s3-spoolss: Added more winreg hepler functions.
[sfrench/samba-autobuild/.git] / source3 / rpc_server / srv_spoolss_util.c
1 /*
2  *  Unix SMB/CIFS implementation.
3  *
4  *  SPOOLSS RPC Pipe server / winreg client routines
5  *
6  *  Copyright (c) 2010      Andreas Schneider <asn@samba.org>
7  *
8  *  This program is free software; you can redistribute it and/or modify
9  *  it under the terms of the GNU General Public License as published by
10  *  the Free Software Foundation; either version 3 of the License, or
11  *  (at your option) any later version.
12  *
13  *  This program is distributed in the hope that it will be useful,
14  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
15  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16  *  GNU General Public License for more details.
17  *
18  *  You should have received a copy of the GNU General Public License
19  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
20  */
21
22 #include "includes.h"
23 #include "srv_spoolss_util.h"
24 #include "../librpc/gen_ndr/srv_winreg.h"
25 #include "../librpc/gen_ndr/cli_winreg.h"
26
27 #define TOP_LEVEL_PRINT_KEY "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print"
28 #define TOP_LEVEL_PRINT_PRINTERS_KEY TOP_LEVEL_PRINT_KEY "\\Printers"
29 #define TOP_LEVEL_CONTROL_KEY "SYSTEM\\CurrentControlSet\\Control\\Print"
30 #define TOP_LEVEL_CONTROL_FORMS_KEY TOP_LEVEL_CONTROL_KEY "\\Forms"
31
32 /*        FLAGS,                NAME,                              with,   height,   left, top, right, bottom */
33 static const struct spoolss_FormInfo1 builtin_forms1[] = {
34         { SPOOLSS_FORM_BUILTIN, "Letter",                         {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
35         { SPOOLSS_FORM_BUILTIN, "Letter Small",                   {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
36         { SPOOLSS_FORM_BUILTIN, "Tabloid",                        {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
37         { SPOOLSS_FORM_BUILTIN, "Ledger",                         {0x696b8,0x44368}, {0x0,0x0,0x696b8,0x44368} },
38         { SPOOLSS_FORM_BUILTIN, "Legal",                          {0x34b5c,0x56d10}, {0x0,0x0,0x34b5c,0x56d10} },
39         { SPOOLSS_FORM_BUILTIN, "Statement",                      {0x221b4,0x34b5c}, {0x0,0x0,0x221b4,0x34b5c} },
40         { SPOOLSS_FORM_BUILTIN, "Executive",                      {0x2cf56,0x411cc}, {0x0,0x0,0x2cf56,0x411cc} },
41         { SPOOLSS_FORM_BUILTIN, "A3",                             {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
42         { SPOOLSS_FORM_BUILTIN, "A4",                             {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
43         { SPOOLSS_FORM_BUILTIN, "A4 Small",                       {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
44         { SPOOLSS_FORM_BUILTIN, "A5",                             {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
45         { SPOOLSS_FORM_BUILTIN, "B4 (JIS)",                       {0x3ebe8,0x58de0}, {0x0,0x0,0x3ebe8,0x58de0} },
46         { SPOOLSS_FORM_BUILTIN, "B5 (JIS)",                       {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
47         { SPOOLSS_FORM_BUILTIN, "Folio",                          {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
48         { SPOOLSS_FORM_BUILTIN, "Quarto",                         {0x347d8,0x43238}, {0x0,0x0,0x347d8,0x43238} },
49         { SPOOLSS_FORM_BUILTIN, "10x14",                          {0x3e030,0x56d10}, {0x0,0x0,0x3e030,0x56d10} },
50         { SPOOLSS_FORM_BUILTIN, "11x17",                          {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
51         { SPOOLSS_FORM_BUILTIN, "Note",                           {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
52         { SPOOLSS_FORM_BUILTIN, "Envelope #9",                    {0x18079,0x37091}, {0x0,0x0,0x18079,0x37091} },
53         { SPOOLSS_FORM_BUILTIN, "Envelope #10",                   {0x19947,0x3ae94}, {0x0,0x0,0x19947,0x3ae94} },
54         { SPOOLSS_FORM_BUILTIN, "Envelope #11",                   {0x1be7c,0x40565}, {0x0,0x0,0x1be7c,0x40565} },
55         { SPOOLSS_FORM_BUILTIN, "Envelope #12",                   {0x1d74a,0x44368}, {0x0,0x0,0x1d74a,0x44368} },
56         { SPOOLSS_FORM_BUILTIN, "Envelope #14",                   {0x1f018,0x47504}, {0x0,0x0,0x1f018,0x47504} },
57         { SPOOLSS_FORM_BUILTIN, "C size sheet",                   {0x696b8,0x886d0}, {0x0,0x0,0x696b8,0x886d0} },
58         { SPOOLSS_FORM_BUILTIN, "D size sheet",                   {0x886d0,0xd2d70}, {0x0,0x0,0x886d0,0xd2d70} },
59         { SPOOLSS_FORM_BUILTIN, "E size sheet",                   {0xd2d70,0x110da0},{0x0,0x0,0xd2d70,0x110da0} },
60         { SPOOLSS_FORM_BUILTIN, "Envelope DL",                    {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
61         { SPOOLSS_FORM_BUILTIN, "Envelope C5",                    {0x278d0,0x37e88}, {0x0,0x0,0x278d0,0x37e88} },
62         { SPOOLSS_FORM_BUILTIN, "Envelope C3",                    {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
63         { SPOOLSS_FORM_BUILTIN, "Envelope C4",                    {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
64         { SPOOLSS_FORM_BUILTIN, "Envelope C6",                    {0x1bd50,0x278d0}, {0x0,0x0,0x1bd50,0x278d0} },
65         { SPOOLSS_FORM_BUILTIN, "Envelope C65",                   {0x1bd50,0x37e88}, {0x0,0x0,0x1bd50,0x37e88} },
66         { SPOOLSS_FORM_BUILTIN, "Envelope B4",                    {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
67         { SPOOLSS_FORM_BUILTIN, "Envelope B5",                    {0x2af80,0x3d090}, {0x0,0x0,0x2af80,0x3d090} },
68         { SPOOLSS_FORM_BUILTIN, "Envelope B6",                    {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
69         { SPOOLSS_FORM_BUILTIN, "Envelope",                       {0x1adb0,0x38270}, {0x0,0x0,0x1adb0,0x38270} },
70         { SPOOLSS_FORM_BUILTIN, "Envelope Monarch",               {0x18079,0x2e824}, {0x0,0x0,0x18079,0x2e824} },
71         { SPOOLSS_FORM_BUILTIN, "6 3/4 Envelope",                 {0x167ab,0x284ec}, {0x0,0x0,0x167ab,0x284ec} },
72         { SPOOLSS_FORM_BUILTIN, "US Std Fanfold",                 {0x5c3e1,0x44368}, {0x0,0x0,0x5c3e1,0x44368} },
73         { SPOOLSS_FORM_BUILTIN, "German Std Fanfold",             {0x34b5c,0x4a6a0}, {0x0,0x0,0x34b5c,0x4a6a0} },
74         { SPOOLSS_FORM_BUILTIN, "German Legal Fanfold",           {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
75         { SPOOLSS_FORM_BUILTIN, "B4 (ISO)",                       {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
76         { SPOOLSS_FORM_BUILTIN, "Japanese Postcard",              {0x186a0,0x24220}, {0x0,0x0,0x186a0,0x24220} },
77         { SPOOLSS_FORM_BUILTIN, "9x11",                           {0x37cf8,0x44368}, {0x0,0x0,0x37cf8,0x44368} },
78         { SPOOLSS_FORM_BUILTIN, "10x11",                          {0x3e030,0x44368}, {0x0,0x0,0x3e030,0x44368} },
79         { SPOOLSS_FORM_BUILTIN, "15x11",                          {0x5d048,0x44368}, {0x0,0x0,0x5d048,0x44368} },
80         { SPOOLSS_FORM_BUILTIN, "Envelope Invite",                {0x35b60,0x35b60}, {0x0,0x0,0x35b60,0x35b60} },
81         { SPOOLSS_FORM_BUILTIN, "Reserved48",                     {0x1,0x1},         {0x0,0x0,0x1,0x1} },
82         { SPOOLSS_FORM_BUILTIN, "Reserved49",                     {0x1,0x1},         {0x0,0x0,0x1,0x1} },
83         { SPOOLSS_FORM_BUILTIN, "Letter Extra",                   {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
84         { SPOOLSS_FORM_BUILTIN, "Legal Extra",                    {0x3ae94,0x5d048}, {0x0,0x0,0x3ae94,0x5d048} },
85         { SPOOLSS_FORM_BUILTIN, "Tabloid Extra",                  {0x4a6a0,0x6f9f0}, {0x0,0x0,0x4a6a0,0x6f9f0} },
86         { SPOOLSS_FORM_BUILTIN, "A4 Extra",                       {0x397c2,0x4eb16}, {0x0,0x0,0x397c2,0x4eb16} },
87         { SPOOLSS_FORM_BUILTIN, "Letter Transverse",              {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
88         { SPOOLSS_FORM_BUILTIN, "A4 Transverse",                  {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
89         { SPOOLSS_FORM_BUILTIN, "Letter Extra Transverse",        {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
90         { SPOOLSS_FORM_BUILTIN, "Super A",                        {0x376b8,0x56ea0}, {0x0,0x0,0x376b8,0x56ea0} },
91         { SPOOLSS_FORM_BUILTIN, "Super B",                        {0x4a768,0x76e58}, {0x0,0x0,0x4a768,0x76e58} },
92         { SPOOLSS_FORM_BUILTIN, "Letter Plus",                    {0x34b5c,0x4eb16}, {0x0,0x0,0x34b5c,0x4eb16} },
93         { SPOOLSS_FORM_BUILTIN, "A4 Plus",                        {0x33450,0x50910}, {0x0,0x0,0x33450,0x50910} },
94         { SPOOLSS_FORM_BUILTIN, "A5 Transverse",                  {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
95         { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Transverse",            {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
96         { SPOOLSS_FORM_BUILTIN, "A3 Extra",                       {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
97         { SPOOLSS_FORM_BUILTIN, "A5 Extra",                       {0x2a7b0,0x395f8}, {0x0,0x0,0x2a7b0,0x395f8} },
98         { SPOOLSS_FORM_BUILTIN, "B5 (ISO) Extra",                 {0x31128,0x43620}, {0x0,0x0,0x31128,0x43620} },
99         { SPOOLSS_FORM_BUILTIN, "A2",                             {0x668a0,0x91050}, {0x0,0x0,0x668a0,0x91050} },
100         { SPOOLSS_FORM_BUILTIN, "A3 Transverse",                  {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
101         { SPOOLSS_FORM_BUILTIN, "A3 Extra Transverse",            {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
102         { SPOOLSS_FORM_BUILTIN, "Japanese Double Postcard",       {0x30d40,0x24220}, {0x0,0x0,0x30d40,0x24220} },
103         { SPOOLSS_FORM_BUILTIN, "A6",                             {0x19a28,0x24220}, {0x0,0x0,0x19a28,0x24220} },
104         { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #2",      {0x3a980,0x510e0}, {0x0,0x0,0x3a980,0x510e0} },
105         { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #3",      {0x34bc0,0x43a08}, {0x0,0x0,0x34bc0,0x43a08} },
106         { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #3",      {0x1d4c0,0x395f8}, {0x0,0x0,0x1d4c0,0x395f8} },
107         { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #4",      {0x15f90,0x320c8}, {0x0,0x0,0x15f90,0x320c8} },
108         { SPOOLSS_FORM_BUILTIN, "Letter Rotated",                 {0x44368,0x34b5c}, {0x0,0x0,0x44368,0x34b5c} },
109         { SPOOLSS_FORM_BUILTIN, "A3 Rotated",                     {0x668a0,0x48828}, {0x0,0x0,0x668a0,0x48828} },
110         { SPOOLSS_FORM_BUILTIN, "A4 Rotated",                     {0x48828,0x33450}, {0x0,0x0,0x48828,0x33450} },
111         { SPOOLSS_FORM_BUILTIN, "A5 Rotated",                     {0x33450,0x24220}, {0x0,0x0,0x33450,0x24220} },
112         { SPOOLSS_FORM_BUILTIN, "B4 (JIS) Rotated",               {0x58de0,0x3ebe8}, {0x0,0x0,0x58de0,0x3ebe8} },
113         { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Rotated",               {0x3ebe8,0x2c6f0}, {0x0,0x0,0x3ebe8,0x2c6f0} },
114         { SPOOLSS_FORM_BUILTIN, "Japanese Postcard Rotated",      {0x24220,0x186a0}, {0x0,0x0,0x24220,0x186a0} },
115         { SPOOLSS_FORM_BUILTIN, "Double Japan Postcard Rotated",  {0x24220,0x30d40}, {0x0,0x0,0x24220,0x30d40} },
116         { SPOOLSS_FORM_BUILTIN, "A6 Rotated",                     {0x24220,0x19a28}, {0x0,0x0,0x24220,0x19a28} },
117         { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #2 Rotated", {0x510e0,0x3a980}, {0x0,0x0,0x510e0,0x3a980} },
118         { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #3 Rotated", {0x43a08,0x34bc0}, {0x0,0x0,0x43a08,0x34bc0} },
119         { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #3 Rotated", {0x395f8,0x1d4c0}, {0x0,0x0,0x395f8,0x1d4c0} },
120         { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #4 Rotated", {0x320c8,0x15f90}, {0x0,0x0,0x320c8,0x15f90} },
121         { SPOOLSS_FORM_BUILTIN, "B6 (JIS)",                       {0x1f400,0x2c6f0}, {0x0,0x0,0x1f400,0x2c6f0} },
122         { SPOOLSS_FORM_BUILTIN, "B6 (JIS) Rotated",               {0x2c6f0,0x1f400}, {0x0,0x0,0x2c6f0,0x1f400} },
123         { SPOOLSS_FORM_BUILTIN, "12x11",                          {0x4a724,0x443e1}, {0x0,0x0,0x4a724,0x443e1} },
124         { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4",          {0x19a28,0x395f8}, {0x0,0x0,0x19a28,0x395f8} },
125         { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4 Rotated",  {0x395f8,0x19a28}, {0x0,0x0,0x395f8,0x19a28} },
126         { SPOOLSS_FORM_BUILTIN, "PRC 16K",                        {0x2de60,0x3f7a0}, {0x0,0x0,0x2de60,0x3f7a0} },
127         { SPOOLSS_FORM_BUILTIN, "PRC 32K",                        {0x1fbd0,0x2cec0}, {0x0,0x0,0x1fbd0,0x2cec0} },
128         { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big)",                   {0x222e0,0x318f8}, {0x0,0x0,0x222e0,0x318f8} },
129         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1",                {0x18e70,0x28488}, {0x0,0x0,0x18e70,0x28488} },
130         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2",                {0x18e70,0x2af80}, {0x0,0x0,0x18e70,0x2af80} },
131         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3",                {0x1e848,0x2af80}, {0x0,0x0,0x1e848,0x2af80} },
132         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4",                {0x1adb0,0x32c80}, {0x0,0x0,0x1adb0,0x32c80} },
133         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5",                {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
134         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6",                {0x1d4c0,0x38270}, {0x0,0x0,0x1d4c0,0x38270} },
135         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7",                {0x27100,0x38270}, {0x0,0x0,0x27100,0x38270} },
136         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8",                {0x1d4c0,0x4b708}, {0x0,0x0,0x1d4c0,0x4b708} },
137         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9",                {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
138         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10",               {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
139         { SPOOLSS_FORM_BUILTIN, "PRC 16K Rotated",                {0x3f7a0,0x2de60}, {0x0,0x0,0x3f7a0,0x2de60} },
140         { SPOOLSS_FORM_BUILTIN, "PRC 32K Rotated",                {0x2cec0,0x1fbd0}, {0x0,0x0,0x2cec0,0x1fbd0} },
141         { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big) Rotated",           {0x318f8,0x222e0}, {0x0,0x0,0x318f8,0x222e0} },
142         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1 Rotated",        {0x28488,0x18e70}, {0x0,0x0,0x28488,0x18e70} },
143         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2 Rotated",        {0x2af80,0x18e70}, {0x0,0x0,0x2af80,0x18e70} },
144         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3 Rotated",        {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
145         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4 Rotated",        {0x32c80,0x1adb0}, {0x0,0x0,0x32c80,0x1adb0} },
146         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5 Rotated",        {0x35b60,0x1adb0}, {0x0,0x0,0x35b60,0x1adb0} },
147         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6 Rotated",        {0x38270,0x1d4c0}, {0x0,0x0,0x38270,0x1d4c0} },
148         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7 Rotated",        {0x38270,0x27100}, {0x0,0x0,0x38270,0x27100} },
149         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8 Rotated",        {0x4b708,0x1d4c0}, {0x0,0x0,0x4b708,0x1d4c0} },
150         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9 Rotated",        {0x4f1a0,0x37e88}, {0x0,0x0,0x4f1a0,0x37e88} },
151         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10 Rotated",       {0x6fd10,0x4f1a0}, {0x0,0x0,0x6fd10,0x4f1a0} }
152 };
153
154 /********************************************************************
155  static helper functions
156 ********************************************************************/
157
158 /****************************************************************************
159  Update the changeid time.
160 ****************************************************************************/
161 /**
162  * @internal
163  *
164  * @brief Update the ChangeID time of a printer.
165  *
166  * This is SO NASTY as some drivers need this to change, others need it
167  * static. This value will change every second, and I must hope that this
168  * is enough..... DON'T CHANGE THIS CODE WITHOUT A TEST MATRIX THE SIZE OF
169  * UTAH ! JRA.
170  *
171  * @return              The ChangeID.
172  */
173 static uint32_t winreg_printer_rev_changeid(void)
174 {
175         struct timeval tv;
176
177         get_process_uptime(&tv);
178
179 #if 1   /* JERRY */
180         /* Return changeid as msec since spooler restart */
181         return tv.tv_sec * 1000 + tv.tv_usec / 1000;
182 #else
183         /*
184          * This setting seems to work well but is too untested
185          * to replace the above calculation.  Left in for experiementation
186          * of the reader            --jerry (Tue Mar 12 09:15:05 CST 2002)
187          */
188         return tv.tv_sec * 10 + tv.tv_usec / 100000;
189 #endif
190 }
191
192 /**
193  * @internal
194  *
195  * @brief Connect to the interal winreg server and open the given printer key.
196  *
197  * The function will create the needed subkeys if they don't exist.
198  *
199  * @param[in]  mem_ctx       The memory context to use.
200  *
201  * @param[in]  server_info   The supplied server info.
202  *
203  * @param[out] winreg_pipe   A pointer for the winreg rpc client pipe.
204  *
205  * @param[in]  path          The path to the key to open.
206  *
207  * @param[in]  key           The key to open.
208  *
209  * @param[in]  create_key    Set to true if the key should be created if it
210  *                           doesn't exist.
211  *
212  * @param[in]  access_mask   The access mask to open the key.
213  *
214  * @param[out] hive_handle   A policy handle for the opened hive.
215  *
216  * @param[out] key_handle    A policy handle for the opened key.
217  *
218  * @return                   WERR_OK on success, the corresponding DOS error
219  *                           code if something gone wrong.
220  */
221 static WERROR winreg_printer_openkey(TALLOC_CTX *mem_ctx,
222                               struct auth_serversupplied_info *server_info,
223                               struct rpc_pipe_client **winreg_pipe,
224                               const char *path,
225                               const char *key,
226                               bool create_key,
227                               uint32_t access_mask,
228                               struct policy_handle *hive_handle,
229                               struct policy_handle *key_handle)
230 {
231         struct rpc_pipe_client *pipe_handle;
232         struct winreg_String wkey, wkeyclass;
233         char *keyname;
234         NTSTATUS status;
235         WERROR result = WERR_OK;
236
237         /* create winreg connection */
238         status = rpc_pipe_open_internal(mem_ctx,
239                                         &ndr_table_winreg.syntax_id,
240                                         rpc_winreg_dispatch,
241                                         server_info,
242                                         &pipe_handle);
243         if (!NT_STATUS_IS_OK(status)) {
244                 DEBUG(0, ("winreg_printer_openkey: Could not connect to winreg_pipe: %s\n",
245                           nt_errstr(status)));
246                 return ntstatus_to_werror(status);
247         }
248
249         status = rpccli_winreg_OpenHKLM(pipe_handle,
250                                         mem_ctx,
251                                         NULL,
252                                         access_mask,
253                                         hive_handle,
254                                         &result);
255         if (!NT_STATUS_IS_OK(status)) {
256                 DEBUG(0, ("winreg_printer_openkey: Could not open HKLM hive: %s\n",
257                           nt_errstr(status)));
258                 talloc_free(pipe_handle);
259                 if (!W_ERROR_IS_OK(result)) {
260                         return result;
261                 }
262                 return ntstatus_to_werror(status);
263         }
264
265         if (key && *key) {
266                 keyname = talloc_asprintf(mem_ctx, "%s\\%s", path, key);
267         } else {
268                 keyname = talloc_strdup(mem_ctx, path);
269         }
270         if (keyname == NULL) {
271                 talloc_free(pipe_handle);
272                 return WERR_NOMEM;
273         }
274
275         ZERO_STRUCT(wkey);
276         wkey.name = keyname;
277
278         if (create_key) {
279                 enum winreg_CreateAction action = REG_ACTION_NONE;
280
281                 ZERO_STRUCT(wkeyclass);
282                 wkeyclass.name = "";
283
284                 status = rpccli_winreg_CreateKey(pipe_handle,
285                                                  mem_ctx,
286                                                  hive_handle,
287                                                  wkey,
288                                                  wkeyclass,
289                                                  0,
290                                                  access_mask,
291                                                  NULL,
292                                                  key_handle,
293                                                  &action,
294                                                  &result);
295                 switch (action) {
296                         case REG_ACTION_NONE:
297                                 DEBUG(8, ("winreg_printer_openkey:createkey did nothing -- huh?\n"));
298                                 break;
299                         case REG_CREATED_NEW_KEY:
300                                 DEBUG(8, ("winreg_printer_openkey: createkey created %s\n", keyname));
301                                 break;
302                         case REG_OPENED_EXISTING_KEY:
303                                 DEBUG(8, ("winreg_printer_openkey: createkey opened existing %s\n", keyname));
304                                 break;
305                 }
306         } else {
307                 status = rpccli_winreg_OpenKey(pipe_handle,
308                                                mem_ctx,
309                                                hive_handle,
310                                                wkey,
311                                                0,
312                                                access_mask,
313                                                key_handle,
314                                                &result);
315         }
316         if (!NT_STATUS_IS_OK(status)) {
317                 talloc_free(pipe_handle);
318                 if (!W_ERROR_IS_OK(result)) {
319                         return result;
320                 }
321                 return ntstatus_to_werror(status);
322         }
323
324         *winreg_pipe = pipe_handle;
325
326         return WERR_OK;
327 }
328
329 /**
330  * @brief Create the registry keyname for the given printer.
331  *
332  * @param[in]  mem_ctx  The memory context to use.
333  *
334  * @param[in]  printer  The name of the printer to get the registry key.
335  *
336  * @return     The registry key or NULL on error.
337  */
338 static char *winreg_printer_data_keyname(TALLOC_CTX *mem_ctx, const char *printer) {
339         return talloc_asprintf(mem_ctx, "%s\\%s", TOP_LEVEL_PRINT_PRINTERS_KEY, printer);
340 }
341
342 /**
343  * @internal
344  *
345  * @brief Enumerate values of an opened key handle and retrieve the data.
346  *
347  * @param[in]  mem_ctx  The memory context to use.
348  *
349  * @param[in]  pipe_handle The pipe handle for the rpc connection.
350  *
351  * @param[in]  key_hnd  The opened key handle.
352  *
353  * @param[out] pnum_values A pointer to store he number of values found.
354  *
355  * @param[out] pnum_values A pointer to store the number of values we found.
356  *
357  * @return                   WERR_OK on success, the corresponding DOS error
358  *                           code if something gone wrong.
359  */
360 static WERROR winreg_printer_enumvalues(TALLOC_CTX *mem_ctx,
361                                         struct rpc_pipe_client *pipe_handle,
362                                         struct policy_handle *key_hnd,
363                                         uint32_t *pnum_values,
364                                         struct spoolss_PrinterEnumValues **penum_values)
365 {
366         TALLOC_CTX *tmp_ctx;
367         uint32_t num_subkeys, max_subkeylen, max_classlen;
368         uint32_t num_values, max_valnamelen, max_valbufsize;
369         uint32_t secdescsize;
370         uint32_t i;
371         NTTIME last_changed_time;
372         struct winreg_String classname;
373
374         struct spoolss_PrinterEnumValues *enum_values;
375
376         WERROR result = WERR_OK;
377         NTSTATUS status;
378
379         tmp_ctx = talloc_new(mem_ctx);
380         if (tmp_ctx == NULL) {
381                 return WERR_NOMEM;
382         }
383
384         ZERO_STRUCT(classname);
385
386         status = rpccli_winreg_QueryInfoKey(pipe_handle,
387                                             tmp_ctx,
388                                             key_hnd,
389                                             &classname,
390                                             &num_subkeys,
391                                             &max_subkeylen,
392                                             &max_classlen,
393                                             &num_values,
394                                             &max_valnamelen,
395                                             &max_valbufsize,
396                                             &secdescsize,
397                                             &last_changed_time,
398                                             &result);
399         if (!NT_STATUS_IS_OK(status)) {
400                 DEBUG(0, ("winreg_printer_enumvalues: Could not query info: %s\n",
401                           nt_errstr(status)));
402                 if (!W_ERROR_IS_OK(result)) {
403                         goto error;
404                 }
405                 result = ntstatus_to_werror(status);
406                 goto error;
407         }
408
409         if (num_values == 0) {
410                 *pnum_values = 0;
411                 TALLOC_FREE(tmp_ctx);
412                 return WERR_OK;
413         }
414
415         enum_values = TALLOC_ARRAY(tmp_ctx, struct spoolss_PrinterEnumValues, num_values);
416         if (enum_values == NULL) {
417                 result = WERR_NOMEM;
418                 goto error;
419         }
420
421         for (i = 0; i < num_values; i++) {
422                 struct spoolss_PrinterEnumValues val;
423                 struct winreg_ValNameBuf name_buf;
424                 enum winreg_Type type = REG_NONE;
425                 uint8_t *data = NULL;
426                 uint32_t data_size;
427                 uint32_t length;
428                 char n = '\0';;
429
430                 name_buf.name = &n;
431                 name_buf.size = max_valnamelen + 2;
432                 name_buf.length = 0;
433
434                 data_size = max_valbufsize;
435                 data = (uint8_t *) TALLOC(tmp_ctx, data_size);
436                 length = 0;
437
438                 status = rpccli_winreg_EnumValue(pipe_handle,
439                                                  tmp_ctx,
440                                                  key_hnd,
441                                                  i,
442                                                  &name_buf,
443                                                  &type,
444                                                  data,
445                                                  &data_size,
446                                                  &length,
447                                                  &result);
448                 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
449                         result = WERR_OK;
450                         status = NT_STATUS_OK;
451                         break;
452                 }
453
454                 if (!NT_STATUS_IS_OK(status)) {
455                         DEBUG(0, ("winreg_printer_enumvalues: Could not enumerate values: %s\n",
456                                   nt_errstr(status)));
457                         if (!W_ERROR_IS_OK(result)) {
458                                 goto error;
459                         }
460                         result = ntstatus_to_werror(status);
461                         goto error;
462                 }
463
464                 if (name_buf.name == NULL) {
465                         result = WERR_INVALID_PARAMETER;
466                         goto error;
467                 }
468
469                 val.value_name = talloc_strdup(enum_values, name_buf.name);
470                 if (val.value_name == NULL) {
471                         result = WERR_NOMEM;
472                         goto error;
473                 }
474                 val.value_name_len = strlen_m_term(val.value_name) * 2;
475
476                 val.type = type;
477                 val.data_length = data_size;
478                 val.data = NULL;
479                 if (val.data_length) {
480                         val.data = talloc(enum_values, DATA_BLOB);
481                         if (val.data == NULL) {
482                                 result = WERR_NOMEM;
483                                 goto error;
484                         }
485                         *val.data = data_blob_talloc(enum_values, data, data_size);
486                 }
487
488                 enum_values[i] = val;
489         }
490
491         *pnum_values = num_values;
492         if (penum_values) {
493                 *penum_values = talloc_move(mem_ctx, &enum_values);
494         }
495
496         result = WERR_OK;
497
498  error:
499         TALLOC_FREE(tmp_ctx);
500         return result;
501 }
502
503 /**
504  * @internal
505  *
506  * @brief Enumerate subkeys of an opened key handle and get the names.
507  *
508  * @param[in]  mem_ctx  The memory context to use.
509  *
510  * @param[in]  pipe_handle The pipe handle for the rpc connection.
511  *
512  * @param[in]  key_hnd  The opened key handle.
513  *
514  * @param[in]  pnum_subkeys A pointer to store the number of found subkeys.
515  *
516  * @param[in]  psubkeys A pointer to an array to store the found names of
517  *                      subkeys.
518  *
519  * @return                   WERR_OK on success, the corresponding DOS error
520  *                           code if something gone wrong.
521  */
522 static WERROR winreg_printer_enumkeys(TALLOC_CTX *mem_ctx,
523                                       struct rpc_pipe_client *pipe_handle,
524                                       struct policy_handle *key_hnd,
525                                       uint32_t *pnum_subkeys,
526                                       const char ***psubkeys)
527 {
528         TALLOC_CTX *tmp_ctx;
529         const char **subkeys;
530         uint32_t num_subkeys, max_subkeylen, max_classlen;
531         uint32_t num_values, max_valnamelen, max_valbufsize;
532         uint32_t i;
533         NTTIME last_changed_time;
534         uint32_t secdescsize;
535         struct winreg_String classname;
536         WERROR result = WERR_OK;
537         NTSTATUS status;
538
539         tmp_ctx = talloc_new(mem_ctx);
540         if (tmp_ctx == NULL) {
541                 return WERR_NOMEM;
542         }
543
544         ZERO_STRUCT(classname);
545
546         status = rpccli_winreg_QueryInfoKey(pipe_handle,
547                                             tmp_ctx,
548                                             key_hnd,
549                                             &classname,
550                                             &num_subkeys,
551                                             &max_subkeylen,
552                                             &max_classlen,
553                                             &num_values,
554                                             &max_valnamelen,
555                                             &max_valbufsize,
556                                             &secdescsize,
557                                             &last_changed_time,
558                                             &result);
559         if (!NT_STATUS_IS_OK(status)) {
560                 DEBUG(0, ("winreg_printer_enumkeys: Could not query info: %s\n",
561                           nt_errstr(status)));
562                 if (!W_ERROR_IS_OK(result)) {
563                         goto error;
564                 }
565                 result = ntstatus_to_werror(status);
566                 goto error;
567         }
568
569         subkeys = talloc_zero_array(tmp_ctx, const char *, num_subkeys + 2);
570         if (subkeys == NULL) {
571                 result = WERR_NOMEM;
572                 goto error;
573         }
574
575         if (num_subkeys == 0) {
576                 subkeys[0] = talloc_strdup(subkeys, "");
577                 if (subkeys[0] == NULL) {
578                         result = WERR_NOMEM;
579                         goto error;
580                 }
581                 *pnum_subkeys = 0;
582                 if (psubkeys) {
583                         *psubkeys = talloc_move(mem_ctx, &subkeys);
584                 }
585
586                 TALLOC_FREE(tmp_ctx);
587                 return WERR_OK;
588         }
589
590         for (i = 0; i < num_subkeys; i++) {
591                 char c = '\0';
592                 char n = '\0';
593                 char *name = NULL;
594                 struct winreg_StringBuf class_buf;
595                 struct winreg_StringBuf name_buf;
596                 NTTIME modtime;
597
598                 class_buf.name = &c;
599                 class_buf.size = max_classlen + 2;
600                 class_buf.length = 0;
601
602                 name_buf.name = &n;
603                 name_buf.size = max_subkeylen + 2;
604                 name_buf.length = 0;
605
606                 ZERO_STRUCT(modtime);
607
608                 status = rpccli_winreg_EnumKey(pipe_handle,
609                                                tmp_ctx,
610                                                key_hnd,
611                                                i,
612                                                &name_buf,
613                                                &class_buf,
614                                                &modtime,
615                                                &result);
616                 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
617                         result = WERR_OK;
618                         status = NT_STATUS_OK;
619                         break;
620                 }
621
622                 if (!NT_STATUS_IS_OK(status)) {
623                         DEBUG(0, ("winreg_printer_enumkeys: Could not enumerate keys: %s\n",
624                                   nt_errstr(status)));
625                         if (!W_ERROR_IS_OK(result)) {
626                                 goto error;
627                         }
628                         result = ntstatus_to_werror(status);
629                         goto error;
630                 }
631
632                 if (name_buf.name == NULL) {
633                         result = WERR_INVALID_PARAMETER;
634                         goto error;
635                 }
636
637                 name = talloc_strdup(subkeys, name_buf.name);
638                 if (name == NULL) {
639                         result = WERR_NOMEM;
640                         goto error;
641                 }
642
643                 subkeys[i] = name;
644         }
645
646         *pnum_subkeys = num_subkeys;
647         if (psubkeys) {
648                 *psubkeys = talloc_move(mem_ctx, &subkeys);
649         }
650
651  error:
652         TALLOC_FREE(tmp_ctx);
653         return result;
654 }
655
656 /**
657  * @internal
658  *
659  * @brief A function to delete a key and its subkeys recurively.
660  *
661  * @param[in]  mem_ctx  The memory context to use.
662  *
663  * @param[in]  pipe_handle The pipe handle for the rpc connection.
664  *
665  * @param[in]  hive_handle A opened hive handle to the key.
666  *
667  * @param[in]  access_mask The access mask to access the key.
668  *
669  * @param[in]  key      The key to delete
670  *
671  * @return              WERR_OK on success, the corresponding DOS error
672  *                      code if something gone wrong.
673  */
674 static WERROR winreg_printer_delete_subkeys(TALLOC_CTX *mem_ctx,
675                                             struct rpc_pipe_client *pipe_handle,
676                                             struct policy_handle *hive_handle,
677                                             uint32_t access_mask,
678                                             const char *key)
679 {
680         const char **subkeys = NULL;
681         uint32_t num_subkeys = 0;
682         struct policy_handle key_hnd;
683         struct winreg_String wkey;
684         WERROR result = WERR_OK;
685         NTSTATUS status;
686         uint32_t i;
687
688         ZERO_STRUCT(key_hnd);
689         wkey.name = key;
690
691         DEBUG(2, ("winreg_printer_delete_subkeys: delete key %s\n", key));
692         /* open the key */
693         status = rpccli_winreg_OpenKey(pipe_handle,
694                                        mem_ctx,
695                                        hive_handle,
696                                        wkey,
697                                        0,
698                                        access_mask,
699                                        &key_hnd,
700                                        &result);
701         if (!NT_STATUS_IS_OK(status)) {
702                 DEBUG(0, ("winreg_printer_delete_subkeys: Could not open key %s: %s\n",
703                           wkey.name, nt_errstr(status)));
704                 if (!W_ERROR_IS_OK(result)) {
705                         return result;
706                 }
707                 return ntstatus_to_werror(status);
708         }
709
710         result = winreg_printer_enumkeys(mem_ctx,
711                                          pipe_handle,
712                                          &key_hnd,
713                                          &num_subkeys,
714                                          &subkeys);
715         if (!W_ERROR_IS_OK(result)) {
716                 goto done;
717         }
718
719         for (i = 0; i < num_subkeys; i++) {
720                 /* create key + subkey */
721                 char *subkey = talloc_asprintf(mem_ctx, "%s\\%s", key, subkeys[i]);
722                 if (subkey == NULL) {
723                         goto done;
724                 }
725
726                 DEBUG(2, ("winreg_printer_delete_subkeys: delete subkey %s\n", subkey));
727                 result = winreg_printer_delete_subkeys(mem_ctx,
728                                                        pipe_handle,
729                                                        hive_handle,
730                                                        access_mask,
731                                                        subkey);
732                 if (!W_ERROR_IS_OK(result)) {
733                         goto done;
734                 }
735         }
736
737         if (is_valid_policy_hnd(&key_hnd)) {
738                 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
739         }
740
741         wkey.name = key;
742
743         status = rpccli_winreg_DeleteKey(pipe_handle,
744                                          mem_ctx,
745                                          hive_handle,
746                                          wkey,
747                                          &result);
748
749 done:
750         if (is_valid_policy_hnd(&key_hnd)) {
751                 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
752         }
753
754         return result;
755 }
756
757 static WERROR winreg_printer_write_sz(TALLOC_CTX *mem_ctx,
758                                       struct rpc_pipe_client *pipe_handle,
759                                       struct policy_handle *key_handle,
760                                       const char *value,
761                                       const char *data)
762 {
763         struct winreg_String wvalue;
764         DATA_BLOB blob;
765         WERROR result = WERR_OK;
766         NTSTATUS status;
767
768         wvalue.name = value;
769         if (data == NULL) {
770                 blob = data_blob_string_const("");
771         } else {
772                 if (!push_reg_sz(mem_ctx, NULL, &blob, data)) {
773                         DEBUG(0, ("winreg_printer_write_sz: Could not marshall string %s for %s\n",
774                                 data, wvalue.name));
775                         return WERR_NOMEM;
776                 }
777         }
778         status = rpccli_winreg_SetValue(pipe_handle,
779                                         mem_ctx,
780                                         key_handle,
781                                         wvalue,
782                                         REG_SZ,
783                                         blob.data,
784                                         blob.length,
785                                         &result);
786         if (!NT_STATUS_IS_OK(status)) {
787                 DEBUG(0, ("winreg_printer_write_sz: Could not set value %s: %s\n",
788                         wvalue.name, win_errstr(result)));
789                 if (!W_ERROR_IS_OK(result)) {
790                         result = ntstatus_to_werror(status);
791                 }
792         }
793
794         return result;
795 }
796
797 static WERROR winreg_printer_write_dword(TALLOC_CTX *mem_ctx,
798                                          struct rpc_pipe_client *pipe_handle,
799                                          struct policy_handle *key_handle,
800                                          const char *value,
801                                          uint32_t data)
802 {
803         struct winreg_String wvalue;
804         DATA_BLOB blob;
805         WERROR result = WERR_OK;
806         NTSTATUS status;
807
808         wvalue.name = value;
809         blob = data_blob_talloc(mem_ctx, NULL, 4);
810         SIVAL(blob.data, 0, data);
811
812         status = rpccli_winreg_SetValue(pipe_handle,
813                                         mem_ctx,
814                                         key_handle,
815                                         wvalue,
816                                         REG_DWORD,
817                                         blob.data,
818                                         blob.length,
819                                         &result);
820         if (!NT_STATUS_IS_OK(status)) {
821                 DEBUG(0, ("winreg_printer_write_dword: Could not set value %s: %s\n",
822                         wvalue.name, win_errstr(result)));
823                 if (!W_ERROR_IS_OK(result)) {
824                         result = ntstatus_to_werror(status);
825                 }
826         }
827
828         return result;
829 }
830
831 static WERROR winreg_printer_write_binary(TALLOC_CTX *mem_ctx,
832                                           struct rpc_pipe_client *pipe_handle,
833                                           struct policy_handle *key_handle,
834                                           const char *value,
835                                           DATA_BLOB blob)
836 {
837         struct winreg_String wvalue;
838         WERROR result = WERR_OK;
839         NTSTATUS status;
840
841         wvalue.name = value;
842         status = rpccli_winreg_SetValue(pipe_handle,
843                                         mem_ctx,
844                                         key_handle,
845                                         wvalue,
846                                         REG_BINARY,
847                                         blob.data,
848                                         blob.length,
849                                         &result);
850         if (!NT_STATUS_IS_OK(status)) {
851                 DEBUG(0, ("winreg_printer_write_binary: Could not set value %s: %s\n",
852                         wvalue.name, win_errstr(result)));
853                 if (!W_ERROR_IS_OK(result)) {
854                         result = ntstatus_to_werror(status);
855                 }
856         }
857
858         return result;
859 }
860
861 static WERROR winreg_printer_query_dword(TALLOC_CTX *mem_ctx,
862                                          struct rpc_pipe_client *pipe_handle,
863                                          struct policy_handle *key_handle,
864                                          const char *value,
865                                          uint32_t *data)
866 {
867         struct winreg_String wvalue;
868         enum winreg_Type type;
869         WERROR result = WERR_OK;
870         uint32_t value_len = 0;
871         NTSTATUS status;
872         DATA_BLOB blob;
873
874         wvalue.name = value;
875         status = rpccli_winreg_QueryValue(pipe_handle,
876                                           mem_ctx,
877                                           key_handle,
878                                           &wvalue,
879                                           &type,
880                                           NULL,
881                                           (uint32_t *) &blob.length,
882                                           &value_len,
883                                           &result);
884         if (!NT_STATUS_IS_OK(status)) {
885                 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
886                           wvalue.name, nt_errstr(status)));
887                 if (!W_ERROR_IS_OK(result)) {
888                         goto done;
889                 }
890                 result = ntstatus_to_werror(status);
891                 goto done;
892         }
893
894         if (type != REG_DWORD) {
895                 result = WERR_INVALID_DATATYPE;
896                 goto done;
897         }
898
899         if (blob.length != 4) {
900                 result = WERR_INVALID_DATA;
901                 goto done;
902         }
903
904         blob.data = (uint8_t *) TALLOC(mem_ctx, blob.length);
905         if (blob.data == NULL) {
906                 result = WERR_NOMEM;
907                 goto done;
908         }
909         value_len = 0;
910
911         status = rpccli_winreg_QueryValue(pipe_handle,
912                                           mem_ctx,
913                                           key_handle,
914                                           &wvalue,
915                                           &type,
916                                           blob.data,
917                                           (uint32_t *) &blob.length,
918                                           &value_len,
919                                           &result);
920         if (!NT_STATUS_IS_OK(status)) {
921                 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
922                           wvalue.name, nt_errstr(status)));
923                 if (!W_ERROR_IS_OK(result)) {
924                         result = ntstatus_to_werror(status);
925                 }
926                 goto done;
927         }
928
929         if (data) {
930                 *data = IVAL(blob.data, 0);
931         }
932 done:
933         return result;
934 }
935
936 static WERROR winreg_printer_write_multi_sz(TALLOC_CTX *mem_ctx,
937                                             struct rpc_pipe_client *pipe_handle,
938                                             struct policy_handle *key_handle,
939                                             const char *value,
940                                             const char **data)
941 {
942         struct winreg_String wvalue;
943         DATA_BLOB blob;
944         WERROR result = WERR_OK;
945         NTSTATUS status;
946
947         wvalue.name = value;
948         if (!push_reg_multi_sz(mem_ctx, NULL, &blob, data)) {
949                 return WERR_NOMEM;
950         }
951         status = rpccli_winreg_SetValue(pipe_handle,
952                                         mem_ctx,
953                                         key_handle,
954                                         wvalue,
955                                         REG_MULTI_SZ,
956                                         blob.data,
957                                         blob.length,
958                                         &result);
959         if (!NT_STATUS_IS_OK(status)) {
960                 DEBUG(0, ("winreg_printer_write_multi_sz: Could not set value %s: %s\n",
961                         wvalue.name, win_errstr(result)));
962                 if (!W_ERROR_IS_OK(result)) {
963                         result = ntstatus_to_werror(status);
964                 }
965         }
966
967         return result;
968 }
969
970 static WERROR winreg_printer_opendriver(TALLOC_CTX *mem_ctx,
971                                         struct auth_serversupplied_info *server_info,
972                                         const char *drivername,
973                                         const char *architecture,
974                                         uint32_t version,
975                                         uint32_t access_mask,
976                                         bool create,
977                                         struct rpc_pipe_client **winreg_pipe,
978                                         struct policy_handle *hive_hnd,
979                                         struct policy_handle *key_hnd)
980 {
981         WERROR result;
982         char *key_name;
983
984         key_name = talloc_asprintf(mem_ctx, "%s\\Environments\\%s\\Drivers\\Version-%u",
985                                    TOP_LEVEL_CONTROL_KEY,
986                                    architecture, version);
987         if (!key_name) {
988                 return WERR_NOMEM;
989         }
990
991         result = winreg_printer_openkey(mem_ctx,
992                                         server_info,
993                                         winreg_pipe,
994                                         key_name,
995                                         drivername,
996                                         create,
997                                         access_mask,
998                                         hive_hnd,
999                                         key_hnd);
1000         return result;
1001 }
1002
1003 static WERROR winreg_enumval_to_dword(TALLOC_CTX *mem_ctx,
1004                                       struct spoolss_PrinterEnumValues *v,
1005                                       const char *valuename, uint32_t *dw)
1006 {
1007         /* just return if it is not the one we are looking for */
1008         if (strcmp(valuename, v->value_name) != 0) {
1009                 return WERR_NOT_FOUND;
1010         }
1011
1012         if (v->type != REG_DWORD) {
1013                 return WERR_INVALID_DATATYPE;
1014         }
1015
1016         *dw = IVAL(v->data->data, 0);
1017         return WERR_OK;
1018 }
1019
1020 static WERROR winreg_enumval_to_sz(TALLOC_CTX *mem_ctx,
1021                                    struct spoolss_PrinterEnumValues *v,
1022                                    const char *valuename, const char **_str)
1023 {
1024         /* just return if it is not the one we are looking for */
1025         if (strcmp(valuename, v->value_name) != 0) {
1026                 return WERR_NOT_FOUND;
1027         }
1028
1029         if (v->type != REG_SZ) {
1030                 return WERR_INVALID_DATATYPE;
1031         }
1032
1033         if (!pull_reg_sz(mem_ctx, NULL, v->data, _str)) {
1034                 return WERR_NOMEM;
1035         }
1036
1037         return WERR_OK;
1038 }
1039
1040 static WERROR winreg_enumval_to_multi_sz(TALLOC_CTX *mem_ctx,
1041                                          struct spoolss_PrinterEnumValues *v,
1042                                          const char *valuename,
1043                                          const char ***array)
1044 {
1045         /* just return if it is not the one we are looking for */
1046         if (strcmp(valuename, v->value_name) != 0) {
1047                 return WERR_NOT_FOUND;
1048         }
1049
1050         if (v->type != REG_MULTI_SZ) {
1051                 return WERR_INVALID_DATATYPE;
1052         }
1053
1054         if (!pull_reg_multi_sz(mem_ctx, NULL, v->data, array)) {
1055                 return WERR_NOMEM;
1056         }
1057
1058         return WERR_OK;
1059 }
1060
1061 static WERROR winreg_enumval_to_blob(TALLOC_CTX *mem_ctx,
1062                                      struct spoolss_PrinterEnumValues *v,
1063                                      const char *valuename,
1064                                      DATA_BLOB *blob)
1065 {
1066         /* just return if it is not the one we are looking for */
1067         if (strcmp(valuename, v->value_name) != 0) {
1068                 return WERR_NOT_FOUND;
1069         }
1070
1071         if (v->type != REG_BINARY) {
1072                 return WERR_INVALID_DATATYPE;
1073         }
1074
1075         blob->data = v->data->data;
1076         blob->length = v->data_length;
1077
1078         return WERR_OK;
1079 }
1080
1081 /********************************************************************
1082  Public winreg function for spoolss
1083 ********************************************************************/
1084
1085 /* Set printer data over the winreg pipe. */
1086 WERROR winreg_set_printer_dataex(TALLOC_CTX *mem_ctx,
1087                                  struct auth_serversupplied_info *server_info,
1088                                  const char *printer,
1089                                  const char *key,
1090                                  const char *value,
1091                                  enum winreg_Type type,
1092                                  uint8_t *data,
1093                                  uint32_t data_size)
1094 {
1095         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1096         struct rpc_pipe_client *winreg_pipe = NULL;
1097         struct policy_handle hive_hnd, key_hnd;
1098         struct winreg_String wvalue;
1099         char *path;
1100         WERROR result = WERR_OK;
1101         NTSTATUS status;
1102         TALLOC_CTX *tmp_ctx;
1103
1104         tmp_ctx = talloc_new(mem_ctx);
1105         if (tmp_ctx == NULL) {
1106                 return WERR_NOMEM;
1107         }
1108
1109         path = winreg_printer_data_keyname(tmp_ctx, printer);
1110         if (path == NULL) {
1111                 TALLOC_FREE(tmp_ctx);
1112                 return WERR_NOMEM;
1113         }
1114
1115         ZERO_STRUCT(hive_hnd);
1116         ZERO_STRUCT(key_hnd);
1117
1118         DEBUG(8, ("winreg_set_printer_dataex: Open printer key %s, value %s, access_mask: 0x%05x for [%s]\n",
1119                         key, value, access_mask, printer));
1120         result = winreg_printer_openkey(tmp_ctx,
1121                                         server_info,
1122                                         &winreg_pipe,
1123                                         path,
1124                                         key,
1125                                         true,
1126                                         access_mask,
1127                                         &hive_hnd,
1128                                         &key_hnd);
1129         if (!W_ERROR_IS_OK(result)) {
1130                 DEBUG(0, ("winreg_set_printer_dataex: Could not open key %s: %s\n",
1131                           key, win_errstr(result)));
1132                 goto done;
1133         }
1134
1135         wvalue.name = value;
1136         status = rpccli_winreg_SetValue(winreg_pipe,
1137                                         tmp_ctx,
1138                                         &key_hnd,
1139                                         wvalue,
1140                                         type,
1141                                         data,
1142                                         data_size,
1143                                         &result);
1144         if (!NT_STATUS_IS_OK(status)) {
1145                 DEBUG(0, ("winreg_set_printer_dataex: Could not set value %s: %s\n",
1146                           value, nt_errstr(status)));
1147                 if (!W_ERROR_IS_OK(result)) {
1148                         goto done;
1149                 }
1150                 result = ntstatus_to_werror(status);
1151                 goto done;
1152         }
1153
1154         result = WERR_OK;
1155 done:
1156         if (winreg_pipe != NULL) {
1157                 if (is_valid_policy_hnd(&key_hnd)) {
1158                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1159                 }
1160                 if (is_valid_policy_hnd(&hive_hnd)) {
1161                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1162                 }
1163         }
1164
1165         TALLOC_FREE(tmp_ctx);
1166         return result;
1167 }
1168
1169 /* Get printer data over a winreg pipe. */
1170 WERROR winreg_get_printer_dataex(TALLOC_CTX *mem_ctx,
1171                                  struct auth_serversupplied_info *server_info,
1172                                  const char *printer,
1173                                  const char *key,
1174                                  const char *value,
1175                                  enum winreg_Type *type,
1176                                  uint8_t **data,
1177                                  uint32_t *data_size)
1178 {
1179         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1180         struct rpc_pipe_client *winreg_pipe = NULL;
1181         struct policy_handle hive_hnd, key_hnd;
1182         struct winreg_String wvalue;
1183         enum winreg_Type type_in;
1184         char *path;
1185         uint8_t *data_in;
1186         uint32_t data_in_size = 0;
1187         uint32_t value_len = 0;
1188         WERROR result = WERR_OK;
1189         NTSTATUS status;
1190         TALLOC_CTX *tmp_ctx;
1191
1192         tmp_ctx = talloc_new(mem_ctx);
1193         if (tmp_ctx == NULL) {
1194                 return WERR_NOMEM;
1195         }
1196
1197         path = winreg_printer_data_keyname(tmp_ctx, printer);
1198         if (path == NULL) {
1199                 TALLOC_FREE(tmp_ctx);
1200                 return WERR_NOMEM;
1201         }
1202
1203         ZERO_STRUCT(hive_hnd);
1204         ZERO_STRUCT(key_hnd);
1205
1206         result = winreg_printer_openkey(tmp_ctx,
1207                                         server_info,
1208                                         &winreg_pipe,
1209                                         path,
1210                                         key,
1211                                         false,
1212                                         access_mask,
1213                                         &hive_hnd,
1214                                         &key_hnd);
1215         if (!W_ERROR_IS_OK(result)) {
1216                 DEBUG(0, ("winreg_get_printer_dataex: Could not open key %s: %s\n",
1217                           key, win_errstr(result)));
1218                 goto done;
1219         }
1220
1221         wvalue.name = value;
1222
1223         /*
1224          * call QueryValue once with data == NULL to get the
1225          * needed memory size to be allocated, then allocate
1226          * data buffer and call again.
1227          */
1228         status = rpccli_winreg_QueryValue(winreg_pipe,
1229                                           tmp_ctx,
1230                                           &key_hnd,
1231                                           &wvalue,
1232                                           &type_in,
1233                                           NULL,
1234                                           &data_in_size,
1235                                           &value_len,
1236                                           &result);
1237         if (!NT_STATUS_IS_OK(status)) {
1238                 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
1239                           value, nt_errstr(status)));
1240                 if (!W_ERROR_IS_OK(result)) {
1241                         goto done;
1242                 }
1243                 result = ntstatus_to_werror(status);
1244                 goto done;
1245         }
1246
1247         data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
1248         if (data_in == NULL) {
1249                 result = WERR_NOMEM;
1250                 goto done;
1251         }
1252         value_len = 0;
1253
1254         status = rpccli_winreg_QueryValue(winreg_pipe,
1255                                           tmp_ctx,
1256                                           &key_hnd,
1257                                           &wvalue,
1258                                           &type_in,
1259                                           data_in,
1260                                           &data_in_size,
1261                                           &value_len,
1262                                           &result);
1263         if (!NT_STATUS_IS_OK(status)) {
1264                 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
1265                           value, nt_errstr(status)));
1266                 if (!W_ERROR_IS_OK(result)) {
1267                         result = ntstatus_to_werror(status);
1268                 }
1269                 goto done;
1270         }
1271
1272         *type = type_in;
1273         *data_size = data_in_size;
1274         if (data_in_size) {
1275                 *data = talloc_move(mem_ctx, &data_in);
1276         }
1277
1278         result = WERR_OK;
1279 done:
1280         if (winreg_pipe != NULL) {
1281                 if (is_valid_policy_hnd(&key_hnd)) {
1282                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1283                 }
1284                 if (is_valid_policy_hnd(&hive_hnd)) {
1285                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1286                 }
1287         }
1288
1289         TALLOC_FREE(tmp_ctx);
1290         return result;
1291 }
1292
1293 /* Enumerate on the values of a given key and provide the data. */
1294 WERROR winreg_enum_printer_dataex(TALLOC_CTX *mem_ctx,
1295                                   struct auth_serversupplied_info *server_info,
1296                                   const char *printer,
1297                                   const char *key,
1298                                   uint32_t *pnum_values,
1299                                   struct spoolss_PrinterEnumValues **penum_values)
1300 {
1301         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1302         struct rpc_pipe_client *winreg_pipe = NULL;
1303         struct policy_handle hive_hnd, key_hnd;
1304
1305         struct spoolss_PrinterEnumValues *enum_values = NULL;
1306         uint32_t num_values = 0;
1307         char *path;
1308         WERROR result = WERR_OK;
1309
1310         TALLOC_CTX *tmp_ctx;
1311
1312         tmp_ctx = talloc_new(mem_ctx);
1313         if (tmp_ctx == NULL) {
1314                 return WERR_NOMEM;
1315         }
1316
1317         path = winreg_printer_data_keyname(tmp_ctx, printer);
1318         if (path == NULL) {
1319                 TALLOC_FREE(tmp_ctx);
1320                 return WERR_NOMEM;
1321         }
1322
1323         result = winreg_printer_openkey(tmp_ctx,
1324                                         server_info,
1325                                         &winreg_pipe,
1326                                         path,
1327                                         key,
1328                                         false,
1329                                         access_mask,
1330                                         &hive_hnd,
1331                                         &key_hnd);
1332         if (!W_ERROR_IS_OK(result)) {
1333                 DEBUG(0, ("winreg_enum_printer_dataex: Could not open key %s: %s\n",
1334                           key, win_errstr(result)));
1335                 goto done;
1336         }
1337
1338         result = winreg_printer_enumvalues(tmp_ctx,
1339                                            winreg_pipe,
1340                                            &key_hnd,
1341                                            &num_values,
1342                                            &enum_values);
1343         if (!W_ERROR_IS_OK(result)) {
1344                 DEBUG(0, ("winreg_enum_printer_dataex: Could not enumerate values in %s: %s\n",
1345                           key, win_errstr(result)));
1346                 goto done;
1347         }
1348
1349         *pnum_values = num_values;
1350         if (penum_values) {
1351                 *penum_values = talloc_move(mem_ctx, &enum_values);
1352         }
1353
1354         result = WERR_OK;
1355 done:
1356         if (winreg_pipe != NULL) {
1357                 if (is_valid_policy_hnd(&key_hnd)) {
1358                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1359                 }
1360                 if (is_valid_policy_hnd(&hive_hnd)) {
1361                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1362                 }
1363         }
1364
1365         TALLOC_FREE(tmp_ctx);
1366         return result;
1367 }
1368
1369 /* Delete printer data over a winreg pipe. */
1370 WERROR winreg_delete_printer_dataex(TALLOC_CTX *mem_ctx,
1371                                     struct auth_serversupplied_info *server_info,
1372                                     const char *printer,
1373                                     const char *key,
1374                                     const char *value)
1375 {
1376         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1377         struct rpc_pipe_client *winreg_pipe = NULL;
1378         struct policy_handle hive_hnd, key_hnd;
1379         struct winreg_String wvalue;
1380         char *path;
1381         WERROR result = WERR_OK;
1382         NTSTATUS status;
1383
1384         TALLOC_CTX *tmp_ctx;
1385
1386         tmp_ctx = talloc_new(mem_ctx);
1387         if (tmp_ctx == NULL) {
1388                 return WERR_NOMEM;
1389         }
1390
1391         path = winreg_printer_data_keyname(tmp_ctx, printer);
1392         if (path == NULL) {
1393                 TALLOC_FREE(tmp_ctx);
1394                 return WERR_NOMEM;
1395         }
1396
1397         ZERO_STRUCT(hive_hnd);
1398         ZERO_STRUCT(key_hnd);
1399
1400         result = winreg_printer_openkey(tmp_ctx,
1401                                         server_info,
1402                                         &winreg_pipe,
1403                                         path,
1404                                         key,
1405                                         false,
1406                                         access_mask,
1407                                         &hive_hnd,
1408                                         &key_hnd);
1409         if (!W_ERROR_IS_OK(result)) {
1410                 DEBUG(0, ("winreg_delete_printer_dataex: Could not open key %s: %s\n",
1411                           key, win_errstr(result)));
1412                 goto done;
1413         }
1414
1415         wvalue.name = value;
1416         status = rpccli_winreg_DeleteValue(winreg_pipe,
1417                                            tmp_ctx,
1418                                            &key_hnd,
1419                                            wvalue,
1420                                            &result);
1421         if (!NT_STATUS_IS_OK(status)) {
1422                 DEBUG(0, ("winreg_delete_printer_dataex: Could not delete value %s: %s\n",
1423                           value, nt_errstr(status)));
1424                 if (!W_ERROR_IS_OK(result)) {
1425                         goto done;
1426                 }
1427                 result = ntstatus_to_werror(status);
1428                 goto done;
1429         }
1430
1431         result = WERR_OK;
1432 done:
1433         if (winreg_pipe != NULL) {
1434                 if (is_valid_policy_hnd(&key_hnd)) {
1435                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1436                 }
1437                 if (is_valid_policy_hnd(&hive_hnd)) {
1438                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1439                 }
1440         }
1441
1442         TALLOC_FREE(tmp_ctx);
1443         return result;
1444 }
1445
1446 /* Enumerate on the subkeys of a given key and provide the data. */
1447 WERROR winreg_enum_printer_key(TALLOC_CTX *mem_ctx,
1448                                struct auth_serversupplied_info *server_info,
1449                                const char *printer,
1450                                const char *key,
1451                                uint32_t *pnum_subkeys,
1452                                const char ***psubkeys)
1453 {
1454         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1455         struct rpc_pipe_client *winreg_pipe = NULL;
1456         struct policy_handle hive_hnd, key_hnd;
1457         char *path;
1458         const char **subkeys = NULL;
1459         uint32_t num_subkeys = -1;
1460
1461         WERROR result = WERR_OK;
1462
1463         TALLOC_CTX *tmp_ctx;
1464
1465         tmp_ctx = talloc_new(mem_ctx);
1466         if (tmp_ctx == NULL) {
1467                 return WERR_NOMEM;
1468         }
1469
1470         path = winreg_printer_data_keyname(tmp_ctx, printer);
1471         if (path == NULL) {
1472                 TALLOC_FREE(tmp_ctx);
1473                 return WERR_NOMEM;
1474         }
1475
1476         ZERO_STRUCT(hive_hnd);
1477         ZERO_STRUCT(key_hnd);
1478
1479         result = winreg_printer_openkey(tmp_ctx,
1480                                         server_info,
1481                                         &winreg_pipe,
1482                                         path,
1483                                         key,
1484                                         false,
1485                                         access_mask,
1486                                         &hive_hnd,
1487                                         &key_hnd);
1488         if (!W_ERROR_IS_OK(result)) {
1489                 DEBUG(0, ("winreg_enum_printer_key: Could not open key %s: %s\n",
1490                           key, win_errstr(result)));
1491                 goto done;
1492         }
1493
1494         result = winreg_printer_enumkeys(tmp_ctx,
1495                                          winreg_pipe,
1496                                          &key_hnd,
1497                                          &num_subkeys,
1498                                          &subkeys);
1499         if (!W_ERROR_IS_OK(result)) {
1500                 DEBUG(0, ("winreg_enum_printer_key: Could not enumerate subkeys in %s: %s\n",
1501                           key, win_errstr(result)));
1502                 goto done;
1503         }
1504
1505         *pnum_subkeys = num_subkeys;
1506         if (psubkeys) {
1507                 *psubkeys = talloc_move(mem_ctx, &subkeys);
1508         }
1509
1510         result = WERR_OK;
1511 done:
1512         if (winreg_pipe != NULL) {
1513                 if (is_valid_policy_hnd(&key_hnd)) {
1514                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1515                 }
1516                 if (is_valid_policy_hnd(&hive_hnd)) {
1517                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1518                 }
1519         }
1520
1521         TALLOC_FREE(tmp_ctx);
1522         return result;
1523 }
1524
1525 /* Delete a key with subkeys of a given printer. */
1526 WERROR winreg_delete_printer_key(TALLOC_CTX *mem_ctx,
1527                                  struct auth_serversupplied_info *server_info,
1528                                  const char *printer,
1529                                  const char *key)
1530 {
1531         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1532         struct rpc_pipe_client *winreg_pipe = NULL;
1533         struct policy_handle hive_hnd, key_hnd;
1534         char *keyname;
1535         char *path;
1536         WERROR result;
1537         TALLOC_CTX *tmp_ctx;
1538
1539         tmp_ctx = talloc_new(mem_ctx);
1540         if (tmp_ctx == NULL) {
1541                 return WERR_NOMEM;
1542         }
1543
1544         path = winreg_printer_data_keyname(tmp_ctx, printer);
1545         if (path == NULL) {
1546                 TALLOC_FREE(tmp_ctx);
1547                 return WERR_NOMEM;
1548         }
1549
1550         result = winreg_printer_openkey(tmp_ctx,
1551                                         server_info,
1552                                         &winreg_pipe,
1553                                         path,
1554                                         key,
1555                                         false,
1556                                         access_mask,
1557                                         &hive_hnd,
1558                                         &key_hnd);
1559         if (!W_ERROR_IS_OK(result)) {
1560                 /* key doesn't exist */
1561                 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1562                         result = WERR_OK;
1563                         goto done;
1564                 }
1565
1566                 DEBUG(0, ("winreg_delete_printer_key: Could not open key %s: %s\n",
1567                           key, win_errstr(result)));
1568                 goto done;
1569         }
1570
1571         if (is_valid_policy_hnd(&key_hnd)) {
1572                 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1573         }
1574
1575         keyname = talloc_asprintf(tmp_ctx,
1576                                   "%s\\%s",
1577                                   path,
1578                                   key);
1579         if (keyname == NULL) {
1580                 result = WERR_NOMEM;
1581                 goto done;
1582         }
1583
1584         result = winreg_printer_delete_subkeys(tmp_ctx,
1585                                                winreg_pipe,
1586                                                &hive_hnd,
1587                                                access_mask,
1588                                                keyname);
1589         if (!W_ERROR_IS_OK(result)) {
1590                 DEBUG(0, ("winreg_delete_printer_key: Could not delete key %s: %s\n",
1591                           key, win_errstr(result)));
1592                 goto done;
1593         }
1594
1595 done:
1596         if (winreg_pipe != NULL) {
1597                 if (is_valid_policy_hnd(&key_hnd)) {
1598                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1599                 }
1600                 if (is_valid_policy_hnd(&hive_hnd)) {
1601                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1602                 }
1603         }
1604
1605         TALLOC_FREE(tmp_ctx);
1606         return result;
1607 }
1608
1609 WERROR winreg_printer_update_changeid(TALLOC_CTX *mem_ctx,
1610                                       struct auth_serversupplied_info *server_info,
1611                                       const char *printer)
1612 {
1613         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1614         struct rpc_pipe_client *winreg_pipe = NULL;
1615         struct policy_handle hive_hnd, key_hnd;
1616         char *path;
1617         WERROR result;
1618         TALLOC_CTX *tmp_ctx;
1619
1620         tmp_ctx = talloc_new(mem_ctx);
1621         if (tmp_ctx == NULL) {
1622                 return WERR_NOMEM;
1623         }
1624
1625         path = winreg_printer_data_keyname(tmp_ctx, printer);
1626         if (path == NULL) {
1627                 TALLOC_FREE(tmp_ctx);
1628                 return WERR_NOMEM;
1629         }
1630
1631         ZERO_STRUCT(hive_hnd);
1632         ZERO_STRUCT(key_hnd);
1633
1634         result = winreg_printer_openkey(tmp_ctx,
1635                                         server_info,
1636                                         &winreg_pipe,
1637                                         path,
1638                                         "",
1639                                         false,
1640                                         access_mask,
1641                                         &hive_hnd,
1642                                         &key_hnd);
1643         if (!W_ERROR_IS_OK(result)) {
1644                 DEBUG(0, ("winreg_printer_update_changeid: Could not open key %s: %s\n",
1645                           path, win_errstr(result)));
1646                 goto done;
1647         }
1648
1649         result = winreg_printer_write_dword(tmp_ctx,
1650                                             winreg_pipe,
1651                                             &key_hnd,
1652                                             "ChangeID",
1653                                             winreg_printer_rev_changeid());
1654         if (!W_ERROR_IS_OK(result)) {
1655                 goto done;
1656         }
1657
1658         result = WERR_OK;
1659 done:
1660         if (winreg_pipe != NULL) {
1661                 if (is_valid_policy_hnd(&key_hnd)) {
1662                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1663                 }
1664                 if (is_valid_policy_hnd(&hive_hnd)) {
1665                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1666                 }
1667         }
1668
1669         TALLOC_FREE(tmp_ctx);
1670         return result;
1671 }
1672
1673 WERROR winreg_printer_get_changeid(TALLOC_CTX *mem_ctx,
1674                                    struct auth_serversupplied_info *server_info,
1675                                    const char *printer,
1676                                    uint32_t *pchangeid)
1677 {
1678         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1679         struct rpc_pipe_client *winreg_pipe = NULL;
1680         struct policy_handle hive_hnd, key_hnd;
1681         uint32_t changeid = 0;
1682         char *path;
1683         WERROR result;
1684         TALLOC_CTX *tmp_ctx;
1685
1686         tmp_ctx = talloc_new(mem_ctx);
1687         if (tmp_ctx == NULL) {
1688                 return WERR_NOMEM;
1689         }
1690
1691         path = winreg_printer_data_keyname(tmp_ctx, printer);
1692         if (path == NULL) {
1693                 TALLOC_FREE(tmp_ctx);
1694                 return WERR_NOMEM;
1695         }
1696
1697         ZERO_STRUCT(hive_hnd);
1698         ZERO_STRUCT(key_hnd);
1699
1700         result = winreg_printer_openkey(tmp_ctx,
1701                                         server_info,
1702                                         &winreg_pipe,
1703                                         path,
1704                                         "",
1705                                         false,
1706                                         access_mask,
1707                                         &hive_hnd,
1708                                         &key_hnd);
1709         if (!W_ERROR_IS_OK(result)) {
1710                 DEBUG(0, ("winreg_printer_get_changeid: Could not open key %s: %s\n",
1711                           path, win_errstr(result)));
1712                 goto done;
1713         }
1714
1715         DEBUG(0, ("winreg_printer_get_changeid: get changeid from %s\n", path));
1716         result = winreg_printer_query_dword(tmp_ctx,
1717                                             winreg_pipe,
1718                                             &key_hnd,
1719                                             "ChangeID",
1720                                             &changeid);
1721         if (!W_ERROR_IS_OK(result)) {
1722                 goto done;
1723         }
1724
1725         if (pchangeid) {
1726                 *pchangeid = changeid;
1727         }
1728
1729         result = WERR_OK;
1730 done:
1731         if (winreg_pipe != NULL) {
1732                 if (is_valid_policy_hnd(&key_hnd)) {
1733                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1734                 }
1735                 if (is_valid_policy_hnd(&hive_hnd)) {
1736                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1737                 }
1738         }
1739
1740         TALLOC_FREE(tmp_ctx);
1741         return result;
1742 }
1743
1744 /*
1745  * The special behaviour of the spoolss forms is documented at the website:
1746  *
1747  * Managing Win32 Printserver Forms
1748  * http://unixwiz.net/techtips/winspooler-forms.html
1749  */
1750
1751 WERROR winreg_printer_addform1(TALLOC_CTX *mem_ctx,
1752                                struct auth_serversupplied_info *server_info,
1753                                struct spoolss_AddFormInfo1 *form)
1754 {
1755         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1756         struct rpc_pipe_client *winreg_pipe = NULL;
1757         struct policy_handle hive_hnd, key_hnd;
1758         struct winreg_String wvalue;
1759         DATA_BLOB blob;
1760         uint32_t num_info = 0;
1761         union spoolss_FormInfo *info = NULL;
1762         uint32_t i;
1763         WERROR result;
1764         NTSTATUS status;
1765         TALLOC_CTX *tmp_ctx;
1766
1767         tmp_ctx = talloc_new(mem_ctx);
1768         if (tmp_ctx == NULL) {
1769                 return WERR_NOMEM;
1770         }
1771
1772         ZERO_STRUCT(hive_hnd);
1773         ZERO_STRUCT(key_hnd);
1774
1775         result = winreg_printer_openkey(tmp_ctx,
1776                                         server_info,
1777                                         &winreg_pipe,
1778                                         TOP_LEVEL_CONTROL_FORMS_KEY,
1779                                         "",
1780                                         true,
1781                                         access_mask,
1782                                         &hive_hnd,
1783                                         &key_hnd);
1784         if (!W_ERROR_IS_OK(result)) {
1785                 DEBUG(0, ("winreg_printer_addform1: Could not open key %s: %s\n",
1786                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1787                 goto done;
1788         }
1789
1790         result = winreg_printer_enumforms1(tmp_ctx, server_info, &num_info, &info);
1791         if (!W_ERROR_IS_OK(result)) {
1792                 DEBUG(0, ("winreg_printer_addform: Could not enum keys %s: %s\n",
1793                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1794                 goto done;
1795         }
1796
1797         /* If form name already exists or is builtin return ALREADY_EXISTS */
1798         for (i = 0; i < num_info; i++) {
1799                 if (strequal(info[i].info1.form_name, form->form_name)) {
1800                         result = WERR_FILE_EXISTS;
1801                         goto done;
1802                 }
1803         }
1804
1805         wvalue.name = form->form_name;
1806
1807         blob = data_blob_talloc(tmp_ctx, NULL, 32);
1808         SIVAL(blob.data,  0, form->size.width);
1809         SIVAL(blob.data,  4, form->size.height);
1810         SIVAL(blob.data,  8, form->area.left);
1811         SIVAL(blob.data, 12, form->area.top);
1812         SIVAL(blob.data, 16, form->area.right);
1813         SIVAL(blob.data, 20, form->area.bottom);
1814         SIVAL(blob.data, 24, num_info + 1); /* FIXME */
1815         SIVAL(blob.data, 28, form->flags);
1816
1817         status = rpccli_winreg_SetValue(winreg_pipe,
1818                                         tmp_ctx,
1819                                         &key_hnd,
1820                                         wvalue,
1821                                         REG_BINARY,
1822                                         blob.data,
1823                                         blob.length,
1824                                         &result);
1825         if (!NT_STATUS_IS_OK(status)) {
1826                 DEBUG(0, ("winreg_printer_addform1: Could not set value %s: %s\n",
1827                           wvalue.name, nt_errstr(status)));
1828                 if (!W_ERROR_IS_OK(result)) {
1829                         goto done;
1830                 }
1831                 result = ntstatus_to_werror(status);
1832                 goto done;
1833         }
1834
1835         result = WERR_OK;
1836 done:
1837         if (winreg_pipe != NULL) {
1838                 if (is_valid_policy_hnd(&key_hnd)) {
1839                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1840                 }
1841                 if (is_valid_policy_hnd(&hive_hnd)) {
1842                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1843                 }
1844         }
1845
1846         TALLOC_FREE(info);
1847         TALLOC_FREE(tmp_ctx);
1848         return result;
1849 }
1850
1851 WERROR winreg_printer_enumforms1(TALLOC_CTX *mem_ctx,
1852                                  struct auth_serversupplied_info *server_info,
1853                                  uint32_t *pnum_info,
1854                                  union spoolss_FormInfo **pinfo)
1855 {
1856         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1857         struct rpc_pipe_client *winreg_pipe = NULL;
1858         struct policy_handle hive_hnd, key_hnd;
1859         union spoolss_FormInfo *info;
1860         struct spoolss_PrinterEnumValues *enum_values = NULL;
1861         uint32_t num_values = 0;
1862         uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1863         uint32_t i;
1864         WERROR result;
1865         TALLOC_CTX *tmp_ctx;
1866
1867         tmp_ctx = talloc_new(mem_ctx);
1868         if (tmp_ctx == NULL) {
1869                 return WERR_NOMEM;
1870         }
1871
1872         ZERO_STRUCT(hive_hnd);
1873         ZERO_STRUCT(key_hnd);
1874
1875         result = winreg_printer_openkey(tmp_ctx,
1876                                         server_info,
1877                                         &winreg_pipe,
1878                                         TOP_LEVEL_CONTROL_FORMS_KEY,
1879                                         "",
1880                                         true,
1881                                         access_mask,
1882                                         &hive_hnd,
1883                                         &key_hnd);
1884         if (!W_ERROR_IS_OK(result)) {
1885                 /* key doesn't exist */
1886                 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1887                         result = WERR_OK;
1888                         goto done;
1889                 }
1890
1891                 DEBUG(0, ("winreg_printer_enumforms1: Could not open key %s: %s\n",
1892                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1893                 goto done;
1894         }
1895
1896         result = winreg_printer_enumvalues(tmp_ctx,
1897                                            winreg_pipe,
1898                                            &key_hnd,
1899                                            &num_values,
1900                                            &enum_values);
1901         if (!W_ERROR_IS_OK(result)) {
1902                 DEBUG(0, ("winreg_printer_enumforms1: Could not enumerate values in %s: %s\n",
1903                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1904                 goto done;
1905         }
1906
1907         info = TALLOC_ARRAY(tmp_ctx, union spoolss_FormInfo, num_builtin + num_values);
1908         if (info == NULL) {
1909                 result = WERR_NOMEM;
1910                 goto done;
1911         }
1912
1913         /* Enumerate BUILTIN forms */
1914         for (i = 0; i < num_builtin; i++) {
1915                 info[i].info1 = builtin_forms1[i];
1916         }
1917
1918         /* Enumerate registry forms */
1919         for (i = 0; i < num_values; i++) {
1920                 union spoolss_FormInfo val;
1921
1922                 if (enum_values[i].type != REG_BINARY ||
1923                     enum_values[i].data_length != 32) {
1924                         continue;
1925                 }
1926
1927                 val.info1.form_name = talloc_strdup(info, enum_values[i].value_name);
1928                 if (val.info1.form_name == NULL) {
1929                         result = WERR_NOMEM;
1930                         goto done;
1931                 }
1932
1933                 val.info1.size.width  = IVAL(enum_values[i].data->data,  0);
1934                 val.info1.size.height = IVAL(enum_values[i].data->data,  4);
1935                 val.info1.area.left   = IVAL(enum_values[i].data->data,  8);
1936                 val.info1.area.top    = IVAL(enum_values[i].data->data, 12);
1937                 val.info1.area.right  = IVAL(enum_values[i].data->data, 16);
1938                 val.info1.area.bottom = IVAL(enum_values[i].data->data, 20);
1939                 /* skip form index      IVAL(enum_values[i].data->data, 24)));*/
1940                 val.info1.flags       = IVAL(enum_values[i].data->data, 28);
1941
1942                 info[i + num_builtin] = val;
1943         }
1944
1945         *pnum_info = num_builtin + num_values;
1946         if (pinfo) {
1947                 *pinfo = talloc_move(mem_ctx, &info);
1948         }
1949
1950 done:
1951         if (winreg_pipe != NULL) {
1952                 if (is_valid_policy_hnd(&key_hnd)) {
1953                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1954                 }
1955                 if (is_valid_policy_hnd(&hive_hnd)) {
1956                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1957                 }
1958         }
1959
1960         TALLOC_FREE(enum_values);
1961         TALLOC_FREE(tmp_ctx);
1962         return result;
1963 }
1964
1965 WERROR winreg_printer_deleteform1(TALLOC_CTX *mem_ctx,
1966                                   struct auth_serversupplied_info *server_info,
1967                                   const char *form_name)
1968 {
1969         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1970         struct rpc_pipe_client *winreg_pipe = NULL;
1971         struct policy_handle hive_hnd, key_hnd;
1972         struct winreg_String wvalue;
1973         uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1974         uint32_t i;
1975         WERROR result = WERR_OK;
1976         NTSTATUS status;
1977         TALLOC_CTX *tmp_ctx;
1978
1979         for (i = 0; i < num_builtin; i++) {
1980                 if (strequal(builtin_forms1[i].form_name, form_name)) {
1981                         return WERR_INVALID_PARAMETER;
1982                 }
1983         }
1984
1985         tmp_ctx = talloc_new(mem_ctx);
1986         if (tmp_ctx == NULL) {
1987                 return WERR_NOMEM;
1988         }
1989
1990         ZERO_STRUCT(hive_hnd);
1991         ZERO_STRUCT(key_hnd);
1992
1993         result = winreg_printer_openkey(tmp_ctx,
1994                                         server_info,
1995                                         &winreg_pipe,
1996                                         TOP_LEVEL_CONTROL_FORMS_KEY,
1997                                         "",
1998                                         false,
1999                                         access_mask,
2000                                         &hive_hnd,
2001                                         &key_hnd);
2002         if (!W_ERROR_IS_OK(result)) {
2003                 DEBUG(0, ("winreg_printer_deleteform1: Could not open key %s: %s\n",
2004                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
2005                 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
2006                         result = WERR_INVALID_FORM_NAME;
2007                 }
2008                 goto done;
2009         }
2010
2011         wvalue.name = form_name;
2012         status = rpccli_winreg_DeleteValue(winreg_pipe,
2013                                            tmp_ctx,
2014                                            &key_hnd,
2015                                            wvalue,
2016                                            &result);
2017         if (!NT_STATUS_IS_OK(status)) {
2018                 /* If the value doesn't exist, return WERR_INVALID_FORM_NAME */
2019                 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
2020                         result = WERR_INVALID_FORM_NAME;
2021                         goto done;
2022                 }
2023                 DEBUG(0, ("winreg_printer_delteform1: Could not delete value %s: %s\n",
2024                           wvalue.name, nt_errstr(status)));
2025                 if (!W_ERROR_IS_OK(result)) {
2026                         goto done;
2027                 }
2028                 result = ntstatus_to_werror(status);
2029                 goto done;
2030         }
2031
2032         result = WERR_OK;
2033 done:
2034         if (winreg_pipe != NULL) {
2035                 if (is_valid_policy_hnd(&key_hnd)) {
2036                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2037                 }
2038                 if (is_valid_policy_hnd(&hive_hnd)) {
2039                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2040                 }
2041         }
2042
2043         TALLOC_FREE(tmp_ctx);
2044         return result;
2045 }
2046
2047 WERROR winreg_printer_setform1(TALLOC_CTX *mem_ctx,
2048                                struct auth_serversupplied_info *server_info,
2049                                const char *form_name,
2050                                struct spoolss_AddFormInfo1 *form)
2051 {
2052         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2053         struct rpc_pipe_client *winreg_pipe = NULL;
2054         struct policy_handle hive_hnd, key_hnd;
2055         struct winreg_String wvalue;
2056         DATA_BLOB blob;
2057         uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
2058         uint32_t i;
2059         WERROR result;
2060         NTSTATUS status;
2061         TALLOC_CTX *tmp_ctx = NULL;
2062
2063         for (i = 0; i < num_builtin; i++) {
2064                 if (strequal(builtin_forms1[i].form_name, form->form_name)) {
2065                         result = WERR_INVALID_PARAM;
2066                         goto done;
2067                 }
2068         }
2069
2070         tmp_ctx = talloc_new(mem_ctx);
2071         if (tmp_ctx == NULL) {
2072                 return WERR_NOMEM;
2073         }
2074
2075         ZERO_STRUCT(hive_hnd);
2076         ZERO_STRUCT(key_hnd);
2077
2078         result = winreg_printer_openkey(tmp_ctx,
2079                                         server_info,
2080                                         &winreg_pipe,
2081                                         TOP_LEVEL_CONTROL_FORMS_KEY,
2082                                         "",
2083                                         true,
2084                                         access_mask,
2085                                         &hive_hnd,
2086                                         &key_hnd);
2087         if (!W_ERROR_IS_OK(result)) {
2088                 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
2089                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
2090                 goto done;
2091         }
2092
2093         /* If form_name != form->form_name then we renamed the form */
2094         if (strequal(form_name, form->form_name)) {
2095                 result = winreg_printer_deleteform1(tmp_ctx, server_info, form_name);
2096                 if (!W_ERROR_IS_OK(result)) {
2097                         DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
2098                                   TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
2099                         goto done;
2100                 }
2101         }
2102
2103         wvalue.name = form->form_name;
2104
2105         blob = data_blob_talloc(tmp_ctx, NULL, 32);
2106         SIVAL(blob.data,  0, form->size.width);
2107         SIVAL(blob.data,  4, form->size.height);
2108         SIVAL(blob.data,  8, form->area.left);
2109         SIVAL(blob.data, 12, form->area.top);
2110         SIVAL(blob.data, 16, form->area.right);
2111         SIVAL(blob.data, 20, form->area.bottom);
2112         SIVAL(blob.data, 24, 42);
2113         SIVAL(blob.data, 28, form->flags);
2114
2115         status = rpccli_winreg_SetValue(winreg_pipe,
2116                                         tmp_ctx,
2117                                         &key_hnd,
2118                                         wvalue,
2119                                         REG_BINARY,
2120                                         blob.data,
2121                                         blob.length,
2122                                         &result);
2123         if (!NT_STATUS_IS_OK(status)) {
2124                 DEBUG(0, ("winreg_printer_setform1: Could not set value %s: %s\n",
2125                           wvalue.name, nt_errstr(status)));
2126                 if (!W_ERROR_IS_OK(result)) {
2127                         goto done;
2128                 }
2129                 result = ntstatus_to_werror(status);
2130                 goto done;
2131         }
2132
2133         result = WERR_OK;
2134 done:
2135         if (winreg_pipe != NULL) {
2136                 if (is_valid_policy_hnd(&key_hnd)) {
2137                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2138                 }
2139                 if (is_valid_policy_hnd(&hive_hnd)) {
2140                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2141                 }
2142         }
2143
2144         TALLOC_FREE(tmp_ctx);
2145         return result;
2146 }
2147
2148 WERROR winreg_printer_getform1(TALLOC_CTX *mem_ctx,
2149                                struct auth_serversupplied_info *server_info,
2150                                const char *form_name,
2151                                struct spoolss_FormInfo1 *r)
2152 {
2153         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2154         struct rpc_pipe_client *winreg_pipe = NULL;
2155         struct policy_handle hive_hnd, key_hnd;
2156         struct winreg_String wvalue;
2157         enum winreg_Type type_in;
2158         uint8_t *data_in;
2159         uint32_t data_in_size = 0;
2160         uint32_t value_len = 0;
2161         uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
2162         uint32_t i;
2163         WERROR result;
2164         NTSTATUS status;
2165         TALLOC_CTX *tmp_ctx;
2166
2167         /* check builtin forms first */
2168         for (i = 0; i < num_builtin; i++) {
2169                 if (strequal(builtin_forms1[i].form_name, form_name)) {
2170                         *r = builtin_forms1[i];
2171                         return WERR_OK;
2172                 }
2173         }
2174
2175         tmp_ctx = talloc_new(mem_ctx);
2176         if (tmp_ctx == NULL) {
2177                 return WERR_NOMEM;
2178         }
2179
2180         ZERO_STRUCT(hive_hnd);
2181         ZERO_STRUCT(key_hnd);
2182
2183         result = winreg_printer_openkey(tmp_ctx,
2184                                         server_info,
2185                                         &winreg_pipe,
2186                                         TOP_LEVEL_CONTROL_FORMS_KEY,
2187                                         "",
2188                                         true,
2189                                         access_mask,
2190                                         &hive_hnd,
2191                                         &key_hnd);
2192         if (!W_ERROR_IS_OK(result)) {
2193                 DEBUG(0, ("winreg_printer_getform1: Could not open key %s: %s\n",
2194                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
2195                 goto done;
2196         }
2197
2198         wvalue.name = form_name;
2199
2200         /*
2201          * call QueryValue once with data == NULL to get the
2202          * needed memory size to be allocated, then allocate
2203          * data buffer and call again.
2204          */
2205         status = rpccli_winreg_QueryValue(winreg_pipe,
2206                                           tmp_ctx,
2207                                           &key_hnd,
2208                                           &wvalue,
2209                                           &type_in,
2210                                           NULL,
2211                                           &data_in_size,
2212                                           &value_len,
2213                                           &result);
2214         if (!NT_STATUS_IS_OK(status)) {
2215                 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
2216                           wvalue.name, nt_errstr(status)));
2217                 if (!W_ERROR_IS_OK(result)) {
2218                         goto done;
2219                 }
2220                 result = ntstatus_to_werror(status);
2221                 goto done;
2222         }
2223
2224         data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
2225         if (data_in == NULL) {
2226                 result = WERR_NOMEM;
2227                 goto done;
2228         }
2229         value_len = 0;
2230
2231         status = rpccli_winreg_QueryValue(winreg_pipe,
2232                                           tmp_ctx,
2233                                           &key_hnd,
2234                                           &wvalue,
2235                                           &type_in,
2236                                           data_in,
2237                                           &data_in_size,
2238                                           &value_len,
2239                                           &result);
2240         if (!NT_STATUS_IS_OK(status)) {
2241                 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
2242                           wvalue.name, nt_errstr(status)));
2243                 if (!W_ERROR_IS_OK(result)) {
2244                         goto done;
2245                 }
2246                 result = ntstatus_to_werror(status);
2247                 goto done;
2248         }
2249
2250         r->form_name = talloc_strdup(mem_ctx, form_name);
2251         if (r->form_name == NULL) {
2252                 result = WERR_NOMEM;
2253                 goto done;
2254         }
2255
2256         r->size.width  = IVAL(data_in,  0);
2257         r->size.height = IVAL(data_in,  4);
2258         r->area.left   = IVAL(data_in,  8);
2259         r->area.top    = IVAL(data_in, 12);
2260         r->area.right  = IVAL(data_in, 16);
2261         r->area.bottom = IVAL(data_in, 20);
2262         /* skip index    IVAL(data_in, 24)));*/
2263         r->flags       = IVAL(data_in, 28);
2264
2265         result = WERR_OK;
2266 done:
2267         if (winreg_pipe != NULL) {
2268                 if (is_valid_policy_hnd(&key_hnd)) {
2269                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2270                 }
2271                 if (is_valid_policy_hnd(&hive_hnd)) {
2272                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2273                 }
2274         }
2275
2276         TALLOC_FREE(tmp_ctx);
2277         return result;
2278 }