#include "shellprv.h" #include "shlexec.h" #include "netview.h" extern "C" { #include } #include #include "ole2dup.h" #include #include #include "ids.h" #define REGSTR_PATH_CHECKBADAPPSNEW TEXT("System\\CurrentControlSet\\Control\\Session Manager\\CheckBadApps") #define REGSTR_PATH_CHECKBADAPPS400NEW TEXT("System\\CurrentControlSet\\Control\\Session Manager\\CheckBadApps400") #define REGSTR_TEMP_APPCOMPATPATH TEXT("System\\CurrentControlSet\\Control\\Session Manager\\AppCompatibility\\%s") #define SAFE_DEBUGSTR(str) ((str) ? (str) : "") HINSTANCE Window_GetInstance(HWND hwnd) { DWORD idProcess; GetWindowThreadProcessId(hwnd, &idProcess); // HINSTANCEs are pointers valid only within // a single process, so 33 is returned to indicate success // as 0-32 are reserved for error. (Actually 32 is supposed // to be a valid success return but some apps get it wrong.) return (HINSTANCE)(DWORD_PTR)(idProcess ? 33 : 0); } // Return TRUE if the window belongs to a 32bit or a Win4.0 app. // NB We can't just check if it's a 32bit window // since many apps use 16bit ddeml windows to communicate with the shell // On NT we can. BOOL Window_IsLFNAware(HWND hwnd) { // 32-bit window return LOWORD(GetWindowLongPtr(hwnd,GWLP_HINSTANCE)) == 0; } #define COPYTODST(_szdst, _szend, _szsrc, _ulen, _ret) \ { \ UINT _utemp = _ulen; \ if ((UINT)(_szend-_szdst) <= _utemp) { \ return(_ret); \ } \ lstrcpyn(_szdst, _szsrc, _utemp+1); \ _szdst += _utemp; \ } /* Returns NULL if this is the last parm, pointer to next space otherwise */ LPTSTR _GetNextParm(LPCTSTR lpSrc, LPTSTR lpDst, UINT cchDst) { LPCTSTR lpNextQuote, lpNextSpace; LPTSTR lpEnd = lpDst+cchDst-1; // dec to account for trailing NULL BOOL fQuote; // quoted string? BOOL fDoubleQuote; // is this quote a double quote? VDATEINPUTBUF(lpDst, TCHAR, cchDst); while (*lpSrc == TEXT(' ')) ++lpSrc; if (!*lpSrc) return(NULL); fQuote = (*lpSrc == TEXT('"')); if (fQuote) lpSrc++; // skip leading quote for (;;) { lpNextQuote = StrChr(lpSrc, TEXT('"')); if (!fQuote) { // for an un-quoted string, copy all chars to first space/null lpNextSpace = StrChr(lpSrc, TEXT(' ')); if (!lpNextSpace) // null before space! (end of string) { if (!lpNextQuote) { // copy all chars to the null if (lpDst) { COPYTODST(lpDst, lpEnd, lpSrc, lstrlen(lpSrc), NULL); } return NULL; } else { // we have a quote to convert. Fall through. } } else if (!lpNextQuote || lpNextSpace < lpNextQuote) { // copy all chars to the space if (lpDst) { COPYTODST(lpDst, lpEnd, lpSrc, (UINT)(lpNextSpace-lpSrc), NULL); } return (LPTSTR)lpNextSpace; } else { // quote before space. Fall through to convert quote. } } else if (!lpNextQuote) { // a quoted string without a terminating quote? Illegal! ASSERT(0); return NULL; } // we have a potential quote to convert ASSERT(lpNextQuote); fDoubleQuote = *(lpNextQuote+1) == TEXT('"'); if (fDoubleQuote) lpNextQuote++; // so the quote is copied if (lpDst) { COPYTODST(lpDst, lpEnd, lpSrc, (UINT) (lpNextQuote-lpSrc), NULL); } lpSrc = lpNextQuote+1; if (!fDoubleQuote) { // we just copied the rest of this quoted string. if this wasn't // quoted, it's an illegal string... treat the quote as a space. ASSERT(fQuote); return (LPTSTR)lpSrc; } } } #define PEMAGIC ((WORD)'P'+((WORD)'E'<<8)) // Returns TRUE is app is LFN aware. // This assumes all Win32 apps are LFN aware. BOOL App_IsLFNAware(LPCTSTR pszFile) { BOOL fRet = FALSE; // Assume Win 4.0 apps and Win32 apps are LFN aware. DWORD dw = GetExeType(pszFile); // TraceMsg(TF_SHELLEXEC, "s.aila: %s %s %x", pszFile, szFile, dw); if ((LOWORD(dw) == PEMAGIC) || ((LOWORD(dw) == NEMAGIC) && (HIWORD(dw) >= 0x0400))) { TCHAR sz[MAX_PATH]; PathToAppPathKey(pszFile, sz, ARRAYSIZE(sz)); fRet = (ERROR_SUCCESS != SHGetValue(HKEY_LOCAL_MACHINE, sz, TEXT("UseShortName"), NULL, NULL, NULL)); } return fRet; } // apps can tag themselves in a way so we know we can pass an URL on the cmd // line. this uses the existance of a value called "UseURL" under the // App Paths key in the registry associated with the app that is passed in. // pszPath is the path to the exe BOOL DoesAppWantUrl(LPCTSTR pszPath) { TCHAR sz[MAX_PATH]; PathToAppPathKey(pszPath, sz, ARRAYSIZE(sz)); return (ERROR_SUCCESS == SHGetValue(HKEY_LOCAL_MACHINE, sz, TEXT("UseURL"), NULL, NULL, NULL)); } BOOL _AppIsLFNAware(LPCTSTR pszFile) { TCHAR szFile[MAX_PATH]; // Does it look like a DDE command? if (pszFile && *pszFile && (*pszFile != TEXT('['))) { // Nope - Hopefully just a regular old command %1 thing. lstrcpyn(szFile, pszFile, ARRAYSIZE(szFile)); LPTSTR pszArgs = PathGetArgs(szFile); if (*pszArgs) *(pszArgs - 1) = TEXT('\0'); PathRemoveBlanks(szFile); // remove any blanks that may be after the command PathUnquoteSpaces(szFile); return App_IsLFNAware(szFile); } return FALSE; } // in: // lpFile exe name (used for %0 or %1 in replacement string) // lpFrom string template to sub params and file into "excel.exe %1 %2 /n %3" // lpParams parameter list "foo.txt bar.txt" // out: // lpTo output string with all parameters replaced // // supports: // %* replace with all parameters // %0, %1 replace with file // %n use nth parameter // // replace parameter placeholders (%1 %2 ... %n) with parameters // UINT ReplaceParameters(LPTSTR lpTo, UINT cchTo, LPCTSTR lpFile, LPCTSTR lpFrom, LPCTSTR lpParms, int nShow, DWORD * pdwHotKey, BOOL fLFNAware, LPCITEMIDLIST lpID, LPITEMIDLIST *ppidlGlobal) { int i; TCHAR c; LPCTSTR lpT; TCHAR sz[MAX_PATH]; BOOL fFirstParam = TRUE; LPTSTR lpEnd = lpTo + cchTo - 1; // dec to allow trailing NULL LPTSTR pToOrig = lpTo; for (; *lpFrom; lpFrom++) { if (*lpFrom == TEXT('%')) { switch (*(++lpFrom)) { case TEXT('~'): // Copy all parms starting with nth (n >= 2 and <= 9) c = *(++lpFrom); if (c >= TEXT('2') && c <= TEXT('9')) { for (i = 2, lpT = lpParms; i < c-TEXT('0') && lpT; i++) { lpT = _GetNextParm(lpT, NULL, 0); } if (lpT) { COPYTODST(lpTo, lpEnd, lpT, lstrlen(lpT), SE_ERR_ACCESSDENIED); } } else { lpFrom -= 2; // Backup over %~ and pass through goto NormalChar; } break; case TEXT('*'): // Copy all parms if (lpParms) { COPYTODST(lpTo, lpEnd, lpParms, lstrlen(lpParms), SE_ERR_ACCESSDENIED); } break; case TEXT('0'): case TEXT('1'): // %0, %1, copy the file name // If the filename comes first then we don't need to convert it to // a shortname. If it appears anywhere else and the app is not LFN // aware then we must. if (!(fFirstParam || fLFNAware || _AppIsLFNAware(pToOrig)) && GetShortPathName(lpFile, sz, ARRAYSIZE(sz)) > 0) { TraceMsg(TF_SHELLEXEC, "ShellExecuteEx: Getting short version of path."); COPYTODST(lpTo, lpEnd, sz, lstrlen(sz), SE_ERR_ACCESSDENIED); } else { TraceMsg(TF_SHELLEXEC, "ShellExecuteEx: Using long version of path."); COPYTODST(lpTo, lpEnd, lpFile, lstrlen(lpFile), SE_ERR_ACCESSDENIED); } break; case TEXT('2'): case TEXT('3'): case TEXT('4'): case TEXT('5'): case TEXT('6'): case TEXT('7'): case TEXT('8'): case TEXT('9'): for (i = *lpFrom-TEXT('2'), lpT = lpParms; lpT; --i) { if (i) lpT = _GetNextParm(lpT, NULL, 0); else { sz[0] = '\0'; // ensure a valid string, regardless of what happens within _GetNextParm _GetNextParm(lpT, sz, ARRAYSIZE(sz)); COPYTODST(lpTo, lpEnd, sz, lstrlen(sz), SE_ERR_ACCESSDENIED); break; } } break; case TEXT('s'): case TEXT('S'): wsprintf(sz, TEXT("%ld"), nShow); COPYTODST(lpTo, lpEnd, sz, lstrlen(sz), SE_ERR_ACCESSDENIED); break; case TEXT('h'): case TEXT('H'): wsprintf(sz, TEXT("%X"), pdwHotKey ? *pdwHotKey : 0); COPYTODST(lpTo, lpEnd, sz, lstrlen(sz), SE_ERR_ACCESSDENIED); if (pdwHotKey) *pdwHotKey = 0; break; // Note that a new global IDList is created for each case TEXT('i'): case TEXT('I'): // Note that a single global ID list is created and used over // again, so that it may be easily destroyed if anything // goes wrong if (ppidlGlobal) { if (lpID && !*ppidlGlobal) { *ppidlGlobal = (LPITEMIDLIST)SHAllocShared(lpID,ILGetSize(lpID),GetCurrentProcessId()); if (!*ppidlGlobal) { return SE_ERR_OOM; } } wsprintf(sz, TEXT(":%ld:%ld"), *ppidlGlobal,GetCurrentProcessId()); } else { lstrcpy(sz,TEXT(":0")); } COPYTODST(lpTo, lpEnd, sz, lstrlen(sz), SE_ERR_ACCESSDENIED); break; case TEXT('l'): case TEXT('L'): // Like %1 only using the long name. // REVIEW UNDONE IANEL Remove the fFirstParam and fLFNAware stuff as soon as this // is up and running. TraceMsg(TF_SHELLEXEC, "ShellExecuteEx: Using long version of path."); COPYTODST(lpTo, lpEnd, lpFile, lstrlen(lpFile), SE_ERR_ACCESSDENIED); break; case TEXT('D'): case TEXT('d'): { // %D gives the display name of an object. if (lpID && SUCCEEDED(SHGetNameAndFlags(lpID, SHGDN_FORPARSING, sz, ARRAYSIZE(sz), NULL))) { COPYTODST(lpTo, lpEnd, sz, lstrlen(sz), SE_ERR_ACCESSDENIED); } else return SE_ERR_ACCESSDENIED; break; } default: goto NormalChar; } // TraceMsg(TF_SHELLEXEC, "s.rp: Past first param (1)."); fFirstParam = FALSE; } else { NormalChar: // not a "%?" thing, just copy this to the destination if (lpEnd-lpTo < 2) { // Always check for room for DBCS char return(SE_ERR_ACCESSDENIED); } *lpTo++ = *lpFrom; // Special case for things like "%1" ie don't clear the first param flag // if we hit a dbl-quote. if (*lpFrom != TEXT('"')) { // TraceMsg(TF_SHELLEXEC, "s.rp: Past first param (2)."); fFirstParam = FALSE; } else if (IsDBCSLeadByte(*lpFrom)) { *lpTo++ = *(++lpFrom); } } } // We should always have enough room since we dec'ed cchTo when determining // lpEnd *lpTo = 0; // This means success return(0); } HWND ThreadID_GetVisibleWindow(DWORD dwID) { HWND hwnd; for (hwnd = GetWindow(GetDesktopWindow(), GW_CHILD); hwnd; hwnd = GetWindow(hwnd, GW_HWNDNEXT)) { DWORD dwIDTmp = GetWindowThreadProcessId(hwnd, NULL); TraceMsg(TF_SHELLEXEC, "s.ti_gvw: Hwnd %x Thread ID %x.", hwnd, dwIDTmp); if (IsWindowVisible(hwnd) && (dwIDTmp == dwID)) { TraceMsg(TF_SHELLEXEC, "s.ti_gvw: Found match %x.", hwnd); return hwnd; } } return NULL; } void ActivateHandler(HWND hwnd, DWORD_PTR dwHotKey) { ASSERT(hwnd); hwnd = GetTopParentWindow(hwnd); // returns non-NULL for any non-NULL input HWND hwndT = GetLastActivePopup(hwnd); // returns non-NULL for any non-NULL input if (!IsWindowVisible(hwndT)) { DWORD dwID = GetWindowThreadProcessId(hwnd, NULL); TraceMsg(TF_SHELLEXEC, "ActivateHandler: Hwnd %x Thread ID %x.", hwnd, dwID); ASSERT(dwID); // Find the first visible top level window owned by the // same guy that's handling the DDE conversation. hwnd = ThreadID_GetVisibleWindow(dwID); if (hwnd) { hwndT = GetLastActivePopup(hwnd); if (IsIconic(hwnd)) { TraceMsg(TF_SHELLEXEC, "ActivateHandler: Window is iconic, restoring."); ShowWindow(hwnd,SW_RESTORE); } else { TraceMsg(TF_SHELLEXEC, "ActivateHandler: Window is normal, bringing to top."); BringWindowToTop(hwnd); if (hwndT && hwnd != hwndT) BringWindowToTop(hwndT); } // set the hotkey if (dwHotKey) { SendMessage(hwnd, WM_SETHOTKEY, dwHotKey, 0); } } } } // Some apps when run no-active steal the focus anyway so we // we set it back to the previously active window. void FixActivationStealingApps(HWND hwndOldActive, int nShow) { HWND hwndNew; if (nShow == SW_SHOWMINNOACTIVE && (hwndNew = GetForegroundWindow()) != hwndOldActive && IsIconic(hwndNew)) SetForegroundWindow(hwndOldActive); } BOOL FindExistingDrv(LPCTSTR pszUNCRoot, LPTSTR pszLocalName) { int iDrive; for (iDrive = 0; iDrive < 26; iDrive++) { if (IsRemoteDrive(iDrive)) { TCHAR szDriveName[3]; DWORD cb = MAX_PATH; szDriveName[0] = (TCHAR)iDrive + (TCHAR)TEXT('A'); szDriveName[1] = TEXT(':'); szDriveName[2] = 0; SHWNetGetConnection(szDriveName, pszLocalName, &cb); if (lstrcmpi(pszUNCRoot, pszLocalName) == 0) { lstrcpy(pszLocalName, szDriveName); return(TRUE); } } } return(FALSE); } // Returns whether the given net path exists. This fails for NON net paths. // BOOL NetPathExists(LPCTSTR lpszPath, DWORD *lpdwType) { BOOL fResult = FALSE; NETRESOURCE nr; LPTSTR lpSystem; DWORD dwRes, dwSize = 1024; void * lpv; if (!lpszPath || !*lpszPath) return FALSE; lpv = (void *)LocalAlloc(LPTR, dwSize); if (!lpv) return FALSE; TryWNetAgain: nr.dwScope = RESOURCE_GLOBALNET; nr.dwType = RESOURCETYPE_ANY; nr.dwDisplayType = 0; nr.lpLocalName = NULL; nr.lpRemoteName = (LPTSTR)lpszPath; nr.lpProvider = NULL; nr.lpComment = NULL; dwRes = WNetGetResourceInformation(&nr, lpv, &dwSize, &lpSystem); // If our buffer wasn't big enough, try a bigger buffer... if (dwRes == WN_MORE_DATA) { void * tmp = LocalReAlloc(lpv, dwSize, LMEM_MOVEABLE); if (!tmp) { LocalFree(lpv); SetLastError(ERROR_OUTOFMEMORY); return FALSE; } lpv = tmp; goto TryWNetAgain; } fResult = (dwRes == WN_SUCCESS); if (fResult && lpdwType) *lpdwType = ((LPNETRESOURCE)lpv)->dwType; LocalFree(lpv); return fResult; } HRESULT _CheckExistingNet(LPCTSTR pszFile, LPCTSTR pszRoot, BOOL fPrint) { // // This used to be a call to GetFileAttributes(), but // GetFileAttributes() doesn't handle net paths very well. // However, we need to be careful, because other shell code // expects SHValidateUNC to return false for paths that point // to print shares. // HRESULT hr = S_FALSE; if (!PathIsRoot(pszFile)) { // if we are checking for a printshare, then it must be a Root if (fPrint) hr = E_FAIL; else if (PathFileExists(pszFile)) hr = S_OK; } if (S_FALSE == hr) { DWORD dwType; if (NetPathExists(pszRoot, &dwType)) { if (fPrint ? dwType != RESOURCETYPE_PRINT : dwType == RESOURCETYPE_PRINT) hr = E_FAIL; else hr = S_OK; } else if (-1 != GetFileAttributes(pszRoot)) { // // IE 4.01 SP1 QFE #104. GetFileAttributes now called // as a last resort become some clients often fail when using // WNetGetResourceInformation. For example, many NFS clients were // broken because of this. // hr = S_OK; } } if (hr == E_FAIL) SetLastError(ERROR_NOT_SUPPORTED); return hr; } HRESULT _CheckNetUse(HWND hwnd, LPTSTR pszShare, UINT fConnect, LPTSTR pszOut, DWORD cchOut) { NETRESOURCE rc; DWORD dw, err; DWORD dwRedir = CONNECT_TEMPORARY; if (!(fConnect & VALIDATEUNC_NOUI)) dwRedir |= CONNECT_INTERACTIVE; if (fConnect & VALIDATEUNC_CONNECT) dwRedir |= CONNECT_REDIRECT; // VALIDATE_PRINT happens only after a failed attempt to validate for // a file. That previous attempt will have given the option to // connect to other media -- don't do it here or the user will be // presented with the same dialog twice when the first one is cancelled. if (fConnect & VALIDATEUNC_PRINT) dwRedir |= CONNECT_CURRENT_MEDIA; rc.lpRemoteName = pszShare; rc.lpLocalName = NULL; rc.lpProvider = NULL; rc.dwType = (fConnect & VALIDATEUNC_PRINT) ? RESOURCETYPE_PRINT : RESOURCETYPE_DISK; err = WNetUseConnection(hwnd, &rc, NULL, NULL, dwRedir, pszOut, &cchOut, &dw); TraceMsg(TF_SHELLEXEC, "SHValidateUNC WNetUseConnection(%s) returned %x", pszShare, err); if (err) { SetLastError(err); return E_FAIL; } else if (fConnect & VALIDATEUNC_PRINT) { // just because WNetUse succeeded, doesnt mean // NetPathExists will. if it fails then // we shouldnt succeed this call regardless // because we are only interested in print shares. if (!NetPathExists(pszShare, &dw) || (dw != RESOURCETYPE_PRINT)) { SetLastError(ERROR_NOT_SUPPORTED); return E_FAIL; } } return S_OK; } // // SHValidateUNC // // This function validates a UNC path by calling WNetAddConnection3. // It will make it possible for the user to type a remote (RNA) UNC // app/document name from Start->Run dialog. // // fConnect - flags controling what to do // // VALIDATEUNC_NOUI // dont bring up stinking UI! // VALIDATEUNC_CONNECT // connect a drive letter // VALIDATEUNC_PRINT // validate as print share instead of disk share // BOOL WINAPI SHValidateUNC(HWND hwndOwner, LPTSTR pszFile, UINT fConnect) { HRESULT hr; TCHAR szShare[MAX_PATH]; BOOL fPrint = (fConnect & VALIDATEUNC_PRINT); ASSERT(PathIsUNC(pszFile)); ASSERT((fConnect & ~VALIDATEUNC_VALID) == 0); ASSERT((fConnect & VALIDATEUNC_CONNECT) ? !fPrint : TRUE); lstrcpyn(szShare, pszFile, ARRAYSIZE(szShare)); if (!PathStripToRoot(szShare)) { SetLastError(ERROR_PATH_NOT_FOUND); return FALSE; } if (fConnect & VALIDATEUNC_CONNECT) hr = S_FALSE; else hr = _CheckExistingNet(pszFile, szShare, fPrint); if (S_FALSE == hr) { TCHAR szAccessName[MAX_PATH]; if (!fPrint && FindExistingDrv(szShare, szAccessName)) { hr = S_OK; } else hr = _CheckNetUse(hwndOwner, szShare, fConnect, szAccessName, SIZECHARS(szAccessName)); if (S_OK == hr && !fPrint) { StrCatBuff(szAccessName, pszFile + lstrlen(szShare), ARRAYSIZE(szAccessName)); // The name should only get shorter, so no need to check length lstrcpy(pszFile, szAccessName); // Handle the root case if (pszFile[2] == TEXT('\0')) { pszFile[2] = TEXT('\\'); pszFile[3] = TEXT('\0'); } hr = _CheckExistingNet(pszFile, szShare, FALSE); } } return (hr == S_OK); } HINSTANCE WINAPI RealShellExecuteExA(HWND hwnd, LPCSTR lpOp, LPCSTR lpFile, LPCSTR lpArgs, LPCSTR lpDir, LPSTR lpResult, LPCSTR lpTitle, LPSTR lpReserved, WORD nShowCmd, LPHANDLE lphProcess, DWORD dwFlags) { SHELLEXECUTEINFOA sei = { sizeof(SHELLEXECUTEINFOA), SEE_MASK_FLAG_NO_UI|SEE_MASK_FORCENOIDLIST, hwnd, lpOp, lpFile, lpArgs, lpDir, nShowCmd, NULL}; TraceMsg(TF_SHELLEXEC, "RealShellExecuteExA(%04X, %s, %s, %s, %s, %s, %s, %s, %d, %08lX, %d)", hwnd, lpOp, lpFile, lpArgs, lpDir, lpResult, lpTitle, lpReserved, nShowCmd, lphProcess, dwFlags); // Pass along the lpReserved parameter to the new process if (lpReserved) { sei.fMask |= SEE_MASK_RESERVED; sei.hInstApp = (HINSTANCE)lpReserved; } // Pass along the lpTitle parameter to the new process if (lpTitle) { sei.fMask |= SEE_MASK_HASTITLE; sei.lpClass = lpTitle; } // Pass along the SEPARATE_VDM flag if (dwFlags & EXEC_SEPARATE_VDM) { sei.fMask |= SEE_MASK_FLAG_SEPVDM; } // Pass along the NO_CONSOLE flag if (dwFlags & EXEC_NO_CONSOLE) { sei.fMask |= SEE_MASK_NO_CONSOLE; } if (lphProcess) { // Return the process handle sei.fMask |= SEE_MASK_NOCLOSEPROCESS; ShellExecuteExA(&sei); *lphProcess = sei.hProcess; } else { ShellExecuteExA(&sei); } return sei.hInstApp; } HINSTANCE WINAPI RealShellExecuteExW(HWND hwnd, LPCWSTR lpOp, LPCWSTR lpFile, LPCWSTR lpArgs, LPCWSTR lpDir, LPWSTR lpResult, LPCWSTR lpTitle, LPWSTR lpReserved, WORD nShowCmd, LPHANDLE lphProcess, DWORD dwFlags) { SHELLEXECUTEINFOW sei = { sizeof(SHELLEXECUTEINFOW), SEE_MASK_FLAG_NO_UI|SEE_MASK_FORCENOIDLIST, hwnd, lpOp, lpFile, lpArgs, lpDir, nShowCmd, NULL}; TraceMsg(TF_SHELLEXEC, "RealShellExecuteExW(%04X, %s, %s, %s, %s, %s, %s, %s, %d, %08lX, %d)", hwnd, lpOp, lpFile, lpArgs, lpDir, lpResult, lpTitle, lpReserved, nShowCmd, lphProcess, dwFlags); if (lpReserved) { sei.fMask |= SEE_MASK_RESERVED; sei.hInstApp = (HINSTANCE)lpReserved; } if (lpTitle) { sei.fMask |= SEE_MASK_HASTITLE; sei.lpClass = lpTitle; } if (dwFlags & EXEC_SEPARATE_VDM) { sei.fMask |= SEE_MASK_FLAG_SEPVDM; } if (dwFlags & EXEC_NO_CONSOLE) { sei.fMask |= SEE_MASK_NO_CONSOLE; } if (lphProcess) { // Return the process handle sei.fMask |= SEE_MASK_NOCLOSEPROCESS; ShellExecuteExW(&sei); *lphProcess = sei.hProcess; } else { ShellExecuteExW(&sei); } return sei.hInstApp; } HINSTANCE WINAPI RealShellExecuteA(HWND hwnd, LPCSTR lpOp, LPCSTR lpFile, LPCSTR lpArgs, LPCSTR lpDir, LPSTR lpResult, LPCSTR lpTitle, LPSTR lpReserved, WORD nShowCmd, LPHANDLE lphProcess) { TraceMsg(TF_SHELLEXEC, "RealShellExecuteA(%04X, %s, %s, %s, %s, %s, %s, %s, %d, %08lX)", hwnd, lpOp, lpFile, lpArgs, lpDir, lpResult, lpTitle, lpReserved, nShowCmd, lphProcess); return RealShellExecuteExA(hwnd,lpOp,lpFile,lpArgs,lpDir,lpResult,lpTitle,lpReserved,nShowCmd,lphProcess,0); } HINSTANCE RealShellExecuteW(HWND hwnd, LPCWSTR lpOp, LPCWSTR lpFile, LPCWSTR lpArgs, LPCWSTR lpDir, LPWSTR lpResult, LPCWSTR lpTitle, LPWSTR lpReserved, WORD nShowCmd, LPHANDLE lphProcess) { TraceMsg(TF_SHELLEXEC, "RealShellExecuteW(%04X, %s, %s, %s, %s, %s, %s, %s, %d, %08lX)", hwnd, lpOp, lpFile, lpArgs, lpDir, lpResult, lpTitle, lpReserved, nShowCmd, lphProcess); return RealShellExecuteExW(hwnd,lpOp,lpFile,lpArgs,lpDir,lpResult,lpTitle,lpReserved,nShowCmd,lphProcess,0); } HINSTANCE WINAPI ShellExecute(HWND hwnd, LPCTSTR lpOp, LPCTSTR lpFile, LPCTSTR lpArgs, LPCTSTR lpDir, int nShowCmd) { // NB The FORCENOIDLIST flag stops us from going through the ShellExecPidl() // code (for backwards compatability with progman). // DDEWAIT makes us synchronous, and gets around threads without // msg pumps and ones that are killed immediately after shellexec() SHELLEXECUTEINFO sei = { sizeof(SHELLEXECUTEINFO), 0, hwnd, lpOp, lpFile, lpArgs, lpDir, nShowCmd, NULL}; ULONG fMask = SEE_MASK_FLAG_NO_UI|SEE_MASK_FORCENOIDLIST; if(!(SHGetAppCompatFlags(ACF_WIN95SHLEXEC) & ACF_WIN95SHLEXEC)) fMask |= SEE_MASK_FLAG_DDEWAIT; sei.fMask = fMask; TraceMsg(TF_SHELLEXEC, "ShellExecute(%04X, %s, %s, %s, %s, %d)", hwnd, lpOp, lpFile, lpArgs, lpDir, nShowCmd); ShellExecuteEx(&sei); return sei.hInstApp; } HINSTANCE WINAPI ShellExecuteA(HWND hwnd, LPCSTR lpOp, LPCSTR lpFile, LPCSTR lpArgs, LPCSTR lpDir, int nShowCmd) { // NB The FORCENOIDLIST flag stops us from going through the ShellExecPidl() // code (for backwards compatability with progman). // DDEWAIT makes us synchronous, and gets around threads without // msg pumps and ones that are killed immediately after shellexec() SHELLEXECUTEINFOA sei = { sizeof(SHELLEXECUTEINFOA), 0, hwnd, lpOp, lpFile, lpArgs, lpDir, nShowCmd, NULL}; ULONG fMask = SEE_MASK_FLAG_NO_UI|SEE_MASK_FORCENOIDLIST; if (!(SHGetAppCompatFlags(ACF_WIN95SHLEXEC) & ACF_WIN95SHLEXEC)) fMask |= SEE_MASK_FLAG_DDEWAIT; sei.fMask = fMask; TraceMsg(TF_SHELLEXEC, "ShellExecuteA(%04X, %S, %S, %S, %S, %d)", hwnd, SAFE_DEBUGSTR(lpOp), SAFE_DEBUGSTR(lpFile), SAFE_DEBUGSTR(lpArgs), SAFE_DEBUGSTR(lpDir), nShowCmd); ShellExecuteExA(&sei); return sei.hInstApp; } // Returns TRUE if the specified app is listed under the specified key STDAPI_(BOOL) IsNameListedUnderKey(LPCTSTR pszFileName, LPCTSTR pszKey) { HKEY hkey; // Enum through the list of apps. if (RegOpenKey(HKEY_CURRENT_USER, pszKey, &hkey) == ERROR_SUCCESS) { TCHAR szValue[MAX_PATH], szData[MAX_PATH]; DWORD dwType, cbData = sizeof(szData); DWORD cchValue = ARRAYSIZE(szValue); int iValue = 0; while (RegEnumValue(hkey, iValue, szValue, &cchValue, NULL, &dwType, (LPBYTE)szData, &cbData) == ERROR_SUCCESS) { if (lstrcmpi(szData, pszFileName) == 0) { RegCloseKey(hkey); return TRUE; } cbData = sizeof(szData); cchValue = ARRAYSIZE(szValue); iValue++; } RegCloseKey(hkey); } return FALSE; } #define REGSTR_PATH_POLICIES_EXPLORER REGSTR_PATH_POLICIES TEXT("\\Explorer\\RestrictRun") #define REGSTR_PATH_POLICIES_EXPLORER_DISALLOW REGSTR_PATH_POLICIES TEXT("\\Explorer\\DisallowRun") //---------------------------------------------------------------------------- // Returns TRUE if the specified app is not on the list of unrestricted apps. BOOL RestrictedApp(LPCTSTR pszApp) { LPTSTR pszFileName; pszFileName = PathFindFileName(pszApp); TraceMsg(TF_SHELLEXEC, "RestrictedApp: %s ", pszFileName); // Special cases: // Apps you can always run. if (lstrcmpi(pszFileName, c_szRunDll) == 0) return FALSE; if (lstrcmpi(pszFileName, TEXT("systray.exe")) == 0) return FALSE; return !IsNameListedUnderKey(pszFileName, REGSTR_PATH_POLICIES_EXPLORER); } //---------------------------------------------------------------------------- // Returns TRUE if the specified app is on the list of disallowed apps. BOOL DisallowedApp(LPCTSTR pszApp) { LPTSTR pszFileName; pszFileName = PathFindFileName(pszApp); TraceMsg(TF_SHELLEXEC, "DisallowedApp: %s ", pszFileName); return IsNameListedUnderKey(pszFileName, REGSTR_PATH_POLICIES_EXPLORER_DISALLOW); } //---------------------------------------------------------------------------- // Returns TRUE if the system has FAT32 drives. BOOL HasFat32Drives() { static BOOL fHasFat32Drives = -1; // -1 means unverified. int iDrive; if (fHasFat32Drives != -1) return fHasFat32Drives; // Assume false fHasFat32Drives = FALSE; for (iDrive = 0; iDrive < 26; iDrive++) { TCHAR szDriveName[4]; if (GetDriveType((LPTSTR)PathBuildRoot(szDriveName, iDrive)) == DRIVE_FIXED) { TCHAR szFileSystemName[12]; if (GetVolumeInformation(szDriveName, NULL, 0, NULL, NULL, NULL, szFileSystemName, ARRAYSIZE(szFileSystemName))) { if (lstrcmpi(szFileSystemName, TEXT("FAT32"))==0) { fHasFat32Drives = TRUE; return fHasFat32Drives; } } } } return fHasFat32Drives; } typedef struct { // local data HWND hDlg; // parameters DWORD dwHelpId; LPCTSTR lpszTitle; DWORD dwResString; BOOL fHardBlock; BOOL fDone; } APPCOMPATDLG_DATA, *PAPPCOMPATDLG_DATA; BOOL_PTR CALLBACK AppCompat_DlgProc(HWND hDlg, UINT uMsg, WPARAM wParam, LPARAM lParam) { PAPPCOMPATDLG_DATA lpdata = (PAPPCOMPATDLG_DATA)GetWindowLongPtr(hDlg, DWLP_USER); DWORD aHelpIDs[4]; switch (uMsg) { case WM_INITDIALOG: { TCHAR szMsgText[2048]; /* The title will be in the lParam. */ lpdata = (PAPPCOMPATDLG_DATA)lParam; lpdata->hDlg = hDlg; if (lpdata->fHardBlock) { // Disable the "Run" button. EnableWindow(GetDlgItem(hDlg, IDOK), FALSE); } SetWindowLongPtr(hDlg, DWLP_USER, (LONG_PTR)lpdata); SetWindowText(hDlg, lpdata->lpszTitle); LoadString(HINST_THISDLL, lpdata->dwResString, szMsgText, ARRAYSIZE(szMsgText)); SetDlgItemText(hDlg, IDD_LINE_1, szMsgText); return TRUE; } case WM_DESTROY: break; case WM_HELP: // WinHelp((HWND)((LPHELPINFO)lParam)->hItemHandle, TEXT("apps.chm>Proc4"), HELP_CONTEXT, 0); HtmlHelp((HWND)((LPHELPINFO)lParam)->hItemHandle, TEXT("apps.chm>Proc4"), HELP_CONTEXT, 0); break; case WM_COMMAND: switch (GET_WM_COMMAND_ID(wParam, lParam)) { case IDHELP: aHelpIDs[0]=IDHELP; aHelpIDs[1]=lpdata->dwHelpId; aHelpIDs[2]=0; aHelpIDs[3]=0; // WinHelp(hDlg, TEXT("apps.chm>Proc4"), HELP_CONTEXT, (DWORD)lpdata->dwHelpId); HtmlHelp(hDlg, TEXT("apps.chm>Proc4"), HH_HELP_CONTEXT, (DWORD)lpdata->dwHelpId); break; case IDD_COMMAND: case IDOK: if (IsDlgButtonChecked(hDlg, IDD_STATE)) EndDialog(hDlg, 0x8000 | IDOK); else EndDialog(hDlg, IDOK); break; case IDCANCEL: EndDialog(hDlg, IDCANCEL); break; default: return FALSE; } break; default: return FALSE; } return TRUE; } BOOL _GetAppCompatData(LPCTSTR pszAppPath, LPCTSTR pszAppName, LPCTSTR *ppszNewEnvString, HKEY hkApp, APPCOMPATDLG_DATA *pdata, LPTSTR pszValue, DWORD cchValue) { BOOL fRet = FALSE; BOOL fBreakOutOfTheLoop=FALSE; int iValue; // Enum keys under this app name and check for dependant files. for (iValue = 0; !fBreakOutOfTheLoop; iValue++) { DWORD cch = cchValue; DWORD dwType; BYTE *pvData; DWORD cbData; LONG lResult; lResult = RegEnumValue(hkApp, iValue, pszValue, &cch, NULL, &dwType, NULL, &cbData); if ((lResult != NOERROR) && (lResult != ERROR_MORE_DATA)) { // no more values break; } // insure this is our kind of data if (dwType != REG_BINARY) continue; pvData = (BYTE *) GlobalAlloc(GPTR, cbData); if (pvData) { cch = cchValue; if (NOERROR == RegEnumValue(hkApp, iValue, pszValue, &cch, NULL, &dwType, pvData, &cbData)) { BADAPP_DATA badAppData; BADAPP_PROP badAppProp; badAppProp.Size = sizeof(BADAPP_PROP); badAppData.Size = sizeof(BADAPP_DATA); badAppData.FilePath = pszAppPath; badAppData.Blob = pvData; badAppData.BlobSize = cbData; if (SHIsBadApp(&badAppData, &badAppProp)) { // // we found a bad app // pdata->dwHelpId = badAppProp.MsgId; pdata->lpszTitle = pszAppName; fRet=TRUE; // Map ids to message strings for the various platforms we run on switch (badAppProp.AppType & APPTYPE_TYPE_MASK) { case APPTYPE_MINORPROBLEM: pdata->dwResString = IDS_APPCOMPATWIN95L; break; case APPTYPE_INC_HARDBLOCK: pdata->fHardBlock = TRUE; pdata->dwResString = IDS_APPCOMPATWIN95H; break; case APPTYPE_INC_NOBLOCK: pdata->dwResString = IDS_APPCOMPATWIN95; break; case APPTYPE_VERSIONSUB: { static const LPCTSTR VersionFlavors[] = { TEXT("_COMPAT_VER_NNN=4,0,1381,3,0,2,Service Pack 3"), TEXT("_COMPAT_VER_NNN=4,0,1381,4,0,2,Service Pack 4"), TEXT("_COMPAT_VER_NNN=4,0,1381,5,0,2,Service Pack 5"), TEXT("_COMPAT_VER_NNN=4,0,950,0,0,1"), 0}; // // Is the ID within the number of strings we have? // if (badAppProp.MsgId <= (sizeof(VersionFlavors) / sizeof(LPTSTR) - 1)) { *ppszNewEnvString = VersionFlavors[badAppProp.MsgId]; } fRet = FALSE; } break; case APPTYPE_SHIM: // // If there is a shim for this app do not display // any message // fRet = FALSE; break; default: continue; } // this will break us out fBreakOutOfTheLoop = TRUE; } } GlobalFree((HANDLE)pvData); } } return fRet; } typedef enum { SEV_DEFAULT = 0, SEV_LOW, SEV_HARD, } SEVERITY; BOOL _GetBadAppData(LPCTSTR pszAppPath, LPCTSTR pszAppName, HKEY hkApp, APPCOMPATDLG_DATA *pdata, LPTSTR pszValue, DWORD cchValue) { BOOL fRet = FALSE; int iValue; TCHAR szPath[MAX_PATH]; DWORD cchPath; LPTSTR pchCopyToPath; // Get directory of this app so that we can check for dependant files. StrCpyN(szPath, pszAppPath, ARRAYSIZE(szPath)); PathRemoveFileSpec(szPath); PathAddBackslash(szPath); cchPath = lstrlen(szPath); pchCopyToPath = &szPath[cchPath]; cchPath = ARRAYSIZE(szPath) - cchPath; for (iValue = 0; !fRet; iValue++) { DWORD cch = cchValue; TCHAR szData[MAX_PATH]; DWORD cbData = sizeof(szData); DWORD dwType; if (NOERROR == RegEnumValue(hkApp, iValue, pszValue, &cch, NULL, &dwType, (LPBYTE)szData, &cbData)) { // Fully qualified path to dependant file StrCpyN(pchCopyToPath, pszValue, cchPath); // * means match any file. if (pszValue[0] == TEXT('*') || PathFileExistsAndAttributes(szPath, NULL)) { DWORD rgData[2]; DWORD dwHelpId = StrToInt(szData); SEVERITY sev = SEV_DEFAULT; // Get the flags... lstrcpy(szData, TEXT("Flags")); StrCatBuff(szData, pszValue, ARRAYSIZE(szData)); cbData = sizeof(szData); if (SHQueryValueEx(hkApp, szData, NULL, &dwType, (LPBYTE)szData, &cbData) == ERROR_SUCCESS && cbData >= 1) { if (StrChr(szData, TEXT('L'))) sev = SEV_LOW; if (StrChr(szData, TEXT('Y'))) sev = SEV_HARD; if ((StrChr(szData, TEXT('N')) && !(GetSystemMetrics(SM_NETWORK) & RNC_NETWORKS)) || (StrChr(szData, TEXT('F')) && !HasFat32Drives())) { continue; } } // Check the version if any... lstrcpy(szData, TEXT("Version")); StrCatBuff(szData, pszValue, ARRAYSIZE(szData)); cbData = sizeof(rgData); if (SHQueryValueEx(hkApp, szData, NULL, &dwType, (LPBYTE)rgData, &cbData) == ERROR_SUCCESS && (cbData == 8)) { DWORD dwVerLen, dwVerHandle; DWORD dwMajorVer, dwMinorVer; DWORD dwBadMajorVer, dwBadMinorVer; LPTSTR lpVerBuffer; BOOL fBadApp = FALSE; // What is a bad version according to the registry key? dwBadMajorVer = rgData[0]; dwBadMinorVer = rgData[1]; // If no version resource can be found, assume 0. dwMajorVer = 0; dwMinorVer = 0; // Version data in inf file should be of the form 8 bytes // Major Minor // 3.10 10.10 // 40 30 20 10 is 10 20 30 40 in registry // cast const -> non const if (0 != (dwVerLen = GetFileVersionInfoSize((LPTSTR)pszAppPath, &dwVerHandle))) { lpVerBuffer = (LPTSTR)GlobalAlloc(GPTR, dwVerLen); if (lpVerBuffer) { VS_FIXEDFILEINFO *pffi = NULL; UINT cb; if (GetFileVersionInfo((LPTSTR)pszAppPath, dwVerHandle, dwVerLen, lpVerBuffer) && VerQueryValue(lpVerBuffer, TEXT("\\"), (void **)&pffi, &cb)) { dwMajorVer = pffi->dwProductVersionMS; dwMinorVer = pffi->dwProductVersionLS; } GlobalFree((HANDLE)lpVerBuffer); } } if (dwMajorVer < dwBadMajorVer) fBadApp = TRUE; else if ((dwMajorVer == dwBadMajorVer) && (dwMinorVer <= dwBadMinorVer)) fBadApp = TRUE; if (!fBadApp) { // This dude is ok continue; } } pdata->dwHelpId = dwHelpId; pdata->lpszTitle = pszAppName; // Map ids to message strings for the various platforms we run on switch (sev) { case SEV_LOW: pdata->dwResString = IDS_APPCOMPATWIN95L; break; case SEV_HARD: pdata->fHardBlock = TRUE; pdata->dwResString = IDS_APPCOMPATWIN95H; break; default: pdata->dwResString = IDS_APPCOMPATWIN95; } // this will break us out fRet = TRUE; } } else break; } return fRet; } HKEY _OpenBadAppKey(LPCTSTR pszApp, LPCTSTR pszName) { HKEY hkBad = NULL; DWORD dwAppVersion = GetExeType(pszApp); ASSERT(pszApp && *pszApp && pszName && *pszName); if (HIWORD(dwAppVersion) < 0x0400) { // Check the reg key for apps older than 4.00 RegOpenKey(HKEY_LOCAL_MACHINE, REGSTR_PATH_CHECKBADAPPSNEW, &hkBad); } else if (HIWORD(dwAppVersion) == 0x0400) { // Check the reg key for apps == 4.00 RegOpenKey(HKEY_LOCAL_MACHINE, REGSTR_PATH_CHECKBADAPPS400NEW, &hkBad); } // else // Newer than 4.0 so all should be fine. if (hkBad) { // Check for the app name HKEY hkRet = NULL; RegOpenKey(hkBad, pszName, &hkRet); RegCloseKey(hkBad); return hkRet; } return NULL; } HKEY _CheckBadApps(LPCTSTR pszAppPath, LPCTSTR pszAppName, APPCOMPATDLG_DATA *pdata, LPTSTR pszValue, DWORD cchValue) { HKEY hkApp = _OpenBadAppKey(pszAppPath, pszAppName); if (hkApp) { TraceMsg(TF_SHELLEXEC, "CheckBadApps() maybe is bad %s", pszAppName); if (_GetBadAppData(pszAppPath, pszAppName, hkApp, pdata, pszValue, cchValue)) return hkApp; RegCloseKey(hkApp); } return NULL; } HKEY _OpenAppCompatKey(LPCTSTR pszAppName) { TCHAR sz[MAX_PATH]; HKEY hkRet = NULL; wnsprintf(sz, SIZECHARS(sz), REGSTR_TEMP_APPCOMPATPATH, pszAppName); RegOpenKey(HKEY_LOCAL_MACHINE, sz, &hkRet); return hkRet; } HKEY _CheckAppCompat(LPCTSTR pszAppPath, LPCTSTR pszAppName, LPCTSTR *ppszNewEnvString, APPCOMPATDLG_DATA *pdata, LPTSTR pszValue, DWORD cchValue) { HKEY hkApp = _OpenAppCompatKey(pszAppName); if (hkApp) { TraceMsg(TF_SHELLEXEC, "CheckAppCompat() maybe is bad %s", pszAppName); if (_GetAppCompatData(pszAppPath, pszAppName, ppszNewEnvString, hkApp, pdata, pszValue, cchValue)) return hkApp; RegCloseKey(hkApp); } return NULL; } // Returns FALSE if app is fatally incompatible BOOL CheckAppCompatibility(LPCTSTR pszApp, LPCTSTR *ppszNewEnvString, BOOL fNoUI, HWND hwnd) { BOOL fRet = TRUE; // If no app name, then nothing to check, so pretend it's a good app. // Must check now or RegOpenKey will get a null string and behave // "nonintuitively". (If you give RegOpenKey a null string, it // returns the same key back and does *not* bump the refcount.) if (pszApp && *pszApp) { LPCTSTR pszFileName = PathFindFileName(pszApp); if (pszFileName && *pszFileName) { APPCOMPATDLG_DATA data = {0}; TCHAR szValue[MAX_PATH]; HKEY hkBad = _CheckAppCompat(pszApp, pszFileName, ppszNewEnvString, &data, szValue, ARRAYSIZE(szValue)); if (!hkBad) hkBad = _CheckBadApps(pszApp, pszFileName, &data, szValue, ARRAYSIZE(szValue)); if (hkBad) { TraceMsg(TF_SHELLEXEC, "BADAPP %s", pszFileName); if (fNoUI && !hwnd) { // // LEGACY - we just let soft blocks right on through - ZekeL - 27-MAY-99 // the NOUI flag is usually passed by apps when they // have very specific behavior they are looking for. // if that is the case we should probably just defer to them // unless we know it is really bad. // if (data.fHardBlock) fRet = FALSE; else fRet = TRUE; } else { int iRet = (int)DialogBoxParam(HINST_THISDLL, MAKEINTRESOURCE(DLG_APPCOMPAT), hwnd, AppCompat_DlgProc, (LPARAM)&data); if (iRet & 0x8000) { // Delete so we don't warn again. RegDeleteValue(hkBad, szValue); } if ((iRet & 0x0FFF) != IDOK) fRet = FALSE; } RegCloseKey(hkBad); } } } return fRet; } /* * Returns: * S_OK or error. * *phrHook is hook result if S_OK is returned, otherwise it is S_FALSE. */ HRESULT InvokeShellExecuteHook(REFGUID clsidHook, LPSHELLEXECUTEINFO pei, HRESULT *phrHook) { *phrHook = S_FALSE; IUnknown *punk; HRESULT hr = SHExtCoCreateInstance(NULL, &clsidHook, NULL, IID_PPV_ARG(IUnknown, &punk)); if (hr == S_OK) { IShellExecuteHook *pshexhk; hr = punk->QueryInterface(IID_PPV_ARG(IShellExecuteHook, &pshexhk)); if (hr == S_OK) { *phrHook = pshexhk->Execute(pei); pshexhk->Release(); } else { IShellExecuteHookA *pshexhkA; hr = punk->QueryInterface(IID_PPV_ARG(IShellExecuteHookA, &pshexhkA)); if (SUCCEEDED(hr)) { SHELLEXECUTEINFOA seia; UINT cchVerb = 0; UINT cchFile = 0; UINT cchParameters = 0; UINT cchDirectory = 0; UINT cchClass = 0; LPSTR lpszBuffer; seia = *(SHELLEXECUTEINFOA*)pei; // Copy all of the binary data if (pei->lpVerb) { cchVerb = WideCharToMultiByte(CP_ACP,0, pei->lpVerb, -1, NULL, 0, NULL, NULL) + 1; } if (pei->lpFile) cchFile = WideCharToMultiByte(CP_ACP,0, pei->lpFile, -1, NULL, 0, NULL, NULL)+1; if (pei->lpParameters) cchParameters = WideCharToMultiByte(CP_ACP,0, pei->lpParameters, -1, NULL, 0, NULL, NULL)+1; if (pei->lpDirectory) cchDirectory = WideCharToMultiByte(CP_ACP,0, pei->lpDirectory, -1, NULL, 0, NULL, NULL)+1; if (_UseClassName(pei->fMask) && pei->lpClass) cchClass = WideCharToMultiByte(CP_ACP,0, pei->lpClass, -1, NULL, 0, NULL, NULL)+1; lpszBuffer = (LPSTR) alloca(cchVerb+cchFile+cchParameters+cchDirectory+cchClass); seia.lpVerb = NULL; seia.lpFile = NULL; seia.lpParameters = NULL; seia.lpDirectory = NULL; seia.lpClass = NULL; // // Convert all of the strings to ANSI // if (pei->lpVerb) { WideCharToMultiByte(CP_ACP, 0, pei->lpVerb, -1, lpszBuffer, cchVerb, NULL, NULL); seia.lpVerb = lpszBuffer; lpszBuffer += cchVerb; } if (pei->lpFile) { WideCharToMultiByte(CP_ACP, 0, pei->lpFile, -1, lpszBuffer, cchFile, NULL, NULL); seia.lpFile = lpszBuffer; lpszBuffer += cchFile; } if (pei->lpParameters) { WideCharToMultiByte(CP_ACP, 0, pei->lpParameters, -1, lpszBuffer, cchParameters, NULL, NULL); seia.lpParameters = lpszBuffer; lpszBuffer += cchParameters; } if (pei->lpDirectory) { WideCharToMultiByte(CP_ACP, 0, pei->lpDirectory, -1, lpszBuffer, cchDirectory, NULL, NULL); seia.lpDirectory = lpszBuffer; lpszBuffer += cchDirectory; } if (_UseClassName(pei->fMask) && pei->lpClass) { WideCharToMultiByte(CP_ACP, 0, pei->lpClass, -1, lpszBuffer, cchClass, NULL, NULL); seia.lpClass = lpszBuffer; } *phrHook = pshexhkA->Execute(&seia); pei->hInstApp = seia.hInstApp; // hook may set hProcess (e.g. CURLExec creates dummy process // to signal IEAK that IE setup failed -- in browser only mode) pei->hProcess = seia.hProcess; pshexhkA->Release(); } } punk->Release(); } return(hr); } const TCHAR c_szShellExecuteHooks[] = REGSTR_PATH_EXPLORER TEXT("\\ShellExecuteHooks"); /* * Returns: * S_OK Execution handled by hook. pei->hInstApp filled in. * S_FALSE Execution not handled by hook. pei->hInstApp not filled in. * E_... Error during execution by hook. pei->hInstApp filled in. */ HRESULT TryShellExecuteHooks(LPSHELLEXECUTEINFO pei) { HRESULT hr = S_FALSE; HKEY hkeyHooks; // Enumerate the list of hooks. A hook is registered as a GUID value of the // c_szShellExecuteHooks key. if (RegOpenKey(HKEY_LOCAL_MACHINE, c_szShellExecuteHooks, &hkeyHooks) == ERROR_SUCCESS) { DWORD dwiValue; TCHAR szCLSID[GUIDSTR_MAX]; DWORD cchCLSID; // Invoke each hook. A hook returns S_FALSE if it does not handle the // exec. Stop when a hook returns S_OK (handled) or an error. for (cchCLSID = ARRAYSIZE(szCLSID), dwiValue = 0; RegEnumValue(hkeyHooks, dwiValue, szCLSID, &cchCLSID, NULL, NULL, NULL, NULL) == ERROR_SUCCESS; cchCLSID = ARRAYSIZE(szCLSID), dwiValue++) { CLSID clsidHook; if (SUCCEEDED(SHCLSIDFromString(szCLSID, &clsidHook))) { HRESULT hrHook; if (InvokeShellExecuteHook(clsidHook, pei, &hrHook) == S_OK && hrHook != S_FALSE) { hr = hrHook; break; } } } RegCloseKey(hkeyHooks); } ASSERT(hr == S_FALSE || (hr == S_OK && ISSHELLEXECSUCCEEDED(pei->hInstApp)) || (FAILED(hr) && ! ISSHELLEXECSUCCEEDED(pei->hInstApp))); return(hr); } BOOL InRunDllProcess(void) { static BOOL s_fInRunDll = -1; if (-1 == s_fInRunDll) { TCHAR sz[MAX_PATH]; s_fInRunDll = FALSE; if (GetModuleFileName(NULL, sz, SIZECHARS(sz))) { // // WARNING - rundll often seems to fail to add the DDEWAIT flag, and // it often needs to since it is common to use rundll as a fire // and forget process, and it exits too early. // if (StrStrI(sz, TEXT("rundll"))) s_fInRunDll = TRUE; } } return s_fInRunDll; } #ifdef DEBUG /*---------------------------------------------------------- Purpose: Validation function for SHELLEXECUTEINFO */ BOOL IsValidPSHELLEXECUTEINFO(LPSHELLEXECUTEINFO pei) { // // Note that we do *NOT* validate hInstApp, for several reasons. // // 1. It is an OUT parameter, not an IN parameter. // 2. It often contains an error code (see documentation). // 3. Even when it contains an HINSTANCE, it's an HINSTANCE // in another process, so we can't validate it anyway. // return (IS_VALID_WRITE_PTR(pei, SHELLEXECUTEINFO) && IS_VALID_SIZE(pei->cbSize, sizeof(*pei)) && (IsFlagSet(pei->fMask, SEE_MASK_FLAG_NO_UI) || NULL == pei->hwnd || IS_VALID_HANDLE(pei->hwnd, WND)) && (NULL == pei->lpVerb || IS_VALID_STRING_PTR(pei->lpVerb, -1)) && (NULL == pei->lpFile || IS_VALID_STRING_PTR(pei->lpFile, -1)) && (NULL == pei->lpParameters || IS_VALID_STRING_PTR(pei->lpParameters, -1)) && (NULL == pei->lpDirectory || IS_VALID_STRING_PTR(pei->lpDirectory, -1)) && (IsFlagClear(pei->fMask, SEE_MASK_IDLIST) || IsFlagSet(pei->fMask, SEE_MASK_INVOKEIDLIST) || // because SEE_MASK_IDLIST is part of SEE_MASK_INVOKEIDLIST this line will IS_VALID_PIDL((LPCITEMIDLIST)(pei->lpIDList))) && // defer to the next clause if the superset is true (IsFlagClear(pei->fMask, SEE_MASK_INVOKEIDLIST) || NULL == pei->lpIDList || IS_VALID_PIDL((LPCITEMIDLIST)(pei->lpIDList))) && (!_UseClassName(pei->fMask) || IS_VALID_STRING_PTR(pei->lpClass, -1)) && (!_UseTitleName(pei->fMask) || NULL == pei->lpClass || IS_VALID_STRING_PTR(pei->lpClass, -1)) && (!_UseClassKey(pei->fMask) || IS_VALID_HANDLE(pei->hkeyClass, KEY)) && (IsFlagClear(pei->fMask, SEE_MASK_ICON) || IS_VALID_HANDLE(pei->hIcon, ICON))); } #endif // DEBUG // // ShellExecuteEx // // returns TRUE if the execute succeeded, in which case // hInstApp should be the hinstance of the app executed (>32) // NOTE: in some cases the HINSTANCE cannot (currently) be determined. // In these cases, hInstApp is set to 42. // // returns FALSE if the execute did not succeed, in which case // GetLastError will contain error information // For backwards compatibility, hInstApp will contain the // best SE_ERR_ error information (<=32) possible. // BOOL WINAPI ShellExecuteEx(LPSHELLEXECUTEINFO pei) { DWORD err = NOERROR; // Don't overreact if CoInitializeEx fails; it just means we // can't do our shell hooks. HRESULT hrInit = SHCoInitialize(); if (IS_VALID_STRUCT_PTR(pei, SHELLEXECUTEINFO) && sizeof(*pei) == pei->cbSize) { // This internal bit prevents error message box reporting // when we recurse back into ShellExecuteEx ULONG ulOriginalMask = pei->fMask; pei->fMask |= SEE_MASK_FLAG_SHELLEXEC; if (SHRegGetBoolUSValue(TEXT("Software\\Microsoft\\Windows\\CurrentVersion\\Explorer"), TEXT("MaximizeApps"), FALSE, FALSE)) // && (GetSystemMetrics(SM_CYSCREEN)<=600)) { switch (pei->nShow) { case SW_NORMAL: case SW_SHOW: case SW_RESTORE: case SW_SHOWDEFAULT: pei->nShow = SW_MAXIMIZE; } } if (!(pei->fMask & SEE_MASK_FLAG_DDEWAIT) && InRunDllProcess()) { // // WARNING - rundll often seems to fail to add the DDEWAIT flag, and // it often needs to since it is common to use rundll as a fire // and forget process, and it exits too early. // pei->fMask |= (SEE_MASK_FLAG_DDEWAIT | SEE_MASK_WAITFORINPUTIDLE); } // ShellExecuteNormal does its own SetLastError err = ShellExecuteNormal(pei); // Mike's attempt to be consistent in error reporting: if (err != ERROR_SUCCESS) { // we shouldn't put up errors on dll's not found. // this is handled WITHIN shellexecuteNormal because // sometimes kernel will put up the message for us, and sometimes // we need to. we've put the curtion at ShellExecuteNormal // LEGACY - ERROR_RESTRICTED_APP was never mapped to a valid error - ZekeL 2001-FEB-14 // because we always called _ShellExecuteError() before // resetting the mask to ulOriginalMask, we never mapped // ERROR_RESTRICTED_APP (which is -1) to a valid code if (err != ERROR_DLL_NOT_FOUND && err != ERROR_CANCELLED) { _ShellExecuteError(pei, NULL, err); } } pei->fMask = ulOriginalMask; } else { // Failed parameter validation pei->hInstApp = (HINSTANCE)SE_ERR_ACCESSDENIED; err = ERROR_ACCESS_DENIED; } SHCoUninitialize(hrInit); if (err != ERROR_SUCCESS) SetLastError(err); return err == ERROR_SUCCESS; } //+------------------------------------------------------------------------- // // Function: ShellExecuteExA // // Synopsis: Thunks ANSI call to ShellExecuteA to ShellExecuteW // // Arguments: [pei] -- pointer to an ANSI SHELLEXECUTINFO struct // // Returns: BOOL success value // // History: 2-04-95 bobday Created // 2-06-95 davepl Changed to ConvertStrings // // Notes: // //-------------------------------------------------------------------------- inline BOOL _ThunkClass(ULONG fMask) { return (fMask & SEE_MASK_HASLINKNAME) || (fMask & SEE_MASK_HASTITLE) || _UseClassName(fMask); } BOOL WINAPI ShellExecuteExA(LPSHELLEXECUTEINFOA pei) { if (pei->cbSize != sizeof(SHELLEXECUTEINFOA)) { pei->hInstApp = (HINSTANCE)SE_ERR_ACCESSDENIED; SetLastError(ERROR_ACCESS_DENIED); return FALSE; } SHELLEXECUTEINFOW seiw = {0}; seiw.cbSize = sizeof(SHELLEXECUTEINFOW); seiw.fMask = pei->fMask; seiw.hwnd = pei->hwnd; seiw.nShow = pei->nShow; if (_UseClassKey(pei->fMask)) seiw.hkeyClass = pei->hkeyClass; if (pei->fMask & SEE_MASK_IDLIST) seiw.lpIDList = pei->lpIDList; if (pei->fMask & SEE_MASK_HOTKEY) seiw.dwHotKey = pei->dwHotKey; if (pei->fMask & SEE_MASK_ICON) seiw.hIcon = pei->hIcon; // Thunk the text fields as appropriate ThunkText *pThunkText = ConvertStrings(6, pei->lpVerb, pei->lpFile, pei->lpParameters, pei->lpDirectory, _ThunkClass(pei->fMask) ? pei->lpClass : NULL, (pei->fMask & SEE_MASK_RESERVED) ? pei->hInstApp : NULL); if (NULL == pThunkText) { pei->hInstApp = (HINSTANCE)SE_ERR_OOM; return FALSE; } // Set our UNICODE text fields to point to the thunked strings seiw.lpVerb = pThunkText->m_pStr[0]; seiw.lpFile = pThunkText->m_pStr[1]; seiw.lpParameters = pThunkText->m_pStr[2]; seiw.lpDirectory = pThunkText->m_pStr[3]; seiw.lpClass = pThunkText->m_pStr[4]; seiw.hInstApp = (HINSTANCE)pThunkText->m_pStr[5]; // If we are passed the SEE_MASK_FILEANDURL flag, this means that // we have a lpFile parameter that has both the CacheFilename and the URL // (seperated by a single NULL, eg. "CacheFileName\0UrlName). We therefore // need to special case the thunking of pei->lpFile. LPWSTR pwszFileAndUrl = NULL; if (pei->fMask & SEE_MASK_FILEANDURL) { int iUrlLength; int iCacheFileLength = lstrlenW(pThunkText->m_pStr[1]); WCHAR wszURL[INTERNET_MAX_URL_LENGTH]; LPSTR pszUrlPart = (LPSTR)&pei->lpFile[iCacheFileLength + 1]; if (IsBadStringPtrA(pszUrlPart, INTERNET_MAX_URL_LENGTH) || !PathIsURLA(pszUrlPart)) { ASSERT(FALSE); } else { // we have a vaild URL, so thunk it iUrlLength = lstrlenA(pszUrlPart); pwszFileAndUrl = (LPWSTR)LocalAlloc(LPTR, (iUrlLength + iCacheFileLength + 2) * sizeof(WCHAR)); if (!pwszFileAndUrl) { pei->hInstApp = (HINSTANCE)SE_ERR_OOM; return FALSE; } SHAnsiToUnicode(pszUrlPart, wszURL, INTERNET_MAX_URL_LENGTH); // construct the wide multi-string lstrcpyW(pwszFileAndUrl, pThunkText->m_pStr[1]); lstrcpyW(&pwszFileAndUrl[iCacheFileLength + 1], wszURL); seiw.lpFile = pwszFileAndUrl; } } // Call the real UNICODE ShellExecuteEx BOOL fRet = ShellExecuteEx(&seiw); pei->hInstApp = seiw.hInstApp; if (pei->fMask & SEE_MASK_NOCLOSEPROCESS) { pei->hProcess = seiw.hProcess; } LocalFree(pThunkText); if (pwszFileAndUrl) LocalFree(pwszFileAndUrl); return fRet; } // To display an error message appropriately, call this if ShellExecuteEx fails. void _DisplayShellExecError(ULONG fMask, HWND hwnd, LPCTSTR pszFile, LPCTSTR pszTitle, DWORD dwErr) { if (!(fMask & SEE_MASK_FLAG_NO_UI)) { if (dwErr != ERROR_CANCELLED) { LPCTSTR pszHeader; UINT ids; // don't display "user cancelled", the user knows that already // make sure parent window is the foreground window if (hwnd) SetForegroundWindow(hwnd); if (pszTitle) pszHeader = pszTitle; else pszHeader = pszFile; // Use our messages when we can -- they're more descriptive switch (dwErr) { case 0: case ERROR_NOT_ENOUGH_MEMORY: case ERROR_OUTOFMEMORY: ids = IDS_LowMemError; break; case ERROR_FILE_NOT_FOUND: ids = IDS_RunFileNotFound; break; case ERROR_PATH_NOT_FOUND: case ERROR_BAD_PATHNAME: ids = IDS_PathNotFound; break; case ERROR_TOO_MANY_OPEN_FILES: ids = IDS_TooManyOpenFiles; break; case ERROR_ACCESS_DENIED: ids = IDS_RunAccessDenied; break; case ERROR_BAD_FORMAT: // NB CreateProcess, when execing a Win16 apps maps just about all of // these errors to BadFormat. Not very useful but there it is. ids = IDS_BadFormat; break; case ERROR_SHARING_VIOLATION: ids = IDS_ShareError; break; case ERROR_OLD_WIN_VERSION: ids = IDS_OldWindowsVer; break; case ERROR_APP_WRONG_OS: ids = IDS_OS2AppError; break; case ERROR_SINGLE_INSTANCE_APP: ids = IDS_MultipleDS; break; case ERROR_RMODE_APP: ids = IDS_RModeApp; break; case ERROR_INVALID_DLL: ids = IDS_InvalidDLL; break; case ERROR_NO_ASSOCIATION: ids = IDS_NoAssocError; break; case ERROR_DDE_FAIL: ids = IDS_DDEFailError; break; case ERROR_BAD_NET_NAME: case ERROR_SEM_TIMEOUT: ids = IDS_REASONS_BADNETNAME; break; // LEGACY - ERROR_RESTRICTED_APP was never mapped to a valid error - ZekeL 2001-FEB-14 // because we always called _ShellExecuteError() before // resetting the mask to ulOriginalMask, we never mapped // ERROR_RESTRICTED_APP (which is -1) to a valid code case ERROR_RESTRICTED_APP: ids = IDS_RESTRICTIONS; // restrictions like to use IDS_RESTRICTIONSTITLE if (!pszTitle) pszHeader = MAKEINTRESOURCE(IDS_RESTRICTIONSTITLE); break; // If we don't get a match, let the system handle it for us default: ids = 0; SHSysErrorMessageBox( hwnd, pszHeader, IDS_SHLEXEC_ERROR, dwErr, pszFile, MB_OK | MB_ICONSTOP); break; } if (ids) { ShellMessageBox(HINST_THISDLL, hwnd, MAKEINTRESOURCE(ids), pszHeader, (ids == IDS_LowMemError)? (MB_OK | MB_ICONSTOP | MB_SYSTEMMODAL):(MB_OK | MB_ICONSTOP), pszFile); } } } SetLastError(dwErr); // The message box may have clobbered. } void _ShellExecuteError(LPSHELLEXECUTEINFO pei, LPCTSTR lpTitle, DWORD dwErr) { ASSERT(!ISSHELLEXECSUCCEEDED(pei->hInstApp)); // if dwErr not passed in, get it if (dwErr == 0) dwErr = GetLastError(); _DisplayShellExecError(pei->fMask, pei->hwnd, pei->lpFile, lpTitle, dwErr); } //---------------------------------------------------------------------------- // Given a file name and directory, get the path to the execuatable that // would be exec'd if you tried to ShellExecute this thing. HINSTANCE WINAPI FindExecutable(LPCTSTR lpFile, LPCTSTR lpDirectory, LPTSTR lpResult) { HINSTANCE hInstance = (HINSTANCE)42; // assume success must be > 32 TCHAR szOldDir[MAX_PATH]; TCHAR szFile[MAX_PATH]; LPCTSTR dirs[2]; // Progman relies on lpResult being a ptr to an null string on error. *lpResult = TEXT('\0'); GetCurrentDirectory(ARRAYSIZE(szOldDir), szOldDir); if (lpDirectory && *lpDirectory) SetCurrentDirectory(lpDirectory); else lpDirectory = szOldDir; // needed for PathResolve() if (!GetShortPathName(lpFile, szFile, ARRAYSIZE(szFile))) { // if the lpFile is unqualified or bogus, let's use it down // in PathResolve. lstrcpyn(szFile, lpFile, ARRAYSIZE(szFile)); } // get fully qualified path and add .exe extension if needed dirs[0] = (LPTSTR)lpDirectory; dirs[1] = NULL; if (!PathResolve(szFile, dirs, PRF_VERIFYEXISTS | PRF_TRYPROGRAMEXTENSIONS | PRF_FIRSTDIRDEF)) { // File doesn't exist, return file not found. hInstance = (HINSTANCE)SE_ERR_FNF; goto Exit; } TraceMsg(TF_SHELLEXEC, "FindExecutable: PathResolve -> %s", (LPCSTR)szFile); if (PathIsExe(szFile)) { lstrcpy(lpResult, szFile); goto Exit; } if (SUCCEEDED(AssocQueryString(0, ASSOCSTR_EXECUTABLE, szFile, NULL, szFile, (LPDWORD)MAKEINTRESOURCE(SIZECHARS(szFile))))) { lstrcpy(lpResult, szFile); } else { hInstance = (HINSTANCE)SE_ERR_NOASSOC; } Exit: TraceMsg(TF_SHELLEXEC, "FindExec(%s) ==> %s", (LPTSTR)lpFile, (LPTSTR)lpResult); SetCurrentDirectory(szOldDir); return hInstance; } HINSTANCE WINAPI FindExecutableA(LPCSTR lpFile, LPCSTR lpDirectory, LPSTR lpResult) { HINSTANCE hResult; WCHAR wszResult[MAX_PATH]; ThunkText * pThunkText = ConvertStrings(2, lpFile, lpDirectory); *lpResult = '\0'; if (NULL == pThunkText) { return (HINSTANCE)SE_ERR_OOM; } hResult = FindExecutableW(pThunkText->m_pStr[0], pThunkText->m_pStr[1], wszResult); LocalFree(pThunkText); // FindExecutableW terminates wszResult for us, so this is safe // even if the above call fails // Thunk the output result string back to ANSI. If the conversion fails, // or if the default char is used, we fail the API call. if (0 == WideCharToMultiByte(CP_ACP, 0, wszResult, -1, lpResult, MAX_PATH, NULL, NULL)) { SetLastError((DWORD)E_FAIL); return (HINSTANCE) SE_ERR_FNF; } return hResult; } //---------------------------------------------------------------------------- // Data structures for our wait for file open functions // typedef struct _WaitForItem * PWAITFORITEM; typedef struct _WaitForItem { DWORD dwSize; DWORD fOperation; // Operation to perform PWAITFORITEM pwfiNext; HANDLE hEvent; // Handle to event that was registered. UINT iWaiting; // Number of clients that are waiting. ITEMIDLIST idlItem; // pidl to wait for } WAITFORITEM; // // This is the form of the structure that is shoved into the shared memory // block. It must be the 32-bit version for interoperability reasons. // typedef struct _WaitForItem32 { DWORD dwSize; DWORD fOperation; // Operation to perform DWORD NotUsed1; LONG hEvent; // Truncated event handle UINT NotUsed2; ITEMIDLIST idlItem; // pidl to wait for } WAITFORITEM32, *PWAITFORITEM32; // // These macros enforce type safety so people are forced to use the // WAITFORITEM32 structure when accessing the shared memory block. // #define SHLockWaitForItem(h, pid) ((PWAITFORITEM32)SHLockShared(h, pid)) __inline void SHUnlockWaitForItem(PWAITFORITEM32 pwfi) { SHUnlockShared(pwfi); } PWAITFORITEM g_pwfiHead = NULL; HANDLE SHWaitOp_OperateInternal(DWORD fOperation, LPCITEMIDLIST pidlItem) { PWAITFORITEM pwfi; HANDLE hEvent = (HANDLE)NULL; for (pwfi = g_pwfiHead; pwfi != NULL; pwfi = pwfi->pwfiNext) { if (ILIsEqual(&(pwfi->idlItem), pidlItem)) { hEvent = pwfi->hEvent; break; } } if (fOperation & WFFO_ADD) { if (!pwfi) { UINT uSize; UINT uSizeIDList = 0; if (pidlItem) uSizeIDList = ILGetSize(pidlItem); uSize = sizeof(WAITFORITEM) + uSizeIDList; // Create an event to wait for hEvent = CreateEvent(NULL, FALSE, FALSE, NULL); if (hEvent) pwfi = (PWAITFORITEM)SHAlloc(uSize); if (pwfi) { pwfi->dwSize = uSize; // pwfi->fOperation = 0; // Meaningless pwfi->hEvent = hEvent; pwfi->iWaiting = ((fOperation & WFFO_WAIT) != 0); memcpy(&(pwfi->idlItem), pidlItem, uSizeIDList); // now link it in pwfi->pwfiNext = g_pwfiHead; g_pwfiHead = pwfi; } } } if (pwfi) { if (fOperation & WFFO_WAIT) pwfi->iWaiting++; if (fOperation & WFFO_SIGNAL) SetEvent(hEvent); if (fOperation & WFFO_REMOVE) pwfi->iWaiting--; // decrement in use count; // Only check removal case if not adding if ((fOperation & WFFO_ADD) == 0) { // Remove it if nobody waiting on it if (pwfi->iWaiting == 0) { if (g_pwfiHead == pwfi) g_pwfiHead = pwfi->pwfiNext; else { PWAITFORITEM pwfiT = g_pwfiHead; while ((pwfiT != NULL) && (pwfiT->pwfiNext != pwfi)) pwfiT = pwfiT->pwfiNext; ASSERT(pwfiT != NULL); if (pwfiT != NULL) pwfiT->pwfiNext = pwfi->pwfiNext; } // Close the handle CloseHandle(pwfi->hEvent); // Free the memory SHFree(pwfi); hEvent = NULL; // NULL indicates nobody waiting... (for remove case) } } } return hEvent; } void SHWaitOp_Operate(HANDLE hWait, DWORD dwProcId) { PWAITFORITEM32 pwfiFind = SHLockWaitForItem(hWait, dwProcId); if (pwfiFind) { pwfiFind->hEvent = HandleToLong(SHWaitOp_OperateInternal(pwfiFind->fOperation, &(pwfiFind->idlItem))); SHUnlockWaitForItem(pwfiFind); } } HANDLE SHWaitOp_Create(DWORD fOperation, LPCITEMIDLIST pidlItem, DWORD dwProcId) { UINT uSizeIDList = pidlItem ? ILGetSize(pidlItem) : 0; UINT uSize = sizeof(WAITFORITEM32) + uSizeIDList; HANDLE hWaitOp = SHAllocShared(NULL, uSize, dwProcId); if (hWaitOp) { PWAITFORITEM32 pwfi = SHLockWaitForItem(hWaitOp,dwProcId); if (pwfi) { pwfi->dwSize = uSize; pwfi->fOperation = fOperation; pwfi->NotUsed1 = 0; pwfi->hEvent = HandleToLong((HANDLE)NULL); pwfi->NotUsed2 = 0; if (pidlItem) memcpy(&(pwfi->idlItem), pidlItem, uSizeIDList); SHUnlockWaitForItem(pwfi); } else { // clean up SHFreeShared(hWaitOp, dwProcId); hWaitOp = NULL; } } return hWaitOp; } // This function allows the cabinet to wait for a // file (in particular folders) to signal us that they are in an open state. // This should take care of several synchronazation problems with the shell // not knowing when a folder is in the process of being opened or not // STDAPI_(DWORD) SHWaitForFileToOpen(LPCITEMIDLIST pidl, UINT uOptions, DWORD dwTimeout) { HWND hwndShell; HANDLE hWaitOp; HANDLE hEvent = NULL; DWORD dwProcIdSrc = GetCurrentProcessId(); DWORD dwReturn = WAIT_OBJECT_0; // we need a default hwndShell = GetShellWindow(); if ((uOptions & (WFFO_WAIT | WFFO_ADD)) != 0) { if (hwndShell) { DWORD dwProcIdDst; GetWindowThreadProcessId(hwndShell, &dwProcIdDst); // Do just the add and/or wait portions hWaitOp = SHWaitOp_Create(uOptions & (WFFO_WAIT | WFFO_ADD), pidl, dwProcIdSrc); if (hWaitOp) { SendMessage(hwndShell, CWM_WAITOP, (WPARAM)hWaitOp, (LPARAM)dwProcIdSrc); // Now get the hEvent and convert to a local handle PWAITFORITEM32 pwfi = SHLockWaitForItem(hWaitOp, dwProcIdSrc); if (pwfi) { hEvent = SHMapHandle(LongToHandle(pwfi->hEvent),dwProcIdDst, dwProcIdSrc, EVENT_ALL_ACCESS, 0); SHUnlockWaitForItem(pwfi); } SHFreeShared(hWaitOp,dwProcIdSrc); } } else { // Do just the add and/or wait portions hEvent = SHWaitOp_OperateInternal(uOptions & (WFFO_WAIT | WFFO_ADD), pidl); } if (hEvent) { if (uOptions & WFFO_WAIT) dwReturn = SHProcessMessagesUntilEvent(NULL, hEvent, dwTimeout); if (hwndShell) // Close the duplicated handle. CloseHandle(hEvent); } } if (uOptions & WFFO_REMOVE) { if (hwndShell) { hWaitOp = SHWaitOp_Create(WFFO_REMOVE, pidl, dwProcIdSrc); if (hWaitOp) { SendMessage(hwndShell, CWM_WAITOP, (WPARAM)hWaitOp, (LPARAM)dwProcIdSrc); SHFreeShared(hWaitOp,dwProcIdSrc); } } else { SHWaitOp_OperateInternal(WFFO_REMOVE, pidl); } } return dwReturn; } // Signals that the file is open // STDAPI_(BOOL) SignalFileOpen(LPCITEMIDLIST pidl) { BOOL fResult = FALSE; HWND hwndShell = GetShellWindow(); if (hwndShell) { PWAITFORITEM32 pwfi; DWORD dwProcId = GetCurrentProcessId(); HANDLE hWaitOp = SHWaitOp_Create(WFFO_SIGNAL, pidl, dwProcId); if (hWaitOp) { SendMessage(hwndShell, CWM_WAITOP, (WPARAM)hWaitOp, (LPARAM)dwProcId); // Now get the hEvent to determine return value... pwfi = SHLockWaitForItem(hWaitOp, dwProcId); if (pwfi) { fResult = (LongToHandle(pwfi->hEvent) != (HANDLE)NULL); SHUnlockWaitForItem(pwfi); } SHFreeShared(hWaitOp,dwProcId); } } else { fResult = (SHWaitOp_OperateInternal(WFFO_SIGNAL, pidl) == (HANDLE)NULL); } // Let everyone know that we opened something UINT uMsg = RegisterWindowMessage(SH_FILEOPENED); BroadcastSystemMessage(BSF_POSTMESSAGE, BSM_ALLCOMPONENTS, uMsg, NULL, NULL); return fResult; } // // Checks to see if darwin is enabled. // BOOL IsDarwinEnabled() { static BOOL s_fDarwinEnabled = TRUE; static BOOL s_fInit = FALSE; if (!s_fInit) { HKEY hkeyPolicy = 0; if (RegOpenKey(HKEY_CURRENT_USER, REGSTR_PATH_POLICIES_EXPLORER, &hkeyPolicy) == ERROR_SUCCESS) { if (SHQueryValueEx(hkeyPolicy, TEXT("DisableMSI"), NULL, NULL, NULL, NULL) == ERROR_SUCCESS) { s_fDarwinEnabled = FALSE; // policy turns MSI off } RegCloseKey(hkeyPolicy); } s_fInit = TRUE; } return s_fDarwinEnabled; } // takes the darwin ID string from the registry, and calls darwin to get the // full path to the application. // // IN: pszDarwinDescriptor - this has the contents of the darwin key read out of the registry. // it should contain a string like "[Darwin-ID-for-App] /switches". // // OUT: pszDarwinComand - the full path to the application to this buffer w/ switches. // STDAPI ParseDarwinID(LPTSTR pszDarwinDescriptor, LPTSTR pszDarwinCommand, DWORD cchDarwinCommand) { DWORD dwError = CommandLineFromMsiDescriptor(pszDarwinDescriptor, pszDarwinCommand, &cchDarwinCommand); return HRESULT_FROM_WIN32(dwError); }