1118 lines
34 KiB
C++
1118 lines
34 KiB
C++
// --------------------------------------------------------------------------------
|
|
// Demand.cpp
|
|
// Written By: jimsch, brimo, t-erikne (bastardized by sbailey)
|
|
// --------------------------------------------------------------------------------
|
|
// W4 stuff
|
|
#pragma warning(disable: 4201) // nameless struct/union
|
|
#pragma warning(disable: 4514) // unreferenced inline function removed
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// Includes
|
|
// --------------------------------------------------------------------------------
|
|
#include "pch.hxx"
|
|
#include "shlwapi.h"
|
|
#include "shared.h"
|
|
#define IMPLEMENT_LOADER_FUNCTIONS
|
|
#include "demand.h"
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// CRIT_GET_PROC_ADDR
|
|
// --------------------------------------------------------------------------------
|
|
#define CRIT_GET_PROC_ADDR(h, fn, temp) \
|
|
temp = (TYP_##fn) GetProcAddress(h, #fn); \
|
|
if (temp) \
|
|
VAR_##fn = temp; \
|
|
else \
|
|
{ \
|
|
AssertSz(0, VAR_##fn" failed to load"); \
|
|
goto error; \
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// RESET
|
|
// --------------------------------------------------------------------------------
|
|
#define RESET(fn) VAR_##fn = LOADER_##fn;
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// GET_PROC_ADDR
|
|
// --------------------------------------------------------------------------------
|
|
#define GET_PROC_ADDR(h, fn) \
|
|
VAR_##fn = (TYP_##fn) GetProcAddress(h, #fn); \
|
|
Assert(VAR_##fn != NULL); \
|
|
if(NULL == VAR_##fn ) { \
|
|
VAR_##fn = LOADER_##fn; \
|
|
}
|
|
|
|
// Use this for exports not available on all platforms
|
|
#define GET_PROC_ADDR_NOASSERT(h, fn) \
|
|
VAR_##fn = (TYP_##fn) GetProcAddress(h, #fn); \
|
|
if(NULL == VAR_##fn ) { \
|
|
VAR_##fn = LOADER_##fn; \
|
|
}
|
|
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// GET_PROC_ADDR_ORDINAL
|
|
// --------------------------------------------------------------------------------
|
|
#define GET_PROC_ADDR_ORDINAL(h, fn, ord) \
|
|
VAR_##fn = (TYP_##fn) GetProcAddress(h, MAKEINTRESOURCE(ord)); \
|
|
Assert(VAR_##fn != NULL); \
|
|
if(NULL == VAR_##fn ) { \
|
|
VAR_##fn = LOADER_##fn; \
|
|
}
|
|
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// GET_PROC_ADDR3
|
|
// --------------------------------------------------------------------------------
|
|
#define GET_PROC_ADDR3(h, fn, varname) \
|
|
VAR_##varname = (TYP_##varname) GetProcAddress(h, #fn); \
|
|
Assert(VAR_##varname != NULL);
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// Static Globals
|
|
// --------------------------------------------------------------------------------
|
|
static HMODULE s_hCrypt = NULL;
|
|
static HMODULE s_hCryptDlg = NULL;
|
|
static HMODULE s_hWinTrust = NULL;
|
|
static HMODULE s_hWinINET = NULL;
|
|
static HMODULE s_hShell32 = NULL;
|
|
static HMODULE s_hOleAut32 = NULL;
|
|
static HMODULE s_hComDlg32 = NULL;
|
|
static HMODULE s_hVersion = NULL;
|
|
static HMODULE s_hUrlmon = NULL;
|
|
static HMODULE s_hShDocVw = NULL;
|
|
static HMODULE s_hInetCPL = NULL;
|
|
static HMODULE s_hMSO9 = NULL;
|
|
static HMODULE s_hWinMM = NULL;
|
|
static HMODULE s_hRichEdit = NULL;
|
|
static HMODULE s_hMLANG = NULL;
|
|
static HMODULE s_hWSOCK = NULL;
|
|
static HMODULE s_hPstoreC = NULL;
|
|
static HMODULE s_hRAS = NULL;
|
|
static HMODULE s_hAdvApi = NULL;
|
|
static HMODULE s_hCryptUI = NULL;
|
|
static HMODULE s_ShlWapi = NULL;
|
|
static HMODULE s_hMSI = NULL;
|
|
|
|
static CRITICAL_SECTION g_csDefLoad = {0};
|
|
|
|
BOOL g_FSupportV3 = FALSE;
|
|
|
|
IF_DEBUG(static BOOL s_fInit = FALSE;)
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// InitDemandLoadedLibs
|
|
// --------------------------------------------------------------------------------
|
|
void InitDemandLoadedLibs(void)
|
|
{
|
|
InitializeCriticalSection(&g_csDefLoad);
|
|
IF_DEBUG(s_fInit = TRUE;)
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// FreeDemandLoadedLibs
|
|
// --------------------------------------------------------------------------------
|
|
void FreeDemandLoadedLibs(void)
|
|
{
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
SafeFreeLibrary(s_hCrypt);
|
|
SafeFreeLibrary(s_hCryptDlg);
|
|
SafeFreeLibrary(s_hWinTrust);
|
|
SafeFreeLibrary(s_hWinINET);
|
|
SafeFreeLibrary(s_hWSOCK);
|
|
SafeFreeLibrary(s_hShell32);
|
|
SafeFreeLibrary(s_hOleAut32);
|
|
SafeFreeLibrary(s_hComDlg32);
|
|
SafeFreeLibrary(s_hVersion);
|
|
SafeFreeLibrary(s_hUrlmon);
|
|
SafeFreeLibrary(s_hMLANG);
|
|
SafeFreeLibrary(s_hShDocVw);
|
|
SafeFreeLibrary(s_hInetCPL);
|
|
SafeFreeLibrary(s_hMSO9);
|
|
SafeFreeLibrary(s_hWinMM);
|
|
SafeFreeLibrary(s_hRichEdit);
|
|
SafeFreeLibrary(s_hPstoreC);
|
|
SafeFreeLibrary(s_hRAS);
|
|
SafeFreeLibrary(s_hAdvApi);
|
|
SafeFreeLibrary(s_ShlWapi);
|
|
SafeFreeLibrary(s_hMSI);
|
|
|
|
IF_DEBUG(s_fInit = FALSE;)
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
DeleteCriticalSection(&g_csDefLoad);
|
|
}
|
|
|
|
#ifdef DEAD
|
|
// --------------------------------------------------------------------------------
|
|
// CorrectAcctManPath
|
|
// --------------------------------------------------------------------------------
|
|
BOOL CorrectAcctManPath(LPTSTR pszPath, DWORD cb, DWORD *pdwT)
|
|
{
|
|
HKEY hKey = NULL;
|
|
BOOL fRet = FALSE;
|
|
|
|
// Tracing
|
|
TraceCall("CorrectAcctManPath");
|
|
|
|
// Tact 1: Look for msoeacct.dll in same dir as inetcomm.dll
|
|
|
|
// Try to open the inetcomm regkey
|
|
if (ERROR_SUCCESS != RegOpenKeyEx(HKEY_LOCAL_MACHINE, c_szRegInetCommDll, 0, KEY_QUERY_VALUE, &hKey))
|
|
{
|
|
TraceResult(E_FAIL);
|
|
goto exit;
|
|
}
|
|
|
|
// Query the Value
|
|
if (ERROR_SUCCESS != RegQueryValueEx(hKey, c_szDllPath, 0, pdwT, (LPBYTE)pszPath, &cb))
|
|
{
|
|
TraceResult(E_FAIL);
|
|
goto exit;
|
|
}
|
|
|
|
fRet = TRUE;
|
|
|
|
exit:
|
|
// Cleanup
|
|
if (hKey)
|
|
RegCloseKey(hKey);
|
|
|
|
return fRet;
|
|
}
|
|
#endif // DEAD
|
|
|
|
BOOL IsSMIME3Supported(void)
|
|
{
|
|
if (0 == s_hCrypt)
|
|
DemandLoadCrypt32();
|
|
|
|
return(g_FSupportV3);
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadCrypt32
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadCrypt32(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hCrypt)
|
|
{
|
|
s_hCrypt = LoadLibrary("CRYPT32.DLL");
|
|
AssertSz((NULL != s_hCrypt), TEXT("LoadLibrary failed on CRYPT32.DLL"));
|
|
|
|
if (0 == s_hCrypt)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hCrypt, CertRDNValueToStrA);
|
|
GET_PROC_ADDR(s_hCrypt, CertAddCertificateContextToStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertAddEncodedCertificateToStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertGetIssuerCertificateFromStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertEnumCertificatesInStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertFreeCertificateContext)
|
|
GET_PROC_ADDR(s_hCrypt, CertDuplicateCertificateContext)
|
|
GET_PROC_ADDR(s_hCrypt, CertFindCertificateInStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertVerifyTimeValidity)
|
|
GET_PROC_ADDR(s_hCrypt, CertCompareCertificate)
|
|
GET_PROC_ADDR(s_hCrypt, CertCompareCertificateName)
|
|
GET_PROC_ADDR(s_hCrypt, CertCompareIntegerBlob)
|
|
GET_PROC_ADDR(s_hCrypt, CertOpenStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertDuplicateStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertCloseStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertControlStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertGetCertificateContextProperty)
|
|
GET_PROC_ADDR(s_hCrypt, CertGetSubjectCertificateFromStore)
|
|
GET_PROC_ADDR(s_hCrypt, CryptDecodeObject)
|
|
GET_PROC_ADDR(s_hCrypt, CryptDecodeObjectEx)
|
|
GET_PROC_ADDR(s_hCrypt, CertFindRDNAttr)
|
|
GET_PROC_ADDR(s_hCrypt, CryptMsgOpenToEncode)
|
|
GET_PROC_ADDR(s_hCrypt, CryptMsgOpenToDecode)
|
|
GET_PROC_ADDR(s_hCrypt, CryptMsgControl)
|
|
GET_PROC_ADDR(s_hCrypt, CryptMsgUpdate)
|
|
GET_PROC_ADDR(s_hCrypt, CryptMsgGetParam)
|
|
GET_PROC_ADDR(s_hCrypt, CryptMsgClose)
|
|
GET_PROC_ADDR(s_hCrypt, CryptEncodeObject)
|
|
GET_PROC_ADDR(s_hCrypt, CryptEncodeObjectEx)
|
|
GET_PROC_ADDR(s_hCrypt, CertAddEncodedCRLToStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertEnumCRLsInStore)
|
|
GET_PROC_ADDR(s_hCrypt, CertFindExtension)
|
|
GET_PROC_ADDR(s_hCrypt, CertCreateCertificateContext)
|
|
GET_PROC_ADDR(s_hCrypt, CertGetEnhancedKeyUsage);
|
|
GET_PROC_ADDR(s_hCrypt, CertNameToStrA);
|
|
GET_PROC_ADDR(s_hCrypt, CertAddStoreToCollection);
|
|
GET_PROC_ADDR(s_hCrypt, CertVerifySubjectCertificateContext);
|
|
GET_PROC_ADDR(s_hCrypt, CertSetCertificateContextProperty);
|
|
GET_PROC_ADDR(s_hCrypt, CertFreeCertificateChain);
|
|
GET_PROC_ADDR(s_hCrypt, CertGetCertificateChain);
|
|
GET_PROC_ADDR(s_hCrypt, CertVerifyCertificateChainPolicy);
|
|
|
|
|
|
//
|
|
// We need to make a determination if the dll supports the
|
|
// new APIs we need or not
|
|
//
|
|
|
|
if (GetProcAddress(s_hCrypt, "CryptMsgVerifyCountersignatureEncodedEx") != NULL) {
|
|
g_FSupportV3 = TRUE;
|
|
}
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
#ifdef DEAD
|
|
// --------------------------------------------------------------------------------
|
|
// SmartLoadLibrary
|
|
// --------------------------------------------------------------------------------
|
|
HINSTANCE SmartLoadLibrary(HKEY hKeyRoot, LPCSTR pszRegRoot, LPCSTR pszRegValue,
|
|
LPCSTR pszDllName)
|
|
{
|
|
// Locals
|
|
BOOL fProblem=FALSE;
|
|
HINSTANCE hInst=NULL;
|
|
HKEY hKey=NULL, hKey2 = NULL;
|
|
CHAR szPath[MAX_PATH];
|
|
DWORD cb=ARRAYSIZE(szPath);
|
|
DWORD dwT;
|
|
DWORD iEnd;
|
|
LPSTR pszPath=szPath;
|
|
CHAR szT[MAX_PATH];
|
|
|
|
// Tracing
|
|
TraceCall("SmartLoadLibrary");
|
|
|
|
// Try to open the regkey
|
|
if (ERROR_SUCCESS != RegOpenKeyEx(hKeyRoot, pszRegRoot, 0, KEY_QUERY_VALUE, &hKey))
|
|
{
|
|
TraceResult(E_FAIL);
|
|
goto exit;
|
|
}
|
|
|
|
// Query the Value
|
|
if (ERROR_SUCCESS != RegQueryValueEx(hKey, pszRegValue, 0, &dwT, (LPBYTE)szPath, &cb))
|
|
{
|
|
TraceResult(E_FAIL);
|
|
goto exit;
|
|
}
|
|
|
|
// Special case: msoeacct reg entry may have been hosed by OL98
|
|
// Looking for outlacct.dll\0 which has 13 characters
|
|
if (!lstrcmpi(&szPath[cb-sizeof(TCHAR)*13], c_szOutlAcctManDll))
|
|
{
|
|
if (!CorrectAcctManPath(szPath, ARRAYSIZE(szPath), &dwT))
|
|
// We're in trouble, couldn't find Inetcomm's path
|
|
goto desperate;
|
|
|
|
fProblem = TRUE;
|
|
}
|
|
|
|
// Remove the file name from the path
|
|
PathRemoveFileSpec(szPath);
|
|
|
|
// Get the End
|
|
iEnd = lstrlen(szPath);
|
|
|
|
// Append a backslash
|
|
szPath[iEnd++] = '\\';
|
|
|
|
// Append the Dll Name
|
|
lstrcpyn(&szPath[iEnd], pszDllName, MAX_PATH - iEnd);
|
|
|
|
if (fProblem)
|
|
{
|
|
// Try to open the regkey to save ourself in future - will fail if we are not admin!
|
|
if (ERROR_SUCCESS == RegOpenKeyEx(HKEY_LOCAL_MACHINE, c_szRegMsoeAcctDll, 0, KEY_SET_VALUE, &hKey2))
|
|
{
|
|
RegSetValueEx(hKey2, c_szDllPath, 0, dwT, (LPBYTE)szPath, (iEnd+lstrlen(pszDllName)+1)*sizeof(TCHAR));
|
|
RegCloseKey(hKey2);
|
|
}
|
|
}
|
|
|
|
// Expand Sz ?
|
|
if (REG_EXPAND_SZ == dwT)
|
|
{
|
|
// Expand It
|
|
cb = ExpandEnvironmentStrings(szPath, szT, ARRAYSIZE(szT));
|
|
|
|
// Failure
|
|
if (cb == 0 || cb > ARRAYSIZE(szT))
|
|
{
|
|
TraceResult(E_FAIL);
|
|
goto exit;
|
|
}
|
|
|
|
// Change pszPath
|
|
pszPath = szT;
|
|
}
|
|
|
|
|
|
// Try to Load Library the Dll
|
|
hInst = LoadLibrary(pszPath);
|
|
|
|
desperate:
|
|
|
|
// Failure ?
|
|
if (NULL == hInst)
|
|
{
|
|
// If we are not going to try the GetModuleFName, just try the dll name
|
|
hInst = LoadLibrary(pszDllName);
|
|
|
|
// We really failed
|
|
if (NULL == hInst)
|
|
{
|
|
TraceResult(E_FAIL);
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
exit:
|
|
// Cleanup
|
|
if (hKey)
|
|
RegCloseKey(hKey);
|
|
|
|
// Done
|
|
return hInst;
|
|
}
|
|
#endif // DEAD
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadCryptDlg
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadCryptDlg(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hCryptDlg)
|
|
{
|
|
s_hCryptDlg = LoadLibrary("CRYPTDLG.DLL");
|
|
AssertSz((NULL != s_hCryptDlg), TEXT("LoadLibrary failed on CRYPTDLG.DLL"));
|
|
|
|
if (0 == s_hCryptDlg)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hCryptDlg, CertViewPropertiesA)
|
|
GET_PROC_ADDR(s_hCryptDlg, GetFriendlyNameOfCertA)
|
|
GET_PROC_ADDR(s_hCryptDlg, CertSelectCertificateA)
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadWinTrust
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadWinTrust(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hWinTrust)
|
|
{
|
|
s_hWinTrust = LoadLibrary("WINTRUST.DLL");
|
|
AssertSz((NULL != s_hWinTrust), TEXT("LoadLibrary failed on WINTRUST.DLL"));
|
|
|
|
if (0 == s_hWinTrust)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hWinTrust, WinVerifyTrust)
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadWinINET
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadWinINET(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hWinINET)
|
|
{
|
|
s_hWinINET = LoadLibrary("WININET.DLL");
|
|
AssertSz((NULL != s_hWinINET), TEXT("LoadLibrary failed on WININET.DLL"));
|
|
|
|
if (0 == s_hWinINET)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hWinINET, RetrieveUrlCacheEntryFileA)
|
|
GET_PROC_ADDR(s_hWinINET, UnlockUrlCacheEntryFileA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetQueryOptionA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetSetOptionA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetDialA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetHangUp)
|
|
GET_PROC_ADDR(s_hWinINET, InternetGetConnectedStateExA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetCombineUrlA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetCrackUrlA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetCloseHandle)
|
|
GET_PROC_ADDR(s_hWinINET, InternetReadFile)
|
|
GET_PROC_ADDR(s_hWinINET, InternetConnectA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetOpenA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetSetStatusCallbackA)
|
|
GET_PROC_ADDR(s_hWinINET, HttpQueryInfoA)
|
|
GET_PROC_ADDR(s_hWinINET, HttpOpenRequestA)
|
|
GET_PROC_ADDR(s_hWinINET, HttpAddRequestHeadersA)
|
|
GET_PROC_ADDR(s_hWinINET, HttpSendRequestA)
|
|
GET_PROC_ADDR(s_hWinINET, InternetWriteFile)
|
|
GET_PROC_ADDR(s_hWinINET, HttpEndRequestA)
|
|
GET_PROC_ADDR(s_hWinINET, HttpSendRequestExA)
|
|
GET_PROC_ADDR(s_hWinINET, CommitUrlCacheEntryA)
|
|
GET_PROC_ADDR(s_hWinINET, CreateUrlCacheEntryA)
|
|
GET_PROC_ADDR(s_hWinINET, DeleteUrlCacheEntryA)
|
|
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadWSOCK32
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadWSOCK32()
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hWSOCK)
|
|
{
|
|
s_hWSOCK = LoadLibrary("WSOCK32.DLL");
|
|
AssertSz((NULL != s_hWSOCK), TEXT("LoadLibrary failed on WSOCK32.DLL"));
|
|
|
|
if (0 == s_hWSOCK)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hWSOCK, WSAStartup)
|
|
GET_PROC_ADDR(s_hWSOCK, WSACleanup)
|
|
GET_PROC_ADDR(s_hWSOCK, WSAGetLastError)
|
|
GET_PROC_ADDR(s_hWSOCK, gethostname)
|
|
GET_PROC_ADDR(s_hWSOCK, gethostbyname)
|
|
GET_PROC_ADDR(s_hWSOCK, WSAAsyncGetHostByName)
|
|
GET_PROC_ADDR(s_hWSOCK, inet_addr)
|
|
GET_PROC_ADDR(s_hWSOCK, htons)
|
|
GET_PROC_ADDR(s_hWSOCK, WSACancelAsyncRequest)
|
|
GET_PROC_ADDR(s_hWSOCK, send)
|
|
GET_PROC_ADDR(s_hWSOCK, connect)
|
|
GET_PROC_ADDR(s_hWSOCK, WSAAsyncSelect)
|
|
GET_PROC_ADDR(s_hWSOCK, socket)
|
|
GET_PROC_ADDR(s_hWSOCK, inet_ntoa)
|
|
GET_PROC_ADDR(s_hWSOCK, closesocket)
|
|
GET_PROC_ADDR(s_hWSOCK, recv)
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadSHELL32
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadSHELL32(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hShell32)
|
|
{
|
|
s_hShell32 = LoadLibrary("SHELL32.DLL");
|
|
AssertSz((NULL != s_hShell32), TEXT("LoadLibrary failed on SHELL32.DLL"));
|
|
|
|
if (0 == s_hShell32)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hShell32, SHGetPathFromIDListA);
|
|
GET_PROC_ADDR_NOASSERT(s_hShell32, SHGetPathFromIDListW);
|
|
GET_PROC_ADDR(s_hShell32, SHGetSpecialFolderLocation);
|
|
GET_PROC_ADDR_ORDINAL(s_hShell32, SHFree, 195);
|
|
GET_PROC_ADDR(s_hShell32, SHBrowseForFolderA);
|
|
GET_PROC_ADDR_NOASSERT(s_hShell32, SHBrowseForFolderW);
|
|
GET_PROC_ADDR_NOASSERT(s_hShell32, SHSetUnreadMailCountW);
|
|
GET_PROC_ADDR(s_hShell32, ShellExecuteA);
|
|
GET_PROC_ADDR(s_hShell32, ShellExecuteExA);
|
|
GET_PROC_ADDR(s_hShell32, DragQueryFileA);
|
|
GET_PROC_ADDR(s_hShell32, SHGetFileInfoA);
|
|
GET_PROC_ADDR(s_hShell32, Shell_NotifyIconA);
|
|
GET_PROC_ADDR(s_hShell32, ExtractIconA);
|
|
GET_PROC_ADDR(s_hShell32, SHFileOperationA);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
#if 0
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadOLEAUT32
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadOLEAUT32(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hOleAut32)
|
|
{
|
|
s_hOleAut32 = LoadLibrary("OLEAUT32.DLL");
|
|
AssertSz((BOOL)s_hOleAut32, TEXT("LoadLibrary failed on OLEAUT32.DLL"));
|
|
|
|
if (0 == s_hOleAut32)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hOleAut32, SafeArrayCreate);
|
|
GET_PROC_ADDR(s_hOleAut32, SafeArrayPutElement);
|
|
GET_PROC_ADDR(s_hOleAut32, DispInvoke);
|
|
GET_PROC_ADDR(s_hOleAut32, DispGetIDsOfNames);
|
|
GET_PROC_ADDR(s_hOleAut32, SafeArrayDestroy);
|
|
GET_PROC_ADDR(s_hOleAut32, SafeArrayGetUBound);
|
|
GET_PROC_ADDR(s_hOleAut32, SafeArrayGetLBound);
|
|
GET_PROC_ADDR(s_hOleAut32, SafeArrayGetElement);
|
|
GET_PROC_ADDR(s_hOleAut32, SysAllocStringByteLen);
|
|
GET_PROC_ADDR(s_hOleAut32, SysReAllocString);
|
|
GET_PROC_ADDR(s_hOleAut32, SysAllocStringLen);
|
|
GET_PROC_ADDR(s_hOleAut32, SysAllocString);
|
|
GET_PROC_ADDR(s_hOleAut32, SysFreeString);
|
|
GET_PROC_ADDR(s_hOleAut32, SysStringLen);
|
|
GET_PROC_ADDR(s_hOleAut32, VariantInit);
|
|
GET_PROC_ADDR(s_hOleAut32, LoadTypeLib);
|
|
GET_PROC_ADDR(s_hOleAut32, RegisterTypeLib);
|
|
GET_PROC_ADDR(s_hOleAut32, SafeArrayAccessData);
|
|
GET_PROC_ADDR(s_hOleAut32, SafeArrayUnaccessData);
|
|
GET_PROC_ADDR(s_hOleAut32, SysStringByteLen);
|
|
GET_PROC_ADDR(s_hOleAut32, VariantClear);
|
|
GET_PROC_ADDR(s_hOleAut32, VariantCopy);
|
|
GET_PROC_ADDR(s_hOleAut32, SetErrorInfo);
|
|
GET_PROC_ADDR(s_hOleAut32, CreateErrorInfo);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
#endif
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadCOMDLG32
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadCOMDLG32(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hComDlg32)
|
|
{
|
|
s_hComDlg32 = LoadLibrary("COMDLG32.DLL");
|
|
AssertSz((NULL != s_hComDlg32), TEXT("LoadLibrary failed on COMDLG32.DLL"));
|
|
|
|
if (0 == s_hComDlg32)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hComDlg32, GetSaveFileNameA);
|
|
GET_PROC_ADDR(s_hComDlg32, GetOpenFileNameA);
|
|
GET_PROC_ADDR(s_hComDlg32, ChooseFontA);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadVERSION
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadVERSION(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hVersion)
|
|
{
|
|
s_hVersion = LoadLibrary("VERSION.DLL");
|
|
AssertSz((NULL != s_hVersion), TEXT("LoadLibrary failed on VERSION.DLL"));
|
|
|
|
if (0 == s_hVersion)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hVersion, VerQueryValueA);
|
|
GET_PROC_ADDR(s_hVersion, GetFileVersionInfoA);
|
|
GET_PROC_ADDR(s_hVersion, GetFileVersionInfoSizeA);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadURLMON
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadURLMON(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hUrlmon)
|
|
{
|
|
s_hUrlmon = LoadLibrary("URLMON.DLL");
|
|
AssertSz((NULL != s_hUrlmon), TEXT("LoadLibrary failed on URLMON.DLL"));
|
|
|
|
if (0 == s_hUrlmon)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hUrlmon, CreateURLMoniker);
|
|
GET_PROC_ADDR(s_hUrlmon, URLOpenBlockingStreamA);
|
|
GET_PROC_ADDR(s_hUrlmon, FindMimeFromData);
|
|
GET_PROC_ADDR(s_hUrlmon, CoInternetCombineUrl);
|
|
GET_PROC_ADDR(s_hUrlmon, RegisterBindStatusCallback);
|
|
GET_PROC_ADDR(s_hUrlmon, RevokeBindStatusCallback);
|
|
GET_PROC_ADDR(s_hUrlmon, FaultInIEFeature);
|
|
GET_PROC_ADDR(s_hUrlmon, CoInternetGetSecurityUrl);
|
|
GET_PROC_ADDR(s_hUrlmon, ObtainUserAgentString);
|
|
GET_PROC_ADDR(s_hUrlmon, CoInternetCreateSecurityManager);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadMLANG
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadMLANG(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hMLANG)
|
|
{
|
|
s_hMLANG = LoadLibrary("MLANG.DLL");
|
|
AssertSz((NULL != s_hMLANG), TEXT("LoadLibrary failed on MLANG.DLL"));
|
|
|
|
if (0 == s_hMLANG)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hMLANG, IsConvertINetStringAvailable)
|
|
GET_PROC_ADDR(s_hMLANG, ConvertINetString)
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadSHDOCVW
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadSHDOCVW()
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hShDocVw)
|
|
{
|
|
s_hShDocVw = LoadLibrary("SHDOCVW.DLL");
|
|
AssertSz((NULL != s_hShDocVw), TEXT("LoadLibrary failed on SHDOCVW.DLL"));
|
|
|
|
if (0 == s_hShDocVw)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hShDocVw, AddUrlToFavorites);
|
|
GET_PROC_ADDR(s_hShDocVw, SetQueryNetSessionCount);
|
|
GET_PROC_ADDR(s_hShDocVw, SetShellOfflineState);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadINETCPL
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadINETCPL()
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hInetCPL)
|
|
{
|
|
s_hInetCPL = LoadLibrary("INETCPL.CPL");
|
|
AssertSz((NULL != s_hInetCPL), TEXT("LoadLibrary failed on INETCPL.CPL"));
|
|
|
|
if (0 == s_hInetCPL)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hInetCPL, OpenFontsDialog);
|
|
GET_PROC_ADDR(s_hInetCPL, LaunchConnectionDialog);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadMSO9
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadMSO9(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hMSO9)
|
|
{
|
|
#ifdef DEBUG
|
|
s_hMSO9 = LoadLibrary("mso9d.DLL");
|
|
if (!s_hMSO9)
|
|
s_hMSO9 = LoadLibrary("mso9.DLL");
|
|
#else
|
|
s_hMSO9 = LoadLibrary("mso9.DLL");
|
|
#endif
|
|
AssertSz((NULL != s_hMSO9), TEXT("LoadLibrary failed on MSO9.DLL"));
|
|
|
|
if (0 == s_hMSO9)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR3(s_hMSO9, _MsoFGetComponentManager@4, MsoFGetComponentManager);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadWinMM
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadWinMM(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hWinMM)
|
|
{
|
|
s_hWinMM = LoadLibrary("winmm.dll");
|
|
AssertSz((NULL != s_hWinMM), TEXT("LoadLibrary failed on WINMM.DLL"));
|
|
|
|
if (0 == s_hWinMM)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hWinMM, sndPlaySoundA);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadRichEdit
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadRichEdit(void)
|
|
{
|
|
if (!s_hRichEdit)
|
|
{
|
|
s_hRichEdit = LoadLibrary("RICHED32.DLL");
|
|
if (!s_hRichEdit)
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadPStoreC
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadPStoreC()
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hPstoreC)
|
|
{
|
|
s_hPstoreC = LoadLibrary("PSTOREC.DLL");
|
|
AssertSz((NULL != s_hPstoreC), TEXT("LoadLibrary failed on PSTOREC.DLL"));
|
|
|
|
if (0 == s_hPstoreC)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hPstoreC, PStoreCreateInstance);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadRAS
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadRAS()
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hRAS)
|
|
{
|
|
s_hRAS = LoadLibrary("RASAPI32.DLL");
|
|
AssertSz((NULL != s_hRAS), TEXT("LoadLibrary failed on RASAPI32.DLL"));
|
|
|
|
if (0 == s_hRAS)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hRAS, RasEnumEntriesA)
|
|
GET_PROC_ADDR(s_hRAS, RasEditPhonebookEntryA)
|
|
GET_PROC_ADDR(s_hRAS, RasCreatePhonebookEntryA)
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
BOOL IsWin95()
|
|
{
|
|
OSVERSIONINFOA ver;
|
|
ver.dwOSVersionInfoSize = sizeof(ver);
|
|
|
|
if (GetVersionExA(&ver))
|
|
{
|
|
return (VER_PLATFORM_WIN32_WINDOWS == ver.dwPlatformId);
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
BOOL MyCryptAcquireContextW(HCRYPTPROV * phProv, LPCWSTR pszContainer,
|
|
LPCWSTR pszProvider, DWORD dwProvType, DWORD dwFlags)
|
|
{
|
|
char rgch1[256];
|
|
char rgch2[256];
|
|
|
|
if (pszContainer != NULL)
|
|
{
|
|
WideCharToMultiByte(CP_ACP, 0, pszContainer, -1, rgch1, sizeof(rgch1),
|
|
NULL, NULL);
|
|
pszContainer = (LPWSTR) rgch1;
|
|
}
|
|
|
|
if (pszProvider != NULL)
|
|
{
|
|
WideCharToMultiByte(CP_ACP, 0, pszProvider, -1, rgch2, sizeof(rgch2),
|
|
NULL, NULL);
|
|
pszProvider = (LPWSTR) rgch2;
|
|
}
|
|
|
|
return CryptAcquireContextA(phProv, (LPCSTR) pszContainer,
|
|
(LPCSTR) pszProvider, dwProvType, dwFlags);
|
|
}
|
|
|
|
BOOL MY_CryptContextAddRef(HCRYPTPROV, DWORD * , DWORD )
|
|
{
|
|
#ifdef DEBUG
|
|
return TRUE;
|
|
#else // !DEBUG
|
|
SetLastError(ERROR_NOT_SUPPORTED);
|
|
return FALSE;
|
|
#endif // DEBUG
|
|
}
|
|
|
|
BOOL MY_CryptDuplicateKey(HCRYPTKEY , DWORD * , DWORD , HCRYPTKEY * )
|
|
{
|
|
#ifdef DEBUG
|
|
return TRUE;
|
|
#else // !DEBUG
|
|
SetLastError(ERROR_NOT_SUPPORTED);
|
|
return FALSE;
|
|
#endif // DEBUG
|
|
}
|
|
|
|
BOOL DemandLoadAdvApi32()
|
|
{
|
|
BOOL fRet = TRUE;
|
|
OSVERSIONINFOA ver;
|
|
|
|
ver.dwOSVersionInfoSize = sizeof(ver);
|
|
|
|
Assert(s_fInit);
|
|
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hAdvApi)
|
|
{
|
|
if(!GetVersionExA(&ver))
|
|
{
|
|
fRet = FALSE;
|
|
goto exit;
|
|
}
|
|
|
|
s_hAdvApi = LoadLibrary("ADVAPI32.DLL");
|
|
AssertSz((NULL != s_hAdvApi), TEXT("LoadLibrary failed on ADVAPI32.DLL"));
|
|
|
|
if (0 == s_hAdvApi)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
if (VER_PLATFORM_WIN32_WINDOWS == ver.dwPlatformId) // Win95
|
|
CryptAcquireContextW = MyCryptAcquireContextW;
|
|
else
|
|
GET_PROC_ADDR(s_hAdvApi, CryptAcquireContextW)
|
|
|
|
VAR_CryptContextAddRef = LOADER_CryptContextAddRef;
|
|
if((ver.dwPlatformId == VER_PLATFORM_WIN32_NT) && (ver.dwMajorVersion >= 5)) //NT5
|
|
{
|
|
GET_PROC_ADDR(s_hAdvApi, CryptContextAddRef);
|
|
GET_PROC_ADDR(s_hAdvApi, CryptDuplicateKey);
|
|
}
|
|
|
|
if (VAR_CryptContextAddRef == LOADER_CryptContextAddRef)
|
|
VAR_CryptContextAddRef = MY_CryptContextAddRef;
|
|
|
|
if (VAR_CryptDuplicateKey == LOADER_CryptDuplicateKey)
|
|
VAR_CryptDuplicateKey = MY_CryptDuplicateKey;
|
|
}
|
|
}
|
|
|
|
exit:
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
HINSTANCE DemandLoadShlWapi()
|
|
{
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (!s_ShlWapi)
|
|
{
|
|
s_ShlWapi = LoadLibrary("shlwapi.dll");
|
|
AssertSz((NULL != s_ShlWapi), TEXT("LoadLibrary failed on ShlWAPI.DLL"));
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return((HINSTANCE) s_ShlWapi);
|
|
}
|
|
|
|
BOOL DemandLoadCryptUI()
|
|
{
|
|
BOOL fRet = TRUE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
if (0 == s_hCryptUI)
|
|
{
|
|
s_hCryptUI = LoadLibrary("CRYPTUI.DLL");
|
|
AssertSz((NULL != s_hCryptUI), TEXT("LoadLibrary failed on CRYPTUI.DLL"));
|
|
|
|
if (0 == s_hCryptUI)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
GET_PROC_ADDR(s_hCryptUI, CryptUIDlgCertMgr)
|
|
}
|
|
}
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|
|
|
|
|
|
// --------------------------------------------------------------------------------
|
|
// DemandLoadMSI
|
|
// --------------------------------------------------------------------------------
|
|
BOOL DemandLoadMSI(void)
|
|
{
|
|
BOOL fRet = TRUE;
|
|
static BOOL s_fMSIInited = FALSE;
|
|
|
|
Assert(s_fInit);
|
|
EnterCriticalSection(&g_csDefLoad);
|
|
|
|
// Unlike other demand-loaded dlls, this dll may not exist and that's fine.
|
|
// In these cases s_hMSI will always be NULL, so we need another flag to tell
|
|
// us whether we are inited.
|
|
if (FALSE == s_fMSIInited)
|
|
{
|
|
s_fMSIInited = TRUE;
|
|
|
|
s_hMSI = LoadLibrary("MSI.DLL");
|
|
if (NULL == s_hMSI)
|
|
fRet = FALSE;
|
|
else
|
|
{
|
|
// It's okay to use the asserting macro here because while MSI is
|
|
// optional, if present it must have these entry points
|
|
GET_PROC_ADDR(s_hMSI, MsiEnumComponentQualifiersA);
|
|
GET_PROC_ADDR(s_hMSI, MsiProvideQualifiedComponentA);
|
|
GET_PROC_ADDR(s_hMSI, MsiLocateComponentA);
|
|
GET_PROC_ADDR(s_hMSI, MsiSetInternalUI);
|
|
}
|
|
}
|
|
|
|
LeaveCriticalSection(&g_csDefLoad);
|
|
return fRet;
|
|
}
|