1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
|
#define OLD_NTDOMAIN 1
/*
* Unix SMB/Netbios implementation.
* Version 1.9.
* RPC Pipe client / server routines
* Copyright (C) Andrew Tridgell 1992-1997,
* Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
* Copyright (C) Paul Ashton 1997.
* Copyright (C) Hewlett-Packard Company 1999.
* Copyright (C) Jeremy Allison 2001.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
/* Implementation of registry functions. */
#include "includes.h"
extern int DEBUGLEVEL;
/*******************************************************************
reg_reply_unknown_1
********************************************************************/
uint32 _reg_close(pipes_struct *p, REG_Q_CLOSE *q_u, REG_R_CLOSE *r_u)
{
/* set up the REG unknown_1 response */
memset((char *)r_u->pol.data, '\0', POL_HND_SIZE);
/* close the policy handle */
if (!close_lsa_policy_hnd(&q_u->pol))
return NT_STATUS_OBJECT_NAME_INVALID;
return NT_STATUS_NOPROBLEMO;
}
/*******************************************************************
reg_reply_open
********************************************************************/
uint32 _reg_open(pipes_struct *p, REG_Q_OPEN_HKLM *q_u, REG_R_OPEN_HKLM *r_u)
{
if (!open_lsa_policy_hnd(&r_u->pol))
return NT_STATUS_OBJECT_NAME_NOT_FOUND;
return NT_STATUS_NOPROBLEMO;
}
/*******************************************************************
reg_reply_open_entry
********************************************************************/
uint32 _reg_open_entry(pipes_struct *p, REG_Q_OPEN_ENTRY *q_u, REG_R_OPEN_ENTRY *r_u)
{
POLICY_HND pol;
fstring name;
DEBUG(5,("reg_open_entry: %d\n", __LINE__));
if (find_lsa_policy_by_hnd(&q_u->pol) == -1)
return NT_STATUS_INVALID_HANDLE;
if (!open_lsa_policy_hnd(&pol))
return NT_STATUS_TOO_MANY_SECRETS; /* ha ha very droll */
fstrcpy(name, dos_unistrn2(q_u->uni_name.buffer, q_u->uni_name.uni_str_len));
DEBUG(5,("reg_open_entry: %s\n", name));
/* lkcl XXXX do a check on the name, here */
if (!strequal(name, "SYSTEM\\CurrentControlSet\\Control\\ProductOptions") &&
!strequal(name, "System\\CurrentControlSet\\services\\Netlogon\\parameters\\"))
return NT_STATUS_ACCESS_DENIED;
if (!set_lsa_policy_reg_name(&pol, name))
return NT_STATUS_TOO_MANY_SECRETS; /* ha ha very droll */
init_reg_r_open_entry(r_u, &pol, NT_STATUS_NOPROBLEMO);
DEBUG(5,("reg_open_entry: %d\n", __LINE__));
return r_u->status;
}
/*******************************************************************
reg_reply_info
********************************************************************/
uint32 _reg_info(pipes_struct *p, REG_Q_INFO *q_u, REG_R_INFO *r_u)
{
uint32 status = NT_STATUS_NOPROBLEMO;
char *key;
uint32 type=0x1; /* key type: REG_SZ */
UNISTR2 uni_key;
BUFFER2 buf;
fstring name;
DEBUG(5,("_reg_info: %d\n", __LINE__));
if (find_lsa_policy_by_hnd(&q_u->pol) == -1)
return NT_STATUS_INVALID_HANDLE;
fstrcpy(name, dos_unistrn2(q_u->uni_type.buffer, q_u->uni_type.uni_str_len));
DEBUG(5,("reg_info: checking key: %s\n", name));
if ( strequal(name, "RefusePasswordChange") ) {
type=0xF770;
status = ERRbadfile;
init_unistr2(&uni_key, "", 0);
init_buffer2(&buf, (uint8*) uni_key.buffer, uni_key.uni_str_len*2);
buf.buf_max_len=4;
goto out;
}
switch (lp_server_role()) {
case ROLE_DOMAIN_PDC:
case ROLE_DOMAIN_BDC:
key = "LanmanNT";
break;
case ROLE_STANDALONE:
key = "ServerNT";
break;
case ROLE_DOMAIN_MEMBER:
key = "WinNT";
break;
}
/* This makes the server look like a member server to clients */
/* which tells clients that we have our own local user and */
/* group databases and helps with ACL support. */
init_unistr2(&uni_key, key, strlen(key)+1);
init_buffer2(&buf, (uint8*)uni_key.buffer, uni_key.uni_str_len*2);
out:
init_reg_r_info(q_u->ptr_buf, r_u, &buf, type, status);
DEBUG(5,("reg_open_entry: %d\n", __LINE__));
return status;
}
#undef OLD_NTDOMAIN
|