|
|
//----------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 2000.
//
// File: policy-r.c
//
// Contents: Policy management for registry.
//
//
// History: KrishnaG.
// AbhisheV.
//
//----------------------------------------------------------------------------
#include "precomp.h"
extern LPWSTR PolicyDNAttributes[];
DWORD RegEnumPolicyData( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, PIPSEC_POLICY_DATA ** pppIpsecPolicyData, PDWORD pdwNumPolicyObjects ) { DWORD dwError = 0; PIPSEC_POLICY_OBJECT * ppIpsecPolicyObjects = NULL; PIPSEC_POLICY_DATA pIpsecPolicyData = NULL; PIPSEC_POLICY_DATA * ppIpsecPolicyData = NULL; DWORD dwNumPolicyObjects = 0; DWORD i = 0; DWORD j = 0;
dwError = RegEnumPolicyObjects( hRegistryKey, pszIpsecRootContainer, &ppIpsecPolicyObjects, &dwNumPolicyObjects ); BAIL_ON_WIN32_ERROR(dwError);
if (dwNumPolicyObjects) { ppIpsecPolicyData = (PIPSEC_POLICY_DATA *) AllocPolMem( dwNumPolicyObjects*sizeof(PIPSEC_POLICY_DATA)); if (!ppIpsecPolicyData) { dwError = ERROR_OUTOFMEMORY; BAIL_ON_WIN32_ERROR(dwError); } }
for (i = 0; i < dwNumPolicyObjects; i++) {
dwError = RegUnmarshallPolicyData( *(ppIpsecPolicyObjects + i), &pIpsecPolicyData ); if (!dwError) { *(ppIpsecPolicyData + j) = pIpsecPolicyData; j++; } }
if (j == 0) { if (ppIpsecPolicyData) { FreePolMem(ppIpsecPolicyData); ppIpsecPolicyData = NULL; } }
*pppIpsecPolicyData = ppIpsecPolicyData; *pdwNumPolicyObjects = j;
dwError = ERROR_SUCCESS;
cleanup:
if (ppIpsecPolicyObjects) { FreeIpsecPolicyObjects( ppIpsecPolicyObjects, dwNumPolicyObjects ); }
return(dwError);
error:
if (ppIpsecPolicyData) { FreeMulIpsecPolicyData( ppIpsecPolicyData, i ); }
*pppIpsecPolicyData = NULL; *pdwNumPolicyObjects = 0;
goto cleanup;
}
DWORD RegEnumPolicyObjects( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, PIPSEC_POLICY_OBJECT ** pppIpsecPolicyObjects, PDWORD pdwNumPolicyObjects ) {
DWORD dwError = 0; DWORD i = 0; DWORD dwCount = 0; PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL; PIPSEC_POLICY_OBJECT * ppIpsecPolicyObjects = NULL;
DWORD dwNumPolicyObjectsReturned = 0; DWORD dwIndex = 0; WCHAR szPolicyName[MAX_PATH]; DWORD dwSize = 0;
*pppIpsecPolicyObjects = NULL; *pdwNumPolicyObjects = 0;
while (1) {
dwSize = MAX_PATH; szPolicyName[0] = L'\0';
dwError = RegEnumKeyExW( hRegistryKey, dwIndex, szPolicyName, &dwSize, NULL, NULL, 0, 0 ); if (dwError == ERROR_NO_MORE_ITEMS) { break; } BAIL_ON_WIN32_ERROR(dwError);
if (!wcsstr(szPolicyName, L"ipsecPolicy")) { dwIndex++; continue; }
pIpsecPolicyObject = NULL;
dwError =UnMarshallRegistryPolicyObject( hRegistryKey, pszIpsecRootContainer, szPolicyName, REG_RELATIVE_NAME, &pIpsecPolicyObject ); if (dwError == ERROR_SUCCESS) {
dwError = ReallocatePolMem( (LPVOID *) &ppIpsecPolicyObjects, sizeof(PIPSEC_POLICY_OBJECT)*(dwNumPolicyObjectsReturned), sizeof(PIPSEC_POLICY_OBJECT)*(dwNumPolicyObjectsReturned + 1) ); BAIL_ON_WIN32_ERROR(dwError);
*(ppIpsecPolicyObjects + dwNumPolicyObjectsReturned) = pIpsecPolicyObject;
dwNumPolicyObjectsReturned++;
}
dwIndex++;
}
*pppIpsecPolicyObjects = ppIpsecPolicyObjects; *pdwNumPolicyObjects = dwNumPolicyObjectsReturned;
dwError = ERROR_SUCCESS;
return(dwError);
error:
if (ppIpsecPolicyObjects) { FreeIpsecPolicyObjects( ppIpsecPolicyObjects, dwNumPolicyObjectsReturned ); }
if (pIpsecPolicyObject) { FreeIpsecPolicyObject( pIpsecPolicyObject ); }
*pppIpsecPolicyObjects = NULL; *pdwNumPolicyObjects = 0;
return(dwError); }
DWORD RegSetPolicyData( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, LPWSTR pszLocationName, PIPSEC_POLICY_DATA pIpsecPolicyData ) { DWORD dwError = 0; PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL; LPWSTR pszAbsOldISAKMPRef = NULL; LPWSTR pszRelOldISAKMPRef = NULL; WCHAR szAbsPolicyReference[MAX_PATH]; LPWSTR pszRelISAKMPReference = NULL; DWORD dwRootPathLen = 0; BOOL bIsActive = FALSE;
dwRootPathLen = wcslen(pszIpsecRootContainer);
dwError = RegGetPolicyExistingISAKMPRef( hRegistryKey, pIpsecPolicyData, &pszAbsOldISAKMPRef ); // BAIL_ON_WIN32_ERROR(dwError);
if (pszAbsOldISAKMPRef && *pszAbsOldISAKMPRef) { pszRelOldISAKMPRef = pszAbsOldISAKMPRef + dwRootPathLen + 1; }
dwError = RegMarshallPolicyObject( pIpsecPolicyData, pszIpsecRootContainer, &pIpsecPolicyObject ); BAIL_ON_WIN32_ERROR(dwError);
dwError = RegSetPolicyObject( hRegistryKey, pszIpsecRootContainer, pIpsecPolicyObject ); BAIL_ON_WIN32_ERROR(dwError);
szAbsPolicyReference[0] = L'\0'; wcscpy(szAbsPolicyReference, pszIpsecRootContainer); wcscat(szAbsPolicyReference, L"\\"); wcscat(szAbsPolicyReference, pIpsecPolicyObject->pszIpsecOwnersReference);
pszRelISAKMPReference = pIpsecPolicyObject->pszIpsecISAKMPReference + dwRootPathLen + 1;
if (pszRelOldISAKMPRef) { dwError = RegRemovePolicyReferenceFromISAKMPObject( hRegistryKey, pszRelOldISAKMPRef, szAbsPolicyReference ); // BAIL_ON_WIN32_ERROR(dwError);
}
dwError = RegAddPolicyReferenceToISAKMPObject( hRegistryKey, pszRelISAKMPReference, szAbsPolicyReference ); BAIL_ON_WIN32_ERROR(dwError);
dwError = RegUpdateISAKMPReferenceInPolicyObject( hRegistryKey, pIpsecPolicyObject->pszIpsecOwnersReference, pszAbsOldISAKMPRef, pIpsecPolicyObject->pszIpsecISAKMPReference ); BAIL_ON_WIN32_ERROR(dwError);
dwError = IsRegPolicyCurrentlyActive( hRegistryKey, pszIpsecRootContainer, pIpsecPolicyData->PolicyIdentifier, &bIsActive ); BAIL_ON_WIN32_ERROR(dwError);
if (bIsActive) { dwError = PingPolicyAgentSvc(pszLocationName); BAIL_ON_WIN32_ERROR(dwError); }
error:
if (pIpsecPolicyObject) { FreeIpsecPolicyObject(pIpsecPolicyObject); }
if (pszAbsOldISAKMPRef) { FreePolStr(pszAbsOldISAKMPRef); }
return(dwError); }
DWORD RegSetPolicyObject( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, PIPSEC_POLICY_OBJECT pIpsecPolicyObject ) { DWORD dwError = 0;
dwError = PersistPolicyObject( hRegistryKey, pIpsecPolicyObject ); BAIL_ON_WIN32_ERROR(dwError);
error:
return(dwError); }
DWORD RegCreatePolicyData( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, PIPSEC_POLICY_DATA pIpsecPolicyData ) { DWORD dwError = 0; PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL; WCHAR szAbsPolicyReference[MAX_PATH]; LPWSTR pszRelISAKMPReference = NULL; DWORD dwRootPathLen = 0;
dwRootPathLen = wcslen(pszIpsecRootContainer);
dwError = RegMarshallPolicyObject( pIpsecPolicyData, pszIpsecRootContainer, &pIpsecPolicyObject ); BAIL_ON_WIN32_ERROR(dwError);
dwError = RegCreatePolicyObject( hRegistryKey, pszIpsecRootContainer, pIpsecPolicyObject ); BAIL_ON_WIN32_ERROR(dwError);
szAbsPolicyReference[0] = L'\0'; wcscpy(szAbsPolicyReference, pszIpsecRootContainer); wcscat(szAbsPolicyReference, L"\\"); wcscat(szAbsPolicyReference, pIpsecPolicyObject->pszIpsecOwnersReference);
pszRelISAKMPReference = pIpsecPolicyObject->pszIpsecISAKMPReference + dwRootPathLen + 1;
//
// Write the ISAKMP object reference.
//
dwError = RegAddPolicyReferenceToISAKMPObject( hRegistryKey, pszRelISAKMPReference, szAbsPolicyReference ); BAIL_ON_WIN32_ERROR(dwError);
//
// Write the Policy object reference.
//
dwError = RegAddISAKMPReferenceToPolicyObject( hRegistryKey, pIpsecPolicyObject->pszIpsecOwnersReference, pIpsecPolicyObject->pszIpsecISAKMPReference ); BAIL_ON_WIN32_ERROR(dwError);
error:
if (pIpsecPolicyObject) { FreeIpsecPolicyObject( pIpsecPolicyObject ); }
return(dwError); }
DWORD RegCreatePolicyObject( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, PIPSEC_POLICY_OBJECT pIpsecPolicyObject ) {
DWORD dwError = 0;
dwError = PersistPolicyObject( hRegistryKey, pIpsecPolicyObject ); BAIL_ON_WIN32_ERROR(dwError);
error:
return(dwError); }
DWORD RegDeletePolicyData( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, PIPSEC_POLICY_DATA pIpsecPolicyData ) { DWORD dwError = ERROR_SUCCESS; PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL; WCHAR szAbsPolicyReference[MAX_PATH]; LPWSTR pszRelISAKMPReference = NULL; DWORD dwRootPathLen = 0; BOOL bIsActive = FALSE;
dwError = IsRegPolicyCurrentlyActive( hRegistryKey, pszIpsecRootContainer, pIpsecPolicyData->PolicyIdentifier, &bIsActive ); BAIL_ON_WIN32_ERROR(dwError);
if (bIsActive) { dwError = ERROR_INVALID_PARAMETER; BAIL_ON_WIN32_ERROR(dwError); }
dwRootPathLen = wcslen(pszIpsecRootContainer);
dwError = RegMarshallPolicyObject( pIpsecPolicyData, pszIpsecRootContainer, &pIpsecPolicyObject ); BAIL_ON_WIN32_ERROR(dwError);
szAbsPolicyReference[0] = L'\0'; wcscpy(szAbsPolicyReference, pszIpsecRootContainer); wcscat(szAbsPolicyReference, L"\\"); wcscat(szAbsPolicyReference, pIpsecPolicyObject->pszIpsecOwnersReference);
pszRelISAKMPReference = pIpsecPolicyObject->pszIpsecISAKMPReference + dwRootPathLen + 1;
dwError = RegRemovePolicyReferenceFromISAKMPObject( hRegistryKey, pszRelISAKMPReference, szAbsPolicyReference ); // BAIL_ON_WIN32_ERROR(dwError);
dwError = RegDeleteKeyW( hRegistryKey, pIpsecPolicyObject->pszIpsecOwnersReference ); BAIL_ON_WIN32_ERROR(dwError);
error:
if (pIpsecPolicyObject) { FreeIpsecPolicyObject(pIpsecPolicyObject); }
return(dwError); }
DWORD RegUnmarshallPolicyData( PIPSEC_POLICY_OBJECT pIpsecPolicyObject, PIPSEC_POLICY_DATA * ppIpsecPolicyData ) { DWORD dwError = 0;
dwError = UnmarshallPolicyObject( pIpsecPolicyObject, IPSEC_REGISTRY_PROVIDER, ppIpsecPolicyData );
return(dwError); }
DWORD RegMarshallPolicyObject( PIPSEC_POLICY_DATA pIpsecPolicyData, LPWSTR pszIpsecRootContainer, PIPSEC_POLICY_OBJECT * ppIpsecPolicyObject ) { DWORD dwError = 0; PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL; WCHAR szGuid[MAX_PATH]; WCHAR szDistinguishedName[MAX_PATH]; LPBYTE pBuffer = NULL; DWORD dwBufferLen = 0; LPWSTR pszStringUuid = NULL; LPWSTR pszIpsecISAKMPReference = NULL; time_t PresentTime;
szGuid[0] = L'\0'; szDistinguishedName[0] = L'\0'; pIpsecPolicyObject = (PIPSEC_POLICY_OBJECT)AllocPolMem( sizeof(IPSEC_POLICY_OBJECT) ); if (!pIpsecPolicyObject) { dwError = ERROR_OUTOFMEMORY; BAIL_ON_WIN32_ERROR(dwError); }
dwError = UuidToString( &pIpsecPolicyData->PolicyIdentifier, &pszStringUuid ); BAIL_ON_WIN32_ERROR(dwError); wcscpy(szGuid, L"{"); wcscat(szGuid, pszStringUuid); wcscat(szGuid, L"}");
//
// Fill in the distinguishedName
//
wcscpy(szDistinguishedName,L"ipsecPolicy"); wcscat(szDistinguishedName, szGuid); pIpsecPolicyObject->pszIpsecOwnersReference = AllocPolStr( szDistinguishedName ); if (!pIpsecPolicyObject->pszIpsecOwnersReference) { dwError = ERROR_OUTOFMEMORY; BAIL_ON_WIN32_ERROR(dwError); }
//
// Fill in the ipsecName
//
if (pIpsecPolicyData->pszIpsecName && *pIpsecPolicyData->pszIpsecName) {
pIpsecPolicyObject->pszIpsecName = AllocPolStr( pIpsecPolicyData->pszIpsecName ); if (!pIpsecPolicyObject->pszIpsecName) { dwError = ERROR_OUTOFMEMORY; BAIL_ON_WIN32_ERROR(dwError); } }
if (pIpsecPolicyData->pszDescription && *pIpsecPolicyData->pszDescription) {
pIpsecPolicyObject->pszDescription = AllocPolStr( pIpsecPolicyData->pszDescription ); if (!pIpsecPolicyObject->pszDescription) { dwError = ERROR_OUTOFMEMORY; BAIL_ON_WIN32_ERROR(dwError); } }
//
// Fill in the ipsecID
//
pIpsecPolicyObject->pszIpsecID = AllocPolStr( szGuid ); if (!pIpsecPolicyObject->pszIpsecID) { dwError = ERROR_OUTOFMEMORY; BAIL_ON_WIN32_ERROR(dwError); }
//
// Fill in the ipsecDataType
//
pIpsecPolicyObject->dwIpsecDataType = 0x100;
//
// Marshall the pIpsecDataBuffer and the Length
//
dwError = MarshallPolicyBuffer( pIpsecPolicyData, &pBuffer, &dwBufferLen ); BAIL_ON_WIN32_ERROR(dwError);
pIpsecPolicyObject->pIpsecData = pBuffer; pIpsecPolicyObject->dwIpsecDataLen = dwBufferLen;
dwError = ConvertGuidToISAKMPString( pIpsecPolicyData->ISAKMPIdentifier, pszIpsecRootContainer, &pszIpsecISAKMPReference ); BAIL_ON_WIN32_ERROR(dwError); pIpsecPolicyObject->pszIpsecISAKMPReference = pszIpsecISAKMPReference;
time(&PresentTime);
pIpsecPolicyObject->dwWhenChanged = (DWORD) PresentTime;
*ppIpsecPolicyObject = pIpsecPolicyObject;
cleanup:
if (pszStringUuid) { RpcStringFree( &pszStringUuid ); }
return(dwError);
error:
if (pIpsecPolicyObject) { FreeIpsecPolicyObject( pIpsecPolicyObject ); }
*ppIpsecPolicyObject = NULL; goto cleanup;
}
DWORD MarshallPolicyBuffer( PIPSEC_POLICY_DATA pIpsecPolicyData, LPBYTE * ppBuffer, DWORD * pdwBufferLen ) { LPBYTE pBuffer = NULL; DWORD dwSize = 0; DWORD dwError = 0; DWORD dwPollingInterval = 0; LPBYTE pCurrentPos = NULL; DWORD dwEffectiveSize = 0;
// {22202163-4F4C-11d1-863B-00A0248D3021}
static const GUID GUID_IPSEC_POLICY_DATA_BLOB = { 0x22202163, 0x4f4c, 0x11d1, { 0x86, 0x3b, 0x0, 0xa0, 0x24, 0x8d, 0x30, 0x21 } };
dwSize += sizeof(GUID); dwSize += sizeof(DWORD);
dwSize += sizeof(DWORD); dwSize++;
pBuffer = AllocPolMem(dwSize); if (!pBuffer) { dwError = ERROR_OUTOFMEMORY; BAIL_ON_WIN32_ERROR(dwError); }
pCurrentPos = pBuffer;
memcpy(pCurrentPos, &GUID_IPSEC_POLICY_DATA_BLOB, sizeof(GUID)); pCurrentPos += sizeof(GUID);
dwEffectiveSize = dwSize - sizeof(GUID) - sizeof(DWORD) - 1;
memcpy(pCurrentPos, &dwEffectiveSize, sizeof(DWORD)); pCurrentPos += sizeof(DWORD);
dwPollingInterval = pIpsecPolicyData->dwPollingInterval; memcpy(pCurrentPos, &dwPollingInterval, sizeof(DWORD));
*ppBuffer = pBuffer; *pdwBufferLen = dwSize; return(dwError);
error:
if (pBuffer) { FreePolMem(pBuffer); }
*ppBuffer = NULL; *pdwBufferLen = 0; return(dwError); }
DWORD ConvertGuidToISAKMPString( GUID ISAKMPIdentifier, LPWSTR pszIpsecRootContainer, LPWSTR * ppszIpsecISAKMPReference ) { DWORD dwError = 0; WCHAR szISAKMPReference[MAX_PATH]; LPWSTR pszIpsecISAKMPReference = NULL; WCHAR szGuidString[MAX_PATH]; LPWSTR pszStringUuid = NULL;
dwError = UuidToString( &ISAKMPIdentifier, &pszStringUuid ); BAIL_ON_WIN32_ERROR(dwError);
szGuidString[0] = L'\0'; wcscpy(szGuidString, L"{"); wcscat(szGuidString, pszStringUuid); wcscat(szGuidString, L"}");
szISAKMPReference[0] = L'\0'; wcscpy(szISAKMPReference, pszIpsecRootContainer); wcscat(szISAKMPReference, L"\\"); wcscat(szISAKMPReference, L"ipsecISAKMPPolicy"); wcscat(szISAKMPReference, szGuidString);
pszIpsecISAKMPReference = AllocPolStr( szISAKMPReference ); if (!pszIpsecISAKMPReference) { dwError = ERROR_OUTOFMEMORY; BAIL_ON_WIN32_ERROR(dwError); }
*ppszIpsecISAKMPReference = pszIpsecISAKMPReference;
cleanup:
if (pszStringUuid) { RpcStringFree(&pszStringUuid); }
return(dwError);
error:
*ppszIpsecISAKMPReference = NULL;
goto cleanup; }
DWORD RegGetPolicyExistingISAKMPRef( HKEY hRegistryKey, PIPSEC_POLICY_DATA pIpsecPolicyData, LPWSTR * ppszISAKMPName ) { DWORD dwError = 0; LPWSTR pszStringUuid = NULL; WCHAR szRelativeName[MAX_PATH]; HKEY hRegKey = NULL; DWORD dwSize = 0;
szRelativeName[0] = L'\0'; dwError = UuidToString( &pIpsecPolicyData->PolicyIdentifier, &pszStringUuid ); BAIL_ON_WIN32_ERROR(dwError); wcscpy(szRelativeName, L"ipsecPolicy"); wcscat(szRelativeName, L"{"); wcscat(szRelativeName, pszStringUuid); wcscat(szRelativeName, L"}");
dwError = RegOpenKeyExW( hRegistryKey, szRelativeName, 0, KEY_ALL_ACCESS, &hRegKey ); BAIL_ON_WIN32_ERROR(dwError);
dwError = RegstoreQueryValue( hRegKey, L"ipsecISAKMPReference", REG_SZ, (LPBYTE *)ppszISAKMPName, &dwSize ); BAIL_ON_WIN32_ERROR(dwError);
error:
if (pszStringUuid) { RpcStringFree(&pszStringUuid); }
if (hRegKey) { RegCloseKey(hRegKey); }
return (dwError); }
DWORD RegAssignPolicy( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, GUID PolicyIdentifier, LPWSTR pszLocationName ) { DWORD dwError = 0; WCHAR szRelativeName[MAX_PATH]; LPWSTR pszStringUuid = NULL; WCHAR szAbsPolicyRef[MAX_PATH];
szRelativeName[0] = L'\0'; dwError = UuidToString( &PolicyIdentifier, &pszStringUuid ); BAIL_ON_WIN32_ERROR(dwError); wcscpy(szRelativeName, L"ipsecPolicy"); wcscat(szRelativeName, L"{"); wcscat(szRelativeName, pszStringUuid); wcscat(szRelativeName, L"}");
szAbsPolicyRef[0] = L'\0'; wcscpy(szAbsPolicyRef, pszIpsecRootContainer); wcscat(szAbsPolicyRef, L"\\"); wcscat(szAbsPolicyRef, szRelativeName);
dwError = RegSetValueExW( hRegistryKey, L"ActivePolicy", 0, REG_SZ, (LPBYTE) szAbsPolicyRef, (wcslen(szAbsPolicyRef) + 1)*sizeof(WCHAR) ); BAIL_ON_WIN32_ERROR(dwError);
dwError = PingPolicyAgentSvc(pszLocationName); BAIL_ON_WIN32_ERROR(dwError);
error:
if (pszStringUuid) { RpcStringFree(&pszStringUuid); }
return (dwError); }
DWORD RegUnassignPolicy( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, GUID PolicyIdentifier, LPWSTR pszLocationName ) { DWORD dwError = 0;
dwError = RegDeleteValueW( hRegistryKey, L"ActivePolicy" ); BAIL_ON_WIN32_ERROR(dwError);
dwError = PingPolicyAgentSvc(pszLocationName); BAIL_ON_WIN32_ERROR(dwError);
error:
return (dwError); }
DWORD PingPolicyAgentSvc( LPWSTR pszLocationName ) { SC_HANDLE ServiceDatabase = NULL; SC_HANDLE ServiceHandle = NULL; BOOL bStatus = FALSE; DWORD dwError = 0; SERVICE_STATUS IpsecStatus;
memset(&IpsecStatus, 0, sizeof(SERVICE_STATUS));
ServiceDatabase = OpenSCManagerW( pszLocationName, NULL, SC_MANAGER_ALL_ACCESS ); if (ServiceDatabase == NULL) { dwError = GetLastError(); BAIL_ON_WIN32_ERROR(dwError); }
ServiceHandle = OpenService( ServiceDatabase, "PolicyAgent", SERVICE_ALL_ACCESS ); if (ServiceHandle == NULL) { dwError = GetLastError(); BAIL_ON_WIN32_ERROR(dwError); }
bStatus = QueryServiceStatus( ServiceHandle, &IpsecStatus ); if (bStatus == FALSE) { dwError = GetLastError(); BAIL_ON_WIN32_ERROR(dwError); }
if (IpsecStatus.dwCurrentState == SERVICE_STOPPED) { bStatus = StartService( ServiceHandle, 0, NULL ); if (bStatus == FALSE) { dwError = GetLastError(); BAIL_ON_WIN32_ERROR(dwError); } } else if (IpsecStatus.dwCurrentState == SERVICE_RUNNING) { bStatus = ControlService( ServiceHandle, 129, &IpsecStatus ); if (bStatus == FALSE) { dwError = GetLastError(); BAIL_ON_WIN32_ERROR(dwError); } }
error:
if (ServiceDatabase != NULL) { CloseServiceHandle(ServiceDatabase); }
if (ServiceHandle != NULL) { CloseServiceHandle(ServiceHandle); }
return (dwError); }
DWORD IsRegPolicyCurrentlyActive( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, GUID PolicyIdentifier, PBOOL pbIsActive ) { DWORD dwError = 0; PIPSEC_POLICY_DATA pIpsecPolicyData = NULL;
*pbIsActive = FALSE;
dwError = RegGetAssignedPolicyData( hRegistryKey, pszIpsecRootContainer, &pIpsecPolicyData ); if (pIpsecPolicyData) { if (!memcmp( &PolicyIdentifier, &pIpsecPolicyData->PolicyIdentifier, sizeof(GUID))) { *pbIsActive = TRUE; } FreeIpsecPolicyData(pIpsecPolicyData); }
dwError = ERROR_SUCCESS;
return (dwError); }
DWORD RegGetPolicyData( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, GUID PolicyGUID, PIPSEC_POLICY_DATA * ppIpsecPolicyData ) { DWORD dwError = 0; PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL; PIPSEC_POLICY_DATA pIpsecPolicyData = NULL; WCHAR szIpsecPolicyName[MAX_PATH]; LPWSTR pszPolicyName = NULL;
szIpsecPolicyName[0] = L'\0'; wcscpy(szIpsecPolicyName, L"ipsecPolicy");
dwError = UuidToString(&PolicyGUID, &pszPolicyName); BAIL_ON_WIN32_ERROR(dwError);
wcscat(szIpsecPolicyName, L"{"); wcscat(szIpsecPolicyName, pszPolicyName); wcscat(szIpsecPolicyName, L"}");
dwError = UnMarshallRegistryPolicyObject( hRegistryKey, pszIpsecRootContainer, szIpsecPolicyName, REG_RELATIVE_NAME, &pIpsecPolicyObject ); BAIL_ON_WIN32_ERROR(dwError);
dwError = RegUnmarshallPolicyData( pIpsecPolicyObject, &pIpsecPolicyData ); BAIL_ON_WIN32_ERROR(dwError);
error:
if (pIpsecPolicyObject) { FreeIpsecPolicyObject( pIpsecPolicyObject ); }
if (pszPolicyName) { RpcStringFree(&pszPolicyName); }
*ppIpsecPolicyData = pIpsecPolicyData;
return(dwError); }
DWORD RegPingPASvcForActivePolicy( HKEY hRegistryKey, LPWSTR pszIpsecRootContainer, LPWSTR pszLocationName ) { DWORD dwError = 0; PIPSEC_POLICY_DATA pIpsecPolicyData = NULL; WCHAR szIpsecPolicyName[MAX_PATH]; LPWSTR pszPolicyName = NULL; WCHAR szAbsPolicyReference[MAX_PATH];
dwError = RegGetAssignedPolicyData( hRegistryKey, pszIpsecRootContainer, &pIpsecPolicyData ); BAIL_ON_WIN32_ERROR(dwError);
if (!pIpsecPolicyData) { dwError = ERROR_SUCCESS; return (dwError); }
szIpsecPolicyName[0] = L'\0'; wcscpy(szIpsecPolicyName, L"ipsecPolicy");
dwError = UuidToString(&pIpsecPolicyData->PolicyIdentifier, &pszPolicyName); BAIL_ON_WIN32_ERROR(dwError);
wcscat(szIpsecPolicyName, L"{"); wcscat(szIpsecPolicyName, pszPolicyName); wcscat(szIpsecPolicyName, L"}");
szAbsPolicyReference[0] = L'\0'; wcscpy(szAbsPolicyReference, pszIpsecRootContainer); wcscat(szAbsPolicyReference, L"\\"); wcscat(szAbsPolicyReference, szIpsecPolicyName);
dwError = RegUpdatePolicy( hRegistryKey, pszIpsecRootContainer, szAbsPolicyReference ); BAIL_ON_WIN32_ERROR(dwError);
dwError = PingPolicyAgentSvc(pszLocationName); BAIL_ON_WIN32_ERROR(dwError);
error:
if (pIpsecPolicyData) { FreeIpsecPolicyData(pIpsecPolicyData); }
if (pszPolicyName) { RpcStringFree(&pszPolicyName); }
return (dwError); }
|