//++ // // Copyright (C) Microsoft Corporation, 1987 - 2000 // // Module Name: // // ipsec.c // // Abstract: // // IP Security stats for netdiag // // Author: // // DKalin - 8/3/1999 // // Environment: // // User mode only. // Contains NT-specific code. // // Revision History: // // Changed behavior for Whistler - now we report registry/OU settings only // More specific code moved to ipseccmd.exe tool //-- #include "precomp.h" #include #include "tcpinfo.h" #include "ipinfo.h" #include "llinfo.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #define MAXSTRLEN (1024) #define STRING_TEXT_SIZE 4096 #define NETDIAG_TEXT_LIMIT 3072 // policy source constants #define PS_NO_POLICY 0 #define PS_DS_POLICY 1 #define PS_LOC_POLICY 2 // magic strings #define IPSEC_SERVICE_NAME TEXT("policyagent") #define GPEXT_KEY TEXT("Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\GPExtensions") TCHAR pcszGPTIPSecKey[] = TEXT("SOFTWARE\\Policies\\Microsoft\\Windows\\IPSEC\\GPTIPSECPolicy"); TCHAR pcszGPTIPSecName[] = TEXT("DSIPSECPolicyName"); TCHAR pcszGPTIPSecFlags[] = TEXT("DSIPSECPolicyFlags"); TCHAR pcszGPTIPSecPath[] = TEXT("DSIPSECPolicyPath"); TCHAR pcszLocIPSecKey[] = TEXT("SOFTWARE\\Policies\\Microsoft\\Windows\\IPSEC\\Policy\\Local"); TCHAR pcszLocIPSecPol[] = TEXT("ActivePolicy"); TCHAR pcszCacheIPSecKey[] = TEXT("SOFTWARE\\Policies\\Microsoft\\Windows\\IPSEC\\Policy\\Cache"); TCHAR pcszIPSecPolicy[] = TEXT("ipsecPolicy"); TCHAR pcszIPSecName[] = TEXT("ipsecName"); TCHAR pcszIPSecDesc[] = TEXT("description"); TCHAR pcszIPSecTimestamp[] = TEXT("whenChanged"); // BAIL_xx defines #define BAIL_ON_WIN32_ERROR(dwError) \ if (dwError) {\ goto error; \ } #define BAIL_ON_FAILURE(hr) \ if (FAILED(hr)) {\ goto error; \ } typedef struct { int iPolicySource; // one of the three constants mentioned above TCHAR pszPolicyName[MAXSTRLEN]; // policy name TCHAR pszPolicyDesc[MAXSTRLEN]; // policy description TCHAR pszPolicyPath[MAXSTRLEN]; // policy path (DN or RegKey) time_t timestamp; // last updated time } POLICY_INFO, *PPOLICY_INFO; typedef struct { SERVICE_STATUS servStat; // service status QUERY_SERVICE_CONFIG servConfig; // service configuration } SERVICE_INFO, *PSERVICE_INFO; typedef struct { TCHAR pszComputerOU[MAXSTRLEN]; // this computer' OU name PGROUP_POLICY_OBJECT pGPO; // GPO that is assigning IPSec Policy TCHAR pszPolicyOU [MAXSTRLEN]; // OU that has the GPO assigned } DS_POLICY_INFO, *PDS_POLICY_INFO; DWORD MyFormatMessage ( DWORD dwFlags, LPCVOID lpSource, DWORD dwMessageId, DWORD dwLanguageId, LPTSTR lpBuffer, DWORD nSize, va_list *Arguments ); void reportError ( HRESULT hr, NETDIAG_PARAMS* pParams, NETDIAG_RESULT* pResults ); void reportServiceInfo ( NETDIAG_PARAMS* pParams, NETDIAG_RESULT* pResults ); HRESULT getPolicyInfo ( ); DWORD getMorePolicyInfo ( ); DWORD getServiceInfo ( PSERVICE_INFO pInfo ); PGROUP_POLICY_OBJECT getIPSecGPO ( ); void StringToGuid( TCHAR * szValue, GUID * pGuid ); BOOL bTestSkipped = FALSE; BOOL bTestPassed = FALSE; POLICY_INFO piAssignedPolicy; SERVICE_INFO siIPSecStatus; DS_POLICY_INFO dpiAssignedPolicy; TCHAR pszBuf[STRING_TEXT_SIZE]; WCHAR StringTxt[STRING_TEXT_SIZE]; BOOL IPSecTest(NETDIAG_PARAMS* pParams, NETDIAG_RESULT* pResults) //++ // Description: // This is IPSec test // // Arguments: // None. // // Author: // DKalin 08/03/99 //-- { DWORD dwError = ERROR_SUCCESS; HRESULT hr = ERROR_SUCCESS; PGROUP_POLICY_OBJECT pGPO = NULL; PrintStatusMessage( pParams, 4, IDS_IPSEC_STATUS_MSG ); InitializeListHead(&pResults->IPSec.lmsgGlobalOutput); InitializeListHead(&pResults->IPSec.lmsgAdditOutput); dwError = getServiceInfo(&siIPSecStatus); if (dwError != ERROR_SUCCESS || siIPSecStatus.servStat.dwCurrentState != SERVICE_RUNNING) { // test skipped bTestSkipped = TRUE; if (dwError == ERROR_SERVICE_DOES_NOT_EXIST) { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_NOT_INSTALLED ); } else if (dwError == ERROR_SUCCESS) { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_NOT_STARTED ); reportServiceInfo(pParams, pResults); } else { // some error AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_NO_INFO ); reportError(dwError, pParams, pResults); } return S_OK; } else { // test passed bTestPassed = TRUE; reportServiceInfo(pParams, pResults); hr = getPolicyInfo(); if (hr != ERROR_SUCCESS) { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_NO_POLICY_INFO ); reportError(hr, pParams, pResults); } else { switch (piAssignedPolicy.iPolicySource) { case PS_NO_POLICY: AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_NO_POLICY ); break; case PS_DS_POLICY: getMorePolicyInfo(); pGPO = getIPSecGPO(); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_DS_POLICY ); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_POLICY_NAME, piAssignedPolicy.pszPolicyName ); // description and timestamp - not available yet /* AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_DESCRIPTION, piAssignedPolicy.pszPolicyDesc ); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_TIMESTAMP ); if (piAssignedPolicy.timestamp == 0) { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_ADAPTER_UNKNOWN); } else { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDSSZ_GLOBAL_String, _tctime(&(piAssignedPolicy.timestamp))); } AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_EmptyLine); */ // GPO / OU AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_GPO); if (pGPO) { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDSSZ_GLOBAL_String, pGPO->lpDisplayName); } else { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_ADAPTER_UNKNOWN); } AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_EmptyLine); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_OU); if (pGPO) { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDSSZ_GLOBAL_String, pGPO->lpLink); } else { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_ADAPTER_UNKNOWN); } AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_EmptyLine); // policy path AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_POLICY_PATH); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDSSZ_GLOBAL_StringLine, piAssignedPolicy.pszPolicyPath); // cleanup GPO if (pGPO) { FreeGPOList (pGPO); } break; case PS_LOC_POLICY: getMorePolicyInfo(); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_LOC_POLICY ); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_POLICY_NAME, piAssignedPolicy.pszPolicyName ); // description and timestamp AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_DESCRIPTION, piAssignedPolicy.pszPolicyDesc ); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_TIMESTAMP ); if (piAssignedPolicy.timestamp == 0) { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_ADAPTER_UNKNOWN); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_EmptyLine); } else { AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDSSZ_GLOBAL_String, _tctime(&(piAssignedPolicy.timestamp))); } // local policy path AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_POLICY_PATH); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_LOCAL_PATH, piAssignedPolicy.pszPolicyPath); break; } } AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_IPSECCMD ); } return S_OK; } void IPSecGlobalPrint(NETDIAG_PARAMS *pParams, NETDIAG_RESULT *pResults) { PrintMessage(pParams, IDS_GLOBAL_EmptyLine); if (bTestSkipped) { PrintTestTitleResult(pParams, IDS_IPSEC_LONG, IDS_IPSEC_SHORT, FALSE, S_FALSE, 0); } if (bTestPassed) { PrintTestTitleResult(pParams, IDS_IPSEC_LONG, IDS_IPSEC_SHORT, TRUE, S_OK, 0); } PrintMessageList(pParams, &pResults->IPSec.lmsgGlobalOutput); PrintMessageList(pParams, &pResults->IPSec.lmsgAdditOutput); } void IPSecPerInterfacePrint(NETDIAG_PARAMS *pParams, NETDIAG_RESULT *pResults, INTERFACE_RESULT *pInterfaceResults) { return; } void IPSecCleanup(IN NETDIAG_PARAMS *pParams, IN OUT NETDIAG_RESULT *pResults) { MessageListCleanUp(&pResults->IPSec.lmsgGlobalOutput); MessageListCleanUp(&pResults->IPSec.lmsgAdditOutput); } //#define MSG_HANDLE_INVALID TEXT("Handle is invalid. Is IPSEC Policy Agent Service running?") // this will call SDK' FormatMessage function but will also correct some awkward messages // will work only for FORMAT_MESSAGE_ALLOCATE_BUFFER|FORMAT_MESSAGE_FROM_SYSTEM flag combination DWORD MyFormatMessage( DWORD dwFlags, // source and processing options LPCVOID lpSource, // pointer to message source DWORD dwMessageId, // requested message identifier DWORD dwLanguageId, // language identifier for requested message LPTSTR lpBuffer, // pointer to message buffer DWORD nSize, // maximum size of message buffer va_list *Arguments // pointer to array of message inserts ) { LPTSTR* tmp = (LPTSTR*) lpBuffer; switch (dwMessageId) { /* case ERROR_INVALID_HANDLE: // patch for "handle is invalid" message. Suggest to check if service is started if (dwFlags == (FORMAT_MESSAGE_ALLOCATE_BUFFER|FORMAT_MESSAGE_FROM_SYSTEM)) { *tmp = (LPTSTR) malloc((_tcslen(MSG_HANDLE_INVALID)+1)*sizeof(TCHAR)); _tcscpy(*tmp, MSG_HANDLE_INVALID); return _tcslen(*tmp); } else { return FormatMessage(dwFlags,lpSource,dwMessageId,dwLanguageId,lpBuffer,nSize,Arguments); } */ default: // call standard method return FormatMessage(dwFlags,lpSource,dwMessageId,dwLanguageId,lpBuffer,nSize,Arguments); } } /******************************************************************** FUNCTION: getPolicyInfo PURPOSE: gets information about currently assigned policy into piAssignedPolicy global structure INPUT: none RETURNS: HRESULT. Will return ERROR_SUCCESS if everything is fine. *********************************************************************/ HRESULT getPolicyInfo ( ) { LONG lRegistryCallResult; HKEY hRegKey; DWORD dwType; // for RegQueryValueEx DWORD dwBufLen; // for RegQueryValueEx lRegistryCallResult = RegOpenKeyEx( HKEY_LOCAL_MACHINE, pcszGPTIPSecKey, 0, KEY_READ, &hRegKey); if (lRegistryCallResult == ERROR_SUCCESS) { DWORD dwType; DWORD dwValue; DWORD dwLength = sizeof(DWORD); // query for flags, if flags aint' there or equal to 0, we don't have domain policy lRegistryCallResult = RegQueryValueEx(hRegKey, pcszGPTIPSecFlags, NULL, &dwType, (LPBYTE)&dwValue, &dwLength); if (lRegistryCallResult == ERROR_SUCCESS) { if (dwValue == 0) lRegistryCallResult = ERROR_FILE_NOT_FOUND; } // now get name if (lRegistryCallResult == ERROR_SUCCESS) { dwBufLen = MAXSTRLEN*sizeof(TCHAR); lRegistryCallResult = RegQueryValueEx( hRegKey, pcszGPTIPSecName, NULL, &dwType, // will be REG_SZ (LPBYTE) pszBuf, &dwBufLen); } } if (lRegistryCallResult == ERROR_SUCCESS) { piAssignedPolicy.iPolicySource = PS_DS_POLICY; piAssignedPolicy.pszPolicyPath[0] = 0; _tcscpy(piAssignedPolicy.pszPolicyName, pszBuf); dwBufLen = MAXSTRLEN*sizeof(TCHAR); lRegistryCallResult = RegQueryValueEx( hRegKey, pcszGPTIPSecPath, NULL, &dwType, // will be REG_SZ (LPBYTE) pszBuf, &dwBufLen); if (lRegistryCallResult == ERROR_SUCCESS) { _tcscpy(piAssignedPolicy.pszPolicyPath, pszBuf); } RegCloseKey(hRegKey); return ERROR_SUCCESS; } else { RegCloseKey(hRegKey); if (lRegistryCallResult == ERROR_FILE_NOT_FOUND) { // DS reg key not found, check local lRegistryCallResult = RegOpenKeyEx( HKEY_LOCAL_MACHINE, pcszLocIPSecKey, 0, KEY_READ, &hRegKey); if (lRegistryCallResult == ERROR_SUCCESS) { dwBufLen = MAXSTRLEN*sizeof(TCHAR); lRegistryCallResult = RegQueryValueEx( hRegKey, pcszLocIPSecPol, NULL, &dwType, // will be REG_SZ (LPBYTE) pszBuf, &dwBufLen); } else { return lRegistryCallResult; // return whatever error we got } RegCloseKey(hRegKey); if (lRegistryCallResult == ERROR_FILE_NOT_FOUND) { // no policy assigned piAssignedPolicy.iPolicySource = PS_NO_POLICY; piAssignedPolicy.pszPolicyPath[0] = 0; piAssignedPolicy.pszPolicyName[0] = 0; return ERROR_SUCCESS; } else { // read it lRegistryCallResult = RegOpenKeyEx( HKEY_LOCAL_MACHINE, pszBuf, 0, KEY_READ, &hRegKey); _tcscpy(piAssignedPolicy.pszPolicyPath, pszBuf); if (lRegistryCallResult == ERROR_SUCCESS) { dwBufLen = MAXSTRLEN*sizeof(TCHAR); lRegistryCallResult = RegQueryValueEx( hRegKey, pcszIPSecName, NULL, &dwType, // will be REG_SZ (LPBYTE) pszBuf, &dwBufLen); } RegCloseKey(hRegKey); if (lRegistryCallResult == ERROR_FILE_NOT_FOUND) { // no policy assigned piAssignedPolicy.iPolicySource = PS_NO_POLICY; piAssignedPolicy.pszPolicyPath[0] = 0; return ERROR_SUCCESS; } else if (lRegistryCallResult == ERROR_SUCCESS) { // found it piAssignedPolicy.iPolicySource = PS_LOC_POLICY; _tcscpy(piAssignedPolicy.pszPolicyName, pszBuf); } } } return (HRESULT) lRegistryCallResult; } } /******************************************************************** FUNCTION: getServiceInfo PURPOSE: gets information about current state and configuration of IPSec Service into *pInfo structure INPUT: pInfo - pointer to SERVICE_INFO structure which will be updated with current information TODO: RETURNS: Win32 error codes. Will return ERROR_SUCCESS if everything is fine. ERROR_SERVICE_DOES_NOT_EXIST is returned is service is not installed on the system *********************************************************************/ DWORD getServiceInfo ( OUT PSERVICE_INFO pInfo ) { DWORD dwError = ERROR_SUCCESS; DWORD dwRequiredSize = 0; PVOID pLargeConfig = 0; SC_HANDLE schMan = NULL; SC_HANDLE schPA = NULL; if (!pInfo) { return ERROR_INVALID_PARAMETER; } memset(&(pInfo->servStat), 0, sizeof(SERVICE_STATUS)); memset(&(pInfo->servConfig), 0, sizeof(QUERY_SERVICE_CONFIG)); schMan = OpenSCManager(NULL, NULL, GENERIC_READ); if (schMan == NULL) { dwError = GetLastError(); goto error; } schPA = OpenService(schMan, IPSEC_SERVICE_NAME, GENERIC_READ); if (schMan == NULL) { dwError = GetLastError(); goto error; } if (!QueryServiceStatus(schPA, &(pInfo->servStat))) { dwError = GetLastError(); goto error; } if (!QueryServiceConfig(schPA, &(pInfo->servConfig), sizeof(QUERY_SERVICE_CONFIG), &dwRequiredSize)) { dwError = GetLastError(); if (dwError == ERROR_INSUFFICIENT_BUFFER) { pLargeConfig = malloc(dwRequiredSize); if (!pLargeConfig) { goto error; } if (!QueryServiceConfig(schPA, (LPQUERY_SERVICE_CONFIG) pLargeConfig, dwRequiredSize, &dwRequiredSize)) { dwError = GetLastError(); goto error; } // else we just got the information, copy over to *pInfo memcpy(&(pInfo->servConfig), pLargeConfig, sizeof(QUERY_SERVICE_CONFIG)); dwError = ERROR_SUCCESS; } goto error; } error: if (schPA) CloseServiceHandle(schPA); if (schMan) CloseServiceHandle(schMan); if (pLargeConfig) { free(pLargeConfig); } return dwError; } /******************************************************************** FUNCTION: reportError PURPOSE: prints out message code and message itself INPUT: HRESULT - error code RETURNS: none *********************************************************************/ void reportError ( HRESULT hr, NETDIAG_PARAMS* pParams, NETDIAG_RESULT* pResults ) { LPTSTR msg = NULL; MyFormatMessage(FORMAT_MESSAGE_ALLOCATE_BUFFER|FORMAT_MESSAGE_FROM_SYSTEM, NULL, hr, 0, (LPTSTR) &msg, 0, NULL ); AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_ERROR_MSG, hr, msg ); } /******************************************************************** FUNCTION: reportServiceInfo PURPOSE: prints out service status and startup information INPUT: none RETURNS: none *********************************************************************/ void reportServiceInfo ( NETDIAG_PARAMS* pParams, NETDIAG_RESULT* pResults ) { // print status information AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_STATUS ); switch (siIPSecStatus.servStat.dwCurrentState) { case SERVICE_RUNNING: AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_STARTED ); break; case SERVICE_STOPPED: AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_STOPPED ); break; case SERVICE_PAUSED: AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_PAUSED ); break; default: AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_ADAPTER_UNKNOWN); break; } AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_EmptyLine); // print config information AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_STARTUP ); switch (siIPSecStatus.servConfig.dwStartType) { case SERVICE_AUTO_START: AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_AUTOMATIC ); break; case SERVICE_DEMAND_START: AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_MANUAL ); break; case SERVICE_DISABLED: AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_IPSEC_PA_DISABLED ); break; default: AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_ADAPTER_UNKNOWN); break; } AddMessageToList( &pResults->IPSec.lmsgGlobalOutput, Nd_Verbose, IDS_GLOBAL_EmptyLine); } /******************************************************************** FUNCTION: getIPSecGPO PURPOSE: returns GPO that is assigning IPSec Policy INPUT: none RETURNS: pointer to GROUP_POLICY_OBJECT structure NULL if policy is not assigned or if GPO information is not retrievable NOTES: Tested only with domain GPOs Behaves unpredictably when run for the computer that does not have active Directory IPSec policy assigned CALLER is responsible for freeing the memory! *********************************************************************/ PGROUP_POLICY_OBJECT getIPSecGPO ( ) { HKEY hKey, hSubKey; DWORD dwType, dwSize, dwIndex, dwNameSize; LONG lResult; TCHAR szName[50]; GUID guid; PGROUP_POLICY_OBJECT pGPO, pGPOTemp; PGROUP_POLICY_OBJECT pGPOReturn = NULL; DWORD dwResult; // // Enumerate the extensions // lResult = RegOpenKeyEx (HKEY_LOCAL_MACHINE, GPEXT_KEY, 0, KEY_READ, &hKey); if (lResult == ERROR_SUCCESS) { dwIndex = 0; dwNameSize = 50; while ((dwResult = RegEnumKeyEx (hKey, dwIndex++, szName, &dwNameSize, NULL, NULL, NULL, NULL)) == ERROR_SUCCESS) { dwNameSize = 50; // // Skip the registry extension since we did it above // if (lstrcmpi(TEXT("{35378EAC-683F-11D2-A89A-00C04FBBCFA2}"), szName)) { // // Get the list of GPOs this extension applied // StringToGuid(szName, &guid); lResult = GetAppliedGPOList (GPO_LIST_FLAG_MACHINE, NULL, NULL, &guid, &pGPO); if (lResult == ERROR_SUCCESS) { if (pGPO) { // // Get the extension's friendly display name // lResult = RegOpenKeyEx (hKey, szName, 0, KEY_READ, &hSubKey); if (lResult == ERROR_SUCCESS) { if (!lstrcmpi(TEXT("{e437bc1c-aa7d-11d2-a382-00c04f991e27}"), szName)) { // found IPSec return pGPO; } else { FreeGPOList(pGPO); } } } } } } } return pGPOReturn; } //************************************************************* // // StringToGuid() // // Purpose: Converts a GUID in string format to a GUID structure // // Parameters: szValue - guid in string format // pGuid - guid structure receiving the guid // // // Return: void // //************************************************************* void StringToGuid( TCHAR * szValue, GUID * pGuid ) { TCHAR wc; INT i; // // If the first character is a '{', skip it // if ( szValue[0] == TEXT('{') ) szValue++; // // Since szValue may be used again, no permanent modification to // it is be made. // wc = szValue[8]; szValue[8] = 0; pGuid->Data1 = _tcstoul( &szValue[0], 0, 16 ); szValue[8] = wc; wc = szValue[13]; szValue[13] = 0; pGuid->Data2 = (USHORT)_tcstoul( &szValue[9], 0, 16 ); szValue[13] = wc; wc = szValue[18]; szValue[18] = 0; pGuid->Data3 = (USHORT)_tcstoul( &szValue[14], 0, 16 ); szValue[18] = wc; wc = szValue[21]; szValue[21] = 0; pGuid->Data4[0] = (unsigned char)_tcstoul( &szValue[19], 0, 16 ); szValue[21] = wc; wc = szValue[23]; szValue[23] = 0; pGuid->Data4[1] = (unsigned char)_tcstoul( &szValue[21], 0, 16 ); szValue[23] = wc; for ( i = 0; i < 6; i++ ) { wc = szValue[26+i*2]; szValue[26+i*2] = 0; pGuid->Data4[2+i] = (unsigned char)_tcstoul( &szValue[24+i*2], 0, 16 ); szValue[26+i*2] = wc; } } /******************************************************************** FUNCTION: getMorePolicyInfo PURPOSE: gets additional information about currently assigned policy into piAssignedPolicy global structure INPUT: none, uses global piAssignedPolicy structure particularly iPolicySource pszPolicyName pszPolicyPath fields RETURNS: HRESULT. Will return ERROR_SUCCESS if everything is fine. Currently fills pszPolicyDesc and timestamp fields of the global structure NOTES: This is separate from getPolicyInfo routine for two reasons a) the information obtained here is optional and error during this particular routine is not considered fatal b) the code structure is simpler as this routine is "built on top" of what getPolicyInfo provides *********************************************************************/ DWORD getMorePolicyInfo ( ) { DWORD dwError = ERROR_SUCCESS; HKEY hRegKey = NULL; DWORD dwType; // for RegQueryValueEx DWORD dwBufLen; // for RegQueryValueEx DWORD dwValue; DWORD dwLength = sizeof(DWORD); PTCHAR* ppszExplodeDN = NULL; // set some default values piAssignedPolicy.pszPolicyDesc[0] = 0; piAssignedPolicy.timestamp = 0; switch (piAssignedPolicy.iPolicySource) { case PS_LOC_POLICY: // open the key dwError = RegOpenKeyEx( HKEY_LOCAL_MACHINE, piAssignedPolicy.pszPolicyPath, 0, KEY_READ, &hRegKey); BAIL_ON_WIN32_ERROR(dwError); // timestamp dwError = RegQueryValueEx(hRegKey, pcszIPSecTimestamp, NULL, &dwType, (LPBYTE)&dwValue, &dwLength); BAIL_ON_WIN32_ERROR(dwError); piAssignedPolicy.timestamp = dwValue; // description dwBufLen = MAXSTRLEN*sizeof(TCHAR); dwError = RegQueryValueEx( hRegKey, pcszIPSecDesc, NULL, &dwType, // will be REG_SZ (LPBYTE) pszBuf, &dwBufLen); BAIL_ON_WIN32_ERROR(dwError); _tcscpy(piAssignedPolicy.pszPolicyDesc, pszBuf); break; case PS_DS_POLICY: // get the policy name from DN _tcscpy(pszBuf, pcszCacheIPSecKey); ppszExplodeDN = ldap_explode_dn(piAssignedPolicy.pszPolicyPath, 1); if (!ppszExplodeDN) { goto error; } _tcscat(pszBuf, TEXT("\\")); _tcscat(pszBuf, ppszExplodeDN[0]); // open the regkey dwError = RegOpenKeyEx( HKEY_LOCAL_MACHINE, pszBuf, 0, KEY_READ, &hRegKey); BAIL_ON_WIN32_ERROR(dwError); /* - tomestamp and description are not available yet // timestamp dwError = RegQueryValueEx(hRegKey, pcszIPSecTimestamp, NULL, &dwType, (LPBYTE)&dwValue, &dwLength); BAIL_ON_WIN32_ERROR(dwError); piAssignedPolicy.timestamp = dwValue; // description dwBufLen = MAXSTRLEN*sizeof(TCHAR); dwError = RegQueryValueEx( hRegKey, pcszIPSecDesc, NULL, &dwType, // will be REG_SZ (LPBYTE) pszBuf, &dwBufLen); BAIL_ON_WIN32_ERROR(dwError); _tcscpy(piAssignedPolicy.pszPolicyDesc, pszBuf); */ break; } error: if (hRegKey) { RegCloseKey(hRegKey); } if (ppszExplodeDN) { ldap_value_free(ppszExplodeDN); } return dwError; }