2001-02-25 05:14:49 +03:00
/*
2002-01-30 09:08:46 +03:00
* Unix SMB / CIFS implementation .
2001-02-25 05:14:49 +03:00
* RPC Pipe client / server routines
2002-08-17 19:34:15 +04:00
* Copyright ( C ) Andrew Tridgell 1992 - 1997.
* Copyright ( C ) Luke Kenneth Casson Leighton 1996 - 1997.
* Copyright ( C ) Paul Ashton 1997.
* Copyright ( C ) Jeremy Allison 2001.
2005-03-24 02:26:33 +03:00
* Copyright ( C ) Gerald Carter 2002 - 2005.
2001-02-25 05:14:49 +03:00
*
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation ; either version 2 of the License , or
* ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program ; if not , write to the Free Software
* Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
/* Implementation of registry functions. */
# include "includes.h"
2005-05-23 20:25:31 +04:00
# include "regfio.h"
2001-02-25 05:14:49 +03:00
2002-07-15 14:35:28 +04:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_RPC_SRV
2002-08-17 19:34:15 +04:00
# define REGSTR_PRODUCTTYPE "ProductType"
# define REG_PT_WINNT "WinNT"
# define REG_PT_LANMANNT "LanmanNT"
# define REG_PT_SERVERNT "ServerNT"
2002-07-15 14:35:28 +04:00
# define OUR_HANDLE(hnd) (((hnd)==NULL)?"NULL":(IVAL((hnd)->data5,4)==(uint32)sys_getpid()?"OURS":"OTHER")), \
( ( unsigned int ) IVAL ( ( hnd ) - > data5 , 4 ) ) , ( ( unsigned int ) sys_getpid ( ) )
2005-05-23 20:25:31 +04:00
/* no idea if this is correct, just use the file access bits for now */
struct generic_mapping reg_map = { REG_KEY_READ , REG_KEY_WRITE , REG_KEY_EXECUTE , REG_KEY_ALL } ;
2005-06-17 00:29:15 +04:00
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-06-17 00:45:55 +04:00
NTSTATUS registry_access_check ( SEC_DESC * sec_desc , NT_USER_TOKEN * token ,
2005-06-17 00:29:15 +04:00
uint32 access_desired , uint32 * access_granted )
{
NTSTATUS result ;
se_access_check ( sec_desc , token , access_desired , access_granted , & result ) ;
return result ;
}
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-06-17 00:45:55 +04:00
SEC_DESC * construct_registry_sd ( TALLOC_CTX * ctx )
2005-06-17 00:29:15 +04:00
{
SEC_ACE ace [ 2 ] ;
SEC_ACCESS mask ;
size_t i = 0 ;
SEC_DESC * sd ;
SEC_ACL * acl ;
uint32 sd_size ;
/* basic access for Everyone */
init_sec_access ( & mask , REG_KEY_READ ) ;
init_sec_ace ( & ace [ i + + ] , & global_sid_World , SEC_ACE_TYPE_ACCESS_ALLOWED , mask , 0 ) ;
/* Full Access 'BUILTIN\Administrators' */
init_sec_access ( & mask , REG_KEY_ALL ) ;
init_sec_ace ( & ace [ i + + ] , & global_sid_Builtin_Administrators , SEC_ACE_TYPE_ACCESS_ALLOWED , mask , 0 ) ;
/* create the security descriptor */
if ( ! ( acl = make_sec_acl ( ctx , NT4_ACL_REVISION , i , ace ) ) )
return NULL ;
if ( ! ( sd = make_sec_desc ( ctx , SEC_DESC_REVISION , SEC_DESC_SELF_RELATIVE , NULL , NULL , NULL , acl , & sd_size ) ) )
return NULL ;
return sd ;
}
2002-08-17 19:34:15 +04:00
/******************************************************************
free ( ) function for REGISTRY_KEY
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
static void free_regkey_info ( void * ptr )
2002-07-15 14:35:28 +04:00
{
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * info = ( REGISTRY_KEY * ) ptr ;
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
SAFE_FREE ( info ) ;
2002-07-15 14:35:28 +04:00
}
2002-08-17 19:34:15 +04:00
/******************************************************************
Find a registry key handle and return a REGISTRY_KEY
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
static REGISTRY_KEY * find_regkey_index_by_hnd ( pipes_struct * p , POLICY_HND * hnd )
2002-07-15 14:35:28 +04:00
{
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * regkey = NULL ;
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
if ( ! find_policy_by_hnd ( p , hnd , ( void * * ) & regkey ) ) {
DEBUG ( 2 , ( " find_regkey_index_by_hnd: Registry Key not found: " ) ) ;
return NULL ;
2002-07-15 14:35:28 +04:00
}
2002-08-17 19:34:15 +04:00
return regkey ;
2002-07-15 14:35:28 +04:00
}
2002-08-17 19:34:15 +04:00
/*******************************************************************
Function for open a new registry handle and creating a handle
Note that P should be valid & hnd should already have space
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
When we open a key , we store the full path to the key as
HK [ LM | U ] \ < key > \ < key > \ . . .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
static WERROR open_registry_key ( pipes_struct * p , POLICY_HND * hnd , REGISTRY_KEY * parent ,
2003-01-03 11:28:12 +03:00
const char * subkeyname , uint32 access_granted )
2002-07-15 14:35:28 +04:00
{
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * regkey = NULL ;
2005-01-10 23:33:41 +03:00
WERROR result = WERR_OK ;
2002-08-17 19:34:15 +04:00
REGSUBKEY_CTR subkeys ;
2003-01-19 08:04:03 +03:00
pstring subkeyname2 ;
int subkey_len ;
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
DEBUG ( 7 , ( " open_registry_key: name = [%s][%s] \n " ,
parent ? parent - > name : " NULL " , subkeyname ) ) ;
2002-07-15 14:35:28 +04:00
2003-01-19 08:04:03 +03:00
/* strip any trailing '\'s */
pstrcpy ( subkeyname2 , subkeyname ) ;
subkey_len = strlen ( subkeyname2 ) ;
if ( subkey_len & & subkeyname2 [ subkey_len - 1 ] = = ' \\ ' )
subkeyname2 [ subkey_len - 1 ] = ' \0 ' ;
2004-12-07 21:25:53 +03:00
if ( ( regkey = SMB_MALLOC_P ( REGISTRY_KEY ) ) = = NULL )
2005-01-10 23:33:41 +03:00
return WERR_NOMEM ;
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
ZERO_STRUCTP ( regkey ) ;
2002-07-15 14:35:28 +04:00
/*
2002-08-17 19:34:15 +04:00
* very crazy , but regedit . exe on Win2k will attempt to call
* REG_OPEN_ENTRY with a keyname of " " . We should return a new
* ( second ) handle here on the key - > name . regedt32 . exe does
* not do this stupidity . - - jerry
2002-07-15 14:35:28 +04:00
*/
2003-01-19 08:04:03 +03:00
if ( ! subkey_len ) {
2002-08-17 19:34:15 +04:00
pstrcpy ( regkey - > name , parent - > name ) ;
}
else {
pstrcpy ( regkey - > name , " " ) ;
if ( parent ) {
pstrcat ( regkey - > name , parent - > name ) ;
pstrcat ( regkey - > name , " \\ " ) ;
2002-07-15 14:35:28 +04:00
}
2003-01-19 08:04:03 +03:00
pstrcat ( regkey - > name , subkeyname2 ) ;
2002-07-15 14:35:28 +04:00
}
2002-08-17 19:34:15 +04:00
/* Look up the table of registry I/O operations */
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
if ( ! ( regkey - > hook = reghook_cache_find ( regkey - > name ) ) ) {
DEBUG ( 0 , ( " open_registry_key: Failed to assigned a REGISTRY_HOOK to [%s] \n " ,
regkey - > name ) ) ;
2005-01-10 23:33:41 +03:00
return WERR_BADFILE ;
2002-07-15 14:35:28 +04:00
}
2002-08-17 19:34:15 +04:00
/* check if the path really exists; failed is indicated by -1 */
/* if the subkey count failed, bail out */
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
ZERO_STRUCTP ( & subkeys ) ;
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
regsubkey_ctr_init ( & subkeys ) ;
if ( fetch_reg_keys ( regkey , & subkeys ) = = - 1 ) {
/* don't really know what to return here */
2005-01-10 23:33:41 +03:00
result = WERR_BADFILE ;
2002-08-17 19:34:15 +04:00
}
else {
/*
* This would previously return NT_STATUS_TOO_MANY_SECRETS
* that doesn ' t sound quite right to me - - jerry
*/
if ( ! create_policy_hnd ( p , hnd , free_regkey_info , regkey ) )
2005-01-10 23:33:41 +03:00
result = WERR_BADFILE ;
2002-08-17 19:34:15 +04:00
}
2005-06-17 05:57:18 +04:00
/* save the access mask */
regkey - > access_granted = access_granted ;
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
/* clean up */
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
regsubkey_ctr_destroy ( & subkeys ) ;
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
if ( ! NT_STATUS_IS_OK ( result ) )
SAFE_FREE ( regkey ) ;
2002-07-15 14:35:28 +04:00
DEBUG ( 7 , ( " open_registry_key: exit \n " ) ) ;
2002-08-17 19:34:15 +04:00
return result ;
2002-07-15 14:35:28 +04:00
}
/*******************************************************************
Function for open a new registry handle and creating a handle
Note that P should be valid & hnd should already have space
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static BOOL close_registry_key ( pipes_struct * p , POLICY_HND * hnd )
{
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , hnd ) ;
2002-07-15 14:35:28 +04:00
if ( ! regkey ) {
DEBUG ( 2 , ( " close_registry_key: Invalid handle (%s:%u:%u) \n " , OUR_HANDLE ( hnd ) ) ) ;
return False ;
}
close_policy_hnd ( p , hnd ) ;
return True ;
}
/********************************************************************
retrieve information about the subkeys
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-08-17 19:34:15 +04:00
static BOOL get_subkey_information ( REGISTRY_KEY * key , uint32 * maxnum , uint32 * maxlen )
2002-07-15 14:35:28 +04:00
{
2002-08-17 19:34:15 +04:00
int num_subkeys , i ;
uint32 max_len ;
REGSUBKEY_CTR subkeys ;
uint32 len ;
2002-07-15 14:35:28 +04:00
if ( ! key )
return False ;
2002-08-17 19:34:15 +04:00
ZERO_STRUCTP ( & subkeys ) ;
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
regsubkey_ctr_init ( & subkeys ) ;
if ( fetch_reg_keys ( key , & subkeys ) = = - 1 )
2002-07-15 14:35:28 +04:00
return False ;
/* find the longest string */
max_len = 0 ;
2002-08-17 19:34:15 +04:00
num_subkeys = regsubkey_ctr_numkeys ( & subkeys ) ;
2002-07-15 14:35:28 +04:00
for ( i = 0 ; i < num_subkeys ; i + + ) {
2002-08-17 19:34:15 +04:00
len = strlen ( regsubkey_ctr_specific_key ( & subkeys , i ) ) ;
2002-07-15 14:35:28 +04:00
max_len = MAX ( max_len , len ) ;
}
* maxnum = num_subkeys ;
* maxlen = max_len * 2 ;
2002-08-17 19:34:15 +04:00
regsubkey_ctr_destroy ( & subkeys ) ;
2002-07-15 14:35:28 +04:00
return True ;
}
/********************************************************************
retrieve information about the values . We don ' t store values
here . The registry tdb is intended to be a frontend to oether
Samba tdb ' s ( such as ntdrivers . tdb ) .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-08-17 19:34:15 +04:00
static BOOL get_value_information ( REGISTRY_KEY * key , uint32 * maxnum ,
2002-07-15 14:35:28 +04:00
uint32 * maxlen , uint32 * maxsize )
{
2002-08-17 19:34:15 +04:00
REGVAL_CTR values ;
REGISTRY_VALUE * val ;
uint32 sizemax , lenmax ;
int i , num_values ;
2002-07-15 14:35:28 +04:00
if ( ! key )
return False ;
2002-08-17 19:34:15 +04:00
ZERO_STRUCTP ( & values ) ;
regval_ctr_init ( & values ) ;
if ( fetch_reg_values ( key , & values ) = = - 1 )
return False ;
lenmax = sizemax = 0 ;
num_values = regval_ctr_numvals ( & values ) ;
val = regval_ctr_specific_value ( & values , 0 ) ;
for ( i = 0 ; i < num_values & & val ; i + + )
{
lenmax = MAX ( lenmax , strlen ( val - > valuename ) + 1 ) ;
sizemax = MAX ( sizemax , val - > size ) ;
val = regval_ctr_specific_value ( & values , i ) ;
}
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
* maxnum = num_values ;
* maxlen = lenmax ;
* maxsize = sizemax ;
regval_ctr_destroy ( & values ) ;
return True ;
2002-07-15 14:35:28 +04:00
}
2002-08-17 19:34:15 +04:00
2002-07-15 14:35:28 +04:00
/********************************************************************
reg_close
2001-02-25 05:14:49 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
WERROR _reg_close ( pipes_struct * p , REG_Q_CLOSE * q_u , REG_R_CLOSE * r_u )
2001-02-25 05:14:49 +03:00
{
/* close the policy handle */
2005-06-17 00:45:55 +04:00
if ( ! close_registry_key ( p , & q_u - > pol ) )
return WERR_BADFID ;
2001-02-25 05:14:49 +03:00
2005-01-10 23:33:41 +03:00
return WERR_OK ;
2001-02-25 05:14:49 +03:00
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-03-24 02:26:33 +03:00
WERROR _reg_open_hklm ( pipes_struct * p , REG_Q_OPEN_HIVE * q_u , REG_R_OPEN_HIVE * r_u )
2002-07-15 14:35:28 +04:00
{
2005-06-17 00:29:15 +04:00
SEC_DESC * sec_desc ;
uint32 access_granted = 0 ;
NTSTATUS status ;
/* perform access checks */
2005-06-17 00:45:55 +04:00
/* top level keys are done here without passing through the REGISTRY_HOOK api */
2005-06-17 00:29:15 +04:00
2005-06-17 00:45:55 +04:00
if ( ! ( sec_desc = construct_registry_sd ( p - > mem_ctx ) ) )
2005-06-17 00:29:15 +04:00
return WERR_NOMEM ;
status = registry_access_check ( sec_desc , p - > pipe_user . nt_user_token , q_u - > access , & access_granted ) ;
if ( ! NT_STATUS_IS_OK ( status ) )
return ntstatus_to_werror ( status ) ;
return open_registry_key ( p , & r_u - > pol , NULL , KEY_HKLM , access_granted ) ;
2002-08-17 19:34:15 +04:00
}
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-03-24 02:26:33 +03:00
WERROR _reg_open_hkcr ( pipes_struct * p , REG_Q_OPEN_HIVE * q_u , REG_R_OPEN_HIVE * r_u )
2002-08-17 19:34:15 +04:00
{
2005-06-17 00:29:15 +04:00
SEC_DESC * sec_desc ;
uint32 access_granted = 0 ;
NTSTATUS status ;
/* perform access checks */
2005-06-17 00:45:55 +04:00
/* top level keys are done here without passing through the REGISTRY_HOOK api */
2005-06-17 00:29:15 +04:00
2005-06-17 00:45:55 +04:00
if ( ! ( sec_desc = construct_registry_sd ( p - > mem_ctx ) ) )
2005-06-17 00:29:15 +04:00
return WERR_NOMEM ;
status = registry_access_check ( sec_desc , p - > pipe_user . nt_user_token , q_u - > access , & access_granted ) ;
if ( ! NT_STATUS_IS_OK ( status ) )
return ntstatus_to_werror ( status ) ;
return open_registry_key ( p , & r_u - > pol , NULL , KEY_HKCR , access_granted ) ;
2002-07-15 14:35:28 +04:00
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-03-24 02:26:33 +03:00
WERROR _reg_open_hku ( pipes_struct * p , REG_Q_OPEN_HIVE * q_u , REG_R_OPEN_HIVE * r_u )
2001-02-25 05:14:49 +03:00
{
2005-06-17 00:29:15 +04:00
SEC_DESC * sec_desc ;
uint32 access_granted = 0 ;
NTSTATUS status ;
/* perform access checks */
2005-06-17 00:45:55 +04:00
/* top level keys are done here without passing through the REGISTRY_HOOK api */
2005-06-17 00:29:15 +04:00
2005-06-17 00:45:55 +04:00
if ( ! ( sec_desc = construct_registry_sd ( p - > mem_ctx ) ) )
2005-06-17 00:29:15 +04:00
return WERR_NOMEM ;
status = registry_access_check ( sec_desc , p - > pipe_user . nt_user_token , q_u - > access , & access_granted ) ;
if ( ! NT_STATUS_IS_OK ( status ) )
return ntstatus_to_werror ( status ) ;
return open_registry_key ( p , & r_u - > pol , NULL , KEY_HKU , access_granted ) ;
2001-02-25 05:14:49 +03:00
}
/*******************************************************************
reg_reply_open_entry
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
WERROR _reg_open_entry ( pipes_struct * p , REG_Q_OPEN_ENTRY * q_u , REG_R_OPEN_ENTRY * r_u )
2001-02-25 05:14:49 +03:00
{
fstring name ;
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * key = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2005-06-17 05:57:18 +04:00
REGISTRY_KEY * newkey ;
uint32 access_granted ;
2005-01-10 23:33:41 +03:00
WERROR result ;
2001-02-25 05:14:49 +03:00
2002-07-15 14:35:28 +04:00
DEBUG ( 5 , ( " reg_open_entry: Enter \n " ) ) ;
2001-02-25 05:14:49 +03:00
2002-07-15 14:35:28 +04:00
if ( ! key )
2005-06-17 00:45:55 +04:00
return WERR_BADFID ;
2005-03-24 02:26:33 +03:00
rpcstr_pull ( name , q_u - > name . string - > buffer , sizeof ( name ) , q_u - > name . string - > uni_str_len * 2 , 0 ) ;
2002-07-15 14:35:28 +04:00
2005-06-17 05:57:18 +04:00
/* check granted access first; what is the correct mask here? */
if ( ! ( key - > access_granted & SEC_RIGHTS_ENUM_SUBKEYS ) )
return WERR_ACCESS_DENIED ;
/* open the key first to get the appropriate REGISTRY_HOOK
and then check the premissions */
if ( ! W_ERROR_IS_OK ( result = open_registry_key ( p , & r_u - > handle , key , name , 0 ) ) )
return result ;
2001-02-25 05:14:49 +03:00
2005-06-17 05:57:18 +04:00
newkey = find_regkey_index_by_hnd ( p , & r_u - > handle ) ;
2001-02-25 05:14:49 +03:00
2005-06-17 05:57:18 +04:00
/* finally allow the backend to check the access for the requested key */
if ( ! regkey_access_check ( newkey , q_u - > access , & access_granted , p - > pipe_user . nt_user_token ) ) {
close_registry_key ( p , & r_u - > handle ) ;
return WERR_ACCESS_DENIED ;
}
/* if successful, save the granted access mask */
newkey - > access_granted = access_granted ;
return WERR_OK ;
2001-02-25 05:14:49 +03:00
}
/*******************************************************************
reg_reply_info
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
WERROR _reg_info ( pipes_struct * p , REG_Q_INFO * q_u , REG_R_INFO * r_u )
2001-02-25 05:14:49 +03:00
{
2005-01-10 23:33:41 +03:00
WERROR status = WERR_BADFILE ;
2002-08-17 19:34:15 +04:00
fstring name ;
2003-01-03 11:28:12 +03:00
const char * value_ascii = " " ;
2002-09-25 19:19:00 +04:00
fstring value ;
int value_length ;
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
REGISTRY_VALUE * val = NULL ;
REGVAL_CTR regvals ;
int i ;
2001-02-25 05:14:49 +03:00
2002-07-15 14:35:28 +04:00
DEBUG ( 5 , ( " _reg_info: Enter \n " ) ) ;
2001-02-25 05:14:49 +03:00
2002-08-17 19:34:15 +04:00
if ( ! regkey )
2005-06-17 00:45:55 +04:00
return WERR_BADFID ;
2002-07-15 14:35:28 +04:00
2002-08-17 19:34:15 +04:00
DEBUG ( 7 , ( " _reg_info: policy key name = [%s] \n " , regkey - > name ) ) ;
2005-03-24 02:26:33 +03:00
rpcstr_pull ( name , q_u - > name . string - > buffer , sizeof ( name ) , q_u - > name . string - > uni_str_len * 2 , 0 ) ;
2001-02-25 05:14:49 +03:00
2002-08-17 19:34:15 +04:00
DEBUG ( 5 , ( " reg_info: looking up value: [%s] \n " , name ) ) ;
2001-02-25 05:14:49 +03:00
2002-08-17 19:34:15 +04:00
ZERO_STRUCTP ( & regvals ) ;
regval_ctr_init ( & regvals ) ;
2001-02-27 23:17:32 +03:00
2002-08-17 19:34:15 +04:00
/* couple of hard coded registry values */
2001-02-25 05:14:49 +03:00
if ( strequal ( name , " RefusePasswordChange " ) ) {
2005-01-10 21:29:52 +03:00
uint32 dwValue ;
2004-12-07 21:25:53 +03:00
if ( ( val = SMB_MALLOC_P ( REGISTRY_VALUE ) ) = = NULL ) {
2003-01-21 06:42:26 +03:00
DEBUG ( 0 , ( " _reg_info: malloc() failed! \n " ) ) ;
2005-01-10 23:33:41 +03:00
return WERR_NOMEM ;
2003-01-21 06:42:26 +03:00
}
2005-01-10 21:29:52 +03:00
2005-02-12 03:51:31 +03:00
if ( ! account_policy_get ( AP_REFUSE_MACHINE_PW_CHANGE , & dwValue ) )
2005-01-10 21:29:52 +03:00
dwValue = 0 ;
regval_ctr_addvalue ( & regvals , " RefusePasswordChange " ,
REG_DWORD ,
( const char * ) & dwValue , sizeof ( dwValue ) ) ;
val = dup_registry_value (
regval_ctr_specific_value ( & regvals , 0 ) ) ;
2005-01-10 23:33:41 +03:00
status = WERR_OK ;
2002-08-17 19:34:15 +04:00
goto out ;
}
2001-02-25 05:14:49 +03:00
2002-08-17 19:34:15 +04:00
if ( strequal ( name , REGSTR_PRODUCTTYPE ) ) {
/* This makes the server look like a member server to clients */
/* which tells clients that we have our own local user and */
/* group databases and helps with ACL support. */
switch ( lp_server_role ( ) ) {
case ROLE_DOMAIN_PDC :
case ROLE_DOMAIN_BDC :
2002-09-25 19:19:00 +04:00
value_ascii = REG_PT_LANMANNT ;
2002-08-17 19:34:15 +04:00
break ;
case ROLE_STANDALONE :
2002-09-25 19:19:00 +04:00
value_ascii = REG_PT_SERVERNT ;
2002-08-17 19:34:15 +04:00
break ;
case ROLE_DOMAIN_MEMBER :
2002-09-25 19:19:00 +04:00
value_ascii = REG_PT_WINNT ;
2002-08-17 19:34:15 +04:00
break ;
}
2002-09-25 19:19:00 +04:00
value_length = push_ucs2 ( value , value , value_ascii ,
sizeof ( value ) ,
STR_TERMINATE | STR_NOALIGN ) ;
regval_ctr_addvalue ( & regvals , REGSTR_PRODUCTTYPE , REG_SZ ,
value , value_length ) ;
2002-08-17 19:34:15 +04:00
val = dup_registry_value ( regval_ctr_specific_value ( & regvals , 0 ) ) ;
2005-01-10 23:33:41 +03:00
status = WERR_OK ;
2002-08-17 19:34:15 +04:00
2001-02-25 05:14:49 +03:00
goto out ;
}
2002-08-17 19:34:15 +04:00
/* else fall back to actually looking up the value */
for ( i = 0 ; fetch_reg_values_specific ( regkey , & val , i ) ; i + + )
{
DEBUG ( 10 , ( " _reg_info: Testing value [%s] \n " , val - > valuename ) ) ;
if ( StrCaseCmp ( val - > valuename , name ) = = 0 ) {
DEBUG ( 10 , ( " _reg_info: Found match for value [%s] \n " , name ) ) ;
2005-01-10 23:33:41 +03:00
status = WERR_OK ;
2002-07-15 14:35:28 +04:00
break ;
2002-08-17 19:34:15 +04:00
}
free_registry_value ( val ) ;
2001-02-25 05:14:49 +03:00
}
2002-08-17 19:34:15 +04:00
out :
2005-03-24 02:26:33 +03:00
init_reg_r_info ( q_u - > ptr_buf , r_u , val , status ) ;
2002-08-17 19:34:15 +04:00
regval_ctr_destroy ( & regvals ) ;
free_registry_value ( val ) ;
2001-02-25 05:14:49 +03:00
2002-08-17 19:34:15 +04:00
DEBUG ( 5 , ( " _reg_info: Exit \n " ) ) ;
2002-07-15 14:35:28 +04:00
return status ;
}
/*****************************************************************************
Implementation of REG_QUERY_KEY
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
WERROR _reg_query_key ( pipes_struct * p , REG_Q_QUERY_KEY * q_u , REG_R_QUERY_KEY * r_u )
2002-07-15 14:35:28 +04:00
{
2005-01-10 23:33:41 +03:00
WERROR status = WERR_OK ;
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2002-07-15 14:35:28 +04:00
DEBUG ( 5 , ( " _reg_query_key: Enter \n " ) ) ;
if ( ! regkey )
2005-06-17 00:45:55 +04:00
return WERR_BADFID ;
2002-07-15 14:35:28 +04:00
if ( ! get_subkey_information ( regkey , & r_u - > num_subkeys , & r_u - > max_subkeylen ) )
2005-01-10 23:33:41 +03:00
return WERR_ACCESS_DENIED ;
2002-07-15 14:35:28 +04:00
if ( ! get_value_information ( regkey , & r_u - > num_values , & r_u - > max_valnamelen , & r_u - > max_valbufsize ) )
2005-01-10 23:33:41 +03:00
return WERR_ACCESS_DENIED ;
2002-08-17 19:34:15 +04:00
2002-07-15 14:35:28 +04:00
r_u - > sec_desc = 0x00000078 ; /* size for key's sec_desc */
/* Win9x set this to 0x0 since it does not keep timestamps.
Doing the same here for simplicity - - jerry */
ZERO_STRUCT ( r_u - > mod_time ) ;
DEBUG ( 5 , ( " _reg_query_key: Exit \n " ) ) ;
return status ;
}
/*****************************************************************************
2005-03-24 02:26:33 +03:00
Implementation of REG_GETVERSION
2002-07-15 14:35:28 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-03-24 02:26:33 +03:00
WERROR _reg_getversion ( pipes_struct * p , REG_Q_GETVERSION * q_u , REG_R_GETVERSION * r_u )
2002-07-15 14:35:28 +04:00
{
2005-01-10 23:33:41 +03:00
WERROR status = WERR_OK ;
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2002-07-15 14:35:28 +04:00
2005-03-24 02:26:33 +03:00
DEBUG ( 5 , ( " _reg_getversion: Enter \n " ) ) ;
2002-07-15 14:35:28 +04:00
if ( ! regkey )
2005-06-17 00:45:55 +04:00
return WERR_BADFID ;
2002-07-15 14:35:28 +04:00
2005-06-17 00:45:55 +04:00
r_u - > win_version = 0x00000005 ; /* Windows 2000 registry API version */
2002-07-15 14:35:28 +04:00
2005-03-24 02:26:33 +03:00
DEBUG ( 5 , ( " _reg_getversion: Exit \n " ) ) ;
2002-07-15 14:35:28 +04:00
return status ;
}
2001-02-25 05:14:49 +03:00
2002-07-15 14:35:28 +04:00
/*****************************************************************************
Implementation of REG_ENUM_KEY
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
WERROR _reg_enum_key ( pipes_struct * p , REG_Q_ENUM_KEY * q_u , REG_R_ENUM_KEY * r_u )
2002-07-15 14:35:28 +04:00
{
2005-01-10 23:33:41 +03:00
WERROR status = WERR_OK ;
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
char * subkey = NULL ;
2002-07-15 14:35:28 +04:00
DEBUG ( 5 , ( " _reg_enum_key: Enter \n " ) ) ;
if ( ! regkey )
2005-06-17 00:45:55 +04:00
return WERR_BADFID ;
2002-07-15 14:35:28 +04:00
DEBUG ( 8 , ( " _reg_enum_key: enumerating key [%s] \n " , regkey - > name ) ) ;
2002-08-17 19:34:15 +04:00
if ( ! fetch_reg_keys_specific ( regkey , & subkey , q_u - > key_index ) )
2002-07-15 14:35:28 +04:00
{
2005-01-10 23:33:41 +03:00
status = WERR_NO_MORE_ITEMS ;
2002-07-15 14:35:28 +04:00
goto done ;
}
DEBUG ( 10 , ( " _reg_enum_key: retrieved subkey named [%s] \n " , subkey ) ) ;
/* subkey has the string name now */
2005-05-23 20:25:31 +04:00
init_reg_r_enum_key ( r_u , subkey ) ;
2002-07-15 14:35:28 +04:00
DEBUG ( 5 , ( " _reg_enum_key: Exit \n " ) ) ;
done :
2002-08-17 19:34:15 +04:00
SAFE_FREE ( subkey ) ;
return status ;
}
/*****************************************************************************
Implementation of REG_ENUM_VALUE
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
WERROR _reg_enum_value ( pipes_struct * p , REG_Q_ENUM_VALUE * q_u , REG_R_ENUM_VALUE * r_u )
2002-08-17 19:34:15 +04:00
{
2005-01-10 23:33:41 +03:00
WERROR status = WERR_OK ;
2002-08-17 19:34:15 +04:00
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
REGISTRY_VALUE * val ;
DEBUG ( 5 , ( " _reg_enum_value: Enter \n " ) ) ;
if ( ! regkey )
2005-06-17 00:45:55 +04:00
return WERR_BADFID ;
2002-08-17 19:34:15 +04:00
DEBUG ( 8 , ( " _reg_enum_key: enumerating values for key [%s] \n " , regkey - > name ) ) ;
2005-04-05 21:49:16 +04:00
if ( ! fetch_reg_values_specific ( regkey , & val , q_u - > val_index ) ) {
2005-01-10 23:33:41 +03:00
status = WERR_NO_MORE_ITEMS ;
2002-08-17 19:34:15 +04:00
goto done ;
}
DEBUG ( 10 , ( " _reg_enum_value: retrieved value named [%s] \n " , val - > valuename ) ) ;
/* subkey has the string name now */
init_reg_r_enum_val ( r_u , val ) ;
DEBUG ( 5 , ( " _reg_enum_value: Exit \n " ) ) ;
done :
free_registry_value ( val ) ;
2001-02-25 05:14:49 +03:00
return status ;
}
2001-08-24 03:25:34 +04:00
2002-07-15 14:35:28 +04:00
2001-08-24 03:25:34 +04:00
/*******************************************************************
reg_shutdwon
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
WERROR _reg_shutdown ( pipes_struct * p , REG_Q_SHUTDOWN * q_u , REG_R_SHUTDOWN * r_u )
2001-08-24 03:25:34 +04:00
{
2005-03-24 02:26:33 +03:00
REG_Q_SHUTDOWN_EX q_u_ex ;
REG_R_SHUTDOWN_EX r_u_ex ;
/* copy fields (including stealing memory) */
q_u_ex . server = q_u - > server ;
q_u_ex . message = q_u - > message ;
q_u_ex . timeout = q_u - > timeout ;
q_u_ex . force = q_u - > force ;
q_u_ex . reboot = q_u - > reboot ;
q_u_ex . reason = 0x0 ; /* don't care for now */
/* thunk down to _reg_shutdown_ex() (just returns a status) */
return _reg_shutdown_ex ( p , & q_u_ex , & r_u_ex ) ;
}
/*******************************************************************
reg_shutdown_ex
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
# define SHUTDOWN_R_STRING "-r"
# define SHUTDOWN_F_STRING "-f"
WERROR _reg_shutdown_ex ( pipes_struct * p , REG_Q_SHUTDOWN_EX * q_u , REG_R_SHUTDOWN_EX * r_u )
{
2001-08-24 03:25:34 +04:00
pstring shutdown_script ;
pstring message ;
2001-08-24 11:51:59 +04:00
pstring chkmsg ;
2001-08-24 03:25:34 +04:00
fstring timeout ;
2005-03-24 02:26:33 +03:00
fstring reason ;
2001-08-24 03:25:34 +04:00
fstring r ;
fstring f ;
2005-03-24 02:26:33 +03:00
int ret ;
BOOL can_shutdown ;
2001-08-24 03:25:34 +04:00
2005-05-23 20:25:31 +04:00
2005-03-24 02:26:33 +03:00
pstrcpy ( shutdown_script , lp_shutdown_script ( ) ) ;
if ( ! * shutdown_script )
return WERR_ACCESS_DENIED ;
/* pull the message string and perform necessary sanity checks on it */
pstrcpy ( message , " " ) ;
if ( q_u - > message ) {
UNISTR2 * msg_string = q_u - > message - > string ;
2005-05-23 20:25:31 +04:00
2005-03-24 02:26:33 +03:00
rpcstr_pull ( message , msg_string - > buffer , sizeof ( message ) , msg_string - > uni_str_len * 2 , 0 ) ;
}
2001-08-24 18:34:23 +04:00
alpha_strcpy ( chkmsg , message , NULL , sizeof ( message ) ) ;
2005-03-24 02:26:33 +03:00
2003-07-23 16:33:59 +04:00
fstr_sprintf ( timeout , " %d " , q_u - > timeout ) ;
fstr_sprintf ( r , ( q_u - > reboot ) ? SHUTDOWN_R_STRING : " " ) ;
fstr_sprintf ( f , ( q_u - > force ) ? SHUTDOWN_F_STRING : " " ) ;
2005-03-24 02:26:33 +03:00
fstr_sprintf ( reason , " %d " , q_u - > reason ) ;
2001-08-24 03:25:34 +04:00
2005-03-24 02:26:33 +03:00
all_string_sub ( shutdown_script , " %z " , chkmsg , sizeof ( shutdown_script ) ) ;
all_string_sub ( shutdown_script , " %t " , timeout , sizeof ( shutdown_script ) ) ;
all_string_sub ( shutdown_script , " %r " , r , sizeof ( shutdown_script ) ) ;
all_string_sub ( shutdown_script , " %f " , f , sizeof ( shutdown_script ) ) ;
all_string_sub ( shutdown_script , " %x " , reason , sizeof ( shutdown_script ) ) ;
2005-05-23 20:25:31 +04:00
2005-03-24 02:26:33 +03:00
can_shutdown = user_has_privileges ( p - > pipe_user . nt_user_token , & se_remote_shutdown ) ;
2005-01-18 21:30:32 +03:00
2005-03-24 02:26:33 +03:00
/* IF someone has privs, run the shutdown script as root. OTHERWISE run it as not root
Take the error return from the script and provide it as the Windows return code . */
2005-04-05 21:49:16 +04:00
/********** BEGIN SeRemoteShutdownPrivilege BLOCK **********/
if ( can_shutdown )
become_root ( ) ;
2005-03-24 02:26:33 +03:00
ret = smbrun ( shutdown_script , NULL ) ;
2005-04-05 21:49:16 +04:00
if ( can_shutdown )
unbecome_root ( ) ;
/********** END SeRemoteShutdownPrivilege BLOCK **********/
2005-05-23 20:25:31 +04:00
2005-03-24 02:26:33 +03:00
DEBUG ( 3 , ( " _reg_shutdown_ex: Running the command `%s' gave %d \n " ,
shutdown_script , ret ) ) ;
2001-08-24 03:25:34 +04:00
2005-03-24 02:26:33 +03:00
return ( ret = = 0 ) ? WERR_OK : WERR_ACCESS_DENIED ;
2001-08-24 03:25:34 +04:00
}
2001-08-24 11:51:59 +04:00
2005-03-24 02:26:33 +03:00
2002-07-15 14:35:28 +04:00
/*******************************************************************
reg_abort_shutdwon
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
WERROR _reg_abort_shutdown ( pipes_struct * p , REG_Q_ABORT_SHUTDOWN * q_u , REG_R_ABORT_SHUTDOWN * r_u )
2001-08-24 11:51:59 +04:00
{
pstring abort_shutdown_script ;
2005-03-24 02:26:33 +03:00
int ret ;
BOOL can_shutdown ;
2001-08-24 11:51:59 +04:00
pstrcpy ( abort_shutdown_script , lp_abort_shutdown_script ( ) ) ;
2005-03-24 02:26:33 +03:00
if ( ! * abort_shutdown_script )
return WERR_ACCESS_DENIED ;
2005-01-18 21:30:32 +03:00
2005-03-24 02:26:33 +03:00
can_shutdown = user_has_privileges ( p - > pipe_user . nt_user_token , & se_remote_shutdown ) ;
2005-01-18 21:30:32 +03:00
2005-04-05 21:49:16 +04:00
/********** BEGIN SeRemoteShutdownPrivilege BLOCK **********/
2005-03-24 02:26:33 +03:00
2005-04-05 21:49:16 +04:00
if ( can_shutdown )
become_root ( ) ;
2005-03-24 02:26:33 +03:00
ret = smbrun ( abort_shutdown_script , NULL ) ;
2005-04-05 21:49:16 +04:00
if ( can_shutdown )
unbecome_root ( ) ;
/********** END SeRemoteShutdownPrivilege BLOCK **********/
2005-03-24 02:26:33 +03:00
DEBUG ( 3 , ( " _reg_abort_shutdown: Running the command `%s' gave %d \n " ,
abort_shutdown_script , ret ) ) ;
2001-08-24 11:51:59 +04:00
2005-03-24 02:26:33 +03:00
return ( ret = = 0 ) ? WERR_OK : WERR_ACCESS_DENIED ;
2001-08-24 11:51:59 +04:00
}
2002-07-15 14:35:28 +04:00
2005-05-23 20:25:31 +04:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static int validate_reg_filename ( pstring fname )
{
char * p ;
int num_services = lp_numservices ( ) ;
int snum ;
pstring share_path ;
pstring unix_fname ;
/* convert to a unix path, stripping the C:\ along the way */
if ( ! ( p = valid_share_pathname ( fname ) ) )
return - 1 ;
/* has to exist within a valid file share */
for ( snum = 0 ; snum < num_services ; snum + + ) {
if ( ! lp_snum_ok ( snum ) | | lp_print_ok ( snum ) )
continue ;
pstrcpy ( share_path , lp_pathname ( snum ) ) ;
/* make sure we have a path (e.g. [homes] ) */
if ( strlen ( share_path ) = = 0 )
continue ;
if ( strncmp ( share_path , p , strlen ( share_path ) ) = = 0 )
break ;
}
/* p and fname are overlapping memory so copy out and back in again */
pstrcpy ( unix_fname , p ) ;
pstrcpy ( fname , unix_fname ) ;
return ( snum < num_services ) ? snum : - 1 ;
}
2005-06-09 19:20:11 +04:00
/*******************************************************************
Note : topkeypaty is the * full * path that this * key will be
loaded into ( including the name of the key )
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR reg_load_tree ( REGF_FILE * regfile , const char * topkeypath ,
REGF_NK_REC * key )
{
REGF_NK_REC * subkey ;
REGISTRY_KEY registry_key ;
REGVAL_CTR values ;
REGSUBKEY_CTR subkeys ;
int i ;
pstring path ;
WERROR result = WERR_OK ;
/* initialize the REGISTRY_KEY structure */
if ( ! ( registry_key . hook = reghook_cache_find ( topkeypath ) ) ) {
DEBUG ( 0 , ( " reg_load_tree: Failed to assigned a REGISTRY_HOOK to [%s] \n " ,
topkeypath ) ) ;
return WERR_BADFILE ;
}
pstrcpy ( registry_key . name , topkeypath ) ;
/* now start parsing the values and subkeys */
ZERO_STRUCT ( values ) ;
ZERO_STRUCT ( subkeys ) ;
regsubkey_ctr_init ( & subkeys ) ;
regval_ctr_init ( & values ) ;
/* copy values into the REGVAL_CTR */
for ( i = 0 ; i < key - > num_values ; i + + ) {
regval_ctr_addvalue ( & values , key - > values [ i ] . valuename , key - > values [ i ] . type ,
key - > values [ i ] . data , ( key - > values [ i ] . data_size & ~ VK_DATA_IN_OFFSET ) ) ;
}
/* copy subkeys into the REGSUBKEY_CTR */
key - > subkey_index = 0 ;
while ( ( subkey = regfio_fetch_subkey ( regfile , key ) ) ) {
regsubkey_ctr_addkey ( & subkeys , subkey - > keyname ) ;
}
/* write this key and values out */
if ( ! store_reg_values ( & registry_key , & values )
| | ! store_reg_keys ( & registry_key , & subkeys ) )
{
DEBUG ( 0 , ( " reg_load_tree: Failed to load %s! \n " , topkeypath ) ) ;
result = WERR_REG_IO_FAILURE ;
}
regval_ctr_destroy ( & values ) ;
regsubkey_ctr_destroy ( & subkeys ) ;
if ( ! W_ERROR_IS_OK ( result ) )
return result ;
/* now continue to load each subkey registry tree */
key - > subkey_index = 0 ;
while ( ( subkey = regfio_fetch_subkey ( regfile , key ) ) ) {
pstr_sprintf ( path , " %s%s%s " , topkeypath , " \\ " , subkey - > keyname ) ;
result = reg_load_tree ( regfile , path , subkey ) ;
if ( ! W_ERROR_IS_OK ( result ) )
break ;
}
return result ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR restore_registry_key ( REGISTRY_KEY * krecord , const char * fname )
{
REGF_FILE * regfile ;
REGF_NK_REC * rootkey ;
WERROR result ;
/* open the registry file....fail if the file already exists */
if ( ! ( regfile = regfio_open ( fname , ( O_RDONLY ) , 0 ) ) ) {
DEBUG ( 0 , ( " backup_registry_key: failed to open \" %s \" (%s) \n " ,
fname , strerror ( errno ) ) ) ;
return ( ntstatus_to_werror ( map_nt_error_from_unix ( errno ) ) ) ;
}
/* get the rootkey from the regf file and then load the tree
via recursive calls */
if ( ! ( rootkey = regfio_rootkey ( regfile ) ) )
return WERR_REG_FILE_INVALID ;
result = reg_load_tree ( regfile , krecord - > name , rootkey ) ;
/* cleanup */
regfio_close ( regfile ) ;
return result ;
}
2002-08-17 19:34:15 +04:00
/*******************************************************************
2005-04-05 21:49:16 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_restore_key ( pipes_struct * p , REG_Q_RESTORE_KEY * q_u , REG_R_RESTORE_KEY * r_u )
{
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2005-04-07 08:58:38 +04:00
pstring filename ;
2005-05-23 20:25:31 +04:00
int snum ;
2005-04-05 21:49:16 +04:00
DEBUG ( 5 , ( " _reg_restore_key: Enter \n " ) ) ;
if ( ! regkey )
return WERR_BADFID ;
2005-04-07 08:58:38 +04:00
rpcstr_pull ( filename , q_u - > filename . string - > buffer , sizeof ( filename ) , q_u - > filename . string - > uni_str_len * 2 , STR_TERMINATE ) ;
DEBUG ( 8 , ( " _reg_restore_key: verifying restore of key [%s] from \" %s \" \n " , regkey - > name , filename ) ) ;
2005-04-05 21:49:16 +04:00
2005-05-23 20:25:31 +04:00
if ( ( snum = validate_reg_filename ( filename ) ) = = - 1 )
return WERR_OBJECT_PATH_INVALID ;
2005-06-09 19:20:11 +04:00
/* user must posses SeRestorePrivilege for this this proceed */
if ( ! user_has_privileges ( p - > pipe_user . nt_user_token , & se_restore ) )
return WERR_ACCESS_DENIED ;
2005-05-23 20:25:31 +04:00
DEBUG ( 2 , ( " _reg_restore_key: Restoring [%s] from %s in share %s \n " , regkey - > name , filename , lp_servicename ( snum ) ) ) ;
2005-04-05 21:49:16 +04:00
return restore_registry_key ( regkey , filename ) ;
}
2005-05-23 20:25:31 +04:00
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR reg_write_tree ( REGF_FILE * regfile , const char * keypath ,
REGF_NK_REC * parent , SEC_DESC * sec_desc )
{
REGF_NK_REC * key ;
REGVAL_CTR values ;
REGSUBKEY_CTR subkeys ;
int i , num_subkeys ;
pstring key_tmp ;
char * keyname , * parentpath ;
pstring subkeypath ;
char * subkeyname ;
REGISTRY_KEY registry_key ;
WERROR result = WERR_OK ;
if ( ! regfile )
return WERR_GENERAL_FAILURE ;
if ( ! keypath )
return WERR_OBJECT_PATH_INVALID ;
/* split up the registry key path */
pstrcpy ( key_tmp , keypath ) ;
if ( ! reg_split_key ( key_tmp , & parentpath , & keyname ) )
return WERR_OBJECT_PATH_INVALID ;
if ( ! keyname )
keyname = parentpath ;
/* we need a REGISTRY_KEY object here to enumerate subkeys and values */
ZERO_STRUCT ( registry_key ) ;
pstrcpy ( registry_key . name , keypath ) ;
if ( ! ( registry_key . hook = reghook_cache_find ( registry_key . name ) ) )
return WERR_BADFILE ;
/* lookup the values and subkeys */
ZERO_STRUCT ( values ) ;
ZERO_STRUCT ( subkeys ) ;
regsubkey_ctr_init ( & subkeys ) ;
regval_ctr_init ( & values ) ;
fetch_reg_keys ( & registry_key , & subkeys ) ;
fetch_reg_values ( & registry_key , & values ) ;
/* write out this key */
if ( ! ( key = regfio_write_key ( regfile , keyname , & values , & subkeys , sec_desc , parent ) ) ) {
result = WERR_CAN_NOT_COMPLETE ;
goto done ;
}
/* write each one of the subkeys out */
num_subkeys = regsubkey_ctr_numkeys ( & subkeys ) ;
for ( i = 0 ; i < num_subkeys ; i + + ) {
subkeyname = regsubkey_ctr_specific_key ( & subkeys , i ) ;
pstr_sprintf ( subkeypath , " %s \\ %s " , keypath , subkeyname ) ;
result = reg_write_tree ( regfile , subkeypath , key , sec_desc ) ;
if ( ! W_ERROR_IS_OK ( result ) )
goto done ;
}
DEBUG ( 6 , ( " reg_write_tree: wrote key [%s] \n " , keypath ) ) ;
done :
regval_ctr_destroy ( & values ) ;
regsubkey_ctr_destroy ( & subkeys ) ;
return result ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR make_default_reg_sd ( TALLOC_CTX * ctx , SEC_DESC * * psd )
{
DOM_SID adm_sid , owner_sid ;
SEC_ACE ace [ 2 ] ; /* at most 2 entries */
SEC_ACCESS mask ;
SEC_ACL * psa = NULL ;
uint32 sd_size ;
/* set the owner to BUILTIN\Administrator */
sid_copy ( & owner_sid , & global_sid_Builtin ) ;
sid_append_rid ( & owner_sid , DOMAIN_USER_RID_ADMIN ) ;
/* basic access for Everyone */
init_sec_access ( & mask , reg_map . generic_execute | reg_map . generic_read ) ;
init_sec_ace ( & ace [ 0 ] , & global_sid_World , SEC_ACE_TYPE_ACCESS_ALLOWED , mask , 0 ) ;
/* add Full Access 'BUILTIN\Administrators' */
init_sec_access ( & mask , reg_map . generic_all ) ;
sid_copy ( & adm_sid , & global_sid_Builtin ) ;
sid_append_rid ( & adm_sid , BUILTIN_ALIAS_RID_ADMINS ) ;
init_sec_ace ( & ace [ 1 ] , & adm_sid , SEC_ACE_TYPE_ACCESS_ALLOWED , mask , 0 ) ;
/* create the security descriptor */
if ( ( psa = make_sec_acl ( ctx , NT4_ACL_REVISION , 2 , ace ) ) = = NULL )
return WERR_NOMEM ;
if ( ( * psd = make_sec_desc ( ctx , SEC_DESC_REVISION , SEC_DESC_SELF_RELATIVE , & owner_sid , NULL , NULL , psa , & sd_size ) ) = = NULL )
return WERR_NOMEM ;
return WERR_OK ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static WERROR backup_registry_key ( REGISTRY_KEY * krecord , const char * fname )
{
REGF_FILE * regfile ;
WERROR result ;
SEC_DESC * sd = NULL ;
/* open the registry file....fail if the file already exists */
if ( ! ( regfile = regfio_open ( fname , ( O_RDWR | O_CREAT | O_EXCL ) , ( S_IREAD | S_IWRITE ) ) ) ) {
DEBUG ( 0 , ( " backup_registry_key: failed to open \" %s \" (%s) \n " ,
fname , strerror ( errno ) ) ) ;
return ( ntstatus_to_werror ( map_nt_error_from_unix ( errno ) ) ) ;
}
if ( ! W_ERROR_IS_OK ( result = make_default_reg_sd ( regfile - > mem_ctx , & sd ) ) ) {
regfio_close ( regfile ) ;
return result ;
}
/* write the registry tree to the file */
result = reg_write_tree ( regfile , krecord - > name , NULL , sd ) ;
/* cleanup */
regfio_close ( regfile ) ;
return result ;
}
2005-04-05 21:49:16 +04:00
/*******************************************************************
2002-08-17 19:34:15 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-01-10 23:33:41 +03:00
WERROR _reg_save_key ( pipes_struct * p , REG_Q_SAVE_KEY * q_u , REG_R_SAVE_KEY * r_u )
2002-08-17 19:34:15 +04:00
{
REGISTRY_KEY * regkey = find_regkey_index_by_hnd ( p , & q_u - > pol ) ;
2005-04-07 08:58:38 +04:00
pstring filename ;
2005-05-23 20:25:31 +04:00
int snum ;
2002-08-17 19:34:15 +04:00
DEBUG ( 5 , ( " _reg_save_key: Enter \n " ) ) ;
2005-05-23 20:25:31 +04:00
2002-08-17 19:34:15 +04:00
if ( ! regkey )
2005-04-05 21:49:16 +04:00
return WERR_BADFID ;
2002-08-17 19:34:15 +04:00
2005-04-07 08:58:38 +04:00
rpcstr_pull ( filename , q_u - > filename . string - > buffer , sizeof ( filename ) , q_u - > filename . string - > uni_str_len * 2 , STR_TERMINATE ) ;
DEBUG ( 8 , ( " _reg_save_key: verifying backup of key [%s] to \" %s \" \n " , regkey - > name , filename ) ) ;
2005-05-23 20:25:31 +04:00
if ( ( snum = validate_reg_filename ( filename ) ) = = - 1 )
return WERR_OBJECT_PATH_INVALID ;
DEBUG ( 2 , ( " _reg_save_key: Saving [%s] to %s in share %s \n " , regkey - > name , filename , lp_servicename ( snum ) ) ) ;
2005-04-05 21:49:16 +04:00
return backup_registry_key ( regkey , filename ) ;
2002-08-17 19:34:15 +04:00
2005-01-10 23:33:41 +03:00
return WERR_OK ;
2002-08-17 19:34:15 +04:00
}
2005-06-17 00:04:16 +04:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_create_key ( pipes_struct * p , REG_Q_CREATE_KEY * q_u , REG_R_CREATE_KEY * r_u )
{
return WERR_ACCESS_DENIED ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_set_value ( pipes_struct * p , REG_Q_SET_VALUE * q_u , REG_R_SET_VALUE * r_u )
{
return WERR_ACCESS_DENIED ;
}
2002-07-15 14:35:28 +04:00
2005-06-17 00:59:39 +04:00
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_delete_key ( pipes_struct * p , REG_Q_DELETE_KEY * q_u , REG_R_DELETE_KEY * r_u )
{
return WERR_ACCESS_DENIED ;
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
WERROR _reg_delete_value ( pipes_struct * p , REG_Q_DELETE_VALUE * q_u , REG_R_DELETE_VALUE * r_u )
{
return WERR_ACCESS_DENIED ;
}