1
0
mirror of https://github.com/SoftEtherVPN/SoftEtherVPN.git synced 2024-11-23 01:49:53 +03:00
SoftEtherVPN/src/vpncmdsys/vpncmdsys.c

195 lines
3.5 KiB
C

// SoftEther VPN Source Code - Developer Edition Master Branch
// Cedar Communication Module
// vpncmdsys.c
// vpncmd bootstrup
#include <GlobalConst.h>
#include <winsock2.h>
#include <windows.h>
#include <wincrypt.h>
#include <wininet.h>
#include <shlobj.h>
#include <commctrl.h>
#include <Dbghelp.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <wchar.h>
#include <stdarg.h>
#include <time.h>
#include <locale.h>
#include <Mayaqua/Mayaqua.h>
#include <Cedar/Cedar.h>
#include "vpncmdsys.h"
static UINT ret_code = 0;
// Get whether the system is a Windows NT
bool IsWindowsNt()
{
OSVERSIONINFO info;
ZeroMemory(&info, sizeof(info));
info.dwOSVersionInfoSize = sizeof(info);
if (GetVersionEx(&info) == false)
{
return false;
}
if (info.dwPlatformId == VER_PLATFORM_WIN32_NT)
{
return true;
}
return false;
}
// Execute a child process
bool ExecProcess(char *exe_name, wchar_t *args_w)
{
bool ret;
wchar_t exe_name_w[MAX_SIZE];
char args[MAX_SIZE];
STARTUPINFO info;
STARTUPINFOW info_w;
PROCESS_INFORMATION proc;
// Validate arguments
if (exe_name == NULL || args_w == NULL)
{
return false;
}
ZeroMemory(exe_name_w, sizeof(exe_name_w));
ZeroMemory(args, sizeof(args));
mbstowcs(exe_name_w, exe_name, strlen(exe_name));
wcstombs(args, args_w, sizeof(args));
ZeroMemory(&info, sizeof(info));
info.cb = sizeof(info);
ZeroMemory(&info_w, sizeof(info_w));
info_w.cb = sizeof(info_w);
ZeroMemory(&proc, sizeof(proc));
if (IsWindowsNt() == false)
{
ret = CreateProcess(exe_name, args, NULL, NULL, false, NORMAL_PRIORITY_CLASS,
NULL, NULL, &info, &proc);
}
else
{
ret = CreateProcessW(exe_name_w, args_w, NULL, NULL, false, NORMAL_PRIORITY_CLASS,
NULL, NULL, &info_w, &proc);
}
if (ret)
{
WaitForSingleObject(proc.hProcess, INFINITE);
GetExitCodeProcess(proc.hProcess, &ret_code);
}
return ret;
}
// Entry point
int main(int argc, char *argv[])
{
HKEY hKey;
bool ok = false;
char error[MAX_SIZE];
wchar_t *current_args;
bool flag = false;
bool break_now = false;
error[0] = 0;
setlocale(LC_ALL, "");
current_args = GetCommandLineW();
// Remove the program name portion from the command line string
while (true)
{
switch (*current_args)
{
case L'\"':
if (flag == false)
{
flag = true;
}
else
{
flag = false;
}
break;
case L' ':
case L'\t':
case 0:
if (flag == false)
{
break_now = true;
}
break;
}
if (break_now)
{
break;
}
current_args++;
}
while (true)
{
if (*current_args == L' ' || *current_args == L'\t')
{
current_args++;
}
else
{
break;
}
}
strcpy(error, "VPN Command Line Tools is not Installed.\nPlease reinstall programs.");
// Get the path of the vpncmd.exe from the registry
if (RegOpenKey(HKEY_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, &hKey) == 0)
{
DWORD type = REG_SZ;
DWORD size = 4096;
char buf[4096];
if (RegQueryValueEx(hKey, VPNCMD_BOOTSTRAP_REG_VALUENAME_PATH, NULL, &type, (LPBYTE)buf, &size) == 0)
{
wchar_t args[MAX_SIZE];
swprintf(args, sizeof(args), L"\"%S\" %s", buf, current_args);
if (ExecProcess(buf, args) == false)
{
//sprintf(error, "Failed to execute \"%S\".", buf);
}
else
{
ok = true;
}
}
RegCloseKey(hKey);
}
if (ok == false)
{
printf("%s\n", error);
}
return ret_code;
}