• Home
  • History
  • Annotate
  • Line#
  • Navigate
  • Raw
  • Download
  • only in /asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/lib/registry/tools/
1/*
2   Unix SMB/CIFS implementation.
3   simple registry frontend
4
5   Copyright (C) Jelmer Vernooij 2004-2007
6
7   This program is free software; you can redistribute it and/or modify
8   it under the terms of the GNU General Public License as published by
9   the Free Software Foundation; either version 3 of the License, or
10   (at your option) any later version.
11
12   This program is distributed in the hope that it will be useful,
13   but WITHOUT ANY WARRANTY; without even the implied warranty of
14   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15   GNU General Public License for more details.
16
17   You should have received a copy of the GNU General Public License
18   along with this program.  If not, see <http://www.gnu.org/licenses/>.
19*/
20
21#include "includes.h"
22#include "lib/registry/registry.h"
23#include "lib/registry/tools/common.h"
24#include "lib/events/events.h"
25#include "lib/cmdline/popt_common.h"
26#include "param/param.h"
27
28/**
29 * Print a registry key recursively
30 *
31 * @param level Level at which to print
32 * @param p Key to print
33 * @param fullpath Whether the full pat hshould be printed or just the last bit
34 * @param novals Whether values should not be printed
35 */
36static void print_tree(int level, struct registry_key *p,
37		       const char *name,
38		       bool fullpath, bool novals)
39{
40	struct registry_key *subkey;
41	const char *valuename, *keyname;
42	uint32_t valuetype;
43	DATA_BLOB valuedata;
44	struct security_descriptor *sec_desc;
45	WERROR error;
46	int i;
47	TALLOC_CTX *mem_ctx;
48
49	for(i = 0; i < level; i++) putchar(' '); puts(name);
50
51	mem_ctx = talloc_init("print_tree");
52	for (i = 0; W_ERROR_IS_OK(error = reg_key_get_subkey_by_index(mem_ctx,
53								      p,
54								      i,
55								      &keyname,
56								      NULL,
57								      NULL)); i++) {
58
59	        SMB_ASSERT(strlen(keyname) > 0);
60		if (!W_ERROR_IS_OK(reg_open_key(mem_ctx, p, keyname, &subkey)))
61		        continue;
62
63		print_tree(level+1, subkey, (fullpath && strlen(name))?
64                                               talloc_asprintf(mem_ctx, "%s\\%s",
65                                                               name, keyname):
66                                               keyname, fullpath, novals);
67		talloc_free(subkey);
68	}
69	talloc_free(mem_ctx);
70
71	if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
72		DEBUG(0, ("Error occured while fetching subkeys for '%s': %s\n",
73				  name, win_errstr(error)));
74	}
75
76	if (!novals) {
77		mem_ctx = talloc_init("print_tree");
78		for(i = 0; W_ERROR_IS_OK(error = reg_key_get_value_by_index(
79			mem_ctx, p, i, &valuename, &valuetype, &valuedata));
80			i++) {
81			int j;
82			for(j = 0; j < level+1; j++) putchar(' ');
83			printf("%s\n",  reg_val_description(mem_ctx,
84				lp_iconv_convenience(cmdline_lp_ctx), valuename,
85				valuetype, valuedata));
86		}
87		talloc_free(mem_ctx);
88
89		if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
90			DEBUG(0, ("Error occured while fetching values for '%s': %s\n",
91				name, win_errstr(error)));
92		}
93	}
94
95	mem_ctx = talloc_init("sec_desc");
96	if (NT_STATUS_IS_ERR(reg_get_sec_desc(mem_ctx, p, &sec_desc))) {
97		DEBUG(0, ("Error getting security descriptor\n"));
98	}
99	talloc_free(mem_ctx);
100}
101
102int main(int argc, char **argv)
103{
104	int opt, i;
105	const char *file = NULL;
106	const char *remote = NULL;
107	poptContext pc;
108	struct registry_context *h = NULL;
109	struct registry_key *start_key = NULL;
110	struct tevent_context *ev_ctx;
111	WERROR error;
112	bool fullpath = false, no_values = false;
113	struct poptOption long_options[] = {
114		POPT_AUTOHELP
115		{"file", 'F', POPT_ARG_STRING, &file, 0, "file path", NULL },
116		{"remote", 'R', POPT_ARG_STRING, &remote, 0, "connect to specified remote server", NULL },
117		{"fullpath", 'f', POPT_ARG_NONE, &fullpath, 0, "show full paths", NULL},
118		{"no-values", 'V', POPT_ARG_NONE, &no_values, 0, "don't show values", NULL},
119		POPT_COMMON_SAMBA
120		POPT_COMMON_CREDENTIALS
121		POPT_COMMON_VERSION
122		{ NULL }
123	};
124
125	pc = poptGetContext(argv[0], argc, (const char **) argv, long_options,0);
126
127	while((opt = poptGetNextOpt(pc)) != -1) {
128	}
129
130	ev_ctx = s4_event_context_init(NULL);
131
132	if (remote != NULL) {
133		h = reg_common_open_remote(remote, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
134	} else if (file != NULL) {
135		start_key = reg_common_open_file(file, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
136	} else {
137		h = reg_common_open_local(cmdline_credentials, ev_ctx, cmdline_lp_ctx);
138	}
139
140	if (h == NULL && start_key == NULL)
141		return 1;
142
143	poptFreeContext(pc);
144
145	error = WERR_OK;
146
147	if (start_key != NULL) {
148		print_tree(0, start_key, "", fullpath, no_values);
149	} else {
150		for(i = 0; reg_predefined_keys[i].handle; i++) {
151			error = reg_get_predefined_key(h,
152						       reg_predefined_keys[i].handle,
153						       &start_key);
154			if (!W_ERROR_IS_OK(error)) {
155				fprintf(stderr, "Skipping %s: %s\n",
156					reg_predefined_keys[i].name,
157					win_errstr(error));
158				continue;
159			}
160			SMB_ASSERT(start_key != NULL);
161			print_tree(0, start_key, reg_predefined_keys[i].name,
162				   fullpath, no_values);
163		}
164	}
165
166	return 0;
167}
168