1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
|
// SPDX-License-Identifier: GPL-3.0-or-later
#include "../libnetdata.h"
#if defined(OS_WINDOWS)
long netdata_registry_get_dword_from_open_key(unsigned int *out, void *lKey, char *name)
{
DWORD length = 260;
return RegQueryValueEx(lKey, name, NULL, NULL, (LPBYTE) out, &length);
}
bool netdata_registry_get_dword(unsigned int *out, void *hKey, char *subKey, char *name)
{
HKEY lKey;
bool status = true;
long ret = RegOpenKeyEx(hKey,
subKey,
0,
KEY_READ,
&lKey);
if (ret != ERROR_SUCCESS)
return false;
ret = netdata_registry_get_dword_from_open_key(out, lKey, name);
if (ret != ERROR_SUCCESS)
status = false;
RegCloseKey(lKey);
return status;
}
long netdata_registry_get_string_from_open_key(char *out, unsigned int length, void *lKey, char *name)
{
return RegQueryValueEx(lKey, name, NULL, NULL, (LPBYTE) out, &length);
}
bool netdata_registry_get_string(char *out, unsigned int length, void *hKey, char *subKey, char *name)
{
HKEY lKey;
bool status = true;
long ret = RegOpenKeyEx(hKey,
subKey,
0,
KEY_READ,
&lKey);
if (ret != ERROR_SUCCESS)
return false;
ret = netdata_registry_get_string_from_open_key(out, length, lKey, name);
if (ret != ERROR_SUCCESS)
status = false;
RegCloseKey(lKey);
return status;
}
bool EnableWindowsPrivilege(const char *privilegeName) {
HANDLE hToken;
LUID luid;
TOKEN_PRIVILEGES tkp;
// Open the process token with appropriate access rights
if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken))
return false;
// Lookup the LUID for the specified privilege
if (!LookupPrivilegeValue(NULL, privilegeName, &luid)) {
CloseHandle(hToken); // Close the token handle before returning
return false;
}
// Set up the TOKEN_PRIVILEGES structure
tkp.PrivilegeCount = 1;
tkp.Privileges[0].Luid = luid;
tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
// Adjust the token's privileges
if (!AdjustTokenPrivileges(hToken, FALSE, &tkp, sizeof(tkp), NULL, NULL)) {
CloseHandle(hToken); // Close the token handle before returning
return false;
}
// Check if AdjustTokenPrivileges succeeded
if (GetLastError() == ERROR_NOT_ALL_ASSIGNED) {
CloseHandle(hToken); // Close the token handle before returning
return false;
}
// Close the handle to the token after success
CloseHandle(hToken);
return true;
}
#endif
|