VirtualBox

source: vbox/trunk/src/VBox/Additions/WINNT/Installer/VBoxDrvInst.cpp@ 35704

Last change on this file since 35704 was 35704, checked in by vboxsync, 14 years ago

Comment.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id Revision
File size: 44.9 KB
Line 
1/* $Id: VBoxDrvInst.cpp 35704 2011-01-25 11:18:33Z vboxsync $ */
2/** @file
3 * VBoxDrvInst - Driver and service installation helper for Windows guests.
4 */
5
6/*
7 * Copyright (C) 2011 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18
19/*******************************************************************************
20* Header Files *
21*******************************************************************************/
22
23#ifndef UNICODE
24#define UNICODE
25#endif
26
27#include <VBox/version.h>
28
29#include <windows.h>
30#include <setupapi.h>
31#include <stdio.h>
32#include <tchar.h>
33
34/*******************************************************************************
35* Defines *
36*******************************************************************************/
37
38/* Exit codes */
39#define EXIT_OK (0)
40#define EXIT_REBOOT (1)
41#define EXIT_FAIL (2)
42#define EXIT_USAGE (3)
43
44/* Prototypes */
45typedef struct {
46 PWSTR pApplicationId;
47 PWSTR pDisplayName;
48 PWSTR pProductName;
49 PWSTR pMfgName;
50} INSTALLERINFO, *PINSTALLERINFO;
51typedef const PINSTALLERINFO PCINSTALLERINFO;
52
53typedef enum {
54 DIFXAPI_SUCCESS,
55 DIFXAPI_INFO,
56 DIFXAPI_WARNING,
57 DIFXAPI_ERROR
58} DIFXAPI_LOG;
59
60typedef void (WINAPI * DIFXLOGCALLBACK_W)( DIFXAPI_LOG Event, DWORD Error, PCWSTR EventDescription, PVOID CallbackContext);
61typedef void ( __cdecl* DIFXAPILOGCALLBACK_W)( DIFXAPI_LOG Event, DWORD Error, PCWSTR EventDescription, PVOID CallbackContext);
62
63typedef DWORD (WINAPI *fnDriverPackageInstall) (PCTSTR DriverPackageInfPath, DWORD Flags, PCINSTALLERINFO pInstallerInfo, BOOL *pNeedReboot);
64fnDriverPackageInstall g_pfnDriverPackageInstall = NULL;
65
66typedef DWORD (WINAPI *fnDriverPackageUninstall) (PCTSTR DriverPackageInfPath, DWORD Flags, PCINSTALLERINFO pInstallerInfo, BOOL *pNeedReboot);
67fnDriverPackageUninstall g_pfnDriverPackageUninstall = NULL;
68
69typedef VOID (WINAPI *fnDIFXAPISetLogCallback) (DIFXAPILOGCALLBACK_W LogCallback, PVOID CallbackContext);
70fnDIFXAPISetLogCallback g_pfnDIFXAPISetLogCallback = NULL;
71
72/* Defines */
73#define DRIVER_PACKAGE_REPAIR 0x00000001
74#define DRIVER_PACKAGE_SILENT 0x00000002
75#define DRIVER_PACKAGE_FORCE 0x00000004
76#define DRIVER_PACKAGE_ONLY_IF_DEVICE_PRESENT 0x00000008
77#define DRIVER_PACKAGE_LEGACY_MODE 0x00000010
78#define DRIVER_PACKAGE_DELETE_FILES 0x00000020
79
80/* DIFx error codes */
81#define ERROR_DEPENDENT_APPLICATIONS_EXIST \
82 (APPLICATION_ERROR_MASK|ERROR_SEVERITY_ERROR|0x300)
83#define ERROR_DRIVER_STORE_ADD_FAILED \
84 (APPLICATION_ERROR_MASK | ERROR_SEVERITY_ERROR | 0x0247L)
85#define ERROR_DRIVER_PACKAGE_NOT_IN_STORE \
86 (APPLICATION_ERROR_MASK|ERROR_SEVERITY_ERROR|0x302)
87
88/* Registry string list flags */
89#define VBOX_REG_STRINGLIST_NONE 0x00000000 /* No flags set. */
90#define VBOX_REG_STRINGLIST_ALLOW_DUPLICATES 0x00000001 /* Allows duplicates in list when adding a value. */
91
92#ifdef DEBUG
93 #define VBOX_DRVINST_LOGFILE "C:\\Temp\\VBoxDrvInstDIFx.log"
94#endif
95
96bool GetErrorMsg(DWORD dwLastError, _TCHAR *pszMsg, DWORD dwBufSize)
97{
98 if (::FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, NULL, dwLastError, 0, pszMsg, dwBufSize / sizeof(TCHAR), NULL) == 0)
99 {
100 _stprintf(pszMsg, _T("Unknown error!\n"), dwLastError);
101 return false;
102 }
103 else
104 {
105 _TCHAR *p = _tcschr(pszMsg, _T('\r'));
106
107 if (p != NULL)
108 *p = _T('\0');
109 }
110
111 return true;
112}
113
114/**
115 * Log callback for DIFxAPI calls.
116 *
117 * @param Event The event's structure to log.
118 * @param dwError The event's error level.
119 * @param pEventDescription The event's text description.
120 * @param pCallbackContext User-supplied callback context.
121 */
122void LogCallback(DIFXAPI_LOG Event, DWORD dwError, PCWSTR pEventDescription, PVOID pCallbackContext)
123{
124 if (dwError == 0)
125 _tprintf(_T("(%u) %ws\n"), Event, pEventDescription);
126 else
127 _tprintf(_T("(%u) ERROR: %u - %ws\n"), Event, dwError, pEventDescription);
128
129 if (pCallbackContext)
130 fwprintf((FILE*)pCallbackContext, _T("(%u) %u - %s\n"), Event, dwError, pEventDescription);
131}
132
133/**
134 * (Un)Installs a driver from/to the system.
135 *
136 * @return Exit code (EXIT_OK, EXIT_FAIL)
137 * @param fInstall Flag indicating whether to install (TRUE) or uninstall (FALSE) a driver.
138 * @param pszDriverPath Pointer to full qualified path to the driver's .INF file (+ driver files).
139 * @param fSilent Flag indicating a silent installation (TRUE) or not (FALSE).
140 * @param pszLogFile Pointer to full qualified path to log file to be written during installation.
141 * Optional.
142 */
143int VBoxInstallDriver(const BOOL fInstall, const _TCHAR *pszDriverPath, BOOL fSilent,
144 const _TCHAR *pszLogFile)
145{
146 HRESULT hr = ERROR_SUCCESS;
147 HMODULE hDIFxAPI = LoadLibrary(_T("DIFxAPI.dll"));
148 if (NULL == hDIFxAPI)
149 {
150 _tprintf(_T("ERROR: Unable to locate DIFxAPI.dll!\n"));
151 hr = ERROR_FILE_NOT_FOUND;
152 }
153 else
154 {
155 if (fInstall)
156 {
157 g_pfnDriverPackageInstall = (fnDriverPackageInstall)GetProcAddress(hDIFxAPI, "DriverPackageInstallW");
158 if (g_pfnDriverPackageInstall == NULL)
159 {
160 _tprintf(_T("ERROR: Unable to retrieve entry point for DriverPackageInstallW!\n"));
161 hr = ERROR_PROC_NOT_FOUND;
162 }
163 }
164 else
165 {
166 g_pfnDriverPackageUninstall = (fnDriverPackageUninstall)GetProcAddress(hDIFxAPI, "DriverPackageUninstallW");
167 if (g_pfnDriverPackageUninstall == NULL)
168 {
169 _tprintf(_T("ERROR: Unable to retrieve entry point for DriverPackageUninstallW!\n"));
170 hr = ERROR_PROC_NOT_FOUND;
171 }
172 }
173
174 if (SUCCEEDED(hr))
175 {
176 g_pfnDIFXAPISetLogCallback = (fnDIFXAPISetLogCallback)GetProcAddress(hDIFxAPI, "DIFXAPISetLogCallbackW");
177 if (g_pfnDIFXAPISetLogCallback == NULL)
178 {
179 _tprintf(_T("ERROR: Unable to retrieve entry point for DIFXAPISetLogCallbackW!\n"));
180 hr = ERROR_PROC_NOT_FOUND;
181 }
182 }
183 }
184
185 if (SUCCEEDED(hr))
186 {
187 FILE *fh = NULL;
188 if (pszLogFile)
189 {
190 fh = _wfopen(pszLogFile, _T("a"));
191 if (!fh)
192 _tprintf(_T("ERROR: Unable to create log file!\n"));
193 g_pfnDIFXAPISetLogCallback(LogCallback, fh);
194 }
195
196 INSTALLERINFO instInfo =
197 {
198 TEXT("{7d2c708d-c202-40ab-b3e8-de21da1dc629}"), /* Our GUID for representing this installation tool. */
199 TEXT("VirtualBox Guest Additions Install Helper"),
200 TEXT("VirtualBox Guest Additions"), /** @todo Add version! */
201 TEXT("Oracle Corporation")
202 };
203
204 _TCHAR szDriverInf[MAX_PATH + 1];
205 if (0 == GetFullPathNameW(pszDriverPath, MAX_PATH, szDriverInf, NULL))
206 {
207 _tprintf(_T("ERROR: INF-Path too long / could not be retrieved!\n"));
208 hr = ERROR_INVALID_PARAMETER;
209 }
210 else
211 {
212 if (fInstall)
213 _tprintf(_T("Installing driver ...\n"));
214 else
215 _tprintf(_T("Uninstalling driver ...\n"));
216 _tprintf(_T("INF-File: %ws\n"), szDriverInf);
217
218 DWORD dwFlags = DRIVER_PACKAGE_FORCE;
219 if (!fInstall)
220 dwFlags |= DRIVER_PACKAGE_DELETE_FILES;
221
222 OSVERSIONINFO osi;
223 memset(&osi, 0, sizeof(OSVERSIONINFO));
224 osi.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
225 if ( (GetVersionEx(&osi) != 0)
226 && (osi.dwPlatformId == VER_PLATFORM_WIN32_NT)
227 && (osi.dwMajorVersion < 6))
228 {
229 if (fInstall)
230 {
231 _tprintf(_T("Using legacy mode for install ...\n"));
232 dwFlags |= DRIVER_PACKAGE_LEGACY_MODE;
233 }
234 }
235
236 if (fSilent)
237 {
238 _tprintf(_T("Installation is silent ...\n"));
239 dwFlags |= DRIVER_PACKAGE_SILENT;
240 }
241
242 BOOL fReboot;
243 DWORD dwRet = fInstall ?
244 g_pfnDriverPackageInstall(szDriverInf, dwFlags, &instInfo, &fReboot)
245 : g_pfnDriverPackageUninstall(szDriverInf, dwFlags, &instInfo, &fReboot);
246 if (dwRet != ERROR_SUCCESS)
247 {
248 switch (dwRet)
249 {
250 case CRYPT_E_FILE_ERROR:
251 _tprintf(_T("ERROR: The catalog file for the specified driver package was not found!\n"));
252 break;
253
254 case ERROR_ACCESS_DENIED:
255 _tprintf(_T("ERROR: Caller is not in Administrators group to (un)install this driver package!\n"));
256 break;
257
258 case ERROR_BAD_ENVIRONMENT:
259 _tprintf(_T("ERROR: The current Microsoft Windows version does not support this operation!\n"));
260 break;
261
262 case ERROR_CANT_ACCESS_FILE:
263 _tprintf(_T("ERROR: The driver package files could not be accessed!\n"));
264 break;
265
266 case ERROR_DEPENDENT_APPLICATIONS_EXIST:
267 _tprintf(_T("ERROR: DriverPackageUninstall removed an association between the driver package and the specified application but the function did not uninstall the driver package because other applications are associated with the driver package!\n"));
268 break;
269
270 case ERROR_DRIVER_PACKAGE_NOT_IN_STORE:
271 _tprintf(_T("ERROR: There is no INF file in the DIFx driver store that corresponds to the INF file %ws!\n"), szDriverInf);
272 break;
273
274 case ERROR_FILE_NOT_FOUND:
275 _tprintf(_T("ERROR: File not found! File = %ws\n"), szDriverInf);
276 break;
277
278 case ERROR_IN_WOW64:
279 _tprintf(_T("ERROR: The calling application is a 32-bit application attempting to execute in a 64-bit environment, which is not allowed!\n"));
280 break;
281
282 case ERROR_INVALID_FLAGS:
283 _tprintf(_T("ERROR: The flags specified are invalid!\n"));
284 break;
285
286 case ERROR_INSTALL_FAILURE:
287 _tprintf(_T("ERROR: The (un)install operation failed! Consult the Setup API logs for more information.\n"));
288 break;
289
290 case ERROR_NO_MORE_ITEMS:
291 _tprintf(
292 _T(
293 "ERROR: The function found a match for the HardwareId value, but the specified driver was not a better match than the current driver and the caller did not specify the INSTALLFLAG_FORCE flag!\n"));
294 break;
295
296 case ERROR_NO_DRIVER_SELECTED:
297 _tprintf(_T("ERROR: No driver in .INF-file selected!\n"));
298 break;
299
300 case ERROR_SECTION_NOT_FOUND:
301 _tprintf(_T("ERROR: Section in .INF-file was not found!\n"));
302 break;
303
304 case ERROR_SHARING_VIOLATION:
305 _tprintf(_T("ERROR: A component of the driver package in the DIFx driver store is locked by a thread or process\n"));
306 break;
307
308 /*
309 * ! sig: Verifying file against specific Authenticode(tm) catalog failed! (0x800b0109)
310 * ! sig: Error 0x800b0109: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
311 * !!! sto: No error message will be displayed as client is running in non-interactive mode.
312 * !!! ndv: Driver package failed signature validation. Error = 0xE0000247
313 */
314 case ERROR_DRIVER_STORE_ADD_FAILED:
315 _tprintf(_T("ERROR: Adding driver to the driver store failed!!\n"));
316 break;
317
318 case ERROR_UNSUPPORTED_TYPE:
319 _tprintf(_T("ERROR: The driver package type is not supported of INF %ws!\n"), szDriverInf);
320 break;
321
322 default:
323 {
324 /* Try error lookup with GetErrorMsg(). */
325 TCHAR szErrMsg[1024];
326 GetErrorMsg(dwRet, szErrMsg, sizeof(szErrMsg));
327 _tprintf(_T("ERROR (%08x): %ws\n"), dwRet, szErrMsg);
328 break;
329 }
330 }
331 hr = ERROR_INSTALL_FAILURE;
332 }
333 g_pfnDIFXAPISetLogCallback(NULL, NULL);
334 if (fh)
335 fclose(fh);
336 if (SUCCEEDED(hr))
337 {
338 if (fReboot)
339 _tprintf(_T("A reboot is needed to complete the driver (un)installation!\n"));
340 }
341 }
342 }
343
344 if (NULL != hDIFxAPI)
345 FreeLibrary(hDIFxAPI);
346
347 return SUCCEEDED(hr) ? EXIT_OK : EXIT_FAIL;
348}
349
350/**
351 * Executes a sepcified .INF section to install/uninstall drivers and/or services.
352 *
353 * @return Exit code (EXIT_OK, EXIT_FAIL)
354 * @param pszSection Section to execute; usually it's "DefaultInstall".
355 * @param iMode Execution mode to use (see MSDN).
356 * @param pszInf Full qualified path of the .INF file to use.
357 */
358int ExecuteInfFile(const _TCHAR *pszSection, int iMode, const _TCHAR *pszInf)
359{
360 _tprintf(_T("Executing INF-File: %ws (Section: %ws) ...\n"), pszInf, pszSection);
361
362 /* Executed by the installer that already has proper privileges. */
363 _TCHAR szCommandLine[_MAX_PATH + 1] = { 0 };
364 swprintf(szCommandLine, sizeof(szCommandLine), TEXT( "%ws %d %ws" ), pszSection, iMode, pszInf);
365
366#ifdef DEBUG
367 _tprintf (_T( "Commandline: %ws\n"), szCommandLine);
368#endif
369
370 InstallHinfSection(NULL, NULL, szCommandLine, SW_SHOW);
371 /* No return value given! */
372
373 return EXIT_OK;
374}
375
376/**
377 * Adds a string entry to a MULTI_SZ registry list.
378 *
379 * @return Exit code (EXIT_OK, EXIT_FAIL)
380 * @param pszSubKey Sub key containing the list.
381 * @param pszKeyValue The actual key name of the list.
382 * @param pszValueToRemove The value to add to the list.
383 * @param uiOrder Position (zero-based) of where to add the value to the list.
384 */
385int RegistryAddStringToMultiSZ(const TCHAR *pszSubKey, const TCHAR *pszKeyValue, const TCHAR *pszValueToAdd, unsigned int uiOrder)
386{
387#ifdef DEBUG
388 _tprintf(_T("AddStringToMultiSZ: Adding MULTI_SZ string %ws to %ws\\%ws (Order = %d)\n"), pszValueToAdd, pszSubKey, pszKeyValue, uiOrder);
389#endif
390
391 HKEY hKey = NULL;
392 DWORD disp, dwType;
393 LONG lRet = RegCreateKeyEx(HKEY_LOCAL_MACHINE, pszSubKey, 0, NULL, REG_OPTION_NON_VOLATILE, KEY_READ | KEY_WRITE, NULL, &hKey, &disp);
394 if (lRet != ERROR_SUCCESS)
395 _tprintf(_T("AddStringToMultiSZ: RegCreateKeyEx %ts failed with error %ld!\n"), pszSubKey, lRet);
396
397 if (lRet == ERROR_SUCCESS)
398 {
399 TCHAR szKeyValue[512] = { 0 };
400 TCHAR szNewKeyValue[512] = { 0 };
401 DWORD cbKeyValue = sizeof(szKeyValue);
402
403 lRet = RegQueryValueEx(hKey, pszKeyValue, NULL, &dwType, (LPBYTE)szKeyValue, &cbKeyValue);
404 if ( lRet != ERROR_SUCCESS
405 || dwType != REG_MULTI_SZ)
406 {
407 _tprintf(_T("AddStringToMultiSZ: RegQueryValueEx failed with error %ld, key type = 0x%x!\n"), lRet, dwType);
408 }
409 else
410 {
411
412 /* Look if the network provider is already in the list. */
413 int iPos = 0;
414 size_t cb = 0;
415
416 /* Replace delimiting "\0"'s with "," to make tokenizing work. */
417 for (int i = 0; i < cbKeyValue / sizeof(TCHAR); i++)
418 if (szKeyValue[i] == '\0') szKeyValue[i] = ',';
419
420 TCHAR *pszToken = wcstok(szKeyValue, _T(","));
421 TCHAR *pszNewToken = NULL;
422 TCHAR *pNewKeyValuePos = szNewKeyValue;
423 while (pszToken != NULL)
424 {
425 pszNewToken = wcstok(NULL, _T(","));
426
427 /* Append new value (at beginning if iOrder=0). */
428 if (iPos == uiOrder)
429 {
430 memcpy(pNewKeyValuePos, pszValueToAdd, wcslen(pszValueToAdd)*sizeof(TCHAR));
431
432 cb += (wcslen(pszValueToAdd) + 1) * sizeof(TCHAR); /* Add trailing zero as well. */
433 pNewKeyValuePos += wcslen(pszValueToAdd) + 1;
434 iPos++;
435 }
436
437 if (0 != wcsicmp(pszToken, pszValueToAdd))
438 {
439 memcpy(pNewKeyValuePos, pszToken, wcslen(pszToken)*sizeof(TCHAR));
440 cb += (wcslen(pszToken) + 1) * sizeof(TCHAR); /* Add trailing zero as well. */
441 pNewKeyValuePos += wcslen(pszToken) + 1;
442 iPos++;
443 }
444
445 pszToken = pszNewToken;
446 }
447
448 /* Append as last item if needed. */
449 if (uiOrder >= iPos)
450 {
451 memcpy(pNewKeyValuePos, pszValueToAdd, wcslen(pszValueToAdd)*sizeof(TCHAR));
452 cb += wcslen(pszValueToAdd) * sizeof(TCHAR); /* Add trailing zero as well. */
453 }
454
455 lRet = RegSetValueExW(hKey, pszKeyValue, 0, REG_MULTI_SZ, (LPBYTE)szNewKeyValue, (DWORD)cb);
456 if (lRet != ERROR_SUCCESS)
457 _tprintf(_T("AddStringToMultiSZ: RegSetValueEx failed with error %ld!\n"), lRet);
458 }
459
460 RegCloseKey(hKey);
461 #ifdef DEBUG
462 if (lRet == ERROR_SUCCESS)
463 _tprintf(_T("AddStringToMultiSZ: Value %ws successfully written!\n"), pszValueToAdd);
464 #endif
465 }
466
467 return (lRet == ERROR_SUCCESS) ? EXIT_OK : EXIT_FAIL;
468}
469
470/**
471 * Removes a string entry from a MULTI_SZ registry list.
472 *
473 * @return Exit code (EXIT_OK, EXIT_FAIL)
474 * @param pszSubKey Sub key containing the list.
475 * @param pszKeyValue The actual key name of the list.
476 * @param pszValueToRemove The value to remove from the list.
477 */
478int RegistryRemoveStringFromMultiSZ(const TCHAR *pszSubKey, const TCHAR *pszKeyValue, const TCHAR *pszValueToRemove)
479{
480 // @todo Make string sizes dynamically allocated!
481
482 const TCHAR *pszKey = pszSubKey;
483#ifdef DEBUG
484 _tprintf(_T("RemoveStringFromMultiSZ: Removing MULTI_SZ string: %ws from %ws\\%ws ...\n"), pszValueToRemove, pszSubKey, pszKeyValue);
485#endif
486
487 HKEY hkey;
488 DWORD disp, dwType;
489 LONG lRet = RegCreateKeyEx(HKEY_LOCAL_MACHINE, pszKey, 0, NULL, REG_OPTION_NON_VOLATILE, KEY_READ | KEY_WRITE, NULL, &hkey, &disp);
490 if (lRet != ERROR_SUCCESS)
491 _tprintf(_T("RemoveStringFromMultiSZ: RegCreateKeyEx %ts failed with error %ld!\n"), pszKey, lRet);
492
493 if (lRet == ERROR_SUCCESS)
494 {
495 TCHAR szKeyValue[1024];
496 DWORD cbKeyValue = sizeof(szKeyValue);
497
498 lRet = RegQueryValueEx(hkey, pszKeyValue, NULL, &dwType, (LPBYTE)szKeyValue, &cbKeyValue);
499 if ( lRet != ERROR_SUCCESS
500 || dwType != REG_MULTI_SZ)
501 {
502 _tprintf(_T("RemoveStringFromMultiSZ: RegQueryValueEx failed with %d, key type = 0x%x!\n"), lRet, dwType);
503 }
504 else
505 {
506 #ifdef DEBUG
507 _tprintf(_T("RemoveStringFromMultiSZ: Current key len: %ld\n"), cbKeyValue);
508 #endif
509
510 TCHAR szCurString[1024] = { 0 };
511 TCHAR szFinalString[1024] = { 0 };
512 int iIndex = 0;
513 int iNewIndex = 0;
514 for (int i = 0; i < cbKeyValue / sizeof(TCHAR); i++)
515 {
516 if (szKeyValue[i] != _T('\0'))
517 szCurString[iIndex++] = szKeyValue[i];
518
519 if ( (!szKeyValue[i] == _T('\0'))
520 && (szKeyValue[i + 1] == _T('\0')))
521 {
522 if (NULL == wcsstr(szCurString, pszValueToRemove))
523 {
524 wcscat(&szFinalString[iNewIndex], szCurString);
525
526 if (iNewIndex == 0)
527 iNewIndex = iIndex;
528 else iNewIndex += iIndex;
529
530 szFinalString[++iNewIndex] = _T('\0');
531 }
532
533 iIndex = 0;
534 ZeroMemory(szCurString, sizeof(szCurString));
535 }
536 }
537 szFinalString[++iNewIndex] = _T('\0');
538 #ifdef DEBUG
539 _tprintf(_T("RemoveStringFromMultiSZ: New key value: %ws (%u bytes)\n"),
540 szFinalString, iNewIndex * sizeof(TCHAR));
541 #endif
542
543 lRet = RegSetValueExW(hkey, pszKeyValue, 0, REG_MULTI_SZ, (LPBYTE)szFinalString, iNewIndex * sizeof(TCHAR));
544 if (lRet != ERROR_SUCCESS)
545 _tprintf(_T("RemoveStringFromMultiSZ: RegSetValueEx failed with %d!\n"), lRet);
546 }
547
548 RegCloseKey(hkey);
549 #ifdef DEBUG
550 if (lRet == ERROR_SUCCESS)
551 _tprintf(_T("RemoveStringFromMultiSZ: Value %ws successfully removed!\n"), pszValueToRemove);
552 #endif
553 }
554
555 return (lRet == ERROR_SUCCESS) ? EXIT_OK : EXIT_FAIL;
556}
557
558/**
559 * Adds a string to a registry string list (STRING_SZ).
560 * Only operates in HKLM for now, needs to be extended later for
561 * using other hives. Only processes lists with a "," separator
562 * at the moment.
563 *
564 * @return Exit code (EXIT_OK, EXIT_FAIL)
565 * @param pszSubKey Sub key containing the list.
566 * @param pszKeyValue The actual key name of the list.
567 * @param pszValueToAdd The value to add to the list.
568 * @param uiOrder Position (zero-based) of where to add the value to the list.
569 * @param dwFlags Flags.
570 */
571int RegistryAddStringToList(const TCHAR *pszSubKey, const TCHAR *pszKeyValue, const TCHAR *pszValueToAdd,
572 unsigned int uiOrder, DWORD dwFlags)
573{
574 HKEY hKey = NULL;
575 DWORD disp, dwType;
576 LONG lRet = RegCreateKeyEx(HKEY_LOCAL_MACHINE, pszSubKey, 0, NULL, REG_OPTION_NON_VOLATILE, KEY_READ | KEY_WRITE, NULL, &hKey, &disp);
577 if (lRet != ERROR_SUCCESS)
578 _tprintf(_T("RegistryAddStringToList: RegCreateKeyEx %ts failed with error %ld!\n"), pszSubKey, lRet);
579
580 TCHAR szKeyValue[512] = { 0 };
581 TCHAR szNewKeyValue[512] = { 0 };
582 DWORD cbKeyValue = sizeof(szKeyValue);
583
584 lRet = RegQueryValueEx(hKey, pszKeyValue, NULL, &dwType, (LPBYTE)szKeyValue, &cbKeyValue);
585 if ( lRet != ERROR_SUCCESS
586 || dwType != REG_SZ)
587 {
588 _tprintf(_T("RegistryAddStringToList: RegQueryValueEx failed with %d, key type = 0x%x!\n"), lRet, dwType);
589 }
590
591 if (lRet == ERROR_SUCCESS)
592 {
593 #ifdef DEBUG
594 _tprintf(_T("RegistryAddStringToList: Key value: %ws\n"), szKeyValue);
595 #endif
596
597 /* Create entire new list. */
598 unsigned int iPos = 0;
599 TCHAR *pszToken = wcstok(szKeyValue, _T(","));
600 TCHAR *pszNewToken = NULL;
601 while (pszToken != NULL)
602 {
603 pszNewToken = wcstok(NULL, _T(","));
604
605 /* Append new provider name (at beginning if iOrder=0). */
606 if (iPos == uiOrder)
607 {
608 wcscat(szNewKeyValue, pszValueToAdd);
609 wcscat(szNewKeyValue, _T(","));
610 iPos++;
611 }
612
613 BOOL fAddToList = FALSE;
614 if ( !wcsicmp(pszToken, pszValueToAdd)
615 && (dwFlags & VBOX_REG_STRINGLIST_ALLOW_DUPLICATES))
616 fAddToList = TRUE;
617 else if (wcsicmp(pszToken, pszValueToAdd))
618 fAddToList = TRUE;
619
620 if (fAddToList)
621 {
622 wcscat(szNewKeyValue, pszToken);
623 wcscat(szNewKeyValue, _T(","));
624 iPos++;
625 }
626
627 #ifdef DEBUG
628 _tprintf (_T("RegistryAddStringToList: Temp new key value: %ws\n"), szNewKeyValue);
629 #endif
630 pszToken = pszNewToken;
631 }
632
633 /* Append as last item if needed. */
634 if (uiOrder >= iPos)
635 wcscat(szNewKeyValue, pszValueToAdd);
636
637 /* Last char a delimiter? Cut off ... */
638 if (szNewKeyValue[wcslen(szNewKeyValue) - 1] == ',')
639 szNewKeyValue[wcslen(szNewKeyValue) - 1] = '\0';
640
641 size_t iNewLen = (wcslen(szNewKeyValue) * sizeof(WCHAR)) + sizeof(WCHAR);
642
643 #ifdef DEBUG
644 _tprintf(_T("RegistryAddStringToList: New provider list: %ws (%u bytes)\n"), szNewKeyValue, iNewLen);
645 #endif
646
647 lRet = RegSetValueExW(hKey, pszKeyValue, 0, REG_SZ, (LPBYTE)szNewKeyValue, (DWORD)iNewLen);
648 if (lRet != ERROR_SUCCESS)
649 _tprintf(_T("RegistryAddStringToList: RegSetValueEx failed with %ld!\n"), lRet);
650 }
651
652 RegCloseKey(hKey);
653 return (lRet == ERROR_SUCCESS) ? EXIT_OK : EXIT_FAIL;
654}
655
656/**
657 * Removes a string from a registry string list (STRING_SZ).
658 * Only operates in HKLM for now, needs to be extended later for
659 * using other hives. Only processes lists with a "," separator
660 * at the moment.
661 *
662 * @return Exit code (EXIT_OK, EXIT_FAIL)
663 * @param pszSubKey Sub key containing the list.
664 * @param pszKeyValue The actual key name of the list.
665 * @param pszValueToRemove The value to remove from the list.
666 */
667int RegistryRemoveStringFromList(const TCHAR *pszSubKey, const TCHAR *pszKeyValue, const TCHAR *pszValueToRemove)
668{
669 HKEY hKey = NULL;
670 DWORD disp, dwType;
671 LONG lRet = RegCreateKeyEx(HKEY_LOCAL_MACHINE, pszSubKey, 0, NULL, REG_OPTION_NON_VOLATILE, KEY_READ | KEY_WRITE, NULL, &hKey, &disp);
672 if (lRet != ERROR_SUCCESS)
673 _tprintf(_T("RegistryRemoveStringFromList: RegCreateKeyEx %ts failed with error %ld!\n"), pszSubKey, lRet);
674
675 TCHAR szKeyValue[512] = { 0 };
676 TCHAR szNewKeyValue[512] = { 0 };
677 DWORD cbKeyValue = sizeof(szKeyValue);
678
679 lRet = RegQueryValueEx(hKey, pszKeyValue, NULL, &dwType, (LPBYTE)szKeyValue, &cbKeyValue);
680 if ( lRet != ERROR_SUCCESS
681 || dwType != REG_SZ)
682 {
683 _tprintf(_T("RegistryRemoveStringFromList: RegQueryValueEx failed with %d, key type = 0x%x!\n"), lRet, dwType);
684 }
685
686 if (lRet == ERROR_SUCCESS)
687 {
688 #ifdef DEBUG
689 _tprintf(_T("RegistryRemoveStringFromList: Key value: %ws\n"), szKeyValue);
690 #endif
691
692 /* Create entire new list. */
693 int iPos = 0;
694
695 TCHAR *pszToken = wcstok(szKeyValue, _T(","));
696 TCHAR *pszNewToken = NULL;
697 while (pszToken != NULL)
698 {
699 pszNewToken = wcstok(NULL, _T(","));
700
701 /* Append all list values as long as it's not the
702 * value we want to remove. */
703 if (wcsicmp(pszToken, pszValueToRemove))
704 {
705 wcscat(szNewKeyValue, pszToken);
706 wcscat(szNewKeyValue, _T(","));
707 iPos++;
708 }
709
710 #ifdef DEBUG
711 _tprintf (_T("RegistryRemoveStringFromList: Temp new key value: %ws\n"), szNewKeyValue);
712 #endif
713 pszToken = pszNewToken;
714 }
715
716 /* Last char a delimiter? Cut off ... */
717 if (szNewKeyValue[wcslen(szNewKeyValue) - 1] == ',')
718 szNewKeyValue[wcslen(szNewKeyValue) - 1] = '\0';
719
720 size_t iNewLen = (wcslen(szNewKeyValue) * sizeof(WCHAR)) + sizeof(WCHAR);
721
722 #ifdef DEBUG
723 _tprintf(_T("RegistryRemoveStringFromList: New provider list: %ws (%u bytes)\n"), szNewKeyValue, iNewLen);
724 #endif
725
726 lRet = RegSetValueExW(hKey, pszKeyValue, 0, REG_SZ, (LPBYTE)szNewKeyValue, (DWORD)iNewLen);
727 if (lRet != ERROR_SUCCESS)
728 _tprintf(_T("RegistryRemoveStringFromList: RegSetValueEx failed with %ld!\n"), lRet);
729 }
730
731 RegCloseKey(hKey);
732 return (lRet == ERROR_SUCCESS) ? EXIT_OK : EXIT_FAIL;
733}
734
735/**
736 * Adds a network provider with a specified order to the system.
737 *
738 * @return Exit code (EXIT_OK, EXIT_FAIL)
739 * @param pszProvider Name of network provider to add.
740 * @param uiOrder Position in list (zero-based) of where to add.
741 */
742int AddNetworkProvider(const TCHAR *pszProvider, unsigned int uiOrder)
743{
744 _tprintf(_T("Adding network provider \"%ws\" (Order = %u) ...\n"), pszProvider, uiOrder);
745 int rc = RegistryAddStringToList(_T("System\\CurrentControlSet\\Control\\NetworkProvider\\Order"),
746 _T("ProviderOrder"),
747 pszProvider, uiOrder, VBOX_REG_STRINGLIST_NONE /* No flags set */);
748 if (rc == EXIT_OK)
749 _tprintf(_T("Network provider successfully added!\n"));
750 return rc;
751}
752
753/**
754 * Removes a network provider from the system.
755 *
756 * @return Exit code (EXIT_OK, EXIT_FAIL)
757 * @param pszProvider Name of network provider to remove.
758 */
759int RemoveNetworkProvider(const TCHAR *pszProvider)
760{
761 _tprintf(_T("Removing network provider \"%ws\" ...\n"), pszProvider);
762 int rc = RegistryRemoveStringFromList(_T("System\\CurrentControlSet\\Control\\NetworkProvider\\Order"),
763 _T("ProviderOrder"),
764 pszProvider);
765 if (rc == EXIT_OK)
766 _tprintf(_T("Network provider successfully removed!\n"));
767 return rc;
768}
769
770int CreateService(const TCHAR *pszStartStopName,
771 const TCHAR *pszDisplayName,
772 int iServiceType,
773 int iStartType,
774 const TCHAR *pszBinPath,
775 const TCHAR *pszLoadOrderGroup,
776 const TCHAR *pszDependencies,
777 const TCHAR *pszLogonUser,
778 const TCHAR *pszLogonPassword)
779{
780 int rc = ERROR_SUCCESS;
781
782 _tprintf(_T("Installing service %ws (%ws) ...\n"), pszDisplayName, pszStartStopName);
783
784 SC_HANDLE hSCManager = OpenSCManager (NULL, NULL, SC_MANAGER_ALL_ACCESS);
785 if (hSCManager == NULL)
786 {
787 _tprintf(_T("Could not get handle to SCM! Error: %ld\n"), GetLastError());
788 return EXIT_FAIL;
789 }
790
791 /* Fixup end of multistring. */
792 TCHAR szDepend[ _MAX_PATH ] = { 0 }; /* @todo Use dynamically allocated string here! */
793 if (pszDependencies != NULL)
794 {
795 _tcsnccpy (szDepend, pszDependencies, wcslen(pszDependencies));
796 DWORD len = (DWORD)wcslen (szDepend);
797 szDepend [len + 1] = 0;
798
799 /* Replace comma separator on null separator. */
800 for (DWORD i = 0; i < len; i++)
801 {
802 if (',' == szDepend [i])
803 szDepend [i] = 0;
804 }
805 }
806
807 DWORD dwTag = 0xDEADBEAF;
808 SC_HANDLE hService = CreateService (hSCManager, /* SCManager database handle. */
809 pszStartStopName, /* Name of service. */
810 pszDisplayName, /* Name to display. */
811 SERVICE_ALL_ACCESS, /* Desired access. */
812 iServiceType, /* Service type. */
813 iStartType, /* Start type. */
814 SERVICE_ERROR_NORMAL, /* Error control type. */
815 pszBinPath, /* Service's binary. */
816 pszLoadOrderGroup, /* Ordering group. */
817 (pszLoadOrderGroup != NULL) ? &dwTag : NULL, /* Tag identifier. */
818 (pszDependencies != NULL) ? szDepend : NULL, /* Dependencies. */
819 (pszLogonUser != NULL) ? pszLogonUser: NULL, /* Account. */
820 (pszLogonPassword != NULL) ? pszLogonPassword : NULL); /* Password. */
821 if (NULL == hService)
822 {
823 DWORD dwErr = GetLastError();
824 switch (dwErr)
825 {
826
827 case ERROR_SERVICE_EXISTS:
828 {
829 _tprintf(_T("Service already exists. No installation required. Updating the service config.\n"));
830
831 hService = OpenService (hSCManager, /* SCManager database handle. */
832 pszStartStopName, /* Name of service. */
833 SERVICE_ALL_ACCESS); /* Desired access. */
834 if (NULL == hService)
835 {
836 dwErr = GetLastError();
837 _tprintf(_T("Could not open service! Error: %ld\n"), dwErr);
838 }
839 else
840 {
841 BOOL fResult = ChangeServiceConfig (hService, /* Service handle. */
842 iServiceType, /* Service type. */
843 iStartType, /* Start type. */
844 SERVICE_ERROR_NORMAL, /* Error control type. */
845 pszBinPath, /* Service's binary. */
846 pszLoadOrderGroup, /* Ordering group. */
847 (pszLoadOrderGroup != NULL) ? &dwTag : NULL, /* Tag identifier. */
848 (pszDependencies != NULL) ? szDepend : NULL, /* Dependencies. */
849 (pszLogonUser != NULL) ? pszLogonUser: NULL, /* Account. */
850 (pszLogonPassword != NULL) ? pszLogonPassword : NULL, /* Password. */
851 pszDisplayName); /* Name to display. */
852 if (fResult)
853 _tprintf(_T("The service config has been successfully updated.\n"));
854 else
855 {
856 dwErr = GetLastError();
857 _tprintf(_T("Could not change service config! Error: %ld\n"), dwErr);
858 }
859 CloseServiceHandle(hService);
860 }
861
862 /*
863 * This entire branch do not return an error to avoid installations failures,
864 * if updating service parameters. Better to have a running system with old
865 * parameters and the failure information in the installation log.
866 */
867 break;
868 }
869
870 case ERROR_INVALID_PARAMETER:
871
872 _tprintf(_T("Invalid parameter specified!\n"));
873 rc = EXIT_FAIL;
874 break;
875
876 default:
877
878 _tprintf(_T("Could not create service! Error: %ld\n"), dwErr);
879 rc = EXIT_FAIL;
880 break;
881 }
882
883 if (rc == EXIT_FAIL)
884 goto cleanup;
885 }
886 else
887 {
888 CloseServiceHandle (hService);
889 _tprintf(_T("Installation of service successful!\n"));
890 }
891
892cleanup:
893
894 if (hSCManager != NULL)
895 CloseServiceHandle (hSCManager);
896
897 return rc;
898}
899
900int DelService(const TCHAR *pszStartStopName)
901{
902 int rc = ERROR_SUCCESS;
903
904 _tprintf(_T("Deleting service '%ws' ...\n"), pszStartStopName);
905
906 SC_HANDLE hSCManager = OpenSCManager(NULL, NULL, SC_MANAGER_ALL_ACCESS);
907 SC_HANDLE hService = NULL;
908 if (hSCManager == NULL)
909 {
910 _tprintf(_T("Could not get handle to SCM! Error: %ld\n"), GetLastError());
911 rc = EXIT_FAIL;
912 }
913 else
914 {
915 hService = OpenService(hSCManager, pszStartStopName, SERVICE_ALL_ACCESS);
916 if (NULL == hService)
917 {
918 _tprintf(_T("Could not open service '%ws'! Error: %ld\n"), pszStartStopName, GetLastError());
919 rc = EXIT_FAIL;
920 }
921 }
922
923 if (hService != NULL)
924 {
925 if (LockServiceDatabase(hSCManager))
926 {
927 if (FALSE == DeleteService(hService))
928 {
929 DWORD dwErr = GetLastError();
930 switch (dwErr)
931 {
932
933 case ERROR_SERVICE_MARKED_FOR_DELETE:
934
935 _tprintf(_T("Service '%ws' already marked for deletion.\n"), pszStartStopName);
936 break;
937
938 default:
939
940 _tprintf(_T("Could not delete service '%ws'! Error: %ld\n"), pszStartStopName, GetLastError());
941 rc = EXIT_FAIL;
942 break;
943 }
944 }
945 else
946 {
947 _tprintf(_T("Service '%ws' successfully removed!\n"), pszStartStopName);
948 }
949 UnlockServiceDatabase(hSCManager);
950 }
951 else
952 {
953 _tprintf(_T("Unable to lock service database! Error: %ld\n"), GetLastError());
954 rc = EXIT_FAIL;
955 }
956 CloseServiceHandle(hService);
957 }
958
959 if (hSCManager != NULL)
960 CloseServiceHandle(hSCManager);
961
962 return rc;
963}
964
965DWORD RegistryWrite(HKEY hRootKey,
966 const _TCHAR *pszSubKey,
967 const _TCHAR *pszValueName,
968 DWORD dwType,
969 const BYTE *pbData,
970 DWORD cbData)
971{
972 DWORD lRet;
973 HKEY hKey;
974 lRet = RegCreateKeyEx (hRootKey,
975 pszSubKey,
976 0, /* Reserved */
977 NULL, /* lpClass [in, optional] */
978 0, /* dwOptions [in] */
979 KEY_WRITE,
980 NULL, /* lpSecurityAttributes [in, optional] */
981 &hKey,
982 NULL); /* lpdwDisposition [out, optional] */
983 if (lRet != ERROR_SUCCESS)
984 {
985 _tprintf(_T("Could not open registry key! Error: %ld\n"), GetLastError());
986 }
987 else
988 {
989 lRet = RegSetValueEx(hKey, pszValueName, 0, dwType, (BYTE*)pbData, cbData);
990 if (lRet != ERROR_SUCCESS)
991 _tprintf(_T("Could not write to registry! Error: %ld\n"), GetLastError());
992 RegCloseKey(hKey);
993
994 }
995 return lRet;
996}
997
998void PrintHelp(void)
999{
1000 _tprintf(_T("VirtualBox Guest Additions Installation Helper for Windows\n"));
1001 _tprintf(_T("Version: %d.%d.%d.%d\n\n"), VBOX_VERSION_MAJOR, VBOX_VERSION_MINOR, VBOX_VERSION_BUILD, VBOX_SVN_REV);
1002 _tprintf(_T("Syntax:\n"));
1003 _tprintf(_T("\n"));
1004 _tprintf(_T("Drivers:\n"));
1005 _tprintf(_T("\tVBoxDrvInst driver install <inf-file> [log file]\n"));
1006 _tprintf(_T("\tVBoxDrvInst driver uninstall <inf-file> [log file]\n"));
1007 _tprintf(_T("\tVBoxDrvInst driver executeinf <inf-file>\n"));
1008 _tprintf(_T("\n"));
1009 _tprintf(_T("Network Provider:\n"));
1010 _tprintf(_T("\tVBoxDrvInst netprovider add <name> [order]\n"));
1011 _tprintf(_T("\tVBoxDrvInst netprovider remove <name>\n"));
1012 _tprintf(_T("\n"));
1013 _tprintf(_T("Registry:\n"));
1014 _tprintf(_T("\tVBoxDrvInst registry write <root> <sub key>\n")
1015 _T("\t <key name> <key type> <value>\n")
1016 _T("\t [type] [size]\n"));
1017 _tprintf(_T("\tVBoxDrvInst registry addmultisz <root> <sub key>\n")
1018 _T("\t <value> [order]\n"));
1019 _tprintf(_T("\tVBoxDrvInst registry delmultisz <root> <sub key>\n")
1020 _T("\t <key name> <value to remove>\n"));
1021 /** @todo Add "service" category! */
1022 _tprintf(_T("\n"));
1023}
1024
1025int __cdecl _tmain(int argc, _TCHAR *argv[])
1026{
1027 int rc = EXIT_USAGE;
1028
1029 OSVERSIONINFO OSinfo;
1030 OSinfo.dwOSVersionInfoSize = sizeof(OSinfo);
1031 GetVersionEx(&OSinfo);
1032
1033 if (argc >= 2)
1034 {
1035 if ( !_tcsicmp(argv[1], _T("driver"))
1036 && argc >= 3)
1037 {
1038 _TCHAR szINF[_MAX_PATH] = { 0 }; /* Complete path to INF file.*/
1039 if ( ( !_tcsicmp(argv[2], _T("install"))
1040 || !_tcsicmp(argv[2], _T("uninstall")))
1041 && argc == 4)
1042 {
1043 if (OSinfo.dwMajorVersion < 5)
1044 {
1045 _tprintf(_T("ERROR: Platform not supported for driver (un)installation!\n"));
1046 rc = EXIT_FAIL;
1047 }
1048 else
1049 {
1050 _stprintf(szINF, _T("%ws"), argv[3]);
1051
1052 _TCHAR szLogFile[_MAX_PATH] = { 0 };
1053 if (argc > 4)
1054 _stprintf(szLogFile, _T("%ws"), argv[4]);
1055 rc = VBoxInstallDriver(!_tcsicmp(argv[2], _T("install")) ? TRUE : FALSE, szINF,
1056 FALSE /* Not silent */, szLogFile[0] != NULL ? szLogFile : NULL);
1057 }
1058 }
1059 else if ( !_tcsicmp(argv[2], _T("executeinf"))
1060 && argc == 4)
1061 {
1062 _stprintf(szINF, _T("%ws"), argv[3]);
1063 rc = ExecuteInfFile(_T("DefaultInstall"), 132, szINF);
1064 }
1065 }
1066 else if ( !_tcsicmp(argv[1], _T("netprovider"))
1067 && argc >= 3)
1068 {
1069 _TCHAR szProvider[_MAX_PATH] = { 0 }; /* The network provider name for the registry. */
1070 if ( !_tcsicmp(argv[2], _T("add"))
1071 && argc >= 4)
1072 {
1073 int iOrder = 0;
1074 if (argc > 4)
1075 iOrder = _ttoi(argv[4]);
1076 _stprintf(szProvider, _T("%ws"), argv[3]);
1077 rc = AddNetworkProvider(szProvider, iOrder);
1078 }
1079 else if ( !_tcsicmp(argv[2], _T("remove"))
1080 && argc >= 4)
1081 {
1082 _stprintf(szProvider, _T("%ws"), argv[3]);
1083 rc = RemoveNetworkProvider(szProvider);
1084 }
1085 }
1086 else if ( !_tcsicmp(argv[1], _T("service"))
1087 && argc >= 3)
1088 {
1089 if ( !_tcsicmp(argv[2], _T("create"))
1090 && argc >= 8)
1091 {
1092 rc = CreateService(argv[3],
1093 argv[4],
1094 _ttoi(argv[5]),
1095 _ttoi(argv[6]),
1096 argv[7],
1097 (argc > 8) ? argv[8] : NULL,
1098 (argc > 9) ? argv[9] : NULL,
1099 (argc > 10) ? argv[10] : NULL,
1100 (argc > 11) ? argv[11] : NULL);
1101 }
1102 else if ( !_tcsicmp(argv[2], _T("delete"))
1103 && argc == 4)
1104 {
1105 rc = DelService(argv[3]);
1106 }
1107 }
1108 else if ( !_tcsicmp(argv[1], _T("registry"))
1109 && argc >= 3)
1110 {
1111 /** @todo add a handleRegistry(argc, argv) method to keep things cleaner */
1112 if ( !_tcsicmp(argv[2], _T("addmultisz"))
1113 && argc == 7)
1114 {
1115 rc = RegistryAddStringToMultiSZ(argv[3], argv[4], argv[5], _ttoi(argv[6]));
1116 }
1117 else if ( !_tcsicmp(argv[2], _T("delmultisz"))
1118 && argc == 6)
1119 {
1120 rc = RegistryRemoveStringFromMultiSZ(argv[3], argv[4], argv[5]);
1121 }
1122 else if ( !_tcsicmp(argv[2], _T("write"))
1123 && argc >= 8)
1124 {
1125 HKEY hRootKey = HKEY_LOCAL_MACHINE; /** @todo needs to be expanded (argv[3]) */
1126 DWORD dwValSize;
1127 BYTE *pbVal = NULL;
1128 DWORD dwVal;
1129
1130 if (argc > 8)
1131 {
1132 if (!_tcsicmp(argv[8], _T("dword")))
1133 {
1134 dwVal = _ttol(argv[7]);
1135 pbVal = (BYTE*)&dwVal;
1136 dwValSize = sizeof(DWORD);
1137 }
1138 }
1139 if (pbVal == NULL) /* By default interpret value as string */
1140 {
1141 pbVal = (BYTE*)argv[7];
1142 dwValSize = _tcslen(argv[7]);
1143 }
1144 if (argc > 9)
1145 dwValSize = _ttol(argv[9]); /* Get the size in bytes of the value we want to write */
1146 rc = RegistryWrite(hRootKey,
1147 argv[4], /* Sub key */
1148 argv[5], /* Value name */
1149 REG_BINARY, /** @todo needs to be expanded (argv[6]) */
1150 pbVal, /* The value itself */
1151 dwValSize); /* Size of the value */
1152 }
1153#if 0
1154 else if (!_tcsicmp(argv[2], _T("read")))
1155 {
1156 }
1157 else if (!_tcsicmp(argv[2], _T("del")))
1158 {
1159 }
1160#endif
1161 }
1162 else if (!_tcsicmp(argv[1], _T("--version")))
1163 {
1164 _tprintf(_T("%d.%d.%d.%d\n"), VBOX_VERSION_MAJOR, VBOX_VERSION_MINOR, VBOX_VERSION_BUILD, VBOX_SVN_REV);
1165 rc = EXIT_OK;
1166 }
1167 else if ( !_tcsicmp(argv[1], _T("--help"))
1168 || !_tcsicmp(argv[1], _T("/help"))
1169 || !_tcsicmp(argv[1], _T("/h"))
1170 || !_tcsicmp(argv[1], _T("/?")))
1171 {
1172 PrintHelp();
1173 rc = EXIT_OK;
1174 }
1175 }
1176
1177 if (rc == EXIT_USAGE)
1178 _tprintf(_T("No or wrong parameters given! Please consult the help (\"--help\" or \"/?\") for more information.\n"));
1179
1180 return rc;
1181}
1182
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette