Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

855 lines
25 KiB

#include "pch.hxx"
#include "util.h"
#include "shared.h"
#include "strings.h"
// Copied from nt\shell\shlwapi\reg.c
DWORD
DeleteKeyRecursively(
IN HKEY hkey,
IN LPCSTR pszSubKey)
{
DWORD dwRet;
HKEY hkSubKey;
// Open the subkey so we can enumerate any children
dwRet = RegOpenKeyExA(hkey, pszSubKey, 0, MAXIMUM_ALLOWED, &hkSubKey);
if (ERROR_SUCCESS == dwRet)
{
DWORD dwIndex;
CHAR szSubKeyName[MAX_PATH + 1];
DWORD cchSubKeyName = ARRAYSIZE(szSubKeyName);
// I can't just call RegEnumKey with an ever-increasing index, because
// I'm deleting the subkeys as I go, which alters the indices of the
// remaining subkeys in an implementation-dependent way. In order to
// be safe, I have to count backwards while deleting the subkeys.
// Find out how many subkeys there are
dwRet = RegQueryInfoKeyA(hkSubKey, NULL, NULL, NULL,
&dwIndex, // The # of subkeys -- all we need
NULL, NULL, NULL, NULL, NULL, NULL, NULL);
if (NO_ERROR == dwRet)
{
// dwIndex is now the count of subkeys, but it needs to be
// zero-based for RegEnumKey, so I'll pre-decrement, rather
// than post-decrement.
while (ERROR_SUCCESS == RegEnumKeyA(hkSubKey, --dwIndex, szSubKeyName, cchSubKeyName))
{
DeleteKeyRecursively(hkSubKey, szSubKeyName);
}
}
RegCloseKey(hkSubKey);
if (pszSubKey)
{
dwRet = RegDeleteKeyA(hkey, pszSubKey);
}
else
{
// we want to delete all the values by hand
cchSubKeyName = ARRAYSIZE(szSubKeyName);
while (ERROR_SUCCESS == RegEnumValueA(hkey, 0, szSubKeyName, &cchSubKeyName, NULL, NULL, NULL, NULL))
{
// avoid looping infinitely when we cant delete the value
if (RegDeleteValueA(hkey, szSubKeyName))
break;
cchSubKeyName = ARRAYSIZE(szSubKeyName);
}
}
}
return dwRet;
}
//--------------------------------------------------------------------------
// GetWindowsDirectoryWrap
//
// Returns the system's Windows directory
// Based on code from SHLWAPI's util.cpp by TNoonan
//--------------------------------------------------------------------------
typedef UINT (__stdcall * PFNGETSYSTEMWINDOWSDIRECTORYA)(LPSTR pszBuffer, UINT cchBuff);
UINT GetSystemWindowsDirectoryWrap(LPTSTR pszBuffer, UINT uSize)
{
// On NT?
if (VER_PLATFORM_WIN32_NT == si.osv.dwPlatformId)
{
static PFNGETSYSTEMWINDOWSDIRECTORYA s_pfn = (PFNGETSYSTEMWINDOWSDIRECTORYA)-1;
if (((PFNGETSYSTEMWINDOWSDIRECTORYA)-1) == s_pfn)
{
HINSTANCE hinst = GetModuleHandle(TEXT("KERNEL32.DLL"));
Assert(NULL != hinst); // YIKES!
if (hinst)
s_pfn = (PFNGETSYSTEMWINDOWSDIRECTORYA)GetProcAddress(hinst, "GetSystemWindowsDirectoryA");
else
s_pfn = NULL;
}
if (s_pfn)
{
// we use the new API so we dont get lied to by hydra
return s_pfn(pszBuffer, uSize);
}
else
{
// Get System directory is not munged by Hydra
GetSystemDirectory(pszBuffer, uSize);
PathRemoveFileSpec(pszBuffer);
return lstrlen(pszBuffer);
}
}
else
{
// Okay to call GetWindowsDirectory as we are on 9x
return GetWindowsDirectory(pszBuffer, uSize);
}
}
/****************************************************************************
NAME: GoodEnough
SYNOPSIS: Returns true if pwVerGot is newer or equal to pwVerNeed
****************************************************************************/
BOOL GoodEnough(WORD *pwVerGot, WORD *pwVerNeed)
{
BOOL fOK = FALSE;
Assert(pwVerGot);
Assert(pwVerNeed);
if (pwVerGot[0] > pwVerNeed[0])
fOK = TRUE;
else if (pwVerGot[0] == pwVerNeed[0])
{
if (pwVerGot[1] > pwVerNeed[1])
fOK = TRUE;
else if (pwVerGot[1] == pwVerNeed[1])
{
if (pwVerGot[2] > pwVerNeed[2])
fOK = TRUE;
else if (pwVerGot[2] == pwVerNeed[2])
{
if (pwVerGot[3] >= pwVerNeed[3])
fOK = TRUE;
}
}
}
return fOK;
}
/****************************************************************************
NAME: OEFileBackedUp - HACK
****************************************************************************/
BOOL OEFileBackedUp(LPTSTR pszFullPath, int cch)
{
BOOL bFound = FALSE;
HKEY hkeyOE;
TCHAR szINI[MAX_PATH], szTemp[MAX_PATH];
DWORD cb, dwType;
Assert(pszFullPath);
Assert(cch > 0);
if (ERROR_SUCCESS == RegOpenKeyEx(HKEY_LOCAL_MACHINE, c_szRegAdvInfoOE, 0, KEY_READ, &hkeyOE))
{
cb = sizeof(szINI);
if (ERROR_SUCCESS == RegQueryValueEx(hkeyOE, c_szBackupFileName, 0, &dwType, (LPBYTE)szINI, &cb))
{
if (REG_EXPAND_SZ == dwType)
{
ZeroMemory(szTemp, ARRAYSIZE(szTemp));
ExpandEnvironmentStrings(szINI, szTemp, ARRAYSIZE(szTemp));
StrCpyN(szINI, szTemp, ARRAYSIZE(szINI));
// Get ready to change the extension to INI (4 = lstrlen(".DAT"))
cb = lstrlen(szINI)-4;
}
else
// 5 = 4 + 1 (RegQueryValue returns length including NULL)
cb -= 5;
StrCpyN(&szINI[cb], c_szDotINI, ARRAYSIZE(szINI) - cb);
// On Win95, shorten the name
if (VER_PLATFORM_WIN32_WINDOWS == si.osv.dwPlatformId)
GetShortPathName(pszFullPath, pszFullPath, cch);
// See if we can find it
if (1 < GetPrivateProfileString(c_szBackupSection, pszFullPath, c_szEmpty, szTemp, ARRAYSIZE(szTemp), szINI))
{
// We are only interested in the first two characters
szTemp[2] = 0;
if (!lstrcmp(szTemp, c_szBackedup))
bFound = TRUE;
else
AssertSz(!lstrcmp(szTemp, c_szNotBackedup), "SETUP: Advpack back up info has unknown status flag");
}
}
RegCloseKey(hkeyOE);
}
return bFound;
}
/****************************************************************************
NAME: MsgBox
****************************************************************************/
int MsgBox(HWND hWnd, UINT nMsgID, UINT uIcon, UINT uButtons)
{
TCHAR szMsgBuf[CCHMAX_STRINGRES];
if (!si.fPrompt)
return 0;
LoadString(g_hInstance, nMsgID, szMsgBuf, ARRAYSIZE(szMsgBuf));
LOG("[MSGBOX] ");
LOG2(szMsgBuf);
return(MessageBox(hWnd, szMsgBuf, si.szAppName, uIcon | uButtons | MB_SETFOREGROUND));
}
/*******************************************************************
NAME: ConvertVerToEnum
********************************************************************/
SETUPVER ConvertVerToEnum(WORD *pwVer)
{
SETUPVER sv;
Assert(pwVer);
switch (pwVer[0])
{
case 0:
sv = VER_NONE;
break;
case 1:
if (0 == pwVer[1])
sv = VER_1_0;
else
sv = VER_1_1;
break;
case 4:
sv = VER_4_0;
break;
case 5:
sv = VER_5_0;
break;
case 6:
sv = VER_6_0;
break;
default:
sv = VER_MAX;
}
return sv;
}
/*******************************************************************
NAME: ConvertStrToVer
********************************************************************/
void ConvertStrToVer(LPCSTR pszStr, WORD *pwVer)
{
int i;
Assert(pszStr);
Assert(pwVer);
ZeroMemory(pwVer, 4 * sizeof(WORD));
for (i=0; i<4; i++)
{
while (*pszStr && (*pszStr != ',') && (*pszStr != '.'))
{
pwVer[i] *= 10;
pwVer[i] += *pszStr - '0';
pszStr++;
}
if (*pszStr)
pszStr++;
}
return;
}
/*******************************************************************
NAME: GetVers
********************************************************************/
void GetVers(WORD *pwVerCurr, WORD *pwVerPrev)
{
HKEY hkeyT;
DWORD cb;
CHAR szVer[VERLEN];
if (ERROR_SUCCESS == RegOpenKeyEx(HKEY_LOCAL_MACHINE, si.pszVerInfo, 0, KEY_QUERY_VALUE, &hkeyT))
{
if (pwVerCurr)
{
cb = sizeof(szVer);
RegQueryValueExA(hkeyT, c_szRegCurrVer, NULL, NULL, (LPBYTE)szVer, &cb);
ConvertStrToVer(szVer, pwVerCurr);
}
if (pwVerPrev)
{
cb = sizeof(szVer);
RegQueryValueExA(hkeyT, c_szRegPrevVer, NULL, NULL, (LPBYTE)szVer, &cb);
ConvertStrToVer(szVer, pwVerPrev);
}
RegCloseKey(hkeyT);
}
}
/*******************************************************************
NAME: GetVerInfo
********************************************************************/
void GetVerInfo(SETUPVER *psvCurr, SETUPVER *psvPrev)
{
WORD wVerCurr[4];
WORD wVerPrev[4];
GetVers(wVerCurr, wVerPrev);
if (psvCurr)
*psvCurr = ConvertVerToEnum(wVerCurr);
if (psvPrev)
*psvPrev = ConvertVerToEnum(wVerPrev);
}
/*******************************************************************
NAME: InterimBuild
********************************************************************/
BOOL InterimBuild(SETUPVER *psv)
{
HKEY hkeyT;
DWORD cb;
BOOL fInterim = FALSE;
Assert(psv);
ZeroMemory(psv, sizeof(SETUPVER));
if (ERROR_SUCCESS == RegOpenKeyEx(HKEY_LOCAL_MACHINE, si.pszVerInfo, 0, KEY_QUERY_VALUE, &hkeyT))
{
cb = sizeof(SETUPVER);
fInterim = (ERROR_SUCCESS == RegQueryValueExA(hkeyT, c_szRegInterimVer, NULL, NULL, (LPBYTE)psv, &cb));
RegCloseKey(hkeyT);
}
return fInterim;
}
/*******************************************************************
NAME: GetASetupVer
********************************************************************/
BOOL GetASetupVer(LPCTSTR pszGUID, WORD *pwVer, LPTSTR pszVer, int cch)
{
HKEY hkey;
TCHAR szPath[MAX_PATH], szVer[64];
BOOL fInstalled = FALSE;
DWORD dwValue, cb;
Assert(pszGUID);
if (pszVer)
pszVer[0] = 0;
if (pwVer)
ZeroMemory(pwVer, 4 * sizeof(WORD));
wnsprintf(szPath, ARRAYSIZE(szPath), c_szPathFileFmt, c_szRegASetup, pszGUID);
if (ERROR_SUCCESS == RegOpenKeyEx(HKEY_LOCAL_MACHINE, szPath, 0, KEY_QUERY_VALUE, &hkey))
{
cb = sizeof(dwValue);
if (ERROR_SUCCESS == RegQueryValueEx(hkey, c_szIsInstalled, 0, NULL, (LPBYTE)&dwValue, &cb))
{
if (1 == dwValue)
{
cb = sizeof(szVer);
if (ERROR_SUCCESS == RegQueryValueEx(hkey, c_szValueVersion, 0, NULL, (LPBYTE)szVer, &cb))
{
if (pwVer)
ConvertStrToVer(szVer, pwVer);
if (pszVer)
StrCpyN(pszVer, szVer, cch);
fInstalled = TRUE;
}
}
}
RegCloseKey(hkey);
}
return fInstalled;
}
/*******************************************************************
NAME: GetFileVer
********************************************************************/
HRESULT GetFileVer(LPCTSTR pszExePath, LPTSTR pszVer, DWORD cch)
{
DWORD dwVerInfoSize, dwVerHnd;
HRESULT hr = S_OK;
LPSTR pszInfo = NULL;
LPSTR pszVersion;
LPWORD pwTrans;
TCHAR szGet[MAX_PATH];
UINT uLen;
// Validate Parameters
Assert(pszExePath);
Assert(pszVer);
Assert(cch);
// Validate global state
Assert(g_pMalloc);
// Initialize out parameters
pszVer[0] = TEXT('\0');
// Allocate space for version info block
if (0 == (dwVerInfoSize = GetFileVersionInfoSize(const_cast<LPTSTR> (pszExePath), &dwVerHnd)))
{
hr = E_FAIL;
TraceResult(hr);
goto exit;
}
IF_NULLEXIT(pszInfo = (LPTSTR)g_pMalloc->Alloc(dwVerInfoSize));
ZeroMemory(pszInfo, dwVerInfoSize);
// Get Version info block
IF_FALSEEXIT(GetFileVersionInfo(const_cast<LPTSTR> (pszExePath), dwVerHnd, dwVerInfoSize, pszInfo), E_FAIL);
// Figure out language for version info
IF_FALSEEXIT(VerQueryValue(pszInfo, "\\VarFileInfo\\Translation", (LPVOID *)&pwTrans, &uLen) && uLen >= (2 * sizeof(WORD)), E_FAIL);
// Set up buffer with correct language and get version
wnsprintf(szGet, ARRAYSIZE(szGet), "\\StringFileInfo\\%04X%04X\\FileVersion", pwTrans[0], pwTrans[1]);
IF_FALSEEXIT(VerQueryValue(pszInfo, szGet, (LPVOID *)&pszVersion, &uLen) && uLen, E_FAIL);
// Copy version out of version block, into out param
Assert(pszVersion);
StrCpyN(pszVer, pszVersion, cch);
exit:
if (pszInfo)
g_pMalloc->Free(pszInfo);
return hr;
}
/*******************************************************************
NAME: GetExeVer
********************************************************************/
HRESULT GetExeVer(LPCTSTR pszExeName, WORD *pwVer, LPTSTR pszVer, int cch)
{
HRESULT hr = S_OK;
TCHAR szPath[MAX_PATH];
TCHAR szVer[64];
// Validate params
Assert(pszExeName);
// Initialize out params
if (pszVer)
{
Assert(cch);
pszVer[0] = 0;
}
if (pwVer)
// Version is an array of 4 words
ZeroMemory(pwVer, 4 * sizeof(WORD));
// Find the exe
IF_FALSEEXIT(GetExePath(pszExeName, szPath, ARRAYSIZE(szPath), FALSE), E_FAIL);
// Get the string representation of the version
IF_FAILEXIT(hr = GetFileVer(szPath, szVer, ARRAYSIZE(szVer)));
// Fill in out params
if (pwVer)
ConvertStrToVer(szVer, pwVer);
if (pszVer)
StrCpyN(pszVer, szVer, cch);
exit:
return hr;
}
/****************************************************************************
NAME: IsNTAdmin
****************************************************************************/
BOOL IsNTAdmin(void)
{
static int fIsAdmin = 2;
HANDLE hAccessToken;
PTOKEN_GROUPS ptgGroups;
DWORD dwReqSize;
UINT i;
SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;
PSID AdministratorsGroup;
BOOL bRet;
//
// If we have cached a value, return the cached value. Note I never
// set the cached value to false as I want to retry each time in
// case a previous failure was just a temp. problem (ie net access down)
//
bRet = FALSE;
ptgGroups = NULL;
if( fIsAdmin != 2 )
return (BOOL)fIsAdmin;
if (si.osv.dwPlatformId != VER_PLATFORM_WIN32_NT)
{
fIsAdmin = TRUE; // If we are not running under NT return TRUE.
return (BOOL)fIsAdmin;
}
if(!OpenProcessToken( GetCurrentProcess(), TOKEN_QUERY, &hAccessToken ) )
return FALSE;
// See how big of a buffer we need for the token information
if(!GetTokenInformation( hAccessToken, TokenGroups, NULL, 0, &dwReqSize))
{
// GetTokenInfo should the buffer size we need - Alloc a buffer
if(GetLastError() == ERROR_INSUFFICIENT_BUFFER)
MemAlloc((void **)&ptgGroups, dwReqSize);
}
// ptgGroups could be NULL for a coupla reasons here:
// 1. The alloc above failed
// 2. GetTokenInformation actually managed to succeed the first time (possible?)
// 3. GetTokenInfo failed for a reason other than insufficient buffer
// Any of these seem justification for bailing.
// So, make sure it isn't null, then get the token info
if(ptgGroups && GetTokenInformation(hAccessToken, TokenGroups, ptgGroups, dwReqSize, &dwReqSize))
{
if(AllocateAndInitializeSid( &NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID,
DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdministratorsGroup) )
{
// Search thru all the groups this process belongs to looking for the
// Admistrators Group.
for( i=0; i < ptgGroups->GroupCount; i++ )
{
if( EqualSid(ptgGroups->Groups[i].Sid, AdministratorsGroup) )
{
// Yea! This guy looks like an admin
fIsAdmin = TRUE;
bRet = TRUE;
break;
}
}
FreeSid(AdministratorsGroup);
}
}
// BUGBUG: Close handle here? doc's aren't clear whether this is needed.
CloseHandle(hAccessToken);
if(ptgGroups)
MemFree(ptgGroups);
return bRet;
}
const LPCTSTR c_rgszExes[] = { c_szMainExe };
/****************************************************************************
NAME: RegisterExes
****************************************************************************/
void RegisterExes(BOOL fReg)
{
int i;
STARTUPINFO sti;
DWORD dw,cb;
PROCESS_INFORMATION pi;
TCHAR szPath[MAX_PATH], szUnreg[MAX_PATH + 32], szExpanded[MAX_PATH];
LPTSTR pszPath;
HKEY hkey;
LOG("Reg/Unreg Exes: ");
// Use InstallRoot as directory
if (ERROR_SUCCESS == RegOpenKeyEx(HKEY_LOCAL_MACHINE, c_szRegFlat, 0, KEY_QUERY_VALUE, &hkey))
{
cb = sizeof(szPath);
if (ERROR_SUCCESS == RegQueryValueEx(hkey, c_szInstallRoot, 0, &dw, (LPBYTE)szPath, &cb))
{
if (REG_EXPAND_SZ == dw)
{
ZeroMemory(szExpanded, ARRAYSIZE(szExpanded));
ExpandEnvironmentStrings(szPath, szExpanded, ARRAYSIZE(szExpanded));
pszPath = szExpanded;
}
else
pszPath = szPath;
for (i = 0; i < ARRAYSIZE(c_rgszExes); i++)
{
wnsprintf(szUnreg, ARRAYSIZE(szUnreg), fReg ? c_szRegFmt : c_szUnregFmt, pszPath, c_rgszExes[i]);
ZeroMemory(&sti, sizeof(STARTUPINFO));
sti.cb = sizeof(STARTUPINFO);
LOG2(szUnreg);
if (CreateProcess(NULL, szUnreg, NULL, NULL, FALSE, 0, NULL, NULL, &sti, &pi))
{
WaitForSingleObject(pi.hProcess, INFINITE);
GetExitCodeProcess(pi.hProcess, &dw);
CloseHandle(pi.hThread);
CloseHandle(pi.hProcess);
}
}
}
RegCloseKey(hkey);
}
}
#ifdef SETUP_LOG
/****************************************************************************
NAME: OpenLogFile
****************************************************************************/
void OpenLogFile()
{
TCHAR szPath[MAX_PATH];
BOOL fOK = FALSE;
DWORD cb;
SYSTEMTIME systime;
// On Term server, this will be stored in user's windows dir - this is fine.
cb = GetWindowsDirectory(szPath, ARRAYSIZE(szPath));
if (*CharPrev(szPath, szPath+cb) != '\\')
szPath[cb++] = '\\';
StrCpyN(&szPath[cb], c_szFileLog, ARRAYSIZE(szPath)-cb);
si.hLogFile = CreateFile(szPath, GENERIC_READ | GENERIC_WRITE, 0, NULL, OPEN_ALWAYS,
FILE_FLAG_SEQUENTIAL_SCAN | FILE_ATTRIBUTE_NORMAL, NULL);
if (INVALID_HANDLE_VALUE == si.hLogFile)
return;
cb = GetFileSize(si.hLogFile, NULL);
if (0xFFFFFFFF == cb)
cb = 0;
// If file is getting kind of large
if (cb >= 102400)
{
// Seek to the end of the file...
SetFilePointer(si.hLogFile, 0, NULL, FILE_BEGIN);
// Set End Of File
SetEndOfFile(si.hLogFile);
}
// Seek to the end of the file...
SetFilePointer(si.hLogFile, 0, NULL, FILE_END);
GetLocalTime(&systime);
wnsprintf(szLogBuffer, ARRAYSIZE(szLogBuffer), "\r\n\r\n-----[START]: OE / WAB Setup 5.0 started on %02d/%02d/%04d at %02d:%02d\r\n",
systime.wMonth, systime.wDay, systime.wYear, systime.wHour, systime.wMinute);
LogMessage(szLogBuffer, TRUE);
}
/****************************************************************************
NAME: CloseLogFile
****************************************************************************/
void CloseLogFile()
{
if (INVALID_HANDLE_VALUE != si.hLogFile)
{
LogMessage("\r\n-----[END]", TRUE);
CloseHandle(si.hLogFile);
}
}
/****************************************************************************
NAME: LogMessage
****************************************************************************/
void LogMessage(LPSTR pszMsg, BOOL fNewLine)
{
if (INVALID_HANDLE_VALUE != si.hLogFile)
{
DWORD cb;
CHAR szBuffer[256];
if (fNewLine)
{
szBuffer[0] = '\r';
szBuffer[1] = '\n';
cb = 2;
}
else
cb = 0;
StrCpyN(&szBuffer[cb], pszMsg, ARRAYSIZE(szBuffer)-cb);
WriteFile(si.hLogFile, (LPCVOID)szBuffer, lstrlen(szBuffer)+1, &cb, NULL);
}
}
/****************************************************************************
NAME: LogRegistryKey
****************************************************************************/
void LogRegistryKey(HKEY hkeyMain, LPTSTR pszSub)
{
if (INVALID_HANDLE_VALUE != si.hLogFile)
{
LogMessage("Registry Dump: ", TRUE);
if (HKEY_LOCAL_MACHINE == hkeyMain)
LogMessage("HKLM, ", FALSE);
else if (HKEY_CURRENT_USER == hkeyMain)
LogMessage("HKCU, ", FALSE);
else if (HKEY_CLASSES_ROOT == hkeyMain)
LogMessage("HKCR, ", FALSE);
else
LogMessage("????, ", FALSE);
LogMessage(pszSub, TRUE);
}
}
/****************************************************************************
NAME: LogRegistry
****************************************************************************/
void LogRegistry(HKEY hkeyMain, LPTSTR pszSub)
{
if (INVALID_HANDLE_VALUE != si.hLogFile)
{
DWORD i;
HKEY hkey;
LONG lStatus;
DWORD dwClassLength=0;
DWORD dwSubKeys;
DWORD dwMaxSubKey;
DWORD dwMaxClass;
DWORD dwValues;
DWORD dwMaxValueName;
DWORD dwMaxValueData;
DWORD dwSecurityLength;
FILETIME ftLastWrite;
LPTSTR szNameBuffer;
//
// First open the given key so we can enumerate its subkeys
//
if (ERROR_SUCCESS != RegOpenKeyEx(hkeyMain, pszSub, 0, KEY_ENUMERATE_SUB_KEYS | KEY_QUERY_VALUE, &hkey))
{
LogRegistryKey(hkeyMain, pszSub);
}
//
// Use RegQueryInfoKey to determine how big to allocate the buffer
// for the subkey names.
//
if (ERROR_SUCCESS != RegQueryInfoKey(hkey, NULL, &dwClassLength, 0, &dwSubKeys, &dwMaxSubKey, &dwMaxClass, &dwValues,
&dwMaxValueName, &dwMaxValueData, &dwSecurityLength, &ftLastWrite))
{
RegCloseKey(hkey);
return;
}
if (!MemAlloc((void **)&szNameBuffer, sizeof(TCHAR) * (dwMaxSubKey + 1)))
{
RegCloseKey(hkey);
return;
}
//
// Enumerate subkeys and apply ourselves to each one.
//
i = 0;
do {
if (ERROR_SUCCESS == (lStatus = RegEnumKey(hkey, i, szNameBuffer, dwMaxSubKey+1)))
LogRegistry(hkey, szNameBuffer);
else
++i;
} while ( (lStatus != ERROR_NO_MORE_ITEMS) && (i < dwSubKeys) );
MemFree(szNameBuffer);
RegCloseKey(hkey);
LogRegistryKey(hkey, pszSub);
}
}
#endif