s3-spoolss: avoid passing down full "struct pipes_struct".
[amitay/samba.git] / source3 / rpc_server / srv_spoolss_util.c
1 /*
2  *  Unix SMB/CIFS implementation.
3  *
4  *  SPOOLSS RPC Pipe server / winreg client routines
5  *
6  *  Copyright (c) 2010      Andreas Schneider <asn@samba.org>
7  *
8  *  This program is free software; you can redistribute it and/or modify
9  *  it under the terms of the GNU General Public License as published by
10  *  the Free Software Foundation; either version 3 of the License, or
11  *  (at your option) any later version.
12  *
13  *  This program is distributed in the hope that it will be useful,
14  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
15  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16  *  GNU General Public License for more details.
17  *
18  *  You should have received a copy of the GNU General Public License
19  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
20  */
21
22 #include "includes.h"
23 #include "srv_spoolss_util.h"
24 #include "../librpc/gen_ndr/srv_winreg.h"
25 #include "../librpc/gen_ndr/cli_winreg.h"
26
27 #define TOP_LEVEL_PRINT_KEY "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print"
28 #define TOP_LEVEL_PRINT_PRINTERS_KEY TOP_LEVEL_PRINT_KEY "\\Printers"
29 #define TOP_LEVEL_CONTROL_KEY "SYSTEM\\CurrentControlSet\\Control\\Print"
30 #define TOP_LEVEL_CONTROL_FORMS_KEY TOP_LEVEL_CONTROL_KEY "\\Forms"
31
32 /*        FLAGS,                NAME,                              with,   height,   left, top, right, bottom */
33 static const struct spoolss_FormInfo1 builtin_forms1[] = {
34         { SPOOLSS_FORM_BUILTIN, "Letter",                         {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
35         { SPOOLSS_FORM_BUILTIN, "Letter Small",                   {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
36         { SPOOLSS_FORM_BUILTIN, "Tabloid",                        {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
37         { SPOOLSS_FORM_BUILTIN, "Ledger",                         {0x696b8,0x44368}, {0x0,0x0,0x696b8,0x44368} },
38         { SPOOLSS_FORM_BUILTIN, "Legal",                          {0x34b5c,0x56d10}, {0x0,0x0,0x34b5c,0x56d10} },
39         { SPOOLSS_FORM_BUILTIN, "Statement",                      {0x221b4,0x34b5c}, {0x0,0x0,0x221b4,0x34b5c} },
40         { SPOOLSS_FORM_BUILTIN, "Executive",                      {0x2cf56,0x411cc}, {0x0,0x0,0x2cf56,0x411cc} },
41         { SPOOLSS_FORM_BUILTIN, "A3",                             {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
42         { SPOOLSS_FORM_BUILTIN, "A4",                             {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
43         { SPOOLSS_FORM_BUILTIN, "A4 Small",                       {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
44         { SPOOLSS_FORM_BUILTIN, "A5",                             {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
45         { SPOOLSS_FORM_BUILTIN, "B4 (JIS)",                       {0x3ebe8,0x58de0}, {0x0,0x0,0x3ebe8,0x58de0} },
46         { SPOOLSS_FORM_BUILTIN, "B5 (JIS)",                       {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
47         { SPOOLSS_FORM_BUILTIN, "Folio",                          {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
48         { SPOOLSS_FORM_BUILTIN, "Quarto",                         {0x347d8,0x43238}, {0x0,0x0,0x347d8,0x43238} },
49         { SPOOLSS_FORM_BUILTIN, "10x14",                          {0x3e030,0x56d10}, {0x0,0x0,0x3e030,0x56d10} },
50         { SPOOLSS_FORM_BUILTIN, "11x17",                          {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
51         { SPOOLSS_FORM_BUILTIN, "Note",                           {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
52         { SPOOLSS_FORM_BUILTIN, "Envelope #9",                    {0x18079,0x37091}, {0x0,0x0,0x18079,0x37091} },
53         { SPOOLSS_FORM_BUILTIN, "Envelope #10",                   {0x19947,0x3ae94}, {0x0,0x0,0x19947,0x3ae94} },
54         { SPOOLSS_FORM_BUILTIN, "Envelope #11",                   {0x1be7c,0x40565}, {0x0,0x0,0x1be7c,0x40565} },
55         { SPOOLSS_FORM_BUILTIN, "Envelope #12",                   {0x1d74a,0x44368}, {0x0,0x0,0x1d74a,0x44368} },
56         { SPOOLSS_FORM_BUILTIN, "Envelope #14",                   {0x1f018,0x47504}, {0x0,0x0,0x1f018,0x47504} },
57         { SPOOLSS_FORM_BUILTIN, "C size sheet",                   {0x696b8,0x886d0}, {0x0,0x0,0x696b8,0x886d0} },
58         { SPOOLSS_FORM_BUILTIN, "D size sheet",                   {0x886d0,0xd2d70}, {0x0,0x0,0x886d0,0xd2d70} },
59         { SPOOLSS_FORM_BUILTIN, "E size sheet",                   {0xd2d70,0x110da0},{0x0,0x0,0xd2d70,0x110da0} },
60         { SPOOLSS_FORM_BUILTIN, "Envelope DL",                    {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
61         { SPOOLSS_FORM_BUILTIN, "Envelope C5",                    {0x278d0,0x37e88}, {0x0,0x0,0x278d0,0x37e88} },
62         { SPOOLSS_FORM_BUILTIN, "Envelope C3",                    {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
63         { SPOOLSS_FORM_BUILTIN, "Envelope C4",                    {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
64         { SPOOLSS_FORM_BUILTIN, "Envelope C6",                    {0x1bd50,0x278d0}, {0x0,0x0,0x1bd50,0x278d0} },
65         { SPOOLSS_FORM_BUILTIN, "Envelope C65",                   {0x1bd50,0x37e88}, {0x0,0x0,0x1bd50,0x37e88} },
66         { SPOOLSS_FORM_BUILTIN, "Envelope B4",                    {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
67         { SPOOLSS_FORM_BUILTIN, "Envelope B5",                    {0x2af80,0x3d090}, {0x0,0x0,0x2af80,0x3d090} },
68         { SPOOLSS_FORM_BUILTIN, "Envelope B6",                    {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
69         { SPOOLSS_FORM_BUILTIN, "Envelope",                       {0x1adb0,0x38270}, {0x0,0x0,0x1adb0,0x38270} },
70         { SPOOLSS_FORM_BUILTIN, "Envelope Monarch",               {0x18079,0x2e824}, {0x0,0x0,0x18079,0x2e824} },
71         { SPOOLSS_FORM_BUILTIN, "6 3/4 Envelope",                 {0x167ab,0x284ec}, {0x0,0x0,0x167ab,0x284ec} },
72         { SPOOLSS_FORM_BUILTIN, "US Std Fanfold",                 {0x5c3e1,0x44368}, {0x0,0x0,0x5c3e1,0x44368} },
73         { SPOOLSS_FORM_BUILTIN, "German Std Fanfold",             {0x34b5c,0x4a6a0}, {0x0,0x0,0x34b5c,0x4a6a0} },
74         { SPOOLSS_FORM_BUILTIN, "German Legal Fanfold",           {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
75         { SPOOLSS_FORM_BUILTIN, "B4 (ISO)",                       {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
76         { SPOOLSS_FORM_BUILTIN, "Japanese Postcard",              {0x186a0,0x24220}, {0x0,0x0,0x186a0,0x24220} },
77         { SPOOLSS_FORM_BUILTIN, "9x11",                           {0x37cf8,0x44368}, {0x0,0x0,0x37cf8,0x44368} },
78         { SPOOLSS_FORM_BUILTIN, "10x11",                          {0x3e030,0x44368}, {0x0,0x0,0x3e030,0x44368} },
79         { SPOOLSS_FORM_BUILTIN, "15x11",                          {0x5d048,0x44368}, {0x0,0x0,0x5d048,0x44368} },
80         { SPOOLSS_FORM_BUILTIN, "Envelope Invite",                {0x35b60,0x35b60}, {0x0,0x0,0x35b60,0x35b60} },
81         { SPOOLSS_FORM_BUILTIN, "Reserved48",                     {0x1,0x1},         {0x0,0x0,0x1,0x1} },
82         { SPOOLSS_FORM_BUILTIN, "Reserved49",                     {0x1,0x1},         {0x0,0x0,0x1,0x1} },
83         { SPOOLSS_FORM_BUILTIN, "Letter Extra",                   {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
84         { SPOOLSS_FORM_BUILTIN, "Legal Extra",                    {0x3ae94,0x5d048}, {0x0,0x0,0x3ae94,0x5d048} },
85         { SPOOLSS_FORM_BUILTIN, "Tabloid Extra",                  {0x4a6a0,0x6f9f0}, {0x0,0x0,0x4a6a0,0x6f9f0} },
86         { SPOOLSS_FORM_BUILTIN, "A4 Extra",                       {0x397c2,0x4eb16}, {0x0,0x0,0x397c2,0x4eb16} },
87         { SPOOLSS_FORM_BUILTIN, "Letter Transverse",              {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
88         { SPOOLSS_FORM_BUILTIN, "A4 Transverse",                  {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
89         { SPOOLSS_FORM_BUILTIN, "Letter Extra Transverse",        {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
90         { SPOOLSS_FORM_BUILTIN, "Super A",                        {0x376b8,0x56ea0}, {0x0,0x0,0x376b8,0x56ea0} },
91         { SPOOLSS_FORM_BUILTIN, "Super B",                        {0x4a768,0x76e58}, {0x0,0x0,0x4a768,0x76e58} },
92         { SPOOLSS_FORM_BUILTIN, "Letter Plus",                    {0x34b5c,0x4eb16}, {0x0,0x0,0x34b5c,0x4eb16} },
93         { SPOOLSS_FORM_BUILTIN, "A4 Plus",                        {0x33450,0x50910}, {0x0,0x0,0x33450,0x50910} },
94         { SPOOLSS_FORM_BUILTIN, "A5 Transverse",                  {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
95         { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Transverse",            {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
96         { SPOOLSS_FORM_BUILTIN, "A3 Extra",                       {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
97         { SPOOLSS_FORM_BUILTIN, "A5 Extra",                       {0x2a7b0,0x395f8}, {0x0,0x0,0x2a7b0,0x395f8} },
98         { SPOOLSS_FORM_BUILTIN, "B5 (ISO) Extra",                 {0x31128,0x43620}, {0x0,0x0,0x31128,0x43620} },
99         { SPOOLSS_FORM_BUILTIN, "A2",                             {0x668a0,0x91050}, {0x0,0x0,0x668a0,0x91050} },
100         { SPOOLSS_FORM_BUILTIN, "A3 Transverse",                  {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
101         { SPOOLSS_FORM_BUILTIN, "A3 Extra Transverse",            {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
102         { SPOOLSS_FORM_BUILTIN, "Japanese Double Postcard",       {0x30d40,0x24220}, {0x0,0x0,0x30d40,0x24220} },
103         { SPOOLSS_FORM_BUILTIN, "A6",                             {0x19a28,0x24220}, {0x0,0x0,0x19a28,0x24220} },
104         { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #2",      {0x3a980,0x510e0}, {0x0,0x0,0x3a980,0x510e0} },
105         { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #3",      {0x34bc0,0x43a08}, {0x0,0x0,0x34bc0,0x43a08} },
106         { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #3",      {0x1d4c0,0x395f8}, {0x0,0x0,0x1d4c0,0x395f8} },
107         { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #4",      {0x15f90,0x320c8}, {0x0,0x0,0x15f90,0x320c8} },
108         { SPOOLSS_FORM_BUILTIN, "Letter Rotated",                 {0x44368,0x34b5c}, {0x0,0x0,0x44368,0x34b5c} },
109         { SPOOLSS_FORM_BUILTIN, "A3 Rotated",                     {0x668a0,0x48828}, {0x0,0x0,0x668a0,0x48828} },
110         { SPOOLSS_FORM_BUILTIN, "A4 Rotated",                     {0x48828,0x33450}, {0x0,0x0,0x48828,0x33450} },
111         { SPOOLSS_FORM_BUILTIN, "A5 Rotated",                     {0x33450,0x24220}, {0x0,0x0,0x33450,0x24220} },
112         { SPOOLSS_FORM_BUILTIN, "B4 (JIS) Rotated",               {0x58de0,0x3ebe8}, {0x0,0x0,0x58de0,0x3ebe8} },
113         { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Rotated",               {0x3ebe8,0x2c6f0}, {0x0,0x0,0x3ebe8,0x2c6f0} },
114         { SPOOLSS_FORM_BUILTIN, "Japanese Postcard Rotated",      {0x24220,0x186a0}, {0x0,0x0,0x24220,0x186a0} },
115         { SPOOLSS_FORM_BUILTIN, "Double Japan Postcard Rotated",  {0x24220,0x30d40}, {0x0,0x0,0x24220,0x30d40} },
116         { SPOOLSS_FORM_BUILTIN, "A6 Rotated",                     {0x24220,0x19a28}, {0x0,0x0,0x24220,0x19a28} },
117         { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #2 Rotated", {0x510e0,0x3a980}, {0x0,0x0,0x510e0,0x3a980} },
118         { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #3 Rotated", {0x43a08,0x34bc0}, {0x0,0x0,0x43a08,0x34bc0} },
119         { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #3 Rotated", {0x395f8,0x1d4c0}, {0x0,0x0,0x395f8,0x1d4c0} },
120         { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #4 Rotated", {0x320c8,0x15f90}, {0x0,0x0,0x320c8,0x15f90} },
121         { SPOOLSS_FORM_BUILTIN, "B6 (JIS)",                       {0x1f400,0x2c6f0}, {0x0,0x0,0x1f400,0x2c6f0} },
122         { SPOOLSS_FORM_BUILTIN, "B6 (JIS) Rotated",               {0x2c6f0,0x1f400}, {0x0,0x0,0x2c6f0,0x1f400} },
123         { SPOOLSS_FORM_BUILTIN, "12x11",                          {0x4a724,0x443e1}, {0x0,0x0,0x4a724,0x443e1} },
124         { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4",          {0x19a28,0x395f8}, {0x0,0x0,0x19a28,0x395f8} },
125         { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4 Rotated",  {0x395f8,0x19a28}, {0x0,0x0,0x395f8,0x19a28} },
126         { SPOOLSS_FORM_BUILTIN, "PRC 16K",                        {0x2de60,0x3f7a0}, {0x0,0x0,0x2de60,0x3f7a0} },
127         { SPOOLSS_FORM_BUILTIN, "PRC 32K",                        {0x1fbd0,0x2cec0}, {0x0,0x0,0x1fbd0,0x2cec0} },
128         { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big)",                   {0x222e0,0x318f8}, {0x0,0x0,0x222e0,0x318f8} },
129         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1",                {0x18e70,0x28488}, {0x0,0x0,0x18e70,0x28488} },
130         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2",                {0x18e70,0x2af80}, {0x0,0x0,0x18e70,0x2af80} },
131         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3",                {0x1e848,0x2af80}, {0x0,0x0,0x1e848,0x2af80} },
132         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4",                {0x1adb0,0x32c80}, {0x0,0x0,0x1adb0,0x32c80} },
133         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5",                {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
134         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6",                {0x1d4c0,0x38270}, {0x0,0x0,0x1d4c0,0x38270} },
135         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7",                {0x27100,0x38270}, {0x0,0x0,0x27100,0x38270} },
136         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8",                {0x1d4c0,0x4b708}, {0x0,0x0,0x1d4c0,0x4b708} },
137         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9",                {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
138         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10",               {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
139         { SPOOLSS_FORM_BUILTIN, "PRC 16K Rotated",                {0x3f7a0,0x2de60}, {0x0,0x0,0x3f7a0,0x2de60} },
140         { SPOOLSS_FORM_BUILTIN, "PRC 32K Rotated",                {0x2cec0,0x1fbd0}, {0x0,0x0,0x2cec0,0x1fbd0} },
141         { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big) Rotated",           {0x318f8,0x222e0}, {0x0,0x0,0x318f8,0x222e0} },
142         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1 Rotated",        {0x28488,0x18e70}, {0x0,0x0,0x28488,0x18e70} },
143         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2 Rotated",        {0x2af80,0x18e70}, {0x0,0x0,0x2af80,0x18e70} },
144         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3 Rotated",        {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
145         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4 Rotated",        {0x32c80,0x1adb0}, {0x0,0x0,0x32c80,0x1adb0} },
146         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5 Rotated",        {0x35b60,0x1adb0}, {0x0,0x0,0x35b60,0x1adb0} },
147         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6 Rotated",        {0x38270,0x1d4c0}, {0x0,0x0,0x38270,0x1d4c0} },
148         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7 Rotated",        {0x38270,0x27100}, {0x0,0x0,0x38270,0x27100} },
149         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8 Rotated",        {0x4b708,0x1d4c0}, {0x0,0x0,0x4b708,0x1d4c0} },
150         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9 Rotated",        {0x4f1a0,0x37e88}, {0x0,0x0,0x4f1a0,0x37e88} },
151         { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10 Rotated",       {0x6fd10,0x4f1a0}, {0x0,0x0,0x6fd10,0x4f1a0} }
152 };
153
154 /********************************************************************
155  static helper functions
156 ********************************************************************/
157
158 /**
159  * @internal
160  *
161  * @brief Connect to the interal winreg server and open the given printer key.
162  *
163  * The function will create the needed subkeys if they don't exist.
164  *
165  * @param[in]  mem_ctx       The memory context to use.
166  *
167  * @param[in]  server_info   The supplied server info.
168  *
169  * @param[out] winreg_pipe   A pointer for the winreg rpc client pipe.
170  *
171  * @param[in]  path          The path to the key to open.
172  *
173  * @param[in]  key           The key to open.
174  *
175  * @param[in]  create_key    Set to true if the key should be created if it
176  *                           doesn't exist.
177  *
178  * @param[in]  access_mask   The access mask to open the key.
179  *
180  * @param[out] hive_handle   A policy handle for the opened hive.
181  *
182  * @param[out] key_handle    A policy handle for the opened key.
183  *
184  * @return                   WERR_OK on success, the corresponding DOS error
185  *                           code if something gone wrong.
186  */
187 static WERROR winreg_printer_openkey(TALLOC_CTX *mem_ctx,
188                               struct auth_serversupplied_info *server_info,
189                               struct rpc_pipe_client **winreg_pipe,
190                               const char *path,
191                               const char *key,
192                               bool create_key,
193                               uint32_t access_mask,
194                               struct policy_handle *hive_handle,
195                               struct policy_handle *key_handle)
196 {
197         struct rpc_pipe_client *pipe_handle;
198         struct winreg_String wkey, wkeyclass;
199         char *keyname;
200         NTSTATUS status;
201         WERROR result = WERR_OK;
202
203         /* create winreg connection */
204         status = rpc_pipe_open_internal(mem_ctx,
205                                         &ndr_table_winreg.syntax_id,
206                                         rpc_winreg_dispatch,
207                                         server_info,
208                                         &pipe_handle);
209         if (!NT_STATUS_IS_OK(status)) {
210                 DEBUG(0, ("winreg_printer_openkey: Could not connect to winreg_pipe: %s\n",
211                           nt_errstr(status)));
212                 return ntstatus_to_werror(status);
213         }
214
215         status = rpccli_winreg_OpenHKLM(pipe_handle,
216                                         mem_ctx,
217                                         NULL,
218                                         access_mask,
219                                         hive_handle,
220                                         &result);
221         if (!NT_STATUS_IS_OK(status)) {
222                 DEBUG(0, ("winreg_printer_openkey: Could not open HKLM hive: %s\n",
223                           nt_errstr(status)));
224                 talloc_free(pipe_handle);
225                 if (!W_ERROR_IS_OK(result)) {
226                         return result;
227                 }
228                 return ntstatus_to_werror(status);
229         }
230
231         if (key && *key) {
232                 keyname = talloc_asprintf(mem_ctx, "%s\\%s", path, key);
233         } else {
234                 keyname = talloc_strdup(mem_ctx, path);
235         }
236         if (keyname == NULL) {
237                 talloc_free(pipe_handle);
238                 return WERR_NOMEM;
239         }
240
241         ZERO_STRUCT(wkey);
242         wkey.name = keyname;
243
244         if (create_key) {
245                 enum winreg_CreateAction action = REG_ACTION_NONE;
246
247                 ZERO_STRUCT(wkeyclass);
248                 wkeyclass.name = "";
249
250                 status = rpccli_winreg_CreateKey(pipe_handle,
251                                                  mem_ctx,
252                                                  hive_handle,
253                                                  wkey,
254                                                  wkeyclass,
255                                                  0,
256                                                  access_mask,
257                                                  NULL,
258                                                  key_handle,
259                                                  &action,
260                                                  &result);
261                 switch (action) {
262                         case REG_ACTION_NONE:
263                                 DEBUG(8, ("winreg_printer_openkey:createkey did nothing -- huh?\n"));
264                                 break;
265                         case REG_CREATED_NEW_KEY:
266                                 DEBUG(8, ("winreg_printer_openkey: createkey created %s\n", keyname));
267                                 break;
268                         case REG_OPENED_EXISTING_KEY:
269                                 DEBUG(8, ("winreg_printer_openkey: createkey opened existing %s\n", keyname));
270                                 break;
271                 }
272         } else {
273                 status = rpccli_winreg_OpenKey(pipe_handle,
274                                                mem_ctx,
275                                                hive_handle,
276                                                wkey,
277                                                0,
278                                                access_mask,
279                                                key_handle,
280                                                &result);
281         }
282         if (!NT_STATUS_IS_OK(status)) {
283                 talloc_free(pipe_handle);
284                 if (!W_ERROR_IS_OK(result)) {
285                         return result;
286                 }
287                 return ntstatus_to_werror(status);
288         }
289
290         *winreg_pipe = pipe_handle;
291
292         return WERR_OK;
293 }
294
295 /**
296  * @brief Create the registry keyname for the given printer.
297  *
298  * @param[in]  mem_ctx  The memory context to use.
299  *
300  * @param[in]  printer  The name of the printer to get the registry key.
301  *
302  * @return     The registry key or NULL on error.
303  */
304 static char *winreg_printer_data_keyname(TALLOC_CTX *mem_ctx, const char *printer) {
305         return talloc_asprintf(mem_ctx, "%s\\%s", TOP_LEVEL_PRINT_PRINTERS_KEY, printer);
306 }
307
308 /**
309  * @internal
310  *
311  * @brief Enumerate values of an opened key handle and retrieve the data.
312  *
313  * @param[in]  mem_ctx  The memory context to use.
314  *
315  * @param[in]  pipe_handle The pipe handle for the rpc connection.
316  *
317  * @param[in]  key_hnd  The opened key handle.
318  *
319  * @param[out] pnum_values A pointer to store he number of values found.
320  *
321  * @param[out] pnum_values A pointer to store the number of values we found.
322  *
323  * @return                   WERR_OK on success, the corresponding DOS error
324  *                           code if something gone wrong.
325  */
326 static WERROR winreg_printer_enumvalues(TALLOC_CTX *mem_ctx,
327                                         struct rpc_pipe_client *pipe_handle,
328                                         struct policy_handle *key_hnd,
329                                         uint32_t *pnum_values,
330                                         struct spoolss_PrinterEnumValues **penum_values)
331 {
332         TALLOC_CTX *tmp_ctx;
333         uint32_t num_subkeys, max_subkeylen, max_classlen;
334         uint32_t num_values, max_valnamelen, max_valbufsize;
335         uint32_t secdescsize;
336         uint32_t i;
337         NTTIME last_changed_time;
338         struct winreg_String classname;
339
340         struct spoolss_PrinterEnumValues *enum_values;
341
342         WERROR result = WERR_OK;
343         NTSTATUS status;
344
345         tmp_ctx = talloc_new(mem_ctx);
346         if (tmp_ctx == NULL) {
347                 return WERR_NOMEM;
348         }
349
350         ZERO_STRUCT(classname);
351
352         status = rpccli_winreg_QueryInfoKey(pipe_handle,
353                                             tmp_ctx,
354                                             key_hnd,
355                                             &classname,
356                                             &num_subkeys,
357                                             &max_subkeylen,
358                                             &max_classlen,
359                                             &num_values,
360                                             &max_valnamelen,
361                                             &max_valbufsize,
362                                             &secdescsize,
363                                             &last_changed_time,
364                                             &result);
365         if (!NT_STATUS_IS_OK(status)) {
366                 DEBUG(0, ("winreg_printer_enumvalues: Could not query info: %s\n",
367                           nt_errstr(status)));
368                 if (!W_ERROR_IS_OK(result)) {
369                         goto error;
370                 }
371                 result = ntstatus_to_werror(status);
372                 goto error;
373         }
374
375         if (num_values == 0) {
376                 *pnum_values = 0;
377                 TALLOC_FREE(tmp_ctx);
378                 return WERR_OK;
379         }
380
381         enum_values = TALLOC_ARRAY(tmp_ctx, struct spoolss_PrinterEnumValues, num_values);
382         if (enum_values == NULL) {
383                 result = WERR_NOMEM;
384                 goto error;
385         }
386
387         for (i = 0; i < num_values; i++) {
388                 struct spoolss_PrinterEnumValues val;
389                 struct winreg_ValNameBuf name_buf;
390                 enum winreg_Type type = REG_NONE;
391                 uint8_t *data = NULL;
392                 uint32_t data_size;
393                 uint32_t length;
394                 char n = '\0';;
395
396                 name_buf.name = &n;
397                 name_buf.size = max_valnamelen + 2;
398                 name_buf.length = 0;
399
400                 data_size = max_valbufsize;
401                 data = (uint8_t *) TALLOC(tmp_ctx, data_size);
402                 length = 0;
403
404                 status = rpccli_winreg_EnumValue(pipe_handle,
405                                                  tmp_ctx,
406                                                  key_hnd,
407                                                  i,
408                                                  &name_buf,
409                                                  &type,
410                                                  data,
411                                                  &data_size,
412                                                  &length,
413                                                  &result);
414                 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
415                         result = WERR_OK;
416                         status = NT_STATUS_OK;
417                         break;
418                 }
419
420                 if (!NT_STATUS_IS_OK(status)) {
421                         DEBUG(0, ("winreg_printer_enumvalues: Could not enumerate values: %s\n",
422                                   nt_errstr(status)));
423                         if (!W_ERROR_IS_OK(result)) {
424                                 goto error;
425                         }
426                         result = ntstatus_to_werror(status);
427                         goto error;
428                 }
429
430                 if (name_buf.name == NULL) {
431                         result = WERR_INVALID_PARAMETER;
432                         goto error;
433                 }
434
435                 val.value_name = talloc_strdup(enum_values, name_buf.name);
436                 if (val.value_name == NULL) {
437                         result = WERR_NOMEM;
438                         goto error;
439                 }
440                 val.value_name_len = strlen_m_term(val.value_name) * 2;
441
442                 val.type = type;
443                 val.data_length = data_size;
444                 val.data = NULL;
445                 if (val.data_length) {
446                         val.data = talloc(enum_values, DATA_BLOB);
447                         if (val.data == NULL) {
448                                 result = WERR_NOMEM;
449                                 goto error;
450                         }
451                         *val.data = data_blob_talloc(enum_values, data, data_size);
452                 }
453
454                 enum_values[i] = val;
455         }
456
457         *pnum_values = num_values;
458         if (penum_values) {
459                 *penum_values = talloc_move(mem_ctx, &enum_values);
460         }
461
462         result = WERR_OK;
463
464  error:
465         TALLOC_FREE(tmp_ctx);
466         return result;
467 }
468
469 /**
470  * @internal
471  *
472  * @brief Enumerate subkeys of an opened key handle and get the names.
473  *
474  * @param[in]  mem_ctx  The memory context to use.
475  *
476  * @param[in]  pipe_handle The pipe handle for the rpc connection.
477  *
478  * @param[in]  key_hnd  The opened key handle.
479  *
480  * @param[in]  pnum_subkeys A pointer to store the number of found subkeys.
481  *
482  * @param[in]  psubkeys A pointer to an array to store the found names of
483  *                      subkeys.
484  *
485  * @return                   WERR_OK on success, the corresponding DOS error
486  *                           code if something gone wrong.
487  */
488 static WERROR winreg_printer_enumkeys(TALLOC_CTX *mem_ctx,
489                                       struct rpc_pipe_client *pipe_handle,
490                                       struct policy_handle *key_hnd,
491                                       uint32_t *pnum_subkeys,
492                                       const char ***psubkeys)
493 {
494         TALLOC_CTX *tmp_ctx;
495         const char **subkeys;
496         uint32_t num_subkeys, max_subkeylen, max_classlen;
497         uint32_t num_values, max_valnamelen, max_valbufsize;
498         uint32_t i;
499         NTTIME last_changed_time;
500         uint32_t secdescsize;
501         struct winreg_String classname;
502         WERROR result = WERR_OK;
503         NTSTATUS status;
504
505         tmp_ctx = talloc_new(mem_ctx);
506         if (tmp_ctx == NULL) {
507                 return WERR_NOMEM;
508         }
509
510         ZERO_STRUCT(classname);
511
512         status = rpccli_winreg_QueryInfoKey(pipe_handle,
513                                             tmp_ctx,
514                                             key_hnd,
515                                             &classname,
516                                             &num_subkeys,
517                                             &max_subkeylen,
518                                             &max_classlen,
519                                             &num_values,
520                                             &max_valnamelen,
521                                             &max_valbufsize,
522                                             &secdescsize,
523                                             &last_changed_time,
524                                             &result);
525         if (!NT_STATUS_IS_OK(status)) {
526                 DEBUG(0, ("winreg_printer_enumkeys: Could not query info: %s\n",
527                           nt_errstr(status)));
528                 if (!W_ERROR_IS_OK(result)) {
529                         goto error;
530                 }
531                 result = ntstatus_to_werror(status);
532                 goto error;
533         }
534
535         subkeys = talloc_zero_array(tmp_ctx, const char *, num_subkeys + 2);
536         if (subkeys == NULL) {
537                 result = WERR_NOMEM;
538                 goto error;
539         }
540
541         if (num_subkeys == 0) {
542                 subkeys[0] = talloc_strdup(subkeys, "");
543                 if (subkeys[0] == NULL) {
544                         result = WERR_NOMEM;
545                         goto error;
546                 }
547                 *pnum_subkeys = 0;
548                 if (psubkeys) {
549                         *psubkeys = talloc_move(mem_ctx, &subkeys);
550                 }
551
552                 TALLOC_FREE(tmp_ctx);
553                 return WERR_OK;
554         }
555
556         for (i = 0; i < num_subkeys; i++) {
557                 char c = '\0';
558                 char n = '\0';
559                 char *name = NULL;
560                 struct winreg_StringBuf class_buf;
561                 struct winreg_StringBuf name_buf;
562                 NTTIME modtime;
563
564                 class_buf.name = &c;
565                 class_buf.size = max_classlen + 2;
566                 class_buf.length = 0;
567
568                 name_buf.name = &n;
569                 name_buf.size = max_subkeylen + 2;
570                 name_buf.length = 0;
571
572                 ZERO_STRUCT(modtime);
573
574                 status = rpccli_winreg_EnumKey(pipe_handle,
575                                                tmp_ctx,
576                                                key_hnd,
577                                                i,
578                                                &name_buf,
579                                                &class_buf,
580                                                &modtime,
581                                                &result);
582                 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
583                         result = WERR_OK;
584                         status = NT_STATUS_OK;
585                         break;
586                 }
587
588                 if (!NT_STATUS_IS_OK(status)) {
589                         DEBUG(0, ("winreg_printer_enumkeys: Could not enumerate keys: %s\n",
590                                   nt_errstr(status)));
591                         if (!W_ERROR_IS_OK(result)) {
592                                 goto error;
593                         }
594                         result = ntstatus_to_werror(status);
595                         goto error;
596                 }
597
598                 if (name_buf.name == NULL) {
599                         result = WERR_INVALID_PARAMETER;
600                         goto error;
601                 }
602
603                 name = talloc_strdup(subkeys, name_buf.name);
604                 if (name == NULL) {
605                         result = WERR_NOMEM;
606                         goto error;
607                 }
608
609                 subkeys[i] = name;
610         }
611
612         *pnum_subkeys = num_subkeys;
613         if (psubkeys) {
614                 *psubkeys = talloc_move(mem_ctx, &subkeys);
615         }
616
617  error:
618         TALLOC_FREE(tmp_ctx);
619         return result;
620 }
621
622 /**
623  * @internal
624  *
625  * @brief A function to delete a key and its subkeys recurively.
626  *
627  * @param[in]  mem_ctx  The memory context to use.
628  *
629  * @param[in]  pipe_handle The pipe handle for the rpc connection.
630  *
631  * @param[in]  hive_handle A opened hive handle to the key.
632  *
633  * @param[in]  access_mask The access mask to access the key.
634  *
635  * @param[in]  key      The key to delete
636  *
637  * @return              WERR_OK on success, the corresponding DOS error
638  *                      code if something gone wrong.
639  */
640 static WERROR winreg_printer_delete_subkeys(TALLOC_CTX *mem_ctx,
641                                             struct rpc_pipe_client *pipe_handle,
642                                             struct policy_handle *hive_handle,
643                                             uint32_t access_mask,
644                                             const char *key)
645 {
646         const char **subkeys = NULL;
647         uint32_t num_subkeys = 0;
648         struct policy_handle key_hnd;
649         struct winreg_String wkey;
650         WERROR result = WERR_OK;
651         NTSTATUS status;
652         uint32_t i;
653
654         ZERO_STRUCT(key_hnd);
655         wkey.name = key;
656
657         DEBUG(2, ("winreg_printer_delete_subkeys: delete key %s\n", key));
658         /* open the key */
659         status = rpccli_winreg_OpenKey(pipe_handle,
660                                        mem_ctx,
661                                        hive_handle,
662                                        wkey,
663                                        0,
664                                        access_mask,
665                                        &key_hnd,
666                                        &result);
667         if (!NT_STATUS_IS_OK(status)) {
668                 DEBUG(0, ("winreg_printer_delete_subkeys: Could not open key %s: %s\n",
669                           wkey.name, nt_errstr(status)));
670                 if (!W_ERROR_IS_OK(result)) {
671                         return result;
672                 }
673                 return ntstatus_to_werror(status);
674         }
675
676         result = winreg_printer_enumkeys(mem_ctx,
677                                          pipe_handle,
678                                          &key_hnd,
679                                          &num_subkeys,
680                                          &subkeys);
681         if (!W_ERROR_IS_OK(result)) {
682                 goto done;
683         }
684
685         for (i = 0; i < num_subkeys; i++) {
686                 /* create key + subkey */
687                 char *subkey = talloc_asprintf(mem_ctx, "%s\\%s", key, subkeys[i]);
688                 if (subkey == NULL) {
689                         goto done;
690                 }
691
692                 DEBUG(2, ("winreg_printer_delete_subkeys: delete subkey %s\n", subkey));
693                 result = winreg_printer_delete_subkeys(mem_ctx,
694                                                        pipe_handle,
695                                                        hive_handle,
696                                                        access_mask,
697                                                        subkey);
698                 if (!W_ERROR_IS_OK(result)) {
699                         goto done;
700                 }
701         }
702
703         if (is_valid_policy_hnd(&key_hnd)) {
704                 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
705         }
706
707         wkey.name = key;
708
709         status = rpccli_winreg_DeleteKey(pipe_handle,
710                                          mem_ctx,
711                                          hive_handle,
712                                          wkey,
713                                          &result);
714
715 done:
716         if (is_valid_policy_hnd(&key_hnd)) {
717                 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
718         }
719
720         return result;
721 }
722
723 /********************************************************************
724  Public winreg function for spoolss
725 ********************************************************************/
726
727 /* Set printer data over the winreg pipe. */
728 WERROR winreg_set_printer_dataex(TALLOC_CTX *mem_ctx,
729                                  struct auth_serversupplied_info *server_info,
730                                  const char *printer,
731                                  const char *key,
732                                  const char *value,
733                                  enum winreg_Type type,
734                                  uint8_t *data,
735                                  uint32_t data_size)
736 {
737         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
738         struct rpc_pipe_client *winreg_pipe = NULL;
739         struct policy_handle hive_hnd, key_hnd;
740         struct winreg_String wvalue;
741         char *path;
742         WERROR result = WERR_OK;
743         NTSTATUS status;
744         TALLOC_CTX *tmp_ctx;
745
746         tmp_ctx = talloc_new(mem_ctx);
747         if (tmp_ctx == NULL) {
748                 return WERR_NOMEM;
749         }
750
751         path = winreg_printer_data_keyname(tmp_ctx, printer);
752         if (path == NULL) {
753                 TALLOC_FREE(tmp_ctx);
754                 return WERR_NOMEM;
755         }
756
757         ZERO_STRUCT(hive_hnd);
758         ZERO_STRUCT(key_hnd);
759
760         DEBUG(8, ("winreg_set_printer_dataex: Open printer key %s, value %s, access_mask: 0x%05x for [%s]\n",
761                         key, value, access_mask, printer));
762         result = winreg_printer_openkey(tmp_ctx,
763                                         server_info,
764                                         &winreg_pipe,
765                                         path,
766                                         key,
767                                         true,
768                                         access_mask,
769                                         &hive_hnd,
770                                         &key_hnd);
771         if (!W_ERROR_IS_OK(result)) {
772                 DEBUG(0, ("winreg_set_printer_dataex: Could not open key %s: %s\n",
773                           key, win_errstr(result)));
774                 goto done;
775         }
776
777         wvalue.name = value;
778         status = rpccli_winreg_SetValue(winreg_pipe,
779                                         tmp_ctx,
780                                         &key_hnd,
781                                         wvalue,
782                                         type,
783                                         data,
784                                         data_size,
785                                         &result);
786         if (!NT_STATUS_IS_OK(status)) {
787                 DEBUG(0, ("winreg_set_printer_dataex: Could not set value %s: %s\n",
788                           value, nt_errstr(status)));
789                 if (!W_ERROR_IS_OK(result)) {
790                         goto done;
791                 }
792                 result = ntstatus_to_werror(status);
793                 goto done;
794         }
795
796         result = WERR_OK;
797 done:
798         if (winreg_pipe != NULL) {
799                 if (is_valid_policy_hnd(&key_hnd)) {
800                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
801                 }
802                 if (is_valid_policy_hnd(&hive_hnd)) {
803                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
804                 }
805         }
806
807         TALLOC_FREE(tmp_ctx);
808         return result;
809 }
810
811 /* Get printer data over a winreg pipe. */
812 WERROR winreg_get_printer_dataex(TALLOC_CTX *mem_ctx,
813                                  struct auth_serversupplied_info *server_info,
814                                  const char *printer,
815                                  const char *key,
816                                  const char *value,
817                                  enum winreg_Type *type,
818                                  uint8_t **data,
819                                  uint32_t *data_size)
820 {
821         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
822         struct rpc_pipe_client *winreg_pipe = NULL;
823         struct policy_handle hive_hnd, key_hnd;
824         struct winreg_String wvalue;
825         enum winreg_Type type_in;
826         char *path;
827         uint8_t *data_in;
828         uint32_t data_in_size = 0;
829         uint32_t value_len = 0;
830         WERROR result = WERR_OK;
831         NTSTATUS status;
832         TALLOC_CTX *tmp_ctx;
833
834         tmp_ctx = talloc_new(mem_ctx);
835         if (tmp_ctx == NULL) {
836                 return WERR_NOMEM;
837         }
838
839         path = winreg_printer_data_keyname(tmp_ctx, printer);
840         if (path == NULL) {
841                 TALLOC_FREE(tmp_ctx);
842                 return WERR_NOMEM;
843         }
844
845         ZERO_STRUCT(hive_hnd);
846         ZERO_STRUCT(key_hnd);
847
848         result = winreg_printer_openkey(tmp_ctx,
849                                         server_info,
850                                         &winreg_pipe,
851                                         path,
852                                         key,
853                                         false,
854                                         access_mask,
855                                         &hive_hnd,
856                                         &key_hnd);
857         if (!W_ERROR_IS_OK(result)) {
858                 DEBUG(0, ("winreg_get_printer_dataex: Could not open key %s: %s\n",
859                           key, win_errstr(result)));
860                 goto done;
861         }
862
863         wvalue.name = value;
864
865         /*
866          * call QueryValue once with data == NULL to get the
867          * needed memory size to be allocated, then allocate
868          * data buffer and call again.
869          */
870         status = rpccli_winreg_QueryValue(winreg_pipe,
871                                           tmp_ctx,
872                                           &key_hnd,
873                                           &wvalue,
874                                           &type_in,
875                                           NULL,
876                                           &data_in_size,
877                                           &value_len,
878                                           &result);
879         if (!NT_STATUS_IS_OK(status)) {
880                 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
881                           value, nt_errstr(status)));
882                 if (!W_ERROR_IS_OK(result)) {
883                         goto done;
884                 }
885                 result = ntstatus_to_werror(status);
886                 goto done;
887         }
888
889         data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
890         if (data_in == NULL) {
891                 result = WERR_NOMEM;
892                 goto done;
893         }
894         value_len = 0;
895
896         status = rpccli_winreg_QueryValue(winreg_pipe,
897                                           tmp_ctx,
898                                           &key_hnd,
899                                           &wvalue,
900                                           &type_in,
901                                           data_in,
902                                           &data_in_size,
903                                           &value_len,
904                                           &result);
905         if (!NT_STATUS_IS_OK(status)) {
906                 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
907                           value, nt_errstr(status)));
908                 if (!W_ERROR_IS_OK(result)) {
909                         result = ntstatus_to_werror(status);
910                 }
911                 goto done;
912         }
913
914         *type = type_in;
915         *data_size = data_in_size;
916         if (data_in_size) {
917                 *data = talloc_move(mem_ctx, &data_in);
918         }
919
920         result = WERR_OK;
921 done:
922         if (winreg_pipe != NULL) {
923                 if (is_valid_policy_hnd(&key_hnd)) {
924                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
925                 }
926                 if (is_valid_policy_hnd(&hive_hnd)) {
927                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
928                 }
929         }
930
931         TALLOC_FREE(tmp_ctx);
932         return result;
933 }
934
935 /* Enumerate on the values of a given key and provide the data. */
936 WERROR winreg_enum_printer_dataex(TALLOC_CTX *mem_ctx,
937                                   struct auth_serversupplied_info *server_info,
938                                   const char *printer,
939                                   const char *key,
940                                   uint32_t *pnum_values,
941                                   struct spoolss_PrinterEnumValues **penum_values)
942 {
943         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
944         struct rpc_pipe_client *winreg_pipe = NULL;
945         struct policy_handle hive_hnd, key_hnd;
946
947         struct spoolss_PrinterEnumValues *enum_values = NULL;
948         uint32_t num_values = 0;
949         char *path;
950         WERROR result = WERR_OK;
951
952         TALLOC_CTX *tmp_ctx;
953
954         tmp_ctx = talloc_new(mem_ctx);
955         if (tmp_ctx == NULL) {
956                 return WERR_NOMEM;
957         }
958
959         path = winreg_printer_data_keyname(tmp_ctx, printer);
960         if (path == NULL) {
961                 TALLOC_FREE(tmp_ctx);
962                 return WERR_NOMEM;
963         }
964
965         result = winreg_printer_openkey(tmp_ctx,
966                                         server_info,
967                                         &winreg_pipe,
968                                         path,
969                                         key,
970                                         false,
971                                         access_mask,
972                                         &hive_hnd,
973                                         &key_hnd);
974         if (!W_ERROR_IS_OK(result)) {
975                 DEBUG(0, ("winreg_enum_printer_dataex: Could not open key %s: %s\n",
976                           key, win_errstr(result)));
977                 goto done;
978         }
979
980         result = winreg_printer_enumvalues(tmp_ctx,
981                                            winreg_pipe,
982                                            &key_hnd,
983                                            &num_values,
984                                            &enum_values);
985         if (!W_ERROR_IS_OK(result)) {
986                 DEBUG(0, ("winreg_enum_printer_dataex: Could not enumerate values in %s: %s\n",
987                           key, win_errstr(result)));
988                 goto done;
989         }
990
991         *pnum_values = num_values;
992         if (penum_values) {
993                 *penum_values = talloc_move(mem_ctx, &enum_values);
994         }
995
996         result = WERR_OK;
997 done:
998         if (winreg_pipe != NULL) {
999                 if (is_valid_policy_hnd(&key_hnd)) {
1000                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1001                 }
1002                 if (is_valid_policy_hnd(&hive_hnd)) {
1003                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1004                 }
1005         }
1006
1007         TALLOC_FREE(tmp_ctx);
1008         return result;
1009 }
1010
1011 /* Delete printer data over a winreg pipe. */
1012 WERROR winreg_delete_printer_dataex(TALLOC_CTX *mem_ctx,
1013                                     struct auth_serversupplied_info *server_info,
1014                                     const char *printer,
1015                                     const char *key,
1016                                     const char *value)
1017 {
1018         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1019         struct rpc_pipe_client *winreg_pipe = NULL;
1020         struct policy_handle hive_hnd, key_hnd;
1021         struct winreg_String wvalue;
1022         char *path;
1023         WERROR result = WERR_OK;
1024         NTSTATUS status;
1025
1026         TALLOC_CTX *tmp_ctx;
1027
1028         tmp_ctx = talloc_new(mem_ctx);
1029         if (tmp_ctx == NULL) {
1030                 return WERR_NOMEM;
1031         }
1032
1033         path = winreg_printer_data_keyname(tmp_ctx, printer);
1034         if (path == NULL) {
1035                 TALLOC_FREE(tmp_ctx);
1036                 return WERR_NOMEM;
1037         }
1038
1039         ZERO_STRUCT(hive_hnd);
1040         ZERO_STRUCT(key_hnd);
1041
1042         result = winreg_printer_openkey(tmp_ctx,
1043                                         server_info,
1044                                         &winreg_pipe,
1045                                         path,
1046                                         key,
1047                                         false,
1048                                         access_mask,
1049                                         &hive_hnd,
1050                                         &key_hnd);
1051         if (!W_ERROR_IS_OK(result)) {
1052                 DEBUG(0, ("winreg_delete_printer_dataex: Could not open key %s: %s\n",
1053                           key, win_errstr(result)));
1054                 goto done;
1055         }
1056
1057         wvalue.name = value;
1058         status = rpccli_winreg_DeleteValue(winreg_pipe,
1059                                            tmp_ctx,
1060                                            &key_hnd,
1061                                            wvalue,
1062                                            &result);
1063         if (!NT_STATUS_IS_OK(status)) {
1064                 DEBUG(0, ("winreg_delete_printer_dataex: Could not delete value %s: %s\n",
1065                           value, nt_errstr(status)));
1066                 if (!W_ERROR_IS_OK(result)) {
1067                         goto done;
1068                 }
1069                 result = ntstatus_to_werror(status);
1070                 goto done;
1071         }
1072
1073         result = WERR_OK;
1074 done:
1075         if (winreg_pipe != NULL) {
1076                 if (is_valid_policy_hnd(&key_hnd)) {
1077                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1078                 }
1079                 if (is_valid_policy_hnd(&hive_hnd)) {
1080                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1081                 }
1082         }
1083
1084         TALLOC_FREE(tmp_ctx);
1085         return result;
1086 }
1087
1088 /* Enumerate on the subkeys of a given key and provide the data. */
1089 WERROR winreg_enum_printer_key(TALLOC_CTX *mem_ctx,
1090                                struct auth_serversupplied_info *server_info,
1091                                const char *printer,
1092                                const char *key,
1093                                uint32_t *pnum_subkeys,
1094                                const char ***psubkeys)
1095 {
1096         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1097         struct rpc_pipe_client *winreg_pipe = NULL;
1098         struct policy_handle hive_hnd, key_hnd;
1099         char *path;
1100         const char **subkeys = NULL;
1101         uint32_t num_subkeys = -1;
1102
1103         WERROR result = WERR_OK;
1104
1105         TALLOC_CTX *tmp_ctx;
1106
1107         tmp_ctx = talloc_new(mem_ctx);
1108         if (tmp_ctx == NULL) {
1109                 return WERR_NOMEM;
1110         }
1111
1112         path = winreg_printer_data_keyname(tmp_ctx, printer);
1113         if (path == NULL) {
1114                 TALLOC_FREE(tmp_ctx);
1115                 return WERR_NOMEM;
1116         }
1117
1118         ZERO_STRUCT(hive_hnd);
1119         ZERO_STRUCT(key_hnd);
1120
1121         result = winreg_printer_openkey(tmp_ctx,
1122                                         server_info,
1123                                         &winreg_pipe,
1124                                         path,
1125                                         key,
1126                                         false,
1127                                         access_mask,
1128                                         &hive_hnd,
1129                                         &key_hnd);
1130         if (!W_ERROR_IS_OK(result)) {
1131                 DEBUG(0, ("winreg_enum_printer_key: Could not open key %s: %s\n",
1132                           key, win_errstr(result)));
1133                 goto done;
1134         }
1135
1136         result = winreg_printer_enumkeys(tmp_ctx,
1137                                          winreg_pipe,
1138                                          &key_hnd,
1139                                          &num_subkeys,
1140                                          &subkeys);
1141         if (!W_ERROR_IS_OK(result)) {
1142                 DEBUG(0, ("winreg_enum_printer_key: Could not enumerate subkeys in %s: %s\n",
1143                           key, win_errstr(result)));
1144                 goto done;
1145         }
1146
1147         *pnum_subkeys = num_subkeys;
1148         if (psubkeys) {
1149                 *psubkeys = talloc_move(mem_ctx, &subkeys);
1150         }
1151
1152         result = WERR_OK;
1153 done:
1154         if (winreg_pipe != NULL) {
1155                 if (is_valid_policy_hnd(&key_hnd)) {
1156                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1157                 }
1158                 if (is_valid_policy_hnd(&hive_hnd)) {
1159                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1160                 }
1161         }
1162
1163         TALLOC_FREE(tmp_ctx);
1164         return result;
1165 }
1166
1167 /* Delete a key with subkeys of a given printer. */
1168 WERROR winreg_delete_printer_key(TALLOC_CTX *mem_ctx,
1169                                  struct auth_serversupplied_info *server_info,
1170                                  const char *printer,
1171                                  const char *key)
1172 {
1173         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1174         struct rpc_pipe_client *winreg_pipe = NULL;
1175         struct policy_handle hive_hnd, key_hnd;
1176         char *keyname;
1177         char *path;
1178         WERROR result;
1179         TALLOC_CTX *tmp_ctx;
1180
1181         tmp_ctx = talloc_new(mem_ctx);
1182         if (tmp_ctx == NULL) {
1183                 return WERR_NOMEM;
1184         }
1185
1186         path = winreg_printer_data_keyname(tmp_ctx, printer);
1187         if (path == NULL) {
1188                 TALLOC_FREE(tmp_ctx);
1189                 return WERR_NOMEM;
1190         }
1191
1192         result = winreg_printer_openkey(tmp_ctx,
1193                                         server_info,
1194                                         &winreg_pipe,
1195                                         path,
1196                                         key,
1197                                         false,
1198                                         access_mask,
1199                                         &hive_hnd,
1200                                         &key_hnd);
1201         if (!W_ERROR_IS_OK(result)) {
1202                 /* key doesn't exist */
1203                 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1204                         result = WERR_OK;
1205                         goto done;
1206                 }
1207
1208                 DEBUG(0, ("winreg_delete_printer_key: Could not open key %s: %s\n",
1209                           key, win_errstr(result)));
1210                 goto done;
1211         }
1212
1213         if (is_valid_policy_hnd(&key_hnd)) {
1214                 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1215         }
1216
1217         keyname = talloc_asprintf(tmp_ctx,
1218                                   "%s\\%s",
1219                                   path,
1220                                   key);
1221         if (keyname == NULL) {
1222                 result = WERR_NOMEM;
1223                 goto done;
1224         }
1225
1226         result = winreg_printer_delete_subkeys(tmp_ctx,
1227                                                winreg_pipe,
1228                                                &hive_hnd,
1229                                                access_mask,
1230                                                keyname);
1231         if (!W_ERROR_IS_OK(result)) {
1232                 DEBUG(0, ("winreg_delete_printer_key: Could not delete key %s: %s\n",
1233                           key, win_errstr(result)));
1234                 goto done;
1235         }
1236
1237 done:
1238         if (winreg_pipe != NULL) {
1239                 if (is_valid_policy_hnd(&key_hnd)) {
1240                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1241                 }
1242                 if (is_valid_policy_hnd(&hive_hnd)) {
1243                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1244                 }
1245         }
1246
1247         TALLOC_FREE(tmp_ctx);
1248         return result;
1249 }
1250
1251 /*
1252  * The special behaviour of the spoolss forms is documented at the website:
1253  *
1254  * Managing Win32 Printserver Forms
1255  * http://unixwiz.net/techtips/winspooler-forms.html
1256  */
1257
1258 WERROR winreg_printer_addform1(TALLOC_CTX *mem_ctx,
1259                                struct auth_serversupplied_info *server_info,
1260                                struct spoolss_AddFormInfo1 *form)
1261 {
1262         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1263         struct rpc_pipe_client *winreg_pipe = NULL;
1264         struct policy_handle hive_hnd, key_hnd;
1265         struct winreg_String wvalue;
1266         DATA_BLOB blob;
1267         uint32_t num_info = 0;
1268         union spoolss_FormInfo *info = NULL;
1269         uint32_t i;
1270         WERROR result;
1271         NTSTATUS status;
1272         TALLOC_CTX *tmp_ctx;
1273
1274         tmp_ctx = talloc_new(mem_ctx);
1275         if (tmp_ctx == NULL) {
1276                 return WERR_NOMEM;
1277         }
1278
1279         ZERO_STRUCT(hive_hnd);
1280         ZERO_STRUCT(key_hnd);
1281
1282         result = winreg_printer_openkey(tmp_ctx,
1283                                         server_info,
1284                                         &winreg_pipe,
1285                                         TOP_LEVEL_CONTROL_FORMS_KEY,
1286                                         "",
1287                                         true,
1288                                         access_mask,
1289                                         &hive_hnd,
1290                                         &key_hnd);
1291         if (!W_ERROR_IS_OK(result)) {
1292                 DEBUG(0, ("winreg_printer_addform1: Could not open key %s: %s\n",
1293                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1294                 goto done;
1295         }
1296
1297         result = winreg_printer_enumforms1(tmp_ctx, server_info, &num_info, &info);
1298         if (!W_ERROR_IS_OK(result)) {
1299                 DEBUG(0, ("winreg_printer_addform: Could not enum keys %s: %s\n",
1300                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1301                 goto done;
1302         }
1303
1304         /* If form name already exists or is builtin return ALREADY_EXISTS */
1305         for (i = 0; i < num_info; i++) {
1306                 if (strequal(info[i].info1.form_name, form->form_name)) {
1307                         result = WERR_FILE_EXISTS;
1308                         goto done;
1309                 }
1310         }
1311
1312         wvalue.name = form->form_name;
1313
1314         blob = data_blob_talloc(tmp_ctx, NULL, 32);
1315         SIVAL(blob.data,  0, form->size.width);
1316         SIVAL(blob.data,  4, form->size.height);
1317         SIVAL(blob.data,  8, form->area.left);
1318         SIVAL(blob.data, 12, form->area.top);
1319         SIVAL(blob.data, 16, form->area.right);
1320         SIVAL(blob.data, 20, form->area.bottom);
1321         SIVAL(blob.data, 24, num_info + 1); /* FIXME */
1322         SIVAL(blob.data, 28, form->flags);
1323
1324         status = rpccli_winreg_SetValue(winreg_pipe,
1325                                         tmp_ctx,
1326                                         &key_hnd,
1327                                         wvalue,
1328                                         REG_BINARY,
1329                                         blob.data,
1330                                         blob.length,
1331                                         &result);
1332         if (!NT_STATUS_IS_OK(status)) {
1333                 DEBUG(0, ("winreg_printer_addform1: Could not set value %s: %s\n",
1334                           wvalue.name, nt_errstr(status)));
1335                 if (!W_ERROR_IS_OK(result)) {
1336                         goto done;
1337                 }
1338                 result = ntstatus_to_werror(status);
1339                 goto done;
1340         }
1341
1342         result = WERR_OK;
1343 done:
1344         if (winreg_pipe != NULL) {
1345                 if (is_valid_policy_hnd(&key_hnd)) {
1346                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1347                 }
1348                 if (is_valid_policy_hnd(&hive_hnd)) {
1349                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1350                 }
1351         }
1352
1353         TALLOC_FREE(info);
1354         TALLOC_FREE(tmp_ctx);
1355         return result;
1356 }
1357
1358 WERROR winreg_printer_enumforms1(TALLOC_CTX *mem_ctx,
1359                                  struct auth_serversupplied_info *server_info,
1360                                  uint32_t *pnum_info,
1361                                  union spoolss_FormInfo **pinfo)
1362 {
1363         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1364         struct rpc_pipe_client *winreg_pipe = NULL;
1365         struct policy_handle hive_hnd, key_hnd;
1366         union spoolss_FormInfo *info;
1367         struct spoolss_PrinterEnumValues *enum_values = NULL;
1368         uint32_t num_values = 0;
1369         uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1370         uint32_t i;
1371         WERROR result;
1372         TALLOC_CTX *tmp_ctx;
1373
1374         tmp_ctx = talloc_new(mem_ctx);
1375         if (tmp_ctx == NULL) {
1376                 return WERR_NOMEM;
1377         }
1378
1379         ZERO_STRUCT(hive_hnd);
1380         ZERO_STRUCT(key_hnd);
1381
1382         result = winreg_printer_openkey(tmp_ctx,
1383                                         server_info,
1384                                         &winreg_pipe,
1385                                         TOP_LEVEL_CONTROL_FORMS_KEY,
1386                                         "",
1387                                         true,
1388                                         access_mask,
1389                                         &hive_hnd,
1390                                         &key_hnd);
1391         if (!W_ERROR_IS_OK(result)) {
1392                 /* key doesn't exist */
1393                 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1394                         result = WERR_OK;
1395                         goto done;
1396                 }
1397
1398                 DEBUG(0, ("winreg_printer_enumforms1: Could not open key %s: %s\n",
1399                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1400                 goto done;
1401         }
1402
1403         result = winreg_printer_enumvalues(tmp_ctx,
1404                                            winreg_pipe,
1405                                            &key_hnd,
1406                                            &num_values,
1407                                            &enum_values);
1408         if (!W_ERROR_IS_OK(result)) {
1409                 DEBUG(0, ("winreg_printer_enumforms1: Could not enumerate values in %s: %s\n",
1410                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1411                 goto done;
1412         }
1413
1414         info = TALLOC_ARRAY(tmp_ctx, union spoolss_FormInfo, num_builtin + num_values);
1415         if (info == NULL) {
1416                 result = WERR_NOMEM;
1417                 goto done;
1418         }
1419
1420         /* Enumerate BUILTIN forms */
1421         for (i = 0; i < num_builtin; i++) {
1422                 info[i].info1 = builtin_forms1[i];
1423         }
1424
1425         /* Enumerate registry forms */
1426         for (i = 0; i < num_values; i++) {
1427                 union spoolss_FormInfo val;
1428
1429                 if (enum_values[i].type != REG_BINARY ||
1430                     enum_values[i].data_length != 32) {
1431                         continue;
1432                 }
1433
1434                 val.info1.form_name = talloc_strdup(info, enum_values[i].value_name);
1435                 if (val.info1.form_name == NULL) {
1436                         result = WERR_NOMEM;
1437                         goto done;
1438                 }
1439
1440                 val.info1.size.width  = IVAL(enum_values[i].data->data,  0);
1441                 val.info1.size.height = IVAL(enum_values[i].data->data,  4);
1442                 val.info1.area.left   = IVAL(enum_values[i].data->data,  8);
1443                 val.info1.area.top    = IVAL(enum_values[i].data->data, 12);
1444                 val.info1.area.right  = IVAL(enum_values[i].data->data, 16);
1445                 val.info1.area.bottom = IVAL(enum_values[i].data->data, 20);
1446                 /* skip form index      IVAL(enum_values[i].data->data, 24)));*/
1447                 val.info1.flags       = IVAL(enum_values[i].data->data, 28);
1448
1449                 info[i + num_builtin] = val;
1450         }
1451
1452         *pnum_info = num_builtin + num_values;
1453         if (pinfo) {
1454                 *pinfo = talloc_move(mem_ctx, &info);
1455         }
1456
1457 done:
1458         if (winreg_pipe != NULL) {
1459                 if (is_valid_policy_hnd(&key_hnd)) {
1460                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1461                 }
1462                 if (is_valid_policy_hnd(&hive_hnd)) {
1463                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1464                 }
1465         }
1466
1467         TALLOC_FREE(enum_values);
1468         TALLOC_FREE(tmp_ctx);
1469         return result;
1470 }
1471
1472 WERROR winreg_printer_deleteform1(TALLOC_CTX *mem_ctx,
1473                                   struct auth_serversupplied_info *server_info,
1474                                   const char *form_name)
1475 {
1476         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1477         struct rpc_pipe_client *winreg_pipe = NULL;
1478         struct policy_handle hive_hnd, key_hnd;
1479         struct winreg_String wvalue;
1480         uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1481         uint32_t i;
1482         WERROR result = WERR_OK;
1483         NTSTATUS status;
1484         TALLOC_CTX *tmp_ctx;
1485
1486         for (i = 0; i < num_builtin; i++) {
1487                 if (strequal(builtin_forms1[i].form_name, form_name)) {
1488                         return WERR_INVALID_PARAMETER;
1489                 }
1490         }
1491
1492         tmp_ctx = talloc_new(mem_ctx);
1493         if (tmp_ctx == NULL) {
1494                 return WERR_NOMEM;
1495         }
1496
1497         ZERO_STRUCT(hive_hnd);
1498         ZERO_STRUCT(key_hnd);
1499
1500         result = winreg_printer_openkey(tmp_ctx,
1501                                         server_info,
1502                                         &winreg_pipe,
1503                                         TOP_LEVEL_CONTROL_FORMS_KEY,
1504                                         "",
1505                                         false,
1506                                         access_mask,
1507                                         &hive_hnd,
1508                                         &key_hnd);
1509         if (!W_ERROR_IS_OK(result)) {
1510                 DEBUG(0, ("winreg_printer_deleteform1: Could not open key %s: %s\n",
1511                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1512                 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1513                         result = WERR_INVALID_FORM_NAME;
1514                 }
1515                 goto done;
1516         }
1517
1518         wvalue.name = form_name;
1519         status = rpccli_winreg_DeleteValue(winreg_pipe,
1520                                            tmp_ctx,
1521                                            &key_hnd,
1522                                            wvalue,
1523                                            &result);
1524         if (!NT_STATUS_IS_OK(status)) {
1525                 DEBUG(0, ("winreg_printer_delteform1: Could not delete value %s: %s\n",
1526                           wvalue.name, nt_errstr(status)));
1527                 if (!W_ERROR_IS_OK(result)) {
1528                         goto done;
1529                 }
1530                 result = ntstatus_to_werror(status);
1531                 goto done;
1532         }
1533
1534         result = WERR_OK;
1535 done:
1536         if (winreg_pipe != NULL) {
1537                 if (is_valid_policy_hnd(&key_hnd)) {
1538                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1539                 }
1540                 if (is_valid_policy_hnd(&hive_hnd)) {
1541                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1542                 }
1543         }
1544
1545         TALLOC_FREE(tmp_ctx);
1546         return result;
1547 }
1548
1549 WERROR winreg_printer_setform1(TALLOC_CTX *mem_ctx,
1550                                struct auth_serversupplied_info *server_info,
1551                                const char *form_name,
1552                                struct spoolss_AddFormInfo1 *form)
1553 {
1554         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1555         struct rpc_pipe_client *winreg_pipe = NULL;
1556         struct policy_handle hive_hnd, key_hnd;
1557         struct winreg_String wvalue;
1558         DATA_BLOB blob;
1559         uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1560         uint32_t i;
1561         WERROR result;
1562         NTSTATUS status;
1563         TALLOC_CTX *tmp_ctx = NULL;
1564
1565         for (i = 0; i < num_builtin; i++) {
1566                 if (strequal(builtin_forms1[i].form_name, form->form_name)) {
1567                         result = WERR_INVALID_PARAM;
1568                         goto done;
1569                 }
1570         }
1571
1572         tmp_ctx = talloc_new(mem_ctx);
1573         if (tmp_ctx == NULL) {
1574                 return WERR_NOMEM;
1575         }
1576
1577         ZERO_STRUCT(hive_hnd);
1578         ZERO_STRUCT(key_hnd);
1579
1580         result = winreg_printer_openkey(tmp_ctx,
1581                                         server_info,
1582                                         &winreg_pipe,
1583                                         TOP_LEVEL_CONTROL_FORMS_KEY,
1584                                         "",
1585                                         true,
1586                                         access_mask,
1587                                         &hive_hnd,
1588                                         &key_hnd);
1589         if (!W_ERROR_IS_OK(result)) {
1590                 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
1591                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1592                 goto done;
1593         }
1594
1595         /* If form_name != form->form_name then we renamed the form */
1596         if (strequal(form_name, form->form_name)) {
1597                 result = winreg_printer_deleteform1(tmp_ctx, server_info, form_name);
1598                 if (!W_ERROR_IS_OK(result)) {
1599                         DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
1600                                   TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1601                         goto done;
1602                 }
1603         }
1604
1605         wvalue.name = form->form_name;
1606
1607         blob = data_blob_talloc(tmp_ctx, NULL, 32);
1608         SIVAL(blob.data,  0, form->size.width);
1609         SIVAL(blob.data,  4, form->size.height);
1610         SIVAL(blob.data,  8, form->area.left);
1611         SIVAL(blob.data, 12, form->area.top);
1612         SIVAL(blob.data, 16, form->area.right);
1613         SIVAL(blob.data, 20, form->area.bottom);
1614         SIVAL(blob.data, 24, 42);
1615         SIVAL(blob.data, 28, form->flags);
1616
1617         status = rpccli_winreg_SetValue(winreg_pipe,
1618                                         tmp_ctx,
1619                                         &key_hnd,
1620                                         wvalue,
1621                                         REG_BINARY,
1622                                         blob.data,
1623                                         blob.length,
1624                                         &result);
1625         if (!NT_STATUS_IS_OK(status)) {
1626                 DEBUG(0, ("winreg_printer_setform1: Could not set value %s: %s\n",
1627                           wvalue.name, nt_errstr(status)));
1628                 if (!W_ERROR_IS_OK(result)) {
1629                         goto done;
1630                 }
1631                 result = ntstatus_to_werror(status);
1632                 goto done;
1633         }
1634
1635         result = WERR_OK;
1636 done:
1637         if (winreg_pipe != NULL) {
1638                 if (is_valid_policy_hnd(&key_hnd)) {
1639                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1640                 }
1641                 if (is_valid_policy_hnd(&hive_hnd)) {
1642                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1643                 }
1644         }
1645
1646         TALLOC_FREE(tmp_ctx);
1647         return result;
1648 }
1649
1650 WERROR winreg_printer_getform1(TALLOC_CTX *mem_ctx,
1651                                struct auth_serversupplied_info *server_info,
1652                                const char *form_name,
1653                                struct spoolss_FormInfo1 *r)
1654 {
1655         uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1656         struct rpc_pipe_client *winreg_pipe = NULL;
1657         struct policy_handle hive_hnd, key_hnd;
1658         struct winreg_String wvalue;
1659         enum winreg_Type type_in;
1660         uint8_t *data_in;
1661         uint32_t data_in_size = 0;
1662         uint32_t value_len = 0;
1663         uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
1664         uint32_t i;
1665         WERROR result;
1666         NTSTATUS status;
1667         TALLOC_CTX *tmp_ctx;
1668
1669         /* check builtin forms first */
1670         for (i = 0; i < num_builtin; i++) {
1671                 if (strequal(builtin_forms1[i].form_name, form_name)) {
1672                         *r = builtin_forms1[i];
1673                         return WERR_OK;
1674                 }
1675         }
1676
1677         tmp_ctx = talloc_new(mem_ctx);
1678         if (tmp_ctx == NULL) {
1679                 return WERR_NOMEM;
1680         }
1681
1682         ZERO_STRUCT(hive_hnd);
1683         ZERO_STRUCT(key_hnd);
1684
1685         result = winreg_printer_openkey(tmp_ctx,
1686                                         server_info,
1687                                         &winreg_pipe,
1688                                         TOP_LEVEL_CONTROL_FORMS_KEY,
1689                                         "",
1690                                         true,
1691                                         access_mask,
1692                                         &hive_hnd,
1693                                         &key_hnd);
1694         if (!W_ERROR_IS_OK(result)) {
1695                 DEBUG(0, ("winreg_printer_getform1: Could not open key %s: %s\n",
1696                           TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
1697                 goto done;
1698         }
1699
1700         wvalue.name = form_name;
1701
1702         /*
1703          * call QueryValue once with data == NULL to get the
1704          * needed memory size to be allocated, then allocate
1705          * data buffer and call again.
1706          */
1707         status = rpccli_winreg_QueryValue(winreg_pipe,
1708                                           tmp_ctx,
1709                                           &key_hnd,
1710                                           &wvalue,
1711                                           &type_in,
1712                                           NULL,
1713                                           &data_in_size,
1714                                           &value_len,
1715                                           &result);
1716         if (!NT_STATUS_IS_OK(status)) {
1717                 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
1718                           wvalue.name, nt_errstr(status)));
1719                 if (!W_ERROR_IS_OK(result)) {
1720                         goto done;
1721                 }
1722                 result = ntstatus_to_werror(status);
1723                 goto done;
1724         }
1725
1726         data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
1727         if (data_in == NULL) {
1728                 result = WERR_NOMEM;
1729                 goto done;
1730         }
1731         value_len = 0;
1732
1733         status = rpccli_winreg_QueryValue(winreg_pipe,
1734                                           tmp_ctx,
1735                                           &key_hnd,
1736                                           &wvalue,
1737                                           &type_in,
1738                                           data_in,
1739                                           &data_in_size,
1740                                           &value_len,
1741                                           &result);
1742         if (!NT_STATUS_IS_OK(status)) {
1743                 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
1744                           wvalue.name, nt_errstr(status)));
1745                 if (!W_ERROR_IS_OK(result)) {
1746                         goto done;
1747                 }
1748                 result = ntstatus_to_werror(status);
1749                 goto done;
1750         }
1751
1752         r->form_name = talloc_strdup(mem_ctx, form_name);
1753         if (r->form_name == NULL) {
1754                 result = WERR_NOMEM;
1755                 goto done;
1756         }
1757
1758         r->size.width  = IVAL(data_in,  0);
1759         r->size.height = IVAL(data_in,  4);
1760         r->area.left   = IVAL(data_in,  8);
1761         r->area.top    = IVAL(data_in, 12);
1762         r->area.right  = IVAL(data_in, 16);
1763         r->area.bottom = IVAL(data_in, 20);
1764         /* skip index    IVAL(data_in, 24)));*/
1765         r->flags       = IVAL(data_in, 28);
1766
1767         result = WERR_OK;
1768 done:
1769         if (winreg_pipe != NULL) {
1770                 if (is_valid_policy_hnd(&key_hnd)) {
1771                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1772                 }
1773                 if (is_valid_policy_hnd(&hive_hnd)) {
1774                         rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1775                 }
1776         }
1777
1778         TALLOC_FREE(tmp_ctx);
1779         return result;
1780 }