2 * Unix SMB/CIFS implementation.
4 * SPOOLSS RPC Pipe server / winreg client routines
6 * Copyright (c) 2010 Andreas Schneider <asn@samba.org>
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, see <http://www.gnu.org/licenses/>.
23 #include "srv_spoolss_util.h"
24 #include "../librpc/gen_ndr/srv_winreg.h"
25 #include "../librpc/gen_ndr/cli_winreg.h"
27 #define TOP_LEVEL_PRINT_KEY "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print"
28 #define TOP_LEVEL_PRINT_PRINTERS_KEY TOP_LEVEL_PRINT_KEY "\\Printers"
29 #define TOP_LEVEL_CONTROL_KEY "SYSTEM\\CurrentControlSet\\Control\\Print"
30 #define TOP_LEVEL_CONTROL_FORMS_KEY TOP_LEVEL_CONTROL_KEY "\\Forms"
32 /* FLAGS, NAME, with, height, left, top, right, bottom */
33 static const struct spoolss_FormInfo1 builtin_forms1
[] = {
34 { SPOOLSS_FORM_BUILTIN
, "Letter", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
35 { SPOOLSS_FORM_BUILTIN
, "Letter Small", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
36 { SPOOLSS_FORM_BUILTIN
, "Tabloid", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
37 { SPOOLSS_FORM_BUILTIN
, "Ledger", {0x696b8,0x44368}, {0x0,0x0,0x696b8,0x44368} },
38 { SPOOLSS_FORM_BUILTIN
, "Legal", {0x34b5c,0x56d10}, {0x0,0x0,0x34b5c,0x56d10} },
39 { SPOOLSS_FORM_BUILTIN
, "Statement", {0x221b4,0x34b5c}, {0x0,0x0,0x221b4,0x34b5c} },
40 { SPOOLSS_FORM_BUILTIN
, "Executive", {0x2cf56,0x411cc}, {0x0,0x0,0x2cf56,0x411cc} },
41 { SPOOLSS_FORM_BUILTIN
, "A3", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
42 { SPOOLSS_FORM_BUILTIN
, "A4", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
43 { SPOOLSS_FORM_BUILTIN
, "A4 Small", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
44 { SPOOLSS_FORM_BUILTIN
, "A5", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
45 { SPOOLSS_FORM_BUILTIN
, "B4 (JIS)", {0x3ebe8,0x58de0}, {0x0,0x0,0x3ebe8,0x58de0} },
46 { SPOOLSS_FORM_BUILTIN
, "B5 (JIS)", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
47 { SPOOLSS_FORM_BUILTIN
, "Folio", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
48 { SPOOLSS_FORM_BUILTIN
, "Quarto", {0x347d8,0x43238}, {0x0,0x0,0x347d8,0x43238} },
49 { SPOOLSS_FORM_BUILTIN
, "10x14", {0x3e030,0x56d10}, {0x0,0x0,0x3e030,0x56d10} },
50 { SPOOLSS_FORM_BUILTIN
, "11x17", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
51 { SPOOLSS_FORM_BUILTIN
, "Note", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
52 { SPOOLSS_FORM_BUILTIN
, "Envelope #9", {0x18079,0x37091}, {0x0,0x0,0x18079,0x37091} },
53 { SPOOLSS_FORM_BUILTIN
, "Envelope #10", {0x19947,0x3ae94}, {0x0,0x0,0x19947,0x3ae94} },
54 { SPOOLSS_FORM_BUILTIN
, "Envelope #11", {0x1be7c,0x40565}, {0x0,0x0,0x1be7c,0x40565} },
55 { SPOOLSS_FORM_BUILTIN
, "Envelope #12", {0x1d74a,0x44368}, {0x0,0x0,0x1d74a,0x44368} },
56 { SPOOLSS_FORM_BUILTIN
, "Envelope #14", {0x1f018,0x47504}, {0x0,0x0,0x1f018,0x47504} },
57 { SPOOLSS_FORM_BUILTIN
, "C size sheet", {0x696b8,0x886d0}, {0x0,0x0,0x696b8,0x886d0} },
58 { SPOOLSS_FORM_BUILTIN
, "D size sheet", {0x886d0,0xd2d70}, {0x0,0x0,0x886d0,0xd2d70} },
59 { SPOOLSS_FORM_BUILTIN
, "E size sheet", {0xd2d70,0x110da0},{0x0,0x0,0xd2d70,0x110da0} },
60 { SPOOLSS_FORM_BUILTIN
, "Envelope DL", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
61 { SPOOLSS_FORM_BUILTIN
, "Envelope C5", {0x278d0,0x37e88}, {0x0,0x0,0x278d0,0x37e88} },
62 { SPOOLSS_FORM_BUILTIN
, "Envelope C3", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
63 { SPOOLSS_FORM_BUILTIN
, "Envelope C4", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
64 { SPOOLSS_FORM_BUILTIN
, "Envelope C6", {0x1bd50,0x278d0}, {0x0,0x0,0x1bd50,0x278d0} },
65 { SPOOLSS_FORM_BUILTIN
, "Envelope C65", {0x1bd50,0x37e88}, {0x0,0x0,0x1bd50,0x37e88} },
66 { SPOOLSS_FORM_BUILTIN
, "Envelope B4", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
67 { SPOOLSS_FORM_BUILTIN
, "Envelope B5", {0x2af80,0x3d090}, {0x0,0x0,0x2af80,0x3d090} },
68 { SPOOLSS_FORM_BUILTIN
, "Envelope B6", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
69 { SPOOLSS_FORM_BUILTIN
, "Envelope", {0x1adb0,0x38270}, {0x0,0x0,0x1adb0,0x38270} },
70 { SPOOLSS_FORM_BUILTIN
, "Envelope Monarch", {0x18079,0x2e824}, {0x0,0x0,0x18079,0x2e824} },
71 { SPOOLSS_FORM_BUILTIN
, "6 3/4 Envelope", {0x167ab,0x284ec}, {0x0,0x0,0x167ab,0x284ec} },
72 { SPOOLSS_FORM_BUILTIN
, "US Std Fanfold", {0x5c3e1,0x44368}, {0x0,0x0,0x5c3e1,0x44368} },
73 { SPOOLSS_FORM_BUILTIN
, "German Std Fanfold", {0x34b5c,0x4a6a0}, {0x0,0x0,0x34b5c,0x4a6a0} },
74 { SPOOLSS_FORM_BUILTIN
, "German Legal Fanfold", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
75 { SPOOLSS_FORM_BUILTIN
, "B4 (ISO)", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
76 { SPOOLSS_FORM_BUILTIN
, "Japanese Postcard", {0x186a0,0x24220}, {0x0,0x0,0x186a0,0x24220} },
77 { SPOOLSS_FORM_BUILTIN
, "9x11", {0x37cf8,0x44368}, {0x0,0x0,0x37cf8,0x44368} },
78 { SPOOLSS_FORM_BUILTIN
, "10x11", {0x3e030,0x44368}, {0x0,0x0,0x3e030,0x44368} },
79 { SPOOLSS_FORM_BUILTIN
, "15x11", {0x5d048,0x44368}, {0x0,0x0,0x5d048,0x44368} },
80 { SPOOLSS_FORM_BUILTIN
, "Envelope Invite", {0x35b60,0x35b60}, {0x0,0x0,0x35b60,0x35b60} },
81 { SPOOLSS_FORM_BUILTIN
, "Reserved48", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
82 { SPOOLSS_FORM_BUILTIN
, "Reserved49", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
83 { SPOOLSS_FORM_BUILTIN
, "Letter Extra", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
84 { SPOOLSS_FORM_BUILTIN
, "Legal Extra", {0x3ae94,0x5d048}, {0x0,0x0,0x3ae94,0x5d048} },
85 { SPOOLSS_FORM_BUILTIN
, "Tabloid Extra", {0x4a6a0,0x6f9f0}, {0x0,0x0,0x4a6a0,0x6f9f0} },
86 { SPOOLSS_FORM_BUILTIN
, "A4 Extra", {0x397c2,0x4eb16}, {0x0,0x0,0x397c2,0x4eb16} },
87 { SPOOLSS_FORM_BUILTIN
, "Letter Transverse", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
88 { SPOOLSS_FORM_BUILTIN
, "A4 Transverse", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
89 { SPOOLSS_FORM_BUILTIN
, "Letter Extra Transverse", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
90 { SPOOLSS_FORM_BUILTIN
, "Super A", {0x376b8,0x56ea0}, {0x0,0x0,0x376b8,0x56ea0} },
91 { SPOOLSS_FORM_BUILTIN
, "Super B", {0x4a768,0x76e58}, {0x0,0x0,0x4a768,0x76e58} },
92 { SPOOLSS_FORM_BUILTIN
, "Letter Plus", {0x34b5c,0x4eb16}, {0x0,0x0,0x34b5c,0x4eb16} },
93 { SPOOLSS_FORM_BUILTIN
, "A4 Plus", {0x33450,0x50910}, {0x0,0x0,0x33450,0x50910} },
94 { SPOOLSS_FORM_BUILTIN
, "A5 Transverse", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
95 { SPOOLSS_FORM_BUILTIN
, "B5 (JIS) Transverse", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
96 { SPOOLSS_FORM_BUILTIN
, "A3 Extra", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
97 { SPOOLSS_FORM_BUILTIN
, "A5 Extra", {0x2a7b0,0x395f8}, {0x0,0x0,0x2a7b0,0x395f8} },
98 { SPOOLSS_FORM_BUILTIN
, "B5 (ISO) Extra", {0x31128,0x43620}, {0x0,0x0,0x31128,0x43620} },
99 { SPOOLSS_FORM_BUILTIN
, "A2", {0x668a0,0x91050}, {0x0,0x0,0x668a0,0x91050} },
100 { SPOOLSS_FORM_BUILTIN
, "A3 Transverse", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
101 { SPOOLSS_FORM_BUILTIN
, "A3 Extra Transverse", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
102 { SPOOLSS_FORM_BUILTIN
, "Japanese Double Postcard", {0x30d40,0x24220}, {0x0,0x0,0x30d40,0x24220} },
103 { SPOOLSS_FORM_BUILTIN
, "A6", {0x19a28,0x24220}, {0x0,0x0,0x19a28,0x24220} },
104 { SPOOLSS_FORM_BUILTIN
, "Japanese Envelope Kaku #2", {0x3a980,0x510e0}, {0x0,0x0,0x3a980,0x510e0} },
105 { SPOOLSS_FORM_BUILTIN
, "Japanese Envelope Kaku #3", {0x34bc0,0x43a08}, {0x0,0x0,0x34bc0,0x43a08} },
106 { SPOOLSS_FORM_BUILTIN
, "Japanese Envelope Chou #3", {0x1d4c0,0x395f8}, {0x0,0x0,0x1d4c0,0x395f8} },
107 { SPOOLSS_FORM_BUILTIN
, "Japanese Envelope Chou #4", {0x15f90,0x320c8}, {0x0,0x0,0x15f90,0x320c8} },
108 { SPOOLSS_FORM_BUILTIN
, "Letter Rotated", {0x44368,0x34b5c}, {0x0,0x0,0x44368,0x34b5c} },
109 { SPOOLSS_FORM_BUILTIN
, "A3 Rotated", {0x668a0,0x48828}, {0x0,0x0,0x668a0,0x48828} },
110 { SPOOLSS_FORM_BUILTIN
, "A4 Rotated", {0x48828,0x33450}, {0x0,0x0,0x48828,0x33450} },
111 { SPOOLSS_FORM_BUILTIN
, "A5 Rotated", {0x33450,0x24220}, {0x0,0x0,0x33450,0x24220} },
112 { SPOOLSS_FORM_BUILTIN
, "B4 (JIS) Rotated", {0x58de0,0x3ebe8}, {0x0,0x0,0x58de0,0x3ebe8} },
113 { SPOOLSS_FORM_BUILTIN
, "B5 (JIS) Rotated", {0x3ebe8,0x2c6f0}, {0x0,0x0,0x3ebe8,0x2c6f0} },
114 { SPOOLSS_FORM_BUILTIN
, "Japanese Postcard Rotated", {0x24220,0x186a0}, {0x0,0x0,0x24220,0x186a0} },
115 { SPOOLSS_FORM_BUILTIN
, "Double Japan Postcard Rotated", {0x24220,0x30d40}, {0x0,0x0,0x24220,0x30d40} },
116 { SPOOLSS_FORM_BUILTIN
, "A6 Rotated", {0x24220,0x19a28}, {0x0,0x0,0x24220,0x19a28} },
117 { SPOOLSS_FORM_BUILTIN
, "Japan Envelope Kaku #2 Rotated", {0x510e0,0x3a980}, {0x0,0x0,0x510e0,0x3a980} },
118 { SPOOLSS_FORM_BUILTIN
, "Japan Envelope Kaku #3 Rotated", {0x43a08,0x34bc0}, {0x0,0x0,0x43a08,0x34bc0} },
119 { SPOOLSS_FORM_BUILTIN
, "Japan Envelope Chou #3 Rotated", {0x395f8,0x1d4c0}, {0x0,0x0,0x395f8,0x1d4c0} },
120 { SPOOLSS_FORM_BUILTIN
, "Japan Envelope Chou #4 Rotated", {0x320c8,0x15f90}, {0x0,0x0,0x320c8,0x15f90} },
121 { SPOOLSS_FORM_BUILTIN
, "B6 (JIS)", {0x1f400,0x2c6f0}, {0x0,0x0,0x1f400,0x2c6f0} },
122 { SPOOLSS_FORM_BUILTIN
, "B6 (JIS) Rotated", {0x2c6f0,0x1f400}, {0x0,0x0,0x2c6f0,0x1f400} },
123 { SPOOLSS_FORM_BUILTIN
, "12x11", {0x4a724,0x443e1}, {0x0,0x0,0x4a724,0x443e1} },
124 { SPOOLSS_FORM_BUILTIN
, "Japan Envelope You #4", {0x19a28,0x395f8}, {0x0,0x0,0x19a28,0x395f8} },
125 { SPOOLSS_FORM_BUILTIN
, "Japan Envelope You #4 Rotated", {0x395f8,0x19a28}, {0x0,0x0,0x395f8,0x19a28} },
126 { SPOOLSS_FORM_BUILTIN
, "PRC 16K", {0x2de60,0x3f7a0}, {0x0,0x0,0x2de60,0x3f7a0} },
127 { SPOOLSS_FORM_BUILTIN
, "PRC 32K", {0x1fbd0,0x2cec0}, {0x0,0x0,0x1fbd0,0x2cec0} },
128 { SPOOLSS_FORM_BUILTIN
, "PRC 32K(Big)", {0x222e0,0x318f8}, {0x0,0x0,0x222e0,0x318f8} },
129 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #1", {0x18e70,0x28488}, {0x0,0x0,0x18e70,0x28488} },
130 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #2", {0x18e70,0x2af80}, {0x0,0x0,0x18e70,0x2af80} },
131 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #3", {0x1e848,0x2af80}, {0x0,0x0,0x1e848,0x2af80} },
132 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #4", {0x1adb0,0x32c80}, {0x0,0x0,0x1adb0,0x32c80} },
133 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #5", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
134 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #6", {0x1d4c0,0x38270}, {0x0,0x0,0x1d4c0,0x38270} },
135 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #7", {0x27100,0x38270}, {0x0,0x0,0x27100,0x38270} },
136 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #8", {0x1d4c0,0x4b708}, {0x0,0x0,0x1d4c0,0x4b708} },
137 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #9", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
138 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #10", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
139 { SPOOLSS_FORM_BUILTIN
, "PRC 16K Rotated", {0x3f7a0,0x2de60}, {0x0,0x0,0x3f7a0,0x2de60} },
140 { SPOOLSS_FORM_BUILTIN
, "PRC 32K Rotated", {0x2cec0,0x1fbd0}, {0x0,0x0,0x2cec0,0x1fbd0} },
141 { SPOOLSS_FORM_BUILTIN
, "PRC 32K(Big) Rotated", {0x318f8,0x222e0}, {0x0,0x0,0x318f8,0x222e0} },
142 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #1 Rotated", {0x28488,0x18e70}, {0x0,0x0,0x28488,0x18e70} },
143 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #2 Rotated", {0x2af80,0x18e70}, {0x0,0x0,0x2af80,0x18e70} },
144 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #3 Rotated", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
145 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #4 Rotated", {0x32c80,0x1adb0}, {0x0,0x0,0x32c80,0x1adb0} },
146 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #5 Rotated", {0x35b60,0x1adb0}, {0x0,0x0,0x35b60,0x1adb0} },
147 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #6 Rotated", {0x38270,0x1d4c0}, {0x0,0x0,0x38270,0x1d4c0} },
148 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #7 Rotated", {0x38270,0x27100}, {0x0,0x0,0x38270,0x27100} },
149 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #8 Rotated", {0x4b708,0x1d4c0}, {0x0,0x0,0x4b708,0x1d4c0} },
150 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #9 Rotated", {0x4f1a0,0x37e88}, {0x0,0x0,0x4f1a0,0x37e88} },
151 { SPOOLSS_FORM_BUILTIN
, "PRC Envelope #10 Rotated", {0x6fd10,0x4f1a0}, {0x0,0x0,0x6fd10,0x4f1a0} }
154 /********************************************************************
155 static helper functions
156 ********************************************************************/
158 /****************************************************************************
159 Update the changeid time.
160 ****************************************************************************/
164 * @brief Update the ChangeID time of a printer.
166 * This is SO NASTY as some drivers need this to change, others need it
167 * static. This value will change every second, and I must hope that this
168 * is enough..... DON'T CHANGE THIS CODE WITHOUT A TEST MATRIX THE SIZE OF
171 * @return The ChangeID.
173 static uint32_t winreg_printer_rev_changeid(void)
177 get_process_uptime(&tv
);
180 /* Return changeid as msec since spooler restart */
181 return tv
.tv_sec
* 1000 + tv
.tv_usec
/ 1000;
184 * This setting seems to work well but is too untested
185 * to replace the above calculation. Left in for experiementation
186 * of the reader --jerry (Tue Mar 12 09:15:05 CST 2002)
188 return tv
.tv_sec
* 10 + tv
.tv_usec
/ 100000;
195 * @brief Connect to the interal winreg server and open the given printer key.
197 * The function will create the needed subkeys if they don't exist.
199 * @param[in] mem_ctx The memory context to use.
201 * @param[in] server_info The supplied server info.
203 * @param[out] winreg_pipe A pointer for the winreg rpc client pipe.
205 * @param[in] path The path to the key to open.
207 * @param[in] key The key to open.
209 * @param[in] create_key Set to true if the key should be created if it
212 * @param[in] access_mask The access mask to open the key.
214 * @param[out] hive_handle A policy handle for the opened hive.
216 * @param[out] key_handle A policy handle for the opened key.
218 * @return WERR_OK on success, the corresponding DOS error
219 * code if something gone wrong.
221 static WERROR
winreg_printer_openkey(TALLOC_CTX
*mem_ctx
,
222 struct auth_serversupplied_info
*server_info
,
223 struct rpc_pipe_client
**winreg_pipe
,
227 uint32_t access_mask
,
228 struct policy_handle
*hive_handle
,
229 struct policy_handle
*key_handle
)
231 struct rpc_pipe_client
*pipe_handle
;
232 struct winreg_String wkey
, wkeyclass
;
235 WERROR result
= WERR_OK
;
237 /* create winreg connection */
238 status
= rpc_pipe_open_internal(mem_ctx
,
239 &ndr_table_winreg
.syntax_id
,
243 if (!NT_STATUS_IS_OK(status
)) {
244 DEBUG(0, ("winreg_printer_openkey: Could not connect to winreg_pipe: %s\n",
246 return ntstatus_to_werror(status
);
249 status
= rpccli_winreg_OpenHKLM(pipe_handle
,
255 if (!NT_STATUS_IS_OK(status
)) {
256 DEBUG(0, ("winreg_printer_openkey: Could not open HKLM hive: %s\n",
258 talloc_free(pipe_handle
);
259 if (!W_ERROR_IS_OK(result
)) {
262 return ntstatus_to_werror(status
);
266 keyname
= talloc_asprintf(mem_ctx
, "%s\\%s", path
, key
);
268 keyname
= talloc_strdup(mem_ctx
, path
);
270 if (keyname
== NULL
) {
271 talloc_free(pipe_handle
);
279 enum winreg_CreateAction action
= REG_ACTION_NONE
;
281 ZERO_STRUCT(wkeyclass
);
284 status
= rpccli_winreg_CreateKey(pipe_handle
,
296 case REG_ACTION_NONE
:
297 DEBUG(8, ("winreg_printer_openkey:createkey did nothing -- huh?\n"));
299 case REG_CREATED_NEW_KEY
:
300 DEBUG(8, ("winreg_printer_openkey: createkey created %s\n", keyname
));
302 case REG_OPENED_EXISTING_KEY
:
303 DEBUG(8, ("winreg_printer_openkey: createkey opened existing %s\n", keyname
));
307 status
= rpccli_winreg_OpenKey(pipe_handle
,
316 if (!NT_STATUS_IS_OK(status
)) {
317 talloc_free(pipe_handle
);
318 if (!W_ERROR_IS_OK(result
)) {
321 return ntstatus_to_werror(status
);
324 *winreg_pipe
= pipe_handle
;
330 * @brief Create the registry keyname for the given printer.
332 * @param[in] mem_ctx The memory context to use.
334 * @param[in] printer The name of the printer to get the registry key.
336 * @return The registry key or NULL on error.
338 static char *winreg_printer_data_keyname(TALLOC_CTX
*mem_ctx
, const char *printer
) {
339 return talloc_asprintf(mem_ctx
, "%s\\%s", TOP_LEVEL_PRINT_PRINTERS_KEY
, printer
);
345 * @brief Enumerate values of an opened key handle and retrieve the data.
347 * @param[in] mem_ctx The memory context to use.
349 * @param[in] pipe_handle The pipe handle for the rpc connection.
351 * @param[in] key_hnd The opened key handle.
353 * @param[out] pnum_values A pointer to store he number of values found.
355 * @param[out] pnum_values A pointer to store the number of values we found.
357 * @return WERR_OK on success, the corresponding DOS error
358 * code if something gone wrong.
360 static WERROR
winreg_printer_enumvalues(TALLOC_CTX
*mem_ctx
,
361 struct rpc_pipe_client
*pipe_handle
,
362 struct policy_handle
*key_hnd
,
363 uint32_t *pnum_values
,
364 struct spoolss_PrinterEnumValues
**penum_values
)
367 uint32_t num_subkeys
, max_subkeylen
, max_classlen
;
368 uint32_t num_values
, max_valnamelen
, max_valbufsize
;
369 uint32_t secdescsize
;
371 NTTIME last_changed_time
;
372 struct winreg_String classname
;
374 struct spoolss_PrinterEnumValues
*enum_values
;
376 WERROR result
= WERR_OK
;
379 tmp_ctx
= talloc_new(mem_ctx
);
380 if (tmp_ctx
== NULL
) {
384 ZERO_STRUCT(classname
);
386 status
= rpccli_winreg_QueryInfoKey(pipe_handle
,
399 if (!NT_STATUS_IS_OK(status
)) {
400 DEBUG(0, ("winreg_printer_enumvalues: Could not query info: %s\n",
402 if (!W_ERROR_IS_OK(result
)) {
405 result
= ntstatus_to_werror(status
);
409 if (num_values
== 0) {
411 TALLOC_FREE(tmp_ctx
);
415 enum_values
= TALLOC_ARRAY(tmp_ctx
, struct spoolss_PrinterEnumValues
, num_values
);
416 if (enum_values
== NULL
) {
421 for (i
= 0; i
< num_values
; i
++) {
422 struct spoolss_PrinterEnumValues val
;
423 struct winreg_ValNameBuf name_buf
;
424 enum winreg_Type type
= REG_NONE
;
425 uint8_t *data
= NULL
;
431 name_buf
.size
= max_valnamelen
+ 2;
434 data_size
= max_valbufsize
;
435 data
= (uint8_t *) TALLOC(tmp_ctx
, data_size
);
438 status
= rpccli_winreg_EnumValue(pipe_handle
,
448 if (W_ERROR_EQUAL(result
, WERR_NO_MORE_ITEMS
) ) {
450 status
= NT_STATUS_OK
;
454 if (!NT_STATUS_IS_OK(status
)) {
455 DEBUG(0, ("winreg_printer_enumvalues: Could not enumerate values: %s\n",
457 if (!W_ERROR_IS_OK(result
)) {
460 result
= ntstatus_to_werror(status
);
464 if (name_buf
.name
== NULL
) {
465 result
= WERR_INVALID_PARAMETER
;
469 val
.value_name
= talloc_strdup(enum_values
, name_buf
.name
);
470 if (val
.value_name
== NULL
) {
474 val
.value_name_len
= strlen_m_term(val
.value_name
) * 2;
477 val
.data_length
= data_size
;
479 if (val
.data_length
) {
480 val
.data
= talloc(enum_values
, DATA_BLOB
);
481 if (val
.data
== NULL
) {
485 *val
.data
= data_blob_talloc(enum_values
, data
, data_size
);
488 enum_values
[i
] = val
;
491 *pnum_values
= num_values
;
493 *penum_values
= talloc_move(mem_ctx
, &enum_values
);
499 TALLOC_FREE(tmp_ctx
);
506 * @brief Enumerate subkeys of an opened key handle and get the names.
508 * @param[in] mem_ctx The memory context to use.
510 * @param[in] pipe_handle The pipe handle for the rpc connection.
512 * @param[in] key_hnd The opened key handle.
514 * @param[in] pnum_subkeys A pointer to store the number of found subkeys.
516 * @param[in] psubkeys A pointer to an array to store the found names of
519 * @return WERR_OK on success, the corresponding DOS error
520 * code if something gone wrong.
522 static WERROR
winreg_printer_enumkeys(TALLOC_CTX
*mem_ctx
,
523 struct rpc_pipe_client
*pipe_handle
,
524 struct policy_handle
*key_hnd
,
525 uint32_t *pnum_subkeys
,
526 const char ***psubkeys
)
529 const char **subkeys
;
530 uint32_t num_subkeys
, max_subkeylen
, max_classlen
;
531 uint32_t num_values
, max_valnamelen
, max_valbufsize
;
533 NTTIME last_changed_time
;
534 uint32_t secdescsize
;
535 struct winreg_String classname
;
536 WERROR result
= WERR_OK
;
539 tmp_ctx
= talloc_new(mem_ctx
);
540 if (tmp_ctx
== NULL
) {
544 ZERO_STRUCT(classname
);
546 status
= rpccli_winreg_QueryInfoKey(pipe_handle
,
559 if (!NT_STATUS_IS_OK(status
)) {
560 DEBUG(0, ("winreg_printer_enumkeys: Could not query info: %s\n",
562 if (!W_ERROR_IS_OK(result
)) {
565 result
= ntstatus_to_werror(status
);
569 subkeys
= talloc_zero_array(tmp_ctx
, const char *, num_subkeys
+ 2);
570 if (subkeys
== NULL
) {
575 if (num_subkeys
== 0) {
576 subkeys
[0] = talloc_strdup(subkeys
, "");
577 if (subkeys
[0] == NULL
) {
583 *psubkeys
= talloc_move(mem_ctx
, &subkeys
);
586 TALLOC_FREE(tmp_ctx
);
590 for (i
= 0; i
< num_subkeys
; i
++) {
594 struct winreg_StringBuf class_buf
;
595 struct winreg_StringBuf name_buf
;
599 class_buf
.size
= max_classlen
+ 2;
600 class_buf
.length
= 0;
603 name_buf
.size
= max_subkeylen
+ 2;
606 ZERO_STRUCT(modtime
);
608 status
= rpccli_winreg_EnumKey(pipe_handle
,
616 if (W_ERROR_EQUAL(result
, WERR_NO_MORE_ITEMS
) ) {
618 status
= NT_STATUS_OK
;
622 if (!NT_STATUS_IS_OK(status
)) {
623 DEBUG(0, ("winreg_printer_enumkeys: Could not enumerate keys: %s\n",
625 if (!W_ERROR_IS_OK(result
)) {
628 result
= ntstatus_to_werror(status
);
632 if (name_buf
.name
== NULL
) {
633 result
= WERR_INVALID_PARAMETER
;
637 name
= talloc_strdup(subkeys
, name_buf
.name
);
646 *pnum_subkeys
= num_subkeys
;
648 *psubkeys
= talloc_move(mem_ctx
, &subkeys
);
652 TALLOC_FREE(tmp_ctx
);
659 * @brief A function to delete a key and its subkeys recurively.
661 * @param[in] mem_ctx The memory context to use.
663 * @param[in] pipe_handle The pipe handle for the rpc connection.
665 * @param[in] hive_handle A opened hive handle to the key.
667 * @param[in] access_mask The access mask to access the key.
669 * @param[in] key The key to delete
671 * @return WERR_OK on success, the corresponding DOS error
672 * code if something gone wrong.
674 static WERROR
winreg_printer_delete_subkeys(TALLOC_CTX
*mem_ctx
,
675 struct rpc_pipe_client
*pipe_handle
,
676 struct policy_handle
*hive_handle
,
677 uint32_t access_mask
,
680 const char **subkeys
= NULL
;
681 uint32_t num_subkeys
= 0;
682 struct policy_handle key_hnd
;
683 struct winreg_String wkey
;
684 WERROR result
= WERR_OK
;
688 ZERO_STRUCT(key_hnd
);
691 DEBUG(2, ("winreg_printer_delete_subkeys: delete key %s\n", key
));
693 status
= rpccli_winreg_OpenKey(pipe_handle
,
701 if (!NT_STATUS_IS_OK(status
)) {
702 DEBUG(0, ("winreg_printer_delete_subkeys: Could not open key %s: %s\n",
703 wkey
.name
, nt_errstr(status
)));
704 if (!W_ERROR_IS_OK(result
)) {
707 return ntstatus_to_werror(status
);
710 result
= winreg_printer_enumkeys(mem_ctx
,
715 if (!W_ERROR_IS_OK(result
)) {
719 for (i
= 0; i
< num_subkeys
; i
++) {
720 /* create key + subkey */
721 char *subkey
= talloc_asprintf(mem_ctx
, "%s\\%s", key
, subkeys
[i
]);
722 if (subkey
== NULL
) {
726 DEBUG(2, ("winreg_printer_delete_subkeys: delete subkey %s\n", subkey
));
727 result
= winreg_printer_delete_subkeys(mem_ctx
,
732 if (!W_ERROR_IS_OK(result
)) {
737 if (is_valid_policy_hnd(&key_hnd
)) {
738 rpccli_winreg_CloseKey(pipe_handle
, mem_ctx
, &key_hnd
, NULL
);
743 status
= rpccli_winreg_DeleteKey(pipe_handle
,
750 if (is_valid_policy_hnd(&key_hnd
)) {
751 rpccli_winreg_CloseKey(pipe_handle
, mem_ctx
, &key_hnd
, NULL
);
757 static WERROR
winreg_printer_write_sz(TALLOC_CTX
*mem_ctx
,
758 struct rpc_pipe_client
*pipe_handle
,
759 struct policy_handle
*key_handle
,
763 struct winreg_String wvalue
;
765 WERROR result
= WERR_OK
;
770 blob
= data_blob_string_const("");
772 if (!push_reg_sz(mem_ctx
, NULL
, &blob
, data
)) {
773 DEBUG(0, ("winreg_printer_write_sz: Could not marshall string %s for %s\n",
778 status
= rpccli_winreg_SetValue(pipe_handle
,
786 if (!NT_STATUS_IS_OK(status
)) {
787 DEBUG(0, ("winreg_printer_write_sz: Could not set value %s: %s\n",
788 wvalue
.name
, win_errstr(result
)));
789 if (!W_ERROR_IS_OK(result
)) {
790 result
= ntstatus_to_werror(status
);
797 static WERROR
winreg_printer_write_dword(TALLOC_CTX
*mem_ctx
,
798 struct rpc_pipe_client
*pipe_handle
,
799 struct policy_handle
*key_handle
,
803 struct winreg_String wvalue
;
805 WERROR result
= WERR_OK
;
809 blob
= data_blob_talloc(mem_ctx
, NULL
, 4);
810 SIVAL(blob
.data
, 0, data
);
812 status
= rpccli_winreg_SetValue(pipe_handle
,
820 if (!NT_STATUS_IS_OK(status
)) {
821 DEBUG(0, ("winreg_printer_write_dword: Could not set value %s: %s\n",
822 wvalue
.name
, win_errstr(result
)));
823 if (!W_ERROR_IS_OK(result
)) {
824 result
= ntstatus_to_werror(status
);
831 static WERROR
winreg_printer_write_binary(TALLOC_CTX
*mem_ctx
,
832 struct rpc_pipe_client
*pipe_handle
,
833 struct policy_handle
*key_handle
,
837 struct winreg_String wvalue
;
838 WERROR result
= WERR_OK
;
842 status
= rpccli_winreg_SetValue(pipe_handle
,
850 if (!NT_STATUS_IS_OK(status
)) {
851 DEBUG(0, ("winreg_printer_write_binary: Could not set value %s: %s\n",
852 wvalue
.name
, win_errstr(result
)));
853 if (!W_ERROR_IS_OK(result
)) {
854 result
= ntstatus_to_werror(status
);
861 static WERROR
winreg_printer_query_dword(TALLOC_CTX
*mem_ctx
,
862 struct rpc_pipe_client
*pipe_handle
,
863 struct policy_handle
*key_handle
,
867 struct winreg_String wvalue
;
868 enum winreg_Type type
;
869 WERROR result
= WERR_OK
;
870 uint32_t value_len
= 0;
875 status
= rpccli_winreg_QueryValue(pipe_handle
,
881 (uint32_t *) &blob
.length
,
884 if (!NT_STATUS_IS_OK(status
)) {
885 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
886 wvalue
.name
, nt_errstr(status
)));
887 if (!W_ERROR_IS_OK(result
)) {
890 result
= ntstatus_to_werror(status
);
894 if (type
!= REG_DWORD
) {
895 result
= WERR_INVALID_DATATYPE
;
899 if (blob
.length
!= 4) {
900 result
= WERR_INVALID_DATA
;
904 blob
.data
= (uint8_t *) TALLOC(mem_ctx
, blob
.length
);
905 if (blob
.data
== NULL
) {
911 status
= rpccli_winreg_QueryValue(pipe_handle
,
917 (uint32_t *) &blob
.length
,
920 if (!NT_STATUS_IS_OK(status
)) {
921 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
922 wvalue
.name
, nt_errstr(status
)));
923 if (!W_ERROR_IS_OK(result
)) {
924 result
= ntstatus_to_werror(status
);
930 *data
= IVAL(blob
.data
, 0);
936 static WERROR
winreg_printer_write_multi_sz(TALLOC_CTX
*mem_ctx
,
937 struct rpc_pipe_client
*pipe_handle
,
938 struct policy_handle
*key_handle
,
942 struct winreg_String wvalue
;
944 WERROR result
= WERR_OK
;
948 if (!push_reg_multi_sz(mem_ctx
, NULL
, &blob
, data
)) {
951 status
= rpccli_winreg_SetValue(pipe_handle
,
959 if (!NT_STATUS_IS_OK(status
)) {
960 DEBUG(0, ("winreg_printer_write_multi_sz: Could not set value %s: %s\n",
961 wvalue
.name
, win_errstr(result
)));
962 if (!W_ERROR_IS_OK(result
)) {
963 result
= ntstatus_to_werror(status
);
970 static WERROR
winreg_printer_opendriver(TALLOC_CTX
*mem_ctx
,
971 struct auth_serversupplied_info
*server_info
,
972 const char *drivername
,
973 const char *architecture
,
975 uint32_t access_mask
,
977 struct rpc_pipe_client
**winreg_pipe
,
978 struct policy_handle
*hive_hnd
,
979 struct policy_handle
*key_hnd
)
984 key_name
= talloc_asprintf(mem_ctx
, "%s\\Environments\\%s\\Drivers\\Version-%u",
985 TOP_LEVEL_CONTROL_KEY
,
986 architecture
, version
);
991 result
= winreg_printer_openkey(mem_ctx
,
1003 static WERROR
winreg_enumval_to_dword(TALLOC_CTX
*mem_ctx
,
1004 struct spoolss_PrinterEnumValues
*v
,
1005 const char *valuename
, uint32_t *dw
)
1007 /* just return if it is not the one we are looking for */
1008 if (strcmp(valuename
, v
->value_name
) != 0) {
1009 return WERR_NOT_FOUND
;
1012 if (v
->type
!= REG_DWORD
) {
1013 return WERR_INVALID_DATATYPE
;
1016 *dw
= IVAL(v
->data
->data
, 0);
1020 static WERROR
winreg_enumval_to_sz(TALLOC_CTX
*mem_ctx
,
1021 struct spoolss_PrinterEnumValues
*v
,
1022 const char *valuename
, const char **_str
)
1024 /* just return if it is not the one we are looking for */
1025 if (strcmp(valuename
, v
->value_name
) != 0) {
1026 return WERR_NOT_FOUND
;
1029 if (v
->type
!= REG_SZ
) {
1030 return WERR_INVALID_DATATYPE
;
1033 if (!pull_reg_sz(mem_ctx
, NULL
, v
->data
, _str
)) {
1040 static WERROR
winreg_enumval_to_multi_sz(TALLOC_CTX
*mem_ctx
,
1041 struct spoolss_PrinterEnumValues
*v
,
1042 const char *valuename
,
1043 const char ***array
)
1045 /* just return if it is not the one we are looking for */
1046 if (strcmp(valuename
, v
->value_name
) != 0) {
1047 return WERR_NOT_FOUND
;
1050 if (v
->type
!= REG_MULTI_SZ
) {
1051 return WERR_INVALID_DATATYPE
;
1054 if (!pull_reg_multi_sz(mem_ctx
, NULL
, v
->data
, array
)) {
1061 static WERROR
winreg_enumval_to_blob(TALLOC_CTX
*mem_ctx
,
1062 struct spoolss_PrinterEnumValues
*v
,
1063 const char *valuename
,
1066 /* just return if it is not the one we are looking for */
1067 if (strcmp(valuename
, v
->value_name
) != 0) {
1068 return WERR_NOT_FOUND
;
1071 if (v
->type
!= REG_BINARY
) {
1072 return WERR_INVALID_DATATYPE
;
1075 blob
->data
= v
->data
->data
;
1076 blob
->length
= v
->data_length
;
1081 static WERROR
winreg_printer_write_date(TALLOC_CTX
*mem_ctx
,
1082 struct rpc_pipe_client
*pipe_handle
,
1083 struct policy_handle
*key_handle
,
1087 struct winreg_String wvalue
;
1089 WERROR result
= WERR_OK
;
1095 t
= nt_time_to_unix(data
);
1097 str
= talloc_asprintf(mem_ctx
, "%02d/%02d/%04d",
1098 tm
->tm_mon
+ 1, tm
->tm_mday
, tm
->tm_year
+ 1900);
1103 wvalue
.name
= value
;
1104 if (!push_reg_sz(mem_ctx
, NULL
, &blob
, str
)) {
1107 status
= rpccli_winreg_SetValue(pipe_handle
,
1115 if (!NT_STATUS_IS_OK(status
)) {
1116 DEBUG(0, ("winreg_printer_write_date: Could not set value %s: %s\n",
1117 wvalue
.name
, win_errstr(result
)));
1118 if (!W_ERROR_IS_OK(result
)) {
1119 result
= ntstatus_to_werror(status
);
1126 static WERROR
winreg_printer_date_to_NTTIME(const char *str
, NTTIME
*data
)
1133 if (sscanf(str
, "%d/%d/%d",
1134 &tm
.tm_mon
, &tm
.tm_mday
, &tm
.tm_year
) != 3) {
1135 return WERR_INVALID_PARAMETER
;
1142 unix_to_nt_time(data
, t
);
1147 static WERROR
winreg_printer_write_ver(TALLOC_CTX
*mem_ctx
,
1148 struct rpc_pipe_client
*pipe_handle
,
1149 struct policy_handle
*key_handle
,
1153 struct winreg_String wvalue
;
1155 WERROR result
= WERR_OK
;
1159 /* FIXME: check format is right,
1160 * this needs to be something like: 6.1.7600.16385 */
1161 str
= talloc_asprintf(mem_ctx
, "%u.%u.%u.%u",
1162 (unsigned)((data
>> 48) & 0xFFFF),
1163 (unsigned)((data
>> 32) & 0xFFFF),
1164 (unsigned)((data
>> 16) & 0xFFFF),
1165 (unsigned)(data
& 0xFFFF));
1170 wvalue
.name
= value
;
1171 if (!push_reg_sz(mem_ctx
, NULL
, &blob
, str
)) {
1174 status
= rpccli_winreg_SetValue(pipe_handle
,
1182 if (!NT_STATUS_IS_OK(status
)) {
1183 DEBUG(0, ("winreg_printer_write_date: Could not set value %s: %s\n",
1184 wvalue
.name
, win_errstr(result
)));
1185 if (!W_ERROR_IS_OK(result
)) {
1186 result
= ntstatus_to_werror(status
);
1193 static WERROR
winreg_printer_ver_to_dword(const char *str
, uint64_t *data
)
1195 unsigned int v1
, v2
, v3
, v4
;
1197 if (sscanf(str
, "%u.%u.%u.%u", &v1
, &v2
, &v3
, &v4
) != 4) {
1198 return WERR_INVALID_PARAMETER
;
1201 *data
= ((uint64_t)(v1
& 0xFFFF) << 48) +
1202 ((uint64_t)(v2
& 0xFFFF) << 32) +
1203 ((uint64_t)(v3
& 0xFFFF) << 16) +
1204 (uint64_t)(v2
& 0xFFFF);
1209 /********************************************************************
1210 Public winreg function for spoolss
1211 ********************************************************************/
1213 /* Set printer data over the winreg pipe. */
1214 WERROR
winreg_set_printer_dataex(TALLOC_CTX
*mem_ctx
,
1215 struct auth_serversupplied_info
*server_info
,
1216 const char *printer
,
1219 enum winreg_Type type
,
1223 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1224 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1225 struct policy_handle hive_hnd
, key_hnd
;
1226 struct winreg_String wvalue
;
1228 WERROR result
= WERR_OK
;
1230 TALLOC_CTX
*tmp_ctx
;
1232 tmp_ctx
= talloc_new(mem_ctx
);
1233 if (tmp_ctx
== NULL
) {
1237 path
= winreg_printer_data_keyname(tmp_ctx
, printer
);
1239 TALLOC_FREE(tmp_ctx
);
1243 ZERO_STRUCT(hive_hnd
);
1244 ZERO_STRUCT(key_hnd
);
1246 DEBUG(8, ("winreg_set_printer_dataex: Open printer key %s, value %s, access_mask: 0x%05x for [%s]\n",
1247 key
, value
, access_mask
, printer
));
1248 result
= winreg_printer_openkey(tmp_ctx
,
1257 if (!W_ERROR_IS_OK(result
)) {
1258 DEBUG(0, ("winreg_set_printer_dataex: Could not open key %s: %s\n",
1259 key
, win_errstr(result
)));
1263 wvalue
.name
= value
;
1264 status
= rpccli_winreg_SetValue(winreg_pipe
,
1272 if (!NT_STATUS_IS_OK(status
)) {
1273 DEBUG(0, ("winreg_set_printer_dataex: Could not set value %s: %s\n",
1274 value
, nt_errstr(status
)));
1275 if (!W_ERROR_IS_OK(result
)) {
1278 result
= ntstatus_to_werror(status
);
1284 if (winreg_pipe
!= NULL
) {
1285 if (is_valid_policy_hnd(&key_hnd
)) {
1286 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1288 if (is_valid_policy_hnd(&hive_hnd
)) {
1289 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
1293 TALLOC_FREE(tmp_ctx
);
1297 /* Get printer data over a winreg pipe. */
1298 WERROR
winreg_get_printer_dataex(TALLOC_CTX
*mem_ctx
,
1299 struct auth_serversupplied_info
*server_info
,
1300 const char *printer
,
1303 enum winreg_Type
*type
,
1305 uint32_t *data_size
)
1307 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1308 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1309 struct policy_handle hive_hnd
, key_hnd
;
1310 struct winreg_String wvalue
;
1311 enum winreg_Type type_in
;
1314 uint32_t data_in_size
= 0;
1315 uint32_t value_len
= 0;
1316 WERROR result
= WERR_OK
;
1318 TALLOC_CTX
*tmp_ctx
;
1320 tmp_ctx
= talloc_new(mem_ctx
);
1321 if (tmp_ctx
== NULL
) {
1325 path
= winreg_printer_data_keyname(tmp_ctx
, printer
);
1327 TALLOC_FREE(tmp_ctx
);
1331 ZERO_STRUCT(hive_hnd
);
1332 ZERO_STRUCT(key_hnd
);
1334 result
= winreg_printer_openkey(tmp_ctx
,
1343 if (!W_ERROR_IS_OK(result
)) {
1344 DEBUG(0, ("winreg_get_printer_dataex: Could not open key %s: %s\n",
1345 key
, win_errstr(result
)));
1349 wvalue
.name
= value
;
1352 * call QueryValue once with data == NULL to get the
1353 * needed memory size to be allocated, then allocate
1354 * data buffer and call again.
1356 status
= rpccli_winreg_QueryValue(winreg_pipe
,
1365 if (!NT_STATUS_IS_OK(status
)) {
1366 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
1367 value
, nt_errstr(status
)));
1368 if (!W_ERROR_IS_OK(result
)) {
1371 result
= ntstatus_to_werror(status
);
1375 data_in
= (uint8_t *) TALLOC(tmp_ctx
, data_in_size
);
1376 if (data_in
== NULL
) {
1377 result
= WERR_NOMEM
;
1382 status
= rpccli_winreg_QueryValue(winreg_pipe
,
1391 if (!NT_STATUS_IS_OK(status
)) {
1392 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
1393 value
, nt_errstr(status
)));
1394 if (!W_ERROR_IS_OK(result
)) {
1395 result
= ntstatus_to_werror(status
);
1401 *data_size
= data_in_size
;
1403 *data
= talloc_move(mem_ctx
, &data_in
);
1408 if (winreg_pipe
!= NULL
) {
1409 if (is_valid_policy_hnd(&key_hnd
)) {
1410 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1412 if (is_valid_policy_hnd(&hive_hnd
)) {
1413 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
1417 TALLOC_FREE(tmp_ctx
);
1421 /* Enumerate on the values of a given key and provide the data. */
1422 WERROR
winreg_enum_printer_dataex(TALLOC_CTX
*mem_ctx
,
1423 struct auth_serversupplied_info
*server_info
,
1424 const char *printer
,
1426 uint32_t *pnum_values
,
1427 struct spoolss_PrinterEnumValues
**penum_values
)
1429 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1430 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1431 struct policy_handle hive_hnd
, key_hnd
;
1433 struct spoolss_PrinterEnumValues
*enum_values
= NULL
;
1434 uint32_t num_values
= 0;
1436 WERROR result
= WERR_OK
;
1438 TALLOC_CTX
*tmp_ctx
;
1440 tmp_ctx
= talloc_new(mem_ctx
);
1441 if (tmp_ctx
== NULL
) {
1445 path
= winreg_printer_data_keyname(tmp_ctx
, printer
);
1447 TALLOC_FREE(tmp_ctx
);
1451 result
= winreg_printer_openkey(tmp_ctx
,
1460 if (!W_ERROR_IS_OK(result
)) {
1461 DEBUG(0, ("winreg_enum_printer_dataex: Could not open key %s: %s\n",
1462 key
, win_errstr(result
)));
1466 result
= winreg_printer_enumvalues(tmp_ctx
,
1471 if (!W_ERROR_IS_OK(result
)) {
1472 DEBUG(0, ("winreg_enum_printer_dataex: Could not enumerate values in %s: %s\n",
1473 key
, win_errstr(result
)));
1477 *pnum_values
= num_values
;
1479 *penum_values
= talloc_move(mem_ctx
, &enum_values
);
1484 if (winreg_pipe
!= NULL
) {
1485 if (is_valid_policy_hnd(&key_hnd
)) {
1486 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1488 if (is_valid_policy_hnd(&hive_hnd
)) {
1489 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
1493 TALLOC_FREE(tmp_ctx
);
1497 /* Delete printer data over a winreg pipe. */
1498 WERROR
winreg_delete_printer_dataex(TALLOC_CTX
*mem_ctx
,
1499 struct auth_serversupplied_info
*server_info
,
1500 const char *printer
,
1504 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1505 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1506 struct policy_handle hive_hnd
, key_hnd
;
1507 struct winreg_String wvalue
;
1509 WERROR result
= WERR_OK
;
1512 TALLOC_CTX
*tmp_ctx
;
1514 tmp_ctx
= talloc_new(mem_ctx
);
1515 if (tmp_ctx
== NULL
) {
1519 path
= winreg_printer_data_keyname(tmp_ctx
, printer
);
1521 TALLOC_FREE(tmp_ctx
);
1525 ZERO_STRUCT(hive_hnd
);
1526 ZERO_STRUCT(key_hnd
);
1528 result
= winreg_printer_openkey(tmp_ctx
,
1537 if (!W_ERROR_IS_OK(result
)) {
1538 DEBUG(0, ("winreg_delete_printer_dataex: Could not open key %s: %s\n",
1539 key
, win_errstr(result
)));
1543 wvalue
.name
= value
;
1544 status
= rpccli_winreg_DeleteValue(winreg_pipe
,
1549 if (!NT_STATUS_IS_OK(status
)) {
1550 DEBUG(0, ("winreg_delete_printer_dataex: Could not delete value %s: %s\n",
1551 value
, nt_errstr(status
)));
1552 if (!W_ERROR_IS_OK(result
)) {
1555 result
= ntstatus_to_werror(status
);
1561 if (winreg_pipe
!= NULL
) {
1562 if (is_valid_policy_hnd(&key_hnd
)) {
1563 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1565 if (is_valid_policy_hnd(&hive_hnd
)) {
1566 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
1570 TALLOC_FREE(tmp_ctx
);
1574 /* Enumerate on the subkeys of a given key and provide the data. */
1575 WERROR
winreg_enum_printer_key(TALLOC_CTX
*mem_ctx
,
1576 struct auth_serversupplied_info
*server_info
,
1577 const char *printer
,
1579 uint32_t *pnum_subkeys
,
1580 const char ***psubkeys
)
1582 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1583 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1584 struct policy_handle hive_hnd
, key_hnd
;
1586 const char **subkeys
= NULL
;
1587 uint32_t num_subkeys
= -1;
1589 WERROR result
= WERR_OK
;
1591 TALLOC_CTX
*tmp_ctx
;
1593 tmp_ctx
= talloc_new(mem_ctx
);
1594 if (tmp_ctx
== NULL
) {
1598 path
= winreg_printer_data_keyname(tmp_ctx
, printer
);
1600 TALLOC_FREE(tmp_ctx
);
1604 ZERO_STRUCT(hive_hnd
);
1605 ZERO_STRUCT(key_hnd
);
1607 result
= winreg_printer_openkey(tmp_ctx
,
1616 if (!W_ERROR_IS_OK(result
)) {
1617 DEBUG(0, ("winreg_enum_printer_key: Could not open key %s: %s\n",
1618 key
, win_errstr(result
)));
1622 result
= winreg_printer_enumkeys(tmp_ctx
,
1627 if (!W_ERROR_IS_OK(result
)) {
1628 DEBUG(0, ("winreg_enum_printer_key: Could not enumerate subkeys in %s: %s\n",
1629 key
, win_errstr(result
)));
1633 *pnum_subkeys
= num_subkeys
;
1635 *psubkeys
= talloc_move(mem_ctx
, &subkeys
);
1640 if (winreg_pipe
!= NULL
) {
1641 if (is_valid_policy_hnd(&key_hnd
)) {
1642 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1644 if (is_valid_policy_hnd(&hive_hnd
)) {
1645 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
1649 TALLOC_FREE(tmp_ctx
);
1653 /* Delete a key with subkeys of a given printer. */
1654 WERROR
winreg_delete_printer_key(TALLOC_CTX
*mem_ctx
,
1655 struct auth_serversupplied_info
*server_info
,
1656 const char *printer
,
1659 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1660 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1661 struct policy_handle hive_hnd
, key_hnd
;
1665 TALLOC_CTX
*tmp_ctx
;
1667 tmp_ctx
= talloc_new(mem_ctx
);
1668 if (tmp_ctx
== NULL
) {
1672 path
= winreg_printer_data_keyname(tmp_ctx
, printer
);
1674 TALLOC_FREE(tmp_ctx
);
1678 result
= winreg_printer_openkey(tmp_ctx
,
1687 if (!W_ERROR_IS_OK(result
)) {
1688 /* key doesn't exist */
1689 if (W_ERROR_EQUAL(result
, WERR_BADFILE
)) {
1694 DEBUG(0, ("winreg_delete_printer_key: Could not open key %s: %s\n",
1695 key
, win_errstr(result
)));
1699 if (is_valid_policy_hnd(&key_hnd
)) {
1700 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1703 keyname
= talloc_asprintf(tmp_ctx
,
1707 if (keyname
== NULL
) {
1708 result
= WERR_NOMEM
;
1712 result
= winreg_printer_delete_subkeys(tmp_ctx
,
1717 if (!W_ERROR_IS_OK(result
)) {
1718 DEBUG(0, ("winreg_delete_printer_key: Could not delete key %s: %s\n",
1719 key
, win_errstr(result
)));
1724 if (winreg_pipe
!= NULL
) {
1725 if (is_valid_policy_hnd(&key_hnd
)) {
1726 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1728 if (is_valid_policy_hnd(&hive_hnd
)) {
1729 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
1733 TALLOC_FREE(tmp_ctx
);
1737 WERROR
winreg_printer_update_changeid(TALLOC_CTX
*mem_ctx
,
1738 struct auth_serversupplied_info
*server_info
,
1739 const char *printer
)
1741 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1742 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1743 struct policy_handle hive_hnd
, key_hnd
;
1746 TALLOC_CTX
*tmp_ctx
;
1748 tmp_ctx
= talloc_new(mem_ctx
);
1749 if (tmp_ctx
== NULL
) {
1753 path
= winreg_printer_data_keyname(tmp_ctx
, printer
);
1755 TALLOC_FREE(tmp_ctx
);
1759 ZERO_STRUCT(hive_hnd
);
1760 ZERO_STRUCT(key_hnd
);
1762 result
= winreg_printer_openkey(tmp_ctx
,
1771 if (!W_ERROR_IS_OK(result
)) {
1772 DEBUG(0, ("winreg_printer_update_changeid: Could not open key %s: %s\n",
1773 path
, win_errstr(result
)));
1777 result
= winreg_printer_write_dword(tmp_ctx
,
1781 winreg_printer_rev_changeid());
1782 if (!W_ERROR_IS_OK(result
)) {
1788 if (winreg_pipe
!= NULL
) {
1789 if (is_valid_policy_hnd(&key_hnd
)) {
1790 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1792 if (is_valid_policy_hnd(&hive_hnd
)) {
1793 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
1797 TALLOC_FREE(tmp_ctx
);
1801 WERROR
winreg_printer_get_changeid(TALLOC_CTX
*mem_ctx
,
1802 struct auth_serversupplied_info
*server_info
,
1803 const char *printer
,
1804 uint32_t *pchangeid
)
1806 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1807 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1808 struct policy_handle hive_hnd
, key_hnd
;
1809 uint32_t changeid
= 0;
1812 TALLOC_CTX
*tmp_ctx
;
1814 tmp_ctx
= talloc_new(mem_ctx
);
1815 if (tmp_ctx
== NULL
) {
1819 path
= winreg_printer_data_keyname(tmp_ctx
, printer
);
1821 TALLOC_FREE(tmp_ctx
);
1825 ZERO_STRUCT(hive_hnd
);
1826 ZERO_STRUCT(key_hnd
);
1828 result
= winreg_printer_openkey(tmp_ctx
,
1837 if (!W_ERROR_IS_OK(result
)) {
1838 DEBUG(0, ("winreg_printer_get_changeid: Could not open key %s: %s\n",
1839 path
, win_errstr(result
)));
1843 DEBUG(0, ("winreg_printer_get_changeid: get changeid from %s\n", path
));
1844 result
= winreg_printer_query_dword(tmp_ctx
,
1849 if (!W_ERROR_IS_OK(result
)) {
1854 *pchangeid
= changeid
;
1859 if (winreg_pipe
!= NULL
) {
1860 if (is_valid_policy_hnd(&key_hnd
)) {
1861 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1863 if (is_valid_policy_hnd(&hive_hnd
)) {
1864 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
1868 TALLOC_FREE(tmp_ctx
);
1873 * The special behaviour of the spoolss forms is documented at the website:
1875 * Managing Win32 Printserver Forms
1876 * http://unixwiz.net/techtips/winspooler-forms.html
1879 WERROR
winreg_printer_addform1(TALLOC_CTX
*mem_ctx
,
1880 struct auth_serversupplied_info
*server_info
,
1881 struct spoolss_AddFormInfo1
*form
)
1883 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1884 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1885 struct policy_handle hive_hnd
, key_hnd
;
1886 struct winreg_String wvalue
;
1888 uint32_t num_info
= 0;
1889 union spoolss_FormInfo
*info
= NULL
;
1893 TALLOC_CTX
*tmp_ctx
;
1895 tmp_ctx
= talloc_new(mem_ctx
);
1896 if (tmp_ctx
== NULL
) {
1900 ZERO_STRUCT(hive_hnd
);
1901 ZERO_STRUCT(key_hnd
);
1903 result
= winreg_printer_openkey(tmp_ctx
,
1906 TOP_LEVEL_CONTROL_FORMS_KEY
,
1912 if (!W_ERROR_IS_OK(result
)) {
1913 DEBUG(0, ("winreg_printer_addform1: Could not open key %s: %s\n",
1914 TOP_LEVEL_CONTROL_FORMS_KEY
, win_errstr(result
)));
1918 result
= winreg_printer_enumforms1(tmp_ctx
, server_info
, &num_info
, &info
);
1919 if (!W_ERROR_IS_OK(result
)) {
1920 DEBUG(0, ("winreg_printer_addform: Could not enum keys %s: %s\n",
1921 TOP_LEVEL_CONTROL_FORMS_KEY
, win_errstr(result
)));
1925 /* If form name already exists or is builtin return ALREADY_EXISTS */
1926 for (i
= 0; i
< num_info
; i
++) {
1927 if (strequal(info
[i
].info1
.form_name
, form
->form_name
)) {
1928 result
= WERR_FILE_EXISTS
;
1933 wvalue
.name
= form
->form_name
;
1935 blob
= data_blob_talloc(tmp_ctx
, NULL
, 32);
1936 SIVAL(blob
.data
, 0, form
->size
.width
);
1937 SIVAL(blob
.data
, 4, form
->size
.height
);
1938 SIVAL(blob
.data
, 8, form
->area
.left
);
1939 SIVAL(blob
.data
, 12, form
->area
.top
);
1940 SIVAL(blob
.data
, 16, form
->area
.right
);
1941 SIVAL(blob
.data
, 20, form
->area
.bottom
);
1942 SIVAL(blob
.data
, 24, num_info
+ 1); /* FIXME */
1943 SIVAL(blob
.data
, 28, form
->flags
);
1945 status
= rpccli_winreg_SetValue(winreg_pipe
,
1953 if (!NT_STATUS_IS_OK(status
)) {
1954 DEBUG(0, ("winreg_printer_addform1: Could not set value %s: %s\n",
1955 wvalue
.name
, nt_errstr(status
)));
1956 if (!W_ERROR_IS_OK(result
)) {
1959 result
= ntstatus_to_werror(status
);
1965 if (winreg_pipe
!= NULL
) {
1966 if (is_valid_policy_hnd(&key_hnd
)) {
1967 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
1969 if (is_valid_policy_hnd(&hive_hnd
)) {
1970 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
1975 TALLOC_FREE(tmp_ctx
);
1979 WERROR
winreg_printer_enumforms1(TALLOC_CTX
*mem_ctx
,
1980 struct auth_serversupplied_info
*server_info
,
1981 uint32_t *pnum_info
,
1982 union spoolss_FormInfo
**pinfo
)
1984 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
1985 struct rpc_pipe_client
*winreg_pipe
= NULL
;
1986 struct policy_handle hive_hnd
, key_hnd
;
1987 union spoolss_FormInfo
*info
;
1988 struct spoolss_PrinterEnumValues
*enum_values
= NULL
;
1989 uint32_t num_values
= 0;
1990 uint32_t num_builtin
= ARRAY_SIZE(builtin_forms1
);
1993 TALLOC_CTX
*tmp_ctx
;
1995 tmp_ctx
= talloc_new(mem_ctx
);
1996 if (tmp_ctx
== NULL
) {
2000 ZERO_STRUCT(hive_hnd
);
2001 ZERO_STRUCT(key_hnd
);
2003 result
= winreg_printer_openkey(tmp_ctx
,
2006 TOP_LEVEL_CONTROL_FORMS_KEY
,
2012 if (!W_ERROR_IS_OK(result
)) {
2013 /* key doesn't exist */
2014 if (W_ERROR_EQUAL(result
, WERR_BADFILE
)) {
2019 DEBUG(0, ("winreg_printer_enumforms1: Could not open key %s: %s\n",
2020 TOP_LEVEL_CONTROL_FORMS_KEY
, win_errstr(result
)));
2024 result
= winreg_printer_enumvalues(tmp_ctx
,
2029 if (!W_ERROR_IS_OK(result
)) {
2030 DEBUG(0, ("winreg_printer_enumforms1: Could not enumerate values in %s: %s\n",
2031 TOP_LEVEL_CONTROL_FORMS_KEY
, win_errstr(result
)));
2035 info
= TALLOC_ARRAY(tmp_ctx
, union spoolss_FormInfo
, num_builtin
+ num_values
);
2037 result
= WERR_NOMEM
;
2041 /* Enumerate BUILTIN forms */
2042 for (i
= 0; i
< num_builtin
; i
++) {
2043 info
[i
].info1
= builtin_forms1
[i
];
2046 /* Enumerate registry forms */
2047 for (i
= 0; i
< num_values
; i
++) {
2048 union spoolss_FormInfo val
;
2050 if (enum_values
[i
].type
!= REG_BINARY
||
2051 enum_values
[i
].data_length
!= 32) {
2055 val
.info1
.form_name
= talloc_strdup(info
, enum_values
[i
].value_name
);
2056 if (val
.info1
.form_name
== NULL
) {
2057 result
= WERR_NOMEM
;
2061 val
.info1
.size
.width
= IVAL(enum_values
[i
].data
->data
, 0);
2062 val
.info1
.size
.height
= IVAL(enum_values
[i
].data
->data
, 4);
2063 val
.info1
.area
.left
= IVAL(enum_values
[i
].data
->data
, 8);
2064 val
.info1
.area
.top
= IVAL(enum_values
[i
].data
->data
, 12);
2065 val
.info1
.area
.right
= IVAL(enum_values
[i
].data
->data
, 16);
2066 val
.info1
.area
.bottom
= IVAL(enum_values
[i
].data
->data
, 20);
2067 /* skip form index IVAL(enum_values[i].data->data, 24)));*/
2068 val
.info1
.flags
= IVAL(enum_values
[i
].data
->data
, 28);
2070 info
[i
+ num_builtin
] = val
;
2073 *pnum_info
= num_builtin
+ num_values
;
2075 *pinfo
= talloc_move(mem_ctx
, &info
);
2079 if (winreg_pipe
!= NULL
) {
2080 if (is_valid_policy_hnd(&key_hnd
)) {
2081 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
2083 if (is_valid_policy_hnd(&hive_hnd
)) {
2084 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
2088 TALLOC_FREE(enum_values
);
2089 TALLOC_FREE(tmp_ctx
);
2093 WERROR
winreg_printer_deleteform1(TALLOC_CTX
*mem_ctx
,
2094 struct auth_serversupplied_info
*server_info
,
2095 const char *form_name
)
2097 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
2098 struct rpc_pipe_client
*winreg_pipe
= NULL
;
2099 struct policy_handle hive_hnd
, key_hnd
;
2100 struct winreg_String wvalue
;
2101 uint32_t num_builtin
= ARRAY_SIZE(builtin_forms1
);
2103 WERROR result
= WERR_OK
;
2105 TALLOC_CTX
*tmp_ctx
;
2107 for (i
= 0; i
< num_builtin
; i
++) {
2108 if (strequal(builtin_forms1
[i
].form_name
, form_name
)) {
2109 return WERR_INVALID_PARAMETER
;
2113 tmp_ctx
= talloc_new(mem_ctx
);
2114 if (tmp_ctx
== NULL
) {
2118 ZERO_STRUCT(hive_hnd
);
2119 ZERO_STRUCT(key_hnd
);
2121 result
= winreg_printer_openkey(tmp_ctx
,
2124 TOP_LEVEL_CONTROL_FORMS_KEY
,
2130 if (!W_ERROR_IS_OK(result
)) {
2131 DEBUG(0, ("winreg_printer_deleteform1: Could not open key %s: %s\n",
2132 TOP_LEVEL_CONTROL_FORMS_KEY
, win_errstr(result
)));
2133 if (W_ERROR_EQUAL(result
, WERR_BADFILE
)) {
2134 result
= WERR_INVALID_FORM_NAME
;
2139 wvalue
.name
= form_name
;
2140 status
= rpccli_winreg_DeleteValue(winreg_pipe
,
2145 if (!NT_STATUS_IS_OK(status
)) {
2146 /* If the value doesn't exist, return WERR_INVALID_FORM_NAME */
2147 if (W_ERROR_EQUAL(result
, WERR_BADFILE
)) {
2148 result
= WERR_INVALID_FORM_NAME
;
2151 DEBUG(0, ("winreg_printer_delteform1: Could not delete value %s: %s\n",
2152 wvalue
.name
, nt_errstr(status
)));
2153 if (!W_ERROR_IS_OK(result
)) {
2156 result
= ntstatus_to_werror(status
);
2162 if (winreg_pipe
!= NULL
) {
2163 if (is_valid_policy_hnd(&key_hnd
)) {
2164 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
2166 if (is_valid_policy_hnd(&hive_hnd
)) {
2167 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
2171 TALLOC_FREE(tmp_ctx
);
2175 WERROR
winreg_printer_setform1(TALLOC_CTX
*mem_ctx
,
2176 struct auth_serversupplied_info
*server_info
,
2177 const char *form_name
,
2178 struct spoolss_AddFormInfo1
*form
)
2180 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
2181 struct rpc_pipe_client
*winreg_pipe
= NULL
;
2182 struct policy_handle hive_hnd
, key_hnd
;
2183 struct winreg_String wvalue
;
2185 uint32_t num_builtin
= ARRAY_SIZE(builtin_forms1
);
2189 TALLOC_CTX
*tmp_ctx
= NULL
;
2191 for (i
= 0; i
< num_builtin
; i
++) {
2192 if (strequal(builtin_forms1
[i
].form_name
, form
->form_name
)) {
2193 result
= WERR_INVALID_PARAM
;
2198 tmp_ctx
= talloc_new(mem_ctx
);
2199 if (tmp_ctx
== NULL
) {
2203 ZERO_STRUCT(hive_hnd
);
2204 ZERO_STRUCT(key_hnd
);
2206 result
= winreg_printer_openkey(tmp_ctx
,
2209 TOP_LEVEL_CONTROL_FORMS_KEY
,
2215 if (!W_ERROR_IS_OK(result
)) {
2216 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
2217 TOP_LEVEL_CONTROL_FORMS_KEY
, win_errstr(result
)));
2221 /* If form_name != form->form_name then we renamed the form */
2222 if (strequal(form_name
, form
->form_name
)) {
2223 result
= winreg_printer_deleteform1(tmp_ctx
, server_info
, form_name
);
2224 if (!W_ERROR_IS_OK(result
)) {
2225 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
2226 TOP_LEVEL_CONTROL_FORMS_KEY
, win_errstr(result
)));
2231 wvalue
.name
= form
->form_name
;
2233 blob
= data_blob_talloc(tmp_ctx
, NULL
, 32);
2234 SIVAL(blob
.data
, 0, form
->size
.width
);
2235 SIVAL(blob
.data
, 4, form
->size
.height
);
2236 SIVAL(blob
.data
, 8, form
->area
.left
);
2237 SIVAL(blob
.data
, 12, form
->area
.top
);
2238 SIVAL(blob
.data
, 16, form
->area
.right
);
2239 SIVAL(blob
.data
, 20, form
->area
.bottom
);
2240 SIVAL(blob
.data
, 24, 42);
2241 SIVAL(blob
.data
, 28, form
->flags
);
2243 status
= rpccli_winreg_SetValue(winreg_pipe
,
2251 if (!NT_STATUS_IS_OK(status
)) {
2252 DEBUG(0, ("winreg_printer_setform1: Could not set value %s: %s\n",
2253 wvalue
.name
, nt_errstr(status
)));
2254 if (!W_ERROR_IS_OK(result
)) {
2257 result
= ntstatus_to_werror(status
);
2263 if (winreg_pipe
!= NULL
) {
2264 if (is_valid_policy_hnd(&key_hnd
)) {
2265 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
2267 if (is_valid_policy_hnd(&hive_hnd
)) {
2268 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
2272 TALLOC_FREE(tmp_ctx
);
2276 WERROR
winreg_printer_getform1(TALLOC_CTX
*mem_ctx
,
2277 struct auth_serversupplied_info
*server_info
,
2278 const char *form_name
,
2279 struct spoolss_FormInfo1
*r
)
2281 uint32_t access_mask
= SEC_FLAG_MAXIMUM_ALLOWED
;
2282 struct rpc_pipe_client
*winreg_pipe
= NULL
;
2283 struct policy_handle hive_hnd
, key_hnd
;
2284 struct winreg_String wvalue
;
2285 enum winreg_Type type_in
;
2287 uint32_t data_in_size
= 0;
2288 uint32_t value_len
= 0;
2289 uint32_t num_builtin
= ARRAY_SIZE(builtin_forms1
);
2293 TALLOC_CTX
*tmp_ctx
;
2295 /* check builtin forms first */
2296 for (i
= 0; i
< num_builtin
; i
++) {
2297 if (strequal(builtin_forms1
[i
].form_name
, form_name
)) {
2298 *r
= builtin_forms1
[i
];
2303 tmp_ctx
= talloc_new(mem_ctx
);
2304 if (tmp_ctx
== NULL
) {
2308 ZERO_STRUCT(hive_hnd
);
2309 ZERO_STRUCT(key_hnd
);
2311 result
= winreg_printer_openkey(tmp_ctx
,
2314 TOP_LEVEL_CONTROL_FORMS_KEY
,
2320 if (!W_ERROR_IS_OK(result
)) {
2321 DEBUG(0, ("winreg_printer_getform1: Could not open key %s: %s\n",
2322 TOP_LEVEL_CONTROL_FORMS_KEY
, win_errstr(result
)));
2326 wvalue
.name
= form_name
;
2329 * call QueryValue once with data == NULL to get the
2330 * needed memory size to be allocated, then allocate
2331 * data buffer and call again.
2333 status
= rpccli_winreg_QueryValue(winreg_pipe
,
2342 if (!NT_STATUS_IS_OK(status
)) {
2343 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
2344 wvalue
.name
, nt_errstr(status
)));
2345 if (!W_ERROR_IS_OK(result
)) {
2348 result
= ntstatus_to_werror(status
);
2352 data_in
= (uint8_t *) TALLOC(tmp_ctx
, data_in_size
);
2353 if (data_in
== NULL
) {
2354 result
= WERR_NOMEM
;
2359 status
= rpccli_winreg_QueryValue(winreg_pipe
,
2368 if (!NT_STATUS_IS_OK(status
)) {
2369 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
2370 wvalue
.name
, nt_errstr(status
)));
2371 if (!W_ERROR_IS_OK(result
)) {
2374 result
= ntstatus_to_werror(status
);
2378 r
->form_name
= talloc_strdup(mem_ctx
, form_name
);
2379 if (r
->form_name
== NULL
) {
2380 result
= WERR_NOMEM
;
2384 r
->size
.width
= IVAL(data_in
, 0);
2385 r
->size
.height
= IVAL(data_in
, 4);
2386 r
->area
.left
= IVAL(data_in
, 8);
2387 r
->area
.top
= IVAL(data_in
, 12);
2388 r
->area
.right
= IVAL(data_in
, 16);
2389 r
->area
.bottom
= IVAL(data_in
, 20);
2390 /* skip index IVAL(data_in, 24)));*/
2391 r
->flags
= IVAL(data_in
, 28);
2395 if (winreg_pipe
!= NULL
) {
2396 if (is_valid_policy_hnd(&key_hnd
)) {
2397 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &key_hnd
, NULL
);
2399 if (is_valid_policy_hnd(&hive_hnd
)) {
2400 rpccli_winreg_CloseKey(winreg_pipe
, tmp_ctx
, &hive_hnd
, NULL
);
2404 TALLOC_FREE(tmp_ctx
);