/* * Branched from Samba project Subversion repository, version #7470: * http://viewcvs.samba.org/cgi-bin/viewcvs.cgi/trunk/source/registry/regfio.c?rev=7470&view=auto * * Unix SMB/CIFS implementation. * Windows NT registry I/O library * * Copyright (C) 2005-2008 Timothy D. Morgan * Copyright (C) 2005 Gerald (Jerry) Carter * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; version 2 of the License. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. * * $Id: regfi.c 97 2008-02-27 01:04:14Z tim $ */ #include "../include/regfi.h" /* Registry types mapping */ const unsigned int regfi_num_reg_types = 12; static const char* regfi_type_names[] = {"NONE", "SZ", "EXPAND_SZ", "BINARY", "DWORD", "DWORD_BE", "LINK", "MULTI_SZ", "RSRC_LIST", "RSRC_DESC", "RSRC_REQ_LIST", "QWORD"}; /* Returns NULL on error */ const char* regfi_type_val2str(unsigned int val) { if(val == REG_KEY) return "KEY"; if(val >= regfi_num_reg_types) return NULL; return regfi_type_names[val]; } /* Returns -1 on error */ int regfi_type_str2val(const char* str) { int i; if(strcmp("KEY", str) == 0) return REG_KEY; for(i=0; i < regfi_num_reg_types; i++) if (strcmp(regfi_type_names[i], str) == 0) return i; if(strcmp("DWORD_LE", str) == 0) return REG_DWORD_LE; return -1; } /* Security descriptor parsing functions */ const char* regfi_ace_type2str(uint8 type) { static const char* map[7] = {"ALLOW", "DENY", "AUDIT", "ALARM", "ALLOW CPD", "OBJ ALLOW", "OBJ DENY"}; if(type < 7) return map[type]; else /* XXX: would be nice to return the unknown integer value. * However, as it is a const string, it can't be free()ed later on, * so that would need to change. */ return "UNKNOWN"; } /* XXX: need a better reference on the meaning of each flag. */ /* For more info, see: * http://msdn2.microsoft.com/en-us/library/aa772242.aspx */ char* regfi_ace_flags2str(uint8 flags) { static const char* flag_map[32] = { "OI", /* Object Inherit */ "CI", /* Container Inherit */ "NP", /* Non-Propagate */ "IO", /* Inherit Only */ "IA", /* Inherited ACE */ NULL, NULL, NULL, }; char* ret_val = malloc(35*sizeof(char)); char* fo = ret_val; uint32 i; uint8 f; if(ret_val == NULL) return NULL; fo[0] = '\0'; if (!flags) return ret_val; for(i=0; i < 8; i++) { f = (1<num_auths; char* ret_val = malloc(size); if(ret_val == NULL) return NULL; if(comps > MAXSUBAUTHS) comps = MAXSUBAUTHS; left -= sprintf(ret_val, "S-%u-%u", sid->sid_rev_num, sid->id_auth[5]); for (i = 0; i < comps; i++) left -= snprintf(ret_val+(size-left), left, "-%u", sid->sub_auths[i]); return ret_val; } char* regfi_get_acl(SEC_ACL* acl) { uint32 i, extra, size = 0; const char* type_str; char* flags_str; char* perms_str; char* sid_str; char* ace_delim = ""; char* ret_val = NULL; char* tmp_val = NULL; bool failed = false; char field_delim = ':'; for (i = 0; i < acl->num_aces && !failed; i++) { sid_str = regfi_sid2str(&acl->ace[i].trustee); type_str = regfi_ace_type2str(acl->ace[i].type); perms_str = regfi_ace_perms2str(acl->ace[i].info.mask); flags_str = regfi_ace_flags2str(acl->ace[i].flags); if(flags_str != NULL && perms_str != NULL && type_str != NULL && sid_str != NULL) { /* XXX: this is slow */ extra = strlen(sid_str) + strlen(type_str) + strlen(perms_str) + strlen(flags_str)+5; tmp_val = realloc(ret_val, size+extra); if(tmp_val == NULL) { free(ret_val); failed = true; } else { ret_val = tmp_val; size += snprintf(ret_val+size, extra, "%s%s%c%s%c%s%c%s", ace_delim,sid_str, field_delim,type_str, field_delim,perms_str, field_delim,flags_str); ace_delim = "|"; } } else failed = true; if(sid_str != NULL) free(sid_str); if(sid_str != NULL) free(perms_str); if(sid_str != NULL) free(flags_str); } return ret_val; } char* regfi_get_sacl(SEC_DESC *sec_desc) { if (sec_desc->sacl) return regfi_get_acl(sec_desc->sacl); else return NULL; } char* regfi_get_dacl(SEC_DESC *sec_desc) { if (sec_desc->dacl) return regfi_get_acl(sec_desc->dacl); else return NULL; } char* regfi_get_owner(SEC_DESC *sec_desc) { return regfi_sid2str(sec_desc->owner_sid); } char* regfi_get_group(SEC_DESC *sec_desc) { return regfi_sid2str(sec_desc->grp_sid); } /******************************************************************* *******************************************************************/ static bool prs_nk_rec( const char *desc, prs_struct *ps, int depth, REGF_NK_REC *nk ) { uint16 class_length, name_length; uint32 start; uint32 data_size, start_off, end_off; uint32 unknown_off = REGF_OFFSET_NONE; nk->hbin_off = ps->data_offset; start = nk->hbin_off; depth++; /* back up and get the data_size */ if ( !prs_set_offset( ps, ps->data_offset-sizeof(uint32)) ) return false; start_off = ps->data_offset; if ( !prs_uint32( "rec_size", ps, depth, &nk->rec_size )) return false; if (!prs_uint8s("header", ps, depth, nk->header, sizeof(nk->header))) return false; if ( !prs_uint16( "key_type", ps, depth, &nk->key_type )) return false; if ( !smb_io_time( "mtime", &nk->mtime, ps, depth )) return false; if ( !prs_set_offset( ps, start+0x0010 ) ) return false; if ( !prs_uint32( "parent_off", ps, depth, &nk->parent_off )) return false; if ( !prs_uint32( "num_subkeys", ps, depth, &nk->num_subkeys )) return false; if ( !prs_set_offset( ps, start+0x001c ) ) return false; if ( !prs_uint32( "subkeys_off", ps, depth, &nk->subkeys_off )) return false; if ( !prs_uint32( "unknown_off", ps, depth, &unknown_off) ) return false; if ( !prs_set_offset( ps, start+0x0024 ) ) return false; if ( !prs_uint32( "num_values", ps, depth, &nk->num_values )) return false; if ( !prs_uint32( "values_off", ps, depth, &nk->values_off )) return false; if ( !prs_uint32( "sk_off", ps, depth, &nk->sk_off )) return false; if ( !prs_uint32( "classname_off", ps, depth, &nk->classname_off )) return false; if (!prs_uint32("max_bytes_subkeyname", ps, depth, &nk->max_bytes_subkeyname)) return false; if ( !prs_uint32( "max_bytes_subkeyclassname", ps, depth, &nk->max_bytes_subkeyclassname)) { return false; } if ( !prs_uint32( "max_bytes_valuename", ps, depth, &nk->max_bytes_valuename)) return false; if ( !prs_uint32( "max_bytes_value", ps, depth, &nk->max_bytes_value)) return false; if ( !prs_uint32( "unknown index", ps, depth, &nk->unk_index)) return false; name_length = nk->keyname ? strlen(nk->keyname) : 0 ; class_length = nk->classname ? strlen(nk->classname) : 0 ; if ( !prs_uint16( "name_length", ps, depth, &name_length )) return false; if ( !prs_uint16( "class_length", ps, depth, &class_length )) return false; if ( class_length ) { /* XXX: why isn't this parsed? */ ;; } if ( name_length ) { if(ps->io && !(nk->keyname = (char*)zcalloc(sizeof(char), name_length+1))) return false; if(!prs_uint8s("name", ps, depth, (uint8*)nk->keyname, name_length)) return false; if(ps->io) nk->keyname[name_length] = '\0'; } end_off = ps->data_offset; /* data_size must be divisible by 8 and large enough to hold the original record */ data_size = ((start_off - end_off) & 0xfffffff8 ); /*if ( data_size > nk->rec_size ) DEBUG(10,("Encountered reused record (0x%x < 0x%x)\n", data_size, nk->rec_size));*/ return true; } /******************************************************************* Input a randon offset and receive the correpsonding HBIN block for it *******************************************************************/ static bool hbin_contains_offset( REGF_HBIN *hbin, uint32 offset ) { if ( !hbin ) return false; if ( (offset > hbin->first_hbin_off) && (offset < (hbin->first_hbin_off+hbin->block_size)) ) return true; return false; } /******************************************************************* Input a randon offset and receive the correpsonding HBIN block for it *******************************************************************/ static REGF_HBIN* lookup_hbin_block( REGF_FILE *file, uint32 offset ) { REGF_HBIN *hbin = NULL; uint32 block_off; /* start with the open list */ for ( hbin=file->block_list; hbin; hbin=hbin->next ) { /* DEBUG(10,("lookup_hbin_block: address = 0x%x [0x%x]\n", hbin->file_off, (uint32)hbin ));*/ if ( hbin_contains_offset( hbin, offset ) ) return hbin; } if ( !hbin ) { /* start at the beginning */ block_off = REGF_BLOCKSIZE; do { /* cleanup before the next round */ if ( hbin ) { if(hbin->ps.is_dynamic) SAFE_FREE(hbin->ps.data_p); hbin->ps.is_dynamic = false; hbin->ps.buffer_size = 0; hbin->ps.data_offset = 0; } hbin = regfi_parse_hbin(file, block_off, true, false); if ( hbin ) block_off = hbin->file_off + hbin->block_size; } while ( hbin && !hbin_contains_offset( hbin, offset ) ); } if ( hbin ) /* XXX: this kind of caching needs to be re-evaluated */ DLIST_ADD( file->block_list, hbin ); return hbin; } /******************************************************************* *******************************************************************/ static bool prs_hash_rec( const char *desc, prs_struct *ps, int depth, REGF_HASH_REC *hash ) { depth++; if ( !prs_uint32( "nk_off", ps, depth, &hash->nk_off )) return false; if ( !prs_uint8s("keycheck", ps, depth, hash->keycheck, sizeof( hash->keycheck )) ) return false; return true; } /******************************************************************* *******************************************************************/ static bool hbin_prs_lf_records(const char *desc, REGF_HBIN *hbin, int depth, REGF_NK_REC *nk) { int i; REGF_LF_REC *lf = &nk->subkeys; uint32 data_size, start_off, end_off; depth++; /* check if we have anything to do first */ if ( nk->num_subkeys == 0 ) return true; /* move to the LF record */ if ( !prs_set_offset( &hbin->ps, nk->subkeys_off + HBIN_MAGIC_SIZE - hbin->first_hbin_off ) ) return false; /* backup and get the data_size */ if ( !prs_set_offset( &hbin->ps, hbin->ps.data_offset-sizeof(uint32)) ) return false; start_off = hbin->ps.data_offset; if ( !prs_uint32( "rec_size", &hbin->ps, depth, &lf->rec_size )) return false; if(!prs_uint8s("header", &hbin->ps, depth, lf->header, sizeof(lf->header))) return false; if ( !prs_uint16( "num_keys", &hbin->ps, depth, &lf->num_keys)) return false; if ( hbin->ps.io ) { if ( !(lf->hashes = (REGF_HASH_REC*)zcalloc(sizeof(REGF_HASH_REC), lf->num_keys )) ) return false; } for ( i=0; inum_keys; i++ ) { if ( !prs_hash_rec( "hash_rec", &hbin->ps, depth, &lf->hashes[i] ) ) return false; } end_off = hbin->ps.data_offset; /* data_size must be divisible by 8 and large enough to hold the original record */ data_size = ((start_off - end_off) & 0xfffffff8 ); /* if ( data_size > lf->rec_size )*/ /*DEBUG(10,("Encountered reused record (0x%x < 0x%x)\n", data_size, lf->rec_size));*/ return true; } /******************************************************************* *******************************************************************/ static bool hbin_prs_sk_rec( const char *desc, REGF_HBIN *hbin, int depth, REGF_SK_REC *sk ) { prs_struct *ps = &hbin->ps; uint16 tag = 0xFFFF; uint32 data_size, start_off, end_off; depth++; if ( !prs_set_offset( &hbin->ps, sk->sk_off + HBIN_MAGIC_SIZE - hbin->first_hbin_off ) ) return false; /* backup and get the data_size */ if ( !prs_set_offset( &hbin->ps, hbin->ps.data_offset-sizeof(uint32)) ) return false; start_off = hbin->ps.data_offset; if ( !prs_uint32( "rec_size", &hbin->ps, depth, &sk->rec_size )) return false; if (!prs_uint8s("header", ps, depth, sk->header, sizeof(sk->header))) return false; if ( !prs_uint16( "tag", ps, depth, &tag)) return false; if ( !prs_uint32( "prev_sk_off", ps, depth, &sk->prev_sk_off)) return false; if ( !prs_uint32( "next_sk_off", ps, depth, &sk->next_sk_off)) return false; if ( !prs_uint32( "ref_count", ps, depth, &sk->ref_count)) return false; if ( !prs_uint32( "size", ps, depth, &sk->size)) return false; if ( !sec_io_desc( "sec_desc", &sk->sec_desc, ps, depth )) return false; end_off = hbin->ps.data_offset; /* data_size must be divisible by 8 and large enough to hold the original record */ data_size = ((start_off - end_off) & 0xfffffff8 ); /* if ( data_size > sk->rec_size )*/ /*DEBUG(10,("Encountered reused record (0x%x < 0x%x)\n", data_size, sk->rec_size));*/ return true; } /******************************************************************* *******************************************************************/ static bool hbin_prs_vk_rec( const char *desc, REGF_HBIN *hbin, int depth, REGF_VK_REC *vk, REGF_FILE *file ) { uint32 offset; uint16 name_length; prs_struct *ps = &hbin->ps; uint32 data_size, start_off, end_off; depth++; /* backup and get the data_size */ if ( !prs_set_offset( &hbin->ps, hbin->ps.data_offset-sizeof(uint32)) ) return false; start_off = hbin->ps.data_offset; if ( !prs_uint32( "rec_size", &hbin->ps, depth, &vk->rec_size )) return false; if ( !prs_uint8s("header", ps, depth, vk->header, sizeof( vk->header )) ) return false; if ( !hbin->ps.io ) name_length = strlen(vk->valuename); if ( !prs_uint16( "name_length", ps, depth, &name_length )) return false; if ( !prs_uint32( "data_size", ps, depth, &vk->data_size )) return false; if ( !prs_uint32( "data_off", ps, depth, &vk->data_off )) return false; if ( !prs_uint32( "type", ps, depth, &vk->type)) return false; if ( !prs_uint16( "flag", ps, depth, &vk->flag)) return false; offset = ps->data_offset; offset += 2; /* skip 2 bytes */ prs_set_offset( ps, offset ); /* get the name */ if ( vk->flag&VK_FLAG_NAME_PRESENT ) { if ( hbin->ps.io ) { if ( !(vk->valuename = (char*)zcalloc(sizeof(char), name_length+1 ))) return false; } if ( !prs_uint8s("name", ps, depth, (uint8*)vk->valuename, name_length) ) return false; } end_off = hbin->ps.data_offset; /* get the data if necessary */ if ( vk->data_size != 0 ) { /* the data is stored in the offset if the size <= 4 */ if ( !(vk->data_size & VK_DATA_IN_OFFSET) ) { REGF_HBIN *hblock = hbin; uint32 data_rec_size; if ( hbin->ps.io ) { if ( !(vk->data = (uint8*)zcalloc(sizeof(uint8), vk->data_size) ) ) return false; } /* this data can be in another hbin */ if ( !hbin_contains_offset( hbin, vk->data_off ) ) { if ( !(hblock = lookup_hbin_block( file, vk->data_off )) ) return false; } if (!(prs_set_offset(&hblock->ps, (vk->data_off + HBIN_MAGIC_SIZE - hblock->first_hbin_off) - sizeof(uint32)))) { return false; } if ( !hblock->ps.io ) { data_rec_size = ( (vk->data_size+sizeof(uint32)) & 0xfffffff8 ) + 8; data_rec_size = ( data_rec_size - 1 ) ^ 0xFFFFFFFF; } if ( !prs_uint32( "data_rec_size", &hblock->ps, depth, &data_rec_size )) return false; if(!prs_uint8s("data", &hblock->ps, depth, vk->data, vk->data_size)) return false; } else { if(!(vk->data = zcalloc(sizeof(uint8), 4))) return false; SIVAL( vk->data, 0, vk->data_off ); } } /* data_size must be divisible by 8 and large enough to hold the original record */ data_size = ((start_off - end_off ) & 0xfffffff8 ); /* XXX: should probably print a warning here */ /*if ( data_size != vk->rec_size ) DEBUG(10,("prs_vk_rec: data_size check failed (0x%x < 0x%x)\n", data_size, vk->rec_size));*/ return true; } /******************************************************************* read a VK record which is contained in the HBIN block stored in the prs_struct *ps. *******************************************************************/ static bool hbin_prs_vk_records(const char *desc, REGF_HBIN *hbin, int depth, REGF_NK_REC *nk, REGF_FILE *file) { int i; uint32 record_size; depth++; /* check if we have anything to do first */ if(nk->num_values == 0) return true; if(hbin->ps.io) { if (!(nk->values = (REGF_VK_REC*)zcalloc(sizeof(REGF_VK_REC), nk->num_values ))) return false; } /* convert the offset to something relative to this HBIN block */ if (!prs_set_offset(&hbin->ps, nk->values_off + HBIN_MAGIC_SIZE - hbin->first_hbin_off - sizeof(uint32))) { return false; } if ( !hbin->ps.io ) { record_size = ( ( nk->num_values * sizeof(uint32) ) & 0xfffffff8 ) + 8; record_size = (record_size - 1) ^ 0xFFFFFFFF; } if ( !prs_uint32( "record_size", &hbin->ps, depth, &record_size ) ) return false; for ( i=0; inum_values; i++ ) { if ( !prs_uint32( "vk_off", &hbin->ps, depth, &nk->values[i].rec_off ) ) return false; } for ( i=0; inum_values; i++ ) { REGF_HBIN *sub_hbin = hbin; uint32 new_offset; if ( !hbin_contains_offset( hbin, nk->values[i].rec_off ) ) { sub_hbin = lookup_hbin_block( file, nk->values[i].rec_off ); if ( !sub_hbin ) { /*DEBUG(0,("hbin_prs_vk_records: Failed to find HBIN block containing offset [0x%x]\n", nk->values[i].hbin_off));*/ return false; } } new_offset = nk->values[i].rec_off + HBIN_MAGIC_SIZE - sub_hbin->first_hbin_off; if (!prs_set_offset(&sub_hbin->ps, new_offset)) return false; if (!hbin_prs_vk_rec("vk_rec", sub_hbin, depth, &nk->values[i], file)) return false; } return true; } /******************************************************************* *******************************************************************/ static REGF_SK_REC* find_sk_record_by_offset( REGF_FILE *file, uint32 offset ) { REGF_SK_REC *p_sk; for ( p_sk=file->sec_desc_list; p_sk; p_sk=p_sk->next ) { if ( p_sk->sk_off == offset ) return p_sk; } return NULL; } /******************************************************************* *******************************************************************/ static REGF_SK_REC* find_sk_record_by_sec_desc( REGF_FILE *file, SEC_DESC *sd ) { REGF_SK_REC *p; for ( p=file->sec_desc_list; p; p=p->next ) { if ( sec_desc_equal( p->sec_desc, sd ) ) return p; } /* failure */ return NULL; } /******************************************************************* *******************************************************************/ static bool hbin_prs_key( REGF_FILE *file, REGF_HBIN *hbin, REGF_NK_REC *nk ) { int depth = 0; REGF_HBIN *sub_hbin; depth++; /* get the initial nk record */ if (!prs_nk_rec("nk_rec", &hbin->ps, depth, nk)) return false; /* fill in values */ if ( nk->num_values && (nk->values_off!=REGF_OFFSET_NONE) ) { sub_hbin = hbin; if ( !hbin_contains_offset( hbin, nk->values_off ) ) { sub_hbin = lookup_hbin_block( file, nk->values_off ); if ( !sub_hbin ) { /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing value_list_offset [0x%x]\n", nk->values_off));*/ return false; } } if(!hbin_prs_vk_records("vk_rec", sub_hbin, depth, nk, file)) return false; } /* now get subkeys */ if ( nk->num_subkeys && (nk->subkeys_off!=REGF_OFFSET_NONE) ) { sub_hbin = hbin; if ( !hbin_contains_offset( hbin, nk->subkeys_off ) ) { sub_hbin = lookup_hbin_block( file, nk->subkeys_off ); if ( !sub_hbin ) { /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing subkey_offset [0x%x]\n", nk->subkeys_off));*/ return false; } } if (!hbin_prs_lf_records("lf_rec", sub_hbin, depth, nk)) return false; } /* get the to the security descriptor. First look if we have already parsed it */ if ((nk->sk_off!=REGF_OFFSET_NONE) && !(nk->sec_desc = find_sk_record_by_offset( file, nk->sk_off ))) { sub_hbin = hbin; if (!hbin_contains_offset(hbin, nk->sk_off)) { sub_hbin = lookup_hbin_block( file, nk->sk_off ); if ( !sub_hbin ) { /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing sk_offset [0x%x]\n", nk->subkeys_off));*/ return false; } } if ( !(nk->sec_desc = (REGF_SK_REC*)zalloc(sizeof(REGF_SK_REC) )) ) return false; nk->sec_desc->sk_off = nk->sk_off; if ( !hbin_prs_sk_rec( "sk_rec", sub_hbin, depth, nk->sec_desc )) return false; /* add to the list of security descriptors (ref_count has been read from the files) */ nk->sec_desc->sk_off = nk->sk_off; /* XXX: this kind of caching needs to be re-evaluated */ DLIST_ADD( file->sec_desc_list, nk->sec_desc ); } return true; } /******************************************************************* *******************************************************************/ static bool next_record( REGF_HBIN *hbin, const char *hdr, bool *eob ) { uint8 header[REC_HDR_SIZE] = ""; uint32 record_size; uint32 curr_off, block_size; bool found = false; prs_struct *ps = &hbin->ps; curr_off = ps->data_offset; if ( curr_off == 0 ) prs_set_offset( ps, HBIN_HEADER_REC_SIZE+4 ); /* assume that the current offset is at the reacord header and we need to backup to read the record size */ curr_off -= sizeof(uint32); block_size = ps->buffer_size; record_size = 0; while ( !found ) { curr_off = curr_off+record_size; if ( curr_off >= block_size ) break; if ( !prs_set_offset( &hbin->ps, curr_off) ) return false; if ( !prs_uint32( "record_size", ps, 0, &record_size ) ) return false; if ( !prs_uint8s("header", ps, 0, header, REC_HDR_SIZE ) ) return false; if ( record_size & 0x80000000 ) { /* absolute_value(record_size) */ record_size = (record_size ^ 0xffffffff) + 1; } if ( memcmp( header, hdr, REC_HDR_SIZE ) == 0 ) { found = true; curr_off += sizeof(uint32); } } /* mark prs_struct as done ( at end ) if no more SK records */ /* mark end-of-block as true */ if ( !found ) { prs_set_offset( &hbin->ps, hbin->ps.buffer_size ); *eob = true; return false; } if (!prs_set_offset(ps, curr_off)) return false; return true; } /******************************************************************* *******************************************************************/ static bool next_nk_record(REGF_FILE *file, REGF_HBIN *hbin, REGF_NK_REC *nk, bool *eob) { if (next_record(hbin, "nk", eob) && hbin_prs_key(file, hbin, nk)) return true; return false; } /******************************************************************* * Open the registry file and then read in the REGF block to get the * first hbin offset. *******************************************************************/ REGF_FILE* regfi_open(const char* filename) { REGF_FILE* rb; int fd; int flags = O_RDONLY; /* open an existing file */ if ((fd = open(filename, flags)) == -1) { /* DEBUG(0,("regfi_open: failure to open %s (%s)\n", filename, strerror(errno)));*/ return NULL; } /* read in an existing file */ if ((rb = regfi_parse_regf(fd, true)) == NULL) { /* DEBUG(0,("regfi_open: Failed to read initial REGF block\n"));*/ close(fd); return NULL; } /* success */ return rb; } /******************************************************************* XXX: should this be nuked? *******************************************************************/ static void regfi_mem_free( REGF_FILE *file ) { /* free any zalloc()'d memory */ /* if ( file && file->mem_ctx ) free(file->mem_ctx); */ } /******************************************************************* *******************************************************************/ int regfi_close( REGF_FILE *file ) { int fd; regfi_mem_free( file ); /* nothing to do if there is no open file */ if ( !file || (file->fd == -1) ) return 0; fd = file->fd; file->fd = -1; SAFE_FREE( file ); return close( fd ); } /****************************************************************************** * There should be only *one* root key in the registry file based * on my experience. --jerry *****************************************************************************/ REGF_NK_REC* regfi_rootkey( REGF_FILE *file ) { REGF_NK_REC *nk; REGF_HBIN *hbin; uint32 offset = REGF_BLOCKSIZE; bool found = false; bool eob; if ( !file ) return NULL; if ( !(nk = (REGF_NK_REC*)zalloc(sizeof(REGF_NK_REC) )) ) { /*DEBUG(0,("regfi_rootkey: zalloc() failed!\n"));*/ return NULL; } /* scan through the file on HBIN block at a time looking for an NK record with a type == 0x002c. Normally this is the first nk record in the first hbin block (but I'm not assuming that for now) */ while ( (hbin = regfi_parse_hbin(file, offset, true, false)) ) { eob = false; while ( !eob) { if ( next_nk_record( file, hbin, nk, &eob ) ) { if ( nk->key_type == NK_TYPE_ROOTKEY ) { found = true; break; } } if(hbin->ps.is_dynamic) SAFE_FREE(hbin->ps.data_p); hbin->ps.is_dynamic = false; hbin->ps.buffer_size = 0; hbin->ps.data_offset = 0; } if ( found ) break; offset += hbin->block_size; } if ( !found ) { /*DEBUG(0,("regfi_rootkey: corrupt registry file ? No root key record located\n"));*/ return NULL; } /* XXX: this kind of caching needs to be re-evaluated */ DLIST_ADD( file->block_list, hbin ); return nk; } /****************************************************************************** *****************************************************************************/ void regfi_key_free(REGF_NK_REC* nk) { uint32 i; if((nk->values != NULL) && (nk->values_off!=REGF_OFFSET_NONE)) { for(i=0; i < nk->num_values; i++) { if(nk->values[i].valuename != NULL) free(nk->values[i].valuename); if(nk->values[i].data != NULL) free(nk->values[i].data); } free(nk->values); } if(nk->keyname != NULL) free(nk->keyname); if(nk->classname != NULL) free(nk->classname); /* XXX: not freeing hbin because these are cached. This needs to be reviewed. */ /* XXX: not freeing sec_desc because these are cached. This needs to be reviewed. */ free(nk); } /****************************************************************************** *****************************************************************************/ REGFI_ITERATOR* regfi_iterator_new(REGF_FILE* fh) { REGF_NK_REC* root; REGFI_ITERATOR* ret_val = (REGFI_ITERATOR*)malloc(sizeof(REGFI_ITERATOR)); if(ret_val == NULL) return NULL; root = regfi_rootkey(fh); if(root == NULL) { free(ret_val); return NULL; } ret_val->key_positions = void_stack_new(REGF_MAX_DEPTH); if(ret_val->key_positions == NULL) { free(ret_val); free(root); return NULL; } ret_val->f = fh; ret_val->cur_key = root; ret_val->cur_subkey = 0; ret_val->cur_value = 0; return ret_val; } /****************************************************************************** *****************************************************************************/ void regfi_iterator_free(REGFI_ITERATOR* i) { REGFI_ITER_POSITION* cur; if(i->cur_key != NULL) regfi_key_free(i->cur_key); while((cur = (REGFI_ITER_POSITION*)void_stack_pop(i->key_positions)) != NULL) { regfi_key_free(cur->nk); free(cur); } free(i); } /****************************************************************************** *****************************************************************************/ /* XXX: some way of indicating reason for failure should be added. */ bool regfi_iterator_down(REGFI_ITERATOR* i) { REGF_NK_REC* subkey; REGFI_ITER_POSITION* pos; pos = (REGFI_ITER_POSITION*)malloc(sizeof(REGFI_ITER_POSITION)); if(pos == NULL) return false; subkey = (REGF_NK_REC*)regfi_iterator_cur_subkey(i); if(subkey == NULL) { free(pos); return false; } pos->nk = i->cur_key; pos->cur_subkey = i->cur_subkey; if(!void_stack_push(i->key_positions, pos)) { free(pos); regfi_key_free(subkey); return false; } i->cur_key = subkey; i->cur_subkey = 0; i->cur_value = 0; return true; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_up(REGFI_ITERATOR* i) { REGFI_ITER_POSITION* pos; pos = (REGFI_ITER_POSITION*)void_stack_pop(i->key_positions); if(pos == NULL) return false; regfi_key_free(i->cur_key); i->cur_key = pos->nk; i->cur_subkey = pos->cur_subkey; i->cur_value = 0; free(pos); return true; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_to_root(REGFI_ITERATOR* i) { while(regfi_iterator_up(i)) continue; return true; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_find_subkey(REGFI_ITERATOR* i, const char* subkey_name) { REGF_NK_REC* subkey; bool found = false; uint32 old_subkey = i->cur_subkey; if(subkey_name == NULL) return false; /* XXX: this alloc/free of each sub key might be a bit excessive */ subkey = (REGF_NK_REC*)regfi_iterator_first_subkey(i); while((subkey != NULL) && (found == false)) { if(subkey->keyname != NULL && strcasecmp(subkey->keyname, subkey_name) == 0) found = true; else { regfi_key_free(subkey); subkey = (REGF_NK_REC*)regfi_iterator_next_subkey(i); } } if(found == false) { i->cur_subkey = old_subkey; return false; } regfi_key_free(subkey); return true; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_walk_path(REGFI_ITERATOR* i, const char** path) { uint32 x; if(path == NULL) return false; for(x=0; ((path[x] != NULL) && regfi_iterator_find_subkey(i, path[x]) && regfi_iterator_down(i)); x++) { continue; } if(path[x] == NULL) return true; /* XXX: is this the right number of times? */ for(; x > 0; x--) regfi_iterator_up(i); return false; } /****************************************************************************** *****************************************************************************/ const REGF_NK_REC* regfi_iterator_cur_key(REGFI_ITERATOR* i) { return i->cur_key; } /****************************************************************************** *****************************************************************************/ const REGF_NK_REC* regfi_iterator_first_subkey(REGFI_ITERATOR* i) { i->cur_subkey = 0; return regfi_iterator_cur_subkey(i); } /****************************************************************************** *****************************************************************************/ const REGF_NK_REC* regfi_iterator_cur_subkey(REGFI_ITERATOR* i) { REGF_NK_REC* subkey; REGF_HBIN* hbin; uint32 nk_offset; /* see if there is anything left to report */ if (!(i->cur_key) || (i->cur_key->subkeys_off==REGF_OFFSET_NONE) || (i->cur_subkey >= i->cur_key->num_subkeys)) return NULL; nk_offset = i->cur_key->subkeys.hashes[i->cur_subkey].nk_off; /* find the HBIN block which should contain the nk record */ hbin = lookup_hbin_block(i->f, nk_offset); if(!hbin) { /* XXX: should print out some kind of error message every time here */ /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing offset [0x%x]\n", i->cur_key->subkeys.hashes[i->cur_subkey].nk_off));*/ return NULL; } if(!prs_set_offset(&hbin->ps, HBIN_MAGIC_SIZE + nk_offset - hbin->first_hbin_off)) return NULL; if(!(subkey = (REGF_NK_REC*)zalloc(sizeof(REGF_NK_REC)))) return NULL; if(!hbin_prs_key(i->f, hbin, subkey)) { regfi_key_free(subkey); return NULL; } return subkey; } /****************************************************************************** *****************************************************************************/ /* XXX: some way of indicating reason for failure should be added. */ const REGF_NK_REC* regfi_iterator_next_subkey(REGFI_ITERATOR* i) { const REGF_NK_REC* subkey; i->cur_subkey++; subkey = regfi_iterator_cur_subkey(i); if(subkey == NULL) i->cur_subkey--; return subkey; } /****************************************************************************** *****************************************************************************/ bool regfi_iterator_find_value(REGFI_ITERATOR* i, const char* value_name) { const REGF_VK_REC* cur; bool found = false; /* XXX: cur->valuename can be NULL in the registry. * Should we allow for a way to search for that? */ if(value_name == NULL) return false; cur = regfi_iterator_first_value(i); while((cur != NULL) && (found == false)) { if((cur->valuename != NULL) && (strcasecmp(cur->valuename, value_name) == 0)) found = true; else cur = regfi_iterator_next_value(i); } return found; } /****************************************************************************** *****************************************************************************/ const REGF_VK_REC* regfi_iterator_first_value(REGFI_ITERATOR* i) { i->cur_value = 0; return regfi_iterator_cur_value(i); } /****************************************************************************** *****************************************************************************/ const REGF_VK_REC* regfi_iterator_cur_value(REGFI_ITERATOR* i) { REGF_VK_REC* ret_val = NULL; if(i->cur_value < i->cur_key->num_values) ret_val = &(i->cur_key->values[i->cur_value]); return ret_val; } /****************************************************************************** *****************************************************************************/ const REGF_VK_REC* regfi_iterator_next_value(REGFI_ITERATOR* i) { const REGF_VK_REC* ret_val; i->cur_value++; ret_val = regfi_iterator_cur_value(i); if(ret_val == NULL) i->cur_value--; return ret_val; } /****************/ /* Experimental */ /****************/ /* typedef struct { uint32 offset; uint32 size; } REGFI_CELL_INFO; typedef struct { uint32 count REGFI_CELL_INFO** cells; } REGFI_CELL_LIST; */ /******************************************************************* * Computes the checksum of the registry file header. * buffer must be at least the size of an regf header (4096 bytes). *******************************************************************/ static uint32 regfi_compute_header_checksum(uint8* buffer) { uint32 checksum, x; int i; /* XOR of all bytes 0x0000 - 0x01FB */ checksum = x = 0; for ( i=0; i<0x01FB; i+=4 ) { x = IVAL(buffer, i ); checksum ^= x; } return checksum; } /******************************************************************* * TODO: add way to return more detailed error information. *******************************************************************/ REGF_FILE* regfi_parse_regf(int fd, bool strict) { uint8 file_header[REGF_BLOCKSIZE]; uint32 ret, length; uint32 file_length; struct stat sbuf; REGF_FILE* ret_val; /* Determine file length. Must be at least big enough * for the header and one hbin. */ if (fstat(fd, &sbuf) == -1) return NULL; file_length = sbuf.st_size; if(file_length < REGF_BLOCKSIZE+REGF_ALLOC_BLOCK) return NULL; ret_val = (REGF_FILE*)zalloc(sizeof(REGF_FILE)); if(ret_val == NULL) return NULL; ret_val->fd = fd; ret_val->file_length = file_length; length = REGF_BLOCKSIZE; if((ret = regfi_read(fd, file_header, &length)) != 0 || length != REGF_BLOCKSIZE) { free(ret_val); return NULL; } ret_val->checksum = IVAL(file_header, 0x1FC); ret_val->computed_checksum = regfi_compute_header_checksum(file_header); if (strict && (ret_val->checksum != ret_val->computed_checksum)) { free(ret_val); return NULL; } memcpy(ret_val->magic, file_header, 4); if(strict && (memcmp(ret_val->magic, "regf", 4) != 0)) { free(ret_val); return NULL; } ret_val->unknown1 = IVAL(file_header, 0x4); ret_val->unknown2 = IVAL(file_header, 0x8); ret_val->mtime.low = IVAL(file_header, 0xC); ret_val->mtime.high = IVAL(file_header, 0x10); ret_val->unknown3 = IVAL(file_header, 0x14); ret_val->unknown4 = IVAL(file_header, 0x18); ret_val->unknown5 = IVAL(file_header, 0x1C); ret_val->unknown6 = IVAL(file_header, 0x20); ret_val->data_offset = IVAL(file_header, 0x24); ret_val->last_block = IVAL(file_header, 0x28); ret_val->unknown7 = IVAL(file_header, 0x2C); return ret_val; } /******************************************************************* * Given real file offset, read and parse the hbin at that location * along with it's associated cells. If save_unalloc is true, a list * of unallocated cell offsets will be stored in TODO. *******************************************************************/ /* TODO: Need a way to return types of errors. Also need to free * the hbin/ps when an error occurs. */ REGF_HBIN* regfi_parse_hbin(REGF_FILE* file, uint32 offset, bool strict, bool save_unalloc) { REGF_HBIN *hbin; uint8 hbin_header[HBIN_HEADER_REC_SIZE]; uint32 length, curr_off; int32 cell_len; bool is_unalloc; if(!(hbin = (REGF_HBIN*)zalloc(sizeof(REGF_HBIN)))) return NULL; hbin->file_off = offset; if(lseek(file->fd, offset, SEEK_SET) == -1) return NULL; length = HBIN_HEADER_REC_SIZE; if((regfi_read(file->fd, hbin_header, &length) != 0) || length != HBIN_HEADER_REC_SIZE) return NULL; if(lseek(file->fd, offset, SEEK_SET) == -1) return NULL; memcpy(hbin->magic, hbin_header, 4); if(strict && (memcmp(hbin->magic, "hbin", 4) != 0)) return NULL; hbin->first_hbin_off = IVAL(hbin_header, 0x4); hbin->block_size = IVAL(hbin_header, 0x8); /* this should be the same thing as hbin->block_size but just in case */ hbin->next_block = IVAL(hbin_header, 0x1C); /* TODO: This check is this more of a way to determine if they are ever * not the same than to really do sanity checking. This may need * to be changed or removed once these fields are better understood. */ if(strict && (hbin->block_size != hbin->next_block)) { fprintf(stderr, "DEBUG: hbin->block_size != hbin->next_block\n"); return NULL; } /* Ensure the block size is a multiple of 0x1000 and doesn't run off * the end of the file. */ /* TODO: This may need to be relaxed for dealing with * partial or corrupt files. */ if((offset + hbin->block_size > file->file_length) || (hbin->block_size & 0xFFFFF000) != hbin->block_size) return NULL; /* TODO: need to get rid of this, but currently lots depends on the * ps structure. */ if(!prs_init(&hbin->ps, hbin->block_size, file->mem_ctx, UNMARSHALL)) return NULL; length = hbin->block_size; if((regfi_read(file->fd, (uint8*)hbin->ps.data_p, &length) != 0) || length != hbin->block_size) return NULL; if(save_unalloc) { is_unalloc = false; cell_len = 0; curr_off = HBIN_HEADER_REC_SIZE; while ( curr_off < hbin->block_size ) { cell_len = IVALS(hbin->ps.data_p, curr_off); if(cell_len > 0) is_unalloc = true; else cell_len = -1*cell_len; if((cell_len == 0) || ((cell_len & 0xFFFFFFFC) != cell_len)) /* TODO: should report an error here. */ break; /* for some reason the record_size of the last record in an hbin block can extend past the end of the block even though the record fits within the remaining space....aaarrrgggghhhhhh */ if(curr_off + cell_len >= hbin->block_size) cell_len = hbin->block_size - curr_off; if(is_unalloc) /* TODO: save cell info */ curr_off = curr_off+cell_len; } } /* TODO: need to get rid of this, but currently lots depends on the * ps structure. */ if(!prs_set_offset(&hbin->ps, file->data_offset+HBIN_MAGIC_SIZE)) return NULL; return hbin; } /***************************************************************************** * This function is just like read(2), except that it continues to * re-try reading from the file descriptor if EINTR or EAGAIN is received. * regfi_read will attempt to read length bytes from fd and write them to buf. * * On success, 0 is returned. Upon failure, an errno code is returned. * * The number of bytes successfully read is returned through the length * parameter by reference. If both the return value and length parameter are * returned as 0, then EOF was encountered immediately *****************************************************************************/ uint32 regfi_read(int fd, uint8* buf, uint32* length) { uint32 rsize = 0; uint32 rret = 0; do { rret = read(fd, buf + rsize, *length - rsize); if(rret > 0) rsize += rret; }while(*length - rsize > 0 && (rret > 0 || (rret == -1 && (errno == EAGAIN || errno == EINTR)))); *length = rsize; if (rret == -1 && errno != EINTR && errno != EAGAIN) return errno; return 0; }