You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
645 lines
14 KiB
645 lines
14 KiB
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
#define POLICY_ACCESS_RIGHTS NSU_ACL_F_AdminFull | NSU_ACL_F_LocalSystemFull
|
|
|
|
enum STORAGE_LOCATION {
|
|
LOCATION_LOCAL=0,
|
|
LOCATION_REMOTE,
|
|
LOCATION_GLOBAL,
|
|
LOCATION_CACHE,
|
|
LOCATION_FILE,
|
|
LOCATION_WMI
|
|
};
|
|
|
|
#include <ipsec.h>
|
|
#include <oakdefs.h>
|
|
#include <polstructs.h>
|
|
|
|
//
|
|
//wmi wbenservices
|
|
//
|
|
|
|
#include <wbemidl.h>
|
|
|
|
HRESULT
|
|
WriteDirectoryPolicyToWMI(
|
|
LPWSTR pszMachineName,
|
|
LPWSTR pszPolicyDN,
|
|
PGPO_INFO pGPOInfo,
|
|
IWbemServices *pWbemServices
|
|
);
|
|
|
|
HRESULT
|
|
IPSecClearWMIStore(
|
|
IWbemServices *pWbemServices
|
|
);
|
|
|
|
DWORD
|
|
IPSecEnumPolicyData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_POLICY_DATA ** pppIpsecPolicyData,
|
|
PDWORD pdwNumPolicyObjects
|
|
);
|
|
|
|
DWORD
|
|
IPSecSetPolicyData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCreatePolicyData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData
|
|
);
|
|
|
|
DWORD
|
|
IPSecDeletePolicyData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData
|
|
);
|
|
|
|
DWORD
|
|
IPSecEnumFilterData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_FILTER_DATA ** pppIpsecFilterData,
|
|
PDWORD pdwNumFilterObjects
|
|
);
|
|
|
|
DWORD
|
|
IPSecSetFilterData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_FILTER_DATA pIpsecFilterData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCreateFilterData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_FILTER_DATA pIpsecFilterData
|
|
);
|
|
|
|
DWORD
|
|
IPSecDeleteFilterData(
|
|
HANDLE hPolicyStore,
|
|
GUID FilterIdentifier
|
|
);
|
|
|
|
DWORD
|
|
IPSecEnumNegPolData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_NEGPOL_DATA ** pppIpsecNegPolData,
|
|
PDWORD pdwNumNegPolObjects
|
|
);
|
|
|
|
DWORD
|
|
IPSecSetNegPolData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_NEGPOL_DATA pIpsecNegPolData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCreateNegPolData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_NEGPOL_DATA pIpsecNegPolData
|
|
);
|
|
|
|
DWORD
|
|
IPSecDeleteNegPolData(
|
|
HANDLE hPolicyStore,
|
|
GUID NegPolIdentifier
|
|
);
|
|
|
|
DWORD
|
|
IPSecCreateNFAData(
|
|
HANDLE hPolicyStore,
|
|
GUID PolicyIdentifier,
|
|
PIPSEC_NFA_DATA pIpsecNFAData
|
|
);
|
|
|
|
DWORD
|
|
IPSecSetNFAData(
|
|
HANDLE hPolicyStore,
|
|
GUID PolicyIdentifier,
|
|
PIPSEC_NFA_DATA pIpsecNFAData
|
|
);
|
|
|
|
DWORD
|
|
IPSecDeleteNFAData(
|
|
HANDLE hPolicyStore,
|
|
GUID PolicyIdentifier,
|
|
PIPSEC_NFA_DATA pIpsecNFAData
|
|
);
|
|
|
|
DWORD
|
|
IPSecEnumNFAData(
|
|
HANDLE hPolicyStore,
|
|
GUID PolicyIdentifier,
|
|
PIPSEC_NFA_DATA ** pppIpsecNFAData,
|
|
PDWORD pdwNumNFAObjects
|
|
);
|
|
|
|
DWORD
|
|
IPSecGetFilterData(
|
|
HANDLE hPolicyStore,
|
|
GUID FilterGUID,
|
|
PIPSEC_FILTER_DATA * ppIpsecFilterData
|
|
);
|
|
|
|
DWORD
|
|
IPSecGetNegPolData(
|
|
HANDLE hPolicyStore,
|
|
GUID NegPolGUID,
|
|
PIPSEC_NEGPOL_DATA * ppIpsecNegPolData
|
|
);
|
|
|
|
DWORD
|
|
IPSecEnumISAKMPData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_ISAKMP_DATA ** pppIpsecISAKMPData,
|
|
PDWORD pdwNumISAKMPObjects
|
|
);
|
|
|
|
DWORD
|
|
IPSecSetISAKMPData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_ISAKMP_DATA pIpsecISAKMPData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCreateISAKMPData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_ISAKMP_DATA pIpsecISAKMPData
|
|
);
|
|
|
|
DWORD
|
|
IPSecDeleteISAKMPData(
|
|
HANDLE hPolicyStore,
|
|
GUID ISAKMPIdentifier
|
|
);
|
|
|
|
DWORD
|
|
IPSecGetISAKMPData(
|
|
HANDLE hPolicyStore,
|
|
GUID ISAKMPGUID,
|
|
PIPSEC_ISAKMP_DATA * ppIpsecISAKMPData
|
|
);
|
|
|
|
DWORD
|
|
IPSecOpenPolicyStore(
|
|
LPWSTR pszMachineName,
|
|
DWORD dwTypeOfStore,
|
|
LPWSTR pszFileName,
|
|
HANDLE * phPolicyStore
|
|
);
|
|
|
|
DWORD
|
|
RegOpenPolicyStore(
|
|
LPWSTR pszMachineName,
|
|
IN DWORD dwStore, // See IPSEC_STORE_* values
|
|
HANDLE * phPolicyStore
|
|
);
|
|
|
|
////
|
|
DWORD
|
|
WMIOpenPolicyStore(
|
|
LPWSTR pszMachineName,
|
|
HANDLE * phPolicyStore
|
|
);
|
|
|
|
DWORD
|
|
DirOpenPolicyStore(
|
|
LPWSTR pszMachineName,
|
|
HANDLE * phPolicyStore
|
|
);
|
|
|
|
DWORD
|
|
FileOpenPolicyStore(
|
|
LPWSTR pszMachineName,
|
|
LPWSTR pszFileName,
|
|
HANDLE * phPolicyStore
|
|
);
|
|
|
|
DWORD
|
|
IPSecClosePolicyStore(
|
|
HANDLE hPolicyStore
|
|
);
|
|
|
|
DWORD
|
|
IPSecAssignPolicy(
|
|
HANDLE hPolicyStore,
|
|
GUID PolicyGUID
|
|
);
|
|
|
|
DWORD
|
|
IPSecUnassignPolicy(
|
|
HANDLE hPolicyStore,
|
|
GUID PolicyGUID
|
|
);
|
|
|
|
DWORD
|
|
ComputeDirLocationName(
|
|
LPWSTR pszDirDomainName,
|
|
LPWSTR * ppszDirFQPathName
|
|
);
|
|
|
|
DWORD
|
|
IPSecGetAssignedPolicyData(
|
|
HANDLE hPolicyStore,
|
|
PIPSEC_POLICY_DATA * ppIpsecPolicyData
|
|
);
|
|
|
|
|
|
DWORD
|
|
IPSecExportPolicies(
|
|
HANDLE hSrcPolicyStore,
|
|
HANDLE hDesPolicyStore
|
|
);
|
|
|
|
DWORD
|
|
IPSecImportPolicies(
|
|
HANDLE hSrcPolicyStore,
|
|
HANDLE hDesPolicyStore
|
|
);
|
|
|
|
/*
|
|
//////////////////////////////
|
|
//
|
|
// Globals
|
|
//
|
|
//////////////////////////////
|
|
|
|
// {6A1F5C6F-72B7-11d2-ACF0-0060B0ECCA17}
|
|
static const GUID GUID_POLSTORE_VERSION_INFO =
|
|
{ 0x6a1f5c6f, 0x72b7, 0x11d2, { 0xac, 0xf0, 0x0, 0x60, 0xb0, 0xec, 0xca, 0x17 } };
|
|
|
|
|
|
// {72385230-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_SECURE_INITIATOR_POLICY =
|
|
{ 0x72385230, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {72385231-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_SECURE_INITIATOR_ISAKMP =
|
|
{ 0x72385231, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {72385232-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_SECURE_INITIATOR_NFA =
|
|
{ 0x72385232, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {72385233-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_SECURE_INITIATOR_NEGPOL =
|
|
{ 0x72385233, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
|
|
// {72385236-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_RESPONDER_POLICY =
|
|
{ 0x72385236, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {72385237-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_RESPONDER_ISAKMP =
|
|
{ 0x72385237, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
|
|
// {72385238-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_L2TP_POLICY =
|
|
{ 0x72385238, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {72385239-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_L2TP_ISAKMP =
|
|
{ 0x72385239, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
|
|
// {7238523a-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_ME_TO_FROM_ANYONE_FILTER=
|
|
{ 0x7238523a, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {72385235-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_ICMP_FILTER =
|
|
{ 0x72385235, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
|
|
// {7238523c-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_LOCKDOWN_POLICY =
|
|
{ 0x7238523c, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {7238523d-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_LOCKDOWN_ISAKMP =
|
|
{ 0x7238523d, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {7238523e-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_LOCKDOWN_NFA =
|
|
{ 0x7238523e, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {7238523f-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_LOCKDOWN_NEGPOL =
|
|
{ 0x7238523f, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
static const GUID GUID_BUILTIN_PERMIT_NEGPOL =
|
|
{ 0x7238523b, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
|
|
|
|
|
|
|
|
//////////////////////////////
|
|
//////////////////////////////
|
|
// Negotiation Policy Types
|
|
//////////////////////////////
|
|
//////////////////////////////
|
|
// {62F49E10-6C37-11d1-864C-14A300000000}
|
|
static const GUID GUID_NEGOTIATION_TYPE_STANDARD =
|
|
{ 0x62f49e10, 0x6c37, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {62F49E11-6C37-11d1-864C-14A300000000}
|
|
static const GUID GUID_NEGOTIATION_TYPE_L2TP_BASE =
|
|
{ 0x62f49e11, 0x6c37, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {62F49E12-6C37-11d1-864C-14A300000000}
|
|
static const GUID GUID_NEGOTIATION_TYPE_L2TP_EXTENDED =
|
|
{ 0x62f49e12, 0x6c37, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {62F49E13-6C37-11d1-864C-14A300000000}
|
|
static const GUID GUID_NEGOTIATION_TYPE_DEFAULT =
|
|
{ 0x62f49e13, 0x6c37, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
|
|
//////////////////////////////
|
|
//////////////////////////////
|
|
// Negotiation Policy Actions
|
|
//////////////////////////////
|
|
//////////////////////////////
|
|
|
|
// {3F91A819-7647-11d1-864D-D46A00000000}
|
|
static const GUID GUID_NEGOTIATION_ACTION_BLOCK =
|
|
{ 0x3f91a819, 0x7647, 0x11d1, { 0x86, 0x4d, 0xd4, 0x6a, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {3F91A81A-7647-11d1-864D-D46A00000000}
|
|
static const GUID GUID_NEGOTIATION_ACTION_INBOUND_PASSTHRU =
|
|
{ 0x3f91a81a, 0x7647, 0x11d1, { 0x86, 0x4d, 0xd4, 0x6a, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {8A171DD2-77E3-11d1-8659-A04F00000000}
|
|
static const GUID GUID_NEGOTIATION_ACTION_NO_IPSEC =
|
|
{ 0x8a171dd2, 0x77e3, 0x11d1, { 0x86, 0x59, 0xa0, 0x4f, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {8A171DD3-77E3-11d1-8659-A04F00000000}
|
|
static const GUID GUID_NEGOTIATION_ACTION_NORMAL_IPSEC =
|
|
{ 0x8a171dd3, 0x77e3, 0x11d1, { 0x86, 0x59, 0xa0, 0x4f, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
|
|
|
|
|
|
//////////////////////////////
|
|
//////////////////////////////
|
|
// GUID identifying the default IKE settings to use
|
|
// in case no policy is assigned.
|
|
//////////////////////////////
|
|
//////////////////////////////
|
|
// {72385234-70FA-11d1-864C-14A300000000}
|
|
static const GUID GUID_BUILTIN_DEFAULT_ISAKMP_POLICY=
|
|
{ 0x72385234, 0x70fa, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
///////////////////////
|
|
// GUIDS reserved for future use... These are handy mostly because they
|
|
// are easily recognizable because of the trailing zeros. This helps out in
|
|
// debugging and in manual manipulation of policies by GUID -- such as removing
|
|
// built-in policies from the DS using adsvw etc.
|
|
//////////////////////
|
|
*/
|
|
|
|
|
|
#define PAS_INTERFACE_TYPE_NONE 0
|
|
#define PAS_INTERFACE_TYPE_DIALUP -1
|
|
#define PAS_INTERFACE_TYPE_LAN -2
|
|
#define PAS_INTERFACE_TYPE_ALL -3
|
|
|
|
|
|
//
|
|
// Negotiation Policy Actions.
|
|
//
|
|
|
|
// {3F91A819-7647-11d1-864D-D46A00000000}
|
|
static const GUID GUID_NEGOTIATION_ACTION_BLOCK =
|
|
{ 0x3f91a819, 0x7647, 0x11d1, { 0x86, 0x4d, 0xd4, 0x6a, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {3F91A81A-7647-11d1-864D-D46A00000000}
|
|
static const GUID GUID_NEGOTIATION_ACTION_INBOUND_PASSTHRU =
|
|
{ 0x3f91a81a, 0x7647, 0x11d1, { 0x86, 0x4d, 0xd4, 0x6a, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {8A171DD2-77E3-11d1-8659-A04F00000000}
|
|
static const GUID GUID_NEGOTIATION_ACTION_NO_IPSEC =
|
|
{ 0x8a171dd2, 0x77e3, 0x11d1, { 0x86, 0x59, 0xa0, 0x4f, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {8A171DD3-77E3-11d1-8659-A04F00000000}
|
|
static const GUID GUID_NEGOTIATION_ACTION_NORMAL_IPSEC =
|
|
{ 0x8a171dd3, 0x77e3, 0x11d1, { 0x86, 0x59, 0xa0, 0x4f, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
|
|
//
|
|
// Negotiation Policy Types.
|
|
//
|
|
|
|
// {62F49E10-6C37-11d1-864C-14A300000000}
|
|
static const GUID GUID_NEGOTIATION_TYPE_STANDARD =
|
|
{ 0x62f49e10, 0x6c37, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
// {62F49E13-6C37-11d1-864C-14A300000000}
|
|
static const GUID GUID_NEGOTIATION_TYPE_DEFAULT =
|
|
{ 0x62f49e13, 0x6c37, 0x11d1, { 0x86, 0x4c, 0x14, 0xa3, 0x0, 0x0, 0x0, 0x0 } };
|
|
|
|
|
|
DWORD
|
|
IPSecRestoreDefaultPolicies(
|
|
HANDLE hPolicyStore
|
|
);
|
|
|
|
|
|
DWORD
|
|
IPSecIsDomainPolicyAssigned(
|
|
PBOOL pbIsDomainPolicyAssigned
|
|
);
|
|
|
|
|
|
//
|
|
// Polstore memory management functions.
|
|
//
|
|
|
|
|
|
LPVOID
|
|
IPSecAllocPolMem(
|
|
DWORD cb
|
|
);
|
|
|
|
BOOL
|
|
IPSecFreePolMem(
|
|
LPVOID pMem
|
|
);
|
|
|
|
LPWSTR
|
|
IPSecAllocPolStr(
|
|
LPCWSTR pStr
|
|
);
|
|
|
|
BOOL
|
|
IPSecFreePolStr(
|
|
LPWSTR pStr
|
|
);
|
|
|
|
DWORD
|
|
IPSecReallocatePolMem(
|
|
LPVOID * ppOldMem,
|
|
DWORD cbOld,
|
|
DWORD cbNew
|
|
);
|
|
|
|
BOOL
|
|
IPSecReallocatePolStr(
|
|
LPWSTR *ppStr,
|
|
LPWSTR pStr
|
|
);
|
|
|
|
void
|
|
IPSecFreePolicyData(
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData
|
|
);
|
|
|
|
void
|
|
IPSecFreeNegPolData(
|
|
PIPSEC_NEGPOL_DATA pIpsecNegPolData
|
|
);
|
|
|
|
void
|
|
IPSecFreeFilterData(
|
|
PIPSEC_FILTER_DATA pIpsecFilterData
|
|
);
|
|
|
|
void
|
|
IPSecFreeISAKMPData(
|
|
PIPSEC_ISAKMP_DATA pIpsecISAKMPData
|
|
);
|
|
|
|
void
|
|
IPSecFreeNFAData(
|
|
PIPSEC_NFA_DATA pIpsecNFAData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCopyPolicyData(
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData,
|
|
PIPSEC_POLICY_DATA * ppIpsecPolicyData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCopyNegPolData(
|
|
PIPSEC_NEGPOL_DATA pIpsecNegPolData,
|
|
PIPSEC_NEGPOL_DATA * ppIpsecNegPolData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCopyFilterData(
|
|
PIPSEC_FILTER_DATA pIpsecFilterData,
|
|
PIPSEC_FILTER_DATA * ppIpsecFilterData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCopyFilterSpec(
|
|
PIPSEC_FILTER_SPEC pFilterSpecs,
|
|
PIPSEC_FILTER_SPEC * ppFilterSpecs
|
|
);
|
|
|
|
DWORD
|
|
IPSecCopyISAKMPData(
|
|
PIPSEC_ISAKMP_DATA pIpsecISAKMPData,
|
|
PIPSEC_ISAKMP_DATA * ppIpsecISAKMPData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCopyNFAData(
|
|
PIPSEC_NFA_DATA pIpsecNFAData,
|
|
PIPSEC_NFA_DATA * ppIpsecNFAData
|
|
);
|
|
|
|
DWORD
|
|
IPSecCopyAuthMethod(
|
|
PIPSEC_AUTH_METHOD pAuthMethod,
|
|
PIPSEC_AUTH_METHOD * ppAuthMethod
|
|
);
|
|
|
|
void
|
|
IPSecFreeMulPolicyData(
|
|
PIPSEC_POLICY_DATA * ppIpsecPolicyData,
|
|
DWORD dwNumPolicyObjects
|
|
);
|
|
|
|
void
|
|
IPSecFreeMulNegPolData(
|
|
PIPSEC_NEGPOL_DATA * ppIpsecNegPolData,
|
|
DWORD dwNumNegPolObjects
|
|
);
|
|
|
|
void
|
|
IPSecFreeMulFilterData(
|
|
PIPSEC_FILTER_DATA * ppIpsecFilterData,
|
|
DWORD dwNumFilterObjects
|
|
);
|
|
|
|
void
|
|
IPSecFreeFilterSpecs(
|
|
PIPSEC_FILTER_SPEC * ppIpsecFilterSpecs,
|
|
DWORD dwNumFilterSpecs
|
|
);
|
|
|
|
void
|
|
IPSecFreeFilterSpec(
|
|
PIPSEC_FILTER_SPEC pIpsecFilterSpec
|
|
);
|
|
|
|
void
|
|
IPSecFreeMulISAKMPData(
|
|
PIPSEC_ISAKMP_DATA * ppIpsecISAKMPData,
|
|
DWORD dwNumISAKMPObjects
|
|
);
|
|
|
|
void
|
|
IPSecFreeMulNFAData(
|
|
PIPSEC_NFA_DATA * ppIpsecNFAData,
|
|
DWORD dwNumNFAObjects
|
|
);
|
|
|
|
DWORD
|
|
IPSecChooseDriverBootMode(
|
|
HKEY hHKLMKey,
|
|
DWORD dwStore,
|
|
DWORD dwAction
|
|
);
|
|
|
|
DWORD
|
|
IPSecSetDriverOperationMode(
|
|
HKEY hHKLMKey,
|
|
DWORD dwNewOperationMode
|
|
);
|
|
|
|
DWORD
|
|
IsRegvalueExist(
|
|
HKEY hHKLMKey,
|
|
LPWSTR pszKey,
|
|
LPWSTR pszValue,
|
|
BOOL * pbValueExists
|
|
);
|
|
|
|
DWORD
|
|
IPSecRegDeleteValue(
|
|
HKEY hHKLMKey,
|
|
LPWSTR pszKey,
|
|
LPWSTR pszValue
|
|
);
|
|
|
|
DWORD
|
|
IsAnyPolicyAssigned (
|
|
HKEY hHKLMKey,
|
|
BOOL * pbAnyPolicyAssigned
|
|
);
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|