/* * Unix SMB/CIFS implementation. * * SPOOLSS RPC Pipe server / winreg client routines * * Copyright (c) 2010 Andreas Schneider * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, see . */ #include "includes.h" #include "srv_spoolss_util.h" #include "../librpc/gen_ndr/srv_winreg.h" #include "../librpc/gen_ndr/cli_winreg.h" /** * @internal * * @brief Connect to the interal winreg server and open the given printer key. * * The function will create the needed subkeys if they don't exist. * * @param[in] mem_ctx The memory context to use. * * @param[in] server_info The supplied server info. * * @param[out] winreg_pipe A pointer for the winreg rpc client pipe. * * @param[in] name The name of the printer. * * @param[in] key The key to open. * * @param[in] create_key Set to true if the key should be created if it * doesn't exist. * * @param[in] access_mask The access mask to open the key. * * @param[out] hive_handle A policy handle for the opened hive. * * @param[out] key_handle A policy handle for the opened key. * * @return WERR_OK on success, the corresponding DOS error * code if something gone wrong. */ static WERROR winreg_printer_openkey(TALLOC_CTX *mem_ctx, struct auth_serversupplied_info *server_info, struct rpc_pipe_client **winreg_pipe, const char *name, const char *key, bool create_key, uint32_t access_mask, struct policy_handle *hive_handle, struct policy_handle *key_handle) { struct rpc_pipe_client *pipe_handle; struct winreg_String wkey, wkeyclass; char *keyname; NTSTATUS status; WERROR result = WERR_OK; /* create winreg connection */ status = rpc_pipe_open_internal(mem_ctx, &ndr_table_winreg.syntax_id, rpc_winreg_dispatch, server_info, &pipe_handle); if (!NT_STATUS_IS_OK(status)) { DEBUG(0, ("winreg_printer_openkey: Could not connect to winreg_pipe: %s\n", nt_errstr(status))); return ntstatus_to_werror(status); } status = rpccli_winreg_OpenHKLM(pipe_handle, mem_ctx, NULL, access_mask, hive_handle, &result); if (!NT_STATUS_IS_OK(status)) { DEBUG(0, ("winreg_printer_openkey: Could not open HKLM hive: %s\n", nt_errstr(status))); talloc_free(pipe_handle); if (!W_ERROR_IS_OK(result)) { return result; } return ntstatus_to_werror(status); } if (key && *key) { keyname = talloc_asprintf(mem_ctx, "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print\\Printers\\%s\\%s", name, key); } else { keyname = talloc_asprintf(mem_ctx, "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print\\Printers\\%s", name); } if (keyname == NULL) { talloc_free(pipe_handle); return WERR_NOMEM; } ZERO_STRUCT(wkey); wkey.name = keyname; if (create_key) { enum winreg_CreateAction action = REG_ACTION_NONE; ZERO_STRUCT(wkeyclass); wkeyclass.name = ""; status = rpccli_winreg_CreateKey(pipe_handle, mem_ctx, hive_handle, wkey, wkeyclass, 0, access_mask, NULL, key_handle, &action, &result); switch (action) { case REG_ACTION_NONE: DEBUG(8, ("winreg_printer_openkey:createkey did nothing -- huh?\n")); break; case REG_CREATED_NEW_KEY: DEBUG(8, ("winreg_printer_openkey: createkey created %s\n", keyname)); break; case REG_OPENED_EXISTING_KEY: DEBUG(8, ("winreg_printer_openkey: createkey opened existing %s\n", keyname)); break; } } else { status = rpccli_winreg_OpenKey(pipe_handle, mem_ctx, hive_handle, wkey, 0, access_mask, key_handle, &result); } if (!NT_STATUS_IS_OK(status)) { talloc_free(pipe_handle); if (!W_ERROR_IS_OK(result)) { return result; } return ntstatus_to_werror(status); } *winreg_pipe = pipe_handle; return WERR_OK; } /* Set printer data over the winreg pipe. */ WERROR winreg_set_printer_dataex(struct pipes_struct *p, const char *printer, const char *key, const char *value, enum winreg_Type type, uint8_t *data, uint32_t data_size) { uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED; struct rpc_pipe_client *winreg_pipe = NULL; struct policy_handle hive_hnd, key_hnd; struct winreg_String wvalue; WERROR result = WERR_OK; NTSTATUS status; TALLOC_CTX *tmp_ctx; tmp_ctx = talloc_new(p->mem_ctx); if (tmp_ctx == NULL) { return WERR_NOMEM; } ZERO_STRUCT(hive_hnd); ZERO_STRUCT(key_hnd); DEBUG(8, ("winreg_set_printer_dataex: Open printer key %s, value %s, access_mask: 0x%05x for [%s]\n", key, value, access_mask, printer)); result = winreg_printer_openkey(tmp_ctx, p->server_info, &winreg_pipe, printer, key, true, access_mask, &hive_hnd, &key_hnd); if (!W_ERROR_IS_OK(result)) { DEBUG(0, ("winreg_set_printer_dataex: Could not open key %s: %s\n", key, win_errstr(result))); goto done; } wvalue.name = value; status = rpccli_winreg_SetValue(winreg_pipe, tmp_ctx, &key_hnd, wvalue, type, data, data_size, &result); if (!NT_STATUS_IS_OK(status)) { DEBUG(0, ("winreg_set_printer_dataex: Could not set value %s: %s\n", value, nt_errstr(status))); if (!W_ERROR_IS_OK(result)) { goto done; } result = ntstatus_to_werror(status); goto done; } result = WERR_OK; done: if (winreg_pipe != NULL) { if (is_valid_policy_hnd(&key_hnd)) { rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL); } if (is_valid_policy_hnd(&hive_hnd)) { rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL); } } TALLOC_FREE(tmp_ctx); return result; } /* Get printer data over a winreg pipe. */ WERROR winreg_get_printer_dataex(struct pipes_struct *p, const char *printer, const char *key, const char *value, enum winreg_Type *type, uint8_t **data, uint32_t *data_size) { uint32_t access_mask = SEC_FLAG_MAXIMUM_ALLOWED; struct rpc_pipe_client *winreg_pipe = NULL; struct policy_handle hive_hnd, key_hnd; struct winreg_String wvalue; enum winreg_Type type_in; uint8_t *data_in; uint32_t data_in_size = 0; uint32_t value_len = 0; WERROR result = WERR_OK; NTSTATUS status; TALLOC_CTX *tmp_ctx; tmp_ctx = talloc_new(p->mem_ctx); if (tmp_ctx == NULL) { return WERR_NOMEM; } ZERO_STRUCT(hive_hnd); ZERO_STRUCT(key_hnd); result = winreg_printer_openkey(tmp_ctx, p->server_info, &winreg_pipe, printer, key, false, access_mask, &hive_hnd, &key_hnd); if (!W_ERROR_IS_OK(result)) { DEBUG(0, ("winreg_get_printer_dataex: Could not open key %s: %s\n", key, win_errstr(result))); goto done; } wvalue.name = value; /* * call QueryValue once with data == NULL to get the * needed memory size to be allocated, then allocate * data buffer and call again. */ status = rpccli_winreg_QueryValue(winreg_pipe, tmp_ctx, &key_hnd, &wvalue, &type_in, NULL, &data_in_size, &value_len, &result); if (!NT_STATUS_IS_OK(status)) { DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n", value, nt_errstr(status))); if (!W_ERROR_IS_OK(result)) { goto done; } result = ntstatus_to_werror(status); goto done; } data_in = (uint8_t *) TALLOC(tmp_ctx, data_in_size); if (data_in == NULL) { result = WERR_NOMEM; goto done; } value_len = 0; status = rpccli_winreg_QueryValue(winreg_pipe, tmp_ctx, &key_hnd, &wvalue, &type_in, data_in, &data_in_size, &value_len, &result); if (!NT_STATUS_IS_OK(status)) { DEBUG(0, ("winreg_get_printer_dataex: Could not query value %s: %s\n", value, nt_errstr(status))); if (!W_ERROR_IS_OK(result)) { result = ntstatus_to_werror(status); } goto done; } *type = type_in; *data_size = data_in_size; if (data_in_size) { *data = talloc_move(p->mem_ctx, &data_in); } result = WERR_OK; done: if (winreg_pipe != NULL) { if (is_valid_policy_hnd(&key_hnd)) { rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &key_hnd, NULL); } if (is_valid_policy_hnd(&hive_hnd)) { rpccli_winreg_CloseKey(winreg_pipe, tmp_ctx, &hive_hnd, NULL); } } TALLOC_FREE(tmp_ctx); return result; }