Author: ekohl
Date: Thu Dec 31 16:39:01 2015
New Revision: 70473
URL:
http://svn.reactos.org/svn/reactos?rev=70473&view=rev
Log:
[SYSSETUP]
Remove the NtUnloadKey hack.
Modified:
trunk/reactos/dll/win32/syssetup/install.c
Modified: trunk/reactos/dll/win32/syssetup/install.c
URL:
http://svn.reactos.org/svn/reactos/trunk/reactos/dll/win32/syssetup/install…
==============================================================================
--- trunk/reactos/dll/win32/syssetup/install.c [iso-8859-1] (original)
+++ trunk/reactos/dll/win32/syssetup/install.c [iso-8859-1] Thu Dec 31 16:39:01 2015
@@ -1185,43 +1185,6 @@
SetupCloseInfFile(hShortcutsInf);
- /* ROS HACK, as long as NtUnloadKey is not implemented */
- {
- NTSTATUS Status = NtUnloadKey(NULL);
- if (!NT_SUCCESS(Status))
- {
- /* Create the Administrator profile */
- PROFILEINFOW ProfileInfo;
- HANDLE hToken;
- BOOL ret;
-
- DPRINT1("NtUnloadKey failed with 0x%lx\n", Status);
-
- ret = LogonUserW(AdminInfo.Name,
- AdminInfo.Domain,
- AdminInfo.Password,
- LOGON32_LOGON_INTERACTIVE,
- LOGON32_PROVIDER_DEFAULT,
- &hToken);
- if (!ret)
- {
- FatalError("LogonUserW() failed!");
- return 0;
- }
- ZeroMemory(&ProfileInfo, sizeof(PROFILEINFOW));
- ProfileInfo.dwSize = sizeof(PROFILEINFOW);
- ProfileInfo.lpUserName = L"Administrator";
- ProfileInfo.dwFlags = PI_NOUI;
- LoadUserProfileW(hToken, &ProfileInfo);
- CloseHandle(hToken);
- }
- else
- {
- DPRINT1("ROS HACK not needed anymore. Please remove it\n");
- }
- }
- /* END OF ROS HACK */
-
SetupCloseInfFile(hSysSetupInf);
SetSetupType(0);