You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
4056 lines
122 KiB
4056 lines
122 KiB
//+---------------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
// Copyright (C) Microsoft Corporation, 2000.
|
|
//
|
|
// File: I C S U P G R D . CPP
|
|
//
|
|
// Contents: Functions that is related to
|
|
// o upgrade of ICS from Win98 SE, WinMe and Win2K to Whistler
|
|
// o unattended clean install of Homenet on Whistler or later
|
|
//
|
|
// Date: 20-Sept-2000
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
#include "pch.h"
|
|
#pragma hdrstop
|
|
#include <winsock2.h>
|
|
#include <netcon.h>
|
|
#include <netconp.h>
|
|
#include <shfolder.h>
|
|
#include <hnetcfg.h>
|
|
|
|
#include <atlbase.h>
|
|
extern CComModule _Module; // required by atlcom.h
|
|
#include <atlcom.h>
|
|
#include "ncatl.h"
|
|
#include "ncui.h"
|
|
|
|
#include "ncstring.h"
|
|
#include "ncnetcfg.h"
|
|
#include "kkutils.h"
|
|
#include "kkcwinf.h"
|
|
#include "nslog.h"
|
|
#include "afilexp.h"
|
|
#include "ncras.h"
|
|
#include "ncreg.h"
|
|
|
|
extern "C"
|
|
{
|
|
// Fix IA64 conflict with Shell Macro
|
|
#undef IS_ALIGNED
|
|
#include <ipnat.h>
|
|
}
|
|
|
|
#include "IcsUpgrd.h"
|
|
#include "resource.h" // need to use string resource ids
|
|
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
This function drives the FIcsUpgrade call by
|
|
passing a init'ed and opened CWInfFile object.
|
|
|
|
Arguments:
|
|
None
|
|
|
|
|
|
Returns: TRUE if succeeded
|
|
|
|
Notes:
|
|
|
|
--*/
|
|
BOOL FDoIcsUpgradeIfNecessary()
|
|
{
|
|
BOOL fRet = FALSE;
|
|
HRESULT hr;
|
|
tstring strAnswerFileName;
|
|
|
|
hr = HrGetAnswerFileName(&strAnswerFileName);
|
|
if (S_OK == hr)
|
|
{
|
|
CWInfFile wifIcsAnswerFile;
|
|
|
|
// initialize answer file
|
|
if (wifIcsAnswerFile.Init())
|
|
{
|
|
if (wifIcsAnswerFile.Open(strAnswerFileName.c_str()))
|
|
{
|
|
TraceTag(ttidNetSetup, "calling FIcsUpgrade now...");
|
|
|
|
fRet = FIcsUpgrade(&wifIcsAnswerFile);
|
|
wifIcsAnswerFile.Close();
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidNetSetup, "wifIcsAnswerFile.Open failed");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidNetSetup, "wifIcsAnswerFile.Init failed");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidNetSetup, "HrGetAnswerFileName failed");
|
|
}
|
|
return fRet;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Perform the upgrade of
|
|
o ICS from Win98 SE, WinMe and Win2K
|
|
o Unattended Homenet clean install
|
|
|
|
Arguments:
|
|
[in] pwifAnswerFile The answer-file contains upgrade info from Win9x or
|
|
Windows XP unattended clean install.
|
|
|
|
Returns: TRUE if succeeded
|
|
|
|
Notes:
|
|
|
|
--*/
|
|
BOOL FIcsUpgrade(CWInfFile* pwifAnswerFile)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
ICS_UPGRADE_SETTINGS iusSettings;
|
|
BOOL fUpgradeIcsToRrasNat = FALSE;
|
|
BOOL fCoUninitialize = FALSE;
|
|
|
|
|
|
DefineFunctionName("FIcsUpgrade");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
hr = CoInitialize(NULL);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
fCoUninitialize = TRUE;
|
|
}
|
|
else
|
|
{
|
|
if (RPC_E_CHANGED_MODE == hr)
|
|
{
|
|
hr = S_OK;
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: CoInitialize failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevError,
|
|
SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS));
|
|
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
do
|
|
{
|
|
SetIcsDefaultSettings(&iusSettings);
|
|
|
|
// check if we are upgrading from Windows 2000
|
|
if (FNeedIcsUpgradeFromWin2K())
|
|
{
|
|
hr = BuildIcsUpgradeSettingsFromWin2K(&iusSettings);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: BuildIcsUpgradeSettingsFromWin2K failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS));
|
|
|
|
break;
|
|
}
|
|
|
|
// ICS installed on Win2K if we are here
|
|
if (FOsIsUnsupported())
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"%s: We're running an Unsupported SKU, won't upgrade ICS from Win2K.",
|
|
__FUNCNAME__);
|
|
|
|
|
|
fUpgradeIcsToRrasNat = TRUE;
|
|
break;
|
|
}
|
|
// OS version is less than Advanced Server if we are here
|
|
}
|
|
else
|
|
{
|
|
// we need to check if we are doing ICS upgrade from Win9x or
|
|
// doing unattended Homenet install on Windows XP or later
|
|
if (NULL == pwifAnswerFile)
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"%s: Not an ICS Upgrade from Win2K and no answer-file.",
|
|
__FUNCNAME__);
|
|
|
|
break;
|
|
}
|
|
// Try to load "Homenet" section data from Answer-File
|
|
hr = LoadIcsSettingsFromAnswerFile(pwifAnswerFile, &iusSettings);
|
|
if (S_FALSE == hr)
|
|
{
|
|
// no Homenet section
|
|
hr = S_OK;
|
|
break;
|
|
}
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"%s: LoadIcsSettingsFromAnswerFile failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
|
|
// this may not be an error because of bug# 253074 in Win9x
|
|
// OEM ICS upgrade
|
|
// I'm not going to log this to setup log
|
|
if (iusSettings.fEnableICS && iusSettings.fWin9xUpgrade)
|
|
{
|
|
hr = S_OK; // ICS enabled but no internal/external adapters.
|
|
}
|
|
break;
|
|
}
|
|
|
|
// Assert: Answer file has valid [Homenet] section.
|
|
// make sure OS SKU is less than Advanced Server
|
|
if (FOsIsUnsupported())
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"%s: We're running an Unsupported SKU, won't do any homenet unattended setup.",
|
|
__FUNCNAME__);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS_ADS_DTC));
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
// upgrade ics settings to XP or do unattended Homenet if we
|
|
// can reach here
|
|
hr = UpgradeIcsSettings(&iusSettings);
|
|
if (S_OK != hr)
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: UpgradeIcsSettings failed : 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS));
|
|
}
|
|
|
|
} while (FALSE);
|
|
|
|
if (fUpgradeIcsToRrasNat)
|
|
{
|
|
// If we are here, ICS installed on Win2K and this is an upgrade of OS
|
|
// to ADS/DTC SKUs. We won't upgrade ICS on ADS/DTC SKUs
|
|
TraceTag(ttidNetSetup,
|
|
"%s: We are not upgrading ICS on ADS/DTC SKUs",
|
|
__FUNCNAME__);
|
|
|
|
// During the "Report System Compatiblilty" stage (winnt32.exe) of this
|
|
// OS upgrade process, user has already been notified that we're not
|
|
// upgrading ICS on ADS/DTC SKUs.
|
|
|
|
// we will still log a message to setupact.log file.
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS_ADS_DTC));
|
|
|
|
// we need to delete and backup the old ICS registry settings
|
|
hr = BackupAndDelIcsRegistryValuesOnWin2k();
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"%s: BackupAndDelIcsRegistryValuesOnWin2k failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
|
|
}
|
|
}
|
|
|
|
// Free iusSettings contents if needed
|
|
FreeIcsUpgradeSettings(&iusSettings);
|
|
|
|
if (fCoUninitialize)
|
|
{
|
|
CoUninitialize();
|
|
}
|
|
|
|
return (S_OK == hr? TRUE : FALSE);
|
|
}
|
|
|
|
|
|
//--------- ICS Upgrade helpers begin----------------------------
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Gets the current shared ICS connection On Win2K
|
|
|
|
Arguments:
|
|
[out] pConnection The shared connection information
|
|
|
|
Returns: S_OK if succeeded
|
|
|
|
Notes: Returns the interface connected to the internet
|
|
|
|
--*/
|
|
HRESULT GetSharedConnectionOnWin2k(LPRASSHARECONN pConnection)
|
|
{
|
|
HKEY hKey = NULL;
|
|
HRESULT hr = S_OK;
|
|
|
|
DefineFunctionName("GetSharedConnectionOnWin2k");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
Assert(pConnection);
|
|
|
|
hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, c_wszRegKeySharedAccessParams, KEY_ALL_ACCESS, &hKey);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: HrRegOpenKeyEx failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
Assert(hKey);
|
|
|
|
DWORD dwType = REG_BINARY;
|
|
PBYTE pByte = NULL;
|
|
DWORD dwValueSize = 0;
|
|
|
|
hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedConnection, &dwType, &pByte, &dwValueSize);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: HrRegQueryValueWithAlloc %S failed: 0x%lx",
|
|
__FUNCNAME__, c_wszRegValSharedConnection, hr);
|
|
|
|
goto Exit;
|
|
}
|
|
if (dwValueSize > sizeof(RASSHARECONN))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: RASSHARECONN size too big: 0x%lx bytes",
|
|
__FUNCNAME__, dwValueSize);
|
|
|
|
hr = E_FAIL;
|
|
goto Exit;
|
|
}
|
|
|
|
// transfer value
|
|
memcpy(pConnection, pByte, dwValueSize);
|
|
|
|
Exit:
|
|
// Close the key, if opened
|
|
RegSafeCloseKey(hKey);
|
|
|
|
// Clean up the registry buffer
|
|
if (pByte)
|
|
{
|
|
MemFree(pByte);
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Gets the current private LAN connection on Win2K
|
|
|
|
Arguments:
|
|
[out] pGuid The private LAN information
|
|
|
|
Returns: S_OK if succeeded
|
|
|
|
Notes: Returns the interface connected to the private LAN
|
|
On Win2K, there is only 1 private LAN connection
|
|
|
|
--*/
|
|
HRESULT GetSharedPrivateLanOnWin2K(GUID *pGuid)
|
|
{
|
|
HKEY hKey = NULL;
|
|
HRESULT hr = S_OK;
|
|
|
|
DefineFunctionName("GetSharedPrivateLanOnWin2K");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
Assert(pGuid);
|
|
|
|
hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, c_wszRegKeySharedAccessParams, KEY_ALL_ACCESS, &hKey);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: HrRegOpenKeyEx failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
Assert(hKey);
|
|
|
|
DWORD dwType = REG_SZ;
|
|
PBYTE pByte = NULL;
|
|
DWORD dwValueSize = 0;
|
|
|
|
hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedPrivateLan, &dwType, &pByte, &dwValueSize);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: HrRegQueryValueWithAlloc %S failed: 0x%lx",
|
|
__FUNCNAME__, c_wszRegValSharedPrivateLan, hr);
|
|
|
|
goto Exit;
|
|
}
|
|
// SharedPrivateLan is of type REG_SZ, pByte should have included
|
|
// the terminating null character.
|
|
hr = CLSIDFromString(reinterpret_cast<PWCHAR>(pByte), pGuid);
|
|
|
|
Exit:
|
|
// Close the key, if opened
|
|
RegSafeCloseKey(hKey);
|
|
|
|
// Clean up the registry buffer
|
|
if (pByte)
|
|
{
|
|
MemFree(pByte);
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Delete and backup SharedConnection and SharedPrivateLan registry values
|
|
|
|
Arguments: none
|
|
|
|
Returns: S_OK if succeeded
|
|
|
|
Notes:
|
|
|
|
--*/
|
|
HRESULT BackupAndDelIcsRegistryValuesOnWin2k()
|
|
{
|
|
HKEY hKey = NULL;
|
|
HRESULT hr = S_OK;
|
|
|
|
DefineFunctionName("BackupAndDelIcsRegistryValuesOnWin2k");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, c_wszRegKeySharedAccessParams, KEY_ALL_ACCESS, &hKey);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: HrRegOpenKeyEx failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
Assert(hKey);
|
|
|
|
DWORD dwType = REG_BINARY;
|
|
PBYTE pByte = NULL;
|
|
DWORD dwValueSize = 0;
|
|
|
|
// backup SharedConnection
|
|
hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedConnection, &dwType, &pByte, &dwValueSize);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: HrRegQueryValueWithAlloc %S failed: 0x%lx",
|
|
__FUNCNAME__, c_wszRegValSharedConnection, hr);
|
|
|
|
goto Exit;
|
|
}
|
|
hr = HrRegSetValueEx(hKey, c_wszRegValBackupSharedConnection, dwType, pByte, dwValueSize);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: HrRegSetValueEx %S failed: 0x%lx",
|
|
__FUNCNAME__, c_wszRegValBackupSharedConnection, hr);
|
|
|
|
goto Exit;
|
|
}
|
|
if (pByte)
|
|
{
|
|
MemFree(pByte);
|
|
}
|
|
|
|
// Reset values
|
|
pByte = NULL;
|
|
dwValueSize = 0;
|
|
dwType = REG_SZ;
|
|
|
|
// backup SharedPrivateLan
|
|
hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedPrivateLan, &dwType, &pByte, &dwValueSize);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: HrRegQueryValueWithAlloc %S failed: 0x%lx",
|
|
__FUNCNAME__, c_wszRegValSharedPrivateLan, hr);
|
|
|
|
goto Exit;
|
|
}
|
|
|
|
hr = HrRegSetValueEx(hKey, c_wszRegValBackupSharedPrivateLan, dwType, pByte, dwValueSize);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: HrRegSetValueEx %S failed: 0x%lx",
|
|
__FUNCNAME__, c_wszRegValBackupSharedPrivateLan, hr);
|
|
|
|
goto Exit;
|
|
}
|
|
|
|
Exit:
|
|
// Delete SharedConnection and ShardPrivateLan named values, ignore any errors
|
|
HrRegDeleteValue(hKey, c_wszRegValSharedConnection);
|
|
HrRegDeleteValue(hKey, c_wszRegValSharedPrivateLan);
|
|
|
|
RegSafeCloseKey(hKey);
|
|
if (pByte)
|
|
{
|
|
MemFree(pByte);
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Gets the RAS phonebook directory
|
|
|
|
Arguments:
|
|
[out] pszPathBuf The phone book path
|
|
|
|
Returns: S_OK if succeeded
|
|
Notes:
|
|
|
|
--*/
|
|
HRESULT GetPhonebookDirectory(WCHAR* pwszPathBuf)
|
|
// Loads caller's 'pszPathBuf' (should have length MAX_PATH + 1) with the
|
|
// path to the directory containing phonebook files for the given mode,
|
|
// e.g. c:\nt\system32\ras\" for mode PBM_Router. Note the
|
|
// trailing backslash.
|
|
//
|
|
// Returns true if successful, false otherwise. Caller is guaranteed that
|
|
// an 8.3 filename will fit on the end of the directory without exceeding
|
|
// MAX_PATH.
|
|
//
|
|
{
|
|
DefineFunctionName("GetPhonebookDirectory");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
|
|
HANDLE hToken = NULL;
|
|
|
|
PFNSHGETFOLDERPATHW pfnSHGetFolderPathW;
|
|
HINSTANCE Hinstance;
|
|
|
|
//
|
|
// Load ShFolder.dll, which contains the 'SHGetFolderPath' entrypoint
|
|
// that we will use to get the Application data for all users path
|
|
|
|
if (!(Hinstance = LoadLibraryW(c_wszShFolder)) ||
|
|
!(pfnSHGetFolderPathW = (PFNSHGETFOLDERPATHW)
|
|
GetProcAddress(Hinstance, c_szSHGetFolderPathW)))
|
|
{
|
|
if (Hinstance)
|
|
{
|
|
FreeLibrary(Hinstance);
|
|
}
|
|
return E_FAIL;
|
|
}
|
|
|
|
if ((OpenThreadToken(
|
|
GetCurrentThread(),
|
|
TOKEN_QUERY | TOKEN_IMPERSONATE,
|
|
TRUE,
|
|
&hToken)
|
|
|| OpenProcessToken(
|
|
GetCurrentProcess(),
|
|
TOKEN_QUERY | TOKEN_IMPERSONATE,
|
|
&hToken)))
|
|
{
|
|
HRESULT hr;
|
|
INT csidl = CSIDL_COMMON_APPDATA;
|
|
|
|
hr = pfnSHGetFolderPathW(NULL, csidl, hToken, 0, pwszPathBuf);
|
|
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
if(lstrlen(pwszPathBuf) <=
|
|
(MAX_PATH -
|
|
(lstrlen(c_wszPhoneBookPath))))
|
|
{
|
|
lstrcat(pwszPathBuf, c_wszPhoneBookPath);
|
|
CloseHandle(hToken);
|
|
FreeLibrary(Hinstance);
|
|
return S_OK;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidError, "%s: SHGetFolderPath failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
|
|
CloseHandle(hToken);
|
|
}
|
|
FreeLibrary(Hinstance);
|
|
return E_FAIL;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
CSharedAccessServer::CSharedAccessServer() Constructor
|
|
|
|
Arguments: none
|
|
|
|
Return Value: none
|
|
|
|
Notes:
|
|
|
|
--*/
|
|
CSharedAccessServer::CSharedAccessServer()
|
|
{
|
|
m_wPort = 0;
|
|
m_wInternalPort = 0;
|
|
m_bBuiltIn = FALSE;
|
|
m_bSelected = FALSE;
|
|
m_dwSectionNum = 0;
|
|
};
|
|
|
|
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Returns the current list of Shared Access Servers
|
|
|
|
Arguments:
|
|
[in,out] lstSharedAccessServers List of SharedAccessServers
|
|
|
|
Returns: S_OK if succeeded
|
|
|
|
Notes: Reads the sharedaccess.ini phonebook file for server mappings.
|
|
|
|
--*/
|
|
HRESULT GetServerMappings(list<CSharedAccessServer> &lstSharedAccessServers)
|
|
{
|
|
WCHAR wszPathBuf[MAX_PATH + 1];
|
|
HRESULT hr = GetPhonebookDirectory(wszPathBuf);
|
|
if FAILED(hr)
|
|
return hr;
|
|
|
|
tstring strIniFile; // full pathname to sharedaccess.ini
|
|
strIniFile = wszPathBuf;
|
|
strIniFile += c_wszFileSharedAccess;
|
|
|
|
const DWORD dwBufSize = 32768; // limit the section buffer size to the same value as Win9x max. buffer size
|
|
PWCHAR wszLargeReturnedString = new WCHAR[dwBufSize];
|
|
if (NULL == wszLargeReturnedString)
|
|
{
|
|
return E_OUTOFMEMORY;
|
|
}
|
|
|
|
DWORD dwResult;
|
|
dwResult = GetPrivateProfileSection(c_wszContentsServer, wszLargeReturnedString, dwBufSize-1, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
PWCHAR wszEnd = wszLargeReturnedString + dwResult;
|
|
|
|
for (PWCHAR wszServer = wszLargeReturnedString; (*wszServer) && (wszServer < wszEnd); wszServer += wcslen(wszServer) + 1)
|
|
{
|
|
WCHAR wszReturnedString[MAX_PATH];
|
|
PWCHAR wszSectionNum = NULL;
|
|
PWCHAR wszEnabled;
|
|
|
|
// prefix bug# 295834
|
|
wszSectionNum = new WCHAR[wcslen(wszServer)+1];
|
|
if (NULL == wszSectionNum)
|
|
{
|
|
delete [] wszLargeReturnedString;
|
|
return E_OUTOFMEMORY;
|
|
}
|
|
wcscpy(wszSectionNum, wszServer);
|
|
PWCHAR wszAssign = wcschr(wszSectionNum, L'=');
|
|
if (wszAssign)
|
|
{
|
|
*wszAssign = NULL;
|
|
wszEnabled = wszAssign + 1;
|
|
}
|
|
else
|
|
{
|
|
wszEnabled = FALSE;
|
|
}
|
|
|
|
tstring strSectionName;
|
|
strSectionName = c_wszServerPrefix; // prefix bug# 295835
|
|
strSectionName += wszSectionNum; // prefix bug# 295836
|
|
|
|
CSharedAccessServer SharedAccessServer;
|
|
SharedAccessServer.m_dwSectionNum = _wtoi(wszSectionNum);
|
|
SharedAccessServer.m_bSelected = _wtoi(wszEnabled);
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszInternalName, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessServer.m_szInternalName = wszReturnedString;
|
|
}
|
|
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszTitle, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessServer.m_szTitle = wszReturnedString;
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszInternalPort, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessServer.m_wInternalPort = static_cast<USHORT>(_wtoi(wszReturnedString));
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszPort, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessServer.m_wPort = static_cast<USHORT>(_wtoi(wszReturnedString));
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszReservedAddress, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessServer.m_szReservedAddress = wszReturnedString;
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszProtocol, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessServer.m_szProtocol = wszReturnedString;
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszBuiltIn, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessServer.m_bBuiltIn = static_cast<USHORT>(_wtoi(wszReturnedString));
|
|
}
|
|
lstSharedAccessServers.insert(lstSharedAccessServers.end(), SharedAccessServer);
|
|
delete [] wszSectionNum;
|
|
wszSectionNum = NULL;
|
|
}
|
|
}
|
|
|
|
delete [] wszLargeReturnedString;
|
|
return S_OK;
|
|
}
|
|
|
|
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Returns the current list of Shared Access Applications
|
|
|
|
Arguments:
|
|
[in,out] lstSharedAccessApplications List of SharedAccessApplications
|
|
|
|
Returns: S_OK if succeeded
|
|
|
|
Notes: Reads the sharedaccess.ini phonebook file for application mappings.
|
|
|
|
--*/
|
|
HRESULT GetApplicationMappings(list<CSharedAccessApplication> &lstSharedAccessApplications)
|
|
{
|
|
WCHAR wszPathBuf[MAX_PATH + 1];
|
|
HRESULT hr = GetPhonebookDirectory(wszPathBuf);
|
|
if FAILED(hr)
|
|
return hr;
|
|
|
|
tstring strIniFile; // full pathname to sharedaccess.ini
|
|
strIniFile = wszPathBuf;
|
|
strIniFile += c_wszFileSharedAccess;
|
|
|
|
const DWORD dwBufSize = 32768; // limit the section buffer size to the same value as Win9x max. buffer size
|
|
PWCHAR wszLargeReturnedString = new WCHAR[dwBufSize];
|
|
if (NULL == wszLargeReturnedString)
|
|
{
|
|
return E_OUTOFMEMORY;
|
|
}
|
|
|
|
DWORD dwResult;
|
|
dwResult = GetPrivateProfileSection(c_wszContentsApplication, wszLargeReturnedString, dwBufSize-1, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
PWCHAR wszEnd = wszLargeReturnedString + dwResult;
|
|
|
|
for (PWCHAR wszApplication = wszLargeReturnedString; (*wszApplication) && (wszApplication < wszEnd); wszApplication += wcslen(wszApplication) + 1)
|
|
{
|
|
WCHAR wszReturnedString[MAX_PATH];
|
|
PWCHAR wszSectionNum = NULL;
|
|
PWCHAR wszEnabled;
|
|
|
|
// prefix bug# 295838
|
|
wszSectionNum = new WCHAR[wcslen(wszApplication)+1];
|
|
if (NULL == wszSectionNum)
|
|
{
|
|
delete [] wszLargeReturnedString;
|
|
return E_OUTOFMEMORY;
|
|
}
|
|
wcscpy(wszSectionNum, wszApplication);
|
|
PWCHAR wszAssign = wcschr(wszSectionNum, L'=');
|
|
if (wszAssign)
|
|
{
|
|
*wszAssign = NULL;
|
|
wszEnabled = wszAssign + 1;
|
|
}
|
|
else
|
|
{
|
|
wszEnabled = FALSE;
|
|
}
|
|
|
|
tstring strSectionName;
|
|
strSectionName = c_wszApplicationPrefix; // prefix bug# 295839
|
|
strSectionName += wszSectionNum; // prefix bug# 295840
|
|
|
|
CSharedAccessApplication SharedAccessApplication;
|
|
SharedAccessApplication.m_dwSectionNum = _wtoi(wszSectionNum);
|
|
SharedAccessApplication.m_bSelected = _wtoi(wszEnabled);
|
|
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszTitle, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessApplication.m_szTitle = wszReturnedString;
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszProtocol, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessApplication.m_szProtocol = wszReturnedString;
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszPort, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessApplication.m_wPort = static_cast<USHORT>(_wtoi(wszReturnedString));
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszTcpResponseList, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessApplication.m_szTcpResponseList = wszReturnedString;
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszUdpResponseList, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessApplication.m_szUdpResponseList = wszReturnedString;
|
|
}
|
|
dwResult = GetPrivateProfileString(strSectionName.c_str(), c_wszBuiltIn, L"", wszReturnedString, MAX_PATH, strIniFile.c_str());
|
|
if (dwResult)
|
|
{
|
|
SharedAccessApplication.m_bBuiltIn = static_cast<USHORT>(_wtoi(wszReturnedString));
|
|
}
|
|
lstSharedAccessApplications.insert(lstSharedAccessApplications.end(), SharedAccessApplication);
|
|
delete [] wszSectionNum;
|
|
wszSectionNum = NULL;
|
|
}
|
|
}
|
|
|
|
delete [] wszLargeReturnedString;
|
|
return S_OK;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Add ResponseList string into vector of HNET_RESPONSE_RANGE
|
|
|
|
Arguments:
|
|
[in] rssaAppProt - ref. to the CSharedAccessApplication obj.
|
|
[in] ucProtocol - NAT_PROTOCOL_TCP or NAT_PROTOCOL_UDP
|
|
[out] rvecResponseRange - add new HNET_RESPONSE_RANGE(s) to this vector
|
|
|
|
Returns: S_OK if succeeded
|
|
|
|
Notes: In case of failure, contents of rvecResponseRange will be erased.
|
|
Design by contract: ucProtocol could only be NAT_PROTOCOL_TCP or
|
|
NAT_PROTOCOL_UDP
|
|
|
|
--*/
|
|
HRESULT AddResponseStringToVector(
|
|
CSharedAccessApplication& rsaaAppProt,
|
|
UCHAR ucProtocol,
|
|
vector<HNET_RESPONSE_RANGE>& rvecResponseRange // vector of response range
|
|
)
|
|
{
|
|
WCHAR* Endp;
|
|
USHORT EndPort; // the End port # in the range of response port #
|
|
USHORT StartPort; // the starting port # in the range of response port #
|
|
const WCHAR* pwszValue = NULL; // the tcp or udp ResponseString to be converted.
|
|
// (e.g "1300-1310,1450" or "1245")
|
|
HNET_RESPONSE_RANGE hnrrResponseRange; // the response range
|
|
HRESULT hr = S_OK;
|
|
|
|
|
|
|
|
// select the ResponseList to be added
|
|
if (NAT_PROTOCOL_TCP == ucProtocol)
|
|
{
|
|
pwszValue = rsaaAppProt.m_szTcpResponseList.c_str();
|
|
}
|
|
else if (NAT_PROTOCOL_UDP == ucProtocol)
|
|
{
|
|
pwszValue = rsaaAppProt.m_szUdpResponseList.c_str();
|
|
}
|
|
|
|
if (NULL == pwszValue)
|
|
{
|
|
// no operation
|
|
goto Exit;
|
|
}
|
|
|
|
while (*pwszValue)
|
|
{
|
|
// Read either a single port or a range of ports.
|
|
if (!(StartPort = (USHORT)wcstoul(pwszValue, &Endp, 10)))
|
|
{
|
|
hr = E_FAIL;
|
|
goto Exit;
|
|
}
|
|
else if (!*Endp || *Endp == L',')
|
|
{
|
|
EndPort = StartPort;
|
|
pwszValue = (!*Endp ? Endp : Endp + 1);
|
|
}
|
|
else if (*Endp != L'-')
|
|
{
|
|
hr = E_FAIL;
|
|
goto Exit;
|
|
}
|
|
else if (!(EndPort = (USHORT)wcstoul(++Endp, (WCHAR**)&pwszValue, 10)))
|
|
{
|
|
hr = E_FAIL;
|
|
goto Exit;
|
|
}
|
|
else if (EndPort < StartPort)
|
|
{
|
|
hr = E_FAIL;
|
|
goto Exit;
|
|
}
|
|
else if (*pwszValue && *pwszValue++ != L',')
|
|
{
|
|
hr = E_FAIL;
|
|
goto Exit;
|
|
}
|
|
|
|
// transfer values
|
|
hnrrResponseRange.ucIPProtocol = ucProtocol;
|
|
hnrrResponseRange.usStartPort = HTONS(StartPort);
|
|
hnrrResponseRange.usEndPort = HTONS(EndPort);
|
|
|
|
rvecResponseRange.push_back(hnrrResponseRange);
|
|
}
|
|
Exit:
|
|
if (FAILED(hr))
|
|
{
|
|
rvecResponseRange.erase(rvecResponseRange.begin(), rvecResponseRange.end());
|
|
}
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Converts ResponseList string into array of HNET_RESPONSE_RANGE
|
|
|
|
Arguments:
|
|
|
|
[in] rssaAppProt - ref. to the CSharedAccessApplication obj.
|
|
[out] puscResponse - number of HNET_RESPONSE_RANGE converted
|
|
[out] pphnrrResponseRange - array of HNET_RESPONSE_RANGE converted
|
|
|
|
Returns: S_OK if succeeded
|
|
|
|
Notes: User is responsible to free pphnrrResponseRange by
|
|
"delete [] (BYTE*)(*pphnrrResponseRange)" if *puscResponse > 0
|
|
|
|
--*/
|
|
HRESULT PutResponseStringIntoArray(
|
|
CSharedAccessApplication& rsaaAppProt, // Application Protocol
|
|
USHORT* puscResponse,
|
|
HNET_RESPONSE_RANGE** pphnrrResponseRange
|
|
)
|
|
{
|
|
HRESULT hr;
|
|
DWORD dwIdx = 0;
|
|
|
|
Assert(pphnrrResponseRange != NULL);
|
|
Assert(puscResponse != NULL);
|
|
*pphnrrResponseRange = NULL;
|
|
*puscResponse = 0;
|
|
|
|
vector<HNET_RESPONSE_RANGE> vecResponseRange; // vector of response range
|
|
|
|
if (! rsaaAppProt.m_szTcpResponseList.empty())
|
|
{
|
|
//TcpResponseList is not empty
|
|
hr = AddResponseStringToVector(rsaaAppProt, NAT_PROTOCOL_TCP, vecResponseRange);
|
|
if (FAILED(hr))
|
|
{
|
|
return hr;
|
|
}
|
|
}
|
|
|
|
if (! rsaaAppProt.m_szUdpResponseList.empty())
|
|
{
|
|
// UdpResponseList is not empty
|
|
hr = AddResponseStringToVector(rsaaAppProt, NAT_PROTOCOL_UDP, vecResponseRange);
|
|
if (FAILED(hr))
|
|
{
|
|
return hr;
|
|
}
|
|
}
|
|
|
|
HNET_RESPONSE_RANGE* phnrrResponseRange = NULL;
|
|
USHORT uscResponseRange = (USHORT) vecResponseRange.size();
|
|
if (1 > uscResponseRange)
|
|
{
|
|
// we should have at least 1 ReponseRange
|
|
hr = E_FAIL;
|
|
goto Exit;
|
|
}
|
|
|
|
phnrrResponseRange = (HNET_RESPONSE_RANGE*)
|
|
new BYTE[sizeof(HNET_RESPONSE_RANGE) * uscResponseRange];
|
|
if (phnrrResponseRange == NULL)
|
|
{
|
|
hr = E_OUTOFMEMORY;
|
|
goto Exit;
|
|
}
|
|
|
|
for (vector<HNET_RESPONSE_RANGE>::iterator iter = vecResponseRange.begin();
|
|
iter != vecResponseRange.end();
|
|
++iter, ++dwIdx)
|
|
{
|
|
phnrrResponseRange[dwIdx] = *iter;
|
|
}
|
|
// transfer values
|
|
*pphnrrResponseRange = phnrrResponseRange;
|
|
*puscResponse = uscResponseRange;
|
|
|
|
Exit:
|
|
vecResponseRange.erase(vecResponseRange.begin(), vecResponseRange.end());
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Check if we need to upgrade ICS from Win2K
|
|
|
|
Returns: TRUE or FALSE
|
|
|
|
Notes:
|
|
1. Check if registry value names (SharedConnection and
|
|
SharedPrivateLan) exist.
|
|
2. Check if sharedaccess.ini file exists
|
|
After upgrade, the registry names should be deleted because
|
|
ICS will use settings from WMI repository.
|
|
We don't Check if the IPNATHLP service exists, because it is
|
|
removed in ADS and DTC SKUs
|
|
--*/
|
|
BOOL FNeedIcsUpgradeFromWin2K()
|
|
{
|
|
// 1. Check if registry key values exist
|
|
HKEY hKey = NULL;
|
|
HRESULT hr = S_OK;
|
|
|
|
hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, c_wszRegKeySharedAccessParams, KEY_ALL_ACCESS, &hKey);
|
|
if (FAILED(hr))
|
|
{
|
|
return FALSE;
|
|
}
|
|
Assert(hKey);
|
|
|
|
DWORD dwType = REG_BINARY;
|
|
PBYTE pByte = NULL;
|
|
DWORD dwValueSize = 0;
|
|
|
|
hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedConnection, &dwType, &pByte, &dwValueSize);
|
|
if (FAILED(hr))
|
|
{
|
|
RegSafeCloseKey(hKey);
|
|
return FALSE;
|
|
}
|
|
if (pByte)
|
|
{
|
|
MemFree(pByte);
|
|
}
|
|
|
|
// Reset values
|
|
pByte = NULL;
|
|
dwValueSize = 0;
|
|
dwType = REG_SZ;
|
|
|
|
hr = HrRegQueryValueWithAlloc(hKey, c_wszRegValSharedPrivateLan, &dwType, &pByte, &dwValueSize);
|
|
if (FAILED(hr))
|
|
{
|
|
RegSafeCloseKey(hKey);
|
|
return FALSE;
|
|
}
|
|
if (pByte)
|
|
{
|
|
MemFree(pByte);
|
|
}
|
|
|
|
// 2. Check if sharedaccess.ini file exists
|
|
WCHAR wszPathBuf[MAX_PATH + 1];
|
|
hr = GetPhonebookDirectory(wszPathBuf);
|
|
if FAILED(hr)
|
|
return FALSE;
|
|
|
|
tstring strShareAccessFile;
|
|
strShareAccessFile = wszPathBuf;
|
|
strShareAccessFile += c_wszFileSharedAccess;
|
|
|
|
HANDLE hOpenFile =
|
|
CreateFileW(strShareAccessFile.c_str(), // open file
|
|
GENERIC_READ, // open for reading
|
|
FILE_SHARE_READ, // share for reading
|
|
NULL, // no security
|
|
OPEN_EXISTING, // existing file only
|
|
FILE_ATTRIBUTE_NORMAL, // normal file
|
|
NULL); // no attr. template
|
|
|
|
if (INVALID_HANDLE_VALUE == hOpenFile)
|
|
{
|
|
return FALSE;
|
|
}
|
|
CloseHandle(hOpenFile);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Upgrade ICS Settings
|
|
|
|
Arguments:
|
|
[in] pIcsUpgradeSettings - the ICS UPGRADE SETTINGS
|
|
|
|
Returns: standard HRESULT
|
|
|
|
Notes:
|
|
|
|
--*/
|
|
HRESULT UpgradeIcsSettings(ICS_UPGRADE_SETTINGS * pIcsUpgrdSettings)
|
|
{
|
|
HRESULT hr;
|
|
|
|
DefineFunctionName("UpgradeIcsSettings");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
CIcsUpgrade IcsUpgradeObj;
|
|
hr = IcsUpgradeObj.Init(pIcsUpgrdSettings);
|
|
if (S_OK != hr)
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: IcsUpgradeObj.Init failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
return IcsUpgradeObj.StartUpgrade();
|
|
}
|
|
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Build the ICS_UPGRADE_SETTINGS struct from Win2K ICS settings
|
|
|
|
Arguments:
|
|
|
|
[in] pIcsUpgrdSettings - pointer to the ICS_UPGRADE_SETTINGS
|
|
|
|
Return Value: standard HRESULT
|
|
|
|
Notes:
|
|
|
|
--*/
|
|
HRESULT BuildIcsUpgradeSettingsFromWin2K(ICS_UPGRADE_SETTINGS* pIcsUpgrdSettings)
|
|
{
|
|
HRESULT hr;
|
|
|
|
DefineFunctionName("BuildIcsUpgradeSettingsFromWin2K");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
Assert(pIcsUpgrdSettings != NULL);
|
|
|
|
|
|
GUID guid;
|
|
hr = GetSharedPrivateLanOnWin2K(&guid);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: GetSharedPrivateLanOnWin2K failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
|
|
hr = GetSharedConnectionOnWin2k(&(pIcsUpgrdSettings->rscExternal));
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: GetSharedConnectionOnWin2k failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
|
|
hr = GetServerMappings(pIcsUpgrdSettings->listSvrPortmappings);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: Ignore error from GetServerMappings : 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
|
|
hr = GetApplicationMappings(pIcsUpgrdSettings->listAppPortmappings);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: Ignore error from GetApplicationMappings : 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
|
|
// transfer values
|
|
pIcsUpgrdSettings->guidInternal = guid;
|
|
pIcsUpgrdSettings->fInternalAdapterFound = TRUE;
|
|
pIcsUpgrdSettings->fDialOnDemand = TRUE;
|
|
pIcsUpgrdSettings->fEnableICS = TRUE;
|
|
pIcsUpgrdSettings->fShowTrayIcon = TRUE;
|
|
pIcsUpgrdSettings->fWin2KUpgrade = TRUE;
|
|
|
|
return S_OK;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Free resources inside the ICS_UPGRADE_SETTINGS
|
|
|
|
Arguments:
|
|
|
|
[in] pIcsUpgrdSettings - pointer to the ICS_UPGRADE_SETTINGS
|
|
|
|
Return Value: none
|
|
|
|
Note.
|
|
|
|
--*/
|
|
void FreeIcsUpgradeSettings(ICS_UPGRADE_SETTINGS* pIcsUpgrdSettings)
|
|
{
|
|
Assert(pIcsUpgrdSettings != NULL);
|
|
|
|
list<GUID>& rlistPersonalFirewall = pIcsUpgrdSettings->listPersonalFirewall;
|
|
list<GUID>& rlistBridge = pIcsUpgrdSettings->listBridge;
|
|
list<CSharedAccessServer>& rlistSvrPortmappings = pIcsUpgrdSettings->listSvrPortmappings;
|
|
list<CSharedAccessApplication>& rlistAppPortmappings = pIcsUpgrdSettings->listAppPortmappings;
|
|
|
|
rlistPersonalFirewall.erase(rlistPersonalFirewall.begin(), rlistPersonalFirewall.end());
|
|
rlistBridge.erase(rlistBridge.begin(), rlistBridge.end());
|
|
rlistSvrPortmappings.erase(rlistSvrPortmappings.begin(), rlistSvrPortmappings.end());
|
|
rlistAppPortmappings.erase(rlistAppPortmappings.begin(), rlistAppPortmappings.end());
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
convert a list of adapter strings into a list of its corresponding GUID
|
|
|
|
Arguments:
|
|
|
|
[in] rslAdapters - reference to the list of adapter strings
|
|
[in out] rlistGuid - a list of the converted GUIDs
|
|
|
|
Return Value:
|
|
S_OK - if either all of the adapter strings converted to its corresponding
|
|
GUIDs or the input is an empty list of adapter strings.
|
|
S_FALSE - if it can convert at least one of the adaper strings.
|
|
E_FAIL - if none of the adapter strings could be converted to its
|
|
corresponding GUIDs
|
|
|
|
--*/
|
|
HRESULT ConvertAdapterStringListToGuidList(IN TStringList& rslAdapters,
|
|
IN OUT list<GUID>& rlistGuid)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
GUID guidTemp = {0};
|
|
tstring* pstrTemp = NULL;
|
|
TStringList::iterator iter;
|
|
|
|
if (rslAdapters.empty())
|
|
return hr;
|
|
|
|
// init the [in out] parameter first
|
|
rlistGuid.erase(rlistGuid.begin(), rlistGuid.end());
|
|
|
|
for (iter = rslAdapters.begin(); iter != rslAdapters.end(); ++iter)
|
|
{
|
|
pstrTemp = *iter;
|
|
|
|
Assert(pstrTemp);
|
|
if (!FGetInstanceGuidOfComponentFromAnswerFileMap(pstrTemp->c_str(), &guidTemp))
|
|
{
|
|
TraceTag(ttidError,
|
|
"FGetInstanceGuidOfComponentFromAnswerFileMap failed to match GUID for adapter %S",
|
|
pstrTemp->c_str());
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_E_ADAPTER_TO_GUID),
|
|
pstrTemp->c_str());
|
|
}
|
|
else
|
|
{
|
|
rlistGuid.push_back(guidTemp);
|
|
}
|
|
}
|
|
|
|
if (rlistGuid.empty())
|
|
{
|
|
hr = E_FAIL;
|
|
}
|
|
if (rlistGuid.size() < rslAdapters.size())
|
|
{
|
|
hr = S_FALSE;
|
|
}
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
remove duplicates in a TStringList
|
|
|
|
Arguments:
|
|
|
|
[in, out] sl - the string list contains duplicates to be removed
|
|
|
|
|
|
Return Value: none
|
|
|
|
|
|
--*/
|
|
void RemoveDupsInTStringList(IN OUT TStringList& sl)
|
|
{
|
|
for (list<tstring*>::iterator i = sl.begin(); i != sl.end(); ++i)
|
|
{
|
|
list<tstring*>::iterator tmpI = i;
|
|
for (list<tstring*>::iterator j = ++tmpI; j != sl.end(); ++j)
|
|
{
|
|
list<tstring*>::iterator tmpJ = j;
|
|
list<tstring*>::iterator k = --tmpJ;
|
|
if (!_wcsicmp((*i)->c_str(), (*j)->c_str()))
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"RemoveDupsInTStringList: found duplicated string %S",
|
|
(*i)->c_str());
|
|
|
|
delete *j; // free the resource
|
|
sl.erase(j); // erase the list item
|
|
j = k; // adjust the iterator to the previous one
|
|
}
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
remove items in slDest if the item is also in slSrc
|
|
|
|
Arguments:
|
|
|
|
[in] slSrc - the source string list contains items to be matched
|
|
[in, out] slDest - the string list where equal items are removed
|
|
|
|
Return Value: none
|
|
|
|
Note : Both slSrc and slDest MUST not contain duplicated items.
|
|
|
|
--*/
|
|
void RemoveEqualItems(IN const TStringList& slSrc, IN OUT TStringList& slDest)
|
|
{
|
|
list<tstring*>::iterator _F = slSrc.begin(), _L = slSrc.end(), pos;
|
|
if (slDest.empty())
|
|
return;
|
|
while (_F != _L)
|
|
{
|
|
if (FIsInStringList(slDest, (*_F)->c_str(), &pos))
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"RemoveEqualItems: '%S' appeared in both slSrc and slDest lists, remove it from slDest.",
|
|
(*_F)->c_str());
|
|
|
|
// found a matched item.
|
|
delete *pos;
|
|
slDest.erase(pos);
|
|
if (slDest.empty())
|
|
return;
|
|
}
|
|
++_F;
|
|
}
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
remove item in slDest if the item is the same as pstrSrc
|
|
|
|
Arguments:
|
|
|
|
[in] strSrc - the source string to be matched
|
|
[in, out] slDest - the string list where equal item is removed
|
|
|
|
Return Value: none
|
|
|
|
Note : Both slDest MUST not contain duplicated items.
|
|
|
|
--*/
|
|
void RemoveEqualItems(IN const tstring& strSrc, IN OUT TStringList& slDest)
|
|
{
|
|
list<tstring*>::iterator pos;
|
|
if (FIsInStringList(slDest, strSrc.c_str(), &pos))
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"RemoveEqualItems: remove '%S' from slDest.",
|
|
strSrc.c_str());
|
|
|
|
// found a matched item.
|
|
delete *pos;
|
|
slDest.erase(pos);
|
|
if (slDest.empty())
|
|
return;
|
|
}
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Load Homenet settings from the answer file and put the
|
|
settings into the ICS_UPGRADE_SETTINGS structure
|
|
|
|
Arguments:
|
|
[in] pwifAnswerFile the access point of the answer file
|
|
[in/out] pSettings it contains the settings when the
|
|
routine returns S_OK
|
|
|
|
Returns: S_OK if there are Homenet settings in the answer file
|
|
S_FALSE: no Homenet settings present in the answer file
|
|
otherwise the failure code
|
|
|
|
Notes:
|
|
Bug# 253047, the Answer-File for a Win9x ICS upgrade will
|
|
look like the following (if Clean install WinMe, selecting custom
|
|
installation, and select ICS as an optional component.):
|
|
[Homenet]
|
|
IsW9xUpgrade='1'
|
|
EnableICS="1"
|
|
ShowTrayIcon="1"
|
|
|
|
Bug# 304474, in this case, Answer-File for a Win9x ICS upgrade will look
|
|
like (There is no value for ExternalAdapter or
|
|
ExternalConnectionName key.):
|
|
[Homenet]
|
|
IsW9xUpgrade='1'
|
|
InternalAdapter="Adapter2"
|
|
DialOnDemand="0"
|
|
EnableICS="1"
|
|
ShowTrayIcon="1"
|
|
|
|
|
|
More notes regarding validation of Answer File:
|
|
1. if adapter found in both the PersonalFirewall list and Bridge list,
|
|
remove that adaper from the PersonalFirewall list.
|
|
2. if ICS public LAN found in Bridge list, it will be removed from the
|
|
Bridge list.
|
|
3. if ICS private found in Firewall list, remove that adapter from the
|
|
PersonalFirewall list.
|
|
|
|
--*/
|
|
HRESULT LoadIcsSettingsFromAnswerFile(
|
|
CWInfFile* pwifAnswerFile,
|
|
PICS_UPGRADE_SETTINGS pSettings
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
BOOL fRet;
|
|
PCWInfSection pwifSection = NULL;
|
|
//BOOL fInternalAdapterFound = FALSE;
|
|
|
|
DefineFunctionName("LoadIcsSettingsFromAnswerFile");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
Assert(pwifAnswerFile);
|
|
Assert(pSettings);
|
|
|
|
pwifSection = pwifAnswerFile->FindSection(c_wszHomenetSection);
|
|
if (NULL == pwifSection)
|
|
return S_FALSE;
|
|
|
|
tstring strTemp;
|
|
TStringList slICF, slBridge; // hold comma-delimited string into a list
|
|
GUID guidTemp = {0};
|
|
BOOL fTemp = FALSE;
|
|
|
|
do
|
|
{
|
|
// ICS Upgrade from Win9x or Unattended Homenet clean install
|
|
|
|
|
|
// determine if this answer file is for Win9x upgrade or
|
|
// Homenet unattended clean install
|
|
pSettings->fWin9xUpgrade = pwifSection->GetBoolValue(c_wszIsW9xUpgrade, FALSE);
|
|
pSettings->fXpUnattended = !pSettings->fWin9xUpgrade;
|
|
|
|
// default value for EnableICS is FALSE
|
|
pSettings->fEnableICS = pwifSection->GetBoolValue(c_wszICSEnabled, FALSE);
|
|
|
|
// default value for InternalIsBridge is FALSE
|
|
pSettings->fInternalIsBridge = pwifSection->GetBoolValue(c_wszInternalIsBridge, FALSE);
|
|
|
|
TraceTag(ttidNetSetup,
|
|
"IsW9xUpgrade: %S, EnableICS: %S, InternalIsBridge: %S",
|
|
pSettings->fWin9xUpgrade ? L"Yes" : L"No",
|
|
pSettings->fEnableICS ? L"Yes" : L"No",
|
|
pSettings->fInternalIsBridge ? L"Yes" : L"No");
|
|
|
|
//
|
|
// get a list of interface GUID for the Internet Connection Firewall
|
|
// (ICF) and a list of interface GUID that forms the bridge. We'll also
|
|
// do validation before converting adapter names to interface GUID
|
|
//
|
|
fRet = pwifSection->GetStringListValue(c_wszPersonalFirewall, slICF);
|
|
if (fRet)
|
|
{
|
|
// remove duplicates within slICF
|
|
RemoveDupsInTStringList(slICF);
|
|
}
|
|
fRet = pwifSection->GetStringListValue(c_wszBridge, slBridge);
|
|
if (fRet)
|
|
{
|
|
// remove duplicates within slBridge
|
|
RemoveDupsInTStringList(slBridge);
|
|
}
|
|
if (!slICF.empty() && !slBridge.empty())
|
|
{
|
|
// remove items in slICF if the item is also in slBridge
|
|
RemoveEqualItems(slBridge, slICF);
|
|
}
|
|
|
|
// if ICS is enabled, get the share connection.
|
|
// If the share connection is a LAN connection, make sure it is
|
|
// not a member of the bridge.
|
|
if (pSettings->fEnableICS)
|
|
{
|
|
fRet = pwifSection->GetStringValue(c_wszExternalAdapter, strTemp);
|
|
if (fRet)
|
|
{
|
|
if (!FGetInstanceGuidOfComponentFromAnswerFileMap(strTemp.c_str(), &guidTemp))
|
|
{
|
|
TraceTag(ttidError,
|
|
"FGetInstanceGuidOfComponentFromAnswerFileMap failed to match GUID for adapter %S",
|
|
strTemp.c_str());
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_E_ADAPTER_TO_GUID),
|
|
strTemp.c_str());
|
|
|
|
hr = E_FAIL;
|
|
break;
|
|
}
|
|
pSettings->rscExternal.fIsLanConnection = TRUE;
|
|
pSettings->rscExternal.guid = guidTemp;
|
|
// Another validation:
|
|
// ICS public LAN adapter couldn't be a member of a bridge
|
|
if (! slBridge.empty())
|
|
{
|
|
RemoveEqualItems(strTemp, slBridge);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Can't find "ExternalAdapter" key in answer-file.
|
|
// We'll try the "ExternalConnectionName" key.
|
|
|
|
TraceTag(ttidNetSetup,
|
|
"pwifSection->GetStringValue failed to get %S, we will try to get %S",
|
|
c_wszExternalAdapter, c_wszExternalConnectionName);
|
|
|
|
fRet = pwifSection->GetStringValue(c_wszExternalConnectionName, strTemp);
|
|
if (! fRet)
|
|
{
|
|
if (pSettings->fWin9xUpgrade)
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"pwifSection->GetStringValue failed to get %S too.",
|
|
c_wszExternalConnectionName);
|
|
TraceTag(ttidNetSetup,
|
|
"We will try to look for a WAN connectoid as the ExternalConnectionName.");
|
|
// Bug# 304474
|
|
// Cook up a fake WAN connectoid name, the code in
|
|
// GetINetConnectionByName will later try to resolve it
|
|
// to a WAN connectoid if there is *only 1* WAN
|
|
// connectoid left on the system. WAN connectoid has
|
|
// media types of either NCM_PHONE, NCM_ISDN or
|
|
// NCM_TUNNEL.
|
|
lstrcpynW(pSettings->rscExternal.name.szEntryName,
|
|
L"X1-2Bogus-3WAN-4Conn-5Name",
|
|
celems(pSettings->rscExternal.name.szEntryName));
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidError,
|
|
"pwifSection->GetStringValue failed to get %S too.",
|
|
c_wszExternalConnectionName);
|
|
|
|
hr = E_FAIL;
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
lstrcpynW(pSettings->rscExternal.name.szEntryName,
|
|
strTemp.c_str(),
|
|
celems(pSettings->rscExternal.name.szEntryName));
|
|
}
|
|
|
|
pSettings->rscExternal.fIsLanConnection = FALSE;
|
|
}
|
|
}
|
|
|
|
// convert bridge adapter names to interface GUID
|
|
if (!slBridge.empty())
|
|
{
|
|
hr = ConvertAdapterStringListToGuidList(slBridge, pSettings->listBridge);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(
|
|
ttidError,
|
|
"Error in converting Personal Firewall string list to GUID list");
|
|
break;
|
|
}
|
|
if (S_FALSE == hr)
|
|
{
|
|
hr = S_OK; // convert any S_FALSE to S_OK
|
|
}
|
|
}
|
|
// we will convert the slICF list later because we need to check if
|
|
// ICS private adapter is also in slICF, if yes, we need to remove it
|
|
// from the slICF list.
|
|
|
|
//
|
|
// get the internal adapter GUID
|
|
//
|
|
fRet = pwifSection->GetStringValue(c_wszInternalAdapter, strTemp);
|
|
if (fRet && !pSettings->fInternalIsBridge && !pSettings->fEnableICS)
|
|
{
|
|
// invalid parameters from answer file (AF)
|
|
TraceTag(ttidError,
|
|
"Invalid AF settings: InternalAdapter=%S, InternalIsBridge='0', EnableICS='0'.",
|
|
strTemp.c_str());
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_HOMENET_INVALID_AF_SETTINGS));
|
|
|
|
hr = E_FAIL;
|
|
break;
|
|
|
|
}
|
|
if (fRet && pSettings->fInternalIsBridge)
|
|
{
|
|
TraceTag(ttidError,
|
|
"Invalid AF settings: InternalAdapter=%S, InternalIsBridge='1'.",
|
|
strTemp.c_str());
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_HOMENET_INVALID_AF_SETTINGS));
|
|
|
|
hr = E_FAIL;
|
|
break;
|
|
}
|
|
if (fRet)
|
|
{
|
|
// get the internal adapter GUID if InternalIsBridge is '0'
|
|
Assert(!pSettings->fInternalIsBridge);
|
|
if (!FGetInstanceGuidOfComponentFromAnswerFileMap(strTemp.c_str(), &guidTemp))
|
|
{
|
|
TraceTag(ttidError,
|
|
"FGetInstanceGuidOfComponentFromAnswerFileMap failed to match GUID for adapter %S",
|
|
strTemp.c_str());
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_E_ADAPTER_TO_GUID),
|
|
strTemp.c_str());
|
|
|
|
hr = E_FAIL;
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
pSettings->fInternalAdapterFound = TRUE;
|
|
pSettings->guidInternal = guidTemp;
|
|
// another validation:
|
|
// remove ICS private from the firewall list (slICF)
|
|
// if necessary.
|
|
if (!slICF.empty())
|
|
{
|
|
RemoveEqualItems(strTemp, slICF);
|
|
}
|
|
}
|
|
}
|
|
|
|
// check for other answer file errors
|
|
if (pSettings->fWin9xUpgrade && !pSettings->fEnableICS)
|
|
{
|
|
TraceTag(
|
|
ttidError,
|
|
"Invalid AF settings: IsW9xUpgrade='1', EnableICS='0'");
|
|
|
|
hr = E_FAIL;
|
|
break;
|
|
}
|
|
|
|
// special case for Win9x ICS upgrade.
|
|
if ( pSettings->fWin9xUpgrade)
|
|
{
|
|
// Bug# 315265
|
|
if ( pSettings->fInternalIsBridge &&
|
|
1 == (pSettings->listBridge).size() )
|
|
{
|
|
// for Win9x ICS upgrade, one of the 2 internal adapters is
|
|
// broken, we will continue to do the upgrade without creating
|
|
// the internal bridge.
|
|
|
|
// adjust answer file parameters
|
|
pSettings->fWin9xUpgradeAtLeastOneInternalAdapterBroken = TRUE;
|
|
pSettings->fInternalAdapterFound = TRUE;
|
|
pSettings->guidInternal = *((pSettings->listBridge).begin());
|
|
// note: On Win9x ICS upgrade, there will be no firewall list,
|
|
// so, we don't try to remove this ICS private from the
|
|
// firewall list (slICF).
|
|
pSettings->fInternalIsBridge = FALSE;
|
|
pSettings->listBridge.erase(pSettings->listBridge.begin(),
|
|
pSettings->listBridge.end());
|
|
|
|
TraceTag(
|
|
ttidNetSetup,
|
|
"On Win9x ICS upgrade, one internal adapter couldn't be upgraded.");
|
|
}
|
|
}
|
|
|
|
if ( (pSettings->fInternalIsBridge && (pSettings->listBridge).size() < 2) ||
|
|
(1 == (pSettings->listBridge).size()) )
|
|
{
|
|
TraceTag(
|
|
ttidError,
|
|
"Invalid setting: fInternalIsBridge: %S, size of listBridge: %d",
|
|
pSettings->fInternalIsBridge ? L"TRUE" : L"FALSE",
|
|
(pSettings->listBridge).size());
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_HOMENET_INVALID_AF_SETTINGS));
|
|
|
|
hr = E_FAIL;
|
|
break;
|
|
}
|
|
|
|
if ( pSettings->fEnableICS &&
|
|
!pSettings->fInternalIsBridge &&
|
|
!pSettings->fInternalAdapterFound)
|
|
{
|
|
// Bug# 304474 falls under this case
|
|
TraceTag(
|
|
ttidError,
|
|
"Invalid AF settings: no InternalAdapter, InternalIsBridge='0', EnableICS='1'.");
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_HOMENET_INVALID_AF_SETTINGS));
|
|
|
|
hr = E_FAIL;
|
|
break;
|
|
}
|
|
|
|
// convert firewall adapter names to interface GUID
|
|
if (!slICF.empty())
|
|
{
|
|
hr = ConvertAdapterStringListToGuidList(slICF, pSettings->listPersonalFirewall);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(
|
|
ttidError,
|
|
"Error in converting Personal Firewall string list to GUID list");
|
|
break;
|
|
}
|
|
if (S_FALSE == hr)
|
|
{
|
|
hr = S_OK; // convert any S_FALSE to S_OK
|
|
}
|
|
}
|
|
|
|
// default value for DialOnDemand is FALSE
|
|
pSettings->fDialOnDemand = pwifSection->GetBoolValue(c_wszDialOnDemand, FALSE);
|
|
|
|
// default value for ShowTrayIcon is TRUE
|
|
pSettings->fShowTrayIcon = pwifSection->GetBoolValue(c_wszShowTrayIcon, TRUE);
|
|
|
|
|
|
} while(FALSE);
|
|
|
|
// free resource if necessary
|
|
EraseAndDeleteAll(&slICF);
|
|
EraseAndDeleteAll(&slBridge);
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Set some default values into ICS_UPGRADE_SETTINGS
|
|
|
|
Arguments:
|
|
|
|
[in] pIcsUpgrdSettings - pointer to the ICS_UPGRADE_SETTINGS
|
|
|
|
Return Value: none
|
|
|
|
Note.
|
|
|
|
--*/
|
|
void SetIcsDefaultSettings(ICS_UPGRADE_SETTINGS * pSettings)
|
|
{
|
|
//initialize the settings here
|
|
pSettings->fDialOnDemand = FALSE;
|
|
pSettings->fEnableICS = FALSE;
|
|
pSettings->fShowTrayIcon = TRUE;
|
|
|
|
pSettings->fWin9xUpgrade = FALSE;
|
|
pSettings->fWin9xUpgradeAtLeastOneInternalAdapterBroken = FALSE;
|
|
|
|
pSettings->fWin2KUpgrade = FALSE;
|
|
pSettings->fXpUnattended = FALSE;
|
|
pSettings->fInternalIsBridge = FALSE;
|
|
pSettings->fInternalAdapterFound = FALSE;
|
|
}
|
|
|
|
BOOL FOsIsUnsupported()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Check current OS version.
|
|
billi: I am modifying the version check to synchronize it with the home
|
|
networking version check. We want to prevent upgrages on specific
|
|
sku's and server suites higher than Advanced Server.
|
|
|
|
Arguments:
|
|
|
|
None
|
|
Return Value: returns TRUE if current OS version is Adv. Server or higher
|
|
|
|
Note.
|
|
|
|
--*/
|
|
{
|
|
OSVERSIONINFOEXW verInfo = {0};
|
|
ULONGLONG ConditionMask = 0;
|
|
|
|
verInfo.dwOSVersionInfoSize = sizeof(verInfo);
|
|
verInfo.wSuiteMask = VER_SUITE_DATACENTER |
|
|
// VER_SUITE_BACKOFFICE |
|
|
VER_SUITE_SMALLBUSINESS_RESTRICTED |
|
|
VER_SUITE_SMALLBUSINESS |
|
|
VER_SUITE_BLADE;
|
|
|
|
VER_SET_CONDITION(ConditionMask, VER_SUITENAME, VER_OR);
|
|
|
|
return VerifyVersionInfo(&verInfo, VER_SUITENAME, ConditionMask);
|
|
}
|
|
|
|
//--------- ICS Upgrade helpers end -----------------------------
|
|
|
|
|
|
|
|
//--------- HNet helpers begin ----------------------------------
|
|
// extract from %sdxroot%\net\rras\ras\ui\common\nouiutil\noui.c
|
|
DWORD
|
|
IpPszToHostAddr(
|
|
IN LPCTSTR cp )
|
|
|
|
// Converts an IP address represented as a string to
|
|
// host byte order.
|
|
//
|
|
{
|
|
DWORD val, base, n;
|
|
TCHAR c;
|
|
DWORD parts[4], *pp = parts;
|
|
|
|
again:
|
|
// Collect number up to ``.''.
|
|
// Values are specified as for C:
|
|
// 0x=hex, 0=octal, other=decimal.
|
|
//
|
|
val = 0; base = 10;
|
|
if (*cp == TEXT('0'))
|
|
base = 8, cp++;
|
|
if (*cp == TEXT('x') || *cp == TEXT('X'))
|
|
base = 16, cp++;
|
|
while (c = *cp)
|
|
{
|
|
if ((c >= TEXT('0')) && (c <= TEXT('9')))
|
|
{
|
|
val = (val * base) + (c - TEXT('0'));
|
|
cp++;
|
|
continue;
|
|
}
|
|
if ((base == 16) &&
|
|
( ((c >= TEXT('0')) && (c <= TEXT('9'))) ||
|
|
((c >= TEXT('A')) && (c <= TEXT('F'))) ||
|
|
((c >= TEXT('a')) && (c <= TEXT('f'))) ))
|
|
{
|
|
val = (val << 4) + (c + 10 - (
|
|
((c >= TEXT('a')) && (c <= TEXT('f')))
|
|
? TEXT('a')
|
|
: TEXT('A') ) );
|
|
cp++;
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
if (*cp == TEXT('.'))
|
|
{
|
|
// Internet format:
|
|
// a.b.c.d
|
|
// a.b.c (with c treated as 16-bits)
|
|
// a.b (with b treated as 24 bits)
|
|
//
|
|
if (pp >= parts + 3)
|
|
return (DWORD) -1;
|
|
*pp++ = val, cp++;
|
|
goto again;
|
|
}
|
|
|
|
// Check for trailing characters.
|
|
//
|
|
if (*cp && (*cp != TEXT(' ')))
|
|
return 0xffffffff;
|
|
|
|
*pp++ = val;
|
|
|
|
// Concoct the address according to
|
|
// the number of parts specified.
|
|
//
|
|
n = (DWORD) (pp - parts);
|
|
switch (n)
|
|
{
|
|
case 1: // a -- 32 bits
|
|
val = parts[0];
|
|
break;
|
|
|
|
case 2: // a.b -- 8.24 bits
|
|
val = (parts[0] << 24) | (parts[1] & 0xffffff);
|
|
break;
|
|
|
|
case 3: // a.b.c -- 8.8.16 bits
|
|
val = (parts[0] << 24) | ((parts[1] & 0xff) << 16) |
|
|
(parts[2] & 0xffff);
|
|
break;
|
|
|
|
case 4: // a.b.c.d -- 8.8.8.8 bits
|
|
val = (parts[0] << 24) | ((parts[1] & 0xff) << 16) |
|
|
((parts[2] & 0xff) << 8) | (parts[3] & 0xff);
|
|
break;
|
|
|
|
default:
|
|
return 0xffffffff;
|
|
}
|
|
|
|
return val;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Sets the standard COM security settings on the proxy for an
|
|
object.
|
|
|
|
Arguments:
|
|
|
|
pUnk - the object to set the proxy blanket on
|
|
|
|
Return Value:
|
|
|
|
Note. Even if the CoSetProxyBlanket calls fail, pUnk remains
|
|
in a usable state. Failure is expected in certain contexts, such
|
|
as when, for example, we're being called w/in the netman process --
|
|
in this case, we have direct pointers to the netman objects, instead
|
|
of going through a proxy.
|
|
|
|
--*/
|
|
VOID SetProxyBlanket(IUnknown *pUnk)
|
|
{
|
|
HRESULT hr;
|
|
|
|
Assert(pUnk);
|
|
|
|
hr = CoSetProxyBlanket(
|
|
pUnk,
|
|
RPC_C_AUTHN_WINNT, // use NT default security
|
|
RPC_C_AUTHZ_NONE, // use NT default authentication
|
|
NULL, // must be null if default
|
|
RPC_C_AUTHN_LEVEL_CALL, // call
|
|
RPC_C_IMP_LEVEL_IMPERSONATE,
|
|
NULL, // use process token
|
|
EOAC_NONE
|
|
);
|
|
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
IUnknown * pUnkSet = NULL;
|
|
hr = pUnk->QueryInterface(&pUnkSet);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = CoSetProxyBlanket(
|
|
pUnkSet,
|
|
RPC_C_AUTHN_WINNT, // use NT default security
|
|
RPC_C_AUTHZ_NONE, // use NT default authentication
|
|
NULL, // must be null if default
|
|
RPC_C_AUTHN_LEVEL_CALL, // call
|
|
RPC_C_IMP_LEVEL_IMPERSONATE,
|
|
NULL, // use process token
|
|
EOAC_NONE
|
|
);
|
|
|
|
pUnkSet->Release();
|
|
}
|
|
}
|
|
}
|
|
|
|
/////////////////////////////////////////////////////////////////////////////
|
|
// CIcsUpgrade public methods
|
|
/////////////////////////////////////////////////////////////////////////////
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Init ourself with the pIcsUpgradeSettings, we also cache the
|
|
IEnumNetConnection object in our m_spEnum.
|
|
|
|
Arguments:
|
|
|
|
[in] pIcsUpgradeSettings - the ICS UPGRADE SETTINGS
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
|
|
HRESULT CIcsUpgrade::Init(ICS_UPGRADE_SETTINGS * pIcsUpgradeSettings)
|
|
{
|
|
HRESULT hr;
|
|
|
|
if (!pIcsUpgradeSettings)
|
|
{
|
|
return E_INVALIDARG;
|
|
}
|
|
|
|
if (pIcsUpgradeSettings->fWin9xUpgrade)
|
|
{
|
|
// validate parameters for Win9x ICS upgrade
|
|
if (!pIcsUpgradeSettings->fEnableICS)
|
|
{
|
|
return E_INVALIDARG;
|
|
}
|
|
if (pIcsUpgradeSettings->fInternalIsBridge)
|
|
{
|
|
// internal is a bridge
|
|
if ( (pIcsUpgradeSettings->listBridge).size() < 2 )
|
|
{
|
|
return E_INVALIDARG;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (!pIcsUpgradeSettings->fInternalAdapterFound)
|
|
{
|
|
return E_INVALIDARG;
|
|
}
|
|
}
|
|
}
|
|
else if (pIcsUpgradeSettings->fWin2KUpgrade)
|
|
{
|
|
// validate parameters for Win2K ICS upgrade
|
|
if (pIcsUpgradeSettings->fInternalIsBridge ||
|
|
!pIcsUpgradeSettings->fEnableICS ||
|
|
!pIcsUpgradeSettings->fInternalAdapterFound)
|
|
{
|
|
return E_INVALIDARG;
|
|
}
|
|
|
|
}
|
|
|
|
if (!m_fInited)
|
|
{
|
|
// Get the net connection manager
|
|
INetConnectionManager *pConnMan;
|
|
|
|
hr = CoCreateInstance(CLSID_ConnectionManager, NULL,
|
|
CLSCTX_ALL,
|
|
IID_INetConnectionManager,
|
|
(LPVOID *)&pConnMan);
|
|
if (S_OK == hr)
|
|
{
|
|
// Get the enumeration of connections
|
|
SetProxyBlanket(pConnMan);
|
|
hr = pConnMan->EnumConnections(NCME_DEFAULT, &m_spEnum);
|
|
pConnMan->Release();
|
|
}
|
|
else
|
|
{
|
|
return E_FAIL;
|
|
}
|
|
|
|
if (S_OK == hr)
|
|
{
|
|
SetProxyBlanket(m_spEnum);
|
|
m_fInited = TRUE;
|
|
}
|
|
else
|
|
{
|
|
return E_FAIL;
|
|
}
|
|
}
|
|
m_pIcsUpgradeSettings = pIcsUpgradeSettings;
|
|
return S_OK;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Enable ICS on external adapter and internal adapters.
|
|
Enable personal firewall on the external adapter.
|
|
Migrating the server and application port mappings.
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::StartUpgrade()
|
|
{
|
|
HRESULT hr;
|
|
|
|
DefineFunctionName("CIcsUpgrade::StartUpGrade");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
if (m_fInited)
|
|
{
|
|
if (m_pIcsUpgradeSettings->fWin2KUpgrade)
|
|
{
|
|
// we need to delete Win2K registry named value
|
|
hr = BackupAndDelIcsRegistryValuesOnWin2k();
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: Ignore BackupAndDelIcsRegistryValuesOnWin2k failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
|
|
hr = SetupApplicationProtocol();
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: SetupApplicationProtocol failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
hr = SetupServerPortMapping();
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: SetupServerPortMapping failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
}
|
|
|
|
hr = SetupHomenetConnections();
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: SetupHomenetConnections failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
|
|
hr = SetupIcsMiscItems();
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: Ignore SetupIcsMiscItems failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
}
|
|
return S_OK;
|
|
}
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////
|
|
// CIcsUpgrade private methods
|
|
/////////////////////////////////////////////////////////////////////////////
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Free all cached resources,
|
|
CComPtr smart pointer will be released when this object is out of scope or
|
|
being deleted.
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
void CIcsUpgrade::FinalRelease()
|
|
{
|
|
if (m_pExternalNetConn)
|
|
{
|
|
m_pExternalNetConn->Release();
|
|
m_pExternalNetConn = NULL;
|
|
}
|
|
|
|
|
|
if (m_hIcsUpgradeEvent)
|
|
{
|
|
CloseHandle(m_hIcsUpgradeEvent);
|
|
m_hIcsUpgradeEvent = NULL;
|
|
}
|
|
}
|
|
|
|
/*++
|
|
Routine Description:
|
|
|
|
Setup Homenet connections based on parameters from m_pIcsUpgradeSettings.
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::SetupHomenetConnections()
|
|
{
|
|
DefineFunctionName("CIcsUpgrade::SetupHomenetConnections");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
HRESULT hr = S_OK;
|
|
INetConnection** prgINetConn = NULL; // array of INetConnection*
|
|
DWORD cINetConn = 0; // number of INetConnection* in the array
|
|
INetConnection* pExternalNetConn = NULL;
|
|
INetConnection* pInternalNetConn = NULL;
|
|
|
|
// Create a named event to notify other components that we're
|
|
// in GUI Mode ICS Upgrade. Reason: sharedaccess service
|
|
// fails to start during the GUI Mode Setup.
|
|
hr = CreateIcsUpgradeNamedEvent();
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: CreateIcsUpgradeNamedEvent failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
|
|
// create a bridge if we have more than 1 adapter guid
|
|
if ( (m_pIcsUpgradeSettings->listBridge).size() > 1 )
|
|
{
|
|
do
|
|
{
|
|
|
|
hr = GetINetConnectionArray(m_pIcsUpgradeSettings->listBridge,
|
|
&prgINetConn, &cINetConn);
|
|
TraceTag(ttidNetSetup,
|
|
"after GetINetConnectionArray for bridge.");
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: GetINetConnectionArray failed: 0x%lx line: %d",
|
|
__FUNCNAME__, hr, __LINE__);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_CREATE_BRIDGE));
|
|
|
|
break;
|
|
}
|
|
|
|
TraceTag(ttidNetSetup, "calling HNetCreateBridge.");
|
|
hr = HNetCreateBridge(prgINetConn, NULL);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: HNetCreateBridge failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_CREATE_BRIDGE));
|
|
|
|
break;
|
|
}
|
|
} while (FALSE);
|
|
|
|
// free resource if necessary
|
|
for (DWORD i = 0; i < cINetConn ; ++i)
|
|
{
|
|
if (prgINetConn[i])
|
|
prgINetConn[i]->Release();
|
|
}
|
|
if (prgINetConn)
|
|
{
|
|
delete [] (BYTE*)prgINetConn;
|
|
}
|
|
prgINetConn = NULL;
|
|
cINetConn = 0;
|
|
}
|
|
|
|
|
|
// create ICS
|
|
if (m_pIcsUpgradeSettings->fEnableICS)
|
|
{
|
|
do
|
|
{
|
|
if (m_pExternalNetConn == NULL)
|
|
{ // no cached copy
|
|
hr = GetExternalINetConnection(&pExternalNetConn);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: GetExternalINetConnection failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_CREATE_ICS));
|
|
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
pExternalNetConn = m_pExternalNetConn; // use the cached copy
|
|
}
|
|
|
|
if (m_pIcsUpgradeSettings->fInternalIsBridge)
|
|
{
|
|
hr = GetBridgeINetConn(&pInternalNetConn);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: GetBridgeINetConn failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_CREATE_ICS));
|
|
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
hr = GetINetConnectionByGuid(
|
|
&m_pIcsUpgradeSettings->guidInternal,
|
|
&pInternalNetConn);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: GetINetConnectionByGuid failed: 0x%lx line: %d",
|
|
__FUNCNAME__, hr, __LINE__);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_CREATE_ICS));
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
TraceTag(ttidNetSetup, "calling HrCreateICS.");
|
|
hr = HrCreateICS(pExternalNetConn, pInternalNetConn);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: HNetCreateBridge failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_CREATE_ICS));
|
|
|
|
break;
|
|
}
|
|
m_fICSCreated = TRUE;
|
|
} while (FALSE);
|
|
|
|
// cleanup if necessary
|
|
if (pInternalNetConn)
|
|
{
|
|
pInternalNetConn->Release();
|
|
}
|
|
if (FAILED(hr))
|
|
{
|
|
if (pExternalNetConn && !m_pExternalNetConn)
|
|
{
|
|
pExternalNetConn->Release();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// cache External INetConnections if necessary
|
|
if (!m_pExternalNetConn)
|
|
{
|
|
m_pExternalNetConn = pExternalNetConn;
|
|
}
|
|
}
|
|
}
|
|
|
|
// enable firewall on each connection specified from answer file
|
|
// note: ICS private couldn't be firewalled, bridge couldn't be firewalled.
|
|
if ( (m_pIcsUpgradeSettings->listPersonalFirewall).size() > 0 )
|
|
{
|
|
do
|
|
{
|
|
hr = GetINetConnectionArray(
|
|
m_pIcsUpgradeSettings->listPersonalFirewall,
|
|
&prgINetConn, &cINetConn);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: GetINetConnectionArray failed: 0x%lx line: %d",
|
|
__FUNCNAME__, hr, __LINE__);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_FIREWALL));
|
|
|
|
break;
|
|
}
|
|
|
|
TraceTag(ttidNetSetup, "calling HrEnablePersonalFirewall.");
|
|
hr = HrEnablePersonalFirewall(prgINetConn);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: HrEnablePersonalFirewall failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_FIREWALL));
|
|
|
|
break;
|
|
}
|
|
} while(FALSE);
|
|
|
|
// free resource if necessary
|
|
for (DWORD i = 0; i < cINetConn ; ++i)
|
|
{
|
|
if (prgINetConn[i])
|
|
prgINetConn[i]->Release();
|
|
}
|
|
if (prgINetConn)
|
|
{
|
|
delete [] (BYTE*)prgINetConn;
|
|
}
|
|
prgINetConn = NULL;
|
|
cINetConn = 0;
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
Get an array of INetConnection interface pointers
|
|
corresponds to a list of GUID in rlistGuid.
|
|
|
|
Arguments:
|
|
[in] rlistGuid - a list of interface Guid.
|
|
[in, out] pprgInternalNetConn - an array of INetConnection*
|
|
[in, out] pcInternalNetConn - number of INetConnection* in the array
|
|
|
|
Return Value:
|
|
standard HRESULT
|
|
|
|
Note :
|
|
-User needs to release the returned INetConnection interface pointers in
|
|
the array.
|
|
-User needs to free the memory allocated for the array by using
|
|
"delete [] (BYTE*)prgInternalNetConn".
|
|
-The array is NULL terminated (similar to "char** argv" argument in
|
|
main())
|
|
|
|
--*/
|
|
|
|
HRESULT CIcsUpgrade::GetINetConnectionArray(
|
|
IN list<GUID>& rlistGuid,
|
|
IN OUT INetConnection*** pprgINetConn,
|
|
IN OUT DWORD* pcINetConn)
|
|
{
|
|
DefineFunctionName("CIcsUpgrade::GetINetConnectionArray");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
HRESULT hr;
|
|
|
|
Assert(pprgINetConn);
|
|
Assert(pcINetConn);
|
|
|
|
*pprgINetConn = NULL;
|
|
*pcINetConn = 0;
|
|
|
|
|
|
DWORD cConnections = rlistGuid.size();
|
|
if (cConnections < 1)
|
|
{
|
|
return E_FAIL;
|
|
}
|
|
|
|
// Note that we allocated an extra entry since this is a null-terminated
|
|
// array
|
|
DWORD dwSize = (cConnections + 1) * sizeof(INetConnection*);
|
|
INetConnection** prgINetConn = (INetConnection**) new BYTE[dwSize];
|
|
if (prgINetConn)
|
|
{
|
|
ZeroMemory((PVOID) prgINetConn, dwSize);
|
|
DWORD i = 0;
|
|
for (list<GUID>::iterator iter = rlistGuid.begin();
|
|
iter != rlistGuid.end(); ++iter, ++i)
|
|
{
|
|
hr = GetINetConnectionByGuid( &(*iter), &prgINetConn[i]);
|
|
if (FAILED(hr))
|
|
{
|
|
for (DWORD j = 0; j < i; ++j)
|
|
{
|
|
if (prgINetConn[j])
|
|
{
|
|
prgINetConn[j]->Release();
|
|
}
|
|
}
|
|
delete [] (BYTE*)prgINetConn;
|
|
return hr;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
hr = E_OUTOFMEMORY;
|
|
}
|
|
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
*pcINetConn = cConnections;
|
|
*pprgINetConn = prgINetConn;
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Retrieves the INetConnection that corresponds to the LPRASSHARECONN
|
|
in m_pIcsUpgradeSettings->pExternal.
|
|
|
|
Arguments:
|
|
|
|
[out] ppNetConn - receives the interface
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::GetExternalINetConnection(INetConnection** ppNetConn)
|
|
{
|
|
LPRASSHARECONN pRasShareConn = &(m_pIcsUpgradeSettings->rscExternal);
|
|
|
|
if (pRasShareConn->fIsLanConnection)
|
|
{
|
|
return GetINetConnectionByGuid(&(pRasShareConn->guid), ppNetConn);
|
|
}
|
|
else
|
|
{
|
|
return GetINetConnectionByName((pRasShareConn->name).szEntryName,
|
|
ppNetConn);
|
|
}
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Retrieves the INetConnection that corresponds to the given GUID.
|
|
We will enumerate the INetConnection using our cached m_spEnum.
|
|
|
|
Arguments:
|
|
|
|
[in] pGuid - the guid of the connection
|
|
[out] ppNetCon - receives the interface
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT
|
|
CIcsUpgrade::GetINetConnectionByGuid(
|
|
GUID* pGuid,
|
|
INetConnection** ppNetCon)
|
|
{
|
|
HRESULT hr;
|
|
INetConnection* pConn;
|
|
|
|
Assert(NULL != pGuid);
|
|
Assert(NULL != ppNetCon);
|
|
|
|
*ppNetCon = NULL;
|
|
|
|
// Search for the connection with the correct guid
|
|
|
|
ULONG ulCount;
|
|
BOOLEAN fFound = FALSE;
|
|
|
|
#if DBG
|
|
WCHAR szGuid[c_cchGuidWithTerm];
|
|
if (SUCCEEDED(StringFromGUID2(*pGuid, szGuid, c_cchGuidWithTerm)))
|
|
{
|
|
TraceTag(ttidNetSetup, "GetINetConnectionByGuid: pGuid is: %S", szGuid);
|
|
}
|
|
#endif
|
|
|
|
// reset our cache m_spEnum
|
|
m_spEnum->Reset();
|
|
do
|
|
{
|
|
NETCON_PROPERTIES* pProps;
|
|
|
|
hr = m_spEnum->Next(1, &pConn, &ulCount);
|
|
if (SUCCEEDED(hr) && 1 == ulCount)
|
|
{
|
|
SetProxyBlanket(pConn);
|
|
|
|
hr = pConn->GetProperties(&pProps);
|
|
if (S_OK == hr)
|
|
{
|
|
if (IsEqualGUID(pProps->guidId, *pGuid))
|
|
{
|
|
fFound = TRUE;
|
|
*ppNetCon = pConn;
|
|
(*ppNetCon)->AddRef();
|
|
}
|
|
|
|
NcFreeNetconProperties(pProps);
|
|
}
|
|
|
|
pConn->Release();
|
|
}
|
|
} while (FALSE == fFound && SUCCEEDED(hr) && 1 == ulCount);
|
|
|
|
// Normalize hr
|
|
hr = (fFound ? S_OK : E_FAIL);
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Retrieves the INetConnection that corresponds to the given Name
|
|
of the Connection Icon in Network Connection Folder.
|
|
We will enumerate the INetConnection using our cached m_spEnum.
|
|
|
|
Arguments:
|
|
|
|
[in] pwszConnName - the connection name to search
|
|
[out] ppNetCon - receives the interface
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
Note: Bug# 304474: If we couldn't find the INetConnection corresponding
|
|
to the given name from the pwszConnName parameter and there is
|
|
exactly one WAN MediaType connection left, we'll return the
|
|
INetconnection for that WAN connection. WAN media types are either
|
|
NCM_PHONE, NCM_ISDN or NCM_TUNNEL.
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::GetINetConnectionByName(
|
|
WCHAR* pwszConnName,
|
|
INetConnection** ppNetCon)
|
|
{
|
|
HRESULT hr;
|
|
INetConnection* pConn;
|
|
|
|
Assert(NULL != pwszConnName);
|
|
Assert(NULL != ppNetCon);
|
|
|
|
*ppNetCon = NULL;
|
|
|
|
TraceTag(ttidNetSetup, "GetINetConnectionByName: pwszConnName: %S", pwszConnName);
|
|
|
|
// Search for the connection with the correct connection name
|
|
|
|
ULONG ulCount;
|
|
BOOLEAN fFound = FALSE;
|
|
INetConnection* pWANConn = NULL;
|
|
ULONG ulcWANConn = 0;
|
|
|
|
// reset our cache m_spEnum
|
|
m_spEnum->Reset();
|
|
do
|
|
{
|
|
NETCON_PROPERTIES* pProps;
|
|
|
|
hr = m_spEnum->Next(1, &pConn, &ulCount);
|
|
if (SUCCEEDED(hr) && 1 == ulCount)
|
|
{
|
|
SetProxyBlanket(pConn);
|
|
|
|
hr = pConn->GetProperties(&pProps);
|
|
if (S_OK == hr)
|
|
{
|
|
TraceTag(ttidNetSetup, "GetINetConnectionByName: Connection Name: %S", pProps->pszwName);
|
|
|
|
if ( (NCM_PHONE == pProps->MediaType) ||
|
|
(NCM_ISDN == pProps->MediaType) ||
|
|
(NCM_TUNNEL == pProps->MediaType)
|
|
)
|
|
{
|
|
TraceTag(
|
|
ttidNetSetup,
|
|
"GetINetConnectionByName: Connection Name: %S is WAN, MediaType is %d",
|
|
pProps->pszwName, pProps->MediaType);
|
|
ulcWANConn++;
|
|
if (1 == ulcWANConn)
|
|
{
|
|
// save the 1st WAN connection found
|
|
TraceTag(ttidNetSetup, "GetINetConnectionByName: Connection Name: %S is 1st WAN found", pProps->pszwName);
|
|
pWANConn = pConn;
|
|
pWANConn->AddRef();
|
|
}
|
|
}
|
|
if (wcscmp(pProps->pszwName, pwszConnName) == 0)
|
|
{
|
|
fFound = TRUE;
|
|
*ppNetCon = pConn;
|
|
(*ppNetCon)->AddRef();
|
|
}
|
|
|
|
NcFreeNetconProperties(pProps);
|
|
}
|
|
|
|
pConn->Release();
|
|
}
|
|
}
|
|
while (FALSE == fFound && SUCCEEDED(hr) && 1 == ulCount);
|
|
|
|
if (fFound)
|
|
{
|
|
if (pWANConn)
|
|
{
|
|
// No matter how many WAN connections we have,
|
|
// release the saved WAN connection.
|
|
pWANConn->Release();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidNetSetup, "GetINetConnectionByName: Can't find pwszConnName: %S", pwszConnName);
|
|
|
|
// no connection has the name specified by the pwszConnName [in] parameter
|
|
if (1 == ulcWANConn && pWANConn)
|
|
{
|
|
// There is exactly ONE WAN connection left on the sysetm.
|
|
// Transfer this as the INetConnection output.
|
|
TraceTag(ttidNetSetup, "GetINetConnectionByName: will use the only one WAN connectoid left");
|
|
*ppNetCon = pWANConn;
|
|
fFound = TRUE;
|
|
}
|
|
else if (ulcWANConn > 1 && pWANConn)
|
|
{
|
|
// not found and there are more than 1 WAN connections
|
|
TraceTag(ttidNetSetup, "GetINetConnectionByName: more than one WAN connectoid found");
|
|
pWANConn->Release();
|
|
}
|
|
}
|
|
|
|
// Normalize hr
|
|
hr = (fFound ? S_OK : E_FAIL);
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Setup the global Application Protocol
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::SetupApplicationProtocol()
|
|
{
|
|
DefineFunctionName("CIcsUpgrade::SetupApplicationProtocol");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
HRESULT hr;
|
|
list<CSharedAccessApplication>& rListAppProt =
|
|
m_pIcsUpgradeSettings->listAppPortmappings;
|
|
|
|
if ( rListAppProt.size() == 0)
|
|
{
|
|
// no Application Protocol to set
|
|
return S_OK;
|
|
}
|
|
|
|
|
|
// 1. Get the INetProtocolSettings interface to control system-wide
|
|
// ICS and firewall settings (i.e port mappings and applications).
|
|
|
|
// Create Homenet Configuration Manager COM Instance
|
|
CComPtr<IHNetCfgMgr> spIHNetCfgMgr;
|
|
|
|
hr = CoCreateInstance(CLSID_HNetCfgMgr, NULL,
|
|
CLSCTX_ALL,
|
|
IID_IHNetCfgMgr,
|
|
(LPVOID *)&spIHNetCfgMgr);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: CoCreateInstance CLSID_HNetCfgMgr failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
|
|
// Get the IHNetProtocolSettings
|
|
CComPtr<IHNetProtocolSettings> spHNetProtocolSettings;
|
|
hr = spIHNetCfgMgr->QueryInterface(IID_IHNetProtocolSettings,
|
|
(LPVOID *)&spHNetProtocolSettings);
|
|
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: QueryInterface IID_IHNetProtocolSettings failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
|
|
|
|
// 2. For each enabled CSharedAccessApplication
|
|
// if (there is no existing matching ApplicationProtocol
|
|
// invoke INetProtocolSettings::CreateApplicationProtocol
|
|
// else
|
|
// update the existing ApplicaitonProtocol
|
|
for (list<CSharedAccessApplication>::iterator iter = rListAppProt.begin();
|
|
iter != rListAppProt.end();
|
|
++iter)
|
|
{
|
|
HNET_RESPONSE_RANGE* pHNetResponseArray = NULL;
|
|
USHORT uscResponseRange = 0; // number of HNET_RESPONSE_RANGE returned
|
|
|
|
if ((*iter).m_bSelected)
|
|
{
|
|
// migrate the enabled one only
|
|
UCHAR ucProtocol;
|
|
if (lstrcmpiW( ((*iter).m_szProtocol).c_str(), c_wszTCP) == 0)
|
|
{
|
|
ucProtocol = NAT_PROTOCOL_TCP;
|
|
}
|
|
else if (lstrcmpiW( ((*iter).m_szProtocol).c_str(), c_wszUDP) == 0)
|
|
{
|
|
ucProtocol = NAT_PROTOCOL_UDP;
|
|
}
|
|
else
|
|
{
|
|
// ignore others
|
|
continue;
|
|
}
|
|
USHORT usPort = HTONS((*iter).m_wPort);
|
|
WCHAR* pwszTitle = (WCHAR*)((*iter).m_szTitle).c_str();
|
|
|
|
hr = PutResponseStringIntoArray(*iter, &uscResponseRange,
|
|
&pHNetResponseArray);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: Ignore error in PutResponseStringIntoArray : 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
if (S_OK == hr)
|
|
{
|
|
Assert(pHNetResponseArray != NULL);
|
|
CComPtr<IHNetApplicationProtocol> spHNetAppProt;
|
|
|
|
hr = FindMatchingApplicationProtocol(
|
|
spHNetProtocolSettings, ucProtocol, usPort,
|
|
&spHNetAppProt);
|
|
if (S_OK == hr)
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"%s: Update existing ApplicationProtocol for %S",
|
|
__FUNCNAME__, pwszTitle);
|
|
// there is existing ApplicatonProtocol
|
|
hr = spHNetAppProt->SetName(pwszTitle);
|
|
if (S_OK != hr)
|
|
{
|
|
TraceTag(ttidError, "%s: spHNetAppProt->SetName failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
|
|
hr = spHNetAppProt->SetResponseRanges(uscResponseRange,
|
|
pHNetResponseArray);
|
|
if (S_OK != hr)
|
|
{
|
|
TraceTag(ttidError, "%s: spHNetAppProt->SetResponseRanges failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
|
|
hr = spHNetAppProt->SetEnabled(TRUE);
|
|
if (S_OK != hr)
|
|
{
|
|
TraceTag(ttidError, "%s: spHNetAppProt->SetEnabled failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
// no existing ApplicationProtocol, create a new one
|
|
hr = spHNetProtocolSettings->CreateApplicationProtocol(
|
|
pwszTitle,
|
|
ucProtocol,
|
|
usPort,
|
|
uscResponseRange,
|
|
pHNetResponseArray,
|
|
&spHNetAppProt);
|
|
if (S_OK != hr)
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: CreateApplicationProtocol failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
else
|
|
{
|
|
hr = spHNetAppProt->SetEnabled(TRUE);
|
|
if (S_OK != hr)
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: spHNetAppProt->SetEnabled failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
}
|
|
}
|
|
|
|
delete [] (BYTE*) pHNetResponseArray;
|
|
pHNetResponseArray = NULL;
|
|
uscResponseRange = 0;
|
|
}
|
|
}
|
|
} //end for
|
|
|
|
return S_OK;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Setup the Server Port Mapping Protocol on the external connection.
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::SetupServerPortMapping()
|
|
{
|
|
HRESULT hr;
|
|
list<CSharedAccessServer>& rListSvrPortMappings =
|
|
m_pIcsUpgradeSettings->listSvrPortmappings;
|
|
|
|
DefineFunctionName("CIcsUpgrade::SetupServerPortMapping");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
if ( rListSvrPortMappings.size() == 0 )
|
|
{
|
|
// no Server Port Mappings to set
|
|
return S_OK;
|
|
}
|
|
|
|
// 1. Get the INetProtocolSettings interface to control system-wide
|
|
// ICS and firewall settings (i.e port mappings and applications).
|
|
|
|
// Create Homenet Configuration Manager COM Instance
|
|
CComPtr<IHNetCfgMgr> spIHNetCfgMgr;
|
|
|
|
hr = CoCreateInstance(CLSID_HNetCfgMgr, NULL,
|
|
CLSCTX_ALL,
|
|
IID_IHNetCfgMgr,
|
|
(LPVOID *)&spIHNetCfgMgr);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: CoCreateInstance CLSID_HNetCfgMgr failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
|
|
// Get the IHNetProtocolSettings
|
|
CComPtr<IHNetProtocolSettings> spHNetProtocolSettings;
|
|
hr = spIHNetCfgMgr->QueryInterface(IID_IHNetProtocolSettings,
|
|
(LPVOID *)&spHNetProtocolSettings);
|
|
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: QueryInterface IID_IHNetProtocolSettings failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
|
|
// 2. For each enabled CSharedAccessServer x
|
|
// if (there is no PortMapping Protocol corresponding to the
|
|
// x.m_szProtocol and x.m_wInternalPort)
|
|
// call INetProtocolSettings::CreatePortMappingProtocol
|
|
// to get an IHNetPortMappingProtocol interface ptr;
|
|
// else
|
|
// get an existing IHNetPortMappingProtocol interface ptr
|
|
//
|
|
// Get IHNetPortMappingBinding interface ptr by calling
|
|
// IHNetConnection::GetBindingForPortMappingProtocol by passing the
|
|
// IHNetPortMappingProtocol iface ptr on the public IHNetConnection;
|
|
// call IHNetPortMappingBinding::SetTargetComputerName;
|
|
for (list<CSharedAccessServer>::iterator iter =
|
|
rListSvrPortMappings.begin();
|
|
iter != rListSvrPortMappings.end();
|
|
++iter)
|
|
{
|
|
// migrate the enabled one only
|
|
if ((*iter).m_bSelected)
|
|
{
|
|
UCHAR ucProtocol;
|
|
if (lstrcmpiW( ((*iter).m_szProtocol).c_str(), c_wszTCP) == 0)
|
|
{
|
|
ucProtocol = NAT_PROTOCOL_TCP;
|
|
}
|
|
else if (lstrcmpiW( ((*iter).m_szProtocol).c_str(), c_wszUDP) == 0)
|
|
{
|
|
ucProtocol = NAT_PROTOCOL_UDP;
|
|
}
|
|
else
|
|
{
|
|
// ignore others
|
|
continue;
|
|
}
|
|
USHORT usPort = HTONS((*iter).m_wInternalPort);
|
|
WCHAR* pwszTitle = (WCHAR*) ((*iter).m_szTitle).c_str();
|
|
|
|
// get the IHNetPortMappingProtocol iface ptr
|
|
CComPtr<IHNetPortMappingProtocol> spHNetPortMappingProt;
|
|
|
|
hr = FindMatchingPortMappingProtocol(
|
|
spHNetProtocolSettings, ucProtocol, usPort,
|
|
&spHNetPortMappingProt);
|
|
if (S_OK == hr)
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"%s: Update existing PortMappingProtocol for %S",
|
|
__FUNCNAME__, pwszTitle);
|
|
// change the name of the title
|
|
hr= spHNetPortMappingProt->SetName(pwszTitle);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: spHNetPortMappingProt->SetName failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
hr = S_OK; // we still want to invoke
|
|
// IHNetPortMappingBinding::SetEnabled() below.
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidNetSetup,
|
|
"%s: CreatePortMappingProtocol for %S",
|
|
__FUNCNAME__, pwszTitle);
|
|
// no existing PortMappingProtocol, create a new one
|
|
hr = spHNetProtocolSettings->CreatePortMappingProtocol(
|
|
pwszTitle, // Title
|
|
ucProtocol, // Protocol
|
|
usPort, // InternalPort
|
|
&spHNetPortMappingProt); // returned iface ptr
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: CreatePortMappingProtocol failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
}
|
|
|
|
if (S_OK == hr)
|
|
{
|
|
CComPtr<IHNetConnection> spExternalHNetConn;
|
|
|
|
if (m_pExternalNetConn == NULL)
|
|
{
|
|
hr = GetExternalINetConnection(&m_pExternalNetConn);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: GetExternalINetConnection failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr; // fatal return
|
|
}
|
|
}
|
|
|
|
|
|
// get the external/public IHNetConnection iface ptr
|
|
hr = spIHNetCfgMgr->GetIHNetConnectionForINetConnection(
|
|
m_pExternalNetConn,
|
|
&spExternalHNetConn);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: GetIHNetConnectionForINetConnection failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
if (S_OK == hr)
|
|
{
|
|
// Get IHNetPortMappingBinding interface ptr
|
|
CComPtr<IHNetPortMappingBinding> spHNetPortMappingBinding;
|
|
|
|
hr = spExternalHNetConn->GetBindingForPortMappingProtocol(
|
|
spHNetPortMappingProt,
|
|
&spHNetPortMappingBinding);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: GetBindingForPortMappingProtocol failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
if (S_OK == hr)
|
|
{
|
|
ULONG ulAddress = INADDR_NONE;
|
|
WCHAR* pwszInternalName = (OLECHAR *)((*iter).m_szInternalName).c_str();
|
|
if ( ((*iter).m_szInternalName).length() > 7)
|
|
{
|
|
// 1.2.3.4 -- minimum of 7 characters
|
|
ulAddress = IpPszToHostAddr(pwszInternalName);
|
|
}
|
|
|
|
if (INADDR_NONE == ulAddress)
|
|
{
|
|
hr = spHNetPortMappingBinding->SetTargetComputerName(
|
|
pwszInternalName);
|
|
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: SetTargetComputerName failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
hr = spHNetPortMappingBinding->SetTargetComputerAddress(
|
|
HTONL(ulAddress));
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: SetTargetComputerAddress failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
}
|
|
if (S_OK == hr)
|
|
{
|
|
hr = spHNetPortMappingBinding->SetEnabled(TRUE);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: SetEnabled failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
}
|
|
} // end if ((*iter).m_bSelected)
|
|
} //end for
|
|
|
|
return S_OK;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
retrive a matching IHNetPortMappingProtocol object which matches the
|
|
given protocol (ucProtocol) and port number (usPort)
|
|
|
|
Arguments:
|
|
|
|
[in] pHNetProtocolSettings - IHNetProtocolSettings iface ptr
|
|
[in] ucProtocol - NAT_PROTOCOL_TCP or NAT_PROTOCOL_UDP
|
|
[in] usPort - port number used by this server PortMapping Protocol
|
|
[out] ppHNetPortMappingProtocol - return the matching
|
|
IHNetPortMappingProtocol
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::FindMatchingPortMappingProtocol(
|
|
IHNetProtocolSettings* pHNetProtocolSettings,
|
|
UCHAR ucProtocol,
|
|
USHORT usPort,
|
|
IHNetPortMappingProtocol** ppHNetPortMappingProtocol)
|
|
{
|
|
HRESULT hr;
|
|
|
|
Assert(pHNetProtocolSettings != NULL);
|
|
Assert(ppHNetPortMappingProtocol != NULL);
|
|
|
|
DefineFunctionName("CIcsUpgrade::FindMatchingPortMappingProtocol");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
|
|
*ppHNetPortMappingProtocol = NULL;
|
|
|
|
CComPtr<IEnumHNetPortMappingProtocols> spServerEnum;
|
|
hr = pHNetProtocolSettings->EnumPortMappingProtocols(
|
|
&spServerEnum);
|
|
if (FAILED(hr))
|
|
{
|
|
return hr;
|
|
}
|
|
|
|
IHNetPortMappingProtocol* pServer;
|
|
|
|
ULONG ulCount;
|
|
do
|
|
{
|
|
UCHAR ucFoundProtocol;
|
|
USHORT usFoundPort;
|
|
|
|
hr = spServerEnum->Next(
|
|
1,
|
|
&pServer,
|
|
&ulCount
|
|
);
|
|
|
|
if (SUCCEEDED(hr) && 1 == ulCount)
|
|
{
|
|
hr = pServer->GetIPProtocol(&ucFoundProtocol);
|
|
if (FAILED(hr))
|
|
{
|
|
pServer->Release();
|
|
return hr;
|
|
}
|
|
hr = pServer->GetPort(&usFoundPort);
|
|
if (FAILED(hr))
|
|
{
|
|
pServer->Release();
|
|
return hr;
|
|
}
|
|
|
|
if (ucFoundProtocol == ucProtocol &&
|
|
usFoundPort == usPort)
|
|
{
|
|
// found mathcing one, transfer value
|
|
*ppHNetPortMappingProtocol = pServer;
|
|
return S_OK;
|
|
}
|
|
pServer->Release();
|
|
}
|
|
} while (SUCCEEDED(hr) && 1 == ulCount);
|
|
|
|
return E_FAIL; // not found
|
|
}
|
|
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
retrive a matching IHNetApplicationProtocol object which matches the
|
|
given protocol (ucProtocol) and port number (usPort)
|
|
|
|
Arguments:
|
|
|
|
[in] pHNetProtocolSettings - IHNetProtocolSettings iface ptr
|
|
[in] ucProtocol - NAT_PROTOCOL_TCP or NAT_PROTOCOL_UDP
|
|
[in] usPort - port number used by this server PortMapping Protocol
|
|
[out] ppHNetApplicationProtocol - return the matching
|
|
IHNetApplicationProtocol
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::FindMatchingApplicationProtocol(
|
|
IHNetProtocolSettings* pHNetProtocolSettings,
|
|
UCHAR ucProtocol,
|
|
USHORT usPort,
|
|
IHNetApplicationProtocol** ppHNetApplicationProtocol)
|
|
{
|
|
HRESULT hr;
|
|
|
|
Assert(pHNetProtocolSettings != NULL);
|
|
Assert(ppHNetApplicationProtocol != NULL);
|
|
|
|
DefineFunctionName("CIcsUpgrade::FindMatchingApplicationProtocol");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
|
|
*ppHNetApplicationProtocol = NULL;
|
|
|
|
CComPtr<IEnumHNetApplicationProtocols> spAppEnum;
|
|
hr = pHNetProtocolSettings->EnumApplicationProtocols(
|
|
FALSE,
|
|
&spAppEnum);
|
|
if (FAILED(hr))
|
|
{
|
|
return hr;
|
|
}
|
|
|
|
IHNetApplicationProtocol* pApp;
|
|
|
|
ULONG ulCount;
|
|
do
|
|
{
|
|
UCHAR ucFoundProtocol;
|
|
USHORT usFoundPort;
|
|
|
|
hr = spAppEnum->Next(
|
|
1,
|
|
&pApp,
|
|
&ulCount
|
|
);
|
|
|
|
if (SUCCEEDED(hr) && 1 == ulCount)
|
|
{
|
|
hr = pApp->GetOutgoingIPProtocol(&ucFoundProtocol);
|
|
if (FAILED(hr))
|
|
{
|
|
pApp->Release();
|
|
return hr;
|
|
}
|
|
hr = pApp->GetOutgoingPort(&usFoundPort);
|
|
if (FAILED(hr))
|
|
{
|
|
pApp->Release();
|
|
return hr;
|
|
}
|
|
|
|
if (ucFoundProtocol == ucProtocol &&
|
|
usFoundPort == usPort)
|
|
{
|
|
// found mathcing one, transfer value
|
|
*ppHNetApplicationProtocol = pApp;
|
|
return S_OK;
|
|
}
|
|
pApp->Release();
|
|
}
|
|
} while (SUCCEEDED(hr) && 1 == ulCount);
|
|
|
|
return E_FAIL; // not found
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Setup ICS misc. settings from m_pIcsUpgradeSettings
|
|
|
|
Arguments:
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::SetupIcsMiscItems()
|
|
{
|
|
HRESULT hr = S_OK;
|
|
|
|
if (NULL == m_pIcsUpgradeSettings)
|
|
{
|
|
return E_UNEXPECTED;
|
|
}
|
|
|
|
DefineFunctionName("CIcsUpgrade::SetupIcsMiscItems");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
if (!m_fICSCreated)
|
|
{
|
|
// no need to continue if ICS has not been created
|
|
return hr;
|
|
}
|
|
|
|
// If Win9x/Win2K ICS upgrade, firewall the ICS public connection
|
|
if (m_pIcsUpgradeSettings->fWin9xUpgrade ||
|
|
m_pIcsUpgradeSettings->fWin2KUpgrade)
|
|
{
|
|
INetConnection* rgINetConn[2] = {0, 0};
|
|
if (m_pExternalNetConn)
|
|
{
|
|
rgINetConn[0] = m_pExternalNetConn;
|
|
hr = HrEnablePersonalFirewall(rgINetConn);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: HrEnablePersonalFirewall failed: 0x%lx line: %d",
|
|
__FUNCNAME__, hr, __LINE__);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_FIREWALL));
|
|
|
|
hr = S_OK; // continue with the rest.
|
|
}
|
|
}
|
|
}
|
|
|
|
// Bug# 315265, 315242
|
|
// post-processing to fix up IP Configuration on private connection
|
|
// (1) if there is at least one internal adapter couldn't be upgraded from
|
|
// Win9x ICS upgrade, we have to make sure the survival internal adapter
|
|
// has static IP address 192.168.0.1, subnet mask 255.255.255.0
|
|
// (2) if we create a bridge for Win9x ICS upgrade, we need to set static
|
|
// IP address 192.168.0.1, subnet mask 255.255.255.0 for TcpIp bound to
|
|
// the bridge.
|
|
// Note: (1) and (2) are exclusive.
|
|
//
|
|
// For WinXP Unattended clean install,
|
|
// (3) if an internal ICS adapter is found, set static IP address
|
|
// 192.168.0.1, subnet mask 255.255.255.0 for the TCPIP bound to the
|
|
// internal adapter.
|
|
// (4) if ICS is enabled and the bridge is the ICS private connection.
|
|
// Set static IP address 192.168.0.1, subnet mask 255.255.255.0 for
|
|
// TcpIp bound to the bridge.
|
|
// Note: (3) and (4) are exclusive.
|
|
if ( m_pIcsUpgradeSettings->fInternalAdapterFound &&
|
|
(m_pIcsUpgradeSettings->fWin9xUpgradeAtLeastOneInternalAdapterBroken ||
|
|
m_pIcsUpgradeSettings->fXpUnattended) )
|
|
{
|
|
hr = SetPrivateIpConfiguration(m_pIcsUpgradeSettings->guidInternal);
|
|
if (FAILED(hr))
|
|
{
|
|
// logging, but we'll continue to do the rest of the ICS upgrade though.
|
|
TraceTag(ttidError,
|
|
"%s: SetPrivateIpConfiguration on private adapter failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS));
|
|
}
|
|
}
|
|
else if ( ((m_pIcsUpgradeSettings->listBridge).size() >= 2) &&
|
|
!m_pIcsUpgradeSettings->fInternalAdapterFound)
|
|
{
|
|
// A bridge was created as ICS private.
|
|
// We need to setup its static IP Configuration since
|
|
// these settings are not configured when it was created a while ago.
|
|
GUID guidBridge;
|
|
hr = GetBridgeGuid(guidBridge);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = SetPrivateIpConfiguration(guidBridge);
|
|
if (FAILED(hr))
|
|
{
|
|
// logging, but we'll continue to do the rest of the ICS upgrade though.
|
|
TraceTag(ttidError,
|
|
"%s: SetPrivateIpConfiguration for bridge failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS));
|
|
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
// logging, but we'll continue to do the rest of the ICS upgrade though.
|
|
TraceTag(ttidError,
|
|
"%s: GetBridgeGuid failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
NetSetupLogStatusV(
|
|
LogSevInformation,
|
|
SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS));
|
|
}
|
|
}
|
|
|
|
LPRASSHARECONN pRasShareConn = &(m_pIcsUpgradeSettings->rscExternal);
|
|
|
|
// set the fShowTrayIcon to the external INetConnection
|
|
// note: this property has already migrated for Win2K upgrade
|
|
if ( (m_pExternalNetConn) &&
|
|
(m_pIcsUpgradeSettings->fWin9xUpgrade ||
|
|
m_pIcsUpgradeSettings->fXpUnattended) )
|
|
{
|
|
if (pRasShareConn->fIsLanConnection)
|
|
{
|
|
INetLanConnection* pLanConn = NULL;
|
|
|
|
hr = HrQIAndSetProxyBlanket(m_pExternalNetConn, &pLanConn);
|
|
if (SUCCEEDED(hr) && pLanConn)
|
|
{
|
|
LANCON_INFO linfo = {0};
|
|
linfo.fShowIcon = m_pIcsUpgradeSettings->fShowTrayIcon;
|
|
// Set new value of show icon property
|
|
hr = pLanConn->SetInfo(LCIF_ICON, &linfo);
|
|
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: pLanConn->SetInfo failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
|
|
}
|
|
pLanConn->Release();
|
|
}
|
|
else
|
|
{
|
|
TraceTag(
|
|
ttidError,
|
|
"%s: HrQIAndSetProxyBlanket for INetLanConnection failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// this is a WAN connection
|
|
|
|
RASCON_INFO rci;
|
|
LPRASENTRY pRasEntry = NULL;
|
|
DWORD dwRasEntrySize;
|
|
|
|
hr = HrRciGetRasConnectionInfo(m_pExternalNetConn, &rci);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = HrRasGetEntryProperties(rci.pszwPbkFile, rci.pszwEntryName,
|
|
&pRasEntry, &dwRasEntrySize);
|
|
if (SUCCEEDED(hr) && pRasEntry)
|
|
{
|
|
DWORD dwRet;
|
|
|
|
if (m_pIcsUpgradeSettings->fShowTrayIcon)
|
|
pRasEntry->dwfOptions |= RASEO_ModemLights;
|
|
else
|
|
pRasEntry->dwfOptions &= (~RASEO_ModemLights);
|
|
|
|
dwRet = RasSetEntryProperties(rci.pszwPbkFile, rci.pszwEntryName,
|
|
pRasEntry, dwRasEntrySize, 0, 0);
|
|
if (0 != dwRet)
|
|
{
|
|
TraceTag(
|
|
ttidError,
|
|
"%s: RasSetEntryProperties failed: 0x%lx",
|
|
__FUNCNAME__, GetLastError());
|
|
|
|
hr = HRESULT_FROM_WIN32(GetLastError());
|
|
}
|
|
|
|
MemFree(pRasEntry);
|
|
}
|
|
else
|
|
{
|
|
TraceTag(
|
|
ttidError,
|
|
"%s: HrRasGetEntryProperties failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
RciFree (&rci);
|
|
}
|
|
else
|
|
{
|
|
TraceTag(
|
|
ttidError,
|
|
"%s: HrRciGetRasConnectionInfo failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Set the dial on demand setting.
|
|
// We don't need to do it for 2 cases:
|
|
// 1. Win2K ICS upgrade because the registry settings is already migrated.
|
|
// 2. the ICS public is a LAN connection.
|
|
if (pRasShareConn->fIsLanConnection || m_pIcsUpgradeSettings->fWin2KUpgrade)
|
|
{
|
|
// no need to set dial on-demand for external lan connection
|
|
return hr;
|
|
}
|
|
|
|
|
|
// Get the IHNetIcsSettings interface to control system-wide
|
|
// ICS settings
|
|
|
|
// Create Homenet Configuration Manager COM Instance
|
|
CComPtr<IHNetCfgMgr> spIHNetCfgMgr;
|
|
|
|
hr = CoCreateInstance(CLSID_HNetCfgMgr, NULL,
|
|
CLSCTX_ALL,
|
|
IID_IHNetCfgMgr,
|
|
(LPVOID *)&spIHNetCfgMgr);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError, "%s: CoCreateInstance CLSID_HNetCfgMgr failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
|
|
// Get the IHNetIcsSettings
|
|
CComPtr<IHNetIcsSettings> spHNetIcsSettings;
|
|
hr = spIHNetCfgMgr->QueryInterface(IID_IHNetIcsSettings,
|
|
(LPVOID *)&spHNetIcsSettings);
|
|
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: QueryInterface IID_IHNetIcsSettings failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
return hr;
|
|
}
|
|
hr = spHNetIcsSettings->SetAutodialSettings(!!(m_pIcsUpgradeSettings->fDialOnDemand));
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: Ignore SetAutodialSettings failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
hr = S_OK;
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The interface given by rAdapterGuid will be configured to
|
|
use ICS static IP 192.168.0.1, subnet mask 255.255.255.0
|
|
|
|
Arguments:
|
|
|
|
[in] rInterfaceGuid -- the Guid of the TcpIp interface
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::SetPrivateIpConfiguration(IN GUID& rInterfaceGuid)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
HKEY hkeyTcpipInterface = NULL;
|
|
|
|
DefineFunctionName("CIcsUpgrade::SetPrivateIpConfiguration");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
hr = OpenTcpipInterfaceKey(rInterfaceGuid, &hkeyTcpipInterface);
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: OpenTcpipInterfaceKey failed: 0x%lx",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
Assert(hkeyTcpipInterface);
|
|
|
|
// IPAddress
|
|
hr = HrRegSetMultiSz(hkeyTcpipInterface,
|
|
c_wszIPAddress,
|
|
c_mszScopeAddress);
|
|
if(FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: failed to set %S to the registry. hr = 0x%lx.",
|
|
__FUNCNAME__, c_wszIPAddress,
|
|
hr);
|
|
|
|
goto Error;
|
|
}
|
|
|
|
// SubnetMask
|
|
hr = HrRegSetMultiSz(hkeyTcpipInterface,
|
|
c_wszSubnetMask,
|
|
c_mszScopeMask);
|
|
if(FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: failed to set %S to the registry. hr = 0x%lx.",
|
|
__FUNCNAME__, c_wszIPAddress,
|
|
hr);
|
|
|
|
goto Error;
|
|
}
|
|
|
|
// EnableDHCP
|
|
hr = HrRegSetDword(hkeyTcpipInterface,
|
|
c_wszEnableDHCP,
|
|
0);
|
|
if(FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: failed to set %S to the registry. hr = 0x%lx.",
|
|
__FUNCNAME__, c_wszEnableDHCP,
|
|
hr);
|
|
|
|
goto Error;
|
|
}
|
|
|
|
Error:
|
|
|
|
RegSafeCloseKey(hkeyTcpipInterface);
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Get the interface guid of a bridge.
|
|
|
|
Arguments:
|
|
|
|
[out] rInterfaceGuid -- receive the Guid from the bridge interface
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::GetBridgeGuid(OUT GUID& rInterfaceGuid)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
BOOLEAN fFound = FALSE;
|
|
INetConnection* pConn = NULL;
|
|
ULONG ulCount = 0;
|
|
|
|
|
|
DefineFunctionName("CIcsUpgrade::GetBridgeGuid");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
// we don't use the cached m_spEnum because it may be in a stale
|
|
// state (a bridge has just been created).
|
|
CComPtr<IEnumNetConnection> spEnum;
|
|
|
|
// Get the net connection manager
|
|
INetConnectionManager* pConnMan = NULL;
|
|
|
|
hr = CoCreateInstance(CLSID_ConnectionManager, NULL,
|
|
CLSCTX_ALL,
|
|
IID_INetConnectionManager,
|
|
(LPVOID *)&pConnMan);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
// Get the enumeration of connections
|
|
SetProxyBlanket(pConnMan);
|
|
hr = pConnMan->EnumConnections(NCME_DEFAULT, &spEnum);
|
|
pConnMan->Release(); // don't need this anymore
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
SetProxyBlanket(spEnum);
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: EnumConnections failed: 0x%lx.",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: CoCreateInstance failed: 0x%lx.",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
|
|
hr = spEnum->Reset();
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: Reset failed: 0x%lx.",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
do
|
|
{
|
|
NETCON_PROPERTIES* pProps;
|
|
|
|
hr = spEnum->Next(1, &pConn, &ulCount);
|
|
if (SUCCEEDED(hr) && 1 == ulCount)
|
|
{
|
|
SetProxyBlanket(pConn);
|
|
|
|
hr = pConn->GetProperties(&pProps);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
if (NCM_BRIDGE == pProps->MediaType)
|
|
{
|
|
// transfer value
|
|
rInterfaceGuid = pProps->guidId;
|
|
fFound = TRUE;
|
|
}
|
|
NcFreeNetconProperties(pProps);
|
|
}
|
|
pConn->Release();
|
|
}
|
|
} while (FALSE == fFound && SUCCEEDED(hr) && 1 == ulCount);
|
|
|
|
// Normalize hr
|
|
hr = (fFound ? S_OK : E_FAIL);
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Get the INetConnection of a bridge.
|
|
|
|
Arguments:
|
|
|
|
[out] ppINetConn -- receive the INetConnection from the bridge interface
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::GetBridgeINetConn(OUT INetConnection** ppINetConn)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
BOOLEAN fFound = FALSE;
|
|
INetConnection* pConn = NULL;
|
|
ULONG ulCount = 0;
|
|
|
|
|
|
DefineFunctionName("CIcsUpgrade::GetBridgeINetConn");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
Assert(ppINetConn);
|
|
*ppINetConn = NULL;
|
|
// we don't use the cached m_spEnum because it may be in a stale
|
|
// state (a bridge has just been created).
|
|
CComPtr<IEnumNetConnection> spEnum;
|
|
|
|
// Get the net connection manager
|
|
INetConnectionManager* pConnMan = NULL;
|
|
|
|
hr = CoCreateInstance(CLSID_ConnectionManager, NULL,
|
|
CLSCTX_ALL,
|
|
IID_INetConnectionManager,
|
|
(LPVOID *)&pConnMan);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
// Get the enumeration of connections
|
|
SetProxyBlanket(pConnMan);
|
|
hr = pConnMan->EnumConnections(NCME_DEFAULT, &spEnum);
|
|
pConnMan->Release(); // don't need this anymore
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
SetProxyBlanket(spEnum);
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: EnumConnections failed: 0x%lx.",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: CoCreateInstance failed: 0x%lx.",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
|
|
hr = spEnum->Reset();
|
|
if (FAILED(hr))
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: Reset failed: 0x%lx.",
|
|
__FUNCNAME__, hr);
|
|
|
|
return hr;
|
|
}
|
|
do
|
|
{
|
|
NETCON_PROPERTIES* pProps;
|
|
|
|
hr = spEnum->Next(1, &pConn, &ulCount);
|
|
if (SUCCEEDED(hr) && 1 == ulCount)
|
|
{
|
|
SetProxyBlanket(pConn);
|
|
|
|
hr = pConn->GetProperties(&pProps);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
if (NCM_BRIDGE == pProps->MediaType)
|
|
{
|
|
// transfer value
|
|
*ppINetConn = pConn;
|
|
fFound = TRUE;
|
|
}
|
|
NcFreeNetconProperties(pProps);
|
|
}
|
|
if (!fFound)
|
|
{
|
|
pConn->Release();
|
|
}
|
|
}
|
|
} while (FALSE == fFound && SUCCEEDED(hr) && 1 == ulCount);
|
|
|
|
// Normalize hr
|
|
hr = (fFound ? S_OK : E_FAIL);
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Open the Ip Configuration registry Key of an interface
|
|
|
|
Arguments:
|
|
|
|
[in] rGuid -- the Guid of the TcpIp interface
|
|
[out] phKey -- receives the opened key
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::OpenTcpipInterfaceKey(
|
|
IN GUID& rGuid,
|
|
OUT PHKEY phKey)
|
|
{
|
|
HRESULT hr;
|
|
LPWSTR wszSubKeyName;
|
|
ULONG ulSubKeyNameLength;
|
|
LPWSTR wszGuid;
|
|
|
|
Assert(phKey);
|
|
|
|
hr = StringFromCLSID(rGuid, &wszGuid);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
ulSubKeyNameLength =
|
|
wcslen(c_wszTcpipParametersKey) + 1 +
|
|
wcslen(c_wszInterfaces) + 1 +
|
|
wcslen(wszGuid) + 2;
|
|
|
|
wszSubKeyName = new WCHAR[ulSubKeyNameLength];
|
|
if (NULL != wszSubKeyName)
|
|
{
|
|
swprintf(
|
|
wszSubKeyName,
|
|
L"%ls\\%ls\\%ls",
|
|
c_wszTcpipParametersKey,
|
|
c_wszInterfaces,
|
|
wszGuid
|
|
);
|
|
}
|
|
else
|
|
{
|
|
hr = E_OUTOFMEMORY;
|
|
}
|
|
|
|
CoTaskMemFree(wszGuid);
|
|
}
|
|
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = HrRegOpenKeyEx(HKEY_LOCAL_MACHINE, wszSubKeyName, KEY_ALL_ACCESS, phKey);
|
|
delete [] wszSubKeyName;
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Create a named event to notify other components that we're
|
|
in GUI Mode Setup of Win2K ICS Upgrade
|
|
|
|
Arguments:
|
|
|
|
Return Value:
|
|
|
|
standard HRESULT
|
|
|
|
--*/
|
|
HRESULT CIcsUpgrade::CreateIcsUpgradeNamedEvent()
|
|
{
|
|
DefineFunctionName("CIcsUpgrade::CreateIcsUpgradeNamedEvent");
|
|
TraceFunctionEntry(ttidNetSetup);
|
|
|
|
// create an auto-reset, nonsingaled, named event
|
|
m_hIcsUpgradeEvent = CreateEvent(NULL, FALSE, FALSE, c_wszIcsUpgradeEventName);
|
|
if (NULL == m_hIcsUpgradeEvent)
|
|
{
|
|
TraceTag(ttidError,
|
|
"%s: CreateEvent failed: 0x%lx",
|
|
__FUNCNAME__, GetLastError());
|
|
|
|
NetSetupLogStatusV(
|
|
LogSevError,
|
|
SzLoadIds (IDS_TXT_CANT_UPGRADE_ICS));
|
|
|
|
return HRESULT_FROM_WIN32(GetLastError());
|
|
}
|
|
|
|
return S_OK;
|
|
}
|
|
//--------- HNet helpers end ------------------------------------
|