You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
548 lines
13 KiB
548 lines
13 KiB
#include <pch.h>
|
|
#pragma hdrstop
|
|
#include "comp.h"
|
|
#include "nccom.h"
|
|
#include "ncperms.h"
|
|
#include "ncreg.h"
|
|
#include "ncsetup.h"
|
|
#include "util.h"
|
|
|
|
VOID
|
|
CreateInstanceKeyPath (
|
|
NETCLASS Class,
|
|
const GUID& InstanceGuid,
|
|
PWSTR pszPath)
|
|
{
|
|
PCWSTR pszNetworkSubtreePath;
|
|
|
|
Assert (pszPath);
|
|
|
|
pszNetworkSubtreePath = MAP_NETCLASS_TO_NETWORK_SUBTREE[Class];
|
|
AssertSz (pszNetworkSubtreePath,
|
|
"This class does not use the network subtree.");
|
|
|
|
wcscpy (pszPath, pszNetworkSubtreePath);
|
|
wcscat (pszPath, L"\\");
|
|
|
|
INT cch = StringFromGUID2 (
|
|
InstanceGuid,
|
|
pszPath + wcslen(pszPath),
|
|
c_cchGuidWithTerm);
|
|
Assert (c_cchGuidWithTerm == cch);
|
|
}
|
|
|
|
HRESULT
|
|
HrOpenDeviceInfo (
|
|
IN NETCLASS Class,
|
|
IN PCWSTR pszPnpId,
|
|
OUT HDEVINFO* phdiOut,
|
|
OUT SP_DEVINFO_DATA* pdeidOut)
|
|
{
|
|
HRESULT hr;
|
|
|
|
Assert (FIsEnumerated(Class));
|
|
Assert (pszPnpId && *pszPnpId);
|
|
Assert (phdiOut);
|
|
Assert (pdeidOut);
|
|
|
|
hr = HrSetupDiCreateDeviceInfoList (
|
|
NULL,
|
|
NULL,
|
|
phdiOut);
|
|
|
|
if (S_OK == hr)
|
|
{
|
|
hr = HrSetupDiOpenDeviceInfo (
|
|
*phdiOut,
|
|
pszPnpId,
|
|
NULL,
|
|
0,
|
|
pdeidOut);
|
|
|
|
// On failure, cleanup the hdevinfo.
|
|
//
|
|
if (S_OK != hr)
|
|
{
|
|
SetupDiDestroyDeviceInfoList (*phdiOut);
|
|
*phdiOut = NULL;
|
|
}
|
|
}
|
|
|
|
|
|
TraceHr (ttidError, FAL, hr, SPAPI_E_NO_SUCH_DEVINST == hr,
|
|
"HrOpenDeviceInfo (%S)", pszPnpId);
|
|
return hr;
|
|
}
|
|
|
|
|
|
HRESULT
|
|
HrOpenComponentInstanceKey (
|
|
IN NETCLASS Class,
|
|
IN const GUID& InstanceGuid, OPTIONAL
|
|
IN PCWSTR pszPnpId, OPTIONAL
|
|
IN REGSAM samDesired,
|
|
OUT HKEY* phkey,
|
|
OUT HDEVINFO* phdiOut OPTIONAL,
|
|
OUT SP_DEVINFO_DATA* pdeidOut OPTIONAL)
|
|
{
|
|
HRESULT hr;
|
|
WCHAR szInstanceKeyPath [_MAX_PATH];
|
|
|
|
Assert (FIsValidNetClass(Class));
|
|
Assert (FImplies(FIsConsideredNetClass(Class), pszPnpId && *pszPnpId));
|
|
Assert (phkey);
|
|
Assert ((phdiOut && pdeidOut) || (!phdiOut && !pdeidOut));
|
|
|
|
*phkey = NULL;
|
|
|
|
if (phdiOut)
|
|
{
|
|
*phdiOut = NULL;
|
|
}
|
|
|
|
// Non-enumerated components have there instance key under the Network
|
|
// tree.
|
|
//
|
|
if (!FIsEnumerated (Class))
|
|
{
|
|
CreateInstanceKeyPath(Class, InstanceGuid, szInstanceKeyPath);
|
|
|
|
hr = HrRegOpenKeyEx (
|
|
HKEY_LOCAL_MACHINE,
|
|
szInstanceKeyPath,
|
|
samDesired,
|
|
phkey);
|
|
|
|
TraceHr (ttidError, FAL, hr, FALSE, "HrOpenInstanceKey (%S)",
|
|
szInstanceKeyPath);
|
|
}
|
|
|
|
// For enumerated components, we get the instance key from PnP.
|
|
//
|
|
else
|
|
{
|
|
Assert (pszPnpId);
|
|
|
|
HDEVINFO hdi;
|
|
SP_DEVINFO_DATA deid;
|
|
SP_DEVINFO_DATA* pdeid;
|
|
|
|
pdeid = (pdeidOut) ? pdeidOut : &deid;
|
|
|
|
hr = HrOpenDeviceInfo (Class, pszPnpId, &hdi, pdeid);
|
|
|
|
if (S_OK == hr)
|
|
{
|
|
hr = HrSetupDiOpenDevRegKey (
|
|
hdi,
|
|
pdeid,
|
|
DICS_FLAG_GLOBAL,
|
|
0,
|
|
DIREG_DRV,
|
|
samDesired,
|
|
phkey);
|
|
|
|
if (S_OK == hr)
|
|
{
|
|
if (phdiOut)
|
|
{
|
|
*phdiOut = hdi;
|
|
}
|
|
}
|
|
|
|
// On error, or if the caller doesn't want the HDEVINFO, free it.
|
|
//
|
|
if (!phdiOut || (S_OK != hr))
|
|
{
|
|
SetupDiDestroyDeviceInfoList (hdi);
|
|
}
|
|
}
|
|
else if ((SPAPI_E_NO_SUCH_DEVINST == hr) && (KEY_READ == samDesired))
|
|
{
|
|
// The instance key may not exist for the case when the
|
|
// class installer is called to remove an enumerated
|
|
// component and then notifies us to remove its bindings.
|
|
// For this case, the class installer has created a
|
|
// temporary key under the Network subtree that we can use
|
|
// to read a limited set of the data (namely LowerRange and
|
|
// UpperRange) we'll need to finish off the removal.
|
|
//
|
|
// We only do this for KEY_READ since there is no point in
|
|
// allowing anyone else to write to this key. This prevents
|
|
// HrCreateLinkageKey in particular from trying to write
|
|
// to this key.
|
|
//
|
|
wcscpy (szInstanceKeyPath,
|
|
c_szTempNetcfgStorageForUninstalledEnumeratedComponent);
|
|
|
|
INT cch = StringFromGUID2 (
|
|
InstanceGuid,
|
|
szInstanceKeyPath + wcslen(szInstanceKeyPath),
|
|
c_cchGuidWithTerm);
|
|
Assert (c_cchGuidWithTerm == cch);
|
|
|
|
hr = HrRegOpenKeyEx (
|
|
HKEY_LOCAL_MACHINE,
|
|
szInstanceKeyPath,
|
|
KEY_READ,
|
|
phkey);
|
|
|
|
if (S_OK != hr)
|
|
{
|
|
hr = SPAPI_E_NO_SUCH_DEVINST;
|
|
}
|
|
}
|
|
|
|
TraceHr (ttidError, FAL, hr,
|
|
(SPAPI_E_NO_SUCH_DEVINST == hr),
|
|
"HrOpenInstanceKey (%S)", pszPnpId);
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
HRESULT
|
|
HrOpenNetworkKey (
|
|
IN REGSAM samDesired,
|
|
OUT HKEY* phkey)
|
|
{
|
|
HRESULT hr;
|
|
|
|
hr = HrRegOpenKeyEx (
|
|
HKEY_LOCAL_MACHINE,
|
|
L"System\\CurrentControlSet\\Control\\Network",
|
|
samDesired,
|
|
phkey);
|
|
|
|
TraceHr (ttidError, FAL, hr, FALSE, "HrOpenNetworkKey");
|
|
return hr;
|
|
}
|
|
|
|
HRESULT
|
|
HrRegCreateKeyWithWorldAccess (
|
|
HKEY hkey,
|
|
PCWSTR pszSubkey,
|
|
DWORD dwOptions,
|
|
REGSAM samDesired,
|
|
PHKEY phkey,
|
|
LPDWORD pdwDisposition)
|
|
{
|
|
HRESULT hr;
|
|
SECURITY_ATTRIBUTES sa = {0};
|
|
PSECURITY_DESCRIPTOR pSd;
|
|
|
|
// Create the correct descriptor. If this fails, we'll still
|
|
// create the key, it's just that if a service running as
|
|
// localsystem is creating this key, and a user process tries
|
|
// to open it, it will fail.
|
|
//
|
|
hr = HrAllocateSecurityDescriptorAllowAccessToWorld (&pSd);
|
|
|
|
if (S_OK == hr)
|
|
{
|
|
sa.nLength = sizeof(sa);
|
|
sa.lpSecurityDescriptor = pSd;
|
|
sa.bInheritHandle = FALSE;
|
|
}
|
|
else
|
|
{
|
|
Assert (!pSd);
|
|
TraceHr (ttidError, FAL, hr, FALSE,
|
|
"HrAllocateSecurityDescriptorAllowAccessToWorld "
|
|
"failed in HrRegCreateKeyWithWorldAccess");
|
|
}
|
|
|
|
hr = HrRegCreateKeyEx (
|
|
hkey,
|
|
pszSubkey,
|
|
dwOptions,
|
|
samDesired,
|
|
(pSd) ? &sa : NULL,
|
|
phkey,
|
|
pdwDisposition);
|
|
|
|
MemFree (pSd);
|
|
|
|
TraceHr (ttidError, FAL, hr, FALSE, "HrRegCreateKeyWithWorldAccess");
|
|
return hr;
|
|
}
|
|
|
|
PWSTR
|
|
GetNextStringToken (
|
|
IN OUT PWSTR pszString,
|
|
IN PCWSTR pszDelims,
|
|
OUT PWSTR* ppszNextToken)
|
|
{
|
|
const WCHAR* pchDelim;
|
|
PWSTR pszToken;
|
|
|
|
Assert (pszDelims);
|
|
Assert (ppszNextToken);
|
|
|
|
// If pszString is NULL, continue with the previous string.
|
|
//
|
|
if (!pszString)
|
|
{
|
|
pszString = *ppszNextToken;
|
|
Assert (pszString);
|
|
}
|
|
|
|
// Find the beginning of the token by skipping over the leading
|
|
// delimiters. Note that there is no token if and only if this loop
|
|
// sets pszString to point to the terminating NULL.
|
|
//
|
|
while (*pszString)
|
|
{
|
|
pchDelim = pszDelims;
|
|
while (*pchDelim && (*pchDelim != *pszString))
|
|
{
|
|
pchDelim++;
|
|
}
|
|
|
|
if (!*pchDelim)
|
|
{
|
|
// Current string character is not a delimiter, so it must
|
|
// be part of the token. Break the loop and go find the
|
|
// whole token.
|
|
//
|
|
break;
|
|
}
|
|
|
|
pszString++;
|
|
}
|
|
|
|
pszToken = pszString;
|
|
|
|
// Find the end of the token. If it is not the end of the string,
|
|
// put a NULL there.
|
|
//
|
|
while (*pszString)
|
|
{
|
|
pchDelim = pszDelims;
|
|
while (*pchDelim && (*pchDelim != *pszString))
|
|
{
|
|
pchDelim++;
|
|
}
|
|
|
|
if (*pchDelim)
|
|
{
|
|
// Found a delimiter so this ends the token. Advance
|
|
// pszString so that we'll set *ppszNextToken for next time.
|
|
//
|
|
*pszString = 0;
|
|
pszString++;
|
|
break;
|
|
}
|
|
|
|
pszString++;
|
|
}
|
|
|
|
// Remember where we left off for the next token.
|
|
//
|
|
*ppszNextToken = pszString;
|
|
|
|
// Return the token if we found it.
|
|
//
|
|
if (pszToken == pszString)
|
|
{
|
|
return NULL;
|
|
}
|
|
else
|
|
{
|
|
return pszToken;
|
|
}
|
|
}
|
|
|
|
VOID
|
|
SignalNetworkProviderLoaded (
|
|
VOID)
|
|
{
|
|
HANDLE Event;
|
|
UNICODE_STRING EventName;
|
|
OBJECT_ATTRIBUTES EventAttr;
|
|
NTSTATUS Status;
|
|
|
|
RtlInitUnicodeString (
|
|
&EventName,
|
|
L"\\Security\\NetworkProviderLoad");
|
|
|
|
InitializeObjectAttributes (
|
|
&EventAttr,
|
|
&EventName,
|
|
OBJ_CASE_INSENSITIVE,
|
|
NULL, NULL);
|
|
|
|
Status = NtOpenEvent (
|
|
&Event,
|
|
EVENT_QUERY_STATE | EVENT_MODIFY_STATE | SYNCHRONIZE,
|
|
&EventAttr);
|
|
|
|
if (NT_SUCCESS(Status))
|
|
{
|
|
SetEvent (Event);
|
|
CloseHandle (Event);
|
|
}
|
|
else
|
|
{
|
|
ULONG Win32Error;
|
|
|
|
Win32Error = RtlNtStatusToDosError(Status);
|
|
SetLastError(Win32Error);
|
|
|
|
TraceHr (ttidError, FAL, HrFromLastWin32Error(), FALSE,
|
|
"SignalNetworkProviderLoaded");
|
|
}
|
|
}
|
|
|
|
BOOL
|
|
CDynamicBuffer::FGrowBuffer (
|
|
ULONG cbGrow)
|
|
{
|
|
PBYTE pbNew;
|
|
|
|
// If it hasn't been set, use a default of 4096.
|
|
if (!m_cbGranularity)
|
|
{
|
|
m_cbGranularity = 4096;
|
|
}
|
|
|
|
if (cbGrow % m_cbGranularity)
|
|
{
|
|
cbGrow = (cbGrow + m_cbGranularity) - (cbGrow % m_cbGranularity);
|
|
}
|
|
|
|
pbNew = (PBYTE)MemAlloc (m_cbAllocated + cbGrow);
|
|
|
|
if (pbNew)
|
|
{
|
|
#ifdef ENABLETRACE
|
|
if (m_pbBuffer)
|
|
{
|
|
TraceTag (ttidDefault, "Dynamic buffer grown. New size = %d.",
|
|
m_cbAllocated + cbGrow);
|
|
}
|
|
#endif
|
|
|
|
CopyMemory (pbNew, m_pbBuffer, m_cbConsumed);
|
|
MemFree (m_pbBuffer);
|
|
m_pbBuffer = pbNew;
|
|
m_cbAllocated += cbGrow;
|
|
}
|
|
|
|
return !!pbNew;
|
|
}
|
|
|
|
HRESULT
|
|
CDynamicBuffer::HrReserveBytes (
|
|
ULONG cbReserve)
|
|
{
|
|
if (cbReserve > m_cbAllocated)
|
|
{
|
|
return (FGrowBuffer(cbReserve)) ? S_OK : E_OUTOFMEMORY;
|
|
}
|
|
return S_OK;
|
|
}
|
|
|
|
HRESULT
|
|
CDynamicBuffer::HrCopyBytes (
|
|
const BYTE* pbSrc,
|
|
ULONG cbSrc)
|
|
{
|
|
Assert (pbSrc);
|
|
Assert (m_cbAllocated >= m_cbConsumed);
|
|
|
|
if (cbSrc > m_cbAllocated - m_cbConsumed)
|
|
{
|
|
if (!FGrowBuffer (cbSrc))
|
|
{
|
|
return E_OUTOFMEMORY;
|
|
}
|
|
}
|
|
|
|
CopyMemory (m_pbBuffer + m_cbConsumed, pbSrc, cbSrc);
|
|
m_cbConsumed += cbSrc;
|
|
|
|
return S_OK;
|
|
}
|
|
|
|
HRESULT
|
|
CDynamicBuffer::HrCopyString (
|
|
PCWSTR pszSrc)
|
|
{
|
|
ULONG cbSrc;
|
|
|
|
cbSrc = CbOfSzAndTermSafe(pszSrc);
|
|
|
|
return HrCopyBytes ((const BYTE*)pszSrc, cbSrc);
|
|
}
|
|
|
|
BOOL
|
|
FIsFilterDevice (HDEVINFO hdi, PSP_DEVINFO_DATA pdeid)
|
|
{
|
|
WCHAR szFilterInfId[_MAX_PATH];
|
|
BOOL fIsFilterDevice = FALSE;
|
|
HKEY hkeyInstance;
|
|
HRESULT hr;
|
|
|
|
// Open the device's driver key.
|
|
//
|
|
hr = HrSetupDiOpenDevRegKey (
|
|
hdi, pdeid,
|
|
DICS_FLAG_GLOBAL, 0, DIREG_DRV,
|
|
KEY_READ, &hkeyInstance);
|
|
|
|
if (S_OK == hr)
|
|
{
|
|
// Get the filterinfid value. If present, then
|
|
// this device is a filter device.
|
|
//
|
|
DWORD cbFilterInfId = sizeof(szFilterInfId);
|
|
|
|
hr = HrRegQuerySzBuffer (
|
|
hkeyInstance,
|
|
L"FilterInfId",
|
|
szFilterInfId,
|
|
&cbFilterInfId);
|
|
|
|
if (S_OK == hr)
|
|
{
|
|
fIsFilterDevice = TRUE;
|
|
}
|
|
|
|
RegCloseKey (hkeyInstance);
|
|
}
|
|
|
|
return fIsFilterDevice;
|
|
}
|
|
|
|
VOID
|
|
AddOrRemoveDontExposeLowerCharacteristicIfNeeded (
|
|
IN OUT CComponent* pComponent)
|
|
{
|
|
|
|
ASSERT (pComponent);
|
|
|
|
// Special case: NCF_DONTEXPOSELOWER
|
|
// SPX has erroneously set this characteristic. It's not really
|
|
// needed as nothing binds with SPX. Having it set means that
|
|
// two components above IPX have this characteristic set. (NWNB
|
|
// is the other. The code to generate bindpaths by recursing
|
|
// the stack table is only setup to handle at most one component
|
|
// with this characteristic per pass. Turning it off for SPX
|
|
// solves this in the simplest way.
|
|
//
|
|
// Furthermore, enforce that only IPX and NWNB have this
|
|
// characteristic set..
|
|
//
|
|
//
|
|
if ((0 == wcscmp(L"ms_nwnb", pComponent->m_pszInfId)) ||
|
|
(0 == wcscmp(L"ms_nwipx", pComponent->m_pszInfId)))
|
|
{
|
|
pComponent->m_dwCharacter |= NCF_DONTEXPOSELOWER;
|
|
}
|
|
else
|
|
{
|
|
pComponent->m_dwCharacter &= ~NCF_DONTEXPOSELOWER;
|
|
}
|
|
// End Special case
|
|
}
|