129 lines
3.0 KiB
C++
129 lines
3.0 KiB
C++
#include "stdafx.h"
|
|
#include "WinAdmin.h"
|
|
|
|
#include <windows.h>
|
|
#include <codecvt>
|
|
#include <Shlwapi.h>
|
|
|
|
bool IsElevated()
|
|
{
|
|
bool fRet = false;
|
|
HANDLE hToken = NULL;
|
|
if(OpenProcessToken(GetCurrentProcess(),TOKEN_QUERY,&hToken))
|
|
{
|
|
TOKEN_ELEVATION Elevation;
|
|
DWORD cbSize = sizeof(TOKEN_ELEVATION);
|
|
if(GetTokenInformation(hToken, TokenElevation, &Elevation, sizeof( Elevation ), &cbSize))
|
|
fRet = Elevation.TokenIsElevated;
|
|
}
|
|
if(hToken)
|
|
CloseHandle(hToken);
|
|
return fRet;
|
|
}
|
|
|
|
int RunElevated(const wstring& Params, bool bGetCode)
|
|
{
|
|
wchar_t szPath[MAX_PATH];
|
|
if (!GetModuleFileName(NULL, szPath, ARRAYSIZE(szPath)))
|
|
return -3;
|
|
return RunElevated(wstring(szPath), Params, bGetCode);
|
|
}
|
|
|
|
int RunElevated(const wstring& binaryPath, const wstring& Params, bool bGetCode)
|
|
{
|
|
// Launch itself as admin
|
|
SHELLEXECUTEINFO sei = { sizeof(sei) };
|
|
sei.fMask = SEE_MASK_NOCLOSEPROCESS;
|
|
sei.lpVerb = L"runas";
|
|
sei.lpFile = binaryPath.c_str();
|
|
sei.lpParameters = Params.c_str();
|
|
sei.hwnd = NULL;
|
|
sei.nShow = SW_NORMAL;
|
|
if (!ShellExecuteEx(&sei))
|
|
{
|
|
DWORD dwError = GetLastError();
|
|
if (dwError == ERROR_CANCELLED)
|
|
return -2; // The user refused to allow privileges elevation.
|
|
}
|
|
else
|
|
{
|
|
if (bGetCode)
|
|
{
|
|
WaitForSingleObject(sei.hProcess, 10000);
|
|
DWORD ExitCode = -4;
|
|
BOOL success = GetExitCodeProcess(sei.hProcess, &ExitCode);
|
|
CloseHandle(sei.hProcess);
|
|
return success ? ExitCode : -4;
|
|
}
|
|
return 0;
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
int RestartElevated(int &argc, char **argv)
|
|
{
|
|
wstring Params;
|
|
for (int i = 1; i < argc; i++)
|
|
{
|
|
if (i > 1)
|
|
Params.append(L" ");
|
|
Params.append(L"\"" + wstring_convert<codecvt_utf8<wchar_t>>().from_bytes(argv[i]) + L"\"");
|
|
}
|
|
return RunElevated(Params);
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////////////
|
|
// AutoRun
|
|
|
|
#define APP_NAME L"SandboxiePlus"
|
|
|
|
#define AUTO_RUN_KEY_NAME APP_NAME L"_AutoRun"
|
|
|
|
bool IsAutorunEnabled()
|
|
{
|
|
bool result = false;
|
|
|
|
HKEY hkey = nullptr;
|
|
if (RegOpenKeyEx (HKEY_CURRENT_USER, L"Software\\Microsoft\\Windows\\CurrentVersion\\Run", 0, KEY_ALL_ACCESS, &hkey) == ERROR_SUCCESS)
|
|
{
|
|
WCHAR buffer[MAX_PATH] = {0};
|
|
DWORD size = _countof (buffer);
|
|
|
|
if (RegQueryValueEx (hkey, AUTO_RUN_KEY_NAME, nullptr, nullptr, (LPBYTE)buffer, &size) == ERROR_SUCCESS)
|
|
{
|
|
result = true; // todo: check path
|
|
}
|
|
|
|
RegCloseKey (hkey);
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
bool AutorunEnable (bool is_enable)
|
|
{
|
|
bool result = false;
|
|
|
|
HKEY hkey = nullptr;
|
|
if (RegOpenKeyEx (HKEY_CURRENT_USER, L"Software\\Microsoft\\Windows\\CurrentVersion\\Run", 0, KEY_ALL_ACCESS, &hkey) == ERROR_SUCCESS)
|
|
{
|
|
if (is_enable)
|
|
{
|
|
wchar_t szPath[MAX_PATH];
|
|
if (GetModuleFileName(NULL, szPath, ARRAYSIZE(szPath)))
|
|
{
|
|
wstring path = L"\"" + wstring(szPath) + L"\" -autorun";
|
|
|
|
result = (RegSetValueEx(hkey, AUTO_RUN_KEY_NAME, 0, REG_SZ, (LPBYTE)path.c_str(), DWORD((path.length() + 1) * sizeof(WCHAR))) == ERROR_SUCCESS);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
result = (RegDeleteValue (hkey, AUTO_RUN_KEY_NAME) == ERROR_SUCCESS);
|
|
}
|
|
|
|
RegCloseKey (hkey);
|
|
}
|
|
|
|
return false;
|
|
} |