Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
b3957e30
Commit
b3957e30
authored
May 05, 2005
by
Robert Shearman
Committed by
Alexandre Julliard
May 05, 2005
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
- Fix access rights for RegOpenKeyEx and RegCreateKeyEx calls.
- Add privilege checks for RegLoadKey, RegUnloadKey & RegSaveKey calls.
parent
ac0bf21a
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
41 additions
and
5 deletions
+41
-5
registry.c
server/registry.c
+41
-5
No files found.
server/registry.c
View file @
b3957e30
...
@@ -44,6 +44,7 @@
...
@@ -44,6 +44,7 @@
#include "handle.h"
#include "handle.h"
#include "request.h"
#include "request.h"
#include "unicode.h"
#include "unicode.h"
#include "security.h"
#include "winbase.h"
#include "winbase.h"
#include "winreg.h"
#include "winreg.h"
...
@@ -1685,7 +1686,7 @@ DECL_HANDLER(create_key)
...
@@ -1685,7 +1686,7 @@ DECL_HANDLER(create_key)
if
(
access
&
MAXIMUM_ALLOWED
)
access
=
KEY_ALL_ACCESS
;
/* FIXME: needs general solution */
if
(
access
&
MAXIMUM_ALLOWED
)
access
=
KEY_ALL_ACCESS
;
/* FIXME: needs general solution */
reply
->
hkey
=
0
;
reply
->
hkey
=
0
;
if
(
!
(
name
=
copy_req_path
(
req
->
namelen
,
!
req
->
parent
)))
return
;
if
(
!
(
name
=
copy_req_path
(
req
->
namelen
,
!
req
->
parent
)))
return
;
if
((
parent
=
get_hkey_obj
(
req
->
parent
,
0
/*FIXME*/
)))
if
((
parent
=
get_hkey_obj
(
req
->
parent
,
KEY_CREATE_SUB_KEY
)))
{
{
int
flags
=
(
req
->
options
&
REG_OPTION_VOLATILE
)
?
KEY_VOLATILE
:
KEY_DIRTY
;
int
flags
=
(
req
->
options
&
REG_OPTION_VOLATILE
)
?
KEY_VOLATILE
:
KEY_DIRTY
;
...
@@ -1720,7 +1721,8 @@ DECL_HANDLER(open_key)
...
@@ -1720,7 +1721,8 @@ DECL_HANDLER(open_key)
if
(
access
&
MAXIMUM_ALLOWED
)
access
=
KEY_ALL_ACCESS
;
/* FIXME: needs general solution */
if
(
access
&
MAXIMUM_ALLOWED
)
access
=
KEY_ALL_ACCESS
;
/* FIXME: needs general solution */
reply
->
hkey
=
0
;
reply
->
hkey
=
0
;
if
((
parent
=
get_hkey_obj
(
req
->
parent
,
0
/*FIXME*/
)))
/* NOTE: no access rights are required to open the parent key, only the child key */
if
((
parent
=
get_hkey_obj
(
req
->
parent
,
0
)))
{
{
WCHAR
*
name
=
copy_path
(
get_req_data
(),
get_req_data_size
(),
!
req
->
parent
);
WCHAR
*
name
=
copy_path
(
get_req_data
(),
get_req_data_size
(),
!
req
->
parent
);
if
(
name
&&
(
key
=
open_key
(
parent
,
name
)))
if
(
name
&&
(
key
=
open_key
(
parent
,
name
)))
...
@@ -1737,7 +1739,7 @@ DECL_HANDLER(delete_key)
...
@@ -1737,7 +1739,7 @@ DECL_HANDLER(delete_key)
{
{
struct
key
*
key
;
struct
key
*
key
;
if
((
key
=
get_hkey_obj
(
req
->
hkey
,
0
/*FIXME*/
)))
if
((
key
=
get_hkey_obj
(
req
->
hkey
,
DELETE
)))
{
{
delete_key
(
key
,
0
);
delete_key
(
key
,
0
);
release_object
(
key
);
release_object
(
key
);
...
@@ -1833,8 +1835,22 @@ DECL_HANDLER(delete_key_value)
...
@@ -1833,8 +1835,22 @@ DECL_HANDLER(delete_key_value)
DECL_HANDLER
(
load_registry
)
DECL_HANDLER
(
load_registry
)
{
{
struct
key
*
key
,
*
parent
;
struct
key
*
key
,
*
parent
;
struct
token
*
token
=
thread_get_impersonation_token
(
current
);
if
((
parent
=
get_hkey_obj
(
req
->
hkey
,
KEY_SET_VALUE
|
KEY_CREATE_SUB_KEY
)))
const
LUID_AND_ATTRIBUTES
privs
[]
=
{
{
SeBackupPrivilege
,
0
},
{
SeRestorePrivilege
,
0
},
};
if
(
!
token
||
!
token_check_privileges
(
token
,
TRUE
,
privs
,
sizeof
(
privs
)
/
sizeof
(
privs
[
0
]),
NULL
))
{
set_error
(
STATUS_PRIVILEGE_NOT_HELD
);
return
;
}
if
((
parent
=
get_hkey_obj
(
req
->
hkey
,
0
)))
{
{
int
dummy
;
int
dummy
;
WCHAR
*
name
=
copy_path
(
get_req_data
(),
get_req_data_size
(),
!
req
->
hkey
);
WCHAR
*
name
=
copy_path
(
get_req_data
(),
get_req_data_size
(),
!
req
->
hkey
);
...
@@ -1850,6 +1866,20 @@ DECL_HANDLER(load_registry)
...
@@ -1850,6 +1866,20 @@ DECL_HANDLER(load_registry)
DECL_HANDLER
(
unload_registry
)
DECL_HANDLER
(
unload_registry
)
{
{
struct
key
*
key
;
struct
key
*
key
;
struct
token
*
token
=
thread_get_impersonation_token
(
current
);
const
LUID_AND_ATTRIBUTES
privs
[]
=
{
{
SeBackupPrivilege
,
0
},
{
SeRestorePrivilege
,
0
},
};
if
(
!
token
||
!
token_check_privileges
(
token
,
TRUE
,
privs
,
sizeof
(
privs
)
/
sizeof
(
privs
[
0
]),
NULL
))
{
set_error
(
STATUS_PRIVILEGE_NOT_HELD
);
return
;
}
if
((
key
=
get_hkey_obj
(
req
->
hkey
,
0
)))
if
((
key
=
get_hkey_obj
(
req
->
hkey
,
0
)))
{
{
...
@@ -1863,7 +1893,13 @@ DECL_HANDLER(save_registry)
...
@@ -1863,7 +1893,13 @@ DECL_HANDLER(save_registry)
{
{
struct
key
*
key
;
struct
key
*
key
;
if
((
key
=
get_hkey_obj
(
req
->
hkey
,
KEY_QUERY_VALUE
|
KEY_ENUMERATE_SUB_KEYS
)))
if
(
!
thread_single_check_privilege
(
current
,
&
SeBackupPrivilege
))
{
set_error
(
STATUS_PRIVILEGE_NOT_HELD
);
return
;
}
if
((
key
=
get_hkey_obj
(
req
->
hkey
,
0
)))
{
{
save_registry
(
key
,
req
->
file
);
save_registry
(
key
,
req
->
file
);
release_object
(
key
);
release_object
(
key
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment