From patchwork Fri May 21 17:32:30 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Selva Nair X-Patchwork-Id: 1833 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director11.mail.ord1d.rsapps.net ([172.31.255.6]) by backend30.mail.ord1d.rsapps.net with LMTP id YHWxBaN7qGBOagAAIUCqbw (envelope-from ) for ; Fri, 21 May 2021 23:33:55 -0400 Received: from proxy16.mail.iad3b.rsapps.net ([172.31.255.6]) by director11.mail.ord1d.rsapps.net with LMTP id gB2jBaN7qGBRRAAAvGGmqA (envelope-from ) for ; Fri, 21 May 2021 23:33:55 -0400 Received: from smtp16.gate.iad3b ([172.31.255.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy16.mail.iad3b.rsapps.net with LMTPS id YD6LOqJ7qGAZKgAAPj+4aA (envelope-from ) for ; Fri, 21 May 2021 23:33:54 -0400 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.105.38.7] Authentication-Results: smtp16.gate.iad3b.rsapps.net; iprev=pass policy.iprev="216.105.38.7"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dkim=fail (signature verification failed) header.d=gmail.com; dmarc=fail (p=none; dis=none) header.from=gmail.com X-Suspicious-Flag: YES X-Classification-ID: 884d9c5a-baae-11eb-bd7b-5254004ed364-1-1 Received: from [216.105.38.7] ([216.105.38.7:54754] helo=lists.sourceforge.net) by smtp16.gate.iad3b.rsapps.net (envelope-from ) (ecelerity 4.2.38.62370 r(:)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id 71/8A-21240-2AB78A06; Fri, 21 May 2021 23:33:54 -0400 Received: from [127.0.0.1] (helo=sfs-ml-2.v29.lw.sourceforge.com) by sfs-ml-2.v29.lw.sourceforge.com with esmtp (Exim 4.92.3) (envelope-from ) id 1lkINg-0008Nu-8C; Sat, 22 May 2021 03:32:52 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-2.v29.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92.3) (envelope-from ) id 1lkINe-0008Nm-Vg for openvpn-devel@lists.sourceforge.net; Sat, 22 May 2021 03:32:50 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=Content-Transfer-Encoding:MIME-Version:Message-Id: Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=T5VOIi73OtleXRo+eMGOORiZqtFvPPhQfgRvrthDod0=; b=WA0iknNc0v90BOqXSiBnWGpmHZ CZ7XaxshrLvGB/Pxyxy+4niA8m5/fl2q0WyIcTdseORqMB0XcgT/0uUZz+yuezFC9H4RKDIgnWmJ8 Npr0Fe1U5VXnc7hXAeh0RhFaGmFrYlKi5/DUF8blxzgfayZxWKCcBLaxkvk+I+nrSJsk=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=Content-Transfer-Encoding:MIME-Version:Message-Id:Date:Subject:Cc:To:From :Sender:Reply-To:Content-Type:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post: List-Owner:List-Archive; bh=T5VOIi73OtleXRo+eMGOORiZqtFvPPhQfgRvrthDod0=; b=G Z5x/RuuddVQYJiIiWM6DwOKU/4NQtT8C/+fWb0ZA/TMcukc0M8j29jBwFrdUO6e5jfT38A4Wz0Ce6 vV1DXhLGpX25tFERNImBTGMBGpZOOY50ol49+kptrUlfgukKU6G8C0TpsKyzwMM5voTBml8rw+Qs/ a9ar9nmpdiGmaED8=; Received: from mail-qv1-f50.google.com ([209.85.219.50]) by sfi-mx-2.v28.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.92.3) id 1lkINZ-0000Ue-Ss for openvpn-devel@lists.sourceforge.net; Sat, 22 May 2021 03:32:50 +0000 Received: by mail-qv1-f50.google.com with SMTP id h7so10864441qvs.12 for ; Fri, 21 May 2021 20:32:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=T5VOIi73OtleXRo+eMGOORiZqtFvPPhQfgRvrthDod0=; b=doZ0ORiIWCHcrM/dffRVcnlx441gULDbIjN/sUIvkdI+kioaLGHrbj8bJ1GcNmTSVo F7aKUhBTDY6+go9ilrCEYafzzRHHfKz4AuilZ575HUa+lhPvvePWOp+PloKYeRcxaTXT mbj/Wd3AZVuVGAhR1FhZ/pPGKL15Y0FVUBFmP5lWkPGXhACzSIUdgaaZDksMGvJCiVQH nyVJvKlQ5V75wLXO6z0hlG/wYYqIr9uvTm9F6mBNLrebdOeB6w3TSqlpQkHQ/7SNNOG4 0/zdOMiwfuCmbS/HQUXESmv4qCyZUMorWqOnUCXQABWn+8DzDoU4ebweFq7UWjaEFV6p oghw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=T5VOIi73OtleXRo+eMGOORiZqtFvPPhQfgRvrthDod0=; b=NPNCY+ka8dGzdlkC+RW5WTXCuDag89nePdrfcxvm8YkwWEzAGFQzhd9LsN/xIOoA6y BV/zmJbr28gr6UV6F/Y1+GTrRgbk6CJ7wdYerHb7Um7Sh2sH251G+Mfr0N+lv8ma13oi 6f1+KCN0HaqLyGsXDy9w1gQGyRHrAVWBDvGxNd795ceDq8TyGmnFOloIJJ/UE5e21zZ/ r4lDqIDT1ltBReLPrXkJxFUJB5BH1OOwkIOeKxLjznq+zYTQF3bAWoE92zXC+PfX+tsi b7eiyKniN+pdmI0dGv+KlYyASLLihtHG5eAgY+SwPyXTQoe/DuJZSZC0qkPU8fl6oHaS B4Rw== X-Gm-Message-State: AOAM532deQd7MlJxOWjifpK65XDJEQlIFZbJXEdV7LgyTYKusErvf0G0 0pNEU2woFxesZFc2Y/eE4yG7ZYK+ediQDQ== X-Google-Smtp-Source: ABdhPJzr4kgieyOnTIRmHWutxuSEBaH/aLiATKJ0CHB/yHW9rCL+xOOVPjV4ibaaDbREJbaMu+PxUA== X-Received: by 2002:a0c:fb52:: with SMTP id b18mr17126923qvq.8.1621654360388; Fri, 21 May 2021 20:32:40 -0700 (PDT) Received: from uranus.home.sansel.ca (bras-vprn-tnhlon4053w-lp130-01-70-51-222-236.dsl.bell.ca. [70.51.222.236]) by smtp.gmail.com with ESMTPSA id q12sm5907187qtl.13.2021.05.21.20.32.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 21 May 2021 20:32:39 -0700 (PDT) From: selva.nair@gmail.com To: openvpn-devel@lists.sourceforge.net Date: Fri, 21 May 2021 23:32:30 -0400 Message-Id: <20210522033232.20548-1-selva.nair@gmail.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (selva.nair[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.0 RCVD_IN_MSPIKE_H2 RBL: Average reputation (+2) [209.85.219.50 listed in wl.mailspike.net] -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [209.85.219.50 listed in list.dnswl.org] -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid X-Headers-End: 1lkINZ-0000Ue-Ss Subject: [Openvpn-devel] [PATCH 1/3] Make it explicit that WIndows build requires UNICODE support X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox From: Selva Nair The interactive service code implicitly treats TCHAR == WCHAR in several places with the assumption that we build only with UNICODE defined. Make this explicit and remove some redundant code. Also replace openvpn_sntprintf(), _tprintf() and similar with explicit wide string functions. This adds some definiteness as to which stdio functions are used, and helps the next commit that makes those calls C-standard compliant. Also, replace direct swprintf calls with openvpn_swprintf. Note: we need UNICODE defined mainly because of the use of TEXT("..") throughout the code. If those are replaced by L"..", we could build with just -municode as done for OpenVPN core. Signed-off-by: Selva Nair Acked-by: Lev Stipakov --- src/openvpnserv/common.c | 53 ++++++++++++-------------------- src/openvpnserv/interactive.c | 41 ++++++------------------- src/openvpnserv/service.c | 58 +++++++++++++++++------------------ src/openvpnserv/service.h | 5 +++ src/openvpnserv/validate.c | 12 -------- 5 files changed, 62 insertions(+), 107 deletions(-) diff --git a/src/openvpnserv/common.c b/src/openvpnserv/common.c index ebd08677..2f711ebc 100644 --- a/src/openvpnserv/common.c +++ b/src/openvpnserv/common.c @@ -32,46 +32,31 @@ static wchar_t win_sys_path[MAX_PATH]; * that don't guarantee null termination for size > 0. */ BOOL -openvpn_vsntprintf(LPTSTR str, size_t size, LPCTSTR format, va_list arglist) +openvpn_vswprintf(LPTSTR str, size_t size, LPCTSTR format, va_list arglist) { int len = -1; if (size > 0) { - len = _vsntprintf_s(str, size, _TRUNCATE, format, arglist); + len = vswprintf_s(str, size, format, arglist); str[size - 1] = 0; } return (len >= 0 && (size_t)len < size); } BOOL -openvpn_sntprintf(LPTSTR str, size_t size, LPCTSTR format, ...) +openvpn_swprintf(LPTSTR str, size_t size, LPCTSTR format, ...) { va_list arglist; BOOL res = FALSE; if (size > 0) { va_start(arglist, format); - res = openvpn_vsntprintf(str, size, format, arglist); + res = openvpn_vswprintf(str, size, format, arglist); va_end(arglist); } return res; } -BOOL -openvpn_swprintf(wchar_t *const str, const size_t size, const wchar_t *const format, ...) -{ - va_list arglist; - int len = -1; - if (size > 0) - { - va_start(arglist, format); - len = vswprintf(str, size, format, arglist); - va_end(arglist); - str[size - 1] = L'\0'; - } - return (len >= 0 && len < size); -} - static DWORD GetRegString(HKEY key, LPCTSTR value, LPTSTR data, DWORD size, LPCTSTR default_value) { @@ -81,7 +66,7 @@ GetRegString(HKEY key, LPCTSTR value, LPTSTR data, DWORD size, LPCTSTR default_v if (status == ERROR_FILE_NOT_FOUND && default_value) { size_t len = size/sizeof(data[0]); - if (openvpn_sntprintf(data, len, default_value)) + if (openvpn_swprintf(data, len, default_value)) { status = ERROR_SUCCESS; } @@ -108,7 +93,7 @@ GetOpenvpnSettings(settings_t *s) TCHAR install_path[MAX_PATH]; TCHAR default_value[MAX_PATH]; - openvpn_sntprintf(reg_path, _countof(reg_path), TEXT("SOFTWARE\\" PACKAGE_NAME "%s"), service_instance); + openvpn_swprintf(reg_path, _countof(reg_path), TEXT("SOFTWARE\\" PACKAGE_NAME "%s"), service_instance); LONG status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, reg_path, 0, KEY_READ, &key); if (status != ERROR_SUCCESS) @@ -125,7 +110,7 @@ GetOpenvpnSettings(settings_t *s) goto out; } - openvpn_sntprintf(default_value, _countof(default_value), TEXT("%s\\bin\\openvpn.exe"), + openvpn_swprintf(default_value, _countof(default_value), TEXT("%s\\bin\\openvpn.exe"), install_path); error = GetRegString(key, TEXT("exe_path"), s->exe_path, sizeof(s->exe_path), default_value); if (error != ERROR_SUCCESS) @@ -133,7 +118,7 @@ GetOpenvpnSettings(settings_t *s) goto out; } - openvpn_sntprintf(default_value, _countof(default_value), TEXT("%s\\config"), install_path); + openvpn_swprintf(default_value, _countof(default_value), TEXT("%s\\config"), install_path); error = GetRegString(key, TEXT("config_dir"), s->config_dir, sizeof(s->config_dir), default_value); if (error != ERROR_SUCCESS) @@ -148,7 +133,7 @@ GetOpenvpnSettings(settings_t *s) goto out; } - openvpn_sntprintf(default_value, _countof(default_value), TEXT("%s\\log"), install_path); + openvpn_swprintf(default_value, _countof(default_value), TEXT("%s\\log"), install_path); error = GetRegString(key, TEXT("log_dir"), s->log_dir, sizeof(s->log_dir), default_value); if (error != ERROR_SUCCESS) { @@ -176,23 +161,23 @@ GetOpenvpnSettings(settings_t *s) goto out; } /* set process priority */ - if (!_tcsicmp(priority, TEXT("IDLE_PRIORITY_CLASS"))) + if (!_wcsicmp(priority, TEXT("IDLE_PRIORITY_CLASS"))) { s->priority = IDLE_PRIORITY_CLASS; } - else if (!_tcsicmp(priority, TEXT("BELOW_NORMAL_PRIORITY_CLASS"))) + else if (!_wcsicmp(priority, TEXT("BELOW_NORMAL_PRIORITY_CLASS"))) { s->priority = BELOW_NORMAL_PRIORITY_CLASS; } - else if (!_tcsicmp(priority, TEXT("NORMAL_PRIORITY_CLASS"))) + else if (!_wcsicmp(priority, TEXT("NORMAL_PRIORITY_CLASS"))) { s->priority = NORMAL_PRIORITY_CLASS; } - else if (!_tcsicmp(priority, TEXT("ABOVE_NORMAL_PRIORITY_CLASS"))) + else if (!_wcsicmp(priority, TEXT("ABOVE_NORMAL_PRIORITY_CLASS"))) { s->priority = ABOVE_NORMAL_PRIORITY_CLASS; } - else if (!_tcsicmp(priority, TEXT("HIGH_PRIORITY_CLASS"))) + else if (!_wcsicmp(priority, TEXT("HIGH_PRIORITY_CLASS"))) { s->priority = HIGH_PRIORITY_CLASS; } @@ -235,7 +220,7 @@ GetLastErrorText() error = GetLastError(); len = FormatMessage(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_ARGUMENT_ARRAY, - NULL, error, LANG_NEUTRAL, (LPTSTR)&tmp, 0, NULL); + NULL, error, LANG_NEUTRAL, tmp, 0, NULL); if (len == 0 || (long) _countof(buf) < (long) len + 14) { @@ -243,8 +228,8 @@ GetLastErrorText() } else { - tmp[_tcslen(tmp) - 2] = TEXT('\0'); /* remove CR/LF characters */ - openvpn_sntprintf(buf, _countof(buf), TEXT("%s (0x%x)"), tmp, error); + tmp[wcslen(tmp) - 2] = TEXT('\0'); /* remove CR/LF characters */ + openvpn_swprintf(buf, _countof(buf), TEXT("%s (0x%x)"), tmp, error); } if (tmp) @@ -274,12 +259,12 @@ MsgToEventLog(DWORD flags, LPCTSTR format, ...) hEventSource = RegisterEventSource(NULL, APPNAME); if (hEventSource != NULL) { - openvpn_sntprintf(msg[0], _countof(msg[0]), + openvpn_swprintf(msg[0], _countof(msg[0]), TEXT("%s%s%s: %s"), APPNAME, service_instance, (flags & MSG_FLAGS_ERROR) ? TEXT(" error") : TEXT(""), err_msg); va_start(arglist, format); - openvpn_vsntprintf(msg[1], _countof(msg[1]), format, arglist); + openvpn_vswprintf(msg[1], _countof(msg[1]), format, arglist); va_end(arglist); const TCHAR *mesg[] = { msg[0], msg[1] }; diff --git a/src/openvpnserv/interactive.c b/src/openvpnserv/interactive.c index efd0bc4f..57e9697d 100644 --- a/src/openvpnserv/interactive.c +++ b/src/openvpnserv/interactive.c @@ -338,11 +338,7 @@ ReturnError(HANDLE pipe, DWORD error, LPCWSTR func, DWORD count, LPHANDLE events (LPWSTR) &result, 0, (va_list *) args); WritePipeAsync(pipe, result, (DWORD)(wcslen(result) * 2), count, events); -#ifdef UNICODE MsgToEventLog(MSG_FLAGS_ERROR, result); -#else - MsgToEventLog(MSG_FLAGS_ERROR, "%S", result); -#endif if (error != ERROR_OPENVPN_STARTUP) { @@ -776,11 +772,7 @@ BlockDNSErrHandler(DWORD err, const char *msg) err_str = buf; } -#ifdef UNICODE MsgToEventLog(M_ERR, L"%S (status = %lu): %s", msg, err, err_str); -#else - MsgToEventLog(M_ERR, "%s (status = %lu): %s", msg, err, err_str); -#endif } @@ -799,13 +791,7 @@ HandleBlockDNSMessage(const block_dns_message_t *msg, undo_lists_t *lists) HANDLE engine = NULL; LPCWSTR exe_path; -#ifdef UNICODE exe_path = settings.exe_path; -#else - WCHAR wide_path[MAX_PATH]; - MultiByteToWideChar(CP_UTF8, 0, settings.exe_path, MAX_PATH, wide_path, MAX_PATH); - exe_path = wide_path; -#endif if (msg->header.type == msg_add_block_dns) { @@ -1046,8 +1032,7 @@ netsh_dns_cmd(const wchar_t *action, const wchar_t *proto, const wchar_t *if_nam } /* Path of netsh */ - swprintf(argv0, _countof(argv0), L"%s\\%s", get_win_sys_path(), L"netsh.exe"); - argv0[_countof(argv0) - 1] = L'\0'; + openvpn_swprintf(argv0, _countof(argv0), L"%s\\%s", get_win_sys_path(), L"netsh.exe"); /* cmd template: * netsh interface $proto $action dns $if_name $addr [validate=no] @@ -1063,7 +1048,7 @@ netsh_dns_cmd(const wchar_t *action, const wchar_t *proto, const wchar_t *if_nam goto out; } - openvpn_sntprintf(cmdline, ncmdline, fmt, proto, action, if_name, addr); + openvpn_swprintf(cmdline, ncmdline, fmt, proto, action, if_name, addr); if (IsWindows7OrGreater()) { @@ -1093,8 +1078,7 @@ wmic_nicconfig_cmd(const wchar_t *action, const NET_IFINDEX if_index, wchar_t *cmdline = NULL; int timeout = 10000; /* in msec */ - swprintf(argv0, _countof(argv0), L"%s\\%s", get_win_sys_path(), L"wbem\\wmic.exe"); - argv0[_countof(argv0) - 1] = L'\0'; + openvpn_swprintf(argv0, _countof(argv0), L"%s\\%s", get_win_sys_path(), L"wbem\\wmic.exe"); const wchar_t *fmt; /* comma separated list must be enclosed in parenthesis */ @@ -1115,7 +1099,7 @@ wmic_nicconfig_cmd(const wchar_t *action, const NET_IFINDEX if_index, return ERROR_OUTOFMEMORY; } - openvpn_sntprintf(cmdline, ncmdline, fmt, if_index, action, + openvpn_swprintf(cmdline, ncmdline, fmt, if_index, action, data? data : L""); err = ExecCommand(argv0, cmdline, timeout); @@ -1300,8 +1284,7 @@ HandleEnableDHCPMessage(const enable_dhcp_message_t *dhcp) wchar_t argv0[MAX_PATH]; /* Path of netsh */ - swprintf(argv0, _countof(argv0), L"%s\\%s", get_win_sys_path(), L"netsh.exe"); - argv0[_countof(argv0) - 1] = L'\0'; + openvpn_swprintf(argv0, _countof(argv0), L"%s\\%s", get_win_sys_path(), L"netsh.exe"); /* cmd template: * netsh interface ipv4 set address name=$if_index source=dhcp @@ -1319,7 +1302,7 @@ HandleEnableDHCPMessage(const enable_dhcp_message_t *dhcp) return err; } - openvpn_sntprintf(cmdline, ncmdline, fmt, dhcp->iface.index); + openvpn_swprintf(cmdline, ncmdline, fmt, dhcp->iface.index); err = ExecCommand(argv0, cmdline, timeout); @@ -1790,7 +1773,7 @@ RunOpenvpn(LPVOID p) goto out; } - openvpn_sntprintf(ovpn_pipe_name, _countof(ovpn_pipe_name), + openvpn_swprintf(ovpn_pipe_name, _countof(ovpn_pipe_name), TEXT("\\\\.\\pipe\\" PACKAGE "%s\\service_%lu"), service_instance, GetCurrentThreadId()); ovpn_pipe = CreateNamedPipe(ovpn_pipe_name, PIPE_ACCESS_DUPLEX | FILE_FLAG_FIRST_PIPE_INSTANCE | FILE_FLAG_OVERLAPPED, @@ -1823,7 +1806,7 @@ RunOpenvpn(LPVOID p) ReturnLastError(pipe, L"malloc"); goto out; } - openvpn_sntprintf(cmdline, cmdline_size, L"openvpn %s --msg-channel %lu", + openvpn_swprintf(cmdline, cmdline_size, L"openvpn %s --msg-channel %lu", sud.options, svc_pipe); if (!CreateEnvironmentBlock(&user_env, imp_token, FALSE)) @@ -1839,13 +1822,7 @@ RunOpenvpn(LPVOID p) startup_info.hStdOutput = stdout_write; startup_info.hStdError = stdout_write; -#ifdef UNICODE exe_path = settings.exe_path; -#else - WCHAR wide_path[MAX_PATH]; - MultiByteToWideChar(CP_UTF8, 0, settings.exe_path, MAX_PATH, wide_path, MAX_PATH); - exe_path = wide_path; -#endif /* TODO: make sure HKCU is correct or call LoadUserProfile() */ if (!CreateProcessAsUserW(pri_token, exe_path, cmdline, &ovpn_sa, NULL, TRUE, @@ -1995,7 +1972,7 @@ CreateClientPipeInstance(VOID) initialized = TRUE; } - openvpn_sntprintf(pipe_name, _countof(pipe_name), TEXT("\\\\.\\pipe\\" PACKAGE "%s\\service"), service_instance); + openvpn_swprintf(pipe_name, _countof(pipe_name), TEXT("\\\\.\\pipe\\" PACKAGE "%s\\service"), service_instance); pipe = CreateNamedPipe(pipe_name, flags, PIPE_TYPE_MESSAGE | PIPE_READMODE_MESSAGE, PIPE_UNLIMITED_INSTANCES, 1024, 1024, 0, NULL); diff --git a/src/openvpnserv/service.c b/src/openvpnserv/service.c index 9566f99d..65b88faa 100644 --- a/src/openvpnserv/service.c +++ b/src/openvpnserv/service.c @@ -63,17 +63,17 @@ CmdInstallServices() if (GetModuleFileName(NULL, path + 1, _countof(path) - 2) == 0) { - _tprintf(TEXT("Unable to install service - %s\n"), GetLastErrorText()); + wprintf(TEXT("Unable to install service - %s\n"), GetLastErrorText()); return 1; } path[0] = TEXT('\"'); - _tcscat_s(path, _countof(path), TEXT("\"")); + wcscat_s(path, _countof(path), TEXT("\"")); svc_ctl_mgr = OpenSCManager(NULL, NULL, SC_MANAGER_CONNECT | SC_MANAGER_CREATE_SERVICE); if (svc_ctl_mgr == NULL) { - _tprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText()); return 1; } @@ -91,13 +91,13 @@ CmdInstallServices() NULL, NULL); if (service) { - _tprintf(TEXT("%s installed.\n"), openvpn_service[i].display_name); + wprintf(TEXT("%s installed.\n"), openvpn_service[i].display_name); CloseServiceHandle(service); --ret; } else { - _tprintf(TEXT("CreateService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("CreateService failed - %s\n"), GetLastErrorText()); } } @@ -116,7 +116,7 @@ CmdStartService(openvpn_service_type type) svc_ctl_mgr = OpenSCManager(NULL, NULL, SC_MANAGER_ALL_ACCESS); if (svc_ctl_mgr == NULL) { - _tprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText()); return 1; } @@ -125,19 +125,19 @@ CmdStartService(openvpn_service_type type) { if (StartService(service, 0, NULL)) { - _tprintf(TEXT("Service Started\n")); + wprintf(TEXT("Service Started\n")); ret = 0; } else { - _tprintf(TEXT("StartService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("StartService failed - %s\n"), GetLastErrorText()); } CloseServiceHandle(service); } else { - _tprintf(TEXT("OpenService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenService failed - %s\n"), GetLastErrorText()); } CloseServiceHandle(svc_ctl_mgr); @@ -156,7 +156,7 @@ CmdRemoveServices() svc_ctl_mgr = OpenSCManager(NULL, NULL, SC_MANAGER_CONNECT); if (svc_ctl_mgr == NULL) { - _tprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText()); return 1; } @@ -167,21 +167,21 @@ CmdRemoveServices() DELETE | SERVICE_STOP | SERVICE_QUERY_STATUS); if (service == NULL) { - _tprintf(TEXT("OpenService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenService failed - %s\n"), GetLastErrorText()); goto out; } /* try to stop the service */ if (ControlService(service, SERVICE_CONTROL_STOP, &status)) { - _tprintf(TEXT("Stopping %s."), ovpn_svc->display_name); + wprintf(TEXT("Stopping %s."), ovpn_svc->display_name); Sleep(1000); while (QueryServiceStatus(service, &status)) { if (status.dwCurrentState == SERVICE_STOP_PENDING) { - _tprintf(TEXT(".")); + wprintf(TEXT(".")); Sleep(1000); } else @@ -192,23 +192,23 @@ CmdRemoveServices() if (status.dwCurrentState == SERVICE_STOPPED) { - _tprintf(TEXT("\n%s stopped.\n"), ovpn_svc->display_name); + wprintf(TEXT("\n%s stopped.\n"), ovpn_svc->display_name); } else { - _tprintf(TEXT("\n%s failed to stop.\n"), ovpn_svc->display_name); + wprintf(TEXT("\n%s failed to stop.\n"), ovpn_svc->display_name); } } /* now remove the service */ if (DeleteService(service)) { - _tprintf(TEXT("%s removed.\n"), ovpn_svc->display_name); + wprintf(TEXT("%s removed.\n"), ovpn_svc->display_name); --ret; } else { - _tprintf(TEXT("DeleteService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("DeleteService failed - %s\n"), GetLastErrorText()); } CloseServiceHandle(service); @@ -246,21 +246,21 @@ _tmain(int argc, TCHAR *argv[]) { if (*argv[i] == TEXT('-') || *argv[i] == TEXT('/')) { - if (_tcsicmp(TEXT("install"), argv[i] + 1) == 0) + if (_wcsicmp(TEXT("install"), argv[i] + 1) == 0) { return CmdInstallServices(); } - else if (_tcsicmp(TEXT("remove"), argv[i] + 1) == 0) + else if (_wcsicmp(TEXT("remove"), argv[i] + 1) == 0) { return CmdRemoveServices(); } - else if (_tcsicmp(TEXT("start"), argv[i] + 1) == 0) + else if (_wcsicmp(TEXT("start"), argv[i] + 1) == 0) { return CmdStartService(interactive); } - else if (argc > i + 2 && _tcsicmp(TEXT("instance"), argv[i] + 1) == 0) + else if (argc > i + 2 && _wcsicmp(TEXT("instance"), argv[i] + 1) == 0) { - if (_tcsicmp(TEXT("interactive"), argv[i+1]) == 0) + if (_wcsicmp(TEXT("interactive"), argv[i+1]) == 0) { dispatchTable = dispatchTable_interactive; service_instance = argv[i + 2]; @@ -274,12 +274,12 @@ _tmain(int argc, TCHAR *argv[]) } else { - _tprintf(TEXT("%s -install to install the interactive service\n"), APPNAME); - _tprintf(TEXT("%s -start [name] to start the service (name = \"interactive\" is optional)\n"), APPNAME); - _tprintf(TEXT("%s -remove to remove the service\n"), APPNAME); + wprintf(TEXT("%s -install to install the interactive service\n"), APPNAME); + wprintf(TEXT("%s -start [name] to start the service (name = \"interactive\" is optional)\n"), APPNAME); + wprintf(TEXT("%s -remove to remove the service\n"), APPNAME); - _tprintf(TEXT("\nService run-time parameters:\n")); - _tprintf(TEXT("-instance interactive \n") + wprintf(TEXT("\nService run-time parameters:\n")); + wprintf(TEXT("-instance interactive \n") TEXT(" Runs the service as an alternate instance.\n") TEXT(" The service settings will be loaded from\n") TEXT(" HKLM\\Software\\" PACKAGE_NAME " registry key, and the service will accept\n") @@ -294,8 +294,8 @@ _tmain(int argc, TCHAR *argv[]) * the service control manager may be starting the service * so we must call StartServiceCtrlDispatcher */ - _tprintf(TEXT("\nStartServiceCtrlDispatcher being called.\n")); - _tprintf(TEXT("This may take several seconds. Please wait.\n")); + wprintf(TEXT("\nStartServiceCtrlDispatcher being called.\n")); + wprintf(TEXT("This may take several seconds. Please wait.\n")); if (!StartServiceCtrlDispatcher(dispatchTable)) { diff --git a/src/openvpnserv/service.h b/src/openvpnserv/service.h index 32a721f3..e5616906 100644 --- a/src/openvpnserv/service.h +++ b/src/openvpnserv/service.h @@ -24,6 +24,11 @@ #ifndef _SERVICE_H #define _SERVICE_H +/* We do not support non-unicode builds */ +#ifndef UNICODE +#define UNICODE +#endif + #ifdef HAVE_CONFIG_H #include "config.h" #elif defined(_MSC_VER) diff --git a/src/openvpnserv/validate.c b/src/openvpnserv/validate.c index 9b017700..b3eac963 100644 --- a/src/openvpnserv/validate.c +++ b/src/openvpnserv/validate.c @@ -64,9 +64,6 @@ CheckConfigPath(const WCHAR *workdir, const WCHAR *fname, const settings_t *s) WCHAR tmp[MAX_PATH]; const WCHAR *config_file = NULL; const WCHAR *config_dir = NULL; -#ifndef UNICODE - WCHAR widepath[MAX_PATH]; -#endif /* convert fname to full path */ if (PathIsRelativeW(fname) ) @@ -79,16 +76,7 @@ CheckConfigPath(const WCHAR *workdir, const WCHAR *fname, const settings_t *s) config_file = fname; } -#ifdef UNICODE config_dir = s->config_dir; -#else - if (MultiByteToWideChar(CP_UTF8, 0, s->config_dir, -1, widepath, MAX_PATH) == 0) - { - MsgToEventLog(M_SYSERR, TEXT("Failed to convert config_dir name to WideChar")); - return FALSE; - } - config_dir = widepath; -#endif if (wcsncmp(config_dir, config_file, wcslen(config_dir)) == 0 && wcsstr(config_file + wcslen(config_dir), L"..") == NULL) From patchwork Fri May 21 17:32:31 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Selva Nair X-Patchwork-Id: 1834 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director11.mail.ord1d.rsapps.net ([172.31.255.6]) by backend30.mail.ord1d.rsapps.net with LMTP id 4K0dCaR7qGBOagAAIUCqbw (envelope-from ) for ; Fri, 21 May 2021 23:33:56 -0400 Received: from proxy9.mail.iad3b.rsapps.net ([172.31.255.6]) by director11.mail.ord1d.rsapps.net with LMTP id KK8GCaR7qGD6QwAAvGGmqA (envelope-from ) for ; Fri, 21 May 2021 23:33:56 -0400 Received: from smtp32.gate.iad3b ([172.31.255.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy9.mail.iad3b.rsapps.net with LMTPS id UHDtAaR7qGA9GQAAC4PSzw (envelope-from ) for ; Fri, 21 May 2021 23:33:56 -0400 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.105.38.7] Authentication-Results: smtp32.gate.iad3b.rsapps.net; iprev=pass policy.iprev="216.105.38.7"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dkim=fail (signature verification failed) header.d=gmail.com; dmarc=fail (p=none; dis=none) header.from=gmail.com X-Suspicious-Flag: YES X-Classification-ID: 88e77c3a-baae-11eb-8f3e-5254006a2e70-1-1 Received: from [216.105.38.7] ([216.105.38.7:54762] helo=lists.sourceforge.net) by smtp32.gate.iad3b.rsapps.net (envelope-from ) (ecelerity 4.2.38.62370 r(:)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id 9B/43-14195-3AB78A06; Fri, 21 May 2021 23:33:55 -0400 Received: from [127.0.0.1] (helo=sfs-ml-2.v29.lw.sourceforge.com) by sfs-ml-2.v29.lw.sourceforge.com with esmtp (Exim 4.92.3) (envelope-from ) id 1lkINy-0008PG-IT; Sat, 22 May 2021 03:33:10 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-2.v29.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92.3) (envelope-from ) id 1lkINx-0008P7-3q for openvpn-devel@lists.sourceforge.net; Sat, 22 May 2021 03:33:09 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=Content-Transfer-Encoding:MIME-Version:References: In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=QoU4m0/p5LOgzflkioE+lShYVcNxdNr9VF/IQE7mc8g=; b=Xn6BVtPpYeUxHjq5dWJAy8oQBa 6kWu4xO+p0Y8rIna+pVhg0YZLLdrE0Qt9pKVmg5YwpaD0cFbHpnKSSQTFsTeE0JOHqm6xjZNN1KeV tqUcQWKKuvsjue10rxZnhoPIcFVpOo1CoyLQYj7/Q1G7dGEOppPQCuBdc3Y8sKfsvN8U=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=Content-Transfer-Encoding:MIME-Version:References:In-Reply-To:Message-Id: Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=QoU4m0/p5LOgzflkioE+lShYVcNxdNr9VF/IQE7mc8g=; b=OWIK5BQFewsIEaejYVeHjB/k1t jXApAH9O/EpWkI0Kjhr2mnunSPcDdBPu9UCWy9S1uWnxgK61lTfTVF2U4FQzLet3p/oQQr7DmVOtL NTNuAVGv8eETAkB335i0I4qjKQQIWP0GChtznmiRkTt5QOTxBmmI42HV8Ivi8JraBFaU=; Received: from mail-qt1-f177.google.com ([209.85.160.177]) by sfi-mx-1.v28.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.92.2) id 1lkINl-001Pky-BB for openvpn-devel@lists.sourceforge.net; Sat, 22 May 2021 03:33:09 +0000 Received: by mail-qt1-f177.google.com with SMTP id 1so16846833qtb.0 for ; Fri, 21 May 2021 20:32:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=QoU4m0/p5LOgzflkioE+lShYVcNxdNr9VF/IQE7mc8g=; b=FFiuWMly56+muhiC6MGzktS6NKi99D5OapMInsKOLYQKFX4BeISLdiFEk8aE/EzKUO l25FYhpug8KCEHexpsMad7Sw28bLSEBhrT6MmAaOHMtlKTOLF9pGctsLb4U0iF/OWd7u 976puR2X+zf3L8UHfhwzuSVAZqbSo6M7raj/Z7ZdBAEx6yUT0g/ewfUoRe9jqacapVyj y9hOo8eduiyV+CdhbfNsEQndcgwhON2t8ngFQY+VvedJLS21mvI6wZmjLAOpNaY8N+/h 0hPe2gIDXxRwF31EJKSglOvUsGxNvBqgy3uYW69ali1ItR/wBUtIsHTNYKrPw4LnZBtZ XN0g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=QoU4m0/p5LOgzflkioE+lShYVcNxdNr9VF/IQE7mc8g=; b=aSd7AS9pac8JK9LtFW1XuyK8Vi+CmrcSjTfg8Vcb71s1lWvQ+LqYok3BfT4j7Q1cT2 iyZOVfZtt3iXJ/XuAGJtpyVRc8yChAHtvZ1nsmJ+AeHsKGtLgYr2bPNpUNDwRAkU35+O bnO0d6URmKR3Je6Tk6g0mHB9CtxSLAG7xFhSQMY1KbBc6NlF8HFqPCJE/zz6gRm53Z8d 7vH+tkmj46/K9dndCwdzyLW9WQF+itw/efY8htaMMMOabYpJ8fv0Gq47dm7ozRVaD3oy QUJkfitTYlBFWE4v0SqLykcm0ZvEukiLZ2ebI3t5DFDMFyTK55zvdAaikEL/tQzexTvy KiXA== X-Gm-Message-State: AOAM5311ZPYUKmyKcy5LTLFHeel7Oe4kZKIGhoQIaW6wQm3pPLvAWxee /ECNRrsZ/zS0cRcuzlhgGlKITinq5Mh5iA== X-Google-Smtp-Source: ABdhPJzPjMUoGsRCVrZMNMLpbj1KYF7CPl5M7xWkOwkDLol8jLEhpJqmY/Pvq6duxXXmMQDdnRtg5g== X-Received: by 2002:ac8:5318:: with SMTP id t24mr14895355qtn.114.1621654370479; Fri, 21 May 2021 20:32:50 -0700 (PDT) Received: from uranus.home.sansel.ca (bras-vprn-tnhlon4053w-lp130-01-70-51-222-236.dsl.bell.ca. [70.51.222.236]) by smtp.gmail.com with ESMTPSA id q12sm5907187qtl.13.2021.05.21.20.32.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 21 May 2021 20:32:50 -0700 (PDT) From: selva.nair@gmail.com To: openvpn-devel@lists.sourceforge.net Date: Fri, 21 May 2021 23:32:31 -0400 Message-Id: <20210522033232.20548-2-selva.nair@gmail.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210522033232.20548-1-selva.nair@gmail.com> References: <20210522033232.20548-1-selva.nair@gmail.com> MIME-Version: 1.0 X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (selva.nair[at]gmail.com) -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [209.85.160.177 listed in list.dnswl.org] 0.0 RCVD_IN_MSPIKE_H3 RBL: Good reputation (+3) [209.85.160.177 listed in wl.mailspike.net] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.0 RCVD_IN_MSPIKE_WL Mailspike good senders X-Headers-End: 1lkINl-001Pky-BB Subject: [Openvpn-devel] [PATCH 2/3] Use C standard compliant format specs in wprintf functions X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox From: Selva Nair - Use %ls for wchar_t * and %hs for char * variables This makes it possible to build correctly with or without __USE_MINGW_ANIS_STDIO defined. When this define is not used all printf/scanf family functions are resolved from the windows runtime MSVCRT. Newer (since version 8) mingw-w64 versions have started automatically enabling this macro under some feature sets such as _GNU_SOURCE and C99. The changes should not affect MSVC builds as Windows support these format specifications. Signed-off-by: Selva Nair Acked-by: Lev Stipakov --- src/openvpn/tun.c | 2 +- src/openvpn/win32.c | 4 ++-- src/openvpnserv/common.c | 20 ++++++++-------- src/openvpnserv/interactive.c | 43 +++++++++++++++++------------------ src/openvpnserv/service.c | 34 +++++++++++++-------------- src/openvpnserv/validate.c | 6 ++--- 6 files changed, 54 insertions(+), 55 deletions(-) diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c index 4ef34e4e..f9cf725e 100644 --- a/src/openvpn/tun.c +++ b/src/openvpn/tun.c @@ -4833,7 +4833,7 @@ get_adapter_index_method_1(const char *guid) DWORD index; ULONG aindex; wchar_t wbuf[256]; - openvpn_swprintf(wbuf, SIZE(wbuf), L"\\DEVICE\\TCPIP_%S", guid); + openvpn_swprintf(wbuf, SIZE(wbuf), L"\\DEVICE\\TCPIP_%hs", guid); if (GetAdapterIndex(wbuf, &aindex) != NO_ERROR) { index = TUN_ADAPTER_INDEX_INVALID; diff --git a/src/openvpn/win32.c b/src/openvpn/win32.c index 629ebbd9..d0e81d3a 100644 --- a/src/openvpn/win32.c +++ b/src/openvpn/win32.c @@ -1040,13 +1040,13 @@ openvpn_execve(const struct argv *a, const struct env_set *es, const unsigned in } else { - msg(M_WARN|M_ERRNO, "openvpn_execve: GetExitCodeProcess %S failed", cmd); + msg(M_WARN|M_ERRNO, "openvpn_execve: GetExitCodeProcess %ls failed", cmd); } CloseHandle(proc_info.hProcess); } else { - msg(M_WARN|M_ERRNO, "openvpn_execve: CreateProcess %S failed", cmd); + msg(M_WARN|M_ERRNO, "openvpn_execve: CreateProcess %ls failed", cmd); } free(env); gc_free(&gc); diff --git a/src/openvpnserv/common.c b/src/openvpnserv/common.c index 2f711ebc..35532f2b 100644 --- a/src/openvpnserv/common.c +++ b/src/openvpnserv/common.c @@ -75,7 +75,7 @@ GetRegString(HKEY key, LPCTSTR value, LPTSTR data, DWORD size, LPCTSTR default_v if (status != ERROR_SUCCESS) { SetLastError(status); - return MsgToEventLog(M_SYSERR, TEXT("Error querying registry value: HKLM\\SOFTWARE\\" PACKAGE_NAME "%s\\%s"), service_instance, value); + return MsgToEventLog(M_SYSERR, TEXT("Error querying registry value: HKLM\\SOFTWARE\\" PACKAGE_NAME "%ls\\%ls"), service_instance, value); } return ERROR_SUCCESS; @@ -93,13 +93,13 @@ GetOpenvpnSettings(settings_t *s) TCHAR install_path[MAX_PATH]; TCHAR default_value[MAX_PATH]; - openvpn_swprintf(reg_path, _countof(reg_path), TEXT("SOFTWARE\\" PACKAGE_NAME "%s"), service_instance); + openvpn_swprintf(reg_path, _countof(reg_path), TEXT("SOFTWARE\\" PACKAGE_NAME "%ls"), service_instance); LONG status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, reg_path, 0, KEY_READ, &key); if (status != ERROR_SUCCESS) { SetLastError(status); - return MsgToEventLog(M_SYSERR, TEXT("Could not open Registry key HKLM\\%s not found"), reg_path); + return MsgToEventLog(M_SYSERR, TEXT("Could not open Registry key HKLM\\%ls not found"), reg_path); } /* The default value of REG_KEY is the install path */ @@ -110,7 +110,7 @@ GetOpenvpnSettings(settings_t *s) goto out; } - openvpn_swprintf(default_value, _countof(default_value), TEXT("%s\\bin\\openvpn.exe"), + openvpn_swprintf(default_value, _countof(default_value), TEXT("%ls\\bin\\openvpn.exe"), install_path); error = GetRegString(key, TEXT("exe_path"), s->exe_path, sizeof(s->exe_path), default_value); if (error != ERROR_SUCCESS) @@ -118,7 +118,7 @@ GetOpenvpnSettings(settings_t *s) goto out; } - openvpn_swprintf(default_value, _countof(default_value), TEXT("%s\\config"), install_path); + openvpn_swprintf(default_value, _countof(default_value), TEXT("%ls\\config"), install_path); error = GetRegString(key, TEXT("config_dir"), s->config_dir, sizeof(s->config_dir), default_value); if (error != ERROR_SUCCESS) @@ -133,7 +133,7 @@ GetOpenvpnSettings(settings_t *s) goto out; } - openvpn_swprintf(default_value, _countof(default_value), TEXT("%s\\log"), install_path); + openvpn_swprintf(default_value, _countof(default_value), TEXT("%ls\\log"), install_path); error = GetRegString(key, TEXT("log_dir"), s->log_dir, sizeof(s->log_dir), default_value); if (error != ERROR_SUCCESS) { @@ -184,7 +184,7 @@ GetOpenvpnSettings(settings_t *s) else { SetLastError(ERROR_INVALID_DATA); - error = MsgToEventLog(M_SYSERR, TEXT("Unknown priority name: %s"), priority); + error = MsgToEventLog(M_SYSERR, TEXT("Unknown priority name: %ls"), priority); goto out; } @@ -200,7 +200,7 @@ GetOpenvpnSettings(settings_t *s) else { SetLastError(ERROR_INVALID_DATA); - error = MsgToEventLog(M_ERR, TEXT("Log file append flag (given as '%s') must be '0' or '1'"), append); + error = MsgToEventLog(M_ERR, TEXT("Log file append flag (given as '%ls') must be '0' or '1'"), append); goto out; } @@ -229,7 +229,7 @@ GetLastErrorText() else { tmp[wcslen(tmp) - 2] = TEXT('\0'); /* remove CR/LF characters */ - openvpn_swprintf(buf, _countof(buf), TEXT("%s (0x%x)"), tmp, error); + openvpn_swprintf(buf, _countof(buf), TEXT("%ls (0x%x)"), tmp, error); } if (tmp) @@ -260,7 +260,7 @@ MsgToEventLog(DWORD flags, LPCTSTR format, ...) if (hEventSource != NULL) { openvpn_swprintf(msg[0], _countof(msg[0]), - TEXT("%s%s%s: %s"), APPNAME, service_instance, + TEXT("%ls%ls%ls: %ls"), APPNAME, service_instance, (flags & MSG_FLAGS_ERROR) ? TEXT(" error") : TEXT(""), err_msg); va_start(arglist, format); diff --git a/src/openvpnserv/interactive.c b/src/openvpnserv/interactive.c index 57e9697d..03237c95 100644 --- a/src/openvpnserv/interactive.c +++ b/src/openvpnserv/interactive.c @@ -307,7 +307,7 @@ ReturnProcessId(HANDLE pipe, DWORD pid, DWORD count, LPHANDLE events) * Same format as error messages (3 line string) with error = 0 in * 0x%08x format, PID on line 2 and a description "Process ID" on line 3 */ - openvpn_swprintf(buf, _countof(buf), L"0x%08x\n0x%08x\n%s", 0, pid, msg); + openvpn_swprintf(buf, _countof(buf), L"0x%08x\n0x%08x\n%ls", 0, pid, msg); WritePipeAsync(pipe, buf, (DWORD)(wcslen(buf) * 2), count, events); } @@ -369,13 +369,13 @@ ValidateOptions(HANDLE pipe, const WCHAR *workdir, const WCHAR *options, WCHAR * int argc; BOOL ret = FALSE; int i; - const WCHAR *msg1 = L"You have specified a config file location (%s relative to %s)" + const WCHAR *msg1 = L"You have specified a config file location (%ls relative to %ls)" L" that requires admin approval. This error may be avoided" - L" by adding your account to the \"%s\" group"; + L" by adding your account to the \"%ls\" group"; - const WCHAR *msg2 = L"You have specified an option (%s) that may be used" + const WCHAR *msg2 = L"You have specified an option (%ls) that may be used" L" only with admin approval. This error may be avoided" - L" by adding your account to the \"%s\" group"; + L" by adding your account to the \"%ls\" group"; argv = CommandLineToArgvW(options, &argc); @@ -574,7 +574,7 @@ ConvertInterfaceNameToIndex(const wchar_t *ifname, NET_IFINDEX *index) } if (err != ERROR_SUCCESS) { - MsgToEventLog(M_ERR, L"Failed to find interface index for <%s>", ifname); + MsgToEventLog(M_ERR, L"Failed to find interface index for <%ls>", ifname); } return err; } @@ -772,8 +772,7 @@ BlockDNSErrHandler(DWORD err, const char *msg) err_str = buf; } - MsgToEventLog(M_ERR, L"%S (status = %lu): %s", msg, err, err_str); - + MsgToEventLog(M_ERR, L"%hs (status = %lu): %ls", msg, err, err_str); } /* Use an always-true match_fn to get the head of the list */ @@ -901,17 +900,17 @@ ExecCommand(const WCHAR *argv0, const WCHAR *cmdline, DWORD timeout) /* kill without impunity */ TerminateProcess(pi.hProcess, exit_code); - MsgToEventLog(M_ERR, TEXT("ExecCommand: \"%s %s\" killed after timeout"), + MsgToEventLog(M_ERR, TEXT("ExecCommand: \"%ls %ls\" killed after timeout"), argv0, cmdline); } else if (exit_code) { - MsgToEventLog(M_ERR, TEXT("ExecCommand: \"%s %s\" exited with status = %lu"), + MsgToEventLog(M_ERR, TEXT("ExecCommand: \"%ls %ls\" exited with status = %lu"), argv0, cmdline, exit_code); } else { - MsgToEventLog(M_INFO, TEXT("ExecCommand: \"%s %s\" completed"), argv0, cmdline); + MsgToEventLog(M_INFO, TEXT("ExecCommand: \"%ls %ls\" completed"), argv0, cmdline); } CloseHandle(pi.hProcess); @@ -920,7 +919,7 @@ ExecCommand(const WCHAR *argv0, const WCHAR *cmdline, DWORD timeout) else { exit_code = GetLastError(); - MsgToEventLog(M_SYSERR, TEXT("ExecCommand: could not run \"%s %s\" :"), + MsgToEventLog(M_SYSERR, TEXT("ExecCommand: could not run \"%ls %ls\" :"), argv0, cmdline); } @@ -953,7 +952,7 @@ RegisterDNS(LPVOID unused) HANDLE wait_handles[2] = {rdns_semaphore, exit_event}; - openvpn_swprintf(ipcfg, MAX_PATH, L"%s\\%s", get_win_sys_path(), L"ipconfig.exe"); + openvpn_swprintf(ipcfg, MAX_PATH, L"%ls\\%ls", get_win_sys_path(), L"ipconfig.exe"); if (WaitForMultipleObjects(2, wait_handles, FALSE, timeout) == WAIT_OBJECT_0) { @@ -1032,12 +1031,12 @@ netsh_dns_cmd(const wchar_t *action, const wchar_t *proto, const wchar_t *if_nam } /* Path of netsh */ - openvpn_swprintf(argv0, _countof(argv0), L"%s\\%s", get_win_sys_path(), L"netsh.exe"); + openvpn_swprintf(argv0, _countof(argv0), L"%ls\\%ls", get_win_sys_path(), L"netsh.exe"); /* cmd template: * netsh interface $proto $action dns $if_name $addr [validate=no] */ - const wchar_t *fmt = L"netsh interface %s %s dns \"%s\" %s"; + const wchar_t *fmt = L"netsh interface %ls %ls dns \"%ls\" %ls"; /* max cmdline length in wchars -- include room for worst case and some */ size_t ncmdline = wcslen(fmt) + wcslen(if_name) + wcslen(addr) + 32 + 1; @@ -1078,17 +1077,17 @@ wmic_nicconfig_cmd(const wchar_t *action, const NET_IFINDEX if_index, wchar_t *cmdline = NULL; int timeout = 10000; /* in msec */ - openvpn_swprintf(argv0, _countof(argv0), L"%s\\%s", get_win_sys_path(), L"wbem\\wmic.exe"); + openvpn_swprintf(argv0, _countof(argv0), L"%ls\\%ls", get_win_sys_path(), L"wbem\\wmic.exe"); const wchar_t *fmt; /* comma separated list must be enclosed in parenthesis */ if (data && wcschr(data, L',')) { - fmt = L"wmic nicconfig where (InterfaceIndex=%ld) call %s (%s)"; + fmt = L"wmic nicconfig where (InterfaceIndex=%ld) call %ls (%ls)"; } else { - fmt = L"wmic nicconfig where (InterfaceIndex=%ld) call %s \"%s\""; + fmt = L"wmic nicconfig where (InterfaceIndex=%ld) call %ls \"%ls\""; } size_t ncmdline = wcslen(fmt) + 20 + wcslen(action) /* max 20 for ifindex */ @@ -1284,7 +1283,7 @@ HandleEnableDHCPMessage(const enable_dhcp_message_t *dhcp) wchar_t argv0[MAX_PATH]; /* Path of netsh */ - openvpn_swprintf(argv0, _countof(argv0), L"%s\\%s", get_win_sys_path(), L"netsh.exe"); + openvpn_swprintf(argv0, _countof(argv0), L"%ls\\%ls", get_win_sys_path(), L"netsh.exe"); /* cmd template: * netsh interface ipv4 set address name=$if_index source=dhcp @@ -1774,7 +1773,7 @@ RunOpenvpn(LPVOID p) } openvpn_swprintf(ovpn_pipe_name, _countof(ovpn_pipe_name), - TEXT("\\\\.\\pipe\\" PACKAGE "%s\\service_%lu"), service_instance, GetCurrentThreadId()); + TEXT("\\\\.\\pipe\\" PACKAGE "%ls\\service_%lu"), service_instance, GetCurrentThreadId()); ovpn_pipe = CreateNamedPipe(ovpn_pipe_name, PIPE_ACCESS_DUPLEX | FILE_FLAG_FIRST_PIPE_INSTANCE | FILE_FLAG_OVERLAPPED, PIPE_TYPE_MESSAGE | PIPE_READMODE_MESSAGE | PIPE_WAIT, 1, 128, 128, 0, NULL); @@ -1806,7 +1805,7 @@ RunOpenvpn(LPVOID p) ReturnLastError(pipe, L"malloc"); goto out; } - openvpn_swprintf(cmdline, cmdline_size, L"openvpn %s --msg-channel %lu", + openvpn_swprintf(cmdline, cmdline_size, L"openvpn %ls --msg-channel %lu", sud.options, svc_pipe); if (!CreateEnvironmentBlock(&user_env, imp_token, FALSE)) @@ -1972,7 +1971,7 @@ CreateClientPipeInstance(VOID) initialized = TRUE; } - openvpn_swprintf(pipe_name, _countof(pipe_name), TEXT("\\\\.\\pipe\\" PACKAGE "%s\\service"), service_instance); + openvpn_swprintf(pipe_name, _countof(pipe_name), TEXT("\\\\.\\pipe\\" PACKAGE "%ls\\service"), service_instance); pipe = CreateNamedPipe(pipe_name, flags, PIPE_TYPE_MESSAGE | PIPE_READMODE_MESSAGE, PIPE_UNLIMITED_INSTANCES, 1024, 1024, 0, NULL); diff --git a/src/openvpnserv/service.c b/src/openvpnserv/service.c index 65b88faa..c27878dc 100644 --- a/src/openvpnserv/service.c +++ b/src/openvpnserv/service.c @@ -63,7 +63,7 @@ CmdInstallServices() if (GetModuleFileName(NULL, path + 1, _countof(path) - 2) == 0) { - wprintf(TEXT("Unable to install service - %s\n"), GetLastErrorText()); + wprintf(TEXT("Unable to install service - %ls\n"), GetLastErrorText()); return 1; } @@ -73,7 +73,7 @@ CmdInstallServices() svc_ctl_mgr = OpenSCManager(NULL, NULL, SC_MANAGER_CONNECT | SC_MANAGER_CREATE_SERVICE); if (svc_ctl_mgr == NULL) { - wprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenSCManager failed - %ls\n"), GetLastErrorText()); return 1; } @@ -91,13 +91,13 @@ CmdInstallServices() NULL, NULL); if (service) { - wprintf(TEXT("%s installed.\n"), openvpn_service[i].display_name); + wprintf(TEXT("%ls installed.\n"), openvpn_service[i].display_name); CloseServiceHandle(service); --ret; } else { - wprintf(TEXT("CreateService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("CreateService failed - %ls\n"), GetLastErrorText()); } } @@ -116,7 +116,7 @@ CmdStartService(openvpn_service_type type) svc_ctl_mgr = OpenSCManager(NULL, NULL, SC_MANAGER_ALL_ACCESS); if (svc_ctl_mgr == NULL) { - wprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenSCManager failed - %ls\n"), GetLastErrorText()); return 1; } @@ -130,14 +130,14 @@ CmdStartService(openvpn_service_type type) } else { - wprintf(TEXT("StartService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("StartService failed - %ls\n"), GetLastErrorText()); } CloseServiceHandle(service); } else { - wprintf(TEXT("OpenService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenService failed - %ls\n"), GetLastErrorText()); } CloseServiceHandle(svc_ctl_mgr); @@ -156,7 +156,7 @@ CmdRemoveServices() svc_ctl_mgr = OpenSCManager(NULL, NULL, SC_MANAGER_CONNECT); if (svc_ctl_mgr == NULL) { - wprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenSCManager failed - %ls\n"), GetLastErrorText()); return 1; } @@ -167,14 +167,14 @@ CmdRemoveServices() DELETE | SERVICE_STOP | SERVICE_QUERY_STATUS); if (service == NULL) { - wprintf(TEXT("OpenService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("OpenService failed - %ls\n"), GetLastErrorText()); goto out; } /* try to stop the service */ if (ControlService(service, SERVICE_CONTROL_STOP, &status)) { - wprintf(TEXT("Stopping %s."), ovpn_svc->display_name); + wprintf(TEXT("Stopping %ls."), ovpn_svc->display_name); Sleep(1000); while (QueryServiceStatus(service, &status)) @@ -192,23 +192,23 @@ CmdRemoveServices() if (status.dwCurrentState == SERVICE_STOPPED) { - wprintf(TEXT("\n%s stopped.\n"), ovpn_svc->display_name); + wprintf(TEXT("\n%ls stopped.\n"), ovpn_svc->display_name); } else { - wprintf(TEXT("\n%s failed to stop.\n"), ovpn_svc->display_name); + wprintf(TEXT("\n%ls failed to stop.\n"), ovpn_svc->display_name); } } /* now remove the service */ if (DeleteService(service)) { - wprintf(TEXT("%s removed.\n"), ovpn_svc->display_name); + wprintf(TEXT("%ls removed.\n"), ovpn_svc->display_name); --ret; } else { - wprintf(TEXT("DeleteService failed - %s\n"), GetLastErrorText()); + wprintf(TEXT("DeleteService failed - %ls\n"), GetLastErrorText()); } CloseServiceHandle(service); @@ -274,9 +274,9 @@ _tmain(int argc, TCHAR *argv[]) } else { - wprintf(TEXT("%s -install to install the interactive service\n"), APPNAME); - wprintf(TEXT("%s -start [name] to start the service (name = \"interactive\" is optional)\n"), APPNAME); - wprintf(TEXT("%s -remove to remove the service\n"), APPNAME); + wprintf(TEXT("%ls -install to install the interactive service\n"), APPNAME); + wprintf(TEXT("%ls -start [name] to start the service (name = \"interactive\" is optional)\n"), APPNAME); + wprintf(TEXT("%ls -remove to remove the service\n"), APPNAME); wprintf(TEXT("\nService run-time parameters:\n")); wprintf(TEXT("-instance interactive \n") diff --git a/src/openvpnserv/validate.c b/src/openvpnserv/validate.c index b3eac963..0b1bc807 100644 --- a/src/openvpnserv/validate.c +++ b/src/openvpnserv/validate.c @@ -68,7 +68,7 @@ CheckConfigPath(const WCHAR *workdir, const WCHAR *fname, const settings_t *s) /* convert fname to full path */ if (PathIsRelativeW(fname) ) { - openvpn_swprintf(tmp, _countof(tmp), L"%s\\%s", workdir, fname); + openvpn_swprintf(tmp, _countof(tmp), L"%ls\\%ls", workdir, fname); config_file = tmp; } else @@ -182,7 +182,7 @@ IsAuthorizedUser(PSID sid, const HANDLE token, const WCHAR *ovpn_admin_group) ret = IsUserInGroup(sid, token_groups, admin_group[i]); if (ret) { - MsgToEventLog(M_INFO, TEXT("Authorizing user '%s@%s' by virtue of membership in group '%s'"), + MsgToEventLog(M_INFO, TEXT("Authorizing user '%ls@%ls' by virtue of membership in group '%ls'"), username, domain, admin_group[i]); goto out; } @@ -302,7 +302,7 @@ IsUserInGroup(PSID sid, const PTOKEN_GROUPS token_groups, const WCHAR *group_nam if (err != NERR_Success && err != NERR_GroupNotFound) { SetLastError(err); - MsgToEventLog(M_SYSERR, TEXT("In NetLocalGroupGetMembers for group '%s'"), group_name); + MsgToEventLog(M_SYSERR, TEXT("In NetLocalGroupGetMembers for group '%ls'"), group_name); } return ret; From patchwork Fri May 21 17:32:32 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Selva Nair X-Patchwork-Id: 1835 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director12.mail.ord1d.rsapps.net ([172.31.255.6]) by backend30.mail.ord1d.rsapps.net with LMTP id QDQbL6R7qGBOagAAIUCqbw (envelope-from ) for ; Fri, 21 May 2021 23:33:56 -0400 Received: from proxy3.mail.iad3b.rsapps.net ([172.31.255.6]) by director12.mail.ord1d.rsapps.net with LMTP id eNchL6R7qGBXIgAAIasKDg (envelope-from ) for ; Fri, 21 May 2021 23:33:56 -0400 Received: from smtp38.gate.iad3b ([172.31.255.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy3.mail.iad3b.rsapps.net with LMTPS id oBLRJqR7qGCLGgAAM8Wetg (envelope-from ) for ; Fri, 21 May 2021 23:33:56 -0400 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.105.38.7] Authentication-Results: smtp38.gate.iad3b.rsapps.net; iprev=pass policy.iprev="216.105.38.7"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dkim=fail (signature verification failed) header.d=gmail.com; dmarc=fail (p=none; dis=none) header.from=gmail.com X-Suspicious-Flag: YES X-Classification-ID: 894b6ba0-baae-11eb-81a8-5254006f0979-1-1 Received: from [216.105.38.7] ([216.105.38.7:41526] helo=lists.sourceforge.net) by smtp38.gate.iad3b.rsapps.net (envelope-from ) (ecelerity 4.2.38.62370 r(:)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id 6D/04-24528-4AB78A06; Fri, 21 May 2021 23:33:56 -0400 Received: from [127.0.0.1] (helo=sfs-ml-4.v29.lw.sourceforge.com) by sfs-ml-4.v29.lw.sourceforge.com with esmtp (Exim 4.90_1) (envelope-from ) id 1lkINx-0003Jk-6M; Sat, 22 May 2021 03:33:09 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-4.v29.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lkINv-0003Jd-N2 for openvpn-devel@lists.sourceforge.net; Sat, 22 May 2021 03:33:07 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=Content-Transfer-Encoding:MIME-Version:References: In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=Oc5f2G9v2hWEl1cmqvltlMZ/FUKMNve7PVaaSghmauM=; b=Xu33ArZh+hbhtjVIQJ/yaoSmCD 0bhq4HMMthXUIQbSPufJP/NRaFa2jet7PzMyvjj1q6/b8brVN3n8qxWvOTbmFaMLWkny11UTCUQSI 992LfcagUhUiyNvz5hmlYu8GvHz/hbboJtjuswnvEAFq8cH4gWy/Wbu/2lUO4mtaWblY=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=Content-Transfer-Encoding:MIME-Version:References:In-Reply-To:Message-Id: Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=Oc5f2G9v2hWEl1cmqvltlMZ/FUKMNve7PVaaSghmauM=; b=D6kk2f27rVnNa2j/ZqpCCD50lb 2Xbee/X83y15UFz1f2QWYSwE1E1LMlynVisS09C7UZrnMzSWVEYTla7QGOr6qv2q6DYTaer7j4fVU ospoSUIn2x21M5ARMl5ZJtA9NGFo/oZxm/2hjGkgg52bCGP5SG2aXDJKYwqjkr4Ilwp8=; Received: from mail-qk1-f175.google.com ([209.85.222.175]) by sfi-mx-2.v28.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.92.3) id 1lkINo-0000W2-7a for openvpn-devel@lists.sourceforge.net; Sat, 22 May 2021 03:33:08 +0000 Received: by mail-qk1-f175.google.com with SMTP id j189so1048340qkf.2 for ; Fri, 21 May 2021 20:33:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Oc5f2G9v2hWEl1cmqvltlMZ/FUKMNve7PVaaSghmauM=; b=DqY6/09lvVHnd2Y8ZG46L5HIvJQDaHwhwzFZLpfGix0AnThcjAEFYfa/O3jPBVdhT8 1Z2U0wLiBIov/U825hKka7f0EvMrRM0/uxu+gr5Q9Xd6l3ynvel+u1rewWW/IzdXi7Au yC1lyfzsjqJBadYt7ky2+9zC1FBl/9evq16WOoRPw0nE28ynVa822qx318imBUFqwRPd vJ+0ZFMlkZPPaOxAnnbv8IxikkPIDiB5JcKFiZuYq4OkRcauSJOpcYKAPsrfDZXXuU/u a5yn2WBs7Zrzq+tQqjpoYNG4XkrvSKC/xxo9pmS9iWsp9xYM73fnWD4+Eccz+rFHdu7J aPgw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Oc5f2G9v2hWEl1cmqvltlMZ/FUKMNve7PVaaSghmauM=; b=H8+mJkdntJwJusvNxVefRtD1OMsGL/WRJYWcTkrsW4m16pZ688zXnO3j8wtSKto7ni cGMD/0dKBqmibx0GZTUoiJMDhXmNnrlFhT8fivob/B+9W1hfoE2puqXLmiCOaiZ23yUF 05ANaOXRuJUwXV3NE04PM6bPMJmWMrAGVclf+nB9HW5ifpDzdS7NzlGZRK6CBKkSsuGR f2OOaRBE1kgxsq0jFNnYfXHyFG78rQaqf+qYbaDtKmxsQiM1cs6axpcuRsrpJy0geQqs nrtpNqVjCu+80+iQxy3rHPnda+iQR7JeXeQRzkybBr6mxWPlM8TAWyaRuqM85HivDIKw 9kmw== X-Gm-Message-State: AOAM530Yf+icjf3aX2P2yifQp7HhUIYouc62TYQQ+NjCf8YLwsRHhvJu M9k4fQJ9HTQbkdETD2ZLa6xWYZ6/wAhuEA== X-Google-Smtp-Source: ABdhPJz/aXsGqJO9bm8fQDcpWnm0oeMEIEMONWyE36YExION8gF05mh8ovBXe3b/KwKoedZR5oVNNw== X-Received: by 2002:a05:620a:22b9:: with SMTP id p25mr16021162qkh.319.1621654375245; Fri, 21 May 2021 20:32:55 -0700 (PDT) Received: from uranus.home.sansel.ca (bras-vprn-tnhlon4053w-lp130-01-70-51-222-236.dsl.bell.ca. [70.51.222.236]) by smtp.gmail.com with ESMTPSA id q12sm5907187qtl.13.2021.05.21.20.32.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 21 May 2021 20:32:54 -0700 (PDT) From: selva.nair@gmail.com To: openvpn-devel@lists.sourceforge.net Date: Fri, 21 May 2021 23:32:32 -0400 Message-Id: <20210522033232.20548-3-selva.nair@gmail.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210522033232.20548-1-selva.nair@gmail.com> References: <20210522033232.20548-1-selva.nair@gmail.com> MIME-Version: 1.0 X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [209.85.222.175 listed in list.dnswl.org] 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (selva.nair[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.0 RCVD_IN_MSPIKE_H2 RBL: Average reputation (+2) [209.85.222.175 listed in wl.mailspike.net] -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid X-Headers-End: 1lkINo-0000W2-7a Subject: [Openvpn-devel] [PATCH 3/3] Print format spec changes for tapctl and openvpnmscia X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox From: Selva Nair The tapctl and openvpnmscia codebase is written with an intent of supporting both unicode and ansi builds. This patch does not attempt to change that although non-unicode support looks untested and buggy. The main change is to replace %s by PRIsLPTSR that is defined as %ls or %s depending on _UNICODE is defined ot not. Signed-off-by: Selva Nair --- src/openvpnmsica/openvpnmsica.c | 6 +++-- src/tapctl/main.c | 39 +++++++++++++++++++++------------ src/tapctl/tap.c | 3 ++- 3 files changed, 31 insertions(+), 17 deletions(-) diff --git a/src/openvpnmsica/openvpnmsica.c b/src/openvpnmsica/openvpnmsica.c index 96652117..1a6f7e86 100644 --- a/src/openvpnmsica/openvpnmsica.c +++ b/src/openvpnmsica/openvpnmsica.c @@ -108,7 +108,8 @@ _debug_popup(_In_z_ LPCTSTR szFunctionName) /* Compose pop-up title. The dialog title will contain function name to ease the process * locating. Mind that Visual Studio displays window titles on the process list. */ - _stprintf_s(szTitle, _countof(szTitle), TEXT("%s v%s"), szFunctionName, TEXT(PACKAGE_VERSION)); + _stprintf_s(szTitle, _countof(szTitle), TEXT("%") TEXT(PRIsLPTSTR) TEXT("v%") TEXT(PRIsLPTSTR), + szFunctionName, TEXT(PACKAGE_VERSION)); /* Get process name. */ GetModuleFileName(NULL, szProcessPath, _countof(szProcessPath)); @@ -118,7 +119,8 @@ _debug_popup(_In_z_ LPCTSTR szFunctionName) /* Compose the pop-up message. */ _stprintf_s( szMessage, _countof(szMessage), - TEXT("The %s process (PID: %u) has started to execute the %s custom action.\r\n") + TEXT("The %") TEXT(PRIsLPTSTR) TEXT(" process (PID: %u) has started to execute the %" + TEXT(PRIsLPTSTR) TEXT(" custom action.\r\n") TEXT("\r\n") TEXT("If you would like to debug the custom action, attach a debugger to this process and set breakpoints before dismissing this dialog.\r\n") TEXT("\r\n") diff --git a/src/tapctl/main.c b/src/tapctl/main.c index 3350bf1f..81addaef 100644 --- a/src/tapctl/main.c +++ b/src/tapctl/main.c @@ -49,7 +49,7 @@ const TCHAR title_string[] = ; static const TCHAR usage_message[] = - TEXT("%s\n") + TEXT("%") TEXT(PRIsLPTSTR) TEXT("\n") TEXT("\n") TEXT("Usage:\n") TEXT("\n") @@ -66,7 +66,7 @@ static const TCHAR usage_message[] = ; static const TCHAR usage_message_create[] = - TEXT("%s\n") + TEXT("%") TEXT(PRIsLPTSTR) TEXT("\n") TEXT("\n") TEXT("Creates a new TUN/TAP adapter\n") TEXT("\n") @@ -91,7 +91,7 @@ static const TCHAR usage_message_create[] = ; static const TCHAR usage_message_list[] = - TEXT("%s\n") + TEXT("%") TEXT(PRIsLPTSTR) TEXT("\n") TEXT("\n") TEXT("Lists TUN/TAP adapters\n") TEXT("\n") @@ -110,7 +110,7 @@ static const TCHAR usage_message_list[] = ; static const TCHAR usage_message_delete[] = - TEXT("%s\n") + TEXT("%") TEXT(PRIsLPTSTR) TEXT("\n") TEXT("\n") TEXT("Deletes the specified network adapter\n") TEXT("\n") @@ -170,7 +170,8 @@ _tmain(int argc, LPCTSTR argv[]) } else { - _ftprintf(stderr, TEXT("Unknown command \"%s\". Please, use \"tapctl help\" to list supported commands.\n"), argv[2]); + _ftprintf(stderr, TEXT("Unknown command \"%") TEXT(PRIsLPTSTR) + TEXT("\". Please, use \"tapctl help\" to list supported commands.\n"), argv[2]); } return 1; @@ -194,7 +195,9 @@ _tmain(int argc, LPCTSTR argv[]) } else { - _ftprintf(stderr, TEXT("Unknown option \"%s\". Please, use \"tapctl help create\" to list supported options. Ignored.\n"), argv[i]); + _ftprintf(stderr, TEXT("Unknown option \"%") TEXT(PRIsLPTSTR) + TEXT("\". Please, use \"tapctl help create\" to list supported options. Ignored.\n"), + argv[i]); } } @@ -230,7 +233,8 @@ _tmain(int argc, LPCTSTR argv[]) if (_tcsicmp(szName, pAdapter->szName) == 0) { StringFromIID((REFIID)&pAdapter->guid, &szAdapterId); - _ftprintf(stderr, TEXT("Adapter \"%s\" already exists (GUID %") TEXT(PRIsLPOLESTR) TEXT(").\n"), pAdapter->szName, szAdapterId); + _ftprintf(stderr, TEXT("Adapter \"%") TEXT(PRIsLPTSTR) TEXT("\" already exists (GUID %") + TEXT(PRIsLPOLESTR) TEXT(").\n"), pAdapter->szName, szAdapterId); CoTaskMemFree(szAdapterId); iResult = 1; goto create_cleanup_pAdapterList; } @@ -241,7 +245,9 @@ _tmain(int argc, LPCTSTR argv[]) if (dwResult != ERROR_SUCCESS) { StringFromIID((REFIID)&guidAdapter, &szAdapterId); - _ftprintf(stderr, TEXT("Renaming TUN/TAP adapter %") TEXT(PRIsLPOLESTR) TEXT(" to \"%s\" failed (error 0x%x).\n"), szAdapterId, szName, dwResult); + _ftprintf(stderr, TEXT("Renaming TUN/TAP adapter %") TEXT(PRIsLPOLESTR) + TEXT(" to \"%") TEXT(PRIsLPTSTR) TEXT("\" failed (error 0x%x).\n"), + szAdapterId, szName, dwResult); CoTaskMemFree(szAdapterId); iResult = 1; goto quit; } @@ -289,7 +295,9 @@ create_delete_adapter: } else { - _ftprintf(stderr, TEXT("Unknown option \"%s\". Please, use \"tapctl help list\" to list supported options. Ignored.\n"), argv[i]); + _ftprintf(stderr, TEXT("Unknown option \"%") TEXT(PRIsLPTSTR) + TEXT("\". Please, use \"tapctl help list\" to list supported options. Ignored.\n"), + argv[i]); } } @@ -306,7 +314,8 @@ create_delete_adapter: { LPOLESTR szAdapterId = NULL; StringFromIID((REFIID)&pAdapter->guid, &szAdapterId); - _ftprintf(stdout, TEXT("%") TEXT(PRIsLPOLESTR) TEXT("\t%") TEXT(PRIsLPTSTR) TEXT("\n"), szAdapterId, pAdapter->szName); + _ftprintf(stdout, TEXT("%") TEXT(PRIsLPOLESTR) TEXT("\t%") + TEXT(PRIsLPTSTR) TEXT("\n"), szAdapterId, pAdapter->szName); CoTaskMemFree(szAdapterId); } @@ -337,7 +346,7 @@ create_delete_adapter: { if (pAdapter == NULL) { - _ftprintf(stderr, TEXT("\"%s\" adapter not found.\n"), argv[2]); + _ftprintf(stderr, TEXT("\"%") TEXT(PRIsLPTSTR) TEXT("\" adapter not found.\n"), argv[2]); iResult = 1; goto delete_cleanup_pAdapterList; } else if (_tcsicmp(argv[2], pAdapter->szName) == 0) @@ -364,7 +373,8 @@ delete_cleanup_pAdapterList: &bRebootRequired); if (dwResult != ERROR_SUCCESS) { - _ftprintf(stderr, TEXT("Deleting adapter \"%s\" failed (error 0x%x).\n"), argv[2], dwResult); + _ftprintf(stderr, TEXT("Deleting adapter \"%") TEXT(PRIsLPTSTR) + TEXT("\" failed (error 0x%x).\n"), argv[2], dwResult); iResult = 1; goto quit; } @@ -372,7 +382,8 @@ delete_cleanup_pAdapterList: } else { - _ftprintf(stderr, TEXT("Unknown command \"%s\". Please, use \"tapctl help\" to list supported commands.\n"), argv[1]); + _ftprintf(stderr, TEXT("Unknown command \"%") TEXT(PRIsLPTSTR) + TEXT("\". Please, use \"tapctl help\" to list supported commands.\n"), argv[1]); return 1; } @@ -434,7 +445,7 @@ x_msg_va(const unsigned int flags, const char *format, va_list arglist) } /* Output error message. */ - _ftprintf(stderr, TEXT("Error 0x%x: %s\n"), dwResult, szErrMessage); + _ftprintf(stderr, TEXT("Error 0x%x: %") TEXT(PRIsLPTSTR) TEXT("\n"), dwResult, szErrMessage); LocalFree(szErrMessage); } diff --git a/src/tapctl/tap.c b/src/tapctl/tap.c index 563c07f6..b8d63b0f 100644 --- a/src/tapctl/tap.c +++ b/src/tapctl/tap.c @@ -1117,7 +1117,8 @@ tap_set_adapter_name( } /* rename adapter via netsh call */ - const TCHAR* szFmt = _T("netsh interface set interface name=\"%s\" newname=\"%s\""); + const TCHAR* szFmt = TEXT("netsh interface set interface name=\"%") + TEXT(PRIsLPTSTR) TEXT("\" newname=\"%") TEXT(PRIsLPTSTR) TEXT("\""); size_t ncmdline = _tcslen(szFmt) + _tcslen(szOldName) + _tcslen(szName) + 1; WCHAR* szCmdLine = malloc(ncmdline * sizeof(TCHAR)); _stprintf_s(szCmdLine, ncmdline, szFmt, szOldName, szName);