Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

85 lines
1.5 KiB

#if GPC
NTSTATUS
IPSecGpcInitialize(
);
NTSTATUS
IPSecGpcDeinitialize(
);
NTSTATUS
IPSecEnableGpc(
);
NTSTATUS
IPSecDisableGpc(
);
NTSTATUS
IPSecInitGpcFilter(
IN PFILTER pFilter,
IN PGPC_IP_PATTERN pPattern,
IN PGPC_IP_PATTERN pMask
);
NTSTATUS
IPSecInsertGpcPattern(
IN PFILTER pFilter
);
NTSTATUS
IPSecDeleteGpcPattern(
IN PFILTER pFilter
);
NTSTATUS
IPSecInsertGpcFilter(
IN PFILTER pFilter
);
NTSTATUS
IPSecDeleteGpcFilter(
IN PFILTER pFilter
);
NTSTATUS
IPSecInstallGpcFilter(
IN PFILTER pFilter
);
NTSTATUS
IPSecUninstallGpcFilter(
IN PFILTER pFilter
);
NTSTATUS
IPSecLookupGpcSA(
IN ULARGE_INTEGER uliSrcDstAddr,
IN ULARGE_INTEGER uliProtoSrcDstPort,
IN CLASSIFICATION_HANDLE GpcHandle,
OUT PFILTER *ppFilter,
OUT PSA_TABLE_ENTRY *ppSA,
OUT PSA_TABLE_ENTRY *ppNextSA,
OUT PSA_TABLE_ENTRY *ppTunnelSA,
IN BOOLEAN fOutbound,
IN BOOLEAN fVerify,
IN PIPSEC_UDP_ENCAP_CONTEXT pNatContext
);
NTSTATUS
IPSecLookupGpcMaskedSA(
IN ULARGE_INTEGER uliSrcDstAddr,
IN ULARGE_INTEGER uliProtoSrcDstPort,
OUT PFILTER *ppFilter,
OUT PSA_TABLE_ENTRY *ppSA,
IN BOOLEAN fOutbound,
IN PIPSEC_UDP_ENCAP_CONTEXT pNatContext
);
#endif