Home | History | Annotate | Download | only in lib
      1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 //
      5 // A library to manage RLZ information for access-points shared
      6 // across different client applications.
      7 
      8 #include "rlz/win/lib/rlz_lib.h"
      9 
     10 #include <windows.h>
     11 #include <aclapi.h>
     12 #include <winerror.h>
     13 
     14 #include "base/basictypes.h"
     15 #include "base/win/registry.h"
     16 #include "base/win/windows_version.h"
     17 #include "rlz/lib/assert.h"
     18 #include "rlz/lib/rlz_value_store.h"
     19 #include "rlz/win/lib/machine_deal.h"
     20 #include "rlz/win/lib/rlz_value_store_registry.h"
     21 
     22 namespace {
     23 
     24 // Path to recursively copy into the replacemment hives.  These are needed
     25 // to make sure certain win32 APIs continue to run correctly once the real
     26 // hives are replaced.
     27 const wchar_t* kHKLMAccessProviders =
     28     L"System\\CurrentControlSet\\Control\\Lsa\\AccessProviders";
     29 
     30 // Helper functions
     31 
     32 void CopyRegistryTree(const base::win::RegKey& src, base::win::RegKey* dest) {
     33   // First copy values.
     34   for (base::win::RegistryValueIterator i(src.Handle(), L"");
     35        i.Valid(); ++i) {
     36     dest->WriteValue(i.Name(), reinterpret_cast<const void*>(i.Value()),
     37                      i.ValueSize(), i.Type());
     38   }
     39 
     40   // Next copy subkeys recursively.
     41   for (base::win::RegistryKeyIterator i(src.Handle(), L"");
     42        i.Valid(); ++i) {
     43     base::win::RegKey subkey(dest->Handle(), i.Name(), KEY_ALL_ACCESS);
     44     CopyRegistryTree(base::win::RegKey(src.Handle(), i.Name(), KEY_READ),
     45                      &subkey);
     46   }
     47 }
     48 
     49 }  // namespace anonymous
     50 
     51 
     52 namespace rlz_lib {
     53 
     54 // OEM Deal confirmation storage functions.
     55 
     56 template<class T>
     57 class typed_buffer_ptr {
     58   scoped_ptr<char[]> buffer_;
     59 
     60  public:
     61   typed_buffer_ptr() {
     62   }
     63 
     64   explicit typed_buffer_ptr(size_t size) : buffer_(new char[size]) {
     65   }
     66 
     67   void reset(size_t size) {
     68     buffer_.reset(new char[size]);
     69   }
     70 
     71   operator T*() {
     72     return reinterpret_cast<T*>(buffer_.get());
     73   }
     74 };
     75 
     76 // Check if this SID has the desired access by scanning the ACEs in the DACL.
     77 // This function is part of the rlz_lib namespace so that it can be called from
     78 // unit tests.  Non-unit test code should not call this function.
     79 bool HasAccess(PSID sid, ACCESS_MASK access_mask, ACL* dacl) {
     80   if (dacl == NULL)
     81     return false;
     82 
     83   ACL_SIZE_INFORMATION info;
     84   if (!GetAclInformation(dacl, &info, sizeof(info), AclSizeInformation))
     85     return false;
     86 
     87   GENERIC_MAPPING generic_mapping = {KEY_READ, KEY_WRITE, KEY_EXECUTE,
     88                                      KEY_ALL_ACCESS};
     89   MapGenericMask(&access_mask, &generic_mapping);
     90 
     91   for (DWORD i = 0; i < info.AceCount; ++i) {
     92     ACCESS_ALLOWED_ACE* ace;
     93     if (GetAce(dacl, i, reinterpret_cast<void**>(&ace))) {
     94       if ((ace->Header.AceFlags & INHERIT_ONLY_ACE) == INHERIT_ONLY_ACE)
     95         continue;
     96 
     97       PSID existing_sid = reinterpret_cast<PSID>(&ace->SidStart);
     98       DWORD mask = ace->Mask;
     99       MapGenericMask(&mask, &generic_mapping);
    100 
    101       if (ace->Header.AceType == ACCESS_ALLOWED_ACE_TYPE &&
    102          (mask & access_mask) == access_mask && EqualSid(existing_sid, sid))
    103         return true;
    104 
    105       if (ace->Header.AceType == ACCESS_DENIED_ACE_TYPE &&
    106          (mask & access_mask) != 0 && EqualSid(existing_sid, sid))
    107         return false;
    108     }
    109   }
    110 
    111   return false;
    112 }
    113 
    114 bool CreateMachineState() {
    115   LibMutex lock;
    116   if (lock.failed())
    117     return false;
    118 
    119   base::win::RegKey hklm_key;
    120   if (hklm_key.Create(HKEY_LOCAL_MACHINE,
    121                       RlzValueStoreRegistry::GetWideLibKeyName().c_str(),
    122                       KEY_ALL_ACCESS | KEY_WOW64_32KEY) != ERROR_SUCCESS) {
    123     ASSERT_STRING("rlz_lib::CreateMachineState: "
    124                   "Unable to create / open machine key.");
    125     return false;
    126   }
    127 
    128   // Create a SID that represents ALL USERS.
    129   DWORD users_sid_size = SECURITY_MAX_SID_SIZE;
    130   typed_buffer_ptr<SID> users_sid(users_sid_size);
    131   CreateWellKnownSid(WinBuiltinUsersSid, NULL, users_sid, &users_sid_size);
    132 
    133   // Get the security descriptor for the registry key.
    134   DWORD original_sd_size = 0;
    135   ::RegGetKeySecurity(hklm_key.Handle(), DACL_SECURITY_INFORMATION, NULL,
    136       &original_sd_size);
    137   typed_buffer_ptr<SECURITY_DESCRIPTOR> original_sd(original_sd_size);
    138 
    139   LONG result = ::RegGetKeySecurity(hklm_key.Handle(),
    140       DACL_SECURITY_INFORMATION, original_sd, &original_sd_size);
    141   if (result != ERROR_SUCCESS) {
    142     ASSERT_STRING("rlz_lib::CreateMachineState: "
    143                   "Unable to create / open machine key.");
    144     return false;
    145   }
    146 
    147   // Make a copy of the security descriptor so we can modify it.  The one
    148   // returned by RegGetKeySecurity() is self-relative, so we need to make it
    149   // absolute.
    150   DWORD new_sd_size = 0;
    151   DWORD dacl_size = 0;
    152   DWORD sacl_size = 0;
    153   DWORD owner_size = 0;
    154   DWORD group_size = 0;
    155   ::MakeAbsoluteSD(original_sd, NULL, &new_sd_size, NULL, &dacl_size,
    156                         NULL, &sacl_size, NULL, &owner_size,
    157                         NULL, &group_size);
    158 
    159   typed_buffer_ptr<SECURITY_DESCRIPTOR> new_sd(new_sd_size);
    160   // Make sure the DACL is big enough to add one more ACE.
    161   typed_buffer_ptr<ACL> dacl(dacl_size + SECURITY_MAX_SID_SIZE);
    162   typed_buffer_ptr<ACL> sacl(sacl_size);
    163   typed_buffer_ptr<SID> owner(owner_size);
    164   typed_buffer_ptr<SID> group(group_size);
    165 
    166   if (!::MakeAbsoluteSD(original_sd, new_sd, &new_sd_size, dacl, &dacl_size,
    167                         sacl, &sacl_size, owner, &owner_size,
    168                         group, &group_size)) {
    169     ASSERT_STRING("rlz_lib::CreateMachineState: MakeAbsoluteSD failed");
    170     return false;
    171   }
    172 
    173   // If all users already have read/write access to the registry key, then
    174   // nothing to do.  Otherwise change the security descriptor of the key to
    175   // give everyone access.
    176   if (HasAccess(users_sid, KEY_ALL_ACCESS, dacl)) {
    177     return false;
    178   }
    179 
    180   // Add ALL-USERS ALL-ACCESS ACL.
    181   EXPLICIT_ACCESS ea;
    182   ZeroMemory(&ea, sizeof(EXPLICIT_ACCESS));
    183   ea.grfAccessPermissions = GENERIC_ALL | KEY_ALL_ACCESS;
    184   ea.grfAccessMode = GRANT_ACCESS;
    185   ea.grfInheritance= SUB_CONTAINERS_AND_OBJECTS_INHERIT;
    186   ea.Trustee.TrusteeForm = TRUSTEE_IS_NAME;
    187   ea.Trustee.ptstrName = L"Everyone";
    188 
    189   ACL* new_dacl = NULL;
    190   result = SetEntriesInAcl(1, &ea, dacl, &new_dacl);
    191   if (result != ERROR_SUCCESS) {
    192     ASSERT_STRING("rlz_lib::CreateMachineState: SetEntriesInAcl failed");
    193     return false;
    194   }
    195 
    196   BOOL ok = SetSecurityDescriptorDacl(new_sd, TRUE, new_dacl, FALSE);
    197   if (!ok) {
    198     ASSERT_STRING("rlz_lib::CreateMachineState: "
    199                   "SetSecurityDescriptorOwner failed");
    200     LocalFree(new_dacl);
    201     return false;
    202   }
    203 
    204   result = ::RegSetKeySecurity(hklm_key.Handle(),
    205                                DACL_SECURITY_INFORMATION,
    206                                new_sd);
    207   // Note that the new DACL cannot be freed until after the call to
    208   // RegSetKeySecurity().
    209   LocalFree(new_dacl);
    210 
    211   bool success = true;
    212   if (result != ERROR_SUCCESS) {
    213     ASSERT_STRING("rlz_lib::CreateMachineState: "
    214                   "Unable to create / open machine key.");
    215     success = false;
    216   }
    217 
    218 
    219   return success;
    220 }
    221 
    222 bool SetMachineDealCode(const char* dcc) {
    223   return MachineDealCode::Set(dcc);
    224 }
    225 
    226 bool GetMachineDealCodeAsCgi(char* cgi, size_t cgi_size) {
    227   return MachineDealCode::GetAsCgi(cgi, cgi_size);
    228 }
    229 
    230 bool GetMachineDealCode(char* dcc, size_t dcc_size) {
    231   return MachineDealCode::Get(dcc, dcc_size);
    232 }
    233 
    234 // Combined functions.
    235 
    236 bool SetMachineDealCodeFromPingResponse(const char* response) {
    237   return MachineDealCode::SetFromPingResponse(response);
    238 }
    239 
    240 void InitializeTempHivesForTesting(const base::win::RegKey& temp_hklm_key,
    241                                    const base::win::RegKey& temp_hkcu_key) {
    242   // For the moment, the HKCU hive requires no initialization.
    243 
    244   if (base::win::GetVersion() >= base::win::VERSION_WIN7) {
    245     // Copy the following HKLM subtrees to the temporary location so that the
    246     // win32 APIs used by the tests continue to work:
    247     //
    248     //    HKLM\System\CurrentControlSet\Control\Lsa\AccessProviders
    249     //
    250     // This seems to be required since Win7.
    251     base::win::RegKey dest(temp_hklm_key.Handle(), kHKLMAccessProviders,
    252                            KEY_ALL_ACCESS);
    253     CopyRegistryTree(base::win::RegKey(HKEY_LOCAL_MACHINE,
    254                                        kHKLMAccessProviders,
    255                                        KEY_READ),
    256                      &dest);
    257   }
    258 }
    259 
    260 }  // namespace rlz_lib
    261