forked from Hay1tsme/segatools
43 lines
787 B
C
43 lines
787 B
C
|
#include <windows.h>
|
||
|
|
||
|
#include "cardhook/_com12.h"
|
||
|
|
||
|
#include "hook/process.h"
|
||
|
|
||
|
#include "hooklib/serial.h"
|
||
|
|
||
|
#include "util/dprintf.h"
|
||
|
#include "util/spike.h"
|
||
|
|
||
|
static process_entry_t app_startup;
|
||
|
|
||
|
static DWORD CALLBACK app_pre_startup(void)
|
||
|
{
|
||
|
dprintf("--- Begin %s ---\n", __func__);
|
||
|
|
||
|
serial_hook_init();
|
||
|
spike_hook_init("cardspike.txt");
|
||
|
com12_hook_init();
|
||
|
|
||
|
dprintf("--- End %s ---\n", __func__);
|
||
|
|
||
|
return app_startup();
|
||
|
}
|
||
|
|
||
|
BOOL WINAPI DllMain(HMODULE mod, DWORD cause, void *ctx)
|
||
|
{
|
||
|
HRESULT hr;
|
||
|
|
||
|
if (cause != DLL_PROCESS_ATTACH) {
|
||
|
return TRUE;
|
||
|
}
|
||
|
|
||
|
hr = process_hijack_startup(app_pre_startup, &app_startup);
|
||
|
|
||
|
if (!SUCCEEDED(hr)) {
|
||
|
dprintf("Failed to hijack process startup: %x\n", (int) hr);
|
||
|
}
|
||
|
|
||
|
return SUCCEEDED(hr);
|
||
|
}
|