|
|
#pragma once
# ifdef __cplusplus
extern "C" { # endif
PVOID MIDL_user_allocate(size_t NumBytes);
VOID MIDL_user_free(void * MemPointer);
//---------------------------------------
// Macros for handling additional attributes on WZC_WLAN_CONFIG structures
// Coding of additional attributes in the Reserved bytes of WZC_WLAN_CONFIG objects:
// Reserved
// [1] [0]
// ---SSSAA CCCCCCCC
// SSS = [0-7; used: 0-6] selection set category, one of VPI, VI, PI, VPA, VA, PA, N
// AA = [0-3; used: 0-3] authentication mode, NDIS_802_11_AUTHENTICATION_MODE value
// CCCCCCCC = [0-255] retry counter for this object.
//
#define NWB_AUTHMODE_MASK 0x03
#define NWB_SELCATEG_MASK 0x1C
#define NWB_SET_AUTHMODE(pNWB, nAM) (pNWB)->Reserved[1] = (((pNWB)->Reserved[1] & ~NWB_AUTHMODE_MASK) | ((nAM) & NWB_AUTHMODE_MASK))
#define NWB_GET_AUTHMODE(pNWB) ((pNWB)->Reserved[1] & NWB_AUTHMODE_MASK)
#define NWB_SET_SELCATEG(pNWB, nSC) (pNWB)->Reserved[1] = (((pNWB)->Reserved[1] & ~NWB_SELCATEG_MASK) | (((nSC)<<2) & NWB_SELCATEG_MASK))
#define NWB_GET_SELCATEG(pNWB) (((pNWB)->Reserved[1] & NWB_SELCATEG_MASK)>>2)
//---------------------------------------
// [P]RAW_DATA: generic description of a BLOB
typedef struct { DWORD dwDataLen; #if defined(MIDL_PASS)
[unique, size_is(dwDataLen)] LPBYTE pData; #else
LPBYTE pData; #endif
} RAW_DATA, *PRAW_DATA;
#if !defined(MIDL_PASS)
#include <ntddndis.h>
#define WZCCTL_MAX_WEPK_MATERIAL 32
#define WZCCTL_WEPK_PRESENT 0x0001 // specifies whether the configuration includes or not a WEP key
#define WZCCTL_WEPK_XFORMAT 0x0002 // the WEP Key material (if any) is entered as hexadecimal digits
#define WZCCTL_VOLATILE 0x0004 // this configuration should not be stored
#define WZCCTL_POLICY 0x0008 // this configuration is enforced by the policy
//---------------------------------------
// [P]WZC_WLAN_CONFIG: like NDIS_WLAN_BSSID, but contains all the additional
// data that defines a [Preferred] Wireless Zero Configuration
typedef struct { ULONG Length; // Length of this structure
DWORD dwCtlFlags; // control flags (NON-NDIS) see WZC_WEPK* constants
// fields from the NDIS_WLAN_BSSID structure
NDIS_802_11_MAC_ADDRESS MacAddress; // BSSID
UCHAR Reserved[2]; NDIS_802_11_SSID Ssid; // SSID
ULONG Privacy; // WEP encryption requirement
NDIS_802_11_RSSI Rssi; // receive signal strength in dBm
NDIS_802_11_NETWORK_TYPE NetworkTypeInUse; NDIS_802_11_CONFIGURATION Configuration; NDIS_802_11_NETWORK_INFRASTRUCTURE InfrastructureMode; NDIS_802_11_RATES SupportedRates; // fields from NDIS_802_11_WEP structure
ULONG KeyIndex; // 0 is the per-client key, 1-N are the global keys
ULONG KeyLength; // length of key in bytes
UCHAR KeyMaterial[WZCCTL_MAX_WEPK_MATERIAL]; // variable length depending on above field
// aditional field for the Authentication mode
NDIS_802_11_AUTHENTICATION_MODE AuthenticationMode; RAW_DATA rdUserData; // upper level buffer, attached to this config
} WZC_WLAN_CONFIG, *PWZC_WLAN_CONFIG;
//---------------------------------------
// [P]WZC_802_11_CONFIG_LIST: like NDIS_802_11_BSSID_LIST but indexes a
// set of [Preferred] Wireless Zero Configurations
typedef struct { ULONG NumberOfItems; // number of elements in the array below
ULONG Index; // [start] index in the array below
WZC_WLAN_CONFIG Config[1]; // array of WZC_WLAN_CONFIGs
} WZC_802_11_CONFIG_LIST, *PWZC_802_11_CONFIG_LIST;
// WZC dialog codes have the 16th bit set to 1. This is what quickly sepparates them from EAPOL signals.
#define WZCDLG_IS_WZC(x) (((x) & 0x00010000) == 0x00010000)
#define WZCDLG_FAILED 0x00010001 // 802.11 automatic configuration failed
// Dialog BLOB passed through the UI pipe to netman and wzcdlg
typedef struct _WZCDLG_DATA { DWORD dwCode; DWORD lParam; // long numeric data
} WZCDLG_DATA, *PWZCDLG_DATA;
#endif
//---------------------------------------
// [P]INTF_ENTRY: describes the key info for one interface
// this is used in conjunction with [P]INTFS_KEY_TABLE and WZCEnumInterfaces
typedef struct { #if defined(MIDL_PASS)
[unique, string] LPWSTR wszGuid; #else
LPWSTR wszGuid; #endif
} INTF_KEY_ENTRY, *PINTF_KEY_ENTRY;
//---------------------------------------
// [P]INTFS_KEY_TABLE: describes the table of key info for all interfaces
// this is used in conjunction with [P]INTF_KEY_ENTRY and WZCEnumInterfaces
typedef struct { DWORD dwNumIntfs; #if defined(MIDL_PASS)
[size_is(dwNumIntfs)] PINTF_KEY_ENTRY pIntfs; #else
PINTF_KEY_ENTRY pIntfs; #endif
} INTFS_KEY_TABLE, *PINTFS_KEY_TABLE;
//---------------------------------------
// Bits used in conjunction with INTF_ENTRY, WZCQueryInterface
// and WZCSetInterface. They point to the relevant information
// that is requested from the service or to the relevant information
// to be set down to the interface. On the output, they point to
// the information that was processed (queried/set) successfully.
#define INTF_ALL 0xffffffff
#define INTF_ALL_FLAGS 0x0000ffff
#define INTF_CM_MASK 0x00000007 // mask for the configuration mode (NDIS_802_11_NETWORK_INFRASTRUCTURE value)
#define INTF_ENABLED 0x00008000 // zero conf enabled for this interface
#define INTF_FALLBACK 0x00004000 // attempt to connect to visible non-preferred networks also
#define INTF_OIDSSUPP 0x00002000 // 802.11 OIDs are supported by the driver/firmware (can't be set)
#define INTF_VOLATILE 0x00001000 // the service parameters are volatile.
#define INTF_POLICY 0x00000800 // the service parameters are enforced by the policy.
#define INTF_DESCR 0x00010000
#define INTF_NDISMEDIA 0x00020000
#define INTF_PREFLIST 0x00040000
#define INTF_ALL_OIDS 0xfff00000
#define INTF_HANDLE 0x00100000
#define INTF_INFRAMODE 0x00200000
#define INTF_AUTHMODE 0x00400000
#define INTF_WEPSTATUS 0x00800000
#define INTF_SSID 0x01000000
#define INTF_BSSID 0x02000000
#define INTF_BSSIDLIST 0x04000000
#define INTF_LIST_SCAN 0x08000000
#define INTF_ADDWEPKEY 0x10000000
#define INTF_REMWEPKEY 0x20000000
#define INTF_LDDEFWKEY 0x40000000 // reload the default WEP_KEY
//---------------------------------------
// Bits used to specify particular control options for the interface
// entry
#define INTFCTL_CM_MASK 0x0007 // mask for the configuration mode (NDIS_802_11_NETWORK_INFRASTRUCTURE value)
#define INTFCTL_ENABLED 0x8000 // zero conf enabled for this interface
#define INTFCTL_FALLBACK 0x4000 // attempt to connect to visible non-preferred networks also
#define INTFCTL_OIDSSUPP 0x2000 // 802.11 OIDs are supported by the driver/firmware (can't be set)
#define INTFCTL_VOLATILE 0x1000 // the service parameters are volatile.
#define INTFCTL_POLICY 0x0800 // the service parameters policy enforced.
//---------------------------------------
// [P]INTF_ENTRY: contains everything an RPC client needs to know
// about an interface. It is used in conjunction with RpcQueryInterface.
// Flags below are to be used to specify what info is queried for the
// interface. Guid field is not covered since this is the key of the
// structure so it has to be specified eather way.
typedef struct { #if defined(MIDL_PASS)
[string] LPWSTR wszGuid; #else
LPWSTR wszGuid; #endif
#if defined(MIDL_PASS)
[string] LPWSTR wszDescr; #else
LPWSTR wszDescr; #endif
ULONG ulMediaState; ULONG ulMediaType; ULONG ulPhysicalMediaType; INT nInfraMode; INT nAuthMode; INT nWepStatus; DWORD dwCtlFlags; // control flags (see INTFCTL_* defines)
RAW_DATA rdSSID; // encapsulates the SSID raw binary
RAW_DATA rdBSSID; // encapsulates the BSSID raw binary
RAW_DATA rdBSSIDList; // encapsulates one WZC_802_11_CONFIG_LIST structure
RAW_DATA rdStSSIDList; // encapsulates one WZC_802_11_CONFIG_LIST structure
RAW_DATA rdCtrlData; // data for various control actions on the interface
} INTF_ENTRY, *PINTF_ENTRY;
//---------------------------------------
// Defines and datastucture for handling the WZC Service Context (generic service params)
// Default values for WZC internal timers (WZC_CONTEXT.tmT* fields)
#define TMMS_DEFAULT_TR 0x00000bb8 // Timeout until a rescan completes: ms (3sec)
#define TMMS_DEFAULT_TC 0x0000ea60 // Timeout to retry a valid configuration: ms (1min)
#define TMMS_DEFAULT_TP 0x000007d0 // Timeout to expect a media connect for a selected config: ms (2sec)
#define TMMS_DEFAULT_TF 0x0000ea60 // Timeout to recover from a failed configuration: ms (1min)
#define TMMS_DEFAULT_TD 0x00001388 // Timeout to delay the {SSr} processing: ms (5sec)
// Default turns logging on
#define WZC_CTXT_LOGGING_ON 0x00000001
// Structure: WZC_CONTEXT holds all global service options that may be customized
typedef struct _wzc_context_t { DWORD dwFlags; //service flags (see WZC_CTXT_*)
//Service specific timers
DWORD tmTr; //Rescan timeout
DWORD tmTc; //Retry valid config timeout
DWORD tmTp; //Timeout to expect a media connect
DWORD tmTf; //Timeout to recover from an invalid config
DWORD tmTd; //Timeout to delay {Ssr} processing
} WZC_CONTEXT, *PWZC_CONTEXT;
// Context control flags (see WZCSet/QueryContext() calls)
#define WZC_CONTEXT_CTL_LOG 0x00000001
#define WZC_CONTEXT_CTL_TIMER_TR 0x00000002
#define WZC_CONTEXT_CTL_TIMER_TC 0x00000004
#define WZC_CONTEXT_CTL_TIMER_TP 0x00000008
#define WZC_CONTEXT_CTL_TIMER_TF 0x00000010
#define WZC_CONTEXT_CTL_TIMER_TD 0x00000020
//---------------------------------------
// Utility Rpc memory management routines
#define RpcCAlloc(nBytes) MIDL_user_allocate(nBytes)
#define RpcFree(pMem) MIDL_user_free(pMem)
//---------------------------------------
// WZCDeleteIntfObj: cleans an INTF_ENTRY object that is
// allocated within any RPC call.
//
// Parameters
// pIntf
// [in] pointer to the INTF_ENTRY object to delete
VOID WZCDeleteIntfObj( PINTF_ENTRY pIntf);
//---------------------------------------
// WZCEnumInterfaces: provides the table of key
// information for all the interfaces that are managed.
// For all subsequent calls the clients need to identify
// the Interface it operates on by providing the respective
// key info.
//
// Parameters:
// pSrvAddr
// [in] WZC Server to contact
// pIntf
// [out] table of key info for all interfaces
// Returned value:
// Win32 error code
DWORD WZCEnumInterfaces( LPWSTR pSrvAddr, PINTFS_KEY_TABLE pIntfs);
//---------------------------------------
// WZCQueryIterface: provides detailed information for a
// given interface.
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be queried (bitmask of INTF_*)
// pIntf:
// [in] Key of the interface to query
// [out] Requested data from the interface.
// pdwOutFlags
// [out] Fields successfully retrieved (bitmask of INTF_*)
//
// Returned value:
// Win32 error code
DWORD WZCQueryInterface( LPWSTR pSrvAddr, DWORD dwInFlags, PINTF_ENTRY pIntf, LPDWORD pdwOutFlags);
//---------------------------------------
// WZCSetIterface: sets specific information on the interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be set (bitmask of INTF_*)
// pIntf:
// [in] Key of the interface to query and data to be set
// pdwOutFlags:
// [out] Fields successfully set (bitmask of INTF_*)
//
// Returned value:
// Win32 error code
DWORD WZCSetInterface( LPWSTR pSrvAddr, DWORD dwInFlags, PINTF_ENTRY pIntf, LPDWORD pdwOutFlags);
//---------------------------------------
// WZCRefreshInterface: refreshes specific information for the interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be refreshed and specific refresh actions to be
// taken (bitmask of INTF_*)
// pIntf:
// [in] Key of the interface to be refreshed
// pdwOutFlags:
// [out] Fields successfully refreshed (bitmask of INTF_*)
//
// Returned value:
// Win32 error code
DWORD WZCRefreshInterface( LPWSTR pSrvAddr, DWORD dwInFlags, PINTF_ENTRY pIntf, LPDWORD pdwOutFlags);
//---------------------------------------
// WZCQueryContext: retrieves the WZC service parameters
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be retrieved (bitmask of WZC_CONTEXT_CTL*)
// pContext:
// [in] Placeholder for the service parameters
// pdwOutFlags:
// [out] Fields successfully retrieved (bitmask of WZC_CONTEXT_CTL*)
//
// Returned value:
// Win32 error code
DWORD WZCQueryContext( LPWSTR pSrvAddr, DWORD dwInFlags, PWZC_CONTEXT pContext, LPDWORD pdwOutFlags);
//---------------------------------------
// WZCSetContext: sets specific WZC service parameters
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be set (bitmask of WZC_CONTEXT_CTL*)
// pContext:
// [in] Context buffer containing the specific parameters to be set
// pdwOutFlags:
// [out] Fields successfully set (bitmask of WZC_CONTEXT_CTL*)
//
// Returned value:
// Win32 error code
DWORD WZCSetContext( LPWSTR pSrvAddr, DWORD dwInFlags, PWZC_CONTEXT pContext, LPDWORD pdwOutFlags);
//============================================================================================
//
// EAPOL-related definitions
//
#define EAPOL_DISABLED 0
#define EAPOL_ENABLED 0x80000000
#define EAPOL_MACHINE_AUTH_DISABLED 0
#define EAPOL_MACHINE_AUTH_ENABLED 0x40000000
#define EAPOL_GUEST_AUTH_DISABLED 0
#define EAPOL_GUEST_AUTH_ENABLED 0x20000000
#define EAP_TYPE_MD5 4
#define EAP_TYPE_TLS 13
#define EAP_TYPE_PEAP 25
#define EAP_TYPE_MSCHAPv2 26
#define DEFAULT_EAP_TYPE EAP_TYPE_TLS
#define DEFAULT_EAPOL_STATE EAPOL_ENABLED
#define DEFAULT_MACHINE_AUTH_STATE EAPOL_MACHINE_AUTH_ENABLED
#define DEFAULT_GUEST_AUTH_STATE EAPOL_GUEST_AUTH_DISABLED
#define DEFAULT_EAP_STATE (DEFAULT_EAPOL_STATE | DEFAULT_MACHINE_AUTH_STATE | DEFAULT_GUEST_AUTH_STATE)
#define IS_EAPOL_ENABLED(x) \
((x & EAPOL_ENABLED)?1:0) #define IS_MACHINE_AUTH_ENABLED(x) \
((x & EAPOL_MACHINE_AUTH_ENABLED)?1:0) #define IS_GUEST_AUTH_ENABLED(x) \
((x & EAPOL_GUEST_AUTH_ENABLED)?1:0)
// Supplicant modes of operation depending on network state and
// administrator decision
#define SUPPLICANT_MODE_0 0
#define SUPPLICANT_MODE_1 1
#define SUPPLICANT_MODE_2 2
#define SUPPLICANT_MODE_3 3
#define MAX_SUPPLICANT_MODE SUPPLICANT_MODE_3
#define EAPOL_DEFAULT_SUPPLICANT_MODE SUPPLICANT_MODE_2
// Auth modes of operation depending on administrator decision
#define EAPOL_AUTH_MODE_0 0
#define EAPOL_AUTH_MODE_1 1
#define EAPOL_AUTH_MODE_2 2
#define MAX_EAPOL_AUTH_MODE EAPOL_AUTH_MODE_2
#define EAPOL_DEFAULT_AUTH_MODE EAPOL_AUTH_MODE_1
#define GUID_STRING_LEN_WITH_TERM 39
//
// Heap-related functions
//
#define MALLOC(s) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, (s))
#define FREE(p) HeapFree(GetProcessHeap(), 0, (p))
// Double-threaded linked list node control block. There is one node for each
// entry in a list.
//
// Applications should not access this structure directly.
//
typedef struct _DTLNODE { struct _DTLNODE* pdtlnodePrev; // Address of previous node or NULL if none
struct _DTLNODE* pdtlnodeNext; // Address of next node or NULL if none
VOID* pData; // Address of user's data
LONG_PTR lNodeId; // User-defined node identification code
} DTLNODE;
//
// Double-threaded linked list control block. There is one for each list.
//
// Applications should not access this structure directly.
//
typedef struct _DTLLIST { struct _DTLNODE* pdtlnodeFirst; // Address of first node or NULL if none
struct _DTLNODE* pdtlnodeLast; // Address of last node or NULL if none
LONG lNodes; // Number of nodes in list
LONG_PTR lListId; // User-defined list identification code
} DTLLIST;
// List node free function. See FreeList.
//
typedef VOID (*PDESTROYNODE)( IN DTLNODE* );
#define DtlGetFirstNode( pdtllist ) ((pdtllist)->pdtlnodeFirst)
#define DtlGetNextNode( pdtlnode ) ((pdtlnode)->pdtlnodeNext)
#define DtlGetData( pdtlnode ) ((pdtlnode)->pData)
typedef enum _EAPTLS_CONNPROP_ATTRIBUTE_TYPE_ {
ecatMinimum = 0, //Undefined
ecatFlagRegistryCert, //Value is a pointer to BOOL
ecatFlagScard, //Value is a pointer to BOOL
ecatFlagValidateServer, //Value is a pointer to BOOL
ecatFlagValidateName, //Value is a pointer to BOOL
ecatFlagDiffUser, //Value is a pointer to BOOL
ecatServerNames, //Value is a pointer to NULL
//terminated string of semi
//colon delimited server names
ecatRootHashes //Value is a pointer to
//SHA1 hashes of Root certs.
}EAPTLS_CONNPROP_ATTRIBUTE_TYPE;
typedef struct _EAPTLS_CONNPROP_ATTRIBUTE {
EAPTLS_CONNPROP_ATTRIBUTE_TYPE ecaType; DWORD dwLength; //includes byte length of the value
//if it is a LPWSTR, it includes
//the null termination.
PVOID Value;
}EAPTLS_CONNPROP_ATTRIBUTE, *PEAPTLS_CONNPROP_ATTRIBUTE;
// EAP configuration DLL entrypoints. These definitions must match the
// raseapif.h prototypes for RasEapInvokeConfigUI and RasEapFreeUserData.
typedef DWORD (APIENTRY * RASEAPFREE)( PBYTE ); typedef DWORD (APIENTRY * RASEAPINVOKECONFIGUI)( DWORD, HWND, DWORD, PBYTE, DWORD, PBYTE*, DWORD*); typedef DWORD (APIENTRY * RASEAPGETIDENTITY)( DWORD, HWND, DWORD, const WCHAR*, const WCHAR*, PBYTE, DWORD, PBYTE, DWORD, PBYTE*, DWORD*, WCHAR** ); typedef DWORD (APIENTRY * RASEAPINVOKEINTERACTIVEUI)( DWORD, HWND, PBYTE, DWORD, PBYTE*, DWORD* ); typedef DWORD (APIENTRY * RASEAPCREATECONNPROP)( PEAPTLS_CONNPROP_ATTRIBUTE, PVOID*, DWORD*, PVOID*, DWORD*);
#define RAS_EAP_VALUENAME_HIDEPEAPMSCHAPv2 TEXT("HidePEAPMSCHAPv2")
// Flags
#define EAPCFG_FLAG_RequireUsername 0x1
#define EAPCFG_FLAG_RequirePassword 0x2
// EAP configuration package definition.
typedef struct _EAPCFG { // The package's unique EAP algorithm code.
//
DWORD dwKey;
// The friendly name of the package suitable for display to the user.
//
TCHAR* pszFriendlyName;
// The SystemRoot-relative path to the package's configuration DLL. May
// be NULL indicating there is none.
//
TCHAR* pszConfigDll;
// The SystemRoot-relative path to the package's identity DLL. May
// be NULL indicating there is none.
//
TCHAR* pszIdentityDll;
// Flags that specify what standard credentials are required at dial
// time.
//
DWORD dwStdCredentialFlags;
// True if user is to be forced to run the configuration API for the
// package, i.e. defaults are not sufficient.
//
BOOL fForceConfig;
// True if the package provides MPPE encryption keys, false if not.
//
BOOL fProvidesMppeKeys;
// The package's default configuration blob, which can be overwritten by
// the configuration DLL. May be NULL and 0 indicating there is none.
//
BYTE* pData; DWORD cbData;
// EAP per user data to be stored in HKCU. This data is returned from
// the EapInvokeConfigUI entrypoint in the eap dll.
//
BYTE* pUserData; DWORD cbUserData;
// Set when the configuration DLL has been called on the package. This is
// not a registry setting. It is provided for the convenience of the UI
// only.
//
BOOL fConfigDllCalled;
// Specifies the class ID of the configuration UI for remote machines.
// Not used
GUID guidConfigCLSID; } EAPCFG;
VOID DtlDestroyList( DTLLIST*, PDESTROYNODE );
DTLNODE * CreateEapcfgNode( void);
VOID DestroyEapcfgNode( IN OUT DTLNODE* pNode);
DTLNODE* EapcfgNodeFromKey( IN DTLLIST* pList, IN DWORD dwKey);
#define EAPOL_MUTUAL_AUTH_EAP_ONLY 0x00000001
DTLLIST* ReadEapcfgList(IN DWORD dwFlags);
#define MAX_SSID_LEN 32
//
// Structure : EAPOL_INTF_PARAMS
//
typedef struct _EAPOL_INTF_PARAMS { DWORD dwVersion; DWORD dwReserved2; DWORD dwEapFlags; DWORD dwEapType; DWORD dwSizeOfSSID; BYTE bSSID[MAX_SSID_LEN]; } EAPOL_INTF_PARAMS, *PEAPOL_INTF_PARAMS;
//
// EAPOL states
//
typedef enum _EAPOL_STATE { EAPOLSTATE_LOGOFF = 0, EAPOLSTATE_DISCONNECTED, EAPOLSTATE_CONNECTING, EAPOLSTATE_ACQUIRED, EAPOLSTATE_AUTHENTICATING, EAPOLSTATE_HELD, EAPOLSTATE_AUTHENTICATED, EAPOLSTATE_UNDEFINED } EAPOL_STATE;
//
// EAP UI State
//
typedef enum _EAPUISTATE { EAPUISTATE_WAITING_FOR_IDENTITY = 1, EAPUISTATE_WAITING_FOR_UI_RESPONSE } EAPUISTATE;
//
// Structure : EAPOL_INTF_STATE
//
typedef struct _EAPOL_INTF_STATE { #if defined(MIDL_PASS)
[unique, string] LPWSTR pwszLocalMACAddr; #else
LPWSTR pwszLocalMACAddr; #endif
#if defined(MIDL_PASS)
[unique, string] LPWSTR pwszRemoteMACAddr; #else
LPWSTR pwszRemoteMACAddr; #endif
DWORD dwSizeOfSSID; BYTE bSSID[MAX_SSID_LEN+1]; #if defined(MIDL_PASS)
[unique, string] LPSTR pszEapIdentity; #else
LPSTR pszEapIdentity; #endif
EAPOL_STATE dwState; EAPUISTATE dwEapUIState; DWORD dwEAPOLAuthMode; DWORD dwEAPOLAuthenticationType; DWORD dwEapType; DWORD dwFailCount; DWORD dwPhysicalMediumType; } EAPOL_INTF_STATE, *PEAPOL_INTF_STATE;
#define EAPOL_VERSION_1 1
#define EAPOL_VERSION_2 2
#define EAPOL_VERSION_3 3
#define EAPOL_CURRENT_VERSION EAPOL_VERSION_3
//
// Structure : EAPOL_AUTH_DATA
//
typedef struct _EAPOL_AUTH_DATA { DWORD dwEapType; DWORD dwSize; BYTE bData[1]; } EAPOL_AUTH_DATA, *PEAPOL_AUTH_DATA;
DWORD WZCGetEapUserInfo ( IN WCHAR *pwszGUID, IN DWORD dwEapTypeId, IN DWORD dwSizOfSSID, IN BYTE *pbSSID, IN OUT PBYTE pbUserInfo, IN OUT DWORD *pdwInfoSize );
// Structure used to define the UI Response.
// Currently it contains upto 3 blobs.
// If more are required, add to the structure
#define NUM_RESP_BLOBS 3
typedef struct _EAPOLUI_RESP { RAW_DATA rdData0; RAW_DATA rdData1; RAW_DATA rdData2; } EAPOLUI_RESP, *PEAPOLUI_RESP;
//
// EAPOL Policy related parameters
//
#define EAPOL_CERT_TYPE_SMARTCARD 1
#define EAPOL_CERT_TYPE_MC_CERT 2
typedef struct _EAPOL_POLICY_DATA { BYTE pbWirelessSSID[32]; DWORD dwWirelessSSIDLen; DWORD dwEnable8021x; DWORD dw8021xMode; DWORD dwEAPType; DWORD dwMachineAuthentication; DWORD dwMachineAuthenticationType; DWORD dwGuestAuthentication; DWORD dwIEEE8021xMaxStart; DWORD dwIEEE8021xStartPeriod; DWORD dwIEEE8021xAuthPeriod; DWORD dwIEEE8021xHeldPeriod; DWORD dwEAPDataLen; LPBYTE pbEAPData; } EAPOL_POLICY_DATA, *PEAPOL_POLICY_DATA;
typedef struct _EAPOL_POLICY_LIST { DWORD dwNumberOfItems; EAPOL_POLICY_DATA EAPOLPolicy[1]; } EAPOL_POLICY_LIST, *PEAPOL_POLICY_LIST;
#if !defined(MIDL_PASS)
//---------------------------------------
// WZCEapolGetCustomAuthData: Get EAP-specific configuration data for interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// dwEapTypeId:
// [in] EAP type Id
// dwSizeOfSSID:
// [in] Size of SSID for which data is to be stored
// pbSSID:
// [in] SSID for which data is to be stored
// pbConnInfo:
// [in out] Connection EAP info
// pdwInfoSize:
// [in out] Size of pbConnInfo
//
// Returned value:
// Win32 error code
DWORD WZCEapolGetCustomAuthData ( IN LPWSTR pSrvAddr, IN PWCHAR pwszGuid, IN DWORD dwEapTypeId, IN DWORD dwSizeOfSSID, IN BYTE *pbSSID, IN OUT PBYTE pbConnInfo, IN OUT PDWORD pdwInfoSize );
//---------------------------------------
// WZCEapolSetCustomAuthData: Set EAP-specific configuration data for interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// dwEapTypeId:
// [in] EAP type Id
// dwSizeOfSSID:
// [in] Size of SSID for which data is to be stored
// pbSSID:
// [in] SSID for which data is to be stored
// pbConnInfo:
// [in] Connection EAP info
// pdwInfoSize:
// [in] Size of pbConnInfo
//
// Returned value:
// Win32 error code
DWORD WZCEapolSetCustomAuthData ( IN LPWSTR pSrvAddr, IN PWCHAR pwszGuid, IN DWORD dwEapTypeId, IN DWORD dwSizeOfSSID, IN BYTE *pbSSID, IN PBYTE pbConnInfo, IN DWORD dwInfoSize );
//---------------------------------------
// WZCEapolGetInterfaceParams: Get configuration parameters for interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// pIntfParams:
// [in out] Interface Parameters
//
// Returned value:
// Win32 error code
DWORD WZCEapolGetInterfaceParams ( IN LPWSTR pSrvAddr, IN PWCHAR pwszGuid, IN OUT EAPOL_INTF_PARAMS *pIntfParams );
//---------------------------------------
// WZCEapolSetInterfaceParams: Set configuration parameters for interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// pIntfParams:
// [in] Interface parameters
// Returned value:
// Win32 error code
DWORD WZCEapolSetInterfaceParams ( IN LPWSTR pSrvAddr, IN PWCHAR pwszGuid, IN EAPOL_INTF_PARAMS *pIntfParams );
//---------------------------------------
// WZCEapolReAuthenticate : Restart 802.1X authentication on an interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// Returned value:
// Win32 error code
DWORD WZCEapolReAuthenticate ( IN LPWSTR pSrvAddr, IN PWCHAR pwszGuid );
//---------------------------------------
// WZCEapolQueryState: Query the interface 802.1X/EAPOL state
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// pIntfState:
// [in out] EAPOL Interface State
//
// Returned value:
// Win32 error code
DWORD WZCEapolQueryState ( IN LPWSTR pSrvAddr, IN PWCHAR pwszGuid, IN OUT EAPOL_INTF_STATE *pIntfState );
#endif // MIDL_PASS
//
// Free EAPOL interface state information on the client side obtained via
// RPC query
//
DWORD WZCEapolFreeState ( IN EAPOL_INTF_STATE *pIntfState );
//
// Structure: EAPOL_EAP_UI_CONTEXT
//
typedef struct _EAPOL_EAP_UI_CONTEXT { DWORD dwEAPOLUIMsgType; WCHAR wszGUID[39]; DWORD dwSessionId; DWORD dwContextId; DWORD dwEapId; DWORD dwEapTypeId; DWORD dwEapFlags; WCHAR wszSSID[MAX_SSID_LEN+1]; DWORD dwSizeOfSSID; BYTE bSSID[MAX_SSID_LEN]; DWORD dwEAPOLState; DWORD dwRetCode; DWORD dwSizeOfEapUIData; BYTE bEapUIData[1]; } EAPOL_EAP_UI_CONTEXT, *PEAPOL_EAP_UI_CONTEXT;
//
// Defines for messaging between Service and Dialog DLL
//
#define EAPOLUI_GET_USERIDENTITY 0x00000001
#define EAPOLUI_GET_USERNAMEPASSWORD 0x00000002
#define EAPOLUI_INVOKEINTERACTIVEUI 0x00000004
#define EAPOLUI_EAP_NOTIFICATION 0x00000008
#define EAPOLUI_REAUTHENTICATE 0x00000010
#define EAPOLUI_CREATEBALLOON 0x00000020
#define EAPOLUI_CLEANUP 0x00000040
#define EAPOLUI_DUMMY 0x00000080
#define NUM_EAPOL_DLG_MSGS 8
//---------------------------------------
// WZCEapolUIResponse: Send Dlg response to Service
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// EapolUIContext:
// [in] EAPOLUI Context data
// EapolUI:
// [in] EAPOLUI response data
//
// Returned value:
// Win32 error code
DWORD WZCEapolUIResponse ( IN LPWSTR pSrvAddr, IN EAPOL_EAP_UI_CONTEXT EapolUIContext, IN EAPOLUI_RESP EapolUIResp );
# ifdef __cplusplus
} # endif
|