| Index: chrome/browser/policy/preg_parser_win.cc
|
| diff --git a/chrome/browser/policy/preg_parser_win.cc b/chrome/browser/policy/preg_parser_win.cc
|
| deleted file mode 100644
|
| index a30714a9fe8f5c0bb3a26d98e346a0ce77449c65..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/policy/preg_parser_win.cc
|
| +++ /dev/null
|
| @@ -1,306 +0,0 @@
|
| -// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/policy/preg_parser_win.h"
|
| -
|
| -#include <windows.h>
|
| -
|
| -#include <algorithm>
|
| -#include <iterator>
|
| -#include <vector>
|
| -
|
| -#include "base/basictypes.h"
|
| -#include "base/files/file_path.h"
|
| -#include "base/files/memory_mapped_file.h"
|
| -#include "base/logging.h"
|
| -#include "base/stl_util.h"
|
| -#include "base/strings/string16.h"
|
| -#include "base/strings/string_util.h"
|
| -#include "base/strings/utf_string_conversions.h"
|
| -#include "base/sys_byteorder.h"
|
| -#include "base/values.h"
|
| -#include "chrome/browser/policy/policy_load_status.h"
|
| -#include "components/policy/core/common/registry_dict_win.h"
|
| -
|
| -namespace policy {
|
| -namespace preg_parser {
|
| -
|
| -const char kPRegFileHeader[8] =
|
| - { 'P', 'R', 'e', 'g', '\x01', '\x00', '\x00', '\x00' };
|
| -
|
| -// Maximum PReg file size we're willing to accept.
|
| -const int64 kMaxPRegFileSize = 1024 * 1024 * 16;
|
| -
|
| -// Constants for PReg file delimiters.
|
| -const char16 kDelimBracketOpen = L'[';
|
| -const char16 kDelimBracketClose = L']';
|
| -const char16 kDelimSemicolon = L';';
|
| -
|
| -// Registry path separator.
|
| -const char16 kRegistryPathSeparator[] = L"\\";
|
| -
|
| -// Magic strings for the PReg value field to trigger special actions.
|
| -const char kActionTriggerPrefix[] = "**";
|
| -const char kActionTriggerDeleteValues[] = "deletevalues";
|
| -const char kActionTriggerDel[] = "del.";
|
| -const char kActionTriggerDelVals[] = "delvals";
|
| -const char kActionTriggerDeleteKeys[] = "deletekeys";
|
| -const char kActionTriggerSecureKey[] = "securekey";
|
| -const char kActionTriggerSoft[] = "soft";
|
| -
|
| -// Returns the character at |cursor| and increments it, unless the end is here
|
| -// in which case -1 is returned.
|
| -int NextChar(const uint8** cursor, const uint8* end) {
|
| - // Only read the character if a full char16 is available.
|
| - if (*cursor + sizeof(char16) > end)
|
| - return -1;
|
| -
|
| - int result = **cursor | (*(*cursor + 1) << 8);
|
| - *cursor += sizeof(char16);
|
| - return result;
|
| -}
|
| -
|
| -// Reads a fixed-size field from a PReg file.
|
| -bool ReadFieldBinary(const uint8** cursor,
|
| - const uint8* end,
|
| - uint32 size,
|
| - uint8* data) {
|
| - if (size == 0)
|
| - return true;
|
| -
|
| - const uint8* field_end = *cursor + size;
|
| - if (field_end <= *cursor || field_end > end)
|
| - return false;
|
| - std::copy(*cursor, field_end, data);
|
| - *cursor = field_end;
|
| - return true;
|
| -}
|
| -
|
| -bool ReadField32(const uint8** cursor, const uint8* end, uint32* data) {
|
| - uint32 value = 0;
|
| - if (!ReadFieldBinary(cursor, end, sizeof(uint32),
|
| - reinterpret_cast<uint8*>(&value))) {
|
| - return false;
|
| - }
|
| - *data = base::ByteSwapToLE32(value);
|
| - return true;
|
| -}
|
| -
|
| -// Reads a string field from a file.
|
| -bool ReadFieldString(const uint8** cursor, const uint8* end, string16* str) {
|
| - int current = -1;
|
| - while ((current = NextChar(cursor, end)) > 0x0000)
|
| - *str += current;
|
| -
|
| - return current == L'\0';
|
| -}
|
| -
|
| -std::string DecodePRegStringValue(const std::vector<uint8>& data) {
|
| - size_t len = data.size() / sizeof(char16);
|
| - if (len <= 0)
|
| - return std::string();
|
| -
|
| - const char16* chars = reinterpret_cast<const char16*>(vector_as_array(&data));
|
| - string16 result;
|
| - std::transform(chars, chars + len - 1, std::back_inserter(result),
|
| - std::ptr_fun(base::ByteSwapToLE16));
|
| - return UTF16ToUTF8(result);
|
| -}
|
| -
|
| -// Decodes a value from a PReg file given as a uint8 vector.
|
| -bool DecodePRegValue(uint32 type,
|
| - const std::vector<uint8>& data,
|
| - scoped_ptr<base::Value>* value) {
|
| - switch (type) {
|
| - case REG_SZ:
|
| - case REG_EXPAND_SZ:
|
| - value->reset(base::Value::CreateStringValue(DecodePRegStringValue(data)));
|
| - return true;
|
| - case REG_DWORD_LITTLE_ENDIAN:
|
| - case REG_DWORD_BIG_ENDIAN:
|
| - if (data.size() == sizeof(uint32)) {
|
| - uint32 val = *reinterpret_cast<const uint32*>(vector_as_array(&data));
|
| - if (type == REG_DWORD_BIG_ENDIAN)
|
| - val = base::NetToHost32(val);
|
| - else
|
| - val = base::ByteSwapToLE32(val);
|
| - value->reset(base::Value::CreateIntegerValue(static_cast<int>(val)));
|
| - return true;
|
| - } else {
|
| - LOG(ERROR) << "Bad data size " << data.size();
|
| - }
|
| - break;
|
| - case REG_NONE:
|
| - case REG_LINK:
|
| - case REG_MULTI_SZ:
|
| - case REG_RESOURCE_LIST:
|
| - case REG_FULL_RESOURCE_DESCRIPTOR:
|
| - case REG_RESOURCE_REQUIREMENTS_LIST:
|
| - case REG_QWORD_LITTLE_ENDIAN:
|
| - default:
|
| - LOG(ERROR) << "Unsupported registry data type " << type;
|
| - }
|
| -
|
| - return false;
|
| -}
|
| -
|
| -// Adds the record data passed via parameters to |dict| in case the data is
|
| -// relevant policy for Chromium.
|
| -void HandleRecord(const string16& key_name,
|
| - const string16& value,
|
| - uint32 type,
|
| - const std::vector<uint8>& data,
|
| - RegistryDict* dict) {
|
| - // Locate/create the dictionary to place the value in.
|
| - std::vector<string16> path;
|
| -
|
| - Tokenize(key_name, kRegistryPathSeparator, &path);
|
| - for (std::vector<string16>::const_iterator entry(path.begin());
|
| - entry != path.end(); ++entry) {
|
| - if (entry->empty())
|
| - continue;
|
| - const std::string name = UTF16ToUTF8(*entry);
|
| - RegistryDict* subdict = dict->GetKey(name);
|
| - if (!subdict) {
|
| - subdict = new RegistryDict();
|
| - dict->SetKey(name, make_scoped_ptr(subdict));
|
| - }
|
| - dict = subdict;
|
| - }
|
| -
|
| - if (value.empty())
|
| - return;
|
| -
|
| - std::string value_name(UTF16ToUTF8(value));
|
| - if (!StartsWithASCII(value_name, kActionTriggerPrefix, true)) {
|
| - scoped_ptr<base::Value> value;
|
| - if (DecodePRegValue(type, data, &value))
|
| - dict->SetValue(value_name, value.Pass());
|
| - return;
|
| - }
|
| -
|
| - std::string action_trigger(StringToLowerASCII(value_name.substr(
|
| - arraysize(kActionTriggerPrefix) - 1)));
|
| - if (action_trigger == kActionTriggerDeleteValues) {
|
| - std::vector<std::string> values;
|
| - Tokenize(DecodePRegStringValue(data), ";", &values);
|
| - for (std::vector<std::string>::const_iterator value(values.begin());
|
| - value != values.end(); ++value) {
|
| - dict->RemoveValue(*value);
|
| - }
|
| - } else if (StartsWithASCII(action_trigger, kActionTriggerDeleteKeys, true)) {
|
| - std::vector<std::string> keys;
|
| - Tokenize(DecodePRegStringValue(data), ";", &keys);
|
| - for (std::vector<std::string>::const_iterator key(keys.begin());
|
| - key != keys.end(); ++key) {
|
| - dict->RemoveKey(*key);
|
| - }
|
| - } else if (StartsWithASCII(action_trigger, kActionTriggerDel, true)) {
|
| - dict->RemoveValue(
|
| - value_name.substr(arraysize(kActionTriggerPrefix) - 1 +
|
| - arraysize(kActionTriggerDel) - 1));
|
| - } else if (StartsWithASCII(action_trigger, kActionTriggerDelVals, true)) {
|
| - // Delete all values.
|
| - dict->ClearValues();
|
| - } else if (StartsWithASCII(action_trigger, kActionTriggerSecureKey, true) ||
|
| - StartsWithASCII(action_trigger, kActionTriggerSoft, true)) {
|
| - // Doesn't affect values.
|
| - } else {
|
| - LOG(ERROR) << "Bad action trigger " << value_name;
|
| - }
|
| -}
|
| -
|
| -bool ReadFile(const base::FilePath& file_path,
|
| - const string16& root,
|
| - RegistryDict* dict,
|
| - PolicyLoadStatusSample* status) {
|
| - base::MemoryMappedFile mapped_file;
|
| - if (!mapped_file.Initialize(file_path) || !mapped_file.IsValid()) {
|
| - PLOG(ERROR) << "Failed to map " << file_path.value();
|
| - status->Add(POLICY_LOAD_STATUS_READ_ERROR);
|
| - return false;
|
| - }
|
| -
|
| - if (mapped_file.length() > kMaxPRegFileSize) {
|
| - LOG(ERROR) << "PReg file " << file_path.value() << " too large: "
|
| - << mapped_file.length();
|
| - status->Add(POLICY_LOAD_STATUS_TOO_BIG);
|
| - return false;
|
| - }
|
| -
|
| - // Check the header.
|
| - const int kHeaderSize = arraysize(kPRegFileHeader);
|
| - if (mapped_file.length() < kHeaderSize ||
|
| - memcmp(kPRegFileHeader, mapped_file.data(), kHeaderSize) != 0) {
|
| - LOG(ERROR) << "Bad policy file " << file_path.value();
|
| - status->Add(POLICY_LOAD_STATUS_PARSE_ERROR);
|
| - return false;
|
| - }
|
| -
|
| - // Parse file contents, which is UCS-2 and little-endian. The latter I
|
| - // couldn't find documentation on, but the example I saw were all
|
| - // little-endian. It'd be interesting to check on big-endian hardware.
|
| - const uint8* cursor = mapped_file.data() + kHeaderSize;
|
| - const uint8* end = mapped_file.data() + mapped_file.length();
|
| - while (true) {
|
| - if (cursor == end)
|
| - return true;
|
| -
|
| - if (NextChar(&cursor, end) != kDelimBracketOpen)
|
| - break;
|
| -
|
| - // Read the record fields.
|
| - string16 key_name;
|
| - string16 value;
|
| - uint32 type = 0;
|
| - uint32 size = 0;
|
| - std::vector<uint8> data;
|
| -
|
| - if (!ReadFieldString(&cursor, end, &key_name))
|
| - break;
|
| -
|
| - int current = NextChar(&cursor, end);
|
| - if (current == kDelimSemicolon) {
|
| - if (!ReadFieldString(&cursor, end, &value))
|
| - break;
|
| - current = NextChar(&cursor, end);
|
| - }
|
| -
|
| - if (current == kDelimSemicolon) {
|
| - if (!ReadField32(&cursor, end, &type))
|
| - break;
|
| - current = NextChar(&cursor, end);
|
| - }
|
| -
|
| - if (current == kDelimSemicolon) {
|
| - if (!ReadField32(&cursor, end, &size))
|
| - break;
|
| - current = NextChar(&cursor, end);
|
| - }
|
| -
|
| - if (current == kDelimSemicolon) {
|
| - if (size > kMaxPRegFileSize)
|
| - break;
|
| - data.resize(size);
|
| - if (!ReadFieldBinary(&cursor, end, size, vector_as_array(&data)))
|
| - break;
|
| - current = NextChar(&cursor, end);
|
| - }
|
| -
|
| - if (current != kDelimBracketClose)
|
| - break;
|
| -
|
| - // Process the record if it is within the |root| subtree.
|
| - if (StartsWith(key_name, root, false))
|
| - HandleRecord(key_name.substr(root.size()), value, type, data, dict);
|
| - }
|
| -
|
| - LOG(ERROR) << "Error parsing " << file_path.value() << " at offset "
|
| - << reinterpret_cast<const uint8*>(cursor - 1) - mapped_file.data();
|
| - status->Add(POLICY_LOAD_STATUS_PARSE_ERROR);
|
| - return false;
|
| -}
|
| -
|
| -} // namespace preg_parser
|
| -} // namespace policy
|
|
|