Index: chrome/browser/policy/preg_parser_win.cc |
diff --git a/chrome/browser/policy/preg_parser_win.cc b/chrome/browser/policy/preg_parser_win.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..fbf5b1877038eee7d15416367f2467fa1203d9f3 |
--- /dev/null |
+++ b/chrome/browser/policy/preg_parser_win.cc |
@@ -0,0 +1,302 @@ |
+// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/policy/preg_parser_win.h" |
+ |
+#include <algorithm> |
+#include <iterator> |
+ |
+#include <windows.h> |
+ |
+#include "base/basictypes.h" |
+#include "base/files/file_path.h" |
+#include "base/files/memory_mapped_file.h" |
+#include "base/logging.h" |
+#include "base/stl_util.h" |
+#include "base/string16.h" |
+#include "base/string_util.h" |
+#include "base/sys_byteorder.h" |
+#include "base/utf_string_conversions.h" |
+#include "base/values.h" |
+ |
+namespace policy { |
+namespace preg_parser { |
+ |
+// The magic header in PReg files: ASCII "PReg" + version (0x0001). |
+const char kPolicyRegistryFileHeader[] = "PReg\x01\x00\x00\x00"; |
+ |
+// Maximum PReg file size we're willing to accept. |
+const int64 kMaxPRegFileSize = 1024 * 1024 * 16; |
+ |
+// Constants for PReg file delimiters. |
+const char16 kDelimBracketOpen = L'['; |
+const char16 kDelimBracketClose = L']'; |
+const char16 kDelimSemicolon = L';'; |
+ |
+// Registry path separator. |
+const char16 kRegistryPathSeparator[] = L"\\"; |
+ |
+// Magic strings for the PReg value field to trigger special actions. |
+const char kActionTriggerPrefix[] = "**"; |
+const char kActionTriggerDeleteValues[] = "deletevalues"; |
+const char kActionTriggerDel[] = "del."; |
+const char kActionTriggerDelVals[] = "delvals"; |
+const char kActionTriggerDeleteKeys[] = "deletekeys"; |
+const char kActionTriggerSecureKey[] = "securekey"; |
+const char kActionTriggerSoft[] = "soft"; |
+ |
+// Returns the character at |cursor| and increments it, unless the end is here |
+// in which case -1 is returned. |
+int NextChar(const uint8** cursor, const uint8* end) { |
+ // Only read the character if a full char16 is available. |
+ if (*cursor + sizeof(char16) > end) |
+ return -1; |
+ |
+ int result = **cursor | (*(*cursor + 1) << 8); |
+ *cursor += sizeof(char16); |
+ return result; |
+} |
+ |
+// Reads a fixed-size field from a PReg file. |
+bool ReadFieldBinary(const uint8** cursor, |
+ const uint8* end, |
+ int size, |
+ uint8* data) { |
+ const uint8* field_end = *cursor + size; |
+ if (field_end > end) |
+ return false; |
+ std::copy(*cursor, field_end, data); |
+ *cursor = field_end; |
+ return true; |
+} |
+ |
+bool ReadField32(const uint8** cursor, const uint8* end, uint32* data) { |
+ uint32 value = 0; |
+ if (!ReadFieldBinary(cursor, end, sizeof(uint32), |
+ reinterpret_cast<uint8*>(&value))) { |
+ return false; |
+ } |
+ *data = base::ByteSwapToLE32(value); |
+ return true; |
+} |
+ |
+// Reads a string field from a file. |
+bool ReadFieldString(const uint8** cursor, const uint8* end, string16* str) { |
+ int current = -1; |
+ while ((current = NextChar(cursor, end)) > 0x0000) |
+ *str += current; |
+ |
+ return current == L'\0'; |
+} |
+ |
+std::string DecodePRegStringValue(const std::vector<uint8>& data) { |
+ size_t len = data.size() / sizeof(char16); |
+ if (len <= 0) |
+ return std::string(); |
+ |
+ const char16* chars = reinterpret_cast<const char16*>(vector_as_array(&data)); |
+ string16 result; |
+ std::transform(chars, chars + len - 1, std::back_inserter(result), |
+ std::ptr_fun(base::ByteSwapToLE16)); |
+ return UTF16ToUTF8(result); |
+} |
+ |
+// Decodes a value from a PReg file given as a uint8 vector. |
+bool DecodePRegValue(uint32 type, |
+ const std::vector<uint8>& data, |
+ scoped_ptr<base::Value>* value) { |
+ switch (type) { |
+ case REG_SZ: |
+ case REG_EXPAND_SZ: |
+ value->reset(base::Value::CreateStringValue(DecodePRegStringValue(data))); |
+ return true; |
+ case REG_DWORD_LITTLE_ENDIAN: |
+ case REG_DWORD_BIG_ENDIAN: |
+ if (data.size() == sizeof(uint32)) { |
+ uint32 val = *reinterpret_cast<const uint32*>(vector_as_array(&data)); |
+ if (type == REG_DWORD_BIG_ENDIAN) |
+ val = base::NetToHost32(val); |
+ else |
+ val = base::ByteSwapToLE32(val); |
+ value->reset(base::Value::CreateIntegerValue(static_cast<int>(val))); |
+ return true; |
+ } else { |
+ LOG(ERROR) << "Bad data size " << data.size(); |
+ } |
+ break; |
+ case REG_NONE: |
+ case REG_LINK: |
+ case REG_MULTI_SZ: |
+ case REG_RESOURCE_LIST: |
+ case REG_FULL_RESOURCE_DESCRIPTOR: |
+ case REG_RESOURCE_REQUIREMENTS_LIST: |
+ case REG_QWORD_LITTLE_ENDIAN: |
+ default: |
+ LOG(ERROR) << "Unsupported registry data type " << type; |
+ } |
+ |
+ return false; |
+} |
+ |
+// Adds the record data passed via parameters to |dict| in case the data is |
+// relevant policy for Chromium. |
+void HandleRecord(const string16& key_name, |
+ const string16& value, |
+ uint32 type, |
+ const std::vector<uint8>& data, |
+ base::DictionaryValue* dict) { |
+ // Locate/create the dictionary to place the value in. |
+ std::vector<string16> path; |
+ |
+ Tokenize(key_name, kRegistryPathSeparator, &path); |
+ for (std::vector<string16>::const_iterator entry(path.begin()); |
+ entry != path.end(); ++entry) { |
+ if (entry->empty()) |
+ continue; |
+ base::DictionaryValue* subdict = NULL; |
+ const std::string name = UTF16ToUTF8(*entry); |
+ if (!dict->GetDictionaryWithoutPathExpansion(name, &subdict) || |
+ !subdict) { |
+ subdict = new DictionaryValue(); |
+ dict->SetWithoutPathExpansion(name, subdict); |
+ } |
+ dict = subdict; |
+ } |
+ |
+ if (value.empty()) |
+ return; |
+ |
+ std::string value_name(UTF16ToUTF8(value)); |
+ if (!StartsWithASCII(value_name, kActionTriggerPrefix, true)) { |
+ scoped_ptr<base::Value> value; |
+ if (DecodePRegValue(type, data, &value)) |
+ dict->Set(value_name, value.release()); |
+ return; |
+ } |
+ |
+ std::string action_trigger(StringToLowerASCII(value_name.substr( |
+ arraysize(kActionTriggerPrefix) - 1))); |
+ if (action_trigger == kActionTriggerDeleteValues || |
+ StartsWithASCII(action_trigger, kActionTriggerDeleteKeys, true)) { |
+ std::vector<std::string> keys; |
+ Tokenize(DecodePRegStringValue(data), ";", &keys); |
+ for (std::vector<std::string>::const_iterator key(keys.begin()); |
+ key != keys.end(); ++key) { |
+ dict->RemoveWithoutPathExpansion(*key, NULL); |
+ } |
+ } else if (StartsWithASCII(action_trigger, kActionTriggerDel, true)) { |
+ dict->RemoveWithoutPathExpansion( |
+ value_name.substr(arraysize(kActionTriggerPrefix) - 1 + |
+ arraysize(kActionTriggerDel) - 1), |
+ NULL); |
+ } else if (StartsWithASCII(action_trigger, kActionTriggerDelVals, true)) { |
+ // Delete all values, but keep keys (i.e. retain dictionary entries). |
+ base::DictionaryValue new_dict; |
+ for (base::DictionaryValue::Iterator it(*dict); it.HasNext(); |
+ it.Advance()) { |
+ base::DictionaryValue* subdict = NULL; |
+ if (dict->GetDictionaryWithoutPathExpansion(it.key(), &subdict)) { |
+ scoped_ptr<base::DictionaryValue> new_subdict( |
+ new base::DictionaryValue()); |
+ new_subdict->Swap(subdict); |
+ new_dict.Set(it.key(), new_subdict.release()); |
+ } |
+ } |
+ dict->Swap(&new_dict); |
+ } else if (StartsWithASCII(action_trigger, kActionTriggerSecureKey, true) || |
+ StartsWithASCII(action_trigger, kActionTriggerSoft, true)) { |
+ // Doesn't affect values. |
+ } else { |
+ LOG(ERROR) << "Bad action trigger " << value_name; |
+ } |
+} |
+ |
+bool ReadFile(const base::FilePath& file_path, |
+ const string16& root, |
+ base::DictionaryValue* dict) { |
+ base::MemoryMappedFile mapped_file; |
+ if (!mapped_file.Initialize(file_path) || !mapped_file.IsValid()) { |
+ PLOG(ERROR) << "Failed to map " << file_path.value(); |
+ return false; |
+ } |
+ |
+ if (mapped_file.length() > kMaxPRegFileSize) { |
+ LOG(ERROR) << "PReg file " << file_path.value() << " too large: " |
+ << mapped_file.length(); |
+ return false; |
+ } |
+ |
+ // Check the header. |
+ const int kHeaderSize = arraysize(kPolicyRegistryFileHeader) - 1; |
+ if (mapped_file.length() < kHeaderSize || |
+ memcmp(kPolicyRegistryFileHeader, mapped_file.data(), kHeaderSize) != 0) { |
+ LOG(ERROR) << "Bad policy file " << file_path.value(); |
+ return false; |
+ } |
+ |
+ // Parse file contents, which is UCS-2 and little-endian. The latter I |
+ // couldn't find documentation on, but the example I saw were all |
+ // little-endian. It'd be interesting to check on big-endian hardware. |
+ const uint8* cursor = mapped_file.data() + kHeaderSize; |
+ const uint8* end = mapped_file.data() + mapped_file.length(); |
+ while (true) { |
+ if (cursor == end) |
+ return true; |
+ |
+ if (NextChar(&cursor, end) != kDelimBracketOpen) |
+ break; |
+ |
+ // Read the record fields. |
+ string16 key_name; |
+ string16 value; |
+ uint32 type = 0; |
+ uint32 size = 0; |
+ std::vector<uint8> data; |
+ |
+ if (!ReadFieldString(&cursor, end, &key_name)) |
+ break; |
+ |
+ int current = NextChar(&cursor, end); |
+ if (current == kDelimSemicolon) { |
+ if (!ReadFieldString(&cursor, end, &value)) |
+ break; |
+ current = NextChar(&cursor, end); |
+ } |
+ |
+ if (current == kDelimSemicolon) { |
+ if (!ReadField32(&cursor, end, &type)) |
+ break; |
+ current = NextChar(&cursor, end); |
+ } |
+ |
+ if (current == kDelimSemicolon) { |
+ if (!ReadField32(&cursor, end, &size)) |
+ break; |
+ current = NextChar(&cursor, end); |
+ } |
+ |
+ if (current == kDelimSemicolon) { |
+ if (size > kMaxPRegFileSize) |
+ break; |
+ data.resize(size); |
+ if (!ReadFieldBinary(&cursor, end, size, vector_as_array(&data))) |
+ break; |
+ current = NextChar(&cursor, end); |
+ } |
+ |
+ if (current != kDelimBracketClose) |
+ break; |
+ |
+ // Process the record if it is within the |root| subtree. |
+ if (StartsWith(key_name, root, false)) |
+ HandleRecord(key_name.substr(root.size()), value, type, data, dict); |
+ } |
+ |
+ LOG(ERROR) << "Error parsing " << file_path.value() << " at offset " |
+ << reinterpret_cast<const uint8*>(cursor - 1) - mapped_file.data(); |
+ return false; |
+} |
+ |
+} // namespace preg_parser |
+} // namespace policy |