source: trunk/lib/regfio.c @ 76

Last change on this file since 76 was 76, checked in by tim, 18 years ago

Added parsing of ACE permissions field. Minor improvement to flags field parsing.

  • Property svn:keywords set to Id
File size: 39.4 KB
Line 
1/*
2 * Branched from Samba project Subversion repository, version #7470:
3 *   http://websvn.samba.org/cgi-bin/viewcvs.cgi/trunk/source/registry/regfio.c
4 *
5 * Unix SMB/CIFS implementation.
6 * Windows NT registry I/O library
7 *
8 * Copyright (C) 2005-2006 Timothy D. Morgan
9 * Copyright (C) 2005 Gerald (Jerry) Carter
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; version 2 of the License.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 
23 *
24 * $Id: regfio.c 76 2007-01-07 01:25:45Z tim $
25 */
26
27#include "../include/regfio.h"
28
29
30/* Registry types mapping */
31const unsigned int regfio_num_reg_types = 12;
32static const char* regfio_type_names[] =
33  {"NONE", "SZ", "EXPAND_SZ", "BINARY", "DWORD", "DWORD_BE", "LINK",
34   "MULTI_SZ", "RSRC_LIST", "RSRC_DESC", "RSRC_REQ_LIST", "QWORD"};
35
36
37/* Returns NULL on error */
38const char* regfio_type_val2str(unsigned int val)
39{
40  if(val == REG_KEY)
41    return "KEY";
42 
43  if(val >= regfio_num_reg_types)
44    return NULL;
45 
46  return regfio_type_names[val];
47}
48
49
50/* Returns -1 on error */
51int regfio_type_str2val(const char* str)
52{
53  int i;
54
55  if(strcmp("KEY", str) == 0)
56    return REG_KEY;
57
58  for(i=0; i < regfio_num_reg_types; i++)
59    if (strcmp(regfio_type_names[i], str) == 0) 
60      return i;
61
62  if(strcmp("DWORD_LE", str) == 0)
63    return REG_DWORD_LE;
64
65  return -1;
66}
67
68
69/* Security descriptor parsing functions  */
70
71const char* regfio_ace_type2str(uint8 type)
72{
73  static const char* map[7] 
74    = {"ALLOW", "DENY", "AUDIT", "ALARM", 
75       "ALLOW CPD", "OBJ ALLOW", "OBJ DENY"};
76  if(type < 7)
77    return map[type];
78  else
79    /* XXX: would be nice to return the unknown integer value. 
80     *      However, as it is a const string, it can't be free()ed later on,
81     *      so that would need to change.
82     */
83    return "UNKNOWN";
84}
85
86
87/* XXX: need a better reference on the meaning of each flag. */
88/* For more info, see:
89 *   http://msdn2.microsoft.com/en-us/library/aa772242.aspx
90 */
91char* regfio_ace_flags2str(uint8 flags)
92{
93  static const char* flag_map[32] = 
94    { "OI",
95      "CI",
96      "NP",
97      "IO",
98      "IA",
99      NULL,
100      NULL,
101      NULL,
102    };
103
104  char* ret_val = malloc(35*sizeof(char));
105  char* fo = ret_val;
106  uint32 i;
107  uint8 f;
108
109  if(ret_val == NULL)
110    return NULL;
111
112  fo[0] = '\0';
113  if (!flags)
114    return ret_val;
115
116  for(i=0; i < 8; i++)
117  {
118    f = (1<<i);
119    if((flags & f) && (flag_map[i] != NULL))
120    {
121      strcpy(fo, flag_map[i]);
122      fo += strlen(flag_map[i]);
123      *(fo++) = ' ';
124      flags ^= f;
125    }
126  }
127 
128  /* Any remaining unknown flags are added at the end in hex. */
129  if(flags != 0)
130    sprintf(fo, "0x%.2X ", flags);
131
132  /* Chop off the last space if we've written anything to ret_val */
133  if(fo != ret_val)
134    fo[-1] = '\0';
135
136  /* XXX: what was this old VI flag for??
137     XXX: Is this check right?  0xF == 1|2|4|8, which makes it redundant...
138  if (flags == 0xF) {
139    if (some) strcat(flg_output, " ");
140    some = 1;
141    strcat(flg_output, "VI");
142  }
143  */
144
145  return ret_val;
146}
147
148
149char* regfio_ace_perms2str(uint32 perms)
150{
151  uint32 i, p;
152  /* This is more than is needed by a fair margin. */
153  char* ret_val = malloc(350*sizeof(char));
154  char* r = ret_val;
155
156  /* Each represents one of 32 permissions bits.  NULL is for undefined/reserved bits.
157   * For more information, see:
158   *   http://msdn2.microsoft.com/en-gb/library/aa374892.aspx
159   *   http://msdn2.microsoft.com/en-gb/library/ms724878.aspx
160   */
161  static const char* perm_map[32] = 
162    {/* object-specific permissions (registry keys, in this case) */
163      "QRY_VAL",       /* KEY_QUERY_VALUE */
164      "SET_VAL",       /* KEY_SET_VALUE */
165      "CREATE_KEY",    /* KEY_CREATE_SUB_KEY */
166      "ENUM_KEYS",     /* KEY_ENUMERATE_SUB_KEYS */
167      "NOTIFY",        /* KEY_NOTIFY */
168      "CREATE_LNK",    /* KEY_CREATE_LINK - Reserved for system use. */
169      NULL,
170      NULL,
171      "WOW64_64",      /* KEY_WOW64_64KEY */
172      "WOW64_32",      /* KEY_WOW64_32KEY */
173      NULL,
174      NULL,
175      NULL,
176      NULL,
177      NULL,
178      NULL,
179      /* standard access rights */
180      "DELETE",        /* DELETE */
181      "R_CONT",        /* READ_CONTROL */
182      "W_DAC",         /* WRITE_DAC */
183      "W_OWNER",       /* WRITE_OWNER */
184      "SYNC",          /* SYNCHRONIZE - Shouldn't be set in registries */
185      NULL,
186      NULL,
187      NULL,
188      /* other generic */
189      "SYS_SEC",       /* ACCESS_SYSTEM_SECURITY */
190      "MAX_ALLWD",     /* MAXIMUM_ALLOWED */
191      NULL,
192      NULL,
193      "GEN_A",         /* GENERIC_ALL */
194      "GEN_X",         /* GENERIC_EXECUTE */
195      "GEN_W",         /* GENERIC_WRITE */
196      "GEN_R",         /* GENERIC_READ */
197    };
198
199
200  if(ret_val == NULL)
201    return NULL;
202
203  r[0] = '\0';
204  for(i=0; i < 32; i++)
205  {
206    p = (1<<i);
207    if((perms & p) && (perm_map[i] != NULL))
208    {
209      strcpy(r, perm_map[i]);
210      r += strlen(perm_map[i]);
211      *(r++) = ' ';
212      perms ^= p;
213    }
214  }
215 
216  /* Any remaining unknown permission bits are added at the end in hex. */
217  if(perms != 0)
218    sprintf(r, "0x%.8X ", perms);
219
220  /* Chop off the last space if we've written anything to ret_val */
221  if(r != ret_val)
222    r[-1] = '\0';
223
224  return ret_val;
225}
226
227
228char* regfio_sid2str(DOM_SID* sid)
229{
230  uint32 i, size = MAXSUBAUTHS*11 + 24;
231  uint32 left = size;
232  uint8 comps = sid->num_auths;
233  char* ret_val = malloc(size);
234 
235  if(ret_val == NULL)
236    return NULL;
237
238  if(comps > MAXSUBAUTHS)
239    comps = MAXSUBAUTHS;
240
241  left -= sprintf(ret_val, "S-%u-%u", sid->sid_rev_num, sid->id_auth[5]);
242
243  for (i = 0; i < comps; i++) 
244    left -= snprintf(ret_val+(size-left), left, "-%u", sid->sub_auths[i]);
245
246  return ret_val;
247}
248
249
250char* regfio_get_acl(SEC_ACL* acl)
251{
252  uint32 i, extra, size = 0;
253  const char* type_str;
254  char* flags_str;
255  char* perms_str;
256  char* sid_str;
257  char* ace_delim = "";
258  char* ret_val = NULL;
259  char* tmp_val = NULL;
260  bool failed = false;
261  char field_delim = ':';
262
263  for (i = 0; i < acl->num_aces && !failed; i++)
264  {
265    sid_str = regfio_sid2str(&acl->ace[i].trustee);
266    type_str = regfio_ace_type2str(acl->ace[i].type);
267    perms_str = regfio_ace_perms2str(acl->ace[i].info.mask);
268    flags_str = regfio_ace_flags2str(acl->ace[i].flags);
269   
270    if(flags_str != NULL && perms_str != NULL 
271       && type_str != NULL && sid_str != NULL)
272    {
273      /* XXX: this is slow */
274      extra = strlen(sid_str) + strlen(type_str) 
275        + strlen(perms_str) + strlen(flags_str)+5;
276      tmp_val = realloc(ret_val, size+extra);
277
278      if(tmp_val == NULL)
279      {
280        free(ret_val);
281        failed = true;
282      }
283      else
284      {
285        ret_val = tmp_val;
286        size += snprintf(ret_val+size, extra, "%s%s%c%s%c%s%c%s",
287                         ace_delim,sid_str,
288                         field_delim,type_str,
289                         field_delim,perms_str,
290                         field_delim,flags_str);
291        ace_delim = "|";
292      }
293    }
294    else
295      failed = true;
296
297    if(sid_str != NULL)
298      free(sid_str);
299    if(sid_str != NULL)
300      free(perms_str);
301    if(sid_str != NULL)
302      free(flags_str);
303  }
304
305  return ret_val;
306}
307
308
309char* regfio_get_sacl(SEC_DESC *sec_desc)
310{
311  if (sec_desc->sacl)
312    return regfio_get_acl(sec_desc->sacl);
313  else
314    return NULL;
315}
316
317
318char* regfio_get_dacl(SEC_DESC *sec_desc)
319{
320  if (sec_desc->dacl)
321    return regfio_get_acl(sec_desc->dacl);
322  else
323    return NULL;
324}
325
326
327char* regfio_get_owner(SEC_DESC *sec_desc)
328{
329  return regfio_sid2str(sec_desc->owner_sid);
330}
331
332
333char* regfio_get_group(SEC_DESC *sec_desc)
334{
335  return regfio_sid2str(sec_desc->grp_sid);
336}
337
338
339
340/*******************************************************************
341 *******************************************************************/
342static int read_block( REGF_FILE *file, prs_struct *ps, uint32 file_offset, 
343                       uint32 block_size )
344{
345  const int hdr_size = 0x20;
346  int bytes_read, returned;
347  char *buffer;
348  SMB_STRUCT_STAT sbuf;
349
350  /* check for end of file */
351
352  if ( fstat( file->fd, &sbuf ) ) {
353    /*DEBUG(0,("read_block: stat() failed! (%s)\n", strerror(errno)));*/
354    return -1;
355  }
356
357  if ( (size_t)file_offset >= sbuf.st_size )
358    return -1;
359       
360  /* if block_size == 0, we are parsnig HBIN records and need
361     to read some of the header to get the block_size from there */
362           
363  if ( block_size == 0 ) {
364    uint8 hdr[0x20];
365
366    if ( lseek( file->fd, file_offset, SEEK_SET ) == -1 ) {
367      /*DEBUG(0,("read_block: lseek() failed! (%s)\n", strerror(errno) ));*/
368      return -1;
369    }
370
371    bytes_read = returned = 0;
372    while (bytes_read < hdr_size)
373    {
374      returned = read(file->fd, hdr + bytes_read, hdr_size - bytes_read);
375      if(returned == -1 && errno != EINTR && errno != EAGAIN)
376      {
377        /*DEBUG(0,("read_block: read of hdr failed (%s)\n",strerror(errno)));*/
378        return -1;
379      }
380
381      if(returned == 0)
382        return -1;
383
384      bytes_read += returned;
385    }
386
387    /* make sure this is an hbin header */
388
389    if ( strncmp( (char*)hdr, "hbin", HBIN_HDR_SIZE ) != 0 ) {
390      /*DEBUG(0,("read_block: invalid block header!\n"));*/
391      return -1;
392    }
393
394    block_size = IVAL( hdr, 0x08 );
395  }
396
397  /*DEBUG(10,("read_block: block_size == 0x%x\n", block_size ));*/
398
399  /* set the offset, initialize the buffer, and read the block from disk */
400
401  if ( lseek( file->fd, file_offset, SEEK_SET ) == -1 ) {
402    /*DEBUG(0,("read_block: lseek() failed! (%s)\n", strerror(errno) ));*/
403    return -1;
404  }
405       
406  prs_init( ps, block_size, file->mem_ctx, UNMARSHALL );
407  buffer = ps->data_p;
408  bytes_read = returned = 0;
409
410  while ( bytes_read < block_size ) 
411  {
412    returned = read(file->fd, buffer+bytes_read, block_size-bytes_read);
413    if(returned == -1 && errno != EINTR && errno != EAGAIN)
414    {
415      /*DEBUG(0,("read_block: read() failed (%s)\n", strerror(errno) ));*/
416      return -1;
417    }
418
419    if ((returned == 0) && (bytes_read < block_size)) 
420    {
421      /*DEBUG(0,("read_block: not a vald registry file ?\n" ));*/
422      return -1;
423    }   
424
425    bytes_read += returned;
426  }
427       
428  return bytes_read;
429}
430
431
432/*******************************************************************
433 *******************************************************************/
434static bool prs_regf_block(const char *desc, prs_struct *ps, 
435                           int depth, REGF_FILE *file)
436{
437  depth++;
438       
439  if(!prs_uint8s(true, "header", ps, depth, file->header, sizeof(file->header)))
440    return false;
441       
442  /* yes, these values are always identical so store them only once */
443       
444  if ( !prs_uint32( "unknown1", ps, depth, &file->unknown1 ))
445    return false;
446  if ( !prs_uint32( "unknown1 (again)", ps, depth, &file->unknown1 ))
447    return false;
448
449  /* get the modtime */
450       
451  if ( !prs_set_offset( ps, 0x0c ) )
452    return false;
453  if ( !smb_io_time( "modtime", &file->mtime, ps, depth ) )
454    return false;
455
456  /* constants */
457       
458  if ( !prs_uint32( "unknown2", ps, depth, &file->unknown2 ))
459    return false;
460  if ( !prs_uint32( "unknown3", ps, depth, &file->unknown3 ))
461    return false;
462  if ( !prs_uint32( "unknown4", ps, depth, &file->unknown4 ))
463    return false;
464  if ( !prs_uint32( "unknown5", ps, depth, &file->unknown5 ))
465    return false;
466
467  /* get file offsets */
468       
469  if ( !prs_set_offset( ps, 0x24 ) )
470    return false;
471  if ( !prs_uint32( "data_offset", ps, depth, &file->data_offset ))
472    return false;
473  if ( !prs_uint32( "last_block", ps, depth, &file->last_block ))
474    return false;
475               
476  /* one more constant */
477       
478  if ( !prs_uint32( "unknown6", ps, depth, &file->unknown6 ))
479    return false;
480               
481  /* get the checksum */
482       
483  if ( !prs_set_offset( ps, 0x01fc ) )
484    return false;
485  if ( !prs_uint32( "checksum", ps, depth, &file->checksum ))
486    return false;
487       
488  return true;
489}
490
491
492/*******************************************************************
493 *******************************************************************/
494static bool prs_hbin_block(const char *desc, prs_struct *ps, 
495                           int depth, REGF_HBIN *hbin)
496{
497  uint32 block_size2;
498
499  depth++;
500       
501  if(!prs_uint8s(true, "header", ps, depth, hbin->header, sizeof(hbin->header)))
502    return false;
503
504  if ( !prs_uint32( "first_hbin_off", ps, depth, &hbin->first_hbin_off ))
505    return false;
506
507  /* The dosreg.cpp comments say that the block size is at 0x1c.
508     According to a WINXP NTUSER.dat file, this is wrong.  The block_size
509     is at 0x08 */
510
511  if ( !prs_uint32( "block_size", ps, depth, &hbin->block_size ))
512    return false;
513
514  block_size2 = hbin->block_size;
515  prs_set_offset( ps, 0x1c );
516  if ( !prs_uint32( "block_size2", ps, depth, &block_size2 ))
517    return false;
518
519  if ( !ps->io )
520    hbin->dirty = true;
521       
522
523  return true;
524}
525
526
527/*******************************************************************
528 *******************************************************************/
529static bool prs_nk_rec( const char *desc, prs_struct *ps, 
530                        int depth, REGF_NK_REC *nk )
531{
532  uint16 class_length, name_length;
533  uint32 start;
534  uint32 data_size, start_off, end_off;
535  uint32 unknown_off = REGF_OFFSET_NONE;
536
537  nk->hbin_off = ps->data_offset;
538  start = nk->hbin_off;
539       
540  depth++;
541       
542  /* back up and get the data_size */   
543  if ( !prs_set_offset( ps, ps->data_offset-sizeof(uint32)) )
544    return false;
545  start_off = ps->data_offset;
546  if ( !prs_uint32( "rec_size", ps, depth, &nk->rec_size ))
547    return false;
548       
549  if (!prs_uint8s(true, "header", ps, depth, nk->header, sizeof(nk->header)))
550    return false;
551               
552  if ( !prs_uint16( "key_type", ps, depth, &nk->key_type ))
553    return false;
554  if ( !smb_io_time( "mtime", &nk->mtime, ps, depth ))
555    return false;
556               
557  if ( !prs_set_offset( ps, start+0x0010 ) )
558    return false;
559  if ( !prs_uint32( "parent_off", ps, depth, &nk->parent_off ))
560    return false;
561  if ( !prs_uint32( "num_subkeys", ps, depth, &nk->num_subkeys ))
562    return false;
563               
564  if ( !prs_set_offset( ps, start+0x001c ) )
565    return false;
566  if ( !prs_uint32( "subkeys_off", ps, depth, &nk->subkeys_off ))
567    return false;
568  if ( !prs_uint32( "unknown_off", ps, depth, &unknown_off) )
569    return false;
570               
571  if ( !prs_set_offset( ps, start+0x0024 ) )
572    return false;
573  if ( !prs_uint32( "num_values", ps, depth, &nk->num_values ))
574    return false;
575  if ( !prs_uint32( "values_off", ps, depth, &nk->values_off ))
576    return false;
577  if ( !prs_uint32( "sk_off", ps, depth, &nk->sk_off ))
578    return false;
579  if ( !prs_uint32( "classname_off", ps, depth, &nk->classname_off ))
580    return false;
581
582  if (!prs_uint32("max_bytes_subkeyname", ps, depth, &nk->max_bytes_subkeyname))
583    return false;
584  if ( !prs_uint32( "max_bytes_subkeyclassname", ps, 
585                    depth, &nk->max_bytes_subkeyclassname))
586  { return false; }
587  if ( !prs_uint32( "max_bytes_valuename", ps, depth, &nk->max_bytes_valuename))
588    return false;
589  if ( !prs_uint32( "max_bytes_value", ps, depth, &nk->max_bytes_value))
590    return false;
591  if ( !prs_uint32( "unknown index", ps, depth, &nk->unk_index))
592    return false;
593
594  name_length = nk->keyname ? strlen(nk->keyname) : 0 ;
595  class_length = nk->classname ? strlen(nk->classname) : 0 ;
596  if ( !prs_uint16( "name_length", ps, depth, &name_length ))
597    return false;
598  if ( !prs_uint16( "class_length", ps, depth, &class_length ))
599    return false;       
600               
601  if ( class_length ) 
602  {
603    ;;
604  }
605       
606  if ( name_length ) 
607  {
608    if(ps->io && !(nk->keyname = (char*)zcalloc(sizeof(char), name_length+1)))
609        return false;
610
611    if(!prs_uint8s(true, "name", ps, depth, (uint8*)nk->keyname, name_length))
612      return false;
613
614    if(ps->io)
615      nk->keyname[name_length] = '\0';
616  }
617
618  end_off = ps->data_offset;
619
620  /* data_size must be divisible by 8 and large enough to hold
621     the original record */
622
623  data_size = ((start_off - end_off) & 0xfffffff8 );
624  /*if ( data_size > nk->rec_size )
625      DEBUG(10,("Encountered reused record (0x%x < 0x%x)\n", data_size, nk->rec_size));*/
626
627  if ( !ps->io )
628    nk->hbin->dirty = true;
629 
630  nk->subkey_index = 0;
631  return true;
632}
633
634
635/*******************************************************************
636 *******************************************************************/
637static uint32 regf_block_checksum( prs_struct *ps )
638{
639  char *buffer = ps->data_p;
640  uint32 checksum, x;
641  int i;
642
643  /* XOR of all bytes 0x0000 - 0x01FB */
644               
645  checksum = x = 0;
646       
647  for ( i=0; i<0x01FB; i+=4 ) {
648    x = IVAL(buffer, i );
649    checksum ^= x;
650  }
651       
652  return checksum;
653}
654
655
656/*******************************************************************
657 *******************************************************************/
658static bool read_regf_block( REGF_FILE *file )
659{
660  prs_struct ps;
661  uint32 checksum;
662       
663  /* grab the first block from the file */
664               
665  if ( read_block( file, &ps, 0, REGF_BLOCKSIZE ) == -1 )
666    return false;
667       
668  /* parse the block and verify the checksum */
669       
670  if ( !prs_regf_block( "regf_header", &ps, 0, file ) )
671    return false;       
672               
673  checksum = regf_block_checksum( &ps );
674       
675  if(ps.is_dynamic)
676    SAFE_FREE(ps.data_p);
677  ps.is_dynamic = false;
678  ps.buffer_size = 0;
679  ps.data_offset = 0;
680
681  if ( file->checksum !=  checksum ) {
682    /*DEBUG(0,("read_regf_block: invalid checksum\n" ));*/
683    return false;
684  }
685
686  return true;
687}
688
689
690/*******************************************************************
691 *******************************************************************/
692static REGF_HBIN* read_hbin_block( REGF_FILE *file, off_t offset )
693{
694  REGF_HBIN *hbin;
695  uint32 record_size, curr_off, block_size, header;
696       
697  if ( !(hbin = (REGF_HBIN*)zalloc(sizeof(REGF_HBIN))) ) 
698    return NULL;
699  hbin->file_off = offset;
700  hbin->free_off = -1;
701               
702  if ( read_block( file, &hbin->ps, offset, 0 ) == -1 )
703    return NULL;
704       
705  if ( !prs_hbin_block( "hbin", &hbin->ps, 0, hbin ) )
706    return NULL;       
707
708  /* this should be the same thing as hbin->block_size but just in case */
709
710  block_size = hbin->ps.buffer_size;
711
712  /* Find the available free space offset.  Always at the end,
713     so walk the record list and stop when you get to the end.
714     The end is defined by a record header of 0xffffffff.  The
715     previous 4 bytes contains the amount of free space remaining
716     in the hbin block. */
717
718  /* remember that the record_size is in the 4 bytes preceeding the record itself */
719
720  if ( !prs_set_offset( &hbin->ps, file->data_offset+HBIN_HDR_SIZE-sizeof(uint32) ) )
721    return false;
722
723  record_size = 0;
724  curr_off = hbin->ps.data_offset;
725  while ( header != 0xffffffff ) {
726    /* not done yet so reset the current offset to the
727       next record_size field */
728
729    curr_off = curr_off+record_size;
730
731    /* for some reason the record_size of the last record in
732       an hbin block can extend past the end of the block
733       even though the record fits within the remaining
734       space....aaarrrgggghhhhhh */
735
736    if ( curr_off >= block_size ) {
737      record_size = -1;
738      curr_off = -1;
739      break;
740    }
741
742    if ( !prs_set_offset( &hbin->ps, curr_off) )
743      return false;
744
745    if ( !prs_uint32( "rec_size", &hbin->ps, 0, &record_size ) )
746      return false;
747    if ( !prs_uint32( "header", &hbin->ps, 0, &header ) )
748      return false;
749               
750    assert( record_size != 0 );
751
752    if ( record_size & 0x80000000 ) {
753      /* absolute_value(record_size) */
754      record_size = (record_size ^ 0xffffffff) + 1;
755    }
756  }
757
758  /* save the free space offset */
759
760  if ( header == 0xffffffff ) {
761
762    /* account for the fact that the curr_off is 4 bytes behind the actual
763       record header */
764
765    hbin->free_off = curr_off + sizeof(uint32);
766    hbin->free_size = record_size;
767  }
768
769  /*DEBUG(10,("read_hbin_block: free space offset == 0x%x\n", hbin->free_off));*/
770
771  if ( !prs_set_offset( &hbin->ps, file->data_offset+HBIN_HDR_SIZE )  )
772    return false;
773       
774  return hbin;
775}
776
777
778/*******************************************************************
779 Input a randon offset and receive the correpsonding HBIN
780 block for it
781*******************************************************************/
782static bool hbin_contains_offset( REGF_HBIN *hbin, uint32 offset )
783{
784  if ( !hbin )
785    return false;
786       
787  if ( (offset > hbin->first_hbin_off) && (offset < (hbin->first_hbin_off+hbin->block_size)) )
788    return true;
789               
790  return false;
791}
792
793
794/*******************************************************************
795 Input a randon offset and receive the correpsonding HBIN
796 block for it
797*******************************************************************/
798static REGF_HBIN* lookup_hbin_block( REGF_FILE *file, uint32 offset )
799{
800  REGF_HBIN *hbin = NULL;
801  uint32 block_off;
802
803  /* start with the open list */
804
805  for ( hbin=file->block_list; hbin; hbin=hbin->next ) {
806    /* DEBUG(10,("lookup_hbin_block: address = 0x%x [0x%x]\n", hbin->file_off, (uint32)hbin ));*/
807    if ( hbin_contains_offset( hbin, offset ) )
808      return hbin;
809  }
810       
811  if ( !hbin ) {
812    /* start at the beginning */
813
814    block_off = REGF_BLOCKSIZE;
815    do {
816      /* cleanup before the next round */
817      if ( hbin )
818      {
819        if(hbin->ps.is_dynamic)
820          SAFE_FREE(hbin->ps.data_p);
821        hbin->ps.is_dynamic = false;
822        hbin->ps.buffer_size = 0;
823        hbin->ps.data_offset = 0;
824      }
825
826      hbin = read_hbin_block( file, block_off );
827
828      if ( hbin ) 
829        block_off = hbin->file_off + hbin->block_size;
830
831    } while ( hbin && !hbin_contains_offset( hbin, offset ) );
832  }
833
834  if ( hbin )
835    DLIST_ADD( file->block_list, hbin );
836
837  return hbin;
838}
839
840
841/*******************************************************************
842 *******************************************************************/
843static bool prs_hash_rec( const char *desc, prs_struct *ps, int depth, REGF_HASH_REC *hash )
844{
845  depth++;
846
847  if ( !prs_uint32( "nk_off", ps, depth, &hash->nk_off ))
848    return false;
849  if ( !prs_uint8s( true, "keycheck", ps, depth, hash->keycheck, sizeof( hash->keycheck )) )
850    return false;
851       
852  return true;
853}
854
855
856/*******************************************************************
857 *******************************************************************/
858static bool hbin_prs_lf_records(const char *desc, REGF_HBIN *hbin, 
859                                int depth, REGF_NK_REC *nk)
860{
861  int i;
862  REGF_LF_REC *lf = &nk->subkeys;
863  uint32 data_size, start_off, end_off;
864
865  depth++;
866
867  /* check if we have anything to do first */
868       
869  if ( nk->num_subkeys == 0 )
870    return true;
871
872  /* move to the LF record */
873
874  if ( !prs_set_offset( &hbin->ps, nk->subkeys_off + HBIN_HDR_SIZE - hbin->first_hbin_off ) )
875    return false;
876
877  /* backup and get the data_size */
878       
879  if ( !prs_set_offset( &hbin->ps, hbin->ps.data_offset-sizeof(uint32)) )
880    return false;
881  start_off = hbin->ps.data_offset;
882  if ( !prs_uint32( "rec_size", &hbin->ps, depth, &lf->rec_size ))
883    return false;
884
885  if(!prs_uint8s(true, "header", &hbin->ps, depth, 
886                 lf->header, sizeof(lf->header)))
887    return false;
888               
889  if ( !prs_uint16( "num_keys", &hbin->ps, depth, &lf->num_keys))
890    return false;
891
892  if ( hbin->ps.io ) {
893    if ( !(lf->hashes = (REGF_HASH_REC*)zcalloc(sizeof(REGF_HASH_REC), lf->num_keys )) )
894      return false;
895  }
896
897  for ( i=0; i<lf->num_keys; i++ ) {
898    if ( !prs_hash_rec( "hash_rec", &hbin->ps, depth, &lf->hashes[i] ) )
899      return false;
900  }
901
902  end_off = hbin->ps.data_offset;
903
904  /* data_size must be divisible by 8 and large enough to hold the original record */
905
906  data_size = ((start_off - end_off) & 0xfffffff8 );
907  /*  if ( data_size > lf->rec_size )*/
908    /*DEBUG(10,("Encountered reused record (0x%x < 0x%x)\n", data_size, lf->rec_size));*/
909
910  if ( !hbin->ps.io )
911    hbin->dirty = true;
912
913  return true;
914}
915
916
917/*******************************************************************
918 *******************************************************************/
919static bool hbin_prs_sk_rec( const char *desc, REGF_HBIN *hbin, int depth, REGF_SK_REC *sk )
920{
921  prs_struct *ps = &hbin->ps;
922  uint16 tag = 0xFFFF;
923  uint32 data_size, start_off, end_off;
924
925
926  depth++;
927
928  if ( !prs_set_offset( &hbin->ps, sk->sk_off + HBIN_HDR_SIZE - hbin->first_hbin_off ) )
929    return false;
930
931  /* backup and get the data_size */
932       
933  if ( !prs_set_offset( &hbin->ps, hbin->ps.data_offset-sizeof(uint32)) )
934    return false;
935  start_off = hbin->ps.data_offset;
936  if ( !prs_uint32( "rec_size", &hbin->ps, depth, &sk->rec_size ))
937    return false;
938
939  if (!prs_uint8s(true, "header", ps, depth, sk->header, sizeof(sk->header)))
940    return false;
941  if ( !prs_uint16( "tag", ps, depth, &tag))
942    return false;
943
944  if ( !prs_uint32( "prev_sk_off", ps, depth, &sk->prev_sk_off))
945    return false;
946  if ( !prs_uint32( "next_sk_off", ps, depth, &sk->next_sk_off))
947    return false;
948  if ( !prs_uint32( "ref_count", ps, depth, &sk->ref_count))
949    return false;
950  if ( !prs_uint32( "size", ps, depth, &sk->size))
951    return false;
952
953  if ( !sec_io_desc( "sec_desc", &sk->sec_desc, ps, depth )) 
954    return false;
955
956  end_off = hbin->ps.data_offset;
957
958  /* data_size must be divisible by 8 and large enough to hold the original record */
959
960  data_size = ((start_off - end_off) & 0xfffffff8 );
961  /*  if ( data_size > sk->rec_size )*/
962    /*DEBUG(10,("Encountered reused record (0x%x < 0x%x)\n", data_size, sk->rec_size));*/
963
964  if ( !hbin->ps.io )
965    hbin->dirty = true;
966
967  return true;
968}
969
970
971/*******************************************************************
972 *******************************************************************/
973static bool hbin_prs_vk_rec( const char *desc, REGF_HBIN *hbin, int depth, 
974                             REGF_VK_REC *vk, REGF_FILE *file )
975{
976  uint32 offset;
977  uint16 name_length;
978  prs_struct *ps = &hbin->ps;
979  uint32 data_size, start_off, end_off;
980
981  depth++;
982
983  /* backup and get the data_size */
984       
985  if ( !prs_set_offset( &hbin->ps, hbin->ps.data_offset-sizeof(uint32)) )
986    return false;
987  start_off = hbin->ps.data_offset;
988  if ( !prs_uint32( "rec_size", &hbin->ps, depth, &vk->rec_size ))
989    return false;
990
991  if ( !prs_uint8s( true, "header", ps, depth, vk->header, sizeof( vk->header )) )
992    return false;
993
994  if ( !hbin->ps.io )
995    name_length = strlen(vk->valuename);
996
997  if ( !prs_uint16( "name_length", ps, depth, &name_length ))
998    return false;
999  if ( !prs_uint32( "data_size", ps, depth, &vk->data_size ))
1000    return false;
1001  if ( !prs_uint32( "data_off", ps, depth, &vk->data_off ))
1002    return false;
1003  if ( !prs_uint32( "type", ps, depth, &vk->type))
1004    return false;
1005  if ( !prs_uint16( "flag", ps, depth, &vk->flag))
1006    return false;
1007
1008  offset = ps->data_offset;
1009  offset += 2;  /* skip 2 bytes */
1010  prs_set_offset( ps, offset );
1011
1012  /* get the name */
1013
1014  if ( vk->flag&VK_FLAG_NAME_PRESENT ) {
1015
1016    if ( hbin->ps.io ) {
1017      if ( !(vk->valuename = (char*)zcalloc(sizeof(char), name_length+1 )))
1018        return false;
1019    }
1020    if ( !prs_uint8s(true, "name", ps, depth, 
1021                     (uint8*)vk->valuename, name_length) )
1022      return false;
1023  }
1024
1025  end_off = hbin->ps.data_offset;
1026
1027  /* get the data if necessary */
1028
1029  if ( vk->data_size != 0 ) 
1030  {
1031    bool charmode = false;
1032
1033    if ( (vk->type == REG_SZ) || (vk->type == REG_MULTI_SZ) )
1034      charmode = true;
1035
1036    /* the data is stored in the offset if the size <= 4 */
1037    if ( !(vk->data_size & VK_DATA_IN_OFFSET) ) 
1038    {
1039      REGF_HBIN *hblock = hbin;
1040      uint32 data_rec_size;
1041
1042      if ( hbin->ps.io ) 
1043      {
1044        if ( !(vk->data = (uint8*)zcalloc(sizeof(uint8), vk->data_size) ) )
1045          return false;
1046      }
1047
1048      /* this data can be in another hbin */
1049      if ( !hbin_contains_offset( hbin, vk->data_off ) ) 
1050      {
1051        if ( !(hblock = lookup_hbin_block( file, vk->data_off )) )
1052          return false;
1053      }
1054      if (!(prs_set_offset(&hblock->ps, 
1055                           (vk->data_off
1056                            + HBIN_HDR_SIZE
1057                            - hblock->first_hbin_off)
1058                           - sizeof(uint32))))
1059      { return false; }
1060
1061      if ( !hblock->ps.io ) 
1062      {
1063        data_rec_size = ( (vk->data_size+sizeof(uint32)) & 0xfffffff8 ) + 8;
1064        data_rec_size = ( data_rec_size - 1 ) ^ 0xFFFFFFFF;
1065      }
1066      if ( !prs_uint32( "data_rec_size", &hblock->ps, depth, &data_rec_size ))
1067        return false;
1068      if(!prs_uint8s(charmode, "data", &hblock->ps, depth, 
1069                     vk->data, vk->data_size))
1070        return false;
1071
1072      if ( !hblock->ps.io )
1073        hblock->dirty = true;
1074    }
1075    else 
1076    {
1077      if(!(vk->data = zcalloc(sizeof(uint8), 4)))
1078        return false;
1079      SIVAL( vk->data, 0, vk->data_off );
1080    }
1081               
1082  }
1083
1084  /* data_size must be divisible by 8 and large enough to hold the original record */
1085
1086  data_size = ((start_off - end_off ) & 0xfffffff8 );
1087  /*if ( data_size !=  vk->rec_size )
1088    DEBUG(10,("prs_vk_rec: data_size check failed (0x%x < 0x%x)\n", data_size, vk->rec_size));*/
1089
1090  if ( !hbin->ps.io )
1091    hbin->dirty = true;
1092
1093  return true;
1094}
1095
1096
1097/*******************************************************************
1098 read a VK record which is contained in the HBIN block stored
1099 in the prs_struct *ps.
1100*******************************************************************/
1101static bool hbin_prs_vk_records(const char *desc, REGF_HBIN *hbin, 
1102                                int depth, REGF_NK_REC *nk, REGF_FILE *file)
1103{
1104  int i;
1105  uint32 record_size;
1106
1107  depth++;
1108       
1109  /* check if we have anything to do first */
1110  if(nk->num_values == 0)
1111    return true;
1112               
1113  if(hbin->ps.io)
1114  {
1115    if (!(nk->values = (REGF_VK_REC*)zcalloc(sizeof(REGF_VK_REC), 
1116                                              nk->num_values )))
1117      return false;
1118  }
1119       
1120  /* convert the offset to something relative to this HBIN block */
1121  if (!prs_set_offset(&hbin->ps, 
1122                      nk->values_off
1123                      + HBIN_HDR_SIZE
1124                      - hbin->first_hbin_off
1125                      - sizeof(uint32)))
1126  { return false; }
1127
1128  if ( !hbin->ps.io ) 
1129  { 
1130    record_size = ( ( nk->num_values * sizeof(uint32) ) & 0xfffffff8 ) + 8;
1131    record_size = (record_size - 1) ^ 0xFFFFFFFF;
1132  }
1133
1134  if ( !prs_uint32( "record_size", &hbin->ps, depth, &record_size ) )
1135    return false;
1136               
1137  for ( i=0; i<nk->num_values; i++ ) 
1138  {
1139    if ( !prs_uint32( "vk_off", &hbin->ps, depth, &nk->values[i].rec_off ) )
1140      return false;
1141  }
1142
1143  for ( i=0; i<nk->num_values; i++ ) 
1144  {
1145    REGF_HBIN *sub_hbin = hbin;
1146    uint32 new_offset;
1147       
1148    if ( !hbin_contains_offset( hbin, nk->values[i].rec_off ) ) 
1149    {
1150      sub_hbin = lookup_hbin_block( file, nk->values[i].rec_off );
1151      if ( !sub_hbin ) 
1152      {
1153        /*DEBUG(0,("hbin_prs_vk_records: Failed to find HBIN block containing offset [0x%x]\n",
1154          nk->values[i].hbin_off));*/
1155        return false;
1156      }
1157    }
1158               
1159    new_offset = nk->values[i].rec_off
1160      + HBIN_HDR_SIZE
1161      - sub_hbin->first_hbin_off;
1162
1163    if (!prs_set_offset(&sub_hbin->ps, new_offset))
1164      return false;
1165    if (!hbin_prs_vk_rec("vk_rec", sub_hbin, depth, &nk->values[i], file))
1166      return false;
1167  }
1168
1169  if ( !hbin->ps.io )
1170    hbin->dirty = true;
1171
1172  return true;
1173}
1174
1175
1176/*******************************************************************
1177 *******************************************************************/
1178static REGF_SK_REC* find_sk_record_by_offset( REGF_FILE *file, uint32 offset )
1179{
1180  REGF_SK_REC *p_sk;
1181       
1182  for ( p_sk=file->sec_desc_list; p_sk; p_sk=p_sk->next ) {
1183    if ( p_sk->sk_off == offset ) 
1184      return p_sk;
1185  }
1186       
1187  return NULL;
1188}
1189
1190
1191/*******************************************************************
1192 *******************************************************************/
1193static REGF_SK_REC* find_sk_record_by_sec_desc( REGF_FILE *file, SEC_DESC *sd )
1194{
1195  REGF_SK_REC *p;
1196
1197  for ( p=file->sec_desc_list; p; p=p->next ) {
1198    if ( sec_desc_equal( p->sec_desc, sd ) )
1199      return p;
1200  }
1201
1202  /* failure */
1203
1204  return NULL;
1205}
1206
1207
1208/*******************************************************************
1209 *******************************************************************/
1210static bool hbin_prs_key( REGF_FILE *file, REGF_HBIN *hbin, REGF_NK_REC *nk )
1211{
1212  int depth = 0;
1213  REGF_HBIN *sub_hbin;
1214       
1215  depth++;
1216
1217  /* get the initial nk record */
1218  if (!prs_nk_rec("nk_rec", &hbin->ps, depth, nk))
1219    return false;
1220
1221  /* fill in values */
1222  if ( nk->num_values && (nk->values_off!=REGF_OFFSET_NONE) ) 
1223  {
1224    sub_hbin = hbin;
1225    if ( !hbin_contains_offset( hbin, nk->values_off ) ) 
1226    {
1227      sub_hbin = lookup_hbin_block( file, nk->values_off );
1228      if ( !sub_hbin ) 
1229      {
1230        /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing value_list_offset [0x%x]\n",
1231          nk->values_off));*/
1232        return false;
1233      }
1234    }
1235               
1236    if(!hbin_prs_vk_records("vk_rec", sub_hbin, depth, nk, file))
1237      return false;
1238  }
1239               
1240  /* now get subkeys */
1241  if ( nk->num_subkeys && (nk->subkeys_off!=REGF_OFFSET_NONE) ) 
1242  {
1243    sub_hbin = hbin;
1244    if ( !hbin_contains_offset( hbin, nk->subkeys_off ) ) 
1245    {
1246      sub_hbin = lookup_hbin_block( file, nk->subkeys_off );
1247      if ( !sub_hbin ) 
1248      {
1249        /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing subkey_offset [0x%x]\n",
1250          nk->subkeys_off));*/
1251        return false;
1252      }
1253    }
1254               
1255    if (!hbin_prs_lf_records("lf_rec", sub_hbin, depth, nk))
1256      return false;
1257  }
1258
1259  /* get the to the security descriptor.  First look if we have already parsed it */
1260       
1261  if ((nk->sk_off!=REGF_OFFSET_NONE) 
1262      && !(nk->sec_desc = find_sk_record_by_offset( file, nk->sk_off )))
1263  {
1264    sub_hbin = hbin;
1265    if (!hbin_contains_offset(hbin, nk->sk_off))
1266    {
1267      sub_hbin = lookup_hbin_block( file, nk->sk_off );
1268      if ( !sub_hbin ) {
1269        /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing sk_offset [0x%x]\n",
1270          nk->subkeys_off));*/
1271        return false;
1272      }
1273    }
1274               
1275    if ( !(nk->sec_desc = (REGF_SK_REC*)zalloc(sizeof(REGF_SK_REC) )) )
1276      return false;
1277    nk->sec_desc->sk_off = nk->sk_off;
1278    if ( !hbin_prs_sk_rec( "sk_rec", sub_hbin, depth, nk->sec_desc ))
1279      return false;
1280                       
1281    /* add to the list of security descriptors (ref_count has been read from the files) */
1282
1283    nk->sec_desc->sk_off = nk->sk_off;
1284    DLIST_ADD( file->sec_desc_list, nk->sec_desc );
1285  }
1286               
1287  return true;
1288}
1289
1290
1291/*******************************************************************
1292 *******************************************************************/
1293static bool next_record( REGF_HBIN *hbin, const char *hdr, bool *eob )
1294{
1295  uint8 header[REC_HDR_SIZE] = "";
1296  uint32 record_size;
1297  uint32 curr_off, block_size;
1298  bool found = false;
1299  prs_struct *ps = &hbin->ps;
1300       
1301  curr_off = ps->data_offset;
1302  if ( curr_off == 0 )
1303    prs_set_offset( ps, HBIN_HEADER_REC_SIZE );
1304
1305  /* assume that the current offset is at the reacord header
1306     and we need to backup to read the record size */
1307  curr_off -= sizeof(uint32);
1308
1309  block_size = ps->buffer_size;
1310  record_size = 0;
1311  while ( !found ) 
1312  {
1313    curr_off = curr_off+record_size;
1314    if ( curr_off >= block_size ) 
1315      break;
1316
1317    if ( !prs_set_offset( &hbin->ps, curr_off) )
1318      return false;
1319
1320    if ( !prs_uint32( "record_size", ps, 0, &record_size ) )
1321      return false;
1322    if ( !prs_uint8s( true, "header", ps, 0, header, REC_HDR_SIZE ) )
1323      return false;
1324
1325    if ( record_size & 0x80000000 ) {
1326      /* absolute_value(record_size) */
1327      record_size = (record_size ^ 0xffffffff) + 1;
1328    }
1329
1330    if ( memcmp( header, hdr, REC_HDR_SIZE ) == 0 ) {
1331      found = true;
1332      curr_off += sizeof(uint32);
1333    }
1334  } 
1335
1336  /* mark prs_struct as done ( at end ) if no more SK records */
1337  /* mark end-of-block as true */       
1338  if ( !found )
1339  {
1340    prs_set_offset( &hbin->ps, hbin->ps.buffer_size );
1341    *eob = true;
1342    return false;
1343  }
1344
1345  if (!prs_set_offset(ps, curr_off))
1346    return false;
1347
1348  return true;
1349}
1350
1351
1352/*******************************************************************
1353 *******************************************************************/
1354static bool next_nk_record(REGF_FILE *file, REGF_HBIN *hbin, 
1355                           REGF_NK_REC *nk, bool *eob)
1356{
1357  if (next_record(hbin, "nk", eob) 
1358      && hbin_prs_key(file, hbin, nk))
1359    return true;
1360       
1361  return false;
1362}
1363
1364
1365/*******************************************************************
1366 Open the registry file and then read in the REGF block to get the
1367 first hbin offset.
1368*******************************************************************/
1369REGF_FILE* regfio_open( const char *filename )
1370{
1371  REGF_FILE *rb;
1372  int flags = O_RDONLY;
1373
1374  if ( !(rb = (REGF_FILE*)malloc(sizeof(REGF_FILE))) ) {
1375    /* DEBUG(0,("ERROR allocating memory\n")); */
1376    return NULL;
1377  }
1378  memset(rb, 0, sizeof(REGF_FILE));
1379  rb->fd = -1;
1380       
1381  /*    if ( !(rb->mem_ctx = talloc_init( "read_regf_block" )) )
1382    {
1383    regfio_close( rb );
1384    return NULL;
1385    }
1386  */
1387  rb->open_flags = flags;
1388       
1389  /* open and existing file */
1390
1391  if ( (rb->fd = open(filename, flags)) == -1 ) {
1392    /* DEBUG(0,("regfio_open: failure to open %s (%s)\n", filename, strerror(errno)));*/
1393    regfio_close( rb );
1394    return NULL;
1395  }
1396       
1397  /* read in an existing file */
1398       
1399  if ( !read_regf_block( rb ) ) {
1400    /* DEBUG(0,("regfio_open: Failed to read initial REGF block\n"));*/
1401    regfio_close( rb );
1402    return NULL;
1403  }
1404       
1405  /* success */
1406       
1407  return rb;
1408}
1409
1410
1411/*******************************************************************
1412 *******************************************************************/
1413static void regfio_mem_free( REGF_FILE *file )
1414{
1415  /* free any zalloc()'d memory */
1416       
1417  /*    if ( file && file->mem_ctx )
1418    free(file->mem_ctx);
1419  */
1420}
1421
1422
1423/*******************************************************************
1424 *******************************************************************/
1425int regfio_close( REGF_FILE *file )
1426{
1427  int fd;
1428
1429  regfio_mem_free( file );
1430
1431  /* nothing to do if there is no open file */
1432
1433  if ( !file || (file->fd == -1) )
1434    return 0;
1435               
1436  fd = file->fd;
1437  file->fd = -1;
1438  SAFE_FREE( file );
1439
1440  return close( fd );
1441}
1442
1443
1444/*******************************************************************
1445 There should be only *one* root key in the registry file based
1446 on my experience.  --jerry
1447*******************************************************************/
1448REGF_NK_REC* regfio_rootkey( REGF_FILE *file )
1449{
1450  REGF_NK_REC *nk;
1451  REGF_HBIN   *hbin;
1452  uint32      offset = REGF_BLOCKSIZE;
1453  bool        found = false;
1454  bool        eob;
1455       
1456  if ( !file )
1457    return NULL;
1458               
1459  if ( !(nk = (REGF_NK_REC*)zalloc(sizeof(REGF_NK_REC) )) ) {
1460    /*DEBUG(0,("regfio_rootkey: zalloc() failed!\n"));*/
1461    return NULL;
1462  }
1463       
1464  /* scan through the file on HBIN block at a time looking
1465     for an NK record with a type == 0x002c.
1466     Normally this is the first nk record in the first hbin
1467     block (but I'm not assuming that for now) */
1468       
1469  while ( (hbin = read_hbin_block( file, offset )) ) {
1470    eob = false;
1471
1472    while ( !eob) {
1473      if ( next_nk_record( file, hbin, nk, &eob ) ) {
1474        if ( nk->key_type == NK_TYPE_ROOTKEY ) {
1475          found = true;
1476          break;
1477        }
1478      }
1479      if(hbin->ps.is_dynamic)
1480        SAFE_FREE(hbin->ps.data_p);
1481      hbin->ps.is_dynamic = false;
1482      hbin->ps.buffer_size = 0;
1483      hbin->ps.data_offset = 0;
1484    }
1485               
1486    if ( found ) 
1487      break;
1488
1489    offset += hbin->block_size;
1490  }
1491       
1492  if ( !found ) {
1493    /*DEBUG(0,("regfio_rootkey: corrupt registry file ?  No root key record located\n"));*/
1494    return NULL;
1495  }
1496
1497  DLIST_ADD( file->block_list, hbin );
1498
1499  return nk;           
1500}
1501
1502
1503/* XXX: An interator struct should be used instead, and this function
1504 *   should operate on it, so the state of iteration isn't stored in the
1505 * REGF_NK_REC struct itself.
1506 */
1507/*******************************************************************
1508 This acts as an interator over the subkeys defined for a given
1509 NK record.  Remember that offsets are from the *first* HBIN block.
1510*******************************************************************/
1511REGF_NK_REC* regfio_fetch_subkey( REGF_FILE *file, REGF_NK_REC *nk )
1512{
1513  REGF_NK_REC *subkey;
1514  REGF_HBIN   *hbin;
1515  uint32      nk_offset;
1516
1517  /* see if there is anything left to report */
1518  if (!nk || (nk->subkeys_off==REGF_OFFSET_NONE) 
1519      || (nk->subkey_index >= nk->num_subkeys))
1520    return NULL;
1521
1522  /* find the HBIN block which should contain the nk record */
1523  if(!(hbin
1524       = lookup_hbin_block(file, nk->subkeys.hashes[nk->subkey_index].nk_off )))
1525  {
1526    /*DEBUG(0,("hbin_prs_key: Failed to find HBIN block containing offset [0x%x]\n",
1527      nk->subkeys.hashes[nk->subkey_index].nk_off));*/
1528    return NULL;
1529  }
1530       
1531  nk_offset = nk->subkeys.hashes[nk->subkey_index].nk_off;
1532  if(!prs_set_offset(&hbin->ps, 
1533                     (HBIN_HDR_SIZE + nk_offset - hbin->first_hbin_off)))
1534    return NULL;
1535               
1536  nk->subkey_index++;
1537  if(!(subkey = (REGF_NK_REC*)zalloc(sizeof(REGF_NK_REC))))
1538    return NULL;
1539
1540  if(!hbin_prs_key(file, hbin, subkey))
1541    return NULL;
1542
1543  return subkey;
1544}
Note: See TracBrowser for help on using the repository browser.