2 * Unix SMB/CIFS implementation.
4 * SPOOLSS RPC Pipe server / winreg client routines
6 * Copyright (c) 2010 Andreas Schneider <asn@samba.org>
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, see <http://www.gnu.org/licenses/>.
23 #include "srv_spoolss_util.h"
24 #include "../librpc/gen_ndr/srv_winreg.h"
25 #include "../librpc/gen_ndr/cli_winreg.h"
27 #define TOP_LEVEL_PRINT_KEY "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print"
28 #define TOP_LEVEL_PRINT_PRINTERS_KEY TOP_LEVEL_PRINT_KEY "\\Printers"
29 #define TOP_LEVEL_CONTROL_KEY "SYSTEM\\CurrentControlSet\\Control\\Print"
30 #define TOP_LEVEL_CONTROL_FORMS_KEY TOP_LEVEL_CONTROL_KEY "\\Forms"
32 /* FLAGS, NAME, with, height, left, top, right, bottom */
33 static const struct spoolss_FormInfo1 builtin_forms1[] = {
34 { SPOOLSS_FORM_BUILTIN, "Letter", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
35 { SPOOLSS_FORM_BUILTIN, "Letter Small", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
36 { SPOOLSS_FORM_BUILTIN, "Tabloid", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
37 { SPOOLSS_FORM_BUILTIN, "Ledger", {0x696b8,0x44368}, {0x0,0x0,0x696b8,0x44368} },
38 { SPOOLSS_FORM_BUILTIN, "Legal", {0x34b5c,0x56d10}, {0x0,0x0,0x34b5c,0x56d10} },
39 { SPOOLSS_FORM_BUILTIN, "Statement", {0x221b4,0x34b5c}, {0x0,0x0,0x221b4,0x34b5c} },
40 { SPOOLSS_FORM_BUILTIN, "Executive", {0x2cf56,0x411cc}, {0x0,0x0,0x2cf56,0x411cc} },
41 { SPOOLSS_FORM_BUILTIN, "A3", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
42 { SPOOLSS_FORM_BUILTIN, "A4", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
43 { SPOOLSS_FORM_BUILTIN, "A4 Small", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
44 { SPOOLSS_FORM_BUILTIN, "A5", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
45 { SPOOLSS_FORM_BUILTIN, "B4 (JIS)", {0x3ebe8,0x58de0}, {0x0,0x0,0x3ebe8,0x58de0} },
46 { SPOOLSS_FORM_BUILTIN, "B5 (JIS)", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
47 { SPOOLSS_FORM_BUILTIN, "Folio", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
48 { SPOOLSS_FORM_BUILTIN, "Quarto", {0x347d8,0x43238}, {0x0,0x0,0x347d8,0x43238} },
49 { SPOOLSS_FORM_BUILTIN, "10x14", {0x3e030,0x56d10}, {0x0,0x0,0x3e030,0x56d10} },
50 { SPOOLSS_FORM_BUILTIN, "11x17", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
51 { SPOOLSS_FORM_BUILTIN, "Note", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
52 { SPOOLSS_FORM_BUILTIN, "Envelope #9", {0x18079,0x37091}, {0x0,0x0,0x18079,0x37091} },
53 { SPOOLSS_FORM_BUILTIN, "Envelope #10", {0x19947,0x3ae94}, {0x0,0x0,0x19947,0x3ae94} },
54 { SPOOLSS_FORM_BUILTIN, "Envelope #11", {0x1be7c,0x40565}, {0x0,0x0,0x1be7c,0x40565} },
55 { SPOOLSS_FORM_BUILTIN, "Envelope #12", {0x1d74a,0x44368}, {0x0,0x0,0x1d74a,0x44368} },
56 { SPOOLSS_FORM_BUILTIN, "Envelope #14", {0x1f018,0x47504}, {0x0,0x0,0x1f018,0x47504} },
57 { SPOOLSS_FORM_BUILTIN, "C size sheet", {0x696b8,0x886d0}, {0x0,0x0,0x696b8,0x886d0} },
58 { SPOOLSS_FORM_BUILTIN, "D size sheet", {0x886d0,0xd2d70}, {0x0,0x0,0x886d0,0xd2d70} },
59 { SPOOLSS_FORM_BUILTIN, "E size sheet", {0xd2d70,0x110da0},{0x0,0x0,0xd2d70,0x110da0} },
60 { SPOOLSS_FORM_BUILTIN, "Envelope DL", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
61 { SPOOLSS_FORM_BUILTIN, "Envelope C5", {0x278d0,0x37e88}, {0x0,0x0,0x278d0,0x37e88} },
62 { SPOOLSS_FORM_BUILTIN, "Envelope C3", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
63 { SPOOLSS_FORM_BUILTIN, "Envelope C4", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
64 { SPOOLSS_FORM_BUILTIN, "Envelope C6", {0x1bd50,0x278d0}, {0x0,0x0,0x1bd50,0x278d0} },
65 { SPOOLSS_FORM_BUILTIN, "Envelope C65", {0x1bd50,0x37e88}, {0x0,0x0,0x1bd50,0x37e88} },
66 { SPOOLSS_FORM_BUILTIN, "Envelope B4", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
67 { SPOOLSS_FORM_BUILTIN, "Envelope B5", {0x2af80,0x3d090}, {0x0,0x0,0x2af80,0x3d090} },
68 { SPOOLSS_FORM_BUILTIN, "Envelope B6", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
69 { SPOOLSS_FORM_BUILTIN, "Envelope", {0x1adb0,0x38270}, {0x0,0x0,0x1adb0,0x38270} },
70 { SPOOLSS_FORM_BUILTIN, "Envelope Monarch", {0x18079,0x2e824}, {0x0,0x0,0x18079,0x2e824} },
71 { SPOOLSS_FORM_BUILTIN, "6 3/4 Envelope", {0x167ab,0x284ec}, {0x0,0x0,0x167ab,0x284ec} },
72 { SPOOLSS_FORM_BUILTIN, "US Std Fanfold", {0x5c3e1,0x44368}, {0x0,0x0,0x5c3e1,0x44368} },
73 { SPOOLSS_FORM_BUILTIN, "German Std Fanfold", {0x34b5c,0x4a6a0}, {0x0,0x0,0x34b5c,0x4a6a0} },
74 { SPOOLSS_FORM_BUILTIN, "German Legal Fanfold", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
75 { SPOOLSS_FORM_BUILTIN, "B4 (ISO)", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
76 { SPOOLSS_FORM_BUILTIN, "Japanese Postcard", {0x186a0,0x24220}, {0x0,0x0,0x186a0,0x24220} },
77 { SPOOLSS_FORM_BUILTIN, "9x11", {0x37cf8,0x44368}, {0x0,0x0,0x37cf8,0x44368} },
78 { SPOOLSS_FORM_BUILTIN, "10x11", {0x3e030,0x44368}, {0x0,0x0,0x3e030,0x44368} },
79 { SPOOLSS_FORM_BUILTIN, "15x11", {0x5d048,0x44368}, {0x0,0x0,0x5d048,0x44368} },
80 { SPOOLSS_FORM_BUILTIN, "Envelope Invite", {0x35b60,0x35b60}, {0x0,0x0,0x35b60,0x35b60} },
81 { SPOOLSS_FORM_BUILTIN, "Reserved48", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
82 { SPOOLSS_FORM_BUILTIN, "Reserved49", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
83 { SPOOLSS_FORM_BUILTIN, "Letter Extra", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
84 { SPOOLSS_FORM_BUILTIN, "Legal Extra", {0x3ae94,0x5d048}, {0x0,0x0,0x3ae94,0x5d048} },
85 { SPOOLSS_FORM_BUILTIN, "Tabloid Extra", {0x4a6a0,0x6f9f0}, {0x0,0x0,0x4a6a0,0x6f9f0} },
86 { SPOOLSS_FORM_BUILTIN, "A4 Extra", {0x397c2,0x4eb16}, {0x0,0x0,0x397c2,0x4eb16} },
87 { SPOOLSS_FORM_BUILTIN, "Letter Transverse", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
88 { SPOOLSS_FORM_BUILTIN, "A4 Transverse", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
89 { SPOOLSS_FORM_BUILTIN, "Letter Extra Transverse", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
90 { SPOOLSS_FORM_BUILTIN, "Super A", {0x376b8,0x56ea0}, {0x0,0x0,0x376b8,0x56ea0} },
91 { SPOOLSS_FORM_BUILTIN, "Super B", {0x4a768,0x76e58}, {0x0,0x0,0x4a768,0x76e58} },
92 { SPOOLSS_FORM_BUILTIN, "Letter Plus", {0x34b5c,0x4eb16}, {0x0,0x0,0x34b5c,0x4eb16} },
93 { SPOOLSS_FORM_BUILTIN, "A4 Plus", {0x33450,0x50910}, {0x0,0x0,0x33450,0x50910} },
94 { SPOOLSS_FORM_BUILTIN, "A5 Transverse", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
95 { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Transverse", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
96 { SPOOLSS_FORM_BUILTIN, "A3 Extra", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
97 { SPOOLSS_FORM_BUILTIN, "A5 Extra", {0x2a7b0,0x395f8}, {0x0,0x0,0x2a7b0,0x395f8} },
98 { SPOOLSS_FORM_BUILTIN, "B5 (ISO) Extra", {0x31128,0x43620}, {0x0,0x0,0x31128,0x43620} },
99 { SPOOLSS_FORM_BUILTIN, "A2", {0x668a0,0x91050}, {0x0,0x0,0x668a0,0x91050} },
100 { SPOOLSS_FORM_BUILTIN, "A3 Transverse", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
101 { SPOOLSS_FORM_BUILTIN, "A3 Extra Transverse", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
102 { SPOOLSS_FORM_BUILTIN, "Japanese Double Postcard", {0x30d40,0x24220}, {0x0,0x0,0x30d40,0x24220} },
103 { SPOOLSS_FORM_BUILTIN, "A6", {0x19a28,0x24220}, {0x0,0x0,0x19a28,0x24220} },
104 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #2", {0x3a980,0x510e0}, {0x0,0x0,0x3a980,0x510e0} },
105 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #3", {0x34bc0,0x43a08}, {0x0,0x0,0x34bc0,0x43a08} },
106 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #3", {0x1d4c0,0x395f8}, {0x0,0x0,0x1d4c0,0x395f8} },
107 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #4", {0x15f90,0x320c8}, {0x0,0x0,0x15f90,0x320c8} },
108 { SPOOLSS_FORM_BUILTIN, "Letter Rotated", {0x44368,0x34b5c}, {0x0,0x0,0x44368,0x34b5c} },
109 { SPOOLSS_FORM_BUILTIN, "A3 Rotated", {0x668a0,0x48828}, {0x0,0x0,0x668a0,0x48828} },
110 { SPOOLSS_FORM_BUILTIN, "A4 Rotated", {0x48828,0x33450}, {0x0,0x0,0x48828,0x33450} },
111 { SPOOLSS_FORM_BUILTIN, "A5 Rotated", {0x33450,0x24220}, {0x0,0x0,0x33450,0x24220} },
112 { SPOOLSS_FORM_BUILTIN, "B4 (JIS) Rotated", {0x58de0,0x3ebe8}, {0x0,0x0,0x58de0,0x3ebe8} },
113 { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Rotated", {0x3ebe8,0x2c6f0}, {0x0,0x0,0x3ebe8,0x2c6f0} },
114 { SPOOLSS_FORM_BUILTIN, "Japanese Postcard Rotated", {0x24220,0x186a0}, {0x0,0x0,0x24220,0x186a0} },
115 { SPOOLSS_FORM_BUILTIN, "Double Japan Postcard Rotated", {0x24220,0x30d40}, {0x0,0x0,0x24220,0x30d40} },
116 { SPOOLSS_FORM_BUILTIN, "A6 Rotated", {0x24220,0x19a28}, {0x0,0x0,0x24220,0x19a28} },
117 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #2 Rotated", {0x510e0,0x3a980}, {0x0,0x0,0x510e0,0x3a980} },
118 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #3 Rotated", {0x43a08,0x34bc0}, {0x0,0x0,0x43a08,0x34bc0} },
119 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #3 Rotated", {0x395f8,0x1d4c0}, {0x0,0x0,0x395f8,0x1d4c0} },
120 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #4 Rotated", {0x320c8,0x15f90}, {0x0,0x0,0x320c8,0x15f90} },
121 { SPOOLSS_FORM_BUILTIN, "B6 (JIS)", {0x1f400,0x2c6f0}, {0x0,0x0,0x1f400,0x2c6f0} },
122 { SPOOLSS_FORM_BUILTIN, "B6 (JIS) Rotated", {0x2c6f0,0x1f400}, {0x0,0x0,0x2c6f0,0x1f400} },
123 { SPOOLSS_FORM_BUILTIN, "12x11", {0x4a724,0x443e1}, {0x0,0x0,0x4a724,0x443e1} },
124 { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4", {0x19a28,0x395f8}, {0x0,0x0,0x19a28,0x395f8} },
125 { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4 Rotated", {0x395f8,0x19a28}, {0x0,0x0,0x395f8,0x19a28} },
126 { SPOOLSS_FORM_BUILTIN, "PRC 16K", {0x2de60,0x3f7a0}, {0x0,0x0,0x2de60,0x3f7a0} },
127 { SPOOLSS_FORM_BUILTIN, "PRC 32K", {0x1fbd0,0x2cec0}, {0x0,0x0,0x1fbd0,0x2cec0} },
128 { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big)", {0x222e0,0x318f8}, {0x0,0x0,0x222e0,0x318f8} },
129 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1", {0x18e70,0x28488}, {0x0,0x0,0x18e70,0x28488} },
130 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2", {0x18e70,0x2af80}, {0x0,0x0,0x18e70,0x2af80} },
131 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3", {0x1e848,0x2af80}, {0x0,0x0,0x1e848,0x2af80} },
132 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4", {0x1adb0,0x32c80}, {0x0,0x0,0x1adb0,0x32c80} },
133 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
134 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6", {0x1d4c0,0x38270}, {0x0,0x0,0x1d4c0,0x38270} },
135 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7", {0x27100,0x38270}, {0x0,0x0,0x27100,0x38270} },
136 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8", {0x1d4c0,0x4b708}, {0x0,0x0,0x1d4c0,0x4b708} },
137 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
138 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
139 { SPOOLSS_FORM_BUILTIN, "PRC 16K Rotated", {0x3f7a0,0x2de60}, {0x0,0x0,0x3f7a0,0x2de60} },
140 { SPOOLSS_FORM_BUILTIN, "PRC 32K Rotated", {0x2cec0,0x1fbd0}, {0x0,0x0,0x2cec0,0x1fbd0} },
141 { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big) Rotated", {0x318f8,0x222e0}, {0x0,0x0,0x318f8,0x222e0} },
142 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1 Rotated", {0x28488,0x18e70}, {0x0,0x0,0x28488,0x18e70} },
143 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2 Rotated", {0x2af80,0x18e70}, {0x0,0x0,0x2af80,0x18e70} },
144 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3 Rotated", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
145 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4 Rotated", {0x32c80,0x1adb0}, {0x0,0x0,0x32c80,0x1adb0} },
146 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5 Rotated", {0x35b60,0x1adb0}, {0x0,0x0,0x35b60,0x1adb0} },
147 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6 Rotated", {0x38270,0x1d4c0}, {0x0,0x0,0x38270,0x1d4c0} },
148 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7 Rotated", {0x38270,0x27100}, {0x0,0x0,0x38270,0x27100} },
149 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8 Rotated", {0x4b708,0x1d4c0}, {0x0,0x0,0x4b708,0x1d4c0} },
150 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9 Rotated", {0x4f1a0,0x37e88}, {0x0,0x0,0x4f1a0,0x37e88} },
151 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10 Rotated", {0x6fd10,0x4f1a0}, {0x0,0x0,0x6fd10,0x4f1a0} }
154 /********************************************************************
155 static helper functions
156 ********************************************************************/
161 * @brief Connect to the interal winreg server and open the given printer key.
163 * The function will create the needed subkeys if they don't exist.
165 * @param[in] mem_ctx The memory context to use.
167 * @param[in] server_info The supplied server info.
169 * @param[out] winreg_pipe A pointer for the winreg rpc client pipe.
171 * @param[in] path The path to the key to open.
173 * @param[in] key The key to open.
175 * @param[in] create_key Set to true if the key should be created if it
178 * @param[in] access_mask The access mask to open the key.
180 * @param[out] hive_handle A policy handle for the opened hive.
182 * @param[out] key_handle A policy handle for the opened key.
184 * @return WERR_OK on success, the corresponding DOS error
185 * code if something gone wrong.
187 static WERROR winreg_printer_openkey(TALLOC_CTX *mem_ctx,
188 struct auth_serversupplied_info *server_info,
189 struct rpc_pipe_client **winreg_pipe,
193 uint32_t access_mask,
194 struct policy_handle *hive_handle,
195 struct policy_handle *key_handle)
197 struct rpc_pipe_client *pipe_handle;
198 struct winreg_String wkey, wkeyclass;
201 WERROR result = WERR_OK;
203 /* create winreg connection */
204 status = rpc_pipe_open_internal(mem_ctx,
205 &ndr_table_winreg.syntax_id,
209 if (!NT_STATUS_IS_OK(status)) {
210 DEBUG(0, ("winreg_printer_openkey: Could not connect to winreg_pipe: %s\n",
212 return ntstatus_to_werror(status);
215 status = rpccli_winreg_OpenHKLM(pipe_handle,
221 if (!NT_STATUS_IS_OK(status)) {
222 DEBUG(0, ("winreg_printer_openkey: Could not open HKLM hive: %s\n",
224 talloc_free(pipe_handle);
225 if (!W_ERROR_IS_OK(result)) {
228 return ntstatus_to_werror(status);
232 keyname = talloc_asprintf(mem_ctx, "%s\\%s", path, key);
234 keyname = talloc_strdup(mem_ctx, path);
236 if (keyname == NULL) {
237 talloc_free(pipe_handle);
245 enum winreg_CreateAction action = REG_ACTION_NONE;
247 ZERO_STRUCT(wkeyclass);
250 status = rpccli_winreg_CreateKey(pipe_handle,
262 case REG_ACTION_NONE:
263 DEBUG(8, ("winreg_printer_openkey:createkey did nothing -- huh?\n"));
265 case REG_CREATED_NEW_KEY:
266 DEBUG(8, ("winreg_printer_openkey: createkey created %s\n", keyname));
268 case REG_OPENED_EXISTING_KEY:
269 DEBUG(8, ("winreg_printer_openkey: createkey opened existing %s\n", keyname));
273 status = rpccli_winreg_OpenKey(pipe_handle,
282 if (!NT_STATUS_IS_OK(status)) {
283 talloc_free(pipe_handle);
284 if (!W_ERROR_IS_OK(result)) {
287 return ntstatus_to_werror(status);
290 *winreg_pipe = pipe_handle;
296 * @brief Create the registry keyname for the given printer.
298 * @param[in] mem_ctx The memory context to use.
300 * @param[in] printer The name of the printer to get the registry key.
302 * @return The registry key or NULL on error.
304 static char *winreg_printer_data_keyname(TALLOC_CTX *mem_ctx, const char *printer) {
305 return talloc_asprintf(mem_ctx, "%s\\%s", TOP_LEVEL_PRINT_PRINTERS_KEY, printer);
311 * @brief Enumerate values of an opened key handle and retrieve the data.
313 * @param[in] mem_ctx The memory context to use.
315 * @param[in] pipe_handle The pipe handle for the rpc connection.
317 * @param[in] key_hnd The opened key handle.
319 * @param[out] pnum_values A pointer to store he number of values found.
321 * @param[out] pnum_values A pointer to store the number of values we found.
323 * @return WERR_OK on success, the corresponding DOS error
324 * code if something gone wrong.
326 static WERROR winreg_printer_enumvalues(TALLOC_CTX *mem_ctx,
327 struct rpc_pipe_client *pipe_handle,
328 struct policy_handle *key_hnd,
329 uint32_t *pnum_values,
330 struct spoolss_PrinterEnumValues **penum_values)
333 uint32_t num_subkeys, max_subkeylen, max_classlen;
334 uint32_t num_values, max_valnamelen, max_valbufsize;
335 uint32_t secdescsize;
337 NTTIME last_changed_time;
338 struct winreg_String classname;
340 struct spoolss_PrinterEnumValues *enum_values;
342 WERROR result = WERR_OK;
345 tmp_ctx = talloc_new(mem_ctx);
346 if (tmp_ctx == NULL) {
350 ZERO_STRUCT(classname);
352 status = rpccli_winreg_QueryInfoKey(pipe_handle,
365 if (!NT_STATUS_IS_OK(status)) {
366 DEBUG(0, ("winreg_printer_enumvalues: Could not query info: %s\n",
368 if (!W_ERROR_IS_OK(result)) {
371 result = ntstatus_to_werror(status);
375 if (num_values == 0) {
377 TALLOC_FREE(tmp_ctx);
381 enum_values = TALLOC_ARRAY(tmp_ctx, struct spoolss_PrinterEnumValues, num_values);
382 if (enum_values == NULL) {
387 for (i = 0; i < num_values; i++) {
388 struct spoolss_PrinterEnumValues val;
389 struct winreg_ValNameBuf name_buf;
390 enum winreg_Type type = REG_NONE;
391 uint8_t *data = NULL;
397 name_buf.size = max_valnamelen + 2;
400 data_size = max_valbufsize;
401 data = (uint8_t *) TALLOC(tmp_ctx, data_size);
404 status = rpccli_winreg_EnumValue(pipe_handle,
414 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
416 status = NT_STATUS_OK;
420 if (!NT_STATUS_IS_OK(status)) {
421 DEBUG(0, ("winreg_printer_enumvalues: Could not enumerate values: %s\n",
423 if (!W_ERROR_IS_OK(result)) {
426 result = ntstatus_to_werror(status);
430 if (name_buf.name == NULL) {
431 result = WERR_INVALID_PARAMETER;
435 val.value_name = talloc_strdup(enum_values, name_buf.name);
436 if (val.value_name == NULL) {
440 val.value_name_len = strlen_m_term(val.value_name) * 2;
443 val.data_length = data_size;
445 if (val.data_length) {
446 val.data = talloc(enum_values, DATA_BLOB);
447 if (val.data == NULL) {
451 *val.data = data_blob_talloc(enum_values, data, data_size);
454 enum_values[i] = val;
457 *pnum_values = num_values;
459 *penum_values = talloc_move(mem_ctx, &enum_values);
465 TALLOC_FREE(tmp_ctx);
472 * @brief Enumerate subkeys of an opened key handle and get the names.
474 * @param[in] mem_ctx The memory context to use.
476 * @param[in] pipe_handle The pipe handle for the rpc connection.
478 * @param[in] key_hnd The opened key handle.
480 * @param[in] pnum_subkeys A pointer to store the number of found subkeys.
482 * @param[in] psubkeys A pointer to an array to store the found names of
485 * @return WERR_OK on success, the corresponding DOS error
486 * code if something gone wrong.
488 static WERROR winreg_printer_enumkeys(TALLOC_CTX *mem_ctx,
489 struct rpc_pipe_client *pipe_handle,
490 struct policy_handle *key_hnd,
491 uint32_t *pnum_subkeys,
492 const char ***psubkeys)
495 const char **subkeys;
496 uint32_t num_subkeys, max_subkeylen, max_classlen;
497 uint32_t num_values, max_valnamelen, max_valbufsize;
499 NTTIME last_changed_time;
500 uint32_t secdescsize;
501 struct winreg_String classname;
502 WERROR result = WERR_OK;
505 tmp_ctx = talloc_new(mem_ctx);
506 if (tmp_ctx == NULL) {
510 ZERO_STRUCT(classname);
512 status = rpccli_winreg_QueryInfoKey(pipe_handle,
525 if (!NT_STATUS_IS_OK(status)) {
526 DEBUG(0, ("winreg_printer_enumkeys: Could not query info: %s\n",
528 if (!W_ERROR_IS_OK(result)) {
531 result = ntstatus_to_werror(status);
535 subkeys = talloc_zero_array(tmp_ctx, const char *, num_subkeys + 2);
536 if (subkeys == NULL) {
541 if (num_subkeys == 0) {
542 subkeys[0] = talloc_strdup(subkeys, "");
543 if (subkeys[0] == NULL) {
549 *psubkeys = talloc_move(mem_ctx, &subkeys);
552 TALLOC_FREE(tmp_ctx);
556 for (i = 0; i < num_subkeys; i++) {
560 struct winreg_StringBuf class_buf;
561 struct winreg_StringBuf name_buf;
565 class_buf.size = max_classlen + 2;
566 class_buf.length = 0;
569 name_buf.size = max_subkeylen + 2;
572 ZERO_STRUCT(modtime);
574 status = rpccli_winreg_EnumKey(pipe_handle,
582 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
584 status = NT_STATUS_OK;
588 if (!NT_STATUS_IS_OK(status)) {
589 DEBUG(0, ("winreg_printer_enumkeys: Could not enumerate keys: %s\n",
591 if (!W_ERROR_IS_OK(result)) {
594 result = ntstatus_to_werror(status);
598 if (name_buf.name == NULL) {
599 result = WERR_INVALID_PARAMETER;
603 name = talloc_strdup(subkeys, name_buf.name);
612 *pnum_subkeys = num_subkeys;
614 *psubkeys = talloc_move(mem_ctx, &subkeys);
618 TALLOC_FREE(tmp_ctx);
625 * @brief A function to delete a key and its subkeys recurively.
627 * @param[in] mem_ctx The memory context to use.
629 * @param[in] pipe_handle The pipe handle for the rpc connection.
631 * @param[in] hive_handle A opened hive handle to the key.
633 * @param[in] access_mask The access mask to access the key.
635 * @param[in] key The key to delete
637 * @return WERR_OK on success, the corresponding DOS error
638 * code if something gone wrong.
640 static WERROR winreg_printer_delete_subkeys(TALLOC_CTX *mem_ctx,
641 struct rpc_pipe_client *pipe_handle,
642 struct policy_handle *hive_handle,
643 uint32_t access_mask,
646 const char **subkeys = NULL;
647 uint32_t num_subkeys = 0;
648 struct policy_handle key_hnd;
649 struct winreg_String wkey;
650 WERROR result = WERR_OK;
654 ZERO_STRUCT(key_hnd);
657 DEBUG(2, ("winreg_printer_delete_subkeys: delete key %s\n", key));
659 status = rpccli_winreg_OpenKey(pipe_handle,
667 if (!NT_STATUS_IS_OK(status)) {
668 DEBUG(0, ("winreg_printer_delete_subkeys: Could not open key %s: %s\n",
669 wkey.name, nt_errstr(status)));
670 if (!W_ERROR_IS_OK(result)) {
673 return ntstatus_to_werror(status);
676 result = winreg_printer_enumkeys(mem_ctx,
681 if (!W_ERROR_IS_OK(result)) {
685 for (i = 0; i < num_subkeys; i++) {
686 /* create key + subkey */
687 char *subkey = talloc_asprintf(mem_ctx, "%s\\%s", key, subkeys[i]);
688 if (subkey == NULL) {
692 DEBUG(2, ("winreg_printer_delete_subkeys: delete subkey %s\n", subkey));
693 result = winreg_printer_delete_subkeys(mem_ctx,
698 if (!W_ERROR_IS_OK(result)) {
703 if (is_valid_policy_hnd(&key_hnd)) {
704 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
709 status = rpccli_winreg_DeleteKey(pipe_handle,
716 if (is_valid_policy_hnd(&key_hnd)) {
717 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
723 static WERROR winreg_printer_write_sz(TALLOC_CTX *mem_ctx,
724 struct rpc_pipe_client *pipe_handle,
725 struct policy_handle *key_handle,
729 struct winreg_String wvalue;
731 WERROR result = WERR_OK;
736 blob = data_blob_string_const("");
738 if (!push_reg_sz(mem_ctx, NULL, &blob, data)) {
739 DEBUG(0, ("winreg_printer_write_sz: Could not marshall string %s for %s\n",
744 status = rpccli_winreg_SetValue(pipe_handle,
752 if (!NT_STATUS_IS_OK(status)) {
753 DEBUG(0, ("winreg_printer_write_sz: Could not set value %s: %s\n",
754 wvalue.name, win_errstr(result)));
755 if (!W_ERROR_IS_OK(result)) {
756 result = ntstatus_to_werror(status);
763 static WERROR winreg_printer_write_dword(TALLOC_CTX *mem_ctx,
764 struct rpc_pipe_client *pipe_handle,
765 struct policy_handle *key_handle,
769 struct winreg_String wvalue;
771 WERROR result = WERR_OK;
775 blob = data_blob_talloc(mem_ctx, NULL, 4);
776 SIVAL(blob.data, 0, data);
778 status = rpccli_winreg_SetValue(pipe_handle,
786 if (!NT_STATUS_IS_OK(status)) {
787 DEBUG(0, ("winreg_printer_write_dword: Could not set value %s: %s\n",
788 wvalue.name, win_errstr(result)));
789 if (!W_ERROR_IS_OK(result)) {
790 result = ntstatus_to_werror(status);
797 static WERROR winreg_printer_write_binary(TALLOC_CTX *mem_ctx,
798 struct rpc_pipe_client *pipe_handle,
799 struct policy_handle *key_handle,
803 struct winreg_String wvalue;
804 WERROR result = WERR_OK;
808 status = rpccli_winreg_SetValue(pipe_handle,
816 if (!NT_STATUS_IS_OK(status)) {
817 DEBUG(0, ("winreg_printer_write_binary: Could not set value %s: %s\n",
818 wvalue.name, win_errstr(result)));
819 if (!W_ERROR_IS_OK(result)) {
820 result = ntstatus_to_werror(status);
827 /********************************************************************
828 Public winreg function for spoolss
829 ********************************************************************/
831 /* Set printer data over the winreg pipe. */
832 WERROR winreg_set_printer_dataex(TALLOC_CTX *mem_ctx,
833 struct auth_serversupplied_info *server_info,
837 enum winreg_Type type,
841 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
842 struct rpc_pipe_client *winreg_pipe = NULL;
843 struct policy_handle hive_hnd, key_hnd;
844 struct winreg_String wvalue;
846 WERROR result = WERR_OK;
850 tmp_ctx = talloc_new(mem_ctx);
851 if (tmp_ctx == NULL) {
855 path = winreg_printer_data_keyname(tmp_ctx, printer);
857 TALLOC_FREE(tmp_ctx);
861 ZERO_STRUCT(hive_hnd);
862 ZERO_STRUCT(key_hnd);
864 DEBUG(8, ("winreg_set_printer_dataex: Open printer key %s, value %s, access_mask: 0x%05x for [%s]\n",
865 key, value, access_mask, printer));
866 result = winreg_printer_openkey(tmp_ctx,
875 if (!W_ERROR_IS_OK(result)) {
876 DEBUG(0, ("winreg_set_printer_dataex: Could not open key %s: %s\n",
877 key, win_errstr(result)));
882 status = rpccli_winreg_SetValue(winreg_pipe,
890 if (!NT_STATUS_IS_OK(status)) {
891 DEBUG(0, ("winreg_set_printer_dataex: Could not set value %s: %s\n",
892 value, nt_errstr(status)));
893 if (!W_ERROR_IS_OK(result)) {
896 result = ntstatus_to_werror(status);
902 if (winreg_pipe != NULL) {
903 if (is_valid_policy_hnd(&key_hnd)) {
904 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
906 if (is_valid_policy_hnd(&hive_hnd)) {
907 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
911 TALLOC_FREE(tmp_ctx);
915 /* Get printer data over a winreg pipe. */
916 WERROR winreg_get_printer_dataex(TALLOC_CTX *mem_ctx,
917 struct auth_serversupplied_info *server_info,
921 enum winreg_Type *type,
925 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
926 struct rpc_pipe_client *winreg_pipe = NULL;
927 struct policy_handle hive_hnd, key_hnd;
928 struct winreg_String wvalue;
929 enum winreg_Type type_in;
932 uint32_t data_in_size = 0;
933 uint32_t value_len = 0;
934 WERROR result = WERR_OK;
938 tmp_ctx = talloc_new(mem_ctx);
939 if (tmp_ctx == NULL) {
943 path = winreg_printer_data_keyname(tmp_ctx, printer);
945 TALLOC_FREE(tmp_ctx);
949 ZERO_STRUCT(hive_hnd);
950 ZERO_STRUCT(key_hnd);
952 result = winreg_printer_openkey(tmp_ctx,
961 if (!W_ERROR_IS_OK(result)) {
962 DEBUG(0, ("winreg_get_printer_dataex: Could not open key %s: %s\n",
963 key, win_errstr(result)));
970 * call QueryValue once with data == NULL to get the
971 * needed memory size to be allocated, then allocate
972 * data buffer and call again.
974 status = rpccli_winreg_QueryValue(winreg_pipe,
983 if (!NT_STATUS_IS_OK(status)) {
984 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
985 value, nt_errstr(status)));
986 if (!W_ERROR_IS_OK(result)) {
989 result = ntstatus_to_werror(status);
993 data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
994 if (data_in == NULL) {
1000 status = rpccli_winreg_QueryValue(winreg_pipe,
1009 if (!NT_STATUS_IS_OK(status)) {
1010 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
1011 value, nt_errstr(status)));
1012 if (!W_ERROR_IS_OK(result)) {
1013 result = ntstatus_to_werror(status);
1019 *data_size = data_in_size;
1021 *data = talloc_move(mem_ctx, &data_in);
1026 if (winreg_pipe != NULL) {
1027 if (is_valid_policy_hnd(&key_hnd)) {
1028 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1030 if (is_valid_policy_hnd(&hive_hnd)) {
1031 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1035 TALLOC_FREE(tmp_ctx);
1039 /* Enumerate on the values of a given key and provide the data. */
1040 WERROR winreg_enum_printer_dataex(TALLOC_CTX *mem_ctx,
1041 struct auth_serversupplied_info *server_info,
1042 const char *printer,
1044 uint32_t *pnum_values,
1045 struct spoolss_PrinterEnumValues **penum_values)
1047 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1048 struct rpc_pipe_client *winreg_pipe = NULL;
1049 struct policy_handle hive_hnd, key_hnd;
1051 struct spoolss_PrinterEnumValues *enum_values = NULL;
1052 uint32_t num_values = 0;
1054 WERROR result = WERR_OK;
1056 TALLOC_CTX *tmp_ctx;
1058 tmp_ctx = talloc_new(mem_ctx);
1059 if (tmp_ctx == NULL) {
1063 path = winreg_printer_data_keyname(tmp_ctx, printer);
1065 TALLOC_FREE(tmp_ctx);
1069 result = winreg_printer_openkey(tmp_ctx,
1078 if (!W_ERROR_IS_OK(result)) {
1079 DEBUG(0, ("winreg_enum_printer_dataex: Could not open key %s: %s\n",
1080 key, win_errstr(result)));
1084 result = winreg_printer_enumvalues(tmp_ctx,
1089 if (!W_ERROR_IS_OK(result)) {
1090 DEBUG(0, ("winreg_enum_printer_dataex: Could not enumerate values in %s: %s\n",
1091 key, win_errstr(result)));
1095 *pnum_values = num_values;
1097 *penum_values = talloc_move(mem_ctx, &enum_values);
1102 if (winreg_pipe != NULL) {
1103 if (is_valid_policy_hnd(&key_hnd)) {
1104 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1106 if (is_valid_policy_hnd(&hive_hnd)) {
1107 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1111 TALLOC_FREE(tmp_ctx);
1115 /* Delete printer data over a winreg pipe. */
1116 WERROR winreg_delete_printer_dataex(TALLOC_CTX *mem_ctx,
1117 struct auth_serversupplied_info *server_info,
1118 const char *printer,
1122 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1123 struct rpc_pipe_client *winreg_pipe = NULL;
1124 struct policy_handle hive_hnd, key_hnd;
1125 struct winreg_String wvalue;
1127 WERROR result = WERR_OK;
1130 TALLOC_CTX *tmp_ctx;
1132 tmp_ctx = talloc_new(mem_ctx);
1133 if (tmp_ctx == NULL) {
1137 path = winreg_printer_data_keyname(tmp_ctx, printer);
1139 TALLOC_FREE(tmp_ctx);
1143 ZERO_STRUCT(hive_hnd);
1144 ZERO_STRUCT(key_hnd);
1146 result = winreg_printer_openkey(tmp_ctx,
1155 if (!W_ERROR_IS_OK(result)) {
1156 DEBUG(0, ("winreg_delete_printer_dataex: Could not open key %s: %s\n",
1157 key, win_errstr(result)));
1161 wvalue.name = value;
1162 status = rpccli_winreg_DeleteValue(winreg_pipe,
1167 if (!NT_STATUS_IS_OK(status)) {
1168 DEBUG(0, ("winreg_delete_printer_dataex: Could not delete value %s: %s\n",
1169 value, nt_errstr(status)));
1170 if (!W_ERROR_IS_OK(result)) {
1173 result = ntstatus_to_werror(status);
1179 if (winreg_pipe != NULL) {
1180 if (is_valid_policy_hnd(&key_hnd)) {
1181 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1183 if (is_valid_policy_hnd(&hive_hnd)) {
1184 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1188 TALLOC_FREE(tmp_ctx);
1192 /* Enumerate on the subkeys of a given key and provide the data. */
1193 WERROR winreg_enum_printer_key(TALLOC_CTX *mem_ctx,
1194 struct auth_serversupplied_info *server_info,
1195 const char *printer,
1197 uint32_t *pnum_subkeys,
1198 const char ***psubkeys)
1200 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1201 struct rpc_pipe_client *winreg_pipe = NULL;
1202 struct policy_handle hive_hnd, key_hnd;
1204 const char **subkeys = NULL;
1205 uint32_t num_subkeys = -1;
1207 WERROR result = WERR_OK;
1209 TALLOC_CTX *tmp_ctx;
1211 tmp_ctx = talloc_new(mem_ctx);
1212 if (tmp_ctx == NULL) {
1216 path = winreg_printer_data_keyname(tmp_ctx, printer);
1218 TALLOC_FREE(tmp_ctx);
1222 ZERO_STRUCT(hive_hnd);
1223 ZERO_STRUCT(key_hnd);
1225 result = winreg_printer_openkey(tmp_ctx,
1234 if (!W_ERROR_IS_OK(result)) {
1235 DEBUG(0, ("winreg_enum_printer_key: Could not open key %s: %s\n",
1236 key, win_errstr(result)));
1240 result = winreg_printer_enumkeys(tmp_ctx,
1245 if (!W_ERROR_IS_OK(result)) {
1246 DEBUG(0, ("winreg_enum_printer_key: Could not enumerate subkeys in %s: %s\n",
1247 key, win_errstr(result)));
1251 *pnum_subkeys = num_subkeys;
1253 *psubkeys = talloc_move(mem_ctx, &subkeys);
1258 if (winreg_pipe != NULL) {
1259 if (is_valid_policy_hnd(&key_hnd)) {
1260 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1262 if (is_valid_policy_hnd(&hive_hnd)) {
1263 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1267 TALLOC_FREE(tmp_ctx);
1271 /* Delete a key with subkeys of a given printer. */
1272 WERROR winreg_delete_printer_key(TALLOC_CTX *mem_ctx,
1273 struct auth_serversupplied_info *server_info,
1274 const char *printer,
1277 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1278 struct rpc_pipe_client *winreg_pipe = NULL;
1279 struct policy_handle hive_hnd, key_hnd;
1283 TALLOC_CTX *tmp_ctx;
1285 tmp_ctx = talloc_new(mem_ctx);
1286 if (tmp_ctx == NULL) {
1290 path = winreg_printer_data_keyname(tmp_ctx, printer);
1292 TALLOC_FREE(tmp_ctx);
1296 result = winreg_printer_openkey(tmp_ctx,
1305 if (!W_ERROR_IS_OK(result)) {
1306 /* key doesn't exist */
1307 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1312 DEBUG(0, ("winreg_delete_printer_key: Could not open key %s: %s\n",
1313 key, win_errstr(result)));
1317 if (is_valid_policy_hnd(&key_hnd)) {
1318 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1321 keyname = talloc_asprintf(tmp_ctx,
1325 if (keyname == NULL) {
1326 result = WERR_NOMEM;
1330 result = winreg_printer_delete_subkeys(tmp_ctx,
1335 if (!W_ERROR_IS_OK(result)) {
1336 DEBUG(0, ("winreg_delete_printer_key: Could not delete key %s: %s\n",
1337 key, win_errstr(result)));
1342 if (winreg_pipe != NULL) {
1343 if (is_valid_policy_hnd(&key_hnd)) {
1344 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1346 if (is_valid_policy_hnd(&hive_hnd)) {
1347 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1351 TALLOC_FREE(tmp_ctx);
1356 * The special behaviour of the spoolss forms is documented at the website:
1358 * Managing Win32 Printserver Forms
1359 * http://unixwiz.net/techtips/winspooler-forms.html
1362 WERROR winreg_printer_addform1(TALLOC_CTX *mem_ctx,
1363 struct auth_serversupplied_info *server_info,
1364 struct spoolss_AddFormInfo1 *form)
1366 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1367 struct rpc_pipe_client *winreg_pipe = NULL;
1368 struct policy_handle hive_hnd, key_hnd;
1369 struct winreg_String wvalue;
1371 uint32_t num_info = 0;
1372 union spoolss_FormInfo *info = NULL;
1376 TALLOC_CTX *tmp_ctx;
1378 tmp_ctx = talloc_new(mem_ctx);
1379 if (tmp_ctx == NULL) {
1383 ZERO_STRUCT(hive_hnd);
1384 ZERO_STRUCT(key_hnd);
1386 result = winreg_printer_openkey(tmp_ctx,
1389 TOP_LEVEL_CONTROL_FORMS_KEY,
1395 if (!W_ERROR_IS_OK(result)) {
1396 DEBUG(0, ("winreg_printer_addform1: Could not open key %s: %s\n",
1397 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1401 result = winreg_printer_enumforms1(tmp_ctx, server_info, &num_info, &info);
1402 if (!W_ERROR_IS_OK(result)) {
1403 DEBUG(0, ("winreg_printer_addform: Could not enum keys %s: %s\n",
1404 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1408 /* If form name already exists or is builtin return ALREADY_EXISTS */
1409 for (i = 0; i < num_info; i++) {
1410 if (strequal(info[i].info1.form_name, form->form_name)) {
1411 result = WERR_FILE_EXISTS;
1416 wvalue.name = form->form_name;
1418 blob = data_blob_talloc(tmp_ctx, NULL, 32);
1419 SIVAL(blob.data, 0, form->size.width);
1420 SIVAL(blob.data, 4, form->size.height);
1421 SIVAL(blob.data, 8, form->area.left);
1422 SIVAL(blob.data, 12, form->area.top);
1423 SIVAL(blob.data, 16, form->area.right);
1424 SIVAL(blob.data, 20, form->area.bottom);
1425 SIVAL(blob.data, 24, num_info + 1); /* FIXME */
1426 SIVAL(blob.data, 28, form->flags);
1428 status = rpccli_winreg_SetValue(winreg_pipe,
1436 if (!NT_STATUS_IS_OK(status)) {
1437 DEBUG(0, ("winreg_printer_addform1: Could not set value %s: %s\n",
1438 wvalue.name, nt_errstr(status)));
1439 if (!W_ERROR_IS_OK(result)) {
1442 result = ntstatus_to_werror(status);
1448 if (winreg_pipe != NULL) {
1449 if (is_valid_policy_hnd(&key_hnd)) {
1450 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1452 if (is_valid_policy_hnd(&hive_hnd)) {
1453 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1458 TALLOC_FREE(tmp_ctx);
1462 WERROR winreg_printer_enumforms1(TALLOC_CTX *mem_ctx,
1463 struct auth_serversupplied_info *server_info,
1464 uint32_t *pnum_info,
1465 union spoolss_FormInfo **pinfo)
1467 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1468 struct rpc_pipe_client *winreg_pipe = NULL;
1469 struct policy_handle hive_hnd, key_hnd;
1470 union spoolss_FormInfo *info;
1471 struct spoolss_PrinterEnumValues *enum_values = NULL;
1472 uint32_t num_values = 0;
1473 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1476 TALLOC_CTX *tmp_ctx;
1478 tmp_ctx = talloc_new(mem_ctx);
1479 if (tmp_ctx == NULL) {
1483 ZERO_STRUCT(hive_hnd);
1484 ZERO_STRUCT(key_hnd);
1486 result = winreg_printer_openkey(tmp_ctx,
1489 TOP_LEVEL_CONTROL_FORMS_KEY,
1495 if (!W_ERROR_IS_OK(result)) {
1496 /* key doesn't exist */
1497 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1502 DEBUG(0, ("winreg_printer_enumforms1: Could not open key %s: %s\n",
1503 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1507 result = winreg_printer_enumvalues(tmp_ctx,
1512 if (!W_ERROR_IS_OK(result)) {
1513 DEBUG(0, ("winreg_printer_enumforms1: Could not enumerate values in %s: %s\n",
1514 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1518 info = TALLOC_ARRAY(tmp_ctx, union spoolss_FormInfo, num_builtin + num_values);
1520 result = WERR_NOMEM;
1524 /* Enumerate BUILTIN forms */
1525 for (i = 0; i < num_builtin; i++) {
1526 info[i].info1 = builtin_forms1[i];
1529 /* Enumerate registry forms */
1530 for (i = 0; i < num_values; i++) {
1531 union spoolss_FormInfo val;
1533 if (enum_values[i].type != REG_BINARY ||
1534 enum_values[i].data_length != 32) {
1538 val.info1.form_name = talloc_strdup(info, enum_values[i].value_name);
1539 if (val.info1.form_name == NULL) {
1540 result = WERR_NOMEM;
1544 val.info1.size.width = IVAL(enum_values[i].data->data, 0);
1545 val.info1.size.height = IVAL(enum_values[i].data->data, 4);
1546 val.info1.area.left = IVAL(enum_values[i].data->data, 8);
1547 val.info1.area.top = IVAL(enum_values[i].data->data, 12);
1548 val.info1.area.right = IVAL(enum_values[i].data->data, 16);
1549 val.info1.area.bottom = IVAL(enum_values[i].data->data, 20);
1550 /* skip form index IVAL(enum_values[i].data->data, 24)));*/
1551 val.info1.flags = IVAL(enum_values[i].data->data, 28);
1553 info[i + num_builtin] = val;
1556 *pnum_info = num_builtin + num_values;
1558 *pinfo = talloc_move(mem_ctx, &info);
1562 if (winreg_pipe != NULL) {
1563 if (is_valid_policy_hnd(&key_hnd)) {
1564 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1566 if (is_valid_policy_hnd(&hive_hnd)) {
1567 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1571 TALLOC_FREE(enum_values);
1572 TALLOC_FREE(tmp_ctx);
1576 WERROR winreg_printer_deleteform1(TALLOC_CTX *mem_ctx,
1577 struct auth_serversupplied_info *server_info,
1578 const char *form_name)
1580 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1581 struct rpc_pipe_client *winreg_pipe = NULL;
1582 struct policy_handle hive_hnd, key_hnd;
1583 struct winreg_String wvalue;
1584 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1586 WERROR result = WERR_OK;
1588 TALLOC_CTX *tmp_ctx;
1590 for (i = 0; i < num_builtin; i++) {
1591 if (strequal(builtin_forms1[i].form_name, form_name)) {
1592 return WERR_INVALID_PARAMETER;
1596 tmp_ctx = talloc_new(mem_ctx);
1597 if (tmp_ctx == NULL) {
1601 ZERO_STRUCT(hive_hnd);
1602 ZERO_STRUCT(key_hnd);
1604 result = winreg_printer_openkey(tmp_ctx,
1607 TOP_LEVEL_CONTROL_FORMS_KEY,
1613 if (!W_ERROR_IS_OK(result)) {
1614 DEBUG(0, ("winreg_printer_deleteform1: Could not open key %s: %s\n",
1615 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1616 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1617 result = WERR_INVALID_FORM_NAME;
1622 wvalue.name = form_name;
1623 status = rpccli_winreg_DeleteValue(winreg_pipe,
1628 if (!NT_STATUS_IS_OK(status)) {
1629 /* If the value doesn't exist, return WERR_INVALID_FORM_NAME */
1630 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1631 result = WERR_INVALID_FORM_NAME;
1634 DEBUG(0, ("winreg_printer_delteform1: Could not delete value %s: %s\n",
1635 wvalue.name, nt_errstr(status)));
1636 if (!W_ERROR_IS_OK(result)) {
1639 result = ntstatus_to_werror(status);
1645 if (winreg_pipe != NULL) {
1646 if (is_valid_policy_hnd(&key_hnd)) {
1647 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1649 if (is_valid_policy_hnd(&hive_hnd)) {
1650 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1654 TALLOC_FREE(tmp_ctx);
1658 WERROR winreg_printer_setform1(TALLOC_CTX *mem_ctx,
1659 struct auth_serversupplied_info *server_info,
1660 const char *form_name,
1661 struct spoolss_AddFormInfo1 *form)
1663 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1664 struct rpc_pipe_client *winreg_pipe = NULL;
1665 struct policy_handle hive_hnd, key_hnd;
1666 struct winreg_String wvalue;
1668 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1672 TALLOC_CTX *tmp_ctx = NULL;
1674 for (i = 0; i < num_builtin; i++) {
1675 if (strequal(builtin_forms1[i].form_name, form->form_name)) {
1676 result = WERR_INVALID_PARAM;
1681 tmp_ctx = talloc_new(mem_ctx);
1682 if (tmp_ctx == NULL) {
1686 ZERO_STRUCT(hive_hnd);
1687 ZERO_STRUCT(key_hnd);
1689 result = winreg_printer_openkey(tmp_ctx,
1692 TOP_LEVEL_CONTROL_FORMS_KEY,
1698 if (!W_ERROR_IS_OK(result)) {
1699 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
1700 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1704 /* If form_name != form->form_name then we renamed the form */
1705 if (strequal(form_name, form->form_name)) {
1706 result = winreg_printer_deleteform1(tmp_ctx, server_info, form_name);
1707 if (!W_ERROR_IS_OK(result)) {
1708 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
1709 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1714 wvalue.name = form->form_name;
1716 blob = data_blob_talloc(tmp_ctx, NULL, 32);
1717 SIVAL(blob.data, 0, form->size.width);
1718 SIVAL(blob.data, 4, form->size.height);
1719 SIVAL(blob.data, 8, form->area.left);
1720 SIVAL(blob.data, 12, form->area.top);
1721 SIVAL(blob.data, 16, form->area.right);
1722 SIVAL(blob.data, 20, form->area.bottom);
1723 SIVAL(blob.data, 24, 42);
1724 SIVAL(blob.data, 28, form->flags);
1726 status = rpccli_winreg_SetValue(winreg_pipe,
1734 if (!NT_STATUS_IS_OK(status)) {
1735 DEBUG(0, ("winreg_printer_setform1: Could not set value %s: %s\n",
1736 wvalue.name, nt_errstr(status)));
1737 if (!W_ERROR_IS_OK(result)) {
1740 result = ntstatus_to_werror(status);
1746 if (winreg_pipe != NULL) {
1747 if (is_valid_policy_hnd(&key_hnd)) {
1748 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1750 if (is_valid_policy_hnd(&hive_hnd)) {
1751 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1755 TALLOC_FREE(tmp_ctx);
1759 WERROR winreg_printer_getform1(TALLOC_CTX *mem_ctx,
1760 struct auth_serversupplied_info *server_info,
1761 const char *form_name,
1762 struct spoolss_FormInfo1 *r)
1764 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1765 struct rpc_pipe_client *winreg_pipe = NULL;
1766 struct policy_handle hive_hnd, key_hnd;
1767 struct winreg_String wvalue;
1768 enum winreg_Type type_in;
1770 uint32_t data_in_size = 0;
1771 uint32_t value_len = 0;
1772 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1776 TALLOC_CTX *tmp_ctx;
1778 /* check builtin forms first */
1779 for (i = 0; i < num_builtin; i++) {
1780 if (strequal(builtin_forms1[i].form_name, form_name)) {
1781 *r = builtin_forms1[i];
1786 tmp_ctx = talloc_new(mem_ctx);
1787 if (tmp_ctx == NULL) {
1791 ZERO_STRUCT(hive_hnd);
1792 ZERO_STRUCT(key_hnd);
1794 result = winreg_printer_openkey(tmp_ctx,
1797 TOP_LEVEL_CONTROL_FORMS_KEY,
1803 if (!W_ERROR_IS_OK(result)) {
1804 DEBUG(0, ("winreg_printer_getform1: Could not open key %s: %s\n",
1805 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1809 wvalue.name = form_name;
1812 * call QueryValue once with data == NULL to get the
1813 * needed memory size to be allocated, then allocate
1814 * data buffer and call again.
1816 status = rpccli_winreg_QueryValue(winreg_pipe,
1825 if (!NT_STATUS_IS_OK(status)) {
1826 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
1827 wvalue.name, nt_errstr(status)));
1828 if (!W_ERROR_IS_OK(result)) {
1831 result = ntstatus_to_werror(status);
1835 data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
1836 if (data_in == NULL) {
1837 result = WERR_NOMEM;
1842 status = rpccli_winreg_QueryValue(winreg_pipe,
1851 if (!NT_STATUS_IS_OK(status)) {
1852 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
1853 wvalue.name, nt_errstr(status)));
1854 if (!W_ERROR_IS_OK(result)) {
1857 result = ntstatus_to_werror(status);
1861 r->form_name = talloc_strdup(mem_ctx, form_name);
1862 if (r->form_name == NULL) {
1863 result = WERR_NOMEM;
1867 r->size.width = IVAL(data_in, 0);
1868 r->size.height = IVAL(data_in, 4);
1869 r->area.left = IVAL(data_in, 8);
1870 r->area.top = IVAL(data_in, 12);
1871 r->area.right = IVAL(data_in, 16);
1872 r->area.bottom = IVAL(data_in, 20);
1873 /* skip index IVAL(data_in, 24)));*/
1874 r->flags = IVAL(data_in, 28);
1878 if (winreg_pipe != NULL) {
1879 if (is_valid_policy_hnd(&key_hnd)) {
1880 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1882 if (is_valid_policy_hnd(&hive_hnd)) {
1883 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1887 TALLOC_FREE(tmp_ctx);