2 * Unix SMB/CIFS implementation.
4 * SPOOLSS RPC Pipe server / winreg client routines
6 * Copyright (c) 2010 Andreas Schneider <asn@samba.org>
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, see <http://www.gnu.org/licenses/>.
23 #include "srv_spoolss_util.h"
24 #include "../librpc/gen_ndr/srv_winreg.h"
25 #include "../librpc/gen_ndr/cli_winreg.h"
27 #define TOP_LEVEL_PRINT_KEY "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print"
28 #define TOP_LEVEL_PRINT_PRINTERS_KEY TOP_LEVEL_PRINT_KEY "\\Printers"
29 #define TOP_LEVEL_CONTROL_KEY "SYSTEM\\CurrentControlSet\\Control\\Print"
30 #define TOP_LEVEL_CONTROL_FORMS_KEY TOP_LEVEL_CONTROL_KEY "\\Forms"
32 #define EMPTY_STRING ""
34 #define CHECK_ERROR(result) \
35 if (W_ERROR_IS_OK(result)) continue; \
36 if (W_ERROR_EQUAL(result, WERR_NOT_FOUND)) result = WERR_OK; \
37 if (!W_ERROR_IS_OK(result)) break
39 /* FLAGS, NAME, with, height, left, top, right, bottom */
40 static const struct spoolss_FormInfo1 builtin_forms1[] = {
41 { SPOOLSS_FORM_BUILTIN, "Letter", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
42 { SPOOLSS_FORM_BUILTIN, "Letter Small", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
43 { SPOOLSS_FORM_BUILTIN, "Tabloid", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
44 { SPOOLSS_FORM_BUILTIN, "Ledger", {0x696b8,0x44368}, {0x0,0x0,0x696b8,0x44368} },
45 { SPOOLSS_FORM_BUILTIN, "Legal", {0x34b5c,0x56d10}, {0x0,0x0,0x34b5c,0x56d10} },
46 { SPOOLSS_FORM_BUILTIN, "Statement", {0x221b4,0x34b5c}, {0x0,0x0,0x221b4,0x34b5c} },
47 { SPOOLSS_FORM_BUILTIN, "Executive", {0x2cf56,0x411cc}, {0x0,0x0,0x2cf56,0x411cc} },
48 { SPOOLSS_FORM_BUILTIN, "A3", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
49 { SPOOLSS_FORM_BUILTIN, "A4", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
50 { SPOOLSS_FORM_BUILTIN, "A4 Small", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
51 { SPOOLSS_FORM_BUILTIN, "A5", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
52 { SPOOLSS_FORM_BUILTIN, "B4 (JIS)", {0x3ebe8,0x58de0}, {0x0,0x0,0x3ebe8,0x58de0} },
53 { SPOOLSS_FORM_BUILTIN, "B5 (JIS)", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
54 { SPOOLSS_FORM_BUILTIN, "Folio", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
55 { SPOOLSS_FORM_BUILTIN, "Quarto", {0x347d8,0x43238}, {0x0,0x0,0x347d8,0x43238} },
56 { SPOOLSS_FORM_BUILTIN, "10x14", {0x3e030,0x56d10}, {0x0,0x0,0x3e030,0x56d10} },
57 { SPOOLSS_FORM_BUILTIN, "11x17", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
58 { SPOOLSS_FORM_BUILTIN, "Note", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
59 { SPOOLSS_FORM_BUILTIN, "Envelope #9", {0x18079,0x37091}, {0x0,0x0,0x18079,0x37091} },
60 { SPOOLSS_FORM_BUILTIN, "Envelope #10", {0x19947,0x3ae94}, {0x0,0x0,0x19947,0x3ae94} },
61 { SPOOLSS_FORM_BUILTIN, "Envelope #11", {0x1be7c,0x40565}, {0x0,0x0,0x1be7c,0x40565} },
62 { SPOOLSS_FORM_BUILTIN, "Envelope #12", {0x1d74a,0x44368}, {0x0,0x0,0x1d74a,0x44368} },
63 { SPOOLSS_FORM_BUILTIN, "Envelope #14", {0x1f018,0x47504}, {0x0,0x0,0x1f018,0x47504} },
64 { SPOOLSS_FORM_BUILTIN, "C size sheet", {0x696b8,0x886d0}, {0x0,0x0,0x696b8,0x886d0} },
65 { SPOOLSS_FORM_BUILTIN, "D size sheet", {0x886d0,0xd2d70}, {0x0,0x0,0x886d0,0xd2d70} },
66 { SPOOLSS_FORM_BUILTIN, "E size sheet", {0xd2d70,0x110da0},{0x0,0x0,0xd2d70,0x110da0} },
67 { SPOOLSS_FORM_BUILTIN, "Envelope DL", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
68 { SPOOLSS_FORM_BUILTIN, "Envelope C5", {0x278d0,0x37e88}, {0x0,0x0,0x278d0,0x37e88} },
69 { SPOOLSS_FORM_BUILTIN, "Envelope C3", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
70 { SPOOLSS_FORM_BUILTIN, "Envelope C4", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
71 { SPOOLSS_FORM_BUILTIN, "Envelope C6", {0x1bd50,0x278d0}, {0x0,0x0,0x1bd50,0x278d0} },
72 { SPOOLSS_FORM_BUILTIN, "Envelope C65", {0x1bd50,0x37e88}, {0x0,0x0,0x1bd50,0x37e88} },
73 { SPOOLSS_FORM_BUILTIN, "Envelope B4", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
74 { SPOOLSS_FORM_BUILTIN, "Envelope B5", {0x2af80,0x3d090}, {0x0,0x0,0x2af80,0x3d090} },
75 { SPOOLSS_FORM_BUILTIN, "Envelope B6", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
76 { SPOOLSS_FORM_BUILTIN, "Envelope", {0x1adb0,0x38270}, {0x0,0x0,0x1adb0,0x38270} },
77 { SPOOLSS_FORM_BUILTIN, "Envelope Monarch", {0x18079,0x2e824}, {0x0,0x0,0x18079,0x2e824} },
78 { SPOOLSS_FORM_BUILTIN, "6 3/4 Envelope", {0x167ab,0x284ec}, {0x0,0x0,0x167ab,0x284ec} },
79 { SPOOLSS_FORM_BUILTIN, "US Std Fanfold", {0x5c3e1,0x44368}, {0x0,0x0,0x5c3e1,0x44368} },
80 { SPOOLSS_FORM_BUILTIN, "German Std Fanfold", {0x34b5c,0x4a6a0}, {0x0,0x0,0x34b5c,0x4a6a0} },
81 { SPOOLSS_FORM_BUILTIN, "German Legal Fanfold", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
82 { SPOOLSS_FORM_BUILTIN, "B4 (ISO)", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
83 { SPOOLSS_FORM_BUILTIN, "Japanese Postcard", {0x186a0,0x24220}, {0x0,0x0,0x186a0,0x24220} },
84 { SPOOLSS_FORM_BUILTIN, "9x11", {0x37cf8,0x44368}, {0x0,0x0,0x37cf8,0x44368} },
85 { SPOOLSS_FORM_BUILTIN, "10x11", {0x3e030,0x44368}, {0x0,0x0,0x3e030,0x44368} },
86 { SPOOLSS_FORM_BUILTIN, "15x11", {0x5d048,0x44368}, {0x0,0x0,0x5d048,0x44368} },
87 { SPOOLSS_FORM_BUILTIN, "Envelope Invite", {0x35b60,0x35b60}, {0x0,0x0,0x35b60,0x35b60} },
88 { SPOOLSS_FORM_BUILTIN, "Reserved48", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
89 { SPOOLSS_FORM_BUILTIN, "Reserved49", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
90 { SPOOLSS_FORM_BUILTIN, "Letter Extra", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
91 { SPOOLSS_FORM_BUILTIN, "Legal Extra", {0x3ae94,0x5d048}, {0x0,0x0,0x3ae94,0x5d048} },
92 { SPOOLSS_FORM_BUILTIN, "Tabloid Extra", {0x4a6a0,0x6f9f0}, {0x0,0x0,0x4a6a0,0x6f9f0} },
93 { SPOOLSS_FORM_BUILTIN, "A4 Extra", {0x397c2,0x4eb16}, {0x0,0x0,0x397c2,0x4eb16} },
94 { SPOOLSS_FORM_BUILTIN, "Letter Transverse", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
95 { SPOOLSS_FORM_BUILTIN, "A4 Transverse", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
96 { SPOOLSS_FORM_BUILTIN, "Letter Extra Transverse", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
97 { SPOOLSS_FORM_BUILTIN, "Super A", {0x376b8,0x56ea0}, {0x0,0x0,0x376b8,0x56ea0} },
98 { SPOOLSS_FORM_BUILTIN, "Super B", {0x4a768,0x76e58}, {0x0,0x0,0x4a768,0x76e58} },
99 { SPOOLSS_FORM_BUILTIN, "Letter Plus", {0x34b5c,0x4eb16}, {0x0,0x0,0x34b5c,0x4eb16} },
100 { SPOOLSS_FORM_BUILTIN, "A4 Plus", {0x33450,0x50910}, {0x0,0x0,0x33450,0x50910} },
101 { SPOOLSS_FORM_BUILTIN, "A5 Transverse", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
102 { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Transverse", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
103 { SPOOLSS_FORM_BUILTIN, "A3 Extra", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
104 { SPOOLSS_FORM_BUILTIN, "A5 Extra", {0x2a7b0,0x395f8}, {0x0,0x0,0x2a7b0,0x395f8} },
105 { SPOOLSS_FORM_BUILTIN, "B5 (ISO) Extra", {0x31128,0x43620}, {0x0,0x0,0x31128,0x43620} },
106 { SPOOLSS_FORM_BUILTIN, "A2", {0x668a0,0x91050}, {0x0,0x0,0x668a0,0x91050} },
107 { SPOOLSS_FORM_BUILTIN, "A3 Transverse", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
108 { SPOOLSS_FORM_BUILTIN, "A3 Extra Transverse", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
109 { SPOOLSS_FORM_BUILTIN, "Japanese Double Postcard", {0x30d40,0x24220}, {0x0,0x0,0x30d40,0x24220} },
110 { SPOOLSS_FORM_BUILTIN, "A6", {0x19a28,0x24220}, {0x0,0x0,0x19a28,0x24220} },
111 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #2", {0x3a980,0x510e0}, {0x0,0x0,0x3a980,0x510e0} },
112 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #3", {0x34bc0,0x43a08}, {0x0,0x0,0x34bc0,0x43a08} },
113 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #3", {0x1d4c0,0x395f8}, {0x0,0x0,0x1d4c0,0x395f8} },
114 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #4", {0x15f90,0x320c8}, {0x0,0x0,0x15f90,0x320c8} },
115 { SPOOLSS_FORM_BUILTIN, "Letter Rotated", {0x44368,0x34b5c}, {0x0,0x0,0x44368,0x34b5c} },
116 { SPOOLSS_FORM_BUILTIN, "A3 Rotated", {0x668a0,0x48828}, {0x0,0x0,0x668a0,0x48828} },
117 { SPOOLSS_FORM_BUILTIN, "A4 Rotated", {0x48828,0x33450}, {0x0,0x0,0x48828,0x33450} },
118 { SPOOLSS_FORM_BUILTIN, "A5 Rotated", {0x33450,0x24220}, {0x0,0x0,0x33450,0x24220} },
119 { SPOOLSS_FORM_BUILTIN, "B4 (JIS) Rotated", {0x58de0,0x3ebe8}, {0x0,0x0,0x58de0,0x3ebe8} },
120 { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Rotated", {0x3ebe8,0x2c6f0}, {0x0,0x0,0x3ebe8,0x2c6f0} },
121 { SPOOLSS_FORM_BUILTIN, "Japanese Postcard Rotated", {0x24220,0x186a0}, {0x0,0x0,0x24220,0x186a0} },
122 { SPOOLSS_FORM_BUILTIN, "Double Japan Postcard Rotated", {0x24220,0x30d40}, {0x0,0x0,0x24220,0x30d40} },
123 { SPOOLSS_FORM_BUILTIN, "A6 Rotated", {0x24220,0x19a28}, {0x0,0x0,0x24220,0x19a28} },
124 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #2 Rotated", {0x510e0,0x3a980}, {0x0,0x0,0x510e0,0x3a980} },
125 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #3 Rotated", {0x43a08,0x34bc0}, {0x0,0x0,0x43a08,0x34bc0} },
126 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #3 Rotated", {0x395f8,0x1d4c0}, {0x0,0x0,0x395f8,0x1d4c0} },
127 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #4 Rotated", {0x320c8,0x15f90}, {0x0,0x0,0x320c8,0x15f90} },
128 { SPOOLSS_FORM_BUILTIN, "B6 (JIS)", {0x1f400,0x2c6f0}, {0x0,0x0,0x1f400,0x2c6f0} },
129 { SPOOLSS_FORM_BUILTIN, "B6 (JIS) Rotated", {0x2c6f0,0x1f400}, {0x0,0x0,0x2c6f0,0x1f400} },
130 { SPOOLSS_FORM_BUILTIN, "12x11", {0x4a724,0x443e1}, {0x0,0x0,0x4a724,0x443e1} },
131 { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4", {0x19a28,0x395f8}, {0x0,0x0,0x19a28,0x395f8} },
132 { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4 Rotated", {0x395f8,0x19a28}, {0x0,0x0,0x395f8,0x19a28} },
133 { SPOOLSS_FORM_BUILTIN, "PRC 16K", {0x2de60,0x3f7a0}, {0x0,0x0,0x2de60,0x3f7a0} },
134 { SPOOLSS_FORM_BUILTIN, "PRC 32K", {0x1fbd0,0x2cec0}, {0x0,0x0,0x1fbd0,0x2cec0} },
135 { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big)", {0x222e0,0x318f8}, {0x0,0x0,0x222e0,0x318f8} },
136 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1", {0x18e70,0x28488}, {0x0,0x0,0x18e70,0x28488} },
137 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2", {0x18e70,0x2af80}, {0x0,0x0,0x18e70,0x2af80} },
138 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3", {0x1e848,0x2af80}, {0x0,0x0,0x1e848,0x2af80} },
139 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4", {0x1adb0,0x32c80}, {0x0,0x0,0x1adb0,0x32c80} },
140 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
141 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6", {0x1d4c0,0x38270}, {0x0,0x0,0x1d4c0,0x38270} },
142 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7", {0x27100,0x38270}, {0x0,0x0,0x27100,0x38270} },
143 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8", {0x1d4c0,0x4b708}, {0x0,0x0,0x1d4c0,0x4b708} },
144 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
145 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
146 { SPOOLSS_FORM_BUILTIN, "PRC 16K Rotated", {0x3f7a0,0x2de60}, {0x0,0x0,0x3f7a0,0x2de60} },
147 { SPOOLSS_FORM_BUILTIN, "PRC 32K Rotated", {0x2cec0,0x1fbd0}, {0x0,0x0,0x2cec0,0x1fbd0} },
148 { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big) Rotated", {0x318f8,0x222e0}, {0x0,0x0,0x318f8,0x222e0} },
149 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1 Rotated", {0x28488,0x18e70}, {0x0,0x0,0x28488,0x18e70} },
150 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2 Rotated", {0x2af80,0x18e70}, {0x0,0x0,0x2af80,0x18e70} },
151 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3 Rotated", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
152 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4 Rotated", {0x32c80,0x1adb0}, {0x0,0x0,0x32c80,0x1adb0} },
153 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5 Rotated", {0x35b60,0x1adb0}, {0x0,0x0,0x35b60,0x1adb0} },
154 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6 Rotated", {0x38270,0x1d4c0}, {0x0,0x0,0x38270,0x1d4c0} },
155 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7 Rotated", {0x38270,0x27100}, {0x0,0x0,0x38270,0x27100} },
156 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8 Rotated", {0x4b708,0x1d4c0}, {0x0,0x0,0x4b708,0x1d4c0} },
157 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9 Rotated", {0x4f1a0,0x37e88}, {0x0,0x0,0x4f1a0,0x37e88} },
158 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10 Rotated", {0x6fd10,0x4f1a0}, {0x0,0x0,0x6fd10,0x4f1a0} }
161 /********************************************************************
162 static helper functions
163 ********************************************************************/
165 /****************************************************************************
166 Update the changeid time.
167 ****************************************************************************/
171 * @brief Update the ChangeID time of a printer.
173 * This is SO NASTY as some drivers need this to change, others need it
174 * static. This value will change every second, and I must hope that this
175 * is enough..... DON'T CHANGE THIS CODE WITHOUT A TEST MATRIX THE SIZE OF
178 * @return The ChangeID.
180 static uint32_t winreg_printer_rev_changeid(void)
184 get_process_uptime(&tv);
187 /* Return changeid as msec since spooler restart */
188 return tv.tv_sec * 1000 + tv.tv_usec / 1000;
191 * This setting seems to work well but is too untested
192 * to replace the above calculation. Left in for experiementation
193 * of the reader --jerry (Tue Mar 12 09:15:05 CST 2002)
195 return tv.tv_sec * 10 + tv.tv_usec / 100000;
199 static struct spoolss_security_descriptor *winreg_printer_create_default_secdesc(TALLOC_CTX *ctx)
201 SEC_ACE ace[5]; /* max number of ace entries */
205 SEC_DESC *psd = NULL;
209 /* Create an ACE where Everyone is allowed to print */
211 sa = PRINTER_ACE_PRINT;
212 init_sec_ace(&ace[i++], &global_sid_World, SEC_ACE_TYPE_ACCESS_ALLOWED,
213 sa, SEC_ACE_FLAG_CONTAINER_INHERIT);
215 /* Add the domain admins group if we are a DC */
218 DOM_SID domadmins_sid;
220 sid_compose(&domadmins_sid, get_global_sam_sid(),
221 DOMAIN_GROUP_RID_ADMINS);
223 sa = PRINTER_ACE_FULL_CONTROL;
224 init_sec_ace(&ace[i++], &domadmins_sid,
225 SEC_ACE_TYPE_ACCESS_ALLOWED, sa,
226 SEC_ACE_FLAG_OBJECT_INHERIT | SEC_ACE_FLAG_INHERIT_ONLY);
227 init_sec_ace(&ace[i++], &domadmins_sid, SEC_ACE_TYPE_ACCESS_ALLOWED,
228 sa, SEC_ACE_FLAG_CONTAINER_INHERIT);
230 else if (secrets_fetch_domain_sid(lp_workgroup(), &adm_sid)) {
231 sid_append_rid(&adm_sid, DOMAIN_USER_RID_ADMIN);
233 sa = PRINTER_ACE_FULL_CONTROL;
234 init_sec_ace(&ace[i++], &adm_sid,
235 SEC_ACE_TYPE_ACCESS_ALLOWED, sa,
236 SEC_ACE_FLAG_OBJECT_INHERIT | SEC_ACE_FLAG_INHERIT_ONLY);
237 init_sec_ace(&ace[i++], &adm_sid, SEC_ACE_TYPE_ACCESS_ALLOWED,
238 sa, SEC_ACE_FLAG_CONTAINER_INHERIT);
241 /* add BUILTIN\Administrators as FULL CONTROL */
243 sa = PRINTER_ACE_FULL_CONTROL;
244 init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
245 SEC_ACE_TYPE_ACCESS_ALLOWED, sa,
246 SEC_ACE_FLAG_OBJECT_INHERIT | SEC_ACE_FLAG_INHERIT_ONLY);
247 init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
248 SEC_ACE_TYPE_ACCESS_ALLOWED,
249 sa, SEC_ACE_FLAG_CONTAINER_INHERIT);
251 /* Make the security descriptor owned by the BUILTIN\Administrators */
253 /* The ACL revision number in rpc_secdesc.h differs from the one
254 created by NT when setting ACE entries in printer
255 descriptors. NT4 complains about the property being edited by a
258 if ((psa = make_sec_acl(ctx, NT4_ACL_REVISION, i, ace)) != NULL) {
259 psd = make_sec_desc(ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE,
260 &global_sid_Builtin_Administrators,
261 &global_sid_Builtin_Administrators,
262 NULL, psa, &sd_size);
266 DEBUG(0,("construct_default_printer_sd: Failed to make SEC_DESC.\n"));
270 DEBUG(4,("construct_default_printer_sdb: size = %u.\n",
271 (unsigned int)sd_size));
276 static struct spoolss_DeviceMode *winreg_printer_create_default_devmode(TALLOC_CTX *mem_ctx,
277 const char *default_devicename)
279 char adevice[MAXDEVICENAME];
280 struct spoolss_DeviceMode *devmode;
282 devmode = talloc_zero(mem_ctx, struct spoolss_DeviceMode);
283 if (devmode == NULL) {
287 slprintf(adevice, sizeof(adevice), "%s", default_devicename);
288 devmode->devicename = talloc_strdup(mem_ctx, adevice);
289 if (devmode->devicename == NULL) {
293 devmode->formname = "Letter";
295 devmode->specversion = DMSPEC_NT4_AND_ABOVE;
296 devmode->driverversion = 0x0400;
297 devmode->size = 0x00DC;
298 devmode->__driverextra_length = 0;
299 devmode->fields = DEVMODE_FORMNAME |
301 DEVMODE_PRINTQUALITY |
302 DEVMODE_DEFAULTSOURCE |
307 devmode->orientation = DMORIENT_PORTRAIT;
308 devmode->papersize = DMPAPER_LETTER;
309 devmode->paperlength = 0;
310 devmode->paperwidth = 0;
311 devmode->scale = 0x64;
313 devmode->defaultsource = DMBIN_FORMSOURCE;
314 devmode->printquality = DMRES_HIGH; /* 0x0258 */
315 devmode->color = DMRES_MONOCHROME;
316 devmode->duplex = DMDUP_SIMPLEX;
317 devmode->yresolution = 0;
318 devmode->ttoption = DMTT_SUBDEV;
319 devmode->collate = DMCOLLATE_FALSE;
320 devmode->icmmethod = 0;
321 devmode->icmintent = 0;
322 devmode->mediatype = 0;
323 devmode->dithertype = 0;
325 devmode->logpixels = 0;
326 devmode->bitsperpel = 0;
327 devmode->pelswidth = 0;
328 devmode->pelsheight = 0;
329 devmode->displayflags = 0;
330 devmode->displayfrequency = 0;
331 devmode->reserved1 = 0;
332 devmode->reserved2 = 0;
333 devmode->panningwidth = 0;
334 devmode->panningheight = 0;
336 devmode->driverextra_data.data = NULL;
337 devmode->driverextra_data.length = 0;
345 * @brief Connect to the interal winreg server and open the given printer key.
347 * The function will create the needed subkeys if they don't exist.
349 * @param[in] mem_ctx The memory context to use.
351 * @param[in] server_info The supplied server info.
353 * @param[out] winreg_pipe A pointer for the winreg rpc client pipe.
355 * @param[in] path The path to the key to open.
357 * @param[in] key The key to open.
359 * @param[in] create_key Set to true if the key should be created if it
362 * @param[in] access_mask The access mask to open the key.
364 * @param[out] hive_handle A policy handle for the opened hive.
366 * @param[out] key_handle A policy handle for the opened key.
368 * @return WERR_OK on success, the corresponding DOS error
369 * code if something gone wrong.
371 static WERROR winreg_printer_openkey(TALLOC_CTX *mem_ctx,
372 struct auth_serversupplied_info *server_info,
373 struct rpc_pipe_client **winreg_pipe,
377 uint32_t access_mask,
378 struct policy_handle *hive_handle,
379 struct policy_handle *key_handle)
381 struct rpc_pipe_client *pipe_handle;
382 struct winreg_String wkey, wkeyclass;
385 WERROR result = WERR_OK;
387 /* create winreg connection */
388 status = rpc_pipe_open_internal(mem_ctx,
389 &ndr_table_winreg.syntax_id,
393 if (!NT_STATUS_IS_OK(status)) {
394 DEBUG(0, ("winreg_printer_openkey: Could not connect to winreg_pipe: %s\n",
396 return ntstatus_to_werror(status);
399 status = rpccli_winreg_OpenHKLM(pipe_handle,
405 if (!NT_STATUS_IS_OK(status)) {
406 DEBUG(0, ("winreg_printer_openkey: Could not open HKLM hive: %s\n",
408 talloc_free(pipe_handle);
409 if (!W_ERROR_IS_OK(result)) {
412 return ntstatus_to_werror(status);
416 keyname = talloc_asprintf(mem_ctx, "%s\\%s", path, key);
418 keyname = talloc_strdup(mem_ctx, path);
420 if (keyname == NULL) {
421 talloc_free(pipe_handle);
429 enum winreg_CreateAction action = REG_ACTION_NONE;
431 ZERO_STRUCT(wkeyclass);
434 status = rpccli_winreg_CreateKey(pipe_handle,
446 case REG_ACTION_NONE:
447 DEBUG(8, ("winreg_printer_openkey:createkey did nothing -- huh?\n"));
449 case REG_CREATED_NEW_KEY:
450 DEBUG(8, ("winreg_printer_openkey: createkey created %s\n", keyname));
452 case REG_OPENED_EXISTING_KEY:
453 DEBUG(8, ("winreg_printer_openkey: createkey opened existing %s\n", keyname));
457 status = rpccli_winreg_OpenKey(pipe_handle,
466 if (!NT_STATUS_IS_OK(status)) {
467 talloc_free(pipe_handle);
468 if (!W_ERROR_IS_OK(result)) {
471 return ntstatus_to_werror(status);
474 *winreg_pipe = pipe_handle;
480 * @brief Create the registry keyname for the given printer.
482 * @param[in] mem_ctx The memory context to use.
484 * @param[in] printer The name of the printer to get the registry key.
486 * @return The registry key or NULL on error.
488 static char *winreg_printer_data_keyname(TALLOC_CTX *mem_ctx, const char *printer) {
489 return talloc_asprintf(mem_ctx, "%s\\%s", TOP_LEVEL_PRINT_PRINTERS_KEY, printer);
495 * @brief Enumerate values of an opened key handle and retrieve the data.
497 * @param[in] mem_ctx The memory context to use.
499 * @param[in] pipe_handle The pipe handle for the rpc connection.
501 * @param[in] key_hnd The opened key handle.
503 * @param[out] pnum_values A pointer to store he number of values found.
505 * @param[out] pnum_values A pointer to store the number of values we found.
507 * @return WERR_OK on success, the corresponding DOS error
508 * code if something gone wrong.
510 static WERROR winreg_printer_enumvalues(TALLOC_CTX *mem_ctx,
511 struct rpc_pipe_client *pipe_handle,
512 struct policy_handle *key_hnd,
513 uint32_t *pnum_values,
514 struct spoolss_PrinterEnumValues **penum_values)
517 uint32_t num_subkeys, max_subkeylen, max_classlen;
518 uint32_t num_values, max_valnamelen, max_valbufsize;
519 uint32_t secdescsize;
521 NTTIME last_changed_time;
522 struct winreg_String classname;
524 struct spoolss_PrinterEnumValues *enum_values;
526 WERROR result = WERR_OK;
529 tmp_ctx = talloc_new(mem_ctx);
530 if (tmp_ctx == NULL) {
534 ZERO_STRUCT(classname);
536 status = rpccli_winreg_QueryInfoKey(pipe_handle,
549 if (!NT_STATUS_IS_OK(status)) {
550 DEBUG(0, ("winreg_printer_enumvalues: Could not query info: %s\n",
552 if (!W_ERROR_IS_OK(result)) {
555 result = ntstatus_to_werror(status);
559 if (num_values == 0) {
561 TALLOC_FREE(tmp_ctx);
565 enum_values = TALLOC_ARRAY(tmp_ctx, struct spoolss_PrinterEnumValues, num_values);
566 if (enum_values == NULL) {
571 for (i = 0; i < num_values; i++) {
572 struct spoolss_PrinterEnumValues val;
573 struct winreg_ValNameBuf name_buf;
574 enum winreg_Type type = REG_NONE;
575 uint8_t *data = NULL;
581 name_buf.size = max_valnamelen + 2;
584 data_size = max_valbufsize;
585 data = (uint8_t *) TALLOC(tmp_ctx, data_size);
588 status = rpccli_winreg_EnumValue(pipe_handle,
598 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
600 status = NT_STATUS_OK;
604 if (!NT_STATUS_IS_OK(status)) {
605 DEBUG(0, ("winreg_printer_enumvalues: Could not enumerate values: %s\n",
607 if (!W_ERROR_IS_OK(result)) {
610 result = ntstatus_to_werror(status);
614 if (name_buf.name == NULL) {
615 result = WERR_INVALID_PARAMETER;
619 val.value_name = talloc_strdup(enum_values, name_buf.name);
620 if (val.value_name == NULL) {
624 val.value_name_len = strlen_m_term(val.value_name) * 2;
627 val.data_length = data_size;
629 if (val.data_length) {
630 val.data = talloc(enum_values, DATA_BLOB);
631 if (val.data == NULL) {
635 *val.data = data_blob_talloc(enum_values, data, data_size);
638 enum_values[i] = val;
641 *pnum_values = num_values;
643 *penum_values = talloc_move(mem_ctx, &enum_values);
649 TALLOC_FREE(tmp_ctx);
656 * @brief Enumerate subkeys of an opened key handle and get the names.
658 * @param[in] mem_ctx The memory context to use.
660 * @param[in] pipe_handle The pipe handle for the rpc connection.
662 * @param[in] key_hnd The opened key handle.
664 * @param[in] pnum_subkeys A pointer to store the number of found subkeys.
666 * @param[in] psubkeys A pointer to an array to store the found names of
669 * @return WERR_OK on success, the corresponding DOS error
670 * code if something gone wrong.
672 static WERROR winreg_printer_enumkeys(TALLOC_CTX *mem_ctx,
673 struct rpc_pipe_client *pipe_handle,
674 struct policy_handle *key_hnd,
675 uint32_t *pnum_subkeys,
676 const char ***psubkeys)
679 const char **subkeys;
680 uint32_t num_subkeys, max_subkeylen, max_classlen;
681 uint32_t num_values, max_valnamelen, max_valbufsize;
683 NTTIME last_changed_time;
684 uint32_t secdescsize;
685 struct winreg_String classname;
686 WERROR result = WERR_OK;
689 tmp_ctx = talloc_new(mem_ctx);
690 if (tmp_ctx == NULL) {
694 ZERO_STRUCT(classname);
696 status = rpccli_winreg_QueryInfoKey(pipe_handle,
709 if (!NT_STATUS_IS_OK(status)) {
710 DEBUG(0, ("winreg_printer_enumkeys: Could not query info: %s\n",
712 if (!W_ERROR_IS_OK(result)) {
715 result = ntstatus_to_werror(status);
719 subkeys = talloc_zero_array(tmp_ctx, const char *, num_subkeys + 2);
720 if (subkeys == NULL) {
725 if (num_subkeys == 0) {
726 subkeys[0] = talloc_strdup(subkeys, "");
727 if (subkeys[0] == NULL) {
733 *psubkeys = talloc_move(mem_ctx, &subkeys);
736 TALLOC_FREE(tmp_ctx);
740 for (i = 0; i < num_subkeys; i++) {
744 struct winreg_StringBuf class_buf;
745 struct winreg_StringBuf name_buf;
749 class_buf.size = max_classlen + 2;
750 class_buf.length = 0;
753 name_buf.size = max_subkeylen + 2;
756 ZERO_STRUCT(modtime);
758 status = rpccli_winreg_EnumKey(pipe_handle,
766 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
768 status = NT_STATUS_OK;
772 if (!NT_STATUS_IS_OK(status)) {
773 DEBUG(0, ("winreg_printer_enumkeys: Could not enumerate keys: %s\n",
775 if (!W_ERROR_IS_OK(result)) {
778 result = ntstatus_to_werror(status);
782 if (name_buf.name == NULL) {
783 result = WERR_INVALID_PARAMETER;
787 name = talloc_strdup(subkeys, name_buf.name);
796 *pnum_subkeys = num_subkeys;
798 *psubkeys = talloc_move(mem_ctx, &subkeys);
802 TALLOC_FREE(tmp_ctx);
809 * @brief A function to delete a key and its subkeys recurively.
811 * @param[in] mem_ctx The memory context to use.
813 * @param[in] pipe_handle The pipe handle for the rpc connection.
815 * @param[in] hive_handle A opened hive handle to the key.
817 * @param[in] access_mask The access mask to access the key.
819 * @param[in] key The key to delete
821 * @return WERR_OK on success, the corresponding DOS error
822 * code if something gone wrong.
824 static WERROR winreg_printer_delete_subkeys(TALLOC_CTX *mem_ctx,
825 struct rpc_pipe_client *pipe_handle,
826 struct policy_handle *hive_handle,
827 uint32_t access_mask,
830 const char **subkeys = NULL;
831 uint32_t num_subkeys = 0;
832 struct policy_handle key_hnd;
833 struct winreg_String wkey;
834 WERROR result = WERR_OK;
838 ZERO_STRUCT(key_hnd);
841 DEBUG(2, ("winreg_printer_delete_subkeys: delete key %s\n", key));
843 status = rpccli_winreg_OpenKey(pipe_handle,
851 if (!NT_STATUS_IS_OK(status)) {
852 DEBUG(0, ("winreg_printer_delete_subkeys: Could not open key %s: %s\n",
853 wkey.name, nt_errstr(status)));
854 if (!W_ERROR_IS_OK(result)) {
857 return ntstatus_to_werror(status);
860 result = winreg_printer_enumkeys(mem_ctx,
865 if (!W_ERROR_IS_OK(result)) {
869 for (i = 0; i < num_subkeys; i++) {
870 /* create key + subkey */
871 char *subkey = talloc_asprintf(mem_ctx, "%s\\%s", key, subkeys[i]);
872 if (subkey == NULL) {
876 DEBUG(2, ("winreg_printer_delete_subkeys: delete subkey %s\n", subkey));
877 result = winreg_printer_delete_subkeys(mem_ctx,
882 if (!W_ERROR_IS_OK(result)) {
887 if (is_valid_policy_hnd(&key_hnd)) {
888 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
893 status = rpccli_winreg_DeleteKey(pipe_handle,
900 if (is_valid_policy_hnd(&key_hnd)) {
901 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
907 static WERROR winreg_printer_write_sz(TALLOC_CTX *mem_ctx,
908 struct rpc_pipe_client *pipe_handle,
909 struct policy_handle *key_handle,
913 struct winreg_String wvalue;
915 WERROR result = WERR_OK;
920 blob = data_blob_string_const("");
922 if (!push_reg_sz(mem_ctx, NULL, &blob, data)) {
923 DEBUG(0, ("winreg_printer_write_sz: Could not marshall string %s for %s\n",
928 status = rpccli_winreg_SetValue(pipe_handle,
936 if (!NT_STATUS_IS_OK(status)) {
937 DEBUG(0, ("winreg_printer_write_sz: Could not set value %s: %s\n",
938 wvalue.name, win_errstr(result)));
939 if (!W_ERROR_IS_OK(result)) {
940 result = ntstatus_to_werror(status);
947 static WERROR winreg_printer_write_dword(TALLOC_CTX *mem_ctx,
948 struct rpc_pipe_client *pipe_handle,
949 struct policy_handle *key_handle,
953 struct winreg_String wvalue;
955 WERROR result = WERR_OK;
959 blob = data_blob_talloc(mem_ctx, NULL, 4);
960 SIVAL(blob.data, 0, data);
962 status = rpccli_winreg_SetValue(pipe_handle,
970 if (!NT_STATUS_IS_OK(status)) {
971 DEBUG(0, ("winreg_printer_write_dword: Could not set value %s: %s\n",
972 wvalue.name, win_errstr(result)));
973 if (!W_ERROR_IS_OK(result)) {
974 result = ntstatus_to_werror(status);
981 static WERROR winreg_printer_write_binary(TALLOC_CTX *mem_ctx,
982 struct rpc_pipe_client *pipe_handle,
983 struct policy_handle *key_handle,
987 struct winreg_String wvalue;
988 WERROR result = WERR_OK;
992 status = rpccli_winreg_SetValue(pipe_handle,
1000 if (!NT_STATUS_IS_OK(status)) {
1001 DEBUG(0, ("winreg_printer_write_binary: Could not set value %s: %s\n",
1002 wvalue.name, win_errstr(result)));
1003 if (!W_ERROR_IS_OK(result)) {
1004 result = ntstatus_to_werror(status);
1011 static WERROR winreg_printer_query_dword(TALLOC_CTX *mem_ctx,
1012 struct rpc_pipe_client *pipe_handle,
1013 struct policy_handle *key_handle,
1017 struct winreg_String wvalue;
1018 enum winreg_Type type;
1019 WERROR result = WERR_OK;
1020 uint32_t value_len = 0;
1024 wvalue.name = value;
1025 status = rpccli_winreg_QueryValue(pipe_handle,
1031 (uint32_t *) &blob.length,
1034 if (!NT_STATUS_IS_OK(status)) {
1035 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
1036 wvalue.name, nt_errstr(status)));
1037 if (!W_ERROR_IS_OK(result)) {
1040 result = ntstatus_to_werror(status);
1044 if (type != REG_DWORD) {
1045 result = WERR_INVALID_DATATYPE;
1049 if (blob.length != 4) {
1050 result = WERR_INVALID_DATA;
1054 blob.data = (uint8_t *) TALLOC(mem_ctx, blob.length);
1055 if (blob.data == NULL) {
1056 result = WERR_NOMEM;
1061 status = rpccli_winreg_QueryValue(pipe_handle,
1067 (uint32_t *) &blob.length,
1070 if (!NT_STATUS_IS_OK(status)) {
1071 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
1072 wvalue.name, nt_errstr(status)));
1073 if (!W_ERROR_IS_OK(result)) {
1074 result = ntstatus_to_werror(status);
1080 *data = IVAL(blob.data, 0);
1086 static WERROR winreg_printer_write_multi_sz(TALLOC_CTX *mem_ctx,
1087 struct rpc_pipe_client *pipe_handle,
1088 struct policy_handle *key_handle,
1092 struct winreg_String wvalue;
1094 WERROR result = WERR_OK;
1097 wvalue.name = value;
1098 if (!push_reg_multi_sz(mem_ctx, NULL, &blob, data)) {
1101 status = rpccli_winreg_SetValue(pipe_handle,
1109 if (!NT_STATUS_IS_OK(status)) {
1110 DEBUG(0, ("winreg_printer_write_multi_sz: Could not set value %s: %s\n",
1111 wvalue.name, win_errstr(result)));
1112 if (!W_ERROR_IS_OK(result)) {
1113 result = ntstatus_to_werror(status);
1120 static WERROR winreg_printer_opendriver(TALLOC_CTX *mem_ctx,
1121 struct auth_serversupplied_info *server_info,
1122 const char *drivername,
1123 const char *architecture,
1125 uint32_t access_mask,
1127 struct rpc_pipe_client **winreg_pipe,
1128 struct policy_handle *hive_hnd,
1129 struct policy_handle *key_hnd)
1134 key_name = talloc_asprintf(mem_ctx, "%s\\Environments\\%s\\Drivers\\Version-%u",
1135 TOP_LEVEL_CONTROL_KEY,
1136 architecture, version);
1141 result = winreg_printer_openkey(mem_ctx,
1153 static WERROR winreg_enumval_to_dword(TALLOC_CTX *mem_ctx,
1154 struct spoolss_PrinterEnumValues *v,
1155 const char *valuename, uint32_t *dw)
1157 /* just return if it is not the one we are looking for */
1158 if (strcmp(valuename, v->value_name) != 0) {
1159 return WERR_NOT_FOUND;
1162 if (v->type != REG_DWORD) {
1163 return WERR_INVALID_DATATYPE;
1166 *dw = IVAL(v->data->data, 0);
1170 static WERROR winreg_enumval_to_sz(TALLOC_CTX *mem_ctx,
1171 struct spoolss_PrinterEnumValues *v,
1172 const char *valuename, const char **_str)
1174 /* just return if it is not the one we are looking for */
1175 if (strcmp(valuename, v->value_name) != 0) {
1176 return WERR_NOT_FOUND;
1179 if (v->type != REG_SZ) {
1180 return WERR_INVALID_DATATYPE;
1183 if (!pull_reg_sz(mem_ctx, NULL, v->data, _str)) {
1190 static WERROR winreg_enumval_to_multi_sz(TALLOC_CTX *mem_ctx,
1191 struct spoolss_PrinterEnumValues *v,
1192 const char *valuename,
1193 const char ***array)
1195 /* just return if it is not the one we are looking for */
1196 if (strcmp(valuename, v->value_name) != 0) {
1197 return WERR_NOT_FOUND;
1200 if (v->type != REG_MULTI_SZ) {
1201 return WERR_INVALID_DATATYPE;
1204 if (!pull_reg_multi_sz(mem_ctx, NULL, v->data, array)) {
1211 static WERROR winreg_enumval_to_blob(TALLOC_CTX *mem_ctx,
1212 struct spoolss_PrinterEnumValues *v,
1213 const char *valuename,
1216 /* just return if it is not the one we are looking for */
1217 if (strcmp(valuename, v->value_name) != 0) {
1218 return WERR_NOT_FOUND;
1221 if (v->type != REG_BINARY) {
1222 return WERR_INVALID_DATATYPE;
1225 blob->data = v->data->data;
1226 blob->length = v->data_length;
1231 static WERROR winreg_printer_write_date(TALLOC_CTX *mem_ctx,
1232 struct rpc_pipe_client *pipe_handle,
1233 struct policy_handle *key_handle,
1237 struct winreg_String wvalue;
1239 WERROR result = WERR_OK;
1245 t = nt_time_to_unix(data);
1247 str = talloc_asprintf(mem_ctx, "%02d/%02d/%04d",
1248 tm->tm_mon + 1, tm->tm_mday, tm->tm_year + 1900);
1253 wvalue.name = value;
1254 if (!push_reg_sz(mem_ctx, NULL, &blob, str)) {
1257 status = rpccli_winreg_SetValue(pipe_handle,
1265 if (!NT_STATUS_IS_OK(status)) {
1266 DEBUG(0, ("winreg_printer_write_date: Could not set value %s: %s\n",
1267 wvalue.name, win_errstr(result)));
1268 if (!W_ERROR_IS_OK(result)) {
1269 result = ntstatus_to_werror(status);
1276 static WERROR winreg_printer_date_to_NTTIME(const char *str, NTTIME *data)
1283 if (sscanf(str, "%d/%d/%d",
1284 &tm.tm_mon, &tm.tm_mday, &tm.tm_year) != 3) {
1285 return WERR_INVALID_PARAMETER;
1292 unix_to_nt_time(data, t);
1297 static WERROR winreg_printer_write_ver(TALLOC_CTX *mem_ctx,
1298 struct rpc_pipe_client *pipe_handle,
1299 struct policy_handle *key_handle,
1303 struct winreg_String wvalue;
1305 WERROR result = WERR_OK;
1309 /* FIXME: check format is right,
1310 * this needs to be something like: 6.1.7600.16385 */
1311 str = talloc_asprintf(mem_ctx, "%u.%u.%u.%u",
1312 (unsigned)((data >> 48) & 0xFFFF),
1313 (unsigned)((data >> 32) & 0xFFFF),
1314 (unsigned)((data >> 16) & 0xFFFF),
1315 (unsigned)(data & 0xFFFF));
1320 wvalue.name = value;
1321 if (!push_reg_sz(mem_ctx, NULL, &blob, str)) {
1324 status = rpccli_winreg_SetValue(pipe_handle,
1332 if (!NT_STATUS_IS_OK(status)) {
1333 DEBUG(0, ("winreg_printer_write_date: Could not set value %s: %s\n",
1334 wvalue.name, win_errstr(result)));
1335 if (!W_ERROR_IS_OK(result)) {
1336 result = ntstatus_to_werror(status);
1343 static WERROR winreg_printer_ver_to_dword(const char *str, uint64_t *data)
1345 unsigned int v1, v2, v3, v4;
1347 if (sscanf(str, "%u.%u.%u.%u", &v1, &v2, &v3, &v4) != 4) {
1348 return WERR_INVALID_PARAMETER;
1351 *data = ((uint64_t)(v1 & 0xFFFF) << 48) +
1352 ((uint64_t)(v2 & 0xFFFF) << 32) +
1353 ((uint64_t)(v3 & 0xFFFF) << 16) +
1354 (uint64_t)(v2 & 0xFFFF);
1359 /********************************************************************
1360 Public winreg function for spoolss
1361 ********************************************************************/
1363 WERROR winreg_create_printer(TALLOC_CTX *mem_ctx,
1364 struct auth_serversupplied_info *server_info,
1365 const char *servername,
1366 const char *sharename)
1368 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1369 struct rpc_pipe_client *winreg_pipe = NULL;
1370 struct policy_handle hive_hnd, key_hnd;
1371 struct spoolss_SetPrinterInfo2 *info2;
1372 struct spoolss_DeviceMode *devmode = NULL;
1373 struct security_descriptor *secdesc;
1374 struct winreg_String wkey, wkeyclass;
1376 const char *subkeys[] = { "DsDriver", "DsSpooler", "PrinterDriverData" };
1377 uint32_t i, count = ARRAY_SIZE(subkeys);
1378 int snum = lp_servicenumber(sharename);
1379 uint32_t info2_mask = 0;
1380 WERROR result = WERR_OK;
1381 TALLOC_CTX *tmp_ctx;
1383 tmp_ctx = talloc_new(mem_ctx);
1384 if (tmp_ctx == NULL) {
1388 path = winreg_printer_data_keyname(tmp_ctx, sharename);
1390 TALLOC_FREE(tmp_ctx);
1394 ZERO_STRUCT(hive_hnd);
1395 ZERO_STRUCT(key_hnd);
1397 result = winreg_printer_openkey(tmp_ctx,
1406 if (W_ERROR_IS_OK(result)) {
1407 DEBUG(2, ("winreg_create_printer: Skipping, %s already exists\n", path));
1409 } else if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1410 DEBUG(2, ("winreg_create_printer: Creating default values in %s\n", path));
1411 } else if (!W_ERROR_IS_OK(result)) {
1412 DEBUG(0, ("winreg_create_printer: Could not open key %s: %s\n",
1413 path, win_errstr(result)));
1417 /* Create the main key */
1418 result = winreg_printer_openkey(tmp_ctx,
1427 if (!W_ERROR_IS_OK(result)) {
1428 DEBUG(0, ("winreg_create_printer_keys: Could not create key %s: %s\n",
1429 path, win_errstr(result)));
1433 if (is_valid_policy_hnd(&key_hnd)) {
1434 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1437 /* Create subkeys */
1438 for (i = 0; i < count; i++) {
1440 enum winreg_CreateAction action = REG_ACTION_NONE;
1442 ZERO_STRUCT(key_hnd);
1445 wkey.name = talloc_asprintf(tmp_ctx, "%s\\%s", path, subkeys[i]);
1446 if (wkey.name == NULL) {
1447 result = WERR_NOMEM;
1451 ZERO_STRUCT(wkeyclass);
1452 wkeyclass.name = "";
1454 status = rpccli_winreg_CreateKey(winreg_pipe,
1465 if (!NT_STATUS_IS_OK(status)) {
1466 DEBUG(0, ("winreg_create_printer_keys: Could not create key %s: %s\n",
1467 wkey.name, win_errstr(result)));
1468 if (!W_ERROR_IS_OK(result)) {
1469 result = ntstatus_to_werror(status);
1474 if (is_valid_policy_hnd(&key_hnd)) {
1475 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1478 info2 = talloc_zero(tmp_ctx, struct spoolss_SetPrinterInfo2);
1479 if (info2 == NULL) {
1480 result = WERR_NOMEM;
1484 info2->printername = sharename;
1485 info2_mask |= SPOOLSS_PRINTER_INFO_PRINTERNAME;
1487 info2->sharename = sharename;
1488 info2_mask |= SPOOLSS_PRINTER_INFO_SHARENAME;
1490 info2->portname = SAMBA_PRINTER_PORT_NAME;
1491 info2_mask |= SPOOLSS_PRINTER_INFO_PORTNAME;
1493 info2->printprocessor = "winprint";
1494 info2_mask |= SPOOLSS_PRINTER_INFO_PRINTPROCESSOR;
1496 info2->datatype = "RAW";
1497 info2_mask |= SPOOLSS_PRINTER_INFO_DATATYPE;
1499 info2->comment = "";
1500 info2_mask |= SPOOLSS_PRINTER_INFO_COMMENT;
1502 info2->attributes = PRINTER_ATTRIBUTE_SAMBA;
1503 info2_mask |= SPOOLSS_PRINTER_INFO_ATTRIBUTES;
1505 info2->starttime = 0; /* Minutes since 12:00am GMT */
1506 info2_mask |= SPOOLSS_PRINTER_INFO_STARTTIME;
1508 info2->untiltime = 0; /* Minutes since 12:00am GMT */
1509 info2_mask |= SPOOLSS_PRINTER_INFO_UNTILTIME;
1511 info2->priority = 1;
1512 info2_mask |= SPOOLSS_PRINTER_INFO_PRIORITY;
1514 info2->defaultpriority = 1;
1515 info2_mask |= SPOOLSS_PRINTER_INFO_DEFAULTPRIORITY;
1517 /* info2->setuptime = (uint32_t) time(NULL); */
1519 if (lp_default_devmode(snum)) {
1520 devmode = winreg_printer_create_default_devmode(tmp_ctx,
1521 info2->printername);
1522 if (devmode == NULL) {
1523 result = WERR_NOMEM;
1527 info2_mask |= SPOOLSS_PRINTER_INFO_DEVMODE;
1530 secdesc = winreg_printer_create_default_secdesc(tmp_ctx);
1531 if (secdesc == NULL) {
1532 result = WERR_NOMEM;
1535 info2_mask |= SPOOLSS_PRINTER_INFO_SECDESC;
1537 result = winreg_update_printer(tmp_ctx,
1546 if (winreg_pipe != NULL) {
1547 if (is_valid_policy_hnd(&key_hnd)) {
1548 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1550 if (is_valid_policy_hnd(&hive_hnd)) {
1551 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1555 talloc_free(tmp_ctx);
1559 WERROR winreg_update_printer(TALLOC_CTX *mem_ctx,
1560 struct auth_serversupplied_info *server_info,
1561 const char *sharename,
1562 uint32_t info2_mask,
1563 struct spoolss_SetPrinterInfo2 *info2,
1564 struct spoolss_DeviceMode *devmode,
1565 struct security_descriptor *secdesc)
1567 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1568 struct rpc_pipe_client *winreg_pipe = NULL;
1569 struct policy_handle hive_hnd, key_hnd;
1570 enum ndr_err_code ndr_err;
1573 WERROR result = WERR_OK;
1574 TALLOC_CTX *tmp_ctx;
1576 tmp_ctx = talloc_new(mem_ctx);
1577 if (tmp_ctx == NULL) {
1581 path = winreg_printer_data_keyname(tmp_ctx, sharename);
1583 TALLOC_FREE(tmp_ctx);
1587 ZERO_STRUCT(hive_hnd);
1588 ZERO_STRUCT(key_hnd);
1590 result = winreg_printer_openkey(tmp_ctx,
1599 if (!W_ERROR_IS_OK(result)) {
1600 DEBUG(0, ("winreg_update_printer: Could not open key %s: %s\n",
1601 path, win_errstr(result)));
1605 if (info2_mask & SPOOLSS_PRINTER_INFO_ATTRIBUTES) {
1606 result = winreg_printer_write_dword(tmp_ctx,
1611 if (!W_ERROR_IS_OK(result)) {
1617 if (info2_mask & SPOOLSS_PRINTER_INFO_AVERAGEPPM) {
1618 result = winreg_printer_write_dword(tmp_ctx,
1623 if (!W_ERROR_IS_OK(result)) {
1629 if (info2_mask & SPOOLSS_PRINTER_INFO_COMMENT) {
1630 result = winreg_printer_write_sz(tmp_ctx,
1635 if (!W_ERROR_IS_OK(result)) {
1640 if (info2_mask & SPOOLSS_PRINTER_INFO_DATATYPE) {
1641 result = winreg_printer_write_sz(tmp_ctx,
1646 if (!W_ERROR_IS_OK(result)) {
1651 if (info2_mask & SPOOLSS_PRINTER_INFO_DEFAULTPRIORITY) {
1652 result = winreg_printer_write_dword(tmp_ctx,
1656 info2->defaultpriority);
1657 if (!W_ERROR_IS_OK(result)) {
1662 if (info2_mask & SPOOLSS_PRINTER_INFO_DEVMODE) {
1663 ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, NULL, devmode,
1664 (ndr_push_flags_fn_t) ndr_push_spoolss_DeviceMode);
1665 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1666 DEBUG(0, ("winreg_update_printer: Failed to marshall device mode\n"));
1667 result = WERR_NOMEM;
1671 result = winreg_printer_write_binary(tmp_ctx,
1676 if (!W_ERROR_IS_OK(result)) {
1681 if (info2_mask & SPOOLSS_PRINTER_INFO_DRIVERNAME) {
1682 result = winreg_printer_write_sz(tmp_ctx,
1687 if (!W_ERROR_IS_OK(result)) {
1692 if (info2_mask & SPOOLSS_PRINTER_INFO_LOCATION) {
1693 result = winreg_printer_write_sz(tmp_ctx,
1698 if (!W_ERROR_IS_OK(result)) {
1703 if (info2_mask & SPOOLSS_PRINTER_INFO_PARAMETERS) {
1704 result = winreg_printer_write_sz(tmp_ctx,
1709 if (!W_ERROR_IS_OK(result)) {
1714 if (info2_mask & SPOOLSS_PRINTER_INFO_PORTNAME) {
1715 result = winreg_printer_write_sz(tmp_ctx,
1720 if (!W_ERROR_IS_OK(result)) {
1725 if (info2_mask & SPOOLSS_PRINTER_INFO_PRINTERNAME) {
1727 * in addprinter: no servername and the printer is the name
1728 * in setprinter: servername is \\server
1729 * and printer is \\server\\printer
1731 * Samba manages only local printers.
1732 * we currently don't support things like i
1733 * path=\\other_server\printer
1735 * We only store the printername, not \\server\printername
1737 const char *p = strrchr(info2->printername, '\\');
1739 p = info2->printername;
1743 result = winreg_printer_write_sz(tmp_ctx,
1748 if (!W_ERROR_IS_OK(result)) {
1753 if (info2_mask & SPOOLSS_PRINTER_INFO_PRINTPROCESSOR) {
1754 result = winreg_printer_write_sz(tmp_ctx,
1758 info2->printprocessor);
1759 if (!W_ERROR_IS_OK(result)) {
1764 if (info2_mask & SPOOLSS_PRINTER_INFO_PRIORITY) {
1765 result = winreg_printer_write_dword(tmp_ctx,
1770 if (!W_ERROR_IS_OK(result)) {
1775 if (info2_mask & SPOOLSS_PRINTER_INFO_SECDESC) {
1777 * We need a security descriptor, if it isn't specified by
1778 * AddPrinter{Ex} then create a default descriptor.
1780 if (secdesc == NULL) {
1781 secdesc = winreg_printer_create_default_secdesc(tmp_ctx);
1783 ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, NULL, secdesc,
1784 (ndr_push_flags_fn_t) ndr_push_security_descriptor);
1785 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1786 DEBUG(0, ("winreg_update_printer: Failed to marshall security descriptor\n"));
1787 result = WERR_NOMEM;
1791 result = winreg_printer_write_binary(tmp_ctx,
1796 if (!W_ERROR_IS_OK(result)) {
1801 if (info2_mask & SPOOLSS_PRINTER_INFO_SEPFILE) {
1802 result = winreg_printer_write_sz(tmp_ctx,
1807 if (!W_ERROR_IS_OK(result)) {
1812 if (info2_mask & SPOOLSS_PRINTER_INFO_SHARENAME) {
1813 result = winreg_printer_write_sz(tmp_ctx,
1818 if (!W_ERROR_IS_OK(result)) {
1823 if (info2_mask & SPOOLSS_PRINTER_INFO_STARTTIME) {
1824 result = winreg_printer_write_dword(tmp_ctx,
1829 if (!W_ERROR_IS_OK(result)) {
1834 if (info2_mask & SPOOLSS_PRINTER_INFO_STATUS) {
1835 result = winreg_printer_write_dword(tmp_ctx,
1840 if (!W_ERROR_IS_OK(result)) {
1845 if (info2_mask & SPOOLSS_PRINTER_INFO_UNTILTIME) {
1846 result = winreg_printer_write_dword(tmp_ctx,
1851 if (!W_ERROR_IS_OK(result)) {
1856 result = winreg_printer_write_dword(tmp_ctx,
1860 winreg_printer_rev_changeid());
1861 if (!W_ERROR_IS_OK(result)) {
1867 if (winreg_pipe != NULL) {
1868 if (is_valid_policy_hnd(&key_hnd)) {
1869 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1871 if (is_valid_policy_hnd(&hive_hnd)) {
1872 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1876 TALLOC_FREE(tmp_ctx);
1880 WERROR winreg_get_printer(TALLOC_CTX *mem_ctx,
1881 struct auth_serversupplied_info *server_info,
1882 const char *servername,
1883 const char *printer,
1884 struct spoolss_PrinterInfo2 **pinfo2)
1886 struct spoolss_PrinterInfo2 *info2;
1887 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1888 struct rpc_pipe_client *winreg_pipe = NULL;
1889 struct policy_handle hive_hnd, key_hnd;
1890 struct spoolss_PrinterEnumValues *enum_values = NULL;
1891 struct spoolss_PrinterEnumValues *v;
1892 enum ndr_err_code ndr_err;
1894 uint32_t num_values = 0;
1897 WERROR result = WERR_OK;
1898 TALLOC_CTX *tmp_ctx;
1900 tmp_ctx = talloc_new(mem_ctx);
1901 if (tmp_ctx == NULL) {
1905 path = winreg_printer_data_keyname(tmp_ctx, printer);
1907 TALLOC_FREE(tmp_ctx);
1911 result = winreg_printer_openkey(tmp_ctx,
1920 if (!W_ERROR_IS_OK(result)) {
1921 DEBUG(0, ("winreg_get_printer: Could not open key %s: %s\n",
1922 path, win_errstr(result)));
1926 result = winreg_printer_enumvalues(tmp_ctx,
1931 if (!W_ERROR_IS_OK(result)) {
1932 DEBUG(0, ("winreg_get_printer: Could not enumerate values in %s: %s\n",
1933 path, win_errstr(result)));
1937 info2 = talloc_zero(tmp_ctx, struct spoolss_PrinterInfo2);
1938 if (info2 == NULL) {
1939 result = WERR_NOMEM;
1943 info2->servername = EMPTY_STRING;
1944 info2->printername = EMPTY_STRING;
1945 info2->sharename = EMPTY_STRING;
1946 info2->portname = EMPTY_STRING;
1947 info2->drivername = EMPTY_STRING;
1948 info2->comment = EMPTY_STRING;
1949 info2->location = EMPTY_STRING;
1950 info2->sepfile = EMPTY_STRING;
1951 info2->printprocessor = EMPTY_STRING;
1952 info2->datatype = EMPTY_STRING;
1953 info2->parameters = EMPTY_STRING;
1955 if (servername != NULL && servername[0] != '\0') {
1956 info2->servername = talloc_asprintf(info2, "\\\\%s", servername);
1957 if (info2->servername == NULL) {
1958 result = WERR_NOMEM;
1963 for (i = 0; i < num_values; i++) {
1964 v = &enum_values[i];
1966 result = winreg_enumval_to_sz(info2,
1969 &info2->printername);
1970 if (W_ERROR_IS_OK(result) && info2->servername[0] != '\0') {
1971 char *p = talloc_asprintf(info2, "%s\\%s",
1973 info2->printername);
1975 result = WERR_NOMEM;
1977 info2->printername = p;
1979 CHECK_ERROR(result);
1981 result = winreg_enumval_to_sz(info2,
1985 CHECK_ERROR(result);
1987 result = winreg_enumval_to_sz(info2,
1991 CHECK_ERROR(result);
1993 result = winreg_enumval_to_sz(info2,
1997 CHECK_ERROR(result);
1999 result = winreg_enumval_to_sz(info2,
2003 CHECK_ERROR(result);
2005 result = winreg_enumval_to_sz(info2,
2009 CHECK_ERROR(result);
2011 result = winreg_enumval_to_sz(info2,
2014 &info2->printprocessor);
2015 CHECK_ERROR(result);
2017 result = winreg_enumval_to_sz(info2,
2021 CHECK_ERROR(result);
2023 result = winreg_enumval_to_sz(info2,
2026 &info2->parameters);
2027 CHECK_ERROR(result);
2029 result = winreg_enumval_to_sz(info2,
2032 &info2->drivername);
2033 CHECK_ERROR(result);
2035 result = winreg_enumval_to_dword(info2,
2038 &info2->attributes);
2039 CHECK_ERROR(result);
2041 result = winreg_enumval_to_dword(info2,
2045 CHECK_ERROR(result);
2047 result = winreg_enumval_to_dword(info2,
2050 &info2->defaultpriority);
2051 CHECK_ERROR(result);
2053 result = winreg_enumval_to_dword(info2,
2057 CHECK_ERROR(result);
2059 result = winreg_enumval_to_dword(info2,
2063 CHECK_ERROR(result);
2065 result = winreg_enumval_to_dword(info2,
2069 CHECK_ERROR(result);
2071 result = winreg_enumval_to_dword(info2,
2075 CHECK_ERROR(result);
2077 result = winreg_enumval_to_blob(info2,
2081 if (W_ERROR_IS_OK(result)) {
2082 info2->devmode = talloc_zero(mem_ctx, struct spoolss_DeviceMode);
2083 if (info2->devmode == NULL) {
2084 result = WERR_NOMEM;
2087 ndr_err = ndr_pull_struct_blob(&blob,
2091 (ndr_pull_flags_fn_t) ndr_pull_spoolss_DeviceMode);
2092 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2093 DEBUG(0, ("winreg_get_printer: Failed to unmarshall device mode\n"));
2094 result = WERR_NOMEM;
2098 CHECK_ERROR(result);
2100 result = winreg_enumval_to_blob(info2,
2104 if (W_ERROR_IS_OK(result)) {
2105 info2->secdesc = talloc_zero(mem_ctx, struct spoolss_security_descriptor);
2106 if (info2->secdesc == NULL) {
2107 result = WERR_NOMEM;
2110 ndr_err = ndr_pull_struct_blob(&blob,
2114 (ndr_pull_flags_fn_t) ndr_pull_security_descriptor);
2115 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2116 DEBUG(0, ("winreg_get_printer: Failed to unmarshall security descriptor\n"));
2117 result = WERR_NOMEM;
2121 CHECK_ERROR(result);
2124 if (!W_ERROR_IS_OK(result)) {
2125 DEBUG(0, ("winreg_get_printer: winreg_enumval_to_TYPE() failed "
2128 win_errstr(result)));
2133 *pinfo2 = talloc_move(mem_ctx, &info2);
2138 if (winreg_pipe != NULL) {
2139 if (is_valid_policy_hnd(&key_hnd)) {
2140 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2142 if (is_valid_policy_hnd(&hive_hnd)) {
2143 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2147 TALLOC_FREE(tmp_ctx);
2151 /* Set printer data over the winreg pipe. */
2152 WERROR winreg_set_printer_dataex(TALLOC_CTX *mem_ctx,
2153 struct auth_serversupplied_info *server_info,
2154 const char *printer,
2157 enum winreg_Type type,
2161 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2162 struct rpc_pipe_client *winreg_pipe = NULL;
2163 struct policy_handle hive_hnd, key_hnd;
2164 struct winreg_String wvalue;
2166 WERROR result = WERR_OK;
2168 TALLOC_CTX *tmp_ctx;
2170 tmp_ctx = talloc_new(mem_ctx);
2171 if (tmp_ctx == NULL) {
2175 path = winreg_printer_data_keyname(tmp_ctx, printer);
2177 TALLOC_FREE(tmp_ctx);
2181 ZERO_STRUCT(hive_hnd);
2182 ZERO_STRUCT(key_hnd);
2184 DEBUG(8, ("winreg_set_printer_dataex: Open printer key %s, value %s, access_mask: 0x%05x for [%s]\n",
2185 key, value, access_mask, printer));
2186 result = winreg_printer_openkey(tmp_ctx,
2195 if (!W_ERROR_IS_OK(result)) {
2196 DEBUG(0, ("winreg_set_printer_dataex: Could not open key %s: %s\n",
2197 key, win_errstr(result)));
2201 wvalue.name = value;
2202 status = rpccli_winreg_SetValue(winreg_pipe,
2210 if (!NT_STATUS_IS_OK(status)) {
2211 DEBUG(0, ("winreg_set_printer_dataex: Could not set value %s: %s\n",
2212 value, nt_errstr(status)));
2213 if (!W_ERROR_IS_OK(result)) {
2216 result = ntstatus_to_werror(status);
2222 if (winreg_pipe != NULL) {
2223 if (is_valid_policy_hnd(&key_hnd)) {
2224 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2226 if (is_valid_policy_hnd(&hive_hnd)) {
2227 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2231 TALLOC_FREE(tmp_ctx);
2235 /* Get printer data over a winreg pipe. */
2236 WERROR winreg_get_printer_dataex(TALLOC_CTX *mem_ctx,
2237 struct auth_serversupplied_info *server_info,
2238 const char *printer,
2241 enum winreg_Type *type,
2243 uint32_t *data_size)
2245 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2246 struct rpc_pipe_client *winreg_pipe = NULL;
2247 struct policy_handle hive_hnd, key_hnd;
2248 struct winreg_String wvalue;
2249 enum winreg_Type type_in;
2252 uint32_t data_in_size = 0;
2253 uint32_t value_len = 0;
2254 WERROR result = WERR_OK;
2256 TALLOC_CTX *tmp_ctx;
2258 tmp_ctx = talloc_new(mem_ctx);
2259 if (tmp_ctx == NULL) {
2263 path = winreg_printer_data_keyname(tmp_ctx, printer);
2265 TALLOC_FREE(tmp_ctx);
2269 ZERO_STRUCT(hive_hnd);
2270 ZERO_STRUCT(key_hnd);
2272 result = winreg_printer_openkey(tmp_ctx,
2281 if (!W_ERROR_IS_OK(result)) {
2282 DEBUG(0, ("winreg_get_printer_dataex: Could not open key %s: %s\n",
2283 key, win_errstr(result)));
2287 wvalue.name = value;
2290 * call QueryValue once with data == NULL to get the
2291 * needed memory size to be allocated, then allocate
2292 * data buffer and call again.
2294 status = rpccli_winreg_QueryValue(winreg_pipe,
2303 if (!NT_STATUS_IS_OK(status)) {
2304 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
2305 value, nt_errstr(status)));
2306 if (!W_ERROR_IS_OK(result)) {
2309 result = ntstatus_to_werror(status);
2313 data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
2314 if (data_in == NULL) {
2315 result = WERR_NOMEM;
2320 status = rpccli_winreg_QueryValue(winreg_pipe,
2329 if (!NT_STATUS_IS_OK(status)) {
2330 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
2331 value, nt_errstr(status)));
2332 if (!W_ERROR_IS_OK(result)) {
2333 result = ntstatus_to_werror(status);
2339 *data_size = data_in_size;
2341 *data = talloc_move(mem_ctx, &data_in);
2346 if (winreg_pipe != NULL) {
2347 if (is_valid_policy_hnd(&key_hnd)) {
2348 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2350 if (is_valid_policy_hnd(&hive_hnd)) {
2351 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2355 TALLOC_FREE(tmp_ctx);
2359 /* Enumerate on the values of a given key and provide the data. */
2360 WERROR winreg_enum_printer_dataex(TALLOC_CTX *mem_ctx,
2361 struct auth_serversupplied_info *server_info,
2362 const char *printer,
2364 uint32_t *pnum_values,
2365 struct spoolss_PrinterEnumValues **penum_values)
2367 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2368 struct rpc_pipe_client *winreg_pipe = NULL;
2369 struct policy_handle hive_hnd, key_hnd;
2371 struct spoolss_PrinterEnumValues *enum_values = NULL;
2372 uint32_t num_values = 0;
2374 WERROR result = WERR_OK;
2376 TALLOC_CTX *tmp_ctx;
2378 tmp_ctx = talloc_new(mem_ctx);
2379 if (tmp_ctx == NULL) {
2383 path = winreg_printer_data_keyname(tmp_ctx, printer);
2385 TALLOC_FREE(tmp_ctx);
2389 result = winreg_printer_openkey(tmp_ctx,
2398 if (!W_ERROR_IS_OK(result)) {
2399 DEBUG(0, ("winreg_enum_printer_dataex: Could not open key %s: %s\n",
2400 key, win_errstr(result)));
2404 result = winreg_printer_enumvalues(tmp_ctx,
2409 if (!W_ERROR_IS_OK(result)) {
2410 DEBUG(0, ("winreg_enum_printer_dataex: Could not enumerate values in %s: %s\n",
2411 key, win_errstr(result)));
2415 *pnum_values = num_values;
2417 *penum_values = talloc_move(mem_ctx, &enum_values);
2422 if (winreg_pipe != NULL) {
2423 if (is_valid_policy_hnd(&key_hnd)) {
2424 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2426 if (is_valid_policy_hnd(&hive_hnd)) {
2427 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2431 TALLOC_FREE(tmp_ctx);
2435 /* Delete printer data over a winreg pipe. */
2436 WERROR winreg_delete_printer_dataex(TALLOC_CTX *mem_ctx,
2437 struct auth_serversupplied_info *server_info,
2438 const char *printer,
2442 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2443 struct rpc_pipe_client *winreg_pipe = NULL;
2444 struct policy_handle hive_hnd, key_hnd;
2445 struct winreg_String wvalue;
2447 WERROR result = WERR_OK;
2450 TALLOC_CTX *tmp_ctx;
2452 tmp_ctx = talloc_new(mem_ctx);
2453 if (tmp_ctx == NULL) {
2457 path = winreg_printer_data_keyname(tmp_ctx, printer);
2459 TALLOC_FREE(tmp_ctx);
2463 ZERO_STRUCT(hive_hnd);
2464 ZERO_STRUCT(key_hnd);
2466 result = winreg_printer_openkey(tmp_ctx,
2475 if (!W_ERROR_IS_OK(result)) {
2476 DEBUG(0, ("winreg_delete_printer_dataex: Could not open key %s: %s\n",
2477 key, win_errstr(result)));
2481 wvalue.name = value;
2482 status = rpccli_winreg_DeleteValue(winreg_pipe,
2487 if (!NT_STATUS_IS_OK(status)) {
2488 DEBUG(0, ("winreg_delete_printer_dataex: Could not delete value %s: %s\n",
2489 value, nt_errstr(status)));
2490 if (!W_ERROR_IS_OK(result)) {
2493 result = ntstatus_to_werror(status);
2499 if (winreg_pipe != NULL) {
2500 if (is_valid_policy_hnd(&key_hnd)) {
2501 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2503 if (is_valid_policy_hnd(&hive_hnd)) {
2504 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2508 TALLOC_FREE(tmp_ctx);
2512 /* Enumerate on the subkeys of a given key and provide the data. */
2513 WERROR winreg_enum_printer_key(TALLOC_CTX *mem_ctx,
2514 struct auth_serversupplied_info *server_info,
2515 const char *printer,
2517 uint32_t *pnum_subkeys,
2518 const char ***psubkeys)
2520 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2521 struct rpc_pipe_client *winreg_pipe = NULL;
2522 struct policy_handle hive_hnd, key_hnd;
2524 const char **subkeys = NULL;
2525 uint32_t num_subkeys = -1;
2527 WERROR result = WERR_OK;
2529 TALLOC_CTX *tmp_ctx;
2531 tmp_ctx = talloc_new(mem_ctx);
2532 if (tmp_ctx == NULL) {
2536 path = winreg_printer_data_keyname(tmp_ctx, printer);
2538 TALLOC_FREE(tmp_ctx);
2542 ZERO_STRUCT(hive_hnd);
2543 ZERO_STRUCT(key_hnd);
2545 result = winreg_printer_openkey(tmp_ctx,
2554 if (!W_ERROR_IS_OK(result)) {
2555 DEBUG(0, ("winreg_enum_printer_key: Could not open key %s: %s\n",
2556 key, win_errstr(result)));
2560 result = winreg_printer_enumkeys(tmp_ctx,
2565 if (!W_ERROR_IS_OK(result)) {
2566 DEBUG(0, ("winreg_enum_printer_key: Could not enumerate subkeys in %s: %s\n",
2567 key, win_errstr(result)));
2571 *pnum_subkeys = num_subkeys;
2573 *psubkeys = talloc_move(mem_ctx, &subkeys);
2578 if (winreg_pipe != NULL) {
2579 if (is_valid_policy_hnd(&key_hnd)) {
2580 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2582 if (is_valid_policy_hnd(&hive_hnd)) {
2583 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2587 TALLOC_FREE(tmp_ctx);
2591 /* Delete a key with subkeys of a given printer. */
2592 WERROR winreg_delete_printer_key(TALLOC_CTX *mem_ctx,
2593 struct auth_serversupplied_info *server_info,
2594 const char *printer,
2597 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2598 struct rpc_pipe_client *winreg_pipe = NULL;
2599 struct policy_handle hive_hnd, key_hnd;
2603 TALLOC_CTX *tmp_ctx;
2605 tmp_ctx = talloc_new(mem_ctx);
2606 if (tmp_ctx == NULL) {
2610 path = winreg_printer_data_keyname(tmp_ctx, printer);
2612 TALLOC_FREE(tmp_ctx);
2616 result = winreg_printer_openkey(tmp_ctx,
2625 if (!W_ERROR_IS_OK(result)) {
2626 /* key doesn't exist */
2627 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
2632 DEBUG(0, ("winreg_delete_printer_key: Could not open key %s: %s\n",
2633 key, win_errstr(result)));
2637 if (is_valid_policy_hnd(&key_hnd)) {
2638 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2641 if (key == NULL || key[0] == '\0') {
2644 keyname = talloc_asprintf(tmp_ctx,
2648 if (keyname == NULL) {
2649 result = WERR_NOMEM;
2654 result = winreg_printer_delete_subkeys(tmp_ctx,
2659 if (!W_ERROR_IS_OK(result)) {
2660 DEBUG(0, ("winreg_delete_printer_key: Could not delete key %s: %s\n",
2661 key, win_errstr(result)));
2666 if (winreg_pipe != NULL) {
2667 if (is_valid_policy_hnd(&key_hnd)) {
2668 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2670 if (is_valid_policy_hnd(&hive_hnd)) {
2671 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2675 TALLOC_FREE(tmp_ctx);
2679 WERROR winreg_printer_update_changeid(TALLOC_CTX *mem_ctx,
2680 struct auth_serversupplied_info *server_info,
2681 const char *printer)
2683 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2684 struct rpc_pipe_client *winreg_pipe = NULL;
2685 struct policy_handle hive_hnd, key_hnd;
2688 TALLOC_CTX *tmp_ctx;
2690 tmp_ctx = talloc_new(mem_ctx);
2691 if (tmp_ctx == NULL) {
2695 path = winreg_printer_data_keyname(tmp_ctx, printer);
2697 TALLOC_FREE(tmp_ctx);
2701 ZERO_STRUCT(hive_hnd);
2702 ZERO_STRUCT(key_hnd);
2704 result = winreg_printer_openkey(tmp_ctx,
2713 if (!W_ERROR_IS_OK(result)) {
2714 DEBUG(0, ("winreg_printer_update_changeid: Could not open key %s: %s\n",
2715 path, win_errstr(result)));
2719 result = winreg_printer_write_dword(tmp_ctx,
2723 winreg_printer_rev_changeid());
2724 if (!W_ERROR_IS_OK(result)) {
2730 if (winreg_pipe != NULL) {
2731 if (is_valid_policy_hnd(&key_hnd)) {
2732 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2734 if (is_valid_policy_hnd(&hive_hnd)) {
2735 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2739 TALLOC_FREE(tmp_ctx);
2743 WERROR winreg_printer_get_changeid(TALLOC_CTX *mem_ctx,
2744 struct auth_serversupplied_info *server_info,
2745 const char *printer,
2746 uint32_t *pchangeid)
2748 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2749 struct rpc_pipe_client *winreg_pipe = NULL;
2750 struct policy_handle hive_hnd, key_hnd;
2751 uint32_t changeid = 0;
2754 TALLOC_CTX *tmp_ctx;
2756 tmp_ctx = talloc_new(mem_ctx);
2757 if (tmp_ctx == NULL) {
2761 path = winreg_printer_data_keyname(tmp_ctx, printer);
2763 TALLOC_FREE(tmp_ctx);
2767 ZERO_STRUCT(hive_hnd);
2768 ZERO_STRUCT(key_hnd);
2770 result = winreg_printer_openkey(tmp_ctx,
2779 if (!W_ERROR_IS_OK(result)) {
2780 DEBUG(0, ("winreg_printer_get_changeid: Could not open key %s: %s\n",
2781 path, win_errstr(result)));
2785 DEBUG(0, ("winreg_printer_get_changeid: get changeid from %s\n", path));
2786 result = winreg_printer_query_dword(tmp_ctx,
2791 if (!W_ERROR_IS_OK(result)) {
2796 *pchangeid = changeid;
2801 if (winreg_pipe != NULL) {
2802 if (is_valid_policy_hnd(&key_hnd)) {
2803 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2805 if (is_valid_policy_hnd(&hive_hnd)) {
2806 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2810 TALLOC_FREE(tmp_ctx);
2815 * The special behaviour of the spoolss forms is documented at the website:
2817 * Managing Win32 Printserver Forms
2818 * http://unixwiz.net/techtips/winspooler-forms.html
2821 WERROR winreg_printer_addform1(TALLOC_CTX *mem_ctx,
2822 struct auth_serversupplied_info *server_info,
2823 struct spoolss_AddFormInfo1 *form)
2825 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2826 struct rpc_pipe_client *winreg_pipe = NULL;
2827 struct policy_handle hive_hnd, key_hnd;
2828 struct winreg_String wvalue;
2830 uint32_t num_info = 0;
2831 union spoolss_FormInfo *info = NULL;
2835 TALLOC_CTX *tmp_ctx;
2837 tmp_ctx = talloc_new(mem_ctx);
2838 if (tmp_ctx == NULL) {
2842 ZERO_STRUCT(hive_hnd);
2843 ZERO_STRUCT(key_hnd);
2845 result = winreg_printer_openkey(tmp_ctx,
2848 TOP_LEVEL_CONTROL_FORMS_KEY,
2854 if (!W_ERROR_IS_OK(result)) {
2855 DEBUG(0, ("winreg_printer_addform1: Could not open key %s: %s\n",
2856 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
2860 result = winreg_printer_enumforms1(tmp_ctx, server_info, &num_info, &info);
2861 if (!W_ERROR_IS_OK(result)) {
2862 DEBUG(0, ("winreg_printer_addform: Could not enum keys %s: %s\n",
2863 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
2867 /* If form name already exists or is builtin return ALREADY_EXISTS */
2868 for (i = 0; i < num_info; i++) {
2869 if (strequal(info[i].info1.form_name, form->form_name)) {
2870 result = WERR_FILE_EXISTS;
2875 wvalue.name = form->form_name;
2877 blob = data_blob_talloc(tmp_ctx, NULL, 32);
2878 SIVAL(blob.data, 0, form->size.width);
2879 SIVAL(blob.data, 4, form->size.height);
2880 SIVAL(blob.data, 8, form->area.left);
2881 SIVAL(blob.data, 12, form->area.top);
2882 SIVAL(blob.data, 16, form->area.right);
2883 SIVAL(blob.data, 20, form->area.bottom);
2884 SIVAL(blob.data, 24, num_info + 1); /* FIXME */
2885 SIVAL(blob.data, 28, form->flags);
2887 status = rpccli_winreg_SetValue(winreg_pipe,
2895 if (!NT_STATUS_IS_OK(status)) {
2896 DEBUG(0, ("winreg_printer_addform1: Could not set value %s: %s\n",
2897 wvalue.name, nt_errstr(status)));
2898 if (!W_ERROR_IS_OK(result)) {
2901 result = ntstatus_to_werror(status);
2907 if (winreg_pipe != NULL) {
2908 if (is_valid_policy_hnd(&key_hnd)) {
2909 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2911 if (is_valid_policy_hnd(&hive_hnd)) {
2912 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2917 TALLOC_FREE(tmp_ctx);
2921 WERROR winreg_printer_enumforms1(TALLOC_CTX *mem_ctx,
2922 struct auth_serversupplied_info *server_info,
2923 uint32_t *pnum_info,
2924 union spoolss_FormInfo **pinfo)
2926 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2927 struct rpc_pipe_client *winreg_pipe = NULL;
2928 struct policy_handle hive_hnd, key_hnd;
2929 union spoolss_FormInfo *info;
2930 struct spoolss_PrinterEnumValues *enum_values = NULL;
2931 uint32_t num_values = 0;
2932 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
2935 TALLOC_CTX *tmp_ctx;
2937 tmp_ctx = talloc_new(mem_ctx);
2938 if (tmp_ctx == NULL) {
2942 ZERO_STRUCT(hive_hnd);
2943 ZERO_STRUCT(key_hnd);
2945 result = winreg_printer_openkey(tmp_ctx,
2948 TOP_LEVEL_CONTROL_FORMS_KEY,
2954 if (!W_ERROR_IS_OK(result)) {
2955 /* key doesn't exist */
2956 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
2961 DEBUG(0, ("winreg_printer_enumforms1: Could not open key %s: %s\n",
2962 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
2966 result = winreg_printer_enumvalues(tmp_ctx,
2971 if (!W_ERROR_IS_OK(result)) {
2972 DEBUG(0, ("winreg_printer_enumforms1: Could not enumerate values in %s: %s\n",
2973 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
2977 info = TALLOC_ARRAY(tmp_ctx, union spoolss_FormInfo, num_builtin + num_values);
2979 result = WERR_NOMEM;
2983 /* Enumerate BUILTIN forms */
2984 for (i = 0; i < num_builtin; i++) {
2985 info[i].info1 = builtin_forms1[i];
2988 /* Enumerate registry forms */
2989 for (i = 0; i < num_values; i++) {
2990 union spoolss_FormInfo val;
2992 if (enum_values[i].type != REG_BINARY ||
2993 enum_values[i].data_length != 32) {
2997 val.info1.form_name = talloc_strdup(info, enum_values[i].value_name);
2998 if (val.info1.form_name == NULL) {
2999 result = WERR_NOMEM;
3003 val.info1.size.width = IVAL(enum_values[i].data->data, 0);
3004 val.info1.size.height = IVAL(enum_values[i].data->data, 4);
3005 val.info1.area.left = IVAL(enum_values[i].data->data, 8);
3006 val.info1.area.top = IVAL(enum_values[i].data->data, 12);
3007 val.info1.area.right = IVAL(enum_values[i].data->data, 16);
3008 val.info1.area.bottom = IVAL(enum_values[i].data->data, 20);
3009 /* skip form index IVAL(enum_values[i].data->data, 24)));*/
3010 val.info1.flags = IVAL(enum_values[i].data->data, 28);
3012 info[i + num_builtin] = val;
3015 *pnum_info = num_builtin + num_values;
3017 *pinfo = talloc_move(mem_ctx, &info);
3021 if (winreg_pipe != NULL) {
3022 if (is_valid_policy_hnd(&key_hnd)) {
3023 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3025 if (is_valid_policy_hnd(&hive_hnd)) {
3026 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3030 TALLOC_FREE(enum_values);
3031 TALLOC_FREE(tmp_ctx);
3035 WERROR winreg_printer_deleteform1(TALLOC_CTX *mem_ctx,
3036 struct auth_serversupplied_info *server_info,
3037 const char *form_name)
3039 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3040 struct rpc_pipe_client *winreg_pipe = NULL;
3041 struct policy_handle hive_hnd, key_hnd;
3042 struct winreg_String wvalue;
3043 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3045 WERROR result = WERR_OK;
3047 TALLOC_CTX *tmp_ctx;
3049 for (i = 0; i < num_builtin; i++) {
3050 if (strequal(builtin_forms1[i].form_name, form_name)) {
3051 return WERR_INVALID_PARAMETER;
3055 tmp_ctx = talloc_new(mem_ctx);
3056 if (tmp_ctx == NULL) {
3060 ZERO_STRUCT(hive_hnd);
3061 ZERO_STRUCT(key_hnd);
3063 result = winreg_printer_openkey(tmp_ctx,
3066 TOP_LEVEL_CONTROL_FORMS_KEY,
3072 if (!W_ERROR_IS_OK(result)) {
3073 DEBUG(0, ("winreg_printer_deleteform1: Could not open key %s: %s\n",
3074 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3075 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3076 result = WERR_INVALID_FORM_NAME;
3081 wvalue.name = form_name;
3082 status = rpccli_winreg_DeleteValue(winreg_pipe,
3087 if (!NT_STATUS_IS_OK(status)) {
3088 /* If the value doesn't exist, return WERR_INVALID_FORM_NAME */
3089 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3090 result = WERR_INVALID_FORM_NAME;
3093 DEBUG(0, ("winreg_printer_delteform1: Could not delete value %s: %s\n",
3094 wvalue.name, nt_errstr(status)));
3095 if (!W_ERROR_IS_OK(result)) {
3098 result = ntstatus_to_werror(status);
3104 if (winreg_pipe != NULL) {
3105 if (is_valid_policy_hnd(&key_hnd)) {
3106 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3108 if (is_valid_policy_hnd(&hive_hnd)) {
3109 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3113 TALLOC_FREE(tmp_ctx);
3117 WERROR winreg_printer_setform1(TALLOC_CTX *mem_ctx,
3118 struct auth_serversupplied_info *server_info,
3119 const char *form_name,
3120 struct spoolss_AddFormInfo1 *form)
3122 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3123 struct rpc_pipe_client *winreg_pipe = NULL;
3124 struct policy_handle hive_hnd, key_hnd;
3125 struct winreg_String wvalue;
3127 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3131 TALLOC_CTX *tmp_ctx = NULL;
3133 for (i = 0; i < num_builtin; i++) {
3134 if (strequal(builtin_forms1[i].form_name, form->form_name)) {
3135 result = WERR_INVALID_PARAM;
3140 tmp_ctx = talloc_new(mem_ctx);
3141 if (tmp_ctx == NULL) {
3145 ZERO_STRUCT(hive_hnd);
3146 ZERO_STRUCT(key_hnd);
3148 result = winreg_printer_openkey(tmp_ctx,
3151 TOP_LEVEL_CONTROL_FORMS_KEY,
3157 if (!W_ERROR_IS_OK(result)) {
3158 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
3159 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3163 /* If form_name != form->form_name then we renamed the form */
3164 if (strequal(form_name, form->form_name)) {
3165 result = winreg_printer_deleteform1(tmp_ctx, server_info, form_name);
3166 if (!W_ERROR_IS_OK(result)) {
3167 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
3168 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3173 wvalue.name = form->form_name;
3175 blob = data_blob_talloc(tmp_ctx, NULL, 32);
3176 SIVAL(blob.data, 0, form->size.width);
3177 SIVAL(blob.data, 4, form->size.height);
3178 SIVAL(blob.data, 8, form->area.left);
3179 SIVAL(blob.data, 12, form->area.top);
3180 SIVAL(blob.data, 16, form->area.right);
3181 SIVAL(blob.data, 20, form->area.bottom);
3182 SIVAL(blob.data, 24, 42);
3183 SIVAL(blob.data, 28, form->flags);
3185 status = rpccli_winreg_SetValue(winreg_pipe,
3193 if (!NT_STATUS_IS_OK(status)) {
3194 DEBUG(0, ("winreg_printer_setform1: Could not set value %s: %s\n",
3195 wvalue.name, nt_errstr(status)));
3196 if (!W_ERROR_IS_OK(result)) {
3199 result = ntstatus_to_werror(status);
3205 if (winreg_pipe != NULL) {
3206 if (is_valid_policy_hnd(&key_hnd)) {
3207 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3209 if (is_valid_policy_hnd(&hive_hnd)) {
3210 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3214 TALLOC_FREE(tmp_ctx);
3218 WERROR winreg_printer_getform1(TALLOC_CTX *mem_ctx,
3219 struct auth_serversupplied_info *server_info,
3220 const char *form_name,
3221 struct spoolss_FormInfo1 *r)
3223 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3224 struct rpc_pipe_client *winreg_pipe = NULL;
3225 struct policy_handle hive_hnd, key_hnd;
3226 struct winreg_String wvalue;
3227 enum winreg_Type type_in;
3229 uint32_t data_in_size = 0;
3230 uint32_t value_len = 0;
3231 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3235 TALLOC_CTX *tmp_ctx;
3237 /* check builtin forms first */
3238 for (i = 0; i < num_builtin; i++) {
3239 if (strequal(builtin_forms1[i].form_name, form_name)) {
3240 *r = builtin_forms1[i];
3245 tmp_ctx = talloc_new(mem_ctx);
3246 if (tmp_ctx == NULL) {
3250 ZERO_STRUCT(hive_hnd);
3251 ZERO_STRUCT(key_hnd);
3253 result = winreg_printer_openkey(tmp_ctx,
3256 TOP_LEVEL_CONTROL_FORMS_KEY,
3262 if (!W_ERROR_IS_OK(result)) {
3263 DEBUG(0, ("winreg_printer_getform1: Could not open key %s: %s\n",
3264 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3268 wvalue.name = form_name;
3271 * call QueryValue once with data == NULL to get the
3272 * needed memory size to be allocated, then allocate
3273 * data buffer and call again.
3275 status = rpccli_winreg_QueryValue(winreg_pipe,
3284 if (!NT_STATUS_IS_OK(status)) {
3285 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
3286 wvalue.name, nt_errstr(status)));
3287 if (!W_ERROR_IS_OK(result)) {
3290 result = ntstatus_to_werror(status);
3294 data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
3295 if (data_in == NULL) {
3296 result = WERR_NOMEM;
3301 status = rpccli_winreg_QueryValue(winreg_pipe,
3310 if (!NT_STATUS_IS_OK(status)) {
3311 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
3312 wvalue.name, nt_errstr(status)));
3313 if (!W_ERROR_IS_OK(result)) {
3316 result = ntstatus_to_werror(status);
3320 r->form_name = talloc_strdup(mem_ctx, form_name);
3321 if (r->form_name == NULL) {
3322 result = WERR_NOMEM;
3326 r->size.width = IVAL(data_in, 0);
3327 r->size.height = IVAL(data_in, 4);
3328 r->area.left = IVAL(data_in, 8);
3329 r->area.top = IVAL(data_in, 12);
3330 r->area.right = IVAL(data_in, 16);
3331 r->area.bottom = IVAL(data_in, 20);
3332 /* skip index IVAL(data_in, 24)));*/
3333 r->flags = IVAL(data_in, 28);
3337 if (winreg_pipe != NULL) {
3338 if (is_valid_policy_hnd(&key_hnd)) {
3339 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3341 if (is_valid_policy_hnd(&hive_hnd)) {
3342 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3346 TALLOC_FREE(tmp_ctx);
3350 WERROR winreg_add_driver(TALLOC_CTX *mem_ctx,
3351 struct auth_serversupplied_info *server_info,
3352 struct spoolss_AddDriverInfoCtr *r,
3353 const char **driver_name,
3354 uint32_t *driver_version)
3356 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3357 struct rpc_pipe_client *winreg_pipe = NULL;
3358 struct policy_handle hive_hnd, key_hnd;
3359 struct spoolss_DriverInfo8 info8;
3360 TALLOC_CTX *tmp_ctx = NULL;
3363 ZERO_STRUCT(hive_hnd);
3364 ZERO_STRUCT(key_hnd);
3367 if (!driver_info_ctr_to_info8(r, &info8)) {
3368 result = WERR_INVALID_PARAMETER;
3372 tmp_ctx = talloc_new(mem_ctx);
3373 if (tmp_ctx == NULL) {
3377 result = winreg_printer_opendriver(tmp_ctx,
3386 if (!W_ERROR_IS_OK(result)) {
3387 DEBUG(0, ("winreg_add_driver: "
3388 "Could not open driver key (%s,%s,%d): %s\n",
3389 info8.driver_name, info8.architecture,
3390 info8.version, win_errstr(result)));
3394 /* TODO: "Attributes" ? */
3396 result = winreg_printer_write_dword(tmp_ctx, winreg_pipe,
3397 &key_hnd, "Version",
3399 if (!W_ERROR_IS_OK(result)) {
3403 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3406 if (!W_ERROR_IS_OK(result)) {
3410 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3411 &key_hnd, "Data File",
3413 if (!W_ERROR_IS_OK(result)) {
3417 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3418 &key_hnd, "Configuration File",
3420 if (!W_ERROR_IS_OK(result)) {
3424 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3425 &key_hnd, "Help File",
3427 if (!W_ERROR_IS_OK(result)) {
3431 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3432 &key_hnd, "Dependent Files",
3433 info8.dependent_files);
3434 if (!W_ERROR_IS_OK(result)) {
3438 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3439 &key_hnd, "Monitor",
3440 info8.monitor_name);
3441 if (!W_ERROR_IS_OK(result)) {
3445 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3446 &key_hnd, "Datatype",
3447 info8.default_datatype);
3448 if (!W_ERROR_IS_OK(result)) {
3452 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3453 &key_hnd, "Previous Names",
3454 info8.previous_names);
3455 if (!W_ERROR_IS_OK(result)) {
3459 result = winreg_printer_write_date(tmp_ctx, winreg_pipe,
3460 &key_hnd, "DriverDate",
3462 if (!W_ERROR_IS_OK(result)) {
3466 result = winreg_printer_write_ver(tmp_ctx, winreg_pipe,
3467 &key_hnd, "DriverVersion",
3468 info8.driver_version);
3469 if (!W_ERROR_IS_OK(result)) {
3473 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3474 &key_hnd, "Manufacturer",
3475 info8.manufacturer_name);
3476 if (!W_ERROR_IS_OK(result)) {
3480 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3481 &key_hnd, "OEM URL",
3482 info8.manufacturer_url);
3483 if (!W_ERROR_IS_OK(result)) {
3487 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3488 &key_hnd, "HardwareID",
3490 if (!W_ERROR_IS_OK(result)) {
3494 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3495 &key_hnd, "Provider",
3497 if (!W_ERROR_IS_OK(result)) {
3501 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3502 &key_hnd, "Print Processor",
3503 info8.print_processor);
3504 if (!W_ERROR_IS_OK(result)) {
3508 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3509 &key_hnd, "VendorSetup",
3510 info8.vendor_setup);
3511 if (!W_ERROR_IS_OK(result)) {
3515 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3516 &key_hnd, "Color Profiles",
3517 info8.color_profiles);
3518 if (!W_ERROR_IS_OK(result)) {
3522 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3523 &key_hnd, "InfPath",
3525 if (!W_ERROR_IS_OK(result)) {
3529 result = winreg_printer_write_dword(tmp_ctx, winreg_pipe, &key_hnd,
3530 "PrinterDriverAttributes",
3531 info8.printer_driver_attributes);
3532 if (!W_ERROR_IS_OK(result)) {
3536 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3537 &key_hnd, "CoreDependencies",
3538 info8.core_driver_dependencies);
3539 if (!W_ERROR_IS_OK(result)) {
3543 result = winreg_printer_write_date(tmp_ctx, winreg_pipe,
3544 &key_hnd, "MinInboxDriverVerDate",
3545 info8.min_inbox_driver_ver_date);
3546 if (!W_ERROR_IS_OK(result)) {
3550 result = winreg_printer_write_ver(tmp_ctx, winreg_pipe, &key_hnd,
3551 "MinInboxDriverVerVersion",
3552 info8.min_inbox_driver_ver_version);
3553 if (!W_ERROR_IS_OK(result)) {
3557 *driver_name = info8.driver_name;
3558 *driver_version = info8.version;
3561 if (winreg_pipe != NULL) {
3562 if (is_valid_policy_hnd(&key_hnd)) {
3563 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3565 if (is_valid_policy_hnd(&hive_hnd)) {
3566 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3570 TALLOC_FREE(tmp_ctx);
3574 WERROR winreg_get_driver(TALLOC_CTX *mem_ctx,
3575 struct auth_serversupplied_info *server_info,
3576 const char *architecture,
3577 const char *driver_name,
3578 uint32_t driver_version,
3579 struct spoolss_DriverInfo8 **_info8)
3581 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3582 struct rpc_pipe_client *winreg_pipe = NULL;
3583 struct policy_handle hive_hnd, key_hnd;
3584 struct spoolss_DriverInfo8 i8, *info8;
3585 struct spoolss_PrinterEnumValues *enum_values = NULL;
3586 struct spoolss_PrinterEnumValues *v;
3587 uint32_t num_values = 0;
3588 TALLOC_CTX *tmp_ctx;
3592 ZERO_STRUCT(hive_hnd);
3593 ZERO_STRUCT(key_hnd);
3596 tmp_ctx = talloc_new(mem_ctx);
3597 if (tmp_ctx == NULL) {
3601 if (driver_version == DRIVER_ANY_VERSION) {
3602 /* look for Win2k first and then for NT4 */
3603 result = winreg_printer_opendriver(tmp_ctx,
3612 if (!W_ERROR_IS_OK(result)) {
3613 result = winreg_printer_opendriver(tmp_ctx,
3624 /* ok normal case */
3625 result = winreg_printer_opendriver(tmp_ctx,
3635 if (!W_ERROR_IS_OK(result)) {
3636 DEBUG(5, ("winreg_get_driver: "
3637 "Could not open driver key (%s,%s,%d): %s\n",
3638 driver_name, architecture,
3639 driver_version, win_errstr(result)));
3643 result = winreg_printer_enumvalues(tmp_ctx,
3648 if (!W_ERROR_IS_OK(result)) {
3649 DEBUG(0, ("winreg_get_driver: "
3650 "Could not enumerate values for (%s,%s,%d): %s\n",
3651 driver_name, architecture,
3652 driver_version, win_errstr(result)));
3656 info8 = talloc_zero(tmp_ctx, struct spoolss_DriverInfo8);
3658 result = WERR_NOMEM;
3664 for (i = 0; i < num_values; i++) {
3665 const char *tmp_str;
3667 v = &enum_values[i];
3669 result = winreg_enumval_to_dword(info8, v,
3672 CHECK_ERROR(result);
3674 result = winreg_enumval_to_sz(info8, v,
3676 &info8->driver_path);
3677 CHECK_ERROR(result);
3679 result = winreg_enumval_to_sz(info8, v,
3682 CHECK_ERROR(result);
3684 result = winreg_enumval_to_sz(info8, v,
3685 "Configuration File",
3686 &info8->config_file);
3687 CHECK_ERROR(result);
3689 result = winreg_enumval_to_sz(info8, v,
3692 CHECK_ERROR(result);
3694 result = winreg_enumval_to_multi_sz(info8, v,
3696 &info8->dependent_files);
3697 CHECK_ERROR(result);
3699 result = winreg_enumval_to_sz(info8, v,
3701 &info8->monitor_name);
3702 CHECK_ERROR(result);
3704 result = winreg_enumval_to_sz(info8, v,
3706 &info8->default_datatype);
3707 CHECK_ERROR(result);
3709 result = winreg_enumval_to_multi_sz(info8, v,
3711 &info8->previous_names);
3712 CHECK_ERROR(result);
3714 result = winreg_enumval_to_sz(info8, v,
3717 if (W_ERROR_IS_OK(result)) {
3718 result = winreg_printer_date_to_NTTIME(tmp_str,
3719 &info8->driver_date);
3721 CHECK_ERROR(result);
3723 result = winreg_enumval_to_sz(info8, v,
3726 if (W_ERROR_IS_OK(result)) {
3727 result = winreg_printer_ver_to_dword(tmp_str,
3728 &info8->driver_version);
3730 CHECK_ERROR(result);
3732 result = winreg_enumval_to_sz(info8, v,
3734 &info8->manufacturer_name);
3735 CHECK_ERROR(result);
3737 result = winreg_enumval_to_sz(info8, v,
3739 &info8->manufacturer_url);
3740 CHECK_ERROR(result);
3742 result = winreg_enumval_to_sz(info8, v,
3744 &info8->hardware_id);
3745 CHECK_ERROR(result);
3747 result = winreg_enumval_to_sz(info8, v,
3750 CHECK_ERROR(result);
3752 result = winreg_enumval_to_sz(info8, v,
3754 &info8->print_processor);
3755 CHECK_ERROR(result);
3757 result = winreg_enumval_to_sz(info8, v,
3759 &info8->vendor_setup);
3760 CHECK_ERROR(result);
3762 result = winreg_enumval_to_multi_sz(info8, v,
3764 &info8->color_profiles);
3765 CHECK_ERROR(result);
3767 result = winreg_enumval_to_sz(info8, v,
3770 CHECK_ERROR(result);
3772 result = winreg_enumval_to_dword(info8, v,
3773 "PrinterDriverAttributes",
3774 &info8->printer_driver_attributes);
3775 CHECK_ERROR(result);
3777 result = winreg_enumval_to_multi_sz(info8, v,
3779 &info8->core_driver_dependencies);
3780 CHECK_ERROR(result);
3782 result = winreg_enumval_to_sz(info8, v,
3783 "MinInboxDriverVerDate",
3785 if (W_ERROR_IS_OK(result)) {
3786 result = winreg_printer_date_to_NTTIME(tmp_str,
3787 &info8->min_inbox_driver_ver_date);
3789 CHECK_ERROR(result);
3791 result = winreg_enumval_to_sz(info8, v,
3792 "MinInboxDriverVerVersion",
3794 if (W_ERROR_IS_OK(result)) {
3795 result = winreg_printer_ver_to_dword(tmp_str,
3796 &info8->min_inbox_driver_ver_version);
3798 CHECK_ERROR(result);
3801 if (!W_ERROR_IS_OK(result)) {
3802 DEBUG(0, ("winreg_enumval_to_TYPE() failed "
3803 "for %s: %s\n", v->value_name,
3804 win_errstr(result)));
3808 *_info8 = talloc_steal(mem_ctx, info8);
3811 if (winreg_pipe != NULL) {
3812 if (is_valid_policy_hnd(&key_hnd)) {
3813 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3815 if (is_valid_policy_hnd(&hive_hnd)) {
3816 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3820 TALLOC_FREE(tmp_ctx);
3824 WERROR winreg_del_driver(TALLOC_CTX *mem_ctx,
3825 struct auth_serversupplied_info *server_info,
3826 struct spoolss_DriverInfo8 *info8,
3829 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3830 struct rpc_pipe_client *winreg_pipe = NULL;
3831 struct policy_handle hive_hnd, key_hnd;
3832 TALLOC_CTX *tmp_ctx;
3836 ZERO_STRUCT(hive_hnd);
3837 ZERO_STRUCT(key_hnd);
3839 tmp_ctx = talloc_new(mem_ctx);
3840 if (tmp_ctx == NULL) {
3844 /* test that the key exists */
3845 result = winreg_printer_opendriver(tmp_ctx,
3848 info8->architecture,
3854 if (!W_ERROR_IS_OK(result)) {
3855 /* key doesn't exist */
3856 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3861 DEBUG(5, ("winreg_del_driver: "
3862 "Could not open driver (%s,%s,%u): %s\n",
3863 info8->driver_name, info8->architecture,
3864 version, win_errstr(result)));
3869 if (is_valid_policy_hnd(&key_hnd)) {
3870 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3873 key_name = talloc_asprintf(tmp_ctx,
3874 "%s\\Environments\\%s\\Drivers\\Version-%u",
3875 TOP_LEVEL_CONTROL_KEY,
3876 info8->architecture, version);
3877 if (key_name == NULL) {
3878 result = WERR_NOMEM;
3882 result = winreg_printer_delete_subkeys(tmp_ctx,
3887 if (!W_ERROR_IS_OK(result)) {
3888 DEBUG(0, ("winreg_del_driver: "
3889 "Could not open driver (%s,%s,%u): %s\n",
3890 info8->driver_name, info8->architecture,
3891 version, win_errstr(result)));
3897 if (winreg_pipe != NULL) {
3898 if (is_valid_policy_hnd(&key_hnd)) {
3899 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3901 if (is_valid_policy_hnd(&hive_hnd)) {
3902 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3906 TALLOC_FREE(tmp_ctx);
3910 WERROR winreg_get_driver_list(TALLOC_CTX *mem_ctx,
3911 struct auth_serversupplied_info *server_info,
3912 const char *architecture,
3914 uint32_t *num_drivers,
3915 const char ***drivers)
3917 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3918 struct rpc_pipe_client *winreg_pipe = NULL;
3919 struct policy_handle hive_hnd, key_hnd;
3920 TALLOC_CTX *tmp_ctx;
3923 ZERO_STRUCT(hive_hnd);
3924 ZERO_STRUCT(key_hnd);
3926 tmp_ctx = talloc_new(mem_ctx);
3927 if (tmp_ctx == NULL) {
3931 /* use NULL for the driver name so we open the key that is
3932 * parent of all drivers for this architecture and version */
3933 result = winreg_printer_opendriver(tmp_ctx,
3942 if (!W_ERROR_IS_OK(result)) {
3943 DEBUG(5, ("winreg_get_driver_list: "
3944 "Could not open key (%s,%u): %s\n",
3945 architecture, version, win_errstr(result)));
3949 result = winreg_printer_enumkeys(tmp_ctx,
3954 if (!W_ERROR_IS_OK(result)) {
3955 DEBUG(0, ("winreg_get_driver_list: "
3956 "Could not enumerate drivers for (%s,%u): %s\n",
3957 architecture, version, win_errstr(result)));
3963 if (winreg_pipe != NULL) {
3964 if (is_valid_policy_hnd(&key_hnd)) {
3965 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3967 if (is_valid_policy_hnd(&hive_hnd)) {
3968 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3972 TALLOC_FREE(tmp_ctx);