mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1934 lines
48 KiB
1934 lines
48 KiB
#include "setupp.h"
|
|
#pragma hdrstop
|
|
|
|
|
|
//
|
|
// Safe boot strings
|
|
//
|
|
|
|
#define SAFEBOOT_OPTION_KEY TEXT("System\\CurrentControlSet\\Control\\SafeBoot\\Option")
|
|
#define OPTION_VALUE TEXT("OptionValue")
|
|
|
|
VOID
|
|
SetUpProductTypeName(
|
|
OUT PWSTR ProductTypeString,
|
|
IN UINT BufferSizeChars
|
|
)
|
|
{
|
|
switch(ProductType) {
|
|
case PRODUCT_WORKSTATION:
|
|
lstrcpyn(ProductTypeString,L"WinNT",BufferSizeChars);
|
|
break;
|
|
case PRODUCT_SERVER_PRIMARY:
|
|
lstrcpyn(ProductTypeString,L"LanmanNT",BufferSizeChars);
|
|
break;
|
|
case PRODUCT_SERVER_STANDALONE:
|
|
lstrcpyn(ProductTypeString,L"ServerNT",BufferSizeChars);
|
|
break;
|
|
default:
|
|
LoadString(MyModuleHandle,IDS_UNKNOWN,ProductTypeString,BufferSizeChars);
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
HMODULE
|
|
MyLoadLibraryWithSignatureCheck(
|
|
IN PWSTR ModuleName
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
verifies the signature for a dll and if it's ok, then load the dll
|
|
|
|
Arguments:
|
|
|
|
ModuleName - filename to be loaded.
|
|
|
|
Return Value:
|
|
|
|
an HMODULE on success, else NULL
|
|
|
|
--*/
|
|
|
|
{
|
|
WCHAR FullModuleName[MAX_PATH];
|
|
PWSTR p;
|
|
DWORD error;
|
|
|
|
if (!GetFullPathName(ModuleName,MAX_PATH,FullModuleName,&p)) {
|
|
//
|
|
// couldn't get full path to file
|
|
//
|
|
SetupDebugPrint1( L"Setup: MyLoadLibraryWithSignatureCheck failed GetFullPathName, le = %d\n",
|
|
GetLastError() );
|
|
return NULL;
|
|
}
|
|
|
|
error = pSetupVerifyFile(
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
pSetupGetFileTitle(FullModuleName),
|
|
FullModuleName,
|
|
NULL,
|
|
NULL,
|
|
FALSE,
|
|
NULL,
|
|
NULL,
|
|
NULL );
|
|
|
|
if (NO_ERROR != error) {
|
|
//
|
|
// signing problem
|
|
//
|
|
SetupDebugPrint1( L"Setup: MyLoadLibraryWithSignatureCheck failed pSetupVerifyFile, le = %x\n",
|
|
error );
|
|
SetLastError(error);
|
|
return NULL;
|
|
}
|
|
|
|
return (LoadLibrary(FullModuleName));
|
|
|
|
}
|
|
|
|
|
|
UINT
|
|
MyGetDriveType(
|
|
IN WCHAR Drive
|
|
)
|
|
{
|
|
WCHAR DriveNameNt[] = L"\\\\.\\?:";
|
|
WCHAR DriveName[] = L"?:\\";
|
|
HANDLE hDisk;
|
|
BOOL b;
|
|
UINT rc;
|
|
DWORD DataSize;
|
|
DISK_GEOMETRY MediaInfo;
|
|
|
|
//
|
|
// First, get the win32 drive type. If it tells us DRIVE_REMOVABLE,
|
|
// then we need to see whether it's a floppy or hard disk. Otherwise
|
|
// just believe the api.
|
|
//
|
|
DriveName[0] = Drive;
|
|
if((rc = GetDriveType(DriveName)) == DRIVE_REMOVABLE) {
|
|
|
|
DriveNameNt[4] = Drive;
|
|
|
|
hDisk = CreateFile(
|
|
DriveNameNt,
|
|
FILE_READ_ATTRIBUTES,
|
|
FILE_SHARE_READ | FILE_SHARE_WRITE,
|
|
NULL,
|
|
OPEN_EXISTING,
|
|
0,
|
|
NULL
|
|
);
|
|
|
|
if(hDisk != INVALID_HANDLE_VALUE) {
|
|
|
|
b = DeviceIoControl(
|
|
hDisk,
|
|
IOCTL_DISK_GET_DRIVE_GEOMETRY,
|
|
NULL,
|
|
0,
|
|
&MediaInfo,
|
|
sizeof(MediaInfo),
|
|
&DataSize,
|
|
NULL
|
|
);
|
|
|
|
//
|
|
// It's really a hard disk if the media type is removable.
|
|
//
|
|
if(b && (MediaInfo.MediaType == RemovableMedia)) {
|
|
rc = DRIVE_FIXED;
|
|
}
|
|
|
|
CloseHandle(hDisk);
|
|
}
|
|
}
|
|
|
|
return(rc);
|
|
}
|
|
|
|
|
|
BOOL
|
|
GetPartitionInfo(
|
|
IN WCHAR Drive,
|
|
OUT PPARTITION_INFORMATION PartitionInfo
|
|
)
|
|
{
|
|
WCHAR DriveName[] = L"\\\\.\\?:";
|
|
HANDLE hDisk;
|
|
BOOL b;
|
|
DWORD DataSize;
|
|
|
|
DriveName[4] = Drive;
|
|
|
|
hDisk = CreateFile(
|
|
DriveName,
|
|
GENERIC_READ,
|
|
FILE_SHARE_READ | FILE_SHARE_WRITE,
|
|
NULL,
|
|
OPEN_EXISTING,
|
|
0,
|
|
NULL
|
|
);
|
|
|
|
if(hDisk == INVALID_HANDLE_VALUE) {
|
|
return(FALSE);
|
|
}
|
|
|
|
b = DeviceIoControl(
|
|
hDisk,
|
|
IOCTL_DISK_GET_PARTITION_INFO,
|
|
NULL,
|
|
0,
|
|
PartitionInfo,
|
|
sizeof(PARTITION_INFORMATION),
|
|
&DataSize,
|
|
NULL
|
|
);
|
|
|
|
CloseHandle(hDisk);
|
|
|
|
return(b);
|
|
}
|
|
|
|
|
|
BOOL
|
|
IsErrorLogEmpty (
|
|
VOID
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Checks to see if the error log is empty.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Returns:
|
|
|
|
TRUE if the error log size is zero.
|
|
|
|
--*/
|
|
|
|
{
|
|
HANDLE ErrorLog;
|
|
WCHAR LogName[MAX_PATH];
|
|
DWORD Size = 0;
|
|
|
|
if( GetWindowsDirectory (LogName, MAX_PATH) ) {
|
|
pSetupConcatenatePaths (LogName, SETUPLOG_ERROR_FILENAME, MAX_PATH, NULL);
|
|
|
|
ErrorLog = CreateFile (
|
|
LogName,
|
|
GENERIC_READ,
|
|
FILE_SHARE_READ | FILE_SHARE_WRITE,
|
|
NULL,
|
|
OPEN_EXISTING,
|
|
FILE_ATTRIBUTE_NORMAL,
|
|
NULL
|
|
);
|
|
|
|
if (ErrorLog != INVALID_HANDLE_VALUE) {
|
|
Size = GetFileSize (ErrorLog, NULL);
|
|
CloseHandle (ErrorLog);
|
|
}
|
|
}
|
|
return Size == 0;
|
|
}
|
|
|
|
|
|
VOID
|
|
PumpMessageQueue(
|
|
VOID
|
|
)
|
|
{
|
|
MSG msg;
|
|
|
|
while(PeekMessage(&msg,NULL,0,0,PM_REMOVE)) {
|
|
DispatchMessage(&msg);
|
|
}
|
|
|
|
}
|
|
|
|
|
|
PVOID
|
|
InitSysSetupQueueCallbackEx(
|
|
IN HWND OwnerWindow,
|
|
IN HWND AlternateProgressWindow, OPTIONAL
|
|
IN UINT ProgressMessage,
|
|
IN DWORD Reserved1,
|
|
IN PVOID Reserved2
|
|
)
|
|
{
|
|
PSYSSETUP_QUEUE_CONTEXT SysSetupContext;
|
|
|
|
SysSetupContext = MyMalloc(sizeof(SYSSETUP_QUEUE_CONTEXT));
|
|
|
|
if(SysSetupContext) {
|
|
|
|
SysSetupContext->Skipped = FALSE;
|
|
|
|
SysSetupContext->DefaultContext = SetupInitDefaultQueueCallbackEx(
|
|
OwnerWindow,
|
|
AlternateProgressWindow,
|
|
ProgressMessage,
|
|
Reserved1,
|
|
Reserved2
|
|
);
|
|
}
|
|
|
|
return SysSetupContext;
|
|
}
|
|
|
|
|
|
PVOID
|
|
InitSysSetupQueueCallback(
|
|
IN HWND OwnerWindow
|
|
)
|
|
{
|
|
return(InitSysSetupQueueCallbackEx(OwnerWindow,NULL,0,0,NULL));
|
|
}
|
|
|
|
|
|
VOID
|
|
TermSysSetupQueueCallback(
|
|
IN PVOID SysSetupContext
|
|
)
|
|
{
|
|
PSYSSETUP_QUEUE_CONTEXT Context = SysSetupContext;
|
|
|
|
try {
|
|
if(Context->DefaultContext) {
|
|
SetupTermDefaultQueueCallback(Context->DefaultContext);
|
|
}
|
|
MyFree(Context);
|
|
} except(EXCEPTION_EXECUTE_HANDLER) {
|
|
;
|
|
}
|
|
}
|
|
|
|
|
|
#if 0
|
|
UINT
|
|
VersionCheckQueueCallback(
|
|
IN PVOID Context,
|
|
IN UINT Notification,
|
|
IN UINT_PTR Param1,
|
|
IN UINT_PTR Param2
|
|
)
|
|
{
|
|
PFILEPATHS FilePaths = (PFILEPATHS)Param1;
|
|
|
|
//
|
|
// If we're being notified that a version mismatch was found,
|
|
// indicate that the file shouldn't be copied. Otherwise,
|
|
// pass the notification on.
|
|
//
|
|
if((Notification & (SPFILENOTIFY_LANGMISMATCH |
|
|
SPFILENOTIFY_TARGETNEWER |
|
|
SPFILENOTIFY_TARGETEXISTS)) != 0) {
|
|
|
|
SetuplogError(
|
|
LogSevInformation,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
, // MSG_LOG_VERSION_MISMATCH, This message is no longer appropriate.
|
|
FilePaths->Source,
|
|
FilePaths->Target,
|
|
NULL,NULL);
|
|
|
|
return(0);
|
|
}
|
|
|
|
//
|
|
// Want default processing.
|
|
//
|
|
return(SysSetupQueueCallback(Context,Notification,Param1,Param2));
|
|
}
|
|
#endif
|
|
|
|
|
|
UINT
|
|
SysSetupQueueCallback(
|
|
IN PVOID Context,
|
|
IN UINT Notification,
|
|
IN UINT_PTR Param1,
|
|
IN UINT_PTR Param2
|
|
)
|
|
{
|
|
UINT Status;
|
|
PSYSSETUP_QUEUE_CONTEXT SysSetupContext = Context;
|
|
PFILEPATHS FilePaths = (PFILEPATHS)Param1;
|
|
PSOURCE_MEDIA SourceMedia = (PSOURCE_MEDIA)Param1;
|
|
REGISTRATION_CONTEXT RegistrationContext;
|
|
|
|
|
|
//
|
|
// If we're being notified that a file is missing and we're supposed
|
|
// to skip missing files, then return skip. Otherwise pass it on
|
|
// to the default callback routine.
|
|
//
|
|
if(( (Notification == SPFILENOTIFY_COPYERROR) || (Notification == SPFILENOTIFY_NEEDMEDIA) ) && SkipMissingFiles) {
|
|
|
|
if((FilePaths->Win32Error == ERROR_FILE_NOT_FOUND)
|
|
|| (FilePaths->Win32Error == ERROR_PATH_NOT_FOUND)) {
|
|
|
|
if(Notification == SPFILENOTIFY_COPYERROR)
|
|
SetuplogError(
|
|
LogSevWarning,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_FILE_COPY_ERROR,
|
|
FilePaths->Source,
|
|
FilePaths->Target, NULL,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
FilePaths->Win32Error,
|
|
NULL,NULL);
|
|
else
|
|
SetuplogError(
|
|
LogSevError,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_NEEDMEDIA_SKIP,
|
|
SourceMedia->SourceFile,
|
|
SourceMedia->SourcePath,
|
|
NULL,NULL);
|
|
|
|
|
|
return(FILEOP_SKIP);
|
|
}
|
|
}
|
|
|
|
if ((Notification == SPFILENOTIFY_COPYERROR
|
|
|| Notification == SPFILENOTIFY_RENAMEERROR
|
|
|| Notification == SPFILENOTIFY_DELETEERROR) &&
|
|
(FilePaths->Win32Error == ERROR_DIRECTORY)) {
|
|
WCHAR Buffer[MAX_PATH];
|
|
PWSTR p;
|
|
//
|
|
// The target directory has been converted into a file by autochk.
|
|
// just delete it -- we might be in trouble if the target directory was
|
|
// really important, but it's worth trying
|
|
//
|
|
|
|
wcscpy( Buffer,FilePaths->Target);
|
|
p = wcsrchr(Buffer,L'\\');
|
|
if (p) {
|
|
*p = (WCHAR)NULL;
|
|
}
|
|
if (FileExists(Buffer,NULL)) {
|
|
DeleteFile( Buffer );
|
|
SetupDebugPrint1(L"autochk turned directory %s into file, delete file and retry\n", Buffer);
|
|
return(FILEOP_RETRY);
|
|
}
|
|
}
|
|
|
|
//
|
|
// If we're being notified that a version mismatch was found,
|
|
// silently overwrite the file. Otherwise, pass the notification on.
|
|
//
|
|
if((Notification & (SPFILENOTIFY_LANGMISMATCH |
|
|
SPFILENOTIFY_TARGETNEWER |
|
|
SPFILENOTIFY_TARGETEXISTS)) != 0) {
|
|
|
|
SetuplogError(
|
|
LogSevInformation,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_VERSION_MISMATCH,
|
|
FilePaths->Source,
|
|
FilePaths->Target,
|
|
NULL,NULL);
|
|
|
|
return(FILEOP_DOIT);
|
|
}
|
|
|
|
|
|
//
|
|
// Use default processing, then check for errors.
|
|
//
|
|
Status = SetupDefaultQueueCallback(
|
|
SysSetupContext->DefaultContext,Notification,Param1,Param2);
|
|
|
|
switch(Notification) {
|
|
|
|
case SPFILENOTIFY_STARTQUEUE:
|
|
case SPFILENOTIFY_STARTSUBQUEUE:
|
|
case SPFILENOTIFY_ENDSUBQUEUE:
|
|
//
|
|
// Nothing is logged in this case.
|
|
//
|
|
break;
|
|
|
|
case SPFILENOTIFY_ENDQUEUE:
|
|
|
|
if(!Param1) {
|
|
SetuplogError(
|
|
LogSevInformation,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_QUEUE_ABORT, NULL,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
GetLastError(),
|
|
NULL,NULL);
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_STARTRENAME:
|
|
|
|
if(Status == FILEOP_SKIP) {
|
|
SysSetupContext->Skipped = TRUE;
|
|
} else {
|
|
SysSetupContext->Skipped = FALSE;
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_ENDRENAME:
|
|
|
|
if(FilePaths->Win32Error == NO_ERROR &&
|
|
!SysSetupContext->Skipped) {
|
|
|
|
SetuplogError(
|
|
LogSevInformation,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_FILE_RENAMED,
|
|
FilePaths->Source,
|
|
FilePaths->Target,
|
|
NULL,NULL);
|
|
|
|
} else {
|
|
|
|
SetuplogError(
|
|
LogSevError,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_FILE_RENAME_ERROR,
|
|
FilePaths->Source,
|
|
FilePaths->Target, NULL,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
FilePaths->Win32Error == NO_ERROR ?
|
|
MSG_LOG_USER_SKIP :
|
|
FilePaths->Win32Error,
|
|
NULL,NULL);
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_RENAMEERROR:
|
|
|
|
if(Status == FILEOP_SKIP) {
|
|
SysSetupContext->Skipped = TRUE;
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_STARTDELETE:
|
|
|
|
if(Status == FILEOP_SKIP) {
|
|
SysSetupContext->Skipped = TRUE;
|
|
} else {
|
|
SysSetupContext->Skipped = FALSE;
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_ENDDELETE:
|
|
|
|
if(FilePaths->Win32Error == NO_ERROR &&
|
|
!SysSetupContext->Skipped) {
|
|
|
|
SetuplogError(
|
|
LogSevInformation,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_FILE_DELETED,
|
|
FilePaths->Target,
|
|
NULL,NULL);
|
|
|
|
} else if(FilePaths->Win32Error == ERROR_FILE_NOT_FOUND ||
|
|
FilePaths->Win32Error == ERROR_PATH_NOT_FOUND) {
|
|
//
|
|
// This failure is not important.
|
|
//
|
|
SetuplogError(
|
|
LogSevInformation,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_FILE_DELETE_ERROR,
|
|
FilePaths->Target, NULL,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
FilePaths->Win32Error,
|
|
NULL,NULL);
|
|
|
|
} else {
|
|
//
|
|
// Here we have an actual error.
|
|
//
|
|
SetuplogError(
|
|
LogSevError,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_FILE_DELETE_ERROR,
|
|
FilePaths->Target, NULL,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
FilePaths->Win32Error == NO_ERROR ?
|
|
MSG_LOG_USER_SKIP :
|
|
FilePaths->Win32Error,
|
|
NULL,NULL);
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_DELETEERROR:
|
|
|
|
if(Status == FILEOP_SKIP) {
|
|
SysSetupContext->Skipped = TRUE;
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_STARTCOPY:
|
|
if(Status == FILEOP_SKIP) {
|
|
SysSetupContext->Skipped = TRUE;
|
|
} else {
|
|
SysSetupContext->Skipped = FALSE;
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_ENDCOPY:
|
|
|
|
if(FilePaths->Win32Error == NO_ERROR &&
|
|
!SysSetupContext->Skipped) {
|
|
|
|
LogRepairInfo(
|
|
FilePaths->Source,
|
|
FilePaths->Target
|
|
);
|
|
|
|
SetuplogError(
|
|
LogSevInformation,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_FILE_COPIED,
|
|
FilePaths->Source,
|
|
FilePaths->Target,
|
|
NULL,NULL);
|
|
|
|
//
|
|
// clear the file's readonly attribute that it may have gotten
|
|
// from the cdrom.
|
|
//
|
|
SetFileAttributes(
|
|
FilePaths->Target,
|
|
GetFileAttributes(FilePaths->Target) & ~FILE_ATTRIBUTE_READONLY );
|
|
|
|
} else {
|
|
|
|
SetuplogError(
|
|
LogSevError,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_FILE_COPY_ERROR,
|
|
FilePaths->Source,
|
|
FilePaths->Target, NULL,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
FilePaths->Win32Error == NO_ERROR ?
|
|
MSG_LOG_USER_SKIP :
|
|
FilePaths->Win32Error,
|
|
NULL,NULL);
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_COPYERROR:
|
|
|
|
if(Status == FILEOP_SKIP) {
|
|
SysSetupContext->Skipped = TRUE;
|
|
}
|
|
break;
|
|
|
|
case SPFILENOTIFY_NEEDMEDIA:
|
|
|
|
if(Status == FILEOP_SKIP) {
|
|
|
|
SetuplogError(
|
|
LogSevError,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_NEEDMEDIA_SKIP,
|
|
SourceMedia->SourceFile,
|
|
SourceMedia->SourcePath,
|
|
NULL,NULL);
|
|
|
|
SysSetupContext->Skipped = TRUE;
|
|
}
|
|
|
|
break;
|
|
|
|
case SPFILENOTIFY_STARTREGISTRATION:
|
|
case SPFILENOTIFY_ENDREGISTRATION:
|
|
RtlZeroMemory(&RegistrationContext,sizeof(RegistrationContext));
|
|
RegistrationQueueCallback(
|
|
&RegistrationContext,
|
|
Notification,
|
|
Param1,
|
|
Param2);
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
PSID
|
|
GetAdminAccountSid(
|
|
)
|
|
|
|
/*++
|
|
===============================================================================
|
|
Routine Description:
|
|
|
|
This routine gets the Adminstrator's SID
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
TRUE - success.
|
|
|
|
FALSE - failed.
|
|
|
|
===============================================================================
|
|
--*/
|
|
{
|
|
BOOL b = TRUE;
|
|
LSA_HANDLE hPolicy;
|
|
NTSTATUS ntStatus;
|
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
|
PPOLICY_ACCOUNT_DOMAIN_INFO AccountDomainInfo = NULL;
|
|
UCHAR SubAuthCount;
|
|
DWORD sidlen;
|
|
PSID psid = NULL;
|
|
|
|
|
|
InitializeObjectAttributes( &ObjectAttributes,
|
|
NULL,
|
|
0L,
|
|
NULL,
|
|
NULL );
|
|
|
|
ntStatus = LsaOpenPolicy( NULL,
|
|
&ObjectAttributes,
|
|
POLICY_ALL_ACCESS,
|
|
&hPolicy );
|
|
|
|
if (!NT_SUCCESS(ntStatus)) {
|
|
LsaClose(hPolicy);
|
|
b = FALSE;
|
|
}
|
|
|
|
if( b ) {
|
|
ntStatus = LsaQueryInformationPolicy( hPolicy,
|
|
PolicyAccountDomainInformation,
|
|
(PVOID *) &AccountDomainInfo );
|
|
|
|
LsaClose( hPolicy );
|
|
|
|
if (!NT_SUCCESS(ntStatus)) {
|
|
if ( AccountDomainInfo != NULL ) {
|
|
(VOID) LsaFreeMemory( AccountDomainInfo );
|
|
}
|
|
b = FALSE;
|
|
}
|
|
}
|
|
|
|
if( b ) {
|
|
//
|
|
// calculate the size of a new sid with one more SubAuthority
|
|
//
|
|
SubAuthCount = *(GetSidSubAuthorityCount ( AccountDomainInfo->DomainSid ));
|
|
SubAuthCount++; // for admin
|
|
sidlen = GetSidLengthRequired ( SubAuthCount );
|
|
|
|
//
|
|
// allocate and copy the new new sid from the Domain SID
|
|
//
|
|
psid = (PSID)malloc(sidlen);
|
|
|
|
if( psid ) {
|
|
|
|
memcpy(psid, AccountDomainInfo->DomainSid, GetLengthSid(AccountDomainInfo->DomainSid) );
|
|
|
|
//
|
|
// increment SubAuthority count and add Domain Admin RID
|
|
//
|
|
*(GetSidSubAuthorityCount( psid )) = SubAuthCount;
|
|
*(GetSidSubAuthority( psid, SubAuthCount-1 )) = DOMAIN_USER_RID_ADMIN;
|
|
|
|
if ( AccountDomainInfo != NULL ) {
|
|
(VOID) LsaFreeMemory( AccountDomainInfo );
|
|
}
|
|
}
|
|
}
|
|
|
|
return psid;
|
|
}
|
|
|
|
|
|
VOID
|
|
GetAdminAccountName(
|
|
PWSTR AccountName
|
|
)
|
|
|
|
/*++
|
|
===============================================================================
|
|
Routine Description:
|
|
|
|
This routine sets the Adminstrator Password
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
TRUE - success.
|
|
|
|
FALSE - failed.
|
|
|
|
===============================================================================
|
|
--*/
|
|
{
|
|
BOOL b = TRUE;
|
|
LSA_HANDLE hPolicy;
|
|
NTSTATUS ntStatus;
|
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
|
PPOLICY_ACCOUNT_DOMAIN_INFO AccountDomainInfo = NULL;
|
|
UCHAR SubAuthCount;
|
|
DWORD sidlen;
|
|
PSID psid;
|
|
WCHAR adminname[512];
|
|
WCHAR domainname[512];
|
|
DWORD adminlen=512; // address of size account string
|
|
DWORD domlen=512; // address of size account string
|
|
SID_NAME_USE sidtype;
|
|
|
|
|
|
//
|
|
// Initialize the administrator's account name.
|
|
//
|
|
LoadString(MyModuleHandle,IDS_ADMINISTRATOR,adminname,MAX_USERNAME+1);
|
|
|
|
InitializeObjectAttributes( &ObjectAttributes,
|
|
NULL,
|
|
0L,
|
|
NULL,
|
|
NULL );
|
|
|
|
ntStatus = LsaOpenPolicy( NULL,
|
|
&ObjectAttributes,
|
|
POLICY_ALL_ACCESS,
|
|
&hPolicy );
|
|
|
|
if (!NT_SUCCESS(ntStatus)) {
|
|
LsaClose(hPolicy);
|
|
b = FALSE;
|
|
}
|
|
|
|
if( b ) {
|
|
ntStatus = LsaQueryInformationPolicy( hPolicy,
|
|
PolicyAccountDomainInformation,
|
|
(PVOID *) &AccountDomainInfo );
|
|
|
|
LsaClose( hPolicy );
|
|
|
|
if (!NT_SUCCESS(ntStatus)) {
|
|
if ( AccountDomainInfo != NULL ) {
|
|
(VOID) LsaFreeMemory( AccountDomainInfo );
|
|
}
|
|
b = FALSE;
|
|
}
|
|
}
|
|
|
|
if( b ) {
|
|
//
|
|
// calculate the size of a new sid with one more SubAuthority
|
|
//
|
|
SubAuthCount = *(GetSidSubAuthorityCount ( AccountDomainInfo->DomainSid ));
|
|
SubAuthCount++; // for admin
|
|
sidlen = GetSidLengthRequired ( SubAuthCount );
|
|
|
|
//
|
|
// allocate and copy the new new sid from the Domain SID
|
|
//
|
|
psid = (PSID)malloc(sidlen);
|
|
if (psid) {
|
|
memcpy(psid, AccountDomainInfo->DomainSid, GetLengthSid(AccountDomainInfo->DomainSid) );
|
|
|
|
//
|
|
// increment SubAuthority count and add Domain Admin RID
|
|
//
|
|
*(GetSidSubAuthorityCount( psid )) = SubAuthCount;
|
|
*(GetSidSubAuthority( psid, SubAuthCount-1 )) = DOMAIN_USER_RID_ADMIN;
|
|
|
|
if ( AccountDomainInfo != NULL ) {
|
|
(VOID) LsaFreeMemory( AccountDomainInfo );
|
|
}
|
|
|
|
//
|
|
// get the admin account name from the new SID
|
|
//
|
|
LookupAccountSid( NULL,
|
|
psid,
|
|
adminname,
|
|
&adminlen,
|
|
domainname,
|
|
&domlen,
|
|
&sidtype );
|
|
}
|
|
|
|
}
|
|
|
|
lstrcpy( AccountName, adminname );
|
|
|
|
if (psid) {
|
|
free(psid);
|
|
}
|
|
}
|
|
|
|
|
|
ULONG
|
|
GetBatteryTag (HANDLE DriverHandle)
|
|
{
|
|
NTSTATUS Status;
|
|
IO_STATUS_BLOCK IOSB;
|
|
ULONG BatteryTag;
|
|
|
|
Status = NtDeviceIoControlFile(
|
|
DriverHandle,
|
|
(HANDLE) NULL, // event
|
|
(PIO_APC_ROUTINE) NULL,
|
|
(PVOID) NULL,
|
|
&IOSB,
|
|
IOCTL_BATTERY_QUERY_TAG,
|
|
NULL, // input buffer
|
|
0,
|
|
&BatteryTag, // output buffer
|
|
sizeof (BatteryTag)
|
|
);
|
|
|
|
|
|
if (!NT_SUCCESS(Status)) {
|
|
BatteryTag = BATTERY_TAG_INVALID;
|
|
if (Status == STATUS_NO_SUCH_DEVICE) {
|
|
SetupDebugPrint(L"(Battery is not physically present or is not connected)\n");
|
|
} else {
|
|
SetupDebugPrint1(L"Query Battery tag failed: Status = %x\n", Status);
|
|
}
|
|
|
|
}
|
|
|
|
return BatteryTag;
|
|
}
|
|
|
|
|
|
BOOLEAN
|
|
GetBatteryInfo (
|
|
HANDLE DriverHandle,
|
|
ULONG BatteryTag,
|
|
IN BATTERY_QUERY_INFORMATION_LEVEL Level,
|
|
OUT PVOID Buffer,
|
|
IN ULONG BufferLength
|
|
)
|
|
{
|
|
NTSTATUS Status;
|
|
IO_STATUS_BLOCK IOSB;
|
|
BATTERY_QUERY_INFORMATION BInfo;
|
|
|
|
memset (Buffer, 0, BufferLength);
|
|
BInfo.BatteryTag = BatteryTag;
|
|
BInfo.InformationLevel = Level;
|
|
BInfo.AtRate = 0; // This is needed for reading estimated time correctly.
|
|
|
|
Status = NtDeviceIoControlFile(
|
|
DriverHandle,
|
|
(HANDLE) NULL, // event
|
|
(PIO_APC_ROUTINE) NULL,
|
|
(PVOID) NULL,
|
|
&IOSB,
|
|
IOCTL_BATTERY_QUERY_INFORMATION,
|
|
&BInfo, // input buffer
|
|
sizeof (BInfo),
|
|
Buffer, // output buffer
|
|
BufferLength
|
|
);
|
|
|
|
|
|
if (!NT_SUCCESS(Status)) {
|
|
|
|
if ((Status == STATUS_INVALID_PARAMETER) ||
|
|
(Status == STATUS_INVALID_DEVICE_REQUEST) ||
|
|
(Status == STATUS_NOT_SUPPORTED)) {
|
|
|
|
SetupDebugPrint2(L"Not Supported by Battery, Level %x, Status: %x\n", Level, Status);
|
|
} else {
|
|
SetupDebugPrint2(L"Query failed: Level %x, Status = %x\n", Level, Status);
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
|
|
|
|
BOOLEAN
|
|
IsLongTermBattery(
|
|
PCWSTR BatteryName
|
|
)
|
|
{
|
|
HANDLE driverHandle;
|
|
ULONG batteryTag;
|
|
BATTERY_INFORMATION BInfo;
|
|
BOOLEAN Ret;
|
|
|
|
|
|
driverHandle = CreateFile (BatteryName,
|
|
GENERIC_READ | GENERIC_WRITE,
|
|
FILE_SHARE_READ | FILE_SHARE_WRITE,
|
|
NULL,
|
|
OPEN_EXISTING,
|
|
FILE_ATTRIBUTE_NORMAL,
|
|
NULL);
|
|
|
|
if (INVALID_HANDLE_VALUE == driverHandle) {
|
|
|
|
SetupDebugPrint2(L"Error opening %ws: GetLastError = 0x%08lx \n",
|
|
BatteryName, GetLastError());
|
|
return FALSE;
|
|
}
|
|
|
|
batteryTag = GetBatteryTag (driverHandle);
|
|
if (batteryTag == BATTERY_TAG_INVALID) {
|
|
NtClose(driverHandle);
|
|
return FALSE;
|
|
}
|
|
|
|
if (GetBatteryInfo (driverHandle, batteryTag, BatteryInformation, &BInfo, sizeof(BInfo))) {
|
|
|
|
Ret = !(BInfo.Capabilities & BATTERY_IS_SHORT_TERM);
|
|
|
|
} else {
|
|
|
|
Ret = FALSE;
|
|
}
|
|
|
|
NtClose(driverHandle);
|
|
return(Ret);
|
|
}
|
|
|
|
|
|
BOOLEAN
|
|
IsLaptop(
|
|
VOID
|
|
)
|
|
{
|
|
HDEVINFO devInfo;
|
|
SP_INTERFACE_DEVICE_DATA interfaceDevData;
|
|
PSP_INTERFACE_DEVICE_DETAIL_DATA funcClassDevData;
|
|
UCHAR index;
|
|
DWORD reqSize;
|
|
BOOLEAN b = FALSE;
|
|
|
|
|
|
devInfo = SetupDiGetClassDevs((LPGUID)&GUID_DEVICE_BATTERY, NULL, NULL,
|
|
DIGCF_PRESENT | DIGCF_INTERFACEDEVICE);
|
|
if (devInfo == INVALID_HANDLE_VALUE) {
|
|
SetupDebugPrint1(L"SetupDiGetClassDevs on GUID_DEVICE_BATTERY, failed: %d\n", GetLastError());
|
|
return FALSE;
|
|
}
|
|
interfaceDevData.cbSize = sizeof(SP_DEVINFO_DATA);
|
|
|
|
index = 0;
|
|
while(1) {
|
|
if (SetupDiEnumInterfaceDevice(devInfo,
|
|
0,
|
|
(LPGUID)&GUID_DEVICE_BATTERY,
|
|
index,
|
|
&interfaceDevData)) {
|
|
|
|
// Get the required size of the function class device data.
|
|
SetupDiGetInterfaceDeviceDetail(devInfo,
|
|
&interfaceDevData,
|
|
NULL,
|
|
0,
|
|
&reqSize,
|
|
NULL);
|
|
|
|
funcClassDevData = MyMalloc(reqSize);
|
|
if (funcClassDevData != NULL) {
|
|
funcClassDevData->cbSize =
|
|
sizeof(SP_INTERFACE_DEVICE_DETAIL_DATA);
|
|
|
|
if (SetupDiGetInterfaceDeviceDetail(devInfo,
|
|
&interfaceDevData,
|
|
funcClassDevData,
|
|
reqSize,
|
|
&reqSize,
|
|
NULL)) {
|
|
|
|
b = IsLongTermBattery(funcClassDevData->DevicePath);
|
|
}
|
|
else {
|
|
SetupDebugPrint1(L"SetupDiGetInterfaceDeviceDetail, failed: %d\n", GetLastError());
|
|
}
|
|
|
|
MyFree(funcClassDevData);
|
|
if (b) {
|
|
break;
|
|
}
|
|
}
|
|
} else {
|
|
if (ERROR_NO_MORE_ITEMS == GetLastError()) {
|
|
break;
|
|
}
|
|
else {
|
|
SetupDebugPrint1(L"SetupDiEnumInterfaceDevice, failed: %d\n", GetLastError());
|
|
}
|
|
}
|
|
index++;
|
|
}
|
|
|
|
SetupDiDestroyDeviceInfoList(devInfo);
|
|
return b;
|
|
}
|
|
|
|
|
|
VOID
|
|
SaveInstallInfoIntoEventLog(
|
|
VOID
|
|
)
|
|
/*++
|
|
Routine Description:
|
|
|
|
This routine will store information into the event log regarding
|
|
- if we upgraded or cleaninstall
|
|
- what build did the install originate from
|
|
- what build are we?
|
|
- were there errors during Setup
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
{
|
|
#define AnswerBufLen (64)
|
|
WCHAR AnswerFile[MAX_PATH];
|
|
WCHAR Answer[AnswerBufLen];
|
|
WCHAR OrigVersion[AnswerBufLen];
|
|
WCHAR NewVersion[AnswerBufLen];
|
|
HANDLE hEventSrc;
|
|
PCWSTR MyArgs[2];
|
|
PCWSTR ErrorArgs[1];
|
|
DWORD MessageID;
|
|
WORD MyArgCount;
|
|
|
|
|
|
|
|
|
|
//
|
|
// Go get the starting information out of $winnt$.sif
|
|
//
|
|
OrigVersion[0] = L'0';
|
|
OrigVersion[1] = L'\0';
|
|
GetSystemDirectory(AnswerFile,MAX_PATH);
|
|
pSetupConcatenatePaths(AnswerFile,WINNT_GUI_FILE,MAX_PATH,NULL);
|
|
if( GetPrivateProfileString( WINNT_DATA,
|
|
WINNT_D_WIN32_VER,
|
|
pwNull,
|
|
Answer,
|
|
AnswerBufLen,
|
|
AnswerFile ) ) {
|
|
|
|
if( lstrcmp( pwNull, Answer ) ) {
|
|
|
|
wsprintf( OrigVersion, L"%d", HIWORD(wcstoul( Answer, NULL, 16 )) );
|
|
}
|
|
}
|
|
MyArgs[1] = OrigVersion;
|
|
|
|
|
|
|
|
//
|
|
// Get the new version information.
|
|
//
|
|
wsprintf( NewVersion, L"%d", HIWORD(GetVersion()) );
|
|
MyArgs[0] = NewVersion;
|
|
|
|
|
|
|
|
//
|
|
// See if we're an NT upgrade?
|
|
//
|
|
MessageID = 0;
|
|
if( GetPrivateProfileString( WINNT_DATA,
|
|
WINNT_D_NTUPGRADE,
|
|
pwNo,
|
|
Answer,
|
|
AnswerBufLen,
|
|
AnswerFile ) ) {
|
|
if( !lstrcmp( pwYes, Answer ) ) {
|
|
|
|
MessageID = MSG_NTUPGRADE_SUCCESS;
|
|
MyArgCount = 2;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// See if we're a Win9X upgrade.
|
|
//
|
|
if( (!MessageID) &&
|
|
GetPrivateProfileString( WINNT_DATA,
|
|
WINNT_D_WIN95UPGRADE,
|
|
pwNo,
|
|
Answer,
|
|
AnswerBufLen,
|
|
AnswerFile ) ) {
|
|
if( !lstrcmp( pwYes, Answer ) ) {
|
|
|
|
MessageID = MSG_WIN9XUPGRADE_SUCCESS;
|
|
MyArgCount = 2;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Clean install.
|
|
//
|
|
if( (!MessageID) ) {
|
|
MessageID = MSG_CLEANINSTALL_SUCCESS;
|
|
MyArgCount = 1;
|
|
}
|
|
|
|
|
|
//
|
|
// If this is anything but an NT upgrade, then
|
|
// we need to go try and manually start the eventlog
|
|
// service.
|
|
//
|
|
if( MessageID != MSG_NTUPGRADE_SUCCESS ) {
|
|
SetupStartService( L"Eventlog", TRUE );
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Get a handle to the eventlog.
|
|
//
|
|
hEventSrc = RegisterEventSource( NULL, L"Setup" );
|
|
|
|
if( (hEventSrc == NULL) ||
|
|
(hEventSrc == INVALID_HANDLE_VALUE) ) {
|
|
|
|
//
|
|
// Fail quietly.
|
|
//
|
|
return;
|
|
}
|
|
|
|
|
|
//
|
|
// Log event message for failure of SceSetupRootSecurity
|
|
//
|
|
if( !bSceSetupRootSecurityComplete) {
|
|
ErrorArgs[0] = L"%windir%";
|
|
ReportEvent( hEventSrc,
|
|
EVENTLOG_WARNING_TYPE,
|
|
0,
|
|
MSG_LOG_SCE_SETUPROOT_ERROR,
|
|
NULL,
|
|
1,
|
|
0,
|
|
ErrorArgs,
|
|
NULL );
|
|
}
|
|
|
|
//
|
|
// Log event if there were errors during Setup.
|
|
//
|
|
if ( !IsErrorLogEmpty() ) {
|
|
ReportEvent( hEventSrc,
|
|
EVENTLOG_ERROR_TYPE,
|
|
0,
|
|
MSG_NONFATAL_ERRORS,
|
|
NULL,
|
|
0,
|
|
0,
|
|
NULL,
|
|
NULL );
|
|
}
|
|
|
|
//
|
|
// Build the event log message.
|
|
//
|
|
ReportEvent( hEventSrc,
|
|
EVENTLOG_INFORMATION_TYPE,
|
|
0,
|
|
MessageID,
|
|
NULL,
|
|
MyArgCount,
|
|
0,
|
|
MyArgs,
|
|
NULL );
|
|
|
|
|
|
DeregisterEventSource( hEventSrc );
|
|
|
|
|
|
}
|
|
|
|
BOOL
|
|
IsEncryptedAdminPasswordPresent( VOID )
|
|
{
|
|
|
|
#define MD4HASHLEN ((2*(LM_OWF_PASSWORD_LENGTH + NT_OWF_PASSWORD_LENGTH))+2)
|
|
WCHAR AnswerFile[MAX_PATH+2];
|
|
WCHAR Answer[MD4HASHLEN];
|
|
|
|
//
|
|
// Get EncryptedAdminPassword from the Answer file
|
|
//
|
|
GetSystemDirectory(AnswerFile,MAX_PATH);
|
|
pSetupConcatenatePaths(AnswerFile,WINNT_GUI_FILE,MAX_PATH,NULL);
|
|
|
|
if( GetPrivateProfileString( WINNT_GUIUNATTENDED,
|
|
WINNT_US_ENCRYPTEDADMINPASS,
|
|
pwNull,
|
|
Answer,
|
|
MD4HASHLEN,
|
|
AnswerFile ) ) {
|
|
|
|
//
|
|
// See if we have an encrypted password. Now interpret the Admin Password differently
|
|
//
|
|
|
|
if( !lstrcmpi( WINNT_A_YES, Answer ) )
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
BOOL
|
|
ProcessEncryptedAdminPassword( PCWSTR AdminAccountName )
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine looks in the unattend file to see if there is an encrypted password and if present
|
|
sets the admin password to that.
|
|
|
|
Arguments:
|
|
|
|
AdminAccountName - Name of the administrator account whose password you want to set.
|
|
|
|
|
|
Returns:
|
|
|
|
Returns TRUE if it succeeds, FALSE on failure
|
|
|
|
--*/
|
|
|
|
{
|
|
|
|
#define MD4HASHLEN ((2*(LM_OWF_PASSWORD_LENGTH + NT_OWF_PASSWORD_LENGTH))+2)
|
|
WCHAR AnswerFile[MAX_PATH+2];
|
|
WCHAR Answer[MD4HASHLEN];
|
|
DWORD Err = NO_ERROR;
|
|
WCHAR adminName[MAX_USERNAME+1];
|
|
BOOLEAN ret = FALSE;
|
|
|
|
//
|
|
// Pickup the answer file.
|
|
//
|
|
GetSystemDirectory(AnswerFile,MAX_PATH);
|
|
pSetupConcatenatePaths(AnswerFile,WINNT_GUI_FILE,MAX_PATH,NULL);
|
|
|
|
|
|
//
|
|
// we look for the following keys in the [GUIUnattended] section:
|
|
//
|
|
|
|
//
|
|
// EncryptedAdminPassword = Yes | No
|
|
// AdminPassword = <MD4 Hash value>
|
|
//
|
|
|
|
|
|
if( IsEncryptedAdminPasswordPresent() ) {
|
|
|
|
|
|
//Fetch the Encrypted Admin Password
|
|
|
|
if( GetPrivateProfileString( WINNT_GUIUNATTENDED,
|
|
WINNT_US_ADMINPASS,
|
|
pwNull,
|
|
Answer,
|
|
MD4HASHLEN,
|
|
AnswerFile ) == (MD4HASHLEN-2) ) {
|
|
|
|
Err = SetLocalUserEncryptedPassword( AdminAccountName, L"", FALSE, Answer, TRUE );
|
|
|
|
if( Err == ERROR_SUCCESS) {
|
|
ret = TRUE;
|
|
}else{
|
|
|
|
//Log the error - MSG_LOG_CHANGING_ENCRYPT_PW_FAIL
|
|
|
|
SetuplogError(
|
|
LogSevWarning,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_CHANGING_ENCRYPT_PW_FAIL,
|
|
AdminAccountName, NULL,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_X_PARAM_RETURNED_WINERR,
|
|
L"SetLocalUserEncryptedPassword",
|
|
Err,
|
|
AdminAccountName,
|
|
NULL,NULL);
|
|
|
|
}
|
|
|
|
|
|
}else{
|
|
|
|
//Log that we had a bad encrypted password
|
|
|
|
SetuplogError(
|
|
LogSevError,
|
|
SETUPLOG_USE_MESSAGEID,
|
|
MSG_LOG_BAD_UNATTEND_PARAM,
|
|
WINNT_US_ADMINPASS,
|
|
WINNT_GUIUNATTENDED,
|
|
NULL,NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
|
|
}
|
|
|
|
|
|
BOOL
|
|
FileExists(
|
|
IN PCTSTR FileName,
|
|
OUT PWIN32_FIND_DATA FindData OPTIONAL
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Determine if a file exists and is accessible.
|
|
Errormode is set (and then restored) so the user will not see
|
|
any pop-ups.
|
|
|
|
Arguments:
|
|
|
|
FileName - supplies full path of file to check for existance.
|
|
|
|
FindData - if specified, receives find data for the file.
|
|
|
|
Return Value:
|
|
|
|
TRUE if the file exists and is accessible.
|
|
FALSE if not. GetLastError() returns extended error info.
|
|
|
|
--*/
|
|
|
|
{
|
|
WIN32_FIND_DATA findData;
|
|
HANDLE FindHandle;
|
|
UINT OldMode;
|
|
DWORD Error;
|
|
|
|
OldMode = SetErrorMode(SEM_FAILCRITICALERRORS);
|
|
|
|
FindHandle = FindFirstFile(FileName,&findData);
|
|
if(FindHandle == INVALID_HANDLE_VALUE) {
|
|
Error = GetLastError();
|
|
} else {
|
|
FindClose(FindHandle);
|
|
if(FindData) {
|
|
*FindData = findData;
|
|
}
|
|
Error = NO_ERROR;
|
|
}
|
|
|
|
SetErrorMode(OldMode);
|
|
|
|
SetLastError(Error);
|
|
return (Error == NO_ERROR);
|
|
}
|
|
|
|
|
|
|
|
BOOL IsSafeMode(
|
|
VOID
|
|
)
|
|
{
|
|
LONG lStatus;
|
|
HKEY hk;
|
|
DWORD dwVal;
|
|
DWORD dwType;
|
|
DWORD dwSize;
|
|
|
|
lStatus = RegOpenKeyExW(HKEY_LOCAL_MACHINE, SAFEBOOT_OPTION_KEY, 0, KEY_QUERY_VALUE, &hk);
|
|
|
|
if(lStatus != ERROR_SUCCESS)
|
|
return FALSE;
|
|
|
|
dwSize = sizeof(dwVal);
|
|
lStatus = RegQueryValueExW(hk, OPTION_VALUE, NULL, &dwType, (LPBYTE) &dwVal, &dwSize);
|
|
RegCloseKey(hk);
|
|
return ERROR_SUCCESS == lStatus && REG_DWORD == dwType && dwVal != 0;
|
|
}
|
|
|
|
|
|
void
|
|
SetupCrashRecovery(
|
|
VOID
|
|
)
|
|
/*
|
|
Setup the Crash Recovery stuff. This is implemented as RTL APIS
|
|
This call sets up the tracking file etc. Crash Recovery tracks boot and
|
|
shutdown and in the event of failures in either it will by default pick the
|
|
right advanced boot option.
|
|
|
|
*/
|
|
{
|
|
|
|
HANDLE BootStatusData;
|
|
NTSTATUS Status;
|
|
BOOLEAN Enabled;
|
|
UCHAR Timeout = 30; //default = 30 sec
|
|
WCHAR Buffer[10];
|
|
PSTR AnsiBuffer;
|
|
int p = 0;
|
|
|
|
//
|
|
// We enable the feature for Pro and Per. On Server SKUs
|
|
// we create the file but don't enable the feature by default.
|
|
//
|
|
|
|
|
|
if( ProductType == PRODUCT_WORKSTATION ){
|
|
Enabled = TRUE;
|
|
}else{
|
|
Enabled = FALSE;
|
|
}
|
|
|
|
//
|
|
// For the fresh install case create the boot status data file
|
|
// and setup the default settings. In the case of an upgrade
|
|
// we will set the previous values if we find them in $winnt$.inf
|
|
// as textmode setup would have stored this away for us. If not we
|
|
// proceed as if we were fresh.
|
|
//
|
|
|
|
|
|
if( Upgrade ){
|
|
|
|
//Look for settings in $winnt$.inf
|
|
|
|
if( SpSetupLoadParameter( WINNT_D_CRASHRECOVERYENABLED, Buffer, sizeof(Buffer)/sizeof(WCHAR))){
|
|
if (_wcsicmp(Buffer, L"NO") == 0) {
|
|
Enabled = FALSE;
|
|
}
|
|
|
|
//
|
|
//We do the below check also as we might have to migrate settings on server SKUs
|
|
//that have this enabled. By default they are disabled.
|
|
//
|
|
|
|
if (_wcsicmp(Buffer, L"YES") == 0) {
|
|
Enabled = TRUE;
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
Status = RtlLockBootStatusData( &BootStatusData );
|
|
|
|
// This is the first time or there was no file. Create it
|
|
|
|
if( !NT_SUCCESS( Status )){
|
|
Status = RtlCreateBootStatusDataFile();
|
|
|
|
if( !NT_SUCCESS( Status )){
|
|
SetuplogError(
|
|
LogSevWarning,
|
|
L"Setup: (non-critical error) Could not lock the Crash Recovery status file - (%1!x!)\n",
|
|
0,Status,NULL,NULL);
|
|
return;
|
|
}
|
|
|
|
//Lock the file
|
|
|
|
Status = RtlLockBootStatusData( &BootStatusData );
|
|
if( !NT_SUCCESS( Status )){
|
|
SetupDebugPrint1( L"Setup: (non-critical error) Could not lock the Crash Recovery status file - (%x)\n", Status );
|
|
return;
|
|
}
|
|
|
|
Status = RtlGetSetBootStatusData(
|
|
BootStatusData,
|
|
FALSE,
|
|
RtlBsdItemAabTimeout,
|
|
&Timeout,
|
|
sizeof(UCHAR),
|
|
NULL
|
|
);
|
|
|
|
if( !NT_SUCCESS( Status )){
|
|
SetupDebugPrint1( L"Setup: (non-critical error) Could not set the Crash Recovery timeout - (%x)\n", Status );
|
|
goto SCR_done;
|
|
}
|
|
|
|
|
|
}
|
|
|
|
Status = RtlGetSetBootStatusData(
|
|
BootStatusData,
|
|
FALSE,
|
|
RtlBsdItemAabEnabled,
|
|
&Enabled,
|
|
sizeof(BOOLEAN),
|
|
NULL
|
|
);
|
|
|
|
if( !NT_SUCCESS( Status )){
|
|
SetupDebugPrint1( L"Setup: (non-critical error) Could not enable Crash Recovery - (%x)\n", Status );
|
|
}
|
|
|
|
SCR_done:
|
|
|
|
RtlUnlockBootStatusData( BootStatusData );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
DWORD
|
|
BuildFileListFromDir(
|
|
IN PCTSTR PathBase,
|
|
IN PCTSTR Directory OPTIONAL,
|
|
IN DWORD MustHaveAttrs OPTIONAL,
|
|
IN DWORD MustNotHaveAttrs OPTIONAL,
|
|
IN PFN_BUILD_FILE_LIST_CALLBACK Callback OPTIONAL,
|
|
OUT PLIST_ENTRY ListHead
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Builds a linked list containing the names (without path) of files present in a specified directory.
|
|
The files must meed a set of conditions as specified by the arguments.
|
|
|
|
Arguments:
|
|
|
|
PathBase - The path to the directory to enumerate files in.
|
|
Directory - If not NULL or empty, it is appended to PathBase to form a complete path to the directory.
|
|
MustHaveAttrs - A set of attributes a file must have to be included on the list.
|
|
MustNotHaveAttrs - A set of attributes a file must not have to be included on the list.
|
|
Callback - If not NULL, this function will be called and the file will be included on the list only
|
|
if it returns TRUE.
|
|
ListHead - Pointer to the head of the list to be filled in.
|
|
|
|
Return value:
|
|
|
|
ERROR_SUCCESS on success, otherwise a Win32 error code. The list may not be empty even if the function fails; the caller
|
|
must always empty the list.
|
|
|
|
--*/
|
|
{
|
|
DWORD Error = ERROR_SUCCESS;
|
|
HANDLE hFind = INVALID_HANDLE_VALUE;
|
|
PTSTR szPath = NULL;
|
|
WIN32_FIND_DATA fd;
|
|
|
|
if(ListHead != NULL) {
|
|
InitializeListHead(ListHead);
|
|
}
|
|
|
|
if(NULL == PathBase || 0 == PathBase[0] || NULL == ListHead) {
|
|
Error = ERROR_INVALID_PARAMETER;
|
|
goto exit;
|
|
}
|
|
|
|
szPath = (PTSTR) MyMalloc(MAX_PATH * sizeof(TCHAR));
|
|
|
|
if(NULL == szPath) {
|
|
Error = ERROR_NOT_ENOUGH_MEMORY;
|
|
goto exit;
|
|
}
|
|
|
|
_tcsncpy(szPath, PathBase, MAX_PATH - 1);
|
|
szPath[MAX_PATH - 1] = 0;
|
|
|
|
if(Directory != NULL && Directory[0] != 0) {
|
|
pSetupConcatenatePaths(szPath, Directory, MAX_PATH, NULL);
|
|
}
|
|
|
|
if(!pSetupConcatenatePaths(szPath, TEXT("\\*"), MAX_PATH, NULL)) {
|
|
Error = ERROR_BAD_PATHNAME;
|
|
goto exit;
|
|
}
|
|
|
|
hFind = FindFirstFile(szPath, &fd);
|
|
|
|
if(INVALID_HANDLE_VALUE == hFind) {
|
|
Error = GetLastError();
|
|
|
|
if(ERROR_FILE_NOT_FOUND == Error || ERROR_PATH_NOT_FOUND == Error) {
|
|
Error = ERROR_SUCCESS;
|
|
}
|
|
|
|
goto exit;
|
|
}
|
|
|
|
//
|
|
// We might need the dir later
|
|
//
|
|
(_tcsrchr(szPath, L'\\'))[0] = 0;
|
|
|
|
do {
|
|
if(_tcscmp(fd.cFileName, _T(".")) != 0 &&
|
|
_tcscmp(fd.cFileName, _T("..")) != 0 &&
|
|
(MustHaveAttrs & fd.dwFileAttributes) == MustHaveAttrs &&
|
|
0 == (MustNotHaveAttrs & fd.dwFileAttributes) &&
|
|
(NULL == Callback || Callback(szPath, fd.cFileName))) {
|
|
|
|
ULONG uLen;
|
|
PSTRING_LIST_ENTRY pElem = (PSTRING_LIST_ENTRY) MyMalloc(sizeof(STRING_LIST_ENTRY));
|
|
|
|
if(NULL == pElem) {
|
|
Error = ERROR_NOT_ENOUGH_MEMORY;
|
|
goto exit;
|
|
}
|
|
|
|
uLen = (_tcslen(fd.cFileName) + 1) * sizeof(TCHAR);
|
|
pElem->String = (PTSTR) MyMalloc(uLen);
|
|
|
|
if(NULL == pElem->String) {
|
|
MyFree(pElem);
|
|
Error = ERROR_NOT_ENOUGH_MEMORY;
|
|
goto exit;
|
|
}
|
|
|
|
RtlCopyMemory(pElem->String, fd.cFileName, uLen);
|
|
InsertTailList(ListHead, &pElem->Entry);
|
|
}
|
|
}
|
|
while(FindNextFile(hFind, &fd));
|
|
|
|
Error = GetLastError();
|
|
|
|
if(ERROR_NO_MORE_FILES == Error) {
|
|
Error = ERROR_SUCCESS;
|
|
}
|
|
|
|
exit:
|
|
if(hFind != INVALID_HANDLE_VALUE) {
|
|
FindClose(hFind);
|
|
}
|
|
|
|
if(szPath != NULL) {
|
|
MyFree(szPath);
|
|
}
|
|
|
|
return Error;
|
|
}
|
|
|
|
PSTRING_LIST_ENTRY
|
|
SearchStringInList(
|
|
IN PLIST_ENTRY ListHead,
|
|
IN PCTSTR String,
|
|
BOOL CaseSensitive
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine searches for a string in a string list. The string can be NULL or empty, in which
|
|
case the function returns the first entry in the list with a NULL or empty string.
|
|
|
|
Arguments:
|
|
|
|
ListHead - Pointer to the head of the list to be searched.
|
|
String - Specifies the string to search for.
|
|
CaseSensitive - If TRUE, the search will be case sensitive.
|
|
|
|
Return value:
|
|
|
|
A pointer to the first entry containing the string, if found, or NULL otherwise.
|
|
|
|
--*/
|
|
{
|
|
if(ListHead != NULL)
|
|
{
|
|
PLIST_ENTRY pEntry;
|
|
ULONG uLen1 = (String != NULL ? _tcslen(String) : 0);
|
|
|
|
for(pEntry = ListHead->Flink; pEntry != ListHead; pEntry = pEntry->Flink) {
|
|
PSTRING_LIST_ENTRY pStringEntry;
|
|
ULONG uLen2;
|
|
pStringEntry = CONTAINING_RECORD(pEntry, STRING_LIST_ENTRY, Entry);
|
|
uLen2 = (pStringEntry->String != NULL ? _tcslen(pStringEntry->String) : 0);
|
|
|
|
if(uLen1 == uLen2) {
|
|
if(0 == uLen1 || 0 == (CaseSensitive ? _tcscmp : _tcsicmp)(String, pStringEntry->String)) {
|
|
return pStringEntry;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
DWORD
|
|
LookupCatalogAttribute(
|
|
IN PCWSTR CatalogName,
|
|
IN PCWSTR Directory OPTIONAL,
|
|
IN PCWSTR AttributeName OPTIONAL,
|
|
IN PCWSTR AttributeValue OPTIONAL,
|
|
PBOOL Found
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function searches if a catalog has the specified attribute with the specified value.
|
|
|
|
Arguments:
|
|
|
|
CatalogName - Name of the catalog to search. A path can be specified.
|
|
Directory - If specified, it is prepended to CatalogName to form the path to the catalog.
|
|
AttributeName - See AttributeValue.
|
|
AttributeValue - If AttributeName and AttributeValue are not specified, the catalog meets the condition.
|
|
If AttributeName is specified and AttributeValue isn't, the catalog meets the condition if
|
|
it contains an attribute with AttributeName name and any value. If AttributeName is not
|
|
specified and AttributeValue is, the catalog meets the condition if it contains an attribute
|
|
with AttributeValue value and any name. If both AttributeName and AttributeValue are
|
|
specified, the catalog meets the condition if it contains an attribute with AttributeName name
|
|
and AttributeValue value.
|
|
Found - Pointer to a variable that receives TRUE if the catalog meets the condition, or FALSE otherwise.
|
|
|
|
Return value:
|
|
|
|
ERROR_SUCCESS if successful, otherwise a Win32 error code.
|
|
|
|
--*/
|
|
{
|
|
DWORD Error = ERROR_SUCCESS;
|
|
HANDLE hCat = INVALID_HANDLE_VALUE;
|
|
PWSTR szCatPath = NULL;
|
|
CRYPTCATATTRIBUTE* pAttr;
|
|
|
|
if(Found != NULL) {
|
|
*Found = FALSE;
|
|
}
|
|
|
|
if(NULL == CatalogName || 0 == CatalogName[0] || NULL == Found) {
|
|
Error = ERROR_INVALID_PARAMETER;
|
|
goto exit;
|
|
}
|
|
|
|
if(Directory != NULL && Directory[0] != 0) {
|
|
szCatPath = MyMalloc(MAX_PATH * sizeof(WCHAR));
|
|
|
|
if(NULL == szCatPath) {
|
|
Error = ERROR_NOT_ENOUGH_MEMORY;
|
|
goto exit;
|
|
}
|
|
|
|
_tcsncpy(szCatPath, Directory, MAX_PATH - 1);
|
|
szCatPath[MAX_PATH - 1] = 0;
|
|
pSetupConcatenatePaths(szCatPath, CatalogName, MAX_PATH, NULL);
|
|
CatalogName = szCatPath;
|
|
}
|
|
|
|
//
|
|
// This is easier to test
|
|
//
|
|
if(AttributeName != NULL && 0 == AttributeName[0]) {
|
|
AttributeName = NULL;
|
|
}
|
|
|
|
if(AttributeValue != NULL && 0 == AttributeValue[0]) {
|
|
AttributeValue = NULL;
|
|
}
|
|
|
|
if(NULL == AttributeName && NULL == AttributeValue) {
|
|
//
|
|
// If attribute name and value are not specified, any catalog is a match
|
|
//
|
|
*Found = TRUE;
|
|
goto exit;
|
|
}
|
|
|
|
hCat = CryptCATOpen((PWSTR) CatalogName, CRYPTCAT_OPEN_EXISTING, 0, 0, 0);
|
|
|
|
if(INVALID_HANDLE_VALUE == hCat) {
|
|
Error = GetLastError();
|
|
goto exit;
|
|
}
|
|
|
|
pAttr = CryptCATEnumerateCatAttr(hCat, NULL);
|
|
|
|
while(pAttr != NULL) {
|
|
*Found = (NULL == AttributeName || 0 == _wcsicmp(AttributeName, pAttr->pwszReferenceTag)) &&
|
|
(NULL == AttributeValue || 0 == _wcsicmp(AttributeName, (PCWSTR) pAttr->pbValue));
|
|
|
|
if(*Found) {
|
|
goto exit;
|
|
}
|
|
|
|
pAttr = CryptCATEnumerateCatAttr(hCat, pAttr);
|
|
}
|
|
|
|
Error = GetLastError();
|
|
|
|
if(CRYPT_E_NOT_FOUND == Error) {
|
|
Error = ERROR_SUCCESS;
|
|
}
|
|
|
|
exit:
|
|
if(szCatPath != NULL) {
|
|
MyFree(szCatPath);
|
|
}
|
|
|
|
if(hCat != INVALID_HANDLE_VALUE) {
|
|
CryptCATClose(hCat);
|
|
}
|
|
|
|
return Error;
|
|
}
|