windows-nt/Source/XPSP1/NT/net/config/netcfg/nwclicfg/nwcliinf.cpp

1356 lines
39 KiB
C++
Raw Normal View History

2020-09-26 03:20:57 -05:00
//+---------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1997.
//
// File: N W C L I I N F . C P P
//
// Contents: NetWare client configuration notify object.
// Functionality from old INF
//
// Notes:
//
// Author: jeffspr 24 Jun 1997
//
//----------------------------------------------------------------------------
#include "pch.h"
#pragma hdrstop
#include "lmerr.h"
#include "lmcons.h"
#include "lmserver.h"
#include "ncreg.h"
#include "nwclidef.h"
#include "nwcliobj.h"
extern const WCHAR c_szRegKeyCtlLsa[];
//---[ Constants ]------------------------------------------------------------
const WCHAR c_szConfigDLLName[] = NW_CONFIG_DLL_NAME;
const WCHAR c_szAuthPackageName[] = NW_AUTH_PACKAGE_NAME;
const WCHAR c_szParamOptionKeyPath[] = NW_NWC_PARAM_OPTION_KEY;
const WCHAR c_szParamLogonKeyPath[] = NW_NWC_PARAM_LOGON_KEY;
const WCHAR c_szNwDocGWHelpName[] = L"nwdocgw.hlp";
const WCHAR c_szNwDocGWCNTName[] = L"nwdocgw.cnt";
const WCHAR c_szNwDocHelpName[] = L"nwdoc.hlp";
const WCHAR c_szNwDocCNTName[] = L"nwdoc.cnt";
const DWORD c_dwOptionKeyPermissions = KEY_SET_VALUE | KEY_CREATE_SUB_KEY;
//---[ Prototypes ]-----------------------------------------------------------
// See the function headers for descriptions
//
HRESULT HrAppendNetwareToAuthPackages();
HRESULT HrCreateParametersSubkeys();
HRESULT HrMungeAutoexecNT();
BOOL FMoveSzToEndOfFile( PSTR pszAutoexecName, PSTR pszMatch);
HRESULT HrAddNetWareToWOWKnownList();
HRESULT HrUpdateLanmanSharedDrivesValue();
HRESULT HrRemoveNetwareFromAuthPackages();
HRESULT HrRemoveNetWareFromWOWKnownList();
HRESULT HrDeleteParametersSubkeys();
HRESULT HrRenameNWDocFiles();
//+---------------------------------------------------------------------------
//
// Member: CNWClient::HrLoadConfigDLL
//
// Purpose: Load nwcfg.dll, so we can call some of the functions within.
// Also, do the GetProcAddress calls for all of the functions
// that we might need.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT CNWClient::HrLoadConfigDLL()
{
HRESULT hr = S_OK;
AssertSz(!m_hlibConfig, "This should not be getting initialized twice");
TraceTag(ttidNWClientCfgFn, ">> CNWClient::HrLoadConfigDLL");
m_hlibConfig = LoadLibrary(c_szConfigDLLName);
if (!m_hlibConfig)
{
DWORD dwLastError = GetLastError();
TraceLastWin32Error("HrLoadConfigDLL() failed");
// More specific info
//
TraceTag(ttidNWClientCfg,
"HrLoadConfigDLL() - LoadLibrary failed on %S, Err: %d",
c_szConfigDLLName, dwLastError);
hr = E_FAIL;
goto Exit;
}
// $$REVIEW: We probably won't need all of these, so make sure that we've
// cut out the ones that we're no longer using (or have never used).
//
m_pfnAppendSzToFile = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "AppendSzToFile");
m_pfnRemoveSzFromFile = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "RemoveSzFromFile");
m_pfnGetKernelVersion = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "GetKernelVersion");
m_pfnSetEverybodyPermission = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "SetEverybodyPermission");
m_pfnlodctr = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "lodctr");
m_pfnunlodctr = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "unlodctr");
m_pfnDeleteGatewayPassword = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "DeleteGatewayPassword");
m_pfnSetFileSysChangeValue = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "SetFileSysChangeValue");
m_pfnCleanupRegistryForNWCS = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "CleanupRegistryForNWCS");
m_pfnSetupRegistryForNWCS = (NWCFG_PROC) GetProcAddress(m_hlibConfig, "SetupRegistryForNWCS");
if (!m_pfnAppendSzToFile || !m_pfnRemoveSzFromFile ||
!m_pfnGetKernelVersion || !m_pfnSetEverybodyPermission ||
!m_pfnlodctr || !m_pfnunlodctr ||
!m_pfnDeleteGatewayPassword || !m_pfnSetFileSysChangeValue ||
!m_pfnCleanupRegistryForNWCS || !m_pfnSetupRegistryForNWCS)
{
TraceLastWin32Error("HrLoadConfigDLL() - GetProcAddress failed");
hr = E_FAIL;
goto Exit;
}
Exit:
TraceTag(ttidNWClientCfgFn, "<< CNWClient::HrLoadConfigDLL");
TraceError("HrLoadConfigDLL", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Member: CNWClient::FreeConfigDLL
//
// Purpose: Free nwcfg.dll, and NULL out the function pointers.
//
// Arguments:
// (none)
//
// Returns: No return (VOID)
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
VOID CNWClient::FreeConfigDLL()
{
TraceTag(ttidNWClientCfgFn, ">> CNWClient::FreeConfigDLL()");
// If we successfully loaded the library, free it.
if (m_hlibConfig)
{
// Free up the library resources.
FreeLibrary(m_hlibConfig);
m_hlibConfig = NULL;
m_pfnAppendSzToFile = NULL;
m_pfnRemoveSzFromFile = NULL;
m_pfnGetKernelVersion = NULL;
m_pfnSetEverybodyPermission = NULL;
m_pfnlodctr = NULL;
m_pfnunlodctr = NULL;
m_pfnDeleteGatewayPassword = NULL;
m_pfnSetFileSysChangeValue = NULL;
m_pfnCleanupRegistryForNWCS = NULL;
m_pfnSetupRegistryForNWCS = NULL;
}
TraceTag(ttidNWClientCfgFn, "<< CNWClient::FreeConfigDLL()");
}
//+---------------------------------------------------------------------------
//
// Member: CNWClient::HrInstallCodeFromOldINF
//
// Purpose: This contains all of the logic from the old oemnsvnw.inf, or
// at least calls to helper functions that perform all of the
// logic. This runs pretty much straight through the old
// installadapter code.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT CNWClient::HrInstallCodeFromOldINF()
{
HRESULT hr = S_OK;
BOOL fResult = FALSE;
// Get result from NWCFG functions. We won't use it though.
PWSTR pszDummy = NULL;
TraceTag(ttidNWClientCfgFn, ">> CNWClient::HrInstallCodeFromOldINF()");
hr = HrLoadConfigDLL();
if (FAILED(hr))
{
// Error traced in the call itself.
goto Exit;
}
// Call the NWCFG function that does (their comment):
// "set the FileSysChangeValue to please NETWARE.DRV.
// also set win.ini parameter so wfwnet.drv knows we are there."
fResult = m_pfnSetupRegistryForNWCS(0, NULL, &pszDummy);
if (!fResult)
{
TraceTag(ttidNWClientCfg, "HrInstallCodeFromOldINF() - m_pfnSetupRegistryForNWCS failed");
goto Exit;
}
// Append our name to the Lsa Authentication packages reg value.
hr = HrAppendNetwareToAuthPackages();
if (FAILED(hr))
{
// Error traced within the function itself.
//
goto Exit;
}
// Create the required subkeys under the services\NWCWorkstation\parameters
// key
//
hr = HrCreateParametersSubkeys();
if (FAILED(hr))
{
// Error traced within the function itself.
//
goto Exit;
}
// Munge the autoexec.nt (or autoexec.tmp) file. Pass the function pointers
// to the munge that will allow it to manipulate the autoexec.nt
hr = HrMungeAutoexecNT();
if (FAILED(hr))
{
// Error traced within the function itself.
//
goto Exit;
}
hr = HrAddNetWareToWOWKnownList();
if (FAILED(hr))
{
// Error traced within the function itself.
//
goto Exit;
}
// If this is the gateway that we're installing, do the work that will
// allow us to share a redirected resource.
//
if (PF_SERVER == m_pf)
{
hr = HrUpdateLanmanSharedDrivesValue();
if (FAILED(hr))
{
// Error traced within the function itself.
//
goto Exit;
}
// On the server build, rename nwdocgw.* to nwdoc.*
hr = HrRenameNWDocFiles();
if (FAILED(hr))
{
goto Exit;
}
}
Exit:
// This will work even if the handle is NULL.
FreeConfigDLL();
TraceTag(ttidNWClientCfgFn, "<< CNWClient::HrInstallCodeFromOldINF()");
TraceError("CNWClient::HrInstallCodeFromOldINF()", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Member: CNWClient::HrRemoveCodeFromOldINF
//
// Purpose: This contains all of the remove logic from the old
// oemnsvnw.inf, or at least calls to helper functions that
// perform all of the logic. This runs pretty much straight
// through the old removeadapter code.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT CNWClient::HrRemoveCodeFromOldINF()
{
HRESULT hr = S_OK;
BOOL fResult = FALSE;
// Get result from NWCFG functions. We won't use it though.
PWSTR pszDummy = NULL;
TraceTag(ttidNWClientCfgFn, ">> CNWClient::HrRemoveCodeFromOldINF()");
hr = HrLoadConfigDLL();
if (FAILED(hr))
{
// Error traced in the call itself.
goto Exit;
}
// Call the NWCFG function that does (their comment):
// "set the FileSysChangeValue to please NETWARE.DRV.
// also set win.ini parameter so wfwnet.drv knows we are there."
fResult = m_pfnCleanupRegistryForNWCS(0, NULL, &pszDummy);
if (!fResult)
{
TraceTag(ttidNWClientCfg, "HrRemoveCodeFromOldINF() - m_pfnCleanupRegistryForNWCS failed");
goto Exit;
}
// Remove our name from the Lsa Authentication packages reg value.
hr = HrRemoveNetwareFromAuthPackages();
if (FAILED(hr))
{
// Error traced within the function itself.
//
goto Exit;
}
// Delete the NWC subkeys under the services\NWCWorkstation\parameters
// key
//
hr = HrDeleteParametersSubkeys();
if (FAILED(hr))
{
// Error traced within the function itself.
//
goto Exit;
}
hr = HrRemoveNetWareFromWOWKnownList();
if (FAILED(hr))
{
// Error traced within the function itself.
//
goto Exit;
}
Exit:
// This will work even if the handle is NULL.
FreeConfigDLL();
TraceTag(ttidNWClientCfgFn, "<< CNWClient::HrRemoveCodeFromOldINF()");
TraceError("CNWClient::HrRemoveCodeFromOldINF()", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: HrAppendNetwareToAuthPackages
//
// Purpose: Helper function for HrCodeFromOldINF() - Appends the netware
// authentication provider name to the end of the LSA
// authentication packages value.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 Error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT HrAppendNetwareToAuthPackages()
{
HRESULT hr = S_OK;
TraceTag(ttidNWClientCfgFn, ">> HrAppendNetwareToAuthPackages");
// Call the cool new AddString... function
//
hr = HrRegAddStringToMultiSz(
(PWSTR) c_szAuthPackageName,
HKEY_LOCAL_MACHINE,
c_szRegKeyCtlLsa,
L"Authentication Packages",
STRING_FLAG_ENSURE_AT_END,
0);
if (FAILED(hr))
{
TraceTag(ttidNWClientCfg, "HrAppendNetwareToAuthPackages() - Failed to "
"Add string to multi-sz 'Authentication Packages' in key: %S",
c_szRegKeyCtlLsa);
goto Exit;
}
Exit:
TraceTag(ttidNWClientCfgFn, "<< HrAppendNetwareToAuthPackages");
TraceError("HrAppendNetwareToAuthPackages", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: HrRemoveNetwareFromAuthPackages
//
// Purpose: Helper function for HrCodeFromOldINF() - Appends the netware
// authentication provider name to the end of the LSA
// authentication packages value.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 Error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT HrRemoveNetwareFromAuthPackages()
{
HRESULT hr = S_OK;
TraceTag(ttidNWClientCfgFn, ">> HrRemoveNetwareFromAuthPackages");
// Call the cool new AddString... function
//
hr = HrRegRemoveStringFromMultiSz(
(PWSTR) c_szAuthPackageName,
HKEY_LOCAL_MACHINE,
c_szRegKeyCtlLsa,
L"Authentication Packages",
STRING_FLAG_REMOVE_ALL);
if (FAILED(hr))
{
TraceTag(ttidNWClientCfg, "HrRemoveNetwareFromAuthPackages() - Failed to "
"Remove string to multi-sz 'Authentication Packages' in key: %S",
c_szRegKeyCtlLsa);
goto Exit;
}
Exit:
TraceTag(ttidNWClientCfgFn, "<< HrRemoveNetwareFromAuthPackages");
TraceError("HrRemoveNetwareFromAuthPackages", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: HrNwLibSetEverybodyPermission
//
// Purpose: Set the registry key to everybody "Set Value" (or whatever
// the caller want.)
//
// Arguments:
// hKey [] The handle of the registry key to set security on
// dwPermission [] The permission to add to "everybody"
//
// Returns:
//
// Author: jeffspr 18 Jun 1997
//
// Notes:
//
HRESULT HrNwLibSetEverybodyPermission( IN HKEY hKey,
IN DWORD dwPermission)
{
LONG err; // error code
PSECURITY_DESCRIPTOR psd = NULL; // related SD
PSID pSid = NULL; // original SID
PACL pDacl = NULL; // Absolute DACL
PACL pSacl = NULL; // Absolute SACL
PSID pOSid = NULL; // Absolute Owner SID
PSID pPSid = NULL; // Absolute Primary SID
do { // Not a loop, just for breaking out of error
//
// Initialize all the variables...
//
// world sid authority
SID_IDENTIFIER_AUTHORITY SidAuth= SECURITY_WORLD_SID_AUTHORITY;
DWORD cbSize=0; // Security key size
PACL pAcl; // original ACL
BOOL fDaclPresent;
BOOL fDaclDefault;
SECURITY_DESCRIPTOR absSD; // Absolute SD
DWORD AbsSize = sizeof(SECURITY_DESCRIPTOR); // Absolute SD size
DWORD DaclSize; // Absolute DACL size
DWORD SaclSize; // Absolute SACL size
DWORD OSidSize; // Absolute OSID size
DWORD PSidSize; // Absolute PSID size
// Get the original DACL list
RegGetKeySecurity( hKey, DACL_SECURITY_INFORMATION, NULL, &cbSize);
psd = (PSECURITY_DESCRIPTOR *)LocalAlloc(LMEM_ZEROINIT, cbSize+sizeof(ACCESS_ALLOWED_ACE)+sizeof(ACCESS_MASK)+sizeof(SID));
pDacl = (PACL)LocalAlloc(LMEM_ZEROINIT, cbSize+sizeof(ACCESS_ALLOWED_ACE)+sizeof(ACCESS_MASK)+sizeof(SID));
pSacl = (PACL)LocalAlloc(LMEM_ZEROINIT, cbSize);
pOSid = (PSID)LocalAlloc(LMEM_ZEROINIT, cbSize);
pPSid = (PSID)LocalAlloc(LMEM_ZEROINIT, cbSize);
DaclSize = cbSize+sizeof(ACCESS_ALLOWED_ACE)+sizeof(ACCESS_MASK)+sizeof(SID);
SaclSize = cbSize;
OSidSize = cbSize;
PSidSize = cbSize;
if (( NULL == psd) ||
( NULL == pDacl) ||
( NULL == pSacl) ||
( NULL == pOSid) ||
( NULL == pPSid))
{
err = ERROR_INSUFFICIENT_BUFFER;
break;
}
if ( (err = RegGetKeySecurity( hKey, DACL_SECURITY_INFORMATION, psd, &cbSize )) != ERROR_SUCCESS )
{
break;
}
if ( !GetSecurityDescriptorDacl( psd, &fDaclPresent, &pAcl, &fDaclDefault ))
{
err = GetLastError();
break;
}
// Increase the size for an extra ACE
pAcl->AclSize += sizeof(ACCESS_ALLOWED_ACE)+sizeof(ACCESS_MASK)+sizeof(SID);
// Get World SID
if ( (err = RtlAllocateAndInitializeSid( &SidAuth, 1,
SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &pSid)) != ERROR_SUCCESS)
{
break;
}
// Add Permission ACE
if ( !AddAccessAllowedAce(pAcl, ACL_REVISION, dwPermission ,pSid))
{
err = GetLastError();
break;
}
// Convert from relate format to absolute format
if ( !MakeAbsoluteSD( psd, &absSD, &AbsSize, pDacl, &DaclSize, pSacl, &SaclSize,
pOSid, &OSidSize, pPSid, &PSidSize ))
{
err = GetLastError();
break;
}
// Set SD
if ( !SetSecurityDescriptorDacl( &absSD, TRUE, pAcl, FALSE ))
{
err = GetLastError();
break;
}
if ( (err = RegSetKeySecurity( hKey, DACL_SECURITY_INFORMATION, psd ))
!= ERROR_SUCCESS )
{
break;
}
} while (FALSE);
// Clean up the memory
RtlFreeSid( pSid );
LocalFree( psd );
LocalFree( pDacl );
LocalFree( pSacl );
LocalFree( pOSid );
LocalFree( pPSid );
return (HRESULT_FROM_WIN32(err));
}
//+---------------------------------------------------------------------------
//
// Function: HrSetEverybodyPermissionsOnOptionsKeys
//
// Purpose: Recurse through the options keys (if any), and set the
// "Everybody" permissions on them.
//
// Arguments:
// hkeyOptions []
// dwPermissions []
//
// Returns:
//
// Author: jeffspr 10 Sep 1997
//
// Notes:
//
HRESULT HrSetEverybodyPermissionsOnOptionsKeys(HKEY hkeyOptions, DWORD dwPermissions)
{
HRESULT hr = S_OK;
DWORD dwIndex = 0;
WCHAR szSubkeyName[MAX_PATH+1];
FILETIME ft;
Assert(hkeyOptions);
// First, do it on the root key.
//
hr = HrNwLibSetEverybodyPermission(hkeyOptions, dwPermissions);
// Enumerate the keys, and set it on them as well
//
while (SUCCEEDED(hr))
{
DWORD dwSubkeyNameSize = MAX_PATH+1;
// Get the next key (starting with 0)
//
hr = HrRegEnumKeyEx( hkeyOptions,
dwIndex++,
szSubkeyName,
&dwSubkeyNameSize,
NULL,
NULL,
&ft);
if (SUCCEEDED(hr))
{
HKEY hkeyUser = NULL;
// Open that key for write
hr = HrRegOpenKeyEx(hkeyOptions,
szSubkeyName,
KEY_ALL_ACCESS,
&hkeyUser);
if (SUCCEEDED(hr))
{
hr = HrNwLibSetEverybodyPermission(hkeyUser, dwPermissions);
}
RegSafeCloseKey(hkeyUser);
}
}
if (hr == HRESULT_FROM_WIN32(ERROR_NO_MORE_ITEMS))
{
hr = S_OK;
}
TraceError("HrSetEverybodyPermissionsOnOptionsKeys", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: HrCreateParametersSubkeys
//
// Purpose: Creates the subkeys under the NWCWorkstation parameters key.
// This could have been done in the INF, but there were some
// permissions that needed to be set on the keys as well, so
// all of the work now takes place in this function.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT HrCreateParametersSubkeys()
{
HRESULT hr = S_OK;
HKEY hkeyOption = NULL;
HKEY hkeyLogon = NULL;
DWORD dwDisposition = 0;
TraceTag(ttidNWClientCfgFn, ">> HrCreateParametersSubkeys");
hr = HrRegCreateKeyEx(HKEY_LOCAL_MACHINE,
c_szParamOptionKeyPath,
0,
KEY_ALL_ACCESS,
NULL,
&hkeyOption,
&dwDisposition);
if (FAILED(hr))
{
TraceTag(ttidNWClientCfg, "HrCreateParametersSubkeys() - failed to "
"create/open key %S", c_szParamOptionKeyPath);
goto Exit;
}
hr = HrRegCreateKeyEx(HKEY_LOCAL_MACHINE,
c_szParamLogonKeyPath,
0,
KEY_SET_VALUE,
NULL,
&hkeyLogon,
&dwDisposition);
if (FAILED(hr))
{
TraceTag(ttidNWClientCfg, "HrCreateParametersSubkeys() - failed to "
"create/open key %S", c_szParamLogonKeyPath);
goto Exit;
}
hr = HrSetEverybodyPermissionsOnOptionsKeys(hkeyOption, c_dwOptionKeyPermissions);
if (FAILED(hr))
{
TraceTag(ttidNWClientCfg, "HrSetEverybodyPermissionsOnOptionsKeys failed, hr: 0x%08x", hr);
goto Exit;
}
Exit:
// Close the hkeys, if they're open
RegSafeCloseKey(hkeyLogon);
RegSafeCloseKey(hkeyOption);
TraceTag(ttidNWClientCfgFn, ">> HrCreateParametersSubkeys");
TraceError("HrCreateParametersSubkeys", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: HrDeleteParametersSubkeys
//
// Purpose: Deletes the subkeys under the NWCWorkstation parameters key.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT HrDeleteParametersSubkeys()
{
HRESULT hr = S_OK;
TraceTag(ttidNWClientCfgFn, ">> HrDeleteParametersSubkeys");
// Note: We need to be taking ownership of these keys so we can delete
// them. Regardless, ignore if the key deletions fail.
hr = HrRegDeleteKeyTree(HKEY_LOCAL_MACHINE,
c_szParamOptionKeyPath);
if (FAILED(hr))
{
TraceTag(ttidNWClientCfg, "HrDeleteParametersSubkeys() - failed to "
"delete key %S, hr = 0x%08x", c_szParamOptionKeyPath, hr);
hr = S_OK;
}
hr = HrRegDeleteKey(HKEY_LOCAL_MACHINE,
c_szParamLogonKeyPath);
if (FAILED(hr))
{
TraceTag(ttidNWClientCfg, "HrDeleteParametersSubkeys() - failed to "
"delete key %S, hr = 0x%08x", c_szParamLogonKeyPath, hr);
hr = S_OK;
}
TraceTag(ttidNWClientCfgFn, ">> HrDeleteParametersSubkeys");
TraceError("HrDeleteParametersSubkeys", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: FCheckForExistingFile
//
// Purpose: Checks for the existance of the passed in file. Should be
// common-ized.
//
// Arguments:
// pszFileToCheck [] The file name to verify
//
// Returns: TRUE if the file was found, FALSE otherwise.
//
// Author: jeffspr 24 Jun 1997
//
// Notes: $$TODO: Should be improved if we move this to common code.
// The thing that it doesn't do is distinguish between a file
// being "not found" and a file error (such as access rights
// or sharing violations) on the CreateFile call.
//
BOOL FCheckForExistingFile( PSTR pszFileToCheck )
{
BOOL fReturn = TRUE;
HANDLE hFile = NULL;
TraceTag(ttidNWClientCfgFn, ">> FCheckForExistingFile");
hFile = CreateFileA(pszFileToCheck,
GENERIC_READ,
0, // No sharing allowed
NULL, // No security attributes
OPEN_EXISTING, // Fail if file doesn't exist
FILE_ATTRIBUTE_NORMAL,
NULL);
if (hFile != INVALID_HANDLE_VALUE)
{
CloseHandle(hFile);
hFile = NULL;
}
else
{
// This was previously a bug. We weren't setting FALSE here, which made
// the function somewhat useless.
fReturn = FALSE;
}
TraceTag(ttidNWClientCfgFn, "<< FCheckForExistingFile");
return fReturn;
}
//+---------------------------------------------------------------------------
//
// Function: KillTrailingWhitespace
//
// Purpose: Remove whitespace from a non-UNICODE string. This is a utility
// function for the autoexec.nt parser
//
// Arguments:
// pszKillMyWhitespace [] String from which to remove whitespace
//
// Returns:
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
VOID KillTrailingWhitespace( PSTR pszKillMyWhitespace )
{
long lLength = 0;
if (!pszKillMyWhitespace)
{
Assert(pszKillMyWhitespace);
goto Exit;
}
lLength = lstrlenA(pszKillMyWhitespace);
if (lLength == 0)
{
goto Exit;
}
while (isspace(pszKillMyWhitespace[lLength-1]))
{
pszKillMyWhitespace[--lLength] = '\0';
}
Exit:
return;
}
//+---------------------------------------------------------------------------
//
// Function: FMoveSzToEndOfFile
//
// Purpose: Find a string in the file of this name, and if it's present,
// move the string to the end of the file. This is used by the
// autoexec.nt parser to move the IPX stuff to the end of the
// file. This is a rewrite of similar code in the nwcfg.dll
// stuff. That code apparently wasn't UNICODE, and didn't work
// for what we were doing.
//
// Arguments:
// pszAutoexecName [] Name of the file to modify
// pszMatch [] String to move
//
// Returns:
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
BOOL FMoveSzToEndOfFile( PSTR pszAutoexecName, PSTR pszMatch )
{
FILE * hsrcfile = NULL;
FILE * hdesfile = NULL;
char * pszTempname = NULL;
char szInput[1000];
TraceTag(ttidNWClientCfgFn, ">> FMoveSzToEndOfFile");
// Get a temp name
//
pszTempname = tmpnam(NULL);
// Open the original and the destination files
//
hsrcfile = fopen(pszAutoexecName, "r");
hdesfile = fopen(pszTempname, "w");
if (( hsrcfile != NULL ) && ( hdesfile != NULL ))
{
while (fgets(szInput,1000,hsrcfile))
{
CHAR szInputCopy[1000];
// Copy to another temp buffer so that when we remove the
// trailing whitespace for the comparison, we won't lose the
// original text.
//
strcpy(szInputCopy, szInput);
// Remove the trailing whitespace, so we only have to compare the
// real text
//
KillTrailingWhitespace(szInputCopy);
// Compare the strings
//
if (lstrcmpiA(szInputCopy, pszMatch) != 0)
{
// If the strings weren't identical, then we still want
// to copy the line
//
fputs(szInput,hdesfile);
}
}
// Append the string to the end of the file.
fputs(pszMatch, hdesfile);
fputs("\r\n",hdesfile);
}
if (hsrcfile != NULL)
{
fclose(hsrcfile);
}
if (hdesfile != NULL)
{
fclose(hdesfile);
}
if (( hsrcfile != NULL ) && ( hdesfile != NULL ))
{
CopyFileA(pszTempname,pszAutoexecName, FALSE);
DeleteFileA(pszTempname);
}
TraceTag(ttidNWClientCfgFn, "<< FMoveSzToEndOfFile");
return TRUE;
}
//+---------------------------------------------------------------------------
//
// Function: HrMungeAutoexecNT
//
// Purpose: Move the IPX stuff to the end of the autoexec.nt. Do this by
// calling FMoveSzToEndOfFile on each of our lines.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT HrMungeAutoexecNT()
{
HRESULT hr = S_OK;
CHAR szAutoNTPath[MAX_PATH+1] = {0};
CHAR szAutoTmpPath[MAX_PATH+1] = {0};
CHAR szWindowsDirANSI[MAX_PATH+1] = {0};
PSTR pszAutoPath = NULL;
BOOL fResult = FALSE;
PCWSTR pszRem1 = NULL;
PSTR pszaRem1MultiByte = NULL;
int iLength = 0;
TraceTag(ttidNWClientCfgFn, ">> HrMungeAutoexecNT");
// Get the windows directory
if (GetSystemWindowsDirectoryA(szWindowsDirANSI, sizeof(szWindowsDirANSI)) == 0)
{
TraceLastWin32Error("HrMungeAutoexecNT - Call to GetWindowsDirectoryA");
hr = HrFromLastWin32Error();
goto Exit;
}
// Build the path to the autoexec.nt
//
wsprintfA(szAutoNTPath, "%s\\system32\\%s", szWindowsDirANSI, "autoexec.nt");
if (FCheckForExistingFile(szAutoNTPath) == FALSE)
{
wsprintfA(szAutoTmpPath, "%s\\system32\\%s", szWindowsDirANSI, "autoexec.tmp");
if (FCheckForExistingFile(szAutoTmpPath) == FALSE)
{
// Per the old INF, skip the whole shebang.
goto Exit;
}
else
{
pszAutoPath = szAutoTmpPath;
}
}
else
{
pszAutoPath = szAutoNTPath;
}
// At this point, we should have found at least one valid
// autoexec.nt or .tmp file. If not, we should have dropped out of the
// function
Assert(pszAutoPath);
pszRem1 = SzLoadStringPcch(_Module.GetResourceInstance(), IDS_AUTOEXEC_REM1, &iLength);
if (!pszRem1 || iLength == 0)
{
AssertSz(FALSE, "Failed to load STR_AUTOEXEC_REM from the resources");
TraceTag(ttidNWClientCfg,
"ERROR: Failed to load STR_AUTOEXEC_REM from the resources");
hr = E_FAIL;
goto Exit;
}
// Allocate memory for the demoted string.
pszaRem1MultiByte = (PSTR) MemAlloc(lstrlenW(pszRem1) + 1);
if (!pszaRem1MultiByte)
{
TraceTag(ttidNWClientCfg, "ERROR: Failed to alloc memory for demoted string");
hr = E_OUTOFMEMORY;
goto Exit;
}
// Demote the loaded string to multibyte (single char)
WideCharToMultiByte(
CP_ACP, // ANSI code page
0, // flags for non-mapped character action
pszRem1, // source string
-1, // source string is NULL terminated
pszaRem1MultiByte, // destination string (multibyte)
lstrlenW(pszRem1) + 1, // size of destination string
NULL, // default char on non-mapped char
NULL); // return for default char mapping action
// Move the REM from the autoexec.nt
//
fResult = FMoveSzToEndOfFile(pszAutoPath, pszaRem1MultiByte);
if (!fResult)
{
// Traced in called function.
hr = E_FAIL;
goto Exit;
}
// Move the line that loads nw16
//
fResult = FMoveSzToEndOfFile(pszAutoPath, "lh %SystemRoot%\\system32\\nw16");
if (!fResult)
{
// Traced in called function.
hr = E_FAIL;
goto Exit;
}
// Move the line that loads vwipxspx
//
fResult = FMoveSzToEndOfFile(pszAutoPath, "lh %SystemRoot%\\system32\\vwipxspx");
if (!fResult)
{
// Traced in called function.
hr = E_FAIL;
goto Exit;
}
Exit:
MemFree(pszaRem1MultiByte);
TraceTag(ttidNWClientCfgFn, "<< HrMungeAutoexecNT");
TraceError("HrMungeAutoexecNT", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: HrAddNetWareToWOWKnownList
//
// Purpose: Add the netware.drv to the WOW "known DLLS" list.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT HrAddNetWareToWOWKnownList()
{
HRESULT hr = S_OK;
TraceTag(ttidNWClientCfgFn, ">> HrAddNetWareToWOWKnownList");
// Call the cool new AddString... function
//
hr = HrRegAddStringToSz(
L"netware.drv",
HKEY_LOCAL_MACHINE,
L"System\\CurrentControlSet\\Control\\WOW",
L"KnownDLLS",
L' ',
STRING_FLAG_ENSURE_AT_END,
0);
TraceTag(ttidNWClientCfgFn, "<< HrAddNetWareToWOWKnownList");
TraceError("HrAddNetWareToWOWKnownList", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: HrRemoveNetWareFromWOWKnownList
//
// Purpose: Add the netware.drv to the WOW "known DLLS" list.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT HrRemoveNetWareFromWOWKnownList()
{
HRESULT hr = S_OK;
TraceTag(ttidNWClientCfgFn, ">> HrRemoveNetWareFromWOWKnownList");
// Call the cool new AddString... function
//
hr = HrRegRemoveStringFromSz(
L"netware.drv",
HKEY_LOCAL_MACHINE,
L"System\\CurrentControlSet\\Control\\WOW",
L"KnownDLLS",
L' ',
STRING_FLAG_REMOVE_SINGLE);
TraceTag(ttidNWClientCfgFn, "<< HrRemoveNetWareFromWOWKnownList");
TraceError("HrRemoveNetWareFromWOWKnownList", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: HrUpdateLanmanSharedDrivesValue
//
// Purpose: If the LanmanServer service exists, make sure that they have the
// EnableSharedNetDrives value turned on.
//
// Arguments:
// (none)
//
// Returns: S_OK or valid Win32 error code.
//
// Author: jeffspr 24 Jun 1997
//
// Notes:
//
HRESULT HrUpdateLanmanSharedDrivesValue()
{
HRESULT hr = S_OK;
const DWORD c_dwESNDValue = 1;
HKEY hkeyLMSP = NULL;
SERVER_INFO_1540 si1540 = {0};
NET_API_STATUS nas = ERROR_SUCCESS;
DWORD dwDisposition = 0;
TraceTag(ttidNWClientCfgFn, ">> HrUpdateLanmanSharedDrivesValue");
// Open the LanmanServer parameters key, if it exists. If it doesn't exist,
// it will still return S_OK, but the hkey will still be NULL.
//
hr = HrRegCreateKeyEx(
HKEY_LOCAL_MACHINE,
L"System\\CurrentControlSet\\Services\\LanmanServer\\Parameters",
REG_OPTION_NON_VOLATILE,
KEY_SET_VALUE, // samDesired
NULL,
&hkeyLMSP,
&dwDisposition);
if (FAILED(hr))
{
TraceTag(ttidNWClientCfgFn, "Failed to create/open the "
"LanmanServer\\Parameters key");
goto Exit;
}
Assert(hkeyLMSP);
hr = HrRegSetDword(
hkeyLMSP,
L"EnableSharedNetDrives",
c_dwESNDValue);
if (FAILED(hr))
{
TraceTag(ttidNWClientCfgFn, "Failed to set the EnabledSharedNetDrives value in "
"HrUpdateLanmanSharedDrivesValue()");
goto Exit;
}
// Call the NetServerSetInfo with the Enable Shared Net Drives info (1540).
// This will allow this info to be set dynamically (so as not to require a
// restart of the "Server" service.
//
si1540.sv1540_enablesharednetdrives = TRUE;
// Set the server info for the EnableSharedDrives value. This will cause it to
// take effect if the service is running (and will do nothing if it is not).
//
nas = NetServerSetInfo(NULL, 1540, (LPBYTE) &si1540, NULL);
if (nas != NERR_Success)
{
// It's actually OK if this fails in one condition (0x842), because
// it WILL fail if the server service That's not a problem, because
// the value that I set in the registry above will be picked up the
// next time the server service starts.
//
// OK, cheesy, but I don't know the define, I just know that this is the
// right return code for our ignorable failure.
//
if (nas != 0x842)
{
AssertSz(nas == 0x842, "NetServerSetInfo failed for a reason other "
"than the service not running (which would have been ok)");
}
}
Exit:
// Close the hkey, if it's open
RegSafeCloseKey(hkeyLMSP);
TraceTag(ttidNWClientCfgFn, "<< HrUpdateLanmanSharedDrivesValue");
TraceError("HrUpdateLanmanSharedDrivesValue()", hr);
return hr;
}
//+---------------------------------------------------------------------------
//
// Function: HrRenameNWDocFiles
//
// Purpose: On the server install, rename the nwdocgw.* files, since
// whether we're on CSNW or GSNW, the files are always called
// nwdoc.*
//
// Arguments:
// (none)
//
// Returns:
//
// Author: jeffspr 13 Jul 1997
//
// Notes:
//
HRESULT HrRenameNWDocFiles()
{
HRESULT hr = S_OK;
WCHAR szWindowsDir[MAX_PATH+1];
WCHAR szSourceName[MAX_PATH+1];
WCHAR szTargetName[MAX_PATH+1];
// Get the windows directory
if (GetSystemWindowsDirectory(szWindowsDir, MAX_PATH) == 0)
{
TraceLastWin32Error("HrRenameNWDocFiles - Call to GetSystemWindowsDirectory");
hr = HrFromLastWin32Error();
goto Exit;
}
// Build the path for the first rename
//
wsprintfW(szSourceName, L"%s\\system32\\%s", szWindowsDir, c_szNwDocGWHelpName);
wsprintfW(szTargetName, L"%s\\system32\\%s", szWindowsDir, c_szNwDocHelpName);
// Rename the .HLP file. If this fails, no big deal.
//
if (!MoveFileEx(szSourceName, szTargetName, MOVEFILE_REPLACE_EXISTING))
{
// For debugging only.
//
DWORD dwLastError = GetLastError();
}
// Build the path for the second rename
//
wsprintfW(szSourceName, L"%s\\system32\\%s", szWindowsDir, c_szNwDocGWCNTName);
wsprintfW(szTargetName, L"%s\\system32\\%s", szWindowsDir, c_szNwDocCNTName);
// Rename the .CNT file. If this fails, no big deal.
//
if (!MoveFileEx(szSourceName, szTargetName, MOVEFILE_REPLACE_EXISTING))
{
// For debugging only.
//
DWORD dwLastError = GetLastError();
}
Exit:
return hr;
}