/* * Branched from Samba project Subversion repository, version #7470: * http://viewcvs.samba.org/cgi-bin/viewcvs.cgi/trunk/source/registry/regfio.c?rev=7470&view=auto * * Unix SMB/CIFS implementation. * Windows NT registry I/O library * * Copyright (C) 2005-2007 Timothy D. Morgan * Copyright (C) 2005 Gerald (Jerry) Carter * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; version 2 of the License. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. * * $Id: regfi.c 87 2007-02-04 01:55:18Z tim $ */ #include "../include/regfi.h" /* Registry types mapping */ const unsigned int regfi_num_reg_types = 12; static const char* regfi_type_names[] = {"NONE", "SZ", "EXPAND_SZ", "BINARY", "DWORD", "DWORD_BE", "LINK", "MULTI_SZ", "RSRC_LIST", "RSRC_DESC", "RSRC_REQ_LIST", "QWORD"}; /* Returns NULL on error */ const char* regfi_type_val2str(unsigned int val) { if(val == REG_KEY) return "KEY"; if(val >= regfi_num_reg_types) return NULL; return regfi_type_names[val]; } /* Returns -1 on error */ int regfi_type_str2val(const char* str) { int i; if(strcmp("KEY", str) == 0) return REG_KEY; for(i=0; i < regfi_num_reg_types; i++) if (strcmp(regfi_type_names[i], str) == 0) return i; if(strcmp("DWORD_LE", str) == 0) return REG_DWORD_LE; return -1; } /* Security descriptor parsing functions */ const char* regfi_ace_type2str(uint8 type) { static const char* map[7] = {"ALLOW", "DENY", "AUDIT", "ALARM", "ALLOW CPD", "OBJ ALLOW", "OBJ DENY"}; if(type < 7) return map[type]; else /* XXX: would be nice to return the unknown integer value. * However, as it is a const string, it can't be free()ed later on, * so that would need to change. */ return "UNKNOWN"; } /* XXX: need a better reference on the meaning of each flag. */ /* For more info, see: * http://msdn2.microsoft.com/en-us/library/aa772242.aspx */ char* regfi_ace_flags2str(uint8 flags) { static const char* flag_map[32] = { "OI", /* Object Inherit */ "CI", /* Container Inherit */ "NP", /* Non-Propagate */ "IO", /* Inherit Only */ "IA", /* Inherited ACE */ NULL, NULL, NULL, }; char* ret_val = malloc(35*sizeof(char)); char* fo = ret_val; uint32 i; uint8 f; if(ret_val == NULL) return NULL; fo[0] = '\0'; if (!flags) return ret_val; for(i=0; i < 8; i++) { f = (1<num_auths; char* ret_val = malloc(size); if(ret_val == NULL) return NULL; if(comps > MAXSUBAUTHS) comps = MAXSUBAUTHS; left -= sprintf(ret_val, "S-%u-%u", sid->sid_rev_num, sid->id_auth[5]); for (i = 0; i < comps; i++) left -= snprintf(ret_val+(size-left), left, "-%u", sid->sub_auths[i]); return ret_val; } char* regfi_get_acl(SEC_ACL* acl) { uint32 i, extra, size = 0; const char* type_str; char* flags_str; char* perms_str; char* sid_str; char* ace_delim = ""; char* ret_val = NULL; char* tmp_val = NULL; bool failed = false; char field_delim = ':'; for (i = 0; i < acl->num_aces && !failed; i++) { sid_str = regfi_sid2str(&acl->ace[i].trustee); type_str = regfi_ace_type2str(acl->ace[i].type); perms_str = regfi_ace_perms2str(acl->ace[i].info.mask); flags_str = regfi_ace_flags2str(acl->ace[i].flags); if(flags_str != NULL && perms_str != NULL && type_str != NULL && sid_str != NULL) { /* XXX: this is slow */ extra = strlen(sid_str) + strlen(type_str) + strlen(perms_str) + strlen(flags_str)+5; tmp_val = realloc(ret_val, size+extra); if(tmp_val == NULL) { free(ret_val); failed = true; } else { ret_val = tmp_val; size += snprintf(ret_val+size, extra, "%s%s%c%s%c%s%c%s", ace_delim,sid_str, field_delim,type_str, field_delim,perms_str, field_delim,flags_str); ace_delim = "|"; } } else failed = true; if(sid_str != NULL) free(sid_str); if(sid_str != NULL) free(perms_str); if(sid_str != NULL) free(flags_str); } return ret_val; } char* regfi_get_sacl(SEC_DESC *sec_desc) { if (sec_desc->sacl) return regfi_get_acl(sec_desc->sacl); else return NULL; } char* regfi_get_dacl(SEC_DESC *sec_desc) { if (sec_desc->dacl) return regfi_get_acl(sec_desc->dacl); else return NULL; } char* regfi_get_owner(SEC_DESC *sec_desc) { return regfi_sid2str(sec_desc->owner_sid); } char* regfi_get_group(SEC_DESC *sec_desc) { return regfi_sid2str(sec_desc->grp_sid); } /******************************************************************* *******************************************************************/ static int read_block( REGF_FILE *file, prs_struct *ps, uint32 file_offset, uint32 block_size ) { const int hdr_size = 0x20; int bytes_read, returned; char *buffer; SMB_STRUCT_STAT sbuf; /* check for end of file */ if ( fstat( file->fd, &sbuf ) ) { /*DEBUG(0,("read_block: stat() failed! (%s)\n", strerror(errno)));*/ return -1; } if ( (size_t)file_offset >= sbuf.st_size ) return -1; /* if block_size == 0, we are parsnig HBIN records and need to read some of the header to get the block_size from there */ if ( block_size == 0 ) { uint8 hdr[0x20]; if ( lseek( file->fd, file_offset, SEEK_SET ) == -1 ) { /*DEBUG(0,("read_block: lseek() failed! (%s)\n", strerror(errno) ));*/ return -1; } bytes_read = returned = 0; while (bytes_read < hdr_size) { returned = read(file->fd, hdr + bytes_read, hdr_size - bytes_read); if(returned == -1 && errno != EINTR && errno != EAGAIN) { /*DEBUG(0,("read_block: read of hdr failed (%s)\n",strerror(errno)));*/ return -1; } if(returned == 0) return -1; bytes_read += returned; } /* make sure this is an hbin header */ if ( strncmp( (char*)hdr, "hbin", HBIN_HDR_SIZE ) != 0 ) { /*DEBUG(0,("read_block: invalid block header!\n"));*/ return -1; } block_size = IVAL( hdr, 0x08 ); } /*DEBUG(10,("read_block: block_size == 0x%x\n", block_size ));*/ /* set the offset, initialize the buffer, and read the block from disk */ if ( lseek( file->fd, file_offset, SEEK_SET ) == -1 ) { /*DEBUG(0,("read_block: lseek() failed! (%s)\n", strerror(errno) ));*/ return -1; } prs_init( ps, block_size, file->mem_ctx, UNMARSHALL ); buffer = ps->data_p; bytes_read = returned = 0; while ( bytes_read < block_size ) { returned = read(file->fd, buffer+bytes_read, block_size-bytes_read); if(returned == -1 && errno != EINTR && errno != EAGAIN) { /*DEBUG(0,("read_block: read() failed (%s)\n", strerror(errno) ));*/ return -1; } if ((returned == 0) && (bytes_read < block_size)) { /*DEBUG(0,("read_block: not a vald registry file ?\n" ));*/ return -1; } bytes_read += returned; } return bytes_read; } /******************************************************************* *******************************************************************/ static bool prs_regf_block(const char *desc, prs_struct *ps, int depth, REGF_FILE *file) { depth++; if(!prs_uint8s("header", ps, depth, file->header, sizeof(file->header))) return false; /* yes, these values are always identical so store them only once */ if ( !prs_uint32( "unknown1", ps, depth, &file->unknown1 )) return false; if ( !prs_uint32( "unknown1 (again)", ps, depth, &file->unknown1 )) return false; /* get the modtime */ if ( !prs_set_offset( ps, 0x0c ) ) return false; if ( !smb_io_time( "modtime", &file->mtime, ps, depth ) ) return false; /* constants */ if ( !prs_uint32( "unknown2", ps, depth, &file->unknown2 )) return false; if ( !prs_uint32( "unknown3", ps, depth, &file->unknown3 )) return false; if ( !prs_uint32( "unknown4", ps, depth, &file->unknown4 )) return false; if ( !prs_uint32( "unknown5", ps, depth, &file->unknown5 )) return false; /* get file offsets */ if ( !prs_set_offset( ps, 0x24 ) ) return false; if ( !prs_uint32( "data_offset", ps, depth, &file->data_offset )) return false; if ( !prs_uint32( "last_block", ps, depth, &file->last_block )) return false; /* one more constant */ if ( !prs_uint32( "unknown6", ps, depth, &file->unknown6 )) return false; /* get the checksum */ if ( !prs_set_offset( ps, 0x01fc ) ) return false; if ( !prs_uint32( "checksum", ps, depth, &file->checksum )) return false; return true; } /******************************************************************* *******************************************************************/ static bool prs_hbin_block(const char *desc, prs_struct *ps, int depth, REGF_HBIN *hbin) { uint32 block_size2; depth++; if(!prs_uint8s("header", ps, depth, hbin->header, sizeof(hbin->header))) return false; if ( !prs_uint32( "first_hbin_off", ps, depth, &hbin->first_hbin_off )) return false; /* The dosreg.cpp comments say that the block size is at 0x1c. According to a WINXP NTUSER.dat file, this is wrong. The block_size is at 0x08 */ if ( !prs_uint32( "block_size", ps, depth, &hbin->block_size )) return false; block_size2 = hbin->block_size; prs_set_offset( ps, 0x1c ); if ( !prs_uint32( "block_size2", ps, depth, &block_size2 )) return false; if ( !ps->io ) hbin->dirty = true; return true; } /******************************************************************* *******************************************************************/ static bool prs_nk_rec( const char *desc, prs_struct *ps, int depth, REGF_NK_REC *nk ) { uint16 class_length, name_length; uint32 start; uint32 data_size, start_off, end_off; uint32 unknown_off = REGF_OFFSET_NONE; nk->hbin_off = ps->data_offset; start = nk->hbin_off; depth++; /* back up and get the data_size */ if ( !prs_set_offset( ps, ps->data_offset-sizeof(uint32)) ) return false; start_off = ps->data_offset; if ( !prs_uint32( "rec_size", ps, depth, &nk->rec_size )) return false; if (!prs_uint8s("header", ps, depth, nk->header, sizeof(nk->header))) return false; if ( !prs_uint16( "key_type", ps, depth, &nk->key_type )) return false; if ( !smb_io_time( "mtime", &nk->mtime, ps, depth )) return false; if ( !prs_set_offset( ps, start+0x0010 ) ) return false; if ( !prs_uint32( "parent_off", ps, depth, &nk->parent_off )) return false; if ( !prs_uint32( "num_subkeys", ps, depth, &nk->num_subkeys )) return false; if ( !prs_set_offset( ps, start+0x001c ) ) return false; if ( !prs_uint32( "subkeys_off", ps, depth, &nk->subkeys_off )) return false; if ( !prs_uint32( "unknown_off", ps, depth, &unknown_off) ) return false; if ( !prs_set_offset( ps, start+0x0024 ) ) return false; if ( !prs_uint32( "num_values", ps, depth, &nk->num_values )) return false; if ( !prs_uint32( "values_off", ps, depth, &nk->values_off )) return false; if ( !prs_uint32( "sk_off", ps, depth, &nk->sk_off )) return false; if ( !prs_uint32( "classname_off", ps, depth, &nk->classname_off )) return false; if (!prs_uint32("max_bytes_subkeyname", ps, depth, &nk->max_bytes_subkeyname)) return false; if ( !prs_uint32( "max_bytes_subkeyclassname", ps, depth, &nk->max_bytes_subkeyclassname)) { return false; } if ( !prs_uint32( "max_bytes_valuename", ps, depth, &nk->max_bytes_valuename)) return false; if ( !prs_uint32( "max_bytes_value", ps, depth, &nk->max_bytes_value)) return false; if ( !prs_uint32( "unknown index", ps, depth, &nk->unk_index)) return false; name_length = nk->keyname ? strlen(nk->keyname) : 0 ; class_length = nk->classname ? strlen(nk->classname) : 0 ; if ( !prs_uint16( "name_length", ps, depth, &name_length )) return false; if ( !prs_uint16( "class_length", ps, depth, &class_length )) return false; if ( class_length ) { /* XXX: why isn't this parsed? */ ;; } if ( name_length ) { if(ps->io && !(nk->keyname = (char*)zcalloc(sizeof(char), name_length+1))) return false; if(!prs_uint8s("name", ps, depth, (uint8*)nk->keyname, name_length)) return false; if(ps->io) nk->keyname[name_length] = '\0'; } end_off = ps->data_offset; /* data_size must be divisible by 8 and large enough to hold the original record */ data_size = ((start_off - end_off) & 0xfffffff8 ); /*if ( data_size > nk->rec_size ) DEBUG(10,("Encountered reused record (0x%x < 0x%x)\n", data_size, nk->rec_size));*/ if ( !ps->io ) nk->hbin->dirty = true; return true; } /******************************************************************* *******************************************************************/ static uint32 regf_block_checksum( prs_struct *ps ) { char *buffer = ps->data_p; uint32 checksum, x; int i; /* XOR of all bytes 0x0000 - 0x01FB */ checksum = x = 0; for ( i=0; i<0x01FB; i+=4 ) { x = IVAL(buffer, i ); checksum ^= x; } return checksum; } /******************************************************************* *******************************************************************/ static bool read_regf_block( REGF_FILE *file ) { prs_struct ps; uint32 checksum; /* grab the first block from the file */ if ( read_block( file, &ps, 0, REGF_BLOCKSIZE ) == -1 ) return false; /* parse the block and verify the checksum */ if ( !prs_regf_block( "regf_header", &ps, 0, file ) ) return false; checksum = regf_block_checksum( &ps ); if(ps.is_dynamic) SAFE_FREE(ps.data_p); ps.is_dynamic = false; ps.buffer_size = 0; ps.data_offset = 0; if ( file->checksum != checksum ) { /*DEBUG(0,("read_regf_block: invalid checksum\n" ));*/ return false; } return true; } /******************************************************************* *******************************************************************/ static REGF_HBIN* read_hbin_block( REGF_FILE *file, off_t offset ) { REGF_HBIN *hbin; uint32 record_size, curr_off, block_size, header; if ( !(hbin = (REGF_HBIN*)zalloc(sizeof(REGF_HBIN))) ) return NULL; hbin->file_off = offset; hbin->free_off = -1; if ( read_block( file, &hbin->ps, offset, 0 ) == -1 ) return NULL; if ( !prs_hbin_block( "hbin", &hbin->ps, 0, hbin ) ) return NULL; /* this should be the same thing as hbin->block_size but just in case */ block_size = hbin->ps.buffer_size; /* Find the available free space offset. Always at the end, so walk the record list and stop when you get to the end. The end is defined by a record header of 0xffffffff. The previous 4 bytes contains the amount of free space remaining in the hbin block. */ /* remember that the record_size is in the 4 bytes preceeding the record itself */ if ( !prs_set_offset( &hbin->ps, file->data_offset+HBIN_HDR_SIZE-sizeof(uint32) ) ) return false; record_size = 0; curr_off = hbin->ps.data_offset; while ( header != 0xffffffff ) { /* not done yet so reset the current offset to the next record_size field */ curr_off = curr_off+record_size; /* for some reason the record_size of the last record in an hbin block can extend past the end of the block even though the record fits within the remaining space....aaarrrgggghhhhhh */ if ( curr_off >= block_size ) { record_size = -1; curr_off = -1; break; } if ( !prs_set_offset( &hbin->ps, curr_off) ) return false; if ( !prs_uint32( "rec_size", &hbin->ps, 0, &record_size ) ) return false; if ( !prs_uint32( "header", &hbin->ps, 0, &header ) ) return false; assert( record_size != 0 ); if ( record_size & 0x80000000 ) { /* absolute_value(record_size) */ record_size = (record_size ^ 0xffffffff) + 1; } } /* save the free space offset */ if ( header == 0xffffffff ) { /* account for the fact that the curr_off is 4 bytes behind the actual record header */ hbin->free_off = curr_off + sizeof(uint32); hbin->free_size = record_size; } /*DEBUG(10,("read_hbin_block: free space offset == 0x%x\n", hbin->free_off));*/ if ( !prs_set_offset( &hbin->ps, file->data_offset+HBIN_HDR_SIZE ) ) return false; return hbin; } /******************************************************************* Input a randon offset and receive the correpsonding HBIN block for it *******************************************************************/ static bool hbin_contains_offset( REGF_HBIN *hbin, uint32 offset ) { if ( !hbin ) return false; if ( (offset > hbin->first_hbin_off) && (offset < (hbin->first_hbin_off+hbin->block_size)) ) return true; return false; } /******************************************************************* Input a randon offset and receive the correpsonding HBIN block for it *******************************************************************/ static REGF_HBIN* lookup_hbin_block( REGF_FILE *file, uint32 offset ) { REGF_HBIN *hbin = NULL; uint32 block_off; /* start with the open list */ for ( hbin=file->block_list; hbin; hbin=hbin->next ) { /* DEBUG(10,("lookup_hbin_block: address = 0x%x [0x%x]\n", hbin->file_off, (uint32)hbin ));*/ if ( hbin_contains_offset( hbin, offset ) ) return hbin; } if ( !hbin ) { /* start at the beginning */ block_off = REGF_BLOCKSIZE; do { /* cleanup before the next round */ if ( hbin ) { if(hbin->ps.is_dynamic) SAFE_FREE(hbin->ps.data_p); hbin->ps.is_dynamic = false; hbin->ps.buffer_size = 0; hbin->ps.data_offset = 0; } hbin = read_hbin_block( file, block_off ); if ( hbin ) block_off = hbin->file_off + hbin->block_size; } while ( hbin && !hbin_contains_offset( hbin, offset ) ); } if ( hbin ) /* XXX: this kind of caching needs to be re-evaluated */ DLIST_ADD( file->block_list, hbin ); return hbin; } /******************************************************************* *******************************************************************/ static bool prs_hash_rec( const char *desc, prs_struct *ps, int depth, REGF_HASH_REC *hash ) { depth++; if ( !prs_uint32( "nk_off", ps, depth, &hash->nk_off )) return false; if ( !prs_uint8s("keycheck", ps, depth, hash->keycheck, sizeof( hash->keycheck )) ) return false; return true; } /******************************************************************* *******************************************************************/ static bool hbin_prs_lf_records(const char *desc, REGF_HBIN *hbin, int depth, REGF_NK_REC *nk) { int i; REGF_LF_REC *lf = &nk->subkeys; uint32 data_size, start_off, end_off; depth++; /* check if we have anything to do first */ if ( nk->num_subkeys == 0 ) return true; /* move to the LF record */ if ( !prs_set_offset( &hbin->ps, nk->subkeys_off + HBIN_HDR_SIZE - hbin->first_hbin_off ) ) return false; /* backup and get the data_size */ if ( !prs_set_offset( &hbin->ps, hbin->ps.data_offset-sizeof(uint32)) ) return false; start_off = hbin->ps.data_offset; if ( !prs_uint32( "rec_size", &hbin->ps, depth, &lf->rec_size )) return false; if(!prs_uint8s("header", &hbin->ps, depth, lf->header, sizeof(lf->header))) return false; if ( !prs_uint16( "num_keys", &hbin->ps, depth, &lf->num_keys)) return false; if ( hbin->ps.io ) { if ( !(lf->hashes = (REGF_HASH_REC*)zcalloc(sizeof(REGF_HASH_REC), lf->num_keys )) ) return false; } for ( i=0; inum_keys; i++ ) { if ( !prs_hash_rec( "hash_rec", &hbin->ps, depth, &lf->hashes[i] ) ) return false; } end_off = hbin->ps.data_offset; /* data_size must be divisible by 8 and large enough to hold the original record */ data_size = ((start_off - end_off) & 0xfffffff8 ); /* if ( data_size > lf->rec_size )*/ /*DEBUG(10,("Encountered reused record (0x%x < 0x%x)\n", data_size, lf->rec_size));*/ if ( !hbin->ps.io ) hbin->dirty = true; return true; } /******************************************************************* *******************************************************************/ static bool hbin_prs_sk_rec( const char *desc, REGF_HBIN *hbin, int depth, REGF_SK_REC *sk ) { prs_struct *ps = &hbin->ps; uint16 tag = 0xFFFF; uint32 data_size, start_off, end_off; depth++; if ( !prs_set_offset( &hbin->ps, sk->sk_off + HBIN_HDR_SIZE - hbin->first_hbin_off ) ) return false; /* backup and get the data_size */ if ( !prs_set_offset( &hbin->ps, hbin->ps.data_offset-sizeof(uint32)) ) return false; start_off = hbin->ps.data_offset; if ( !prs_uint32( "rec_size", &hbin->ps, depth, &sk->rec_size )) return false; if (!prs_uint8s("header", ps, depth, sk->header, sizeof(sk->header))) return false; if ( !prs_uint16( "tag", ps, depth, &tag)) return false; if ( !prs_uint32( "prev_sk_off", ps, depth, &sk->prev_sk_off)) return false; if ( !prs_uint32( "next_sk_off", ps, depth, &sk->next_sk_off)) return false; if ( !prs_uint32( "ref_count", ps, depth, &sk->ref_count)) return false; if ( !prs_uint32( "size", ps, depth, &sk->size)) return false; if ( !sec_io_desc( "sec_desc", &sk->sec_desc, ps, depth )) return false; end_off = hbin->ps.data_offset; /* data_size must be divisible by 8 and large enough to hold the original record */ data_size = ((start_off - end_off) & 0xfffffff8 ); /* if ( data_size > sk->rec_size )*/ /*DEBUG(10,("Encountered reused record (0x%x < 0x%x)\n", data_size, sk->rec_size));*/ if ( !hbin->ps.io ) hbin->dirty = true; return true; } /******************************************************************* *******************************************************************/ static bool hbin_prs_vk_rec( const char *desc, REGF_HBIN *hbin, int depth, REGF_VK_REC *vk, REGF_FILE *file ) { uint32 offset; uint16 name_length; prs_struct *ps = &hbin->ps; uint32 data_size, start_off, end_off; depth++; /* backup and get the data_size */ if ( !prs_set_offset( &hbin->ps, hbin->ps.data_offset-sizeof(uint32)) ) return false; start_off = hbin->ps.data_offset; if ( !prs_uint32( "rec_size", &hbin->ps, depth, &vk->rec_size )) return false; if ( !prs_uint8s("header", ps, depth, vk->header, sizeof( vk->header )) ) return false; if ( !hbin->ps.io ) name_length = strlen(vk->valuename); if ( !prs_uint16( "name_length", ps, depth, &name_length )) return false; if ( !prs_uint32( "data_size", ps, depth, &vk->data_size )) return false; if ( !prs_uint32( "data_off", ps, depth, &vk->data_off )) return false; if ( !prs_uint32( "type", ps, depth, &vk->type)) return false; if ( !prs_uint16( "flag", ps, depth, &vk->flag)) return false; offset = ps->data_offset; offset += 2; /* skip 2 bytes */ prs_set_offset( ps, offset ); /* get the name */ if ( vk->flag&VK_FLAG_NAME_PRESENT ) { if ( hbin->ps.io ) { if ( !(vk->valuename = (char*)zcalloc(sizeof(char), name_length+1 ))) return false; } if ( !prs_uint8s("name", ps, depth, (uint8*)vk->valuename, name_length) ) return false; } end_off = hbin->ps.data_offset; /* get the data if necessary */ if ( vk->data_size != 0 ) { /* the data is stored in the offset if the size <= 4 */ if ( !(vk->data_size & VK_DATA_IN_OFFSET) ) { REGF_HBIN *hblock = hbin; uint32 data_rec_size; if ( hbin->ps.io ) { if ( !(vk->data = (uint8*)zcalloc(sizeof(uint8), vk->data_size) ) ) return false; } /* this data can be in another hbin */ if ( !hbin_contains_offset( hbin, vk->data_off ) ) { if ( !(hblock = lookup_hbin_block( file, vk->data_off )) ) return false; } if (!(prs_set_offset(&hblock->ps, (vk->data_off + HBIN_HDR_SIZE - hblock->first_hbin_off) - sizeof(uint32)))) { return false; } if ( !hblock->ps.io ) { data_rec_size = ( (vk->data_size+sizeof(uint32)) & 0xfffffff8 ) + 8; data_rec_size = ( data_rec_size - 1 ) ^ 0xFFFFFFFF; } if ( !prs_uint32( "data_rec_size", &hblock->ps, depth, &data_rec_size )) return false; if(!prs_uint8s("data", &hblock->ps, depth, vk->data, vk->data_size)) return false; if ( !hblock->ps.io ) hblock->dirty = true; } else { if(!(vk->data = zcalloc(sizeof(uint8), 4))) return false; SIVAL( vk->data, 0, vk->data_off ); } } /* data_size must be divisible by 8 and large enough to hold the original record */ data_size = ((start_off - end_off ) & 0xfffffff8 ); /* XXX: should probably print a warning here */ /*if ( data_size != vk->rec_size ) DEBUG(10,("prs_vk_rec: data_size check failed (0x%x < 0x%x)\n", data_size, vk->rec_size));*/ if ( !hbin->ps.io ) hbin->dirty = true; return true; } /******************************************************************* read a VK record which is contained in the HBIN block stored in the prs_struct *ps. *******************************************************************/ static bool hbin_prs_vk_records(const char *desc, REGF_HBIN *hbin, int depth, REGF_NK_REC *nk, REGF_FILE *file) { int i; uint32 record_size; depth++; /* check if we have anything to do first */ if(nk->num_values == 0) return true; if(hbin->ps.io) { if (!(nk->values = (REGF_VK_REC*)zcalloc(sizeof(REGF_VK_REC), nk->num_values ))) return false; } /* convert the offset to something relative to this HBIN block */ if (!prs_set_offset(&hbin->ps, nk->values_off + HBIN_HDR_SIZE - hbin->first_hbin_off - sizeof(uint32))) { return false; } if ( !hbin->ps.io ) { record_size = ( ( nk->num_values * sizeof(uint32) ) & 0xfffffff8 ) + 8; record_size = (record_size - 1) ^ 0xFFFFFFFF; } if ( !prs_uint32( "record_size", &hbin->ps, depth, &record_size ) ) return false; for ( i=0; inum_values; i++ ) { if ( !prs_uint32( "vk_off", &hbin->ps, depth, &nk->values[i].rec_off ) ) return false; } for ( i=0; inum_values; i++ ) { REGF_HBIN *sub_hbin = hbin; uint32 new_offset; if ( !hbin_contains_offset( hbin, nk->values[i].rec_off ) ) { sub_hbin = lookup_hbin_block( file, nk->values[i].rec_off ); if ( !sub_hbin ) { /*DEBUG(0,("hbin_prs_vk_records: Failed to find HBIN block containing offset [0x%x]\n", nk->values[i].hbin_off));*/ return false; } } new_offset = nk->values[i].rec_off + HBIN_HDR_SIZE - sub_hbin->first_hbin_off; if (!prs_set_offset(&sub_hbin->ps, new_offset)) return false; if (!hbin_prs_vk_rec("vk_rec", sub_hbin, depth, &nk->values[i], file)) return false; } if ( !hbin->ps.io ) hbin->dirty = true; return true; } /******************************************************************* *******************************************************************/ static REGF_SK_REC* find_sk_record_by_offset( REGF_FILE *file, uint32 offset ) { REGF_SK_REC *p_sk; for ( p_sk=file->sec_desc_list; p_sk; p_sk=p_sk->next ) { if ( p_sk->sk_off == offset ) return p_sk; } return NULL; } /******************************************************************* *******************************************************************/ static REGF_SK_REC* find_sk_record_by_sec_desc( REGF_FILE *file, SEC_DESC *sd ) { REGF_SK_REC *p; for ( p=file->sec_desc_list; p; p=p->next ) { if ( sec_desc_equal( p->sec_desc, sd ) ) return p; } /* failure */ return NULL; } /******************************************************************* *******************************************************************/ static bool hbin_prs_key( REGF_FILE *file, REGF_HBIN *hbin, REGF_NK_REC *nk ) { int depth = 0; REGF_HBIN *sub_hbin; depth++; /* get the initial nk record */ if (!prs_nk_rec("nk_rec", &hbin->ps, depth, nk)) return false; /* fill in values */ if ( nk->num_values && (nk->values_off!=REGF_OFFSET_NONE) ) { sub_hbin = hbin; if ( !hbin_contains_offset( hbin, nk->values_off ) ) { sub_hbin = lookup_hbin_block( file, nk->values_off ); if ( !sub_hbin ) { /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing value_list_offset [0x%x]\n", nk->values_off));*/ return false; } } if(!hbin_prs_vk_records("vk_rec", sub_hbin, depth, nk, file)) return false; } /* now get subkeys */ if ( nk->num_subkeys && (nk->subkeys_off!=REGF_OFFSET_NONE) ) { sub_hbin = hbin; if ( !hbin_contains_offset( hbin, nk->subkeys_off ) ) { sub_hbin = lookup_hbin_block( file, nk->subkeys_off ); if ( !sub_hbin ) { /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing subkey_offset [0x%x]\n", nk->subkeys_off));*/ return false; } } if (!hbin_prs_lf_records("lf_rec", sub_hbin, depth, nk)) return false; } /* get the to the security descriptor. First look if we have already parsed it */ if ((nk->sk_off!=REGF_OFFSET_NONE) && !(nk->sec_desc = find_sk_record_by_offset( file, nk->sk_off ))) { sub_hbin = hbin; if (!hbin_contains_offset(hbin, nk->sk_off)) { sub_hbin = lookup_hbin_block( file, nk->sk_off ); if ( !sub_hbin ) { /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing sk_offset [0x%x]\n", nk->subkeys_off));*/ return false; } } if ( !(nk->sec_desc = (REGF_SK_REC*)zalloc(sizeof(REGF_SK_REC) )) ) return false; nk->sec_desc->sk_off = nk->sk_off; if ( !hbin_prs_sk_rec( "sk_rec", sub_hbin, depth, nk->sec_desc )) return false; /* add to the list of security descriptors (ref_count has been read from the files) */ nk->sec_desc->sk_off = nk->sk_off; /* XXX: this kind of caching needs to be re-evaluated */ DLIST_ADD( file->sec_desc_list, nk->sec_desc ); } return true; } /******************************************************************* *******************************************************************/ static bool next_record( REGF_HBIN *hbin, const char *hdr, bool *eob ) { uint8 header[REC_HDR_SIZE] = ""; uint32 record_size; uint32 curr_off, block_size; bool found = false; prs_struct *ps = &hbin->ps; curr_off = ps->data_offset; if ( curr_off == 0 ) prs_set_offset( ps, HBIN_HEADER_REC_SIZE ); /* assume that the current offset is at the reacord header and we need to backup to read the record size */ curr_off -= sizeof(uint32); block_size = ps->buffer_size; record_size = 0; while ( !found ) { curr_off = curr_off+record_size; if ( curr_off >= block_size ) break; if ( !prs_set_offset( &hbin->ps, curr_off) ) return false; if ( !prs_uint32( "record_size", ps, 0, &record_size ) ) return false; if ( !prs_uint8s("header", ps, 0, header, REC_HDR_SIZE ) ) return false; if ( record_size & 0x80000000 ) { /* absolute_value(record_size) */ record_size = (record_size ^ 0xffffffff) + 1; } if ( memcmp( header, hdr, REC_HDR_SIZE ) == 0 ) { found = true; curr_off += sizeof(uint32); } } /* mark prs_struct as done ( at end ) if no more SK records */ /* mark end-of-block as true */ if ( !found ) { prs_set_offset( &hbin->ps, hbin->ps.buffer_size ); *eob = true; return false; } if (!prs_set_offset(ps, curr_off)) return false; return true; } /******************************************************************* *******************************************************************/ static bool next_nk_record(REGF_FILE *file, REGF_HBIN *hbin, REGF_NK_REC *nk, bool *eob) { if (next_record(hbin, "nk", eob) && hbin_prs_key(file, hbin, nk)) return true; return false; } /******************************************************************* Open the registry file and then read in the REGF block to get the first hbin offset. *******************************************************************/ REGF_FILE* regfi_open( const char *filename ) { REGF_FILE *rb; int flags = O_RDONLY; if ( !(rb = (REGF_FILE*)malloc(sizeof(REGF_FILE))) ) { /* DEBUG(0,("ERROR allocating memory\n")); */ return NULL; } memset(rb, 0, sizeof(REGF_FILE)); rb->fd = -1; /* if ( !(rb->mem_ctx = talloc_init( "read_regf_block" )) ) { regfi_close( rb ); return NULL; } */ rb->open_flags = flags; /* open and existing file */ if ( (rb->fd = open(filename, flags)) == -1 ) { /* DEBUG(0,("regfi_open: failure to open %s (%s)\n", filename, strerror(errno)));*/ regfi_close( rb ); return NULL; } /* read in an existing file */ if ( !read_regf_block( rb ) ) { /* DEBUG(0,("regfi_open: Failed to read initial REGF block\n"));*/ regfi_close( rb ); return NULL; } /* success */ return rb; } /******************************************************************* XXX: should this be nuked? *******************************************************************/ static void regfi_mem_free( REGF_FILE *file ) { /* free any zalloc()'d memory */ /* if ( file && file->mem_ctx ) free(file->mem_ctx); */ } /******************************************************************* *******************************************************************/ int regfi_close( REGF_FILE *file ) { int fd; regfi_mem_free( file ); /* nothing to do if there is no open file */ if ( !file || (file->fd == -1) ) return 0; fd = file->fd; file->fd = -1; SAFE_FREE( file ); return close( fd ); } /****************************************************************************** * There should be only *one* root key in the registry file based * on my experience. --jerry *****************************************************************************/ REGF_NK_REC* regfi_rootkey( REGF_FILE *file ) { REGF_NK_REC *nk; REGF_HBIN *hbin; uint32 offset = REGF_BLOCKSIZE; bool found = false; bool eob; if ( !file ) return NULL; if ( !(nk = (REGF_NK_REC*)zalloc(sizeof(REGF_NK_REC) )) ) { /*DEBUG(0,("regfi_rootkey: zalloc() failed!\n"));*/ return NULL; } /* scan through the file on HBIN block at a time looking for an NK record with a type == 0x002c. Normally this is the first nk record in the first hbin block (but I'm not assuming that for now) */ while ( (hbin = read_hbin_block( file, offset )) ) { eob = false; while ( !eob) { if ( next_nk_record( file, hbin, nk, &eob ) ) { if ( nk->key_type == NK_TYPE_ROOTKEY ) { found = true; break; } } if(hbin->ps.is_dynamic) SAFE_FREE(hbin->ps.data_p); hbin->ps.is_dynamic = false; hbin->ps.buffer_size = 0; hbin->ps.data_offset = 0; } if ( found ) break; offset += hbin->block_size; } if ( !found ) { /*DEBUG(0,("regfi_rootkey: corrupt registry file ? No root key record located\n"));*/ return NULL; } /* XXX: this kind of caching needs to be re-evaluated */ DLIST_ADD( file->block_list, hbin ); return nk; } /****************************************************************************** *****************************************************************************/ void regfi_key_free(REGF_NK_REC* nk) { uint32 i; if((nk->values != NULL) && (nk->values_off!=REGF_OFFSET_NONE)) { for(i=0; i < nk->num_values; i++) { if(nk->values[i].valuename != NULL) free(nk->values[i].valuename); if(nk->values[i].data != NULL) free(nk->values[i].data); } free(nk->values); } if(nk->keyname != NULL) free(nk->keyname); if(nk->classname != NULL) free(nk->classname); /* XXX: not freeing hbin because these are cached. This needs to be reviewed. */ /* XXX: not freeing sec_desc because these are cached. This needs to be reviewed. */ free(nk); } /****************************************************************************** *****************************************************************************/ REGFI_ITERATOR* regfi_iterator_new(REGF_FILE* fh) { REGF_NK_REC* root; REGFI_ITERATOR* ret_val = (REGFI_ITERATOR*)malloc(sizeof(REGFI_ITERATOR)); if(ret_val == NULL) return NULL; root = regfi_rootkey(fh); if(root == NULL) { free(ret_val); return NULL; } ret_val->key_positions = void_stack_new(REGF_MAX_DEPTH); if(ret_val->key_positions == NULL) { free(ret_val); free(root); return NULL; } ret_val->f = fh; ret_val->cur_key = root; ret_val->cur_subkey = 0; ret_val->cur_value = 0; return ret_val; } /****************************************************************************** *****************************************************************************/ void regfi_iterator_free(REGFI_ITERATOR* i) { REGFI_ITER_POSITION* cur; if(i->cur_key != NULL) regfi_key_free(i->cur_key); while((cur = (REGFI_ITER_POSITION*)void_stack_pop(i->key_positions)) != NULL) { regfi_key_free(cur->nk); free(cur); } free(i); } /****************************************************************************** *****************************************************************************/ /* XXX: some way of indicating reason for failure should be added. */ bool regfi_iterator_down(REGFI_ITERATOR* i) { REGF_NK_REC* subkey; REGFI_ITER_POSITION* pos; pos = (REGFI_ITER_POSITION*)malloc(sizeof(REGFI_ITER_POSITION)); if(pos == NULL) return false; subkey = (REGF_NK_REC*)regfi_iterator_cur_subkey(i); if(subkey == NULL) { free(pos); return false; } pos->nk = i->cur_key; pos->cur_subkey = i->cur_subkey; if(!void_stack_push(i->key_positions, pos)) { free(pos); regfi_key_free(subkey); return false; } i->cur_key = subkey; i->cur_subkey = 0; i->cur_value = 0; return true; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_up(REGFI_ITERATOR* i) { REGFI_ITER_POSITION* pos; pos = (REGFI_ITER_POSITION*)void_stack_pop(i->key_positions); if(pos == NULL) return false; regfi_key_free(i->cur_key); i->cur_key = pos->nk; i->cur_subkey = pos->cur_subkey; i->cur_value = 0; free(pos); return true; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_to_root(REGFI_ITERATOR* i) { while(regfi_iterator_up(i)) continue; return true; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_find_subkey(REGFI_ITERATOR* i, const char* subkey_name) { REGF_NK_REC* subkey; bool found = false; uint32 old_subkey = i->cur_subkey; if(subkey_name == NULL) return false; /* XXX: this alloc/free of each sub key might be a bit excessive */ subkey = (REGF_NK_REC*)regfi_iterator_first_subkey(i); while((subkey != NULL) && (found == false)) { if(subkey->keyname != NULL && strcasecmp(subkey->keyname, subkey_name) == 0) found = true; else { regfi_key_free(subkey); subkey = (REGF_NK_REC*)regfi_iterator_next_subkey(i); } } if(found == false) { i->cur_subkey = old_subkey; return false; } regfi_key_free(subkey); return true; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_walk_path(REGFI_ITERATOR* i, const char** path) { uint32 x; if(path == NULL) return false; for(x=0; ((path[x] != NULL) && regfi_iterator_find_subkey(i, path[x]) && regfi_iterator_down(i)); x++) { continue; } if(path[x] == NULL) return true; /* XXX: is this the right number of times? */ for(; x > 0; x--) regfi_iterator_up(i); return false; } /****************************************************************************** *****************************************************************************/ const REGF_NK_REC* regfi_iterator_cur_key(REGFI_ITERATOR* i) { return i->cur_key; } /****************************************************************************** *****************************************************************************/ const REGF_NK_REC* regfi_iterator_first_subkey(REGFI_ITERATOR* i) { i->cur_subkey = 0; return regfi_iterator_cur_subkey(i); } /****************************************************************************** *****************************************************************************/ const REGF_NK_REC* regfi_iterator_cur_subkey(REGFI_ITERATOR* i) { REGF_NK_REC* subkey; REGF_HBIN* hbin; uint32 nk_offset; /* see if there is anything left to report */ if (!(i->cur_key) || (i->cur_key->subkeys_off==REGF_OFFSET_NONE) || (i->cur_subkey >= i->cur_key->num_subkeys)) return NULL; nk_offset = i->cur_key->subkeys.hashes[i->cur_subkey].nk_off; /* find the HBIN block which should contain the nk record */ hbin = lookup_hbin_block(i->f, nk_offset); if(!hbin) { /* XXX: should print out some kind of error message every time here */ /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing offset [0x%x]\n", i->cur_key->subkeys.hashes[i->cur_subkey].nk_off));*/ return NULL; } if(!prs_set_offset(&hbin->ps, HBIN_HDR_SIZE + nk_offset - hbin->first_hbin_off)) return NULL; if(!(subkey = (REGF_NK_REC*)zalloc(sizeof(REGF_NK_REC)))) return NULL; if(!hbin_prs_key(i->f, hbin, subkey)) { regfi_key_free(subkey); return NULL; } return subkey; } /****************************************************************************** *****************************************************************************/ /* XXX: some way of indicating reason for failure should be added. */ const REGF_NK_REC* regfi_iterator_next_subkey(REGFI_ITERATOR* i) { const REGF_NK_REC* subkey; i->cur_subkey++; subkey = regfi_iterator_cur_subkey(i); if(subkey == NULL) i->cur_subkey--; return subkey; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_find_value(REGFI_ITERATOR* i, const char* value_name) { const REGF_VK_REC* cur; bool found = false; /* XXX: cur->valuename can be NULL in the registry. * Should we allow for a way to search for that? */ if(value_name == NULL) return false; cur = regfi_iterator_first_value(i); while((cur != NULL) && (found == false)) { if((cur->valuename != NULL) && (strcasecmp(cur->valuename, value_name) == 0)) found = true; cur = regfi_iterator_next_value(i); } if(cur == NULL) return false; return true; } /****************************************************************************** *****************************************************************************/ const REGF_VK_REC* regfi_iterator_first_value(REGFI_ITERATOR* i) { i->cur_value = 0; return regfi_iterator_cur_value(i); } /****************************************************************************** *****************************************************************************/ const REGF_VK_REC* regfi_iterator_cur_value(REGFI_ITERATOR* i) { REGF_VK_REC* ret_val = NULL; if(i->cur_value < i->cur_key->num_values) ret_val = &(i->cur_key->values[i->cur_value]); return ret_val; } /****************************************************************************** *****************************************************************************/ const REGF_VK_REC* regfi_iterator_next_value(REGFI_ITERATOR* i) { const REGF_VK_REC* ret_val; i->cur_value++; ret_val = regfi_iterator_cur_value(i); if(ret_val == NULL) i->cur_value--; return ret_val; }