Registry manipulation class with exception handling

This is another registry class manipulation which uses exception handling.

It basically uses the extended API provided for registry access (RegXXXXXEx) and I tried to simplify it as possible. Although right now there's no function overidables for Read/Write to much simplify the passing of data (so you don't have to typecast them to LPBYTE) but I'll work out this one.

Opening of data is fairly simple, you just specify the location of the key handle (HKEY_LOCAL_MACHINE, HKEY_CURRENT_USER...etc) and the subkey (SOFTWARE\\MyCompany\\MyProject...). The option (reserved for future enhancement of the API) and the security access mask (default to all access) are optional. You can open the registry via call to CRegistry::Open() or just by passing the parameters of the Open() function to the constructor.

CRegistry reg1( HKEY_LOCAL_MACHINE, "SOFTWARE\\MyCompany\\somedata" );

CRegistry reg2;
reg2.Open( HKEY_LOCAL_MACHINE, "SOFTWARE\\MyCompany\\someotherdata" );

Reading and writing values are done by calls to Read() and Write() respectively.

Since it is using the CException derived class to handle exception, it is also easier to display the error encountered:


try {
    CRegistry regConfig;
    regConfig.Open( HKEY_LOCAL_MACHINE, "SOFTWARE\\MyCompany\\MyData" );
    DWORD    nLen;
    BYTE        nSomeByteData;
    char        szSomeStringData;
    DWORD    nSomeDWordData;
    /*if you dont want the type of the data to be returned... 
    then specify NULL on the third parameter...
    */
    regConfig.Read( &nSomeData, ( nLen=sizeof( nSomeData ), &nLen ), NULL, "Some Byte Data" );
    regConfig.Read(( LPBYTE )&szSomeStringData, ( nLen=sizeof( szSomeStringData ), &nLen ), NULL, "Some String Data" );
    regConfig.Read(( LPBYTE )&nSomeDWordData, ( nLen=sizeof( nSomeDWordData ), &nLen ), NULL, "Some DWord Data" );

    /* ...  but if you want the data type, then pass a DWORD pointer
    */
    DWORD    nType;
    char          nSomeUnknownData[ 50 ];
    regConfig.Read(( LPBYTE )&nSomeUnknownData, ( nLen=sizeof( nSomeUnknownData ), &nLen ), &nType, "Some Unknown Data" );
    /* your nType now may have the following value: REG_BINARY, REG_DWORD, REG_SZ....
    */
}

catch( CRegistryException *regError ) {
    // display the error
    regError->ReportError();

    // now delete the handle
    regError->Delete();
}

All the data and data types used by this class are also the same one being used by the API (like HKEY_LOCAL_MACHINE, KEY_READ, REG_EXPAND_SZ, REG_LINK....etc).

Download source - 3 KB



Comments

  • All fine and dandy, but the exceptions...

    Posted by Legacy on 09/30/2001 12:00am

    Originally posted by: Martijn

    Hi,

    The exception is thrown if a key does not exist. This is all fine and dandy, but it poses a problem when checking for key existence. e.g.: my program runs and reads it's config from the registry. The first time, there is no key referencing my program, because my program stores it's default values upon program close. This will throw an exception (2, file not found) from your class. However, in my catch() there's no way of finding what went wrong because m_nError is protected...

    Reply
  • I'don't Know How Operation...

    Posted by Legacy on 10/26/2000 12:00am

    Originally posted by: Choi Hyun Kil

    Sorry.

    My Name Is Hyun Kil Choi. I'm Korean
    Recently, I Started on MFC Programming....by the way
    I Need This Class'Operation Sample (Example)

    pls, Help Me

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Hundreds of millions of users have adopted public cloud storage solutions to satisfy their Private Online File Sharing and Collaboration (OFS) needs. With new headlines on cloud privacy issues appearing almost daily, the need to explore private alternatives has never been stronger. Join ESG Senior Analyst Terri McClure and Connected Data in this on-demand webinar to take a look at the business drivers behind OFS adoption, how organizations can benefit from on-premise deployments, and emerging private OFS …

  • The 3rd Platform of computing, based around the four pillars of mobile computing, social media, big data and analytics, and cloud, is redefining what IT infrastructure needs to provide. Endpoint solutions must meet not only traditional data protection requirements, but also a new set of requirements driven by the explosion in mobile computing. This IDC white paper explores the customer challenges associated with safeguarding data residing on various endpoint devices, including laptops, tablets, and …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date