2 * Unix SMB/CIFS implementation.
4 * SPOOLSS RPC Pipe server / winreg client routines
6 * Copyright (c) 2010 Andreas Schneider <asn@samba.org>
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, see <http://www.gnu.org/licenses/>.
23 #include "nt_printing.h"
24 #include "srv_spoolss_util.h"
25 #include "../librpc/gen_ndr/ndr_spoolss.h"
26 #include "../librpc/gen_ndr/srv_winreg.h"
27 #include "../librpc/gen_ndr/cli_winreg.h"
28 #include "../librpc/gen_ndr/ndr_security.h"
31 #define TOP_LEVEL_PRINT_KEY "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print"
32 #define TOP_LEVEL_PRINT_PRINTERS_KEY TOP_LEVEL_PRINT_KEY "\\Printers"
33 #define TOP_LEVEL_CONTROL_KEY "SYSTEM\\CurrentControlSet\\Control\\Print"
34 #define TOP_LEVEL_CONTROL_FORMS_KEY TOP_LEVEL_CONTROL_KEY "\\Forms"
36 #define EMPTY_STRING ""
38 #define FILL_STRING(mem_ctx, in, out) \
40 if (in && strlen(in)) { \
41 out = talloc_strdup(mem_ctx, in); \
43 out = talloc_strdup(mem_ctx, ""); \
45 W_ERROR_HAVE_NO_MEMORY(out); \
48 #define CHECK_ERROR(result) \
49 if (W_ERROR_IS_OK(result)) continue; \
50 if (W_ERROR_EQUAL(result, WERR_NOT_FOUND)) result = WERR_OK; \
51 if (!W_ERROR_IS_OK(result)) break
53 /* FLAGS, NAME, with, height, left, top, right, bottom */
54 static const struct spoolss_FormInfo1 builtin_forms1[] = {
55 { SPOOLSS_FORM_BUILTIN, "10x11", {0x3e030,0x44368}, {0x0,0x0,0x3e030,0x44368} },
56 { SPOOLSS_FORM_BUILTIN, "10x14", {0x3e030,0x56d10}, {0x0,0x0,0x3e030,0x56d10} },
57 { SPOOLSS_FORM_BUILTIN, "11x17", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
58 { SPOOLSS_FORM_BUILTIN, "12x11", {0x4a724,0x443e1}, {0x0,0x0,0x4a724,0x443e1} },
59 { SPOOLSS_FORM_BUILTIN, "15x11", {0x5d048,0x44368}, {0x0,0x0,0x5d048,0x44368} },
60 { SPOOLSS_FORM_BUILTIN, "6 3/4 Envelope", {0x167ab,0x284ec}, {0x0,0x0,0x167ab,0x284ec} },
61 { SPOOLSS_FORM_BUILTIN, "9x11", {0x37cf8,0x44368}, {0x0,0x0,0x37cf8,0x44368} },
62 { SPOOLSS_FORM_BUILTIN, "A0", {0xcd528,0x122488},{0x0,0x0,0xcd528,0x122488} },
63 { SPOOLSS_FORM_BUILTIN, "A1", {0x91050,0xcd528}, {0x0,0x0,0x91050,0xcd528} },
64 { SPOOLSS_FORM_BUILTIN, "A2", {0x668a0,0x91050}, {0x0,0x0,0x668a0,0x91050} },
65 { SPOOLSS_FORM_BUILTIN, "A3 Extra Transverse", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
66 { SPOOLSS_FORM_BUILTIN, "A3 Extra", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
67 { SPOOLSS_FORM_BUILTIN, "A3 Rotated", {0x668a0,0x48828}, {0x0,0x0,0x668a0,0x48828} },
68 { SPOOLSS_FORM_BUILTIN, "A3 Transverse", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
69 { SPOOLSS_FORM_BUILTIN, "A3", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
70 { SPOOLSS_FORM_BUILTIN, "A4 Extra", {0x397c2,0x4eb16}, {0x0,0x0,0x397c2,0x4eb16} },
71 { SPOOLSS_FORM_BUILTIN, "A4 Plus", {0x33450,0x50910}, {0x0,0x0,0x33450,0x50910} },
72 { SPOOLSS_FORM_BUILTIN, "A4 Rotated", {0x48828,0x33450}, {0x0,0x0,0x48828,0x33450} },
73 { SPOOLSS_FORM_BUILTIN, "A4 Small", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
74 { SPOOLSS_FORM_BUILTIN, "A4 Transverse", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
75 { SPOOLSS_FORM_BUILTIN, "A4", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
76 { SPOOLSS_FORM_BUILTIN, "A5 Extra", {0x2a7b0,0x395f8}, {0x0,0x0,0x2a7b0,0x395f8} },
77 { SPOOLSS_FORM_BUILTIN, "A5 Rotated", {0x33450,0x24220}, {0x0,0x0,0x33450,0x24220} },
78 { SPOOLSS_FORM_BUILTIN, "A5 Transverse", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
79 { SPOOLSS_FORM_BUILTIN, "A5", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
80 { SPOOLSS_FORM_BUILTIN, "A6 Rotated", {0x24220,0x19a28}, {0x0,0x0,0x24220,0x19a28} },
81 { SPOOLSS_FORM_BUILTIN, "A6", {0x19a28,0x24220}, {0x0,0x0,0x19a28,0x24220} },
82 { SPOOLSS_FORM_BUILTIN, "B4 (ISO)", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
83 { SPOOLSS_FORM_BUILTIN, "B4 (JIS) Rotated", {0x58de0,0x3ebe8}, {0x0,0x0,0x58de0,0x3ebe8} },
84 { SPOOLSS_FORM_BUILTIN, "B4 (JIS)", {0x3ebe8,0x58de0}, {0x0,0x0,0x3ebe8,0x58de0} },
85 { SPOOLSS_FORM_BUILTIN, "B5 (ISO) Extra", {0x31128,0x43620}, {0x0,0x0,0x31128,0x43620} },
86 { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Rotated", {0x3ebe8,0x2c6f0}, {0x0,0x0,0x3ebe8,0x2c6f0} },
87 { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Transverse", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
88 { SPOOLSS_FORM_BUILTIN, "B5 (JIS)", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
89 { SPOOLSS_FORM_BUILTIN, "B6 (JIS) Rotated", {0x2c6f0,0x1f400}, {0x0,0x0,0x2c6f0,0x1f400} },
90 { SPOOLSS_FORM_BUILTIN, "B6 (JIS)", {0x1f400,0x2c6f0}, {0x0,0x0,0x1f400,0x2c6f0} },
91 { SPOOLSS_FORM_BUILTIN, "C size sheet", {0x696b8,0x886d0}, {0x0,0x0,0x696b8,0x886d0} },
92 { SPOOLSS_FORM_BUILTIN, "D size sheet", {0x886d0,0xd2d70}, {0x0,0x0,0x886d0,0xd2d70} },
93 { SPOOLSS_FORM_BUILTIN, "Double Japan Postcard Rotated", {0x24220,0x30d40}, {0x0,0x0,0x24220,0x30d40} },
94 { SPOOLSS_FORM_BUILTIN, "E size sheet", {0xd2d70,0x110da0},{0x0,0x0,0xd2d70,0x110da0} },
95 { SPOOLSS_FORM_BUILTIN, "Envelope #10", {0x19947,0x3ae94}, {0x0,0x0,0x19947,0x3ae94} },
96 { SPOOLSS_FORM_BUILTIN, "Envelope #11", {0x1be7c,0x40565}, {0x0,0x0,0x1be7c,0x40565} },
97 { SPOOLSS_FORM_BUILTIN, "Envelope #12", {0x1d74a,0x44368}, {0x0,0x0,0x1d74a,0x44368} },
98 { SPOOLSS_FORM_BUILTIN, "Envelope #14", {0x1f018,0x47504}, {0x0,0x0,0x1f018,0x47504} },
99 { SPOOLSS_FORM_BUILTIN, "Envelope #9", {0x18079,0x37091}, {0x0,0x0,0x18079,0x37091} },
100 { SPOOLSS_FORM_BUILTIN, "Envelope B4", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
101 { SPOOLSS_FORM_BUILTIN, "Envelope B5", {0x2af80,0x3d090}, {0x0,0x0,0x2af80,0x3d090} },
102 { SPOOLSS_FORM_BUILTIN, "Envelope B6", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
103 { SPOOLSS_FORM_BUILTIN, "Envelope C3", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
104 { SPOOLSS_FORM_BUILTIN, "Envelope C4", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
105 { SPOOLSS_FORM_BUILTIN, "Envelope C5", {0x278d0,0x37e88}, {0x0,0x0,0x278d0,0x37e88} },
106 { SPOOLSS_FORM_BUILTIN, "Envelope C6", {0x1bd50,0x278d0}, {0x0,0x0,0x1bd50,0x278d0} },
107 { SPOOLSS_FORM_BUILTIN, "Envelope C65", {0x1bd50,0x37e88}, {0x0,0x0,0x1bd50,0x37e88} },
108 { SPOOLSS_FORM_BUILTIN, "Envelope DL", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
109 { SPOOLSS_FORM_BUILTIN, "Envelope Invite", {0x35b60,0x35b60}, {0x0,0x0,0x35b60,0x35b60} },
110 { SPOOLSS_FORM_BUILTIN, "Envelope Monarch", {0x18079,0x2e824}, {0x0,0x0,0x18079,0x2e824} },
111 { SPOOLSS_FORM_BUILTIN, "Envelope", {0x1adb0,0x38270}, {0x0,0x0,0x1adb0,0x38270} },
112 { SPOOLSS_FORM_BUILTIN, "Executive", {0x2cf56,0x411cc}, {0x0,0x0,0x2cf56,0x411cc} },
113 { SPOOLSS_FORM_BUILTIN, "Folio", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
114 { SPOOLSS_FORM_BUILTIN, "German Legal Fanfold", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
115 { SPOOLSS_FORM_BUILTIN, "German Std Fanfold", {0x34b5c,0x4a6a0}, {0x0,0x0,0x34b5c,0x4a6a0} },
116 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #3 Rotated", {0x395f8,0x1d4c0}, {0x0,0x0,0x395f8,0x1d4c0} },
117 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #4 Rotated", {0x320c8,0x15f90}, {0x0,0x0,0x320c8,0x15f90} },
118 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #2 Rotated", {0x510e0,0x3a980}, {0x0,0x0,0x510e0,0x3a980} },
119 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #3 Rotated", {0x43a08,0x34bc0}, {0x0,0x0,0x43a08,0x34bc0} },
120 { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4 Rotated", {0x395f8,0x19a28}, {0x0,0x0,0x395f8,0x19a28} },
121 { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4", {0x19a28,0x395f8}, {0x0,0x0,0x19a28,0x395f8} },
122 { SPOOLSS_FORM_BUILTIN, "Japanese Double Postcard", {0x30d40,0x24220}, {0x0,0x0,0x30d40,0x24220} },
123 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #3", {0x1d4c0,0x395f8}, {0x0,0x0,0x1d4c0,0x395f8} },
124 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #4", {0x15f90,0x320c8}, {0x0,0x0,0x15f90,0x320c8} },
125 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #2", {0x3a980,0x510e0}, {0x0,0x0,0x3a980,0x510e0} },
126 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #3", {0x34bc0,0x43a08}, {0x0,0x0,0x34bc0,0x43a08} },
127 { SPOOLSS_FORM_BUILTIN, "Japanese Postcard Rotated", {0x24220,0x186a0}, {0x0,0x0,0x24220,0x186a0} },
128 { SPOOLSS_FORM_BUILTIN, "Japanese Postcard", {0x186a0,0x24220}, {0x0,0x0,0x186a0,0x24220} },
129 { SPOOLSS_FORM_BUILTIN, "Ledger", {0x696b8,0x44368}, {0x0,0x0,0x696b8,0x44368} },
130 { SPOOLSS_FORM_BUILTIN, "Legal Extra", {0x3ae94,0x5d048}, {0x0,0x0,0x3ae94,0x5d048} },
131 { SPOOLSS_FORM_BUILTIN, "Legal", {0x34b5c,0x56d10}, {0x0,0x0,0x34b5c,0x56d10} },
132 { SPOOLSS_FORM_BUILTIN, "Letter Extra Transverse", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
133 { SPOOLSS_FORM_BUILTIN, "Letter Extra", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
134 { SPOOLSS_FORM_BUILTIN, "Letter Plus", {0x34b5c,0x4eb16}, {0x0,0x0,0x34b5c,0x4eb16} },
135 { SPOOLSS_FORM_BUILTIN, "Letter Rotated", {0x44368,0x34b5c}, {0x0,0x0,0x44368,0x34b5c} },
136 { SPOOLSS_FORM_BUILTIN, "Letter Small", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
137 { SPOOLSS_FORM_BUILTIN, "Letter Transverse", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
138 { SPOOLSS_FORM_BUILTIN, "Letter", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
139 { SPOOLSS_FORM_BUILTIN, "Note", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
140 { SPOOLSS_FORM_BUILTIN, "PRC 16K Rotated", {0x3f7a0,0x2de60}, {0x0,0x0,0x3f7a0,0x2de60} },
141 { SPOOLSS_FORM_BUILTIN, "PRC 16K", {0x2de60,0x3f7a0}, {0x0,0x0,0x2de60,0x3f7a0} },
142 { SPOOLSS_FORM_BUILTIN, "PRC 32K Rotated", {0x2cec0,0x1fbd0}, {0x0,0x0,0x2cec0,0x1fbd0} },
143 { SPOOLSS_FORM_BUILTIN, "PRC 32K", {0x1fbd0,0x2cec0}, {0x0,0x0,0x1fbd0,0x2cec0} },
144 { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big) Rotated", {0x318f8,0x222e0}, {0x0,0x0,0x318f8,0x222e0} },
145 { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big)", {0x222e0,0x318f8}, {0x0,0x0,0x222e0,0x318f8} },
146 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1 Rotated", {0x28488,0x18e70}, {0x0,0x0,0x28488,0x18e70} },
147 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1", {0x18e70,0x28488}, {0x0,0x0,0x18e70,0x28488} },
148 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10 Rotated", {0x6fd10,0x4f1a0}, {0x0,0x0,0x6fd10,0x4f1a0} },
149 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
150 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2 Rotated", {0x2af80,0x18e70}, {0x0,0x0,0x2af80,0x18e70} },
151 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2", {0x18e70,0x2af80}, {0x0,0x0,0x18e70,0x2af80} },
152 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3 Rotated", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
153 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3", {0x1e848,0x2af80}, {0x0,0x0,0x1e848,0x2af80} },
154 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4 Rotated", {0x32c80,0x1adb0}, {0x0,0x0,0x32c80,0x1adb0} },
155 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4", {0x1adb0,0x32c80}, {0x0,0x0,0x1adb0,0x32c80} },
156 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5 Rotated", {0x35b60,0x1adb0}, {0x0,0x0,0x35b60,0x1adb0} },
157 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
158 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6 Rotated", {0x38270,0x1d4c0}, {0x0,0x0,0x38270,0x1d4c0} },
159 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6", {0x1d4c0,0x38270}, {0x0,0x0,0x1d4c0,0x38270} },
160 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7 Rotated", {0x38270,0x27100}, {0x0,0x0,0x38270,0x27100} },
161 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7", {0x27100,0x38270}, {0x0,0x0,0x27100,0x38270} },
162 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8 Rotated", {0x4b708,0x1d4c0}, {0x0,0x0,0x4b708,0x1d4c0} },
163 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8", {0x1d4c0,0x4b708}, {0x0,0x0,0x1d4c0,0x4b708} },
164 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9 Rotated", {0x4f1a0,0x37e88}, {0x0,0x0,0x4f1a0,0x37e88} },
165 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
166 { SPOOLSS_FORM_BUILTIN, "Quarto", {0x347d8,0x43238}, {0x0,0x0,0x347d8,0x43238} },
167 { SPOOLSS_FORM_BUILTIN, "Reserved48", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
168 { SPOOLSS_FORM_BUILTIN, "Reserved49", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
169 { SPOOLSS_FORM_BUILTIN, "Statement", {0x221b4,0x34b5c}, {0x0,0x0,0x221b4,0x34b5c} },
170 { SPOOLSS_FORM_BUILTIN, "Super A", {0x376b8,0x56ea0}, {0x0,0x0,0x376b8,0x56ea0} },
171 { SPOOLSS_FORM_BUILTIN, "Super B", {0x4a768,0x76e58}, {0x0,0x0,0x4a768,0x76e58} },
172 { SPOOLSS_FORM_BUILTIN, "Tabloid Extra", {0x4a6a0,0x6f9f0}, {0x0,0x0,0x4a6a0,0x6f9f0} },
173 { SPOOLSS_FORM_BUILTIN, "Tabloid", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
174 { SPOOLSS_FORM_BUILTIN, "US Std Fanfold", {0x5c3e1,0x44368}, {0x0,0x0,0x5c3e1,0x44368} }
177 /********************************************************************
178 static helper functions
179 ********************************************************************/
181 /****************************************************************************
182 Update the changeid time.
183 ****************************************************************************/
187 * @brief Update the ChangeID time of a printer.
189 * This is SO NASTY as some drivers need this to change, others need it
190 * static. This value will change every second, and I must hope that this
191 * is enough..... DON'T CHANGE THIS CODE WITHOUT A TEST MATRIX THE SIZE OF
194 * @return The ChangeID.
196 static uint32_t winreg_printer_rev_changeid(void)
200 get_process_uptime(&tv);
203 /* Return changeid as msec since spooler restart */
204 return tv.tv_sec * 1000 + tv.tv_usec / 1000;
207 * This setting seems to work well but is too untested
208 * to replace the above calculation. Left in for experiementation
209 * of the reader --jerry (Tue Mar 12 09:15:05 CST 2002)
211 return tv.tv_sec * 10 + tv.tv_usec / 100000;
218 * @brief Connect to the interal winreg server and open the given printer key.
220 * The function will create the needed subkeys if they don't exist.
222 * @param[in] mem_ctx The memory context to use.
224 * @param[in] server_info The supplied server info.
226 * @param[out] winreg_pipe A pointer for the winreg rpc client pipe.
228 * @param[in] path The path to the key to open.
230 * @param[in] key The key to open.
232 * @param[in] create_key Set to true if the key should be created if it
235 * @param[in] access_mask The access mask to open the key.
237 * @param[out] hive_handle A policy handle for the opened hive.
239 * @param[out] key_handle A policy handle for the opened key.
241 * @return WERR_OK on success, the corresponding DOS error
242 * code if something gone wrong.
244 static WERROR winreg_printer_openkey(TALLOC_CTX *mem_ctx,
245 struct auth_serversupplied_info *server_info,
246 struct messaging_context *msg_ctx,
247 struct rpc_pipe_client **winreg_pipe,
251 uint32_t access_mask,
252 struct policy_handle *hive_handle,
253 struct policy_handle *key_handle)
255 struct rpc_pipe_client *pipe_handle;
256 struct winreg_String wkey, wkeyclass;
259 WERROR result = WERR_OK;
261 /* create winreg connection */
262 status = rpc_pipe_open_internal(mem_ctx,
263 &ndr_table_winreg.syntax_id,
267 if (!NT_STATUS_IS_OK(status)) {
268 DEBUG(0, ("winreg_printer_openkey: Could not connect to winreg_pipe: %s\n",
270 return ntstatus_to_werror(status);
273 status = rpccli_winreg_OpenHKLM(pipe_handle,
279 if (!NT_STATUS_IS_OK(status)) {
280 DEBUG(0, ("winreg_printer_openkey: Could not open HKLM hive: %s\n",
282 talloc_free(pipe_handle);
283 if (!W_ERROR_IS_OK(result)) {
286 return ntstatus_to_werror(status);
290 keyname = talloc_asprintf(mem_ctx, "%s\\%s", path, key);
292 keyname = talloc_strdup(mem_ctx, path);
294 if (keyname == NULL) {
295 talloc_free(pipe_handle);
303 enum winreg_CreateAction action = REG_ACTION_NONE;
305 ZERO_STRUCT(wkeyclass);
308 status = rpccli_winreg_CreateKey(pipe_handle,
320 case REG_ACTION_NONE:
321 DEBUG(8, ("winreg_printer_openkey:createkey did nothing -- huh?\n"));
323 case REG_CREATED_NEW_KEY:
324 DEBUG(8, ("winreg_printer_openkey: createkey created %s\n", keyname));
326 case REG_OPENED_EXISTING_KEY:
327 DEBUG(8, ("winreg_printer_openkey: createkey opened existing %s\n", keyname));
331 status = rpccli_winreg_OpenKey(pipe_handle,
340 if (!NT_STATUS_IS_OK(status)) {
341 talloc_free(pipe_handle);
342 if (!W_ERROR_IS_OK(result)) {
345 return ntstatus_to_werror(status);
348 *winreg_pipe = pipe_handle;
354 * @brief Create the registry keyname for the given printer.
356 * @param[in] mem_ctx The memory context to use.
358 * @param[in] printer The name of the printer to get the registry key.
360 * @return The registry key or NULL on error.
362 static char *winreg_printer_data_keyname(TALLOC_CTX *mem_ctx, const char *printer) {
363 return talloc_asprintf(mem_ctx, "%s\\%s", TOP_LEVEL_PRINT_PRINTERS_KEY, printer);
369 * @brief Enumerate values of an opened key handle and retrieve the data.
371 * @param[in] mem_ctx The memory context to use.
373 * @param[in] pipe_handle The pipe handle for the rpc connection.
375 * @param[in] key_hnd The opened key handle.
377 * @param[out] pnum_values A pointer to store he number of values found.
379 * @param[out] pnum_values A pointer to store the number of values we found.
381 * @return WERR_OK on success, the corresponding DOS error
382 * code if something gone wrong.
384 static WERROR winreg_printer_enumvalues(TALLOC_CTX *mem_ctx,
385 struct rpc_pipe_client *pipe_handle,
386 struct policy_handle *key_hnd,
387 uint32_t *pnum_values,
388 struct spoolss_PrinterEnumValues **penum_values)
391 uint32_t num_subkeys, max_subkeylen, max_classlen;
392 uint32_t num_values, max_valnamelen, max_valbufsize;
393 uint32_t secdescsize;
395 NTTIME last_changed_time;
396 struct winreg_String classname;
398 struct spoolss_PrinterEnumValues *enum_values;
400 WERROR result = WERR_OK;
403 tmp_ctx = talloc_stackframe();
404 if (tmp_ctx == NULL) {
408 ZERO_STRUCT(classname);
410 status = rpccli_winreg_QueryInfoKey(pipe_handle,
423 if (!NT_STATUS_IS_OK(status)) {
424 DEBUG(0, ("winreg_printer_enumvalues: Could not query info: %s\n",
426 if (!W_ERROR_IS_OK(result)) {
429 result = ntstatus_to_werror(status);
433 if (num_values == 0) {
435 TALLOC_FREE(tmp_ctx);
439 enum_values = TALLOC_ARRAY(tmp_ctx, struct spoolss_PrinterEnumValues, num_values);
440 if (enum_values == NULL) {
445 for (i = 0; i < num_values; i++) {
446 struct spoolss_PrinterEnumValues val;
447 struct winreg_ValNameBuf name_buf;
448 enum winreg_Type type = REG_NONE;
455 name_buf.size = max_valnamelen + 2;
458 data_size = max_valbufsize;
461 data = (uint8_t *) TALLOC(tmp_ctx, data_size);
465 status = rpccli_winreg_EnumValue(pipe_handle,
472 data_size ? &data_size : NULL,
475 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
477 status = NT_STATUS_OK;
481 if (!NT_STATUS_IS_OK(status)) {
482 DEBUG(0, ("winreg_printer_enumvalues: Could not enumerate values: %s\n",
484 if (!W_ERROR_IS_OK(result)) {
487 result = ntstatus_to_werror(status);
491 if (name_buf.name == NULL) {
492 result = WERR_INVALID_PARAMETER;
496 val.value_name = talloc_strdup(enum_values, name_buf.name);
497 if (val.value_name == NULL) {
501 val.value_name_len = strlen_m_term(val.value_name) * 2;
504 val.data_length = length;
506 if (val.data_length) {
507 val.data = talloc(enum_values, DATA_BLOB);
508 if (val.data == NULL) {
512 *val.data = data_blob_talloc(val.data, data, val.data_length);
515 enum_values[i] = val;
518 *pnum_values = num_values;
520 *penum_values = talloc_move(mem_ctx, &enum_values);
526 TALLOC_FREE(tmp_ctx);
533 * @brief Enumerate subkeys of an opened key handle and get the names.
535 * @param[in] mem_ctx The memory context to use.
537 * @param[in] pipe_handle The pipe handle for the rpc connection.
539 * @param[in] key_hnd The opened key handle.
541 * @param[in] pnum_subkeys A pointer to store the number of found subkeys.
543 * @param[in] psubkeys A pointer to an array to store the found names of
546 * @return WERR_OK on success, the corresponding DOS error
547 * code if something gone wrong.
549 static WERROR winreg_printer_enumkeys(TALLOC_CTX *mem_ctx,
550 struct rpc_pipe_client *pipe_handle,
551 struct policy_handle *key_hnd,
552 uint32_t *pnum_subkeys,
553 const char ***psubkeys)
556 const char **subkeys;
557 uint32_t num_subkeys, max_subkeylen, max_classlen;
558 uint32_t num_values, max_valnamelen, max_valbufsize;
560 NTTIME last_changed_time;
561 uint32_t secdescsize;
562 struct winreg_String classname;
563 WERROR result = WERR_OK;
566 tmp_ctx = talloc_stackframe();
567 if (tmp_ctx == NULL) {
571 ZERO_STRUCT(classname);
573 status = rpccli_winreg_QueryInfoKey(pipe_handle,
586 if (!NT_STATUS_IS_OK(status)) {
587 DEBUG(0, ("winreg_printer_enumkeys: Could not query info: %s\n",
589 if (!W_ERROR_IS_OK(result)) {
592 result = ntstatus_to_werror(status);
596 subkeys = talloc_zero_array(tmp_ctx, const char *, num_subkeys + 2);
597 if (subkeys == NULL) {
602 if (num_subkeys == 0) {
603 subkeys[0] = talloc_strdup(subkeys, "");
604 if (subkeys[0] == NULL) {
610 *psubkeys = talloc_move(mem_ctx, &subkeys);
613 TALLOC_FREE(tmp_ctx);
617 for (i = 0; i < num_subkeys; i++) {
621 struct winreg_StringBuf class_buf;
622 struct winreg_StringBuf name_buf;
626 class_buf.size = max_classlen + 2;
627 class_buf.length = 0;
630 name_buf.size = max_subkeylen + 2;
633 ZERO_STRUCT(modtime);
635 status = rpccli_winreg_EnumKey(pipe_handle,
643 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
645 status = NT_STATUS_OK;
649 if (!NT_STATUS_IS_OK(status)) {
650 DEBUG(0, ("winreg_printer_enumkeys: Could not enumerate keys: %s\n",
652 if (!W_ERROR_IS_OK(result)) {
655 result = ntstatus_to_werror(status);
659 if (name_buf.name == NULL) {
660 result = WERR_INVALID_PARAMETER;
664 name = talloc_strdup(subkeys, name_buf.name);
673 *pnum_subkeys = num_subkeys;
675 *psubkeys = talloc_move(mem_ctx, &subkeys);
679 TALLOC_FREE(tmp_ctx);
686 * @brief A function to delete a key and its subkeys recurively.
688 * @param[in] mem_ctx The memory context to use.
690 * @param[in] pipe_handle The pipe handle for the rpc connection.
692 * @param[in] hive_handle A opened hive handle to the key.
694 * @param[in] access_mask The access mask to access the key.
696 * @param[in] key The key to delete
698 * @return WERR_OK on success, the corresponding DOS error
699 * code if something gone wrong.
701 static WERROR winreg_printer_delete_subkeys(TALLOC_CTX *mem_ctx,
702 struct rpc_pipe_client *pipe_handle,
703 struct policy_handle *hive_handle,
704 uint32_t access_mask,
707 const char **subkeys = NULL;
708 uint32_t num_subkeys = 0;
709 struct policy_handle key_hnd;
710 struct winreg_String wkey;
711 WERROR result = WERR_OK;
715 ZERO_STRUCT(key_hnd);
718 DEBUG(2, ("winreg_printer_delete_subkeys: delete key %s\n", key));
720 status = rpccli_winreg_OpenKey(pipe_handle,
728 if (!NT_STATUS_IS_OK(status)) {
729 DEBUG(0, ("winreg_printer_delete_subkeys: Could not open key %s: %s\n",
730 wkey.name, nt_errstr(status)));
731 if (!W_ERROR_IS_OK(result)) {
734 return ntstatus_to_werror(status);
737 result = winreg_printer_enumkeys(mem_ctx,
742 if (!W_ERROR_IS_OK(result)) {
746 for (i = 0; i < num_subkeys; i++) {
747 /* create key + subkey */
748 char *subkey = talloc_asprintf(mem_ctx, "%s\\%s", key, subkeys[i]);
749 if (subkey == NULL) {
753 DEBUG(2, ("winreg_printer_delete_subkeys: delete subkey %s\n", subkey));
754 result = winreg_printer_delete_subkeys(mem_ctx,
759 if (!W_ERROR_IS_OK(result)) {
764 if (is_valid_policy_hnd(&key_hnd)) {
765 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
770 status = rpccli_winreg_DeleteKey(pipe_handle,
777 if (is_valid_policy_hnd(&key_hnd)) {
778 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
784 static WERROR winreg_printer_write_sz(TALLOC_CTX *mem_ctx,
785 struct rpc_pipe_client *pipe_handle,
786 struct policy_handle *key_handle,
790 struct winreg_String wvalue;
792 WERROR result = WERR_OK;
797 blob = data_blob_string_const("");
799 if (!push_reg_sz(mem_ctx, &blob, data)) {
800 DEBUG(0, ("winreg_printer_write_sz: Could not marshall string %s for %s\n",
805 status = rpccli_winreg_SetValue(pipe_handle,
813 if (!NT_STATUS_IS_OK(status)) {
814 DEBUG(0, ("winreg_printer_write_sz: Could not set value %s: %s\n",
815 wvalue.name, win_errstr(result)));
816 if (!W_ERROR_IS_OK(result)) {
817 result = ntstatus_to_werror(status);
824 static WERROR winreg_printer_write_dword(TALLOC_CTX *mem_ctx,
825 struct rpc_pipe_client *pipe_handle,
826 struct policy_handle *key_handle,
830 struct winreg_String wvalue;
832 WERROR result = WERR_OK;
836 blob = data_blob_talloc(mem_ctx, NULL, 4);
837 SIVAL(blob.data, 0, data);
839 status = rpccli_winreg_SetValue(pipe_handle,
847 if (!NT_STATUS_IS_OK(status)) {
848 DEBUG(0, ("winreg_printer_write_dword: Could not set value %s: %s\n",
849 wvalue.name, win_errstr(result)));
850 if (!W_ERROR_IS_OK(result)) {
851 result = ntstatus_to_werror(status);
858 static WERROR winreg_printer_write_binary(TALLOC_CTX *mem_ctx,
859 struct rpc_pipe_client *pipe_handle,
860 struct policy_handle *key_handle,
864 struct winreg_String wvalue;
865 WERROR result = WERR_OK;
869 status = rpccli_winreg_SetValue(pipe_handle,
877 if (!NT_STATUS_IS_OK(status)) {
878 DEBUG(0, ("winreg_printer_write_binary: Could not set value %s: %s\n",
879 wvalue.name, win_errstr(result)));
880 if (!W_ERROR_IS_OK(result)) {
881 result = ntstatus_to_werror(status);
888 static WERROR winreg_printer_query_binary(TALLOC_CTX *mem_ctx,
889 struct rpc_pipe_client *pipe_handle,
890 struct policy_handle *key_handle,
894 struct winreg_String wvalue;
895 enum winreg_Type type;
896 WERROR result = WERR_OK;
897 uint32_t value_len = 0;
898 uint32_t data_size = 0;
903 status = rpccli_winreg_QueryValue(pipe_handle,
912 if (!NT_STATUS_IS_OK(status)) {
913 DEBUG(2, ("winreg_printer_query_binary: Could not query value %s: %s\n",
914 wvalue.name, nt_errstr(status)));
915 if (!W_ERROR_IS_OK(result)) {
918 result = ntstatus_to_werror(status);
922 if (type != REG_BINARY) {
923 result = WERR_INVALID_DATATYPE;
926 blob = data_blob_talloc(mem_ctx, NULL, data_size);
927 if (blob.data == NULL) {
933 status = rpccli_winreg_QueryValue(pipe_handle,
942 if (!NT_STATUS_IS_OK(status)) {
943 DEBUG(2, ("winreg_printer_query_binary: Could not query value %s: %s\n",
944 wvalue.name, nt_errstr(status)));
945 if (!W_ERROR_IS_OK(result)) {
946 result = ntstatus_to_werror(status);
952 data->data = blob.data;
953 data->length = blob.length;
959 static WERROR winreg_printer_query_dword(TALLOC_CTX *mem_ctx,
960 struct rpc_pipe_client *pipe_handle,
961 struct policy_handle *key_handle,
965 struct winreg_String wvalue;
966 enum winreg_Type type;
967 WERROR result = WERR_OK;
968 uint32_t value_len = 0;
969 uint32_t data_size = 0;
974 status = rpccli_winreg_QueryValue(pipe_handle,
983 if (!NT_STATUS_IS_OK(status)) {
984 DEBUG(2, ("winreg_printer_query_dword: Could not query value %s: %s\n",
985 wvalue.name, nt_errstr(status)));
986 if (!W_ERROR_IS_OK(result)) {
989 result = ntstatus_to_werror(status);
993 if (type != REG_DWORD) {
994 result = WERR_INVALID_DATATYPE;
998 if (data_size != 4) {
999 result = WERR_INVALID_DATA;
1003 blob = data_blob_talloc(mem_ctx, NULL, data_size);
1004 if (blob.data == NULL) {
1005 result = WERR_NOMEM;
1010 status = rpccli_winreg_QueryValue(pipe_handle,
1019 if (!NT_STATUS_IS_OK(status)) {
1020 DEBUG(2, ("winreg_printer_query_dword: Could not query value %s: %s\n",
1021 wvalue.name, nt_errstr(status)));
1022 if (!W_ERROR_IS_OK(result)) {
1023 result = ntstatus_to_werror(status);
1029 *data = IVAL(blob.data, 0);
1035 static WERROR winreg_printer_write_multi_sz(TALLOC_CTX *mem_ctx,
1036 struct rpc_pipe_client *pipe_handle,
1037 struct policy_handle *key_handle,
1041 struct winreg_String wvalue;
1043 WERROR result = WERR_OK;
1046 wvalue.name = value;
1047 if (!push_reg_multi_sz(mem_ctx, &blob, data)) {
1050 status = rpccli_winreg_SetValue(pipe_handle,
1058 if (!NT_STATUS_IS_OK(status)) {
1059 DEBUG(0, ("winreg_printer_write_multi_sz: Could not set value %s: %s\n",
1060 wvalue.name, win_errstr(result)));
1061 if (!W_ERROR_IS_OK(result)) {
1062 result = ntstatus_to_werror(status);
1069 static WERROR winreg_printer_opendriver(TALLOC_CTX *mem_ctx,
1070 struct auth_serversupplied_info *server_info,
1071 struct messaging_context *msg_ctx,
1072 const char *drivername,
1073 const char *architecture,
1075 uint32_t access_mask,
1077 struct rpc_pipe_client **winreg_pipe,
1078 struct policy_handle *hive_hnd,
1079 struct policy_handle *key_hnd)
1084 key_name = talloc_asprintf(mem_ctx, "%s\\Environments\\%s\\Drivers\\Version-%u",
1085 TOP_LEVEL_CONTROL_KEY,
1086 architecture, version);
1091 result = winreg_printer_openkey(mem_ctx,
1104 static WERROR winreg_enumval_to_dword(TALLOC_CTX *mem_ctx,
1105 struct spoolss_PrinterEnumValues *v,
1106 const char *valuename, uint32_t *dw)
1108 /* just return if it is not the one we are looking for */
1109 if (strcmp(valuename, v->value_name) != 0) {
1110 return WERR_NOT_FOUND;
1113 if (v->type != REG_DWORD) {
1114 return WERR_INVALID_DATATYPE;
1117 if (v->data_length != 4) {
1122 *dw = IVAL(v->data->data, 0);
1126 static WERROR winreg_enumval_to_sz(TALLOC_CTX *mem_ctx,
1127 struct spoolss_PrinterEnumValues *v,
1128 const char *valuename, const char **_str)
1130 /* just return if it is not the one we are looking for */
1131 if (strcmp(valuename, v->value_name) != 0) {
1132 return WERR_NOT_FOUND;
1135 if (v->type != REG_SZ) {
1136 return WERR_INVALID_DATATYPE;
1139 if (v->data_length == 0) {
1140 *_str = talloc_strdup(mem_ctx, EMPTY_STRING);
1141 if (*_str == NULL) {
1147 if (!pull_reg_sz(mem_ctx, v->data, _str)) {
1154 static WERROR winreg_enumval_to_multi_sz(TALLOC_CTX *mem_ctx,
1155 struct spoolss_PrinterEnumValues *v,
1156 const char *valuename,
1157 const char ***array)
1159 /* just return if it is not the one we are looking for */
1160 if (strcmp(valuename, v->value_name) != 0) {
1161 return WERR_NOT_FOUND;
1164 if (v->type != REG_MULTI_SZ) {
1165 return WERR_INVALID_DATATYPE;
1168 if (v->data_length == 0) {
1169 *array = talloc_array(mem_ctx, const char *, 1);
1170 if (*array == NULL) {
1177 if (!pull_reg_multi_sz(mem_ctx, v->data, array)) {
1184 static WERROR winreg_printer_write_date(TALLOC_CTX *mem_ctx,
1185 struct rpc_pipe_client *pipe_handle,
1186 struct policy_handle *key_handle,
1190 struct winreg_String wvalue;
1192 WERROR result = WERR_OK;
1198 t = nt_time_to_unix(data);
1200 str = talloc_asprintf(mem_ctx, "%02d/%02d/%04d",
1201 tm->tm_mon + 1, tm->tm_mday, tm->tm_year + 1900);
1206 wvalue.name = value;
1207 if (!push_reg_sz(mem_ctx, &blob, str)) {
1210 status = rpccli_winreg_SetValue(pipe_handle,
1218 if (!NT_STATUS_IS_OK(status)) {
1219 DEBUG(0, ("winreg_printer_write_date: Could not set value %s: %s\n",
1220 wvalue.name, win_errstr(result)));
1221 if (!W_ERROR_IS_OK(result)) {
1222 result = ntstatus_to_werror(status);
1229 static WERROR winreg_printer_date_to_NTTIME(const char *str, NTTIME *data)
1236 if (sscanf(str, "%d/%d/%d",
1237 &tm.tm_mon, &tm.tm_mday, &tm.tm_year) != 3) {
1238 return WERR_INVALID_PARAMETER;
1245 unix_to_nt_time(data, t);
1250 static WERROR winreg_printer_write_ver(TALLOC_CTX *mem_ctx,
1251 struct rpc_pipe_client *pipe_handle,
1252 struct policy_handle *key_handle,
1256 struct winreg_String wvalue;
1258 WERROR result = WERR_OK;
1262 /* FIXME: check format is right,
1263 * this needs to be something like: 6.1.7600.16385 */
1264 str = talloc_asprintf(mem_ctx, "%u.%u.%u.%u",
1265 (unsigned)((data >> 48) & 0xFFFF),
1266 (unsigned)((data >> 32) & 0xFFFF),
1267 (unsigned)((data >> 16) & 0xFFFF),
1268 (unsigned)(data & 0xFFFF));
1273 wvalue.name = value;
1274 if (!push_reg_sz(mem_ctx, &blob, str)) {
1277 status = rpccli_winreg_SetValue(pipe_handle,
1285 if (!NT_STATUS_IS_OK(status)) {
1286 DEBUG(0, ("winreg_printer_write_date: Could not set value %s: %s\n",
1287 wvalue.name, win_errstr(result)));
1288 if (!W_ERROR_IS_OK(result)) {
1289 result = ntstatus_to_werror(status);
1296 static WERROR winreg_printer_ver_to_dword(const char *str, uint64_t *data)
1298 unsigned int v1, v2, v3, v4;
1300 if (sscanf(str, "%u.%u.%u.%u", &v1, &v2, &v3, &v4) != 4) {
1301 return WERR_INVALID_PARAMETER;
1304 *data = ((uint64_t)(v1 & 0xFFFF) << 48) +
1305 ((uint64_t)(v2 & 0xFFFF) << 32) +
1306 ((uint64_t)(v3 & 0xFFFF) << 16) +
1307 (uint64_t)(v2 & 0xFFFF);
1312 /********************************************************************
1313 Public winreg function for spoolss
1314 ********************************************************************/
1316 WERROR winreg_create_printer(TALLOC_CTX *mem_ctx,
1317 struct auth_serversupplied_info *server_info,
1318 struct messaging_context *msg_ctx,
1319 const char *servername,
1320 const char *sharename)
1322 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1323 struct rpc_pipe_client *winreg_pipe = NULL;
1324 struct policy_handle hive_hnd, key_hnd;
1325 struct spoolss_SetPrinterInfo2 *info2;
1326 struct security_descriptor *secdesc;
1327 struct winreg_String wkey, wkeyclass;
1329 const char *subkeys[] = { SPOOL_DSDRIVER_KEY, SPOOL_DSSPOOLER_KEY, SPOOL_PRINTERDATA_KEY };
1330 uint32_t i, count = ARRAY_SIZE(subkeys);
1331 uint32_t info2_mask = 0;
1332 WERROR result = WERR_OK;
1333 TALLOC_CTX *tmp_ctx;
1335 tmp_ctx = talloc_stackframe();
1336 if (tmp_ctx == NULL) {
1340 path = winreg_printer_data_keyname(tmp_ctx, sharename);
1342 TALLOC_FREE(tmp_ctx);
1346 ZERO_STRUCT(hive_hnd);
1347 ZERO_STRUCT(key_hnd);
1349 result = winreg_printer_openkey(tmp_ctx,
1359 if (W_ERROR_IS_OK(result)) {
1360 DEBUG(2, ("winreg_create_printer: Skipping, %s already exists\n", path));
1362 } else if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1363 DEBUG(2, ("winreg_create_printer: Creating default values in %s\n", path));
1364 } else if (!W_ERROR_IS_OK(result)) {
1365 DEBUG(0, ("winreg_create_printer: Could not open key %s: %s\n",
1366 path, win_errstr(result)));
1370 /* Create the main key */
1371 result = winreg_printer_openkey(tmp_ctx,
1381 if (!W_ERROR_IS_OK(result)) {
1382 DEBUG(0, ("winreg_create_printer_keys: Could not create key %s: %s\n",
1383 path, win_errstr(result)));
1387 if (is_valid_policy_hnd(&key_hnd)) {
1388 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1391 /* Create subkeys */
1392 for (i = 0; i < count; i++) {
1394 enum winreg_CreateAction action = REG_ACTION_NONE;
1396 ZERO_STRUCT(key_hnd);
1399 wkey.name = talloc_asprintf(tmp_ctx, "%s\\%s", path, subkeys[i]);
1400 if (wkey.name == NULL) {
1401 result = WERR_NOMEM;
1405 ZERO_STRUCT(wkeyclass);
1406 wkeyclass.name = "";
1408 status = rpccli_winreg_CreateKey(winreg_pipe,
1419 if (!NT_STATUS_IS_OK(status)) {
1420 DEBUG(0, ("winreg_create_printer_keys: Could not create key %s: %s\n",
1421 wkey.name, win_errstr(result)));
1422 if (!W_ERROR_IS_OK(result)) {
1423 result = ntstatus_to_werror(status);
1430 const char *dnssuffix;
1431 const char *longname;
1432 const char *uncname;
1434 result = winreg_printer_write_sz(tmp_ctx,
1437 SPOOL_REG_PRINTERNAME,
1439 if (!W_ERROR_IS_OK(result)) {
1443 result = winreg_printer_write_sz(tmp_ctx,
1446 SPOOL_REG_SHORTSERVERNAME,
1448 if (!W_ERROR_IS_OK(result)) {
1452 /* We make the assumption that the netbios name
1453 * is the same as the DNS name since the former
1454 * will be what we used to join the domain
1456 dnssuffix = get_mydnsdomname(tmp_ctx);
1457 if (dnssuffix != NULL && dnssuffix[0] != '\0') {
1458 longname = talloc_asprintf(tmp_ctx, "%s.%s", global_myname(), dnssuffix);
1460 longname = talloc_strdup(tmp_ctx, global_myname());
1462 if (longname == NULL) {
1463 result = WERR_NOMEM;
1467 result = winreg_printer_write_sz(tmp_ctx,
1470 SPOOL_REG_SERVERNAME,
1472 if (!W_ERROR_IS_OK(result)) {
1476 uncname = talloc_asprintf(tmp_ctx, "\\\\%s\\%s",
1477 longname, sharename);
1478 if (uncname == NULL) {
1479 result = WERR_NOMEM;
1483 result = winreg_printer_write_sz(tmp_ctx,
1488 if (!W_ERROR_IS_OK(result)) {
1492 result = winreg_printer_write_dword(tmp_ctx,
1495 SPOOL_REG_VERSIONNUMBER,
1497 if (!W_ERROR_IS_OK(result)) {
1501 result = winreg_printer_write_dword(tmp_ctx,
1504 SPOOL_REG_PRINTSTARTTIME,
1506 if (!W_ERROR_IS_OK(result)) {
1510 result = winreg_printer_write_dword(tmp_ctx,
1513 SPOOL_REG_PRINTENDTIME,
1515 if (!W_ERROR_IS_OK(result)) {
1519 result = winreg_printer_write_dword(tmp_ctx,
1524 if (!W_ERROR_IS_OK(result)) {
1528 result = winreg_printer_write_dword(tmp_ctx,
1531 SPOOL_REG_PRINTKEEPPRINTEDJOBS,
1533 if (!W_ERROR_IS_OK(result)) {
1541 if (is_valid_policy_hnd(&key_hnd)) {
1542 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1545 info2 = talloc_zero(tmp_ctx, struct spoolss_SetPrinterInfo2);
1546 if (info2 == NULL) {
1547 result = WERR_NOMEM;
1551 if (servername != NULL) {
1552 info2->printername = talloc_asprintf(tmp_ctx, "\\\\%s\\%s",
1553 servername, sharename);
1555 info2->printername = sharename;
1557 if (info2->printername == NULL) {
1558 result = WERR_NOMEM;
1561 info2_mask |= SPOOLSS_PRINTER_INFO_PRINTERNAME;
1563 info2->sharename = sharename;
1564 info2_mask |= SPOOLSS_PRINTER_INFO_SHARENAME;
1566 info2->portname = SAMBA_PRINTER_PORT_NAME;
1567 info2_mask |= SPOOLSS_PRINTER_INFO_PORTNAME;
1569 info2->printprocessor = "winprint";
1570 info2_mask |= SPOOLSS_PRINTER_INFO_PRINTPROCESSOR;
1572 info2->datatype = "RAW";
1573 info2_mask |= SPOOLSS_PRINTER_INFO_DATATYPE;
1575 info2->comment = "";
1576 info2_mask |= SPOOLSS_PRINTER_INFO_COMMENT;
1578 info2->attributes = PRINTER_ATTRIBUTE_SAMBA;
1579 info2_mask |= SPOOLSS_PRINTER_INFO_ATTRIBUTES;
1581 info2->starttime = 0; /* Minutes since 12:00am GMT */
1582 info2_mask |= SPOOLSS_PRINTER_INFO_STARTTIME;
1584 info2->untiltime = 0; /* Minutes since 12:00am GMT */
1585 info2_mask |= SPOOLSS_PRINTER_INFO_UNTILTIME;
1587 info2->priority = 1;
1588 info2_mask |= SPOOLSS_PRINTER_INFO_PRIORITY;
1590 info2->defaultpriority = 1;
1591 info2_mask |= SPOOLSS_PRINTER_INFO_DEFAULTPRIORITY;
1593 result = spoolss_create_default_secdesc(tmp_ctx, &secdesc);
1594 if (!W_ERROR_IS_OK(result)) {
1597 info2_mask |= SPOOLSS_PRINTER_INFO_SECDESC;
1600 * Don't write a default Device Mode to the registry! The Device Mode is
1601 * only written to disk with a SetPrinter level 2 or 8.
1604 result = winreg_update_printer(tmp_ctx,
1613 if (winreg_pipe != NULL) {
1614 if (is_valid_policy_hnd(&key_hnd)) {
1615 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1617 if (is_valid_policy_hnd(&hive_hnd)) {
1618 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1622 talloc_free(tmp_ctx);
1626 WERROR winreg_update_printer(TALLOC_CTX *mem_ctx,
1627 struct auth_serversupplied_info *server_info,
1628 const char *sharename,
1629 uint32_t info2_mask,
1630 struct spoolss_SetPrinterInfo2 *info2,
1631 struct spoolss_DeviceMode *devmode,
1632 struct security_descriptor *secdesc)
1634 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1635 struct rpc_pipe_client *winreg_pipe = NULL;
1636 struct policy_handle hive_hnd, key_hnd;
1637 int snum = lp_servicenumber(sharename);
1638 enum ndr_err_code ndr_err;
1641 WERROR result = WERR_OK;
1642 TALLOC_CTX *tmp_ctx;
1644 tmp_ctx = talloc_stackframe();
1645 if (tmp_ctx == NULL) {
1649 path = winreg_printer_data_keyname(tmp_ctx, sharename);
1651 TALLOC_FREE(tmp_ctx);
1655 ZERO_STRUCT(hive_hnd);
1656 ZERO_STRUCT(key_hnd);
1658 result = winreg_printer_openkey(tmp_ctx,
1660 smbd_messaging_context(),
1668 if (!W_ERROR_IS_OK(result)) {
1669 DEBUG(0, ("winreg_update_printer: Could not open key %s: %s\n",
1670 path, win_errstr(result)));
1674 if (info2_mask & SPOOLSS_PRINTER_INFO_ATTRIBUTES) {
1675 result = winreg_printer_write_dword(tmp_ctx,
1680 if (!W_ERROR_IS_OK(result)) {
1686 if (info2_mask & SPOOLSS_PRINTER_INFO_AVERAGEPPM) {
1687 result = winreg_printer_write_dword(tmp_ctx,
1692 if (!W_ERROR_IS_OK(result)) {
1698 if (info2_mask & SPOOLSS_PRINTER_INFO_COMMENT) {
1699 result = winreg_printer_write_sz(tmp_ctx,
1704 if (!W_ERROR_IS_OK(result)) {
1709 if (info2_mask & SPOOLSS_PRINTER_INFO_DATATYPE) {
1710 result = winreg_printer_write_sz(tmp_ctx,
1715 if (!W_ERROR_IS_OK(result)) {
1720 if (info2_mask & SPOOLSS_PRINTER_INFO_DEFAULTPRIORITY) {
1721 result = winreg_printer_write_dword(tmp_ctx,
1725 info2->defaultpriority);
1726 if (!W_ERROR_IS_OK(result)) {
1731 if (info2_mask & SPOOLSS_PRINTER_INFO_DEVMODE) {
1733 * Some client drivers freak out if there is a NULL devmode
1734 * (probably the driver is not checking before accessing
1735 * the devmode pointer) --jerry
1737 if (devmode == NULL && lp_default_devmode(snum) && info2 != NULL) {
1738 result = spoolss_create_default_devmode(tmp_ctx,
1741 if (!W_ERROR_IS_OK(result)) {
1745 ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, devmode,
1746 (ndr_push_flags_fn_t) ndr_push_spoolss_DeviceMode);
1747 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1748 DEBUG(0, ("winreg_update_printer: Failed to marshall device mode\n"));
1749 result = WERR_NOMEM;
1753 result = winreg_printer_write_binary(tmp_ctx,
1758 if (!W_ERROR_IS_OK(result)) {
1763 if (info2_mask & SPOOLSS_PRINTER_INFO_DRIVERNAME) {
1764 result = winreg_printer_write_sz(tmp_ctx,
1769 if (!W_ERROR_IS_OK(result)) {
1774 if (info2_mask & SPOOLSS_PRINTER_INFO_LOCATION) {
1775 result = winreg_printer_write_sz(tmp_ctx,
1780 if (!W_ERROR_IS_OK(result)) {
1785 if (info2_mask & SPOOLSS_PRINTER_INFO_PARAMETERS) {
1786 result = winreg_printer_write_sz(tmp_ctx,
1791 if (!W_ERROR_IS_OK(result)) {
1796 if (info2_mask & SPOOLSS_PRINTER_INFO_PORTNAME) {
1797 result = winreg_printer_write_sz(tmp_ctx,
1802 if (!W_ERROR_IS_OK(result)) {
1807 if (info2_mask & SPOOLSS_PRINTER_INFO_PRINTERNAME) {
1809 * in addprinter: no servername and the printer is the name
1810 * in setprinter: servername is \\server
1811 * and printer is \\server\\printer
1813 * Samba manages only local printers.
1814 * we currently don't support things like i
1815 * path=\\other_server\printer
1817 * We only store the printername, not \\server\printername
1819 const char *p = strrchr(info2->printername, '\\');
1821 p = info2->printername;
1825 result = winreg_printer_write_sz(tmp_ctx,
1830 if (!W_ERROR_IS_OK(result)) {
1835 if (info2_mask & SPOOLSS_PRINTER_INFO_PRINTPROCESSOR) {
1836 result = winreg_printer_write_sz(tmp_ctx,
1840 info2->printprocessor);
1841 if (!W_ERROR_IS_OK(result)) {
1846 if (info2_mask & SPOOLSS_PRINTER_INFO_PRIORITY) {
1847 result = winreg_printer_write_dword(tmp_ctx,
1852 if (!W_ERROR_IS_OK(result)) {
1857 if (info2_mask & SPOOLSS_PRINTER_INFO_SECDESC) {
1859 * We need a security descriptor, if it isn't specified by
1860 * AddPrinter{Ex} then create a default descriptor.
1862 if (secdesc == NULL) {
1863 result = spoolss_create_default_secdesc(tmp_ctx, &secdesc);
1864 if (!W_ERROR_IS_OK(result)) {
1868 result = winreg_set_printer_secdesc(tmp_ctx,
1872 if (!W_ERROR_IS_OK(result)) {
1877 if (info2_mask & SPOOLSS_PRINTER_INFO_SEPFILE) {
1878 result = winreg_printer_write_sz(tmp_ctx,
1883 if (!W_ERROR_IS_OK(result)) {
1888 if (info2_mask & SPOOLSS_PRINTER_INFO_SHARENAME) {
1889 result = winreg_printer_write_sz(tmp_ctx,
1894 if (!W_ERROR_IS_OK(result)) {
1899 if (info2_mask & SPOOLSS_PRINTER_INFO_STARTTIME) {
1900 result = winreg_printer_write_dword(tmp_ctx,
1905 if (!W_ERROR_IS_OK(result)) {
1910 if (info2_mask & SPOOLSS_PRINTER_INFO_STATUS) {
1911 result = winreg_printer_write_dword(tmp_ctx,
1916 if (!W_ERROR_IS_OK(result)) {
1921 if (info2_mask & SPOOLSS_PRINTER_INFO_UNTILTIME) {
1922 result = winreg_printer_write_dword(tmp_ctx,
1927 if (!W_ERROR_IS_OK(result)) {
1932 result = winreg_printer_write_dword(tmp_ctx,
1936 winreg_printer_rev_changeid());
1937 if (!W_ERROR_IS_OK(result)) {
1943 if (winreg_pipe != NULL) {
1944 if (is_valid_policy_hnd(&key_hnd)) {
1945 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1947 if (is_valid_policy_hnd(&hive_hnd)) {
1948 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1952 TALLOC_FREE(tmp_ctx);
1956 WERROR winreg_get_printer(TALLOC_CTX *mem_ctx,
1957 struct auth_serversupplied_info *server_info,
1958 const char *servername,
1959 const char *printer,
1960 struct spoolss_PrinterInfo2 **pinfo2)
1962 struct spoolss_PrinterInfo2 *info2;
1963 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1964 struct rpc_pipe_client *winreg_pipe = NULL;
1965 struct policy_handle hive_hnd, key_hnd;
1966 struct spoolss_PrinterEnumValues *enum_values = NULL;
1967 struct spoolss_PrinterEnumValues *v;
1968 enum ndr_err_code ndr_err;
1970 int snum = lp_servicenumber(printer);
1971 uint32_t num_values = 0;
1974 WERROR result = WERR_OK;
1975 TALLOC_CTX *tmp_ctx;
1977 tmp_ctx = talloc_stackframe();
1978 if (tmp_ctx == NULL) {
1982 path = winreg_printer_data_keyname(tmp_ctx, printer);
1984 TALLOC_FREE(tmp_ctx);
1988 result = winreg_printer_openkey(tmp_ctx,
1990 smbd_messaging_context(),
1998 if (!W_ERROR_IS_OK(result)) {
1999 DEBUG(2, ("winreg_get_printer: Could not open key %s: %s\n",
2000 path, win_errstr(result)));
2004 result = winreg_printer_enumvalues(tmp_ctx,
2009 if (!W_ERROR_IS_OK(result)) {
2010 DEBUG(0, ("winreg_get_printer: Could not enumerate values in %s: %s\n",
2011 path, win_errstr(result)));
2015 info2 = talloc_zero(tmp_ctx, struct spoolss_PrinterInfo2);
2016 if (info2 == NULL) {
2017 result = WERR_NOMEM;
2021 FILL_STRING(info2, EMPTY_STRING, info2->servername);
2022 FILL_STRING(info2, EMPTY_STRING, info2->printername);
2023 FILL_STRING(info2, EMPTY_STRING, info2->sharename);
2024 FILL_STRING(info2, EMPTY_STRING, info2->portname);
2025 FILL_STRING(info2, EMPTY_STRING, info2->drivername);
2026 FILL_STRING(info2, EMPTY_STRING, info2->comment);
2027 FILL_STRING(info2, EMPTY_STRING, info2->location);
2028 FILL_STRING(info2, EMPTY_STRING, info2->sepfile);
2029 FILL_STRING(info2, EMPTY_STRING, info2->printprocessor);
2030 FILL_STRING(info2, EMPTY_STRING, info2->datatype);
2031 FILL_STRING(info2, EMPTY_STRING, info2->parameters);
2033 if (servername != NULL && servername[0] != '\0') {
2034 info2->servername = talloc_asprintf(info2, "\\\\%s", servername);
2035 if (info2->servername == NULL) {
2036 result = WERR_NOMEM;
2041 for (i = 0; i < num_values; i++) {
2042 v = &enum_values[i];
2044 result = winreg_enumval_to_sz(info2,
2047 &info2->printername);
2048 CHECK_ERROR(result);
2050 result = winreg_enumval_to_sz(info2,
2054 CHECK_ERROR(result);
2056 result = winreg_enumval_to_sz(info2,
2060 CHECK_ERROR(result);
2062 result = winreg_enumval_to_sz(info2,
2066 CHECK_ERROR(result);
2068 result = winreg_enumval_to_sz(info2,
2072 CHECK_ERROR(result);
2074 result = winreg_enumval_to_sz(info2,
2078 CHECK_ERROR(result);
2080 result = winreg_enumval_to_sz(info2,
2083 &info2->printprocessor);
2084 CHECK_ERROR(result);
2086 result = winreg_enumval_to_sz(info2,
2090 CHECK_ERROR(result);
2092 result = winreg_enumval_to_sz(info2,
2095 &info2->parameters);
2096 CHECK_ERROR(result);
2098 result = winreg_enumval_to_sz(info2,
2101 &info2->drivername);
2102 CHECK_ERROR(result);
2104 result = winreg_enumval_to_dword(info2,
2107 &info2->attributes);
2108 CHECK_ERROR(result);
2110 result = winreg_enumval_to_dword(info2,
2114 CHECK_ERROR(result);
2116 result = winreg_enumval_to_dword(info2,
2119 &info2->defaultpriority);
2120 CHECK_ERROR(result);
2122 result = winreg_enumval_to_dword(info2,
2126 CHECK_ERROR(result);
2128 result = winreg_enumval_to_dword(info2,
2132 CHECK_ERROR(result);
2134 result = winreg_enumval_to_dword(info2,
2138 CHECK_ERROR(result);
2140 result = winreg_enumval_to_dword(info2,
2144 CHECK_ERROR(result);
2147 if (!W_ERROR_IS_OK(result)) {
2148 DEBUG(0, ("winreg_get_printer: winreg_enumval_to_TYPE() failed "
2151 win_errstr(result)));
2155 /* Create the printername */
2156 if (info2->servername != NULL && info2->servername[0] != '\0') {
2157 if (lp_force_printername(snum)) {
2158 const char *p = talloc_asprintf(info2, "%s\\%s",
2162 result = WERR_NOMEM;
2165 info2->printername = p;
2167 char *p = talloc_asprintf(info2, "%s\\%s",
2169 info2->printername);
2171 result = WERR_NOMEM;
2174 info2->printername = p;
2178 /* Construct the Device Mode */
2179 result = winreg_printer_query_binary(tmp_ctx,
2184 if (W_ERROR_IS_OK(result)) {
2185 info2->devmode = talloc_zero(info2, struct spoolss_DeviceMode);
2186 if (info2->devmode == NULL) {
2187 result = WERR_NOMEM;
2190 ndr_err = ndr_pull_struct_blob(&blob,
2193 (ndr_pull_flags_fn_t) ndr_pull_spoolss_DeviceMode);
2194 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2195 DEBUG(0, ("winreg_get_printer: Failed to unmarshall device mode\n"));
2196 result = WERR_NOMEM;
2201 if (info2->devmode == NULL && lp_default_devmode(snum)) {
2202 result = spoolss_create_default_devmode(info2,
2205 if (!W_ERROR_IS_OK(result)) {
2210 if (info2->devmode != NULL) {
2211 info2->devmode->devicename = talloc_strdup(info2->devmode,
2212 info2->printername);
2213 if (info2->devmode->devicename == NULL) {
2214 DEBUG(0, ("winreg_get_printer: Failed to set devicename\n"));
2215 result = WERR_NOMEM;
2220 result = winreg_get_printer_secdesc(info2,
2224 if (!W_ERROR_IS_OK(result)) {
2228 /* Fix for OS/2 drivers. */
2229 if (get_remote_arch() == RA_OS2) {
2230 spoolss_map_to_os2_driver(info2, &info2->drivername);
2234 *pinfo2 = talloc_move(mem_ctx, &info2);
2239 if (winreg_pipe != NULL) {
2240 if (is_valid_policy_hnd(&key_hnd)) {
2241 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2243 if (is_valid_policy_hnd(&hive_hnd)) {
2244 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2248 TALLOC_FREE(tmp_ctx);
2252 WERROR winreg_get_printer_secdesc(TALLOC_CTX *mem_ctx,
2253 struct auth_serversupplied_info *server_info,
2254 const char *sharename,
2255 struct spoolss_security_descriptor **psecdesc)
2257 struct spoolss_security_descriptor *secdesc;
2258 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2259 struct rpc_pipe_client *winreg_pipe = NULL;
2260 struct policy_handle hive_hnd, key_hnd;
2261 enum ndr_err_code ndr_err;
2264 TALLOC_CTX *tmp_ctx;
2267 tmp_ctx = talloc_stackframe();
2268 if (tmp_ctx == NULL) {
2272 path = winreg_printer_data_keyname(tmp_ctx, sharename);
2274 talloc_free(tmp_ctx);
2278 ZERO_STRUCT(hive_hnd);
2279 ZERO_STRUCT(key_hnd);
2281 result = winreg_printer_openkey(tmp_ctx,
2283 smbd_messaging_context(),
2291 if (!W_ERROR_IS_OK(result)) {
2292 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
2293 goto create_default;
2298 result = winreg_printer_query_binary(tmp_ctx,
2303 if (!W_ERROR_IS_OK(result)) {
2304 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
2305 goto create_default;
2310 secdesc = talloc_zero(tmp_ctx, struct spoolss_security_descriptor);
2311 if (secdesc == NULL) {
2312 result = WERR_NOMEM;
2315 ndr_err = ndr_pull_struct_blob(&blob,
2318 (ndr_pull_flags_fn_t) ndr_pull_security_descriptor);
2319 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2320 DEBUG(0, ("winreg_get_secdesc: Failed to unmarshall security descriptor\n"));
2321 result = WERR_NOMEM;
2326 *psecdesc = talloc_move(mem_ctx, &secdesc);
2333 result = spoolss_create_default_secdesc(tmp_ctx, &secdesc);
2334 if (!W_ERROR_IS_OK(result)) {
2338 /* If security descriptor is owned by S-1-1-0 and winbindd is up,
2339 this security descriptor has been created when winbindd was
2340 down. Take ownership of security descriptor. */
2341 if (sid_equal(secdesc->owner_sid, &global_sid_World)) {
2342 struct dom_sid owner_sid;
2344 /* Change sd owner to workgroup administrator */
2346 if (secrets_fetch_domain_sid(lp_workgroup(), &owner_sid)) {
2347 struct spoolss_security_descriptor *new_secdesc;
2351 sid_append_rid(&owner_sid, DOMAIN_RID_ADMINISTRATOR);
2353 new_secdesc = make_sec_desc(tmp_ctx,
2362 if (new_secdesc == NULL) {
2363 result = WERR_NOMEM;
2367 /* Swap with other one */
2368 secdesc = new_secdesc;
2372 ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, secdesc,
2373 (ndr_push_flags_fn_t) ndr_push_security_descriptor);
2374 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2375 DEBUG(0, ("winreg_set_secdesc: Failed to marshall security descriptor\n"));
2376 result = WERR_NOMEM;
2380 result = winreg_printer_write_binary(tmp_ctx,
2385 if (!W_ERROR_IS_OK(result)) {
2390 *psecdesc = talloc_move(mem_ctx, &secdesc);
2395 if (winreg_pipe != NULL) {
2396 if (is_valid_policy_hnd(&key_hnd)) {
2397 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2399 if (is_valid_policy_hnd(&hive_hnd)) {
2400 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2404 talloc_free(tmp_ctx);
2408 WERROR winreg_set_printer_secdesc(TALLOC_CTX *mem_ctx,
2409 struct auth_serversupplied_info *server_info,
2410 const char *sharename,
2411 const struct spoolss_security_descriptor *secdesc)
2413 const struct spoolss_security_descriptor *new_secdesc = secdesc;
2414 struct spoolss_security_descriptor *old_secdesc;
2415 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2416 struct rpc_pipe_client *winreg_pipe = NULL;
2417 struct policy_handle hive_hnd, key_hnd;
2418 enum ndr_err_code ndr_err;
2421 TALLOC_CTX *tmp_ctx;
2424 tmp_ctx = talloc_stackframe();
2425 if (tmp_ctx == NULL) {
2429 path = winreg_printer_data_keyname(tmp_ctx, sharename);
2431 talloc_free(tmp_ctx);
2436 * The old owner and group sids of the security descriptor are not
2437 * present when new ACEs are added or removed by changing printer
2438 * permissions through NT. If they are NULL in the new security
2439 * descriptor then copy them over from the old one.
2441 if (!secdesc->owner_sid || !secdesc->group_sid) {
2442 struct dom_sid *owner_sid, *group_sid;
2443 struct security_acl *dacl, *sacl;
2446 result = winreg_get_printer_secdesc(tmp_ctx,
2450 if (!W_ERROR_IS_OK(result)) {
2451 talloc_free(tmp_ctx);
2455 /* Pick out correct owner and group sids */
2456 owner_sid = secdesc->owner_sid ?
2457 secdesc->owner_sid :
2458 old_secdesc->owner_sid;
2460 group_sid = secdesc->group_sid ?
2461 secdesc->group_sid :
2462 old_secdesc->group_sid;
2464 dacl = secdesc->dacl ?
2468 sacl = secdesc->sacl ?
2472 /* Make a deep copy of the security descriptor */
2473 new_secdesc = make_sec_desc(tmp_ctx,
2481 if (new_secdesc == NULL) {
2482 talloc_free(tmp_ctx);
2487 ZERO_STRUCT(hive_hnd);
2488 ZERO_STRUCT(key_hnd);
2490 result = winreg_printer_openkey(tmp_ctx,
2492 smbd_messaging_context(),
2500 if (!W_ERROR_IS_OK(result)) {
2504 ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, new_secdesc,
2505 (ndr_push_flags_fn_t) ndr_push_security_descriptor);
2506 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2507 DEBUG(0, ("winreg_set_secdesc: Failed to marshall security descriptor\n"));
2508 result = WERR_NOMEM;
2512 result = winreg_printer_write_binary(tmp_ctx,
2519 if (winreg_pipe != NULL) {
2520 if (is_valid_policy_hnd(&key_hnd)) {
2521 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2523 if (is_valid_policy_hnd(&hive_hnd)) {
2524 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2528 talloc_free(tmp_ctx);
2532 /* Set printer data over the winreg pipe. */
2533 WERROR winreg_set_printer_dataex(TALLOC_CTX *mem_ctx,
2534 struct auth_serversupplied_info *server_info,
2535 const char *printer,
2538 enum winreg_Type type,
2542 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2543 struct rpc_pipe_client *winreg_pipe = NULL;
2544 struct policy_handle hive_hnd, key_hnd;
2545 struct winreg_String wvalue;
2547 WERROR result = WERR_OK;
2549 TALLOC_CTX *tmp_ctx;
2551 tmp_ctx = talloc_stackframe();
2552 if (tmp_ctx == NULL) {
2556 path = winreg_printer_data_keyname(tmp_ctx, printer);
2558 TALLOC_FREE(tmp_ctx);
2562 ZERO_STRUCT(hive_hnd);
2563 ZERO_STRUCT(key_hnd);
2565 DEBUG(8, ("winreg_set_printer_dataex: Open printer key %s, value %s, access_mask: 0x%05x for [%s]\n",
2566 key, value, access_mask, printer));
2567 result = winreg_printer_openkey(tmp_ctx,
2569 smbd_messaging_context(),
2577 if (!W_ERROR_IS_OK(result)) {
2578 DEBUG(0, ("winreg_set_printer_dataex: Could not open key %s: %s\n",
2579 key, win_errstr(result)));
2583 wvalue.name = value;
2584 status = rpccli_winreg_SetValue(winreg_pipe,
2592 if (!NT_STATUS_IS_OK(status)) {
2593 DEBUG(0, ("winreg_set_printer_dataex: Could not set value %s: %s\n",
2594 value, nt_errstr(status)));
2595 if (!W_ERROR_IS_OK(result)) {
2598 result = ntstatus_to_werror(status);
2604 if (winreg_pipe != NULL) {
2605 if (is_valid_policy_hnd(&key_hnd)) {
2606 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2608 if (is_valid_policy_hnd(&hive_hnd)) {
2609 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2613 TALLOC_FREE(tmp_ctx);
2617 /* Get printer data over a winreg pipe. */
2618 WERROR winreg_get_printer_dataex(TALLOC_CTX *mem_ctx,
2619 struct auth_serversupplied_info *server_info,
2620 const char *printer,
2623 enum winreg_Type *type,
2625 uint32_t *data_size)
2627 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2628 struct rpc_pipe_client *winreg_pipe = NULL;
2629 struct policy_handle hive_hnd, key_hnd;
2630 struct winreg_String wvalue;
2631 enum winreg_Type type_in;
2634 uint32_t data_in_size = 0;
2635 uint32_t value_len = 0;
2636 WERROR result = WERR_OK;
2638 TALLOC_CTX *tmp_ctx;
2640 tmp_ctx = talloc_stackframe();
2641 if (tmp_ctx == NULL) {
2645 path = winreg_printer_data_keyname(tmp_ctx, printer);
2647 TALLOC_FREE(tmp_ctx);
2651 ZERO_STRUCT(hive_hnd);
2652 ZERO_STRUCT(key_hnd);
2654 result = winreg_printer_openkey(tmp_ctx,
2656 smbd_messaging_context(),
2664 if (!W_ERROR_IS_OK(result)) {
2665 DEBUG(2, ("winreg_get_printer_dataex: Could not open key %s: %s\n",
2666 key, win_errstr(result)));
2670 wvalue.name = value;
2673 * call QueryValue once with data == NULL to get the
2674 * needed memory size to be allocated, then allocate
2675 * data buffer and call again.
2677 status = rpccli_winreg_QueryValue(winreg_pipe,
2686 if (!NT_STATUS_IS_OK(status)) {
2687 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
2688 value, nt_errstr(status)));
2689 if (!W_ERROR_IS_OK(result)) {
2692 result = ntstatus_to_werror(status);
2696 data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
2697 if (data_in == NULL) {
2698 result = WERR_NOMEM;
2703 status = rpccli_winreg_QueryValue(winreg_pipe,
2712 if (!NT_STATUS_IS_OK(status)) {
2713 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
2714 value, nt_errstr(status)));
2715 if (!W_ERROR_IS_OK(result)) {
2716 result = ntstatus_to_werror(status);
2722 *data_size = data_in_size;
2724 *data = talloc_move(mem_ctx, &data_in);
2729 if (winreg_pipe != NULL) {
2730 if (is_valid_policy_hnd(&key_hnd)) {
2731 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2733 if (is_valid_policy_hnd(&hive_hnd)) {
2734 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2738 TALLOC_FREE(tmp_ctx);
2742 /* Enumerate on the values of a given key and provide the data. */
2743 WERROR winreg_enum_printer_dataex(TALLOC_CTX *mem_ctx,
2744 struct auth_serversupplied_info *server_info,
2745 const char *printer,
2747 uint32_t *pnum_values,
2748 struct spoolss_PrinterEnumValues **penum_values)
2750 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2751 struct rpc_pipe_client *winreg_pipe = NULL;
2752 struct policy_handle hive_hnd, key_hnd;
2754 struct spoolss_PrinterEnumValues *enum_values = NULL;
2755 uint32_t num_values = 0;
2757 WERROR result = WERR_OK;
2759 TALLOC_CTX *tmp_ctx;
2761 tmp_ctx = talloc_stackframe();
2762 if (tmp_ctx == NULL) {
2766 path = winreg_printer_data_keyname(tmp_ctx, printer);
2768 TALLOC_FREE(tmp_ctx);
2772 result = winreg_printer_openkey(tmp_ctx,
2774 smbd_messaging_context(),
2782 if (!W_ERROR_IS_OK(result)) {
2783 DEBUG(2, ("winreg_enum_printer_dataex: Could not open key %s: %s\n",
2784 key, win_errstr(result)));
2788 result = winreg_printer_enumvalues(tmp_ctx,
2793 if (!W_ERROR_IS_OK(result)) {
2794 DEBUG(0, ("winreg_enum_printer_dataex: Could not enumerate values in %s: %s\n",
2795 key, win_errstr(result)));
2799 *pnum_values = num_values;
2801 *penum_values = talloc_move(mem_ctx, &enum_values);
2806 if (winreg_pipe != NULL) {
2807 if (is_valid_policy_hnd(&key_hnd)) {
2808 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2810 if (is_valid_policy_hnd(&hive_hnd)) {
2811 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2815 TALLOC_FREE(tmp_ctx);
2819 /* Delete printer data over a winreg pipe. */
2820 WERROR winreg_delete_printer_dataex(TALLOC_CTX *mem_ctx,
2821 struct auth_serversupplied_info *server_info,
2822 const char *printer,
2826 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2827 struct rpc_pipe_client *winreg_pipe = NULL;
2828 struct policy_handle hive_hnd, key_hnd;
2829 struct winreg_String wvalue;
2831 WERROR result = WERR_OK;
2834 TALLOC_CTX *tmp_ctx;
2836 tmp_ctx = talloc_stackframe();
2837 if (tmp_ctx == NULL) {
2841 path = winreg_printer_data_keyname(tmp_ctx, printer);
2843 TALLOC_FREE(tmp_ctx);
2847 ZERO_STRUCT(hive_hnd);
2848 ZERO_STRUCT(key_hnd);
2850 result = winreg_printer_openkey(tmp_ctx,
2852 smbd_messaging_context(),
2860 if (!W_ERROR_IS_OK(result)) {
2861 DEBUG(0, ("winreg_delete_printer_dataex: Could not open key %s: %s\n",
2862 key, win_errstr(result)));
2866 wvalue.name = value;
2867 status = rpccli_winreg_DeleteValue(winreg_pipe,
2872 if (!NT_STATUS_IS_OK(status)) {
2873 DEBUG(0, ("winreg_delete_printer_dataex: Could not delete value %s: %s\n",
2874 value, nt_errstr(status)));
2875 if (!W_ERROR_IS_OK(result)) {
2878 result = ntstatus_to_werror(status);
2884 if (winreg_pipe != NULL) {
2885 if (is_valid_policy_hnd(&key_hnd)) {
2886 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2888 if (is_valid_policy_hnd(&hive_hnd)) {
2889 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2893 TALLOC_FREE(tmp_ctx);
2897 /* Enumerate on the subkeys of a given key and provide the data. */
2898 WERROR winreg_enum_printer_key(TALLOC_CTX *mem_ctx,
2899 struct auth_serversupplied_info *server_info,
2900 const char *printer,
2902 uint32_t *pnum_subkeys,
2903 const char ***psubkeys)
2905 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2906 struct rpc_pipe_client *winreg_pipe = NULL;
2907 struct policy_handle hive_hnd, key_hnd;
2909 const char **subkeys = NULL;
2910 uint32_t num_subkeys = -1;
2912 WERROR result = WERR_OK;
2914 TALLOC_CTX *tmp_ctx;
2916 tmp_ctx = talloc_stackframe();
2917 if (tmp_ctx == NULL) {
2921 path = winreg_printer_data_keyname(tmp_ctx, printer);
2923 TALLOC_FREE(tmp_ctx);
2927 ZERO_STRUCT(hive_hnd);
2928 ZERO_STRUCT(key_hnd);
2930 result = winreg_printer_openkey(tmp_ctx,
2932 smbd_messaging_context(),
2940 if (!W_ERROR_IS_OK(result)) {
2941 DEBUG(2, ("winreg_enum_printer_key: Could not open key %s: %s\n",
2942 key, win_errstr(result)));
2946 result = winreg_printer_enumkeys(tmp_ctx,
2951 if (!W_ERROR_IS_OK(result)) {
2952 DEBUG(0, ("winreg_enum_printer_key: Could not enumerate subkeys in %s: %s\n",
2953 key, win_errstr(result)));
2957 *pnum_subkeys = num_subkeys;
2959 *psubkeys = talloc_move(mem_ctx, &subkeys);
2964 if (winreg_pipe != NULL) {
2965 if (is_valid_policy_hnd(&key_hnd)) {
2966 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2968 if (is_valid_policy_hnd(&hive_hnd)) {
2969 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2973 TALLOC_FREE(tmp_ctx);
2977 /* Delete a key with subkeys of a given printer. */
2978 WERROR winreg_delete_printer_key(TALLOC_CTX *mem_ctx,
2979 struct auth_serversupplied_info *server_info,
2980 const char *printer,
2983 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2984 struct rpc_pipe_client *winreg_pipe = NULL;
2985 struct policy_handle hive_hnd, key_hnd;
2989 TALLOC_CTX *tmp_ctx;
2991 tmp_ctx = talloc_stackframe();
2992 if (tmp_ctx == NULL) {
2996 path = winreg_printer_data_keyname(tmp_ctx, printer);
2998 TALLOC_FREE(tmp_ctx);
3002 result = winreg_printer_openkey(tmp_ctx,
3004 smbd_messaging_context(),
3012 if (!W_ERROR_IS_OK(result)) {
3013 /* key doesn't exist */
3014 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3019 DEBUG(0, ("winreg_delete_printer_key: Could not open key %s: %s\n",
3020 key, win_errstr(result)));
3024 if (is_valid_policy_hnd(&key_hnd)) {
3025 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3028 if (key == NULL || key[0] == '\0') {
3031 keyname = talloc_asprintf(tmp_ctx,
3035 if (keyname == NULL) {
3036 result = WERR_NOMEM;
3041 result = winreg_printer_delete_subkeys(tmp_ctx,
3046 if (!W_ERROR_IS_OK(result)) {
3047 DEBUG(0, ("winreg_delete_printer_key: Could not delete key %s: %s\n",
3048 key, win_errstr(result)));
3053 if (winreg_pipe != NULL) {
3054 if (is_valid_policy_hnd(&key_hnd)) {
3055 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3057 if (is_valid_policy_hnd(&hive_hnd)) {
3058 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3062 TALLOC_FREE(tmp_ctx);
3066 WERROR winreg_printer_update_changeid(TALLOC_CTX *mem_ctx,
3067 struct auth_serversupplied_info *server_info,
3068 const char *printer)
3070 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3071 struct rpc_pipe_client *winreg_pipe = NULL;
3072 struct policy_handle hive_hnd, key_hnd;
3075 TALLOC_CTX *tmp_ctx;
3077 tmp_ctx = talloc_stackframe();
3078 if (tmp_ctx == NULL) {
3082 path = winreg_printer_data_keyname(tmp_ctx, printer);
3084 TALLOC_FREE(tmp_ctx);
3088 ZERO_STRUCT(hive_hnd);
3089 ZERO_STRUCT(key_hnd);
3091 result = winreg_printer_openkey(tmp_ctx,
3093 smbd_messaging_context(),
3101 if (!W_ERROR_IS_OK(result)) {
3102 DEBUG(0, ("winreg_printer_update_changeid: Could not open key %s: %s\n",
3103 path, win_errstr(result)));
3107 result = winreg_printer_write_dword(tmp_ctx,
3111 winreg_printer_rev_changeid());
3112 if (!W_ERROR_IS_OK(result)) {
3118 if (winreg_pipe != NULL) {
3119 if (is_valid_policy_hnd(&key_hnd)) {
3120 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3122 if (is_valid_policy_hnd(&hive_hnd)) {
3123 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3127 TALLOC_FREE(tmp_ctx);
3131 WERROR winreg_printer_get_changeid(TALLOC_CTX *mem_ctx,
3132 struct auth_serversupplied_info *server_info,
3133 const char *printer,
3134 uint32_t *pchangeid)
3136 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3137 struct rpc_pipe_client *winreg_pipe = NULL;
3138 struct policy_handle hive_hnd, key_hnd;
3139 uint32_t changeid = 0;
3142 TALLOC_CTX *tmp_ctx;
3144 tmp_ctx = talloc_stackframe();
3145 if (tmp_ctx == NULL) {
3149 path = winreg_printer_data_keyname(tmp_ctx, printer);
3151 TALLOC_FREE(tmp_ctx);
3155 ZERO_STRUCT(hive_hnd);
3156 ZERO_STRUCT(key_hnd);
3158 result = winreg_printer_openkey(tmp_ctx,
3160 smbd_messaging_context(),
3168 if (!W_ERROR_IS_OK(result)) {
3169 DEBUG(2, ("winreg_printer_get_changeid: Could not open key %s: %s\n",
3170 path, win_errstr(result)));
3174 DEBUG(10, ("winreg_printer_get_changeid: get changeid from %s\n", path));
3176 result = winreg_printer_query_dword(tmp_ctx,
3181 if (!W_ERROR_IS_OK(result)) {
3186 *pchangeid = changeid;
3191 if (winreg_pipe != NULL) {
3192 if (is_valid_policy_hnd(&key_hnd)) {
3193 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3195 if (is_valid_policy_hnd(&hive_hnd)) {
3196 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3200 TALLOC_FREE(tmp_ctx);
3205 * The special behaviour of the spoolss forms is documented at the website:
3207 * Managing Win32 Printserver Forms
3208 * http://unixwiz.net/techtips/winspooler-forms.html
3211 WERROR winreg_printer_addform1(TALLOC_CTX *mem_ctx,
3212 struct auth_serversupplied_info *server_info,
3213 struct spoolss_AddFormInfo1 *form)
3215 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3216 struct rpc_pipe_client *winreg_pipe = NULL;
3217 struct policy_handle hive_hnd, key_hnd;
3218 struct winreg_String wvalue;
3220 uint32_t num_info = 0;
3221 union spoolss_FormInfo *info = NULL;
3225 TALLOC_CTX *tmp_ctx;
3227 tmp_ctx = talloc_stackframe();
3228 if (tmp_ctx == NULL) {
3232 ZERO_STRUCT(hive_hnd);
3233 ZERO_STRUCT(key_hnd);
3235 result = winreg_printer_openkey(tmp_ctx,
3237 smbd_messaging_context(),
3239 TOP_LEVEL_CONTROL_FORMS_KEY,
3245 if (!W_ERROR_IS_OK(result)) {
3246 DEBUG(0, ("winreg_printer_addform1: Could not open key %s: %s\n",
3247 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3251 result = winreg_printer_enumforms1(tmp_ctx, server_info, &num_info, &info);
3252 if (!W_ERROR_IS_OK(result)) {
3253 DEBUG(0, ("winreg_printer_addform: Could not enum keys %s: %s\n",
3254 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3258 /* If form name already exists or is builtin return ALREADY_EXISTS */
3259 for (i = 0; i < num_info; i++) {
3260 if (strequal(info[i].info1.form_name, form->form_name)) {
3261 result = WERR_FILE_EXISTS;
3266 wvalue.name = form->form_name;
3268 blob = data_blob_talloc(tmp_ctx, NULL, 32);
3269 SIVAL(blob.data, 0, form->size.width);
3270 SIVAL(blob.data, 4, form->size.height);
3271 SIVAL(blob.data, 8, form->area.left);
3272 SIVAL(blob.data, 12, form->area.top);
3273 SIVAL(blob.data, 16, form->area.right);
3274 SIVAL(blob.data, 20, form->area.bottom);
3275 SIVAL(blob.data, 24, num_info + 1); /* FIXME */
3276 SIVAL(blob.data, 28, form->flags);
3278 status = rpccli_winreg_SetValue(winreg_pipe,
3286 if (!NT_STATUS_IS_OK(status)) {
3287 DEBUG(0, ("winreg_printer_addform1: Could not set value %s: %s\n",
3288 wvalue.name, nt_errstr(status)));
3289 if (!W_ERROR_IS_OK(result)) {
3292 result = ntstatus_to_werror(status);
3298 if (winreg_pipe != NULL) {
3299 if (is_valid_policy_hnd(&key_hnd)) {
3300 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3302 if (is_valid_policy_hnd(&hive_hnd)) {
3303 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3308 TALLOC_FREE(tmp_ctx);
3312 WERROR winreg_printer_enumforms1(TALLOC_CTX *mem_ctx,
3313 struct auth_serversupplied_info *server_info,
3314 uint32_t *pnum_info,
3315 union spoolss_FormInfo **pinfo)
3317 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3318 struct rpc_pipe_client *winreg_pipe = NULL;
3319 struct policy_handle hive_hnd, key_hnd;
3320 union spoolss_FormInfo *info;
3321 struct spoolss_PrinterEnumValues *enum_values = NULL;
3322 uint32_t num_values = 0;
3323 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3326 TALLOC_CTX *tmp_ctx;
3328 tmp_ctx = talloc_stackframe();
3329 if (tmp_ctx == NULL) {
3333 ZERO_STRUCT(hive_hnd);
3334 ZERO_STRUCT(key_hnd);
3336 result = winreg_printer_openkey(tmp_ctx,
3338 smbd_messaging_context(),
3340 TOP_LEVEL_CONTROL_FORMS_KEY,
3346 if (!W_ERROR_IS_OK(result)) {
3347 /* key doesn't exist */
3348 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3353 DEBUG(0, ("winreg_printer_enumforms1: Could not open key %s: %s\n",
3354 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3358 result = winreg_printer_enumvalues(tmp_ctx,
3363 if (!W_ERROR_IS_OK(result)) {
3364 DEBUG(0, ("winreg_printer_enumforms1: Could not enumerate values in %s: %s\n",
3365 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3369 info = TALLOC_ARRAY(tmp_ctx, union spoolss_FormInfo, num_builtin + num_values);
3371 result = WERR_NOMEM;
3375 /* Enumerate BUILTIN forms */
3376 for (i = 0; i < num_builtin; i++) {
3377 info[i].info1 = builtin_forms1[i];
3380 /* Enumerate registry forms */
3381 for (i = 0; i < num_values; i++) {
3382 union spoolss_FormInfo val;
3384 if (enum_values[i].type != REG_BINARY ||
3385 enum_values[i].data_length != 32) {
3389 val.info1.form_name = talloc_strdup(info, enum_values[i].value_name);
3390 if (val.info1.form_name == NULL) {
3391 result = WERR_NOMEM;
3395 val.info1.size.width = IVAL(enum_values[i].data->data, 0);
3396 val.info1.size.height = IVAL(enum_values[i].data->data, 4);
3397 val.info1.area.left = IVAL(enum_values[i].data->data, 8);
3398 val.info1.area.top = IVAL(enum_values[i].data->data, 12);
3399 val.info1.area.right = IVAL(enum_values[i].data->data, 16);
3400 val.info1.area.bottom = IVAL(enum_values[i].data->data, 20);
3401 /* skip form index IVAL(enum_values[i].data->data, 24)));*/
3402 val.info1.flags = (enum spoolss_FormFlags) IVAL(enum_values[i].data->data, 28);
3404 info[i + num_builtin] = val;
3407 *pnum_info = num_builtin + num_values;
3409 *pinfo = talloc_move(mem_ctx, &info);
3413 if (winreg_pipe != NULL) {
3414 if (is_valid_policy_hnd(&key_hnd)) {
3415 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3417 if (is_valid_policy_hnd(&hive_hnd)) {
3418 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3422 TALLOC_FREE(enum_values);
3423 TALLOC_FREE(tmp_ctx);
3427 WERROR winreg_printer_deleteform1(TALLOC_CTX *mem_ctx,
3428 struct auth_serversupplied_info *server_info,
3429 const char *form_name)
3431 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3432 struct rpc_pipe_client *winreg_pipe = NULL;
3433 struct policy_handle hive_hnd, key_hnd;
3434 struct winreg_String wvalue;
3435 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3437 WERROR result = WERR_OK;
3439 TALLOC_CTX *tmp_ctx;
3441 for (i = 0; i < num_builtin; i++) {
3442 if (strequal(builtin_forms1[i].form_name, form_name)) {
3443 return WERR_INVALID_PARAMETER;
3447 tmp_ctx = talloc_stackframe();
3448 if (tmp_ctx == NULL) {
3452 ZERO_STRUCT(hive_hnd);
3453 ZERO_STRUCT(key_hnd);
3455 result = winreg_printer_openkey(tmp_ctx,
3457 smbd_messaging_context(),
3459 TOP_LEVEL_CONTROL_FORMS_KEY,
3465 if (!W_ERROR_IS_OK(result)) {
3466 DEBUG(0, ("winreg_printer_deleteform1: Could not open key %s: %s\n",
3467 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3468 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3469 result = WERR_INVALID_FORM_NAME;
3474 wvalue.name = form_name;
3475 status = rpccli_winreg_DeleteValue(winreg_pipe,
3480 if (!NT_STATUS_IS_OK(status)) {
3481 /* If the value doesn't exist, return WERR_INVALID_FORM_NAME */
3482 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3483 result = WERR_INVALID_FORM_NAME;
3486 DEBUG(0, ("winreg_printer_delteform1: Could not delete value %s: %s\n",
3487 wvalue.name, nt_errstr(status)));
3488 if (!W_ERROR_IS_OK(result)) {
3491 result = ntstatus_to_werror(status);
3497 if (winreg_pipe != NULL) {
3498 if (is_valid_policy_hnd(&key_hnd)) {
3499 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3501 if (is_valid_policy_hnd(&hive_hnd)) {
3502 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3506 TALLOC_FREE(tmp_ctx);
3510 WERROR winreg_printer_setform1(TALLOC_CTX *mem_ctx,
3511 struct auth_serversupplied_info *server_info,
3512 const char *form_name,
3513 struct spoolss_AddFormInfo1 *form)
3515 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3516 struct rpc_pipe_client *winreg_pipe = NULL;
3517 struct policy_handle hive_hnd, key_hnd;
3518 struct winreg_String wvalue;
3520 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3524 TALLOC_CTX *tmp_ctx = NULL;
3526 for (i = 0; i < num_builtin; i++) {
3527 if (strequal(builtin_forms1[i].form_name, form->form_name)) {
3528 result = WERR_INVALID_PARAM;
3533 tmp_ctx = talloc_stackframe();
3534 if (tmp_ctx == NULL) {
3538 ZERO_STRUCT(hive_hnd);
3539 ZERO_STRUCT(key_hnd);
3541 result = winreg_printer_openkey(tmp_ctx,
3543 smbd_messaging_context(),
3545 TOP_LEVEL_CONTROL_FORMS_KEY,
3551 if (!W_ERROR_IS_OK(result)) {
3552 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
3553 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3557 /* If form_name != form->form_name then we renamed the form */
3558 if (strequal(form_name, form->form_name)) {
3559 result = winreg_printer_deleteform1(tmp_ctx, server_info, form_name);
3560 if (!W_ERROR_IS_OK(result)) {
3561 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
3562 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3567 wvalue.name = form->form_name;
3569 blob = data_blob_talloc(tmp_ctx, NULL, 32);
3570 SIVAL(blob.data, 0, form->size.width);
3571 SIVAL(blob.data, 4, form->size.height);
3572 SIVAL(blob.data, 8, form->area.left);
3573 SIVAL(blob.data, 12, form->area.top);
3574 SIVAL(blob.data, 16, form->area.right);
3575 SIVAL(blob.data, 20, form->area.bottom);
3576 SIVAL(blob.data, 24, 42);
3577 SIVAL(blob.data, 28, form->flags);
3579 status = rpccli_winreg_SetValue(winreg_pipe,
3587 if (!NT_STATUS_IS_OK(status)) {
3588 DEBUG(0, ("winreg_printer_setform1: Could not set value %s: %s\n",
3589 wvalue.name, nt_errstr(status)));
3590 if (!W_ERROR_IS_OK(result)) {
3593 result = ntstatus_to_werror(status);
3599 if (winreg_pipe != NULL) {
3600 if (is_valid_policy_hnd(&key_hnd)) {
3601 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3603 if (is_valid_policy_hnd(&hive_hnd)) {
3604 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3608 TALLOC_FREE(tmp_ctx);
3612 WERROR winreg_printer_getform1(TALLOC_CTX *mem_ctx,
3613 struct auth_serversupplied_info *server_info,
3614 const char *form_name,
3615 struct spoolss_FormInfo1 *r)
3617 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3618 struct rpc_pipe_client *winreg_pipe = NULL;
3619 struct policy_handle hive_hnd, key_hnd;
3620 struct winreg_String wvalue;
3621 enum winreg_Type type_in;
3623 uint32_t data_in_size = 0;
3624 uint32_t value_len = 0;
3625 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3629 TALLOC_CTX *tmp_ctx;
3631 /* check builtin forms first */
3632 for (i = 0; i < num_builtin; i++) {
3633 if (strequal(builtin_forms1[i].form_name, form_name)) {
3634 *r = builtin_forms1[i];
3639 tmp_ctx = talloc_stackframe();
3640 if (tmp_ctx == NULL) {
3644 ZERO_STRUCT(hive_hnd);
3645 ZERO_STRUCT(key_hnd);
3647 result = winreg_printer_openkey(tmp_ctx,
3649 smbd_messaging_context(),
3651 TOP_LEVEL_CONTROL_FORMS_KEY,
3657 if (!W_ERROR_IS_OK(result)) {
3658 DEBUG(2, ("winreg_printer_getform1: Could not open key %s: %s\n",
3659 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3663 wvalue.name = form_name;
3666 * call QueryValue once with data == NULL to get the
3667 * needed memory size to be allocated, then allocate
3668 * data buffer and call again.
3670 status = rpccli_winreg_QueryValue(winreg_pipe,
3679 if (!NT_STATUS_IS_OK(status)) {
3680 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
3681 wvalue.name, nt_errstr(status)));
3682 if (!W_ERROR_IS_OK(result)) {
3685 result = ntstatus_to_werror(status);
3689 data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
3690 if (data_in == NULL) {
3691 result = WERR_NOMEM;
3696 status = rpccli_winreg_QueryValue(winreg_pipe,
3705 if (!NT_STATUS_IS_OK(status)) {
3706 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
3707 wvalue.name, nt_errstr(status)));
3708 if (!W_ERROR_IS_OK(result)) {
3711 result = ntstatus_to_werror(status);
3715 r->form_name = talloc_strdup(mem_ctx, form_name);
3716 if (r->form_name == NULL) {
3717 result = WERR_NOMEM;
3721 r->size.width = IVAL(data_in, 0);
3722 r->size.height = IVAL(data_in, 4);
3723 r->area.left = IVAL(data_in, 8);
3724 r->area.top = IVAL(data_in, 12);
3725 r->area.right = IVAL(data_in, 16);
3726 r->area.bottom = IVAL(data_in, 20);
3727 /* skip index IVAL(data_in, 24)));*/
3728 r->flags = (enum spoolss_FormFlags) IVAL(data_in, 28);
3732 if (winreg_pipe != NULL) {
3733 if (is_valid_policy_hnd(&key_hnd)) {
3734 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3736 if (is_valid_policy_hnd(&hive_hnd)) {
3737 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3741 TALLOC_FREE(tmp_ctx);
3745 WERROR winreg_add_driver(TALLOC_CTX *mem_ctx,
3746 struct auth_serversupplied_info *server_info,
3747 struct spoolss_AddDriverInfoCtr *r,
3748 const char **driver_name,
3749 uint32_t *driver_version)
3751 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3752 struct rpc_pipe_client *winreg_pipe = NULL;
3753 struct policy_handle hive_hnd, key_hnd;
3754 struct spoolss_DriverInfo8 info8;
3755 TALLOC_CTX *tmp_ctx = NULL;
3758 ZERO_STRUCT(hive_hnd);
3759 ZERO_STRUCT(key_hnd);
3762 if (!driver_info_ctr_to_info8(r, &info8)) {
3763 result = WERR_INVALID_PARAMETER;
3767 tmp_ctx = talloc_stackframe();
3768 if (tmp_ctx == NULL) {
3772 result = winreg_printer_opendriver(tmp_ctx,
3774 smbd_messaging_context(),
3782 if (!W_ERROR_IS_OK(result)) {
3783 DEBUG(0, ("winreg_add_driver: "
3784 "Could not open driver key (%s,%s,%d): %s\n",
3785 info8.driver_name, info8.architecture,
3786 info8.version, win_errstr(result)));
3790 /* TODO: "Attributes" ? */
3792 result = winreg_printer_write_dword(tmp_ctx, winreg_pipe,
3793 &key_hnd, "Version",
3795 if (!W_ERROR_IS_OK(result)) {
3799 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3802 if (!W_ERROR_IS_OK(result)) {
3806 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3807 &key_hnd, "Data File",
3809 if (!W_ERROR_IS_OK(result)) {
3813 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3814 &key_hnd, "Configuration File",
3816 if (!W_ERROR_IS_OK(result)) {
3820 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3821 &key_hnd, "Help File",
3823 if (!W_ERROR_IS_OK(result)) {
3827 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3828 &key_hnd, "Dependent Files",
3829 info8.dependent_files);
3830 if (!W_ERROR_IS_OK(result)) {
3834 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3835 &key_hnd, "Monitor",
3836 info8.monitor_name);
3837 if (!W_ERROR_IS_OK(result)) {
3841 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3842 &key_hnd, "Datatype",
3843 info8.default_datatype);
3844 if (!W_ERROR_IS_OK(result)) {
3848 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3849 &key_hnd, "Previous Names",
3850 info8.previous_names);
3851 if (!W_ERROR_IS_OK(result)) {
3855 result = winreg_printer_write_date(tmp_ctx, winreg_pipe,
3856 &key_hnd, "DriverDate",
3858 if (!W_ERROR_IS_OK(result)) {
3862 result = winreg_printer_write_ver(tmp_ctx, winreg_pipe,
3863 &key_hnd, "DriverVersion",
3864 info8.driver_version);
3865 if (!W_ERROR_IS_OK(result)) {
3869 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3870 &key_hnd, "Manufacturer",
3871 info8.manufacturer_name);
3872 if (!W_ERROR_IS_OK(result)) {
3876 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3877 &key_hnd, "OEM URL",
3878 info8.manufacturer_url);
3879 if (!W_ERROR_IS_OK(result)) {
3883 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3884 &key_hnd, "HardwareID",
3886 if (!W_ERROR_IS_OK(result)) {
3890 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3891 &key_hnd, "Provider",
3893 if (!W_ERROR_IS_OK(result)) {
3897 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3898 &key_hnd, "Print Processor",
3899 info8.print_processor);
3900 if (!W_ERROR_IS_OK(result)) {
3904 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3905 &key_hnd, "VendorSetup",
3906 info8.vendor_setup);
3907 if (!W_ERROR_IS_OK(result)) {
3911 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3912 &key_hnd, "Color Profiles",
3913 info8.color_profiles);
3914 if (!W_ERROR_IS_OK(result)) {
3918 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3919 &key_hnd, "InfPath",
3921 if (!W_ERROR_IS_OK(result)) {
3925 result = winreg_printer_write_dword(tmp_ctx, winreg_pipe, &key_hnd,
3926 "PrinterDriverAttributes",
3927 info8.printer_driver_attributes);
3928 if (!W_ERROR_IS_OK(result)) {
3932 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3933 &key_hnd, "CoreDependencies",
3934 info8.core_driver_dependencies);
3935 if (!W_ERROR_IS_OK(result)) {
3939 result = winreg_printer_write_date(tmp_ctx, winreg_pipe,
3940 &key_hnd, "MinInboxDriverVerDate",
3941 info8.min_inbox_driver_ver_date);
3942 if (!W_ERROR_IS_OK(result)) {
3946 result = winreg_printer_write_ver(tmp_ctx, winreg_pipe, &key_hnd,
3947 "MinInboxDriverVerVersion",
3948 info8.min_inbox_driver_ver_version);
3949 if (!W_ERROR_IS_OK(result)) {
3953 *driver_name = info8.driver_name;
3954 *driver_version = info8.version;
3957 if (winreg_pipe != NULL) {
3958 if (is_valid_policy_hnd(&key_hnd)) {
3959 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3961 if (is_valid_policy_hnd(&hive_hnd)) {
3962 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3966 TALLOC_FREE(tmp_ctx);
3970 WERROR winreg_get_driver(TALLOC_CTX *mem_ctx,
3971 struct auth_serversupplied_info *server_info,
3972 const char *architecture,
3973 const char *driver_name,
3974 uint32_t driver_version,
3975 struct spoolss_DriverInfo8 **_info8)
3977 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3978 struct rpc_pipe_client *winreg_pipe = NULL;
3979 struct policy_handle hive_hnd, key_hnd;
3980 struct spoolss_DriverInfo8 i8, *info8;
3981 struct spoolss_PrinterEnumValues *enum_values = NULL;
3982 struct spoolss_PrinterEnumValues *v;
3983 uint32_t num_values = 0;
3984 TALLOC_CTX *tmp_ctx;
3988 ZERO_STRUCT(hive_hnd);
3989 ZERO_STRUCT(key_hnd);
3992 tmp_ctx = talloc_stackframe();
3993 if (tmp_ctx == NULL) {
3997 if (driver_version == DRIVER_ANY_VERSION) {
3998 /* look for Win2k first and then for NT4 */
3999 result = winreg_printer_opendriver(tmp_ctx,
4001 smbd_messaging_context(),
4009 if (!W_ERROR_IS_OK(result)) {
4010 result = winreg_printer_opendriver(tmp_ctx,
4012 smbd_messaging_context(),
4022 /* ok normal case */
4023 result = winreg_printer_opendriver(tmp_ctx,
4025 smbd_messaging_context(),
4034 if (!W_ERROR_IS_OK(result)) {
4035 DEBUG(5, ("winreg_get_driver: "
4036 "Could not open driver key (%s,%s,%d): %s\n",
4037 driver_name, architecture,
4038 driver_version, win_errstr(result)));
4042 result = winreg_printer_enumvalues(tmp_ctx,
4047 if (!W_ERROR_IS_OK(result)) {
4048 DEBUG(0, ("winreg_get_driver: "
4049 "Could not enumerate values for (%s,%s,%d): %s\n",
4050 driver_name, architecture,
4051 driver_version, win_errstr(result)));
4055 info8 = talloc_zero(tmp_ctx, struct spoolss_DriverInfo8);
4056 if (info8 == NULL) {
4057 result = WERR_NOMEM;
4061 info8->driver_name = talloc_strdup(info8, driver_name);
4062 if (info8->driver_name == NULL) {
4063 result = WERR_NOMEM;
4067 info8->architecture = talloc_strdup(info8, architecture);
4068 if (info8->architecture == NULL) {
4069 result = WERR_NOMEM;
4075 for (i = 0; i < num_values; i++) {
4076 const char *tmp_str;
4079 v = &enum_values[i];
4081 result = winreg_enumval_to_dword(info8, v,
4084 if (NT_STATUS_IS_OK(result)) {
4085 info8->version = (enum spoolss_DriverOSVersion) tmp;
4087 CHECK_ERROR(result);
4089 result = winreg_enumval_to_sz(info8, v,
4091 &info8->driver_path);
4092 CHECK_ERROR(result);
4094 result = winreg_enumval_to_sz(info8, v,
4097 CHECK_ERROR(result);
4099 result = winreg_enumval_to_sz(info8, v,
4100 "Configuration File",
4101 &info8->config_file);
4102 CHECK_ERROR(result);
4104 result = winreg_enumval_to_sz(info8, v,
4107 CHECK_ERROR(result);
4109 result = winreg_enumval_to_multi_sz(info8, v,
4111 &info8->dependent_files);
4112 CHECK_ERROR(result);
4114 result = winreg_enumval_to_sz(info8, v,
4116 &info8->monitor_name);
4117 CHECK_ERROR(result);
4119 result = winreg_enumval_to_sz(info8, v,
4121 &info8->default_datatype);
4122 CHECK_ERROR(result);
4124 result = winreg_enumval_to_multi_sz(info8, v,
4126 &info8->previous_names);
4127 CHECK_ERROR(result);
4129 result = winreg_enumval_to_sz(info8, v,
4132 if (W_ERROR_IS_OK(result)) {
4133 result = winreg_printer_date_to_NTTIME(tmp_str,
4134 &info8->driver_date);
4136 CHECK_ERROR(result);
4138 result = winreg_enumval_to_sz(info8, v,
4141 if (W_ERROR_IS_OK(result)) {
4142 result = winreg_printer_ver_to_dword(tmp_str,
4143 &info8->driver_version);
4145 CHECK_ERROR(result);
4147 result = winreg_enumval_to_sz(info8, v,
4149 &info8->manufacturer_name);
4150 CHECK_ERROR(result);
4152 result = winreg_enumval_to_sz(info8, v,
4154 &info8->manufacturer_url);
4155 CHECK_ERROR(result);
4157 result = winreg_enumval_to_sz(info8, v,
4159 &info8->hardware_id);
4160 CHECK_ERROR(result);
4162 result = winreg_enumval_to_sz(info8, v,
4165 CHECK_ERROR(result);
4167 result = winreg_enumval_to_sz(info8, v,
4169 &info8->print_processor);
4170 CHECK_ERROR(result);
4172 result = winreg_enumval_to_sz(info8, v,
4174 &info8->vendor_setup);
4175 CHECK_ERROR(result);
4177 result = winreg_enumval_to_multi_sz(info8, v,
4179 &info8->color_profiles);
4180 CHECK_ERROR(result);
4182 result = winreg_enumval_to_sz(info8, v,
4185 CHECK_ERROR(result);
4187 result = winreg_enumval_to_dword(info8, v,
4188 "PrinterDriverAttributes",
4189 &info8->printer_driver_attributes);
4190 CHECK_ERROR(result);
4192 result = winreg_enumval_to_multi_sz(info8, v,
4194 &info8->core_driver_dependencies);
4195 CHECK_ERROR(result);
4197 result = winreg_enumval_to_sz(info8, v,
4198 "MinInboxDriverVerDate",
4200 if (W_ERROR_IS_OK(result)) {
4201 result = winreg_printer_date_to_NTTIME(tmp_str,
4202 &info8->min_inbox_driver_ver_date);
4204 CHECK_ERROR(result);
4206 result = winreg_enumval_to_sz(info8, v,
4207 "MinInboxDriverVerVersion",
4209 if (W_ERROR_IS_OK(result)) {
4210 result = winreg_printer_ver_to_dword(tmp_str,
4211 &info8->min_inbox_driver_ver_version);
4213 CHECK_ERROR(result);
4216 if (!W_ERROR_IS_OK(result)) {
4217 DEBUG(0, ("winreg_enumval_to_TYPE() failed "
4218 "for %s: %s\n", v->value_name,
4219 win_errstr(result)));
4223 *_info8 = talloc_steal(mem_ctx, info8);
4226 if (winreg_pipe != NULL) {
4227 if (is_valid_policy_hnd(&key_hnd)) {
4228 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
4230 if (is_valid_policy_hnd(&hive_hnd)) {
4231 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
4235 TALLOC_FREE(tmp_ctx);
4239 WERROR winreg_del_driver(TALLOC_CTX *mem_ctx,
4240 struct auth_serversupplied_info *server_info,
4241 struct spoolss_DriverInfo8 *info8,
4244 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
4245 struct rpc_pipe_client *winreg_pipe = NULL;
4246 struct policy_handle hive_hnd, key_hnd;
4247 TALLOC_CTX *tmp_ctx;
4251 ZERO_STRUCT(hive_hnd);
4252 ZERO_STRUCT(key_hnd);
4254 tmp_ctx = talloc_stackframe();
4255 if (tmp_ctx == NULL) {
4259 /* test that the key exists */
4260 result = winreg_printer_opendriver(tmp_ctx,
4262 smbd_messaging_context(),
4264 info8->architecture,
4270 if (!W_ERROR_IS_OK(result)) {
4271 /* key doesn't exist */
4272 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
4277 DEBUG(5, ("winreg_del_driver: "
4278 "Could not open driver (%s,%s,%u): %s\n",
4279 info8->driver_name, info8->architecture,
4280 version, win_errstr(result)));
4285 if (is_valid_policy_hnd(&key_hnd)) {
4286 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
4289 key_name = talloc_asprintf(tmp_ctx,
4290 "%s\\Environments\\%s\\Drivers\\Version-%u",
4291 TOP_LEVEL_CONTROL_KEY,
4292 info8->architecture, version);
4293 if (key_name == NULL) {
4294 result = WERR_NOMEM;
4298 result = winreg_printer_delete_subkeys(tmp_ctx,
4303 if (!W_ERROR_IS_OK(result)) {
4304 DEBUG(0, ("winreg_del_driver: "
4305 "Could not open driver (%s,%s,%u): %s\n",
4306 info8->driver_name, info8->architecture,
4307 version, win_errstr(result)));
4313 if (winreg_pipe != NULL) {
4314 if (is_valid_policy_hnd(&key_hnd)) {
4315 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
4317 if (is_valid_policy_hnd(&hive_hnd)) {
4318 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
4322 TALLOC_FREE(tmp_ctx);
4326 WERROR winreg_get_driver_list(TALLOC_CTX *mem_ctx,
4327 struct auth_serversupplied_info *server_info,
4328 const char *architecture,
4330 uint32_t *num_drivers,
4331 const char ***drivers_p)
4333 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
4334 struct rpc_pipe_client *winreg_pipe = NULL;
4335 struct policy_handle hive_hnd, key_hnd;
4336 const char **drivers;
4337 TALLOC_CTX *tmp_ctx;
4343 ZERO_STRUCT(hive_hnd);
4344 ZERO_STRUCT(key_hnd);
4346 tmp_ctx = talloc_stackframe();
4347 if (tmp_ctx == NULL) {
4351 /* use NULL for the driver name so we open the key that is
4352 * parent of all drivers for this architecture and version */
4353 result = winreg_printer_opendriver(tmp_ctx,
4355 smbd_messaging_context(),
4363 if (!W_ERROR_IS_OK(result)) {
4364 DEBUG(5, ("winreg_get_driver_list: "
4365 "Could not open key (%s,%u): %s\n",
4366 architecture, version, win_errstr(result)));
4371 result = winreg_printer_enumkeys(tmp_ctx,
4376 if (!W_ERROR_IS_OK(result)) {
4377 DEBUG(0, ("winreg_get_driver_list: "
4378 "Could not enumerate drivers for (%s,%u): %s\n",
4379 architecture, version, win_errstr(result)));
4383 *drivers_p = talloc_steal(mem_ctx, drivers);
4387 if (winreg_pipe != NULL) {
4388 if (is_valid_policy_hnd(&key_hnd)) {
4389 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
4391 if (is_valid_policy_hnd(&hive_hnd)) {
4392 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
4396 TALLOC_FREE(tmp_ctx);