Leaked source code of windows server 2003
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
|
#if GPC
NTSTATUS IPSecGpcInitialize( );
NTSTATUS IPSecGpcDeinitialize( );
NTSTATUS IPSecEnableGpc( );
NTSTATUS IPSecDisableGpc( );
NTSTATUS IPSecInitGpcFilter( IN PFILTER pFilter, IN PGPC_IP_PATTERN pPattern, IN PGPC_IP_PATTERN pMask );
NTSTATUS IPSecInsertGpcPattern( IN PFILTER pFilter );
NTSTATUS IPSecDeleteGpcPattern( IN PFILTER pFilter );
NTSTATUS IPSecInsertGpcFilter( IN PFILTER pFilter );
NTSTATUS IPSecDeleteGpcFilter( IN PFILTER pFilter );
NTSTATUS IPSecInstallGpcFilter( IN PFILTER pFilter );
NTSTATUS IPSecUninstallGpcFilter( IN PFILTER pFilter );
NTSTATUS IPSecLookupGpcSA( IN ULARGE_INTEGER uliSrcDstAddr, IN ULARGE_INTEGER uliProtoSrcDstPort, IN CLASSIFICATION_HANDLE GpcHandle, OUT PFILTER *ppFilter, OUT PSA_TABLE_ENTRY *ppSA, OUT PSA_TABLE_ENTRY *ppNextSA, OUT PSA_TABLE_ENTRY *ppTunnelSA, IN BOOLEAN fOutbound, IN BOOLEAN fVerify, IN PIPSEC_UDP_ENCAP_CONTEXT pNatContext );
NTSTATUS IPSecLookupGpcMaskedSA( IN ULARGE_INTEGER uliSrcDstAddr, IN ULARGE_INTEGER uliProtoSrcDstPort, OUT PFILTER *ppFilter, OUT PSA_TABLE_ENTRY *ppSA, IN BOOLEAN fOutbound, IN PIPSEC_UDP_ENCAP_CONTEXT pNatContext );
#endif
|