source: trunk/lib/regfi.c @ 112

Last change on this file since 112 was 111, checked in by tim, 17 years ago

Switched license to GPLv3

Added early version of new tool, reglookup-recover

Many library changes made to support this new tool

  • Property svn:keywords set to Id
File size: 45.8 KB
Line 
1/*
2 * Branched from Samba project Subversion repository, version #7470:
3 *   http://viewcvs.samba.org/cgi-bin/viewcvs.cgi/trunk/source/registry/regfio.c?rev=7470&view=auto
4 *
5 * Unix SMB/CIFS implementation.
6 * Windows NT registry I/O library
7 *
8 * Copyright (C) 2005-2008 Timothy D. Morgan
9 * Copyright (C) 2005 Gerald (Jerry) Carter
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; version 3 of the License.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 
23 *
24 * $Id: regfi.c 111 2008-05-01 04:06:22Z tim $
25 */
26
27#include "../include/regfi.h"
28
29
30/* Registry types mapping */
31const unsigned int regfi_num_reg_types = 12;
32static const char* regfi_type_names[] =
33  {"NONE", "SZ", "EXPAND_SZ", "BINARY", "DWORD", "DWORD_BE", "LINK",
34   "MULTI_SZ", "RSRC_LIST", "RSRC_DESC", "RSRC_REQ_LIST", "QWORD"};
35
36
37/* Returns NULL on error */
38const char* regfi_type_val2str(unsigned int val)
39{
40  if(val == REG_KEY)
41    return "KEY";
42 
43  if(val >= regfi_num_reg_types)
44    return NULL;
45 
46  return regfi_type_names[val];
47}
48
49
50/* Returns -1 on error */
51int regfi_type_str2val(const char* str)
52{
53  int i;
54
55  if(strcmp("KEY", str) == 0)
56    return REG_KEY;
57
58  for(i=0; i < regfi_num_reg_types; i++)
59    if (strcmp(regfi_type_names[i], str) == 0) 
60      return i;
61
62  if(strcmp("DWORD_LE", str) == 0)
63    return REG_DWORD_LE;
64
65  return -1;
66}
67
68
69/* Security descriptor parsing functions  */
70
71const char* regfi_ace_type2str(uint8 type)
72{
73  static const char* map[7] 
74    = {"ALLOW", "DENY", "AUDIT", "ALARM", 
75       "ALLOW CPD", "OBJ ALLOW", "OBJ DENY"};
76  if(type < 7)
77    return map[type];
78  else
79    /* XXX: would be nice to return the unknown integer value. 
80     *      However, as it is a const string, it can't be free()ed later on,
81     *      so that would need to change.
82     */
83    return "UNKNOWN";
84}
85
86
87/* XXX: need a better reference on the meaning of each flag. */
88/* For more info, see:
89 *   http://msdn2.microsoft.com/en-us/library/aa772242.aspx
90 */
91char* regfi_ace_flags2str(uint8 flags)
92{
93  static const char* flag_map[32] = 
94    { "OI", /* Object Inherit */
95      "CI", /* Container Inherit */
96      "NP", /* Non-Propagate */
97      "IO", /* Inherit Only */
98      "IA", /* Inherited ACE */
99      NULL,
100      NULL,
101      NULL,
102    };
103
104  char* ret_val = malloc(35*sizeof(char));
105  char* fo = ret_val;
106  uint32 i;
107  uint8 f;
108
109  if(ret_val == NULL)
110    return NULL;
111
112  fo[0] = '\0';
113  if (!flags)
114    return ret_val;
115
116  for(i=0; i < 8; i++)
117  {
118    f = (1<<i);
119    if((flags & f) && (flag_map[i] != NULL))
120    {
121      strcpy(fo, flag_map[i]);
122      fo += strlen(flag_map[i]);
123      *(fo++) = ' ';
124      flags ^= f;
125    }
126  }
127 
128  /* Any remaining unknown flags are added at the end in hex. */
129  if(flags != 0)
130    sprintf(fo, "0x%.2X ", flags);
131
132  /* Chop off the last space if we've written anything to ret_val */
133  if(fo != ret_val)
134    fo[-1] = '\0';
135
136  /* XXX: what was this old VI flag for??
137     XXX: Is this check right?  0xF == 1|2|4|8, which makes it redundant...
138  if (flags == 0xF) {
139    if (some) strcat(flg_output, " ");
140    some = 1;
141    strcat(flg_output, "VI");
142  }
143  */
144
145  return ret_val;
146}
147
148
149char* regfi_ace_perms2str(uint32 perms)
150{
151  uint32 i, p;
152  /* This is more than is needed by a fair margin. */
153  char* ret_val = malloc(350*sizeof(char));
154  char* r = ret_val;
155
156  /* Each represents one of 32 permissions bits.  NULL is for undefined/reserved bits.
157   * For more information, see:
158   *   http://msdn2.microsoft.com/en-gb/library/aa374892.aspx
159   *   http://msdn2.microsoft.com/en-gb/library/ms724878.aspx
160   */
161  static const char* perm_map[32] = 
162    {/* object-specific permissions (registry keys, in this case) */
163      "QRY_VAL",       /* KEY_QUERY_VALUE */
164      "SET_VAL",       /* KEY_SET_VALUE */
165      "CREATE_KEY",    /* KEY_CREATE_SUB_KEY */
166      "ENUM_KEYS",     /* KEY_ENUMERATE_SUB_KEYS */
167      "NOTIFY",        /* KEY_NOTIFY */
168      "CREATE_LNK",    /* KEY_CREATE_LINK - Reserved for system use. */
169      NULL,
170      NULL,
171      "WOW64_64",      /* KEY_WOW64_64KEY */
172      "WOW64_32",      /* KEY_WOW64_32KEY */
173      NULL,
174      NULL,
175      NULL,
176      NULL,
177      NULL,
178      NULL,
179      /* standard access rights */
180      "DELETE",        /* DELETE */
181      "R_CONT",        /* READ_CONTROL */
182      "W_DAC",         /* WRITE_DAC */
183      "W_OWNER",       /* WRITE_OWNER */
184      "SYNC",          /* SYNCHRONIZE - Shouldn't be set in registries */
185      NULL,
186      NULL,
187      NULL,
188      /* other generic */
189      "SYS_SEC",       /* ACCESS_SYSTEM_SECURITY */
190      "MAX_ALLWD",     /* MAXIMUM_ALLOWED */
191      NULL,
192      NULL,
193      "GEN_A",         /* GENERIC_ALL */
194      "GEN_X",         /* GENERIC_EXECUTE */
195      "GEN_W",         /* GENERIC_WRITE */
196      "GEN_R",         /* GENERIC_READ */
197    };
198
199
200  if(ret_val == NULL)
201    return NULL;
202
203  r[0] = '\0';
204  for(i=0; i < 32; i++)
205  {
206    p = (1<<i);
207    if((perms & p) && (perm_map[i] != NULL))
208    {
209      strcpy(r, perm_map[i]);
210      r += strlen(perm_map[i]);
211      *(r++) = ' ';
212      perms ^= p;
213    }
214  }
215 
216  /* Any remaining unknown permission bits are added at the end in hex. */
217  if(perms != 0)
218    sprintf(r, "0x%.8X ", perms);
219
220  /* Chop off the last space if we've written anything to ret_val */
221  if(r != ret_val)
222    r[-1] = '\0';
223
224  return ret_val;
225}
226
227
228char* regfi_sid2str(DOM_SID* sid)
229{
230  uint32 i, size = MAXSUBAUTHS*11 + 24;
231  uint32 left = size;
232  uint8 comps = sid->num_auths;
233  char* ret_val = malloc(size);
234 
235  if(ret_val == NULL)
236    return NULL;
237
238  if(comps > MAXSUBAUTHS)
239    comps = MAXSUBAUTHS;
240
241  left -= sprintf(ret_val, "S-%u-%u", sid->sid_rev_num, sid->id_auth[5]);
242
243  for (i = 0; i < comps; i++) 
244    left -= snprintf(ret_val+(size-left), left, "-%u", sid->sub_auths[i]);
245
246  return ret_val;
247}
248
249
250char* regfi_get_acl(SEC_ACL* acl)
251{
252  uint32 i, extra, size = 0;
253  const char* type_str;
254  char* flags_str;
255  char* perms_str;
256  char* sid_str;
257  char* ace_delim = "";
258  char* ret_val = NULL;
259  char* tmp_val = NULL;
260  bool failed = false;
261  char field_delim = ':';
262
263  for (i = 0; i < acl->num_aces && !failed; i++)
264  {
265    sid_str = regfi_sid2str(&acl->ace[i].trustee);
266    type_str = regfi_ace_type2str(acl->ace[i].type);
267    perms_str = regfi_ace_perms2str(acl->ace[i].info.mask);
268    flags_str = regfi_ace_flags2str(acl->ace[i].flags);
269   
270    if(flags_str != NULL && perms_str != NULL 
271       && type_str != NULL && sid_str != NULL)
272    {
273      /* XXX: this is slow */
274      extra = strlen(sid_str) + strlen(type_str) 
275        + strlen(perms_str) + strlen(flags_str)+5;
276      tmp_val = realloc(ret_val, size+extra);
277
278      if(tmp_val == NULL)
279      {
280        free(ret_val);
281        failed = true;
282      }
283      else
284      {
285        ret_val = tmp_val;
286        size += snprintf(ret_val+size, extra, "%s%s%c%s%c%s%c%s",
287                         ace_delim,sid_str,
288                         field_delim,type_str,
289                         field_delim,perms_str,
290                         field_delim,flags_str);
291        ace_delim = "|";
292      }
293    }
294    else
295      failed = true;
296
297    if(sid_str != NULL)
298      free(sid_str);
299    if(sid_str != NULL)
300      free(perms_str);
301    if(sid_str != NULL)
302      free(flags_str);
303  }
304
305  return ret_val;
306}
307
308
309char* regfi_get_sacl(SEC_DESC *sec_desc)
310{
311  if (sec_desc->sacl)
312    return regfi_get_acl(sec_desc->sacl);
313  else
314    return NULL;
315}
316
317
318char* regfi_get_dacl(SEC_DESC *sec_desc)
319{
320  if (sec_desc->dacl)
321    return regfi_get_acl(sec_desc->dacl);
322  else
323    return NULL;
324}
325
326
327char* regfi_get_owner(SEC_DESC *sec_desc)
328{
329  return regfi_sid2str(sec_desc->owner_sid);
330}
331
332
333char* regfi_get_group(SEC_DESC *sec_desc)
334{
335  return regfi_sid2str(sec_desc->grp_sid);
336}
337
338
339/*****************************************************************************
340 * This function is just like read(2), except that it continues to
341 * re-try reading from the file descriptor if EINTR or EAGAIN is received. 
342 * regfi_read will attempt to read length bytes from fd and write them to buf.
343 *
344 * On success, 0 is returned.  Upon failure, an errno code is returned.
345 *
346 * The number of bytes successfully read is returned through the length
347 * parameter by reference.  If both the return value and length parameter are
348 * returned as 0, then EOF was encountered immediately
349 *****************************************************************************/
350uint32 regfi_read(int fd, uint8* buf, uint32* length)
351{
352  uint32 rsize = 0;
353  uint32 rret = 0;
354
355  do
356  {
357    rret = read(fd, buf + rsize, *length - rsize);
358    if(rret > 0)
359      rsize += rret;
360  }while(*length - rsize > 0 
361         && (rret > 0 || (rret == -1 && (errno == EAGAIN || errno == EINTR))));
362 
363  *length = rsize;
364  if (rret == -1 && errno != EINTR && errno != EAGAIN)
365    return errno;
366
367  return 0;
368}
369
370
371/*****************************************************************************
372 *
373 *****************************************************************************/
374bool regfi_parse_cell(int fd, uint32 offset, uint8* hdr, uint32 hdr_len,
375                      uint32* cell_length, bool* unalloc)
376{
377  uint32 length;
378  int32 raw_length;
379  uint8 tmp[4];
380
381  if(lseek(fd, offset, SEEK_SET) == -1)
382    return false;
383
384  length = 4;
385  if((regfi_read(fd, tmp, &length) != 0) || length != 4)
386    return false;
387  raw_length = IVALS(tmp, 0);
388
389  if(raw_length < 0)
390  {
391    (*cell_length) = raw_length*(-1);
392    (*unalloc) = false;
393  }
394  else
395  {
396    (*cell_length) = raw_length;
397    (*unalloc) = true;
398  }
399
400  if(*cell_length - 4 < hdr_len)
401    return false;
402
403  if(hdr_len > 0)
404  {
405    length = hdr_len;
406    if((regfi_read(fd, hdr, &length) != 0) || length != hdr_len)
407      return false;
408  }
409
410  return true;
411}
412
413
414/*******************************************************************
415 * Given an offset and an hbin, is the offset within that hbin?
416 * The offset is a virtual file offset.
417 *******************************************************************/
418static bool regfi_offset_in_hbin(REGF_HBIN* hbin, uint32 offset)
419{
420  if(!hbin)
421    return false;
422
423  if((offset > hbin->first_hbin_off) 
424     && (offset < (hbin->first_hbin_off + hbin->block_size)))
425    return true;
426               
427  return false;
428}
429
430
431
432/*******************************************************************
433 * Given a virtual offset, and receive the correpsonding HBIN
434 * block for it.  NULL if one doesn't exist.
435 *******************************************************************/
436REGF_HBIN* regfi_lookup_hbin(REGF_FILE* file, uint32 offset)
437{
438  return (REGF_HBIN*)range_list_find_data(file->hbins, offset+REGF_BLOCKSIZE);
439}
440
441
442
443/*******************************************************************
444 TODO: not currently validating against max_size
445 *******************************************************************/
446REGF_HASH_LIST* regfi_load_hashlist(REGF_FILE* file, uint32 offset, 
447                                    uint32 num_keys, uint32 max_size, 
448                                    bool strict)
449{
450  REGF_HASH_LIST* ret_val;
451  uint32 i, cell_length, length;
452  uint8* hashes;
453  uint8 buf[REGFI_HASH_LIST_MIN_LENGTH];
454  bool unalloc;
455
456  if(!regfi_parse_cell(file->fd, offset, buf, REGFI_HASH_LIST_MIN_LENGTH, 
457                       &cell_length, &unalloc))
458    return NULL;
459
460  ret_val = (REGF_HASH_LIST*)zalloc(sizeof(REGF_HASH_LIST));
461  if(ret_val == NULL)
462    return NULL;
463
464  ret_val->offset = offset;
465  ret_val->cell_size = cell_length;
466
467  if((buf[0] != 'l' || buf[1] != 'f') && (buf[0] != 'l' || buf[1] != 'h')
468     && (buf[0] != 'r' || buf[1] != 'i'))
469  {
470    /*printf("DEBUG: lf->header=%c%c\n", buf[0], buf[1]);*/
471    free(ret_val);
472    return NULL;
473  }
474
475  if(buf[0] == 'r' && buf[1] == 'i')
476  {
477    fprintf(stderr, "WARNING: ignoring encountered \"ri\" record.\n");
478    free(ret_val);
479    return NULL;
480  }
481
482  ret_val->magic[0] = buf[0];
483  ret_val->magic[1] = buf[1];
484
485  ret_val->num_keys = SVAL(buf, 0x2);
486  if(num_keys != ret_val->num_keys)
487  {
488    if(strict)
489    {
490      free(ret_val);
491      return NULL;
492    }
493    /* TODO: Not sure which should be authoritative, the number from the
494     *       NK record, or the number in the hash list.  Go with the larger
495     *       of the two to ensure all keys are found.  Note the length checks
496     *       on the cell later ensure that there won't be any critical errors.
497     */
498    if(num_keys < ret_val->num_keys)
499      num_keys = ret_val->num_keys;
500    else
501      ret_val->num_keys = num_keys;
502  }
503
504  if(cell_length - REGFI_HASH_LIST_MIN_LENGTH - sizeof(uint32) 
505     < ret_val->num_keys*sizeof(REGF_HASH_LIST_ELEM))
506    return NULL;
507
508  length = sizeof(REGF_HASH_LIST_ELEM)*ret_val->num_keys;
509  ret_val->hashes = (REGF_HASH_LIST_ELEM*)zalloc(length);
510  if(ret_val->hashes == NULL)
511  {
512    free(ret_val);
513    return NULL;
514  }
515
516  hashes = (uint8*)zalloc(length);
517  if(hashes == NULL)
518  {
519    free(ret_val->hashes);
520    free(ret_val);
521    return NULL;
522  }
523
524  if(regfi_read(file->fd, hashes, &length) != 0
525     || length != sizeof(REGF_HASH_LIST_ELEM)*ret_val->num_keys)
526  {
527    free(ret_val->hashes);
528    free(ret_val);
529    return NULL;
530  }
531
532  for (i=0; i < ret_val->num_keys; i++)
533  {
534    ret_val->hashes[i].nk_off = IVAL(hashes, i*sizeof(REGF_HASH_LIST_ELEM));
535    ret_val->hashes[i].hash = IVAL(hashes, i*sizeof(REGF_HASH_LIST_ELEM)+4);
536  }
537  free(hashes);
538
539  return ret_val;
540}
541
542
543
544/*******************************************************************
545 *******************************************************************/
546REGF_SK_REC* regfi_parse_sk(REGF_FILE* file, uint32 offset, uint32 max_size, bool strict)
547{
548  REGF_SK_REC* ret_val;
549  uint32 cell_length, length;
550  prs_struct ps;
551  uint8 sk_header[REGFI_SK_MIN_LENGTH];
552  bool unalloc = false;
553
554
555  if(!regfi_parse_cell(file->fd, offset, sk_header, REGFI_SK_MIN_LENGTH,
556                       &cell_length, &unalloc))
557    return NULL;
558   
559  if(sk_header[0] != 's' || sk_header[1] != 'k')
560    return NULL;
561 
562  ret_val = (REGF_SK_REC*)zalloc(sizeof(REGF_SK_REC));
563  if(ret_val == NULL)
564    return NULL;
565
566  ret_val->offset = offset;
567  /* TODO: is there a way to be more conservative (shorter) with
568   *       cell length when cell is unallocated?
569   */
570  ret_val->cell_size = cell_length;
571
572  if(ret_val->cell_size > max_size)
573    ret_val->cell_size = max_size & 0xFFFFFFF8;
574  if((ret_val->cell_size < REGFI_SK_MIN_LENGTH) 
575     || (strict && ret_val->cell_size != (ret_val->cell_size & 0xFFFFFFF8)))
576  {
577    free(ret_val);
578    return NULL;
579  }
580
581  ret_val->magic[0] = sk_header[0];
582  ret_val->magic[1] = sk_header[1];
583
584  /* TODO: can additional validation be added here? */
585  ret_val->unknown_tag = SVAL(sk_header, 0x2);
586  ret_val->prev_sk_off = IVAL(sk_header, 0x4);
587  ret_val->next_sk_off = IVAL(sk_header, 0x8);
588  ret_val->ref_count = IVAL(sk_header, 0xC);
589  ret_val->desc_size = IVAL(sk_header, 0x10);
590
591  if(ret_val->desc_size + REGFI_SK_MIN_LENGTH > ret_val->cell_size)
592  {
593    free(ret_val);
594    return NULL;
595  }
596
597  /* TODO: need to get rid of this, but currently the security descriptor
598   * code depends on the ps structure.
599   */
600  if(!prs_init(&ps, ret_val->desc_size, NULL, UNMARSHALL))
601  {
602    free(ret_val);
603    return NULL;
604  }
605
606  length = ret_val->desc_size;
607  if(regfi_read(file->fd, (uint8*)ps.data_p, &length) != 0 
608     || length != ret_val->desc_size)
609  {
610    free(ret_val);
611    return NULL;
612  }
613
614  if (!sec_io_desc("sec_desc", &ret_val->sec_desc, &ps, 0))
615  {
616    free(ret_val);
617    return NULL;
618  }
619
620  free(ps.data_p);
621
622  return ret_val;
623}
624
625
626uint32* regfi_parse_valuelist(REGF_FILE* file, uint32 offset, 
627                              uint32 num_values, bool strict)
628{
629  uint32* ret_val;
630  uint32 i, cell_length, length, read_len;
631  bool unalloc;
632
633  if(!regfi_parse_cell(file->fd, offset, NULL, 0, &cell_length, &unalloc))
634    return NULL;
635
636  if(cell_length != (cell_length & 0xFFFFFFF8))
637  {
638    if(strict)
639      return NULL;
640    cell_length = cell_length & 0xFFFFFFF8;
641  }
642  if((num_values * sizeof(uint32)) > cell_length-sizeof(uint32))
643    return NULL;
644
645  read_len = num_values*sizeof(uint32);
646  ret_val = (uint32*)malloc(read_len);
647  if(ret_val == NULL)
648    return NULL;
649
650  length = read_len;
651  if((regfi_read(file->fd, (uint8*)ret_val, &length) != 0) || length != read_len)
652  {
653    free(ret_val);
654    return NULL;
655  }
656 
657  for(i=0; i < num_values; i++)
658  {
659    /* Fix endianness */
660    ret_val[i] = IVAL(&ret_val[i], 0);
661
662    /* Validate the first num_values values to ensure they make sense */
663    if(strict)
664    {
665      if((ret_val[i] + REGF_BLOCKSIZE > file->file_length)
666         || ((ret_val[i] & 0xFFFFFFF8) != ret_val[i]))
667      {
668        free(ret_val);
669        return NULL;
670      }
671    }
672  }
673
674  return ret_val;
675}
676
677
678
679/******************************************************************************
680 * If !strict, the list may contain NULLs and VK records may point to NULL data.
681 ******************************************************************************/
682REGF_VK_REC** regfi_load_valuelist(REGF_FILE* file, uint32 offset, 
683                                   uint32 num_values, uint32 max_size, 
684                                   bool strict)
685{
686  REGF_VK_REC** ret_val;
687  REGF_HBIN* hbin;
688  uint32 i, vk_offset, vk_max_length;
689  uint32* voffsets;
690
691  if((num_values+1) * sizeof(uint32) > max_size)
692    return NULL;
693
694  /* TODO: For now, everything strict seems to make sense on this call.
695   *       Maybe remove the parameter or use it for other things.
696   */
697  voffsets = regfi_parse_valuelist(file, offset, num_values, true);
698  if(voffsets == NULL)
699    return NULL;
700
701  ret_val = (REGF_VK_REC**)zalloc(sizeof(REGF_VK_REC*) * num_values);
702  if(ret_val == NULL)
703  {
704    free(voffsets);
705    return NULL;
706  }
707 
708  for(i=0; i < num_values; i++)
709  {
710    hbin = regfi_lookup_hbin(file, voffsets[i]);
711    if(!hbin)
712    {
713      free(voffsets);
714      free(ret_val);
715      return NULL;
716    }
717   
718    vk_offset =  voffsets[i] + REGF_BLOCKSIZE;
719    vk_max_length = hbin->block_size - vk_offset + sizeof(uint32);
720    ret_val[i] = regfi_parse_vk(file, vk_offset, vk_max_length, strict);
721    if(ret_val[i] == NULL)
722    { /* If we're being strict, throw out the whole list.
723       * Otherwise, let it be NULL.
724       */
725      if(strict)
726      {
727        free(voffsets);
728        free(ret_val);
729        return NULL;
730      }
731    }
732  }
733
734  free(voffsets);
735  return ret_val;
736}
737
738
739
740/*******************************************************************
741 * TODO: Need to add full key caching using a
742 *       custom cache structure.
743 *******************************************************************/
744REGF_NK_REC* regfi_load_key(REGF_FILE* file, uint32 offset, bool strict)
745{
746  REGF_HBIN* hbin;
747  REGF_HBIN* sub_hbin;
748  REGF_NK_REC* nk;
749  uint32 max_length, off;
750
751  hbin = regfi_lookup_hbin(file, offset-REGF_BLOCKSIZE);
752  if (hbin == NULL) 
753    return NULL;
754
755  /* get the initial nk record */
756  max_length = hbin->block_size + hbin->file_off - offset;
757  if ((nk = regfi_parse_nk(file, offset, max_length, true)) == NULL)
758    return NULL;
759
760  /* fill in values */
761  if(nk->num_values && (nk->values_off!=REGF_OFFSET_NONE)) 
762  {
763    sub_hbin = hbin;
764    if(!regfi_offset_in_hbin(hbin, nk->values_off)) 
765      sub_hbin = regfi_lookup_hbin(file, nk->values_off);
766   
767    if(sub_hbin == NULL)
768    {
769      if(strict)
770      {
771        free(nk);
772        return NULL;
773      }
774      else
775        nk->values = NULL;
776    }
777    else
778    {
779      off = nk->values_off + REGF_BLOCKSIZE;
780      max_length = sub_hbin->block_size + sub_hbin->file_off - off;
781      nk->values = regfi_load_valuelist(file, off, nk->num_values, max_length, 
782                                        true);
783      if(strict && nk->values == NULL)
784      {
785        free(nk);
786        return NULL;
787      }
788    }
789  }
790
791  /* now get subkeys */
792  if(nk->num_subkeys && (nk->subkeys_off != REGF_OFFSET_NONE)) 
793  {
794    sub_hbin = hbin;
795    if(!regfi_offset_in_hbin(hbin, nk->subkeys_off))
796      sub_hbin = regfi_lookup_hbin(file, nk->subkeys_off);
797
798    if (sub_hbin == NULL) 
799    {
800      if(strict)
801      {
802        free(nk);
803        /* TODO: need convenient way to free nk->values deeply in all cases. */
804        return NULL;
805      }
806      else
807        nk->subkeys = NULL;
808    }
809    else
810    {
811      off = nk->subkeys_off + REGF_BLOCKSIZE;
812      max_length = sub_hbin->block_size + sub_hbin->file_off - off;
813      nk->subkeys = regfi_load_hashlist(file, off, nk->num_subkeys, 
814                                        max_length, true);
815      if(nk->subkeys == NULL)
816      {
817        /* TODO: temporary hack to get around 'ri' records */
818        nk->num_subkeys = 0;
819      }
820    }
821  }
822
823  return nk;
824}
825
826
827/******************************************************************************
828
829 ******************************************************************************/
830static bool regfi_find_root_nk(REGF_FILE* file, uint32 offset, uint32 hbin_size,
831                               uint32* root_offset)
832{
833  uint8 tmp[4];
834  int32 record_size;
835  uint32 length, hbin_offset = 0;
836  REGF_NK_REC* nk = NULL;
837  bool found = false;
838
839  for(record_size=0; !found && (hbin_offset < hbin_size); )
840  {
841    if(lseek(file->fd, offset+hbin_offset, SEEK_SET) == -1)
842      return false;
843   
844    length = 4;
845    if((regfi_read(file->fd, tmp, &length) != 0) || length != 4)
846      return false;
847    record_size = IVALS(tmp, 0);
848
849    if(record_size < 0)
850    {
851      record_size = record_size*(-1);
852      nk = regfi_parse_nk(file, offset+hbin_offset, hbin_size-hbin_offset, true);
853      if(nk != NULL)
854      {
855        if(nk->key_type == NK_TYPE_ROOTKEY)
856        {
857          found = true;
858          *root_offset = nk->offset;
859        }
860        free(nk);
861      }
862    }
863
864    hbin_offset += record_size;
865  }
866
867  return found;
868}
869
870
871/*******************************************************************
872 * Open the registry file and then read in the REGF block to get the
873 * first hbin offset.
874 *******************************************************************/
875REGF_FILE* regfi_open(const char* filename)
876{
877  REGF_FILE* rb;
878  REGF_HBIN* hbin = NULL;
879  uint32 hbin_off;
880  int fd;
881  bool rla;
882
883  /* open an existing file */
884  if ((fd = open(filename, O_RDONLY)) == -1) 
885  {
886    /* DEBUG(0,("regfi_open: failure to open %s (%s)\n", filename, strerror(errno)));*/
887    return NULL;
888  }
889 
890  /* read in an existing file */
891  if ((rb = regfi_parse_regf(fd, true)) == NULL) 
892  {
893    /* DEBUG(0,("regfi_open: Failed to read initial REGF block\n"));*/
894    close(fd);
895    return NULL;
896  }
897 
898  rb->hbins = range_list_new();
899  if(rb->hbins == NULL)
900  {
901    range_list_free(rb->hbins);
902    close(fd);
903    free(rb);
904    return NULL;
905  }
906 
907  rla = true;
908  hbin_off = REGF_BLOCKSIZE;
909  hbin = regfi_parse_hbin(rb, hbin_off, true);
910  while(hbin && rla)
911  {
912    hbin_off = hbin->file_off + hbin->block_size;
913    rla = range_list_add(rb->hbins, hbin->file_off, hbin->block_size, hbin);
914    hbin = regfi_parse_hbin(rb, hbin_off, true);
915  }
916
917  /* success */
918  return rb;
919}
920
921
922/*******************************************************************
923 *******************************************************************/
924int regfi_close( REGF_FILE *file )
925{
926  int fd;
927  uint32 i;
928
929  /* nothing to do if there is no open file */
930  if ((file == NULL) || (file->fd == -1))
931    return 0;
932
933  fd = file->fd;
934  file->fd = -1;
935  for(i=0; i < range_list_size(file->hbins); i++)
936    free(range_list_get(file->hbins, i)->data);
937  range_list_free(file->hbins);
938
939  free(file);
940
941  return close(fd);
942}
943
944
945/******************************************************************************
946 * There should be only *one* root key in the registry file based
947 * on my experience.  --jerry
948 *****************************************************************************/
949REGF_NK_REC* regfi_rootkey(REGF_FILE *file)
950{
951  REGF_NK_REC* nk = NULL;
952  REGF_HBIN*   hbin;
953  uint32       root_offset, i, num_hbins;
954 
955  if(!file)
956    return NULL;
957
958  /* Scan through the file one HBIN block at a time looking
959     for an NK record with a type == 0x002c.
960     Normally this is the first nk record in the first hbin
961     block (but I'm not assuming that for now) */
962
963  num_hbins = range_list_size(file->hbins);
964  for(i=0; i < num_hbins; i++)
965  {
966    hbin = (REGF_HBIN*)range_list_get(file->hbins, i)->data;
967    if(regfi_find_root_nk(file, hbin->file_off+HBIN_HEADER_REC_SIZE, 
968                          hbin->block_size-HBIN_HEADER_REC_SIZE, &root_offset))
969    {
970      nk = regfi_load_key(file, root_offset, true);
971      break;
972    }
973  }
974
975  return nk;
976}
977
978
979/******************************************************************************
980 *****************************************************************************/
981void regfi_key_free(REGF_NK_REC* nk)
982{
983  uint32 i;
984 
985  if((nk->values != NULL) && (nk->values_off!=REGF_OFFSET_NONE))
986  {
987    for(i=0; i < nk->num_values; i++)
988    {
989      if(nk->values[i]->valuename != NULL)
990        free(nk->values[i]->valuename);
991      if(nk->values[i]->data != NULL)
992        free(nk->values[i]->data);
993      free(nk->values[i]);
994    }
995    free(nk->values);
996  }
997
998  if(nk->keyname != NULL)
999    free(nk->keyname);
1000  if(nk->classname != NULL)
1001    free(nk->classname);
1002
1003  /* XXX: not freeing hbin because these are cached.  This needs to be reviewed. */
1004  /* XXX: not freeing sec_desc because these are cached.  This needs to be reviewed. */
1005  free(nk);
1006}
1007
1008
1009/******************************************************************************
1010 *****************************************************************************/
1011REGFI_ITERATOR* regfi_iterator_new(REGF_FILE* fh)
1012{
1013  REGF_NK_REC* root;
1014  REGFI_ITERATOR* ret_val = (REGFI_ITERATOR*)malloc(sizeof(REGFI_ITERATOR));
1015  if(ret_val == NULL)
1016    return NULL;
1017
1018  root = regfi_rootkey(fh);
1019  if(root == NULL)
1020  {
1021    free(ret_val);
1022    return NULL;
1023  }
1024
1025  ret_val->key_positions = void_stack_new(REGF_MAX_DEPTH);
1026  if(ret_val->key_positions == NULL)
1027  {
1028    free(ret_val);
1029    free(root);
1030    return NULL;
1031  }
1032
1033  /* TODO: come up with a better secret. */
1034  ret_val->sk_recs = lru_cache_create(127, 0xDEADBEEF, true);
1035
1036  ret_val->f = fh;
1037  ret_val->cur_key = root;
1038  ret_val->cur_subkey = 0;
1039  ret_val->cur_value = 0;
1040
1041  return ret_val;
1042}
1043
1044
1045/******************************************************************************
1046 *****************************************************************************/
1047void regfi_iterator_free(REGFI_ITERATOR* i)
1048{
1049  REGFI_ITER_POSITION* cur;
1050
1051  if(i->cur_key != NULL)
1052    regfi_key_free(i->cur_key);
1053
1054  while((cur = (REGFI_ITER_POSITION*)void_stack_pop(i->key_positions)) != NULL)
1055  {
1056    regfi_key_free(cur->nk);
1057    free(cur);
1058  }
1059 
1060  lru_cache_destroy(i->sk_recs);
1061
1062  free(i);
1063}
1064
1065
1066
1067/******************************************************************************
1068 *****************************************************************************/
1069/* XXX: some way of indicating reason for failure should be added. */
1070bool regfi_iterator_down(REGFI_ITERATOR* i)
1071{
1072  REGF_NK_REC* subkey;
1073  REGFI_ITER_POSITION* pos;
1074
1075  pos = (REGFI_ITER_POSITION*)malloc(sizeof(REGFI_ITER_POSITION));
1076  if(pos == NULL)
1077    return false;
1078
1079  subkey = (REGF_NK_REC*)regfi_iterator_cur_subkey(i);
1080  if(subkey == NULL)
1081  {
1082    free(pos);
1083    return false;
1084  }
1085
1086  pos->nk = i->cur_key;
1087  pos->cur_subkey = i->cur_subkey;
1088  if(!void_stack_push(i->key_positions, pos))
1089  {
1090    free(pos);
1091    regfi_key_free(subkey);
1092    return false;
1093  }
1094
1095  i->cur_key = subkey;
1096  i->cur_subkey = 0;
1097  i->cur_value = 0;
1098
1099  return true;
1100}
1101
1102
1103/******************************************************************************
1104 *****************************************************************************/
1105bool regfi_iterator_up(REGFI_ITERATOR* i)
1106{
1107  REGFI_ITER_POSITION* pos;
1108
1109  pos = (REGFI_ITER_POSITION*)void_stack_pop(i->key_positions);
1110  if(pos == NULL)
1111    return false;
1112
1113  regfi_key_free(i->cur_key);
1114  i->cur_key = pos->nk;
1115  i->cur_subkey = pos->cur_subkey;
1116  i->cur_value = 0;
1117  free(pos);
1118
1119  return true;
1120}
1121
1122
1123/******************************************************************************
1124 *****************************************************************************/
1125bool regfi_iterator_to_root(REGFI_ITERATOR* i)
1126{
1127  while(regfi_iterator_up(i))
1128    continue;
1129
1130  return true;
1131}
1132
1133
1134/******************************************************************************
1135 *****************************************************************************/
1136bool regfi_iterator_find_subkey(REGFI_ITERATOR* i, const char* subkey_name)
1137{
1138  REGF_NK_REC* subkey;
1139  bool found = false;
1140  uint32 old_subkey = i->cur_subkey;
1141 
1142  if(subkey_name == NULL)
1143    return false;
1144
1145  /* XXX: this alloc/free of each sub key might be a bit excessive */
1146  subkey = (REGF_NK_REC*)regfi_iterator_first_subkey(i);
1147  while((subkey != NULL) && (found == false))
1148  {
1149    if(subkey->keyname != NULL 
1150       && strcasecmp(subkey->keyname, subkey_name) == 0)
1151      found = true;
1152    else
1153    {
1154      regfi_key_free(subkey);
1155      subkey = (REGF_NK_REC*)regfi_iterator_next_subkey(i);
1156    }
1157  }
1158
1159  if(found == false)
1160  {
1161    i->cur_subkey = old_subkey;
1162    return false;
1163  }
1164
1165  regfi_key_free(subkey);
1166  return true;
1167}
1168
1169
1170/******************************************************************************
1171 *****************************************************************************/
1172bool regfi_iterator_walk_path(REGFI_ITERATOR* i, const char** path)
1173{
1174  uint32 x;
1175  if(path == NULL)
1176    return false;
1177
1178  for(x=0; 
1179      ((path[x] != NULL) && regfi_iterator_find_subkey(i, path[x])
1180       && regfi_iterator_down(i));
1181      x++)
1182  { continue; }
1183
1184  if(path[x] == NULL)
1185    return true;
1186 
1187  /* XXX: is this the right number of times? */
1188  for(; x > 0; x--)
1189    regfi_iterator_up(i);
1190 
1191  return false;
1192}
1193
1194
1195/******************************************************************************
1196 *****************************************************************************/
1197const REGF_NK_REC* regfi_iterator_cur_key(REGFI_ITERATOR* i)
1198{
1199  return i->cur_key;
1200}
1201
1202
1203/******************************************************************************
1204 *****************************************************************************/
1205const REGF_SK_REC* regfi_iterator_cur_sk(REGFI_ITERATOR* i)
1206{
1207  REGF_SK_REC* ret_val;
1208  REGF_HBIN* hbin;
1209  uint32 max_length, off;
1210
1211  if(i->cur_key == NULL)
1212    return NULL;
1213 
1214  /* First look if we have already parsed it */
1215  if((i->cur_key->sk_off!=REGF_OFFSET_NONE)
1216     && !(ret_val =(REGF_SK_REC*)lru_cache_find(i->sk_recs, 
1217                                                &i->cur_key->sk_off, 4)))
1218  {
1219    hbin = regfi_lookup_hbin(i->f, i->cur_key->sk_off);
1220
1221    if(hbin == NULL)
1222      return NULL;
1223
1224    off = i->cur_key->sk_off + REGF_BLOCKSIZE;
1225    max_length = hbin->block_size + hbin->file_off - off;
1226    ret_val = regfi_parse_sk(i->f, off, max_length, true);
1227    if(ret_val == NULL)
1228      return NULL;
1229
1230    ret_val->sk_off = i->cur_key->sk_off;
1231    lru_cache_update(i->sk_recs, &i->cur_key->sk_off, 4, ret_val);
1232  }
1233
1234  return ret_val;
1235}
1236
1237
1238
1239/******************************************************************************
1240 *****************************************************************************/
1241const REGF_NK_REC* regfi_iterator_first_subkey(REGFI_ITERATOR* i)
1242{
1243  i->cur_subkey = 0;
1244  return regfi_iterator_cur_subkey(i);
1245}
1246
1247
1248/******************************************************************************
1249 *****************************************************************************/
1250const REGF_NK_REC* regfi_iterator_cur_subkey(REGFI_ITERATOR* i)
1251{
1252  uint32 nk_offset;
1253
1254  /* see if there is anything left to report */
1255  if (!(i->cur_key) || (i->cur_key->subkeys_off==REGF_OFFSET_NONE)
1256      || (i->cur_subkey >= i->cur_key->num_subkeys))
1257    return NULL;
1258
1259  nk_offset = i->cur_key->subkeys->hashes[i->cur_subkey].nk_off;
1260 
1261  return regfi_load_key(i->f, nk_offset+REGF_BLOCKSIZE, true);
1262}
1263
1264
1265/******************************************************************************
1266 *****************************************************************************/
1267/* XXX: some way of indicating reason for failure should be added. */
1268const REGF_NK_REC* regfi_iterator_next_subkey(REGFI_ITERATOR* i)
1269{
1270  const REGF_NK_REC* subkey;
1271
1272  i->cur_subkey++;
1273  subkey = regfi_iterator_cur_subkey(i);
1274
1275  if(subkey == NULL)
1276    i->cur_subkey--;
1277
1278  return subkey;
1279}
1280
1281
1282/******************************************************************************
1283 *****************************************************************************/
1284bool regfi_iterator_find_value(REGFI_ITERATOR* i, const char* value_name)
1285{
1286  const REGF_VK_REC* cur;
1287  bool found = false;
1288
1289  /* XXX: cur->valuename can be NULL in the registry. 
1290   *      Should we allow for a way to search for that?
1291   */
1292  if(value_name == NULL)
1293    return false;
1294
1295  cur = regfi_iterator_first_value(i);
1296  while((cur != NULL) && (found == false))
1297  {
1298    if((cur->valuename != NULL)
1299       && (strcasecmp(cur->valuename, value_name) == 0))
1300      found = true;
1301    else
1302      cur = regfi_iterator_next_value(i);
1303  }
1304
1305  return found;
1306}
1307
1308
1309/******************************************************************************
1310 *****************************************************************************/
1311const REGF_VK_REC* regfi_iterator_first_value(REGFI_ITERATOR* i)
1312{
1313  i->cur_value = 0;
1314  return regfi_iterator_cur_value(i);
1315}
1316
1317
1318/******************************************************************************
1319 *****************************************************************************/
1320const REGF_VK_REC* regfi_iterator_cur_value(REGFI_ITERATOR* i)
1321{
1322  REGF_VK_REC* ret_val = NULL;
1323  if(i->cur_value < i->cur_key->num_values)
1324    ret_val = i->cur_key->values[i->cur_value];
1325
1326  return ret_val;
1327}
1328
1329
1330/******************************************************************************
1331 *****************************************************************************/
1332const REGF_VK_REC* regfi_iterator_next_value(REGFI_ITERATOR* i)
1333{
1334  const REGF_VK_REC* ret_val;
1335
1336  i->cur_value++;
1337  ret_val = regfi_iterator_cur_value(i);
1338  if(ret_val == NULL)
1339    i->cur_value--;
1340
1341  return ret_val;
1342}
1343
1344
1345
1346/*******************************************************************
1347 * Computes the checksum of the registry file header.
1348 * buffer must be at least the size of an regf header (4096 bytes).
1349 *******************************************************************/
1350static uint32 regfi_compute_header_checksum(uint8* buffer)
1351{
1352  uint32 checksum, x;
1353  int i;
1354
1355  /* XOR of all bytes 0x0000 - 0x01FB */
1356
1357  checksum = x = 0;
1358 
1359  for ( i=0; i<0x01FB; i+=4 ) {
1360    x = IVAL(buffer, i );
1361    checksum ^= x;
1362  }
1363 
1364  return checksum;
1365}
1366
1367
1368/*******************************************************************
1369 * TODO: add way to return more detailed error information.
1370 *******************************************************************/
1371REGF_FILE* regfi_parse_regf(int fd, bool strict)
1372{
1373  uint8 file_header[REGF_BLOCKSIZE];
1374  uint32 length;
1375  uint32 file_length;
1376  struct stat sbuf;
1377  REGF_FILE* ret_val;
1378
1379  /* Determine file length.  Must be at least big enough
1380   * for the header and one hbin.
1381   */
1382  if (fstat(fd, &sbuf) == -1)
1383    return NULL;
1384  file_length = sbuf.st_size;
1385  if(file_length < REGF_BLOCKSIZE+REGF_ALLOC_BLOCK)
1386    return NULL;
1387
1388  ret_val = (REGF_FILE*)zalloc(sizeof(REGF_FILE));
1389  if(ret_val == NULL)
1390    return NULL;
1391
1392  ret_val->fd = fd;
1393  ret_val->file_length = file_length;
1394
1395  length = REGF_BLOCKSIZE;
1396  if((regfi_read(fd, file_header, &length)) != 0 
1397     || length != REGF_BLOCKSIZE)
1398  {
1399    free(ret_val);
1400    return NULL;
1401  }
1402
1403  ret_val->checksum = IVAL(file_header, 0x1FC);
1404  ret_val->computed_checksum = regfi_compute_header_checksum(file_header);
1405  if (strict && (ret_val->checksum != ret_val->computed_checksum))
1406  {
1407    free(ret_val);
1408    return NULL;
1409  }
1410
1411  memcpy(ret_val->magic, file_header, 4);
1412  if(strict && (memcmp(ret_val->magic, "regf", 4) != 0))
1413  {
1414    free(ret_val);
1415    return NULL;
1416  }
1417 
1418  ret_val->unknown1 = IVAL(file_header, 0x4);
1419  ret_val->unknown2 = IVAL(file_header, 0x8);
1420
1421  ret_val->mtime.low = IVAL(file_header, 0xC);
1422  ret_val->mtime.high = IVAL(file_header, 0x10);
1423
1424  ret_val->unknown3 = IVAL(file_header, 0x14);
1425  ret_val->unknown4 = IVAL(file_header, 0x18);
1426  ret_val->unknown5 = IVAL(file_header, 0x1C);
1427  ret_val->unknown6 = IVAL(file_header, 0x20);
1428 
1429  ret_val->data_offset = IVAL(file_header, 0x24);
1430  ret_val->last_block = IVAL(file_header, 0x28);
1431
1432  ret_val->unknown7 = IVAL(file_header, 0x2C);
1433
1434  return ret_val;
1435}
1436
1437
1438
1439/*******************************************************************
1440 * Given real file offset, read and parse the hbin at that location
1441 * along with it's associated cells.
1442 *******************************************************************/
1443/* TODO: Need a way to return types of errors.  Also need to free
1444 *       the hbin/ps when an error occurs.
1445 */
1446REGF_HBIN* regfi_parse_hbin(REGF_FILE* file, uint32 offset, bool strict)
1447{
1448  REGF_HBIN *hbin;
1449  uint8 hbin_header[HBIN_HEADER_REC_SIZE];
1450  uint32 length;
1451 
1452  if(offset >= file->file_length)
1453    return NULL;
1454
1455  if(lseek(file->fd, offset, SEEK_SET) == -1)
1456    return NULL;
1457
1458  length = HBIN_HEADER_REC_SIZE;
1459  if((regfi_read(file->fd, hbin_header, &length) != 0) 
1460     || length != HBIN_HEADER_REC_SIZE)
1461    return NULL;
1462
1463
1464  if(lseek(file->fd, offset, SEEK_SET) == -1)
1465    return NULL;
1466
1467  if(!(hbin = (REGF_HBIN*)zalloc(sizeof(REGF_HBIN)))) 
1468    return NULL;
1469  hbin->file_off = offset;
1470
1471  memcpy(hbin->magic, hbin_header, 4);
1472  if(strict && (memcmp(hbin->magic, "hbin", 4) != 0))
1473  {
1474    free(hbin);
1475    return NULL;
1476  }
1477
1478  hbin->first_hbin_off = IVAL(hbin_header, 0x4);
1479  hbin->block_size = IVAL(hbin_header, 0x8);
1480  /* this should be the same thing as hbin->block_size but just in case */
1481  hbin->next_block = IVAL(hbin_header, 0x1C);
1482
1483
1484  /* Ensure the block size is a multiple of 0x1000 and doesn't run off
1485   * the end of the file.
1486   */
1487  /* TODO: This may need to be relaxed for dealing with
1488   *       partial or corrupt files. */
1489  if((offset + hbin->block_size > file->file_length)
1490     || (hbin->block_size & 0xFFFFF000) != hbin->block_size)
1491  {
1492    free(hbin);
1493    return NULL;
1494  }
1495
1496  return hbin;
1497}
1498
1499
1500
1501REGF_NK_REC* regfi_parse_nk(REGF_FILE* file, uint32 offset, 
1502                            uint32 max_size, bool strict)
1503{
1504  uint8 nk_header[REGFI_NK_MIN_LENGTH];
1505  REGF_NK_REC* ret_val;
1506  uint32 length;
1507  uint32 cell_length;
1508  bool unalloc = false;
1509
1510  if(!regfi_parse_cell(file->fd, offset, nk_header, REGFI_NK_MIN_LENGTH,
1511                       &cell_length, &unalloc))
1512     return NULL;
1513 
1514  /* A bit of validation before bothering to allocate memory */
1515  if((nk_header[0x0] != 'n') || (nk_header[0x1] != 'k'))
1516  {
1517    /* TODO: deal with subkey-lists that reference other subkey-lists. */
1518    return NULL;
1519  }
1520
1521  ret_val = (REGF_NK_REC*)zalloc(sizeof(REGF_NK_REC));
1522  if(ret_val == NULL)
1523    return NULL;
1524
1525  ret_val->offset = offset;
1526  ret_val->cell_size = cell_length;
1527
1528  if(ret_val->cell_size > max_size)
1529    ret_val->cell_size = max_size & 0xFFFFFFF8;
1530  if((ret_val->cell_size < REGFI_NK_MIN_LENGTH) 
1531     || (strict && ret_val->cell_size != (ret_val->cell_size & 0xFFFFFFF8)))
1532  {
1533    free(ret_val);
1534    return NULL;
1535  }
1536
1537  ret_val->magic[0] = nk_header[0x0];
1538  ret_val->magic[1] = nk_header[0x1];
1539  ret_val->key_type = SVAL(nk_header, 0x2);
1540  if((ret_val->key_type != NK_TYPE_NORMALKEY)
1541     && (ret_val->key_type != NK_TYPE_ROOTKEY) 
1542     && (ret_val->key_type != NK_TYPE_LINKKEY)
1543     && (ret_val->key_type != NK_TYPE_UNKNOWN1))
1544  {
1545    free(ret_val);
1546    return NULL;
1547  }
1548
1549  ret_val->mtime.low = IVAL(nk_header, 0x4);
1550  ret_val->mtime.high = IVAL(nk_header, 0x8);
1551 
1552  ret_val->unknown1 = IVAL(nk_header, 0xC);
1553  ret_val->parent_off = IVAL(nk_header, 0x10);
1554  ret_val->num_subkeys = IVAL(nk_header, 0x14);
1555  ret_val->unknown2 = IVAL(nk_header, 0x18);
1556  ret_val->subkeys_off = IVAL(nk_header, 0x1C);
1557  ret_val->unknown3 = IVAL(nk_header, 0x20);
1558  ret_val->num_values = IVAL(nk_header, 0x24);
1559  ret_val->values_off = IVAL(nk_header, 0x28);
1560  ret_val->sk_off = IVAL(nk_header, 0x2C);
1561  /* TODO: currently we do nothing with class names.  Need to investigate. */
1562  ret_val->classname_off = IVAL(nk_header, 0x30);
1563
1564  ret_val->max_bytes_subkeyname = IVAL(nk_header, 0x34);
1565  ret_val->max_bytes_subkeyclassname = IVAL(nk_header, 0x38);
1566  ret_val->max_bytes_valuename = IVAL(nk_header, 0x3C);
1567  ret_val->max_bytes_value = IVAL(nk_header, 0x40);
1568  ret_val->unk_index = IVAL(nk_header, 0x44);
1569
1570  ret_val->name_length = SVAL(nk_header, 0x48);
1571  ret_val->classname_length = SVAL(nk_header, 0x4A);
1572
1573  if(ret_val->name_length + REGFI_NK_MIN_LENGTH > ret_val->cell_size)
1574  {
1575    if(strict)
1576    {
1577      free(ret_val);
1578      return NULL;
1579    }
1580    else
1581      ret_val->name_length = ret_val->cell_size - REGFI_NK_MIN_LENGTH;
1582  }
1583  else if (unalloc)
1584  { /* Truncate cell_size if it's much larger than the apparent total record length. */
1585    /* Round up to the next multiple of 8 */
1586    length = (ret_val->name_length + REGFI_NK_MIN_LENGTH) & 0xFFFFFFF8;
1587    if(length < ret_val->name_length + REGFI_NK_MIN_LENGTH)
1588      length+=8;
1589
1590    /* If cell_size is still greater, truncate. */
1591    if(length < ret_val->cell_size)
1592      ret_val->cell_size = length;
1593  }
1594
1595  ret_val->keyname = (char*)zalloc(sizeof(char)*(ret_val->name_length+1));
1596  if(ret_val->keyname == NULL)
1597  {
1598    free(ret_val);
1599    return NULL;
1600  }
1601
1602  /* Don't need to seek, should be at the right offset */
1603  length = ret_val->name_length;
1604  if((regfi_read(file->fd, (uint8*)ret_val->keyname, &length) != 0)
1605     || length != ret_val->name_length)
1606  {
1607    free(ret_val->keyname);
1608    free(ret_val);
1609    return NULL;
1610  }
1611  ret_val->keyname[ret_val->name_length] = '\0';
1612
1613  return ret_val;
1614}
1615
1616
1617
1618/*******************************************************************
1619 *******************************************************************/
1620REGF_VK_REC* regfi_parse_vk(REGF_FILE* file, uint32 offset, 
1621                            uint32 max_size, bool strict)
1622{
1623  REGF_VK_REC* ret_val;
1624  uint8 vk_header[REGFI_VK_MIN_LENGTH];
1625  uint32 raw_data_size, length, cell_length;
1626  bool unalloc = false;
1627
1628  if(!regfi_parse_cell(file->fd, offset, vk_header, REGFI_VK_MIN_LENGTH,
1629                       &cell_length, &unalloc))
1630    return NULL;
1631
1632  ret_val = (REGF_VK_REC*)zalloc(sizeof(REGF_VK_REC));
1633  if(ret_val == NULL)
1634    return NULL;
1635
1636  ret_val->offset = offset;
1637  ret_val->cell_size = cell_length;
1638
1639  if(ret_val->cell_size > max_size)
1640    ret_val->cell_size = max_size & 0xFFFFFFF8;
1641  if((ret_val->cell_size < REGFI_VK_MIN_LENGTH) 
1642     || ret_val->cell_size != (ret_val->cell_size & 0xFFFFFFF8))
1643  {
1644    free(ret_val);
1645    return NULL;
1646  }
1647
1648  ret_val->magic[0] = vk_header[0x0];
1649  ret_val->magic[1] = vk_header[0x1];
1650  if((ret_val->magic[0] != 'v') || (ret_val->magic[1] != 'k'))
1651  {
1652    free(ret_val);
1653    return NULL;
1654  }
1655
1656  ret_val->name_length = SVAL(vk_header, 0x2);
1657  raw_data_size = IVAL(vk_header, 0x4);
1658  ret_val->data_size = raw_data_size & ~VK_DATA_IN_OFFSET;
1659  ret_val->data_in_offset = (bool)(raw_data_size & VK_DATA_IN_OFFSET);
1660  ret_val->data_off = IVAL(vk_header, 0x8);
1661  ret_val->type = IVAL(vk_header, 0xC);
1662  ret_val->flag = SVAL(vk_header, 0x10);
1663  ret_val->unknown1 = SVAL(vk_header, 0x12);
1664
1665  if(ret_val->flag & VK_FLAG_NAME_PRESENT)
1666  {
1667    if(ret_val->name_length + REGFI_VK_MIN_LENGTH > ret_val->cell_size)
1668    {
1669      if(strict)
1670      {
1671        free(ret_val);
1672        return NULL;
1673      }
1674      else
1675        ret_val->name_length = ret_val->cell_size - REGFI_VK_MIN_LENGTH;
1676    }
1677
1678    /* Round up to the next multiple of 8 */
1679    length = (ret_val->name_length + REGFI_NK_MIN_LENGTH) & 0xFFFFFFF8;
1680    if(length < ret_val->name_length + REGFI_NK_MIN_LENGTH)
1681      length+=8;
1682
1683    ret_val->valuename = (char*)zalloc(sizeof(char)*(ret_val->name_length+1));
1684    if(ret_val->valuename == NULL)
1685    {
1686      free(ret_val);
1687      return NULL;
1688    }
1689   
1690    /* Don't need to seek, should be at the right offset */
1691    length = ret_val->name_length;
1692    if((regfi_read(file->fd, (uint8*)ret_val->valuename, &length) != 0)
1693       || length != ret_val->name_length)
1694    {
1695      free(ret_val->valuename);
1696      free(ret_val);
1697      return NULL;
1698    }
1699    ret_val->valuename[ret_val->name_length] = '\0';
1700  }
1701  else
1702    length = REGFI_VK_MIN_LENGTH;
1703
1704  if(unalloc)
1705  {
1706    /* If cell_size is still greater, truncate. */
1707    if(length < ret_val->cell_size)
1708      ret_val->cell_size = length;
1709  }
1710
1711  if(ret_val->data_size == 0)
1712    ret_val->data = NULL;
1713  else
1714  {
1715    ret_val->data = regfi_parse_data(file, ret_val->data_off+REGF_BLOCKSIZE,
1716                                     raw_data_size, strict);
1717    if(strict && (ret_val->data == NULL))
1718    {
1719      free(ret_val->valuename);
1720      free(ret_val);
1721      return NULL;
1722    }
1723  }
1724
1725  return ret_val;
1726}
1727
1728
1729uint8* regfi_parse_data(REGF_FILE* file, uint32 offset, uint32 length, bool strict)
1730{
1731  uint8* ret_val;
1732  uint32 read_length, cell_length;
1733  uint8 i;
1734  bool unalloc;
1735
1736  /* The data is stored in the offset if the size <= 4 */
1737  if (length & VK_DATA_IN_OFFSET)
1738  {
1739    length = length & ~VK_DATA_IN_OFFSET;
1740    if(length > 4)
1741      return NULL;
1742
1743    if((ret_val = (uint8*)zalloc(sizeof(uint8)*length)) == NULL)
1744      return NULL;
1745
1746    offset = offset - REGF_BLOCKSIZE;
1747    for(i = 0; i < length; i++)
1748      ret_val[i] = (uint8)((offset >> i*8) & 0xFF);
1749  }
1750  else
1751  {
1752    if(!regfi_parse_cell(file->fd, offset, NULL, 0,
1753                         &cell_length, &unalloc))
1754      return NULL;
1755
1756    if((cell_length & 0xFFFFFFF8) != cell_length)
1757      return NULL;
1758
1759    if(cell_length - 4 < length)
1760    {
1761      /* TODO: This strict condition has been triggered in multiple registries.
1762       *       Not sure the cause, but the data length values are very large,
1763       *       such as 53392.
1764       */
1765      if(strict)
1766        return NULL;
1767      else
1768        length = cell_length - 4;
1769    }
1770
1771    /* TODO: There is currently no check to ensure the data
1772     *       cell doesn't cross HBIN boundary.
1773     */
1774
1775    if((ret_val = (uint8*)zalloc(sizeof(uint8)*length)) == NULL)
1776      return NULL;
1777
1778    read_length = length;
1779    if((regfi_read(file->fd, ret_val, &read_length) != 0) 
1780       || read_length != length)
1781    {
1782      free(ret_val);
1783      return NULL;
1784    }
1785  }
1786
1787  return ret_val;
1788}
1789
1790
1791range_list* regfi_parse_unalloc_cells(REGF_FILE* file)
1792{
1793  range_list* ret_val;
1794  REGF_HBIN* hbin;
1795  const range_list_element* hbins_elem;
1796  uint32 i, num_hbins, curr_off, cell_len;
1797  bool is_unalloc;
1798
1799  ret_val = range_list_new();
1800  if(ret_val == NULL)
1801    return NULL;
1802
1803  num_hbins = range_list_size(file->hbins);
1804  for(i=0; i<num_hbins; i++)
1805  {
1806    hbins_elem = range_list_get(file->hbins, i);
1807    if(hbins_elem == NULL)
1808      break;
1809    hbin = (REGF_HBIN*)hbins_elem->data;
1810
1811    curr_off = HBIN_HEADER_REC_SIZE;
1812    while(curr_off < hbin->block_size)
1813    {
1814      if(!regfi_parse_cell(file->fd, hbin->file_off+curr_off, NULL, 0,
1815                           &cell_len, &is_unalloc))
1816        break;
1817     
1818      if((cell_len == 0) || ((cell_len & 0xFFFFFFFC) != cell_len))
1819        /* TODO: should report an error here. */
1820        break;
1821     
1822      /* for some reason the record_size of the last record in
1823         an hbin block can extend past the end of the block
1824         even though the record fits within the remaining
1825         space....aaarrrgggghhhhhh */ 
1826      if(curr_off + cell_len >= hbin->block_size)
1827        cell_len = hbin->block_size - curr_off;
1828     
1829      if(is_unalloc)
1830        range_list_add(ret_val, hbin->file_off+curr_off, 
1831                       cell_len, NULL);
1832     
1833      curr_off = curr_off+cell_len;
1834    }
1835  }
1836
1837  return ret_val;
1838}
Note: See TracBrowser for help on using the repository browser.