windows-nt/Source/XPSP1/NT/net/config/netcfg/tcpipcfg/tcpaf.cpp

1026 lines
38 KiB
C++
Raw Normal View History

2020-09-26 03:20:57 -05:00
//+---------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1997.
//
// File: T C P A F . C P P
//
// Contents: TCP/IP answer file processing
//
// Notes:
//
// Author: tongl
//
//----------------------------------------------------------------------------
#include "pch.h"
#pragma hdrstop
#include "tcpipobj.h"
#include "ncsetup.h"
#include "tcpconst.h"
#include "tcperror.h"
#include "tcputil.h"
#include "ncreg.h"
#include "ncperms.h"
#include "afilestr.h"
#include "ipafval.h"
extern const WCHAR c_szAdapterSections[];
BOOL FValidateIpFieldsFromAnswerFile(VSTR & vstrIpAddr, PCWSTR pszValueName,
PCWSTR szAdapterName, BOOL fIsIpAddr = TRUE);
BOOL FValidateAdapterParametersFromAnswerFile(ADAPTER_INFO* pAdapter,
PCWSTR pszAdapterName);
BOOL FValidateGlobalParametersFromAnswerFile(GLOBAL_INFO* pGlobalInfo);
HRESULT HrLoadUnConfigurableParamFromAnswerFile(HINF hinf,
PCWSTR pszSection,
const ValueTypePair * prgVtpParams,
UINT cParams,
HKEY hkeyParam);
HRESULT CTcpipcfg::HrProcessAnswerFile(PCWSTR pszAnswerFile,
PCWSTR pszAnswerSection)
{
HRESULT hr = S_OK;
HRESULT hrTmp = S_OK;
CSetupInfFile caf; // Class to process answer file
AssertSz(pszAnswerFile, "Answer file string is NULL!");
AssertSz(pszAnswerSection, "Answer file sections string is NULL!");
// Open the answer file.
hr = caf.HrOpen(pszAnswerFile, NULL, INF_STYLE_OLDNT | INF_STYLE_WIN4, NULL);
if (SUCCEEDED(hr))
{
hrTmp = HrLoadGlobalParamFromAnswerFile(caf.Hinf(), pszAnswerSection);
if (SUCCEEDED(hr))
hr = hrTmp;
// Get the adapter specific Tcpip and NetBT parameters
WCHAR * mszAdapterList;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc(caf.Hinf(),
pszAnswerSection,
c_szAdapterSections,
&mszAdapterList);
if (SUCCEEDED(hrTmp))
{
hrTmp = HrLoadAdapterParameterFromAnswerFile(caf.Hinf(),
mszAdapterList);
delete [] mszAdapterList;
}
if (SUCCEEDED(hr))
hr = hrTmp;
caf.Close();
}
TraceErrorOptional("CTcpipcfg::HrProcessAnswerFile", hr,
SPAPI_E_LINE_NOT_FOUND == hr);
// Mask the errors since we will be using the defaults
if FAILED(hr)
hr = S_OK;
return hr;
}
// Load Global parameters from answerfile to memory structure
HRESULT CTcpipcfg::HrLoadGlobalParamFromAnswerFile(HINF hinf,
PCWSTR pszTcpipMainSection)
{
HRESULT hr = S_OK;
HRESULT hrTmp;
BOOL fTmp;
DWORD dwTmp;
hr = m_glbGlobalInfo.HrSetDefaults();
if SUCCEEDED(hr)
{
// $REVIEW(tongl 3/22/98): per Stuart Kwan, I'm reading global
// DNS server list just for the upgrade case
// DNSDomain -> m_strDnsDomain
tstring strDnsDomain;
hrTmp = HrSetupGetFirstString( hinf,
pszTcpipMainSection,
c_szAfDnsDomain,
&strDnsDomain);
if SUCCEEDED(hrTmp)
{
m_fUpgradeGlobalDnsDomain = TRUE;
if (!strDnsDomain.empty())
{
DNS_STATUS status;
status = DnsValidateName(strDnsDomain.c_str(), DnsNameDomain);
//validate the global dns domain name
if (ERROR_INVALID_NAME == status ||
DNS_ERROR_INVALID_NAME_CHAR == status)
{
WriteTcpSetupErrorLog(IDS_TCP_AF_INVALID_GLOBAL_DNS_DOMAIN, strDnsDomain.c_str());
m_fUpgradeGlobalDnsDomain = FALSE;
}
}
if (m_fUpgradeGlobalDnsDomain)
m_strUpgradeGlobalDnsDomain = strDnsDomain;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadGlobalParameterFromAnswerFile: DNSDomain", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// DNSHostName -> m_strHostNameFromAnswerFile
hrTmp = HrSetupGetFirstString(hinf,
pszTcpipMainSection,
c_szAfDnsHostname,
&m_glbGlobalInfo.m_strHostNameFromAnswerFile);
if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadGlobalParamFromAnswerFile: DNSHostName", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// DNSSuffixSearchOrder -> m_strSearchList
WCHAR * mszSearchList;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc( hinf,
pszTcpipMainSection,
c_szAfDnsSuffixSearchOrder,
&mszSearchList);
if SUCCEEDED(hrTmp)
{
MultiSzToColString( mszSearchList,
&m_glbGlobalInfo.m_vstrDnsSuffixList);
delete [] mszSearchList;
}
if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadGlobalParamFromAnswerFile: DNSSuffixSearchOrder", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// EnableLMHosts -> m_fEnableLmHosts
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszTcpipMainSection,
c_szAfEnableLmhosts,
&fTmp);
if SUCCEEDED(hrTmp)
m_glbGlobalInfo.m_fEnableLmHosts = fTmp;
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadGlobalParamFromAnswerFile: EnableLMHosts", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// Per AmritanR, drop the upgrade support of IpEnableRouter to fix bug 345700
// EnableIPForwarding -> m_fEnableRouter (BOOL)
//(nsun 11/03/98) parameters for RRAS during unattended install
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszTcpipMainSection,
c_szAfEnableICMPRedirect,
&fTmp);
if SUCCEEDED(hrTmp)
m_glbGlobalInfo.m_fEnableIcmpRedirect = fTmp;
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadGlobalParamFromAnswerFile: EnableICMPRedirect", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
//(nsun 09/20/99) PerformRouterDiscoveryDefault was removed to fix bug 405636
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszTcpipMainSection,
c_szAfDeadGWDetectDefault,
&fTmp);
if SUCCEEDED(hrTmp)
m_glbGlobalInfo.m_fDeadGWDetectDefault = fTmp;
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadGlobalParamFromAnswerFile: DeadGWDetectDefault", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszTcpipMainSection,
c_szAfDontAddDefaultGatewayDefault,
&fTmp);
if SUCCEEDED(hrTmp)
m_glbGlobalInfo.m_fDontAddDefaultGatewayDefault = fTmp;
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadGlobalParamFromAnswerFile: DontAddDefaultGatewayDefault", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// EnableSecurity -> m_fEnableFiltering
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszTcpipMainSection,
c_szAfEnableSecurity,
&fTmp);
if SUCCEEDED(hrTmp)
m_glbGlobalInfo.m_fEnableFiltering = fTmp;
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadGlobalParamFromAnswerFile: EnableSecurity", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// 8/10/98 nsun: added to support UseDomainNameDevolution value in unattended install
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszTcpipMainSection,
c_szAfUseDomainNameDevolution,
&fTmp);
if SUCCEEDED(hrTmp)
m_glbGlobalInfo.m_fUseDomainNameDevolution = fTmp;
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadGlobalParamFromAnswerFile: UseDomainNameDevolution", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
//$REVIEW (nsun 12/11/98) directly save the unconfigurable parameters
// right after reading it from the answer file.
HKEY hkeyTcpipParam = NULL;
Assert(m_pnccTcpip);
if(m_pnccTcpip)
{
hrTmp = m_pnccTcpip->OpenParamKey(&hkeyTcpipParam);
if (SUCCEEDED(hrTmp))
{
Assert(hkeyTcpipParam);
hrTmp = HrLoadUnConfigurableParamFromAnswerFile(hinf,
pszTcpipMainSection,
rgVtpIp,
sizeof(rgVtpIp)/sizeof(rgVtpIp[0]),
hkeyTcpipParam);
RegSafeCloseKey(hkeyTcpipParam);
}
if (SUCCEEDED(hr))
hr = hrTmp;
}
HKEY hkeyWinsParam = NULL;
Assert(m_pnccWins);
if(m_pnccWins)
{
hrTmp = m_pnccWins->OpenParamKey(&hkeyWinsParam);
if (SUCCEEDED(hrTmp))
{
Assert(hkeyWinsParam);
hrTmp = HrLoadUnConfigurableParamFromAnswerFile(hinf,
pszTcpipMainSection,
rgVtpNetBt,
sizeof(rgVtpNetBt)/sizeof(rgVtpNetBt[0]),
hkeyWinsParam);
RegSafeCloseKey(hkeyWinsParam);
}
if (SUCCEEDED(hr))
hr = hrTmp;
}
if (!FValidateGlobalParametersFromAnswerFile(&m_glbGlobalInfo))
{
TraceError("FValidateGlobalParametersFromAnswerFile() got invalid tcp settings", E_FAIL);
}
}
TraceError("CTcpipcfg::HrLoadGlobalParamFromAnswerFile", hr);
return hr;
}
// Load adapter specific parameters from answerfile to memory structure
HRESULT CTcpipcfg::HrLoadAdapterParameterFromAnswerFile(HINF hinf,
PCWSTR mszTcpipAdapterSections)
{
HRESULT hr = S_OK;
HRESULT hrTmp = S_OK;
HRESULT hrReg = S_OK;
PCWSTR pszAdapterSection = mszTcpipAdapterSections;
tstring strAdapterName;
tstring strInterfaceRegPath;
//$REVIEW (nsun 12/11/98) bug #204145
//directly save the unconfigurable parameters right after reading
//it from the answer file.
HKEY hkeyTcpipParam = NULL;
hrReg = m_pnccTcpip->OpenParamKey(&hkeyTcpipParam);
hr = hrReg;
while (*pszAdapterSection)
{
// Get the card name "SpecificTo = ..."
hrTmp = HrSetupGetFirstString(hinf, pszAdapterSection,
c_szAfSpecificTo, &strAdapterName);
if (SUCCEEDED(hrTmp))
{
GUID guidNetCard;
if (!FGetInstanceGuidOfComponentInAnswerFile(
strAdapterName.c_str(),
m_pnc,
&guidNetCard))
{
TraceTag(ttidError, "FGetInstanceGuidOfComponentInAnswerFile failed to match GUID for adapter %S", strAdapterName.c_str());
// Move to the next card
pszAdapterSection += lstrlenW(pszAdapterSection) + 1;
continue;
}
// Do we already have this adapter in our list ?
ADAPTER_INFO * pAdapterInfo = PAdapterFromInstanceGuid(&guidNetCard);
if (!pAdapterInfo)
{
pAdapterInfo = new ADAPTER_INFO;
if (NULL == pAdapterInfo)
{
hr = E_OUTOFMEMORY;
continue;
}
hrTmp = pAdapterInfo->HrSetDefaults(&guidNetCard, c_szEmpty,
c_szEmpty, c_szEmpty);
if (SUCCEEDED(hrTmp))
{
m_vcardAdapterInfo.push_back(pAdapterInfo);
// Set the flag that we only got this card from answer file,
// not from binding path, i.e. it's not on the binding path yet.
pAdapterInfo->m_fIsFromAnswerFile = TRUE;
}
else
{
delete pAdapterInfo;
pAdapterInfo = NULL;
}
}
if (SUCCEEDED(hrTmp))
{
BOOL fWins;
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszAdapterSection,
c_szAfWins,
&fWins);
if (FAILED(hrTmp))
{
if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParamFormAnswerFile: fWins", hrTmp);
}
else if (fWins)
{
// WinsServerList -> m_vstrWinsServerList
WCHAR * mszWinsServerList;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc(hinf,
pszAdapterSection,
c_szAfWinsServerList,
&mszWinsServerList);
if SUCCEEDED(hrTmp)
{
MultiSzToColString(mszWinsServerList,
&pAdapterInfo->m_vstrWinsServerList);
delete [] mszWinsServerList;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParamFromAnswerFile: WinsServerList", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
}
if (SUCCEEDED(hr))
hr = hrTmp;
// DHCP -> m_fEnableDhcp
BOOL fEnableDhcp;
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszAdapterSection,
c_szAfDhcp,
&fEnableDhcp);
if SUCCEEDED(hrTmp)
pAdapterInfo->m_fEnableDhcp = fEnableDhcp;
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParamFromAnswerFile: DHCP", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// IPAddress -> m_vstrIpAddresses
WCHAR * mszIPAddresses;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc(hinf,
pszAdapterSection,
c_szAfIpaddress,
&mszIPAddresses);
if SUCCEEDED(hrTmp)
{
MultiSzToColString(mszIPAddresses,
&pAdapterInfo->m_vstrIpAddresses);
delete [] mszIPAddresses;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParamFromAnswerFile: IPAddress", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// SubnetMask -> m_vstrSubnetMask
WCHAR * mszSubnetMasks;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc(hinf,
pszAdapterSection,
c_szAfSubnetmask,
&mszSubnetMasks);
if SUCCEEDED(hrTmp)
{
MultiSzToColString(mszSubnetMasks,
&pAdapterInfo->m_vstrSubnetMask);
delete [] mszSubnetMasks;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParamFromAnswerFile: SubnetMask", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// Gateway -> m_vstrDefaultGateway
WCHAR * mszDefaultGateways;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc(hinf,
pszAdapterSection,
c_szAfDefaultGateway,
&mszDefaultGateways);
if (SUCCEEDED(hrTmp))
{
MultiSzToColString(mszDefaultGateways,
&pAdapterInfo->m_vstrDefaultGateway);
delete [] mszDefaultGateways;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParamFromAnswerFile: Gateway", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// DNSDomain -> m_strDnsDomain
tstring strDnsDomain;
hrTmp = HrSetupGetFirstString( hinf,
pszAdapterSection,
c_szAfDnsDomain,
&strDnsDomain);
if SUCCEEDED(hrTmp)
pAdapterInfo->m_strDnsDomain = strDnsDomain;
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParameterFromAnswerFile: DNSDomain", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// DNSServerSearchOrder -> m_vstrDnsServerList
WCHAR * mszDnsServerList;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc(hinf,
pszAdapterSection,
c_szAfDnsServerSearchOrder,
&mszDnsServerList);
if SUCCEEDED(hrTmp)
{
MultiSzToColString(mszDnsServerList,
&pAdapterInfo->m_vstrDnsServerList);
delete [] mszDnsServerList;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParameterFromAnswerFile: DNSServerSearchOrder", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
BOOL fTmp = FALSE;
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszAdapterSection,
c_szAfDisableDynamicUpdate,
&fTmp);
if (SUCCEEDED(hrTmp))
{
pAdapterInfo->m_fDisableDynamicUpdate = fTmp;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError(
"HrLoadAdapterParameterFromAnswerFile: DisableDynamicUpdate",
hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszAdapterSection,
c_szAfEnableAdapterDomainNameRegistration,
&fTmp);
if (SUCCEEDED(hrTmp))
{
pAdapterInfo->m_fEnableNameRegistration = fTmp;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError(
"HrLoadAdapterParameterFromAnswerFile: EnableAdapterDomainNameRegistration",
hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// NetBIOSOptions ->m_dwNetbiosOptions
DWORD dwNetbiosOptions;
hrTmp = HrSetupGetFirstDword(hinf,
pszAdapterSection,
c_szAfNetBIOSOptions,
&dwNetbiosOptions);
if SUCCEEDED(hrTmp)
{
if ((dwNetbiosOptions == c_dwUnsetNetbios) ||
(dwNetbiosOptions == c_dwEnableNetbios) ||
(dwNetbiosOptions == c_dwDisableNetbios))
{
pAdapterInfo->m_dwNetbiosOptions = dwNetbiosOptions;
}
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParameterFromAnswerFile: NetBIOSOptions", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// TcpAllowedPorts -> m_vstrTcpFilterList
WCHAR * mszTcpFilterList;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc(hinf,
pszAdapterSection,
c_szAfTcpAllowedPorts,
&mszTcpFilterList);
if (SUCCEEDED(hrTmp))
{
MultiSzToColString(mszTcpFilterList,
&pAdapterInfo->m_vstrTcpFilterList);
delete [] mszTcpFilterList;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParamFromAnswerFile: TcpAllowedPorts", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// UdpAllowedPorts -> m_vstrUdpFilterList
WCHAR * mszUdpFilterList;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc(hinf,
pszAdapterSection,
c_szAfUdpAllowedPorts,
&mszUdpFilterList);
if (SUCCEEDED(hrTmp))
{
MultiSzToColString(mszUdpFilterList,
&pAdapterInfo->m_vstrUdpFilterList);
delete [] mszUdpFilterList;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParamFromAnswerFile: UdpAllowedPorts", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
// IpAllowedProtocols -> m_vstrIpFilterList
WCHAR * mszIpFilterList;
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc(hinf,
pszAdapterSection,
c_szAfIpAllowedProtocols,
&mszIpFilterList);
if (SUCCEEDED(hrTmp))
{
MultiSzToColString(mszIpFilterList,
&pAdapterInfo->m_vstrIpFilterList);
delete [] mszIpFilterList;
}
else if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
TraceError("HrLoadAdapterParamFromAnswerFile: IpAllowedProtocols", hrTmp);
if (SUCCEEDED(hr))
hr = hrTmp;
//$REVIEW (nsun 12/11/98) bug #204145
//directly save the unconfigurable parameters right after reading
//it from the answer file.
if (SUCCEEDED(hrReg))
{
Assert(hkeyTcpipParam);
HKEY hkeyInterfaceParam = NULL;
strInterfaceRegPath = c_szInterfacesRegKey;
strInterfaceRegPath += L"\\";
WCHAR szGuid [c_cchGuidWithTerm];
StringFromGUID2(guidNetCard, szGuid, c_cchGuidWithTerm);
strInterfaceRegPath += szGuid;
DWORD dwDisposition;
hrTmp = HrRegCreateKeyEx(hkeyTcpipParam, strInterfaceRegPath.c_str(),
REG_OPTION_NON_VOLATILE, KEY_READ_WRITE_DELETE, NULL,
&hkeyInterfaceParam, &dwDisposition);
if( SUCCEEDED(hrTmp))
{
Assert(hkeyInterfaceParam);
hrTmp = HrLoadUnConfigurableParamFromAnswerFile(
hinf,
pszAdapterSection,
rgVtpIpAdapter,
sizeof(rgVtpIpAdapter)/sizeof(rgVtpIpAdapter[0]),
hkeyInterfaceParam
);
RegSafeCloseKey(hkeyInterfaceParam);
}
else
TraceError("HrLoadAdapterParamFromAnswerFile: CreateTcpipParm Reg key", hrTmp);
}
if (SUCCEEDED(hr))
hr = hrTmp;
if (!FValidateAdapterParametersFromAnswerFile(pAdapterInfo, strAdapterName.c_str()))
{
TraceError("FValidateAdapterParameterFromAnswerFile() got invalid tcp settings", E_FAIL);
}
}
}
if (SUCCEEDED(hr))
hr = hrTmp;
// Move to the next card
pszAdapterSection += lstrlenW(pszAdapterSection)+1;
} // end of while loop
if (SUCCEEDED(hrReg))
RegSafeCloseKey(hkeyTcpipParam);
TraceError("CTcpipcfg::HrLoadAdapterParamFromAnswerFile", hr);
return hr;
}
HRESULT HrLoadUnConfigurableParamFromAnswerFile(HINF hinf,
PCWSTR pszSection,
const ValueTypePair * prgVtpParams,
UINT cParams,
HKEY hkeyParam)
{
Assert(prgVtpParams);
HRESULT hr = S_OK;
HRESULT hrTmp = S_OK;
HRESULT hrReg = S_OK;
BOOL fTmp;
DWORD dwTmp;
tstring strTmp;
WCHAR * mszTmp;
for(UINT i = 0; i < cParams; i++)
{
TraceTag(ttidTcpip, "HrLoadUnConfigurableParamFromAnswerFile: configuring '%S'...", prgVtpParams[i].pszValueName);
switch(prgVtpParams[i].dwType)
{
case REG_BOOL:
hrTmp = HrSetupGetFirstStringAsBool(hinf, pszSection,
prgVtpParams[i].pszValueName,
&fTmp);
if (SUCCEEDED(hrTmp))
hrReg = HrRegSetDword(hkeyParam,
prgVtpParams[i].pszValueName,
fTmp);
break;
case REG_DWORD:
hrTmp = HrSetupGetFirstDword(hinf, pszSection,
prgVtpParams[i].pszValueName,
&dwTmp);
if (SUCCEEDED(hrTmp))
hrReg = HrRegSetDword(hkeyParam,
prgVtpParams[i].pszValueName,
dwTmp);
break;
case REG_SZ:
hrTmp = HrSetupGetFirstString(hinf, pszSection,
prgVtpParams[i].pszValueName,
&strTmp);
if (SUCCEEDED(hrTmp))
hrReg = HrRegSetString(hkeyParam,
prgVtpParams[i].pszValueName,
strTmp);
break;
case REG_MULTI_SZ:
hrTmp = HrSetupGetFirstMultiSzFieldWithAlloc( hinf,
pszSection,
prgVtpParams[i].pszValueName,
&mszTmp);
if (SUCCEEDED(hrTmp))
{
hrReg = HrRegSetMultiSz(hkeyParam,
prgVtpParams[i].pszValueName,
mszTmp);
delete [] mszTmp;
}
break;
case REG_FILE:
hrTmp = HrSetupGetFirstString(hinf, pszSection,
prgVtpParams[i].pszValueName,
&strTmp);
if (SUCCEEDED(hrTmp) && (strTmp.length() > 0))
{
DWORD dwDisposition=0;
TOKEN_PRIVILEGES * ptpRestore = NULL;
HKEY hkeyRestore=NULL;
hrReg = HrRegCreateKeyEx(hkeyParam,
prgVtpParams[i].pszValueName,
REG_OPTION_NON_VOLATILE,
KEY_ALL_ACCESS, NULL,
&hkeyRestore, &dwDisposition);
if (S_OK == hr)
{
hrReg = HrEnableAllPrivileges(&ptpRestore);
if (SUCCEEDED(hrReg))
{
TraceTag(ttidTcpip, "HrLoadUnConfigurableParamFromAnswerFile: trying to restore regkey from file '%S'..", strTmp.c_str());
hrReg = HrRegRestoreKey(hkeyRestore, strTmp.c_str(), 0);
(void) HrRestorePrivileges(ptpRestore);
delete [] reinterpret_cast<BYTE *>(ptpRestore);
}
RegCloseKey(hkeyRestore);
}
}
break;
}
if(FAILED(hrTmp))
{
if(hrTmp == SPAPI_E_LINE_NOT_FOUND)
hrTmp = S_OK;
else
{
TraceTag(ttidError,
"HrLoadUnConfigurableParamFromAnswerFile: failed to load %S. hr = %x.",
prgVtpParams[i].pszValueName, hrTmp);
}
}
#ifdef ENABLETRACE
if(FAILED(hrReg))
{
TraceTag(ttidError,
"HrLoadUnConfigurableParamFromAnswerFile: failed to set %S to the registry. hr = %x.",
prgVtpParams[i].pszValueName, hrReg);
}
#endif
if (SUCCEEDED(hr))
hr = hrTmp;
if (SUCCEEDED(hr))
hr = hrReg;
}
TraceError("CTcpipcfg::HrLoadUnConfigurableParamFromAnswerFile", hr);
return hr;
}
BOOL FValidateIpFieldsFromAnswerFile(VSTR & vstrIpAddr, PCTSTR pszValueName,
PCWSTR pszAdapterName, BOOL fIsIpAddr)
{
BOOL fRet = TRUE;
for (VSTR::iterator iter = vstrIpAddr.begin(); iter != vstrIpAddr.end(); iter++)
{
tstring* pstrIpAddr = *iter;
if (!FIsValidIpFields(pstrIpAddr->c_str(), fIsIpAddr))
{
WriteTcpSetupErrorLog(fIsIpAddr ? IDS_TCP_AF_INVALID_IP_FIELDS : IDS_TCP_AF_INVALID_FIELDS,
pszValueName,
pszAdapterName,
pstrIpAddr->c_str());
fRet = FALSE;
}
}
return fRet;
}
BOOL FValidateGlobalParametersFromAnswerFile(GLOBAL_INFO* pGlobalInfo)
{
BOOL fRet = TRUE;
DNS_STATUS status;
if (!pGlobalInfo->m_vstrDnsSuffixList.empty())
{
for (VSTR::iterator iter = pGlobalInfo->m_vstrDnsSuffixList.begin();
iter != pGlobalInfo->m_vstrDnsSuffixList.end(); iter++)
{
status = DnsValidateName((*iter)->c_str(), DnsNameDomain);
if (ERROR_INVALID_NAME == status ||
DNS_ERROR_INVALID_NAME_CHAR == status)
{
WriteTcpSetupErrorLog(IDS_TCP_AF_INVALID_DNS_SUFFIX,
c_szAfDnsSuffixSearchOrder,
(*iter)->c_str());
fRet = FALSE;
}
}
}
if (!fRet)
{
FreeCollectionAndItem(pGlobalInfo->m_vstrDnsSuffixList);
}
return fRet;
}
BOOL FValidateAdapterParametersFromAnswerFile(ADAPTER_INFO* pAdapter, PCWSTR pszAdapterName)
{
BOOL fRet = TRUE;
if (!pAdapter->m_fEnableDhcp)
{
if (!pAdapter->m_vstrIpAddresses.empty())
{
if (!FValidateIpFieldsFromAnswerFile(pAdapter->m_vstrIpAddresses,
c_szAfIpaddress,
pszAdapterName))
{
fRet = FALSE;
}
}
if (!pAdapter->m_vstrSubnetMask.empty())
{
if (!FValidateIpFieldsFromAnswerFile(pAdapter->m_vstrSubnetMask,
c_szAfSubnetmask,
pszAdapterName,
FALSE))
{
fRet = FALSE;
}
}
if (fRet)
{
IP_VALIDATION_ERR err = ValidateIp(pAdapter);
if (err != ERR_NONE)
{
fRet = FALSE;
switch (err)
{
case ERR_INCORRECT_IP:
WriteTcpSetupErrorLog(IDS_TCP_AF_INVALID_SUBNET, pszAdapterName);
break;
case ERR_NO_IP:
WriteTcpSetupErrorLog(IDS_TCP_AF_NO_IP, pszAdapterName);
break;
case ERR_NO_SUBNET:
WriteTcpSetupErrorLog(IDS_TCP_AF_NO_SUBNET, pszAdapterName);
break;
default:
//$REVIEW: we don't want to check other invalid settings at this time
// because the setting maybe is valid in NT4, for example: uncontiguous
// subnet mask
fRet = TRUE;
break;
}
}
}
if (!fRet)
{
//Invalid IP settings in the answer file. Set IP settings back to default
pAdapter->m_fEnableDhcp = TRUE;
FreeCollectionAndItem(pAdapter->m_vstrIpAddresses);
FreeCollectionAndItem(pAdapter->m_vstrSubnetMask);
}
}
if (!pAdapter->m_strDnsDomain.empty())
{
DNS_STATUS status;
status = DnsValidateName(pAdapter->m_strDnsDomain.c_str(), DnsNameDomain);
if (ERROR_INVALID_NAME == status ||
DNS_ERROR_INVALID_NAME_CHAR == status)
{
WriteTcpSetupErrorLog(IDS_TCP_AF_INVALID_DNS_DOMAIN, pszAdapterName);
pAdapter->m_strDnsDomain = c_szEmpty;
fRet = FALSE;
}
}
if (!pAdapter->m_vstrDnsServerList.empty())
{
if (!FValidateIpFieldsFromAnswerFile(pAdapter->m_vstrDnsServerList,
c_szAfDnsServerSearchOrder,
pszAdapterName))
{
FreeCollectionAndItem(pAdapter->m_vstrDnsServerList);
fRet = FALSE;
}
}
if (!pAdapter->m_vstrDefaultGateway.empty())
{
if (!FValidateIpFieldsFromAnswerFile(pAdapter->m_vstrDefaultGateway,
c_szAfDefaultGateway,
pszAdapterName))
{
FreeCollectionAndItem(pAdapter->m_vstrDefaultGateway);
fRet = FALSE;
}
}
if (!pAdapter->m_vstrWinsServerList.empty())
{
if (!FValidateIpFieldsFromAnswerFile(pAdapter->m_vstrWinsServerList,
c_szAfWinsServerList,
pszAdapterName))
{
FreeCollectionAndItem(pAdapter->m_vstrWinsServerList);
fRet = FALSE;
}
}
return fRet;
}