s3: Fix an uninitialized variable
[Samba/gebeck_regimport.git] / source3 / utils / net_registry.c
blob4a6af959dc185fabc748e2750fc1a4cca21a43e7
1 /*
2 * Samba Unix/Linux SMB client library
3 * Distributed SMB/CIFS Server Management Utility
4 * Local registry interface
6 * Copyright (C) Michael Adam 2008
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "registry.h"
24 #include "registry/reg_util_token.h"
25 #include "utils/net.h"
26 #include "utils/net_registry_util.h"
27 #include "include/g_lock.h"
31 * Helper functions
35 /**
36 * split given path into hive and remaining path and open the hive key
38 static WERROR open_hive(TALLOC_CTX *ctx, const char *path,
39 uint32 desired_access,
40 struct registry_key **hive,
41 char **subkeyname)
43 WERROR werr;
44 NT_USER_TOKEN *token = NULL;
45 char *hivename = NULL;
46 char *tmp_subkeyname = NULL;
47 TALLOC_CTX *tmp_ctx = talloc_stackframe();
49 if ((hive == NULL) || (subkeyname == NULL)) {
50 werr = WERR_INVALID_PARAM;
51 goto done;
54 werr = split_hive_key(tmp_ctx, path, &hivename, &tmp_subkeyname);
55 if (!W_ERROR_IS_OK(werr)) {
56 goto done;
58 *subkeyname = talloc_strdup(ctx, tmp_subkeyname);
59 if (*subkeyname == NULL) {
60 werr = WERR_NOMEM;
61 goto done;
64 werr = ntstatus_to_werror(registry_create_admin_token(tmp_ctx, &token));
65 if (!W_ERROR_IS_OK(werr)) {
66 goto done;
69 werr = reg_openhive(ctx, hivename, desired_access, token, hive);
70 if (!W_ERROR_IS_OK(werr)) {
71 goto done;
74 werr = WERR_OK;
76 done:
77 TALLOC_FREE(tmp_ctx);
78 return werr;
81 static WERROR open_key(TALLOC_CTX *ctx, const char *path,
82 uint32 desired_access,
83 struct registry_key **key)
85 WERROR werr;
86 char *subkey_name = NULL;
87 struct registry_key *hive = NULL;
88 TALLOC_CTX *tmp_ctx = talloc_stackframe();
90 if ((path == NULL) || (key == NULL)) {
91 return WERR_INVALID_PARAM;
94 werr = open_hive(tmp_ctx, path, desired_access, &hive, &subkey_name);
95 if (!W_ERROR_IS_OK(werr)) {
96 d_fprintf(stderr, _("open_hive failed: %s\n"),
97 win_errstr(werr));
98 goto done;
101 werr = reg_openkey(ctx, hive, subkey_name, desired_access, key);
102 if (!W_ERROR_IS_OK(werr)) {
103 d_fprintf(stderr, _("reg_openkey failed: %s\n"),
104 win_errstr(werr));
105 goto done;
108 werr = WERR_OK;
110 done:
111 TALLOC_FREE(tmp_ctx);
112 return werr;
117 * the main "net registry" function implementations
121 static int net_registry_enumerate(struct net_context *c, int argc,
122 const char **argv)
124 WERROR werr;
125 struct registry_key *key = NULL;
126 TALLOC_CTX *ctx = talloc_stackframe();
127 char *subkey_name;
128 NTTIME modtime;
129 uint32_t count;
130 char *valname = NULL;
131 struct registry_value *valvalue = NULL;
132 int ret = -1;
134 if (argc != 1 || c->display_usage) {
135 d_printf("%s\n%s",
136 _("Usage:"),
137 _("net registry enumerate <path>\n"));
138 d_printf("%s\n%s",
139 _("Example:"),
140 _("net registry enumerate 'HKLM\\Software\\Samba'\n"));
141 goto done;
144 werr = open_key(ctx, argv[0], REG_KEY_READ, &key);
145 if (!W_ERROR_IS_OK(werr)) {
146 d_fprintf(stderr, _("open_key failed: %s\n"), win_errstr(werr));
147 goto done;
150 for (count = 0;
151 werr = reg_enumkey(ctx, key, count, &subkey_name, &modtime),
152 W_ERROR_IS_OK(werr);
153 count++)
155 print_registry_key(subkey_name, &modtime);
157 if (!W_ERROR_EQUAL(WERR_NO_MORE_ITEMS, werr)) {
158 goto done;
161 for (count = 0;
162 werr = reg_enumvalue(ctx, key, count, &valname, &valvalue),
163 W_ERROR_IS_OK(werr);
164 count++)
166 print_registry_value_with_name(valname, valvalue);
168 if (!W_ERROR_EQUAL(WERR_NO_MORE_ITEMS, werr)) {
169 goto done;
172 ret = 0;
173 done:
174 TALLOC_FREE(ctx);
175 return ret;
178 static int net_registry_createkey(struct net_context *c, int argc,
179 const char **argv)
181 WERROR werr;
182 enum winreg_CreateAction action;
183 char *subkeyname;
184 struct registry_key *hivekey = NULL;
185 struct registry_key *subkey = NULL;
186 TALLOC_CTX *ctx = talloc_stackframe();
187 int ret = -1;
189 if (argc != 1 || c->display_usage) {
190 d_printf("%s\n%s",
191 _("Usage:"),
192 _("net registry createkey <path>\n"));
193 d_printf("%s\n%s",
194 _("Example:"),
195 _("net registry createkey "
196 "'HKLM\\Software\\Samba\\smbconf.127.0.0.1'\n"));
197 goto done;
199 if (strlen(argv[0]) == 0) {
200 d_fprintf(stderr, _("error: zero length key name given\n"));
201 goto done;
204 werr = open_hive(ctx, argv[0], REG_KEY_WRITE, &hivekey, &subkeyname);
205 if (!W_ERROR_IS_OK(werr)) {
206 d_fprintf(stderr, _("open_hive failed: %s\n"),
207 win_errstr(werr));
208 goto done;
211 werr = reg_createkey(ctx, hivekey, subkeyname, REG_KEY_WRITE,
212 &subkey, &action);
213 if (!W_ERROR_IS_OK(werr)) {
214 d_fprintf(stderr, _("reg_createkey failed: %s\n"),
215 win_errstr(werr));
216 goto done;
218 switch (action) {
219 case REG_ACTION_NONE:
220 d_printf(_("createkey did nothing -- huh?\n"));
221 break;
222 case REG_CREATED_NEW_KEY:
223 d_printf(_("createkey created %s\n"), argv[0]);
224 break;
225 case REG_OPENED_EXISTING_KEY:
226 d_printf(_("createkey opened existing %s\n"), argv[0]);
227 break;
230 ret = 0;
232 done:
233 TALLOC_FREE(ctx);
234 return ret;
237 static int net_registry_deletekey(struct net_context *c, int argc,
238 const char **argv)
240 WERROR werr;
241 char *subkeyname;
242 struct registry_key *hivekey = NULL;
243 TALLOC_CTX *ctx = talloc_stackframe();
244 int ret = -1;
246 if (argc != 1 || c->display_usage) {
247 d_printf("%s\n%s",
248 _("Usage:"),
249 _("net registry deletekey <path>\n"));
250 d_printf("%s\n%s",
251 _("Example:"),
252 _("net registry deletekey "
253 "'HKLM\\Software\\Samba\\smbconf.127.0.0.1'\n"));
254 goto done;
256 if (strlen(argv[0]) == 0) {
257 d_fprintf(stderr, _("error: zero length key name given\n"));
258 goto done;
261 werr = open_hive(ctx, argv[0], REG_KEY_WRITE, &hivekey, &subkeyname);
262 if (!W_ERROR_IS_OK(werr)) {
263 d_fprintf(stderr, "open_hive %s: %s\n", _("failed"),
264 win_errstr(werr));
265 goto done;
268 werr = reg_deletekey(hivekey, subkeyname);
269 if (!W_ERROR_IS_OK(werr)) {
270 d_fprintf(stderr, "reg_deletekey %s: %s\n", _("failed"),
271 win_errstr(werr));
272 goto done;
275 ret = 0;
277 done:
278 TALLOC_FREE(ctx);
279 return ret;
282 static int net_registry_getvalue_internal(struct net_context *c, int argc,
283 const char **argv, bool raw)
285 WERROR werr;
286 int ret = -1;
287 struct registry_key *key = NULL;
288 struct registry_value *value = NULL;
289 TALLOC_CTX *ctx = talloc_stackframe();
291 if (argc != 2 || c->display_usage) {
292 d_fprintf(stderr, "%s\n%s",
293 _("Usage:"),
294 _("net registry getvalue <key> <valuename>\n"));
295 goto done;
298 werr = open_key(ctx, argv[0], REG_KEY_READ, &key);
299 if (!W_ERROR_IS_OK(werr)) {
300 d_fprintf(stderr, _("open_key failed: %s\n"), win_errstr(werr));
301 goto done;
304 werr = reg_queryvalue(ctx, key, argv[1], &value);
305 if (!W_ERROR_IS_OK(werr)) {
306 d_fprintf(stderr, _("reg_queryvalue failed: %s\n"),
307 win_errstr(werr));
308 goto done;
311 print_registry_value(value, raw);
313 ret = 0;
315 done:
316 TALLOC_FREE(ctx);
317 return ret;
320 static int net_registry_getvalue(struct net_context *c, int argc,
321 const char **argv)
323 return net_registry_getvalue_internal(c, argc, argv, false);
326 static int net_registry_getvalueraw(struct net_context *c, int argc,
327 const char **argv)
329 return net_registry_getvalue_internal(c, argc, argv, true);
332 static int net_registry_setvalue(struct net_context *c, int argc,
333 const char **argv)
335 WERROR werr;
336 struct registry_value value;
337 struct registry_key *key = NULL;
338 int ret = -1;
339 TALLOC_CTX *ctx = talloc_stackframe();
341 if (argc < 4 || c->display_usage) {
342 d_fprintf(stderr, "%s\n%s",
343 _("Usage:"),
344 _("net registry setvalue <key> <valuename> "
345 "<type> [<val>]+\n"));
346 goto done;
349 if (!strequal(argv[2], "multi_sz") && (argc != 4)) {
350 d_fprintf(stderr, _("Too many args for type %s\n"), argv[2]);
351 goto done;
354 if (strequal(argv[2], "dword")) {
355 uint32_t v = strtoul(argv[3], NULL, 10);
356 value.type = REG_DWORD;
357 value.data = data_blob_talloc(ctx, NULL, 4);
358 SIVAL(value.data.data, 0, v);
359 } else if (strequal(argv[2], "sz")) {
360 value.type = REG_SZ;
361 if (!push_reg_sz(ctx, &value.data, argv[3])) {
362 goto done;
364 } else if (strequal(argv[2], "multi_sz")) {
365 const char **array;
366 int count = argc - 3;
367 int i;
368 value.type = REG_MULTI_SZ;
369 array = talloc_zero_array(ctx, const char *, count + 1);
370 if (array == NULL) {
371 goto done;
373 for (i=0; i < count; i++) {
374 array[i] = talloc_strdup(array, argv[count+i]);
375 if (array[i] == NULL) {
376 goto done;
379 if (!push_reg_multi_sz(ctx, &value.data, array)) {
380 goto done;
382 } else {
383 d_fprintf(stderr, _("type \"%s\" not implemented\n"), argv[2]);
384 goto done;
387 werr = open_key(ctx, argv[0], REG_KEY_WRITE, &key);
388 if (!W_ERROR_IS_OK(werr)) {
389 d_fprintf(stderr, _("open_key failed: %s\n"), win_errstr(werr));
390 goto done;
393 werr = reg_setvalue(key, argv[1], &value);
394 if (!W_ERROR_IS_OK(werr)) {
395 d_fprintf(stderr, _("reg_setvalue failed: %s\n"),
396 win_errstr(werr));
397 goto done;
400 ret = 0;
402 done:
403 TALLOC_FREE(ctx);
404 return ret;
407 struct net_registry_increment_state {
408 const char *keyname;
409 const char *valuename;
410 uint32_t increment;
411 uint32_t newvalue;
412 WERROR werr;
415 static void net_registry_increment_fn(void *private_data)
417 struct net_registry_increment_state *state =
418 (struct net_registry_increment_state *)private_data;
419 struct registry_value *value;
420 struct registry_key *key = NULL;
421 uint32_t v;
423 state->werr = open_key(talloc_tos(), state->keyname,
424 REG_KEY_READ|REG_KEY_WRITE, &key);
425 if (!W_ERROR_IS_OK(state->werr)) {
426 d_fprintf(stderr, _("open_key failed: %s\n"),
427 win_errstr(state->werr));
428 goto done;
431 state->werr = reg_queryvalue(key, key, state->valuename, &value);
432 if (!W_ERROR_IS_OK(state->werr)) {
433 d_fprintf(stderr, _("reg_queryvalue failed: %s\n"),
434 win_errstr(state->werr));
435 goto done;
438 if (value->type != REG_DWORD) {
439 d_fprintf(stderr, _("value not a DWORD: %s\n"),
440 str_regtype(value->type));
441 goto done;
444 if (value->data.length < 4) {
445 d_fprintf(stderr, _("value too short for regular DWORD\n"));
446 goto done;
449 v = IVAL(value->data.data, 0);
450 v += state->increment;
451 state->newvalue = v;
453 SIVAL(value->data.data, 0, v);
455 state->werr = reg_setvalue(key, state->valuename, value);
456 if (!W_ERROR_IS_OK(state->werr)) {
457 d_fprintf(stderr, _("reg_setvalue failed: %s\n"),
458 win_errstr(state->werr));
459 goto done;
462 done:
463 TALLOC_FREE(key);
464 return;
467 static int net_registry_increment(struct net_context *c, int argc,
468 const char **argv)
470 struct net_registry_increment_state state;
471 NTSTATUS status;
472 int ret = -1;
474 if (argc < 2 || c->display_usage) {
475 d_fprintf(stderr, "%s\n%s",
476 _("Usage:"),
477 _("net registry increment <key> <valuename> "
478 "[<increment>]\n"));
479 goto done;
482 state.keyname = argv[0];
483 state.valuename = argv[1];
485 state.increment = 1;
486 if (argc == 3) {
487 state.increment = strtoul(argv[2], NULL, 10);
490 status = g_lock_do("registry_increment_lock", G_LOCK_WRITE,
491 timeval_set(600, 0),
492 net_registry_increment_fn, &state);
493 if (!NT_STATUS_IS_OK(status)) {
494 d_fprintf(stderr, _("g_lock_do failed: %s\n"),
495 nt_errstr(status));
496 goto done;
498 if (!W_ERROR_IS_OK(state.werr)) {
499 d_fprintf(stderr, _("increment failed: %s\n"),
500 win_errstr(state.werr));
501 goto done;
504 d_printf(_("%u\n"), (unsigned)state.newvalue);
506 ret = 0;
508 done:
509 return ret;
512 static int net_registry_deletevalue(struct net_context *c, int argc,
513 const char **argv)
515 WERROR werr;
516 struct registry_key *key = NULL;
517 TALLOC_CTX *ctx = talloc_stackframe();
518 int ret = -1;
520 if (argc != 2 || c->display_usage) {
521 d_fprintf(stderr, "%s\n%s",
522 _("Usage:"),
523 _("net registry deletevalue <key> <valuename>\n"));
524 goto done;
527 werr = open_key(ctx, argv[0], REG_KEY_WRITE, &key);
528 if (!W_ERROR_IS_OK(werr)) {
529 d_fprintf(stderr, _("open_key failed: %s\n"), win_errstr(werr));
530 goto done;
533 werr = reg_deletevalue(key, argv[1]);
534 if (!W_ERROR_IS_OK(werr)) {
535 d_fprintf(stderr, _("reg_deletekey failed: %s\n"),
536 win_errstr(werr));
537 goto done;
540 ret = 0;
542 done:
543 TALLOC_FREE(ctx);
544 return ret;
547 static WERROR net_registry_getsd_internal(struct net_context *c,
548 TALLOC_CTX *mem_ctx,
549 const char *keyname,
550 struct security_descriptor **sd)
552 WERROR werr;
553 struct registry_key *key = NULL;
554 TALLOC_CTX *ctx = talloc_stackframe();
555 uint32_t access_mask = REG_KEY_READ |
556 SEC_FLAG_MAXIMUM_ALLOWED |
557 SEC_FLAG_SYSTEM_SECURITY;
560 * net_rpc_regsitry uses SEC_FLAG_SYSTEM_SECURITY, but access
561 * is denied with these perms right now...
563 access_mask = REG_KEY_READ;
565 if (sd == NULL) {
566 d_fprintf(stderr, _("internal error: invalid argument\n"));
567 werr = WERR_INVALID_PARAM;
568 goto done;
571 if (strlen(keyname) == 0) {
572 d_fprintf(stderr, _("error: zero length key name given\n"));
573 werr = WERR_INVALID_PARAM;
574 goto done;
577 werr = open_key(ctx, keyname, access_mask, &key);
578 if (!W_ERROR_IS_OK(werr)) {
579 d_fprintf(stderr, "%s%s\n", _("open_key failed: "),
580 win_errstr(werr));
581 goto done;
584 werr = reg_getkeysecurity(mem_ctx, key, sd);
585 if (!W_ERROR_IS_OK(werr)) {
586 d_fprintf(stderr, "%s%s\n", _("reg_getkeysecurity failed: "),
587 win_errstr(werr));
588 goto done;
591 werr = WERR_OK;
593 done:
594 TALLOC_FREE(ctx);
595 return werr;
598 static int net_registry_getsd(struct net_context *c, int argc,
599 const char **argv)
601 WERROR werr;
602 int ret = -1;
603 struct security_descriptor *secdesc = NULL;
604 TALLOC_CTX *ctx = talloc_stackframe();
606 if (argc != 1 || c->display_usage) {
607 d_printf("%s\n%s",
608 _("Usage:"),
609 _("net registry getsd <path>\n"));
610 d_printf("%s\n%s",
611 _("Example:"),
612 _("net registry getsd 'HKLM\\Software\\Samba'\n"));
613 goto done;
616 werr = net_registry_getsd_internal(c, ctx, argv[0], &secdesc);
617 if (!W_ERROR_IS_OK(werr)) {
618 goto done;
621 display_sec_desc(secdesc);
623 ret = 0;
625 done:
626 TALLOC_FREE(ctx);
627 return ret;
630 static int net_registry_getsd_sddl(struct net_context *c,
631 int argc, const char **argv)
633 WERROR werr;
634 int ret = -1;
635 struct security_descriptor *secdesc = NULL;
636 TALLOC_CTX *ctx = talloc_stackframe();
638 if (argc != 1 || c->display_usage) {
639 d_printf("%s\n%s",
640 _("Usage:"),
641 _("net registry getsd_sddl <path>\n"));
642 d_printf("%s\n%s",
643 _("Example:"),
644 _("net registry getsd_sddl 'HKLM\\Software\\Samba'\n"));
645 goto done;
648 werr = net_registry_getsd_internal(c, ctx, argv[0], &secdesc);
649 if (!W_ERROR_IS_OK(werr)) {
650 goto done;
653 d_printf("%s\n", sddl_encode(ctx, secdesc, get_global_sam_sid()));
655 ret = 0;
657 done:
658 TALLOC_FREE(ctx);
659 return ret;
662 static WERROR net_registry_setsd_internal(struct net_context *c,
663 TALLOC_CTX *mem_ctx,
664 const char *keyname,
665 struct security_descriptor *sd)
667 WERROR werr;
668 struct registry_key *key = NULL;
669 TALLOC_CTX *ctx = talloc_stackframe();
670 uint32_t access_mask = REG_KEY_WRITE |
671 SEC_FLAG_MAXIMUM_ALLOWED |
672 SEC_FLAG_SYSTEM_SECURITY;
675 * net_rpc_regsitry uses SEC_FLAG_SYSTEM_SECURITY, but access
676 * is denied with these perms right now...
678 access_mask = REG_KEY_WRITE;
680 if (strlen(keyname) == 0) {
681 d_fprintf(stderr, _("error: zero length key name given\n"));
682 werr = WERR_INVALID_PARAM;
683 goto done;
686 werr = open_key(ctx, keyname, access_mask, &key);
687 if (!W_ERROR_IS_OK(werr)) {
688 d_fprintf(stderr, "%s%s\n", _("open_key failed: "),
689 win_errstr(werr));
690 goto done;
693 werr = reg_setkeysecurity(key, sd);
694 if (!W_ERROR_IS_OK(werr)) {
695 d_fprintf(stderr, "%s%s\n", _("reg_setkeysecurity failed: "),
696 win_errstr(werr));
697 goto done;
700 werr = WERR_OK;
702 done:
703 TALLOC_FREE(ctx);
704 return werr;
707 static int net_registry_setsd_sddl(struct net_context *c,
708 int argc, const char **argv)
710 WERROR werr;
711 int ret = -1;
712 struct security_descriptor *secdesc = NULL;
713 TALLOC_CTX *ctx = talloc_stackframe();
715 if (argc != 2 || c->display_usage) {
716 d_printf("%s\n%s",
717 _("Usage:"),
718 _("net registry setsd_sddl <path> <security_descriptor>\n"));
719 d_printf("%s\n%s",
720 _("Example:"),
721 _("net registry setsd_sddl 'HKLM\\Software\\Samba'\n"));
722 goto done;
725 secdesc = sddl_decode(ctx, argv[1], get_global_sam_sid());
726 if (secdesc == NULL) {
727 goto done;
730 werr = net_registry_setsd_internal(c, ctx, argv[0], secdesc);
731 if (!W_ERROR_IS_OK(werr)) {
732 goto done;
735 ret = 0;
737 done:
738 TALLOC_FREE(ctx);
739 return ret;
742 int net_registry(struct net_context *c, int argc, const char **argv)
744 int ret = -1;
746 struct functable func[] = {
748 "enumerate",
749 net_registry_enumerate,
750 NET_TRANSPORT_LOCAL,
751 N_("Enumerate registry keys and values"),
752 N_("net registry enumerate\n"
753 " Enumerate registry keys and values")
756 "createkey",
757 net_registry_createkey,
758 NET_TRANSPORT_LOCAL,
759 N_("Create a new registry key"),
760 N_("net registry createkey\n"
761 " Create a new registry key")
764 "deletekey",
765 net_registry_deletekey,
766 NET_TRANSPORT_LOCAL,
767 N_("Delete a registry key"),
768 N_("net registry deletekey\n"
769 " Delete a registry key")
772 "getvalue",
773 net_registry_getvalue,
774 NET_TRANSPORT_LOCAL,
775 N_("Print a registry value"),
776 N_("net registry getvalue\n"
777 " Print a registry value")
780 "getvalueraw",
781 net_registry_getvalueraw,
782 NET_TRANSPORT_LOCAL,
783 N_("Print a registry value (raw format)"),
784 N_("net registry getvalueraw\n"
785 " Print a registry value (raw format)")
788 "setvalue",
789 net_registry_setvalue,
790 NET_TRANSPORT_LOCAL,
791 N_("Set a new registry value"),
792 N_("net registry setvalue\n"
793 " Set a new registry value")
796 "increment",
797 net_registry_increment,
798 NET_TRANSPORT_LOCAL,
799 N_("Increment a DWORD registry value under a lock"),
800 N_("net registry increment\n"
801 " Increment a DWORD registry value under a lock")
804 "deletevalue",
805 net_registry_deletevalue,
806 NET_TRANSPORT_LOCAL,
807 N_("Delete a registry value"),
808 N_("net registry deletevalue\n"
809 " Delete a registry value")
812 "getsd",
813 net_registry_getsd,
814 NET_TRANSPORT_LOCAL,
815 N_("Get security descriptor"),
816 N_("net registry getsd\n"
817 " Get security descriptor")
820 "getsd_sddl",
821 net_registry_getsd_sddl,
822 NET_TRANSPORT_LOCAL,
823 N_("Get security descriptor in sddl format"),
824 N_("net registry getsd_sddl\n"
825 " Get security descriptor in sddl format")
828 "setsd_sddl",
829 net_registry_setsd_sddl,
830 NET_TRANSPORT_LOCAL,
831 N_("Set security descriptor from sddl format string"),
832 N_("net registry setsd_sddl\n"
833 " Set security descriptor from sddl format string")
835 { NULL, NULL, 0, NULL, NULL }
838 if (!W_ERROR_IS_OK(registry_init_basic())) {
839 return -1;
842 ret = net_run_function(c, argc, argv, "net registry", func);
844 return ret;