD(LockoutDuration,LOCKOUT_DURATION_DEFAULT)
|
|
PD(AuditSystemEvents,AUDIT_SYSTEM_EVENTS_DEFAULT)
|
|
PD(AuditLogonEvents,AUDIT_LOGON_EVENTS_DEFAULT)
|
|
PD(AuditObjectAccess,AUDIT_OBJECT_ACCESS_DEFAULT)
|
|
PD(AuditPrivilegeUse,AUDIT_PRIVILEGE_USE_DEFAULT)
|
|
PD(AuditPolicyChange,AUDIT_POLICY_CHANGE_DEFAULT)
|
|
PD(AuditAccountManage,AUDIT_ACCOUNT_MANAGE_DEFAULT)
|
|
PD(AuditProcessTracking,AUDIT_PROCESS_TRACKING_DEFAULT)
|
|
PD(AuditDSAccess,AUDIT_DS_ACCESS_DEFAULT)
|
|
PD(AuditAccountLogon,AUDIT_ACCOUNT_LOGON_DEFAULT)
|
|
PD(ForceLogoffWhenHourExpire,FORCE_LOGOFF_DEFAULT)
|
|
PD(EnableAdminAccount,ENABLE_ADMIN_DEFAULT)
|
|
PD(EnableGuestAccount,ENABLE_GUEST_DEFAULT)
|
|
PD(LSAAnonymousNameLookup,LSA_ANON_LOOKUP_DEFAULT)
|
|
PD(MaximumLogSize[EVENT_TYPE_SYSTEM],SYS_MAX_LOG_SIZE_DEFAULT)
|
|
PD(MaximumLogSize[EVENT_TYPE_APP],APP_MAX_LOG_SIZE_DEFAULT)
|
|
PD(MaximumLogSize[EVENT_TYPE_SECURITY],SEC_MAX_LOG_SIZE_DEFAULT)
|
|
PD(AuditLogRetentionPeriod[EVENT_TYPE_SYSTEM],SYS_LOG_RETENTION_PERIOD_DEFAULT)
|
|
PD(AuditLogRetentionPeriod[EVENT_TYPE_APP],APP_LOG_RETENTION_PERIOD_DEFAULT)
|
|
PD(AuditLogRetentionPeriod[EVENT_TYPE_SECURITY],SEC_LOG_RETENTION_PERIOD_DEFAULT)
|
|
PD(RetentionDays[EVENT_TYPE_APP],APP_LOG_RETENTION_DAYS_DEFAULT)
|
|
PD(RetentionDays[EVENT_TYPE_SYSTEM],SYS_LOG_RETENTION_DAYS_DEFAULT)
|
|
PD(RetentionDays[EVENT_TYPE_SECURITY],SEC_LOG_RETENTION_DAYS_DEFAULT)
|
|
PD(RestrictGuestAccess[EVENT_TYPE_APP],APP_RESTRICT_GUEST_ACCESS_DEFAULT)
|
|
PD(RestrictGuestAccess[EVENT_TYPE_SYSTEM],SYS_RESTRICT_GUEST_ACCESS_DEFAULT)
|
|
PD(RestrictGuestAccess[EVENT_TYPE_SECURITY],SEC_RESTRICT_GUEST_ACCESS_DEFAULT)
|
|
|
|
if (pspi->pFiles.pAllNodes->Count == 0) {
|
|
DWORD SDSize = 0;
|
|
pspi->pFiles.pAllNodes->Count = 1;
|
|
pspi->pFiles.pAllNodes->pObjectArray[0] =
|
|
(PSCE_OBJECT_SECURITY) LocalAlloc(LPTR,sizeof(SCE_OBJECT_SECURITY));
|
|
if (pspi->pFiles.pAllNodes->pObjectArray[0]) {
|
|
SceSvcConvertTextToSD (
|
|
FILE_SYSTEM_SECURITY_DEFAULT,
|
|
&(pspi->pFiles.pAllNodes->pObjectArray[0]->pSecurityDescriptor),
|
|
&SDSize,
|
|
&(pspi->pFiles.pAllNodes->pObjectArray[0]->SeInfo)
|
|
);
|
|
}
|
|
}
|
|
|
|
if (pspi->pRegistryKeys.pAllNodes->Count == 0) {
|
|
DWORD SDSize = 0;
|
|
pspi->pRegistryKeys.pAllNodes->Count = 1;
|
|
pspi->pRegistryKeys.pAllNodes->pObjectArray[0] =
|
|
(PSCE_OBJECT_SECURITY) LocalAlloc(LPTR,sizeof(SCE_OBJECT_SECURITY));
|
|
if (pspi->pRegistryKeys.pAllNodes->pObjectArray[0]) {
|
|
SceSvcConvertTextToSD (
|
|
REGISTRY_SECURITY_DEFAULT,
|
|
&(pspi->pRegistryKeys.pAllNodes->pObjectArray[0]->pSecurityDescriptor),
|
|
&SDSize,
|
|
&(pspi->pRegistryKeys.pAllNodes->pObjectArray[0]->SeInfo)
|
|
);
|
|
}
|
|
}
|
|
|
|
if (pspi->pServices->General.pSecurityDescriptor == NULL) {
|
|
DWORD SDSize = 0;
|
|
SceSvcConvertTextToSD (
|
|
SERVICE_SECURITY_DEFAULT,
|
|
&(pspi->pServices->General.pSecurityDescriptor),
|
|
&SDSize,
|
|
&(pspi->pServices->SeInfo)
|
|
);
|
|
}
|
|
}
|
|
g_pDefaultTemplate = pspi;
|
|
return pspi;
|
|
}
|
|
|
|
|
|
HRESULT
|
|
GetDefaultFileSecurity(PSECURITY_DESCRIPTOR *ppSD,
|
|
SECURITY_INFORMATION *pSeInfo) {
|
|
SCE_PROFILE_INFO *pspi = NULL;
|
|
|
|
ASSERT(ppSD);
|
|
ASSERT(pSeInfo);
|
|
if (!ppSD || !pSeInfo) {
|
|
return E_INVALIDARG;
|
|
}
|
|
|
|
pspi = GetDefaultTemplate();
|
|
*ppSD = NULL;
|
|
*pSeInfo = 0;
|
|
|
|
if (!pspi) {
|
|
return E_FAIL;
|
|
}
|
|
if (!pspi->pFiles.pAllNodes) {
|
|
return E_FAIL;
|
|
}
|
|
if (pspi->pFiles.pAllNodes->Count == 0) {
|
|
return E_FAIL;
|
|
}
|
|
*pSeInfo = pspi->pFiles.pAllNodes->pObjectArray[0]->SeInfo;
|
|
|
|
return MyMakeSelfRelativeSD(pspi->pFiles.pAllNodes->pObjectArray[0]->pSecurityDescriptor,
|
|
ppSD);
|
|
}
|
|
|
|
HRESULT
|
|
GetDefaultRegKeySecurity(PSECURITY_DESCRIPTOR *ppSD,
|
|
SECURITY_INFORMATION *pSeInfo) {
|
|
SCE_PROFILE_INFO *pspi = NULL;
|
|
|
|
ASSERT(ppSD);
|
|
ASSERT(pSeInfo);
|
|
if (!ppSD || !pSeInfo) {
|
|
return E_INVALIDARG;
|
|
}
|
|
|
|
pspi = GetDefaultTemplate();
|
|
*ppSD = NULL;
|
|
*pSeInfo = 0;
|
|
|
|
if (!pspi) {
|
|
return E_FAIL;
|
|
}
|
|
if (!pspi->pRegistryKeys.pAllNodes) {
|
|
return E_FAIL;
|
|
}
|
|
if (pspi->pRegistryKeys.pAllNodes->Count == 0) {
|
|
return E_FAIL;
|
|
}
|
|
*pSeInfo = pspi->pRegistryKeys.pAllNodes->pObjectArray[0]->SeInfo;
|
|
|
|
return MyMakeSelfRelativeSD(pspi->pRegistryKeys.pAllNodes->pObjectArray[0]->pSecurityDescriptor,
|
|
ppSD);
|
|
}
|
|
|
|
HRESULT
|
|
GetDefaultServiceSecurity(PSECURITY_DESCRIPTOR *ppSD,
|
|
SECURITY_INFORMATION *pSeInfo) {
|
|
SCE_PROFILE_INFO *pspi = NULL;
|
|
|
|
ASSERT(ppSD);
|
|
ASSERT(pSeInfo);
|
|
if (!ppSD || !pSeInfo) {
|
|
return E_INVALIDARG;
|
|
}
|
|
|
|
pspi = GetDefaultTemplate();
|
|
*ppSD = NULL;
|
|
*pSeInfo = 0;
|
|
|
|
if (!pspi) {
|
|
return E_FAIL;
|
|
}
|
|
if (!pspi->pServices) {
|
|
return E_FAIL;
|
|
}
|
|
*pSeInfo = pspi->pServices->SeInfo;
|
|
|
|
return MyMakeSelfRelativeSD(pspi->pServices->General.pSecurityDescriptor,
|
|
ppSD);
|
|
}
|
|
|
|
|
|
BOOL
|
|
GetSecureWizardName(
|
|
OUT LPTSTR *ppstrPathName OPTIONAL,
|
|
OUT LPTSTR *ppstrDisplayName OPTIONAL
|
|
)
|
|
{
|
|
BOOL b=FALSE;
|
|
|
|
if ( ppstrPathName == NULL && ppstrDisplayName == NULL) return FALSE;
|
|
|
|
if ( ppstrPathName )
|
|
*ppstrPathName = NULL;
|
|
|
|
if ( ppstrDisplayName )
|
|
*ppstrDisplayName = NULL;
|
|
|
|
|
|
#define SCE_WIZARD_PATH SCE_ROOT_PATH TEXT("\\Wizard")
|
|
|
|
DWORD rc;
|
|
DWORD RegType;
|
|
LPVOID pValue=NULL;
|
|
PWSTR pPathName = NULL;
|
|
|
|
rc = MyRegQueryValue(HKEY_LOCAL_MACHINE,
|
|
SCE_WIZARD_PATH,
|
|
TEXT("Path"),
|
|
&pValue,
|
|
&RegType
|
|
);
|
|
|
|
if ( ERROR_SUCCESS == rc && pValue &&
|
|
(RegType == REG_SZ ||
|
|
RegType == REG_EXPAND_SZ) ) {
|
|
|
|
|
|
if ( RegType == REG_EXPAND_SZ ) {
|
|
//
|
|
// Expand the environment variable
|
|
//
|
|
DWORD dSize = ExpandEnvironmentStrings((LPTSTR)pValue, NULL, 0);
|
|
|
|
if ( dSize > 0 ) {
|
|
pPathName = (PWSTR)LocalAlloc(LPTR, (dSize+1)*sizeof(WCHAR));
|
|
|
|
if ( pPathName ) {
|
|
|
|
ExpandEnvironmentStrings((LPTSTR)pValue, pPathName, dSize);
|
|
|
|
} else {
|
|
LocalFree(pValue);
|
|
return FALSE;
|
|
}
|
|
|
|
} else {
|
|
|
|
LocalFree(pValue);
|
|
return FALSE;
|
|
}
|
|
|
|
} else {
|
|
|
|
//
|
|
// just simply take the string
|
|
//
|
|
pPathName = (LPTSTR)pValue;
|
|
pValue = NULL;
|
|
}
|
|
|
|
if ( ppstrDisplayName ) {
|
|
//
|
|
// now query the display name (menu name) from the binary
|
|
// binary name is stored in pPathName (can't be NULL)
|
|
//
|
|
DWORD dwHandle=0;
|
|
|
|
DWORD dwSize = GetFileVersionInfoSize(pPathName, &dwHandle);
|
|
|
|
if ( dwSize > 0 ) {
|
|
|
|
LPVOID pBuffer = (LPVOID)LocalAlloc(LPTR, dwSize+1);
|
|
|
|
if ( pBuffer ) {
|
|
if ( GetFileVersionInfo(pPathName, 0, dwSize, pBuffer) ) {
|
|
|
|
PVOID lpInfo = 0;
|
|
UINT cch = 0;
|
|
CString key;
|
|
WCHAR szBuffer[10];
|
|
CString keyBase;
|
|
//This is a safe usage.
|
|
wsprintf (szBuffer, L"%04X", GetUserDefaultLangID ());
|
|
wcscat (szBuffer, L"04B0");
|
|
|
|
keyBase = L"\\StringFileInfo\\";
|
|
keyBase += szBuffer;
|
|
keyBase += L"\\";
|
|
|
|
|
|
key = keyBase + L"FileDescription";
|
|
if ( VerQueryValue (pBuffer, const_cast <PWSTR>((PCWSTR) key), &lpInfo, &cch) ) {
|
|
|
|
*ppstrDisplayName = (PWSTR)LocalAlloc(LPTR,(cch+1)*sizeof(WCHAR));
|
|
if ( *ppstrDisplayName ) {
|
|
//This may not be a safe usage. ppstrDisplayName is PTSTR. Consider fix.
|
|
wcscpy(*ppstrDisplayName, (PWSTR)lpInfo);
|
|
|
|
b=TRUE;
|
|
}
|
|
}
|
|
}
|
|
|
|
LocalFree(pBuffer);
|
|
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// get the binary name
|
|
//
|
|
if ( ppstrPathName ) {
|
|
*ppstrPathName = pPathName;
|
|
pPathName = NULL;
|
|
|
|
b=TRUE;
|
|
}
|
|
|
|
}
|
|
|
|
if ( pPathName && (pPathName != pValue ) ) {
|
|
LocalFree(pPathName);
|
|
}
|
|
|
|
if ( pValue ) {
|
|
LocalFree(pValue);
|
|
}
|
|
|
|
return b;
|
|
}
|
|
|
|
BOOL IsValidFileName(CString& str)
|
|
{
|
|
CString text;
|
|
CString charsWithSpaces;
|
|
UINT nIndex = 0;
|
|
|
|
PCWSTR szInvalidCharSet = ILLEGAL_FILENAME_CHARS;
|
|
|
|
if( str == L'.' || str == L"..") //Raid #617915, Yanggao
|
|
return FALSE;
|
|
|
|
if( -1 != str.FindOneOf(szInvalidCharSet) )
|
|
{
|
|
while (szInvalidCharSet[nIndex])
|
|
{
|
|
charsWithSpaces += szInvalidCharSet[nIndex];
|
|
charsWithSpaces += L" ";
|
|
nIndex++;
|
|
}
|
|
//This is a sage usage.
|
|
text.FormatMessage (IDS_INVALID_FILENAME, charsWithSpaces);
|
|
|
|
AfxMessageBox(text, MB_OK|MB_ICONEXCLAMATION);
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//Raid 484084, Yanggao, 10/24/2001
|
|
int strlength = str.GetLength();
|
|
if( 1==strlength && (str.GetAt(0) == L'/' || str.GetAt(0) == L'\\') )
|
|
{
|
|
szInvalidCharSet = ILLEGAL_FILENAME_CHARS2; //Raid #526397, 2/26/2002, yanggao
|
|
while (szInvalidCharSet[nIndex])
|
|
{
|
|
charsWithSpaces += szInvalidCharSet[nIndex];
|
|
charsWithSpaces += L" ";
|
|
nIndex++;
|
|
}
|
|
//This is a safe usage.
|
|
text.FormatMessage (IDS_INVALID_FILENAMEPATH, charsWithSpaces);
|
|
AfxMessageBox(text, MB_OK|MB_ICONEXCLAMATION);
|
|
return FALSE;
|
|
}
|
|
int pos1 = str.Find(L"\\\\");
|
|
int pos2 = str.Find(L"//");
|
|
int pos3 = str.Find(L"\\/");
|
|
int pos4 = str.Find(L"/\\");
|
|
if( pos1>=0 || pos2>=0 || pos3>=0 || pos4>=0 ) //Raid #498480, yanggao, do not accept "\\".
|
|
{
|
|
szInvalidCharSet = ILLEGAL_FILENAME_CHARS1;
|
|
while (szInvalidCharSet[nIndex])
|
|
{
|
|
charsWithSpaces += szInvalidCharSet[nIndex];
|
|
charsWithSpaces += L" ";
|
|
nIndex++;
|
|
}
|
|
//This is a safe usage.
|
|
text.FormatMessage (IDS_INVALID_FILENAME, charsWithSpaces);
|
|
AfxMessageBox(text, MB_OK|MB_ICONEXCLAMATION);
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
///////////////////////////////////////////////////////////////////
|
|
//Raid #533432, yanggao, 4/3/2002
|
|
//Currently pextension should include '.'
|
|
///////////////////////////////////////////////////////////////////
|
|
#define IsDigit(c) ((c) >= L'0' && c <= L'9')
|
|
BOOL IsNameReserved(LPCWSTR pszName, LPCWSTR pextension)
|
|
{
|
|
static const WCHAR *rgszPorts3[] = {
|
|
TEXT("NUL"),
|
|
TEXT("PRN"),
|
|
TEXT("CON"),
|
|
TEXT("AUX"),
|
|
};
|
|
|
|
static const WCHAR *rgszPorts4[] = {
|
|
TEXT("LPT"), // LPT#
|
|
TEXT("COM"), // COM#
|
|
};
|
|
|
|
if( !pszName || !pextension )
|
|
return FALSE;
|
|
|
|
CString sz = pszName;
|
|
CString tempsz = pextension;
|
|
if( _wcsicmp(sz.Right(tempsz.GetLength()), tempsz) == 0 ) //Remove extension
|
|
{
|
|
tempsz = sz.Left(sz.GetLength() - tempsz.GetLength());
|
|
}
|
|
else
|
|
{
|
|
tempsz = sz;
|
|
}
|
|
|
|
int cch = tempsz.ReverseFind(L'\\'); //Remove path
|
|
int iMax = tempsz.ReverseFind(L'/');
|
|
if( cch < iMax )
|
|
{
|
|
cch = iMax;
|
|
}
|
|
if( cch >= 0 )
|
|
{
|
|
cch = tempsz.GetLength() - cch - 1;
|
|
sz = tempsz.Right(cch);
|
|
}
|
|
else
|
|
{
|
|
sz = tempsz;
|
|
}
|
|
|
|
LPCTSTR* rgszPorts = rgszPorts3;
|
|
cch = sz.GetLength();
|
|
tempsz = sz;
|
|
|
|
iMax = ARRAYSIZE(rgszPorts3);
|
|
if (cch == 4 && IsDigit(sz.GetAt(3)))
|
|
{
|
|
// if 4 chars start with LPT checks
|
|
// need to filter out:
|
|
// COM1, COM2, etc. LPT1, LPT2, etc
|
|
// but not:
|
|
// COM or LPT or LPT10 or COM10
|
|
// COM == 1 and LPT == 0
|
|
|
|
iMax = ARRAYSIZE(rgszPorts4);
|
|
rgszPorts = rgszPorts4;
|
|
sz.SetAt(3, L'\0');
|
|
cch = 3;
|
|
}
|
|
|
|
if (cch == 3)
|
|
{
|
|
int i = 0;
|
|
for (i; i < iMax; i++)
|
|
{
|
|
if (!lstrcmpi(rgszPorts[i], sz))
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
if( i != iMax )
|
|
{
|
|
sz.FormatMessage(IDS_RESERVED_NAME, tempsz);
|
|
AfxMessageBox(sz, MB_OK|MB_ICONEXCLAMATION);
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
return FALSE;
|
|
}
|