820 lines
22 KiB
C
820 lines
22 KiB
C
|
||
|
||
#include <nt.h>
|
||
#include <ntrtl.h>
|
||
#include <nturtl.h>
|
||
|
||
#include <ntsam.h>
|
||
#include <ntlsa.h>
|
||
|
||
#include <stdio.h>
|
||
#include <stdlib.h>
|
||
#include <windows.h>
|
||
#include <winsock.h>
|
||
#include <nspapi.h>
|
||
#include "..\..\nntpcons.h"
|
||
|
||
#define NNTP_SERVER "NntpSvc"
|
||
LPCSTR NntpKey = "SYSTEM\\CurrentControlSet\\Services\\NntpSvc";
|
||
|
||
VOID
|
||
InstallServiceRegKeys(
|
||
VOID
|
||
);
|
||
|
||
|
||
//
|
||
// For each service create a GUID using uuidgen and store it in static
|
||
// variable for further use below.
|
||
// Gopher Service GUID: 62388f10-58a2-11ce-bec8-00aa0047ae4e
|
||
//
|
||
|
||
static GUID g_NntpGuid = { 0x051eef10, 0x0e24, 0x11cf, 0x90, 0x9e,
|
||
0x00, 0x80, 0x5f, 0x48, 0xa1, 0x35 };
|
||
|
||
//
|
||
// For each of the service make an entry in the following list of services
|
||
//
|
||
// Format for each service info is:
|
||
// ServiceInfo( SymbolicName, ServiceName, DisplayName, SapId, TcpPort,
|
||
// pointer-to-guid-for-the-service)
|
||
//
|
||
// This is a macro. Please be considerate to use a terminating "\"
|
||
//
|
||
|
||
# define AllServicesInfo() \
|
||
\
|
||
ServiceInfo( NNTP_SERVICE_NAME, "NntpSvc", \
|
||
"Microsoft NNTP Service", \
|
||
( 0 ), (119), &g_NntpGuid, \
|
||
NNTP_ANONYMOUS_SECRET_W, \
|
||
NNTP_ROOT_SECRET_W) \
|
||
|
||
//
|
||
// Few convenience macros
|
||
//
|
||
|
||
// For setting up the Values in ServiceTypeValue structure.
|
||
# define SetServiceTypeValues( pSvcTypeValue, dwNS, dwType, dwSize, lpValName, lpVal) \
|
||
( pSvcTypeValue)->dwNameSpace = ( dwNS); \
|
||
( pSvcTypeValue)->dwValueType = ( dwType); \
|
||
( pSvcTypeValue)->dwValueSize = ( dwSize); \
|
||
( pSvcTypeValue)->lpValueName = ( lpValName); \
|
||
( pSvcTypeValue)->lpValue = (PVOID ) ( lpVal); \
|
||
|
||
# define SetServiceTypeValuesDword( pSvcTypeValue, dwNS, lpValName, lpVal) \
|
||
SetServiceTypeValues( (pSvcTypeValue), (dwNS), REG_DWORD, sizeof( DWORD), \
|
||
( lpValName), ( lpVal))
|
||
|
||
|
||
|
||
typedef struct _ServiceSetupInfo {
|
||
|
||
char * m_pszServiceName;
|
||
char * m_pszDisplayName;
|
||
DWORD m_sapId; // Id for SAP ( for SPX/IPX)
|
||
DWORD m_tcpPort; // TCP/IP port number
|
||
LPGUID m_lpGuid;
|
||
WCHAR * m_pszAnonPwdSecret; // Anonymous password secret name
|
||
WCHAR * m_pszRootPwdSecret; // Virtual roots password secret name
|
||
|
||
} ServiceSetupInfo;
|
||
|
||
//
|
||
// Macro to be used for defining a value for ServiceSetupInfo structure
|
||
//
|
||
# define ServiceInfoValue( svcName, dispName, sapId, tcpPort, lpGuid, AnonPwd, RootPwd) \
|
||
{ svcName, dispName, sapId, tcpPort, lpGuid, AnonPwd, RootPwd }
|
||
|
||
|
||
//
|
||
// Form an enumerated list of the service names. These form the
|
||
// index into the array of service setup information structures.
|
||
//
|
||
|
||
# define ServiceInfo( sym, svc, disp, sap, tcpport, lpGuid, AnonPwd, RootPwd) \
|
||
i ## sym,
|
||
|
||
typedef enum {
|
||
|
||
AllServicesInfo()
|
||
iMaxService
|
||
|
||
} eServiceInfo;
|
||
|
||
# undef ServiceInfo
|
||
|
||
|
||
//
|
||
// Form the array of ServiceSetyupInfo objects.
|
||
//
|
||
|
||
# define ServiceInfo( sym, svc, disp, sap, tcpport, lpGuid, AnonPwd, RootPwd) \
|
||
ServiceInfoValue( svc, disp, sap, tcpport, lpGuid, AnonPwd, RootPwd),
|
||
|
||
static ServiceSetupInfo g_svcSetupInfo[] = {
|
||
|
||
AllServicesInfo()
|
||
{ NULL, NULL, 0, 0, NULL, NULL, NULL} // a sentinel for the array
|
||
};
|
||
|
||
# undef ServiceInfo
|
||
|
||
// end_unmodifiable_code
|
||
|
||
|
||
/************************************************************
|
||
* Functions
|
||
************************************************************/
|
||
|
||
//
|
||
// Local functions
|
||
//
|
||
|
||
|
||
static BOOL
|
||
CreateServiceEntry( IN char * pszServiceName,
|
||
IN char * pszDisplayName,
|
||
IN char * pszPath);
|
||
|
||
static BOOL
|
||
CreateEventLogEntry( IN char * pszServiceName,
|
||
IN char * pszServicePath
|
||
);
|
||
|
||
static VOID PrintUsageMessage( IN char * pszProgramName);
|
||
|
||
static BOOL
|
||
PerformSetService( IN const ServiceSetupInfo * pSvcSetupInfo,
|
||
IN DWORD svcOperation);
|
||
|
||
DWORD
|
||
SetSecret(
|
||
IN LPWSTR Server,
|
||
IN LPWSTR SecretName,
|
||
IN LPWSTR pSecret,
|
||
IN DWORD cbSecret
|
||
);
|
||
|
||
|
||
|
||
int _CRTAPI1
|
||
main( int argc, char * argv[] )
|
||
{
|
||
BOOL fRet = TRUE;
|
||
|
||
char * pszProgram = argv[ 0];
|
||
char * pszOperation;
|
||
char * pszSvc;
|
||
|
||
int i;
|
||
ServiceSetupInfo * pSvcSetupInfo = NULL;
|
||
DWORD svcOperation = SERVICE_ADD_TYPE;
|
||
|
||
//
|
||
// Parse the command line arguments.
|
||
//
|
||
|
||
if ( argc != 2) {
|
||
|
||
PrintUsageMessage( argv[ 0]);
|
||
return ( 1);
|
||
}
|
||
|
||
pszSvc = "NntpSvc";
|
||
pszOperation = argv[1];
|
||
|
||
//
|
||
// Lookup the service setup info structure from the array
|
||
// command line argument 1 is the service name.
|
||
// Find the associated service setup info structure.
|
||
//
|
||
|
||
pSvcSetupInfo = g_svcSetupInfo;
|
||
|
||
//
|
||
// Identify the operation to be performed and execute the same.
|
||
//
|
||
|
||
if ( _strnicmp( pszOperation, "/path:", 5) == 0) {
|
||
|
||
fRet = CreateServiceEntry( pSvcSetupInfo->m_pszServiceName,
|
||
pSvcSetupInfo->m_pszDisplayName,
|
||
strchr( pszOperation, ':') + 1);
|
||
|
||
} else {
|
||
|
||
PrintUsageMessage( pszProgram);
|
||
SetLastError( ERROR_INVALID_PARAMETER);
|
||
fRet = FALSE;
|
||
}
|
||
|
||
|
||
fRet = fRet && PerformSetService( pSvcSetupInfo, svcOperation);
|
||
|
||
return ( (fRet) ? NO_ERROR : GetLastError());
|
||
} // main()
|
||
|
||
|
||
|
||
|
||
|
||
VOID
|
||
PrintUsageMessage( IN char * pszProgramName)
|
||
/*++
|
||
Prints the usage message along with possible list of services allowed.
|
||
--*/
|
||
{
|
||
fprintf( stderr,
|
||
"Usage:\n %s /path:<path of inetinfo.exe (incl inetinfo.exe)>\n",
|
||
pszProgramName);
|
||
|
||
return;
|
||
} // PrintUsageMessge()
|
||
|
||
|
||
/************************************************************
|
||
* Following are general functions usable by other Internet services
|
||
************************************************************/
|
||
|
||
|
||
|
||
|
||
static BOOL
|
||
PerformSetService( IN const ServiceSetupInfo * pSvcSetupInfo,
|
||
IN DWORD svcOperation)
|
||
{
|
||
int err;
|
||
|
||
WSADATA WsaData;
|
||
|
||
SERVICE_INFO serviceInfo;
|
||
LPSERVICE_TYPE_INFO_ABS lpServiceTypeInfo ;
|
||
LPSERVICE_TYPE_VALUE_ABS lpServiceTypeValues ;
|
||
BYTE serviceTypeInfoBuffer[sizeof(SERVICE_TYPE_INFO) + 1024];
|
||
// Buffer large enough for 3 values ( SERVICE_TYPE_VALUE_ABS)
|
||
|
||
DWORD Value1 = 1 ;
|
||
DWORD SapValue = pSvcSetupInfo->m_sapId;
|
||
DWORD TcpPortValue = pSvcSetupInfo->m_tcpPort;
|
||
DWORD statusFlags;
|
||
|
||
//
|
||
// Initialize Windows Sockets DLL
|
||
//
|
||
|
||
err = WSAStartup( 0x0101, & WsaData);
|
||
if ( err == SOCKET_ERROR) {
|
||
|
||
fprintf( stderr, " WSAStartup() Failed. Error = %ld\n",
|
||
GetLastError());
|
||
return ( FALSE);
|
||
}
|
||
|
||
|
||
//
|
||
// Setup the service information to be passed to SetService() for adding
|
||
// or deleting this service. Most of the SERVICE_INFO fields are not
|
||
// required for add or delete operation. The main things of interests are
|
||
// GUIDs and ServiceSpecificInfo structure.
|
||
//
|
||
|
||
memset( (PVOID ) & serviceInfo, 0, sizeof( serviceInfo)); //null all fields
|
||
|
||
serviceInfo.lpServiceType = pSvcSetupInfo->m_lpGuid;
|
||
|
||
//
|
||
// The "Blob" will contain the service specific information.
|
||
// In this case, fill it with a SERVICE_TYPE_INFO_ABS structure
|
||
// and associated information.
|
||
//
|
||
serviceInfo.ServiceSpecificInfo.pBlobData = serviceTypeInfoBuffer;
|
||
serviceInfo.ServiceSpecificInfo.cbSize = sizeof( serviceTypeInfoBuffer);
|
||
|
||
|
||
lpServiceTypeInfo = (LPSERVICE_TYPE_INFO_ABS ) serviceTypeInfoBuffer;
|
||
|
||
//
|
||
// There are totally 3 values associated with this service if we're doing
|
||
// both SPX and TCP, there's only one value if TCP.
|
||
//
|
||
|
||
if ( pSvcSetupInfo->m_sapId )
|
||
{
|
||
lpServiceTypeInfo->dwValueCount = 3;
|
||
}
|
||
else
|
||
{
|
||
lpServiceTypeInfo->dwValueCount = 1;
|
||
}
|
||
|
||
lpServiceTypeInfo->lpTypeName = pSvcSetupInfo->m_pszServiceName;
|
||
|
||
lpServiceTypeValues = lpServiceTypeInfo->Values;
|
||
|
||
|
||
if ( pSvcSetupInfo->m_sapId )
|
||
{
|
||
//
|
||
// 1st value: tells the SAP that this is a connection oriented service.
|
||
//
|
||
|
||
SetServiceTypeValuesDword( ( lpServiceTypeValues + 0),
|
||
NS_SAP, // Name Space
|
||
SERVICE_TYPE_VALUE_CONN, // ValueName
|
||
&Value1 // actual value
|
||
);
|
||
|
||
//
|
||
// 2nd Value: tells SAP about object type to be used for broadcasting
|
||
// the service name.
|
||
//
|
||
|
||
SetServiceTypeValuesDword( ( lpServiceTypeValues + 1),
|
||
NS_SAP,
|
||
SERVICE_TYPE_VALUE_SAPID,
|
||
&SapValue);
|
||
|
||
//
|
||
// 3rd value: tells TCPIP name-space provider about TCP/IP port to be used.
|
||
//
|
||
SetServiceTypeValuesDword( ( lpServiceTypeValues + 2),
|
||
NS_DNS,
|
||
SERVICE_TYPE_VALUE_TCPPORT,
|
||
&TcpPortValue);
|
||
}
|
||
else
|
||
{
|
||
SetServiceTypeValuesDword( ( lpServiceTypeValues + 0),
|
||
NS_DNS,
|
||
SERVICE_TYPE_VALUE_TCPPORT,
|
||
&TcpPortValue);
|
||
}
|
||
|
||
//
|
||
// Finally, call SetService to actually perform the operation.
|
||
//
|
||
|
||
err = SetService(
|
||
NS_DEFAULT, // all default name spaces
|
||
svcOperation, // either ADD or DELETE
|
||
0, // dwFlags not used
|
||
&serviceInfo, // the service info structure
|
||
NULL, // lpServiceAsyncInfo
|
||
&statusFlags // additional status information
|
||
);
|
||
|
||
if ( err != NO_ERROR ) {
|
||
|
||
fprintf( stderr, "SetService failed: %ld\n", GetLastError( ) );
|
||
|
||
} else {
|
||
|
||
printf( "SetService( %s) succeeded, status flags = %ld\n",
|
||
pSvcSetupInfo->m_pszServiceName, statusFlags );
|
||
}
|
||
|
||
//
|
||
// Create the LSA secrets for the anonymous user password and the virtual
|
||
// root passwords
|
||
//
|
||
|
||
if ( !SetSecret( NULL,
|
||
pSvcSetupInfo->m_pszAnonPwdSecret,
|
||
L"",
|
||
sizeof(WCHAR) ) ||
|
||
!SetSecret( NULL,
|
||
pSvcSetupInfo->m_pszRootPwdSecret,
|
||
L"",
|
||
sizeof(WCHAR) ))
|
||
{
|
||
err = GetLastError();
|
||
|
||
fprintf( stderr,
|
||
"SetService( %s ) failed to create Lsa Secrets for anonymous\n"
|
||
"username password or virtual root passwords. Error = %d\n",
|
||
pSvcSetupInfo->m_pszServiceName,
|
||
err);
|
||
|
||
}
|
||
|
||
return ( err != NO_ERROR);
|
||
|
||
} // PerformSetService()
|
||
|
||
|
||
|
||
|
||
|
||
static BOOL
|
||
CreateServiceEntry( IN char * pszServiceName,
|
||
IN char * pszDisplayName,
|
||
IN char * pszPath)
|
||
/*++
|
||
|
||
This function calls the service controller to create a new service.
|
||
|
||
Arguments:
|
||
pszServiceName pointer to service name
|
||
pszDisplayName pointer to Display name
|
||
pszPath pointer to null-terminated string containing the path for
|
||
the service DLL.
|
||
|
||
Returns:
|
||
|
||
TRUE on success and FALSE if there is any failure.
|
||
Use GetLastError() to get further error code on failure.
|
||
|
||
--*/
|
||
{
|
||
BOOL fReturn = FALSE;
|
||
SC_HANDLE hServiceManager;
|
||
|
||
if ( strstr( pszPath,"inetinfo.exe") == NULL ) {
|
||
printf("ERROR: path must include inetinfo.exe\n");
|
||
SetLastError(ERROR_BAD_PATHNAME);
|
||
return(FALSE);
|
||
}
|
||
|
||
//
|
||
// Create the service.
|
||
//
|
||
|
||
hServiceManager = OpenSCManager( NULL, // machine name
|
||
NULL, // database name
|
||
STANDARD_RIGHTS_REQUIRED
|
||
| SC_MANAGER_CREATE_SERVICE );
|
||
|
||
if ( hServiceManager != NULL) {
|
||
|
||
SC_HANDLE hService;
|
||
|
||
//
|
||
// create the service itself.
|
||
//
|
||
|
||
hService = CreateService( hServiceManager,
|
||
pszServiceName,
|
||
pszDisplayName,
|
||
GENERIC_READ | GENERIC_WRITE,
|
||
SERVICE_WIN32_SHARE_PROCESS,
|
||
SERVICE_DEMAND_START,
|
||
SERVICE_ERROR_NORMAL,
|
||
pszPath,
|
||
NULL, // lpszLoadOrderGroup
|
||
NULL, // lpdwTagId
|
||
NULL, // lpszDependencies
|
||
NULL, // lpszStartUserName
|
||
NULL ); // lpszPassword
|
||
|
||
|
||
if( hService != NULL ) {
|
||
|
||
fReturn = TRUE;
|
||
CloseServiceHandle( hService);
|
||
}
|
||
|
||
CloseServiceHandle( hServiceManager);
|
||
|
||
//
|
||
// Setup reg keys
|
||
//
|
||
|
||
InstallServiceRegKeys( );
|
||
|
||
} else {
|
||
|
||
fprintf( stderr, "OpenSCManager failed: %ld\n", GetLastError() );
|
||
|
||
}
|
||
|
||
|
||
fprintf( stderr, " %s created with path %s. Return %d ( Error = %ld)\n",
|
||
pszServiceName, pszPath,
|
||
fReturn, ( fReturn) ? NO_ERROR : GetLastError());
|
||
|
||
|
||
return ( fReturn);
|
||
} // CreateServiceEntry()
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
# define EVENT_LOG_REG_KEY \
|
||
"System\\CurrentControlSet\\Services\\EventLog\\System"
|
||
|
||
# define LEN_EVENT_LOG_REG_KEY ( sizeof( EVENT_LOG_REG_KEY))
|
||
|
||
|
||
|
||
static BOOL
|
||
CreateEventLogEntry( IN char * pszServiceName,
|
||
IN char * pszServicePath
|
||
)
|
||
/*++
|
||
|
||
This function creates an entry for a service in the Eventlog registry
|
||
so that the messages of the service may be decoded.
|
||
|
||
Arguments:
|
||
pszServiceName pointer to string containing the service name.
|
||
pszServicePath pointer to string containing the path for the service
|
||
dll with the embedded messages.
|
||
|
||
Returns:
|
||
TRUE on success and FALSE if there are any errors. Use GetLastError()
|
||
to get detailed error message.
|
||
|
||
--*/
|
||
{
|
||
char rgchKeyName[ LEN_EVENT_LOG_REG_KEY + 100];
|
||
HKEY hkeyReg;
|
||
LONG err;
|
||
DWORD Disposition;
|
||
|
||
|
||
if ( strlen( pszServiceName) >= 100) {
|
||
|
||
SetLastError( ERROR_NOT_ENOUGH_MEMORY);
|
||
return ( FALSE);
|
||
}
|
||
|
||
wsprintf( rgchKeyName, "%s\\%s", EVENT_LOG_REG_KEY, pszServiceName);
|
||
|
||
//
|
||
// Add the data to the EventLog's registry key so that the
|
||
// log insertion strings may be found by the Event Viewer.
|
||
//
|
||
|
||
err = RegCreateKeyEx( HKEY_LOCAL_MACHINE,
|
||
rgchKeyName,
|
||
0,
|
||
NULL,
|
||
REG_OPTION_NON_VOLATILE,
|
||
KEY_WRITE,
|
||
NULL,
|
||
&hkeyReg,
|
||
&Disposition );
|
||
|
||
if( err != 0 ) {
|
||
|
||
fprintf( stderr, "RegCreateKeyEx failed: %ld\n", err );
|
||
|
||
SetLastError( err);
|
||
return ( FALSE);
|
||
}
|
||
|
||
err = RegSetValueEx( hkeyReg,
|
||
"EventMessageFile",
|
||
0,
|
||
REG_EXPAND_SZ,
|
||
pszServicePath,
|
||
strlen( pszServicePath ) + 1 );
|
||
|
||
if( err == 0 ) {
|
||
|
||
DWORD Value;
|
||
|
||
Value = ( EVENTLOG_ERROR_TYPE |
|
||
EVENTLOG_WARNING_TYPE |
|
||
EVENTLOG_INFORMATION_TYPE
|
||
);
|
||
|
||
err = RegSetValueEx( hkeyReg,
|
||
"TypesSupported",
|
||
0,
|
||
REG_DWORD,
|
||
(CONST BYTE *)&Value,
|
||
sizeof(Value) );
|
||
}
|
||
|
||
RegCloseKey( hkeyReg );
|
||
|
||
if( err != 0 ) {
|
||
|
||
fprintf( stderr, "RegSetValueEx failed: %ld\n", err );
|
||
SetLastError( err);
|
||
}
|
||
|
||
return ( err == 0);
|
||
|
||
} // CreateEventLogEntry()
|
||
|
||
DWORD
|
||
SetSecret(
|
||
IN LPWSTR Server,
|
||
IN LPWSTR SecretName,
|
||
IN LPWSTR pSecret,
|
||
IN DWORD cbSecret
|
||
)
|
||
/*++
|
||
|
||
Description
|
||
|
||
Sets the specified LSA secret
|
||
|
||
Arguments:
|
||
|
||
Server - Server name (or NULL) secret lives on
|
||
SecretName - Name of the LSA secret
|
||
pSecret - Pointer to secret memory
|
||
cbSecret - Size of pSecret memory block
|
||
|
||
Note:
|
||
|
||
--*/
|
||
{
|
||
LSA_HANDLE hPolicy;
|
||
UNICODE_STRING unicodePassword;
|
||
UNICODE_STRING unicodeServer;
|
||
NTSTATUS ntStatus;
|
||
OBJECT_ATTRIBUTES ObjectAttributes;
|
||
LSA_HANDLE hSecret;
|
||
UNICODE_STRING unicodeSecret;
|
||
|
||
|
||
RtlInitUnicodeString( &unicodeServer,
|
||
Server );
|
||
|
||
//
|
||
// Initialize the unicode string by hand so we can handle '\0' in the
|
||
// string
|
||
//
|
||
|
||
unicodePassword.Buffer = pSecret;
|
||
unicodePassword.Length = (USHORT) cbSecret;
|
||
unicodePassword.MaximumLength = (USHORT) cbSecret;
|
||
|
||
//
|
||
// Open a policy to the remote LSA
|
||
//
|
||
|
||
InitializeObjectAttributes( &ObjectAttributes,
|
||
NULL,
|
||
0L,
|
||
NULL,
|
||
NULL );
|
||
|
||
ntStatus = LsaOpenPolicy( &unicodeServer,
|
||
&ObjectAttributes,
|
||
POLICY_ALL_ACCESS,
|
||
&hPolicy );
|
||
|
||
if ( !NT_SUCCESS( ntStatus ) )
|
||
{
|
||
SetLastError( RtlNtStatusToDosError( ntStatus ) );
|
||
return FALSE;
|
||
}
|
||
|
||
//
|
||
// Create or open the LSA secret
|
||
//
|
||
|
||
RtlInitUnicodeString( &unicodeSecret,
|
||
SecretName );
|
||
|
||
ntStatus = LsaCreateSecret( hPolicy,
|
||
&unicodeSecret,
|
||
SECRET_ALL_ACCESS,
|
||
&hSecret );
|
||
|
||
if ( !NT_SUCCESS( ntStatus ))
|
||
{
|
||
|
||
//
|
||
// If the secret already exists, then we just need to open it
|
||
//
|
||
|
||
if ( ntStatus == STATUS_OBJECT_NAME_COLLISION )
|
||
{
|
||
ntStatus = LsaOpenSecret( hPolicy,
|
||
&unicodeSecret,
|
||
SECRET_ALL_ACCESS,
|
||
&hSecret );
|
||
}
|
||
|
||
if ( !NT_SUCCESS( ntStatus ))
|
||
{
|
||
LsaClose( hPolicy );
|
||
SetLastError( RtlNtStatusToDosError( ntStatus ) );
|
||
return FALSE;
|
||
}
|
||
}
|
||
|
||
//
|
||
// Set the secret value
|
||
//
|
||
|
||
ntStatus = LsaSetSecret( hSecret,
|
||
&unicodePassword,
|
||
&unicodePassword );
|
||
|
||
LsaClose( hSecret );
|
||
LsaClose( hPolicy );
|
||
|
||
if ( !NT_SUCCESS( ntStatus ))
|
||
{
|
||
return RtlNtStatusToDosError( ntStatus );
|
||
}
|
||
|
||
return TRUE;
|
||
}
|
||
|
||
VOID
|
||
InstallServiceRegKeys(
|
||
VOID
|
||
)
|
||
{
|
||
DWORD error;
|
||
DWORD disp;
|
||
HKEY pKey = NULL, sKey = NULL;
|
||
|
||
//
|
||
// Create the reg key templates
|
||
//
|
||
|
||
error = RegOpenKeyEx(
|
||
HKEY_LOCAL_MACHINE,
|
||
NntpKey,
|
||
0,
|
||
KEY_QUERY_VALUE,
|
||
&sKey
|
||
);
|
||
|
||
if ( error != NO_ERROR ) {
|
||
printf("InstallService: error %d opening %s\n",error,NntpKey);
|
||
goto error;
|
||
}
|
||
|
||
error = RegCreateKeyEx(
|
||
sKey,
|
||
"Parameters",
|
||
0,
|
||
"",
|
||
REG_OPTION_NON_VOLATILE,
|
||
KEY_ALL_ACCESS,
|
||
NULL,
|
||
&pKey,
|
||
&disp
|
||
);
|
||
|
||
if ( error != NO_ERROR ) {
|
||
printf("Error %d creating Parameters key\n",error);
|
||
goto error;
|
||
}
|
||
|
||
|
||
{
|
||
LPCSTR tmpString;
|
||
|
||
tmpString = "admin@corp.com";
|
||
error = RegSetValueEx(
|
||
pKey,
|
||
"AdminEmail",
|
||
0,
|
||
REG_SZ,
|
||
(CONST BYTE*)tmpString,
|
||
strlen(tmpString)+1
|
||
);
|
||
|
||
tmpString = "administrator";
|
||
error = RegSetValueEx(
|
||
pKey,
|
||
"AdminName",
|
||
0,
|
||
REG_SZ,
|
||
(CONST BYTE*)tmpString,
|
||
strlen(tmpString)+1
|
||
);
|
||
|
||
tmpString = "InternetGuest";
|
||
error = RegSetValueEx(
|
||
pKey,
|
||
"AnonymousUserName",
|
||
0,
|
||
REG_SZ,
|
||
(CONST BYTE*)tmpString,
|
||
strlen(tmpString)+1
|
||
);
|
||
|
||
}
|
||
|
||
error:
|
||
|
||
if ( pKey != NULL ) {
|
||
RegCloseKey( pKey );
|
||
}
|
||
|
||
if ( sKey != NULL ) {
|
||
RegCloseKey( sKey );
|
||
}
|
||
|
||
return;
|
||
|
||
} // InstallService
|
||
|
||
|