/*
Derived from source code of TrueCrypt 7.1a, which is
Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed
by the TrueCrypt License 3.0.
Modifications and additions to the original source code (contained in this file)
and all other portions of this file are Copyright (c) 2013-2017 IDRIX
and are governed by the Apache License 2.0 the full text of which is
contained in the file License.txt included in VeraCrypt binary and source
code distribution packages.
*/
#ifdef __cplusplus
extern "C" {
#endif
BOOL ReadLocalMachineRegistryDword (wchar_t *subKey, wchar_t *name, DWORD *value);
BOOL ReadLocalMachineRegistryMultiString (wchar_t *subKey, wchar_t *name, wchar_t *value, DWORD *size);
BOOL ReadLocalMachineRegistryString (const wchar_t *subKey, wchar_t *name, wchar_t *value, DWORD *size);
BOOL ReadLocalMachineRegistryStringNonReflected (const wchar_t *subKey, wchar_t *name, wchar_t *str, DWORD *size, BOOL b32bitApp);
int ReadRegistryInt (wchar_t *subKey, wchar_t *name, int defaultValue);
wchar_t *ReadRegistryString (wchar_t *subKey, wchar_t *name, wchar_t *defaultValue, wchar_t *str, int maxLen);
DWORD ReadRegistryBytes (wchar_t *path, wchar_t *name, char *value, int maxLen);
void WriteRegistryInt (wchar_t *subKey, wchar_t *name, int value);
BOOL WriteLocalMachineRegistryDword (wchar_t *subKey, wchar_t *name, DWORD value);
BOOL WriteLocalMachineRegistryMultiString (wchar_t *subKey, wchar_t *name, wchar_t *multiString, DWORD size);
BOOL WriteLocalMachineRegistryString (wchar_t *subKey, wchar_t *name, wchar_t *str, BOOL expandable);
void WriteRegistryString (wchar_t *subKey, wchar_t *name, wchar_t *str);
BOOL WriteRegistryBytes (wchar_t *path, wchar_t *name, char *str, DWORD size);
BOOL DeleteLocalMachineRegistryKey (wchar_t *parentKey, wchar_t *subKeyToDelete);
void DeleteRegistryValue (wchar_t *subKey, wchar_t *name);
void GetStartupRegKeyName (wchar_t *regk, size_t cbRegk);
void GetRestorePointRegKeyName (wchar_t *regk, size_t cbRegk);
#ifdef __cplusplus
}
#endif
55a190efd921c569402c0309a9d212ce98c'>commitdiff
|
blob: 8b08a919d73fc47005e766f5e25422315ceda0df (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
|
/*
Derived from source code of TrueCrypt 7.1a, which is
Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed
by the TrueCrypt License 3.0.
Modifications and additions to the original source code (contained in this file)
and all other portions of this file are Copyright (c) 2013-2016 IDRIX
and are governed by the Apache License 2.0 the full text of which is
contained in the file License.txt included in VeraCrypt binary and source
code distribution packages.
*/
#include "System.h"
#include <sys/mman.h>
#include "Platform/Platform.h"
#include "Platform/SystemLog.h"
#include "Volume/EncryptionThreadPool.h"
#include "Core/Unix/CoreService.h"
#include "Main/Application.h"
#include "Main/Main.h"
#include "Main/UserInterface.h"
#if defined (TC_MACOSX) && !defined (TC_NO_GUI)
#include <ApplicationServices/ApplicationServices.h>
#endif
using namespace VeraCrypt;
int main (int argc, char **argv)
{
try
{
// Make sure all required commands can be executed via default search path
string sysPathStr = "/usr/sbin:/sbin:/usr/bin:/bin";
char *sysPath = getenv ("PATH");
if (sysPath)
{
sysPathStr += ":";
sysPathStr += sysPath;
}
setenv ("PATH", sysPathStr.c_str(), 1);
if (argc > 1 && strcmp (argv[1], TC_CORE_SERVICE_CMDLINE_OPTION) == 0)
{
// Process elevated requests
try
{
CoreService::ProcessElevatedRequests();
return 0;
}
catch (exception &e)
{
#ifdef DEBUG
SystemLog::WriteException (e);
#endif
}
catch (...) { }
return 1;
}
// Start core service
CoreService::Start();
finally_do ({ CoreService::Stop(); });
// Start encryption thread pool
EncryptionThreadPool::Start();
finally_do ({ EncryptionThreadPool::Stop(); });
#ifdef TC_NO_GUI
bool forceTextUI = true;
#else
bool forceTextUI = false;
#endif
#ifdef __WXGTK__
if (!getenv ("DISPLAY"))
forceTextUI = true;
#endif
// Initialize application
if (forceTextUI || (argc > 1 && (strcmp (argv[1], "-t") == 0 || strcmp (argv[1], "--text") == 0)))
{
Application::Initialize (UserInterfaceType::Text);
}
else
{
#if defined (TC_MACOSX) && !defined (TC_NO_GUI)
if (argc > 1 && !(argc == 2 && strstr (argv[1], "-psn_") == argv[1]))
{
ProcessSerialNumber p;
if (GetCurrentProcess (&p) == noErr)
{
TransformProcessType (&p, kProcessTransformToForegroundApplication);
SetFrontProcess (&p);
}
}
#endif
Application::Initialize (UserInterfaceType::Graphic);
}
Application::SetExitCode (1);
// Start application
if (::wxEntry (argc, argv) == 0)
Application::SetExitCode (0);
}
catch (ErrorMessage &e)
{
wcerr << wstring (e) << endl;
}
catch (SystemException &e)
{
wstringstream s;
if (e.GetSubject().empty())
s << e.what() << endl << e.SystemText();
else
s << e.what() << endl << e.SystemText() << endl << e.GetSubject();
wcerr << s.str() << endl;
}
catch (exception &e)
{
stringstream s;
s << StringConverter::GetTypeName (typeid (e)) << endl << e.what();
cerr << s.str() << endl;
}
return Application::GetExitCode();
}
|