1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 // 5 // A library to manage RLZ information for access-points shared 6 // across different client applications. 7 8 #include "rlz/lib/rlz_lib.h" 9 10 #include <windows.h> 11 #include <aclapi.h> 12 #include <winerror.h> 13 14 #include "base/basictypes.h" 15 #include "base/win/registry.h" 16 #include "rlz/lib/assert.h" 17 #include "rlz/lib/rlz_value_store.h" 18 #include "rlz/win/lib/machine_deal.h" 19 #include "rlz/win/lib/rlz_value_store_registry.h" 20 21 namespace rlz_lib { 22 23 // OEM Deal confirmation storage functions. 24 25 template<class T> 26 class typed_buffer_ptr { 27 scoped_ptr<char[]> buffer_; 28 29 public: 30 typed_buffer_ptr() { 31 } 32 33 explicit typed_buffer_ptr(size_t size) : buffer_(new char[size]) { 34 } 35 36 void reset(size_t size) { 37 buffer_.reset(new char[size]); 38 } 39 40 operator T*() { 41 return reinterpret_cast<T*>(buffer_.get()); 42 } 43 }; 44 45 // Check if this SID has the desired access by scanning the ACEs in the DACL. 46 // This function is part of the rlz_lib namespace so that it can be called from 47 // unit tests. Non-unit test code should not call this function. 48 bool HasAccess(PSID sid, ACCESS_MASK access_mask, ACL* dacl) { 49 if (dacl == NULL) 50 return false; 51 52 ACL_SIZE_INFORMATION info; 53 if (!GetAclInformation(dacl, &info, sizeof(info), AclSizeInformation)) 54 return false; 55 56 GENERIC_MAPPING generic_mapping = {KEY_READ, KEY_WRITE, KEY_EXECUTE, 57 KEY_ALL_ACCESS}; 58 MapGenericMask(&access_mask, &generic_mapping); 59 60 for (DWORD i = 0; i < info.AceCount; ++i) { 61 ACCESS_ALLOWED_ACE* ace; 62 if (GetAce(dacl, i, reinterpret_cast<void**>(&ace))) { 63 if ((ace->Header.AceFlags & INHERIT_ONLY_ACE) == INHERIT_ONLY_ACE) 64 continue; 65 66 PSID existing_sid = reinterpret_cast<PSID>(&ace->SidStart); 67 DWORD mask = ace->Mask; 68 MapGenericMask(&mask, &generic_mapping); 69 70 if (ace->Header.AceType == ACCESS_ALLOWED_ACE_TYPE && 71 (mask & access_mask) == access_mask && EqualSid(existing_sid, sid)) 72 return true; 73 74 if (ace->Header.AceType == ACCESS_DENIED_ACE_TYPE && 75 (mask & access_mask) != 0 && EqualSid(existing_sid, sid)) 76 return false; 77 } 78 } 79 80 return false; 81 } 82 83 bool CreateMachineState() { 84 LibMutex lock; 85 if (lock.failed()) 86 return false; 87 88 base::win::RegKey hklm_key; 89 if (hklm_key.Create(HKEY_LOCAL_MACHINE, 90 RlzValueStoreRegistry::GetWideLibKeyName().c_str(), 91 KEY_ALL_ACCESS | KEY_WOW64_32KEY) != ERROR_SUCCESS) { 92 ASSERT_STRING("rlz_lib::CreateMachineState: " 93 "Unable to create / open machine key."); 94 return false; 95 } 96 97 // Create a SID that represents ALL USERS. 98 DWORD users_sid_size = SECURITY_MAX_SID_SIZE; 99 typed_buffer_ptr<SID> users_sid(users_sid_size); 100 CreateWellKnownSid(WinBuiltinUsersSid, NULL, users_sid, &users_sid_size); 101 102 // Get the security descriptor for the registry key. 103 DWORD original_sd_size = 0; 104 ::RegGetKeySecurity(hklm_key.Handle(), DACL_SECURITY_INFORMATION, NULL, 105 &original_sd_size); 106 typed_buffer_ptr<SECURITY_DESCRIPTOR> original_sd(original_sd_size); 107 108 LONG result = ::RegGetKeySecurity(hklm_key.Handle(), 109 DACL_SECURITY_INFORMATION, original_sd, &original_sd_size); 110 if (result != ERROR_SUCCESS) { 111 ASSERT_STRING("rlz_lib::CreateMachineState: " 112 "Unable to create / open machine key."); 113 return false; 114 } 115 116 // Make a copy of the security descriptor so we can modify it. The one 117 // returned by RegGetKeySecurity() is self-relative, so we need to make it 118 // absolute. 119 DWORD new_sd_size = 0; 120 DWORD dacl_size = 0; 121 DWORD sacl_size = 0; 122 DWORD owner_size = 0; 123 DWORD group_size = 0; 124 ::MakeAbsoluteSD(original_sd, NULL, &new_sd_size, NULL, &dacl_size, 125 NULL, &sacl_size, NULL, &owner_size, 126 NULL, &group_size); 127 128 typed_buffer_ptr<SECURITY_DESCRIPTOR> new_sd(new_sd_size); 129 // Make sure the DACL is big enough to add one more ACE. 130 typed_buffer_ptr<ACL> dacl(dacl_size + SECURITY_MAX_SID_SIZE); 131 typed_buffer_ptr<ACL> sacl(sacl_size); 132 typed_buffer_ptr<SID> owner(owner_size); 133 typed_buffer_ptr<SID> group(group_size); 134 135 if (!::MakeAbsoluteSD(original_sd, new_sd, &new_sd_size, dacl, &dacl_size, 136 sacl, &sacl_size, owner, &owner_size, 137 group, &group_size)) { 138 ASSERT_STRING("rlz_lib::CreateMachineState: MakeAbsoluteSD failed"); 139 return false; 140 } 141 142 // If all users already have read/write access to the registry key, then 143 // nothing to do. Otherwise change the security descriptor of the key to 144 // give everyone access. 145 if (HasAccess(users_sid, KEY_ALL_ACCESS, dacl)) { 146 return false; 147 } 148 149 // Add ALL-USERS ALL-ACCESS ACL. 150 EXPLICIT_ACCESS ea; 151 ZeroMemory(&ea, sizeof(EXPLICIT_ACCESS)); 152 ea.grfAccessPermissions = GENERIC_ALL | KEY_ALL_ACCESS; 153 ea.grfAccessMode = GRANT_ACCESS; 154 ea.grfInheritance= SUB_CONTAINERS_AND_OBJECTS_INHERIT; 155 ea.Trustee.TrusteeForm = TRUSTEE_IS_NAME; 156 ea.Trustee.ptstrName = const_cast<wchar_t*>(L"Everyone"); 157 158 ACL* new_dacl = NULL; 159 result = SetEntriesInAcl(1, &ea, dacl, &new_dacl); 160 if (result != ERROR_SUCCESS) { 161 ASSERT_STRING("rlz_lib::CreateMachineState: SetEntriesInAcl failed"); 162 return false; 163 } 164 165 BOOL ok = SetSecurityDescriptorDacl(new_sd, TRUE, new_dacl, FALSE); 166 if (!ok) { 167 ASSERT_STRING("rlz_lib::CreateMachineState: " 168 "SetSecurityDescriptorOwner failed"); 169 LocalFree(new_dacl); 170 return false; 171 } 172 173 result = ::RegSetKeySecurity(hklm_key.Handle(), 174 DACL_SECURITY_INFORMATION, 175 new_sd); 176 // Note that the new DACL cannot be freed until after the call to 177 // RegSetKeySecurity(). 178 LocalFree(new_dacl); 179 180 bool success = true; 181 if (result != ERROR_SUCCESS) { 182 ASSERT_STRING("rlz_lib::CreateMachineState: " 183 "Unable to create / open machine key."); 184 success = false; 185 } 186 187 188 return success; 189 } 190 191 bool SetMachineDealCode(const char* dcc) { 192 return MachineDealCode::Set(dcc); 193 } 194 195 bool GetMachineDealCodeAsCgi(char* cgi, size_t cgi_size) { 196 return MachineDealCode::GetAsCgi(cgi, cgi_size); 197 } 198 199 bool GetMachineDealCode(char* dcc, size_t dcc_size) { 200 return MachineDealCode::Get(dcc, dcc_size); 201 } 202 203 // Combined functions. 204 205 bool SetMachineDealCodeFromPingResponse(const char* response) { 206 return MachineDealCode::SetFromPingResponse(response); 207 } 208 209 } // namespace rlz_lib 210