| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "sandbox/src/restricted_token.h" | |
| 6 #include "sandbox/src/restricted_token_utils.h" | |
| 7 #include "sandbox/tools/finder/finder.h" | |
| 8 | |
| 9 DWORD Finder::ParseRegistry(HKEY key, ATL::CString print_name) { | |
| 10 DWORD index = 0; | |
| 11 DWORD name_size = 2048; | |
| 12 wchar_t buffer[2048] = {0}; | |
| 13 // TODO(nsylvain): Don't hardcode 2048. Get the key len by calling the | |
| 14 // function. | |
| 15 LONG err_code = ::RegEnumKey(key, index, buffer, name_size); | |
| 16 while (ERROR_SUCCESS == err_code) { | |
| 17 ATL::CString name_complete = print_name + buffer + L"\\"; | |
| 18 TestRegAccess(key, buffer, name_complete); | |
| 19 | |
| 20 // Call the function recursively to parse all subkeys | |
| 21 HKEY key_to_parse; | |
| 22 err_code = ::RegOpenKeyEx(key, buffer, 0, KEY_ENUMERATE_SUB_KEYS, | |
| 23 &key_to_parse); | |
| 24 if (ERROR_SUCCESS == err_code) { | |
| 25 ParseRegistry(key_to_parse, name_complete); | |
| 26 ::RegCloseKey(key_to_parse); | |
| 27 } else { | |
| 28 registry_stats_[BROKEN]++; | |
| 29 Output(REG_ERR, err_code, name_complete); | |
| 30 } | |
| 31 | |
| 32 index++; | |
| 33 err_code = ::RegEnumKey(key, index, buffer, name_size); | |
| 34 } | |
| 35 | |
| 36 if (ERROR_NO_MORE_ITEMS != err_code) { | |
| 37 registry_stats_[BROKEN]++; | |
| 38 Output(REG_ERR, err_code, print_name); | |
| 39 } | |
| 40 | |
| 41 return ERROR_SUCCESS; | |
| 42 } | |
| 43 | |
| 44 DWORD Finder::TestRegAccess(HKEY key, ATL::CString name, | |
| 45 ATL::CString print_name) { | |
| 46 Impersonater impersonate(token_handle_); | |
| 47 | |
| 48 registry_stats_[PARSE]++; | |
| 49 | |
| 50 HKEY key_res; | |
| 51 LONG err_code = 0; | |
| 52 | |
| 53 if (access_type_ & kTestForAll) { | |
| 54 err_code = ::RegOpenKeyEx(key, name, 0, GENERIC_ALL, &key_res); | |
| 55 if (ERROR_SUCCESS == err_code) { | |
| 56 registry_stats_[ALL]++; | |
| 57 Output(REG, L"R/W", print_name); | |
| 58 ::RegCloseKey(key_res); | |
| 59 return GENERIC_ALL; | |
| 60 } else if (err_code != ERROR_ACCESS_DENIED) { | |
| 61 Output(REG_ERR, err_code, print_name); | |
| 62 registry_stats_[BROKEN]++; | |
| 63 } | |
| 64 } | |
| 65 | |
| 66 if (access_type_ & kTestForWrite) { | |
| 67 err_code = ::RegOpenKeyEx(key, name, 0, GENERIC_WRITE, &key_res); | |
| 68 if (ERROR_SUCCESS == err_code) { | |
| 69 registry_stats_[WRITE]++; | |
| 70 Output(REG, L"W", print_name); | |
| 71 ::RegCloseKey(key_res); | |
| 72 return GENERIC_WRITE; | |
| 73 } else if (err_code != ERROR_ACCESS_DENIED) { | |
| 74 Output(REG_ERR, err_code, print_name); | |
| 75 registry_stats_[BROKEN]++; | |
| 76 } | |
| 77 } | |
| 78 | |
| 79 if (access_type_ & kTestForRead) { | |
| 80 err_code = ::RegOpenKeyEx(key, name, 0, GENERIC_READ, &key_res); | |
| 81 if (ERROR_SUCCESS == err_code) { | |
| 82 registry_stats_[READ]++; | |
| 83 Output(REG, L"R", print_name); | |
| 84 ::RegCloseKey(key_res); | |
| 85 return GENERIC_READ; | |
| 86 } else if (err_code != ERROR_ACCESS_DENIED) { | |
| 87 Output(REG_ERR, err_code, print_name); | |
| 88 registry_stats_[BROKEN]++; | |
| 89 } | |
| 90 } | |
| 91 | |
| 92 return 0; | |
| 93 } | |
| OLD | NEW |