source: trunk/src/reglookup.c @ 42

Last change on this file since 42 was 42, checked in by tim, 19 years ago

Changed to a CSV-like output format to accommodate extended fields

Added mtime output for keys

Added security descriptor columns (probably broken right now)

  • Property svn:keywords set to Id
File size: 20.7 KB
RevLine 
[30]1/*
[42]2 * A utility to read a Windows NT/2K/XP/2K3 registry file, using
3 * Gerald Carter''s regfio interface.
[30]4 *
5 * Copyright (C) 2005 Timothy D. Morgan
[42]6 * Copyright (C) 2002 Richard Sharpe, rsharpe@richardsharpe.com
[30]7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; version 2 of the License.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 
20 *
21 * $Id: reglookup.c 42 2005-08-04 02:41:25Z tim $
22 */
23
24
25#include <stdlib.h>
26#include <stdio.h>
27#include <string.h>
[33]28#include <strings.h>
[42]29#include <time.h>
[30]30#include "../include/regfio.h"
[31]31#include "../include/void_stack.h"
[30]32
[40]33/* Globals, influenced by command line parameters */
34bool print_verbose = false;
35bool print_security = false;
[42]36bool print_header = true;
[40]37bool path_filter_enabled = false;
38bool type_filter_enabled = false;
39char* path_filter = NULL;
40int type_filter;
41char* registry_file = NULL;
42
[42]43/* Other globals */
44const char* special_chars = ",\"\\";
[40]45
[38]46void bailOut(int code, char* message)
47{
48  fprintf(stderr, message);
49  exit(code);
50}
51
52
[41]53/* Returns a newly malloc()ed string which contains original buffer,
54 * except for non-printable or special characters are quoted in hex
55 * with the syntax '\xQQ' where QQ is the hex ascii value of the quoted
56 * character.  A null terminator is added, as only ascii, not binary,
57 * is returned.
58 */
59static char* quote_buffer(const unsigned char* str, 
60                          unsigned int len, char* special)
61{
62  unsigned int i;
63  unsigned int num_written=0;
64  unsigned int out_len = sizeof(char)*len+1;
65  char* ret_val = malloc(out_len);
66
67  if(ret_val == NULL)
68    return NULL;
69
70  for(i=0; i<len; i++)
71  {
72    if(str[i] < 32 || str[i] > 126 || strchr(special, str[i]) != NULL)
73    {
74      out_len += 3;
75      /* XXX: may not be the most efficient way of getting enough memory. */
76      ret_val = realloc(ret_val, out_len);
77      if(ret_val == NULL)
78        break;
79      num_written += snprintf(ret_val+num_written, (out_len)-num_written,
80                              "\\x%.2X", str[i]);
81    }
82    else
83      ret_val[num_written++] = str[i];
84  }
85  ret_val[num_written] = '\0';
86
87  return ret_val;
88}
89
90
91/* Returns a newly malloc()ed string which contains original string,
92 * except for non-printable or special characters are quoted in hex
93 * with the syntax '\xQQ' where QQ is the hex ascii value of the quoted
94 * character.
95 */
96static char* quote_string(const char* str, char* special)
97{
[42]98  unsigned int len;
[41]99
[42]100  if(str == NULL)
101    return NULL;
102
103  len = strlen(str);
104  return quote_buffer((const unsigned char*)str, len, special);
[41]105}
106
107
108/*
109 * Convert from UniCode to Ascii ... Does not take into account other lang
110 * Restrict by ascii_max if > 0
111 */
112static int uni_to_ascii(unsigned char *uni, unsigned char *ascii, 
113                        int ascii_max, int uni_max)
114{
115  int i = 0; 
116
117  while (i < ascii_max && (uni[i*2] || uni[i*2+1]))
118  {
119    if (uni_max > 0 && (i*2) >= uni_max) break;
120    ascii[i] = uni[i*2];
121    i++;
122  }
123  ascii[i] = '\0';
124
125  return i;
126}
127
128
129/*
130 * Convert a data value to a string for display
131 */
132static unsigned char* data_to_ascii(unsigned char *datap, int len, int type)
133{
134  unsigned char *asciip;
135  unsigned int i;
136  unsigned short num_nulls;
137  unsigned char* ascii;
138  unsigned char* cur_str;
139  unsigned char* cur_ascii;
140  char* cur_quoted;
141  unsigned int cur_str_len;
142  unsigned int ascii_max, cur_str_max;
143  unsigned int str_rem, cur_str_rem, alen;
144
145  switch (type) 
146  {
147  case REG_SZ:
148    if (print_verbose)
149      fprintf(stderr, "Len: %d\n", len);
150   
151    ascii_max = sizeof(char)*len;
152    ascii = malloc(ascii_max+4);
153    if(ascii == NULL)
154      return NULL;
155   
156    /* XXX: This has to be fixed. It has to be UNICODE */
157    uni_to_ascii(datap, ascii, len, ascii_max);
[42]158    cur_quoted = quote_string((char*)ascii, special_chars);
159    free(ascii);
160    return (unsigned char*)cur_quoted;
[41]161    break;
162
163  case REG_EXPAND_SZ:
164    ascii_max = sizeof(char)*len;
165    ascii = malloc(ascii_max+2);
166    if(ascii == NULL)
167      return NULL;
168
169    uni_to_ascii(datap, ascii, len, ascii_max);
[42]170    cur_quoted = quote_string((char*)ascii, special_chars);
171    free(ascii);
172    return (unsigned char*)cur_quoted;
[41]173    break;
174
175  case REG_DWORD:
176    ascii_max = sizeof(char)*10;
177    ascii = malloc(ascii_max+1);
178    if(ascii == NULL)
179      return NULL;
180
181    if (*(int *)datap == 0)
182      snprintf((char*)ascii, ascii_max, "0");
183    else
184      snprintf((char*)ascii, ascii_max, "0x%x", *(int *)datap);
185    return ascii;
186    break;
187
[42]188  /* XXX: this MULTI_SZ parser is pretty inefficient.  Should be
189   *      redone with fewer malloc and better string concatenation.
190   */
[41]191  case REG_MULTI_SZ:
192    ascii_max = sizeof(char)*len*4;
193    cur_str_max = sizeof(char)*len+1;
194    cur_str = malloc(cur_str_max);
195    cur_ascii = malloc(cur_str_max);
196    ascii = malloc(ascii_max+4);
[42]197    if(ascii == NULL || cur_str == NULL || cur_ascii == NULL)
[41]198      return NULL;
199
200    /* Reads until it reaches 4 consecutive NULLs,
201     * which is two nulls in unicode, or until it reaches len, or until we
202     * run out of buffer.  The latter should never happen, but we shouldn't
203     * trust our file to have the right lengths/delimiters.
204     */
205    asciip = ascii;
206    num_nulls = 0;
207    str_rem = ascii_max;
208    cur_str_rem = cur_str_max;
209    cur_str_len = 0;
210
211    for(i=0; (i < len) && str_rem > 0; i++)
212    {
213      *(cur_str+cur_str_len) = *(datap+i);
214      if(*(cur_str+cur_str_len) == 0)
215        num_nulls++;
216      else
217        num_nulls = 0;
218      cur_str_len++;
219
220      if(num_nulls == 2)
221      {
222        uni_to_ascii(cur_str, cur_ascii, cur_str_max, 0);
[42]223        cur_quoted = quote_string((char*)cur_ascii, ",|\"\\");
[41]224        alen = snprintf((char*)asciip, str_rem, "%s", cur_quoted);
225        asciip += alen;
226        str_rem -= alen;
227        free(cur_quoted);
228
229        if(*(datap+i+1) == 0 && *(datap+i+2) == 0)
230          break;
231        else
232        {
233          alen = snprintf((char*)asciip, str_rem, "%c", '|');
234          asciip += alen;
235          str_rem -= alen;
236          memset(cur_str, 0, cur_str_max);
237          cur_str_len = 0;
238          num_nulls = 0;
239          /* To eliminate leading nulls in subsequent strings. */
240          i++;
241        }
242      }
243    }
244    *asciip = 0;
[42]245    free(cur_str);
246    free(cur_ascii);
[41]247    return ascii;
248    break;
249
[42]250  /* XXX: Dont know what to do with these yet, just print as binary... */
251  case REG_RESOURCE_LIST:
252  case REG_FULL_RESOURCE_DESCRIPTOR:
253  case REG_RESOURCE_REQUIREMENTS_LIST:
254
255  case REG_BINARY:
256    return (unsigned char*)quote_buffer(datap, len, special_chars);
257    break;
258
[41]259  default:
260    return NULL;
261    break;
262  } 
263
264  return NULL;
265}
266
267
[42]268/* Security descriptor print functions  */
269
270const char* ace_type2str(uint8 type)
271{
272  static const char* map[7] 
273    = {"ALLOW", "DENY", "AUDIT", "ALARM", 
274       "ALLOW CPD", "OBJ ALLOW", "OBJ DENY"};
275  if(type < 7)
276    return map[type];
277  else
278    return "UNKNOWN";
279}
280
281
282char* ace_flags2str(uint8 flags)
283{
284  char* flg_output = malloc(21*sizeof(char));
285  int some = 0;
286
287  if(flg_output == NULL)
288    return NULL;
289
290  flg_output[0] = '\0';
291  if (!flags)
292    return flg_output;
293
294  if (flags & 0x01) {
295    if (some) strcat(flg_output, " ");
296    some = 1;
297    strcat(flg_output, "OI");
298  }
299  if (flags & 0x02) {
300    if (some) strcat(flg_output, " ");
301    some = 1;
302    strcat(flg_output, "CI");
303  }
304  if (flags & 0x04) {
305    if (some) strcat(flg_output, " ");
306    some = 1;
307    strcat(flg_output, "NP");
308  }
309  if (flags & 0x08) {
310    if (some) strcat(flg_output, " ");
311    some = 1;
312    strcat(flg_output, "IO");
313  }
314  if (flags & 0x10) {
315    if (some) strcat(flg_output, " ");
316    some = 1;
317    strcat(flg_output, "IA");
318  }
319  if (flags == 0xF) {
320    if (some) strcat(flg_output, " ");
321    some = 1;
322    strcat(flg_output, "VI");
323  }
324
325  return flg_output;
326}
327
328
329char* ace_perms2str(uint32 perms)
330{
331  char* ret_val = malloc(9*sizeof(char));
332  sprintf(ret_val, "%8X", perms);
333
334  return ret_val;
335}
336
337
338char* sid2str(DOM_SID* sid)
339{
340  uint32 i, size = MAXSUBAUTHS*11 + 24;
341  uint32 left = size;
342  uint8 comps = sid->num_auths;
343  char* ret_val = malloc(size);
344 
345  if(ret_val == NULL)
346    return NULL;
347
348  if(comps > MAXSUBAUTHS)
349    comps = MAXSUBAUTHS;
350
351  left -= sprintf(ret_val, "S-%u-%u", sid->sid_rev_num, sid->id_auth[5]);
352
353  for (i = 0; i < comps; i++) 
354    left -= snprintf(ret_val+(size-left), left, "-%u", sid->sub_auths[i]);
355
356  return ret_val;
357}
358
359
360char* get_acl(SEC_ACL* acl)
361{
362  uint32 i, extra, size = 0;
363  const char* type_str;
364  char* flags_str;
365  char* perms_str;
366  char* sid_str;
367  char* ret_val = NULL;
368  char* ace_delim = "";
369  char field_delim = ':';
370
371  for (i = 0; i < acl->num_aces; i++)
372  {
373    /* XXX: check for NULL */
374    sid_str = sid2str(&acl->ace[i].trustee);
375    type_str = ace_type2str(acl->ace[i].type);
376    perms_str = ace_perms2str(acl->ace[i].info.mask);
377    flags_str = ace_flags2str(acl->ace[i].flags);
378
379    /* XXX: this is slow */
380    extra = strlen(sid_str) + strlen(type_str) 
381          + strlen(perms_str) + strlen(flags_str);
382    ret_val = realloc(ret_val, size+extra+5);
383    if(ret_val == NULL)
384      return NULL;
385    snprintf(ret_val+size, extra+4, "%s%s%c%s%c%s%c%s",
386             ace_delim,sid_str,
387             field_delim,type_str,
388             field_delim,perms_str,
389             field_delim,flags_str);
390    size += extra;
391    ace_delim = "|";
392    free(sid_str);
393    free(perms_str);
394    free(flags_str);
395  }
396
397  return ret_val;
398}
399
400
401char* get_sacl(SEC_DESC *sec_desc)
402{
403  if (sec_desc->sacl)
404    return get_acl(sec_desc->sacl);
405  else
406    return "";
407}
408
409
410char* get_dacl(SEC_DESC *sec_desc)
411{
412  if (sec_desc->dacl)
413    return get_acl(sec_desc->dacl);
414  else
415    return "";
416}
417
418
419char* get_owner(SEC_DESC *sec_desc)
420{
421  return sid2str(sec_desc->owner_sid);
422}
423
424
425char* get_group(SEC_DESC *sec_desc)
426{
427  return sid2str(sec_desc->grp_sid);
428}
429
430
[33]431void_stack* path2Stack(const char* s)
[30]432{
[38]433  void_stack* ret_val;
434  void_stack* rev_ret = void_stack_new(1024);
435  const char* cur = s;
[33]436  char* next = NULL;
[38]437  char* copy;
438
439  if (rev_ret == NULL)
440    return NULL;
[37]441  if (s == NULL)
[38]442    return rev_ret;
443 
444  while((next = strchr(cur, '/')) != NULL)
[33]445  {
[38]446    if ((next-cur) > 0)
447    {
448      copy = (char*)malloc((next-cur+1)*sizeof(char));
449      if(copy == NULL)
450        bailOut(2, "ERROR: Memory allocation problem.\n");
451         
452      memcpy(copy, cur, next-cur);
453      copy[next-cur] = '\0';
454      void_stack_push(rev_ret, copy);
455    }
456    cur = next+1;
[33]457  }
458  if(strlen(cur) > 0)
[38]459  {
460    copy = strdup(cur);
461    void_stack_push(rev_ret, copy);
462  }
[33]463
[38]464  ret_val = void_stack_copy_reverse(rev_ret);
465  void_stack_destroy(rev_ret);
466
[33]467  return ret_val;
468}
469
470
471char* stack2Path(void_stack* nk_stack)
472{
473  const REGF_NK_REC* cur;
[37]474  uint32 buf_left = 127;
475  uint32 buf_len = buf_left+1;
476  uint32 name_len = 0;
477  uint32 grow_amt;
[31]478  char* buf; 
479  char* new_buf;
480  void_stack_iterator* iter;
481 
482  buf = (char*)malloc((buf_len)*sizeof(char));
483  if (buf == NULL)
484    return NULL;
485  buf[0] = '\0';
[30]486
[31]487  iter = void_stack_iterator_new(nk_stack);
488  if (iter == NULL)
[30]489  {
[31]490    free(buf);
491    return NULL;
[30]492  }
493
[33]494  /* skip root element */
495  cur = void_stack_iterator_next(iter);
496
[31]497  while((cur = void_stack_iterator_next(iter)) != NULL)
498  {
[33]499    buf[buf_len-buf_left-1] = '/';
500    buf_left -= 1;
[31]501    name_len = strlen(cur->keyname);
502    if(name_len+1 > buf_left)
503    {
[37]504      grow_amt = (uint32)(buf_len/2);
[31]505      buf_len += name_len+1+grow_amt-buf_left;
506      if((new_buf = realloc(buf, buf_len)) == NULL)
507      {
508        free(buf);
509        free(iter);
510        return NULL;
511      }
512      buf = new_buf;
513      buf_left = grow_amt + name_len + 1;
514    }
515    strncpy(buf+(buf_len-buf_left-1), cur->keyname, name_len);
516    buf_left -= name_len;
517    buf[buf_len-buf_left-1] = '\0';
518  }
[30]519
[31]520  return buf;
521}
[30]522
[31]523
[33]524void printValue(REGF_VK_REC* vk, char* prefix)
[31]525{
[41]526  uint32 size;
527  uint8 tmp_buf[4];
[42]528  unsigned char* quoted_value;
529  char* quoted_prefix;
530  char* quoted_name;
[41]531
[40]532  if(!type_filter_enabled || (vk->type == type_filter))
[41]533  {
534    /* Thanks Microsoft for making this process so straight-forward!!! */
535    size = (vk->data_size & ~VK_DATA_IN_OFFSET);
536    if(vk->data_size & VK_DATA_IN_OFFSET)
537    {
538      tmp_buf[0] = (uint8)((vk->data_off >> 3) & 0xFF);
539      tmp_buf[1] = (uint8)((vk->data_off >> 2) & 0xFF);
540      tmp_buf[2] = (uint8)((vk->data_off >> 1) & 0xFF);
541      tmp_buf[3] = (uint8)(vk->data_off & 0xFF);
542      if(size > 4)
543        size = 4;
544      quoted_value = data_to_ascii(tmp_buf, 4, vk->type);
545    }
546    else
547    {
548      /* XXX: This is a safety hack.  No data fields have yet been found
549       * larger, but length limits are probably better got from fields
550       * in the registry itself, within reason.
551       */
552      if(size > 16384)
553      {
[42]554        fprintf(stderr, "WARNING: key size %d larger than "
555                        "16384, truncating...\n", size);
[41]556        size = 16384;
557      }
558      quoted_value = data_to_ascii(vk->data, vk->data_size, vk->type);
559    }
560
[42]561    /* XXX: Sometimes value names can be NULL in registry.  Need to
562     *      figure out why and when, and generate the appropriate output
563     *      for that condition.
564     */
565    quoted_prefix = quote_string(prefix, special_chars);
566    quoted_name = quote_string(vk->valuename, special_chars);
567
568    printf("%s/%s,%s,%s,,,,,\n", quoted_prefix, quoted_name,
[41]569           regfio_type_val2str(vk->type), quoted_value);
[42]570
571    if(quoted_value != NULL)
572      free(quoted_value);
573    if(quoted_prefix != NULL)
574      free(quoted_prefix);
575    if(quoted_name != NULL)
576      free(quoted_name);
[41]577  }
[32]578}
579
580
[33]581void printValueList(REGF_NK_REC* nk, char* prefix)
[32]582{
[37]583  uint32 i;
[33]584 
585  for(i=0; i < nk->num_values; i++)
586    printValue(&nk->values[i], prefix);
587}
588
[37]589
[33]590/* XXX: this function is god-awful.  Needs to be re-designed. */
591void printKeyTree(REGF_FILE* f, void_stack* nk_stack, char* prefix)
592{
[31]593  REGF_NK_REC* cur;
594  REGF_NK_REC* sub;
[42]595  char* path = NULL;
596  char* val_path = NULL;
597  char* owner = NULL;
598  char* group = NULL;
599  char* sacl = NULL;
600  char* dacl = NULL;
601  char mtime[20];
602  time_t tmp_time[1];
603  struct tm* tmp_time_s = NULL;
604
[41]605  int key_type = regfio_type_str2val("KEY");
[31]606
[32]607  if((cur = (REGF_NK_REC*)void_stack_cur(nk_stack)) != NULL)
[31]608  {
[33]609    cur->subkey_index = 0;
610    path = stack2Path(nk_stack);
611   
612    if(strlen(path) > 0)
[40]613      if(!type_filter_enabled || (key_type == type_filter))
[42]614      {
615        owner = get_owner(cur->sec_desc->sec_desc);
616        group = get_group(cur->sec_desc->sec_desc);
617        sacl = get_sacl(cur->sec_desc->sec_desc);
618        dacl = get_dacl(cur->sec_desc->sec_desc);
619        *tmp_time = nt_time_to_unix(&cur->mtime);
620        tmp_time_s = gmtime(tmp_time);
621        strftime(mtime, sizeof(mtime), "%Y-%m-%d %H:%M:%S", tmp_time_s);
622        printf("%s%s,KEY,,%s,%s,%s,%s,%s\n", prefix, path, mtime, 
623               owner, group, sacl, dacl);
624        if(owner != NULL)
625          free(owner);
626        owner = NULL;
627        if(group != NULL)
628          free(group);
629        group = NULL;
630        if(sacl != NULL)
631          free(sacl);
632        sacl = NULL;
633        if(dacl != NULL)
634          free(dacl);
635        dacl = NULL;
636      }
[40]637    if(!type_filter_enabled || (key_type != type_filter))
638      printValueList(cur, path);
[32]639    while((cur = (REGF_NK_REC*)void_stack_cur(nk_stack)) != NULL)
[31]640    {
[32]641      if((sub = regfio_fetch_subkey(f, cur)) != NULL)
[31]642      {
[33]643        sub->subkey_index = 0;
[32]644        void_stack_push(nk_stack, sub);
[33]645        path = stack2Path(nk_stack);
[32]646        if(path != NULL)
647        {
[33]648          val_path = (char*)malloc(strlen(prefix)+strlen(path)+1);
649          sprintf(val_path, "%s%s", prefix, path);
[40]650          if(!type_filter_enabled || (key_type == type_filter))
[42]651          {
652            owner = get_owner(sub->sec_desc->sec_desc);
653            group = get_group(sub->sec_desc->sec_desc);
654            sacl = get_sacl(sub->sec_desc->sec_desc);
655            dacl = get_dacl(sub->sec_desc->sec_desc);
656            *tmp_time = nt_time_to_unix(&cur->mtime);
657            tmp_time_s = gmtime(tmp_time);
658            strftime(mtime, sizeof(mtime), "%Y-%m-%d %H:%M:%S", tmp_time_s);
659            printf("%s,KEY,,%s,%s,%s,%s,%s\n", val_path, mtime,
660                   owner, group, sacl, dacl);
661          }
[40]662          if(!type_filter_enabled || (key_type != type_filter))
663            printValueList(sub, val_path);
[42]664          if(val_path != NULL)
665            free(val_path);
666          val_path = NULL;
667          if(path != NULL)
668            free(path);
669          path = NULL;
670          if(owner != NULL)
671            free(owner);
672          owner = NULL;
673          if(group != NULL)
674            free(group);
675          group = NULL;
676          /* XXX: causes segfaults.  fix mem allocation bug */
677          /*      if(sacl != NULL)
678            free(sacl);*/
679          sacl = NULL;
680          if(dacl != NULL)
681            free(dacl);
682          dacl = NULL;
683          tmp_time_s = NULL;
[32]684        }
[31]685      }
[32]686      else
687      {
688        cur = void_stack_pop(nk_stack);
689        /* XXX: This is just a shallow free.  Need to write deep free
690         * routines to replace the Samba code for this.
691         */ 
[39]692        if(cur != NULL)
693          free(cur);
[32]694      }
[31]695    }
696  }
[30]697}
698
699
[33]700/*
701 * Returns 0 if path was found.
702 * Returns 1 if path was not found.
703 * Returns less than 0 on other error.
704 */
705int retrievePath(REGF_FILE* f, void_stack* nk_stack,
706                 void_stack* path_stack)
707{
708  REGF_NK_REC* sub; 
709  REGF_NK_REC* cur;
710  void_stack* sub_nk_stack;
711  char* prefix;
712  char* cur_str = NULL;
713  bool found_cur = true;
[37]714  uint32 i;
715  uint16 path_depth;
[33]716  if(path_stack == NULL)
717    return -1;
718
719  path_depth = void_stack_size(path_stack);
720  if(path_depth < 1)
721    return -2;
722
723  if(void_stack_size(nk_stack) < 1)
724    return -3;
725  cur = (REGF_NK_REC*)void_stack_cur(nk_stack);
726
727  while(void_stack_size(path_stack) > 1)
728  {
729    /* Search key records only */
730    cur_str = (char*)void_stack_pop(path_stack);
731
732    found_cur = false;
733    while(!found_cur &&
734          (sub = regfio_fetch_subkey(f, cur)) != NULL)
735    {
736      if(strcasecmp(sub->keyname, cur_str) == 0)
737      {
738        cur = sub;
739        void_stack_push(nk_stack, sub);
740        found_cur = true;
741      }
742    }
[39]743    free(cur_str);
[33]744
745    if(!found_cur)
[37]746      return 1;
[33]747  }
748
749  /* Last round, search value and key records */
750  cur_str = (char*)void_stack_pop(path_stack);
751
752  for(i=0; (i < cur->num_values); i++)
753  {
754    if(strcasecmp(sub->values[i].valuename, cur_str) == 0)
755    {
756      printValue(&sub->values[i], stack2Path(nk_stack));
757      return 0;
758    }
759  }
760
761  while((sub = regfio_fetch_subkey(f, cur)) != NULL)
762  {
763    if(strcasecmp(sub->keyname, cur_str) == 0)
764    {
765      sub_nk_stack = void_stack_new(1024);
766      void_stack_push(sub_nk_stack, sub);
767      void_stack_push(nk_stack, sub);
768      prefix = stack2Path(nk_stack);
769      printKeyTree(f, sub_nk_stack, prefix);
770      return 0;
771    }
772  }
773
774  return 1;
775}
776
777
[37]778static void usage(void)
779{
[39]780  fprintf(stderr, "Usage: readreg [-v] [-s]"
[40]781          " [-p <PATH_FILTER>] [-t <TYPE_FILTER>]"
[39]782          " <REGISTRY_FILE>\n");
[37]783  /* XXX: replace version string with Subversion property? */
784  fprintf(stderr, "Version: 0.2\n");
[39]785  fprintf(stderr, "Options:\n");
786  fprintf(stderr, "\t-v\t sets verbose mode.\n");
787  fprintf(stderr, "\t-s\t prints security descriptors.\n");
[40]788  fprintf(stderr, "\t-p\t restrict output to elements below this path.\n");
789  fprintf(stderr, "\t-t\t restrict results to this specific data type.\n");
[37]790  fprintf(stderr, "\n");
791}
792
793
[30]794int main(int argc, char** argv)
795{
[31]796  void_stack* nk_stack;
[33]797  void_stack* path_stack;
[31]798  REGF_FILE* f;
799  REGF_NK_REC* root;
[33]800  int retr_path_ret;
[37]801  uint32 argi;
[31]802
[37]803  /* Process command line arguments */
[30]804  if(argc < 2)
805  {
[37]806    usage();
[38]807    bailOut(1, "ERROR: Requires 1 argument.\n");
[30]808  }
[37]809 
810  for(argi = 1; argi < argc; argi++)
811  {
[40]812    if (strcmp("-p", argv[argi]) == 0)
[37]813    {
814      if(++argi > argc)
815      {
816        usage();
[40]817        bailOut(1, "ERROR: '-p' option requires parameter.\n");
[37]818      }
[40]819      if((path_filter = strdup(argv[argi])) == NULL)
[38]820        bailOut(2, "ERROR: Memory allocation problem.\n");
821
[40]822      path_filter_enabled = true;
[37]823    }
824    else if (strcmp("-t", argv[argi]) == 0)
825    {
826      if(++argi > argc)
827      {
828        usage();
[38]829        bailOut(1, "ERROR: '-t' option requires parameter.\n");
[37]830      }
[41]831      if((type_filter = regfio_type_str2val(argv[argi])) == 0)
[40]832      {
833        fprintf(stderr, "ERROR: Invalid type specified: %s.\n", argv[argi]);
834        bailOut(1, "");
835      }
[38]836
[37]837      type_filter_enabled = true;
838    }
839    else if (strcmp("-s", argv[argi]) == 0)
840      print_security = true;
841    else if (strcmp("-v", argv[argi]) == 0)
842      print_verbose = true;
843    else if (argv[argi][0] == '-')
844    {
[38]845      usage();
[37]846      fprintf(stderr, "ERROR: Unrecognized option: %s\n", argv[argi]);
[38]847      bailOut(1, "");
[37]848    }
849    else
850    {
851      if((registry_file = strdup(argv[argi])) == NULL)
[38]852        bailOut(2, "ERROR: Memory allocation problem.\n");
[37]853    }
854  }
[30]855
[37]856  f = regfio_open(registry_file);
857  if(f == NULL)
858  {
859    fprintf(stderr, "ERROR: Couldn't open registry file: %s\n", registry_file);
[38]860    bailOut(3, "");
[37]861  }
[38]862
[31]863  root = regfio_rootkey(f);
[37]864  nk_stack = void_stack_new(1024);
[30]865
[31]866  if(void_stack_push(nk_stack, root))
[33]867  {
[42]868    if(print_header)
869      printf("PATH,TYPE,VALUE,MTIME,OWNER,GROUP,SACL,DACL\n");
870
[40]871    path_stack = path2Stack(path_filter);
[33]872    if(void_stack_size(path_stack) < 1)
873      printKeyTree(f, nk_stack, "");
874    else
875    {
[37]876      retr_path_ret = retrievePath(f, nk_stack, path_stack);
[33]877      if(retr_path_ret == 1)
[37]878        fprintf(stderr, "WARNING: specified path not found.\n");
[33]879      else if(retr_path_ret != 0)
[38]880        bailOut(4, "ERROR:\n");
[33]881    }
882  }
[37]883  else
[38]884    bailOut(2, "ERROR: Memory allocation problem.\n");
[31]885
[38]886  void_stack_destroy_deep(nk_stack);
[30]887  regfio_close(f);
888
889  return 0;
890}
Note: See TracBrowser for help on using the repository browser.