/* Unix SMB/CIFS implementation. simple registry frontend Copyright (C) Jelmer Vernooij 2004-2007 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "includes.h" #include "lib/registry/registry.h" #include "lib/registry/tools/common.h" #include "lib/events/events.h" #include "lib/cmdline/cmdline.h" #include "param/param.h" /** * Print a registry key recursively * * @param level Level at which to print * @param p Key to print * @param fullpath Whether the full pat hshould be printed or just the last bit * @param novals Whether values should not be printed */ static void print_tree(unsigned int level, struct registry_key *p, const char *name, bool fullpath, bool novals) { struct registry_key *subkey; const char *valuename, *keyname; uint32_t valuetype; DATA_BLOB valuedata; struct security_descriptor *sec_desc; WERROR error; unsigned int i; TALLOC_CTX *mem_ctx; for(i = 0; i < level; i++) putchar(' '); puts(name); mem_ctx = talloc_init("print_tree"); for (i = 0; W_ERROR_IS_OK(error = reg_key_get_subkey_by_index(mem_ctx, p, i, &keyname, NULL, NULL)); i++) { SMB_ASSERT(strlen(keyname) > 0); if (!W_ERROR_IS_OK(reg_open_key(mem_ctx, p, keyname, &subkey))) continue; print_tree(level+1, subkey, (fullpath && strlen(name))? talloc_asprintf(mem_ctx, "%s\\%s", name, keyname): keyname, fullpath, novals); talloc_free(subkey); } talloc_free(mem_ctx); if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) { DEBUG(0, ("Error occurred while fetching subkeys for '%s': %s\n", name, win_errstr(error))); } if (!novals) { mem_ctx = talloc_init("print_tree"); for(i = 0; W_ERROR_IS_OK(error = reg_key_get_value_by_index( mem_ctx, p, i, &valuename, &valuetype, &valuedata)); i++) { unsigned int j; for(j = 0; j < level+1; j++) putchar(' '); printf("%s\n", reg_val_description(mem_ctx, valuename, valuetype, valuedata)); } talloc_free(mem_ctx); if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) { DEBUG(0, ("Error occurred while fetching values for '%s': %s\n", name, win_errstr(error))); } } mem_ctx = talloc_init("sec_desc"); if (!W_ERROR_IS_OK(reg_get_sec_desc(mem_ctx, p, &sec_desc))) { DEBUG(0, ("Error getting security descriptor\n")); } talloc_free(mem_ctx); } int main(int argc, char **argv) { const char **argv_const = discard_const_p(const char *, argv); bool ok; TALLOC_CTX *mem_ctx = NULL; int opt; unsigned int i; const char *file = NULL; const char *remote = NULL; poptContext pc; struct registry_context *h = NULL; struct registry_key *start_key = NULL; struct tevent_context *ev_ctx; struct loadparm_context *lp_ctx = NULL; struct cli_credentials *creds = NULL; WERROR error; bool fullpath = false, no_values = false; struct poptOption long_options[] = { POPT_AUTOHELP {"file", 'F', POPT_ARG_STRING, &file, 0, "file path", NULL }, {"remote", 'R', POPT_ARG_STRING, &remote, 0, "connect to specified remote server", NULL }, {"fullpath", 'f', POPT_ARG_NONE, &fullpath, 0, "show full paths", NULL}, {"no-values", 'V', POPT_ARG_NONE, &no_values, 0, "don't show values", NULL}, POPT_COMMON_SAMBA POPT_COMMON_CREDENTIALS POPT_COMMON_VERSION POPT_TABLEEND }; mem_ctx = talloc_init("regtree.c/main"); if (mem_ctx == NULL) { exit(ENOMEM); } ok = samba_cmdline_init(mem_ctx, SAMBA_CMDLINE_CONFIG_CLIENT, false /* require_smbconf */); if (!ok) { DBG_ERR("Failed to init cmdline parser!\n"); TALLOC_FREE(mem_ctx); exit(1); } pc = samba_popt_get_context(getprogname(), argc, argv_const, long_options, 0); if (pc == NULL) { DBG_ERR("Failed to setup popt context!\n"); TALLOC_FREE(mem_ctx); exit(1); } while((opt = poptGetNextOpt(pc)) != -1) { switch (opt) { case POPT_ERROR_BADOPT: fprintf(stderr, "\nInvalid option %s: %s\n\n", poptBadOption(pc, 0), poptStrerror(opt)); poptPrintUsage(pc, stderr, 0); exit(1); } } poptFreeContext(pc); samba_cmdline_burn(argc, argv); ev_ctx = s4_event_context_init(NULL); lp_ctx = samba_cmdline_get_lp_ctx(); creds = samba_cmdline_get_creds(); if (remote != NULL) { h = reg_common_open_remote(remote, ev_ctx, lp_ctx, creds); } else if (file != NULL) { start_key = reg_common_open_file(file, ev_ctx, lp_ctx, creds); } else { h = reg_common_open_local(creds, ev_ctx, lp_ctx); } if (h == NULL && start_key == NULL) { TALLOC_FREE(mem_ctx); return 1; } error = WERR_OK; if (start_key != NULL) { print_tree(0, start_key, "", fullpath, no_values); } else { for(i = 0; reg_predefined_keys[i].handle; i++) { error = reg_get_predefined_key(h, reg_predefined_keys[i].handle, &start_key); if (!W_ERROR_IS_OK(error)) { fprintf(stderr, "Skipping %s: %s\n", reg_predefined_keys[i].name, win_errstr(error)); continue; } SMB_ASSERT(start_key != NULL); print_tree(0, start_key, reg_predefined_keys[i].name, fullpath, no_values); } } TALLOC_FREE(mem_ctx); return 0; }