2001-02-25 02:14:49 +00:00
/*
2002-01-30 06:08:46 +00:00
* Unix SMB / CIFS implementation .
2001-02-25 02:14:49 +00:00
* RPC Pipe client / server routines
2002-08-17 15:34:15 +00:00
* Copyright ( C ) Andrew Tridgell 1992 - 1997.
* Copyright ( C ) Luke Kenneth Casson Leighton 1996 - 1997.
* Copyright ( C ) Paul Ashton 1997.
* Copyright ( C ) Jeremy Allison 2001.
2005-03-23 23:26:33 +00:00
* Copyright ( C ) Gerald Carter 2002 - 2005.
2001-02-25 02:14:49 +00:00
*
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation ; either version 2 of the License , or
* ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program ; if not , write to the Free Software
* Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
/* Implementation of registry functions. */
# include "includes.h"
2005-05-23 16:25:31 +00:00
# include "regfio.h"
2001-02-25 02:14:49 +00:00
2002-07-15 10:35:28 +00:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_RPC_SRV
# define OUR_HANDLE(hnd) (((hnd)==NULL)?"NULL":(IVAL((hnd)->data5,4)==(uint32)sys_getpid()?"OURS":"OTHER")), \
( ( unsigned int ) IVAL ( ( hnd ) - > data5 , 4 ) ) , ( ( unsigned int ) sys_getpid ( ) )
2005-06-28 22:39:18 +00:00
static struct generic_mapping reg_generic_map = { REG_KEY_READ , REG_KEY_WRITE , REG_KEY_EXECUTE , REG_KEY_ALL } ;
2005-05-23 16:25:31 +00:00
2005-06-16 20:29:15 +00:00
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-06-16 20:45:55 +00:00
NTSTATUS registry_access_check ( SEC_DESC * sec_desc , NT_USER_TOKEN * token ,
2005-06-16 20:29:15 +00:00
uint32 access_desired , uint32 * access_granted )
{
NTSTATUS result ;
2005-06-28 22:39:18 +00:00
se_map_generic ( & access_desired , & reg_generic_map ) ;
2005-06-16 20:29:15 +00:00
se_access_check ( sec_desc , token , access_desired , access_granted , & result ) ;
return result ;
}
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-06-16 20:45:55 +00:00
SEC_DESC * construct_registry_sd ( TALLOC_CTX * ctx )
2005-06-16 20:29:15 +00:00
{
SEC_ACE ace [ 2 ] ;
SEC_ACCESS mask ;
size_t i = 0 ;
SEC_DESC * sd ;
SEC_ACL * acl ;
uint32 sd_size ;
/* basic access for Everyone */
init_sec_access ( & mask , REG_KEY_READ ) ;
init_sec_ace ( & ace [ i + + ] , & global_sid_World , SEC_ACE_TYPE_ACCESS_ALLOWED , mask , 0 ) ;
/* Full Access 'BUILTIN\Administrators' */
init_sec_access ( & mask , REG_KEY_ALL ) ;
init_sec_ace ( & ace [ i + + ] , & global_sid_Builtin_Administrators , SEC_ACE_TYPE_ACCESS_ALLOWED , mask , 0 ) ;
/* create the security descriptor */
if ( ! ( acl = make_sec_acl ( ctx , NT4_ACL_REVISION , i , ace ) ) )
return NULL ;
if ( ! ( sd = make_sec_desc ( ctx , SEC_DESC_REVISION , SEC_DESC_SELF_RELATIVE , NULL , NULL , NULL , acl , & sd_size ) ) )
return NULL ;
return sd ;
}
2002-08-17 15:34:15 +00:00
/******************************************************************
free ( ) function for REGISTRY_KEY
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
static void free_regkey_info ( void * ptr )
2002-07-15 10:35:28 +00:00
{
2002-08-17 15:34:15 +00:00
REGISTRY_KEY * info = ( REGISTRY_KEY * ) ptr ;
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
SAFE_FREE ( info ) ;
2002-07-15 10:35:28 +00:00
}
2002-08-17 15:34:15 +00:00
/******************************************************************
Find a registry key handle and return a REGISTRY_KEY
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
static REGISTRY_KEY * find_regkey_index_by_hnd ( pipes_struct * p , POLICY_HND * hnd )
2002-07-15 10:35:28 +00:00
{
2002-08-17 15:34:15 +00:00
REGISTRY_KEY * regkey = NULL ;
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
if ( ! find_policy_by_hnd ( p , hnd , ( void * * ) & regkey ) ) {
DEBUG ( 2 , ( " find_regkey_index_by_hnd: Registry Key not found: " ) ) ;
return NULL ;
2002-07-15 10:35:28 +00:00
}
2002-08-17 15:34:15 +00:00
return regkey ;
2002-07-15 10:35:28 +00:00
}
2002-08-17 15:34:15 +00:00
/*******************************************************************
Function for open a new registry handle and creating a handle
Note that P should be valid & hnd should already have space
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
When we open a key , we store the full path to the key as
HK [ LM | U ] \ < key > \ < key > \ . . .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 20:33:41 +00:00
static WERROR open_registry_key ( pipes_struct * p , POLICY_HND * hnd , REGISTRY_KEY * parent ,
2003-01-03 08:28:12 +00:00
const char * subkeyname , uint32 access_granted )
2002-07-15 10:35:28 +00:00
{
2002-08-17 15:34:15 +00:00
REGISTRY_KEY * regkey = NULL ;
2005-01-10 20:33:41 +00:00
WERROR result = WERR_OK ;
2005-08-29 14:55:40 +00:00
REGSUBKEY_CTR * subkeys = NULL ;
2003-01-19 05:04:03 +00:00
pstring subkeyname2 ;
int subkey_len ;
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
DEBUG ( 7 , ( " open_registry_key: name = [%s][%s] \n " ,
parent ? parent - > name : " NULL " , subkeyname ) ) ;
2002-07-15 10:35:28 +00:00
2003-01-19 05:04:03 +00:00
/* strip any trailing '\'s */
pstrcpy ( subkeyname2 , subkeyname ) ;
subkey_len = strlen ( subkeyname2 ) ;
if ( subkey_len & & subkeyname2 [ subkey_len - 1 ] = = ' \\ ' )
subkeyname2 [ subkey_len - 1 ] = ' \0 ' ;
2004-12-07 18:25:53 +00:00
if ( ( regkey = SMB_MALLOC_P ( REGISTRY_KEY ) ) = = NULL )
2005-01-10 20:33:41 +00:00
return WERR_NOMEM ;
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
ZERO_STRUCTP ( regkey ) ;
2002-07-15 10:35:28 +00:00
/*
2002-08-17 15:34:15 +00:00
* very crazy , but regedit . exe on Win2k will attempt to call
* REG_OPEN_ENTRY with a keyname of " " . We should return a new
* ( second ) handle here on the key - > name . regedt32 . exe does
* not do this stupidity . - - jerry
2002-07-15 10:35:28 +00:00
*/
2003-01-19 05:04:03 +00:00
if ( ! subkey_len ) {
2002-08-17 15:34:15 +00:00
pstrcpy ( regkey - > name , parent - > name ) ;
}
else {
pstrcpy ( regkey - > name , " " ) ;
if ( parent ) {
pstrcat ( regkey - > name , parent - > name ) ;
pstrcat ( regkey - > name , " \\ " ) ;
2002-07-15 10:35:28 +00:00
}
2003-01-19 05:04:03 +00:00
pstrcat ( regkey - > name , subkeyname2 ) ;
2002-07-15 10:35:28 +00:00
}
2002-08-17 15:34:15 +00:00
/* Look up the table of registry I/O operations */
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
if ( ! ( regkey - > hook = reghook_cache_find ( regkey - > name ) ) ) {
DEBUG ( 0 , ( " open_registry_key: Failed to assigned a REGISTRY_HOOK to [%s] \n " ,
regkey - > name ) ) ;
2005-08-29 14:55:40 +00:00
result = WERR_BADFILE ;
goto done ;
2002-07-15 10:35:28 +00:00
}
2002-08-17 15:34:15 +00:00
/* check if the path really exists; failed is indicated by -1 */
/* if the subkey count failed, bail out */
2002-07-15 10:35:28 +00:00
2005-08-29 14:55:40 +00:00
if ( ! ( subkeys = TALLOC_ZERO_P ( p - > mem_ctx , REGSUBKEY_CTR ) ) ) {
result = WERR_NOMEM ;
goto done ;
}
if ( fetch_reg_keys ( regkey , subkeys ) = = - 1 ) {
2005-01-10 20:33:41 +00:00
result = WERR_BADFILE ;
2005-06-17 15:35:31 +00:00
goto done ;
2002-08-17 15:34:15 +00:00
}
2005-06-24 22:34:40 +00:00
2005-06-17 15:35:31 +00:00
if ( ! create_policy_hnd ( p , hnd , free_regkey_info , regkey ) ) {
2005-08-29 14:55:40 +00:00
result = WERR_BADFILE ;
2005-06-17 15:35:31 +00:00
goto done ;
2002-08-17 15:34:15 +00:00
}
2005-06-24 22:34:40 +00:00
2005-06-17 01:57:18 +00:00
/* save the access mask */
regkey - > access_granted = access_granted ;
2002-07-15 10:35:28 +00:00
2005-06-17 15:35:31 +00:00
done :
2002-08-17 15:34:15 +00:00
/* clean up */
2002-07-15 10:35:28 +00:00
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( subkeys ) ;
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
if ( ! NT_STATUS_IS_OK ( result ) )
SAFE_FREE ( regkey ) ;
2002-07-15 10:35:28 +00:00
DEBUG ( 7 , ( " open_registry_key: exit \n " ) ) ;
2002-08-17 15:34:15 +00:00
return result ;
2002-07-15 10:35:28 +00:00
}
/*******************************************************************
Function for open a new registry handle and creating a handle
Note that P should be valid & hnd should already have space
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static BOOL close_registry_key ( pipes_struct * p , POLICY_HND * hnd )
{
2002-08-17 15:34:15 +00:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , hnd ) ;
2002-07-15 10:35:28 +00:00
if ( ! regkey ) {
DEBUG ( 2 , ( " close_registry_key: Invalid handle (%s:%u:%u) \n " , OUR_HANDLE ( hnd ) ) ) ;
return False ;
}
close_policy_hnd ( p , hnd ) ;
return True ;
}
/********************************************************************
retrieve information about the subkeys
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-08-17 15:34:15 +00:00
static BOOL get_subkey_information ( REGISTRY_KEY * key , uint32 * maxnum , uint32 * maxlen )
2002-07-15 10:35:28 +00:00
{
2002-08-17 15:34:15 +00:00
int num_subkeys , i ;
uint32 max_len ;
2005-08-29 14:55:40 +00:00
REGSUBKEY_CTR * subkeys ;
2002-08-17 15:34:15 +00:00
uint32 len ;
2002-07-15 10:35:28 +00:00
if ( ! key )
return False ;
2002-08-17 15:34:15 +00:00
2005-08-29 14:55:40 +00:00
if ( ! ( subkeys = TALLOC_ZERO_P ( NULL , REGSUBKEY_CTR ) ) )
return False ;
if ( fetch_reg_keys ( key , subkeys ) = = - 1 )
2002-07-15 10:35:28 +00:00
return False ;
/* find the longest string */
max_len = 0 ;
2005-08-29 14:55:40 +00:00
num_subkeys = regsubkey_ctr_numkeys ( subkeys ) ;
2002-08-17 15:34:15 +00:00
2002-07-15 10:35:28 +00:00
for ( i = 0 ; i < num_subkeys ; i + + ) {
2005-08-29 14:55:40 +00:00
len = strlen ( regsubkey_ctr_specific_key ( subkeys , i ) ) ;
2002-07-15 10:35:28 +00:00
max_len = MAX ( max_len , len ) ;
}
* maxnum = num_subkeys ;
* maxlen = max_len * 2 ;
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( subkeys ) ;
2002-07-15 10:35:28 +00:00
return True ;
}
/********************************************************************
2005-06-29 16:35:32 +00:00
retrieve information about the values .
2002-07-15 10:35:28 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-08-17 15:34:15 +00:00
static BOOL get_value_information ( REGISTRY_KEY * key , uint32 * maxnum ,
2002-07-15 10:35:28 +00:00
uint32 * maxlen , uint32 * maxsize )
{
2005-08-29 14:55:40 +00:00
REGVAL_CTR * values ;
2002-08-17 15:34:15 +00:00
REGISTRY_VALUE * val ;
uint32 sizemax , lenmax ;
int i , num_values ;
2002-07-15 10:35:28 +00:00
if ( ! key )
return False ;
2005-08-29 14:55:40 +00:00
if ( ! ( values = TALLOC_ZERO_P ( NULL , REGVAL_CTR ) ) )
return False ;
2002-08-17 15:34:15 +00:00
2005-08-29 14:55:40 +00:00
if ( fetch_reg_values ( key , values ) = = - 1 )
2002-08-17 15:34:15 +00:00
return False ;
lenmax = sizemax = 0 ;
2005-08-29 14:55:40 +00:00
num_values = regval_ctr_numvals ( values ) ;
2002-08-17 15:34:15 +00:00
2005-08-29 14:55:40 +00:00
val = regval_ctr_specific_value ( values , 0 ) ;
2002-08-17 15:34:15 +00:00
for ( i = 0 ; i < num_values & & val ; i + + )
{
2005-06-29 16:35:32 +00:00
lenmax = MAX ( lenmax , val - > valuename ? strlen ( val - > valuename ) + 1 : 0 ) ;
2002-08-17 15:34:15 +00:00
sizemax = MAX ( sizemax , val - > size ) ;
2005-08-29 14:55:40 +00:00
val = regval_ctr_specific_value ( values , i ) ;
2002-08-17 15:34:15 +00:00
}
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
* maxnum = num_values ;
* maxlen = lenmax ;
* maxsize = sizemax ;
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( values ) ;
2002-08-17 15:34:15 +00:00
return True ;
2002-07-15 10:35:28 +00:00
}
2002-08-17 15:34:15 +00:00
2002-07-15 10:35:28 +00:00
/********************************************************************
reg_close
2001-02-25 02:14:49 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 20:33:41 +00:00
WERROR _reg_close ( pipes_struct * p , REG_Q_CLOSE * q_u , REG_R_CLOSE * r_u )
2001-02-25 02:14:49 +00:00
{
/* close the policy handle */
2005-06-16 20:45:55 +00:00
2005-06-24 22:34:40 +00:00
if ( ! close_registry_key ( p , & q_u - > pol ) )
2005-06-16 20:45:55 +00:00
return WERR_BADFID ;
2001-02-25 02:14:49 +00:00
2005-01-10 20:33:41 +00:00
return WERR_OK ;
2001-02-25 02:14:49 +00:00
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-03-23 23:26:33 +00:00
WERROR _reg_open_hklm ( pipes_struct * p , REG_Q_OPEN_HIVE * q_u , REG_R_OPEN_HIVE * r_u )
2002-07-15 10:35:28 +00:00
{
2005-06-16 20:29:15 +00:00
SEC_DESC * sec_desc ;
uint32 access_granted = 0 ;
NTSTATUS status ;
/* perform access checks */
2005-06-16 20:45:55 +00:00
/* top level keys are done here without passing through the REGISTRY_HOOK api */
2005-06-16 20:29:15 +00:00
2005-06-16 20:45:55 +00:00
if ( ! ( sec_desc = construct_registry_sd ( p - > mem_ctx ) ) )
2005-06-16 20:29:15 +00:00
return WERR_NOMEM ;
status = registry_access_check ( sec_desc , p - > pipe_user . nt_user_token , q_u - > access , & access_granted ) ;
if ( ! NT_STATUS_IS_OK ( status ) )
return ntstatus_to_werror ( status ) ;
return open_registry_key ( p , & r_u - > pol , NULL , KEY_HKLM , access_granted ) ;
2002-08-17 15:34:15 +00:00
}
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-03-23 23:26:33 +00:00
WERROR _reg_open_hkcr ( pipes_struct * p , REG_Q_OPEN_HIVE * q_u , REG_R_OPEN_HIVE * r_u )
2002-08-17 15:34:15 +00:00
{
2005-06-16 20:29:15 +00:00
SEC_DESC * sec_desc ;
uint32 access_granted = 0 ;
NTSTATUS status ;
/* perform access checks */
2005-06-16 20:45:55 +00:00
/* top level keys are done here without passing through the REGISTRY_HOOK api */
2005-06-16 20:29:15 +00:00
2005-06-16 20:45:55 +00:00
if ( ! ( sec_desc = construct_registry_sd ( p - > mem_ctx ) ) )
2005-06-16 20:29:15 +00:00
return WERR_NOMEM ;
status = registry_access_check ( sec_desc , p - > pipe_user . nt_user_token , q_u - > access , & access_granted ) ;
if ( ! NT_STATUS_IS_OK ( status ) )
return ntstatus_to_werror ( status ) ;
return open_registry_key ( p , & r_u - > pol , NULL , KEY_HKCR , access_granted ) ;
2002-07-15 10:35:28 +00:00
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-03-23 23:26:33 +00:00
WERROR _reg_open_hku ( pipes_struct * p , REG_Q_OPEN_HIVE * q_u , REG_R_OPEN_HIVE * r_u )
2001-02-25 02:14:49 +00:00
{
2005-06-16 20:29:15 +00:00
SEC_DESC * sec_desc ;
uint32 access_granted = 0 ;
NTSTATUS status ;
/* perform access checks */
2005-06-16 20:45:55 +00:00
/* top level keys are done here without passing through the REGISTRY_HOOK api */
2005-06-16 20:29:15 +00:00
2005-06-16 20:45:55 +00:00
if ( ! ( sec_desc = construct_registry_sd ( p - > mem_ctx ) ) )
2005-06-16 20:29:15 +00:00
return WERR_NOMEM ;
status = registry_access_check ( sec_desc , p - > pipe_user . nt_user_token , q_u - > access , & access_granted ) ;
if ( ! NT_STATUS_IS_OK ( status ) )
return ntstatus_to_werror ( status ) ;
return open_registry_key ( p , & r_u - > pol , NULL , KEY_HKU , access_granted ) ;
2001-02-25 02:14:49 +00:00
}
/*******************************************************************
reg_reply_open_entry
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 20:33:41 +00:00
WERROR _reg_open_entry ( pipes_struct * p , REG_Q_OPEN_ENTRY * q_u , REG_R_OPEN_ENTRY * r_u )
2001-02-25 02:14:49 +00:00
{
fstring name ;
2005-06-17 15:35:31 +00:00
REGISTRY_KEY * parent = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2005-06-17 01:57:18 +00:00
REGISTRY_KEY * newkey ;
uint32 access_granted ;
2005-01-10 20:33:41 +00:00
WERROR result ;
2001-02-25 02:14:49 +00:00
2005-06-17 15:35:31 +00:00
if ( ! parent )
2005-06-16 20:45:55 +00:00
return WERR_BADFID ;
2005-06-24 22:34:40 +00:00
2005-03-23 23:26:33 +00:00
rpcstr_pull ( name , q_u - > name . string - > buffer , sizeof ( name ) , q_u - > name . string - > uni_str_len * 2 , 0 ) ;
2002-07-15 10:35:28 +00:00
2005-06-17 01:57:18 +00:00
/* check granted access first; what is the correct mask here? */
2005-08-29 14:55:40 +00:00
if ( ! ( parent - > access_granted & ( SEC_RIGHTS_ENUM_SUBKEYS | SEC_RIGHTS_CREATE_SUBKEY | SEC_RIGHTS_QUERY_VALUE | SEC_RIGHTS_SET_VALUE ) ) )
2005-06-17 01:57:18 +00:00
return WERR_ACCESS_DENIED ;
2005-06-24 22:34:40 +00:00
2005-06-17 01:57:18 +00:00
/* open the key first to get the appropriate REGISTRY_HOOK
and then check the premissions */
2005-06-17 15:35:31 +00:00
if ( ! W_ERROR_IS_OK ( result = open_registry_key ( p , & r_u - > handle , parent , name , 0 ) ) )
2005-06-17 01:57:18 +00:00
return result ;
2001-02-25 02:14:49 +00:00
2005-06-17 01:57:18 +00:00
newkey = find_regkey_index_by_hnd ( p , & r_u - > handle ) ;
2001-02-25 02:14:49 +00:00
2005-06-17 01:57:18 +00:00
/* finally allow the backend to check the access for the requested key */
if ( ! regkey_access_check ( newkey , q_u - > access , & access_granted , p - > pipe_user . nt_user_token ) ) {
close_registry_key ( p , & r_u - > handle ) ;
return WERR_ACCESS_DENIED ;
}
/* if successful, save the granted access mask */
newkey - > access_granted = access_granted ;
return WERR_OK ;
2001-02-25 02:14:49 +00:00
}
/*******************************************************************
reg_reply_info
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-06-24 14:55:09 +00:00
WERROR _reg_query_value ( pipes_struct * p , REG_Q_QUERY_VALUE * q_u , REG_R_QUERY_VALUE * r_u )
2001-02-25 02:14:49 +00:00
{
2005-01-10 20:33:41 +00:00
WERROR status = WERR_BADFILE ;
2002-08-17 15:34:15 +00:00
fstring name ;
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
REGISTRY_VALUE * val = NULL ;
2005-08-29 14:55:40 +00:00
REGVAL_CTR * regvals ;
2002-08-17 15:34:15 +00:00
int i ;
2001-02-25 02:14:49 +00:00
2002-08-17 15:34:15 +00:00
if ( ! regkey )
2005-06-16 20:45:55 +00:00
return WERR_BADFID ;
2002-07-15 10:35:28 +00:00
2002-08-17 15:34:15 +00:00
DEBUG ( 7 , ( " _reg_info: policy key name = [%s] \n " , regkey - > name ) ) ;
2005-03-23 23:26:33 +00:00
rpcstr_pull ( name , q_u - > name . string - > buffer , sizeof ( name ) , q_u - > name . string - > uni_str_len * 2 , 0 ) ;
2001-02-25 02:14:49 +00:00
2002-08-17 15:34:15 +00:00
DEBUG ( 5 , ( " reg_info: looking up value: [%s] \n " , name ) ) ;
2001-02-25 02:14:49 +00:00
2005-08-29 14:55:40 +00:00
if ( ! ( regvals = TALLOC_P ( p - > mem_ctx , REGVAL_CTR ) ) )
return WERR_NOMEM ;
2002-08-17 15:34:15 +00:00
for ( i = 0 ; fetch_reg_values_specific ( regkey , & val , i ) ; i + + )
{
DEBUG ( 10 , ( " _reg_info: Testing value [%s] \n " , val - > valuename ) ) ;
2005-06-24 14:55:09 +00:00
if ( strequal ( val - > valuename , name ) ) {
2002-08-17 15:34:15 +00:00
DEBUG ( 10 , ( " _reg_info: Found match for value [%s] \n " , name ) ) ;
2005-01-10 20:33:41 +00:00
status = WERR_OK ;
2002-07-15 10:35:28 +00:00
break ;
2002-08-17 15:34:15 +00:00
}
free_registry_value ( val ) ;
2001-02-25 02:14:49 +00:00
}
2005-06-24 14:55:09 +00:00
init_reg_r_query_value ( q_u - > ptr_buf , r_u , val , status ) ;
2002-08-17 15:34:15 +00:00
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( regvals ) ;
2002-08-17 15:34:15 +00:00
free_registry_value ( val ) ;
2001-02-25 02:14:49 +00:00
2002-07-15 10:35:28 +00:00
return status ;
}
/*****************************************************************************
Implementation of REG_QUERY_KEY
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 20:33:41 +00:00
WERROR _reg_query_key ( pipes_struct * p , REG_Q_QUERY_KEY * q_u , REG_R_QUERY_KEY * r_u )
2002-07-15 10:35:28 +00:00
{
2005-01-10 20:33:41 +00:00
WERROR status = WERR_OK ;
2002-08-17 15:34:15 +00:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2002-07-15 10:35:28 +00:00
if ( ! regkey )
2005-06-16 20:45:55 +00:00
return WERR_BADFID ;
2002-07-15 10:35:28 +00:00
2005-06-30 20:16:16 +00:00
if ( ! get_subkey_information ( regkey , & r_u - > num_subkeys , & r_u - > max_subkeylen ) ) {
DEBUG ( 0 , ( " _reg_query_key: get_subkey_information() failed! \n " ) ) ;
2005-01-10 20:33:41 +00:00
return WERR_ACCESS_DENIED ;
2005-06-30 20:16:16 +00:00
}
2002-07-15 10:35:28 +00:00
2005-06-30 20:16:16 +00:00
if ( ! get_value_information ( regkey , & r_u - > num_values , & r_u - > max_valnamelen , & r_u - > max_valbufsize ) ) {
DEBUG ( 0 , ( " _reg_query_key: get_value_information() failed! \n " ) ) ;
2005-01-10 20:33:41 +00:00
return WERR_ACCESS_DENIED ;
2005-06-30 20:16:16 +00:00
}
2002-08-17 15:34:15 +00:00
2002-07-15 10:35:28 +00:00
r_u - > sec_desc = 0x00000078 ; /* size for key's sec_desc */
/* Win9x set this to 0x0 since it does not keep timestamps.
Doing the same here for simplicity - - jerry */
ZERO_STRUCT ( r_u - > mod_time ) ;
return status ;
}
/*****************************************************************************
2005-03-23 23:26:33 +00:00
Implementation of REG_GETVERSION
2002-07-15 10:35:28 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-03-23 23:26:33 +00:00
WERROR _reg_getversion ( pipes_struct * p , REG_Q_GETVERSION * q_u , REG_R_GETVERSION * r_u )
2002-07-15 10:35:28 +00:00
{
2005-01-10 20:33:41 +00:00
WERROR status = WERR_OK ;
2002-08-17 15:34:15 +00:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2002-07-15 10:35:28 +00:00
if ( ! regkey )
2005-06-16 20:45:55 +00:00
return WERR_BADFID ;
2002-07-15 10:35:28 +00:00
2005-06-16 20:45:55 +00:00
r_u - > win_version = 0x00000005 ; /* Windows 2000 registry API version */
2002-07-15 10:35:28 +00:00
return status ;
}
2001-02-25 02:14:49 +00:00
2002-07-15 10:35:28 +00:00
/*****************************************************************************
Implementation of REG_ENUM_KEY
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 20:33:41 +00:00
WERROR _reg_enum_key ( pipes_struct * p , REG_Q_ENUM_KEY * q_u , REG_R_ENUM_KEY * r_u )
2002-07-15 10:35:28 +00:00
{
2005-01-10 20:33:41 +00:00
WERROR status = WERR_OK ;
2002-08-17 15:34:15 +00:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
char * subkey = NULL ;
2002-07-15 10:35:28 +00:00
if ( ! regkey )
2005-06-16 20:45:55 +00:00
return WERR_BADFID ;
2002-07-15 10:35:28 +00:00
DEBUG ( 8 , ( " _reg_enum_key: enumerating key [%s] \n " , regkey - > name ) ) ;
2002-08-17 15:34:15 +00:00
if ( ! fetch_reg_keys_specific ( regkey , & subkey , q_u - > key_index ) )
2002-07-15 10:35:28 +00:00
{
2005-01-10 20:33:41 +00:00
status = WERR_NO_MORE_ITEMS ;
2002-07-15 10:35:28 +00:00
goto done ;
}
DEBUG ( 10 , ( " _reg_enum_key: retrieved subkey named [%s] \n " , subkey ) ) ;
/* subkey has the string name now */
2005-05-23 16:25:31 +00:00
init_reg_r_enum_key ( r_u , subkey ) ;
2002-07-15 10:35:28 +00:00
done :
2002-08-17 15:34:15 +00:00
SAFE_FREE ( subkey ) ;
return status ;
}
/*****************************************************************************
Implementation of REG_ENUM_VALUE
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 20:33:41 +00:00
WERROR _reg_enum_value ( pipes_struct * p , REG_Q_ENUM_VALUE * q_u , REG_R_ENUM_VALUE * r_u )
2002-08-17 15:34:15 +00:00
{
2005-01-10 20:33:41 +00:00
WERROR status = WERR_OK ;
2002-08-17 15:34:15 +00:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
REGISTRY_VALUE * val ;
if ( ! regkey )
2005-06-16 20:45:55 +00:00
return WERR_BADFID ;
2002-08-17 15:34:15 +00:00
2005-08-05 14:32:42 +00:00
DEBUG ( 8 , ( " _reg_enum_value: enumerating values for key [%s] \n " , regkey - > name ) ) ;
2002-08-17 15:34:15 +00:00
2005-04-05 17:49:16 +00:00
if ( ! fetch_reg_values_specific ( regkey , & val , q_u - > val_index ) ) {
2005-01-10 20:33:41 +00:00
status = WERR_NO_MORE_ITEMS ;
2002-08-17 15:34:15 +00:00
goto done ;
}
DEBUG ( 10 , ( " _reg_enum_value: retrieved value named [%s] \n " , val - > valuename ) ) ;
/* subkey has the string name now */
init_reg_r_enum_val ( r_u , val ) ;
done :
free_registry_value ( val ) ;
2001-02-25 02:14:49 +00:00
return status ;
}
2001-08-23 23:25:34 +00:00
2002-07-15 10:35:28 +00:00
2001-08-23 23:25:34 +00:00
/*******************************************************************
reg_shutdwon
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 20:33:41 +00:00
WERROR _reg_shutdown ( pipes_struct * p , REG_Q_SHUTDOWN * q_u , REG_R_SHUTDOWN * r_u )
2001-08-23 23:25:34 +00:00
{
2005-03-23 23:26:33 +00:00
REG_Q_SHUTDOWN_EX q_u_ex ;
REG_R_SHUTDOWN_EX r_u_ex ;
/* copy fields (including stealing memory) */
q_u_ex . server = q_u - > server ;
q_u_ex . message = q_u - > message ;
q_u_ex . timeout = q_u - > timeout ;
q_u_ex . force = q_u - > force ;
q_u_ex . reboot = q_u - > reboot ;
q_u_ex . reason = 0x0 ; /* don't care for now */
/* thunk down to _reg_shutdown_ex() (just returns a status) */
return _reg_shutdown_ex ( p , & q_u_ex , & r_u_ex ) ;
}
/*******************************************************************
reg_shutdown_ex
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
# define SHUTDOWN_R_STRING "-r"
# define SHUTDOWN_F_STRING "-f"
WERROR _reg_shutdown_ex ( pipes_struct * p , REG_Q_SHUTDOWN_EX * q_u , REG_R_SHUTDOWN_EX * r_u )
{
2001-08-23 23:25:34 +00:00
pstring shutdown_script ;
pstring message ;
2001-08-24 07:51:59 +00:00
pstring chkmsg ;
2001-08-23 23:25:34 +00:00
fstring timeout ;
2005-03-23 23:26:33 +00:00
fstring reason ;
2001-08-23 23:25:34 +00:00
fstring r ;
fstring f ;
2005-03-23 23:26:33 +00:00
int ret ;
BOOL can_shutdown ;
2001-08-23 23:25:34 +00:00
2005-05-23 16:25:31 +00:00
2005-03-23 23:26:33 +00:00
pstrcpy ( shutdown_script , lp_shutdown_script ( ) ) ;
if ( ! * shutdown_script )
return WERR_ACCESS_DENIED ;
/* pull the message string and perform necessary sanity checks on it */
pstrcpy ( message , " " ) ;
if ( q_u - > message ) {
UNISTR2 * msg_string = q_u - > message - > string ;
2005-05-23 16:25:31 +00:00
2005-03-23 23:26:33 +00:00
rpcstr_pull ( message , msg_string - > buffer , sizeof ( message ) , msg_string - > uni_str_len * 2 , 0 ) ;
}
2001-08-24 14:34:23 +00:00
alpha_strcpy ( chkmsg , message , NULL , sizeof ( message ) ) ;
2005-03-23 23:26:33 +00:00
2003-07-23 12:33:59 +00:00
fstr_sprintf ( timeout , " %d " , q_u - > timeout ) ;
fstr_sprintf ( r , ( q_u - > reboot ) ? SHUTDOWN_R_STRING : " " ) ;
fstr_sprintf ( f , ( q_u - > force ) ? SHUTDOWN_F_STRING : " " ) ;
2005-03-23 23:26:33 +00:00
fstr_sprintf ( reason , " %d " , q_u - > reason ) ;
2001-08-23 23:25:34 +00:00
2005-03-23 23:26:33 +00:00
all_string_sub ( shutdown_script , " %z " , chkmsg , sizeof ( shutdown_script ) ) ;
all_string_sub ( shutdown_script , " %t " , timeout , sizeof ( shutdown_script ) ) ;
all_string_sub ( shutdown_script , " %r " , r , sizeof ( shutdown_script ) ) ;
all_string_sub ( shutdown_script , " %f " , f , sizeof ( shutdown_script ) ) ;
all_string_sub ( shutdown_script , " %x " , reason , sizeof ( shutdown_script ) ) ;
2005-05-23 16:25:31 +00:00
2005-03-23 23:26:33 +00:00
can_shutdown = user_has_privileges ( p - > pipe_user . nt_user_token , & se_remote_shutdown ) ;
2005-01-18 18:30:32 +00:00
2005-03-23 23:26:33 +00:00
/* IF someone has privs, run the shutdown script as root. OTHERWISE run it as not root
Take the error return from the script and provide it as the Windows return code . */
2005-04-05 17:49:16 +00:00
/********** BEGIN SeRemoteShutdownPrivilege BLOCK **********/
if ( can_shutdown )
become_root ( ) ;
2005-03-23 23:26:33 +00:00
ret = smbrun ( shutdown_script , NULL ) ;
2005-04-05 17:49:16 +00:00
if ( can_shutdown )
unbecome_root ( ) ;
/********** END SeRemoteShutdownPrivilege BLOCK **********/
2005-05-23 16:25:31 +00:00
2005-03-23 23:26:33 +00:00
DEBUG ( 3 , ( " _reg_shutdown_ex: Running the command `%s' gave %d \n " ,
shutdown_script , ret ) ) ;
2001-08-23 23:25:34 +00:00
2005-03-23 23:26:33 +00:00
return ( ret = = 0 ) ? WERR_OK : WERR_ACCESS_DENIED ;
2001-08-23 23:25:34 +00:00
}
2001-08-24 07:51:59 +00:00
2005-03-23 23:26:33 +00:00
2002-07-15 10:35:28 +00:00
/*******************************************************************
reg_abort_shutdwon
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 20:33:41 +00:00
WERROR _reg_abort_shutdown ( pipes_struct * p , REG_Q_ABORT_SHUTDOWN * q_u , REG_R_ABORT_SHUTDOWN * r_u )
2001-08-24 07:51:59 +00:00
{
pstring abort_shutdown_script ;
2005-03-23 23:26:33 +00:00
int ret ;
BOOL can_shutdown ;
2001-08-24 07:51:59 +00:00
pstrcpy ( abort_shutdown_script , lp_abort_shutdown_script ( ) ) ;
2005-03-23 23:26:33 +00:00
if ( ! * abort_shutdown_script )
return WERR_ACCESS_DENIED ;
2005-01-18 18:30:32 +00:00
2005-03-23 23:26:33 +00:00
can_shutdown = user_has_privileges ( p - > pipe_user . nt_user_token , & se_remote_shutdown ) ;
2005-01-18 18:30:32 +00:00
2005-04-05 17:49:16 +00:00
/********** BEGIN SeRemoteShutdownPrivilege BLOCK **********/
2005-03-23 23:26:33 +00:00
2005-04-05 17:49:16 +00:00
if ( can_shutdown )
become_root ( ) ;
2005-03-23 23:26:33 +00:00
ret = smbrun ( abort_shutdown_script , NULL ) ;
2005-04-05 17:49:16 +00:00
if ( can_shutdown )
unbecome_root ( ) ;
/********** END SeRemoteShutdownPrivilege BLOCK **********/
2005-03-23 23:26:33 +00:00
DEBUG ( 3 , ( " _reg_abort_shutdown: Running the command `%s' gave %d \n " ,
abort_shutdown_script , ret ) ) ;
2001-08-24 07:51:59 +00:00
2005-03-23 23:26:33 +00:00
return ( ret = = 0 ) ? WERR_OK : WERR_ACCESS_DENIED ;
2001-08-24 07:51:59 +00:00
}
2002-07-15 10:35:28 +00:00
2005-05-23 16:25:31 +00:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static int validate_reg_filename ( pstring fname )
{
char * p ;
int num_services = lp_numservices ( ) ;
int snum ;
pstring share_path ;
pstring unix_fname ;
/* convert to a unix path, stripping the C:\ along the way */
if ( ! ( p = valid_share_pathname ( fname ) ) )
return - 1 ;
/* has to exist within a valid file share */
for ( snum = 0 ; snum < num_services ; snum + + ) {
if ( ! lp_snum_ok ( snum ) | | lp_print_ok ( snum ) )
continue ;
pstrcpy ( share_path , lp_pathname ( snum ) ) ;
/* make sure we have a path (e.g. [homes] ) */
if ( strlen ( share_path ) = = 0 )
continue ;
if ( strncmp ( share_path , p , strlen ( share_path ) ) = = 0 )
break ;
}
/* p and fname are overlapping memory so copy out and back in again */
pstrcpy ( unix_fname , p ) ;
pstrcpy ( fname , unix_fname ) ;
return ( snum < num_services ) ? snum : - 1 ;
}
2005-06-09 15:20:11 +00:00
/*******************************************************************
2005-06-27 03:40:03 +00:00
Note : topkeypat is the * full * path that this * key will be
2005-06-09 15:20:11 +00:00
loaded into ( including the name of the key )
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR reg_load_tree ( REGF_FILE * regfile , const char * topkeypath ,
REGF_NK_REC * key )
{
REGF_NK_REC * subkey ;
REGISTRY_KEY registry_key ;
2005-08-29 14:55:40 +00:00
REGVAL_CTR * values ;
REGSUBKEY_CTR * subkeys ;
2005-06-09 15:20:11 +00:00
int i ;
pstring path ;
WERROR result = WERR_OK ;
/* initialize the REGISTRY_KEY structure */
if ( ! ( registry_key . hook = reghook_cache_find ( topkeypath ) ) ) {
DEBUG ( 0 , ( " reg_load_tree: Failed to assigned a REGISTRY_HOOK to [%s] \n " ,
topkeypath ) ) ;
return WERR_BADFILE ;
}
pstrcpy ( registry_key . name , topkeypath ) ;
/* now start parsing the values and subkeys */
2005-08-29 14:55:40 +00:00
if ( ! ( subkeys = TALLOC_ZERO_P ( regfile - > mem_ctx , REGSUBKEY_CTR ) ) )
return WERR_NOMEM ;
2005-06-09 15:20:11 +00:00
2005-08-29 14:55:40 +00:00
if ( ! ( values = TALLOC_ZERO_P ( subkeys , REGVAL_CTR ) ) )
return WERR_NOMEM ;
2005-06-09 15:20:11 +00:00
/* copy values into the REGVAL_CTR */
for ( i = 0 ; i < key - > num_values ; i + + ) {
2005-08-29 14:55:40 +00:00
regval_ctr_addvalue ( values , key - > values [ i ] . valuename , key - > values [ i ] . type ,
2005-06-09 15:20:11 +00:00
key - > values [ i ] . data , ( key - > values [ i ] . data_size & ~ VK_DATA_IN_OFFSET ) ) ;
}
/* copy subkeys into the REGSUBKEY_CTR */
key - > subkey_index = 0 ;
while ( ( subkey = regfio_fetch_subkey ( regfile , key ) ) ) {
2005-08-29 14:55:40 +00:00
regsubkey_ctr_addkey ( subkeys , subkey - > keyname ) ;
2005-06-09 15:20:11 +00:00
}
/* write this key and values out */
2005-08-29 14:55:40 +00:00
if ( ! store_reg_values ( & registry_key , values )
| | ! store_reg_keys ( & registry_key , subkeys ) )
2005-06-09 15:20:11 +00:00
{
DEBUG ( 0 , ( " reg_load_tree: Failed to load %s! \n " , topkeypath ) ) ;
result = WERR_REG_IO_FAILURE ;
}
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( subkeys ) ;
2005-06-09 15:20:11 +00:00
if ( ! W_ERROR_IS_OK ( result ) )
return result ;
/* now continue to load each subkey registry tree */
key - > subkey_index = 0 ;
while ( ( subkey = regfio_fetch_subkey ( regfile , key ) ) ) {
pstr_sprintf ( path , " %s%s%s " , topkeypath , " \\ " , subkey - > keyname ) ;
result = reg_load_tree ( regfile , path , subkey ) ;
if ( ! W_ERROR_IS_OK ( result ) )
break ;
}
return result ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR restore_registry_key ( REGISTRY_KEY * krecord , const char * fname )
{
REGF_FILE * regfile ;
REGF_NK_REC * rootkey ;
WERROR result ;
/* open the registry file....fail if the file already exists */
if ( ! ( regfile = regfio_open ( fname , ( O_RDONLY ) , 0 ) ) ) {
DEBUG ( 0 , ( " backup_registry_key: failed to open \" %s \" (%s) \n " ,
fname , strerror ( errno ) ) ) ;
return ( ntstatus_to_werror ( map_nt_error_from_unix ( errno ) ) ) ;
}
/* get the rootkey from the regf file and then load the tree
via recursive calls */
if ( ! ( rootkey = regfio_rootkey ( regfile ) ) )
return WERR_REG_FILE_INVALID ;
result = reg_load_tree ( regfile , krecord - > name , rootkey ) ;
/* cleanup */
regfio_close ( regfile ) ;
return result ;
}
2002-08-17 15:34:15 +00:00
/*******************************************************************
2005-04-05 17:49:16 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_restore_key ( pipes_struct * p , REG_Q_RESTORE_KEY * q_u , REG_R_RESTORE_KEY * r_u )
{
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2005-04-07 04:58:38 +00:00
pstring filename ;
2005-05-23 16:25:31 +00:00
int snum ;
2005-04-05 17:49:16 +00:00
if ( ! regkey )
return WERR_BADFID ;
2005-04-07 04:58:38 +00:00
rpcstr_pull ( filename , q_u - > filename . string - > buffer , sizeof ( filename ) , q_u - > filename . string - > uni_str_len * 2 , STR_TERMINATE ) ;
DEBUG ( 8 , ( " _reg_restore_key: verifying restore of key [%s] from \" %s \" \n " , regkey - > name , filename ) ) ;
2005-04-05 17:49:16 +00:00
2005-05-23 16:25:31 +00:00
if ( ( snum = validate_reg_filename ( filename ) ) = = - 1 )
return WERR_OBJECT_PATH_INVALID ;
2005-06-09 15:20:11 +00:00
/* user must posses SeRestorePrivilege for this this proceed */
if ( ! user_has_privileges ( p - > pipe_user . nt_user_token , & se_restore ) )
return WERR_ACCESS_DENIED ;
2005-05-23 16:25:31 +00:00
DEBUG ( 2 , ( " _reg_restore_key: Restoring [%s] from %s in share %s \n " , regkey - > name , filename , lp_servicename ( snum ) ) ) ;
2005-04-05 17:49:16 +00:00
return restore_registry_key ( regkey , filename ) ;
}
2005-05-23 16:25:31 +00:00
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR reg_write_tree ( REGF_FILE * regfile , const char * keypath ,
REGF_NK_REC * parent , SEC_DESC * sec_desc )
{
REGF_NK_REC * key ;
2005-08-29 14:55:40 +00:00
REGVAL_CTR * values ;
REGSUBKEY_CTR * subkeys ;
2005-05-23 16:25:31 +00:00
int i , num_subkeys ;
pstring key_tmp ;
char * keyname , * parentpath ;
pstring subkeypath ;
char * subkeyname ;
REGISTRY_KEY registry_key ;
WERROR result = WERR_OK ;
if ( ! regfile )
return WERR_GENERAL_FAILURE ;
if ( ! keypath )
return WERR_OBJECT_PATH_INVALID ;
/* split up the registry key path */
pstrcpy ( key_tmp , keypath ) ;
if ( ! reg_split_key ( key_tmp , & parentpath , & keyname ) )
return WERR_OBJECT_PATH_INVALID ;
if ( ! keyname )
keyname = parentpath ;
/* we need a REGISTRY_KEY object here to enumerate subkeys and values */
ZERO_STRUCT ( registry_key ) ;
pstrcpy ( registry_key . name , keypath ) ;
if ( ! ( registry_key . hook = reghook_cache_find ( registry_key . name ) ) )
return WERR_BADFILE ;
/* lookup the values and subkeys */
2005-08-29 14:55:40 +00:00
if ( ! ( subkeys = TALLOC_ZERO_P ( regfile - > mem_ctx , REGSUBKEY_CTR ) ) )
return WERR_NOMEM ;
if ( ! ( values = TALLOC_ZERO_P ( subkeys , REGVAL_CTR ) ) )
return WERR_NOMEM ;
fetch_reg_keys ( & registry_key , subkeys ) ;
fetch_reg_values ( & registry_key , values ) ;
2005-05-23 16:25:31 +00:00
/* write out this key */
2005-08-29 14:55:40 +00:00
if ( ! ( key = regfio_write_key ( regfile , keyname , values , subkeys , sec_desc , parent ) ) ) {
2005-05-23 16:25:31 +00:00
result = WERR_CAN_NOT_COMPLETE ;
goto done ;
}
/* write each one of the subkeys out */
2005-08-29 14:55:40 +00:00
num_subkeys = regsubkey_ctr_numkeys ( subkeys ) ;
2005-05-23 16:25:31 +00:00
for ( i = 0 ; i < num_subkeys ; i + + ) {
2005-08-29 14:55:40 +00:00
subkeyname = regsubkey_ctr_specific_key ( subkeys , i ) ;
2005-05-23 16:25:31 +00:00
pstr_sprintf ( subkeypath , " %s \\ %s " , keypath , subkeyname ) ;
result = reg_write_tree ( regfile , subkeypath , key , sec_desc ) ;
if ( ! W_ERROR_IS_OK ( result ) )
goto done ;
}
DEBUG ( 6 , ( " reg_write_tree: wrote key [%s] \n " , keypath ) ) ;
done :
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( subkeys ) ;
2005-05-23 16:25:31 +00:00
return result ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR make_default_reg_sd ( TALLOC_CTX * ctx , SEC_DESC * * psd )
{
DOM_SID adm_sid , owner_sid ;
SEC_ACE ace [ 2 ] ; /* at most 2 entries */
SEC_ACCESS mask ;
SEC_ACL * psa = NULL ;
uint32 sd_size ;
/* set the owner to BUILTIN\Administrator */
sid_copy ( & owner_sid , & global_sid_Builtin ) ;
sid_append_rid ( & owner_sid , DOMAIN_USER_RID_ADMIN ) ;
/* basic access for Everyone */
2005-06-28 22:39:18 +00:00
init_sec_access ( & mask , reg_generic_map . generic_execute | reg_generic_map . generic_read ) ;
2005-05-23 16:25:31 +00:00
init_sec_ace ( & ace [ 0 ] , & global_sid_World , SEC_ACE_TYPE_ACCESS_ALLOWED , mask , 0 ) ;
/* add Full Access 'BUILTIN\Administrators' */
2005-06-28 22:39:18 +00:00
init_sec_access ( & mask , reg_generic_map . generic_all ) ;
2005-05-23 16:25:31 +00:00
sid_copy ( & adm_sid , & global_sid_Builtin ) ;
sid_append_rid ( & adm_sid , BUILTIN_ALIAS_RID_ADMINS ) ;
init_sec_ace ( & ace [ 1 ] , & adm_sid , SEC_ACE_TYPE_ACCESS_ALLOWED , mask , 0 ) ;
/* create the security descriptor */
if ( ( psa = make_sec_acl ( ctx , NT4_ACL_REVISION , 2 , ace ) ) = = NULL )
return WERR_NOMEM ;
if ( ( * psd = make_sec_desc ( ctx , SEC_DESC_REVISION , SEC_DESC_SELF_RELATIVE , & owner_sid , NULL , NULL , psa , & sd_size ) ) = = NULL )
return WERR_NOMEM ;
return WERR_OK ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR backup_registry_key ( REGISTRY_KEY * krecord , const char * fname )
{
REGF_FILE * regfile ;
WERROR result ;
SEC_DESC * sd = NULL ;
/* open the registry file....fail if the file already exists */
if ( ! ( regfile = regfio_open ( fname , ( O_RDWR | O_CREAT | O_EXCL ) , ( S_IREAD | S_IWRITE ) ) ) ) {
DEBUG ( 0 , ( " backup_registry_key: failed to open \" %s \" (%s) \n " ,
fname , strerror ( errno ) ) ) ;
return ( ntstatus_to_werror ( map_nt_error_from_unix ( errno ) ) ) ;
}
if ( ! W_ERROR_IS_OK ( result = make_default_reg_sd ( regfile - > mem_ctx , & sd ) ) ) {
regfio_close ( regfile ) ;
return result ;
}
/* write the registry tree to the file */
result = reg_write_tree ( regfile , krecord - > name , NULL , sd ) ;
/* cleanup */
regfio_close ( regfile ) ;
return result ;
}
2005-04-05 17:49:16 +00:00
/*******************************************************************
2002-08-17 15:34:15 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 20:33:41 +00:00
WERROR _reg_save_key ( pipes_struct * p , REG_Q_SAVE_KEY * q_u , REG_R_SAVE_KEY * r_u )
2002-08-17 15:34:15 +00:00
{
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2005-04-07 04:58:38 +00:00
pstring filename ;
2005-05-23 16:25:31 +00:00
int snum ;
2002-08-17 15:34:15 +00:00
if ( ! regkey )
2005-04-05 17:49:16 +00:00
return WERR_BADFID ;
2002-08-17 15:34:15 +00:00
2005-04-07 04:58:38 +00:00
rpcstr_pull ( filename , q_u - > filename . string - > buffer , sizeof ( filename ) , q_u - > filename . string - > uni_str_len * 2 , STR_TERMINATE ) ;
DEBUG ( 8 , ( " _reg_save_key: verifying backup of key [%s] to \" %s \" \n " , regkey - > name , filename ) ) ;
2005-05-23 16:25:31 +00:00
if ( ( snum = validate_reg_filename ( filename ) ) = = - 1 )
return WERR_OBJECT_PATH_INVALID ;
DEBUG ( 2 , ( " _reg_save_key: Saving [%s] to %s in share %s \n " , regkey - > name , filename , lp_servicename ( snum ) ) ) ;
2005-04-05 17:49:16 +00:00
return backup_registry_key ( regkey , filename ) ;
2002-08-17 15:34:15 +00:00
}
2005-06-16 20:04:16 +00:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-06-29 16:35:32 +00:00
WERROR _reg_create_key_ex ( pipes_struct * p , REG_Q_CREATE_KEY_EX * q_u , REG_R_CREATE_KEY_EX * r_u )
2005-06-16 20:04:16 +00:00
{
2005-06-17 15:35:31 +00:00
REGISTRY_KEY * parent = find_regkey_index_by_hnd ( p , & q_u - > handle ) ;
REGISTRY_KEY * newparent ;
POLICY_HND newparent_handle ;
2005-08-29 14:55:40 +00:00
REGSUBKEY_CTR * subkeys ;
2005-06-17 15:35:31 +00:00
BOOL write_result ;
pstring name ;
WERROR result ;
if ( ! parent )
return WERR_BADFID ;
rpcstr_pull ( name , q_u - > name . string - > buffer , sizeof ( name ) , q_u - > name . string - > uni_str_len * 2 , 0 ) ;
/* ok. Here's what we do. */
if ( strrchr ( name , ' \\ ' ) ) {
pstring newkeyname ;
char * ptr ;
uint32 access_granted ;
/* (1) check for enumerate rights on the parent handle. CLients can try
create things like ' SOFTWARE \ Samba ' on the HKLM handle .
( 2 ) open the path to the child parent key if necessary */
if ( ! ( parent - > access_granted & SEC_RIGHTS_ENUM_SUBKEYS ) )
return WERR_ACCESS_DENIED ;
pstrcpy ( newkeyname , name ) ;
ptr = strrchr ( newkeyname , ' \\ ' ) ;
* ptr = ' \0 ' ;
result = open_registry_key ( p , & newparent_handle , parent , newkeyname , 0 ) ;
if ( ! W_ERROR_IS_OK ( result ) )
return result ;
newparent = find_regkey_index_by_hnd ( p , & newparent_handle ) ;
SMB_ASSERT ( newparent ! = NULL ) ;
if ( ! regkey_access_check ( newparent , REG_KEY_READ | REG_KEY_WRITE , & access_granted , p - > pipe_user . nt_user_token ) ) {
result = WERR_ACCESS_DENIED ;
goto done ;
}
newparent - > access_granted = access_granted ;
/* copy the new key name (just the lower most keyname) */
pstrcpy ( name , ptr + 1 ) ;
}
else {
/* use the existing open key information */
newparent = parent ;
memcpy ( & newparent_handle , & q_u - > handle , sizeof ( POLICY_HND ) ) ;
}
/* (3) check for create subkey rights on the correct parent */
if ( ! ( newparent - > access_granted & SEC_RIGHTS_CREATE_SUBKEY ) ) {
result = WERR_ACCESS_DENIED ;
goto done ;
}
2005-08-29 14:55:40 +00:00
if ( ! ( subkeys = TALLOC_ZERO_P ( p - > mem_ctx , REGSUBKEY_CTR ) ) ) {
result = WERR_NOMEM ;
goto done ;
}
2005-06-17 15:35:31 +00:00
/* (4) lookup the current keys and add the new one */
2005-08-29 14:55:40 +00:00
fetch_reg_keys ( newparent , subkeys ) ;
regsubkey_ctr_addkey ( subkeys , name ) ;
2005-06-17 15:35:31 +00:00
/* now write to the registry backend */
2005-08-29 14:55:40 +00:00
write_result = store_reg_keys ( newparent , subkeys ) ;
2005-06-17 15:35:31 +00:00
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( subkeys ) ;
2005-06-17 15:35:31 +00:00
if ( ! write_result )
return WERR_REG_IO_FAILURE ;
/* (5) open the new key and return the handle. Note that it is probably
not correct to grant full access on this open handle . We should pass
the new open through the regkey_access_check ( ) like we do for
_reg_open_entry ( ) but this is ok for now . */
result = open_registry_key ( p , & r_u - > handle , newparent , name , REG_KEY_ALL ) ;
done :
/* close any intermediate key handles */
if ( newparent ! = parent )
close_registry_key ( p , & newparent_handle ) ;
return result ;
2005-06-16 20:04:16 +00:00
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_set_value ( pipes_struct * p , REG_Q_SET_VALUE * q_u , REG_R_SET_VALUE * r_u )
{
2005-06-17 15:35:31 +00:00
REGISTRY_KEY * key = find_regkey_index_by_hnd ( p , & q_u - > handle ) ;
2005-08-29 14:55:40 +00:00
REGVAL_CTR * values ;
2005-06-17 15:35:31 +00:00
BOOL write_result ;
2005-06-25 17:31:40 +00:00
fstring valuename ;
2005-06-17 15:35:31 +00:00
if ( ! key )
return WERR_BADFID ;
/* access checks first */
if ( ! ( key - > access_granted & SEC_RIGHTS_SET_VALUE ) )
return WERR_ACCESS_DENIED ;
2005-06-25 17:31:40 +00:00
rpcstr_pull ( valuename , q_u - > name . string - > buffer , sizeof ( valuename ) , q_u - > name . string - > uni_str_len * 2 , 0 ) ;
2005-06-29 16:35:32 +00:00
/* verify the name */
if ( ! * valuename )
return WERR_INVALID_PARAM ;
DEBUG ( 8 , ( " _reg_set_value: Setting value for [%s:%s] \n " , key - > name , valuename ) ) ;
2005-06-25 17:31:40 +00:00
2005-08-29 14:55:40 +00:00
if ( ! ( values = TALLOC_ZERO_P ( p - > mem_ctx , REGVAL_CTR ) ) )
return WERR_NOMEM ;
2005-06-17 15:35:31 +00:00
/* lookup the current values and add the new one */
2005-08-29 14:55:40 +00:00
fetch_reg_values ( key , values ) ;
2005-06-25 17:31:40 +00:00
2005-08-29 14:55:40 +00:00
regval_ctr_addvalue ( values , valuename , q_u - > type , q_u - > value . buffer , q_u - > value . buf_len ) ;
2005-06-17 15:35:31 +00:00
/* now write to the registry backend */
2005-08-29 14:55:40 +00:00
write_result = store_reg_values ( key , values ) ;
2005-06-17 15:35:31 +00:00
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( values ) ;
2005-06-17 15:35:31 +00:00
if ( ! write_result )
return WERR_REG_IO_FAILURE ;
return WERR_OK ;
2005-06-16 20:04:16 +00:00
}
2002-07-15 10:35:28 +00:00
2005-06-16 20:59:39 +00:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_delete_key ( pipes_struct * p , REG_Q_DELETE_KEY * q_u , REG_R_DELETE_KEY * r_u )
{
2005-06-17 15:35:31 +00:00
REGISTRY_KEY * parent = find_regkey_index_by_hnd ( p , & q_u - > handle ) ;
2005-06-17 18:57:37 +00:00
REGISTRY_KEY * newparent ;
POLICY_HND newparent_handle ;
2005-08-29 14:55:40 +00:00
REGSUBKEY_CTR * subkeys ;
2005-06-17 15:35:31 +00:00
BOOL write_result ;
2005-06-17 18:57:37 +00:00
pstring name ;
WERROR result ;
2005-06-17 15:35:31 +00:00
if ( ! parent )
return WERR_BADFID ;
rpcstr_pull ( name , q_u - > name . string - > buffer , sizeof ( name ) , q_u - > name . string - > uni_str_len * 2 , 0 ) ;
2005-06-17 18:57:37 +00:00
/* ok. Here's what we do. */
if ( strrchr ( name , ' \\ ' ) ) {
pstring newkeyname ;
char * ptr ;
uint32 access_granted ;
/* (1) check for enumerate rights on the parent handle. CLients can try
create things like ' SOFTWARE \ Samba ' on the HKLM handle .
( 2 ) open the path to the child parent key if necessary */
2005-06-17 15:35:31 +00:00
2005-06-17 18:57:37 +00:00
if ( ! ( parent - > access_granted & SEC_RIGHTS_ENUM_SUBKEYS ) )
return WERR_ACCESS_DENIED ;
2005-06-17 15:35:31 +00:00
2005-06-17 18:57:37 +00:00
pstrcpy ( newkeyname , name ) ;
ptr = strrchr ( newkeyname , ' \\ ' ) ;
* ptr = ' \0 ' ;
result = open_registry_key ( p , & newparent_handle , parent , newkeyname , 0 ) ;
if ( ! W_ERROR_IS_OK ( result ) )
return result ;
newparent = find_regkey_index_by_hnd ( p , & newparent_handle ) ;
SMB_ASSERT ( newparent ! = NULL ) ;
if ( ! regkey_access_check ( newparent , REG_KEY_READ | REG_KEY_WRITE , & access_granted , p - > pipe_user . nt_user_token ) ) {
result = WERR_ACCESS_DENIED ;
goto done ;
}
newparent - > access_granted = access_granted ;
/* copy the new key name (just the lower most keyname) */
pstrcpy ( name , ptr + 1 ) ;
}
else {
/* use the existing open key information */
newparent = parent ;
memcpy ( & newparent_handle , & q_u - > handle , sizeof ( POLICY_HND ) ) ;
}
/* (3) check for create subkey rights on the correct parent */
if ( ! ( newparent - > access_granted & STD_RIGHT_DELETE_ACCESS ) ) {
result = WERR_ACCESS_DENIED ;
goto done ;
}
2005-08-29 14:55:40 +00:00
if ( ! ( subkeys = TALLOC_ZERO_P ( p - > mem_ctx , REGSUBKEY_CTR ) ) ) {
result = WERR_NOMEM ;
goto done ;
}
2005-06-17 15:35:31 +00:00
2005-06-17 18:57:37 +00:00
/* lookup the current keys and delete the new one */
2005-06-17 15:35:31 +00:00
2005-08-29 14:55:40 +00:00
fetch_reg_keys ( newparent , subkeys ) ;
2005-06-17 15:35:31 +00:00
2005-08-29 14:55:40 +00:00
regsubkey_ctr_delkey ( subkeys , name ) ;
2005-06-17 15:35:31 +00:00
/* now write to the registry backend */
2005-08-29 14:55:40 +00:00
write_result = store_reg_keys ( newparent , subkeys ) ;
2005-06-17 15:35:31 +00:00
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( subkeys ) ;
2005-06-24 22:34:40 +00:00
result = write_result ? WERR_OK : WERR_REG_IO_FAILURE ;
2005-06-17 15:35:31 +00:00
2005-06-17 18:57:37 +00:00
done :
/* close any intermediate key handles */
if ( newparent ! = parent )
close_registry_key ( p , & newparent_handle ) ;
2005-06-24 22:34:40 +00:00
return result ;
2005-06-16 20:59:39 +00:00
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_delete_value ( pipes_struct * p , REG_Q_DELETE_VALUE * q_u , REG_R_DELETE_VALUE * r_u )
{
2005-06-17 15:35:31 +00:00
REGISTRY_KEY * key = find_regkey_index_by_hnd ( p , & q_u - > handle ) ;
2005-08-29 14:55:40 +00:00
REGVAL_CTR * values ;
2005-06-17 15:35:31 +00:00
BOOL write_result ;
2005-06-25 17:31:40 +00:00
fstring valuename ;
2005-06-17 15:35:31 +00:00
if ( ! key )
return WERR_BADFID ;
/* access checks first */
if ( ! ( key - > access_granted & SEC_RIGHTS_SET_VALUE ) )
return WERR_ACCESS_DENIED ;
2005-06-25 17:31:40 +00:00
rpcstr_pull ( valuename , q_u - > name . string - > buffer , sizeof ( valuename ) , q_u - > name . string - > uni_str_len * 2 , 0 ) ;
2005-06-29 16:35:32 +00:00
if ( ! * valuename )
return WERR_INVALID_PARAM ;
DEBUG ( 8 , ( " _reg_delete_value: Setting value for [%s:%s] \n " , key - > name , valuename ) ) ;
2005-08-29 14:55:40 +00:00
if ( ! ( values = TALLOC_ZERO_P ( p - > mem_ctx , REGVAL_CTR ) ) )
return WERR_NOMEM ;
2005-06-17 15:35:31 +00:00
/* lookup the current values and add the new one */
2005-08-29 14:55:40 +00:00
fetch_reg_values ( key , values ) ;
2005-06-25 17:31:40 +00:00
2005-08-29 14:55:40 +00:00
regval_ctr_delvalue ( values , valuename ) ;
2005-06-17 15:35:31 +00:00
/* now write to the registry backend */
2005-08-29 14:55:40 +00:00
write_result = store_reg_values ( key , values ) ;
2005-06-17 15:35:31 +00:00
2005-08-29 14:55:40 +00:00
TALLOC_FREE ( values ) ;
2005-06-17 15:35:31 +00:00
if ( ! write_result )
return WERR_REG_IO_FAILURE ;
return WERR_OK ;
2005-06-16 20:59:39 +00:00
}
2005-06-24 22:34:40 +00:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_get_key_sec ( pipes_struct * p , REG_Q_GET_KEY_SEC * q_u , REG_R_GET_KEY_SEC * r_u )
{
REGISTRY_KEY * key = find_regkey_index_by_hnd ( p , & q_u - > handle ) ;
if ( ! key )
return WERR_BADFID ;
/* access checks first */
if ( ! ( key - > access_granted & STD_RIGHT_READ_CONTROL_ACCESS ) )
return WERR_ACCESS_DENIED ;
return WERR_ACCESS_DENIED ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_set_key_sec ( pipes_struct * p , REG_Q_SET_KEY_SEC * q_u , REG_R_SET_KEY_SEC * r_u )
{
REGISTRY_KEY * key = find_regkey_index_by_hnd ( p , & q_u - > handle ) ;
if ( ! key )
return WERR_BADFID ;
/* access checks first */
if ( ! ( key - > access_granted & STD_RIGHT_WRITE_DAC_ACCESS ) )
return WERR_ACCESS_DENIED ;
return WERR_ACCESS_DENIED ;
}