| 1 | /*
|
|---|
| 2 | * Unix SMB/CIFS implementation.
|
|---|
| 3 | * Virtual Windows Registry Layer
|
|---|
| 4 | * Copyright (C) Gerald Carter 2002-2005
|
|---|
| 5 | * Copyright (C) Michael Adam 2006-2008
|
|---|
| 6 | *
|
|---|
| 7 | * This program is free software; you can redistribute it and/or modify
|
|---|
| 8 | * it under the terms of the GNU General Public License as published by
|
|---|
| 9 | * the Free Software Foundation; either version 3 of the License, or
|
|---|
| 10 | * (at your option) any later version.
|
|---|
| 11 | *
|
|---|
| 12 | * This program is distributed in the hope that it will be useful,
|
|---|
| 13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|---|
| 14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|---|
| 15 | * GNU General Public License for more details.
|
|---|
| 16 | *
|
|---|
| 17 | * You should have received a copy of the GNU General Public License
|
|---|
| 18 | * along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|---|
| 19 | */
|
|---|
| 20 |
|
|---|
| 21 | /*
|
|---|
| 22 | * Implementation of registry frontend view functions.
|
|---|
| 23 | * Functions moved from reg_frontend.c to minimize linker deps.
|
|---|
| 24 | */
|
|---|
| 25 |
|
|---|
| 26 | #include "includes.h"
|
|---|
| 27 |
|
|---|
| 28 | #undef DBGC_CLASS
|
|---|
| 29 | #define DBGC_CLASS DBGC_REGISTRY
|
|---|
| 30 |
|
|---|
| 31 | static const struct generic_mapping reg_generic_map =
|
|---|
| 32 | { REG_KEY_READ, REG_KEY_WRITE, REG_KEY_EXECUTE, REG_KEY_ALL };
|
|---|
| 33 |
|
|---|
| 34 | /********************************************************************
|
|---|
| 35 | ********************************************************************/
|
|---|
| 36 |
|
|---|
| 37 | static WERROR construct_registry_sd(TALLOC_CTX *ctx, SEC_DESC **psd)
|
|---|
| 38 | {
|
|---|
| 39 | SEC_ACE ace[3];
|
|---|
| 40 | size_t i = 0;
|
|---|
| 41 | SEC_DESC *sd;
|
|---|
| 42 | SEC_ACL *theacl;
|
|---|
| 43 | size_t sd_size;
|
|---|
| 44 |
|
|---|
| 45 | /* basic access for Everyone */
|
|---|
| 46 |
|
|---|
| 47 | init_sec_ace(&ace[i++], &global_sid_World, SEC_ACE_TYPE_ACCESS_ALLOWED,
|
|---|
| 48 | REG_KEY_READ, 0);
|
|---|
| 49 |
|
|---|
| 50 | /* Full Access 'BUILTIN\Administrators' */
|
|---|
| 51 |
|
|---|
| 52 | init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
|
|---|
| 53 | SEC_ACE_TYPE_ACCESS_ALLOWED, REG_KEY_ALL, 0);
|
|---|
| 54 |
|
|---|
| 55 | /* Full Access 'NT Authority\System' */
|
|---|
| 56 |
|
|---|
| 57 | init_sec_ace(&ace[i++], &global_sid_System, SEC_ACE_TYPE_ACCESS_ALLOWED,
|
|---|
| 58 | REG_KEY_ALL, 0);
|
|---|
| 59 |
|
|---|
| 60 | /* create the security descriptor */
|
|---|
| 61 |
|
|---|
| 62 | theacl = make_sec_acl(ctx, NT4_ACL_REVISION, i, ace);
|
|---|
| 63 | if (theacl == NULL) {
|
|---|
| 64 | return WERR_NOMEM;
|
|---|
| 65 | }
|
|---|
| 66 |
|
|---|
| 67 | sd = make_sec_desc(ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE,
|
|---|
| 68 | &global_sid_Builtin_Administrators,
|
|---|
| 69 | &global_sid_System, NULL, theacl,
|
|---|
| 70 | &sd_size);
|
|---|
| 71 | if (sd == NULL) {
|
|---|
| 72 | return WERR_NOMEM;
|
|---|
| 73 | }
|
|---|
| 74 |
|
|---|
| 75 | *psd = sd;
|
|---|
| 76 | return WERR_OK;
|
|---|
| 77 | }
|
|---|
| 78 |
|
|---|
| 79 | /***********************************************************************
|
|---|
| 80 | High level wrapper function for storing registry subkeys
|
|---|
| 81 | ***********************************************************************/
|
|---|
| 82 |
|
|---|
| 83 | bool store_reg_keys(struct registry_key_handle *key,
|
|---|
| 84 | struct regsubkey_ctr *subkeys)
|
|---|
| 85 | {
|
|---|
| 86 | if (key->ops && key->ops->store_subkeys)
|
|---|
| 87 | return key->ops->store_subkeys(key->name, subkeys);
|
|---|
| 88 |
|
|---|
| 89 | return false;
|
|---|
| 90 | }
|
|---|
| 91 |
|
|---|
| 92 | /***********************************************************************
|
|---|
| 93 | High level wrapper function for storing registry values
|
|---|
| 94 | ***********************************************************************/
|
|---|
| 95 |
|
|---|
| 96 | bool store_reg_values(struct registry_key_handle *key, struct regval_ctr *val)
|
|---|
| 97 | {
|
|---|
| 98 | if (key->ops && key->ops->store_values)
|
|---|
| 99 | return key->ops->store_values(key->name, val);
|
|---|
| 100 |
|
|---|
| 101 | return false;
|
|---|
| 102 | }
|
|---|
| 103 |
|
|---|
| 104 | WERROR create_reg_subkey(struct registry_key_handle *key, const char *subkey)
|
|---|
| 105 | {
|
|---|
| 106 | if (key->ops && key->ops->create_subkey) {
|
|---|
| 107 | return key->ops->create_subkey(key->name, subkey);
|
|---|
| 108 | }
|
|---|
| 109 |
|
|---|
| 110 | return WERR_NOT_SUPPORTED;
|
|---|
| 111 | }
|
|---|
| 112 |
|
|---|
| 113 | WERROR delete_reg_subkey(struct registry_key_handle *key, const char *subkey)
|
|---|
| 114 | {
|
|---|
| 115 | if (key->ops && key->ops->delete_subkey) {
|
|---|
| 116 | return key->ops->delete_subkey(key->name, subkey);
|
|---|
| 117 | }
|
|---|
| 118 |
|
|---|
| 119 | return WERR_NOT_SUPPORTED;
|
|---|
| 120 | }
|
|---|
| 121 |
|
|---|
| 122 | /***********************************************************************
|
|---|
| 123 | High level wrapper function for enumerating registry subkeys
|
|---|
| 124 | Initialize the TALLOC_CTX if necessary
|
|---|
| 125 | ***********************************************************************/
|
|---|
| 126 |
|
|---|
| 127 | int fetch_reg_keys(struct registry_key_handle *key,
|
|---|
| 128 | struct regsubkey_ctr *subkey_ctr)
|
|---|
| 129 | {
|
|---|
| 130 | int result = -1;
|
|---|
| 131 |
|
|---|
| 132 | if (key->ops && key->ops->fetch_subkeys)
|
|---|
| 133 | result = key->ops->fetch_subkeys(key->name, subkey_ctr);
|
|---|
| 134 |
|
|---|
| 135 | return result;
|
|---|
| 136 | }
|
|---|
| 137 |
|
|---|
| 138 | /***********************************************************************
|
|---|
| 139 | High level wrapper function for enumerating registry values
|
|---|
| 140 | ***********************************************************************/
|
|---|
| 141 |
|
|---|
| 142 | int fetch_reg_values(struct registry_key_handle *key, struct regval_ctr *val)
|
|---|
| 143 | {
|
|---|
| 144 | int result = -1;
|
|---|
| 145 |
|
|---|
| 146 | DEBUG(10, ("fetch_reg_values called for key '%s' (ops %p)\n", key->name,
|
|---|
| 147 | (key->ops) ? (void *)key->ops : NULL));
|
|---|
| 148 |
|
|---|
| 149 | if (key->ops && key->ops->fetch_values)
|
|---|
| 150 | result = key->ops->fetch_values(key->name, val);
|
|---|
| 151 |
|
|---|
| 152 | return result;
|
|---|
| 153 | }
|
|---|
| 154 |
|
|---|
| 155 | /***********************************************************************
|
|---|
| 156 | High level access check for passing the required access mask to the
|
|---|
| 157 | underlying registry backend
|
|---|
| 158 | ***********************************************************************/
|
|---|
| 159 |
|
|---|
| 160 | bool regkey_access_check(struct registry_key_handle *key, uint32 requested,
|
|---|
| 161 | uint32 *granted,
|
|---|
| 162 | const struct nt_user_token *token )
|
|---|
| 163 | {
|
|---|
| 164 | SEC_DESC *sec_desc;
|
|---|
| 165 | NTSTATUS status;
|
|---|
| 166 | WERROR err;
|
|---|
| 167 |
|
|---|
| 168 | /* use the default security check if the backend has not defined its
|
|---|
| 169 | * own */
|
|---|
| 170 |
|
|---|
| 171 | if (key->ops && key->ops->reg_access_check) {
|
|---|
| 172 | return key->ops->reg_access_check(key->name, requested,
|
|---|
| 173 | granted, token);
|
|---|
| 174 | }
|
|---|
| 175 |
|
|---|
| 176 | err = regkey_get_secdesc(talloc_tos(), key, &sec_desc);
|
|---|
| 177 |
|
|---|
| 178 | if (!W_ERROR_IS_OK(err)) {
|
|---|
| 179 | return false;
|
|---|
| 180 | }
|
|---|
| 181 |
|
|---|
| 182 | se_map_generic( &requested, ®_generic_map );
|
|---|
| 183 |
|
|---|
| 184 | status =se_access_check(sec_desc, token, requested, granted);
|
|---|
| 185 | TALLOC_FREE(sec_desc);
|
|---|
| 186 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 187 | return false;
|
|---|
| 188 | }
|
|---|
| 189 |
|
|---|
| 190 | return NT_STATUS_IS_OK(status);
|
|---|
| 191 | }
|
|---|
| 192 |
|
|---|
| 193 | WERROR regkey_get_secdesc(TALLOC_CTX *mem_ctx, struct registry_key_handle *key,
|
|---|
| 194 | struct security_descriptor **psecdesc)
|
|---|
| 195 | {
|
|---|
| 196 | struct security_descriptor *secdesc;
|
|---|
| 197 | WERROR werr;
|
|---|
| 198 |
|
|---|
| 199 | if (key->ops && key->ops->get_secdesc) {
|
|---|
| 200 | werr = key->ops->get_secdesc(mem_ctx, key->name, psecdesc);
|
|---|
| 201 | if (W_ERROR_IS_OK(werr)) {
|
|---|
| 202 | return WERR_OK;
|
|---|
| 203 | }
|
|---|
| 204 | }
|
|---|
| 205 |
|
|---|
| 206 | werr = construct_registry_sd(mem_ctx, &secdesc);
|
|---|
| 207 | if (!W_ERROR_IS_OK(werr)) {
|
|---|
| 208 | return werr;
|
|---|
| 209 | }
|
|---|
| 210 |
|
|---|
| 211 | *psecdesc = secdesc;
|
|---|
| 212 | return WERR_OK;
|
|---|
| 213 | }
|
|---|
| 214 |
|
|---|
| 215 | WERROR regkey_set_secdesc(struct registry_key_handle *key,
|
|---|
| 216 | struct security_descriptor *psecdesc)
|
|---|
| 217 | {
|
|---|
| 218 | if (key->ops && key->ops->set_secdesc) {
|
|---|
| 219 | return key->ops->set_secdesc(key->name, psecdesc);
|
|---|
| 220 | }
|
|---|
| 221 |
|
|---|
| 222 | return WERR_ACCESS_DENIED;
|
|---|
| 223 | }
|
|---|
| 224 |
|
|---|
| 225 | /**
|
|---|
| 226 | * Check whether the in-memory version of the subkyes of a
|
|---|
| 227 | * registry key needs update from disk.
|
|---|
| 228 | */
|
|---|
| 229 | bool reg_subkeys_need_update(struct registry_key_handle *key,
|
|---|
| 230 | struct regsubkey_ctr *subkeys)
|
|---|
| 231 | {
|
|---|
| 232 | if (key->ops && key->ops->subkeys_need_update)
|
|---|
| 233 | {
|
|---|
| 234 | return key->ops->subkeys_need_update(subkeys);
|
|---|
| 235 | }
|
|---|
| 236 |
|
|---|
| 237 | return false;
|
|---|
| 238 | }
|
|---|
| 239 |
|
|---|
| 240 | /**
|
|---|
| 241 | * Check whether the in-memory version of the values of a
|
|---|
| 242 | * registry key needs update from disk.
|
|---|
| 243 | */
|
|---|
| 244 | bool reg_values_need_update(struct registry_key_handle *key,
|
|---|
| 245 | struct regval_ctr *values)
|
|---|
| 246 | {
|
|---|
| 247 | if (key->ops && key->ops->values_need_update)
|
|---|
| 248 | {
|
|---|
| 249 | return key->ops->values_need_update(values);
|
|---|
| 250 | }
|
|---|
| 251 |
|
|---|
| 252 | return false;
|
|---|
| 253 | }
|
|---|
| 254 |
|
|---|