Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

913 lines
24 KiB

#include "gptext.h"
#include <initguid.h>
#include <iadsp.h>
#include "ipsecext.h"
#include "SmartPtr.h"
#include "wbemtime.h"
#include <strsafe.h>
#define GPEXT_PATH TEXT("Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\GPExtensions\\{e437bc1c-aa7d-11d2-a382-00c04f991e27}")
#define POLICY_PATH TEXT("Software\\Policies\\Microsoft\\Windows\\IPSec\\GPTIPSECPolicy")
LPWSTR GetAttributes[] = {L"ipsecOwnersReference", L"ipsecName", L"description"};
HRESULT
RegisterIPSEC(void)
{
HKEY hKey;
LONG lResult;
DWORD dwDisp, dwValue;
TCHAR szBuffer[512];
lResult = RegCreateKeyEx (
HKEY_LOCAL_MACHINE,
GPEXT_PATH,
0,
NULL,
REG_OPTION_NON_VOLATILE,
KEY_WRITE,
NULL,
&hKey,
&dwDisp
);
if (lResult != ERROR_SUCCESS)
{
return lResult;
}
LoadString (g_hInstance, IDS_IPSEC_NAME, szBuffer, ARRAYSIZE(szBuffer));
RegSetValueEx (
hKey,
NULL,
0,
REG_SZ,
(LPBYTE)szBuffer,
(lstrlen(szBuffer) + 1) * sizeof(TCHAR)
);
RegSetValueEx (
hKey,
TEXT("ProcessGroupPolicyEx"),
0,
REG_SZ,
(LPBYTE)TEXT("ProcessIPSECPolicyEx"),
(lstrlen(TEXT("ProcessIPSECPolicyEx")) + 1) * sizeof(TCHAR)
);
RegSetValueEx (
hKey,
TEXT("GenerateGroupPolicy"),
0,
REG_SZ,
(LPBYTE)TEXT("GenerateIPSECPolicy"),
(lstrlen(TEXT("GenerateIPSECPolicy")) + 1) * sizeof(TCHAR)
);
szBuffer[0] = L'\0';
(void) StringCchCopy(szBuffer, ARRAYSIZE(szBuffer), L"gptext.dll");
RegSetValueEx (
hKey,
TEXT("DllName"),
0,
REG_EXPAND_SZ,
(LPBYTE)szBuffer,
(lstrlen(szBuffer) + 1) * sizeof(TCHAR)
);
dwValue = 1;
RegSetValueEx (
hKey,
TEXT("NoUserPolicy"),
0,
REG_DWORD,
(LPBYTE)&dwValue,
sizeof(dwValue));
dwValue = 0;
RegSetValueEx (
hKey,
TEXT("NoGPOListChanges"),
0,
REG_DWORD,
(LPBYTE)&dwValue,
sizeof(dwValue));
RegCloseKey (hKey);
return S_OK;
}
HRESULT
UnregisterIPSEC(void)
{
RegDeleteKey (HKEY_LOCAL_MACHINE, GPEXT_PATH);
return S_OK;
}
DWORD
ProcessIPSECPolicyEx(
DWORD dwFlags, // GPO_INFO_FLAGS
HANDLE hToken, // User or machine token
HKEY hKeyRoot, // Root of registry
PGROUP_POLICY_OBJECT pDeletedGPOList, // Linked list of deleted GPOs
PGROUP_POLICY_OBJECT pChangedGPOList, // Linked list of changed GPOs
ASYNCCOMPLETIONHANDLE pHandle, // For asynchronous completion
BOOL *pbAbort, // If true, then abort GPO processing
PFNSTATUSMESSAGECALLBACK pStatusCallback,// Callback function for displaying status messages
IWbemServices *pWbemServices, // Pointer to namespace to log diagnostic mode data
// Note, this will be NULL when Rsop logging is disabled
HRESULT *pRsopStatus // RSOP Logging succeeded or not.
)
{
// Call ProcessIPSECPolicy & get path -> polstore funcs
WCHAR szIPSECPolicy[MAX_PATH]; //policy path
WCHAR szIPSECPolicyName[MAX_PATH]; //policy name
WCHAR szIPSECPolicyDescription[512]; //policy descr
HRESULT hr = S_OK;
DWORD dwError = ERROR_SUCCESS;
PGROUP_POLICY_OBJECT pGPO = NULL;
GPO_INFO GPOInfo;
BOOL ForcePolicyReload = FALSE;
//
// ASSERT: CoInitializeEx was called before this function
// was invoked.
//
ForcePolicyReload = (dwFlags & GPO_INFO_FLAG_FORCED_REFRESH) ||
!(dwFlags & GPO_INFO_FLAG_NOCHANGES);
if (!ForcePolicyReload) {
NotifyPolicyAgent();
} else {
memset(szIPSECPolicy, 0, sizeof(WCHAR)*MAX_PATH);
memset(szIPSECPolicyName, 0, sizeof(WCHAR)*MAX_PATH);
memset(szIPSECPolicyDescription, 0, sizeof(WCHAR)*512);
// First process the Deleted GPO List. If there is a single
// entry on the GPO list, just delete the entire list.
// Example Rex->Cassius->Brutus. If the delete List has
// Cassius to be deleted, then really, we shouldn't be deleting
// our registry entry because we're interested in Brutus which
// has not be deleted. But in our case, the pChangedGPOList will
// have all the information, so Brutus gets written back in the
// next stage.
//
if (pDeletedGPOList) {
dwError = IPSecChooseDriverBootMode(
HKEY_LOCAL_MACHINE,
IPSEC_DIRECTORY_PROVIDER,
POL_ACTION_UNASSIGN
);
hr = HRESULT_FROM_WIN32(dwError);
if (dwError) {
goto error;
}
DeleteIPSECPolicyFromRegistry();
//
// Also Clear WMI store if no GPO's applied and logging enabled
//
if (!pChangedGPOList && pWbemServices) {
hr = IPSecClearWMIStore(
pWbemServices
);
if (FAILED(hr)) {
goto error;
}
DebugMsg( (DM_WARNING, L"ipsecext::ProcessIPSECPolicyEx: IPSec WMI store cleared") );
}
}
if(pChangedGPOList) {
DWORD dwNumGPO = 0;
for(pGPO = pChangedGPOList; pGPO; pGPO = pGPO->pNext) {
dwNumGPO++;
//
// Write only the last, highest precedence policy to registry
//
if(pGPO->pNext == NULL) {
hr = RetrieveIPSECPolicyFromDS(
pGPO,
szIPSECPolicy,
ARRAYSIZE(szIPSECPolicy),
szIPSECPolicyName,
ARRAYSIZE(szIPSECPolicyName),
szIPSECPolicyDescription,
ARRAYSIZE(szIPSECPolicyDescription)
);
if (FAILED(hr)) {
goto success; // WMI store still consistent
}
dwError = WriteIPSECPolicyToRegistry(
szIPSECPolicy,
szIPSECPolicyName,
szIPSECPolicyDescription
);
if (dwError) {
goto success; // WMI store still consistent
}
dwError = IPSecChooseDriverBootMode(
HKEY_LOCAL_MACHINE,
IPSEC_DIRECTORY_PROVIDER,
POL_ACTION_ASSIGN
);
hr = HRESULT_FROM_WIN32(dwError);
if (dwError) {
goto error;
}
}
}
DebugMsg( (DM_WARNING, L"ipsecext::ProcessIPSECPolicyEx: dwNumGPO: %d", dwNumGPO) );
// Write WMI log if logging enabled
if (pWbemServices) {
DWORD dwPrecedence = dwNumGPO;
for(pGPO = pChangedGPOList; pGPO; pGPO = pGPO->pNext) {
hr = RetrieveIPSECPolicyFromDS(
pGPO,
szIPSECPolicy,
ARRAYSIZE(szIPSECPolicy),
szIPSECPolicyName,
ARRAYSIZE(szIPSECPolicyName),
szIPSECPolicyDescription,
ARRAYSIZE(szIPSECPolicyDescription)
);
if (FAILED(hr)) {
goto error;
}
LPWSTR pszIPSECPolicy = szIPSECPolicy + wcslen(L"LDAP://");
DebugMsg( (DM_WARNING, L"ipsecext::ProcessIPSECPolicyEx: pszIPSECPolicy: %s", pszIPSECPolicy) );
(VOID) CreatePolstoreGPOInfo(
pGPO,
dwPrecedence--,
dwNumGPO,
&GPOInfo
);
hr = WriteDirectoryPolicyToWMI(
0, //pszMachineName
pszIPSECPolicy,
&GPOInfo,
pWbemServices
);
(VOID) FreePolstoreGPOInfo(&GPOInfo);
if (FAILED(hr)) {
DebugMsg( (DM_WARNING, L"ipsecext::ProcessIPSECPolicyEx: WriteDirectoryPolicyToWMI failed: 0x%x", hr) );
goto error;
}
}
}
}
DebugMsg( (DM_WARNING, L"ipsecext::ProcessIPSECPolicyEx completed") );
PingPolicyAgent();
}
success:
*pRsopStatus = S_OK;
return(ERROR_SUCCESS);
error:
*pRsopStatus = hr;
return(ERROR_POLICY_OBJECT_NOT_FOUND);
}
DWORD
GenerateIPSECPolicy(
DWORD dwFlags,
BOOL *pbAbort,
WCHAR *pwszSite,
PRSOP_TARGET pMachTarget,
PRSOP_TARGET pUserTarget
)
{
// Call ProcessIPSECPolicy & get path -> polstore funcs
WCHAR szIPSECPolicy[MAX_PATH]; //policy path
WCHAR szIPSECPolicyName[MAX_PATH]; //policy name
WCHAR szIPSECPolicyDescription[512]; //policy descr
HRESULT hr = S_OK;
PGROUP_POLICY_OBJECT pGPO = NULL;
GPO_INFO GPOInfo;
//
// ASSERT: CoInitializeEx was called before this function
// was invoked.
//
memset(szIPSECPolicy, 0, sizeof(WCHAR)*MAX_PATH);
memset(szIPSECPolicyName, 0, sizeof(WCHAR)*MAX_PATH);
memset(szIPSECPolicyDescription, 0, sizeof(WCHAR)*512);
////start
PGROUP_POLICY_OBJECT pChangedGPOList = NULL;
IWbemServices *pWbemServices = NULL;
if(pMachTarget) {
pChangedGPOList = pMachTarget->pGPOList;
pWbemServices = pMachTarget->pWbemServices;
}
if(pUserTarget) {
pChangedGPOList = pUserTarget->pGPOList;
pWbemServices = pUserTarget->pWbemServices;
}
if(pChangedGPOList && pWbemServices) {
DWORD dwNumGPO = 0;
for(pGPO = pChangedGPOList; pGPO; pGPO = pGPO->pNext) {
dwNumGPO++;
}
DebugMsg( (DM_WARNING, L"ipsecext::GenerateIPSECPolicy: dwNumGPO: %d", dwNumGPO) );
DWORD dwPrecedence = dwNumGPO;
for(pGPO = pChangedGPOList; pGPO; pGPO = pGPO->pNext) {
hr = RetrieveIPSECPolicyFromDS(
pGPO,
szIPSECPolicy,
ARRAYSIZE(szIPSECPolicy),
szIPSECPolicyName,
ARRAYSIZE(szIPSECPolicyName),
szIPSECPolicyDescription,
ARRAYSIZE(szIPSECPolicyDescription)
);
if (FAILED(hr)) {
goto error;
}
LPWSTR pszIPSECPolicy = szIPSECPolicy + wcslen(L"LDAP://");
DebugMsg( (DM_WARNING, L"ipsecext::GenerateIPSECPolicy: pszIPSECPolicy: %s", pszIPSECPolicy) );
(VOID) CreatePolstoreGPOInfo(
pGPO,
dwPrecedence--,
dwNumGPO,
&GPOInfo
);
hr = WriteDirectoryPolicyToWMI(
0, //pszMachineName
pszIPSECPolicy,
&GPOInfo,
pWbemServices
);
(VOID) FreePolstoreGPOInfo(&GPOInfo);
if (FAILED(hr)) {
DebugMsg( (DM_WARNING, L"ipsecext::GenerateIPSECPolicy: WriteDirectoryPolicyToWMI failed: 0x%x", hr) );
goto error;
}
}
}
DebugMsg( (DM_WARNING, L"ipsecext::GenerateIPSECPolicy completed") );
return(ERROR_SUCCESS);
error:
return(ERROR_POLICY_OBJECT_NOT_FOUND);
}
HRESULT
CreatePolstoreGPOInfo(
PGROUP_POLICY_OBJECT pGPO,
UINT32 uiPrecedence,
UINT32 uiTotalGPOs,
PGPO_INFO pGPOInfo
)
{
XBStr xbstrCurrentTime;
HRESULT hr;
memset(pGPOInfo, 0, sizeof(GPO_INFO));
pGPOInfo->uiPrecedence = uiPrecedence;
pGPOInfo->uiTotalGPOs = uiTotalGPOs;
pGPOInfo->bsGPOID = SysAllocString(
StripPrefixIpsec(pGPO->lpDSPath)
);
pGPOInfo->bsSOMID = SysAllocString(
StripLinkPrefixIpsec(pGPO->lpLink)
);
// (Failing safe above by ignoring mem alloc errors)
hr = GetCurrentWbemTime(xbstrCurrentTime);
if ( FAILED (hr) ) {
pGPOInfo->bsCreationtime = 0;
}
else {
pGPOInfo->bsCreationtime = xbstrCurrentTime.Acquire();
}
return S_OK;
}
HRESULT
FreePolstoreGPOInfo(
PGPO_INFO pGPOInfo
)
{
if (pGPOInfo && pGPOInfo->bsCreationtime) {
SysFreeString(pGPOInfo->bsCreationtime);
}
if (pGPOInfo && pGPOInfo->bsGPOID) {
SysFreeString(pGPOInfo->bsGPOID);
}
if (pGPOInfo && pGPOInfo->bsSOMID) {
SysFreeString(pGPOInfo->bsSOMID);
}
return S_OK;
}
HRESULT
CreateChildPath(
LPWSTR pszParentPath,
LPWSTR pszChildComponent,
BSTR * ppszChildPath
)
{
HRESULT hr = S_OK;
IADsPathname *pPathname = NULL;
hr = CoCreateInstance(
CLSID_Pathname,
NULL,
CLSCTX_ALL,
IID_IADsPathname,
(void**)&pPathname
);
BAIL_ON_FAILURE(hr);
hr = pPathname->Set(pszParentPath, ADS_SETTYPE_FULL);
BAIL_ON_FAILURE(hr);
hr = pPathname->AddLeafElement(pszChildComponent);
BAIL_ON_FAILURE(hr);
hr = pPathname->Retrieve(ADS_FORMAT_X500, ppszChildPath);
BAIL_ON_FAILURE(hr);
error:
if (pPathname) {
pPathname->Release();
}
return(hr);
}
HRESULT
RetrieveIPSECPolicyFromDS(
PGROUP_POLICY_OBJECT pGPOInfo,
LPWSTR pszIPSecPolicy,
DWORD dwPolLen,
LPWSTR pszIPSecPolicyName,
DWORD dwPolNameLen,
LPWSTR pszIPSecPolicyDescription,
DWORD dwPolDescLen
)
{
LPWSTR pszMachinePath = NULL;
BSTR pszMicrosoftPath = NULL;
BSTR pszWindowsPath = NULL;
BSTR pszIpsecPath = NULL;
IDirectoryObject * pDirectoryObject = NULL;
IDirectoryObject * pIpsecObject = NULL;
BOOL bFound = FALSE;
HRESULT hr = S_OK;
LPWSTR pszOwnersReference = L"ipsecOwnersReference";
PADS_ATTR_INFO pAttributeEntries = NULL;
DWORD dwNumAttributesReturned = 0;
DWORD i = 0;
PADS_ATTR_INFO pAttributeEntry = NULL;
pszMachinePath = pGPOInfo->lpDSPath;
// Build the fully qualified ADsPath for my object
hr = CreateChildPath(
pszMachinePath,
L"cn=Microsoft",
&pszMicrosoftPath
);
BAIL_ON_FAILURE(hr);
hr = CreateChildPath(
pszMicrosoftPath,
L"cn=Windows",
&pszWindowsPath
);
BAIL_ON_FAILURE(hr);
hr = CreateChildPath(
pszWindowsPath,
L"cn=ipsec",
&pszIpsecPath
);
BAIL_ON_FAILURE(hr);
hr = ADsOpenObject(
pszIpsecPath,
NULL,
NULL,
ADS_SECURE_AUTHENTICATION | ADS_USE_SEALING | ADS_USE_SIGNING,
IID_IDirectoryObject,
(void **)&pIpsecObject
);
BAIL_ON_FAILURE(hr);
hr = pIpsecObject->GetObjectAttributes(
GetAttributes,
3,
&pAttributeEntries,
&dwNumAttributesReturned
);
BAIL_ON_FAILURE(hr);
if (dwNumAttributesReturned == 0) {
hr = E_FAIL;
BAIL_ON_FAILURE(hr);
}
//
// Process the PathName
//
for (i = 0; i < dwNumAttributesReturned; i++) {
pAttributeEntry = pAttributeEntries + i;
if (!_wcsicmp(pAttributeEntry->pszAttrName, L"ipsecOwnersReference")) {
hr = StringCchCopy(pszIPSecPolicy, dwPolLen, L"LDAP://");
BAIL_ON_FAILURE(hr);
hr = StringCchCat(pszIPSecPolicy, dwPolLen, pAttributeEntry->pADsValues->DNString);
BAIL_ON_FAILURE(hr);
bFound = TRUE;
break;
}
}
if (!bFound) {
hr = E_FAIL;
BAIL_ON_FAILURE(hr);
}
//
// Process the name
//
for (i = 0; i < dwNumAttributesReturned; i++) {
pAttributeEntry = pAttributeEntries + i;
if (!_wcsicmp(pAttributeEntry->pszAttrName, L"ipsecName")) {
hr = StringCchCopy(pszIPSecPolicyName, dwPolNameLen, pAttributeEntry->pADsValues->DNString);
BAIL_ON_FAILURE(hr);
break;
}
}
//
// Process the description
//
for (i = 0; i < dwNumAttributesReturned; i++) {
pAttributeEntry = pAttributeEntries + i;
if (!_wcsicmp(pAttributeEntry->pszAttrName, L"description")) {
hr = StringCchCopy(pszIPSecPolicyDescription, dwPolDescLen, pAttributeEntry->pADsValues->DNString);
BAIL_ON_FAILURE(hr);
break;
}
}
error:
if (pAttributeEntries) {
FreeADsMem(pAttributeEntries);
}
if (pIpsecObject) {
pIpsecObject->Release();
}
if (pszMicrosoftPath) {
SysFreeString(pszMicrosoftPath);
}
if (pszWindowsPath) {
SysFreeString(pszWindowsPath);
}
if (pszIpsecPath) {
SysFreeString(pszIpsecPath);
}
return(hr);
}
DWORD
DeleteIPSECPolicyFromRegistry(
)
{
DWORD dwError = 0;
HKEY hKey = NULL;
DWORD dwDisp = 0;
dwError = RegCreateKeyEx (
HKEY_LOCAL_MACHINE,
TEXT("Software\\Policies\\Microsoft\\Windows\\IPSec"),
0,
NULL,
REG_OPTION_NON_VOLATILE,
KEY_ALL_ACCESS,
NULL,
&hKey,
&dwDisp
);
if (dwError) {
goto error;
}
dwError = RegDeleteKey(
hKey,
L"GPTIPSECPolicy"
);
/*
dwError = RegDeleteValue(
hKey,
TEXT("DSIPSECPolicyPath")
);
dwError = RegDeleteValue(
hKey,
TEXT("DSIPSECPolicyName")
);*/
error:
if (hKey) {
RegCloseKey (hKey);
}
return(dwError);
}
DWORD
WriteIPSECPolicyToRegistry(
LPWSTR pszIPSecPolicyPath,
LPWSTR pszIPSecPolicyName,
LPWSTR pszIPSecPolicyDescription
)
{
DWORD dwError = 0;
DWORD dwDisp = 0;
HKEY hKey = NULL;
DWORD dwFlags = 1;
dwError = RegCreateKeyEx (
HKEY_LOCAL_MACHINE,
POLICY_PATH,
0,
NULL,
REG_OPTION_NON_VOLATILE,
KEY_ALL_ACCESS,
NULL,
&hKey,
&dwDisp
);
if (dwError) {
goto error;
}
if (pszIPSecPolicyPath && *pszIPSecPolicyPath) {
dwError = RegSetValueEx (
hKey,
TEXT("DSIPSECPolicyPath"),
0,
REG_SZ,
(LPBYTE)pszIPSecPolicyPath,
(lstrlen(pszIPSecPolicyPath) + 1) * sizeof(TCHAR)
);
dwFlags = 1;
dwError = RegSetValueEx (
hKey,
TEXT("DSIPSECPolicyFlags"),
0,
REG_DWORD,
(LPBYTE)&dwFlags,
sizeof(dwFlags)
);
}
if (pszIPSecPolicyName && *pszIPSecPolicyName) {
dwError = RegSetValueEx (
hKey,
TEXT("DSIPSECPolicyName"),
0,
REG_SZ,
(LPBYTE)pszIPSecPolicyName,
(lstrlen(pszIPSecPolicyName) + 1) * sizeof(TCHAR)
);
}
if (pszIPSecPolicyDescription && *pszIPSecPolicyDescription) {
dwError = RegSetValueEx (
hKey,
TEXT("DSIPSECPolicyDescription"),
0,
REG_SZ,
(LPBYTE)pszIPSecPolicyDescription,
(lstrlen(pszIPSecPolicyDescription) + 1) * sizeof(TCHAR)
);
}
error:
if (hKey) {
RegCloseKey (hKey);
}
return(dwError);
}
VOID
PingPolicyAgent(
)
{
HANDLE hPolicyChangeEvent = NULL;
hPolicyChangeEvent = OpenEvent(
EVENT_ALL_ACCESS,
FALSE,
L"IPSEC_POLICY_CHANGE_EVENT"
);
if (hPolicyChangeEvent) {
SetEvent(hPolicyChangeEvent);
CloseHandle(hPolicyChangeEvent);
}
}
VOID
NotifyPolicyAgent(
)
{
HANDLE hGpRefreshEvent = NULL;
hGpRefreshEvent = OpenEvent(
EVENT_ALL_ACCESS,
FALSE,
IPSEC_GP_REFRESH_EVENT
);
if (hGpRefreshEvent) {
SetEvent(hGpRefreshEvent);
CloseHandle(hGpRefreshEvent);
}
}
//
// Prefix stripping functions copied from
// gina\userenv\rsop\logger.cpp written by SitaramR
//
//*************************************************************
//
// StripPrefix()
//
// Purpose: Strips out prefix to get canonical path to Gpo
//
// Parameters: lpGPOInfo - Gpo Info
// pWbemServices - Wbem services
//
// Returns: Pointer to suffix
//
//*************************************************************
WCHAR *StripPrefixIpsec( WCHAR *pwszPath )
{
WCHAR wszMachPrefix[] = TEXT("LDAP://CN=Machine,");
INT iMachPrefixLen = lstrlen( wszMachPrefix );
WCHAR wszUserPrefix[] = TEXT("LDAP://CN=User,");
INT iUserPrefixLen = lstrlen( wszUserPrefix );
WCHAR *pwszPathSuffix;
//
// Strip out prefix to get the canonical path to Gpo
//
if ( CompareString( LOCALE_USER_DEFAULT, NORM_IGNORECASE,
pwszPath, iUserPrefixLen, wszUserPrefix, iUserPrefixLen ) == CSTR_EQUAL ) {
pwszPathSuffix = pwszPath + iUserPrefixLen;
} else if ( CompareString( LOCALE_USER_DEFAULT, NORM_IGNORECASE,
pwszPath, iMachPrefixLen, wszMachPrefix, iMachPrefixLen ) == CSTR_EQUAL ) {
pwszPathSuffix = pwszPath + iMachPrefixLen;
} else
pwszPathSuffix = pwszPath;
return pwszPathSuffix;
}
//*************************************************************
//
// StripLinkPrefix()
//
// Purpose: Strips out prefix to get canonical path to DS
// object
//
// Parameters: pwszPath - path to strip
//
// Returns: Pointer to suffix
//
//*************************************************************
WCHAR *StripLinkPrefixIpsec( WCHAR *pwszPath )
{
WCHAR wszPrefix[] = TEXT("LDAP://");
INT iPrefixLen = lstrlen( wszPrefix );
WCHAR *pwszPathSuffix;
//
// Strip out prefix to get the canonical path to Som
//
if ( wcslen(pwszPath) <= (DWORD) iPrefixLen ) {
return pwszPath;
}
if ( CompareString( LOCALE_USER_DEFAULT, NORM_IGNORECASE,
pwszPath, iPrefixLen, wszPrefix, iPrefixLen ) == CSTR_EQUAL ) {
pwszPathSuffix = pwszPath + iPrefixLen;
} else
pwszPathSuffix = pwszPath;
return pwszPathSuffix;
}