mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1157 lines
28 KiB
1157 lines
28 KiB
//----------------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
// Copyright (C) Microsoft Corporation, 2000.
|
|
//
|
|
// File: policy-r.c
|
|
//
|
|
// Contents: Policy management for registry.
|
|
//
|
|
//
|
|
// History: KrishnaG.
|
|
// AbhisheV.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
|
|
#include "precomp.h"
|
|
|
|
extern LPWSTR PolicyDNAttributes[];
|
|
|
|
DWORD
|
|
RegEnumPolicyData(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
PIPSEC_POLICY_DATA ** pppIpsecPolicyData,
|
|
PDWORD pdwNumPolicyObjects
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
PIPSEC_POLICY_OBJECT * ppIpsecPolicyObjects = NULL;
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData = NULL;
|
|
PIPSEC_POLICY_DATA * ppIpsecPolicyData = NULL;
|
|
DWORD dwNumPolicyObjects = 0;
|
|
DWORD i = 0;
|
|
DWORD j = 0;
|
|
|
|
|
|
dwError = RegEnumPolicyObjects(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
&ppIpsecPolicyObjects,
|
|
&dwNumPolicyObjects
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
if (dwNumPolicyObjects) {
|
|
ppIpsecPolicyData = (PIPSEC_POLICY_DATA *) AllocPolMem(
|
|
dwNumPolicyObjects*sizeof(PIPSEC_POLICY_DATA));
|
|
if (!ppIpsecPolicyData) {
|
|
dwError = ERROR_OUTOFMEMORY;
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
}
|
|
|
|
for (i = 0; i < dwNumPolicyObjects; i++) {
|
|
|
|
dwError = RegUnmarshallPolicyData(
|
|
*(ppIpsecPolicyObjects + i),
|
|
&pIpsecPolicyData
|
|
);
|
|
if (!dwError) {
|
|
*(ppIpsecPolicyData + j) = pIpsecPolicyData;
|
|
j++;
|
|
}
|
|
}
|
|
|
|
if (j == 0) {
|
|
if (ppIpsecPolicyData) {
|
|
FreePolMem(ppIpsecPolicyData);
|
|
ppIpsecPolicyData = NULL;
|
|
}
|
|
}
|
|
|
|
*pppIpsecPolicyData = ppIpsecPolicyData;
|
|
*pdwNumPolicyObjects = j;
|
|
|
|
dwError = ERROR_SUCCESS;
|
|
|
|
cleanup:
|
|
|
|
if (ppIpsecPolicyObjects) {
|
|
FreeIpsecPolicyObjects(
|
|
ppIpsecPolicyObjects,
|
|
dwNumPolicyObjects
|
|
);
|
|
}
|
|
|
|
return(dwError);
|
|
|
|
error:
|
|
|
|
if (ppIpsecPolicyData) {
|
|
FreeMulIpsecPolicyData(
|
|
ppIpsecPolicyData,
|
|
i
|
|
);
|
|
}
|
|
|
|
*pppIpsecPolicyData = NULL;
|
|
*pdwNumPolicyObjects = 0;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
DWORD
|
|
RegEnumPolicyObjects(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
PIPSEC_POLICY_OBJECT ** pppIpsecPolicyObjects,
|
|
PDWORD pdwNumPolicyObjects
|
|
)
|
|
{
|
|
|
|
DWORD dwError = 0;
|
|
DWORD i = 0;
|
|
DWORD dwCount = 0;
|
|
PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL;
|
|
PIPSEC_POLICY_OBJECT * ppIpsecPolicyObjects = NULL;
|
|
|
|
DWORD dwNumPolicyObjectsReturned = 0;
|
|
DWORD dwIndex = 0;
|
|
WCHAR szPolicyName[MAX_PATH];
|
|
DWORD dwSize = 0;
|
|
|
|
*pppIpsecPolicyObjects = NULL;
|
|
*pdwNumPolicyObjects = 0;
|
|
|
|
while (1) {
|
|
|
|
dwSize = MAX_PATH;
|
|
szPolicyName[0] = L'\0';
|
|
|
|
dwError = RegEnumKeyExW(
|
|
hRegistryKey,
|
|
dwIndex,
|
|
szPolicyName,
|
|
&dwSize,
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
0
|
|
);
|
|
if (dwError == ERROR_NO_MORE_ITEMS) {
|
|
break;
|
|
}
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
if (!wcsstr(szPolicyName, L"ipsecPolicy")) {
|
|
dwIndex++;
|
|
continue;
|
|
}
|
|
|
|
pIpsecPolicyObject = NULL;
|
|
|
|
dwError =UnMarshallRegistryPolicyObject(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
szPolicyName,
|
|
REG_RELATIVE_NAME,
|
|
&pIpsecPolicyObject
|
|
);
|
|
if (dwError == ERROR_SUCCESS) {
|
|
|
|
|
|
dwError = ReallocatePolMem(
|
|
(LPVOID *) &ppIpsecPolicyObjects,
|
|
sizeof(PIPSEC_POLICY_OBJECT)*(dwNumPolicyObjectsReturned),
|
|
sizeof(PIPSEC_POLICY_OBJECT)*(dwNumPolicyObjectsReturned + 1)
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
*(ppIpsecPolicyObjects + dwNumPolicyObjectsReturned) = pIpsecPolicyObject;
|
|
|
|
dwNumPolicyObjectsReturned++;
|
|
|
|
}
|
|
|
|
dwIndex++;
|
|
|
|
}
|
|
|
|
*pppIpsecPolicyObjects = ppIpsecPolicyObjects;
|
|
*pdwNumPolicyObjects = dwNumPolicyObjectsReturned;
|
|
|
|
dwError = ERROR_SUCCESS;
|
|
|
|
return(dwError);
|
|
|
|
error:
|
|
|
|
|
|
if (ppIpsecPolicyObjects) {
|
|
FreeIpsecPolicyObjects(
|
|
ppIpsecPolicyObjects,
|
|
dwNumPolicyObjectsReturned
|
|
);
|
|
}
|
|
|
|
if (pIpsecPolicyObject) {
|
|
FreeIpsecPolicyObject(
|
|
pIpsecPolicyObject
|
|
);
|
|
}
|
|
|
|
*pppIpsecPolicyObjects = NULL;
|
|
*pdwNumPolicyObjects = 0;
|
|
|
|
|
|
return(dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegSetPolicyData(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
LPWSTR pszLocationName,
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL;
|
|
LPWSTR pszAbsOldISAKMPRef = NULL;
|
|
LPWSTR pszRelOldISAKMPRef = NULL;
|
|
WCHAR szAbsPolicyReference[MAX_PATH];
|
|
LPWSTR pszRelISAKMPReference = NULL;
|
|
DWORD dwRootPathLen = 0;
|
|
BOOL bIsActive = FALSE;
|
|
|
|
|
|
dwRootPathLen = wcslen(pszIpsecRootContainer);
|
|
|
|
dwError = RegGetPolicyExistingISAKMPRef(
|
|
hRegistryKey,
|
|
pIpsecPolicyData,
|
|
&pszAbsOldISAKMPRef
|
|
);
|
|
// BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
if (pszAbsOldISAKMPRef && *pszAbsOldISAKMPRef) {
|
|
pszRelOldISAKMPRef = pszAbsOldISAKMPRef + dwRootPathLen + 1;
|
|
}
|
|
|
|
dwError = RegMarshallPolicyObject(
|
|
pIpsecPolicyData,
|
|
pszIpsecRootContainer,
|
|
&pIpsecPolicyObject
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = RegSetPolicyObject(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
pIpsecPolicyObject
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
szAbsPolicyReference[0] = L'\0';
|
|
wcscpy(szAbsPolicyReference, pszIpsecRootContainer);
|
|
wcscat(szAbsPolicyReference, L"\\");
|
|
wcscat(szAbsPolicyReference, pIpsecPolicyObject->pszIpsecOwnersReference);
|
|
|
|
pszRelISAKMPReference = pIpsecPolicyObject->pszIpsecISAKMPReference
|
|
+ dwRootPathLen + 1;
|
|
|
|
if (pszRelOldISAKMPRef) {
|
|
dwError = RegRemovePolicyReferenceFromISAKMPObject(
|
|
hRegistryKey,
|
|
pszRelOldISAKMPRef,
|
|
szAbsPolicyReference
|
|
);
|
|
// BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
dwError = RegAddPolicyReferenceToISAKMPObject(
|
|
hRegistryKey,
|
|
pszRelISAKMPReference,
|
|
szAbsPolicyReference
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = RegUpdateISAKMPReferenceInPolicyObject(
|
|
hRegistryKey,
|
|
pIpsecPolicyObject->pszIpsecOwnersReference,
|
|
pszAbsOldISAKMPRef,
|
|
pIpsecPolicyObject->pszIpsecISAKMPReference
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = IsRegPolicyCurrentlyActive(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
pIpsecPolicyData->PolicyIdentifier,
|
|
&bIsActive
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
if (bIsActive) {
|
|
dwError = PingPolicyAgentSvc(pszLocationName);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
error:
|
|
|
|
if (pIpsecPolicyObject) {
|
|
FreeIpsecPolicyObject(pIpsecPolicyObject);
|
|
}
|
|
|
|
if (pszAbsOldISAKMPRef) {
|
|
FreePolStr(pszAbsOldISAKMPRef);
|
|
}
|
|
|
|
return(dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegSetPolicyObject(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
PIPSEC_POLICY_OBJECT pIpsecPolicyObject
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
|
|
dwError = PersistPolicyObject(
|
|
hRegistryKey,
|
|
pIpsecPolicyObject
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
error:
|
|
|
|
return(dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegCreatePolicyData(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL;
|
|
WCHAR szAbsPolicyReference[MAX_PATH];
|
|
LPWSTR pszRelISAKMPReference = NULL;
|
|
DWORD dwRootPathLen = 0;
|
|
|
|
|
|
dwRootPathLen = wcslen(pszIpsecRootContainer);
|
|
|
|
dwError = RegMarshallPolicyObject(
|
|
pIpsecPolicyData,
|
|
pszIpsecRootContainer,
|
|
&pIpsecPolicyObject
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = RegCreatePolicyObject(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
pIpsecPolicyObject
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
szAbsPolicyReference[0] = L'\0';
|
|
wcscpy(szAbsPolicyReference, pszIpsecRootContainer);
|
|
wcscat(szAbsPolicyReference, L"\\");
|
|
wcscat(szAbsPolicyReference, pIpsecPolicyObject->pszIpsecOwnersReference);
|
|
|
|
pszRelISAKMPReference = pIpsecPolicyObject->pszIpsecISAKMPReference
|
|
+ dwRootPathLen + 1;
|
|
|
|
//
|
|
// Write the ISAKMP object reference.
|
|
//
|
|
|
|
dwError = RegAddPolicyReferenceToISAKMPObject(
|
|
hRegistryKey,
|
|
pszRelISAKMPReference,
|
|
szAbsPolicyReference
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
//
|
|
// Write the Policy object reference.
|
|
//
|
|
|
|
dwError = RegAddISAKMPReferenceToPolicyObject(
|
|
hRegistryKey,
|
|
pIpsecPolicyObject->pszIpsecOwnersReference,
|
|
pIpsecPolicyObject->pszIpsecISAKMPReference
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
error:
|
|
|
|
if (pIpsecPolicyObject) {
|
|
FreeIpsecPolicyObject(
|
|
pIpsecPolicyObject
|
|
);
|
|
}
|
|
|
|
return(dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegCreatePolicyObject(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
PIPSEC_POLICY_OBJECT pIpsecPolicyObject
|
|
)
|
|
{
|
|
|
|
DWORD dwError = 0;
|
|
|
|
dwError = PersistPolicyObject(
|
|
hRegistryKey,
|
|
pIpsecPolicyObject
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
error:
|
|
|
|
return(dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegDeletePolicyData(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData
|
|
)
|
|
{
|
|
DWORD dwError = ERROR_SUCCESS;
|
|
PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL;
|
|
WCHAR szAbsPolicyReference[MAX_PATH];
|
|
LPWSTR pszRelISAKMPReference = NULL;
|
|
DWORD dwRootPathLen = 0;
|
|
BOOL bIsActive = FALSE;
|
|
|
|
|
|
dwError = IsRegPolicyCurrentlyActive(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
pIpsecPolicyData->PolicyIdentifier,
|
|
&bIsActive
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
if (bIsActive) {
|
|
dwError = ERROR_INVALID_PARAMETER;
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
dwRootPathLen = wcslen(pszIpsecRootContainer);
|
|
|
|
dwError = RegMarshallPolicyObject(
|
|
pIpsecPolicyData,
|
|
pszIpsecRootContainer,
|
|
&pIpsecPolicyObject
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
szAbsPolicyReference[0] = L'\0';
|
|
wcscpy(szAbsPolicyReference, pszIpsecRootContainer);
|
|
wcscat(szAbsPolicyReference, L"\\");
|
|
wcscat(szAbsPolicyReference, pIpsecPolicyObject->pszIpsecOwnersReference);
|
|
|
|
pszRelISAKMPReference = pIpsecPolicyObject->pszIpsecISAKMPReference
|
|
+ dwRootPathLen + 1;
|
|
|
|
dwError = RegRemovePolicyReferenceFromISAKMPObject(
|
|
hRegistryKey,
|
|
pszRelISAKMPReference,
|
|
szAbsPolicyReference
|
|
);
|
|
// BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = RegDeleteKeyW(
|
|
hRegistryKey,
|
|
pIpsecPolicyObject->pszIpsecOwnersReference
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
error:
|
|
|
|
if (pIpsecPolicyObject) {
|
|
FreeIpsecPolicyObject(pIpsecPolicyObject);
|
|
}
|
|
|
|
return(dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegUnmarshallPolicyData(
|
|
PIPSEC_POLICY_OBJECT pIpsecPolicyObject,
|
|
PIPSEC_POLICY_DATA * ppIpsecPolicyData
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
|
|
dwError = UnmarshallPolicyObject(
|
|
pIpsecPolicyObject,
|
|
IPSEC_REGISTRY_PROVIDER,
|
|
ppIpsecPolicyData
|
|
);
|
|
|
|
|
|
return(dwError);
|
|
}
|
|
|
|
DWORD
|
|
RegMarshallPolicyObject(
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData,
|
|
LPWSTR pszIpsecRootContainer,
|
|
PIPSEC_POLICY_OBJECT * ppIpsecPolicyObject
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL;
|
|
WCHAR szGuid[MAX_PATH];
|
|
WCHAR szDistinguishedName[MAX_PATH];
|
|
LPBYTE pBuffer = NULL;
|
|
DWORD dwBufferLen = 0;
|
|
LPWSTR pszStringUuid = NULL;
|
|
LPWSTR pszIpsecISAKMPReference = NULL;
|
|
time_t PresentTime;
|
|
|
|
szGuid[0] = L'\0';
|
|
szDistinguishedName[0] = L'\0';
|
|
pIpsecPolicyObject = (PIPSEC_POLICY_OBJECT)AllocPolMem(
|
|
sizeof(IPSEC_POLICY_OBJECT)
|
|
);
|
|
if (!pIpsecPolicyObject) {
|
|
dwError = ERROR_OUTOFMEMORY;
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
dwError = UuidToString(
|
|
&pIpsecPolicyData->PolicyIdentifier,
|
|
&pszStringUuid
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
wcscpy(szGuid, L"{");
|
|
wcscat(szGuid, pszStringUuid);
|
|
wcscat(szGuid, L"}");
|
|
|
|
//
|
|
// Fill in the distinguishedName
|
|
//
|
|
|
|
wcscpy(szDistinguishedName,L"ipsecPolicy");
|
|
wcscat(szDistinguishedName, szGuid);
|
|
pIpsecPolicyObject->pszIpsecOwnersReference = AllocPolStr(
|
|
szDistinguishedName
|
|
);
|
|
if (!pIpsecPolicyObject->pszIpsecOwnersReference) {
|
|
dwError = ERROR_OUTOFMEMORY;
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
|
|
//
|
|
// Fill in the ipsecName
|
|
//
|
|
|
|
if (pIpsecPolicyData->pszIpsecName &&
|
|
*pIpsecPolicyData->pszIpsecName) {
|
|
|
|
pIpsecPolicyObject->pszIpsecName = AllocPolStr(
|
|
pIpsecPolicyData->pszIpsecName
|
|
);
|
|
if (!pIpsecPolicyObject->pszIpsecName) {
|
|
dwError = ERROR_OUTOFMEMORY;
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
}
|
|
|
|
if (pIpsecPolicyData->pszDescription &&
|
|
*pIpsecPolicyData->pszDescription) {
|
|
|
|
pIpsecPolicyObject->pszDescription = AllocPolStr(
|
|
pIpsecPolicyData->pszDescription
|
|
);
|
|
if (!pIpsecPolicyObject->pszDescription) {
|
|
dwError = ERROR_OUTOFMEMORY;
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Fill in the ipsecID
|
|
//
|
|
|
|
pIpsecPolicyObject->pszIpsecID = AllocPolStr(
|
|
szGuid
|
|
);
|
|
if (!pIpsecPolicyObject->pszIpsecID) {
|
|
dwError = ERROR_OUTOFMEMORY;
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
//
|
|
// Fill in the ipsecDataType
|
|
//
|
|
|
|
pIpsecPolicyObject->dwIpsecDataType = 0x100;
|
|
|
|
|
|
//
|
|
// Marshall the pIpsecDataBuffer and the Length
|
|
//
|
|
|
|
dwError = MarshallPolicyBuffer(
|
|
pIpsecPolicyData,
|
|
&pBuffer,
|
|
&dwBufferLen
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
pIpsecPolicyObject->pIpsecData = pBuffer;
|
|
pIpsecPolicyObject->dwIpsecDataLen = dwBufferLen;
|
|
|
|
dwError = ConvertGuidToISAKMPString(
|
|
pIpsecPolicyData->ISAKMPIdentifier,
|
|
pszIpsecRootContainer,
|
|
&pszIpsecISAKMPReference
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
pIpsecPolicyObject->pszIpsecISAKMPReference = pszIpsecISAKMPReference;
|
|
|
|
time(&PresentTime);
|
|
|
|
pIpsecPolicyObject->dwWhenChanged = (DWORD) PresentTime;
|
|
|
|
*ppIpsecPolicyObject = pIpsecPolicyObject;
|
|
|
|
cleanup:
|
|
|
|
if (pszStringUuid) {
|
|
RpcStringFree(
|
|
&pszStringUuid
|
|
);
|
|
}
|
|
|
|
return(dwError);
|
|
|
|
error:
|
|
|
|
if (pIpsecPolicyObject) {
|
|
FreeIpsecPolicyObject(
|
|
pIpsecPolicyObject
|
|
);
|
|
}
|
|
|
|
*ppIpsecPolicyObject = NULL;
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
DWORD
|
|
MarshallPolicyBuffer(
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData,
|
|
LPBYTE * ppBuffer,
|
|
DWORD * pdwBufferLen
|
|
)
|
|
{
|
|
LPBYTE pBuffer = NULL;
|
|
DWORD dwSize = 0;
|
|
DWORD dwError = 0;
|
|
DWORD dwPollingInterval = 0;
|
|
LPBYTE pCurrentPos = NULL;
|
|
DWORD dwEffectiveSize = 0;
|
|
|
|
// {22202163-4F4C-11d1-863B-00A0248D3021}
|
|
static const GUID GUID_IPSEC_POLICY_DATA_BLOB =
|
|
{ 0x22202163, 0x4f4c, 0x11d1, { 0x86, 0x3b, 0x0, 0xa0, 0x24, 0x8d, 0x30, 0x21 } };
|
|
|
|
|
|
dwSize += sizeof(GUID);
|
|
dwSize += sizeof(DWORD);
|
|
|
|
dwSize += sizeof(DWORD);
|
|
dwSize++;
|
|
|
|
|
|
pBuffer = AllocPolMem(dwSize);
|
|
if (!pBuffer) {
|
|
dwError = ERROR_OUTOFMEMORY;
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
pCurrentPos = pBuffer;
|
|
|
|
memcpy(pCurrentPos, &GUID_IPSEC_POLICY_DATA_BLOB, sizeof(GUID));
|
|
pCurrentPos += sizeof(GUID);
|
|
|
|
dwEffectiveSize = dwSize - sizeof(GUID) - sizeof(DWORD) - 1;
|
|
|
|
memcpy(pCurrentPos, &dwEffectiveSize, sizeof(DWORD));
|
|
pCurrentPos += sizeof(DWORD);
|
|
|
|
dwPollingInterval = pIpsecPolicyData->dwPollingInterval;
|
|
memcpy(pCurrentPos, &dwPollingInterval, sizeof(DWORD));
|
|
|
|
|
|
*ppBuffer = pBuffer;
|
|
*pdwBufferLen = dwSize;
|
|
return(dwError);
|
|
|
|
error:
|
|
|
|
if (pBuffer) {
|
|
FreePolMem(pBuffer);
|
|
}
|
|
|
|
*ppBuffer = NULL;
|
|
*pdwBufferLen = 0;
|
|
return(dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
ConvertGuidToISAKMPString(
|
|
GUID ISAKMPIdentifier,
|
|
LPWSTR pszIpsecRootContainer,
|
|
LPWSTR * ppszIpsecISAKMPReference
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
WCHAR szISAKMPReference[MAX_PATH];
|
|
LPWSTR pszIpsecISAKMPReference = NULL;
|
|
WCHAR szGuidString[MAX_PATH];
|
|
LPWSTR pszStringUuid = NULL;
|
|
|
|
|
|
dwError = UuidToString(
|
|
&ISAKMPIdentifier,
|
|
&pszStringUuid
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
szGuidString[0] = L'\0';
|
|
wcscpy(szGuidString, L"{");
|
|
wcscat(szGuidString, pszStringUuid);
|
|
wcscat(szGuidString, L"}");
|
|
|
|
szISAKMPReference[0] = L'\0';
|
|
wcscpy(szISAKMPReference, pszIpsecRootContainer);
|
|
wcscat(szISAKMPReference, L"\\");
|
|
wcscat(szISAKMPReference, L"ipsecISAKMPPolicy");
|
|
wcscat(szISAKMPReference, szGuidString);
|
|
|
|
pszIpsecISAKMPReference = AllocPolStr(
|
|
szISAKMPReference
|
|
);
|
|
if (!pszIpsecISAKMPReference) {
|
|
dwError = ERROR_OUTOFMEMORY;
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
*ppszIpsecISAKMPReference = pszIpsecISAKMPReference;
|
|
|
|
cleanup:
|
|
|
|
if (pszStringUuid) {
|
|
RpcStringFree(&pszStringUuid);
|
|
}
|
|
|
|
return(dwError);
|
|
|
|
error:
|
|
|
|
*ppszIpsecISAKMPReference = NULL;
|
|
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegGetPolicyExistingISAKMPRef(
|
|
HKEY hRegistryKey,
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData,
|
|
LPWSTR * ppszISAKMPName
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
LPWSTR pszStringUuid = NULL;
|
|
WCHAR szRelativeName[MAX_PATH];
|
|
HKEY hRegKey = NULL;
|
|
DWORD dwSize = 0;
|
|
|
|
|
|
szRelativeName[0] = L'\0';
|
|
dwError = UuidToString(
|
|
&pIpsecPolicyData->PolicyIdentifier,
|
|
&pszStringUuid
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
wcscpy(szRelativeName, L"ipsecPolicy");
|
|
wcscat(szRelativeName, L"{");
|
|
wcscat(szRelativeName, pszStringUuid);
|
|
wcscat(szRelativeName, L"}");
|
|
|
|
dwError = RegOpenKeyExW(
|
|
hRegistryKey,
|
|
szRelativeName,
|
|
0,
|
|
KEY_ALL_ACCESS,
|
|
&hRegKey
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = RegstoreQueryValue(
|
|
hRegKey,
|
|
L"ipsecISAKMPReference",
|
|
REG_SZ,
|
|
(LPBYTE *)ppszISAKMPName,
|
|
&dwSize
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
error:
|
|
|
|
if (pszStringUuid) {
|
|
RpcStringFree(&pszStringUuid);
|
|
}
|
|
|
|
if (hRegKey) {
|
|
RegCloseKey(hRegKey);
|
|
}
|
|
|
|
return (dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegAssignPolicy(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
GUID PolicyIdentifier,
|
|
LPWSTR pszLocationName
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
WCHAR szRelativeName[MAX_PATH];
|
|
LPWSTR pszStringUuid = NULL;
|
|
WCHAR szAbsPolicyRef[MAX_PATH];
|
|
|
|
|
|
szRelativeName[0] = L'\0';
|
|
dwError = UuidToString(
|
|
&PolicyIdentifier,
|
|
&pszStringUuid
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
wcscpy(szRelativeName, L"ipsecPolicy");
|
|
wcscat(szRelativeName, L"{");
|
|
wcscat(szRelativeName, pszStringUuid);
|
|
wcscat(szRelativeName, L"}");
|
|
|
|
szAbsPolicyRef[0] = L'\0';
|
|
wcscpy(szAbsPolicyRef, pszIpsecRootContainer);
|
|
wcscat(szAbsPolicyRef, L"\\");
|
|
wcscat(szAbsPolicyRef, szRelativeName);
|
|
|
|
dwError = RegSetValueExW(
|
|
hRegistryKey,
|
|
L"ActivePolicy",
|
|
0,
|
|
REG_SZ,
|
|
(LPBYTE) szAbsPolicyRef,
|
|
(wcslen(szAbsPolicyRef) + 1)*sizeof(WCHAR)
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = PingPolicyAgentSvc(pszLocationName);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
error:
|
|
|
|
if (pszStringUuid) {
|
|
RpcStringFree(&pszStringUuid);
|
|
}
|
|
|
|
return (dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegUnassignPolicy(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
GUID PolicyIdentifier,
|
|
LPWSTR pszLocationName
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
|
|
dwError = RegDeleteValueW(
|
|
hRegistryKey,
|
|
L"ActivePolicy"
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = PingPolicyAgentSvc(pszLocationName);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
error:
|
|
|
|
return (dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
PingPolicyAgentSvc(
|
|
LPWSTR pszLocationName
|
|
)
|
|
{
|
|
SC_HANDLE ServiceDatabase = NULL;
|
|
SC_HANDLE ServiceHandle = NULL;
|
|
BOOL bStatus = FALSE;
|
|
DWORD dwError = 0;
|
|
SERVICE_STATUS IpsecStatus;
|
|
|
|
|
|
memset(&IpsecStatus, 0, sizeof(SERVICE_STATUS));
|
|
|
|
ServiceDatabase = OpenSCManagerW(
|
|
pszLocationName,
|
|
NULL,
|
|
SC_MANAGER_ALL_ACCESS
|
|
);
|
|
if (ServiceDatabase == NULL) {
|
|
dwError = GetLastError();
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
ServiceHandle = OpenService(
|
|
ServiceDatabase,
|
|
"PolicyAgent",
|
|
SERVICE_ALL_ACCESS
|
|
);
|
|
if (ServiceHandle == NULL) {
|
|
dwError = GetLastError();
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
bStatus = QueryServiceStatus(
|
|
ServiceHandle,
|
|
&IpsecStatus
|
|
);
|
|
if (bStatus == FALSE) {
|
|
dwError = GetLastError();
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
|
|
if (IpsecStatus.dwCurrentState == SERVICE_STOPPED) {
|
|
bStatus = StartService(
|
|
ServiceHandle,
|
|
0,
|
|
NULL
|
|
);
|
|
if (bStatus == FALSE) {
|
|
dwError = GetLastError();
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
}
|
|
else if (IpsecStatus.dwCurrentState == SERVICE_RUNNING) {
|
|
bStatus = ControlService(
|
|
ServiceHandle,
|
|
129,
|
|
&IpsecStatus
|
|
);
|
|
if (bStatus == FALSE) {
|
|
dwError = GetLastError();
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
}
|
|
}
|
|
|
|
error:
|
|
|
|
if (ServiceDatabase != NULL) {
|
|
CloseServiceHandle(ServiceDatabase);
|
|
}
|
|
|
|
if (ServiceHandle != NULL) {
|
|
CloseServiceHandle(ServiceHandle);
|
|
}
|
|
|
|
return (dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
IsRegPolicyCurrentlyActive(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
GUID PolicyIdentifier,
|
|
PBOOL pbIsActive
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData = NULL;
|
|
|
|
|
|
*pbIsActive = FALSE;
|
|
|
|
dwError = RegGetAssignedPolicyData(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
&pIpsecPolicyData
|
|
);
|
|
if (pIpsecPolicyData) {
|
|
if (!memcmp(
|
|
&PolicyIdentifier,
|
|
&pIpsecPolicyData->PolicyIdentifier,
|
|
sizeof(GUID))) {
|
|
*pbIsActive = TRUE;
|
|
}
|
|
FreeIpsecPolicyData(pIpsecPolicyData);
|
|
}
|
|
|
|
dwError = ERROR_SUCCESS;
|
|
|
|
return (dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegGetPolicyData(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
GUID PolicyGUID,
|
|
PIPSEC_POLICY_DATA * ppIpsecPolicyData
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
PIPSEC_POLICY_OBJECT pIpsecPolicyObject = NULL;
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData = NULL;
|
|
WCHAR szIpsecPolicyName[MAX_PATH];
|
|
LPWSTR pszPolicyName = NULL;
|
|
|
|
szIpsecPolicyName[0] = L'\0';
|
|
wcscpy(szIpsecPolicyName, L"ipsecPolicy");
|
|
|
|
dwError = UuidToString(&PolicyGUID, &pszPolicyName);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
wcscat(szIpsecPolicyName, L"{");
|
|
wcscat(szIpsecPolicyName, pszPolicyName);
|
|
wcscat(szIpsecPolicyName, L"}");
|
|
|
|
dwError = UnMarshallRegistryPolicyObject(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
szIpsecPolicyName,
|
|
REG_RELATIVE_NAME,
|
|
&pIpsecPolicyObject
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = RegUnmarshallPolicyData(
|
|
pIpsecPolicyObject,
|
|
&pIpsecPolicyData
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
error:
|
|
|
|
if (pIpsecPolicyObject) {
|
|
FreeIpsecPolicyObject(
|
|
pIpsecPolicyObject
|
|
);
|
|
}
|
|
|
|
if (pszPolicyName) {
|
|
RpcStringFree(&pszPolicyName);
|
|
}
|
|
|
|
*ppIpsecPolicyData = pIpsecPolicyData;
|
|
|
|
return(dwError);
|
|
}
|
|
|
|
|
|
DWORD
|
|
RegPingPASvcForActivePolicy(
|
|
HKEY hRegistryKey,
|
|
LPWSTR pszIpsecRootContainer,
|
|
LPWSTR pszLocationName
|
|
)
|
|
{
|
|
DWORD dwError = 0;
|
|
PIPSEC_POLICY_DATA pIpsecPolicyData = NULL;
|
|
WCHAR szIpsecPolicyName[MAX_PATH];
|
|
LPWSTR pszPolicyName = NULL;
|
|
WCHAR szAbsPolicyReference[MAX_PATH];
|
|
|
|
|
|
dwError = RegGetAssignedPolicyData(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
&pIpsecPolicyData
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
if (!pIpsecPolicyData) {
|
|
dwError = ERROR_SUCCESS;
|
|
return (dwError);
|
|
}
|
|
|
|
szIpsecPolicyName[0] = L'\0';
|
|
wcscpy(szIpsecPolicyName, L"ipsecPolicy");
|
|
|
|
dwError = UuidToString(&pIpsecPolicyData->PolicyIdentifier, &pszPolicyName);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
wcscat(szIpsecPolicyName, L"{");
|
|
wcscat(szIpsecPolicyName, pszPolicyName);
|
|
wcscat(szIpsecPolicyName, L"}");
|
|
|
|
szAbsPolicyReference[0] = L'\0';
|
|
wcscpy(szAbsPolicyReference, pszIpsecRootContainer);
|
|
wcscat(szAbsPolicyReference, L"\\");
|
|
wcscat(szAbsPolicyReference, szIpsecPolicyName);
|
|
|
|
dwError = RegUpdatePolicy(
|
|
hRegistryKey,
|
|
pszIpsecRootContainer,
|
|
szAbsPolicyReference
|
|
);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
dwError = PingPolicyAgentSvc(pszLocationName);
|
|
BAIL_ON_WIN32_ERROR(dwError);
|
|
|
|
error:
|
|
|
|
if (pIpsecPolicyData) {
|
|
FreeIpsecPolicyData(pIpsecPolicyData);
|
|
}
|
|
|
|
if (pszPolicyName) {
|
|
RpcStringFree(&pszPolicyName);
|
|
}
|
|
|
|
return (dwError);
|
|
}
|
|
|