1/* 2 Unix SMB/CIFS implementation. 3 simple registry frontend 4 5 Copyright (C) Jelmer Vernooij 2004-2007 6 7 This program is free software; you can redistribute it and/or modify 8 it under the terms of the GNU General Public License as published by 9 the Free Software Foundation; either version 3 of the License, or 10 (at your option) any later version. 11 12 This program is distributed in the hope that it will be useful, 13 but WITHOUT ANY WARRANTY; without even the implied warranty of 14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 15 GNU General Public License for more details. 16 17 You should have received a copy of the GNU General Public License 18 along with this program. If not, see <http://www.gnu.org/licenses/>. 19*/ 20 21#include "includes.h" 22#include "lib/registry/registry.h" 23#include "lib/registry/tools/common.h" 24#include "lib/events/events.h" 25#include "lib/cmdline/popt_common.h" 26#include "param/param.h" 27 28/** 29 * Print a registry key recursively 30 * 31 * @param level Level at which to print 32 * @param p Key to print 33 * @param fullpath Whether the full pat hshould be printed or just the last bit 34 * @param novals Whether values should not be printed 35 */ 36static void print_tree(int level, struct registry_key *p, 37 const char *name, 38 bool fullpath, bool novals) 39{ 40 struct registry_key *subkey; 41 const char *valuename, *keyname; 42 uint32_t valuetype; 43 DATA_BLOB valuedata; 44 struct security_descriptor *sec_desc; 45 WERROR error; 46 int i; 47 TALLOC_CTX *mem_ctx; 48 49 for(i = 0; i < level; i++) putchar(' '); puts(name); 50 51 mem_ctx = talloc_init("print_tree"); 52 for (i = 0; W_ERROR_IS_OK(error = reg_key_get_subkey_by_index(mem_ctx, 53 p, 54 i, 55 &keyname, 56 NULL, 57 NULL)); i++) { 58 59 SMB_ASSERT(strlen(keyname) > 0); 60 if (!W_ERROR_IS_OK(reg_open_key(mem_ctx, p, keyname, &subkey))) 61 continue; 62 63 print_tree(level+1, subkey, (fullpath && strlen(name))? 64 talloc_asprintf(mem_ctx, "%s\\%s", 65 name, keyname): 66 keyname, fullpath, novals); 67 talloc_free(subkey); 68 } 69 talloc_free(mem_ctx); 70 71 if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) { 72 DEBUG(0, ("Error occured while fetching subkeys for '%s': %s\n", 73 name, win_errstr(error))); 74 } 75 76 if (!novals) { 77 mem_ctx = talloc_init("print_tree"); 78 for(i = 0; W_ERROR_IS_OK(error = reg_key_get_value_by_index( 79 mem_ctx, p, i, &valuename, &valuetype, &valuedata)); 80 i++) { 81 int j; 82 for(j = 0; j < level+1; j++) putchar(' '); 83 printf("%s\n", reg_val_description(mem_ctx, 84 lp_iconv_convenience(cmdline_lp_ctx), valuename, 85 valuetype, valuedata)); 86 } 87 talloc_free(mem_ctx); 88 89 if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) { 90 DEBUG(0, ("Error occured while fetching values for '%s': %s\n", 91 name, win_errstr(error))); 92 } 93 } 94 95 mem_ctx = talloc_init("sec_desc"); 96 if (NT_STATUS_IS_ERR(reg_get_sec_desc(mem_ctx, p, &sec_desc))) { 97 DEBUG(0, ("Error getting security descriptor\n")); 98 } 99 talloc_free(mem_ctx); 100} 101 102int main(int argc, char **argv) 103{ 104 int opt, i; 105 const char *file = NULL; 106 const char *remote = NULL; 107 poptContext pc; 108 struct registry_context *h = NULL; 109 struct registry_key *start_key = NULL; 110 struct tevent_context *ev_ctx; 111 WERROR error; 112 bool fullpath = false, no_values = false; 113 struct poptOption long_options[] = { 114 POPT_AUTOHELP 115 {"file", 'F', POPT_ARG_STRING, &file, 0, "file path", NULL }, 116 {"remote", 'R', POPT_ARG_STRING, &remote, 0, "connect to specified remote server", NULL }, 117 {"fullpath", 'f', POPT_ARG_NONE, &fullpath, 0, "show full paths", NULL}, 118 {"no-values", 'V', POPT_ARG_NONE, &no_values, 0, "don't show values", NULL}, 119 POPT_COMMON_SAMBA 120 POPT_COMMON_CREDENTIALS 121 POPT_COMMON_VERSION 122 { NULL } 123 }; 124 125 pc = poptGetContext(argv[0], argc, (const char **) argv, long_options,0); 126 127 while((opt = poptGetNextOpt(pc)) != -1) { 128 } 129 130 ev_ctx = s4_event_context_init(NULL); 131 132 if (remote != NULL) { 133 h = reg_common_open_remote(remote, ev_ctx, cmdline_lp_ctx, cmdline_credentials); 134 } else if (file != NULL) { 135 start_key = reg_common_open_file(file, ev_ctx, cmdline_lp_ctx, cmdline_credentials); 136 } else { 137 h = reg_common_open_local(cmdline_credentials, ev_ctx, cmdline_lp_ctx); 138 } 139 140 if (h == NULL && start_key == NULL) 141 return 1; 142 143 poptFreeContext(pc); 144 145 error = WERR_OK; 146 147 if (start_key != NULL) { 148 print_tree(0, start_key, "", fullpath, no_values); 149 } else { 150 for(i = 0; reg_predefined_keys[i].handle; i++) { 151 error = reg_get_predefined_key(h, 152 reg_predefined_keys[i].handle, 153 &start_key); 154 if (!W_ERROR_IS_OK(error)) { 155 fprintf(stderr, "Skipping %s: %s\n", 156 reg_predefined_keys[i].name, 157 win_errstr(error)); 158 continue; 159 } 160 SMB_ASSERT(start_key != NULL); 161 print_tree(0, start_key, reg_predefined_keys[i].name, 162 fullpath, no_values); 163 } 164 } 165 166 return 0; 167} 168