|
|
#include "pch.h"
#include <shsemip.h> // ILClone, ILIsEmpty, etc.
#include <sddl.h>
#include "security.h"
#include "idlhelp.h"
#include "shguidp.h"
#include "folder.h"
#include "strings.h"
#include <ccstock.h>
#ifdef DEBUG
#define SZ_DEBUGINI "ccshell.ini"
#define SZ_DEBUGSECTION "CSC UI"
#define SZ_MODULE "CSCUI.DLL"
// (These are deliberately CHAR)
EXTERN_C const CHAR c_szCcshellIniFile[] = SZ_DEBUGINI; EXTERN_C const CHAR c_szCcshellIniSecDebug[] = SZ_DEBUGSECTION;
EXTERN_C const WCHAR c_wszTrace[] = L"t " TEXTW(SZ_MODULE) L" "; EXTERN_C const WCHAR c_wszErrorDbg[] = L"err " TEXTW(SZ_MODULE) L" "; EXTERN_C const WCHAR c_wszWarningDbg[] = L"wn " TEXTW(SZ_MODULE) L" "; EXTERN_C const WCHAR c_wszAssertMsg[] = TEXTW(SZ_MODULE) L" Assert: "; EXTERN_C const WCHAR c_wszAssertFailed[] = TEXTW(SZ_MODULE) L" Assert %ls, line %d: (%ls)\r\n"; EXTERN_C const WCHAR c_wszRip[] = TEXTW(SZ_MODULE) L" RIP in %s at %s, line %d: (%s)\r\n"; EXTERN_C const WCHAR c_wszRipNoFn[] = TEXTW(SZ_MODULE) L" RIP at %s, line %d: (%s)\r\n";
// (These are deliberately CHAR)
EXTERN_C const CHAR c_szTrace[] = "t " SZ_MODULE " "; EXTERN_C const CHAR c_szErrorDbg[] = "err " SZ_MODULE " "; EXTERN_C const CHAR c_szWarningDbg[] = "wn " SZ_MODULE " "; EXTERN_C const CHAR c_szAssertMsg[] = SZ_MODULE " Assert: "; EXTERN_C const CHAR c_szAssertFailed[] = SZ_MODULE " Assert %s, line %d: (%s)\r\n"; EXTERN_C const CHAR c_szRip[] = SZ_MODULE " RIP in %s at %s, line %d: (%s)\r\n"; EXTERN_C const CHAR c_szRipNoFn[] = SZ_MODULE " RIP at %s, line %d: (%s)\r\n"; EXTERN_C const CHAR c_szRipMsg[] = SZ_MODULE " RIP: "; #endif
//
// Purpose: Return UNC version of a path
//
// Parameters: pszInName - initial path
// ppszOutName - UNC path returned here
//
//
// Return: HRESULT
// S_OK - UNC path returned
// S_FALSE - drive not connected (UNC not returned)
// or failure code
//
// Notes: The function fails is the path is not a valid
// network path. If the path is already UNC,
// a copy is made without validating the path.
// *ppszOutName must be LocalFree'd by the caller.
//
HRESULT GetRemotePath(LPCTSTR pszInName, LPTSTR *ppszOutName) { HRESULT hr = HRESULT_FROM_WIN32(ERROR_BAD_PATHNAME);
*ppszOutName = NULL;
// Don't bother calling GetFullPathName first, since we always
// deal with full (complete) paths.
if (pszInName[1] == TEXT(':')) { TCHAR szLocalName[3];
szLocalName[0] = pszInName[0]; szLocalName[1] = pszInName[1]; szLocalName[2] = 0;
// Call GetDriveType before WNetGetConnection, to avoid loading
// MPR.DLL until absolutely necessary.
if (DRIVE_REMOTE == GetDriveType(szLocalName)) { TCHAR szRemoteName[MAX_PATH]; DWORD dwLen = ARRAYSIZE(szRemoteName); DWORD dwErr = WNetGetConnection(szLocalName, szRemoteName, &dwLen); if (NO_ERROR == dwErr) { dwLen = lstrlen(szRemoteName); // Skip the drive letter and add the length of the rest of the path
// (including NULL)
pszInName += 2; dwLen += lstrlen(pszInName) + 1;
// We should never get incomplete paths, so we should always
// see a backslash after the "X:". If this isn't true, then
// we should call GetFullPathName above.
TraceAssert(TEXT('\\') == *pszInName);
// Allocate the return buffer
*ppszOutName = (LPTSTR)LocalAlloc(LPTR, dwLen * sizeof(TCHAR)); if (*ppszOutName) { lstrcpy(*ppszOutName, szRemoteName); // root part
lstrcat(*ppszOutName, pszInName); // rest of path
hr = S_OK; } else { hr = E_OUTOFMEMORY; } } else if (ERROR_NOT_CONNECTED == dwErr) { hr = S_FALSE; } else { hr = HRESULT_FROM_WIN32(dwErr); } } else { hr = S_FALSE; } } else if (PathIsUNC(pszInName)) { // Just copy the path without validating it
hr = LocalAllocString(ppszOutName, pszInName) ? S_OK : E_OUTOFMEMORY; }
if (S_OK == hr) PathRemoveBackslash(*ppszOutName);
return hr; }
//
// Purpose: TCHAR version of itoa
//
// Parameters: UINT i - unsigned integer to convert
// LPTSTR psz - location to store string result
// UINT cchMax - size of buffer pointed to by psz
//
LPTSTR ULongToString(ULONG i, LPTSTR psz, ULONG cchMax) { wnsprintf(psz, cchMax, TEXT("%d%"), i); return psz; }
//
// Purpose: Free a string allocated with LocalAlloc[String]
//
// Parameters: LPTSTR *ppsz - location of pointer to string
//
void LocalFreeString(LPTSTR *ppsz) { if (ppsz && *ppsz) { LocalFree(*ppsz); *ppsz = NULL; } }
//
// Purpose: Copy a string into a newly allocated buffer
//
// Parameters: LPTSTR *ppszDest - location to store string copy
// LPCTSTR pszSrc - string to copy
//
// Return: BOOL - FALSE if LocalAlloc fails or invalid parameters
//
BOOL LocalAllocString(LPTSTR *ppszDest, LPCTSTR pszSrc) { if (!ppszDest) return FALSE;
*ppszDest = StrDup(pszSrc); return *ppszDest ? TRUE : FALSE; }
//
// Purpose: Find the length (in chars) of a string resource
//
// Parameters: HINSTANCE hInstance - module containing the string
// UINT idStr - ID of string
//
//
// Return: UINT - # of chars in string, not including NULL
//
// Notes: Based on code from user32.
//
UINT SizeofStringResource(HINSTANCE hInstance, UINT idStr) { UINT cch = 0; HRSRC hRes = FindResource(hInstance, (LPTSTR)((LONG_PTR)(((USHORT)idStr >> 4) + 1)), RT_STRING); if (NULL != hRes) { HGLOBAL hStringSeg = LoadResource(hInstance, hRes); if (NULL != hStringSeg) { LPWSTR psz = (LPWSTR)LockResource(hStringSeg); if (NULL != psz) { idStr &= 0x0F; while(true) { cch = *psz++; if (idStr-- == 0) break; psz += cch; } } } } return cch; }
//
// Purpose: Loads a string resource into an alloc'd buffer
//
// Parameters: ppszResult - string resource returned here
// hInstance - module to load string from
// idStr - string resource ID
//
// Return: same as LoadString
//
// Notes: On successful return, the caller must
// LocalFree *ppszResult
//
int LoadStringAlloc(LPTSTR *ppszResult, HINSTANCE hInstance, UINT idStr) { int nResult = 0; UINT cch = SizeofStringResource(hInstance, idStr); if (cch) { cch++; // for NULL
*ppszResult = (LPTSTR)LocalAlloc(LPTR, cch * sizeof(TCHAR)); if (*ppszResult) nResult = LoadString(hInstance, idStr, *ppszResult, cch); } return nResult; }
//
// Purpose: Wrapper for SHChangeNotify
//
// Parameters: pszPath - path of file that changed
// bFlush - TRUE forces a flush of the shell's
// notify queue.
//
// Return: none
//
// Notes: SHCNF_PATH doesn't work outside of the shell,
// so we create a pidl and use SHCNF_IDLIST.
//
// Force a flush every 8 calls so the shell
// doesn't start ignoring notifications.
//
void ShellChangeNotify( LPCTSTR pszPath, WIN32_FIND_DATA *pfd, BOOL bFlush, LONG nEvent ) { LPITEMIDLIST pidlFile = NULL; LPCVOID pvItem = NULL; UINT uFlags = 0;
static int cNoFlush = 0;
if (pszPath) { if ((pfd && SUCCEEDED(SHSimpleIDListFromFindData(pszPath, pfd, &pidlFile))) || (pidlFile = ILCreateFromPath(pszPath))) { uFlags = SHCNF_IDLIST; pvItem = pidlFile; } else { // ILCreateFromPath sometimes fails when we're in disconnected
// mode, so try the path instead.
uFlags = SHCNF_PATH; pvItem = pszPath; } if (0 == nEvent) nEvent = SHCNE_UPDATEITEM; } else nEvent = 0;
if (8 < cNoFlush++) bFlush = TRUE;
if (bFlush) { uFlags |= (SHCNF_FLUSH | SHCNF_FLUSHNOWAIT); cNoFlush = 0; } SHChangeNotify(nEvent, uFlags, pvItem, NULL);
if (pidlFile) SHFree(pidlFile); }
//
// Purpose: Get the path to the target file of a link
//
// Parameters: pszShortcut - name of link file
// ppszTarget - target path returned here
//
//
// Return: HRESULT
// S_OK - target file returned
// S_FALSE - target not returned
// or failure code
//
// Notes: COM must be initialized before calling.
// The function fails is the target is a folder.
// *ppszTarget must be LocalFree'd by the caller.
//
HRESULT GetLinkTarget(LPCTSTR pszShortcut, LPTSTR *ppszTarget, DWORD *pdwAttr) { *ppszTarget = NULL;
if (pdwAttr) *pdwAttr = 0;
IShellLink *psl; HRESULT hr = LoadFromFile(CLSID_ShellLink, pszShortcut, IID_PPV_ARG(IShellLink, &psl)); if (SUCCEEDED(hr)) { // Get the pidl of the target
LPITEMIDLIST pidlTarget; hr = psl->GetIDList(&pidlTarget); if (SUCCEEDED(hr)) { hr = S_FALSE; // means no target returned
TCHAR szTarget[MAX_PATH]; DWORD dwAttr = SFGAO_FOLDER; if (SUCCEEDED(SHGetNameAndFlags(pidlTarget, SHGDN_FORPARSING, szTarget, ARRAYSIZE(szTarget), &dwAttr))) { if (!(dwAttr & SFGAO_FOLDER)) { if (pdwAttr) { *pdwAttr = GetFileAttributes(szTarget); } hr = GetRemotePath(szTarget, ppszTarget); } } SHFree(pidlTarget); } psl->Release(); }
TraceLeaveResult(hr); }
//*************************************************************
//
// _CSCEnumDatabase
//
// Purpose: Enumerate CSC database recursively
//
// Parameters: pszFolder - name of folder to begin enumeration
// (can be NULL to enum shares)
// bRecurse - TRUE to recurse into child folders
// pfnCB - callback function called once for each child
// lpContext - extra data passed to callback function
//
// Return: One of CSCPROC_RETURN_*
//
// Notes: Return CSCPROC_RETURN_SKIP from the callback to prevent
// recursion into a child folder. CSCPROC_RETURN_ABORT
// will terminate the entire operation (unwind all recursive
// calls). CSCPROC_RETURN_CONTINUE will continue normally.
// Other CSCPROC_RETURN_* values are treated as ABORT.
//
//*************************************************************
#define PATH_BUFFER_SIZE 1024
typedef struct { LPTSTR szPath; int cchPathBuffer; BOOL bRecurse; PFN_CSCENUMPROC pfnCB; LPARAM lpContext; } CSC_ENUM_CONTEXT, *PCSC_ENUM_CONTEXT;
DWORD _CSCEnumDatabaseInternal(PCSC_ENUM_CONTEXT pContext) { DWORD dwResult = CSCPROC_RETURN_CONTINUE; HANDLE hFind; DWORD dwStatus = 0; DWORD dwPinCount = 0; DWORD dwHintFlags = 0; LPTSTR pszPath; int cchBuffer; LPTSTR pszFind = NULL; int cchDir = 0; WIN32_FIND_DATA fd;
TraceEnter(TRACE_UTIL, "_CSCEnumDatabaseInternal"); TraceAssert(pContext); TraceAssert(pContext->pfnCB); TraceAssert(pContext->szPath); TraceAssert(pContext->cchPathBuffer);
pszPath = pContext->szPath; cchBuffer = pContext->cchPathBuffer;
if (*pszPath) { PathAddBackslash(pszPath); cchDir = lstrlen(pszPath); TraceAssert(TEXT('\\') == pszPath[cchDir-1]); pszFind = pszPath; }
// skips "." and ".."
hFind = CacheFindFirst(pszFind, &fd, &dwStatus, &dwPinCount, &dwHintFlags, NULL); if (hFind != INVALID_HANDLE_VALUE) { do { int cchFile; ENUM_REASON eReason = ENUM_REASON_FILE;
cchFile = lstrlen(fd.cFileName); if (cchFile >= cchBuffer - cchDir) { // Realloc the path buffer
TraceMsg("Reallocating path buffer"); cchBuffer += max(PATH_BUFFER_SIZE, cchFile + 1); pszPath = (LPTSTR)LocalReAlloc(pContext->szPath, cchBuffer * sizeof(TCHAR), LMEM_MOVEABLE); if (pszPath) { pContext->szPath = pszPath; pContext->cchPathBuffer = cchBuffer; } else { pszPath = pContext->szPath; cchBuffer = pContext->cchPathBuffer; TraceMsg("Unable to reallocate path buffer"); Trace((pszPath)); Trace((fd.cFileName)); continue; } }
// Build full path
lstrcpyn(&pszPath[cchDir], fd.cFileName, cchBuffer - cchDir); cchFile = lstrlen(pszPath);
if ((fd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY) || !pszFind) eReason = ENUM_REASON_FOLDER_BEGIN;
// Call the callback
dwResult = (*pContext->pfnCB)(pszPath, eReason, dwStatus, dwHintFlags, dwPinCount, &fd, pContext->lpContext);
// Recurse into folders
if (CSCPROC_RETURN_CONTINUE == dwResult && pContext->bRecurse && ENUM_REASON_FOLDER_BEGIN == eReason) { dwResult = _CSCEnumDatabaseInternal(pContext);
// Call the callback again
pszPath[cchFile] = 0; dwResult = (*pContext->pfnCB)(pszPath, ENUM_REASON_FOLDER_END, 0, // dwStatus, // these have probably changed
0, // dwHintFlags,
0, // dwPinCount,
&fd, pContext->lpContext); }
if (CSCPROC_RETURN_SKIP == dwResult) dwResult = CSCPROC_RETURN_CONTINUE;
if (CSCPROC_RETURN_CONTINUE != dwResult) break;
} while (CacheFindNext(hFind, &fd, &dwStatus, &dwPinCount, &dwHintFlags, NULL)); CSCFindClose(hFind); }
TraceLeaveValue(dwResult); }
DWORD _CSCEnumDatabase(LPCTSTR pszFolder, BOOL bRecurse, PFN_CSCENUMPROC pfnCB, LPARAM lpContext) { DWORD dwResult = CSCPROC_RETURN_CONTINUE; CSC_ENUM_CONTEXT ec;
TraceEnter(TRACE_UTIL, "_CSCEnumDatabase"); TraceAssert(pfnCB);
if (!pfnCB) TraceLeaveValue(CSCPROC_RETURN_ABORT);
// Allocate the single buffer used for the entire enumeration.
// It will be reallocated later if necessary.
ec.cchPathBuffer = PATH_BUFFER_SIZE; if (pszFolder) ec.cchPathBuffer *= ((lstrlen(pszFolder)/PATH_BUFFER_SIZE) + 1); ec.szPath = (LPTSTR)LocalAlloc(LMEM_FIXED, ec.cchPathBuffer*sizeof(TCHAR)); if (!ec.szPath) TraceLeaveValue(CSCPROC_RETURN_ABORT);
ec.szPath[0] = 0;
// Assume pszFolder is valid a directory path or NULL
if (pszFolder) lstrcpyn(ec.szPath, pszFolder, ec.cchPathBuffer);
ec.bRecurse = bRecurse; ec.pfnCB = pfnCB; ec.lpContext = lpContext;
dwResult = _CSCEnumDatabaseInternal(&ec);
LocalFree(ec.szPath);
TraceLeaveValue(dwResult); }
//*************************************************************
//
// _Win32EnumFolder
//
// Purpose: Enumerate a directory recursively
//
// Parameters: pszFolder - name of folder to begin enumeration
// bRecurse - TRUE to recurse into child folders
// pfnCB - callback function called once for each child
// lpContext - extra data passed to callback function
//
// Return: One of CSCPROC_RETURN_*
//
// Notes: Same as _CSCEnumDatabase except using FindFirstFile
// instead of CSCFindFirstFile.
//
//*************************************************************
typedef struct { LPTSTR szPath; int cchPathBuffer; BOOL bRecurse; PFN_WIN32ENUMPROC pfnCB; LPARAM lpContext; } W32_ENUM_CONTEXT, *PW32_ENUM_CONTEXT;
DWORD _Win32EnumFolderInternal(PW32_ENUM_CONTEXT pContext) { DWORD dwResult = CSCPROC_RETURN_CONTINUE; HANDLE hFind; LPTSTR pszPath; int cchBuffer; int cchDir = 0; WIN32_FIND_DATA fd;
TraceEnter(TRACE_UTIL, "_Win32EnumFolderInternal"); TraceAssert(pContext); TraceAssert(pContext->pfnCB); TraceAssert(pContext->szPath && pContext->szPath[0]); TraceAssert(pContext->cchPathBuffer);
pszPath = pContext->szPath; cchBuffer = pContext->cchPathBuffer;
// Build wildcard path
PathAddBackslash(pszPath); cchDir = lstrlen(pszPath); TraceAssert(TEXT('\\') == pszPath[cchDir-1]); pszPath[cchDir] = TEXT('*'); pszPath[cchDir+1] = 0;
hFind = FindFirstFile(pszPath, &fd); if (hFind != INVALID_HANDLE_VALUE) { do { int cchFile; ENUM_REASON eReason = ENUM_REASON_FILE;
// skip "." and ".."
if (PathIsDotOrDotDot(fd.cFileName)) continue;
cchFile = lstrlen(fd.cFileName); if (cchFile >= cchBuffer - cchDir) { // Realloc the path buffer
TraceMsg("Reallocating path buffer"); cchBuffer += max(PATH_BUFFER_SIZE, cchFile + 1); pszPath = (LPTSTR)LocalReAlloc(pContext->szPath, cchBuffer * sizeof(TCHAR), LMEM_MOVEABLE); if (pszPath) { pContext->szPath = pszPath; pContext->cchPathBuffer = cchBuffer; } else { pszPath = pContext->szPath; cchBuffer = pContext->cchPathBuffer; TraceMsg("Unable to reallocate path buffer"); Trace((pszPath)); Trace((fd.cFileName)); continue; } }
// Build full path
lstrcpyn(&pszPath[cchDir], fd.cFileName, cchBuffer - cchDir); cchFile = lstrlen(pszPath);
if (fd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY) eReason = ENUM_REASON_FOLDER_BEGIN;
// Call the callback
dwResult = (*pContext->pfnCB)(pszPath, eReason, &fd, pContext->lpContext);
// Recurse into folders
if (CSCPROC_RETURN_CONTINUE == dwResult && pContext->bRecurse && ENUM_REASON_FOLDER_BEGIN == eReason) { dwResult = _Win32EnumFolderInternal(pContext);
// Call the callback again
pszPath[cchFile] = 0; dwResult = (*pContext->pfnCB)(pszPath, ENUM_REASON_FOLDER_END, &fd, pContext->lpContext); }
if (CSCPROC_RETURN_SKIP == dwResult) dwResult = CSCPROC_RETURN_CONTINUE;
if (CSCPROC_RETURN_CONTINUE != dwResult) break;
} while (FindNextFile(hFind, &fd));
FindClose(hFind); }
TraceLeaveValue(dwResult); }
DWORD _Win32EnumFolder(LPCTSTR pszFolder, BOOL bRecurse, PFN_WIN32ENUMPROC pfnCB, LPARAM lpContext) { DWORD dwResult = CSCPROC_RETURN_CONTINUE; W32_ENUM_CONTEXT ec;
TraceEnter(TRACE_UTIL, "_Win32EnumFolder"); TraceAssert(pszFolder); TraceAssert(pfnCB);
if (!pszFolder || !*pszFolder || !pfnCB) TraceLeaveValue(CSCPROC_RETURN_ABORT);
// Allocate the single buffer used for the entire enumeration.
// It will be reallocated later if necessary.
ec.cchPathBuffer = ((lstrlen(pszFolder)/PATH_BUFFER_SIZE) + 1) * PATH_BUFFER_SIZE; ec.szPath = (LPTSTR)LocalAlloc(LMEM_FIXED, ec.cchPathBuffer*sizeof(TCHAR)); if (!ec.szPath) TraceLeaveValue(CSCPROC_RETURN_ABORT);
ec.szPath[0] = 0;
// Assume pszFolder is valid a directory path
lstrcpyn(ec.szPath, pszFolder, ec.cchPathBuffer);
ec.bRecurse = bRecurse; ec.pfnCB = pfnCB; ec.lpContext = lpContext;
dwResult = _Win32EnumFolderInternal(&ec);
LocalFree(ec.szPath);
TraceLeaveValue(dwResult); }
CIDArray::~CIDArray() { DoRelease(m_psf); if (m_pIDA) { GlobalUnlock(m_Medium.hGlobal); m_pIDA = NULL; } ReleaseStgMedium(&m_Medium); }
HRESULT CIDArray::Initialize(IDataObject *pdobj) { TraceAssert(NULL == m_pIDA); FORMATETC fe = { g_cfShellIDList, NULL, DVASPECT_CONTENT, -1, TYMED_HGLOBAL }; HRESULT hr = pdobj->GetData(&fe, &m_Medium); if (SUCCEEDED(hr)) { m_pIDA = (LPIDA)GlobalLock(m_Medium.hGlobal); if (m_pIDA) { LPCITEMIDLIST pidlFolder = (LPCITEMIDLIST)ByteOffset(m_pIDA, m_pIDA->aoffset[0]); hr = SHBindToObjectEx(NULL, pidlFolder, NULL, IID_PPV_ARG(IShellFolder, &m_psf)); } else { hr = E_FAIL; } } return hr; }
HRESULT CIDArray::GetItemPath(UINT iItem, LPTSTR pszPath, UINT cchPath, DWORD *pdwAttribs) { HRESULT hr = E_INVALIDARG;
if (m_psf && m_pIDA && (iItem < m_pIDA->cidl)) { LPCITEMIDLIST pidlChild, pidl = (LPCITEMIDLIST)ByteOffset(m_pIDA, m_pIDA->aoffset[iItem + 1]); IShellFolder *psf; hr = SHBindToFolderIDListParent(m_psf, pidl, IID_PPV_ARG(IShellFolder, &psf), &pidlChild); if (SUCCEEDED(hr)) { if (pszPath) { hr = DisplayNameOf(psf, pidlChild, SHGDN_FORPARSING, pszPath, cchPath); if (SUCCEEDED(hr)) { LPTSTR pszRemote; if (S_OK == GetRemotePath(pszPath, &pszRemote)) { lstrcpyn(pszPath, pszRemote, cchPath); LocalFree(pszRemote); } } }
if (SUCCEEDED(hr) && pdwAttribs) hr = psf->GetAttributesOf(1, &pidlChild, pdwAttribs);
psf->Release(); } } return hr; }
HRESULT CIDArray::GetFolderPath(LPTSTR pszPath, UINT cchPath) { HRESULT hr = GetItemPath(0, pszPath, cchPath, NULL); if (SUCCEEDED(hr)) { PathRemoveFileSpec(pszPath); } return hr; }
//*************************************************************
//
// CCscFileHandle non-inline member functions.
//
//*************************************************************
CCscFindHandle& CCscFindHandle::operator = ( const CCscFindHandle& rhs ) { if (this != &rhs) { Attach(rhs.Detach()); } return *this; }
void CCscFindHandle::Close( void ) { if (m_bOwns && INVALID_HANDLE_VALUE != m_handle) { CSCFindClose(m_handle); } m_bOwns = false; m_handle = INVALID_HANDLE_VALUE; }
//*************************************************************
//
// String formatting functions
//
//*************************************************************
DWORD FormatStringID(LPTSTR *ppszResult, HINSTANCE hInstance, UINT idStr, ...) { DWORD dwResult; va_list args; va_start(args, idStr); dwResult = vFormatStringID(ppszResult, hInstance, idStr, &args); va_end(args); return dwResult; }
DWORD FormatString(LPTSTR *ppszResult, LPCTSTR pszFormat, ...) { DWORD dwResult; va_list args; va_start(args, pszFormat); dwResult = vFormatString(ppszResult, pszFormat, &args); va_end(args); return dwResult; }
DWORD vFormatStringID(LPTSTR *ppszResult, HINSTANCE hInstance, UINT idStr, va_list *pargs) { DWORD dwResult = 0; LPTSTR pszFormat = NULL; if (LoadStringAlloc(&pszFormat, hInstance, idStr)) { dwResult = vFormatString(ppszResult, pszFormat, pargs); LocalFree(pszFormat); } return dwResult; }
DWORD vFormatString(LPTSTR *ppszResult, LPCTSTR pszFormat, va_list *pargs) { return FormatMessage(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_STRING, pszFormat, 0, 0, (LPTSTR)ppszResult, 1, pargs); }
DWORD FormatSystemError(LPTSTR *ppszResult, DWORD dwSysError) { LPTSTR pszBuffer = NULL; DWORD dwResult = FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_ALLOCATE_BUFFER, NULL, dwSysError, 0, (LPTSTR)&pszBuffer, 1, NULL);
if (NULL != pszBuffer) { *ppszResult = pszBuffer; } return dwResult; }
//
// Center a window in it's parent.
// If hwndParent is NULL, the window's parent is used.
// If hwndParent is not NULL, hwnd is centered in it.
// If hwndParent is NULL and hwnd doesn't have a parent, it is centered
// on the desktop.
//
void CenterWindow( HWND hwnd, HWND hwndParent ) { RECT rcScreen;
if (NULL != hwnd) { rcScreen.left = rcScreen.top = 0; rcScreen.right = GetSystemMetrics(SM_CXSCREEN); rcScreen.bottom = GetSystemMetrics(SM_CYSCREEN);
if (NULL == hwndParent) { hwndParent = GetParent(hwnd); if (NULL == hwndParent) hwndParent = GetDesktopWindow(); }
RECT rcWnd; RECT rcParent;
GetWindowRect(hwnd, &rcWnd); GetWindowRect(hwndParent, &rcParent);
INT cxWnd = rcWnd.right - rcWnd.left; INT cyWnd = rcWnd.bottom - rcWnd.top; INT cxParent = rcParent.right - rcParent.left; INT cyParent = rcParent.bottom - rcParent.top; POINT ptParentCtr;
ptParentCtr.x = rcParent.left + (cxParent / 2); ptParentCtr.y = rcParent.top + (cyParent / 2);
if ((ptParentCtr.x + (cxWnd / 2)) > rcScreen.right) { //
// Window would run off the right edge of the screen.
//
rcWnd.left = rcScreen.right - cxWnd; } else if ((ptParentCtr.x - (cxWnd / 2)) < rcScreen.left) { //
// Window would run off the left edge of the screen.
//
rcWnd.left = rcScreen.left; } else { rcWnd.left = ptParentCtr.x - (cxWnd / 2); }
if ((ptParentCtr.y + (cyWnd / 2)) > rcScreen.bottom) { //
// Window would run off the bottom edge of the screen.
//
rcWnd.top = rcScreen.bottom - cyWnd; } else if ((ptParentCtr.y - (cyWnd / 2)) < rcScreen.top) { //
// Window would run off the top edge of the screen.
//
rcWnd.top = rcScreen.top; } else { rcWnd.top = ptParentCtr.y - (cyWnd / 2); }
MoveWindow(hwnd, rcWnd.left, rcWnd.top, cxWnd, cyWnd, TRUE); } }
//
// We have some extra stuff to pass to the stats callback so we wrap the
// CSCSHARESTATS in a larger structure.
//
typedef struct { CSCSHARESTATS ss; // The stats data.
DWORD dwUnityFlagsReq; // SSUF_XXXX flags set by user (requested).
DWORD dwUnityFlagsSum; // SSUF_XXXX flags set during enum (sum total).
DWORD dwExcludeFlags; // SSEF_XXXX flags.
bool bEnumAborted; // true if unity flags satisfied.
} CSCSHARESTATS_CBKINFO, *PCSCSHARESTATS_CBKINFO;
//
// Called by CSCEnumForStats for each CSC item enumerated.
//
DWORD _CscShareStatisticsCallback(LPCTSTR lpszName, DWORD dwStatus, DWORD dwHintFlags, DWORD dwPinCount, WIN32_FIND_DATA *lpFind32, DWORD dwReason, DWORD dwParam1, DWORD dwParam2, DWORD_PTR dwContext) { DWORD dwResult = CSCPROC_RETURN_CONTINUE;
if (CSCPROC_REASON_BEGIN != dwReason && // Not "start of data" notification.
CSCPROC_REASON_END != dwReason && // Not "end of data" notification.
1 != dwParam2) // Not "share root" entry.
{ PCSCSHARESTATS_CBKINFO pssci = (PCSCSHARESTATS_CBKINFO)(dwContext); PCSCSHARESTATS pss = &(pssci->ss); const DWORD dwExcludeFlags = pssci->dwExcludeFlags; const DWORD dwUnityFlagsReq = pssci->dwUnityFlagsReq; const bool bIsDir = (0 == dwParam1); const bool bAccessUser = CscAccessUser(dwStatus); const bool bAccessGuest = CscAccessGuest(dwStatus); const bool bAccessOther = CscAccessOther(dwStatus);
if (0 != dwExcludeFlags) { //
// Caller want's to exclude some items from the enumeration.
// If item is in "excluded" specification, return early.
//
if (0 != (dwExcludeFlags & (dwStatus & SSEF_CSCMASK))) { return dwResult; } if ((bIsDir && (dwExcludeFlags & SSEF_DIRECTORY)) || (!bIsDir && (dwExcludeFlags & SSEF_FILE))) { return dwResult; }
const struct { DWORD fExclude; bool bAccess; BYTE fMask;
} rgExclAccess[] = {{ SSEF_NOACCUSER, bAccessUser, 0x01 }, { SSEF_NOACCGUEST, bAccessGuest, 0x02 }, { SSEF_NOACCOTHER, bAccessOther, 0x04 }};
BYTE fExcludeMask = 0; BYTE fNoAccessMask = 0; for (int i = 0; i < ARRAYSIZE(rgExclAccess); i++) { if (dwExcludeFlags & rgExclAccess[i].fExclude) fExcludeMask |= rgExclAccess[i].fMask;
if (!rgExclAccess[i].bAccess) fNoAccessMask |= rgExclAccess[i].fMask; }
if (SSEF_NOACCAND & dwExcludeFlags) { //
// Treat all access exclusion flags as a single unit.
//
if (fExcludeMask == fNoAccessMask) return dwResult; } else { //
// Treat each access flag individually. Only one specified access
// condition must be true to exclude this file.
//
if (fExcludeMask & fNoAccessMask) return dwResult; } }
if (0 == (SSEF_DIRECTORY & dwExcludeFlags) || !bIsDir) { pss->cTotal++; pssci->dwUnityFlagsSum |= SSUF_TOTAL;
if (0 != (dwHintFlags & (FLAG_CSC_HINT_PIN_USER | FLAG_CSC_HINT_PIN_ADMIN))) { pss->cPinned++; pssci->dwUnityFlagsSum |= SSUF_PINNED; } if (0 != (dwStatus & FLAG_CSCUI_COPY_STATUS_ALL_DIRTY)) { //
// If the current user doesn't have sufficient access
// to merge offline changes, then someone else must have
// modified the file, so don't count it for this user.
//
if (bIsDir || CscCanUserMergeFile(dwStatus)) { pss->cModified++; pssci->dwUnityFlagsSum |= SSUF_MODIFIED; } }
const struct { DWORD flag; int *pCount; bool bAccess;
} rgUnity[] = {{ SSUF_ACCUSER, &pss->cAccessUser, bAccessUser }, { SSUF_ACCGUEST, &pss->cAccessGuest, bAccessGuest }, { SSUF_ACCOTHER, &pss->cAccessOther, bAccessOther }};
DWORD fUnityMask = 0; DWORD fAccessMask = 0; for (int i = 0; i < ARRAYSIZE(rgUnity); i++) { if (dwUnityFlagsReq & rgUnity[i].flag) fUnityMask |= rgUnity[i].flag;
if (rgUnity[i].bAccess) { (*rgUnity[i].pCount)++; fAccessMask |= rgUnity[i].flag; } } if (SSUF_ACCAND & dwUnityFlagsReq) { //
// Treat all access unity flags as a single unit.
// We only signal unity if all of the specified access
// unity conditions are true.
//
if (fUnityMask == fAccessMask) pssci->dwUnityFlagsSum |= fUnityMask; } else { //
// Treat all access exclusion flags individually.
//
if (fUnityMask & fAccessMask) { if (SSUF_ACCOR & dwUnityFlagsReq) pssci->dwUnityFlagsSum |= fUnityMask; else pssci->dwUnityFlagsSum |= fAccessMask; } }
if (bIsDir) { pss->cDirs++; pssci->dwUnityFlagsSum |= SSUF_DIRS; } // Note the 'else': don't count dirs in the sparse total
else if (0 != (dwStatus & FLAG_CSC_COPY_STATUS_SPARSE)) { pss->cSparse++; pssci->dwUnityFlagsSum |= SSUF_SPARSE; }
if (0 != dwUnityFlagsReq) { //
// Abort enumeration if all of the requested SSUF_XXXX unity flags
// have been set.
//
if (dwUnityFlagsReq == (dwUnityFlagsReq & pssci->dwUnityFlagsSum)) { dwResult = CSCPROC_RETURN_ABORT; pssci->bEnumAborted; } } } }
return dwResult; }
//
// Enumerate all items for a given share and tally up the
// relevant information like file count, pinned count etc.
// Information is returned through *pss.
//
BOOL _GetShareStatistics( LPCTSTR pszShare, PCSCGETSTATSINFO pi, PCSCSHARESTATS pss ) { typedef BOOL (WINAPI * PFNENUMFORSTATS)(LPCTSTR, LPCSCPROC, DWORD_PTR);
CSCSHARESTATS_CBKINFO ssci; BOOL bResult; DWORD dwShareStatus = 0; PFNENUMFORSTATS pfnEnumForStats = CSCEnumForStats;
ZeroMemory(&ssci, sizeof(ssci)); ssci.dwUnityFlagsReq = pi->dwUnityFlags; ssci.dwExcludeFlags = pi->dwExcludeFlags;
if (pi->bAccessInfo || (pi->dwUnityFlags & (SSUF_ACCUSER | SSUF_ACCGUEST | SSUF_ACCOTHER)) || (pi->dwExcludeFlags & (SSEF_NOACCUSER | SSEF_NOACCGUEST | SSEF_NOACCOTHER))) { //
// If the enumeration requires access information, use the "ex" version
// of the EnumForStats CSC api. Only use it if necessary because gathering
// the access information has a perf cost.
//
pfnEnumForStats = CSCEnumForStatsEx; }
pi->bEnumAborted = false;
bResult = (*pfnEnumForStats)(pszShare, _CscShareStatisticsCallback, (DWORD_PTR)&ssci); *pss = ssci.ss;
if (CSCQueryFileStatus(pszShare, &dwShareStatus, NULL, NULL)) { if (FLAG_CSC_SHARE_STATUS_FILES_OPEN & dwShareStatus) { pss->bOpenFiles = true; } if (FLAG_CSC_SHARE_STATUS_DISCONNECTED_OP & dwShareStatus) { pss->bOffline = true; } } pi->bEnumAborted = ssci.bEnumAborted;
return bResult; }
//
// Retrieve the statistics for the entire cache.
// This is a simple wrapper that calls _GetShareStatistics for each share
// in the cache then sums the results for the entire cache. It accepts
// the same unity and exclusion flags used by _GetShareStatistics.
//
BOOL _GetCacheStatistics( PCSCGETSTATSINFO pi, PCSCCACHESTATS pcs ) { BOOL bResult = TRUE; WIN32_FIND_DATA fd; CSCSHARESTATS ss;
ZeroMemory(pcs, sizeof(*pcs));
pi->bEnumAborted = false;
CCscFindHandle hFind(CacheFindFirst(NULL, &fd, NULL, NULL, NULL, NULL)); if (hFind.IsValid()) { do { pcs->cShares++; if (bResult = _GetShareStatistics(fd.cFileName, pi, &ss)) { pcs->cTotal += ss.cTotal; pcs->cPinned += ss.cPinned; pcs->cModified += ss.cModified; pcs->cSparse += ss.cSparse; pcs->cDirs += ss.cDirs; pcs->cAccessUser += ss.cAccessUser; pcs->cAccessGuest += ss.cAccessGuest; pcs->cAccessOther += ss.cAccessOther; pcs->cSharesOffline += int(ss.bOffline); pcs->cSharesWithOpenFiles += int(ss.bOpenFiles); } } while(bResult && !pi->bEnumAborted && CacheFindNext(hFind, &fd, NULL, NULL, NULL, NULL)); }
return bResult; }
//
// Sets the proper exclusion flags to report only on files accessible by the
// logged on user. Otherwise it's the same as calling _GetShareStatistics.
//
BOOL _GetShareStatisticsForUser( LPCTSTR pszShare, PCSCGETSTATSINFO pi, PCSCSHARESTATS pss ) { pi->dwExcludeFlags |= SSEF_NOACCUSER | SSEF_NOACCGUEST | SSEF_NOACCAND; return _GetShareStatistics(pszShare, pi, pss); }
//
// Sets the proper exclusion flags to report only on files accessible by the
// logged on user. Otherwise it's the same as calling _GetCacheStatistics.
//
BOOL _GetCacheStatisticsForUser( PCSCGETSTATSINFO pi, PCSCCACHESTATS pcs ) { pi->dwExcludeFlags |= SSEF_NOACCUSER | SSEF_NOACCGUEST | SSEF_NOACCAND; return _GetCacheStatistics(pi, pcs); }
//
// CSCUI version of reboot. Requires security goo.
// This code was pattered after that found in \shell\shell32\restart.c
// function CommonRestart().
//
DWORD CSCUIRebootSystem( void ) { TraceEnter(TRACE_UTIL, "CSCUIRebootSystem"); DWORD dwOldState, dwStatus, dwSecError; DWORD dwRebootError = ERROR_SUCCESS;
SetLastError(0); // Be really safe about last error value!
dwStatus = Security_SetPrivilegeAttrib(SE_SHUTDOWN_NAME, SE_PRIVILEGE_ENABLED, &dwOldState); dwSecError = GetLastError(); // ERROR_NOT_ALL_ASSIGNED sometimes
if (!ExitWindowsEx(EWX_REBOOT, 0)) { dwRebootError = GetLastError(); Trace((TEXT("Error %d rebooting system"), dwRebootError)); } if (NT_SUCCESS(dwStatus)) { if (ERROR_SUCCESS == dwSecError) { Security_SetPrivilegeAttrib(SE_SHUTDOWN_NAME, dwOldState, NULL); } else { Trace((TEXT("Error %d setting SE_SHUTDOWN_NAME privilege"), dwSecError)); } } else { Trace((TEXT("Error %d setting SE_SHUTDOWN_NAME privilege"), dwStatus)); } TraceLeaveResult(dwRebootError); }
//
// Retrieve location, size and file/directory count information for the
// CSC cache. If CSC is disabled, information is gathered about the
// system volume. That's where the CSC agent will put the cache when
// one is created.
//
void GetCscSpaceUsageInfo( CSCSPACEUSAGEINFO *psui ) { ULARGE_INTEGER ulTotalBytes = {0, 0}; ULARGE_INTEGER ulUsedBytes = {0, 0};
ZeroMemory(psui, sizeof(*psui)); CSCGetSpaceUsage(psui->szVolume, ARRAYSIZE(psui->szVolume), &ulTotalBytes.HighPart, &ulTotalBytes.LowPart, &ulUsedBytes.HighPart, &ulUsedBytes.LowPart, &psui->dwNumFilesInCache, &psui->dwNumDirsInCache);
if (0 == psui->szVolume[0]) { //
// CSCGetSpaceUsage didn't give us a volume name. Probably because
// CSC hasn't been enabled on the system. Default to the system
// drive because that's what CSC uses anyway.
//
GetSystemDirectory(psui->szVolume, ARRAYSIZE(psui->szVolume)); psui->dwNumFilesInCache = 0; psui->dwNumDirsInCache = 0; }
PathStripToRoot(psui->szVolume); DWORD spc = 0; // Sectors per cluster.
DWORD bps = 0; // Bytes per sector.
DWORD fc = 0; // Free clusters.
DWORD nc = 0; // Total clusters.
GetDiskFreeSpace(psui->szVolume, &spc, &bps, &fc, &nc);
psui->llBytesOnVolume = (LONGLONG)nc * (LONGLONG)spc * (LONGLONG)bps; psui->llBytesTotalInCache = ulTotalBytes.QuadPart; psui->llBytesUsedInCache = ulUsedBytes.QuadPart; }
//-----------------------------------------------------------------------------
// This is code taken from shell32's utils.cpp file.
// We need the function SHSimpleIDListFromFindData() but it's not exported
// from shell32. Therefore, until it is, we just lifted the code.
// [brianau - 9/28/98]
//-----------------------------------------------------------------------------
class CFileSysBindData: public IFileSystemBindData { public: CFileSysBindData(); // *** IUnknown methods ***
STDMETHODIMP QueryInterface(REFIID riid, void **ppvObj); STDMETHODIMP_(ULONG) AddRef(void); STDMETHODIMP_(ULONG) Release(void); // IFileSystemBindData
STDMETHODIMP SetFindData(const WIN32_FIND_DATAW *pfd); STDMETHODIMP GetFindData(WIN32_FIND_DATAW *pfd);
private: ~CFileSysBindData(); LONG _cRef; WIN32_FIND_DATAW _fd; };
CFileSysBindData::CFileSysBindData() : _cRef(1) { ZeroMemory(&_fd, sizeof(_fd)); }
CFileSysBindData::~CFileSysBindData() { }
HRESULT CFileSysBindData::QueryInterface(REFIID riid, void **ppv) { static const QITAB qit[] = { QITABENT(CFileSysBindData, IFileSystemBindData), // IID_IFileSystemBindData
{ 0 }, }; return QISearch(this, qit, riid, ppv); }
STDMETHODIMP_(ULONG) CFileSysBindData::AddRef(void) { return InterlockedIncrement(&_cRef); }
STDMETHODIMP_(ULONG) CFileSysBindData::Release() { if (InterlockedDecrement(&_cRef)) return _cRef;
delete this; return 0; }
HRESULT CFileSysBindData::SetFindData(const WIN32_FIND_DATAW *pfd) { _fd = *pfd; return S_OK; }
HRESULT CFileSysBindData::GetFindData(WIN32_FIND_DATAW *pfd) { *pfd = _fd; return S_OK; }
HRESULT SHCreateFileSysBindCtx( const WIN32_FIND_DATA *pfd, IBindCtx **ppbc ) { HRESULT hres; IFileSystemBindData *pfsbd = new CFileSysBindData(); if (pfsbd) { if (pfd) { WIN32_FIND_DATAW fdw; memcpy(&fdw, pfd, FIELD_OFFSET(WIN32_FIND_DATAW, cFileName)); SHTCharToUnicode(pfd->cFileName, fdw.cFileName, ARRAYSIZE(fdw.cFileName)); SHTCharToUnicode(pfd->cAlternateFileName, fdw.cAlternateFileName, ARRAYSIZE(fdw.cAlternateFileName)); pfsbd->SetFindData(&fdw); }
hres = CreateBindCtx(0, ppbc); if (SUCCEEDED(hres)) { BIND_OPTS bo = {sizeof(bo)}; // Requires size filled in.
bo.grfMode = STGM_CREATE; (*ppbc)->SetBindOptions(&bo); (*ppbc)->RegisterObjectParam(STR_FILE_SYS_BIND_DATA, pfsbd); } pfsbd->Release(); } else { *ppbc = NULL; hres = E_OUTOFMEMORY; } return hres; }
HRESULT SHSimpleIDListFromFindData( LPCTSTR pszPath, const WIN32_FIND_DATA *pfd, LPITEMIDLIST *ppidl ) { IShellFolder *psfDesktop; HRESULT hres = SHGetDesktopFolder(&psfDesktop); if (SUCCEEDED(hres)) { IBindCtx *pbc; hres = SHCreateFileSysBindCtx(pfd, &pbc); if (SUCCEEDED(hres)) { WCHAR wszPath[MAX_PATH];
SHTCharToUnicode(pszPath, wszPath, ARRAYSIZE(wszPath));
hres = psfDesktop->ParseDisplayName(NULL, pbc, wszPath, NULL, ppidl, NULL); pbc->Release(); } psfDesktop->Release(); }
if (FAILED(hres)) *ppidl = NULL; return hres; }
//
// Number of times a CSC API will be repeated if it fails.
// In particular, this is used for CSCDelete and CSCFillSparseFiles; both of
// which can fail on one call but succeed the next. This isn't designed
// behavior but it is reality. ShishirP knows about it and may be able to
// investigate later. [brianau - 4/2/98]
//
const int CSC_API_RETRIES = 3;
//
// Occasionally if a call to a CSC API fails with ERROR_ACCESS_DENIED,
// repeating the call will succeed.
// Here we wrap up the call to CSCDelete so that it is called multiple
// times in the case of these failures.
//
DWORD CscDelete( LPCTSTR pszPath ) { DWORD dwError = ERROR_SUCCESS; int nRetries = CSC_API_RETRIES; while(0 < nRetries--) { if (CSCDelete(pszPath)) return ERROR_SUCCESS;
dwError = GetLastError(); if (ERROR_ACCESS_DENIED != dwError) return dwError; } if (ERROR_SUCCESS == dwError) { //
// Hack for some CSC APIs returning
// ERROR_SUCCESS even though they fail.
//
dwError = ERROR_GEN_FAILURE; } return dwError; }
void EnableDlgItems( HWND hwndDlg, const UINT* pCtlIds, int cCtls, bool bEnable ) { for (int i = 0; i < cCtls; i++) { EnableWindow(GetDlgItem(hwndDlg, *(pCtlIds + i)), bEnable); } }
void ShowDlgItems( HWND hwndDlg, const UINT* pCtlIds, int cCtls, bool bShow ) { const int nCmdShow = bShow ? SW_NORMAL : SW_HIDE;
for (int i = 0; i < cCtls; i++) { ShowWindow(GetDlgItem(hwndDlg, *(pCtlIds + i)), nCmdShow); } }
//
// Wrapper around GetVolumeInformation that accounts for mounted
// volumes. This was borrowed from shell32\mulprsht.c
//
BOOL GetVolumeFlags(LPCTSTR pszPath, DWORD *pdwFlags) { TraceAssert(NULL != pszPath); TraceAssert(NULL != pdwFlags);
TCHAR szRoot[MAX_PATH];
*pdwFlags = NULL;
//
// Is this a mount point, e.g. c:\ or c:\hostfolder\ //
if (!GetVolumePathName(pszPath, szRoot, ARRAYSIZE(szRoot))) { //
// No. Use path provided by caller.
//
lstrcpy(szRoot, pszPath); PathStripToRoot(szRoot); } //
// GetVolumeInformation requires a trailing backslash.
//
PathAddBackslash(szRoot); return GetVolumeInformation(szRoot, NULL, 0, NULL, NULL, pdwFlags, NULL, 0); }
//
// Determine if the parent net share for a given UNC path has an open
// connection on the local machine.
//
// Returns:
//
// S_OK = There is an open connection to the share.
// S_FALSE = No open connection to the share.
// other = Some error code.
//
HRESULT IsOpenConnectionPathUNC( LPCTSTR pszPathUNC ) { TCHAR szShare[MAX_PATH * 2]; lstrcpyn(szShare, pszPathUNC, ARRAYSIZE(szShare)); PathStripToRoot(szShare); if (PathIsUNCServerShare(szShare)) return IsOpenConnectionShare(szShare); return S_FALSE; }
//
// Determine if a net share has an open connection on the local machine.
//
// Returns:
//
// S_OK = There is an open connection to the share.
// S_FALSE = No open connection to the share.
// other = Some error code.
//
HRESULT IsOpenConnectionShare( LPCTSTR pszShare ) { DWORD dwStatus; if (CSCQueryFileStatus(pszShare, &dwStatus, NULL, NULL)) { if (FLAG_CSC_SHARE_STATUS_CONNECTED & dwStatus) return S_OK; } return S_FALSE; }
// With this version of CSCIsCSCEnabled, we can delay all extra dll loads
// (including cscdll.dll) until we actually see a net file/folder.
#include <devioctl.h>
#include <shdcom.h>
static TCHAR const c_szShadowDevice[] = TEXT("\\\\.\\shadow");
BOOL IsCSCEnabled(void) { BOOL bIsCSCEnabled = FALSE; if (!IsOS(OS_PERSONAL)) { SHADOWINFO sSI = {0}; ULONG ulBytesReturned;
HANDLE hShadowDB = CreateFile(c_szShadowDevice, FILE_EXECUTE, FILE_SHARE_READ | FILE_SHARE_WRITE, NULL, OPEN_EXISTING, 0, NULL); if (INVALID_HANDLE_VALUE == hShadowDB) return FALSE;
sSI.uStatus = SHADOW_SWITCH_SHADOWING; sSI.uOp = SHADOW_SWITCH_GET_STATE;
if (DeviceIoControl(hShadowDB, IOCTL_SWITCHES, (void *)(&sSI), 0, NULL, 0, &ulBytesReturned, NULL)) { bIsCSCEnabled = (sSI.uStatus & SHADOW_SWITCH_SHADOWING); } CloseHandle(hShadowDB); } return bIsCSCEnabled; }
//
// The bit-masking used by this function is dependent upon the way
// Shishir defined the database status flags in cscapi.h
//
// FLAG_DATABASESTATUS_ENCRYPTION_MASK 0x00000006 (0000 0110)
// FLAG_DATABASESTATUS_UNENCRYPTED 0x00000000 (0000 0000)
// FLAG_DATABASESTATUS_PARTIALLY_UNENCRYPTED 0x00000004 (0000 0100)
// FLAG_DATABASESTATUS_ENCRYPTED 0x00000002 (0000 0010)
// FLAG_DATABASESTATUS_PARTIALLY_ENCRYPTED 0x00000006 (0000 0110)
//
// Things to note:
// 1. Bit 1 == encryption status.
// 2. Bit 2 == partial completion status.
//
//
// Returns:
// TRUE == Database is encrypted. May be fully or partially encrypted.
// FALSE == Database is not encrypted. May be fully or partially not encrypted.
//
// *pbPartial == Indicates if state is "partial" or not.
//
// Partial encryption means an encryption operation was started
// but not successfully completed. All new files created will be encrypted.
// Partial decryption means a decryption operation was started
// but not successfully completed. All new files created will be unencrypted.
//
BOOL IsCacheEncrypted(BOOL *pbPartial) { ULONG ulStatus; ULONG ulErrors; BOOL bEncrypted = FALSE; if (CSCQueryDatabaseStatus(&ulStatus, &ulErrors)) { ulStatus &= FLAG_DATABASESTATUS_ENCRYPTION_MASK;
bEncrypted = (0 != (FLAG_DATABASESTATUS_ENCRYPTED & ulStatus)); if (NULL != pbPartial) { const ULONG FLAGS_PARTIAL = (FLAG_DATABASESTATUS_PARTIALLY_ENCRYPTED & FLAG_DATABASESTATUS_PARTIALLY_UNENCRYPTED); *pbPartial = (0 != (FLAGS_PARTIAL & ulStatus)); } } return bEncrypted; }
bool CscVolumeSupportsEncryption( LPCTSTR pszPathIn // Path of CSC volume. Can be NULL.
) { TCHAR szPath[MAX_PATH]; // May need local copy to modify.
CSCSPACEUSAGEINFO sui; LPTSTR psz; DWORD dwVolFlags; bool bSupportsEncryption = false;
if (NULL == pszPathIn) { //
// Caller didn't provide path of CSC volume.
// Get it from CSC.
//
sui.szVolume[0] = 0; psz = sui.szVolume; GetCscSpaceUsageInfo(&sui); } else { //
// Caller provided path of CSC volume.
//
lstrcpyn(szPath, pszPathIn, ARRAYSIZE(szPath)); psz = szPath; }
TraceAssert(NULL != psz);
if (GetVolumeFlags(psz, &dwVolFlags)) { if (0 != (FILE_SUPPORTS_ENCRYPTION & dwVolFlags)) { bSupportsEncryption = true; } } return bSupportsEncryption; }
//
// Returns:
//
// NULL == Mutex is owned by another thread.
// non-NULL == Handle of mutex object. This thread now owns the mutex.
// Caller is responsible for releasing the mutex and closing
// the mutex handle.
//
// *pbAbandoned indicates if mutex was abandoned by its thread.
//
//
HANDLE RequestNamedMutexOwnership( LPCTSTR pszMutexName, BOOL *pbAbandoned // [optional]
) { BOOL bAbandoned = FALSE; HANDLE hMutex = CreateMutex(NULL, FALSE, pszMutexName); if (NULL != hMutex) { //
// Whether we created or opened the mutex, wait on it
// to gain ownership.
//
switch(WaitForSingleObject(hMutex, 0)) { case WAIT_ABANDONED: bAbandoned = TRUE; //
// Fall through...
//
case WAIT_OBJECT_0: //
// Current thread now owns the mutex.
// We'll return the handle to the caller.
//
break;
case WAIT_TIMEOUT: default: //
// Couldn't gain ownership of the mutex.
// Close the handle.
//
CloseHandle(hMutex); hMutex = NULL; break; } } if (NULL != pbAbandoned) { *pbAbandoned = bAbandoned; } return hMutex; }
//
// Determine if a named mutex is currently owned by another thread
// or not. This function only determines ownership then immediately
// releases the mutex. If you need to determine ownership and want
// to retain ownership if previously unowned call
// RequestNamedMutexOwnership instead.
//
BOOL IsNamedMutexOwned( LPCTSTR pszMutexName, BOOL *pbAbandoned ) { HANDLE hMutex = RequestNamedMutexOwnership(pszMutexName, pbAbandoned); if (NULL != hMutex) { //
// Mutex was not owned (now owned by current thread).
// Since we're only interested in determining prior ownership
// we release it and close the handle.
//
ReleaseMutex(hMutex); CloseHandle(hMutex); return FALSE; } return TRUE; }
BOOL IsSyncInProgress(void) { return IsNamedMutexOwned(c_szSyncInProgMutex, NULL); }
BOOL IsPurgeInProgress(void) { return IsNamedMutexOwned(c_szPurgeInProgMutex, NULL); }
BOOL IsEncryptionInProgress(void) { return IsNamedMutexOwned(c_szEncryptionInProgMutex, NULL); } //
// Requests ownership of the global cache encryption mutex.
//
// Returns:
// NULL == Mutex already owned by another thread.
// Non-NULL == Mutex now owned by current thread.
// Caller is responsible for releasing the mutex
// and closing the mutex handle.
//
HANDLE RequestPermissionToEncryptCache(void) { return RequestNamedMutexOwnership(c_szEncryptionInProgMutex, NULL); }
//---------------------------------------------------------------
// DataObject helper functions.
// These are roughly taken from similar functions in
// shell\shell32\datautil.cpp
//---------------------------------------------------------------
HRESULT DataObject_SetBlob( IDataObject *pdtobj, CLIPFORMAT cf, LPCVOID pvBlob, UINT cbBlob ) { HRESULT hr = E_OUTOFMEMORY; void * pv = GlobalAlloc(GPTR, cbBlob); if (pv) { CopyMemory(pv, pvBlob, cbBlob); hr = DataObject_SetGlobal(pdtobj, cf, pv);
if (FAILED(hr)) GlobalFree((HGLOBAL)pv); } return hr; }
HRESULT DataObject_GetBlob( IDataObject *pdtobj, CLIPFORMAT cf, void * pvBlob, UINT cbBlob ) { STGMEDIUM medium = {0}; FORMATETC fmte = {cf, NULL, DVASPECT_CONTENT, -1, TYMED_HGLOBAL}; HRESULT hr = pdtobj->GetData(&fmte, &medium); if (SUCCEEDED(hr)) { void * pv = GlobalLock(medium.hGlobal); if (pv) { CopyMemory(pvBlob, pv, cbBlob); GlobalUnlock(medium.hGlobal); } else { hr = E_UNEXPECTED; } ReleaseStgMedium(&medium); } return hr; }
HRESULT DataObject_SetGlobal( IDataObject *pdtobj, CLIPFORMAT cf, HGLOBAL hGlobal ) { FORMATETC fmte = {cf, NULL, DVASPECT_CONTENT, -1, TYMED_HGLOBAL}; STGMEDIUM medium;
medium.tymed = TYMED_HGLOBAL; medium.hGlobal = hGlobal; medium.pUnkForRelease = NULL;
return pdtobj->SetData(&fmte, &medium, TRUE); }
HRESULT DataObject_SetDWORD( IDataObject *pdtobj, CLIPFORMAT cf, DWORD dw ) { return DataObject_SetBlob(pdtobj, cf, &dw, sizeof(dw)); }
HRESULT DataObject_GetDWORD( IDataObject *pdtobj, CLIPFORMAT cf, DWORD *pdwOut ) { return DataObject_GetBlob(pdtobj, cf, pdwOut, sizeof(DWORD)); }
HRESULT SetGetLogicalPerformedDropEffect( IDataObject *pdtobj, DWORD *pdwEffect, bool bSet ) { HRESULT hr = NOERROR; static CLIPFORMAT cf; if ((CLIPFORMAT)0 == cf) cf = (CLIPFORMAT)RegisterClipboardFormat(CFSTR_LOGICALPERFORMEDDROPEFFECT);
if (bSet) { hr = DataObject_SetDWORD(pdtobj, cf, *pdwEffect); } else { *pdwEffect = DROPEFFECT_NONE; DataObject_GetDWORD(pdtobj, cf, pdwEffect); } return hr; }
DWORD GetLogicalPerformedDropEffect( IDataObject *pdtobj ) { DWORD dwEffect = DROPEFFECT_NONE; SetGetLogicalPerformedDropEffect(pdtobj, &dwEffect, false); return dwEffect; }
HRESULT SetLogicalPerformedDropEffect( IDataObject *pdtobj, DWORD dwEffect ) { return SetGetLogicalPerformedDropEffect(pdtobj, &dwEffect, true); }
HRESULT SetGetPreferredDropEffect( IDataObject *pdtobj, DWORD *pdwEffect, bool bSet ) { HRESULT hr = NOERROR; static CLIPFORMAT cf; if ((CLIPFORMAT)0 == cf) cf = (CLIPFORMAT)RegisterClipboardFormat(CFSTR_PREFERREDDROPEFFECT);
if (bSet) { hr = DataObject_SetDWORD(pdtobj, cf, *pdwEffect); } else { *pdwEffect = DROPEFFECT_NONE; DataObject_GetDWORD(pdtobj, cf, pdwEffect); } return hr; }
DWORD GetPreferredDropEffect( IDataObject *pdtobj ) { DWORD dwEffect = DROPEFFECT_NONE; SetGetPreferredDropEffect(pdtobj, &dwEffect, false); return dwEffect; }
HRESULT SetPreferredDropEffect( IDataObject *pdtobj, DWORD dwEffect ) { return SetGetPreferredDropEffect(pdtobj, &dwEffect, true); }
//
// Wrap CSCFindFirstFile so we don't enumerate "." or "..".
// Wrapper also helps code readability.
//
HANDLE CacheFindFirst( LPCTSTR pszPath, PSID psid, WIN32_FIND_DATA *pfd, DWORD *pdwStatus, DWORD *pdwPinCount, DWORD *pdwHintFlags, FILETIME *pft ) { HANDLE hFind = CSCFindFirstFileForSid(pszPath, psid, pfd, pdwStatus, pdwPinCount, pdwHintFlags, pft);
while(INVALID_HANDLE_VALUE != hFind && PathIsDotOrDotDot(pfd->cFileName)) { if (!CSCFindNextFile(hFind, pfd, pdwStatus, pdwPinCount, pdwHintFlags, pft)) { CSCFindClose(hFind); hFind = INVALID_HANDLE_VALUE; } } return hFind; }
//
// Wrap CSCFindFirstFile so we don't enumerate "." or "..".
// Wrapper also helps code readability.
//
BOOL CacheFindNext( HANDLE hFind, WIN32_FIND_DATA *pfd, DWORD *pdwStatus, DWORD *pdwPinCount, DWORD *pdwHintFlags, FILETIME *pft ) { BOOL bResult = FALSE; do { bResult = CSCFindNextFile(hFind, pfd, pdwStatus, pdwPinCount, pdwHintFlags, pft); } while(bResult && PathIsDotOrDotDot(pfd->cFileName)); return bResult; }
//
// If there's a link to the Offline Files folder on the
// user's desktop, delete the link. This version checks a flag in the registry
// before enumerating all LNK's on the desktop. If the flag doesn't exist,
// we don't continue. This is a perf enhancement used at logon.
//
BOOL DeleteOfflineFilesFolderLink_PerfSensitive( HWND hwndParent ) { BOOL bResult = FALSE; //
// Before enumerating links on the desktop, check to see if the user
// has created a link.
//
DWORD dwValue; DWORD cbValue = sizeof(dwValue); DWORD dwType; DWORD dwResult = SHGetValue(HKEY_CURRENT_USER, REGSTR_KEY_OFFLINEFILES, REGSTR_VAL_FOLDERSHORTCUTCREATED, &dwType, &dwValue, &cbValue); if (ERROR_SUCCESS == dwResult) { //
// We don't care about the value or it's type.
// Presence/absence of the value is all that matters.
//
bResult = DeleteOfflineFilesFolderLink(hwndParent); } return bResult; }
//
// This version of the "delete link" function does not check the
// flag in the registry. It finds the link file on the desktop and deletes it.
//
BOOL DeleteOfflineFilesFolderLink( HWND hwndParent ) { BOOL bResult = FALSE; TCHAR szLinkPath[MAX_PATH]; if (SUCCEEDED(COfflineFilesFolder::IsLinkOnDesktop(hwndParent, szLinkPath, ARRAYSIZE(szLinkPath)))) { bResult = DeleteFile(szLinkPath); } //
// Remove the "folder shortcut created" flag from the registry.
//
SHDeleteValue(HKEY_CURRENT_USER, REGSTR_KEY_OFFLINEFILES, REGSTR_VAL_FOLDERSHORTCUTCREATED); return bResult; }
//
// This was taken from shell\shell32\util.cpp.
//
BOOL ShowSuperHidden(void) { BOOL bRet = FALSE;
if (!SHRestricted(REST_DONTSHOWSUPERHIDDEN)) { SHELLSTATE ss;
SHGetSetSettings(&ss, SSF_SHOWSUPERHIDDEN, FALSE); bRet = ss.fShowSuperHidden; } return bRet; }
BOOL ShowHidden(void) { SHELLSTATE ss; SHGetSetSettings(&ss, SSF_SHOWALLOBJECTS, FALSE); return ss.fShowAllObjects; }
BOOL IsSyncMgrInitialized(void) { //
// Is this the first time this user has used run CSCUI?
//
DWORD dwValue = 0; DWORD cbData = sizeof(dwValue); DWORD dwType; SHGetValue(HKEY_CURRENT_USER, c_szCSCKey, c_szSyncMgrInitialized, &dwType, (void *)&dwValue, &cbData); return (0 != dwValue); }
void SetSyncMgrInitialized(void) {
//
// Set the "initialized" flag so our logoff code in cscst.cpp doesn't
// try to re-register for sync-at-logon/logoff.
//
DWORD dwSyncMgrInitialized = 1; SHSetValue(HKEY_CURRENT_USER, c_szCSCKey, c_szSyncMgrInitialized, REG_DWORD, &dwSyncMgrInitialized, sizeof(dwSyncMgrInitialized)); }
//
// Return the HWND for a standard progress dialog.
//
HWND GetProgressDialogWindow(IProgressDialog *ppd) { HWND hwndProgress = NULL; //
// Get the progress dialog's window handle. We'll use
// it as a parent window for error UI.
//
HRESULT hr = IUnknown_GetWindow(ppd, &hwndProgress); return hwndProgress; }
void CAutoWaitCursor::Reset( void ) { ShowCursor(FALSE); if (NULL != m_hCursor) SetCursor(m_hCursor); m_hCursor = NULL; }
//
// Expand all environment strings in a text string.
//
HRESULT ExpandStringInPlace( LPTSTR psz, DWORD cch ) { HRESULT hr = E_OUTOFMEMORY; LPTSTR pszCopy; if (LocalAllocString(&pszCopy, psz)) { DWORD cchExpanded = ExpandEnvironmentStrings(pszCopy, psz, cch); if (0 == cchExpanded) hr = HRESULT_FROM_WIN32(GetLastError()); else if (cchExpanded > cch) hr = HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER); else hr = S_OK;
LocalFreeString(&pszCopy); } if (FAILED(hr) && 0 < cch) { *psz = 0; } return hr; }
|