Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

445 lines
12 KiB

/*++
Copyright (c) Microsoft Corporation. All rights reserved.
Module Name:
spapip.h
Abstract:
Header file for routines exported from setupapi.dll that are NOT
part of the setup API, and are thus intended for private/internal use.
Author:
Ted Miller (tedm) Mar-31-1995
Revision History:
Jamie Hunter (jamiehun) May-25-2000
General cleanup. All private exported SetupAPI functions now begin pSetup...
--*/
//
// these are also exported in setupapi.dll
//
#include <sputils.h>
VOID
pSetupOutOfMemory(
IN HWND Owner OPTIONAL
);
//
// Global flags / overrides
//
VOID
pSetupSetGlobalFlags(
IN DWORD Value
);
DWORD
pSetupGetGlobalFlags(
VOID
);
VOID pSetupModifyGlobalFlags(
IN DWORD Flags,
IN DWORD Value
);
#define PSPGF_NO_RUNONCE 0x00000001 // set to inhibit runonce calls
#define PSPGF_NO_BACKUP 0x00000002 // set to inhibit automatic backup
#define PSPGF_NONINTERACTIVE 0x00000004 // set to inhibit all UI
#define PSPGF_SERVER_SIDE_RUNONCE 0x00000008 // batch RunOnce entries for server-side processing
#define PSPGF_NO_VERIFY_INF 0x00000010 // set to inhibit verification (digital signature) of INFs
#define PSPGF_UNATTENDED_SETUP 0x00000020 // set during full unattended setup
#define PSPGF_MINIMAL_EMBEDDED 0x00000040 // minimize footprint for embedded scenarios
#define PSPGF_NO_SCE_EMBEDDED 0x00000080 // don't call SCE for embedded scenarios
#define PSPGF_AUTOFAIL_VERIFIES 0x00000100 // fail all file verification attempts (w/o calling crypto)
//
// to allow syssetup.dll to signal all setupapi.dll's that we require headless mode
// returns TRUE on success. Only works during syssetup
//
BOOL
pSetupSetNoDriverPrompts(
BOOL Flag
);
//
// Server-side (non-interactive mode) RunOnce processing support
//
typedef struct _PSP_RUNONCE_NODE {
struct _PSP_RUNONCE_NODE *Next;
PCWSTR DllFullPath;
PCSTR DllEntryPointName;
PCWSTR DllParams;
} PSP_RUNONCE_NODE, *PPSP_RUNONCE_NODE;
PPSP_RUNONCE_NODE
pSetupAccessRunOnceNodeList(
VOID
);
VOID
pSetupDestroyRunOnceNodeList(
VOID
);
//
// per queue overrides
//
BOOL
pSetupSetQueueFlags(
IN HSPFILEQ QueueHandle,
IN DWORD flags
);
DWORD
pSetupGetQueueFlags(
IN HSPFILEQ QueueHandle
);
//
// Queue flags.
//
#define FQF_TRY_SIS_COPY 0x00000001 // try SIS copy first
#define FQF_BACKUP_AWARE 0x00010000 // allow callbacks
#define FQF_DID_CATALOGS_OK 0x00020000 // catalog/inf verification has run
#define FQF_DID_CATALOGS_FAILED 0x00040000 // catalog/inf verification has run
#define FQF_DIGSIG_ERRORS_NOUI 0x00080000 // prompt user on failed signature
// verification
#define FQF_DEVICE_INSTALL 0x00100000 // file queue is for device install
#define FQF_USE_ALT_PLATFORM 0x00200000 // use AltPlatformInfo for digital
// signature verification
#define FQF_QUEUE_ALREADY_COMMITTED 0x00400000 // file queue has already been committed
#define FQF_DEVICE_BACKUP 0x00800000 // device backup
#define FQF_QUEUE_FORCE_BLOCK_POLICY 0x01000000 // force policy to block so we never
// install unsigned files (this also
// disallows Authenticode-signed files)
#define FQF_KEEP_INF_AND_CAT_ORIGINAL_NAMES 0x02000000 // install INF/CAT from 3rd-party location
// using original names (for exception INFs)
#define FQF_BACKUP_INCOMPLETE 0x04000000 // set if we were not successful backing up
// all intended files
#define FQF_ABORT_IF_UNSIGNED 0x08000000 // set if we're supposed to bail
// out of unsigned queue committals
// so that the caller can set a system
// restore point.
#define FQF_FILES_MODIFIED 0x10000000 // set if any files are overwritten.
#define FQF_DID_CATALOGS_PROMPT_FOR_TRUST 0x20000000 // catalog/inf verification has run,
// couldn't show UI, so user has yet
// to confirm trust of Authenticode
// publisher
//
// File functions in fileutil.c
//
BOOL
pSetupGetVersionInfoFromImage(
IN PCTSTR FileName,
OUT PULARGE_INTEGER Version,
OUT LANGID *Language
);
//
// Private INF routines
//
PCTSTR
pSetupGetField(
IN PINFCONTEXT Context,
IN DWORD FieldIndex
);
//
// Registry interface routines
//
DWORD
pSetupQueryMultiSzValueToArray(
IN HKEY Root,
IN PCTSTR Subkey,
IN PCTSTR ValueName,
OUT PTSTR **Array,
OUT PUINT StringCount,
IN BOOL FailIfDoesntExist
);
DWORD
pSetupSetArrayToMultiSzValue(
IN HKEY Root,
IN PCTSTR Subkey,
IN PCTSTR ValueName,
IN PTSTR *Array,
IN UINT StringCount
);
VOID
pSetupFreeStringArray(
IN PTSTR *Array,
IN UINT StringCount
);
DWORD
pSetupAppendStringToMultiSz(
IN HKEY Key,
IN PCTSTR SubKeyName, OPTIONAL
IN DWORD DevInst, OPTIONAL
IN PCTSTR ValueName, OPTIONAL
IN PCTSTR String,
IN BOOL AllowDuplicates
);
//
// Service controller helper functions
//
DWORD
pSetupRetrieveServiceConfig(
IN SC_HANDLE ServiceHandle,
OUT LPQUERY_SERVICE_CONFIG *ServiceConfig
);
DWORD
pSetupAddTagToGroupOrderListEntry(
IN PCTSTR LoadOrderGroup,
IN DWORD TagId,
IN BOOL MoveToFront
);
DWORD
pSetupAcquireSCMLock(
IN SC_HANDLE SCMHandle,
OUT SC_LOCK *pSCMLock
);
//
// Miscellaneous utility functions
//
BOOL
pSetupInfIsFromOemLocation(
IN PCTSTR InfFileName,
IN BOOL InfDirectoryOnly
);
DWORD
pSetupGetOsLoaderDriveAndPath(
IN BOOL RootOnly,
OUT PTSTR CallerBuffer,
IN DWORD CallerBufferSize,
OUT PDWORD RequiredSize OPTIONAL
);
BOOL
pSetupSetSystemSourcePath(
IN PCTSTR NewSourcePath,
IN PCTSTR NewSvcPackSourcePath
);
BOOL
pSetupShouldDeviceBeExcluded(
IN PCTSTR DeviceId,
IN HINF hInf,
OUT PBOOL ArchitectureSpecificExclude OPTIONAL
);
BOOL
pSetupDiSetDeviceInfoContext(
IN HDEVINFO DeviceInfoSet,
IN PSP_DEVINFO_DATA DeviceInfoData,
IN DWORD Context
);
BOOL
pSetupDiGetDeviceInfoContext(
IN HDEVINFO DeviceInfoSet,
IN PSP_DEVINFO_DATA DeviceInfoData,
OUT PDWORD Context
);
#define SETUP_HAS_OPEN_DIALOG_EVENT TEXT("MS_SETUPAPI_DIALOG")
#define SETUP_NODRIVERPROMPTS_MODE TEXT("MS_SETUPAPI_NODRIVERPROMPTS")
INT
pSetupAddMiniIconToList(
IN HBITMAP hbmImage,
IN HBITMAP hbmMask
);
PCTSTR
pSetupDirectoryIdToPath(
IN PCTSTR DirectoryId, OPTIONAL
IN OUT PUINT DirectoryIdInt, OPTIONAL
IN PCTSTR SubDirectory, OPTIONAL
IN PCTSTR InfSourcePath, OPTIONAL
IN OUT PCTSTR *OsLoaderPath OPTIONAL
);
//
// Routine used by optional components code in syssetup to setup runonce/grpconv.
//
DWORD
pSetupInstallStopEx(
IN BOOL DoRunOnce,
IN DWORD Flags,
IN PVOID Reserved
);
#define INSTALLSTOP_NO_UI 0x00000001 // InstallStop should do no UI
#define INSTALLSTOP_NO_GRPCONV 0x00000002 // Don't do GrpConv
//
// Section access for INF file
//
BOOL
pSetupGetInfSections (
IN HINF InfHandle,
OUT PTSTR Buffer, OPTIONAL
IN UINT Size, OPTIONAL
OUT UINT *SizeNeeded OPTIONAL
);
//
// GUID handling routines
// these may be eventually removed
//
DWORD
pSetupGuidFromString(
IN PCTSTR GuidString,
OUT LPGUID Guid
);
DWORD
pSetupStringFromGuid(
IN CONST GUID *Guid,
OUT PTSTR GuidString,
IN DWORD GuidStringSize
);
BOOL
pSetupIsGuidNull(
IN CONST GUID *Guid
);
//
// pSetupInfCacheBuild function
// called to rebuild the cache(s)
//
BOOL
WINAPI
pSetupInfCacheBuild(
IN DWORD Action
);
//
// action (more may be added)
//
#define INFCACHEBUILD_UPDATE 0x00000000 // update caches
#define INFCACHEBUILD_REBUILD 0x00000001 // delete and update caches
//
// Digital signature verification routines
//
typedef enum {
SetupapiVerifyNoProblem,
SetupapiVerifyCatalogProblem, // catalog file couldn't be verified
SetupapiVerifyInfProblem, // inf file couldn't be installed/verified
SetupapiVerifyFileNotSigned, // file is not signed, no verification attempted
SetupapiVerifyFileProblem, // file may be signed, but couldn't be verified
SetupapiVerifyClassInstProblem, // class installer is unsigned
SetupapiVerifyCoInstProblem, // co-installer is unsigned
SetupapiVerifyCatalogInstallProblem, // catalog install failed (not due to verification failure)
SetupapiVerifyRegSvrFileProblem, // file to be registered/unregistered is unsigned
SetupapiVerifyIncorrectlyCopiedInf, // invalid attempt to directly copy INF into %windir%\Inf
SetupapiVerifyAutoFailProblem , // PSPGF_AUTOFAIL_VERIFIES flag is set
SetupapiVerifyDriverBlocked // driver is in the bad driver database.
} SetupapiVerifyProblem;
DWORD
pSetupVerifyQueuedCatalogs(
IN HSPFILEQ FileQueue
);
DWORD
pSetupVerifyCatalogFile(
IN LPCTSTR CatalogFullPath
);
DWORD
pSetupVerifyFile(
IN LPVOID LogContext,
IN LPCTSTR Catalog, OPTIONAL
IN PVOID CatalogBaseAddress, OPTIONAL
IN DWORD CatalogImageSize,
IN LPCTSTR Key,
IN LPCTSTR FileFullPath,
OUT SetupapiVerifyProblem *Problem, OPTIONAL
OUT LPTSTR ProblemFile, OPTIONAL
IN BOOL CatalogAlreadyVerified,
IN PSP_ALTPLATFORM_INFO_V2 AltPlatformInfo, OPTIONAL
OUT LPTSTR CatalogFileUsed, OPTIONAL
OUT PDWORD NumCatalogsConsidered OPTIONAL
);
DWORD
pSetupInstallCatalog(
IN LPCTSTR CatalogFullPath,
IN LPCTSTR NewBaseName, OPTIONAL
OUT LPTSTR NewCatalogFullPath
);
BOOL
pSetupHandleFailedVerification(
IN HWND Owner,
IN SetupapiVerifyProblem Problem,
IN LPCTSTR ProblemFile,
IN LPCTSTR DeviceDesc, OPTIONAL
IN DWORD DriverSigningPolicy,
IN BOOL NoUI,
IN DWORD Error,
IN PVOID LogContext, OPTIONAL
OUT PDWORD Flags, OPTIONAL
IN LPCTSTR TargetName OPTIONAL
);
DWORD
pSetupGetCurrentDriverSigningPolicy(
IN BOOL IsDeviceInstallation
);
//
// private SetupDiCallClassInstaller defines/structures
//
//
// DI_FUNCTION codes
//
#define DIF_INTERFACE_TO_DEVICE 0x00000030 // aka DIF_RESERVED2
//
// Structure corresponding to the DIF_INTERFACE_TO_DEVICE install function
// note that this is always Unicode
// always use SetupDiSetClassInstallParamsW
//
typedef struct _SP_INTERFACE_TO_DEVICE_PARAMS_W {
SP_CLASSINSTALL_HEADER ClassInstallHeader;
PCWSTR Interface; // IN (must remain valid)
WCHAR DeviceId[200]; // OUT MAX_DEVICE_ID_LEN
} SP_INTERFACE_TO_DEVICE_PARAMS_W, *PSP_INTERFACE_TO_DEVICE_PARAMS_W;
//
// semi-private flag for SetupQueueCopyIndirect
//
#define PSP_COPY_USE_SPCACHE 0x20000000