aboutsummaryrefslogtreecommitdiff
path: root/service-win32
diff options
context:
space:
mode:
Diffstat (limited to '')
-rwxr-xr-xservice-win32/Makefile25
-rwxr-xr-xservice-win32/mkpatch4
-rwxr-xr-xservice-win32/openvpnserv.c513
-rwxr-xr-xservice-win32/service.patch383
4 files changed, 925 insertions, 0 deletions
diff --git a/service-win32/Makefile b/service-win32/Makefile
new file mode 100755
index 0000000..027b6dd
--- /dev/null
+++ b/service-win32/Makefile
@@ -0,0 +1,25 @@
+# This makefile builds the OpenVPN win32 service
+# wrapper using the mingw environment.
+#
+# service.c and service.h should be generated by
+# applying service.patch to the Platform
+# SDK service sample.
+
+EXE = openvpnserv.exe
+
+HEADERS = service.h
+
+OBJS = openvpnserv.o service.o
+
+INCLUDE_DIRS =
+
+CC = gcc -g -O2 -Wall -Wno-unused-function -Wno-unused-variable -mno-cygwin
+
+all : ${OBJS}
+ ${CC} -o ${EXE} ${OBJS}
+
+clean :
+ rm -f ${OBJS} ${EXE}
+
+%.o : %.c ${HEADERS}
+ ${CC} ${INCLUDE_DIRS} -c $< -o $@
diff --git a/service-win32/mkpatch b/service-win32/mkpatch
new file mode 100755
index 0000000..d87af52
--- /dev/null
+++ b/service-win32/mkpatch
@@ -0,0 +1,4 @@
+# build service.[ch] patch against original
+# SDK sample
+diff -u service.c.orig service.c >service.patch
+diff -u service.h.orig service.h >>service.patch
diff --git a/service-win32/openvpnserv.c b/service-win32/openvpnserv.c
new file mode 100755
index 0000000..0a64a67
--- /dev/null
+++ b/service-win32/openvpnserv.c
@@ -0,0 +1,513 @@
+/*
+ * OpenVPN -- An application to securely tunnel IP networks
+ * over a single TCP/UDP port, with support for SSL/TLS-based
+ * session authentication and key exchange,
+ * packet encryption, packet authentication, and
+ * packet compression.
+ *
+ * Copyright (C) 2002-2005 OpenVPN Solutions LLC <info@openvpn.net>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2
+ * as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program (see the file COPYING included with this
+ * distribution); if not, write to the Free Software Foundation, Inc.,
+ * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ */
+
+/*
+ * This program allows one or more OpenVPN processes to be started
+ * as a service. To build, you must get the service sample from the
+ * Platform SDK and replace Simple.c with this file.
+ *
+ * You should also apply service.patch to
+ * service.c and service.h from the Platform SDK service sample.
+ *
+ * This code is designed to be built with the mingw compiler.
+ */
+
+#include <windows.h>
+#include <stdlib.h>
+#include <stdio.h>
+#include <process.h>
+#include "service.h"
+
+/* bool definitions */
+#define bool int
+#define true 1
+#define false 0
+
+/* These are new for 2000/XP, so they aren't in the mingw headers yet */
+#ifndef BELOW_NORMAL_PRIORITY_CLASS
+#define BELOW_NORMAL_PRIORITY_CLASS 0x00004000
+#endif
+#ifndef ABOVE_NORMAL_PRIORITY_CLASS
+#define ABOVE_NORMAL_PRIORITY_CLASS 0x00008000
+#endif
+
+struct security_attributes
+{
+ SECURITY_ATTRIBUTES sa;
+ SECURITY_DESCRIPTOR sd;
+};
+
+/*
+ * This event is initially created in the non-signaled
+ * state. It will transition to the signaled state when
+ * we have received a terminate signal from the Service
+ * Control Manager which will cause an asynchronous call
+ * of ServiceStop below.
+ */
+#define EXIT_EVENT_NAME "openvpn_exit_1"
+
+/*
+ * Which registry key in HKLM should
+ * we get config info from?
+ */
+#define REG_KEY "SOFTWARE\\OpenVPN"
+
+static HANDLE exit_event = NULL;
+
+/* clear an object */
+#define CLEAR(x) memset(&(x), 0, sizeof(x))
+
+/* snprintf with guaranteed null termination */
+#define mysnprintf(out, args...) \
+ { \
+ snprintf (out, sizeof(out), args); \
+ out [sizeof (out) - 1] = '\0'; \
+ }
+
+/*
+ * Message handling
+ */
+#define M_INFO (0) // informational
+#define M_SYSERR (MSG_FLAGS_ERROR|MSG_FLAGS_SYS_CODE) // error + system code
+#define M_ERR (MSG_FLAGS_ERROR) // error
+
+/* write error to event log */
+#define MSG(flags, args...) \
+ { \
+ char x_msg[256]; \
+ mysnprintf (x_msg, args); \
+ AddToMessageLog ((flags), x_msg); \
+ }
+
+/* get a registry string */
+#define QUERY_REG_STRING(name, data) \
+ { \
+ len = sizeof (data); \
+ status = RegQueryValueEx(openvpn_key, name, NULL, &type, data, &len); \
+ if (status != ERROR_SUCCESS || type != REG_SZ) \
+ { \
+ SetLastError (status); \
+ MSG (M_SYSERR, error_format_str, name); \
+ RegCloseKey (openvpn_key); \
+ goto finish; \
+ } \
+ }
+
+/* get a registry string */
+#define QUERY_REG_DWORD(name, data) \
+ { \
+ len = sizeof (DWORD); \
+ status = RegQueryValueEx(openvpn_key, name, NULL, &type, (LPBYTE)&data, &len); \
+ if (status != ERROR_SUCCESS || type != REG_DWORD || len != sizeof (DWORD)) \
+ { \
+ SetLastError (status); \
+ MSG (M_SYSERR, error_format_dword, name); \
+ RegCloseKey (openvpn_key); \
+ goto finish; \
+ } \
+ }
+
+bool
+init_security_attributes_allow_all (struct security_attributes *obj)
+{
+ CLEAR (*obj);
+
+ obj->sa.nLength = sizeof (SECURITY_ATTRIBUTES);
+ obj->sa.lpSecurityDescriptor = &obj->sd;
+ obj->sa.bInheritHandle = TRUE;
+ if (!InitializeSecurityDescriptor (&obj->sd, SECURITY_DESCRIPTOR_REVISION))
+ return false;
+ if (!SetSecurityDescriptorDacl (&obj->sd, TRUE, NULL, FALSE))
+ return false;
+ return true;
+}
+
+HANDLE
+create_event (const char *name, bool allow_all, bool initial_state, bool manual_reset)
+{
+ if (allow_all)
+ {
+ struct security_attributes sa;
+ if (!init_security_attributes_allow_all (&sa))
+ return NULL;
+ return CreateEvent (&sa.sa, (BOOL)manual_reset, (BOOL)initial_state, name);
+ }
+ else
+ return CreateEvent (NULL, (BOOL)manual_reset, (BOOL)initial_state, name);
+}
+
+void
+close_if_open (HANDLE h)
+{
+ if (h != NULL)
+ CloseHandle (h);
+}
+
+static bool
+match (const WIN32_FIND_DATA *find, const char *ext)
+{
+ int i;
+
+ if (find->dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY)
+ return false;
+
+ if (!strlen (ext))
+ return true;
+
+ i = strlen (find->cFileName) - strlen (ext) - 1;
+ if (i < 1)
+ return false;
+
+ return find->cFileName[i] == '.' && !strcasecmp (find->cFileName + i + 1, ext);
+}
+
+/*
+ * Modify the extension on a filename.
+ */
+static bool
+modext (char *dest, int size, const char *src, const char *newext)
+{
+ int i;
+
+ if (size > 0 && (strlen (src) + 1) <= size)
+ {
+ strcpy (dest, src);
+ dest [size - 1] = '\0';
+ i = strlen (dest);
+ while (--i >= 0)
+ {
+ if (dest[i] == '\\')
+ break;
+ if (dest[i] == '.')
+ {
+ dest[i] = '\0';
+ break;
+ }
+ }
+ if (strlen (dest) + strlen(newext) + 2 <= size)
+ {
+ strcat (dest, ".");
+ strcat (dest, newext);
+ return true;
+ }
+ dest [0] = '\0';
+ }
+ return false;
+}
+
+VOID ServiceStart (DWORD dwArgc, LPTSTR *lpszArgv)
+{
+ char exe_path[MAX_PATH];
+ char config_dir[MAX_PATH];
+ char ext_string[16];
+ char log_dir[MAX_PATH];
+ char priority_string[64];
+ char append_string[2];
+
+ DWORD priority;
+ bool append;
+
+ ResetError ();
+
+ if (!ReportStatusToSCMgr(SERVICE_START_PENDING, NO_ERROR, 3000))
+ {
+ MSG (M_ERR, "ReportStatusToSCMgr #1 failed");
+ goto finish;
+ }
+
+ /*
+ * Create our exit event
+ */
+ exit_event = create_event (EXIT_EVENT_NAME, false, false, true);
+ if (!exit_event)
+ {
+ MSG (M_ERR, "CreateEvent failed");
+ goto finish;
+ }
+
+ /*
+ * If exit event is already signaled, it means we were not
+ * shut down properly.
+ */
+ if (WaitForSingleObject (exit_event, 0) != WAIT_TIMEOUT)
+ {
+ MSG (M_ERR, "Exit event is already signaled -- we were not shut down properly");
+ goto finish;
+ }
+
+ if (!ReportStatusToSCMgr(SERVICE_START_PENDING, NO_ERROR, 3000))
+ {
+ MSG (M_ERR, "ReportStatusToSCMgr #2 failed");
+ goto finish;
+ }
+
+ /*
+ * Read info from registry in key HKLM\SOFTWARE\OpenVPN
+ */
+ {
+ HKEY openvpn_key;
+ LONG status;
+ DWORD len;
+ DWORD type;
+ char error_string[256];
+
+ static const char error_format_str[] =
+ "Error querying registry key of type REG_SZ: HKLM\\" REG_KEY "\\%s";
+
+ static const char error_format_dword[] =
+ "Error querying registry key of type REG_DWORD: HKLM\\" REG_KEY "\\%s";
+
+ status = RegOpenKeyEx(
+ HKEY_LOCAL_MACHINE,
+ REG_KEY,
+ 0,
+ KEY_READ,
+ &openvpn_key);
+
+ if (status != ERROR_SUCCESS)
+ {
+ SetLastError (status);
+ MSG (M_SYSERR, "Registry key HKLM\\" REG_KEY " not found");
+ goto finish;
+ }
+
+ /* get path to openvpn.exe */
+ QUERY_REG_STRING ("exe_path", exe_path);
+
+ /* get path to configuration directory */
+ QUERY_REG_STRING ("config_dir", config_dir);
+
+ /* get extension on configuration files */
+ QUERY_REG_STRING ("config_ext", ext_string);
+
+ /* get path to log directory */
+ QUERY_REG_STRING ("log_dir", log_dir);
+
+ /* get priority for spawned OpenVPN subprocesses */
+ QUERY_REG_STRING ("priority", priority_string);
+
+ /* should we truncate or append to logfile? */
+ QUERY_REG_STRING ("log_append", append_string);
+
+ RegCloseKey (openvpn_key);
+ }
+
+ /* set process priority */
+ priority = NORMAL_PRIORITY_CLASS;
+ if (!strcasecmp (priority_string, "IDLE_PRIORITY_CLASS"))
+ priority = IDLE_PRIORITY_CLASS;
+ else if (!strcasecmp (priority_string, "BELOW_NORMAL_PRIORITY_CLASS"))
+ priority = BELOW_NORMAL_PRIORITY_CLASS;
+ else if (!strcasecmp (priority_string, "NORMAL_PRIORITY_CLASS"))
+ priority = NORMAL_PRIORITY_CLASS;
+ else if (!strcasecmp (priority_string, "ABOVE_NORMAL_PRIORITY_CLASS"))
+ priority = ABOVE_NORMAL_PRIORITY_CLASS;
+ else if (!strcasecmp (priority_string, "HIGH_PRIORITY_CLASS"))
+ priority = HIGH_PRIORITY_CLASS;
+ else
+ {
+ MSG (M_ERR, "Unknown priority name: %s", priority_string);
+ goto finish;
+ }
+
+ /* set log file append/truncate flag */
+ append = false;
+ if (append_string[0] == '0')
+ append = false;
+ else if (append_string[0] == '1')
+ append = true;
+ else
+ {
+ MSG (M_ERR, "Log file append flag (given as '%s') must be '0' or '1'", append_string);
+ goto finish;
+ }
+
+ /*
+ * Instantiate an OpenVPN process for each configuration
+ * file found.
+ */
+ {
+ WIN32_FIND_DATA find_obj;
+ HANDLE find_handle;
+ BOOL more_files;
+ char find_string[MAX_PATH];
+
+ mysnprintf (find_string, "%s\\*", config_dir);
+
+ find_handle = FindFirstFile (find_string, &find_obj);
+ if (find_handle == INVALID_HANDLE_VALUE)
+ {
+ MSG (M_ERR, "Cannot get configuration file list using: %s", find_string);
+ goto finish;
+ }
+
+ /*
+ * Loop over each config file
+ */
+ do {
+ HANDLE log_handle = NULL;
+ STARTUPINFO start_info;
+ PROCESS_INFORMATION proc_info;
+ struct security_attributes sa;
+ char log_file[MAX_PATH];
+ char log_path[MAX_PATH];
+ char command_line[256];
+
+ CLEAR (start_info);
+ CLEAR (proc_info);
+ CLEAR (sa);
+
+ if (!ReportStatusToSCMgr(SERVICE_START_PENDING, NO_ERROR, 3000))
+ {
+ MSG (M_ERR, "ReportStatusToSCMgr #3 failed");
+ FindClose (find_handle);
+ goto finish;
+ }
+
+ /* does file have the correct type and extension? */
+ if (match (&find_obj, ext_string))
+ {
+ /* get log file pathname */
+ if (!modext (log_file, sizeof (log_file), find_obj.cFileName, "log"))
+ {
+ MSG (M_ERR, "Cannot construct logfile name based on: %s", find_obj.cFileName);
+ FindClose (find_handle);
+ goto finish;
+ }
+ mysnprintf (log_path, "%s\\%s", log_dir, log_file);
+
+ /* construct command line */
+ mysnprintf (command_line, "openvpn --service %s 1 --config \"%s\"",
+ EXIT_EVENT_NAME,
+ find_obj.cFileName);
+
+ /* Make security attributes struct for logfile handle so it can
+ be inherited. */
+ if (!init_security_attributes_allow_all (&sa))
+ {
+ MSG (M_SYSERR, "InitializeSecurityDescriptor start_openvpn failed");
+ goto finish;
+ }
+
+ /* open logfile as stdout/stderr for soon-to-be-spawned subprocess */
+ log_handle = CreateFile (log_path,
+ GENERIC_WRITE,
+ FILE_SHARE_READ,
+ &sa.sa,
+ append ? OPEN_ALWAYS : CREATE_ALWAYS,
+ FILE_ATTRIBUTE_NORMAL,
+ NULL);
+
+ if (log_handle == INVALID_HANDLE_VALUE)
+ {
+ MSG (M_SYSERR, "Cannot open logfile: %s", log_path);
+ FindClose (find_handle);
+ goto finish;
+ }
+
+ /* append to logfile? */
+ if (append)
+ {
+ if (SetFilePointer (log_handle, 0, NULL, FILE_END) == INVALID_SET_FILE_POINTER)
+ {
+ MSG (M_SYSERR, "Cannot seek to end of logfile: %s", log_path);
+ FindClose (find_handle);
+ goto finish;
+ }
+ }
+
+ /* fill in STARTUPINFO struct */
+ GetStartupInfo(&start_info);
+ start_info.cb = sizeof(start_info);
+ start_info.dwFlags = STARTF_USESTDHANDLES|STARTF_USESHOWWINDOW;
+ start_info.wShowWindow = SW_HIDE;
+ start_info.hStdInput = GetStdHandle(STD_INPUT_HANDLE);
+ start_info.hStdOutput = start_info.hStdError = log_handle;
+
+ /* create an OpenVPN process for one config file */
+ if (!CreateProcess(exe_path,
+ command_line,
+ NULL,
+ NULL,
+ TRUE,
+ priority | CREATE_NEW_CONSOLE,
+ NULL,
+ config_dir,
+ &start_info,
+ &proc_info))
+ {
+ MSG (M_SYSERR, "CreateProcess failed, exe='%s' cmdline='%s' dir='%s'",
+ exe_path,
+ command_line,
+ config_dir);
+
+ FindClose (find_handle);
+ CloseHandle (log_handle);
+ goto finish;
+ }
+
+ /* close unneeded handles */
+ Sleep (1000); /* try to prevent race if we close logfile
+ handle before child process DUPs it */
+ if (!CloseHandle (proc_info.hProcess)
+ || !CloseHandle (proc_info.hThread)
+ || !CloseHandle (log_handle))
+ {
+ MSG (M_SYSERR, "CloseHandle failed");
+ goto finish;
+ }
+ }
+
+ /* more files to process? */
+ more_files = FindNextFile (find_handle, &find_obj);
+
+ } while (more_files);
+
+ FindClose (find_handle);
+ }
+
+ /* we are now fully started */
+ if (!ReportStatusToSCMgr(SERVICE_RUNNING, NO_ERROR, 0))
+ {
+ MSG (M_ERR, "ReportStatusToSCMgr SERVICE_RUNNING failed");
+ goto finish;
+ }
+
+ /* wait for our shutdown signal */
+ if (WaitForSingleObject (exit_event, INFINITE) != WAIT_OBJECT_0)
+ {
+ MSG (M_ERR, "wait for shutdown signal failed");
+ }
+
+ finish:
+ ServiceStop ();
+ if (exit_event)
+ CloseHandle (exit_event);
+}
+
+VOID ServiceStop()
+{
+ if (exit_event)
+ SetEvent(exit_event);
+}
diff --git a/service-win32/service.patch b/service-win32/service.patch
new file mode 100755
index 0000000..0b60472
--- /dev/null
+++ b/service-win32/service.patch
@@ -0,0 +1,383 @@
+--- service.c.orig Sat Jan 15 17:39:20 2005
++++ service.c Sun Feb 20 11:28:30 2005
+@@ -16,6 +16,7 @@
+ service_main(DWORD dwArgc, LPTSTR *lpszArgv);
+ CmdInstallService();
+ CmdRemoveService();
++ CmdStartService();
+ CmdDebugService(int argc, char **argv);
+ ControlHandler ( DWORD dwCtrlType );
+ GetLastErrorText( LPTSTR lpszBuf, DWORD dwSize );
+@@ -40,8 +41,9 @@
+ // internal function prototypes
+ VOID WINAPI service_ctrl(DWORD dwCtrlCode);
+ VOID WINAPI service_main(DWORD dwArgc, LPTSTR *lpszArgv);
+-VOID CmdInstallService();
+-VOID CmdRemoveService();
++int CmdInstallService();
++int CmdRemoveService();
++int CmdStartService();
+ VOID CmdDebugService(int argc, char **argv);
+ BOOL WINAPI ControlHandler ( DWORD dwCtrlType );
+ LPTSTR GetLastErrorText( LPTSTR lpszBuf, DWORD dwSize );
+@@ -64,7 +66,7 @@
+ // main service thread. When the this call returns,
+ // the service has stopped, so exit.
+ //
+-void __cdecl main(int argc, char **argv)
++int __cdecl main(int argc, char **argv)
+ {
+ SERVICE_TABLE_ENTRY dispatchTable[] =
+ {
+@@ -77,12 +79,16 @@
+ {
+ if ( _stricmp( "install", argv[1]+1 ) == 0 )
+ {
+- CmdInstallService();
++ return CmdInstallService();
+ }
+ else if ( _stricmp( "remove", argv[1]+1 ) == 0 )
+ {
+- CmdRemoveService();
++ return CmdRemoveService();
+ }
++ else if ( _stricmp( "start", argv[1]+1 ) == 0)
++ {
++ return CmdStartService();
++ }
+ else if ( _stricmp( "debug", argv[1]+1 ) == 0 )
+ {
+ bDebug = TRUE;
+@@ -92,7 +98,7 @@
+ {
+ goto dispatch;
+ }
+- exit(0);
++ return 0;
+ }
+
+ // if it doesn't match any of the above parameters
+@@ -101,13 +107,16 @@
+ dispatch:
+ // this is just to be friendly
+ printf( "%s -install to install the service\n", SZAPPNAME );
++ printf( "%s -start to start the service\n", SZAPPNAME );
+ printf( "%s -remove to remove the service\n", SZAPPNAME );
+ printf( "%s -debug <params> to run as a console app for debugging\n", SZAPPNAME );
+ printf( "\nStartServiceCtrlDispatcher being called.\n" );
+ printf( "This may take several seconds. Please wait.\n" );
+
+ if (!StartServiceCtrlDispatcher(dispatchTable))
+- AddToMessageLog(TEXT("StartServiceCtrlDispatcher failed."));
++ AddToMessageLog(MSG_FLAGS_ERROR, TEXT("StartServiceCtrlDispatcher failed."));
++
++ return 0;
+ }
+
+
+@@ -267,7 +276,7 @@
+ //
+ if (!(fResult = SetServiceStatus( sshStatusHandle, &ssStatus)))
+ {
+- AddToMessageLog(TEXT("SetServiceStatus"));
++ AddToMessageLog(MSG_FLAGS_ERROR, TEXT("SetServiceStatus"));
+ }
+ }
+ return fResult;
+@@ -288,28 +297,33 @@
+ //
+ // COMMENTS:
+ //
+-VOID AddToMessageLog(LPTSTR lpszMsg)
++void AddToMessageLog(DWORD flags, LPTSTR lpszMsg)
+ {
+ TCHAR szMsg [(sizeof(SZSERVICENAME) / sizeof(TCHAR)) + 100 ];
+ HANDLE hEventSource;
+- LPTSTR lpszStrings[2];
++ LPCSTR lpszStrings[2];
+
+ if ( !bDebug )
+ {
+- dwErr = GetLastError();
++ if (flags & MSG_FLAGS_SYS_CODE)
++ dwErr = GetLastError();
++ else
++ dwErr = 0;
+
+ // Use event logging to log the error.
+ //
+ hEventSource = RegisterEventSource(NULL, TEXT(SZSERVICENAME));
+
+- _stprintf(szMsg, TEXT("%s error: %d"), TEXT(SZSERVICENAME), dwErr);
++ _stprintf(szMsg, TEXT("%s error: %d"), TEXT(SZSERVICENAME), (int)dwErr);
+ lpszStrings[0] = szMsg;
+ lpszStrings[1] = lpszMsg;
+
+ if (hEventSource != NULL)
+ {
+ ReportEvent(hEventSource, // handle of event source
+- EVENTLOG_ERROR_TYPE, // event type
++ // event type
++ (flags & MSG_FLAGS_ERROR)
++ ? EVENTLOG_ERROR_TYPE : EVENTLOG_INFORMATION_TYPE,
+ 0, // event category
+ 0, // event ID
+ NULL, // current user's SID
+@@ -323,8 +337,10 @@
+ }
+ }
+
+-
+-
++void ResetError (void)
++{
++ dwErr = 0;
++}
+
+ ///////////////////////////////////////////////////////////////////
+ //
+@@ -341,21 +357,23 @@
+ // none
+ //
+ // RETURN VALUE:
+-// none
++// 0 if success
+ //
+ // COMMENTS:
+ //
+-void CmdInstallService()
++int CmdInstallService()
+ {
+ SC_HANDLE schService;
+ SC_HANDLE schSCManager;
+
+ TCHAR szPath[512];
+
++ int ret = 0;
++
+ if ( GetModuleFileName( NULL, szPath, 512 ) == 0 )
+ {
+ _tprintf(TEXT("Unable to install %s - %s\n"), TEXT(SZSERVICEDISPLAYNAME), GetLastErrorText(szErr, 256));
+- return;
++ return 1;
+ }
+
+ schSCManager = OpenSCManager(
+@@ -366,19 +384,19 @@
+ if ( schSCManager )
+ {
+ schService = CreateService(
+- schSCManager, // SCManager database
+- TEXT(SZSERVICENAME), // name of service
+- TEXT(SZSERVICEDISPLAYNAME), // name to display
+- SERVICE_QUERY_STATUS, // desired access
+- SERVICE_WIN32_OWN_PROCESS, // service type
+- SERVICE_DEMAND_START, // start type
+- SERVICE_ERROR_NORMAL, // error control type
+- szPath, // service's binary
+- NULL, // no load ordering group
+- NULL, // no tag identifier
+- TEXT(SZDEPENDENCIES), // dependencies
+- NULL, // LocalSystem account
+- NULL); // no password
++ schSCManager, // SCManager database
++ TEXT(SZSERVICENAME), // name of service
++ TEXT(SZSERVICEDISPLAYNAME), // name to display
++ SERVICE_QUERY_STATUS, // desired access
++ SERVICE_WIN32_OWN_PROCESS, // service type
++ SERVICE_DEMAND_START, // start type -- alternative: SERVICE_AUTO_START
++ SERVICE_ERROR_NORMAL, // error control type
++ szPath, // service's binary
++ NULL, // no load ordering group
++ NULL, // no tag identifier
++ TEXT(SZDEPENDENCIES), // dependencies
++ NULL, // LocalSystem account
++ NULL); // no password
+
+ if ( schService )
+ {
+@@ -388,15 +406,78 @@
+ else
+ {
+ _tprintf(TEXT("CreateService failed - %s\n"), GetLastErrorText(szErr, 256));
++ ret = 1;
+ }
+
+ CloseServiceHandle(schSCManager);
+ }
+ else
+- _tprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText(szErr,256));
++ {
++ _tprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText(szErr,256));
++ ret = 1;
++ }
++ return ret;
+ }
+
++//
++// FUNCTION: CmdStartService()
++//
++// PURPOSE: Start the service
++//
++// PARAMETERS:
++// none
++//
++// RETURN VALUE:
++// 0 if success
++//
++// COMMENTS:
++
++int CmdStartService()
++{
++ int ret = 0;
++
++ SC_HANDLE schSCManager;
++ SC_HANDLE schService;
++
+
++ // Open a handle to the SC Manager database.
++ schSCManager = OpenSCManager(
++ NULL, // local machine
++ NULL, // ServicesActive database
++ SC_MANAGER_ALL_ACCESS); // full access rights
++
++ if (NULL == schSCManager) {
++ _tprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText(szErr,256));
++ ret = 1;
++ }
++
++ schService = OpenService(
++ schSCManager, // SCM database
++ "MeetrixService", // service name
++ SERVICE_ALL_ACCESS);
++
++ if (schService == NULL) {
++ _tprintf(TEXT("OpenService failed - %s\n"), GetLastErrorText(szErr,256));
++ ret = 1;
++ }
++
++ if (!StartService(
++ schService, // handle to service
++ 0, // number of arguments
++ NULL) ) // no arguments
++ {
++ _tprintf(TEXT("StartService failed - %s\n"), GetLastErrorText(szErr,256));
++ ret = 1;
++ }
++ else
++ {
++ _tprintf(TEXT("Service Started\n"));
++ ret = 0;
++ }
++ CloseServiceHandle(schService);
++ CloseServiceHandle(schSCManager);
++ return ret;
++}
+
+ //
+ // FUNCTION: CmdRemoveService()
+@@ -407,15 +488,17 @@
+ // none
+ //
+ // RETURN VALUE:
+-// none
++// 0 if success
+ //
+ // COMMENTS:
+ //
+-void CmdRemoveService()
++int CmdRemoveService()
+ {
+ SC_HANDLE schService;
+ SC_HANDLE schSCManager;
+
++ int ret = 0;
++
+ schSCManager = OpenSCManager(
+ NULL, // machine (NULL == local)
+ NULL, // database (NULL == default)
+@@ -447,7 +530,10 @@
+ if ( ssStatus.dwCurrentState == SERVICE_STOPPED )
+ _tprintf(TEXT("\n%s stopped.\n"), TEXT(SZSERVICEDISPLAYNAME) );
+ else
+- _tprintf(TEXT("\n%s failed to stop.\n"), TEXT(SZSERVICEDISPLAYNAME) );
++ {
++ _tprintf(TEXT("\n%s failed to stop.\n"), TEXT(SZSERVICEDISPLAYNAME) );
++ ret = 1;
++ }
+
+ }
+
+@@ -455,18 +541,28 @@
+ if ( DeleteService(schService) )
+ _tprintf(TEXT("%s removed.\n"), TEXT(SZSERVICEDISPLAYNAME) );
+ else
+- _tprintf(TEXT("DeleteService failed - %s\n"), GetLastErrorText(szErr,256));
++ {
++ _tprintf(TEXT("DeleteService failed - %s\n"), GetLastErrorText(szErr,256));
++ ret = 1;
++ }
+
+
+ CloseServiceHandle(schService);
+ }
+ else
+- _tprintf(TEXT("OpenService failed - %s\n"), GetLastErrorText(szErr,256));
++ {
++ _tprintf(TEXT("OpenService failed - %s\n"), GetLastErrorText(szErr,256));
++ ret = 1;
++ }
+
+ CloseServiceHandle(schSCManager);
+ }
+ else
+- _tprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText(szErr,256));
++ {
++ _tprintf(TEXT("OpenSCManager failed - %s\n"), GetLastErrorText(szErr,256));
++ ret = 1;
++ }
++ return ret;
+ }
+
+
+@@ -587,7 +683,7 @@
+ else
+ {
+ lpszTemp[lstrlen(lpszTemp)-2] = TEXT('\0'); //remove cr and newline character
+- _stprintf( lpszBuf, TEXT("%s (0x%x)"), lpszTemp, GetLastError() );
++ _stprintf( lpszBuf, TEXT("%s (0x%x)"), lpszTemp, (int)GetLastError() );
+ }
+
+ if ( lpszTemp )
+--- service.h.orig Sat Jan 15 17:39:20 2005
++++ service.h Mon Feb 7 17:24:04 2005
+@@ -62,13 +62,13 @@
+ //// todo: change to desired strings
+ ////
+ // name of the executable
+-#define SZAPPNAME "Simple"
++#define SZAPPNAME "openvpnserv"
+ // internal name of the service
+-#define SZSERVICENAME "SimpleService"
++#define SZSERVICENAME "OpenVPNService"
+ // displayed name of the service
+-#define SZSERVICEDISPLAYNAME "Simple Service"
++#define SZSERVICEDISPLAYNAME "OpenVPN Service"
+ // list of service dependencies - "dep1\0dep2\0\0"
+-#define SZDEPENDENCIES ""
++#define SZDEPENDENCIES "TAP0801\0\0"
+ //////////////////////////////////////////////////////////////////////////////
+
+
+@@ -126,7 +126,10 @@
+ // RETURN VALUE:
+ // none
+ //
+- void AddToMessageLog(LPTSTR lpszMsg);
++# define MSG_FLAGS_ERROR (1<<0)
++# define MSG_FLAGS_SYS_CODE (1<<1)
++ void AddToMessageLog(DWORD flags, LPTSTR lpszMsg);
++ void ResetError (void);
+ //////////////////////////////////////////////////////////////////////////////
+
+