Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1740 lines
42 KiB

/*++
Copyright (c) 1999 Microsoft Corporation
Module Name:
tnspecific.c
Abstract:
This module contains all of the code to drive the
specific tunnel filter list management of IPSecSPD
Service.
Author:
abhisheV 29-October-1999
Environment
User Level: Win32
Revision History:
--*/
#include "precomp.h"
DWORD
ApplyTnTransform(
PINITNFILTER pFilter,
MATCHING_ADDR * pMatchingAddresses,
DWORD dwAddrCnt,
PSPECIAL_ADDR pSpecialAddrsList,
PINITNSFILTER * ppSpecificFilters
)
/*++
Routine Description:
This function expands a generic tunnel filter into its
corresponding specific filters.
Arguments:
pFilter - Generic filter to expand.
pMatchingAddresses - List of local ip addresses whose interface
type matches that of the filter.
dwAddrCnt - Number of local ip addresses in the list.
ppSpecificFilters - List of specific filters expanded for the
given generic filter.
Return Value:
ERROR_SUCCESS - Success.
Win32 Error - Failure.
--*/
{
DWORD dwError = 0;
PINITNSFILTER pSpecificFilters = NULL;
PINITNSFILTER pOutboundSpecificFilters = NULL;
PINITNSFILTER pInboundSpecificFilters = NULL;
PADDR_V4 pSrcAddrList = NULL;
DWORD dwSrcAddrCnt = 0;
PADDR_V4 pDesAddrList = NULL;
DWORD dwDesAddrCnt = 0;
PADDR_V4 pOutDesTunAddrList = NULL;
DWORD dwOutDesTunAddrCnt = 0;
PADDR_V4 pInDesTunAddrList = NULL;
DWORD dwInDesTunAddrCnt = 0;
//
// Replace wild card information to generate the new source
// address list.
//
dwError = FormAddressList(
pFilter->SrcAddr,
pMatchingAddresses,
dwAddrCnt,
pSpecialAddrsList,
pFilter->InterfaceType,
&pSrcAddrList,
&dwSrcAddrCnt
);
BAIL_ON_WIN32_ERROR(dwError);
//
// Replace wild card information to generate the new destination
// address list.
//
dwError = FormAddressList(
pFilter->DesAddr,
pMatchingAddresses,
dwAddrCnt,
pSpecialAddrsList,
pFilter->InterfaceType,
&pDesAddrList,
&dwDesAddrCnt
);
BAIL_ON_WIN32_ERROR(dwError);
//
// Form the outbound and inbound destination tunnel address lists.
//
dwError = FormTnOutboundInboundAddresses(
pFilter,
pMatchingAddresses,
dwAddrCnt,
pSpecialAddrsList,
&pOutDesTunAddrList,
&dwOutDesTunAddrCnt,
&pInDesTunAddrList,
&dwInDesTunAddrCnt
);
BAIL_ON_WIN32_ERROR(dwError);
//
// Form outbound specific filters.
//
dwError = FormSpecificTnFilters(
pFilter,
pSrcAddrList,
dwSrcAddrCnt,
pDesAddrList,
dwDesAddrCnt,
pOutDesTunAddrList,
dwOutDesTunAddrCnt,
FILTER_DIRECTION_OUTBOUND,
&pOutboundSpecificFilters
);
BAIL_ON_WIN32_ERROR(dwError);
//
// Form inbound specific filters.
//
dwError = FormSpecificTnFilters(
pFilter,
pSrcAddrList,
dwSrcAddrCnt,
pDesAddrList,
dwDesAddrCnt,
pInDesTunAddrList,
dwInDesTunAddrCnt,
FILTER_DIRECTION_INBOUND,
&pInboundSpecificFilters
);
BAIL_ON_WIN32_ERROR(dwError);
pSpecificFilters = pOutboundSpecificFilters;
AddToSpecificTnList(
&pSpecificFilters,
pInboundSpecificFilters
);
*ppSpecificFilters = pSpecificFilters;
cleanup:
if (pSrcAddrList) {
FreeSPDMemory(pSrcAddrList);
}
if (pDesAddrList) {
FreeSPDMemory(pDesAddrList);
}
if (pOutDesTunAddrList) {
FreeSPDMemory(pOutDesTunAddrList);
}
if (pInDesTunAddrList) {
FreeSPDMemory(pInDesTunAddrList);
}
return (dwError);
error:
if (pOutboundSpecificFilters) {
FreeIniTnSFilterList(pOutboundSpecificFilters);
}
if (pInboundSpecificFilters) {
FreeIniTnSFilterList(pInboundSpecificFilters);
}
*ppSpecificFilters = NULL;
goto cleanup;
}
DWORD
FormTnOutboundInboundAddresses(
PINITNFILTER pFilter,
MATCHING_ADDR * pMatchingAddresses,
DWORD dwAddrCnt,
PSPECIAL_ADDR pSpecialAddrsList,
PADDR_V4 * ppOutDesTunAddrList,
PDWORD pdwOutDesTunAddrCnt,
PADDR_V4 * ppInDesTunAddrList,
PDWORD pdwInDesTunAddrCnt
)
/*++
Routine Description:
This function forms the outbound and inbound
destination tunnel address sets for a generic filter.
Arguments:
pFilter - Generic filter under consideration.
pMatchingAddresses - List of local ip addresses whose interface
type matches that of the filter.
dwAddrCnt - Number of local ip addresses in the list.
ppOutDesTunAddrList - List of outbound destination tunnel addresses.
pdwOutDesTunAddrCnt - Number of addresses in the outbound
destination tunnel address list.
ppInDesTunAddrList - List of inbound destination tunnel addresses.
pdwInDesTunAddrCnt - Number of addresses in the inbound
destination tunnel address list.
Return Value:
ERROR_SUCCESS - Success.
Win32 Error - Failure.
--*/
{
DWORD dwError = 0;
PADDR_V4 pDesTunAddrList = NULL;
DWORD dwDesTunAddrCnt = 0;
PADDR_V4 pOutDesTunAddrList = NULL;
DWORD dwOutDesTunAddrCnt = 0;
PADDR_V4 pInDesTunAddrList = NULL;
DWORD dwInDesTunAddrCnt = 0;
//
// Replace wild card information to generate the new destination
// tunnel address list.
//
dwError = FormAddressList(
pFilter->DesTunnelAddr,
pMatchingAddresses,
dwAddrCnt,
pSpecialAddrsList,
pFilter->InterfaceType,
&pDesTunAddrList,
&dwDesTunAddrCnt
);
BAIL_ON_WIN32_ERROR(dwError);
//
// Separate the destination tunnel address list into outbound
// and inbound destination tunnel address sets based on the local
// machine's ip addresses.
//
dwError = SeparateAddrList(
pFilter->DesTunnelAddr.AddrType,
pDesTunAddrList,
dwDesTunAddrCnt,
pMatchingAddresses,
dwAddrCnt,
&pInDesTunAddrList,
&dwInDesTunAddrCnt,
&pOutDesTunAddrList,
&dwOutDesTunAddrCnt
);
BAIL_ON_WIN32_ERROR(dwError);
*ppOutDesTunAddrList = pOutDesTunAddrList;
*pdwOutDesTunAddrCnt = dwOutDesTunAddrCnt;
*ppInDesTunAddrList = pInDesTunAddrList;
*pdwInDesTunAddrCnt = dwInDesTunAddrCnt;
cleanup:
if (pDesTunAddrList) {
FreeSPDMemory(pDesTunAddrList);
}
return (dwError);
error:
if (pOutDesTunAddrList) {
FreeSPDMemory(pOutDesTunAddrList);
}
if (pInDesTunAddrList) {
FreeSPDMemory(pInDesTunAddrList);
}
*ppOutDesTunAddrList = NULL;
*pdwOutDesTunAddrCnt = 0;
*ppInDesTunAddrList = NULL;
*pdwInDesTunAddrCnt = 0;
goto cleanup;
}
DWORD
FormSpecificTnFilters(
PINITNFILTER pFilter,
PADDR_V4 pSrcAddrList,
DWORD dwSrcAddrCnt,
PADDR_V4 pDesAddrList,
DWORD dwDesAddrCnt,
PADDR_V4 pDesTunAddrList,
DWORD dwDesTunAddrCnt,
DWORD dwDirection,
PINITNSFILTER * ppSpecificFilters
)
/*++
Routine Description:
This function forms the specific tunnel filters
for the given generic filter and the source and
destination address sets.
Arguments:
pFilter - Generic filter for which specific filters
are to be created.
pSrcAddrList - List of source addresses.
dwSrcAddrCnt - Number of addresses in the source
address list.
pDesAddrList - List of destination addresses.
dwDesAddrCnt - Number of addresses in the destination
address list.
pDesTunAddrList - List of destination tunnel addresses.
dwDesTunAddrCnt - Number of addresses in the destination
tunnel address list.
dwDirection - direction of the resulting specific filters.
ppSpecificFilters - Specific filters created for the given
generic filter and the given addresses.
Return Value:
ERROR_SUCCESS - Success.
Win32 Error - Failure.
--*/
{
DWORD dwError = 0;
PINITNSFILTER pSpecificFilters = NULL;
DWORD i = 0, j = 0, k = 0;
PINITNSFILTER pSpecificFilter = NULL;
for (k = 0; k < dwDesTunAddrCnt; k++) {
for (i = 0; i < dwSrcAddrCnt; i++) {
for (j = 0; j < dwDesAddrCnt; j++) {
dwError = CreateSpecificTnFilter(
pFilter,
pSrcAddrList[i],
pDesAddrList[j],
pDesTunAddrList[k],
&pSpecificFilter
);
BAIL_ON_WIN32_ERROR(dwError);
//
// Set the direction of the filter.
//
pSpecificFilter->dwDirection = dwDirection;
AssignTnFilterWeight(pSpecificFilter);
AddToSpecificTnList(
&pSpecificFilters,
pSpecificFilter
);
}
}
}
*ppSpecificFilters = pSpecificFilters;
return (dwError);
error:
if (pSpecificFilters) {
FreeIniTnSFilterList(pSpecificFilters);
}
*ppSpecificFilters = NULL;
return (dwError);
}
DWORD
CreateSpecificTnFilter(
PINITNFILTER pGenericFilter,
ADDR_V4 SrcAddr,
ADDR_V4 DesAddr,
ADDR_V4 DesTunnelAddr,
PINITNSFILTER * ppSpecificFilter
)
{
DWORD dwError = 0;
PINITNSFILTER pSpecificFilter = NULL;
dwError = AllocateSPDMemory(
sizeof(INITNSFILTER),
&pSpecificFilter
);
BAIL_ON_WIN32_ERROR(dwError);
pSpecificFilter->cRef = 0;
pSpecificFilter->IpVersion = pGenericFilter->IpVersion;
CopyGuid(pGenericFilter->gFilterID, &(pSpecificFilter->gParentID));
dwError = AllocateSPDString(
pGenericFilter->pszFilterName,
&(pSpecificFilter->pszFilterName)
);
BAIL_ON_WIN32_ERROR(dwError);
pSpecificFilter->InterfaceType = pGenericFilter->InterfaceType;
pSpecificFilter->dwFlags = pGenericFilter->dwFlags;
CopyAddresses(SrcAddr, &(pSpecificFilter->SrcAddr));
CopyAddresses(DesAddr, &(pSpecificFilter->DesAddr));
CopyAddresses(
pGenericFilter->SrcTunnelAddr,
&(pSpecificFilter->SrcTunnelAddr)
);
CopyAddresses(DesTunnelAddr, &(pSpecificFilter->DesTunnelAddr));
CopyPorts(pGenericFilter->SrcPort, &(pSpecificFilter->SrcPort));
CopyPorts(pGenericFilter->DesPort, &(pSpecificFilter->DesPort));
CopyProtocols(pGenericFilter->Protocol, &(pSpecificFilter->Protocol));
pSpecificFilter->InboundFilterAction = pGenericFilter->InboundFilterAction;
pSpecificFilter->OutboundFilterAction = pGenericFilter->OutboundFilterAction;
//
// Direction must be set in the calling routine.
//
pSpecificFilter->dwDirection = 0;
//
// Weight must be set in the calling routine.
//
pSpecificFilter->dwWeight = 0;
CopyGuid(pGenericFilter->gPolicyID, &(pSpecificFilter->gPolicyID));
pSpecificFilter->pIniQMPolicy = NULL;
pSpecificFilter->pNext = NULL;
*ppSpecificFilter = pSpecificFilter;
return (dwError);
error:
if (pSpecificFilter) {
FreeIniTnSFilter(pSpecificFilter);
}
*ppSpecificFilter = NULL;
return (dwError);
}
VOID
AssignTnFilterWeight(
PINITNSFILTER pSpecificFilter
)
/*++
Routine Description:
Computes and assigns the weight to a specific tunnel filter.
The tunnel filter weight consists of the following:
31 16 12 8 0
+-----------+-----------+-----------+--------+
|AddrMaskWgt| TunnelWgt |ProtocolWgt|PortWgts|
+-----------+-----------+-----------+--------+
Arguments:
pSpecificFilter - Specific tunnel filter to which the weight
is to be assigned.
Return Value:
None.
--*/
{
DWORD dwWeight = 0;
ULONG SrcMask = 0;
ULONG DesMask = 0;
DWORD dwSrcMaskWeight = 0;
DWORD dwDesMaskWeight = 0;
DWORD dwMaskWeight = 0;
DWORD i = 0;
//
// Weight Rule:
// A field with a more specific value gets a higher weight than
// the same field with a lesser specific value.
//
//
// If the protocol is specific then assign the specific protocol
// weight else the weight is zero.
// All the specific filters that have a specific protocol and
// differ only in the protocol field will have the same weight.
//
if (pSpecificFilter->Protocol.dwProtocol != 0) {
dwWeight |= WEIGHT_SPECIFIC_PROTOCOL;
}
//
// If the source port is specific then assign the specific source
// port weight else the weight is zero.
// All the specific filters that have a specific source port and
// differ only in the source port field will have the same weight.
//
if (pSpecificFilter->SrcPort.wPort != 0) {
dwWeight |= WEIGHT_SPECIFIC_SOURCE_PORT;
}
//
// If the destination port is specific then assign the specific
// destination port weight else the weight is zero.
// All the specific filters that have a specific destination port
// and differ only in the destination port field will have the
// same weight.
//
if (pSpecificFilter->DesPort.wPort != 0) {
dwWeight |= WEIGHT_SPECIFIC_DESTINATION_PORT;
}
dwWeight |= WEIGHT_TUNNEL_FILTER;
if (pSpecificFilter->DesTunnelAddr.uIpAddr != SUBNET_ADDRESS_ANY) {
dwWeight |= WEIGHT_SPECIFIC_TUNNEL_FILTER;
}
//
// IP addresses get the weight values based on their mask values.
// In the address case, the weight is computed as a sum of the
// bit positions starting from the position that contains the
// first least significant non-zero bit to the most significant
// bit position of the mask.
// All unique ip addresses have a mask of 0xFFFFFFFF and thus get
// the same weight, which is 1 + 2 + .... + 32.
// A subnet address has a mask with atleast the least significant
// bit zero and thus gets weight in the range (2 + .. + 32) to 0.
//
DesMask = ntohl(pSpecificFilter->DesAddr.uSubNetMask);
for (i = 0; i < sizeof(ULONG) * 8; i++) {
//
// If the bit position contains a non-zero bit, add the bit
// position to the sum.
//
if ((DesMask & 0x1) == 0x1) {
dwMaskWeight += (i+1);
dwDesMaskWeight += (i+1);
}
//
// Move to the next bit position.
//
DesMask = DesMask >> 1;
}
SrcMask = ntohl(pSpecificFilter->SrcAddr.uSubNetMask);
for (i = 0; i < sizeof(ULONG) * 8; i++) {
//
// If the bit position contains a non-zero bit, add the bit
// position to the sum.
//
if ((SrcMask & 0x1) == 0x1) {
dwMaskWeight += (i+1);
dwSrcMaskWeight += (i+1);
}
//
// Move to the next bit position.
//
SrcMask = SrcMask >> 1;
}
if (dwDesMaskWeight >= dwSrcMaskWeight) {
dwWeight |= WEIGHT_ADDRESS_TIE_BREAKER;
}
//
// Move the mask weight to the set of bits in the overall weight
// that it occupies.
//
dwMaskWeight = dwMaskWeight << 16;
dwWeight += dwMaskWeight;
pSpecificFilter->dwWeight = dwWeight;
}
VOID
AddToSpecificTnList(
PINITNSFILTER * ppSpecificTnFilterList,
PINITNSFILTER pSpecificTnFilters
)
{
PINITNSFILTER pListOne = NULL;
PINITNSFILTER pListTwo = NULL;
PINITNSFILTER pListMerge = NULL;
PINITNSFILTER pLast = NULL;
if (!(*ppSpecificTnFilterList) && !pSpecificTnFilters) {
return;
}
if (!(*ppSpecificTnFilterList)) {
*ppSpecificTnFilterList = pSpecificTnFilters;
return;
}
if (!pSpecificTnFilters) {
return;
}
pListOne = *ppSpecificTnFilterList;
pListTwo = pSpecificTnFilters;
while (pListOne && pListTwo) {
if ((pListOne->dwWeight) > (pListTwo->dwWeight)) {
if (!pListMerge) {
pListMerge = pListOne;
pLast = pListOne;
pListOne = pListOne->pNext;
}
else {
pLast->pNext = pListOne;
pListOne = pListOne->pNext;
pLast = pLast->pNext;
}
}
else {
if (!pListMerge) {
pListMerge = pListTwo;
pLast = pListTwo;
pListTwo = pListTwo->pNext;
}
else {
pLast->pNext = pListTwo;
pListTwo = pListTwo->pNext;
pLast = pLast->pNext;
}
}
}
if (pListMerge) {
if (pListOne) {
pLast->pNext = pListOne;
}
else {
pLast->pNext = pListTwo;
}
}
*ppSpecificTnFilterList = pListMerge;
return;
}
VOID
FreeIniTnSFilterList(
PINITNSFILTER pIniTnSFilterList
)
{
PINITNSFILTER pFilter = NULL;
PINITNSFILTER pTempFilter = NULL;
pFilter = pIniTnSFilterList;
while (pFilter) {
pTempFilter = pFilter;
pFilter = pFilter->pNext;
FreeIniTnSFilter(pTempFilter);
}
}
VOID
FreeIniTnSFilter(
PINITNSFILTER pIniTnSFilter
)
{
if (pIniTnSFilter) {
if (pIniTnSFilter->pszFilterName) {
FreeSPDString(pIniTnSFilter->pszFilterName);
}
//
// Must not ever free pIniTnSFilter->pIniQMPolicy.
//
FreeSPDMemory(pIniTnSFilter);
}
}
VOID
LinkTnSpecificFilters(
PINIQMPOLICY pIniQMPolicy,
PINITNSFILTER pIniTnSFilters
)
{
PINITNSFILTER pTemp = NULL;
pTemp = pIniTnSFilters;
while (pTemp) {
pTemp->pIniQMPolicy = pIniQMPolicy;
pTemp = pTemp->pNext;
}
return;
}
VOID
RemoveIniTnSFilter(
PINITNSFILTER pIniTnSFilter
)
{
PINITNSFILTER * ppTemp = NULL;
ppTemp = &gpIniTnSFilter;
while (*ppTemp) {
if (*ppTemp == pIniTnSFilter) {
break;
}
ppTemp = &((*ppTemp)->pNext);
}
if (*ppTemp) {
*ppTemp = pIniTnSFilter->pNext;
}
return;
}
DWORD
EnumSpecificTnFilters(
PINITNSFILTER pIniTnSFilterList,
DWORD dwResumeHandle,
DWORD dwPreferredNumEntries,
PTUNNEL_FILTER * ppTnFilters,
PDWORD pdwNumTnFilters
)
/*++
Routine Description:
This function creates enumerated specific filters.
Arguments:
pIniTnSFilterList - List of specific filters to enumerate.
dwResumeHandle - Location in the specific filter list from which
to resume enumeration.
dwPreferredNumEntries - Preferred number of enumeration entries.
ppTnFilters - Enumerated filters returned to the caller.
pdwNumTnFilters - Number of filters actually enumerated.
Return Value:
ERROR_SUCCESS - Success.
Win32 Error - Failure.
--*/
{
DWORD dwError = 0;
DWORD dwNumToEnum = 0;
PINITNSFILTER pIniTnSFilter = NULL;
DWORD i = 0;
PINITNSFILTER pTemp = NULL;
DWORD dwNumTnFilters = 0;
PTUNNEL_FILTER pTnFilters = 0;
PTUNNEL_FILTER pTnFilter = 0;
if (!dwPreferredNumEntries ||
(dwPreferredNumEntries > MAX_TUNNELFILTER_ENUM_COUNT)) {
dwNumToEnum = MAX_TUNNELFILTER_ENUM_COUNT;
}
else {
dwNumToEnum = dwPreferredNumEntries;
}
pIniTnSFilter = pIniTnSFilterList;
for (i = 0; (i < dwResumeHandle) && (pIniTnSFilter != NULL); i++) {
pIniTnSFilter = pIniTnSFilter->pNext;
}
if (!pIniTnSFilter) {
dwError = ERROR_NO_DATA;
BAIL_ON_WIN32_ERROR(dwError);
}
pTemp = pIniTnSFilter;
while (pTemp && (dwNumTnFilters < dwNumToEnum)) {
dwNumTnFilters++;
pTemp = pTemp->pNext;
}
dwError = SPDApiBufferAllocate(
sizeof(TUNNEL_FILTER)*dwNumTnFilters,
&pTnFilters
);
BAIL_ON_WIN32_ERROR(dwError);
pTemp = pIniTnSFilter;
pTnFilter = pTnFilters;
for (i = 0; i < dwNumTnFilters; i++) {
dwError = CopyTnSFilter(
pTemp,
pTnFilter
);
BAIL_ON_WIN32_ERROR(dwError);
pTemp = pTemp->pNext;
pTnFilter++;
}
*ppTnFilters = pTnFilters;
*pdwNumTnFilters = dwNumTnFilters;
return (dwError);
error:
if (pTnFilters) {
FreeTnFilters(
i,
pTnFilters
);
}
*ppTnFilters = NULL;
*pdwNumTnFilters = 0;
return (dwError);
}
DWORD
CopyTnSFilter(
PINITNSFILTER pIniTnSFilter,
PTUNNEL_FILTER pTnFilter
)
/*++
Routine Description:
This function copies an internal filter into an external filter
container.
Arguments:
pIniTnSFilter - Internal filter to copy.
pTnFilter - External filter container in which to copy.
Return Value:
ERROR_SUCCESS - Success.
Win32 Error - Failure.
--*/
{
DWORD dwError = 0;
pTnFilter->IpVersion = pIniTnSFilter->IpVersion;
CopyGuid(pIniTnSFilter->gParentID, &(pTnFilter->gFilterID));
dwError = CopyName(
pIniTnSFilter->pszFilterName,
&(pTnFilter->pszFilterName)
);
BAIL_ON_WIN32_ERROR(dwError);
pTnFilter->InterfaceType = pIniTnSFilter->InterfaceType;
pTnFilter->bCreateMirror = FALSE;
pTnFilter->dwFlags = pIniTnSFilter->dwFlags;
dwError = CopyIntToExtAddresses(pIniTnSFilter->SrcAddr, &(pTnFilter->SrcAddr));
BAIL_ON_WIN32_ERROR(dwError);
dwError = CopyIntToExtAddresses(pIniTnSFilter->DesAddr, &(pTnFilter->DesAddr));
BAIL_ON_WIN32_ERROR(dwError);
dwError = CopyIntToExtAddresses(
pIniTnSFilter->SrcTunnelAddr,
&(pTnFilter->SrcTunnelAddr)
);
BAIL_ON_WIN32_ERROR(dwError);
dwError = CopyIntToExtAddresses(
pIniTnSFilter->DesTunnelAddr,
&(pTnFilter->DesTunnelAddr)
);
BAIL_ON_WIN32_ERROR(dwError);
CopyProtocols(pIniTnSFilter->Protocol, &(pTnFilter->Protocol));
CopyPorts(pIniTnSFilter->SrcPort, &(pTnFilter->SrcPort));
CopyPorts(pIniTnSFilter->DesPort, &(pTnFilter->DesPort));
pTnFilter->InboundFilterAction = pIniTnSFilter->InboundFilterAction;
pTnFilter->OutboundFilterAction = pIniTnSFilter->OutboundFilterAction;
pTnFilter->dwDirection = pIniTnSFilter->dwDirection;
pTnFilter->dwWeight = pIniTnSFilter->dwWeight;
CopyGuid(pIniTnSFilter->gPolicyID, &(pTnFilter->gPolicyID));
return (dwError);
error:
if (pTnFilter->pszFilterName) {
SPDApiBufferFree(pTnFilter->pszFilterName);
pTnFilter->pszFilterName = NULL;
}
if (pTnFilter->SrcAddr.pgInterfaceID) {
SPDApiBufferFree(pTnFilter->SrcAddr.pgInterfaceID);
pTnFilter->SrcAddr.pgInterfaceID = NULL;
}
if (pTnFilter->DesAddr.pgInterfaceID) {
SPDApiBufferFree(pTnFilter->DesAddr.pgInterfaceID);
pTnFilter->DesAddr.pgInterfaceID = NULL;
}
if (pTnFilter->SrcTunnelAddr.pgInterfaceID) {
SPDApiBufferFree(pTnFilter->SrcTunnelAddr.pgInterfaceID);
pTnFilter->SrcTunnelAddr.pgInterfaceID = NULL;
}
if (pTnFilter->DesTunnelAddr.pgInterfaceID) {
SPDApiBufferFree(pTnFilter->DesTunnelAddr.pgInterfaceID);
pTnFilter->DesTunnelAddr.pgInterfaceID = NULL;
}
return (dwError);
}
DWORD
EnumSelectSpecificTnFilters(
PINITNFILTER pIniTnFilter,
DWORD dwResumeHandle,
DWORD dwPreferredNumEntries,
PTUNNEL_FILTER * ppTnFilters,
PDWORD pdwNumTnFilters
)
/*++
Routine Description:
This function creates enumerated specific filters for
the given generic filter.
Arguments:
pIniTnFilter - Generic filter for which specific filters
are to be enumerated.
dwResumeHandle - Location in the specific filter list for the
given generic filter from which to resume
enumeration.
dwPreferredNumEntries - Preferred number of enumeration entries.
ppTnFilters - Enumerated filters returned to the caller.
pdwNumTnFilters - Number of filters actually enumerated.
Return Value:
ERROR_SUCCESS - Success.
Win32 Error - Failure.
--*/
{
DWORD dwError = 0;
DWORD dwNumToEnum = 0;
DWORD dwNumTnSFilters = 0;
PINITNSFILTER * ppIniTnSFilters = NULL;
DWORD i = 0;
DWORD dwNumTnFilters = 0;
PTUNNEL_FILTER pTnFilters = 0;
PTUNNEL_FILTER pTnFilter = 0;
if (!dwPreferredNumEntries ||
(dwPreferredNumEntries > MAX_TUNNELFILTER_ENUM_COUNT)) {
dwNumToEnum = MAX_TUNNELFILTER_ENUM_COUNT;
}
else {
dwNumToEnum = dwPreferredNumEntries;
}
dwNumTnSFilters = pIniTnFilter->dwNumTnSFilters;
ppIniTnSFilters = pIniTnFilter->ppIniTnSFilters;
if (!dwNumTnSFilters || (dwNumTnSFilters <= dwResumeHandle)) {
dwError = ERROR_NO_DATA;
BAIL_ON_WIN32_ERROR(dwError);
}
dwNumTnFilters = min((dwNumTnSFilters-dwResumeHandle),
dwNumToEnum);
dwError = SPDApiBufferAllocate(
sizeof(TUNNEL_FILTER)*dwNumTnFilters,
&pTnFilters
);
BAIL_ON_WIN32_ERROR(dwError);
pTnFilter = pTnFilters;
for (i = 0; i < dwNumTnFilters; i++) {
dwError = CopyTnSFilter(
*(ppIniTnSFilters + (dwResumeHandle + i)),
pTnFilter
);
BAIL_ON_WIN32_ERROR(dwError);
pTnFilter++;
}
*ppTnFilters = pTnFilters;
*pdwNumTnFilters = dwNumTnFilters;
return (dwError);
error:
if (pTnFilters) {
FreeTnFilters(
i,
pTnFilters
);
}
*ppTnFilters = NULL;
*pdwNumTnFilters = 0;
return (dwError);
}
DWORD
MatchTunnelFilter(
LPWSTR pServerName,
DWORD dwVersion,
PTUNNEL_FILTER pTnFilter,
DWORD dwFlags,
DWORD dwPreferredNumEntries,
PTUNNEL_FILTER * ppMatchedTnFilters,
PIPSEC_QM_POLICY * ppMatchedQMPolicies,
LPDWORD pdwNumMatches,
LPDWORD pdwResumeHandle,
LPVOID pvReserved
)
/*++
Routine Description:
This function finds the matching tunnel filters for the
given tunnel filter template. The matched filters can not
be more specific than the given filter template.
Arguments:
pServerName - Server on which a filter template is to be matched.
pTnFilter - Filter template to match.
dwFlags - Flags.
ppMatchedTnFilters - Matched tunnel filters returned to the
caller.
ppMatchedQMPolicies - Quick mode policies corresponding to the
matched tunnel filters returned to the
caller.
dwPreferredNumEntries - Preferred number of matched entries.
pdwNumMatches - Number of filters actually matched.
pdwResumeHandle - Handle to the location in the matched filter
list from which to resume enumeration.
Return Value:
ERROR_SUCCESS - Success.
Win32 Error - Failure.
--*/
{
DWORD dwError = 0;
DWORD dwResumeHandle = 0;
DWORD dwNumToMatch = 0;
PINITNSFILTER pIniTnSFilter = NULL;
DWORD i = 0;
BOOL bMatches = FALSE;
PINITNSFILTER pTemp = NULL;
DWORD dwNumMatches = 0;
PINITNSFILTER pLastMatchedFilter = NULL;
PTUNNEL_FILTER pMatchedTnFilters = NULL;
PIPSEC_QM_POLICY pMatchedQMPolicies = NULL;
DWORD dwNumFilters = 0;
DWORD dwNumPolicies = 0;
PTUNNEL_FILTER pMatchedTnFilter = NULL;
PIPSEC_QM_POLICY pMatchedQMPolicy = NULL;
dwError = ValidateTnFilterTemplate(
pTnFilter
);
BAIL_ON_WIN32_ERROR(dwError);
dwResumeHandle = *pdwResumeHandle;
if (!dwPreferredNumEntries) {
dwNumToMatch = 1;
}
else if (dwPreferredNumEntries > MAX_TUNNELFILTER_ENUM_COUNT) {
dwNumToMatch = MAX_TUNNELFILTER_ENUM_COUNT;
}
else {
dwNumToMatch = dwPreferredNumEntries;
}
ENTER_SPD_SECTION();
dwError = ValidateTnSecurity(
SPD_OBJECT_SERVER,
SERVER_ACCESS_ADMINISTER,
NULL,
NULL
);
BAIL_ON_LOCK_ERROR(dwError);
pIniTnSFilter = gpIniTnSFilter;
while ((i < dwResumeHandle) && (pIniTnSFilter != NULL)) {
bMatches = MatchIniTnSFilter(
pIniTnSFilter,
pTnFilter
);
if (bMatches) {
i++;
}
pIniTnSFilter = pIniTnSFilter->pNext;
}
if (!pIniTnSFilter) {
if (!(dwFlags & RETURN_DEFAULTS_ON_NO_MATCH)) {
dwError = ERROR_NO_DATA;
BAIL_ON_LOCK_ERROR(dwError);
}
else {
dwError = CopyTnMatchDefaults(
dwFlags,
&pMatchedTnFilters,
&pMatchedQMPolicies,
&dwNumMatches
);
BAIL_ON_LOCK_ERROR(dwError);
BAIL_ON_LOCK_SUCCESS(dwError);
}
}
pTemp = pIniTnSFilter;
while (pTemp && (dwNumMatches < dwNumToMatch)) {
bMatches = MatchIniTnSFilter(
pTemp,
pTnFilter
);
if (bMatches) {
pLastMatchedFilter = pTemp;
dwNumMatches++;
}
pTemp = pTemp->pNext;
}
if (!dwNumMatches) {
if (!(dwFlags & RETURN_DEFAULTS_ON_NO_MATCH)) {
dwError = ERROR_NO_DATA;
BAIL_ON_LOCK_ERROR(dwError);
}
else {
dwError = CopyTnMatchDefaults(
dwFlags,
&pMatchedTnFilters,
&pMatchedQMPolicies,
&dwNumMatches
);
BAIL_ON_LOCK_ERROR(dwError);
BAIL_ON_LOCK_SUCCESS(dwError);
}
}
dwError = SPDApiBufferAllocate(
sizeof(TUNNEL_FILTER)*dwNumMatches,
&pMatchedTnFilters
);
BAIL_ON_LOCK_ERROR(dwError);
dwError = SPDApiBufferAllocate(
sizeof(IPSEC_QM_POLICY)*dwNumMatches,
&pMatchedQMPolicies
);
BAIL_ON_LOCK_ERROR(dwError);
if (dwNumMatches == 1) {
dwError = CopyTnSFilter(
pLastMatchedFilter,
pMatchedTnFilters
);
BAIL_ON_LOCK_ERROR(dwError);
dwNumFilters++;
if (pLastMatchedFilter->pIniQMPolicy) {
dwError = CopyQMPolicy(
dwFlags,
pLastMatchedFilter->pIniQMPolicy,
pMatchedQMPolicies
);
BAIL_ON_LOCK_ERROR(dwError);
}
else {
memset(pMatchedQMPolicies, 0, sizeof(IPSEC_QM_POLICY));
}
dwNumPolicies++;
}
else {
pTemp = pIniTnSFilter;
pMatchedTnFilter = pMatchedTnFilters;
pMatchedQMPolicy = pMatchedQMPolicies;
i = 0;
while (i < dwNumMatches) {
bMatches = MatchIniTnSFilter(
pTemp,
pTnFilter
);
if (bMatches) {
dwError = CopyTnSFilter(
pTemp,
pMatchedTnFilter
);
BAIL_ON_LOCK_ERROR(dwError);
pMatchedTnFilter++;
dwNumFilters++;
if (pTemp->pIniQMPolicy) {
dwError = CopyQMPolicy(
dwFlags,
pTemp->pIniQMPolicy,
pMatchedQMPolicy
);
BAIL_ON_LOCK_ERROR(dwError);
}
else {
memset(pMatchedQMPolicy, 0, sizeof(IPSEC_QM_POLICY));
}
pMatchedQMPolicy++;
dwNumPolicies++;
i++;
}
pTemp = pTemp->pNext;
}
}
lock_success:
LEAVE_SPD_SECTION();
*ppMatchedTnFilters = pMatchedTnFilters;
*ppMatchedQMPolicies = pMatchedQMPolicies;
*pdwNumMatches = dwNumMatches;
*pdwResumeHandle = dwResumeHandle + dwNumMatches;
return (dwError);
lock:
LEAVE_SPD_SECTION();
error:
if (pMatchedTnFilters) {
FreeTnFilters(
dwNumFilters,
pMatchedTnFilters
);
}
if (pMatchedQMPolicies) {
FreeQMPolicies(
dwNumPolicies,
pMatchedQMPolicies
);
}
*ppMatchedTnFilters = NULL;
*ppMatchedQMPolicies = NULL;
*pdwNumMatches = 0;
*pdwResumeHandle = dwResumeHandle;
return (dwError);
}
DWORD
ValidateTnFilterTemplate(
PTUNNEL_FILTER pTnFilter
)
{
DWORD dwError = 0;
BOOL bConflicts = FALSE;
if (!pTnFilter) {
dwError = ERROR_INVALID_PARAMETER;
BAIL_ON_WIN32_ERROR(dwError);
}
dwError = VerifyAddresses(&(pTnFilter->SrcAddr), TRUE, FALSE);
BAIL_ON_WIN32_ERROR(dwError);
dwError = VerifyAddresses(&(pTnFilter->DesAddr), TRUE, TRUE);
BAIL_ON_WIN32_ERROR(dwError);
bConflicts = AddressesConflict(
pTnFilter->SrcAddr,
pTnFilter->DesAddr
);
if (bConflicts) {
dwError = ERROR_INVALID_PARAMETER;
BAIL_ON_WIN32_ERROR(dwError);
}
dwError = ValidateAddr(&(pTnFilter->SrcTunnelAddr));
BAIL_ON_WIN32_ERROR(dwError);
dwError = VerifyAddresses(&(pTnFilter->DesTunnelAddr), TRUE, FALSE);
BAIL_ON_WIN32_ERROR(dwError);
dwError = VerifyProtocols(pTnFilter->Protocol);
BAIL_ON_WIN32_ERROR(dwError);
dwError = VerifyPortsForProtocol(
pTnFilter->SrcPort,
pTnFilter->Protocol
);
BAIL_ON_WIN32_ERROR(dwError);
dwError = VerifyPortsForProtocol(
pTnFilter->DesPort,
pTnFilter->Protocol
);
BAIL_ON_WIN32_ERROR(dwError);
if (pTnFilter->dwDirection) {
if ((pTnFilter->dwDirection != FILTER_DIRECTION_INBOUND) &&
(pTnFilter->dwDirection != FILTER_DIRECTION_OUTBOUND)) {
dwError = ERROR_INVALID_PARAMETER;
BAIL_ON_WIN32_ERROR(dwError);
}
}
error:
return (dwError);
}
BOOL
MatchIniTnSFilter(
PINITNSFILTER pIniTnSFilter,
PTUNNEL_FILTER pTnFilter
)
{
BOOL bMatches = FALSE;
if (pTnFilter->dwDirection) {
if (pTnFilter->dwDirection != pIniTnSFilter->dwDirection) {
return (FALSE);
}
}
if ((pIniTnSFilter->InboundFilterAction != NEGOTIATE_SECURITY) &&
(pIniTnSFilter->OutboundFilterAction != NEGOTIATE_SECURITY)) {
return (FALSE);
}
bMatches = MatchAddresses(
pIniTnSFilter->SrcAddr,
pTnFilter->SrcAddr
);
if (!bMatches) {
return (FALSE);
}
bMatches = MatchAddresses(
pIniTnSFilter->DesAddr,
pTnFilter->DesAddr
);
if (!bMatches) {
return (FALSE);
}
bMatches = MatchAddresses(
pIniTnSFilter->DesTunnelAddr,
pTnFilter->DesTunnelAddr
);
if (!bMatches) {
return (FALSE);
}
bMatches = MatchPorts(
pIniTnSFilter->SrcPort,
pTnFilter->SrcPort
);
if (!bMatches) {
return (FALSE);
}
bMatches = MatchPorts(
pIniTnSFilter->DesPort,
pTnFilter->DesPort
);
if (!bMatches) {
return (FALSE);
}
bMatches = MatchProtocols(
pIniTnSFilter->Protocol,
pTnFilter->Protocol
);
if (!bMatches) {
return (FALSE);
}
return (TRUE);
}
DWORD
CopyTnMatchDefaults(
DWORD dwFlags,
PTUNNEL_FILTER * ppTnFilters,
PIPSEC_QM_POLICY * ppQMPolicies,
PDWORD pdwNumMatches
)
{
DWORD dwError = 0;
PTUNNEL_FILTER pTnFilters = NULL;
PIPSEC_QM_POLICY pQMPolicies = NULL;
DWORD dwNumFilters = 0;
DWORD dwNumPolicies = 0;
if (!gpIniDefaultQMPolicy) {
dwError = ERROR_IPSEC_DEFAULT_QM_POLICY_NOT_FOUND;
BAIL_ON_WIN32_ERROR(dwError);
}
dwError = SPDApiBufferAllocate(
sizeof(TUNNEL_FILTER),
&pTnFilters
);
BAIL_ON_WIN32_ERROR(dwError);
dwError = SPDApiBufferAllocate(
sizeof(IPSEC_QM_POLICY),
&pQMPolicies
);
BAIL_ON_WIN32_ERROR(dwError);
dwError = CopyDefaultTnFilter(
pTnFilters,
gpIniDefaultQMPolicy
);
BAIL_ON_WIN32_ERROR(dwError);
dwNumFilters++;
dwError = CopyQMPolicy(
dwFlags,
gpIniDefaultQMPolicy,
pQMPolicies
);
BAIL_ON_WIN32_ERROR(dwError);
dwNumPolicies++;
*ppTnFilters = pTnFilters;
*ppQMPolicies = pQMPolicies;
*pdwNumMatches = 1;
return (dwError);
error:
if (pTnFilters) {
FreeTnFilters(
dwNumFilters,
pTnFilters
);
}
if (pQMPolicies) {
FreeQMPolicies(
dwNumPolicies,
pQMPolicies
);
}
*ppTnFilters = NULL;
*ppQMPolicies = NULL;
*pdwNumMatches = 0;
return (dwError);
}
DWORD
CopyDefaultTnFilter(
PTUNNEL_FILTER pTnFilter,
PINIQMPOLICY pIniQMPolicy
)
{
DWORD dwError = 0;
RPC_STATUS RpcStatus = RPC_S_OK;
pTnFilter->IpVersion = IPSEC_PROTOCOL_V4;
RpcStatus = UuidCreate(&(pTnFilter->gFilterID));
if (!(RpcStatus == RPC_S_OK || RpcStatus == RPC_S_UUID_LOCAL_ONLY)) {
dwError = RPC_S_CALL_FAILED;
BAIL_ON_WIN32_ERROR(dwError);
}
dwError = CopyName(
L"0",
&(pTnFilter->pszFilterName)
);
BAIL_ON_WIN32_ERROR(dwError);
pTnFilter->InterfaceType = INTERFACE_TYPE_ALL;
pTnFilter->bCreateMirror = TRUE;
pTnFilter->dwFlags = 0;
pTnFilter->dwFlags |= IPSEC_QM_POLICY_DEFAULT_POLICY;
pTnFilter->SrcAddr.AddrType = IP_ADDR_SUBNET;
pTnFilter->SrcAddr.uIpAddr = SUBNET_ADDRESS_ANY;
pTnFilter->SrcAddr.uSubNetMask = SUBNET_MASK_ANY;
pTnFilter->SrcAddr.pgInterfaceID = NULL;
pTnFilter->DesAddr.AddrType = IP_ADDR_SUBNET;
pTnFilter->DesAddr.uIpAddr = SUBNET_ADDRESS_ANY;
pTnFilter->DesAddr.uSubNetMask = SUBNET_MASK_ANY;
pTnFilter->DesAddr.pgInterfaceID = NULL;
pTnFilter->SrcTunnelAddr.AddrType = IP_ADDR_SUBNET;
pTnFilter->SrcTunnelAddr.uIpAddr = SUBNET_ADDRESS_ANY;
pTnFilter->SrcTunnelAddr.uSubNetMask = SUBNET_MASK_ANY;
pTnFilter->SrcTunnelAddr.pgInterfaceID = NULL;
pTnFilter->DesTunnelAddr.AddrType = IP_ADDR_SUBNET;
pTnFilter->DesTunnelAddr.uIpAddr = SUBNET_ADDRESS_ANY;
pTnFilter->DesTunnelAddr.uSubNetMask = SUBNET_MASK_ANY;
pTnFilter->DesTunnelAddr.pgInterfaceID = NULL;
pTnFilter->Protocol.ProtocolType = PROTOCOL_UNIQUE;
pTnFilter->Protocol.dwProtocol = 0;
pTnFilter->SrcPort.PortType = PORT_UNIQUE;
pTnFilter->SrcPort.wPort = 0;
pTnFilter->DesPort.PortType = PORT_UNIQUE;
pTnFilter->DesPort.wPort = 0;
pTnFilter->InboundFilterAction = NEGOTIATE_SECURITY;
pTnFilter->OutboundFilterAction = NEGOTIATE_SECURITY;
pTnFilter->dwDirection = 0;
pTnFilter->dwWeight = 0;
CopyGuid(pIniQMPolicy->gPolicyID, &(pTnFilter->gPolicyID));
error:
return (dwError);
}