2 * Unix SMB/CIFS implementation.
4 * SPOOLSS RPC Pipe server / winreg client routines
6 * Copyright (c) 2010 Andreas Schneider <asn@samba.org>
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, see <http://www.gnu.org/licenses/>.
23 #include "srv_spoolss_util.h"
24 #include "../librpc/gen_ndr/srv_winreg.h"
25 #include "../librpc/gen_ndr/cli_winreg.h"
27 #define TOP_LEVEL_PRINT_KEY "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print"
28 #define TOP_LEVEL_PRINT_PRINTERS_KEY TOP_LEVEL_PRINT_KEY "\\Printers"
29 #define TOP_LEVEL_CONTROL_KEY "SYSTEM\\CurrentControlSet\\Control\\Print"
30 #define TOP_LEVEL_CONTROL_FORMS_KEY TOP_LEVEL_CONTROL_KEY "\\Forms"
32 #define EMPTY_STRING ""
33 static const char *empty_string_array[1] = { NULL };
34 #define EMPTY_STRING_ARRAY empty_string_array
36 #define CHECK_ERROR(result) \
37 if (W_ERROR_IS_OK(result)) continue; \
38 if (W_ERROR_EQUAL(result, WERR_NOT_FOUND)) result = WERR_OK; \
39 if (!W_ERROR_IS_OK(result)) break
41 /* FLAGS, NAME, with, height, left, top, right, bottom */
42 static const struct spoolss_FormInfo1 builtin_forms1[] = {
43 { SPOOLSS_FORM_BUILTIN, "Letter", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
44 { SPOOLSS_FORM_BUILTIN, "Letter Small", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
45 { SPOOLSS_FORM_BUILTIN, "Tabloid", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
46 { SPOOLSS_FORM_BUILTIN, "Ledger", {0x696b8,0x44368}, {0x0,0x0,0x696b8,0x44368} },
47 { SPOOLSS_FORM_BUILTIN, "Legal", {0x34b5c,0x56d10}, {0x0,0x0,0x34b5c,0x56d10} },
48 { SPOOLSS_FORM_BUILTIN, "Statement", {0x221b4,0x34b5c}, {0x0,0x0,0x221b4,0x34b5c} },
49 { SPOOLSS_FORM_BUILTIN, "Executive", {0x2cf56,0x411cc}, {0x0,0x0,0x2cf56,0x411cc} },
50 { SPOOLSS_FORM_BUILTIN, "A3", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
51 { SPOOLSS_FORM_BUILTIN, "A4", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
52 { SPOOLSS_FORM_BUILTIN, "A4 Small", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
53 { SPOOLSS_FORM_BUILTIN, "A5", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
54 { SPOOLSS_FORM_BUILTIN, "B4 (JIS)", {0x3ebe8,0x58de0}, {0x0,0x0,0x3ebe8,0x58de0} },
55 { SPOOLSS_FORM_BUILTIN, "B5 (JIS)", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
56 { SPOOLSS_FORM_BUILTIN, "Folio", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
57 { SPOOLSS_FORM_BUILTIN, "Quarto", {0x347d8,0x43238}, {0x0,0x0,0x347d8,0x43238} },
58 { SPOOLSS_FORM_BUILTIN, "10x14", {0x3e030,0x56d10}, {0x0,0x0,0x3e030,0x56d10} },
59 { SPOOLSS_FORM_BUILTIN, "11x17", {0x44368,0x696b8}, {0x0,0x0,0x44368,0x696b8} },
60 { SPOOLSS_FORM_BUILTIN, "Note", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
61 { SPOOLSS_FORM_BUILTIN, "Envelope #9", {0x18079,0x37091}, {0x0,0x0,0x18079,0x37091} },
62 { SPOOLSS_FORM_BUILTIN, "Envelope #10", {0x19947,0x3ae94}, {0x0,0x0,0x19947,0x3ae94} },
63 { SPOOLSS_FORM_BUILTIN, "Envelope #11", {0x1be7c,0x40565}, {0x0,0x0,0x1be7c,0x40565} },
64 { SPOOLSS_FORM_BUILTIN, "Envelope #12", {0x1d74a,0x44368}, {0x0,0x0,0x1d74a,0x44368} },
65 { SPOOLSS_FORM_BUILTIN, "Envelope #14", {0x1f018,0x47504}, {0x0,0x0,0x1f018,0x47504} },
66 { SPOOLSS_FORM_BUILTIN, "C size sheet", {0x696b8,0x886d0}, {0x0,0x0,0x696b8,0x886d0} },
67 { SPOOLSS_FORM_BUILTIN, "D size sheet", {0x886d0,0xd2d70}, {0x0,0x0,0x886d0,0xd2d70} },
68 { SPOOLSS_FORM_BUILTIN, "E size sheet", {0xd2d70,0x110da0},{0x0,0x0,0xd2d70,0x110da0} },
69 { SPOOLSS_FORM_BUILTIN, "Envelope DL", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
70 { SPOOLSS_FORM_BUILTIN, "Envelope C5", {0x278d0,0x37e88}, {0x0,0x0,0x278d0,0x37e88} },
71 { SPOOLSS_FORM_BUILTIN, "Envelope C3", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
72 { SPOOLSS_FORM_BUILTIN, "Envelope C4", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
73 { SPOOLSS_FORM_BUILTIN, "Envelope C6", {0x1bd50,0x278d0}, {0x0,0x0,0x1bd50,0x278d0} },
74 { SPOOLSS_FORM_BUILTIN, "Envelope C65", {0x1bd50,0x37e88}, {0x0,0x0,0x1bd50,0x37e88} },
75 { SPOOLSS_FORM_BUILTIN, "Envelope B4", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
76 { SPOOLSS_FORM_BUILTIN, "Envelope B5", {0x2af80,0x3d090}, {0x0,0x0,0x2af80,0x3d090} },
77 { SPOOLSS_FORM_BUILTIN, "Envelope B6", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
78 { SPOOLSS_FORM_BUILTIN, "Envelope", {0x1adb0,0x38270}, {0x0,0x0,0x1adb0,0x38270} },
79 { SPOOLSS_FORM_BUILTIN, "Envelope Monarch", {0x18079,0x2e824}, {0x0,0x0,0x18079,0x2e824} },
80 { SPOOLSS_FORM_BUILTIN, "6 3/4 Envelope", {0x167ab,0x284ec}, {0x0,0x0,0x167ab,0x284ec} },
81 { SPOOLSS_FORM_BUILTIN, "US Std Fanfold", {0x5c3e1,0x44368}, {0x0,0x0,0x5c3e1,0x44368} },
82 { SPOOLSS_FORM_BUILTIN, "German Std Fanfold", {0x34b5c,0x4a6a0}, {0x0,0x0,0x34b5c,0x4a6a0} },
83 { SPOOLSS_FORM_BUILTIN, "German Legal Fanfold", {0x34b5c,0x509d8}, {0x0,0x0,0x34b5c,0x509d8} },
84 { SPOOLSS_FORM_BUILTIN, "B4 (ISO)", {0x3d090,0x562e8}, {0x0,0x0,0x3d090,0x562e8} },
85 { SPOOLSS_FORM_BUILTIN, "Japanese Postcard", {0x186a0,0x24220}, {0x0,0x0,0x186a0,0x24220} },
86 { SPOOLSS_FORM_BUILTIN, "9x11", {0x37cf8,0x44368}, {0x0,0x0,0x37cf8,0x44368} },
87 { SPOOLSS_FORM_BUILTIN, "10x11", {0x3e030,0x44368}, {0x0,0x0,0x3e030,0x44368} },
88 { SPOOLSS_FORM_BUILTIN, "15x11", {0x5d048,0x44368}, {0x0,0x0,0x5d048,0x44368} },
89 { SPOOLSS_FORM_BUILTIN, "Envelope Invite", {0x35b60,0x35b60}, {0x0,0x0,0x35b60,0x35b60} },
90 { SPOOLSS_FORM_BUILTIN, "Reserved48", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
91 { SPOOLSS_FORM_BUILTIN, "Reserved49", {0x1,0x1}, {0x0,0x0,0x1,0x1} },
92 { SPOOLSS_FORM_BUILTIN, "Letter Extra", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
93 { SPOOLSS_FORM_BUILTIN, "Legal Extra", {0x3ae94,0x5d048}, {0x0,0x0,0x3ae94,0x5d048} },
94 { SPOOLSS_FORM_BUILTIN, "Tabloid Extra", {0x4a6a0,0x6f9f0}, {0x0,0x0,0x4a6a0,0x6f9f0} },
95 { SPOOLSS_FORM_BUILTIN, "A4 Extra", {0x397c2,0x4eb16}, {0x0,0x0,0x397c2,0x4eb16} },
96 { SPOOLSS_FORM_BUILTIN, "Letter Transverse", {0x34b5c,0x44368}, {0x0,0x0,0x34b5c,0x44368} },
97 { SPOOLSS_FORM_BUILTIN, "A4 Transverse", {0x33450,0x48828}, {0x0,0x0,0x33450,0x48828} },
98 { SPOOLSS_FORM_BUILTIN, "Letter Extra Transverse", {0x3ae94,0x4a6a0}, {0x0,0x0,0x3ae94,0x4a6a0} },
99 { SPOOLSS_FORM_BUILTIN, "Super A", {0x376b8,0x56ea0}, {0x0,0x0,0x376b8,0x56ea0} },
100 { SPOOLSS_FORM_BUILTIN, "Super B", {0x4a768,0x76e58}, {0x0,0x0,0x4a768,0x76e58} },
101 { SPOOLSS_FORM_BUILTIN, "Letter Plus", {0x34b5c,0x4eb16}, {0x0,0x0,0x34b5c,0x4eb16} },
102 { SPOOLSS_FORM_BUILTIN, "A4 Plus", {0x33450,0x50910}, {0x0,0x0,0x33450,0x50910} },
103 { SPOOLSS_FORM_BUILTIN, "A5 Transverse", {0x24220,0x33450}, {0x0,0x0,0x24220,0x33450} },
104 { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Transverse", {0x2c6f0,0x3ebe8}, {0x0,0x0,0x2c6f0,0x3ebe8} },
105 { SPOOLSS_FORM_BUILTIN, "A3 Extra", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
106 { SPOOLSS_FORM_BUILTIN, "A5 Extra", {0x2a7b0,0x395f8}, {0x0,0x0,0x2a7b0,0x395f8} },
107 { SPOOLSS_FORM_BUILTIN, "B5 (ISO) Extra", {0x31128,0x43620}, {0x0,0x0,0x31128,0x43620} },
108 { SPOOLSS_FORM_BUILTIN, "A2", {0x668a0,0x91050}, {0x0,0x0,0x668a0,0x91050} },
109 { SPOOLSS_FORM_BUILTIN, "A3 Transverse", {0x48828,0x668a0}, {0x0,0x0,0x48828,0x668a0} },
110 { SPOOLSS_FORM_BUILTIN, "A3 Extra Transverse", {0x4e9d0,0x6ca48}, {0x0,0x0,0x4e9d0,0x6ca48} },
111 { SPOOLSS_FORM_BUILTIN, "Japanese Double Postcard", {0x30d40,0x24220}, {0x0,0x0,0x30d40,0x24220} },
112 { SPOOLSS_FORM_BUILTIN, "A6", {0x19a28,0x24220}, {0x0,0x0,0x19a28,0x24220} },
113 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #2", {0x3a980,0x510e0}, {0x0,0x0,0x3a980,0x510e0} },
114 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Kaku #3", {0x34bc0,0x43a08}, {0x0,0x0,0x34bc0,0x43a08} },
115 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #3", {0x1d4c0,0x395f8}, {0x0,0x0,0x1d4c0,0x395f8} },
116 { SPOOLSS_FORM_BUILTIN, "Japanese Envelope Chou #4", {0x15f90,0x320c8}, {0x0,0x0,0x15f90,0x320c8} },
117 { SPOOLSS_FORM_BUILTIN, "Letter Rotated", {0x44368,0x34b5c}, {0x0,0x0,0x44368,0x34b5c} },
118 { SPOOLSS_FORM_BUILTIN, "A3 Rotated", {0x668a0,0x48828}, {0x0,0x0,0x668a0,0x48828} },
119 { SPOOLSS_FORM_BUILTIN, "A4 Rotated", {0x48828,0x33450}, {0x0,0x0,0x48828,0x33450} },
120 { SPOOLSS_FORM_BUILTIN, "A5 Rotated", {0x33450,0x24220}, {0x0,0x0,0x33450,0x24220} },
121 { SPOOLSS_FORM_BUILTIN, "B4 (JIS) Rotated", {0x58de0,0x3ebe8}, {0x0,0x0,0x58de0,0x3ebe8} },
122 { SPOOLSS_FORM_BUILTIN, "B5 (JIS) Rotated", {0x3ebe8,0x2c6f0}, {0x0,0x0,0x3ebe8,0x2c6f0} },
123 { SPOOLSS_FORM_BUILTIN, "Japanese Postcard Rotated", {0x24220,0x186a0}, {0x0,0x0,0x24220,0x186a0} },
124 { SPOOLSS_FORM_BUILTIN, "Double Japan Postcard Rotated", {0x24220,0x30d40}, {0x0,0x0,0x24220,0x30d40} },
125 { SPOOLSS_FORM_BUILTIN, "A6 Rotated", {0x24220,0x19a28}, {0x0,0x0,0x24220,0x19a28} },
126 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #2 Rotated", {0x510e0,0x3a980}, {0x0,0x0,0x510e0,0x3a980} },
127 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Kaku #3 Rotated", {0x43a08,0x34bc0}, {0x0,0x0,0x43a08,0x34bc0} },
128 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #3 Rotated", {0x395f8,0x1d4c0}, {0x0,0x0,0x395f8,0x1d4c0} },
129 { SPOOLSS_FORM_BUILTIN, "Japan Envelope Chou #4 Rotated", {0x320c8,0x15f90}, {0x0,0x0,0x320c8,0x15f90} },
130 { SPOOLSS_FORM_BUILTIN, "B6 (JIS)", {0x1f400,0x2c6f0}, {0x0,0x0,0x1f400,0x2c6f0} },
131 { SPOOLSS_FORM_BUILTIN, "B6 (JIS) Rotated", {0x2c6f0,0x1f400}, {0x0,0x0,0x2c6f0,0x1f400} },
132 { SPOOLSS_FORM_BUILTIN, "12x11", {0x4a724,0x443e1}, {0x0,0x0,0x4a724,0x443e1} },
133 { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4", {0x19a28,0x395f8}, {0x0,0x0,0x19a28,0x395f8} },
134 { SPOOLSS_FORM_BUILTIN, "Japan Envelope You #4 Rotated", {0x395f8,0x19a28}, {0x0,0x0,0x395f8,0x19a28} },
135 { SPOOLSS_FORM_BUILTIN, "PRC 16K", {0x2de60,0x3f7a0}, {0x0,0x0,0x2de60,0x3f7a0} },
136 { SPOOLSS_FORM_BUILTIN, "PRC 32K", {0x1fbd0,0x2cec0}, {0x0,0x0,0x1fbd0,0x2cec0} },
137 { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big)", {0x222e0,0x318f8}, {0x0,0x0,0x222e0,0x318f8} },
138 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1", {0x18e70,0x28488}, {0x0,0x0,0x18e70,0x28488} },
139 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2", {0x18e70,0x2af80}, {0x0,0x0,0x18e70,0x2af80} },
140 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3", {0x1e848,0x2af80}, {0x0,0x0,0x1e848,0x2af80} },
141 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4", {0x1adb0,0x32c80}, {0x0,0x0,0x1adb0,0x32c80} },
142 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5", {0x1adb0,0x35b60}, {0x0,0x0,0x1adb0,0x35b60} },
143 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6", {0x1d4c0,0x38270}, {0x0,0x0,0x1d4c0,0x38270} },
144 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7", {0x27100,0x38270}, {0x0,0x0,0x27100,0x38270} },
145 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8", {0x1d4c0,0x4b708}, {0x0,0x0,0x1d4c0,0x4b708} },
146 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9", {0x37e88,0x4f1a0}, {0x0,0x0,0x37e88,0x4f1a0} },
147 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10", {0x4f1a0,0x6fd10}, {0x0,0x0,0x4f1a0,0x6fd10} },
148 { SPOOLSS_FORM_BUILTIN, "PRC 16K Rotated", {0x3f7a0,0x2de60}, {0x0,0x0,0x3f7a0,0x2de60} },
149 { SPOOLSS_FORM_BUILTIN, "PRC 32K Rotated", {0x2cec0,0x1fbd0}, {0x0,0x0,0x2cec0,0x1fbd0} },
150 { SPOOLSS_FORM_BUILTIN, "PRC 32K(Big) Rotated", {0x318f8,0x222e0}, {0x0,0x0,0x318f8,0x222e0} },
151 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #1 Rotated", {0x28488,0x18e70}, {0x0,0x0,0x28488,0x18e70} },
152 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #2 Rotated", {0x2af80,0x18e70}, {0x0,0x0,0x2af80,0x18e70} },
153 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #3 Rotated", {0x2af80,0x1e848}, {0x0,0x0,0x2af80,0x1e848} },
154 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #4 Rotated", {0x32c80,0x1adb0}, {0x0,0x0,0x32c80,0x1adb0} },
155 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #5 Rotated", {0x35b60,0x1adb0}, {0x0,0x0,0x35b60,0x1adb0} },
156 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #6 Rotated", {0x38270,0x1d4c0}, {0x0,0x0,0x38270,0x1d4c0} },
157 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #7 Rotated", {0x38270,0x27100}, {0x0,0x0,0x38270,0x27100} },
158 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #8 Rotated", {0x4b708,0x1d4c0}, {0x0,0x0,0x4b708,0x1d4c0} },
159 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #9 Rotated", {0x4f1a0,0x37e88}, {0x0,0x0,0x4f1a0,0x37e88} },
160 { SPOOLSS_FORM_BUILTIN, "PRC Envelope #10 Rotated", {0x6fd10,0x4f1a0}, {0x0,0x0,0x6fd10,0x4f1a0} }
163 /********************************************************************
164 static helper functions
165 ********************************************************************/
167 /****************************************************************************
168 Update the changeid time.
169 ****************************************************************************/
173 * @brief Update the ChangeID time of a printer.
175 * This is SO NASTY as some drivers need this to change, others need it
176 * static. This value will change every second, and I must hope that this
177 * is enough..... DON'T CHANGE THIS CODE WITHOUT A TEST MATRIX THE SIZE OF
180 * @return The ChangeID.
182 static uint32_t winreg_printer_rev_changeid(void)
186 get_process_uptime(&tv);
189 /* Return changeid as msec since spooler restart */
190 return tv.tv_sec * 1000 + tv.tv_usec / 1000;
193 * This setting seems to work well but is too untested
194 * to replace the above calculation. Left in for experiementation
195 * of the reader --jerry (Tue Mar 12 09:15:05 CST 2002)
197 return tv.tv_sec * 10 + tv.tv_usec / 100000;
204 * @brief Connect to the interal winreg server and open the given printer key.
206 * The function will create the needed subkeys if they don't exist.
208 * @param[in] mem_ctx The memory context to use.
210 * @param[in] server_info The supplied server info.
212 * @param[out] winreg_pipe A pointer for the winreg rpc client pipe.
214 * @param[in] path The path to the key to open.
216 * @param[in] key The key to open.
218 * @param[in] create_key Set to true if the key should be created if it
221 * @param[in] access_mask The access mask to open the key.
223 * @param[out] hive_handle A policy handle for the opened hive.
225 * @param[out] key_handle A policy handle for the opened key.
227 * @return WERR_OK on success, the corresponding DOS error
228 * code if something gone wrong.
230 static WERROR winreg_printer_openkey(TALLOC_CTX *mem_ctx,
231 struct auth_serversupplied_info *server_info,
232 struct rpc_pipe_client **winreg_pipe,
236 uint32_t access_mask,
237 struct policy_handle *hive_handle,
238 struct policy_handle *key_handle)
240 struct rpc_pipe_client *pipe_handle;
241 struct winreg_String wkey, wkeyclass;
244 WERROR result = WERR_OK;
246 /* create winreg connection */
247 status = rpc_pipe_open_internal(mem_ctx,
248 &ndr_table_winreg.syntax_id,
252 if (!NT_STATUS_IS_OK(status)) {
253 DEBUG(0, ("winreg_printer_openkey: Could not connect to winreg_pipe: %s\n",
255 return ntstatus_to_werror(status);
258 status = rpccli_winreg_OpenHKLM(pipe_handle,
264 if (!NT_STATUS_IS_OK(status)) {
265 DEBUG(0, ("winreg_printer_openkey: Could not open HKLM hive: %s\n",
267 talloc_free(pipe_handle);
268 if (!W_ERROR_IS_OK(result)) {
271 return ntstatus_to_werror(status);
275 keyname = talloc_asprintf(mem_ctx, "%s\\%s", path, key);
277 keyname = talloc_strdup(mem_ctx, path);
279 if (keyname == NULL) {
280 talloc_free(pipe_handle);
288 enum winreg_CreateAction action = REG_ACTION_NONE;
290 ZERO_STRUCT(wkeyclass);
293 status = rpccli_winreg_CreateKey(pipe_handle,
305 case REG_ACTION_NONE:
306 DEBUG(8, ("winreg_printer_openkey:createkey did nothing -- huh?\n"));
308 case REG_CREATED_NEW_KEY:
309 DEBUG(8, ("winreg_printer_openkey: createkey created %s\n", keyname));
311 case REG_OPENED_EXISTING_KEY:
312 DEBUG(8, ("winreg_printer_openkey: createkey opened existing %s\n", keyname));
316 status = rpccli_winreg_OpenKey(pipe_handle,
325 if (!NT_STATUS_IS_OK(status)) {
326 talloc_free(pipe_handle);
327 if (!W_ERROR_IS_OK(result)) {
330 return ntstatus_to_werror(status);
333 *winreg_pipe = pipe_handle;
339 * @brief Create the registry keyname for the given printer.
341 * @param[in] mem_ctx The memory context to use.
343 * @param[in] printer The name of the printer to get the registry key.
345 * @return The registry key or NULL on error.
347 static char *winreg_printer_data_keyname(TALLOC_CTX *mem_ctx, const char *printer) {
348 return talloc_asprintf(mem_ctx, "%s\\%s", TOP_LEVEL_PRINT_PRINTERS_KEY, printer);
354 * @brief Enumerate values of an opened key handle and retrieve the data.
356 * @param[in] mem_ctx The memory context to use.
358 * @param[in] pipe_handle The pipe handle for the rpc connection.
360 * @param[in] key_hnd The opened key handle.
362 * @param[out] pnum_values A pointer to store he number of values found.
364 * @param[out] pnum_values A pointer to store the number of values we found.
366 * @return WERR_OK on success, the corresponding DOS error
367 * code if something gone wrong.
369 static WERROR winreg_printer_enumvalues(TALLOC_CTX *mem_ctx,
370 struct rpc_pipe_client *pipe_handle,
371 struct policy_handle *key_hnd,
372 uint32_t *pnum_values,
373 struct spoolss_PrinterEnumValues **penum_values)
376 uint32_t num_subkeys, max_subkeylen, max_classlen;
377 uint32_t num_values, max_valnamelen, max_valbufsize;
378 uint32_t secdescsize;
380 NTTIME last_changed_time;
381 struct winreg_String classname;
383 struct spoolss_PrinterEnumValues *enum_values;
385 WERROR result = WERR_OK;
388 tmp_ctx = talloc_new(mem_ctx);
389 if (tmp_ctx == NULL) {
393 ZERO_STRUCT(classname);
395 status = rpccli_winreg_QueryInfoKey(pipe_handle,
408 if (!NT_STATUS_IS_OK(status)) {
409 DEBUG(0, ("winreg_printer_enumvalues: Could not query info: %s\n",
411 if (!W_ERROR_IS_OK(result)) {
414 result = ntstatus_to_werror(status);
418 if (num_values == 0) {
420 TALLOC_FREE(tmp_ctx);
424 enum_values = TALLOC_ARRAY(tmp_ctx, struct spoolss_PrinterEnumValues, num_values);
425 if (enum_values == NULL) {
430 for (i = 0; i < num_values; i++) {
431 struct spoolss_PrinterEnumValues val;
432 struct winreg_ValNameBuf name_buf;
433 enum winreg_Type type = REG_NONE;
434 uint8_t *data = NULL;
440 name_buf.size = max_valnamelen + 2;
443 data_size = max_valbufsize;
444 data = (uint8_t *) TALLOC(tmp_ctx, data_size);
447 status = rpccli_winreg_EnumValue(pipe_handle,
457 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
459 status = NT_STATUS_OK;
463 if (!NT_STATUS_IS_OK(status)) {
464 DEBUG(0, ("winreg_printer_enumvalues: Could not enumerate values: %s\n",
466 if (!W_ERROR_IS_OK(result)) {
469 result = ntstatus_to_werror(status);
473 if (name_buf.name == NULL) {
474 result = WERR_INVALID_PARAMETER;
478 val.value_name = talloc_strdup(enum_values, name_buf.name);
479 if (val.value_name == NULL) {
483 val.value_name_len = strlen_m_term(val.value_name) * 2;
486 val.data_length = data_size;
488 if (val.data_length) {
489 val.data = talloc(enum_values, DATA_BLOB);
490 if (val.data == NULL) {
494 *val.data = data_blob_talloc(enum_values, data, data_size);
497 enum_values[i] = val;
500 *pnum_values = num_values;
502 *penum_values = talloc_move(mem_ctx, &enum_values);
508 TALLOC_FREE(tmp_ctx);
515 * @brief Enumerate subkeys of an opened key handle and get the names.
517 * @param[in] mem_ctx The memory context to use.
519 * @param[in] pipe_handle The pipe handle for the rpc connection.
521 * @param[in] key_hnd The opened key handle.
523 * @param[in] pnum_subkeys A pointer to store the number of found subkeys.
525 * @param[in] psubkeys A pointer to an array to store the found names of
528 * @return WERR_OK on success, the corresponding DOS error
529 * code if something gone wrong.
531 static WERROR winreg_printer_enumkeys(TALLOC_CTX *mem_ctx,
532 struct rpc_pipe_client *pipe_handle,
533 struct policy_handle *key_hnd,
534 uint32_t *pnum_subkeys,
535 const char ***psubkeys)
538 const char **subkeys;
539 uint32_t num_subkeys, max_subkeylen, max_classlen;
540 uint32_t num_values, max_valnamelen, max_valbufsize;
542 NTTIME last_changed_time;
543 uint32_t secdescsize;
544 struct winreg_String classname;
545 WERROR result = WERR_OK;
548 tmp_ctx = talloc_new(mem_ctx);
549 if (tmp_ctx == NULL) {
553 ZERO_STRUCT(classname);
555 status = rpccli_winreg_QueryInfoKey(pipe_handle,
568 if (!NT_STATUS_IS_OK(status)) {
569 DEBUG(0, ("winreg_printer_enumkeys: Could not query info: %s\n",
571 if (!W_ERROR_IS_OK(result)) {
574 result = ntstatus_to_werror(status);
578 subkeys = talloc_zero_array(tmp_ctx, const char *, num_subkeys + 2);
579 if (subkeys == NULL) {
584 if (num_subkeys == 0) {
585 subkeys[0] = talloc_strdup(subkeys, "");
586 if (subkeys[0] == NULL) {
592 *psubkeys = talloc_move(mem_ctx, &subkeys);
595 TALLOC_FREE(tmp_ctx);
599 for (i = 0; i < num_subkeys; i++) {
603 struct winreg_StringBuf class_buf;
604 struct winreg_StringBuf name_buf;
608 class_buf.size = max_classlen + 2;
609 class_buf.length = 0;
612 name_buf.size = max_subkeylen + 2;
615 ZERO_STRUCT(modtime);
617 status = rpccli_winreg_EnumKey(pipe_handle,
625 if (W_ERROR_EQUAL(result, WERR_NO_MORE_ITEMS) ) {
627 status = NT_STATUS_OK;
631 if (!NT_STATUS_IS_OK(status)) {
632 DEBUG(0, ("winreg_printer_enumkeys: Could not enumerate keys: %s\n",
634 if (!W_ERROR_IS_OK(result)) {
637 result = ntstatus_to_werror(status);
641 if (name_buf.name == NULL) {
642 result = WERR_INVALID_PARAMETER;
646 name = talloc_strdup(subkeys, name_buf.name);
655 *pnum_subkeys = num_subkeys;
657 *psubkeys = talloc_move(mem_ctx, &subkeys);
661 TALLOC_FREE(tmp_ctx);
668 * @brief A function to delete a key and its subkeys recurively.
670 * @param[in] mem_ctx The memory context to use.
672 * @param[in] pipe_handle The pipe handle for the rpc connection.
674 * @param[in] hive_handle A opened hive handle to the key.
676 * @param[in] access_mask The access mask to access the key.
678 * @param[in] key The key to delete
680 * @return WERR_OK on success, the corresponding DOS error
681 * code if something gone wrong.
683 static WERROR winreg_printer_delete_subkeys(TALLOC_CTX *mem_ctx,
684 struct rpc_pipe_client *pipe_handle,
685 struct policy_handle *hive_handle,
686 uint32_t access_mask,
689 const char **subkeys = NULL;
690 uint32_t num_subkeys = 0;
691 struct policy_handle key_hnd;
692 struct winreg_String wkey;
693 WERROR result = WERR_OK;
697 ZERO_STRUCT(key_hnd);
700 DEBUG(2, ("winreg_printer_delete_subkeys: delete key %s\n", key));
702 status = rpccli_winreg_OpenKey(pipe_handle,
710 if (!NT_STATUS_IS_OK(status)) {
711 DEBUG(0, ("winreg_printer_delete_subkeys: Could not open key %s: %s\n",
712 wkey.name, nt_errstr(status)));
713 if (!W_ERROR_IS_OK(result)) {
716 return ntstatus_to_werror(status);
719 result = winreg_printer_enumkeys(mem_ctx,
724 if (!W_ERROR_IS_OK(result)) {
728 for (i = 0; i < num_subkeys; i++) {
729 /* create key + subkey */
730 char *subkey = talloc_asprintf(mem_ctx, "%s\\%s", key, subkeys[i]);
731 if (subkey == NULL) {
735 DEBUG(2, ("winreg_printer_delete_subkeys: delete subkey %s\n", subkey));
736 result = winreg_printer_delete_subkeys(mem_ctx,
741 if (!W_ERROR_IS_OK(result)) {
746 if (is_valid_policy_hnd(&key_hnd)) {
747 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
752 status = rpccli_winreg_DeleteKey(pipe_handle,
759 if (is_valid_policy_hnd(&key_hnd)) {
760 rpccli_winreg_CloseKey(pipe_handle, mem_ctx, &key_hnd, NULL);
766 static WERROR winreg_printer_write_sz(TALLOC_CTX *mem_ctx,
767 struct rpc_pipe_client *pipe_handle,
768 struct policy_handle *key_handle,
772 struct winreg_String wvalue;
774 WERROR result = WERR_OK;
779 blob = data_blob_string_const("");
781 if (!push_reg_sz(mem_ctx, &blob, data)) {
782 DEBUG(0, ("winreg_printer_write_sz: Could not marshall string %s for %s\n",
787 status = rpccli_winreg_SetValue(pipe_handle,
795 if (!NT_STATUS_IS_OK(status)) {
796 DEBUG(0, ("winreg_printer_write_sz: Could not set value %s: %s\n",
797 wvalue.name, win_errstr(result)));
798 if (!W_ERROR_IS_OK(result)) {
799 result = ntstatus_to_werror(status);
806 static WERROR winreg_printer_write_dword(TALLOC_CTX *mem_ctx,
807 struct rpc_pipe_client *pipe_handle,
808 struct policy_handle *key_handle,
812 struct winreg_String wvalue;
814 WERROR result = WERR_OK;
818 blob = data_blob_talloc(mem_ctx, NULL, 4);
819 SIVAL(blob.data, 0, data);
821 status = rpccli_winreg_SetValue(pipe_handle,
829 if (!NT_STATUS_IS_OK(status)) {
830 DEBUG(0, ("winreg_printer_write_dword: Could not set value %s: %s\n",
831 wvalue.name, win_errstr(result)));
832 if (!W_ERROR_IS_OK(result)) {
833 result = ntstatus_to_werror(status);
840 static WERROR winreg_printer_write_binary(TALLOC_CTX *mem_ctx,
841 struct rpc_pipe_client *pipe_handle,
842 struct policy_handle *key_handle,
846 struct winreg_String wvalue;
847 WERROR result = WERR_OK;
851 status = rpccli_winreg_SetValue(pipe_handle,
859 if (!NT_STATUS_IS_OK(status)) {
860 DEBUG(0, ("winreg_printer_write_binary: Could not set value %s: %s\n",
861 wvalue.name, win_errstr(result)));
862 if (!W_ERROR_IS_OK(result)) {
863 result = ntstatus_to_werror(status);
870 static WERROR winreg_printer_query_binary(TALLOC_CTX *mem_ctx,
871 struct rpc_pipe_client *pipe_handle,
872 struct policy_handle *key_handle,
876 struct winreg_String wvalue;
877 enum winreg_Type type;
878 WERROR result = WERR_OK;
879 uint32_t value_len = 0;
880 uint32_t data_size = 0;
885 status = rpccli_winreg_QueryValue(pipe_handle,
894 if (!NT_STATUS_IS_OK(status)) {
895 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
896 wvalue.name, nt_errstr(status)));
897 if (!W_ERROR_IS_OK(result)) {
900 result = ntstatus_to_werror(status);
904 if (type != REG_BINARY) {
905 result = WERR_INVALID_DATATYPE;
908 blob = data_blob_talloc(mem_ctx, NULL, data_size);
909 if (blob.data == NULL) {
915 status = rpccli_winreg_QueryValue(pipe_handle,
924 if (!NT_STATUS_IS_OK(status)) {
925 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
926 wvalue.name, nt_errstr(status)));
927 if (!W_ERROR_IS_OK(result)) {
928 result = ntstatus_to_werror(status);
934 data->data = blob.data;
935 data->length = blob.length;
941 static WERROR winreg_printer_query_dword(TALLOC_CTX *mem_ctx,
942 struct rpc_pipe_client *pipe_handle,
943 struct policy_handle *key_handle,
947 struct winreg_String wvalue;
948 enum winreg_Type type;
949 WERROR result = WERR_OK;
950 uint32_t value_len = 0;
951 uint32_t data_size = 0;
956 status = rpccli_winreg_QueryValue(pipe_handle,
965 if (!NT_STATUS_IS_OK(status)) {
966 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
967 wvalue.name, nt_errstr(status)));
968 if (!W_ERROR_IS_OK(result)) {
971 result = ntstatus_to_werror(status);
975 if (type != REG_DWORD) {
976 result = WERR_INVALID_DATATYPE;
980 if (data_size != 4) {
981 result = WERR_INVALID_DATA;
985 blob = data_blob_talloc(mem_ctx, NULL, data_size);
986 if (blob.data == NULL) {
992 status = rpccli_winreg_QueryValue(pipe_handle,
1001 if (!NT_STATUS_IS_OK(status)) {
1002 DEBUG(0, ("winreg_printer_query_dword: Could not query value %s: %s\n",
1003 wvalue.name, nt_errstr(status)));
1004 if (!W_ERROR_IS_OK(result)) {
1005 result = ntstatus_to_werror(status);
1011 *data = IVAL(blob.data, 0);
1017 static WERROR winreg_printer_write_multi_sz(TALLOC_CTX *mem_ctx,
1018 struct rpc_pipe_client *pipe_handle,
1019 struct policy_handle *key_handle,
1023 struct winreg_String wvalue;
1025 WERROR result = WERR_OK;
1028 wvalue.name = value;
1029 if (!push_reg_multi_sz(mem_ctx, &blob, data)) {
1032 status = rpccli_winreg_SetValue(pipe_handle,
1040 if (!NT_STATUS_IS_OK(status)) {
1041 DEBUG(0, ("winreg_printer_write_multi_sz: Could not set value %s: %s\n",
1042 wvalue.name, win_errstr(result)));
1043 if (!W_ERROR_IS_OK(result)) {
1044 result = ntstatus_to_werror(status);
1051 static WERROR winreg_printer_opendriver(TALLOC_CTX *mem_ctx,
1052 struct auth_serversupplied_info *server_info,
1053 const char *drivername,
1054 const char *architecture,
1056 uint32_t access_mask,
1058 struct rpc_pipe_client **winreg_pipe,
1059 struct policy_handle *hive_hnd,
1060 struct policy_handle *key_hnd)
1065 key_name = talloc_asprintf(mem_ctx, "%s\\Environments\\%s\\Drivers\\Version-%u",
1066 TOP_LEVEL_CONTROL_KEY,
1067 architecture, version);
1072 result = winreg_printer_openkey(mem_ctx,
1084 static WERROR winreg_enumval_to_dword(TALLOC_CTX *mem_ctx,
1085 struct spoolss_PrinterEnumValues *v,
1086 const char *valuename, uint32_t *dw)
1088 /* just return if it is not the one we are looking for */
1089 if (strcmp(valuename, v->value_name) != 0) {
1090 return WERR_NOT_FOUND;
1093 if (v->type != REG_DWORD) {
1094 return WERR_INVALID_DATATYPE;
1097 *dw = IVAL(v->data->data, 0);
1101 static WERROR winreg_enumval_to_sz(TALLOC_CTX *mem_ctx,
1102 struct spoolss_PrinterEnumValues *v,
1103 const char *valuename, const char **_str)
1105 /* just return if it is not the one we are looking for */
1106 if (strcmp(valuename, v->value_name) != 0) {
1107 return WERR_NOT_FOUND;
1110 if (v->type != REG_SZ) {
1111 return WERR_INVALID_DATATYPE;
1114 if (!pull_reg_sz(mem_ctx, v->data, _str)) {
1121 static WERROR winreg_enumval_to_multi_sz(TALLOC_CTX *mem_ctx,
1122 struct spoolss_PrinterEnumValues *v,
1123 const char *valuename,
1124 const char ***array)
1126 /* just return if it is not the one we are looking for */
1127 if (strcmp(valuename, v->value_name) != 0) {
1128 return WERR_NOT_FOUND;
1131 if (v->type != REG_MULTI_SZ) {
1132 return WERR_INVALID_DATATYPE;
1135 if (!pull_reg_multi_sz(mem_ctx, v->data, array)) {
1142 static WERROR winreg_printer_write_date(TALLOC_CTX *mem_ctx,
1143 struct rpc_pipe_client *pipe_handle,
1144 struct policy_handle *key_handle,
1148 struct winreg_String wvalue;
1150 WERROR result = WERR_OK;
1156 t = nt_time_to_unix(data);
1158 str = talloc_asprintf(mem_ctx, "%02d/%02d/%04d",
1159 tm->tm_mon + 1, tm->tm_mday, tm->tm_year + 1900);
1164 wvalue.name = value;
1165 if (!push_reg_sz(mem_ctx, &blob, str)) {
1168 status = rpccli_winreg_SetValue(pipe_handle,
1176 if (!NT_STATUS_IS_OK(status)) {
1177 DEBUG(0, ("winreg_printer_write_date: Could not set value %s: %s\n",
1178 wvalue.name, win_errstr(result)));
1179 if (!W_ERROR_IS_OK(result)) {
1180 result = ntstatus_to_werror(status);
1187 static WERROR winreg_printer_date_to_NTTIME(const char *str, NTTIME *data)
1194 if (sscanf(str, "%d/%d/%d",
1195 &tm.tm_mon, &tm.tm_mday, &tm.tm_year) != 3) {
1196 return WERR_INVALID_PARAMETER;
1203 unix_to_nt_time(data, t);
1208 static WERROR winreg_printer_write_ver(TALLOC_CTX *mem_ctx,
1209 struct rpc_pipe_client *pipe_handle,
1210 struct policy_handle *key_handle,
1214 struct winreg_String wvalue;
1216 WERROR result = WERR_OK;
1220 /* FIXME: check format is right,
1221 * this needs to be something like: 6.1.7600.16385 */
1222 str = talloc_asprintf(mem_ctx, "%u.%u.%u.%u",
1223 (unsigned)((data >> 48) & 0xFFFF),
1224 (unsigned)((data >> 32) & 0xFFFF),
1225 (unsigned)((data >> 16) & 0xFFFF),
1226 (unsigned)(data & 0xFFFF));
1231 wvalue.name = value;
1232 if (!push_reg_sz(mem_ctx, &blob, str)) {
1235 status = rpccli_winreg_SetValue(pipe_handle,
1243 if (!NT_STATUS_IS_OK(status)) {
1244 DEBUG(0, ("winreg_printer_write_date: Could not set value %s: %s\n",
1245 wvalue.name, win_errstr(result)));
1246 if (!W_ERROR_IS_OK(result)) {
1247 result = ntstatus_to_werror(status);
1254 static WERROR winreg_printer_ver_to_dword(const char *str, uint64_t *data)
1256 unsigned int v1, v2, v3, v4;
1258 if (sscanf(str, "%u.%u.%u.%u", &v1, &v2, &v3, &v4) != 4) {
1259 return WERR_INVALID_PARAMETER;
1262 *data = ((uint64_t)(v1 & 0xFFFF) << 48) +
1263 ((uint64_t)(v2 & 0xFFFF) << 32) +
1264 ((uint64_t)(v3 & 0xFFFF) << 16) +
1265 (uint64_t)(v2 & 0xFFFF);
1270 /********************************************************************
1271 Public winreg function for spoolss
1272 ********************************************************************/
1274 WERROR winreg_create_printer(TALLOC_CTX *mem_ctx,
1275 struct auth_serversupplied_info *server_info,
1276 const char *servername,
1277 const char *sharename)
1279 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1280 struct rpc_pipe_client *winreg_pipe = NULL;
1281 struct policy_handle hive_hnd, key_hnd;
1282 struct spoolss_SetPrinterInfo2 *info2;
1283 struct security_descriptor *secdesc;
1284 struct winreg_String wkey, wkeyclass;
1286 const char *subkeys[] = { SPOOL_DSDRIVER_KEY, SPOOL_DSSPOOLER_KEY, SPOOL_PRINTERDATA_KEY };
1287 uint32_t i, count = ARRAY_SIZE(subkeys);
1288 uint32_t info2_mask = 0;
1289 WERROR result = WERR_OK;
1290 TALLOC_CTX *tmp_ctx;
1292 tmp_ctx = talloc_new(mem_ctx);
1293 if (tmp_ctx == NULL) {
1297 path = winreg_printer_data_keyname(tmp_ctx, sharename);
1299 TALLOC_FREE(tmp_ctx);
1303 ZERO_STRUCT(hive_hnd);
1304 ZERO_STRUCT(key_hnd);
1306 result = winreg_printer_openkey(tmp_ctx,
1315 if (W_ERROR_IS_OK(result)) {
1316 DEBUG(2, ("winreg_create_printer: Skipping, %s already exists\n", path));
1318 } else if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
1319 DEBUG(2, ("winreg_create_printer: Creating default values in %s\n", path));
1320 } else if (!W_ERROR_IS_OK(result)) {
1321 DEBUG(0, ("winreg_create_printer: Could not open key %s: %s\n",
1322 path, win_errstr(result)));
1326 /* Create the main key */
1327 result = winreg_printer_openkey(tmp_ctx,
1336 if (!W_ERROR_IS_OK(result)) {
1337 DEBUG(0, ("winreg_create_printer_keys: Could not create key %s: %s\n",
1338 path, win_errstr(result)));
1342 if (is_valid_policy_hnd(&key_hnd)) {
1343 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1346 /* Create subkeys */
1347 for (i = 0; i < count; i++) {
1349 enum winreg_CreateAction action = REG_ACTION_NONE;
1351 ZERO_STRUCT(key_hnd);
1354 wkey.name = talloc_asprintf(tmp_ctx, "%s\\%s", path, subkeys[i]);
1355 if (wkey.name == NULL) {
1356 result = WERR_NOMEM;
1360 ZERO_STRUCT(wkeyclass);
1361 wkeyclass.name = "";
1363 status = rpccli_winreg_CreateKey(winreg_pipe,
1374 if (!NT_STATUS_IS_OK(status)) {
1375 DEBUG(0, ("winreg_create_printer_keys: Could not create key %s: %s\n",
1376 wkey.name, win_errstr(result)));
1377 if (!W_ERROR_IS_OK(result)) {
1378 result = ntstatus_to_werror(status);
1385 const char *dnssuffix;
1386 const char *longname;
1387 const char *uncname;
1389 result = winreg_printer_write_sz(tmp_ctx,
1392 SPOOL_REG_PRINTERNAME,
1394 if (!W_ERROR_IS_OK(result)) {
1398 result = winreg_printer_write_sz(tmp_ctx,
1401 SPOOL_REG_SHORTSERVERNAME,
1403 if (!W_ERROR_IS_OK(result)) {
1407 /* We make the assumption that the netbios name
1408 * is the same as the DNS name since the former
1409 * will be what we used to join the domain
1411 dnssuffix = get_mydnsdomname(tmp_ctx);
1412 if (dnssuffix != NULL && dnssuffix[0] != '\0') {
1413 longname = talloc_asprintf(tmp_ctx, "%s.%s", global_myname(), dnssuffix);
1415 longname = talloc_strdup(tmp_ctx, global_myname());
1417 if (longname == NULL) {
1418 result = WERR_NOMEM;
1422 result = winreg_printer_write_sz(tmp_ctx,
1425 SPOOL_REG_SERVERNAME,
1427 if (!W_ERROR_IS_OK(result)) {
1431 uncname = talloc_asprintf(tmp_ctx, "\\\\%s\\%s",
1432 longname, sharename);
1433 if (uncname == NULL) {
1434 result = WERR_NOMEM;
1438 result = winreg_printer_write_sz(tmp_ctx,
1443 if (!W_ERROR_IS_OK(result)) {
1447 result = winreg_printer_write_dword(tmp_ctx,
1450 SPOOL_REG_VERSIONNUMBER,
1452 if (!W_ERROR_IS_OK(result)) {
1456 result = winreg_printer_write_dword(tmp_ctx,
1459 SPOOL_REG_PRINTSTARTTIME,
1461 if (!W_ERROR_IS_OK(result)) {
1465 result = winreg_printer_write_dword(tmp_ctx,
1468 SPOOL_REG_PRINTENDTIME,
1470 if (!W_ERROR_IS_OK(result)) {
1474 result = winreg_printer_write_dword(tmp_ctx,
1479 if (!W_ERROR_IS_OK(result)) {
1483 result = winreg_printer_write_dword(tmp_ctx,
1486 SPOOL_REG_PRINTKEEPPRINTEDJOBS,
1488 if (!W_ERROR_IS_OK(result)) {
1496 if (is_valid_policy_hnd(&key_hnd)) {
1497 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1500 info2 = talloc_zero(tmp_ctx, struct spoolss_SetPrinterInfo2);
1501 if (info2 == NULL) {
1502 result = WERR_NOMEM;
1506 if (servername != NULL) {
1507 info2->printername = talloc_asprintf(tmp_ctx, "\\\\%s\\%s",
1508 servername, sharename);
1510 info2->printername = sharename;
1512 if (info2->printername == NULL) {
1513 result = WERR_NOMEM;
1516 info2_mask |= SPOOLSS_PRINTER_INFO_PRINTERNAME;
1518 info2->sharename = sharename;
1519 info2_mask |= SPOOLSS_PRINTER_INFO_SHARENAME;
1521 info2->portname = SAMBA_PRINTER_PORT_NAME;
1522 info2_mask |= SPOOLSS_PRINTER_INFO_PORTNAME;
1524 info2->printprocessor = "winprint";
1525 info2_mask |= SPOOLSS_PRINTER_INFO_PRINTPROCESSOR;
1527 info2->datatype = "RAW";
1528 info2_mask |= SPOOLSS_PRINTER_INFO_DATATYPE;
1530 info2->comment = "";
1531 info2_mask |= SPOOLSS_PRINTER_INFO_COMMENT;
1533 info2->attributes = PRINTER_ATTRIBUTE_SAMBA;
1534 info2_mask |= SPOOLSS_PRINTER_INFO_ATTRIBUTES;
1536 info2->starttime = 0; /* Minutes since 12:00am GMT */
1537 info2_mask |= SPOOLSS_PRINTER_INFO_STARTTIME;
1539 info2->untiltime = 0; /* Minutes since 12:00am GMT */
1540 info2_mask |= SPOOLSS_PRINTER_INFO_UNTILTIME;
1542 info2->priority = 1;
1543 info2_mask |= SPOOLSS_PRINTER_INFO_PRIORITY;
1545 info2->defaultpriority = 1;
1546 info2_mask |= SPOOLSS_PRINTER_INFO_DEFAULTPRIORITY;
1548 result = spoolss_create_default_secdesc(tmp_ctx, &secdesc);
1549 if (!W_ERROR_IS_OK(result)) {
1552 info2_mask |= SPOOLSS_PRINTER_INFO_SECDESC;
1555 * Don't write a default Device Mode to the registry! The Device Mode is
1556 * only written to disk with a SetPrinter level 2 or 8.
1559 result = winreg_update_printer(tmp_ctx,
1568 if (winreg_pipe != NULL) {
1569 if (is_valid_policy_hnd(&key_hnd)) {
1570 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1572 if (is_valid_policy_hnd(&hive_hnd)) {
1573 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1577 talloc_free(tmp_ctx);
1581 WERROR winreg_update_printer(TALLOC_CTX *mem_ctx,
1582 struct auth_serversupplied_info *server_info,
1583 const char *sharename,
1584 uint32_t info2_mask,
1585 struct spoolss_SetPrinterInfo2 *info2,
1586 struct spoolss_DeviceMode *devmode,
1587 struct security_descriptor *secdesc)
1589 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1590 struct rpc_pipe_client *winreg_pipe = NULL;
1591 struct policy_handle hive_hnd, key_hnd;
1592 int snum = lp_servicenumber(sharename);
1593 enum ndr_err_code ndr_err;
1596 WERROR result = WERR_OK;
1597 TALLOC_CTX *tmp_ctx;
1599 tmp_ctx = talloc_new(mem_ctx);
1600 if (tmp_ctx == NULL) {
1604 path = winreg_printer_data_keyname(tmp_ctx, sharename);
1606 TALLOC_FREE(tmp_ctx);
1610 ZERO_STRUCT(hive_hnd);
1611 ZERO_STRUCT(key_hnd);
1613 result = winreg_printer_openkey(tmp_ctx,
1622 if (!W_ERROR_IS_OK(result)) {
1623 DEBUG(0, ("winreg_update_printer: Could not open key %s: %s\n",
1624 path, win_errstr(result)));
1628 if (info2_mask & SPOOLSS_PRINTER_INFO_ATTRIBUTES) {
1629 result = winreg_printer_write_dword(tmp_ctx,
1634 if (!W_ERROR_IS_OK(result)) {
1640 if (info2_mask & SPOOLSS_PRINTER_INFO_AVERAGEPPM) {
1641 result = winreg_printer_write_dword(tmp_ctx,
1646 if (!W_ERROR_IS_OK(result)) {
1652 if (info2_mask & SPOOLSS_PRINTER_INFO_COMMENT) {
1653 result = winreg_printer_write_sz(tmp_ctx,
1658 if (!W_ERROR_IS_OK(result)) {
1663 if (info2_mask & SPOOLSS_PRINTER_INFO_DATATYPE) {
1664 result = winreg_printer_write_sz(tmp_ctx,
1669 if (!W_ERROR_IS_OK(result)) {
1674 if (info2_mask & SPOOLSS_PRINTER_INFO_DEFAULTPRIORITY) {
1675 result = winreg_printer_write_dword(tmp_ctx,
1679 info2->defaultpriority);
1680 if (!W_ERROR_IS_OK(result)) {
1685 if (info2_mask & SPOOLSS_PRINTER_INFO_DEVMODE) {
1687 * Some client drivers freak out if there is a NULL devmode
1688 * (probably the driver is not checking before accessing
1689 * the devmode pointer) --jerry
1691 if (devmode == NULL && lp_default_devmode(snum) && info2 != NULL) {
1692 result = spoolss_create_default_devmode(tmp_ctx,
1695 if (!W_ERROR_IS_OK(result)) {
1699 ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, devmode,
1700 (ndr_push_flags_fn_t) ndr_push_spoolss_DeviceMode);
1701 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1702 DEBUG(0, ("winreg_update_printer: Failed to marshall device mode\n"));
1703 result = WERR_NOMEM;
1707 result = winreg_printer_write_binary(tmp_ctx,
1712 if (!W_ERROR_IS_OK(result)) {
1717 if (info2_mask & SPOOLSS_PRINTER_INFO_DRIVERNAME) {
1718 result = winreg_printer_write_sz(tmp_ctx,
1723 if (!W_ERROR_IS_OK(result)) {
1728 if (info2_mask & SPOOLSS_PRINTER_INFO_LOCATION) {
1729 result = winreg_printer_write_sz(tmp_ctx,
1734 if (!W_ERROR_IS_OK(result)) {
1739 if (info2_mask & SPOOLSS_PRINTER_INFO_PARAMETERS) {
1740 result = winreg_printer_write_sz(tmp_ctx,
1745 if (!W_ERROR_IS_OK(result)) {
1750 if (info2_mask & SPOOLSS_PRINTER_INFO_PORTNAME) {
1751 result = winreg_printer_write_sz(tmp_ctx,
1756 if (!W_ERROR_IS_OK(result)) {
1761 if (info2_mask & SPOOLSS_PRINTER_INFO_PRINTERNAME) {
1763 * in addprinter: no servername and the printer is the name
1764 * in setprinter: servername is \\server
1765 * and printer is \\server\\printer
1767 * Samba manages only local printers.
1768 * we currently don't support things like i
1769 * path=\\other_server\printer
1771 * We only store the printername, not \\server\printername
1773 const char *p = strrchr(info2->printername, '\\');
1775 p = info2->printername;
1779 result = winreg_printer_write_sz(tmp_ctx,
1784 if (!W_ERROR_IS_OK(result)) {
1789 if (info2_mask & SPOOLSS_PRINTER_INFO_PRINTPROCESSOR) {
1790 result = winreg_printer_write_sz(tmp_ctx,
1794 info2->printprocessor);
1795 if (!W_ERROR_IS_OK(result)) {
1800 if (info2_mask & SPOOLSS_PRINTER_INFO_PRIORITY) {
1801 result = winreg_printer_write_dword(tmp_ctx,
1806 if (!W_ERROR_IS_OK(result)) {
1811 if (info2_mask & SPOOLSS_PRINTER_INFO_SECDESC) {
1813 * We need a security descriptor, if it isn't specified by
1814 * AddPrinter{Ex} then create a default descriptor.
1816 if (secdesc == NULL) {
1817 result = spoolss_create_default_secdesc(tmp_ctx, &secdesc);
1818 if (!W_ERROR_IS_OK(result)) {
1822 result = winreg_set_printer_secdesc(tmp_ctx,
1826 if (!W_ERROR_IS_OK(result)) {
1831 if (info2_mask & SPOOLSS_PRINTER_INFO_SEPFILE) {
1832 result = winreg_printer_write_sz(tmp_ctx,
1837 if (!W_ERROR_IS_OK(result)) {
1842 if (info2_mask & SPOOLSS_PRINTER_INFO_SHARENAME) {
1843 result = winreg_printer_write_sz(tmp_ctx,
1848 if (!W_ERROR_IS_OK(result)) {
1853 if (info2_mask & SPOOLSS_PRINTER_INFO_STARTTIME) {
1854 result = winreg_printer_write_dword(tmp_ctx,
1859 if (!W_ERROR_IS_OK(result)) {
1864 if (info2_mask & SPOOLSS_PRINTER_INFO_STATUS) {
1865 result = winreg_printer_write_dword(tmp_ctx,
1870 if (!W_ERROR_IS_OK(result)) {
1875 if (info2_mask & SPOOLSS_PRINTER_INFO_UNTILTIME) {
1876 result = winreg_printer_write_dword(tmp_ctx,
1881 if (!W_ERROR_IS_OK(result)) {
1886 result = winreg_printer_write_dword(tmp_ctx,
1890 winreg_printer_rev_changeid());
1891 if (!W_ERROR_IS_OK(result)) {
1897 if (winreg_pipe != NULL) {
1898 if (is_valid_policy_hnd(&key_hnd)) {
1899 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
1901 if (is_valid_policy_hnd(&hive_hnd)) {
1902 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
1906 TALLOC_FREE(tmp_ctx);
1910 WERROR winreg_get_printer(TALLOC_CTX *mem_ctx,
1911 struct auth_serversupplied_info *server_info,
1912 const char *servername,
1913 const char *printer,
1914 struct spoolss_PrinterInfo2 **pinfo2)
1916 struct spoolss_PrinterInfo2 *info2;
1917 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
1918 struct rpc_pipe_client *winreg_pipe = NULL;
1919 struct policy_handle hive_hnd, key_hnd;
1920 struct spoolss_PrinterEnumValues *enum_values = NULL;
1921 struct spoolss_PrinterEnumValues *v;
1922 enum ndr_err_code ndr_err;
1924 int snum = lp_servicenumber(printer);
1925 uint32_t num_values = 0;
1928 WERROR result = WERR_OK;
1929 TALLOC_CTX *tmp_ctx;
1931 tmp_ctx = talloc_new(mem_ctx);
1932 if (tmp_ctx == NULL) {
1936 path = winreg_printer_data_keyname(tmp_ctx, printer);
1938 TALLOC_FREE(tmp_ctx);
1942 result = winreg_printer_openkey(tmp_ctx,
1951 if (!W_ERROR_IS_OK(result)) {
1952 DEBUG(0, ("winreg_get_printer: Could not open key %s: %s\n",
1953 path, win_errstr(result)));
1957 result = winreg_printer_enumvalues(tmp_ctx,
1962 if (!W_ERROR_IS_OK(result)) {
1963 DEBUG(0, ("winreg_get_printer: Could not enumerate values in %s: %s\n",
1964 path, win_errstr(result)));
1968 info2 = talloc_zero(tmp_ctx, struct spoolss_PrinterInfo2);
1969 if (info2 == NULL) {
1970 result = WERR_NOMEM;
1974 info2->servername = EMPTY_STRING;
1975 info2->printername = EMPTY_STRING;
1976 info2->sharename = EMPTY_STRING;
1977 info2->portname = EMPTY_STRING;
1978 info2->drivername = EMPTY_STRING;
1979 info2->comment = EMPTY_STRING;
1980 info2->location = EMPTY_STRING;
1981 info2->sepfile = EMPTY_STRING;
1982 info2->printprocessor = EMPTY_STRING;
1983 info2->datatype = EMPTY_STRING;
1984 info2->parameters = EMPTY_STRING;
1986 if (servername != NULL && servername[0] != '\0') {
1987 info2->servername = talloc_asprintf(info2, "\\\\%s", servername);
1988 if (info2->servername == NULL) {
1989 result = WERR_NOMEM;
1994 for (i = 0; i < num_values; i++) {
1995 v = &enum_values[i];
1997 result = winreg_enumval_to_sz(info2,
2000 &info2->printername);
2001 CHECK_ERROR(result);
2003 result = winreg_enumval_to_sz(info2,
2007 CHECK_ERROR(result);
2009 result = winreg_enumval_to_sz(info2,
2013 CHECK_ERROR(result);
2015 result = winreg_enumval_to_sz(info2,
2019 CHECK_ERROR(result);
2021 result = winreg_enumval_to_sz(info2,
2025 CHECK_ERROR(result);
2027 result = winreg_enumval_to_sz(info2,
2031 CHECK_ERROR(result);
2033 result = winreg_enumval_to_sz(info2,
2036 &info2->printprocessor);
2037 CHECK_ERROR(result);
2039 result = winreg_enumval_to_sz(info2,
2043 CHECK_ERROR(result);
2045 result = winreg_enumval_to_sz(info2,
2048 &info2->parameters);
2049 CHECK_ERROR(result);
2051 result = winreg_enumval_to_sz(info2,
2054 &info2->drivername);
2055 CHECK_ERROR(result);
2057 result = winreg_enumval_to_dword(info2,
2060 &info2->attributes);
2061 CHECK_ERROR(result);
2063 result = winreg_enumval_to_dword(info2,
2067 CHECK_ERROR(result);
2069 result = winreg_enumval_to_dword(info2,
2072 &info2->defaultpriority);
2073 CHECK_ERROR(result);
2075 result = winreg_enumval_to_dword(info2,
2079 CHECK_ERROR(result);
2081 result = winreg_enumval_to_dword(info2,
2085 CHECK_ERROR(result);
2087 result = winreg_enumval_to_dword(info2,
2091 CHECK_ERROR(result);
2093 result = winreg_enumval_to_dword(info2,
2097 CHECK_ERROR(result);
2100 if (!W_ERROR_IS_OK(result)) {
2101 DEBUG(0, ("winreg_get_printer: winreg_enumval_to_TYPE() failed "
2104 win_errstr(result)));
2108 /* Create the printername */
2109 if (info2->servername[0] != '\0') {
2110 if (lp_force_printername(snum)) {
2111 const char *p = talloc_asprintf(info2, "%s\\%s",
2115 result = WERR_NOMEM;
2118 info2->printername = p;
2120 char *p = talloc_asprintf(info2, "%s\\%s",
2122 info2->printername);
2124 result = WERR_NOMEM;
2127 info2->printername = p;
2131 /* Construct the Device Mode */
2132 result = winreg_printer_query_binary(tmp_ctx,
2137 if (W_ERROR_IS_OK(result)) {
2138 info2->devmode = talloc_zero(info2, struct spoolss_DeviceMode);
2139 if (info2->devmode == NULL) {
2140 result = WERR_NOMEM;
2143 ndr_err = ndr_pull_struct_blob(&blob,
2146 (ndr_pull_flags_fn_t) ndr_pull_spoolss_DeviceMode);
2147 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2148 DEBUG(0, ("winreg_get_printer: Failed to unmarshall device mode\n"));
2149 result = WERR_NOMEM;
2154 if (info2->devmode == NULL && lp_default_devmode(snum)) {
2155 result = spoolss_create_default_devmode(info2,
2158 if (!W_ERROR_IS_OK(result)) {
2163 if (info2->devmode != NULL) {
2164 info2->devmode->devicename = talloc_strdup(info2->devmode,
2165 info2->printername);
2166 if (info2->devmode->devicename == NULL) {
2167 DEBUG(0, ("winreg_get_printer: Failed to set devicename\n"));
2168 result = WERR_NOMEM;
2173 result = winreg_get_printer_secdesc(info2,
2177 if (!W_ERROR_IS_OK(result)) {
2182 *pinfo2 = talloc_move(mem_ctx, &info2);
2187 if (winreg_pipe != NULL) {
2188 if (is_valid_policy_hnd(&key_hnd)) {
2189 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2191 if (is_valid_policy_hnd(&hive_hnd)) {
2192 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2196 TALLOC_FREE(tmp_ctx);
2200 WERROR winreg_get_printer_secdesc(TALLOC_CTX *mem_ctx,
2201 struct auth_serversupplied_info *server_info,
2202 const char *sharename,
2203 struct spoolss_security_descriptor **psecdesc)
2205 struct spoolss_security_descriptor *secdesc;
2206 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2207 struct rpc_pipe_client *winreg_pipe = NULL;
2208 struct policy_handle hive_hnd, key_hnd;
2209 enum ndr_err_code ndr_err;
2212 TALLOC_CTX *tmp_ctx;
2215 tmp_ctx = talloc_new(mem_ctx);
2216 if (tmp_ctx == NULL) {
2220 path = winreg_printer_data_keyname(tmp_ctx, sharename);
2222 talloc_free(tmp_ctx);
2226 ZERO_STRUCT(hive_hnd);
2227 ZERO_STRUCT(key_hnd);
2229 result = winreg_printer_openkey(tmp_ctx,
2238 if (!W_ERROR_IS_OK(result)) {
2239 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
2240 goto create_default;
2245 result = winreg_printer_query_binary(tmp_ctx,
2250 if (!W_ERROR_IS_OK(result)) {
2251 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
2252 goto create_default;
2257 secdesc = talloc_zero(tmp_ctx, struct spoolss_security_descriptor);
2258 if (secdesc == NULL) {
2259 result = WERR_NOMEM;
2262 ndr_err = ndr_pull_struct_blob(&blob,
2265 (ndr_pull_flags_fn_t) ndr_pull_security_descriptor);
2266 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2267 DEBUG(0, ("winreg_get_secdesc: Failed to unmarshall security descriptor\n"));
2268 result = WERR_NOMEM;
2273 *psecdesc = talloc_move(mem_ctx, &secdesc);
2280 result = spoolss_create_default_secdesc(tmp_ctx, &secdesc);
2281 if (!W_ERROR_IS_OK(result)) {
2285 /* If security descriptor is owned by S-1-1-0 and winbindd is up,
2286 this security descriptor has been created when winbindd was
2287 down. Take ownership of security descriptor. */
2288 if (sid_equal(secdesc->owner_sid, &global_sid_World)) {
2291 /* Change sd owner to workgroup administrator */
2293 if (secrets_fetch_domain_sid(lp_workgroup(), &owner_sid)) {
2294 struct spoolss_security_descriptor *new_secdesc;
2298 sid_append_rid(&owner_sid, DOMAIN_RID_ADMINISTRATOR);
2300 new_secdesc = make_sec_desc(tmp_ctx,
2309 if (new_secdesc == NULL) {
2310 result = WERR_NOMEM;
2314 /* Swap with other one */
2315 secdesc = new_secdesc;
2319 ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, secdesc,
2320 (ndr_push_flags_fn_t) ndr_push_security_descriptor);
2321 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2322 DEBUG(0, ("winreg_set_secdesc: Failed to marshall security descriptor\n"));
2323 result = WERR_NOMEM;
2327 result = winreg_printer_write_binary(tmp_ctx,
2332 if (!W_ERROR_IS_OK(result)) {
2337 *psecdesc = talloc_move(mem_ctx, &secdesc);
2342 if (winreg_pipe != NULL) {
2343 if (is_valid_policy_hnd(&key_hnd)) {
2344 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2346 if (is_valid_policy_hnd(&hive_hnd)) {
2347 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2351 talloc_free(tmp_ctx);
2355 WERROR winreg_set_printer_secdesc(TALLOC_CTX *mem_ctx,
2356 struct auth_serversupplied_info *server_info,
2357 const char *sharename,
2358 const struct spoolss_security_descriptor *secdesc)
2360 const struct spoolss_security_descriptor *new_secdesc = secdesc;
2361 struct spoolss_security_descriptor *old_secdesc;
2362 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2363 struct rpc_pipe_client *winreg_pipe = NULL;
2364 struct policy_handle hive_hnd, key_hnd;
2365 enum ndr_err_code ndr_err;
2368 TALLOC_CTX *tmp_ctx;
2371 tmp_ctx = talloc_new(mem_ctx);
2372 if (tmp_ctx == NULL) {
2376 path = winreg_printer_data_keyname(tmp_ctx, sharename);
2378 talloc_free(tmp_ctx);
2383 * The old owner and group sids of the security descriptor are not
2384 * present when new ACEs are added or removed by changing printer
2385 * permissions through NT. If they are NULL in the new security
2386 * descriptor then copy them over from the old one.
2388 if (!secdesc->owner_sid || !secdesc->group_sid) {
2389 DOM_SID *owner_sid, *group_sid;
2390 SEC_ACL *dacl, *sacl;
2393 result = winreg_get_printer_secdesc(tmp_ctx,
2397 if (!W_ERROR_IS_OK(result)) {
2398 talloc_free(tmp_ctx);
2402 /* Pick out correct owner and group sids */
2403 owner_sid = secdesc->owner_sid ?
2404 secdesc->owner_sid :
2405 old_secdesc->owner_sid;
2407 group_sid = secdesc->group_sid ?
2408 secdesc->group_sid :
2409 old_secdesc->group_sid;
2411 dacl = secdesc->dacl ?
2415 sacl = secdesc->sacl ?
2419 /* Make a deep copy of the security descriptor */
2420 new_secdesc = make_sec_desc(tmp_ctx,
2428 if (new_secdesc == NULL) {
2429 talloc_free(tmp_ctx);
2434 ZERO_STRUCT(hive_hnd);
2435 ZERO_STRUCT(key_hnd);
2437 result = winreg_printer_openkey(tmp_ctx,
2446 if (!W_ERROR_IS_OK(result)) {
2450 ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, new_secdesc,
2451 (ndr_push_flags_fn_t) ndr_push_security_descriptor);
2452 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2453 DEBUG(0, ("winreg_set_secdesc: Failed to marshall security descriptor\n"));
2454 result = WERR_NOMEM;
2458 result = winreg_printer_write_binary(tmp_ctx,
2465 if (winreg_pipe != NULL) {
2466 if (is_valid_policy_hnd(&key_hnd)) {
2467 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2469 if (is_valid_policy_hnd(&hive_hnd)) {
2470 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2474 talloc_free(tmp_ctx);
2478 /* Set printer data over the winreg pipe. */
2479 WERROR winreg_set_printer_dataex(TALLOC_CTX *mem_ctx,
2480 struct auth_serversupplied_info *server_info,
2481 const char *printer,
2484 enum winreg_Type type,
2488 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2489 struct rpc_pipe_client *winreg_pipe = NULL;
2490 struct policy_handle hive_hnd, key_hnd;
2491 struct winreg_String wvalue;
2493 WERROR result = WERR_OK;
2495 TALLOC_CTX *tmp_ctx;
2497 tmp_ctx = talloc_new(mem_ctx);
2498 if (tmp_ctx == NULL) {
2502 path = winreg_printer_data_keyname(tmp_ctx, printer);
2504 TALLOC_FREE(tmp_ctx);
2508 ZERO_STRUCT(hive_hnd);
2509 ZERO_STRUCT(key_hnd);
2511 DEBUG(8, ("winreg_set_printer_dataex: Open printer key %s, value %s, access_mask: 0x%05x for [%s]\n",
2512 key, value, access_mask, printer));
2513 result = winreg_printer_openkey(tmp_ctx,
2522 if (!W_ERROR_IS_OK(result)) {
2523 DEBUG(0, ("winreg_set_printer_dataex: Could not open key %s: %s\n",
2524 key, win_errstr(result)));
2528 wvalue.name = value;
2529 status = rpccli_winreg_SetValue(winreg_pipe,
2537 if (!NT_STATUS_IS_OK(status)) {
2538 DEBUG(0, ("winreg_set_printer_dataex: Could not set value %s: %s\n",
2539 value, nt_errstr(status)));
2540 if (!W_ERROR_IS_OK(result)) {
2543 result = ntstatus_to_werror(status);
2549 if (winreg_pipe != NULL) {
2550 if (is_valid_policy_hnd(&key_hnd)) {
2551 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2553 if (is_valid_policy_hnd(&hive_hnd)) {
2554 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2558 TALLOC_FREE(tmp_ctx);
2562 /* Get printer data over a winreg pipe. */
2563 WERROR winreg_get_printer_dataex(TALLOC_CTX *mem_ctx,
2564 struct auth_serversupplied_info *server_info,
2565 const char *printer,
2568 enum winreg_Type *type,
2570 uint32_t *data_size)
2572 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2573 struct rpc_pipe_client *winreg_pipe = NULL;
2574 struct policy_handle hive_hnd, key_hnd;
2575 struct winreg_String wvalue;
2576 enum winreg_Type type_in;
2579 uint32_t data_in_size = 0;
2580 uint32_t value_len = 0;
2581 WERROR result = WERR_OK;
2583 TALLOC_CTX *tmp_ctx;
2585 tmp_ctx = talloc_new(mem_ctx);
2586 if (tmp_ctx == NULL) {
2590 path = winreg_printer_data_keyname(tmp_ctx, printer);
2592 TALLOC_FREE(tmp_ctx);
2596 ZERO_STRUCT(hive_hnd);
2597 ZERO_STRUCT(key_hnd);
2599 result = winreg_printer_openkey(tmp_ctx,
2608 if (!W_ERROR_IS_OK(result)) {
2609 DEBUG(0, ("winreg_get_printer_dataex: Could not open key %s: %s\n",
2610 key, win_errstr(result)));
2614 wvalue.name = value;
2617 * call QueryValue once with data == NULL to get the
2618 * needed memory size to be allocated, then allocate
2619 * data buffer and call again.
2621 status = rpccli_winreg_QueryValue(winreg_pipe,
2630 if (!NT_STATUS_IS_OK(status)) {
2631 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
2632 value, nt_errstr(status)));
2633 if (!W_ERROR_IS_OK(result)) {
2636 result = ntstatus_to_werror(status);
2640 data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
2641 if (data_in == NULL) {
2642 result = WERR_NOMEM;
2647 status = rpccli_winreg_QueryValue(winreg_pipe,
2656 if (!NT_STATUS_IS_OK(status)) {
2657 DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n",
2658 value, nt_errstr(status)));
2659 if (!W_ERROR_IS_OK(result)) {
2660 result = ntstatus_to_werror(status);
2666 *data_size = data_in_size;
2668 *data = talloc_move(mem_ctx, &data_in);
2673 if (winreg_pipe != NULL) {
2674 if (is_valid_policy_hnd(&key_hnd)) {
2675 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2677 if (is_valid_policy_hnd(&hive_hnd)) {
2678 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2682 TALLOC_FREE(tmp_ctx);
2686 /* Enumerate on the values of a given key and provide the data. */
2687 WERROR winreg_enum_printer_dataex(TALLOC_CTX *mem_ctx,
2688 struct auth_serversupplied_info *server_info,
2689 const char *printer,
2691 uint32_t *pnum_values,
2692 struct spoolss_PrinterEnumValues **penum_values)
2694 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2695 struct rpc_pipe_client *winreg_pipe = NULL;
2696 struct policy_handle hive_hnd, key_hnd;
2698 struct spoolss_PrinterEnumValues *enum_values = NULL;
2699 uint32_t num_values = 0;
2701 WERROR result = WERR_OK;
2703 TALLOC_CTX *tmp_ctx;
2705 tmp_ctx = talloc_new(mem_ctx);
2706 if (tmp_ctx == NULL) {
2710 path = winreg_printer_data_keyname(tmp_ctx, printer);
2712 TALLOC_FREE(tmp_ctx);
2716 result = winreg_printer_openkey(tmp_ctx,
2725 if (!W_ERROR_IS_OK(result)) {
2726 DEBUG(0, ("winreg_enum_printer_dataex: Could not open key %s: %s\n",
2727 key, win_errstr(result)));
2731 result = winreg_printer_enumvalues(tmp_ctx,
2736 if (!W_ERROR_IS_OK(result)) {
2737 DEBUG(0, ("winreg_enum_printer_dataex: Could not enumerate values in %s: %s\n",
2738 key, win_errstr(result)));
2742 *pnum_values = num_values;
2744 *penum_values = talloc_move(mem_ctx, &enum_values);
2749 if (winreg_pipe != NULL) {
2750 if (is_valid_policy_hnd(&key_hnd)) {
2751 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2753 if (is_valid_policy_hnd(&hive_hnd)) {
2754 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2758 TALLOC_FREE(tmp_ctx);
2762 /* Delete printer data over a winreg pipe. */
2763 WERROR winreg_delete_printer_dataex(TALLOC_CTX *mem_ctx,
2764 struct auth_serversupplied_info *server_info,
2765 const char *printer,
2769 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2770 struct rpc_pipe_client *winreg_pipe = NULL;
2771 struct policy_handle hive_hnd, key_hnd;
2772 struct winreg_String wvalue;
2774 WERROR result = WERR_OK;
2777 TALLOC_CTX *tmp_ctx;
2779 tmp_ctx = talloc_new(mem_ctx);
2780 if (tmp_ctx == NULL) {
2784 path = winreg_printer_data_keyname(tmp_ctx, printer);
2786 TALLOC_FREE(tmp_ctx);
2790 ZERO_STRUCT(hive_hnd);
2791 ZERO_STRUCT(key_hnd);
2793 result = winreg_printer_openkey(tmp_ctx,
2802 if (!W_ERROR_IS_OK(result)) {
2803 DEBUG(0, ("winreg_delete_printer_dataex: Could not open key %s: %s\n",
2804 key, win_errstr(result)));
2808 wvalue.name = value;
2809 status = rpccli_winreg_DeleteValue(winreg_pipe,
2814 if (!NT_STATUS_IS_OK(status)) {
2815 DEBUG(0, ("winreg_delete_printer_dataex: Could not delete value %s: %s\n",
2816 value, nt_errstr(status)));
2817 if (!W_ERROR_IS_OK(result)) {
2820 result = ntstatus_to_werror(status);
2826 if (winreg_pipe != NULL) {
2827 if (is_valid_policy_hnd(&key_hnd)) {
2828 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2830 if (is_valid_policy_hnd(&hive_hnd)) {
2831 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2835 TALLOC_FREE(tmp_ctx);
2839 /* Enumerate on the subkeys of a given key and provide the data. */
2840 WERROR winreg_enum_printer_key(TALLOC_CTX *mem_ctx,
2841 struct auth_serversupplied_info *server_info,
2842 const char *printer,
2844 uint32_t *pnum_subkeys,
2845 const char ***psubkeys)
2847 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2848 struct rpc_pipe_client *winreg_pipe = NULL;
2849 struct policy_handle hive_hnd, key_hnd;
2851 const char **subkeys = NULL;
2852 uint32_t num_subkeys = -1;
2854 WERROR result = WERR_OK;
2856 TALLOC_CTX *tmp_ctx;
2858 tmp_ctx = talloc_new(mem_ctx);
2859 if (tmp_ctx == NULL) {
2863 path = winreg_printer_data_keyname(tmp_ctx, printer);
2865 TALLOC_FREE(tmp_ctx);
2869 ZERO_STRUCT(hive_hnd);
2870 ZERO_STRUCT(key_hnd);
2872 result = winreg_printer_openkey(tmp_ctx,
2881 if (!W_ERROR_IS_OK(result)) {
2882 DEBUG(0, ("winreg_enum_printer_key: Could not open key %s: %s\n",
2883 key, win_errstr(result)));
2887 result = winreg_printer_enumkeys(tmp_ctx,
2892 if (!W_ERROR_IS_OK(result)) {
2893 DEBUG(0, ("winreg_enum_printer_key: Could not enumerate subkeys in %s: %s\n",
2894 key, win_errstr(result)));
2898 *pnum_subkeys = num_subkeys;
2900 *psubkeys = talloc_move(mem_ctx, &subkeys);
2905 if (winreg_pipe != NULL) {
2906 if (is_valid_policy_hnd(&key_hnd)) {
2907 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2909 if (is_valid_policy_hnd(&hive_hnd)) {
2910 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
2914 TALLOC_FREE(tmp_ctx);
2918 /* Delete a key with subkeys of a given printer. */
2919 WERROR winreg_delete_printer_key(TALLOC_CTX *mem_ctx,
2920 struct auth_serversupplied_info *server_info,
2921 const char *printer,
2924 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
2925 struct rpc_pipe_client *winreg_pipe = NULL;
2926 struct policy_handle hive_hnd, key_hnd;
2930 TALLOC_CTX *tmp_ctx;
2932 tmp_ctx = talloc_new(mem_ctx);
2933 if (tmp_ctx == NULL) {
2937 path = winreg_printer_data_keyname(tmp_ctx, printer);
2939 TALLOC_FREE(tmp_ctx);
2943 result = winreg_printer_openkey(tmp_ctx,
2952 if (!W_ERROR_IS_OK(result)) {
2953 /* key doesn't exist */
2954 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
2959 DEBUG(0, ("winreg_delete_printer_key: Could not open key %s: %s\n",
2960 key, win_errstr(result)));
2964 if (is_valid_policy_hnd(&key_hnd)) {
2965 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2968 if (key == NULL || key[0] == '\0') {
2971 keyname = talloc_asprintf(tmp_ctx,
2975 if (keyname == NULL) {
2976 result = WERR_NOMEM;
2981 result = winreg_printer_delete_subkeys(tmp_ctx,
2986 if (!W_ERROR_IS_OK(result)) {
2987 DEBUG(0, ("winreg_delete_printer_key: Could not delete key %s: %s\n",
2988 key, win_errstr(result)));
2993 if (winreg_pipe != NULL) {
2994 if (is_valid_policy_hnd(&key_hnd)) {
2995 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
2997 if (is_valid_policy_hnd(&hive_hnd)) {
2998 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3002 TALLOC_FREE(tmp_ctx);
3006 WERROR winreg_printer_update_changeid(TALLOC_CTX *mem_ctx,
3007 struct auth_serversupplied_info *server_info,
3008 const char *printer)
3010 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3011 struct rpc_pipe_client *winreg_pipe = NULL;
3012 struct policy_handle hive_hnd, key_hnd;
3015 TALLOC_CTX *tmp_ctx;
3017 tmp_ctx = talloc_new(mem_ctx);
3018 if (tmp_ctx == NULL) {
3022 path = winreg_printer_data_keyname(tmp_ctx, printer);
3024 TALLOC_FREE(tmp_ctx);
3028 ZERO_STRUCT(hive_hnd);
3029 ZERO_STRUCT(key_hnd);
3031 result = winreg_printer_openkey(tmp_ctx,
3040 if (!W_ERROR_IS_OK(result)) {
3041 DEBUG(0, ("winreg_printer_update_changeid: Could not open key %s: %s\n",
3042 path, win_errstr(result)));
3046 result = winreg_printer_write_dword(tmp_ctx,
3050 winreg_printer_rev_changeid());
3051 if (!W_ERROR_IS_OK(result)) {
3057 if (winreg_pipe != NULL) {
3058 if (is_valid_policy_hnd(&key_hnd)) {
3059 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3061 if (is_valid_policy_hnd(&hive_hnd)) {
3062 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3066 TALLOC_FREE(tmp_ctx);
3070 WERROR winreg_printer_get_changeid(TALLOC_CTX *mem_ctx,
3071 struct auth_serversupplied_info *server_info,
3072 const char *printer,
3073 uint32_t *pchangeid)
3075 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3076 struct rpc_pipe_client *winreg_pipe = NULL;
3077 struct policy_handle hive_hnd, key_hnd;
3078 uint32_t changeid = 0;
3081 TALLOC_CTX *tmp_ctx;
3083 tmp_ctx = talloc_new(mem_ctx);
3084 if (tmp_ctx == NULL) {
3088 path = winreg_printer_data_keyname(tmp_ctx, printer);
3090 TALLOC_FREE(tmp_ctx);
3094 ZERO_STRUCT(hive_hnd);
3095 ZERO_STRUCT(key_hnd);
3097 result = winreg_printer_openkey(tmp_ctx,
3106 if (!W_ERROR_IS_OK(result)) {
3107 DEBUG(0, ("winreg_printer_get_changeid: Could not open key %s: %s\n",
3108 path, win_errstr(result)));
3112 DEBUG(0, ("winreg_printer_get_changeid: get changeid from %s\n", path));
3113 result = winreg_printer_query_dword(tmp_ctx,
3118 if (!W_ERROR_IS_OK(result)) {
3123 *pchangeid = changeid;
3128 if (winreg_pipe != NULL) {
3129 if (is_valid_policy_hnd(&key_hnd)) {
3130 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3132 if (is_valid_policy_hnd(&hive_hnd)) {
3133 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3137 TALLOC_FREE(tmp_ctx);
3142 * The special behaviour of the spoolss forms is documented at the website:
3144 * Managing Win32 Printserver Forms
3145 * http://unixwiz.net/techtips/winspooler-forms.html
3148 WERROR winreg_printer_addform1(TALLOC_CTX *mem_ctx,
3149 struct auth_serversupplied_info *server_info,
3150 struct spoolss_AddFormInfo1 *form)
3152 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3153 struct rpc_pipe_client *winreg_pipe = NULL;
3154 struct policy_handle hive_hnd, key_hnd;
3155 struct winreg_String wvalue;
3157 uint32_t num_info = 0;
3158 union spoolss_FormInfo *info = NULL;
3162 TALLOC_CTX *tmp_ctx;
3164 tmp_ctx = talloc_new(mem_ctx);
3165 if (tmp_ctx == NULL) {
3169 ZERO_STRUCT(hive_hnd);
3170 ZERO_STRUCT(key_hnd);
3172 result = winreg_printer_openkey(tmp_ctx,
3175 TOP_LEVEL_CONTROL_FORMS_KEY,
3181 if (!W_ERROR_IS_OK(result)) {
3182 DEBUG(0, ("winreg_printer_addform1: Could not open key %s: %s\n",
3183 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3187 result = winreg_printer_enumforms1(tmp_ctx, server_info, &num_info, &info);
3188 if (!W_ERROR_IS_OK(result)) {
3189 DEBUG(0, ("winreg_printer_addform: Could not enum keys %s: %s\n",
3190 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3194 /* If form name already exists or is builtin return ALREADY_EXISTS */
3195 for (i = 0; i < num_info; i++) {
3196 if (strequal(info[i].info1.form_name, form->form_name)) {
3197 result = WERR_FILE_EXISTS;
3202 wvalue.name = form->form_name;
3204 blob = data_blob_talloc(tmp_ctx, NULL, 32);
3205 SIVAL(blob.data, 0, form->size.width);
3206 SIVAL(blob.data, 4, form->size.height);
3207 SIVAL(blob.data, 8, form->area.left);
3208 SIVAL(blob.data, 12, form->area.top);
3209 SIVAL(blob.data, 16, form->area.right);
3210 SIVAL(blob.data, 20, form->area.bottom);
3211 SIVAL(blob.data, 24, num_info + 1); /* FIXME */
3212 SIVAL(blob.data, 28, form->flags);
3214 status = rpccli_winreg_SetValue(winreg_pipe,
3222 if (!NT_STATUS_IS_OK(status)) {
3223 DEBUG(0, ("winreg_printer_addform1: Could not set value %s: %s\n",
3224 wvalue.name, nt_errstr(status)));
3225 if (!W_ERROR_IS_OK(result)) {
3228 result = ntstatus_to_werror(status);
3234 if (winreg_pipe != NULL) {
3235 if (is_valid_policy_hnd(&key_hnd)) {
3236 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3238 if (is_valid_policy_hnd(&hive_hnd)) {
3239 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3244 TALLOC_FREE(tmp_ctx);
3248 WERROR winreg_printer_enumforms1(TALLOC_CTX *mem_ctx,
3249 struct auth_serversupplied_info *server_info,
3250 uint32_t *pnum_info,
3251 union spoolss_FormInfo **pinfo)
3253 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3254 struct rpc_pipe_client *winreg_pipe = NULL;
3255 struct policy_handle hive_hnd, key_hnd;
3256 union spoolss_FormInfo *info;
3257 struct spoolss_PrinterEnumValues *enum_values = NULL;
3258 uint32_t num_values = 0;
3259 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3262 TALLOC_CTX *tmp_ctx;
3264 tmp_ctx = talloc_new(mem_ctx);
3265 if (tmp_ctx == NULL) {
3269 ZERO_STRUCT(hive_hnd);
3270 ZERO_STRUCT(key_hnd);
3272 result = winreg_printer_openkey(tmp_ctx,
3275 TOP_LEVEL_CONTROL_FORMS_KEY,
3281 if (!W_ERROR_IS_OK(result)) {
3282 /* key doesn't exist */
3283 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3288 DEBUG(0, ("winreg_printer_enumforms1: Could not open key %s: %s\n",
3289 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3293 result = winreg_printer_enumvalues(tmp_ctx,
3298 if (!W_ERROR_IS_OK(result)) {
3299 DEBUG(0, ("winreg_printer_enumforms1: Could not enumerate values in %s: %s\n",
3300 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3304 info = TALLOC_ARRAY(tmp_ctx, union spoolss_FormInfo, num_builtin + num_values);
3306 result = WERR_NOMEM;
3310 /* Enumerate BUILTIN forms */
3311 for (i = 0; i < num_builtin; i++) {
3312 info[i].info1 = builtin_forms1[i];
3315 /* Enumerate registry forms */
3316 for (i = 0; i < num_values; i++) {
3317 union spoolss_FormInfo val;
3319 if (enum_values[i].type != REG_BINARY ||
3320 enum_values[i].data_length != 32) {
3324 val.info1.form_name = talloc_strdup(info, enum_values[i].value_name);
3325 if (val.info1.form_name == NULL) {
3326 result = WERR_NOMEM;
3330 val.info1.size.width = IVAL(enum_values[i].data->data, 0);
3331 val.info1.size.height = IVAL(enum_values[i].data->data, 4);
3332 val.info1.area.left = IVAL(enum_values[i].data->data, 8);
3333 val.info1.area.top = IVAL(enum_values[i].data->data, 12);
3334 val.info1.area.right = IVAL(enum_values[i].data->data, 16);
3335 val.info1.area.bottom = IVAL(enum_values[i].data->data, 20);
3336 /* skip form index IVAL(enum_values[i].data->data, 24)));*/
3337 val.info1.flags = IVAL(enum_values[i].data->data, 28);
3339 info[i + num_builtin] = val;
3342 *pnum_info = num_builtin + num_values;
3344 *pinfo = talloc_move(mem_ctx, &info);
3348 if (winreg_pipe != NULL) {
3349 if (is_valid_policy_hnd(&key_hnd)) {
3350 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3352 if (is_valid_policy_hnd(&hive_hnd)) {
3353 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3357 TALLOC_FREE(enum_values);
3358 TALLOC_FREE(tmp_ctx);
3362 WERROR winreg_printer_deleteform1(TALLOC_CTX *mem_ctx,
3363 struct auth_serversupplied_info *server_info,
3364 const char *form_name)
3366 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3367 struct rpc_pipe_client *winreg_pipe = NULL;
3368 struct policy_handle hive_hnd, key_hnd;
3369 struct winreg_String wvalue;
3370 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3372 WERROR result = WERR_OK;
3374 TALLOC_CTX *tmp_ctx;
3376 for (i = 0; i < num_builtin; i++) {
3377 if (strequal(builtin_forms1[i].form_name, form_name)) {
3378 return WERR_INVALID_PARAMETER;
3382 tmp_ctx = talloc_new(mem_ctx);
3383 if (tmp_ctx == NULL) {
3387 ZERO_STRUCT(hive_hnd);
3388 ZERO_STRUCT(key_hnd);
3390 result = winreg_printer_openkey(tmp_ctx,
3393 TOP_LEVEL_CONTROL_FORMS_KEY,
3399 if (!W_ERROR_IS_OK(result)) {
3400 DEBUG(0, ("winreg_printer_deleteform1: Could not open key %s: %s\n",
3401 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3402 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3403 result = WERR_INVALID_FORM_NAME;
3408 wvalue.name = form_name;
3409 status = rpccli_winreg_DeleteValue(winreg_pipe,
3414 if (!NT_STATUS_IS_OK(status)) {
3415 /* If the value doesn't exist, return WERR_INVALID_FORM_NAME */
3416 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
3417 result = WERR_INVALID_FORM_NAME;
3420 DEBUG(0, ("winreg_printer_delteform1: Could not delete value %s: %s\n",
3421 wvalue.name, nt_errstr(status)));
3422 if (!W_ERROR_IS_OK(result)) {
3425 result = ntstatus_to_werror(status);
3431 if (winreg_pipe != NULL) {
3432 if (is_valid_policy_hnd(&key_hnd)) {
3433 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3435 if (is_valid_policy_hnd(&hive_hnd)) {
3436 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3440 TALLOC_FREE(tmp_ctx);
3444 WERROR winreg_printer_setform1(TALLOC_CTX *mem_ctx,
3445 struct auth_serversupplied_info *server_info,
3446 const char *form_name,
3447 struct spoolss_AddFormInfo1 *form)
3449 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3450 struct rpc_pipe_client *winreg_pipe = NULL;
3451 struct policy_handle hive_hnd, key_hnd;
3452 struct winreg_String wvalue;
3454 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3458 TALLOC_CTX *tmp_ctx = NULL;
3460 for (i = 0; i < num_builtin; i++) {
3461 if (strequal(builtin_forms1[i].form_name, form->form_name)) {
3462 result = WERR_INVALID_PARAM;
3467 tmp_ctx = talloc_new(mem_ctx);
3468 if (tmp_ctx == NULL) {
3472 ZERO_STRUCT(hive_hnd);
3473 ZERO_STRUCT(key_hnd);
3475 result = winreg_printer_openkey(tmp_ctx,
3478 TOP_LEVEL_CONTROL_FORMS_KEY,
3484 if (!W_ERROR_IS_OK(result)) {
3485 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
3486 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3490 /* If form_name != form->form_name then we renamed the form */
3491 if (strequal(form_name, form->form_name)) {
3492 result = winreg_printer_deleteform1(tmp_ctx, server_info, form_name);
3493 if (!W_ERROR_IS_OK(result)) {
3494 DEBUG(0, ("winreg_printer_setform1: Could not open key %s: %s\n",
3495 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3500 wvalue.name = form->form_name;
3502 blob = data_blob_talloc(tmp_ctx, NULL, 32);
3503 SIVAL(blob.data, 0, form->size.width);
3504 SIVAL(blob.data, 4, form->size.height);
3505 SIVAL(blob.data, 8, form->area.left);
3506 SIVAL(blob.data, 12, form->area.top);
3507 SIVAL(blob.data, 16, form->area.right);
3508 SIVAL(blob.data, 20, form->area.bottom);
3509 SIVAL(blob.data, 24, 42);
3510 SIVAL(blob.data, 28, form->flags);
3512 status = rpccli_winreg_SetValue(winreg_pipe,
3520 if (!NT_STATUS_IS_OK(status)) {
3521 DEBUG(0, ("winreg_printer_setform1: Could not set value %s: %s\n",
3522 wvalue.name, nt_errstr(status)));
3523 if (!W_ERROR_IS_OK(result)) {
3526 result = ntstatus_to_werror(status);
3532 if (winreg_pipe != NULL) {
3533 if (is_valid_policy_hnd(&key_hnd)) {
3534 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3536 if (is_valid_policy_hnd(&hive_hnd)) {
3537 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3541 TALLOC_FREE(tmp_ctx);
3545 WERROR winreg_printer_getform1(TALLOC_CTX *mem_ctx,
3546 struct auth_serversupplied_info *server_info,
3547 const char *form_name,
3548 struct spoolss_FormInfo1 *r)
3550 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3551 struct rpc_pipe_client *winreg_pipe = NULL;
3552 struct policy_handle hive_hnd, key_hnd;
3553 struct winreg_String wvalue;
3554 enum winreg_Type type_in;
3556 uint32_t data_in_size = 0;
3557 uint32_t value_len = 0;
3558 uint32_t num_builtin = ARRAY_SIZE(builtin_forms1);
3562 TALLOC_CTX *tmp_ctx;
3564 /* check builtin forms first */
3565 for (i = 0; i < num_builtin; i++) {
3566 if (strequal(builtin_forms1[i].form_name, form_name)) {
3567 *r = builtin_forms1[i];
3572 tmp_ctx = talloc_new(mem_ctx);
3573 if (tmp_ctx == NULL) {
3577 ZERO_STRUCT(hive_hnd);
3578 ZERO_STRUCT(key_hnd);
3580 result = winreg_printer_openkey(tmp_ctx,
3583 TOP_LEVEL_CONTROL_FORMS_KEY,
3589 if (!W_ERROR_IS_OK(result)) {
3590 DEBUG(0, ("winreg_printer_getform1: Could not open key %s: %s\n",
3591 TOP_LEVEL_CONTROL_FORMS_KEY, win_errstr(result)));
3595 wvalue.name = form_name;
3598 * call QueryValue once with data == NULL to get the
3599 * needed memory size to be allocated, then allocate
3600 * data buffer and call again.
3602 status = rpccli_winreg_QueryValue(winreg_pipe,
3611 if (!NT_STATUS_IS_OK(status)) {
3612 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
3613 wvalue.name, nt_errstr(status)));
3614 if (!W_ERROR_IS_OK(result)) {
3617 result = ntstatus_to_werror(status);
3621 data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size);
3622 if (data_in == NULL) {
3623 result = WERR_NOMEM;
3628 status = rpccli_winreg_QueryValue(winreg_pipe,
3637 if (!NT_STATUS_IS_OK(status)) {
3638 DEBUG(0, ("winreg_printer_getform1: Could not query value %s: %s\n",
3639 wvalue.name, nt_errstr(status)));
3640 if (!W_ERROR_IS_OK(result)) {
3643 result = ntstatus_to_werror(status);
3647 r->form_name = talloc_strdup(mem_ctx, form_name);
3648 if (r->form_name == NULL) {
3649 result = WERR_NOMEM;
3653 r->size.width = IVAL(data_in, 0);
3654 r->size.height = IVAL(data_in, 4);
3655 r->area.left = IVAL(data_in, 8);
3656 r->area.top = IVAL(data_in, 12);
3657 r->area.right = IVAL(data_in, 16);
3658 r->area.bottom = IVAL(data_in, 20);
3659 /* skip index IVAL(data_in, 24)));*/
3660 r->flags = IVAL(data_in, 28);
3664 if (winreg_pipe != NULL) {
3665 if (is_valid_policy_hnd(&key_hnd)) {
3666 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3668 if (is_valid_policy_hnd(&hive_hnd)) {
3669 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3673 TALLOC_FREE(tmp_ctx);
3677 WERROR winreg_add_driver(TALLOC_CTX *mem_ctx,
3678 struct auth_serversupplied_info *server_info,
3679 struct spoolss_AddDriverInfoCtr *r,
3680 const char **driver_name,
3681 uint32_t *driver_version)
3683 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3684 struct rpc_pipe_client *winreg_pipe = NULL;
3685 struct policy_handle hive_hnd, key_hnd;
3686 struct spoolss_DriverInfo8 info8;
3687 TALLOC_CTX *tmp_ctx = NULL;
3690 ZERO_STRUCT(hive_hnd);
3691 ZERO_STRUCT(key_hnd);
3694 if (!driver_info_ctr_to_info8(r, &info8)) {
3695 result = WERR_INVALID_PARAMETER;
3699 tmp_ctx = talloc_new(mem_ctx);
3700 if (tmp_ctx == NULL) {
3704 result = winreg_printer_opendriver(tmp_ctx,
3713 if (!W_ERROR_IS_OK(result)) {
3714 DEBUG(0, ("winreg_add_driver: "
3715 "Could not open driver key (%s,%s,%d): %s\n",
3716 info8.driver_name, info8.architecture,
3717 info8.version, win_errstr(result)));
3721 /* TODO: "Attributes" ? */
3723 result = winreg_printer_write_dword(tmp_ctx, winreg_pipe,
3724 &key_hnd, "Version",
3726 if (!W_ERROR_IS_OK(result)) {
3730 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3733 if (!W_ERROR_IS_OK(result)) {
3737 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3738 &key_hnd, "Data File",
3740 if (!W_ERROR_IS_OK(result)) {
3744 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3745 &key_hnd, "Configuration File",
3747 if (!W_ERROR_IS_OK(result)) {
3751 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3752 &key_hnd, "Help File",
3754 if (!W_ERROR_IS_OK(result)) {
3758 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3759 &key_hnd, "Dependent Files",
3760 info8.dependent_files);
3761 if (!W_ERROR_IS_OK(result)) {
3765 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3766 &key_hnd, "Monitor",
3767 info8.monitor_name);
3768 if (!W_ERROR_IS_OK(result)) {
3772 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3773 &key_hnd, "Datatype",
3774 info8.default_datatype);
3775 if (!W_ERROR_IS_OK(result)) {
3779 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3780 &key_hnd, "Previous Names",
3781 info8.previous_names);
3782 if (!W_ERROR_IS_OK(result)) {
3786 result = winreg_printer_write_date(tmp_ctx, winreg_pipe,
3787 &key_hnd, "DriverDate",
3789 if (!W_ERROR_IS_OK(result)) {
3793 result = winreg_printer_write_ver(tmp_ctx, winreg_pipe,
3794 &key_hnd, "DriverVersion",
3795 info8.driver_version);
3796 if (!W_ERROR_IS_OK(result)) {
3800 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3801 &key_hnd, "Manufacturer",
3802 info8.manufacturer_name);
3803 if (!W_ERROR_IS_OK(result)) {
3807 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3808 &key_hnd, "OEM URL",
3809 info8.manufacturer_url);
3810 if (!W_ERROR_IS_OK(result)) {
3814 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3815 &key_hnd, "HardwareID",
3817 if (!W_ERROR_IS_OK(result)) {
3821 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3822 &key_hnd, "Provider",
3824 if (!W_ERROR_IS_OK(result)) {
3828 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3829 &key_hnd, "Print Processor",
3830 info8.print_processor);
3831 if (!W_ERROR_IS_OK(result)) {
3835 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3836 &key_hnd, "VendorSetup",
3837 info8.vendor_setup);
3838 if (!W_ERROR_IS_OK(result)) {
3842 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3843 &key_hnd, "Color Profiles",
3844 info8.color_profiles);
3845 if (!W_ERROR_IS_OK(result)) {
3849 result = winreg_printer_write_sz(tmp_ctx, winreg_pipe,
3850 &key_hnd, "InfPath",
3852 if (!W_ERROR_IS_OK(result)) {
3856 result = winreg_printer_write_dword(tmp_ctx, winreg_pipe, &key_hnd,
3857 "PrinterDriverAttributes",
3858 info8.printer_driver_attributes);
3859 if (!W_ERROR_IS_OK(result)) {
3863 result = winreg_printer_write_multi_sz(tmp_ctx, winreg_pipe,
3864 &key_hnd, "CoreDependencies",
3865 info8.core_driver_dependencies);
3866 if (!W_ERROR_IS_OK(result)) {
3870 result = winreg_printer_write_date(tmp_ctx, winreg_pipe,
3871 &key_hnd, "MinInboxDriverVerDate",
3872 info8.min_inbox_driver_ver_date);
3873 if (!W_ERROR_IS_OK(result)) {
3877 result = winreg_printer_write_ver(tmp_ctx, winreg_pipe, &key_hnd,
3878 "MinInboxDriverVerVersion",
3879 info8.min_inbox_driver_ver_version);
3880 if (!W_ERROR_IS_OK(result)) {
3884 *driver_name = info8.driver_name;
3885 *driver_version = info8.version;
3888 if (winreg_pipe != NULL) {
3889 if (is_valid_policy_hnd(&key_hnd)) {
3890 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
3892 if (is_valid_policy_hnd(&hive_hnd)) {
3893 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
3897 TALLOC_FREE(tmp_ctx);
3901 WERROR winreg_get_driver(TALLOC_CTX *mem_ctx,
3902 struct auth_serversupplied_info *server_info,
3903 const char *architecture,
3904 const char *driver_name,
3905 uint32_t driver_version,
3906 struct spoolss_DriverInfo8 **_info8)
3908 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
3909 struct rpc_pipe_client *winreg_pipe = NULL;
3910 struct policy_handle hive_hnd, key_hnd;
3911 struct spoolss_DriverInfo8 i8, *info8;
3912 struct spoolss_PrinterEnumValues *enum_values = NULL;
3913 struct spoolss_PrinterEnumValues *v;
3914 uint32_t num_values = 0;
3915 TALLOC_CTX *tmp_ctx;
3919 ZERO_STRUCT(hive_hnd);
3920 ZERO_STRUCT(key_hnd);
3923 tmp_ctx = talloc_new(mem_ctx);
3924 if (tmp_ctx == NULL) {
3928 if (driver_version == DRIVER_ANY_VERSION) {
3929 /* look for Win2k first and then for NT4 */
3930 result = winreg_printer_opendriver(tmp_ctx,
3939 if (!W_ERROR_IS_OK(result)) {
3940 result = winreg_printer_opendriver(tmp_ctx,
3951 /* ok normal case */
3952 result = winreg_printer_opendriver(tmp_ctx,
3962 if (!W_ERROR_IS_OK(result)) {
3963 DEBUG(5, ("winreg_get_driver: "
3964 "Could not open driver key (%s,%s,%d): %s\n",
3965 driver_name, architecture,
3966 driver_version, win_errstr(result)));
3970 result = winreg_printer_enumvalues(tmp_ctx,
3975 if (!W_ERROR_IS_OK(result)) {
3976 DEBUG(0, ("winreg_get_driver: "
3977 "Could not enumerate values for (%s,%s,%d): %s\n",
3978 driver_name, architecture,
3979 driver_version, win_errstr(result)));
3983 info8 = talloc_zero(tmp_ctx, struct spoolss_DriverInfo8);
3984 if (info8 == NULL) {
3985 result = WERR_NOMEM;
3989 info8->driver_name = talloc_strdup(info8, driver_name);
3990 if (info8->driver_name == NULL) {
3991 result = WERR_NOMEM;
3995 info8->architecture = talloc_strdup(info8, architecture);
3996 if (info8->architecture == NULL) {
3997 result = WERR_NOMEM;
4001 info8->config_file = EMPTY_STRING;
4002 info8->data_file = EMPTY_STRING;
4003 info8->default_datatype = EMPTY_STRING;
4004 info8->driver_path = EMPTY_STRING;
4005 info8->hardware_id = EMPTY_STRING;
4006 info8->help_file = EMPTY_STRING;
4007 info8->inf_path = EMPTY_STRING;
4008 info8->manufacturer_name = EMPTY_STRING;
4009 info8->manufacturer_url = EMPTY_STRING;
4010 info8->monitor_name = EMPTY_STRING;
4011 info8->print_processor = EMPTY_STRING;
4012 info8->provider = EMPTY_STRING;
4013 info8->vendor_setup = EMPTY_STRING;
4015 info8->color_profiles = empty_string_array;
4016 info8->core_driver_dependencies = EMPTY_STRING_ARRAY;
4017 info8->dependent_files = EMPTY_STRING_ARRAY;
4018 info8->previous_names = EMPTY_STRING_ARRAY;
4022 for (i = 0; i < num_values; i++) {
4023 const char *tmp_str;
4025 v = &enum_values[i];
4027 result = winreg_enumval_to_dword(info8, v,
4030 CHECK_ERROR(result);
4032 result = winreg_enumval_to_sz(info8, v,
4034 &info8->driver_path);
4035 CHECK_ERROR(result);
4037 result = winreg_enumval_to_sz(info8, v,
4040 CHECK_ERROR(result);
4042 result = winreg_enumval_to_sz(info8, v,
4043 "Configuration File",
4044 &info8->config_file);
4045 CHECK_ERROR(result);
4047 result = winreg_enumval_to_sz(info8, v,
4050 CHECK_ERROR(result);
4052 result = winreg_enumval_to_multi_sz(info8, v,
4054 &info8->dependent_files);
4055 CHECK_ERROR(result);
4057 result = winreg_enumval_to_sz(info8, v,
4059 &info8->monitor_name);
4060 CHECK_ERROR(result);
4062 result = winreg_enumval_to_sz(info8, v,
4064 &info8->default_datatype);
4065 CHECK_ERROR(result);
4067 result = winreg_enumval_to_multi_sz(info8, v,
4069 &info8->previous_names);
4070 CHECK_ERROR(result);
4072 result = winreg_enumval_to_sz(info8, v,
4075 if (W_ERROR_IS_OK(result)) {
4076 result = winreg_printer_date_to_NTTIME(tmp_str,
4077 &info8->driver_date);
4079 CHECK_ERROR(result);
4081 result = winreg_enumval_to_sz(info8, v,
4084 if (W_ERROR_IS_OK(result)) {
4085 result = winreg_printer_ver_to_dword(tmp_str,
4086 &info8->driver_version);
4088 CHECK_ERROR(result);
4090 result = winreg_enumval_to_sz(info8, v,
4092 &info8->manufacturer_name);
4093 CHECK_ERROR(result);
4095 result = winreg_enumval_to_sz(info8, v,
4097 &info8->manufacturer_url);
4098 CHECK_ERROR(result);
4100 result = winreg_enumval_to_sz(info8, v,
4102 &info8->hardware_id);
4103 CHECK_ERROR(result);
4105 result = winreg_enumval_to_sz(info8, v,
4108 CHECK_ERROR(result);
4110 result = winreg_enumval_to_sz(info8, v,
4112 &info8->print_processor);
4113 CHECK_ERROR(result);
4115 result = winreg_enumval_to_sz(info8, v,
4117 &info8->vendor_setup);
4118 CHECK_ERROR(result);
4120 result = winreg_enumval_to_multi_sz(info8, v,
4122 &info8->color_profiles);
4123 CHECK_ERROR(result);
4125 result = winreg_enumval_to_sz(info8, v,
4128 CHECK_ERROR(result);
4130 result = winreg_enumval_to_dword(info8, v,
4131 "PrinterDriverAttributes",
4132 &info8->printer_driver_attributes);
4133 CHECK_ERROR(result);
4135 result = winreg_enumval_to_multi_sz(info8, v,
4137 &info8->core_driver_dependencies);
4138 CHECK_ERROR(result);
4140 result = winreg_enumval_to_sz(info8, v,
4141 "MinInboxDriverVerDate",
4143 if (W_ERROR_IS_OK(result)) {
4144 result = winreg_printer_date_to_NTTIME(tmp_str,
4145 &info8->min_inbox_driver_ver_date);
4147 CHECK_ERROR(result);
4149 result = winreg_enumval_to_sz(info8, v,
4150 "MinInboxDriverVerVersion",
4152 if (W_ERROR_IS_OK(result)) {
4153 result = winreg_printer_ver_to_dword(tmp_str,
4154 &info8->min_inbox_driver_ver_version);
4156 CHECK_ERROR(result);
4159 if (!W_ERROR_IS_OK(result)) {
4160 DEBUG(0, ("winreg_enumval_to_TYPE() failed "
4161 "for %s: %s\n", v->value_name,
4162 win_errstr(result)));
4166 *_info8 = talloc_steal(mem_ctx, info8);
4169 if (winreg_pipe != NULL) {
4170 if (is_valid_policy_hnd(&key_hnd)) {
4171 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
4173 if (is_valid_policy_hnd(&hive_hnd)) {
4174 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
4178 TALLOC_FREE(tmp_ctx);
4182 WERROR winreg_del_driver(TALLOC_CTX *mem_ctx,
4183 struct auth_serversupplied_info *server_info,
4184 struct spoolss_DriverInfo8 *info8,
4187 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
4188 struct rpc_pipe_client *winreg_pipe = NULL;
4189 struct policy_handle hive_hnd, key_hnd;
4190 TALLOC_CTX *tmp_ctx;
4194 ZERO_STRUCT(hive_hnd);
4195 ZERO_STRUCT(key_hnd);
4197 tmp_ctx = talloc_new(mem_ctx);
4198 if (tmp_ctx == NULL) {
4202 /* test that the key exists */
4203 result = winreg_printer_opendriver(tmp_ctx,
4206 info8->architecture,
4212 if (!W_ERROR_IS_OK(result)) {
4213 /* key doesn't exist */
4214 if (W_ERROR_EQUAL(result, WERR_BADFILE)) {
4219 DEBUG(5, ("winreg_del_driver: "
4220 "Could not open driver (%s,%s,%u): %s\n",
4221 info8->driver_name, info8->architecture,
4222 version, win_errstr(result)));
4227 if (is_valid_policy_hnd(&key_hnd)) {
4228 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
4231 key_name = talloc_asprintf(tmp_ctx,
4232 "%s\\Environments\\%s\\Drivers\\Version-%u",
4233 TOP_LEVEL_CONTROL_KEY,
4234 info8->architecture, version);
4235 if (key_name == NULL) {
4236 result = WERR_NOMEM;
4240 result = winreg_printer_delete_subkeys(tmp_ctx,
4245 if (!W_ERROR_IS_OK(result)) {
4246 DEBUG(0, ("winreg_del_driver: "
4247 "Could not open driver (%s,%s,%u): %s\n",
4248 info8->driver_name, info8->architecture,
4249 version, win_errstr(result)));
4255 if (winreg_pipe != NULL) {
4256 if (is_valid_policy_hnd(&key_hnd)) {
4257 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
4259 if (is_valid_policy_hnd(&hive_hnd)) {
4260 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
4264 TALLOC_FREE(tmp_ctx);
4268 WERROR winreg_get_driver_list(TALLOC_CTX *mem_ctx,
4269 struct auth_serversupplied_info *server_info,
4270 const char *architecture,
4272 uint32_t *num_drivers,
4273 const char ***drivers_p)
4275 uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
4276 struct rpc_pipe_client *winreg_pipe = NULL;
4277 struct policy_handle hive_hnd, key_hnd;
4278 const char **drivers;
4279 TALLOC_CTX *tmp_ctx;
4285 ZERO_STRUCT(hive_hnd);
4286 ZERO_STRUCT(key_hnd);
4288 tmp_ctx = talloc_new(mem_ctx);
4289 if (tmp_ctx == NULL) {
4293 /* use NULL for the driver name so we open the key that is
4294 * parent of all drivers for this architecture and version */
4295 result = winreg_printer_opendriver(tmp_ctx,
4304 if (!W_ERROR_IS_OK(result)) {
4305 DEBUG(5, ("winreg_get_driver_list: "
4306 "Could not open key (%s,%u): %s\n",
4307 architecture, version, win_errstr(result)));
4312 result = winreg_printer_enumkeys(tmp_ctx,
4317 if (!W_ERROR_IS_OK(result)) {
4318 DEBUG(0, ("winreg_get_driver_list: "
4319 "Could not enumerate drivers for (%s,%u): %s\n",
4320 architecture, version, win_errstr(result)));
4324 *drivers_p = talloc_steal(mem_ctx, drivers);
4328 if (winreg_pipe != NULL) {
4329 if (is_valid_policy_hnd(&key_hnd)) {
4330 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL);
4332 if (is_valid_policy_hnd(&hive_hnd)) {
4333 rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL);
4337 TALLOC_FREE(tmp_ctx);