mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1181 lines
37 KiB
1181 lines
37 KiB
/*==========================================================================;
|
|
*
|
|
* Copyright (C) 1994-1997 Microsoft Corporation. All Rights Reserved.
|
|
*
|
|
* File: drvinfo.c
|
|
* Content: DirectDraw driver info implementation
|
|
*@@BEGIN_MSINTERNAL
|
|
* History:
|
|
* Date By Reason
|
|
* ==== == ======
|
|
* 17-jun-98 jeffno initial implementation, after michael lyons and toddla
|
|
* 14-jun-99 mregen return WHQL certification level -- postponed
|
|
*@@END_MSINTERNAL
|
|
*
|
|
***************************************************************************/
|
|
|
|
#include "ddrawpr.h"
|
|
|
|
#include <tchar.h>
|
|
#include <stdio.h>
|
|
#include <wincrypt.h>
|
|
#include <wintrust.h>
|
|
#include <softpub.h>
|
|
#include <mscat.h>
|
|
|
|
|
|
|
|
//========================================================================
|
|
//
|
|
// just some handy forward declarations
|
|
//
|
|
DWORD GetWHQLLevel(LPTSTR lpszDriver, LPSTR lpszWin9xDriver);
|
|
DWORD IsFileDigitallySigned(LPTSTR lpszDriver);
|
|
BOOL FileIsSignedOld(LPTSTR lpszFile);
|
|
|
|
//
|
|
// These functions are defined in mscat.h. They are not available on win95,
|
|
// so we have to use LoadLibrary to load mscat32.dll and wincrypt.dll
|
|
//
|
|
typedef HCATINFO WINAPI funcCryptCATAdminEnumCatalogFromHash(HCATADMIN hCatAdmin,
|
|
BYTE *pbHash,
|
|
DWORD cbHash,
|
|
DWORD dwFlags,
|
|
HCATINFO *phPrevCatInfo);
|
|
typedef BOOL WINAPI funcCryptCATAdminCalcHashFromFileHandle(HANDLE hFile,
|
|
DWORD *pcbHash,
|
|
BYTE *pbHash,
|
|
DWORD dwFlags);
|
|
typedef HANDLE WINAPI funcCryptCATOpen(LPWSTR pwszFileName,
|
|
DWORD fdwOpenFlags,
|
|
HCRYPTPROV hProv,
|
|
DWORD dwPublicVersion,
|
|
DWORD dwEncodingType);
|
|
typedef BOOL WINAPI funcCryptCATClose(IN HANDLE hCatalog);
|
|
typedef CRYPTCATATTRIBUTE * WINAPI funcCryptCATGetCatAttrInfo(HANDLE hCatalog,
|
|
LPWSTR pwszReferenceTag);
|
|
typedef BOOL WINAPI funcCryptCATAdminAcquireContext(HCATADMIN *phCatAdmin,
|
|
GUID *pgSubsystem,
|
|
DWORD dwFlags);
|
|
typedef BOOL WINAPI funcCryptCATAdminReleaseContext(HCATADMIN hCatAdmin,
|
|
DWORD dwFlags);
|
|
typedef BOOL WINAPI funcCryptCATAdminReleaseCatalogContext(HCATADMIN hCatAdmin,
|
|
HCATINFO hCatInfo,
|
|
DWORD dwFlags);
|
|
typedef BOOL WINAPI funcCryptCATCatalogInfoFromContext(HCATINFO hCatInfo,
|
|
CATALOG_INFO *psCatInfo,
|
|
DWORD dwFlags);
|
|
|
|
typedef CRYPTCATATTRIBUTE * WINAPI funcCryptCATEnumerateCatAttr(HCATINFO hCatalog,
|
|
CRYPTCATATTRIBUTE *lpCat);
|
|
|
|
|
|
//
|
|
// function defined in wincrypt.dll
|
|
//
|
|
typedef LONG WINAPI funcWinVerifyTrust(HWND hwnd, GUID *pgActionID,
|
|
LPVOID pWVTData);
|
|
|
|
//
|
|
// our storage for the mscat32/wincrypt dll loader
|
|
//
|
|
typedef struct tagCatApi {
|
|
BOOL bInitialized;
|
|
HINSTANCE hLibMSCat;
|
|
HINSTANCE hLibWinTrust;
|
|
HCATADMIN hCatAdmin;
|
|
funcCryptCATClose *pCryptCATClose;
|
|
funcCryptCATGetCatAttrInfo *pCryptCATGetCatAttrInfo;
|
|
funcCryptCATOpen *pCryptCATOpen;
|
|
funcCryptCATAdminEnumCatalogFromHash *pCryptCATAdminEnumCatalogFromHash;
|
|
funcCryptCATAdminCalcHashFromFileHandle *pCryptCATAdminCalcHashFromFileHandle;
|
|
funcCryptCATAdminAcquireContext *pCryptCATAdminAcquireContext;
|
|
funcCryptCATAdminReleaseContext *pCryptCATAdminReleaseContext;
|
|
funcCryptCATAdminReleaseCatalogContext *pCryptCATAdminReleaseCatalogContext;
|
|
funcCryptCATCatalogInfoFromContext *pCryptCATCatalogInfoFromContext;
|
|
funcCryptCATEnumerateCatAttr *pCryptCATEnumerateCatAttr;
|
|
funcWinVerifyTrust *pWinVerifyTrust;
|
|
} CATAPI,* LPCATAPI;
|
|
|
|
//========================================================================
|
|
//
|
|
// some helper functions to open/close crypt API
|
|
//
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "InitCATAPI"
|
|
|
|
|
|
BOOL InitCATAPI(LPCATAPI lpCatApi)
|
|
{
|
|
UINT uiOldErrorMode;
|
|
HINSTANCE hLibMSCat;
|
|
HINSTANCE hLibWinTrust;
|
|
|
|
DDASSERT(lpCatApi!=NULL);
|
|
ZeroMemory(lpCatApi, sizeof(CATAPI));
|
|
|
|
// already initialized by ZeroMemory
|
|
// lpCatApi->bInitialized=FALSE:
|
|
|
|
uiOldErrorMode=SetErrorMode(SEM_NOOPENFILEERRORBOX);
|
|
hLibMSCat=LoadLibrary("mscat32.dll");
|
|
hLibWinTrust=LoadLibrary("wintrust.dll");
|
|
|
|
if (hLibMSCat!=NULL &&
|
|
hLibWinTrust!=NULL)
|
|
{
|
|
lpCatApi->pCryptCATOpen=(funcCryptCATOpen *)
|
|
GetProcAddress (hLibMSCat, "CryptCATOpen");
|
|
lpCatApi->pCryptCATClose=(funcCryptCATClose *)
|
|
GetProcAddress (hLibMSCat, "CryptCATClose");
|
|
lpCatApi->pCryptCATGetCatAttrInfo=(funcCryptCATGetCatAttrInfo *)
|
|
GetProcAddress (hLibMSCat, "CryptCATGetCatAttrInfo");
|
|
lpCatApi->pCryptCATAdminCalcHashFromFileHandle=(funcCryptCATAdminCalcHashFromFileHandle*)
|
|
GetProcAddress (hLibMSCat, "CryptCATAdminCalcHashFromFileHandle");
|
|
lpCatApi->pCryptCATAdminEnumCatalogFromHash=(funcCryptCATAdminEnumCatalogFromHash*)
|
|
GetProcAddress (hLibMSCat, "CryptCATAdminEnumCatalogFromHash");
|
|
lpCatApi->pCryptCATAdminAcquireContext=(funcCryptCATAdminAcquireContext*)
|
|
GetProcAddress (hLibMSCat, "CryptCATAdminAcquireContext");
|
|
lpCatApi->pCryptCATAdminReleaseContext=(funcCryptCATAdminReleaseContext*)
|
|
GetProcAddress (hLibMSCat, "CryptCATAdminReleaseContext");
|
|
lpCatApi->pCryptCATAdminReleaseCatalogContext=(funcCryptCATAdminReleaseCatalogContext*)
|
|
GetProcAddress (hLibMSCat, "CryptCATAdminReleaseCatalogContext");
|
|
lpCatApi->pCryptCATCatalogInfoFromContext=(funcCryptCATCatalogInfoFromContext*)
|
|
GetProcAddress (hLibMSCat, "CryptCATCatalogInfoFromContext");
|
|
lpCatApi->pCryptCATEnumerateCatAttr=(funcCryptCATEnumerateCatAttr*)
|
|
GetProcAddress (hLibMSCat, "CryptCATEnumerateCatAttr");
|
|
lpCatApi->pWinVerifyTrust=(funcWinVerifyTrust*)
|
|
GetProcAddress (hLibWinTrust,"WinVerifyTrust");
|
|
|
|
if (lpCatApi->pCryptCATOpen!=NULL &&
|
|
lpCatApi->pCryptCATClose!=NULL &&
|
|
lpCatApi->pCryptCATGetCatAttrInfo!=NULL &&
|
|
lpCatApi->pCryptCATAdminCalcHashFromFileHandle!=NULL &&
|
|
lpCatApi->pCryptCATAdminEnumCatalogFromHash!=NULL &&
|
|
lpCatApi->pCryptCATAdminAcquireContext!=NULL &&
|
|
lpCatApi->pCryptCATAdminReleaseContext!=NULL &&
|
|
lpCatApi->pCryptCATAdminReleaseCatalogContext!=NULL &&
|
|
lpCatApi->pCryptCATCatalogInfoFromContext!=NULL &&
|
|
lpCatApi->pCryptCATEnumerateCatAttr !=NULL &&
|
|
lpCatApi->pWinVerifyTrust!=NULL
|
|
)
|
|
{
|
|
if ((*lpCatApi->pCryptCATAdminAcquireContext)(&lpCatApi->hCatAdmin,NULL,0))
|
|
{
|
|
lpCatApi->hLibMSCat=hLibMSCat;
|
|
lpCatApi->hLibWinTrust=hLibWinTrust;
|
|
lpCatApi->bInitialized=TRUE;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!lpCatApi->bInitialized)
|
|
{
|
|
FreeLibrary(hLibMSCat);
|
|
FreeLibrary(hLibWinTrust);
|
|
}
|
|
|
|
SetErrorMode(uiOldErrorMode);
|
|
|
|
return lpCatApi->bInitialized;
|
|
}
|
|
|
|
BOOL ReleaseCATAPI(LPCATAPI lpCatApi)
|
|
{
|
|
DDASSERT(lpCatApi!=NULL);
|
|
|
|
if (lpCatApi->bInitialized)
|
|
{
|
|
(*lpCatApi->pCryptCATAdminReleaseContext)(lpCatApi->hCatAdmin, 0);
|
|
|
|
FreeLibrary(lpCatApi->hLibMSCat);
|
|
FreeLibrary(lpCatApi->hLibWinTrust);
|
|
ZeroMemory(lpCatApi, sizeof(CATAPI));
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//========================================================================
|
|
//
|
|
// _strstr
|
|
//
|
|
// String-in-string function, written to avoid RTL inclusion necessity.
|
|
//
|
|
//========================================================================
|
|
char *_strstr(char *s1, char *s2)
|
|
{
|
|
if (s1 && s2)
|
|
{
|
|
while (*s1)
|
|
{
|
|
char *p1=s1;
|
|
char *p2=s2;
|
|
|
|
while (*p2 && (*p1==*p2))
|
|
{
|
|
p1++;
|
|
p2++;
|
|
}
|
|
if (*p2==0)
|
|
return s1;
|
|
|
|
s1++;
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
//***&&*%**!!ing c runtime
|
|
|
|
DWORD _atoi(char * p)
|
|
{
|
|
DWORD dw=0;
|
|
while ((*p >= '0' && *p <= '9') || (*p >= 'A' && *p <= 'F') || (*p >= 'A' && *p <= 'F'))
|
|
{
|
|
dw = dw*16;
|
|
if (*p >= 'a')
|
|
dw += *p-'a' + 10;
|
|
else if (*p >= 'A')
|
|
dw += *p-'A' + 10;
|
|
else
|
|
dw += *p-'0';
|
|
|
|
p++;
|
|
}
|
|
return dw;
|
|
}
|
|
|
|
char *FindLast(char * s, char c)
|
|
{
|
|
char * pFound=0;
|
|
if (s)
|
|
{
|
|
while (*s)
|
|
{
|
|
if (*s == c)
|
|
pFound = s;
|
|
s++;
|
|
}
|
|
}
|
|
return pFound;
|
|
}
|
|
|
|
//========================================================================
|
|
// hard-coded vendor IDs
|
|
//========================================================================
|
|
#define VEN_3DFX "VEN_121A"
|
|
#define VEN_3DFXVOODOO1 "VEN_121A&DEV_0001"
|
|
#define VEN_POWERVR "VEN_1033"
|
|
|
|
#ifdef WIN95
|
|
|
|
void GetFileVersionData (D3DADAPTER_IDENTIFIER8* pDI)
|
|
{
|
|
void * buffer;
|
|
VS_FIXEDFILEINFO * verinfo;
|
|
DWORD dwSize;
|
|
DWORD dwHi,dwLo;
|
|
|
|
//Failure means 0 returned
|
|
pDI->DriverVersion.HighPart = 0;
|
|
pDI->DriverVersion.LowPart = 0;
|
|
|
|
dwSize = GetFileVersionInfoSize (pDI->Driver, 0);
|
|
|
|
if (!dwSize)
|
|
{
|
|
return;
|
|
}
|
|
|
|
buffer=MemAlloc(dwSize);
|
|
if (!buffer)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (!GetFileVersionInfo(pDI->Driver, 0, dwSize, buffer))
|
|
{
|
|
MemFree(buffer);
|
|
return;
|
|
}
|
|
|
|
if (!VerQueryValue(buffer, "\\", (void **)&verinfo, (UINT *)&dwSize))
|
|
{
|
|
MemFree(buffer);
|
|
return;
|
|
}
|
|
|
|
pDI->DriverVersion.HighPart = verinfo->dwFileVersionMS;
|
|
pDI->DriverVersion.LowPart = verinfo->dwFileVersionLS;
|
|
|
|
MemFree(buffer);
|
|
}
|
|
|
|
extern HRESULT _GetDriverInfoFromRegistry(char *szClass, char *szClassNot, char *szVendor, D3DADAPTER_IDENTIFIER8* pDI, char *szDeviceID);
|
|
|
|
/*
|
|
* following are all the 9x-specific version functions
|
|
*/
|
|
void GetHALName(char* pDriverName, D3DADAPTER_IDENTIFIER8* pDI)
|
|
{
|
|
pDI->Driver[0] = '\0';
|
|
D3D8GetHALName(pDriverName, pDI->Driver);
|
|
}
|
|
|
|
|
|
BOOL CheckPowerVR(D3DADAPTER_IDENTIFIER8* pDI)
|
|
{
|
|
#if 0
|
|
BOOL bFound=FALSE;
|
|
HKEY hKey;
|
|
DWORD dwSize;
|
|
DWORD dwType;
|
|
|
|
if (pdrv->dwFlags & DDRAWI_SECONDARYDRIVERLOADED)
|
|
{
|
|
/*
|
|
* Any secondary driver information in the registry at all? (assert this is true)
|
|
*/
|
|
if (ERROR_SUCCESS == RegOpenKey(HKEY_LOCAL_MACHINE,
|
|
REGSTR_PATH_SECONDARY,
|
|
&hKey))
|
|
{
|
|
/*
|
|
* Extract the name of the secondary driver's DLL. (assert this works)
|
|
*/
|
|
dwSize = sizeof(pDI->di.szDriver) - 1;
|
|
if (ERROR_SUCCESS == RegQueryValueEx(hKey,
|
|
REGSTR_VALUE_SECONDARY_DRIVERNAME,
|
|
NULL,
|
|
&dwType,
|
|
pDI->di.szDriver,
|
|
&dwSize))
|
|
{
|
|
if (REG_SZ == dwType)
|
|
{
|
|
GetFileVersionData(pDI);
|
|
}
|
|
}
|
|
RegCloseKey(hKey);
|
|
}
|
|
|
|
if (SUCCEEDED(_GetDriverInfoFromRegistry(NULL, "Display", VEN_POWERVR, pDI)))
|
|
{
|
|
//got PVR data...
|
|
bFound = TRUE;
|
|
}
|
|
}
|
|
return bFound;
|
|
#endif
|
|
return TRUE;
|
|
}
|
|
|
|
HRESULT Check3Dfx (D3DADAPTER_IDENTIFIER8* pDI)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
char szDeviceID[MAX_DDDEVICEID_STRING];
|
|
|
|
if (FAILED(_GetDriverInfoFromRegistry(NULL, "Display", VEN_3DFX, pDI, szDeviceID)))
|
|
{
|
|
DPF_ERR("Couldn't get registry data for this device");
|
|
hr = E_FAIL;
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
HRESULT GetDriverInfoFromRegistry(char *szClass, char *szClassNot, char *szVendor, D3DADAPTER_IDENTIFIER8* pDI, char *szDeviceID)
|
|
{
|
|
return _GetDriverInfoFromRegistry(szClass, szClassNot, szVendor, pDI, szDeviceID);
|
|
}
|
|
|
|
|
|
/*
|
|
* Given a DISPLAY_DEVICE, get driver name
|
|
* NOTE::: THIS FUNCTION NUKES THE DISPLAY_DEVICE.DeviceKey STRING!!!!
|
|
*/
|
|
void GetWin9XDriverName(DISPLAY_DEVICEA * pdd, LPSTR pDrvName)
|
|
{
|
|
HKEY hKey;
|
|
|
|
lstrcat(pdd->DeviceKey, "\\DEFAULT");
|
|
if (ERROR_SUCCESS == RegOpenKeyEx(
|
|
HKEY_LOCAL_MACHINE,
|
|
pdd->DeviceKey,
|
|
0,
|
|
KEY_QUERY_VALUE ,
|
|
&hKey))
|
|
{
|
|
DWORD dwSize = MAX_DDDEVICEID_STRING;
|
|
DWORD dwType = 0;
|
|
|
|
RegQueryValueEx(hKey,
|
|
TEXT("drv"),
|
|
NULL,
|
|
&dwType,
|
|
pDrvName,
|
|
&dwSize);
|
|
|
|
RegCloseKey(hKey);
|
|
}
|
|
}
|
|
|
|
#else //win95
|
|
|
|
|
|
HRESULT Check3Dfx(D3DADAPTER_IDENTIFIER8* pDI)
|
|
{
|
|
return E_FAIL;
|
|
}
|
|
|
|
HRESULT GetDriverInfoFromRegistry(char *szClass, char *szClassNot, char *szVendor, D3DADAPTER_IDENTIFIER8* pDI, char *szDeviceID)
|
|
{
|
|
return E_FAIL;
|
|
}
|
|
|
|
/*
|
|
* Given a DISPLAY_DEVICE, get driver name, assuming winnt5
|
|
* NOTE::: THIS FUNCTION NUKES THE DISPLAY_DEVICE.DeviceKey STRING!!!!
|
|
*/
|
|
void GetNTDriverNameAndVersion(DISPLAY_DEVICEA * pdd, D3DADAPTER_IDENTIFIER8* pDI)
|
|
{
|
|
HKEY hKey;
|
|
void* buffer;
|
|
DWORD dwSize;
|
|
VS_FIXEDFILEINFO* verinfo;
|
|
|
|
//
|
|
// old style to determine display driver...returns name of miniport!
|
|
//
|
|
|
|
char * pTemp;
|
|
|
|
// The device key has the form blah\blah\services\<devicekey>\DeviceN
|
|
// So we back up one node:
|
|
if ((pTemp = FindLast(pdd->DeviceKey,'\\')))
|
|
{
|
|
char * pTempX;
|
|
char cOld=*pTemp;
|
|
*pTemp = 0;
|
|
|
|
//If we back up one node, we'll have the registry key under which the driver is stored. Let's use that!
|
|
if ((pTempX = FindLast(pdd->DeviceKey,'\\')))
|
|
{
|
|
lstrcpyn(pDI->Driver, pTemp+1, sizeof(pDI->Driver));
|
|
//ATTENTION No point getting version data without a filname:
|
|
//We need a new service or something to get the used display driver name
|
|
//GetFileVersionData(pDI);
|
|
}
|
|
|
|
*pTemp=cOld;
|
|
}
|
|
|
|
//
|
|
// we can find the display driver in a registry key
|
|
//
|
|
// note: InstalledDisplayDrivers can contain several entries
|
|
// to display drivers Since there is no way to find out which
|
|
// one is the active one, we always return the first as being
|
|
// the display driver!
|
|
//
|
|
if (ERROR_SUCCESS == RegOpenKeyEx(
|
|
HKEY_LOCAL_MACHINE,
|
|
pdd->DeviceKey+18,
|
|
0,
|
|
KEY_QUERY_VALUE ,
|
|
&hKey))
|
|
{
|
|
DWORD dwSize = sizeof(pDI->Driver);
|
|
DWORD dwType = 0;
|
|
if (ERROR_SUCCESS == RegQueryValueEx(hKey,
|
|
TEXT("InstalledDisplayDrivers"),
|
|
NULL,
|
|
&dwType,
|
|
pDI->Driver,
|
|
&dwSize))
|
|
{
|
|
lstrcat(pDI->Driver, TEXT(".dll"));
|
|
}
|
|
|
|
RegCloseKey(hKey);
|
|
}
|
|
|
|
// We have the name, now get the version
|
|
|
|
pDI->DriverVersion.HighPart = 0;
|
|
pDI->DriverVersion.LowPart = 0;
|
|
|
|
dwSize=GetFileVersionInfoSize(pDI->Driver, 0);
|
|
if (dwSize == 0)
|
|
return;
|
|
|
|
buffer = MemAlloc(dwSize);
|
|
if (buffer == NULL)
|
|
return;
|
|
|
|
if (!GetFileVersionInfo(pDI->Driver, 0, dwSize, buffer))
|
|
{
|
|
MemFree(buffer);
|
|
return;
|
|
}
|
|
|
|
if (!VerQueryValue(buffer, "\\", (void **)&verinfo, (UINT *)&dwSize))
|
|
{
|
|
MemFree(buffer);
|
|
return;
|
|
}
|
|
|
|
pDI->DriverVersion.HighPart = verinfo->dwFileVersionMS;
|
|
pDI->DriverVersion.LowPart = verinfo->dwFileVersionLS;
|
|
|
|
MemFree(buffer);
|
|
}
|
|
#endif //win95
|
|
|
|
|
|
|
|
void GenerateIdentifier(D3DADAPTER_IDENTIFIER8* pDI)
|
|
{
|
|
LPDWORD pdw;
|
|
|
|
CopyMemory(&pDI->DeviceIdentifier, &CLSID_DirectDraw, sizeof(pDI->DeviceIdentifier));
|
|
|
|
//The device IDs get XORed into the whole GUID with the vendor and device ID in the
|
|
//first two DWORDs so they don't get XORed with anything else. This makes it
|
|
DDASSERT(sizeof(GUID) >= 4*sizeof(DWORD));
|
|
pdw = (LPDWORD) &pDI->DeviceIdentifier;
|
|
pdw[0] ^= pDI->VendorId;
|
|
pdw[1] ^= pDI->DeviceId;
|
|
pdw[2] ^= pDI->SubSysId;
|
|
pdw[3] ^= pDI->Revision;
|
|
|
|
// The driver version gets XORed into the last two DWORDs of the GUID:
|
|
pdw[2] ^= pDI->DriverVersion.LowPart;
|
|
pdw[3] ^= pDI->DriverVersion.HighPart;
|
|
}
|
|
|
|
|
|
void ParseDeviceId(D3DADAPTER_IDENTIFIER8* pDI, char *szDeviceID)
|
|
{
|
|
char * p;
|
|
|
|
DPF(5,"Parsing %s",szDeviceID);
|
|
|
|
pDI->VendorId = 0;
|
|
pDI->DeviceId = 0;
|
|
pDI->SubSysId = 0;
|
|
pDI->Revision = 0;
|
|
|
|
if (p =_strstr(szDeviceID, "VEN_"))
|
|
pDI->VendorId = _atoi(p + 4);
|
|
|
|
if (p = _strstr(szDeviceID, "DEV_"))
|
|
pDI->DeviceId = _atoi(p + 4);
|
|
|
|
if (p = _strstr(szDeviceID, "SUBSYS_"))
|
|
pDI->SubSysId = _atoi(p + 7);
|
|
|
|
if (p = _strstr(szDeviceID, "REV_"))
|
|
pDI->Revision = _atoi(p + 4);
|
|
}
|
|
|
|
|
|
|
|
void GetAdapterInfo(char* pDriverName, D3DADAPTER_IDENTIFIER8* pDI, BOOL bDisplayDriver, BOOL bGuidOnly, BOOL bDriverName)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
int n;
|
|
DISPLAY_DEVICEA dd;
|
|
BOOL bFound;
|
|
char szDeviceID[MAX_DDDEVICEID_STRING];
|
|
#ifndef WINNT
|
|
static char szWin9xName[MAX_DDDEVICEID_STRING];
|
|
#endif
|
|
|
|
memset(pDI, 0, sizeof(*pDI));
|
|
szDeviceID[0] = 0;
|
|
#ifndef WINNT
|
|
|
|
// On Win9X, it's pretty expensive to get the driver name, so we
|
|
// only want to get it when we really need it
|
|
|
|
szWin9xName[0] = '\0';
|
|
if (bDriverName)
|
|
{
|
|
GetHALName(pDriverName, pDI);
|
|
GetFileVersionData(pDI);
|
|
}
|
|
#endif
|
|
|
|
// If it's a 3dfx, it's easy
|
|
|
|
if (!bDisplayDriver)
|
|
{
|
|
hr = Check3Dfx(pDI);
|
|
}
|
|
else
|
|
{
|
|
// Not a 3dfx. Next step: Figure out which display device we
|
|
// really are and get description string for it
|
|
|
|
ZeroMemory(&dd, sizeof(dd));
|
|
dd.cb = sizeof(dd);
|
|
|
|
bFound=FALSE;
|
|
|
|
for(n=0; xxxEnumDisplayDevicesA(NULL, n, &dd, 0); n++)
|
|
{
|
|
if (0 == _stricmp(dd.DeviceName, pDriverName))
|
|
{
|
|
// Found the device. Now we can get some data for it.
|
|
|
|
lstrcpyn(pDI->Description, dd.DeviceString, sizeof(pDI->Description));
|
|
lstrcpyn(szDeviceID, dd.DeviceID, sizeof(szDeviceID));
|
|
|
|
bFound = TRUE;
|
|
|
|
#ifdef WINNT
|
|
GetNTDriverNameAndVersion(&dd,pDI);
|
|
#else
|
|
GetWin9XDriverName(&dd, szWin9xName);
|
|
if (pDI->Driver[0] == '\0')
|
|
{
|
|
lstrcpyn(pDI->Driver, szWin9xName, sizeof(pDI->Driver));
|
|
}
|
|
#endif
|
|
|
|
break;
|
|
}
|
|
|
|
ZeroMemory(&dd, sizeof(dd));
|
|
dd.cb = sizeof(dd);
|
|
}
|
|
|
|
if (!bFound)
|
|
{
|
|
// Didn't find it: xxxEnumDisplayDevices failed, i.e. we're on 9x or NT4,
|
|
|
|
if (FAILED(GetDriverInfoFromRegistry("Display", NULL, NULL, pDI, szDeviceID)))
|
|
{
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
ParseDeviceId(pDI, szDeviceID);
|
|
|
|
// Finally, for the primary only, check if a PowerVR is in and functioning
|
|
#if 0
|
|
if (0 == (dwFlags & DDGDI_GETHOSTIDENTIFIER))
|
|
{
|
|
if (IsVGADevice(pdrv->cDriverName) && CheckPowerVR(pDI))
|
|
{
|
|
ParseDeviceId(pDI, szDeviceID);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
// Munge driver version and ID into the identifier GUID.
|
|
|
|
GenerateIdentifier(pDI);
|
|
|
|
// Now get the WHQL level
|
|
|
|
if (!bGuidOnly)
|
|
{
|
|
#ifdef WINNT
|
|
pDI->WHQLLevel = GetWHQLLevel((LPTSTR)pDI->Driver, NULL);
|
|
#else
|
|
pDI->WHQLLevel = GetWHQLLevel((LPTSTR)pDI->Driver, szWin9xName);
|
|
#endif
|
|
}
|
|
else
|
|
{
|
|
pDI->WHQLLevel = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
* Voodoo1GoodToGo
|
|
*
|
|
* The Voodoo 1 driver will succeed the CreateDC call on Voodoo 2, Voodoo 3,
|
|
* or Banshee hardware, but if we use the driver beyond that it will hang
|
|
* the hardware. This is a work around to not enumerate a Voodoo 1
|
|
* driver if the hardware isn't there.
|
|
*
|
|
* To our knowledge, only two guids were ever used to enumerate Voodoo1
|
|
* hardware, so we will look for those guids and assume that anything else
|
|
* doesn't need to be checked.
|
|
*/
|
|
BOOL Voodoo1GoodToGo(GUID * pGuid)
|
|
{
|
|
D3DADAPTER_IDENTIFIER8 DI;
|
|
|
|
if (IsEqualIID(pGuid, &guidVoodoo1A) || IsEqualIID(pGuid, &guidVoodoo1B))
|
|
{
|
|
#ifdef WIN95
|
|
char szDeviceID[MAX_DDDEVICEID_STRING];
|
|
|
|
/*
|
|
* Now search the hardware enum key to see if Voodoo 1 hardware exists
|
|
*/
|
|
if (FAILED(_GetDriverInfoFromRegistry(NULL, "Display", VEN_3DFXVOODOO1, &DI, szDeviceID)))
|
|
{
|
|
return FALSE;
|
|
}
|
|
#else
|
|
return FALSE;
|
|
#endif
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
#ifndef WINNT
|
|
/****************************************************************************
|
|
*
|
|
* FileIsSignedOld
|
|
*
|
|
* find win95 style of signature
|
|
*
|
|
****************************************************************************/
|
|
BOOL FileIsSignedOld(LPTSTR lpszFile)
|
|
{
|
|
typedef struct tagIMAGE_DOS_HEADER // DOS .EXE header
|
|
{
|
|
WORD e_magic; // Magic number
|
|
WORD e_cblp; // Bytes on last page of file
|
|
WORD e_cp; // Pages in file
|
|
WORD e_crlc; // Relocations
|
|
WORD e_cparhdr; // Size of header in paragraphs
|
|
WORD e_minalloc; // Minimum extra paragraphs needed
|
|
WORD e_maxalloc; // Maximum extra paragraphs needed
|
|
WORD e_ss; // Initial (relative) SS value
|
|
WORD e_sp; // Initial SP value
|
|
WORD e_csum; // Checksum
|
|
WORD e_ip; // Initial IP value
|
|
WORD e_cs; // Initial (relative) CS value
|
|
WORD e_lfarlc; // File address of relocation table
|
|
WORD e_ovno; // Overlay number
|
|
WORD e_res[4]; // Reserved words
|
|
WORD e_oemid; // OEM identifier (for e_oeminfo)
|
|
WORD e_oeminfo; // OEM information; e_oemid specific
|
|
WORD e_res2[10]; // Reserved words
|
|
LONG e_lfanew; // File address of new exe header
|
|
} IMAGE_DOS_HEADER, * PIMAGE_DOS_HEADER, FAR* LPIMAGE_DOS_HEADER;
|
|
|
|
typedef struct tagIMAGE_OS2_HEADER // OS/2 .EXE header
|
|
{
|
|
WORD ne_magic; // Magic number
|
|
CHAR ne_ver; // Version number
|
|
CHAR ne_rev; // Revision number
|
|
WORD ne_enttab; // Offset of Entry Table
|
|
WORD ne_cbenttab; // Number of bytes in Entry Table
|
|
LONG ne_crc; // Checksum of whole file
|
|
WORD ne_flags; // Flag word
|
|
WORD ne_autodata; // Automatic data segment number
|
|
WORD ne_heap; // Initial heap allocation
|
|
WORD ne_stack; // Initial stack allocation
|
|
LONG ne_csip; // Initial CS:IP setting
|
|
LONG ne_sssp; // Initial SS:SP setting
|
|
WORD ne_cseg; // Count of file segments
|
|
WORD ne_cmod; // Entries in Module Reference Table
|
|
WORD ne_cbnrestab; // Size of non-resident name table
|
|
WORD ne_segtab; // Offset of Segment Table
|
|
WORD ne_rsrctab; // Offset of Resource Table
|
|
WORD ne_restab; // Offset of resident name table
|
|
WORD ne_modtab; // Offset of Module Reference Table
|
|
WORD ne_imptab; // Offset of Imported Names Table
|
|
LONG ne_nrestab; // Offset of Non-resident Names Table
|
|
WORD ne_cmovent; // Count of movable entries
|
|
WORD ne_align; // Segment alignment shift count
|
|
WORD ne_cres; // Count of resource segments
|
|
BYTE ne_exetyp; // Target Operating system
|
|
BYTE ne_flagsothers; // Other .EXE flags
|
|
WORD ne_pretthunks; // offset to return thunks
|
|
WORD ne_psegrefbytes; // offset to segment ref. bytes
|
|
WORD ne_swaparea; // Minimum code swap area size
|
|
WORD ne_expver; // Expected Windows version number
|
|
} IMAGE_OS2_HEADER, * PIMAGE_OS2_HEADER, FAR* LPIMAGE_OS2_HEADER;
|
|
|
|
typedef struct tagWINSTUB
|
|
{
|
|
IMAGE_DOS_HEADER idh;
|
|
BYTE rgb[14];
|
|
} WINSTUB, * PWINSTUB, FAR* LPWINSTUB;
|
|
|
|
typedef struct tagFILEINFO
|
|
{
|
|
BYTE cbInfo[0x120];
|
|
} FILEINFO, * PFILEINFO, FAR* LPFILEINFO;
|
|
|
|
|
|
FILEINFO fi;
|
|
int nRC;
|
|
LPIMAGE_DOS_HEADER lpmz;
|
|
LPIMAGE_OS2_HEADER lpne;
|
|
BYTE cbInfo[9+32+2];
|
|
BOOL IsSigned = FALSE;
|
|
OFSTRUCT OpenStruct;
|
|
HFILE hFile;
|
|
|
|
static WINSTUB winstub = {
|
|
{
|
|
IMAGE_DOS_SIGNATURE, /* magic */
|
|
0, /* bytes on last page - varies */
|
|
0, /* pages in file - varies */
|
|
0, /* relocations */
|
|
4, /* paragraphs in header */
|
|
1, /* min allocation */
|
|
0xFFFF, /* max allocation */
|
|
0, /* initial SS */
|
|
0xB8, /* initial SP */
|
|
0, /* checksum (ha!) */
|
|
0, /* initial IP */
|
|
0, /* initial CS */
|
|
0x40, /* lfarlc */
|
|
0, /* overlay number */
|
|
{ 0, 0, 0, 0}, /* reserved */
|
|
0, /* oem id */
|
|
0, /* oem info */
|
|
0, /* compiler bug */
|
|
{ 0}, /* reserved */
|
|
0x80, /* lfanew */
|
|
},
|
|
{
|
|
0x0E, 0x1F, 0xBA, 0x0E, 0x00, 0xB4, 0x09, 0xCD,
|
|
0x21, 0xB8, 0x01, 0x4C, 0xCD, 0x21,
|
|
}
|
|
};
|
|
|
|
OpenStruct.cBytes = sizeof(OpenStruct);
|
|
lstrcpyn(OpenStruct.szPathName, lpszFile, OFS_MAXPATHNAME);
|
|
hFile = OpenFile(lpszFile, &OpenStruct, OF_READ);
|
|
if (hFile == HFILE_ERROR)
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
nRC = 0;
|
|
ReadFile((HANDLE) hFile, (LPVOID)&fi, sizeof(FILEINFO), &nRC, NULL);
|
|
if (nRC != sizeof(FILEINFO))
|
|
{
|
|
goto FileIsSigned_exit;
|
|
}
|
|
|
|
lpmz = (LPIMAGE_DOS_HEADER)(&fi);
|
|
lpne = (LPIMAGE_OS2_HEADER)((WORD)&fi + 0x80);
|
|
|
|
winstub.idh.e_cblp = lpmz->e_cblp;
|
|
winstub.idh.e_cp = lpmz->e_cp;
|
|
|
|
if (memcmp(&fi, &winstub, sizeof(winstub)) == 0)
|
|
{
|
|
goto FileIsSigned_exit;
|
|
}
|
|
|
|
memcpy(cbInfo, &((PWINSTUB)(&fi)->cbInfo)->rgb[14], sizeof(cbInfo));
|
|
|
|
if ((cbInfo[4] != ' ') || // space
|
|
(cbInfo[8] != ' ') || // space
|
|
(cbInfo[9+32] != '\n') || // return
|
|
(cbInfo[9+32+1] != '$')) // Dollar Sign
|
|
{
|
|
goto FileIsSigned_exit;
|
|
}
|
|
|
|
cbInfo[4] = 0;
|
|
cbInfo[8] = 0;
|
|
|
|
if ((strcmp((const char*)&cbInfo[0], "Cert") != 0) ||
|
|
(strcmp((const char*)&cbInfo[5], "DX2") != 0))
|
|
{
|
|
goto FileIsSigned_exit;
|
|
}
|
|
|
|
IsSigned=TRUE;
|
|
|
|
FileIsSigned_exit:
|
|
|
|
_lclose(hFile);
|
|
|
|
return IsSigned;
|
|
}
|
|
#endif
|
|
|
|
|
|
/*
|
|
* GetWHQLLevel - On Win95, look for old stamp only. On Win2000, use digital
|
|
* signature only. On Win98, look for old stamp first, then digital signature
|
|
* if no old stamp.
|
|
*
|
|
* return 0 -- unsigned or uncertified
|
|
* return 1 -- driver certified
|
|
* return 1997 -- driver certified, PC97 compliant...
|
|
* return 1998...
|
|
*
|
|
*
|
|
* arguments:
|
|
*
|
|
* lpszDriver----Path of driver file
|
|
*
|
|
*/
|
|
|
|
DWORD GetWHQLLevel(LPTSTR lpszDriver, LPSTR lpszWin9xDriver)
|
|
{
|
|
TCHAR szTmp[MAX_PATH];
|
|
DWORD dwWhqlLevel = 0;
|
|
|
|
// here we should rather call
|
|
if (GetSystemDirectory(szTmp, MAX_PATH-lstrlen(lpszDriver)-2)==0)
|
|
return 0;
|
|
|
|
lstrcat(szTmp, TEXT("\\"));
|
|
lstrcat(szTmp, lpszDriver);
|
|
_tcslwr(szTmp);
|
|
|
|
//
|
|
// Look for a digital signature
|
|
//
|
|
dwWhqlLevel = IsFileDigitallySigned(szTmp);
|
|
if (dwWhqlLevel != 0)
|
|
{
|
|
return dwWhqlLevel;
|
|
}
|
|
|
|
|
|
#ifndef WINNT
|
|
|
|
// It wasn't digitally signed, but it may still have been signed
|
|
// the old way. On Win9X, however, lpszDriver actually contains the
|
|
// 32 bit HAL name rather than the display driver, but we typically only
|
|
// signed the display driver, so we should use lpszWin9xDriver.
|
|
|
|
if (lpszWin9xDriver[0] != '\0')
|
|
{
|
|
GetSystemDirectory(szTmp, MAX_PATH-lstrlen(lpszWin9xDriver)-2);
|
|
lstrcat(szTmp, TEXT("\\"));
|
|
lstrcat(szTmp, lpszWin9xDriver);
|
|
}
|
|
else
|
|
{
|
|
GetSystemDirectory(szTmp, MAX_PATH-lstrlen(lpszDriver)-2);
|
|
lstrcat(szTmp, TEXT("\\"));
|
|
lstrcat(szTmp, lpszDriver);
|
|
}
|
|
|
|
if (FileIsSignedOld(szTmp))
|
|
{
|
|
return 1;
|
|
}
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
DWORD IsFileDigitallySigned(LPTSTR lpszDriver)
|
|
{
|
|
DWORD dwWHQLLevel=0; // default, driver not certified
|
|
CATAPI catapi;
|
|
WCHAR *lpFileName;
|
|
DRIVER_VER_INFO VerInfo;
|
|
TCHAR szBuffer[50];
|
|
LPSTR lpAttr;
|
|
#ifndef UNICODE
|
|
WCHAR wszDriver[MAX_PATH];
|
|
MultiByteToWideChar(CP_ACP, 0, lpszDriver, -1, wszDriver, MAX_PATH);
|
|
lpFileName = wcsrchr(wszDriver, TEXT('\\'));
|
|
if (lpFileName==NULL)
|
|
{
|
|
lpFileName = wszDriver;
|
|
}
|
|
else
|
|
{
|
|
lpFileName++;
|
|
}
|
|
#else
|
|
lpFileName = _tcsrchr(lpszDriver, TEXT('\\'));
|
|
if (lpFileName==NULL) lpFileName = lpszDriver;
|
|
#endif
|
|
|
|
|
|
//
|
|
// try to load and initialize the mscat32.dll and wintrust.dll
|
|
// these dlls are not available on win95
|
|
//
|
|
if (InitCATAPI(&catapi))
|
|
{
|
|
HANDLE hFile;
|
|
DWORD cbHashSize=0;
|
|
BYTE *pbHash;
|
|
BOOL bResult;
|
|
|
|
//
|
|
// create a handle to our driver, because cat api wants handle to file
|
|
//
|
|
hFile = CreateFile(lpszDriver,
|
|
GENERIC_READ,
|
|
FILE_SHARE_READ | FILE_SHARE_WRITE,
|
|
0,
|
|
OPEN_EXISTING,
|
|
FILE_ATTRIBUTE_NORMAL,
|
|
0
|
|
);
|
|
|
|
if (hFile!=INVALID_HANDLE_VALUE)
|
|
{
|
|
// first query hash size...
|
|
bResult=(*catapi.pCryptCATAdminCalcHashFromFileHandle)(hFile,
|
|
&cbHashSize,
|
|
NULL,
|
|
0);
|
|
pbHash=NULL;
|
|
if (bResult)
|
|
{
|
|
// allocate hash
|
|
pbHash = MemAlloc(cbHashSize);
|
|
}
|
|
|
|
if (pbHash!=NULL)
|
|
{
|
|
HCATINFO hPrevCat=NULL;
|
|
HANDLE hCatalog=NULL;
|
|
WINTRUST_DATA WinTrustData;
|
|
WINTRUST_CATALOG_INFO WinTrustCatalogInfo;
|
|
GUID guidSubSystemDriver = DRIVER_ACTION_VERIFY;
|
|
CRYPTCATATTRIBUTE *lpCat = NULL;
|
|
|
|
//
|
|
// Now get the hash for our file
|
|
//
|
|
|
|
bResult=(*catapi.pCryptCATAdminCalcHashFromFileHandle)(hFile,
|
|
&cbHashSize,
|
|
pbHash,
|
|
0);
|
|
|
|
if (bResult)
|
|
{
|
|
hCatalog=(*catapi.pCryptCATAdminEnumCatalogFromHash)(
|
|
catapi.hCatAdmin,
|
|
pbHash,
|
|
cbHashSize,
|
|
0,
|
|
&hPrevCat);
|
|
}
|
|
|
|
//
|
|
// Initialize the structures that
|
|
// will be used later on in calls to WinVerifyTrust.
|
|
//
|
|
ZeroMemory(&WinTrustData, sizeof(WINTRUST_DATA));
|
|
WinTrustData.cbStruct = sizeof(WINTRUST_DATA);
|
|
WinTrustData.dwUIChoice = WTD_UI_NONE;
|
|
WinTrustData.fdwRevocationChecks = WTD_REVOKE_NONE;
|
|
WinTrustData.dwUnionChoice = WTD_CHOICE_CATALOG;
|
|
WinTrustData.dwStateAction = WTD_STATEACTION_AUTO_CACHE;
|
|
WinTrustData.pPolicyCallbackData = (LPVOID)&VerInfo;
|
|
|
|
ZeroMemory(&VerInfo, sizeof(DRIVER_VER_INFO));
|
|
VerInfo.cbStruct = sizeof(DRIVER_VER_INFO);
|
|
|
|
WinTrustData.pCatalog = &WinTrustCatalogInfo;
|
|
|
|
ZeroMemory(&WinTrustCatalogInfo, sizeof(WINTRUST_CATALOG_INFO));
|
|
WinTrustCatalogInfo.cbStruct = sizeof(WINTRUST_CATALOG_INFO);
|
|
WinTrustCatalogInfo.pbCalculatedFileHash = pbHash;
|
|
WinTrustCatalogInfo.cbCalculatedFileHash = cbHashSize;
|
|
WinTrustCatalogInfo.pcwszMemberTag = lpFileName;
|
|
|
|
while (hCatalog)
|
|
{
|
|
CATALOG_INFO CatInfo;
|
|
|
|
ZeroMemory(&CatInfo, sizeof(CATALOG_INFO));
|
|
CatInfo.cbStruct = sizeof(CATALOG_INFO);
|
|
if ((*catapi.pCryptCATCatalogInfoFromContext)(hCatalog, &CatInfo, 0))
|
|
{
|
|
HRESULT hRes;
|
|
|
|
WinTrustCatalogInfo.pcwszCatalogFilePath = CatInfo.wszCatalogFile;
|
|
|
|
// Now verify that the file is an actual member of the catalog.
|
|
hRes = (*catapi.pWinVerifyTrust)
|
|
(NULL, &guidSubSystemDriver, &WinTrustData);
|
|
|
|
if (hRes == ERROR_SUCCESS)
|
|
{
|
|
//
|
|
// Our driver is certified! Now see if the cat
|
|
// info contains the WHQL level
|
|
//
|
|
CRYPTCATATTRIBUTE *lpCat = NULL;
|
|
HANDLE hCat;
|
|
|
|
dwWHQLLevel=1; // return "certified"
|
|
|
|
hCat = (*catapi.pCryptCATOpen)(CatInfo.wszCatalogFile, (DWORD)CRYPTCAT_OPEN_EXISTING, (HCRYPTPROV)NULL, 0, 0);
|
|
lpCat = (*catapi.pCryptCATGetCatAttrInfo) (hCat, L"KV_DISPLAY");
|
|
if (lpCat != NULL)
|
|
{
|
|
WideCharToMultiByte(CP_ACP, 0, (PUSHORT)lpCat->pbValue, -1, szBuffer, 50, NULL, NULL);
|
|
|
|
// The value looks like "1:yyyy-mm-dd".
|
|
|
|
lpAttr = _strstr(szBuffer, ":");
|
|
lpAttr++;
|
|
lpAttr[4] = '\0';
|
|
dwWHQLLevel = atoi(lpAttr) * 0x10000;
|
|
lpAttr[7] = '\0';
|
|
dwWHQLLevel |= atoi(&lpAttr[5]) * 0x100;
|
|
dwWHQLLevel |= atoi(&lpAttr[8]);
|
|
}
|
|
|
|
(*catapi.pCryptCATClose)(hCat);
|
|
break;
|
|
}
|
|
}
|
|
|
|
//
|
|
// iterate through catalogs...
|
|
//
|
|
hPrevCat=hCatalog;
|
|
hCatalog=(*catapi.pCryptCATAdminEnumCatalogFromHash)(
|
|
catapi.hCatAdmin,
|
|
pbHash,
|
|
cbHashSize,
|
|
0,
|
|
&hPrevCat);
|
|
}
|
|
|
|
//
|
|
// we might have to free a catalog context!
|
|
//
|
|
if (hCatalog)
|
|
{
|
|
(*catapi.pCryptCATAdminReleaseCatalogContext)
|
|
(catapi.hCatAdmin, hCatalog, 0);
|
|
}
|
|
|
|
//
|
|
// free hash
|
|
//
|
|
MemFree(pbHash);
|
|
|
|
}
|
|
|
|
CloseHandle(hFile);
|
|
}
|
|
}
|
|
|
|
ReleaseCATAPI(&catapi);
|
|
|
|
return dwWHQLLevel;
|
|
}
|