root/source4/lib/registry/tools/regtree.c

/* [<][>][^][v][top][bottom][index][help] */

DEFINITIONS

This source file includes following definitions.
  1. print_tree
  2. main

   1 /*
   2    Unix SMB/CIFS implementation.
   3    simple registry frontend
   4 
   5    Copyright (C) Jelmer Vernooij 2004-2007
   6 
   7    This program is free software; you can redistribute it and/or modify
   8    it under the terms of the GNU General Public License as published by
   9    the Free Software Foundation; either version 3 of the License, or
  10    (at your option) any later version.
  11 
  12    This program is distributed in the hope that it will be useful,
  13    but WITHOUT ANY WARRANTY; without even the implied warranty of
  14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  15    GNU General Public License for more details.
  16 
  17    You should have received a copy of the GNU General Public License
  18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
  19 */
  20 
  21 #include "includes.h"
  22 #include "lib/registry/registry.h"
  23 #include "lib/registry/tools/common.h"
  24 #include "lib/events/events.h"
  25 #include "lib/cmdline/popt_common.h"
  26 #include "param/param.h"
  27 
  28 /**
  29  * Print a registry key recursively
  30  *
  31  * @param level Level at which to print
  32  * @param p Key to print
  33  * @param fullpath Whether the full pat hshould be printed or just the last bit
  34  * @param novals Whether values should not be printed
  35  */
  36 static void print_tree(int level, struct registry_key *p,
     /* [<][>][^][v][top][bottom][index][help] */
  37                        const char *name,
  38                        bool fullpath, bool novals)
  39 {
  40         struct registry_key *subkey;
  41         const char *valuename, *keyname;
  42         uint32_t valuetype;
  43         DATA_BLOB valuedata;
  44         struct security_descriptor *sec_desc;
  45         WERROR error;
  46         int i;
  47         TALLOC_CTX *mem_ctx;
  48 
  49         for(i = 0; i < level; i++) putchar(' '); puts(name);
  50 
  51         mem_ctx = talloc_init("print_tree");
  52         for (i = 0; W_ERROR_IS_OK(error = reg_key_get_subkey_by_index(mem_ctx,
  53                                                                       p,
  54                                                                       i,
  55                                                                       &keyname,
  56                                                                       NULL,
  57                                                                       NULL)); i++) {
  58 
  59                 SMB_ASSERT(strlen(keyname) > 0);
  60                 if (!W_ERROR_IS_OK(reg_open_key(mem_ctx, p, keyname, &subkey)))
  61                         continue;
  62 
  63                 print_tree(level+1, subkey, (fullpath && strlen(name))?
  64                                                talloc_asprintf(mem_ctx, "%s\\%s",
  65                                                                name, keyname):
  66                                                keyname, fullpath, novals);
  67                 talloc_free(subkey);
  68         }
  69         talloc_free(mem_ctx);
  70 
  71         if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
  72                 DEBUG(0, ("Error occured while fetching subkeys for '%s': %s\n",
  73                                   name, win_errstr(error)));
  74         }
  75 
  76         if (!novals) {
  77                 mem_ctx = talloc_init("print_tree");
  78                 for(i = 0; W_ERROR_IS_OK(error = reg_key_get_value_by_index(
  79                         mem_ctx, p, i, &valuename, &valuetype, &valuedata));
  80                         i++) {
  81                         int j;
  82                         for(j = 0; j < level+1; j++) putchar(' ');
  83                         printf("%s\n",  reg_val_description(mem_ctx,
  84                                 lp_iconv_convenience(cmdline_lp_ctx), valuename,
  85                                 valuetype, valuedata));
  86                 }
  87                 talloc_free(mem_ctx);
  88 
  89                 if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
  90                         DEBUG(0, ("Error occured while fetching values for '%s': %s\n",
  91                                 name, win_errstr(error)));
  92                 }
  93         }
  94 
  95         mem_ctx = talloc_init("sec_desc");
  96         if (NT_STATUS_IS_ERR(reg_get_sec_desc(mem_ctx, p, &sec_desc))) {
  97                 DEBUG(0, ("Error getting security descriptor\n"));
  98         }
  99         talloc_free(mem_ctx);
 100 }
 101 
 102 int main(int argc, char **argv)
     /* [<][>][^][v][top][bottom][index][help] */
 103 {
 104         int opt, i;
 105         const char *file = NULL;
 106         const char *remote = NULL;
 107         poptContext pc;
 108         struct registry_context *h = NULL;
 109         struct registry_key *start_key = NULL;
 110         struct tevent_context *ev_ctx;
 111         WERROR error;
 112         bool fullpath = false, no_values = false;
 113         struct poptOption long_options[] = {
 114                 POPT_AUTOHELP
 115                 {"file", 'F', POPT_ARG_STRING, &file, 0, "file path", NULL },
 116                 {"remote", 'R', POPT_ARG_STRING, &remote, 0, "connect to specified remote server", NULL },
 117                 {"fullpath", 'f', POPT_ARG_NONE, &fullpath, 0, "show full paths", NULL},
 118                 {"no-values", 'V', POPT_ARG_NONE, &no_values, 0, "don't show values", NULL},
 119                 POPT_COMMON_SAMBA
 120                 POPT_COMMON_CREDENTIALS
 121                 POPT_COMMON_VERSION
 122                 { NULL }
 123         };
 124 
 125         pc = poptGetContext(argv[0], argc, (const char **) argv, long_options,0);
 126 
 127         while((opt = poptGetNextOpt(pc)) != -1) {
 128         }
 129 
 130         ev_ctx = s4_event_context_init(NULL);
 131 
 132         if (remote != NULL) {
 133                 h = reg_common_open_remote(remote, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
 134         } else if (file != NULL) {
 135                 start_key = reg_common_open_file(file, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
 136         } else {
 137                 h = reg_common_open_local(cmdline_credentials, ev_ctx, cmdline_lp_ctx);
 138         }
 139 
 140         if (h == NULL && start_key == NULL)
 141                 return 1;
 142 
 143         poptFreeContext(pc);
 144 
 145         error = WERR_OK;
 146 
 147         if (start_key != NULL) {
 148                 print_tree(0, start_key, "", fullpath, no_values);
 149         } else {
 150                 for(i = 0; reg_predefined_keys[i].handle; i++) {
 151                         error = reg_get_predefined_key(h,
 152                                                        reg_predefined_keys[i].handle,
 153                                                        &start_key);
 154                         if (!W_ERROR_IS_OK(error)) {
 155                                 fprintf(stderr, "Skipping %s: %s\n",
 156                                         reg_predefined_keys[i].name,
 157                                         win_errstr(error));
 158                                 continue;
 159                         }
 160                         SMB_ASSERT(start_key != NULL);
 161                         print_tree(0, start_key, reg_predefined_keys[i].name,
 162                                    fullpath, no_values);
 163                 }
 164         }
 165 
 166         return 0;
 167 }

/* [<][>][^][v][top][bottom][index][help] */