Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

548 lines
13 KiB

#include <pch.h>
#pragma hdrstop
#include "comp.h"
#include "nccom.h"
#include "ncperms.h"
#include "ncreg.h"
#include "ncsetup.h"
#include "util.h"
VOID
CreateInstanceKeyPath (
NETCLASS Class,
const GUID& InstanceGuid,
PWSTR pszPath)
{
PCWSTR pszNetworkSubtreePath;
Assert (pszPath);
pszNetworkSubtreePath = MAP_NETCLASS_TO_NETWORK_SUBTREE[Class];
AssertSz (pszNetworkSubtreePath,
"This class does not use the network subtree.");
wcscpy (pszPath, pszNetworkSubtreePath);
wcscat (pszPath, L"\\");
INT cch = StringFromGUID2 (
InstanceGuid,
pszPath + wcslen(pszPath),
c_cchGuidWithTerm);
Assert (c_cchGuidWithTerm == cch);
}
HRESULT
HrOpenDeviceInfo (
IN NETCLASS Class,
IN PCWSTR pszPnpId,
OUT HDEVINFO* phdiOut,
OUT SP_DEVINFO_DATA* pdeidOut)
{
HRESULT hr;
Assert (FIsEnumerated(Class));
Assert (pszPnpId && *pszPnpId);
Assert (phdiOut);
Assert (pdeidOut);
hr = HrSetupDiCreateDeviceInfoList (
NULL,
NULL,
phdiOut);
if (S_OK == hr)
{
hr = HrSetupDiOpenDeviceInfo (
*phdiOut,
pszPnpId,
NULL,
0,
pdeidOut);
// On failure, cleanup the hdevinfo.
//
if (S_OK != hr)
{
SetupDiDestroyDeviceInfoList (*phdiOut);
*phdiOut = NULL;
}
}
TraceHr (ttidError, FAL, hr, SPAPI_E_NO_SUCH_DEVINST == hr,
"HrOpenDeviceInfo (%S)", pszPnpId);
return hr;
}
HRESULT
HrOpenComponentInstanceKey (
IN NETCLASS Class,
IN const GUID& InstanceGuid, OPTIONAL
IN PCWSTR pszPnpId, OPTIONAL
IN REGSAM samDesired,
OUT HKEY* phkey,
OUT HDEVINFO* phdiOut OPTIONAL,
OUT SP_DEVINFO_DATA* pdeidOut OPTIONAL)
{
HRESULT hr;
WCHAR szInstanceKeyPath [_MAX_PATH];
Assert (FIsValidNetClass(Class));
Assert (FImplies(FIsConsideredNetClass(Class), pszPnpId && *pszPnpId));
Assert (phkey);
Assert ((phdiOut && pdeidOut) || (!phdiOut && !pdeidOut));
*phkey = NULL;
if (phdiOut)
{
*phdiOut = NULL;
}
// Non-enumerated components have there instance key under the Network
// tree.
//
if (!FIsEnumerated (Class))
{
CreateInstanceKeyPath(Class, InstanceGuid, szInstanceKeyPath);
hr = HrRegOpenKeyEx (
HKEY_LOCAL_MACHINE,
szInstanceKeyPath,
samDesired,
phkey);
TraceHr (ttidError, FAL, hr, FALSE, "HrOpenInstanceKey (%S)",
szInstanceKeyPath);
}
// For enumerated components, we get the instance key from PnP.
//
else
{
Assert (pszPnpId);
HDEVINFO hdi;
SP_DEVINFO_DATA deid;
SP_DEVINFO_DATA* pdeid;
pdeid = (pdeidOut) ? pdeidOut : &deid;
hr = HrOpenDeviceInfo (Class, pszPnpId, &hdi, pdeid);
if (S_OK == hr)
{
hr = HrSetupDiOpenDevRegKey (
hdi,
pdeid,
DICS_FLAG_GLOBAL,
0,
DIREG_DRV,
samDesired,
phkey);
if (S_OK == hr)
{
if (phdiOut)
{
*phdiOut = hdi;
}
}
// On error, or if the caller doesn't want the HDEVINFO, free it.
//
if (!phdiOut || (S_OK != hr))
{
SetupDiDestroyDeviceInfoList (hdi);
}
}
else if ((SPAPI_E_NO_SUCH_DEVINST == hr) && (KEY_READ == samDesired))
{
// The instance key may not exist for the case when the
// class installer is called to remove an enumerated
// component and then notifies us to remove its bindings.
// For this case, the class installer has created a
// temporary key under the Network subtree that we can use
// to read a limited set of the data (namely LowerRange and
// UpperRange) we'll need to finish off the removal.
//
// We only do this for KEY_READ since there is no point in
// allowing anyone else to write to this key. This prevents
// HrCreateLinkageKey in particular from trying to write
// to this key.
//
wcscpy (szInstanceKeyPath,
c_szTempNetcfgStorageForUninstalledEnumeratedComponent);
INT cch = StringFromGUID2 (
InstanceGuid,
szInstanceKeyPath + wcslen(szInstanceKeyPath),
c_cchGuidWithTerm);
Assert (c_cchGuidWithTerm == cch);
hr = HrRegOpenKeyEx (
HKEY_LOCAL_MACHINE,
szInstanceKeyPath,
KEY_READ,
phkey);
if (S_OK != hr)
{
hr = SPAPI_E_NO_SUCH_DEVINST;
}
}
TraceHr (ttidError, FAL, hr,
(SPAPI_E_NO_SUCH_DEVINST == hr),
"HrOpenInstanceKey (%S)", pszPnpId);
}
return hr;
}
HRESULT
HrOpenNetworkKey (
IN REGSAM samDesired,
OUT HKEY* phkey)
{
HRESULT hr;
hr = HrRegOpenKeyEx (
HKEY_LOCAL_MACHINE,
L"System\\CurrentControlSet\\Control\\Network",
samDesired,
phkey);
TraceHr (ttidError, FAL, hr, FALSE, "HrOpenNetworkKey");
return hr;
}
HRESULT
HrRegCreateKeyWithWorldAccess (
HKEY hkey,
PCWSTR pszSubkey,
DWORD dwOptions,
REGSAM samDesired,
PHKEY phkey,
LPDWORD pdwDisposition)
{
HRESULT hr;
SECURITY_ATTRIBUTES sa = {0};
PSECURITY_DESCRIPTOR pSd;
// Create the correct descriptor. If this fails, we'll still
// create the key, it's just that if a service running as
// localsystem is creating this key, and a user process tries
// to open it, it will fail.
//
hr = HrAllocateSecurityDescriptorAllowAccessToWorld (&pSd);
if (S_OK == hr)
{
sa.nLength = sizeof(sa);
sa.lpSecurityDescriptor = pSd;
sa.bInheritHandle = FALSE;
}
else
{
Assert (!pSd);
TraceHr (ttidError, FAL, hr, FALSE,
"HrAllocateSecurityDescriptorAllowAccessToWorld "
"failed in HrRegCreateKeyWithWorldAccess");
}
hr = HrRegCreateKeyEx (
hkey,
pszSubkey,
dwOptions,
samDesired,
(pSd) ? &sa : NULL,
phkey,
pdwDisposition);
MemFree (pSd);
TraceHr (ttidError, FAL, hr, FALSE, "HrRegCreateKeyWithWorldAccess");
return hr;
}
PWSTR
GetNextStringToken (
IN OUT PWSTR pszString,
IN PCWSTR pszDelims,
OUT PWSTR* ppszNextToken)
{
const WCHAR* pchDelim;
PWSTR pszToken;
Assert (pszDelims);
Assert (ppszNextToken);
// If pszString is NULL, continue with the previous string.
//
if (!pszString)
{
pszString = *ppszNextToken;
Assert (pszString);
}
// Find the beginning of the token by skipping over the leading
// delimiters. Note that there is no token if and only if this loop
// sets pszString to point to the terminating NULL.
//
while (*pszString)
{
pchDelim = pszDelims;
while (*pchDelim && (*pchDelim != *pszString))
{
pchDelim++;
}
if (!*pchDelim)
{
// Current string character is not a delimiter, so it must
// be part of the token. Break the loop and go find the
// whole token.
//
break;
}
pszString++;
}
pszToken = pszString;
// Find the end of the token. If it is not the end of the string,
// put a NULL there.
//
while (*pszString)
{
pchDelim = pszDelims;
while (*pchDelim && (*pchDelim != *pszString))
{
pchDelim++;
}
if (*pchDelim)
{
// Found a delimiter so this ends the token. Advance
// pszString so that we'll set *ppszNextToken for next time.
//
*pszString = 0;
pszString++;
break;
}
pszString++;
}
// Remember where we left off for the next token.
//
*ppszNextToken = pszString;
// Return the token if we found it.
//
if (pszToken == pszString)
{
return NULL;
}
else
{
return pszToken;
}
}
VOID
SignalNetworkProviderLoaded (
VOID)
{
HANDLE Event;
UNICODE_STRING EventName;
OBJECT_ATTRIBUTES EventAttr;
NTSTATUS Status;
RtlInitUnicodeString (
&EventName,
L"\\Security\\NetworkProviderLoad");
InitializeObjectAttributes (
&EventAttr,
&EventName,
OBJ_CASE_INSENSITIVE,
NULL, NULL);
Status = NtOpenEvent (
&Event,
EVENT_QUERY_STATE | EVENT_MODIFY_STATE | SYNCHRONIZE,
&EventAttr);
if (NT_SUCCESS(Status))
{
SetEvent (Event);
CloseHandle (Event);
}
else
{
ULONG Win32Error;
Win32Error = RtlNtStatusToDosError(Status);
SetLastError(Win32Error);
TraceHr (ttidError, FAL, HrFromLastWin32Error(), FALSE,
"SignalNetworkProviderLoaded");
}
}
BOOL
CDynamicBuffer::FGrowBuffer (
ULONG cbGrow)
{
PBYTE pbNew;
// If it hasn't been set, use a default of 4096.
if (!m_cbGranularity)
{
m_cbGranularity = 4096;
}
if (cbGrow % m_cbGranularity)
{
cbGrow = (cbGrow + m_cbGranularity) - (cbGrow % m_cbGranularity);
}
pbNew = (PBYTE)MemAlloc (m_cbAllocated + cbGrow);
if (pbNew)
{
#ifdef ENABLETRACE
if (m_pbBuffer)
{
TraceTag (ttidDefault, "Dynamic buffer grown. New size = %d.",
m_cbAllocated + cbGrow);
}
#endif
CopyMemory (pbNew, m_pbBuffer, m_cbConsumed);
MemFree (m_pbBuffer);
m_pbBuffer = pbNew;
m_cbAllocated += cbGrow;
}
return !!pbNew;
}
HRESULT
CDynamicBuffer::HrReserveBytes (
ULONG cbReserve)
{
if (cbReserve > m_cbAllocated)
{
return (FGrowBuffer(cbReserve)) ? S_OK : E_OUTOFMEMORY;
}
return S_OK;
}
HRESULT
CDynamicBuffer::HrCopyBytes (
const BYTE* pbSrc,
ULONG cbSrc)
{
Assert (pbSrc);
Assert (m_cbAllocated >= m_cbConsumed);
if (cbSrc > m_cbAllocated - m_cbConsumed)
{
if (!FGrowBuffer (cbSrc))
{
return E_OUTOFMEMORY;
}
}
CopyMemory (m_pbBuffer + m_cbConsumed, pbSrc, cbSrc);
m_cbConsumed += cbSrc;
return S_OK;
}
HRESULT
CDynamicBuffer::HrCopyString (
PCWSTR pszSrc)
{
ULONG cbSrc;
cbSrc = CbOfSzAndTermSafe(pszSrc);
return HrCopyBytes ((const BYTE*)pszSrc, cbSrc);
}
BOOL
FIsFilterDevice (HDEVINFO hdi, PSP_DEVINFO_DATA pdeid)
{
WCHAR szFilterInfId[_MAX_PATH];
BOOL fIsFilterDevice = FALSE;
HKEY hkeyInstance;
HRESULT hr;
// Open the device's driver key.
//
hr = HrSetupDiOpenDevRegKey (
hdi, pdeid,
DICS_FLAG_GLOBAL, 0, DIREG_DRV,
KEY_READ, &hkeyInstance);
if (S_OK == hr)
{
// Get the filterinfid value. If present, then
// this device is a filter device.
//
DWORD cbFilterInfId = sizeof(szFilterInfId);
hr = HrRegQuerySzBuffer (
hkeyInstance,
L"FilterInfId",
szFilterInfId,
&cbFilterInfId);
if (S_OK == hr)
{
fIsFilterDevice = TRUE;
}
RegCloseKey (hkeyInstance);
}
return fIsFilterDevice;
}
VOID
AddOrRemoveDontExposeLowerCharacteristicIfNeeded (
IN OUT CComponent* pComponent)
{
ASSERT (pComponent);
// Special case: NCF_DONTEXPOSELOWER
// SPX has erroneously set this characteristic. It's not really
// needed as nothing binds with SPX. Having it set means that
// two components above IPX have this characteristic set. (NWNB
// is the other. The code to generate bindpaths by recursing
// the stack table is only setup to handle at most one component
// with this characteristic per pass. Turning it off for SPX
// solves this in the simplest way.
//
// Furthermore, enforce that only IPX and NWNB have this
// characteristic set..
//
//
if ((0 == wcscmp(L"ms_nwnb", pComponent->m_pszInfId)) ||
(0 == wcscmp(L"ms_nwipx", pComponent->m_pszInfId)))
{
pComponent->m_dwCharacter |= NCF_DONTEXPOSELOWER;
}
else
{
pComponent->m_dwCharacter &= ~NCF_DONTEXPOSELOWER;
}
// End Special case
}