Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

992 lines
30 KiB

#pragma once
# ifdef __cplusplus
extern "C" {
# endif
PVOID
MIDL_user_allocate(size_t NumBytes);
VOID
MIDL_user_free(void * MemPointer);
//---------------------------------------
// Macros for handling additional attributes on WZC_WLAN_CONFIG structures
// Coding of additional attributes in the Reserved bytes of WZC_WLAN_CONFIG objects:
// Reserved
// [1] [0]
// ---SSSAA CCCCCCCC
// SSS = [0-7; used: 0-6] selection set category, one of VPI, VI, PI, VPA, VA, PA, N
// AA = [0-3; used: 0-3] authentication mode, NDIS_802_11_AUTHENTICATION_MODE value
// CCCCCCCC = [0-255] retry counter for this object.
//
#define NWB_AUTHMODE_MASK 0x03
#define NWB_SELCATEG_MASK 0x1C
#define NWB_SET_AUTHMODE(pNWB, nAM) (pNWB)->Reserved[1] = (((pNWB)->Reserved[1] & ~NWB_AUTHMODE_MASK) | ((nAM) & NWB_AUTHMODE_MASK))
#define NWB_GET_AUTHMODE(pNWB) ((pNWB)->Reserved[1] & NWB_AUTHMODE_MASK)
#define NWB_SET_SELCATEG(pNWB, nSC) (pNWB)->Reserved[1] = (((pNWB)->Reserved[1] & ~NWB_SELCATEG_MASK) | (((nSC)<<2) & NWB_SELCATEG_MASK))
#define NWB_GET_SELCATEG(pNWB) (((pNWB)->Reserved[1] & NWB_SELCATEG_MASK)>>2)
//---------------------------------------
// [P]RAW_DATA: generic description of a BLOB
typedef struct
{
DWORD dwDataLen;
#if defined(MIDL_PASS)
[unique, size_is(dwDataLen)] LPBYTE pData;
#else
LPBYTE pData;
#endif
} RAW_DATA, *PRAW_DATA;
#if !defined(MIDL_PASS)
#include <ntddndis.h>
#define WZCCTL_MAX_WEPK_MATERIAL 32
#define WZCCTL_WEPK_PRESENT 0x0001 // specifies whether the configuration includes or not a WEP key
#define WZCCTL_WEPK_XFORMAT 0x0002 // the WEP Key material (if any) is entered as hexadecimal digits
#define WZCCTL_VOLATILE 0x0004 // this configuration should not be stored
#define WZCCTL_POLICY 0x0008 // this configuration is enforced by the policy
//---------------------------------------
// [P]WZC_WLAN_CONFIG: like NDIS_WLAN_BSSID, but contains all the additional
// data that defines a [Preferred] Wireless Zero Configuration
typedef struct
{
ULONG Length; // Length of this structure
DWORD dwCtlFlags; // control flags (NON-NDIS) see WZC_WEPK* constants
// fields from the NDIS_WLAN_BSSID structure
NDIS_802_11_MAC_ADDRESS MacAddress; // BSSID
UCHAR Reserved[2];
NDIS_802_11_SSID Ssid; // SSID
ULONG Privacy; // WEP encryption requirement
NDIS_802_11_RSSI Rssi; // receive signal strength in dBm
NDIS_802_11_NETWORK_TYPE NetworkTypeInUse;
NDIS_802_11_CONFIGURATION Configuration;
NDIS_802_11_NETWORK_INFRASTRUCTURE InfrastructureMode;
NDIS_802_11_RATES SupportedRates;
// fields from NDIS_802_11_WEP structure
ULONG KeyIndex; // 0 is the per-client key, 1-N are the global keys
ULONG KeyLength; // length of key in bytes
UCHAR KeyMaterial[WZCCTL_MAX_WEPK_MATERIAL]; // variable length depending on above field
// aditional field for the Authentication mode
NDIS_802_11_AUTHENTICATION_MODE AuthenticationMode;
RAW_DATA rdUserData; // upper level buffer, attached to this config
} WZC_WLAN_CONFIG, *PWZC_WLAN_CONFIG;
//---------------------------------------
// [P]WZC_802_11_CONFIG_LIST: like NDIS_802_11_BSSID_LIST but indexes a
// set of [Preferred] Wireless Zero Configurations
typedef struct
{
ULONG NumberOfItems; // number of elements in the array below
ULONG Index; // [start] index in the array below
WZC_WLAN_CONFIG Config[1]; // array of WZC_WLAN_CONFIGs
} WZC_802_11_CONFIG_LIST, *PWZC_802_11_CONFIG_LIST;
// WZC dialog codes have the 16th bit set to 1. This is what quickly sepparates them from EAPOL signals.
#define WZCDLG_IS_WZC(x) (((x) & 0x00010000) == 0x00010000)
#define WZCDLG_FAILED 0x00010001 // 802.11 automatic configuration failed
// Dialog BLOB passed through the UI pipe to netman and wzcdlg
typedef struct _WZCDLG_DATA
{
DWORD dwCode;
DWORD lParam; // long numeric data
} WZCDLG_DATA, *PWZCDLG_DATA;
#endif
//---------------------------------------
// [P]INTF_ENTRY: describes the key info for one interface
// this is used in conjunction with [P]INTFS_KEY_TABLE and WZCEnumInterfaces
typedef struct
{
#if defined(MIDL_PASS)
[unique, string] LPWSTR wszGuid;
#else
LPWSTR wszGuid;
#endif
} INTF_KEY_ENTRY, *PINTF_KEY_ENTRY;
//---------------------------------------
// [P]INTFS_KEY_TABLE: describes the table of key info for all interfaces
// this is used in conjunction with [P]INTF_KEY_ENTRY and WZCEnumInterfaces
typedef struct
{
DWORD dwNumIntfs;
#if defined(MIDL_PASS)
[size_is(dwNumIntfs)] PINTF_KEY_ENTRY pIntfs;
#else
PINTF_KEY_ENTRY pIntfs;
#endif
} INTFS_KEY_TABLE, *PINTFS_KEY_TABLE;
//---------------------------------------
// Bits used in conjunction with INTF_ENTRY, WZCQueryInterface
// and WZCSetInterface. They point to the relevant information
// that is requested from the service or to the relevant information
// to be set down to the interface. On the output, they point to
// the information that was processed (queried/set) successfully.
#define INTF_ALL 0xffffffff
#define INTF_ALL_FLAGS 0x0000ffff
#define INTF_CM_MASK 0x00000007 // mask for the configuration mode (NDIS_802_11_NETWORK_INFRASTRUCTURE value)
#define INTF_ENABLED 0x00008000 // zero conf enabled for this interface
#define INTF_FALLBACK 0x00004000 // attempt to connect to visible non-preferred networks also
#define INTF_OIDSSUPP 0x00002000 // 802.11 OIDs are supported by the driver/firmware (can't be set)
#define INTF_VOLATILE 0x00001000 // the service parameters are volatile.
#define INTF_POLICY 0x00000800 // the service parameters are enforced by the policy.
#define INTF_DESCR 0x00010000
#define INTF_NDISMEDIA 0x00020000
#define INTF_PREFLIST 0x00040000
#define INTF_ALL_OIDS 0xfff00000
#define INTF_HANDLE 0x00100000
#define INTF_INFRAMODE 0x00200000
#define INTF_AUTHMODE 0x00400000
#define INTF_WEPSTATUS 0x00800000
#define INTF_SSID 0x01000000
#define INTF_BSSID 0x02000000
#define INTF_BSSIDLIST 0x04000000
#define INTF_LIST_SCAN 0x08000000
#define INTF_ADDWEPKEY 0x10000000
#define INTF_REMWEPKEY 0x20000000
#define INTF_LDDEFWKEY 0x40000000 // reload the default WEP_KEY
//---------------------------------------
// Bits used to specify particular control options for the interface
// entry
#define INTFCTL_CM_MASK 0x0007 // mask for the configuration mode (NDIS_802_11_NETWORK_INFRASTRUCTURE value)
#define INTFCTL_ENABLED 0x8000 // zero conf enabled for this interface
#define INTFCTL_FALLBACK 0x4000 // attempt to connect to visible non-preferred networks also
#define INTFCTL_OIDSSUPP 0x2000 // 802.11 OIDs are supported by the driver/firmware (can't be set)
#define INTFCTL_VOLATILE 0x1000 // the service parameters are volatile.
#define INTFCTL_POLICY 0x0800 // the service parameters policy enforced.
//---------------------------------------
// [P]INTF_ENTRY: contains everything an RPC client needs to know
// about an interface. It is used in conjunction with RpcQueryInterface.
// Flags below are to be used to specify what info is queried for the
// interface. Guid field is not covered since this is the key of the
// structure so it has to be specified eather way.
typedef struct
{
#if defined(MIDL_PASS)
[string] LPWSTR wszGuid;
#else
LPWSTR wszGuid;
#endif
#if defined(MIDL_PASS)
[string] LPWSTR wszDescr;
#else
LPWSTR wszDescr;
#endif
ULONG ulMediaState;
ULONG ulMediaType;
ULONG ulPhysicalMediaType;
INT nInfraMode;
INT nAuthMode;
INT nWepStatus;
DWORD dwCtlFlags; // control flags (see INTFCTL_* defines)
RAW_DATA rdSSID; // encapsulates the SSID raw binary
RAW_DATA rdBSSID; // encapsulates the BSSID raw binary
RAW_DATA rdBSSIDList; // encapsulates one WZC_802_11_CONFIG_LIST structure
RAW_DATA rdStSSIDList; // encapsulates one WZC_802_11_CONFIG_LIST structure
RAW_DATA rdCtrlData; // data for various control actions on the interface
} INTF_ENTRY, *PINTF_ENTRY;
//---------------------------------------
// Defines and datastucture for handling the WZC Service Context (generic service params)
// Default values for WZC internal timers (WZC_CONTEXT.tmT* fields)
#define TMMS_DEFAULT_TR 0x00000bb8 // Timeout until a rescan completes: ms (3sec)
#define TMMS_DEFAULT_TC 0x0000ea60 // Timeout to retry a valid configuration: ms (1min)
#define TMMS_DEFAULT_TP 0x000007d0 // Timeout to expect a media connect for a selected config: ms (2sec)
#define TMMS_DEFAULT_TF 0x0000ea60 // Timeout to recover from a failed configuration: ms (1min)
#define TMMS_DEFAULT_TD 0x00001388 // Timeout to delay the {SSr} processing: ms (5sec)
// Default turns logging on
#define WZC_CTXT_LOGGING_ON 0x00000001
// Structure: WZC_CONTEXT holds all global service options that may be customized
typedef struct _wzc_context_t
{
DWORD dwFlags; //service flags (see WZC_CTXT_*)
//Service specific timers
DWORD tmTr; //Rescan timeout
DWORD tmTc; //Retry valid config timeout
DWORD tmTp; //Timeout to expect a media connect
DWORD tmTf; //Timeout to recover from an invalid config
DWORD tmTd; //Timeout to delay {Ssr} processing
} WZC_CONTEXT, *PWZC_CONTEXT;
// Context control flags (see WZCSet/QueryContext() calls)
#define WZC_CONTEXT_CTL_LOG 0x00000001
#define WZC_CONTEXT_CTL_TIMER_TR 0x00000002
#define WZC_CONTEXT_CTL_TIMER_TC 0x00000004
#define WZC_CONTEXT_CTL_TIMER_TP 0x00000008
#define WZC_CONTEXT_CTL_TIMER_TF 0x00000010
#define WZC_CONTEXT_CTL_TIMER_TD 0x00000020
//---------------------------------------
// Utility Rpc memory management routines
#define RpcCAlloc(nBytes) MIDL_user_allocate(nBytes)
#define RpcFree(pMem) MIDL_user_free(pMem)
//---------------------------------------
// GetSPResModule: Utility function used to return
// the handle to the module having WZC UI resources
// (needed for XP.QFE & XP.SP1 builds)
HINSTANCE
WZCGetSPResModule();
//---------------------------------------
// GetSPResModule: Utility function used to return
// the handle to the module having WZC UI resources
// (needed for XP.QFE & XP.SP1 builds)
HINSTANCE
WZCGetDlgResModule();
//---------------------------------------
// WZCDeleteIntfObj: cleans an INTF_ENTRY object that is
// allocated within any RPC call.
//
// Parameters
// pIntf
// [in] pointer to the INTF_ENTRY object to delete
VOID
WZCDeleteIntfObj(
PINTF_ENTRY pIntf);
//---------------------------------------
// WZCEnumInterfaces: provides the table of key
// information for all the interfaces that are managed.
// For all subsequent calls the clients need to identify
// the Interface it operates on by providing the respective
// key info.
//
// Parameters:
// pSrvAddr
// [in] WZC Server to contact
// pIntf
// [out] table of key info for all interfaces
// Returned value:
// Win32 error code
DWORD
WZCEnumInterfaces(
LPWSTR pSrvAddr,
PINTFS_KEY_TABLE pIntfs);
//---------------------------------------
// WZCQueryIterface: provides detailed information for a
// given interface.
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be queried (bitmask of INTF_*)
// pIntf:
// [in] Key of the interface to query
// [out] Requested data from the interface.
// pdwOutFlags
// [out] Fields successfully retrieved (bitmask of INTF_*)
//
// Returned value:
// Win32 error code
DWORD
WZCQueryInterface(
LPWSTR pSrvAddr,
DWORD dwInFlags,
PINTF_ENTRY pIntf,
LPDWORD pdwOutFlags);
//---------------------------------------
// WZCSetIterface: sets specific information on the interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be set (bitmask of INTF_*)
// pIntf:
// [in] Key of the interface to query and data to be set
// pdwOutFlags:
// [out] Fields successfully set (bitmask of INTF_*)
//
// Returned value:
// Win32 error code
DWORD
WZCSetInterface(
LPWSTR pSrvAddr,
DWORD dwInFlags,
PINTF_ENTRY pIntf,
LPDWORD pdwOutFlags);
//---------------------------------------
// WZCRefreshInterface: refreshes specific information for the interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be refreshed and specific refresh actions to be
// taken (bitmask of INTF_*)
// pIntf:
// [in] Key of the interface to be refreshed
// pdwOutFlags:
// [out] Fields successfully refreshed (bitmask of INTF_*)
//
// Returned value:
// Win32 error code
DWORD
WZCRefreshInterface(
LPWSTR pSrvAddr,
DWORD dwInFlags,
PINTF_ENTRY pIntf,
LPDWORD pdwOutFlags);
//---------------------------------------
// WZCQueryContext: retrieves the WZC service parameters
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be retrieved (bitmask of WZC_CONTEXT_CTL*)
// pContext:
// [in] Placeholder for the service parameters
// pdwOutFlags:
// [out] Fields successfully retrieved (bitmask of WZC_CONTEXT_CTL*)
//
// Returned value:
// Win32 error code
DWORD
WZCQueryContext(
LPWSTR pSrvAddr,
DWORD dwInFlags,
PWZC_CONTEXT pContext,
LPDWORD pdwOutFlags);
//---------------------------------------
// WZCSetContext: sets specific WZC service parameters
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// dwInFlags:
// [in] Fields to be set (bitmask of WZC_CONTEXT_CTL*)
// pContext:
// [in] Context buffer containing the specific parameters to be set
// pdwOutFlags:
// [out] Fields successfully set (bitmask of WZC_CONTEXT_CTL*)
//
// Returned value:
// Win32 error code
DWORD
WZCSetContext(
LPWSTR pSrvAddr,
DWORD dwInFlags,
PWZC_CONTEXT pContext,
LPDWORD pdwOutFlags);
//============================================================================================
//
// EAPOL-related definitions
//
#define EAPOL_DISABLED 0
#define EAPOL_ENABLED 0x80000000
#define EAPOL_MACHINE_AUTH_DISABLED 0
#define EAPOL_MACHINE_AUTH_ENABLED 0x40000000
#define EAPOL_GUEST_AUTH_DISABLED 0
#define EAPOL_GUEST_AUTH_ENABLED 0x20000000
#define EAP_TYPE_MD5 4
#define EAP_TYPE_TLS 13
#define EAP_TYPE_PEAP 25
#define EAP_TYPE_MSCHAPv2 26
#define DEFAULT_EAP_TYPE EAP_TYPE_TLS
#define DEFAULT_EAPOL_STATE EAPOL_ENABLED
#define DEFAULT_MACHINE_AUTH_STATE EAPOL_MACHINE_AUTH_ENABLED
#define DEFAULT_GUEST_AUTH_STATE EAPOL_GUEST_AUTH_DISABLED
#define DEFAULT_EAP_STATE (DEFAULT_EAPOL_STATE | DEFAULT_MACHINE_AUTH_STATE | DEFAULT_GUEST_AUTH_STATE)
#define IS_EAPOL_ENABLED(x) \
((x & EAPOL_ENABLED)?1:0)
#define IS_MACHINE_AUTH_ENABLED(x) \
((x & EAPOL_MACHINE_AUTH_ENABLED)?1:0)
#define IS_GUEST_AUTH_ENABLED(x) \
((x & EAPOL_GUEST_AUTH_ENABLED)?1:0)
// Supplicant modes of operation depending on network state and
// administrator decision
#define SUPPLICANT_MODE_0 0
#define SUPPLICANT_MODE_1 1
#define SUPPLICANT_MODE_2 2
#define SUPPLICANT_MODE_3 3
#define MAX_SUPPLICANT_MODE SUPPLICANT_MODE_3
#define EAPOL_DEFAULT_SUPPLICANT_MODE SUPPLICANT_MODE_2
// Auth modes of operation depending on administrator decision
#define EAPOL_AUTH_MODE_0 0
#define EAPOL_AUTH_MODE_1 1
#define EAPOL_AUTH_MODE_2 2
#define MAX_EAPOL_AUTH_MODE EAPOL_AUTH_MODE_2
#define EAPOL_DEFAULT_AUTH_MODE EAPOL_AUTH_MODE_1
#define GUID_STRING_LEN_WITH_TERM 39
//
// Heap-related functions
//
#define MALLOC(s) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, (s))
#define FREE(p) HeapFree(GetProcessHeap(), 0, (p))
// Double-threaded linked list node control block. There is one node for each
// entry in a list.
//
// Applications should not access this structure directly.
//
typedef struct
_DTLNODE
{
struct _DTLNODE* pdtlnodePrev; // Address of previous node or NULL if none
struct _DTLNODE* pdtlnodeNext; // Address of next node or NULL if none
VOID* pData; // Address of user's data
LONG_PTR lNodeId; // User-defined node identification code
}
DTLNODE;
//
// Double-threaded linked list control block. There is one for each list.
//
// Applications should not access this structure directly.
//
typedef struct
_DTLLIST
{
struct _DTLNODE* pdtlnodeFirst; // Address of first node or NULL if none
struct _DTLNODE* pdtlnodeLast; // Address of last node or NULL if none
LONG lNodes; // Number of nodes in list
LONG_PTR lListId; // User-defined list identification code
}
DTLLIST;
// List node free function. See FreeList.
//
typedef VOID (*PDESTROYNODE)( IN DTLNODE* );
#define DtlGetFirstNode( pdtllist ) ((pdtllist)->pdtlnodeFirst)
#define DtlGetNextNode( pdtlnode ) ((pdtlnode)->pdtlnodeNext)
#define DtlGetData( pdtlnode ) ((pdtlnode)->pData)
typedef enum _EAPTLS_CONNPROP_ATTRIBUTE_TYPE_
{
ecatMinimum = 0, //Undefined
ecatFlagRegistryCert, //Value is a pointer to BOOL
ecatFlagScard, //Value is a pointer to BOOL
ecatFlagValidateServer, //Value is a pointer to BOOL
ecatFlagValidateName, //Value is a pointer to BOOL
ecatFlagDiffUser, //Value is a pointer to BOOL
ecatServerNames, //Value is a pointer to NULL
//terminated string of semi
//colon delimited server names
ecatRootHashes //Value is a pointer to
//SHA1 hashes of Root certs.
}EAPTLS_CONNPROP_ATTRIBUTE_TYPE;
typedef struct _EAPTLS_CONNPROP_ATTRIBUTE
{
EAPTLS_CONNPROP_ATTRIBUTE_TYPE ecaType;
DWORD dwLength; //includes byte length of the value
//if it is a LPWSTR, it includes
//the null termination.
PVOID Value;
}EAPTLS_CONNPROP_ATTRIBUTE, *PEAPTLS_CONNPROP_ATTRIBUTE;
// EAP configuration DLL entrypoints. These definitions must match the
// raseapif.h prototypes for RasEapInvokeConfigUI and RasEapFreeUserData.
typedef DWORD (APIENTRY * RASEAPFREE)( PBYTE );
typedef DWORD (APIENTRY * RASEAPINVOKECONFIGUI)( DWORD, HWND, DWORD, PBYTE, DWORD, PBYTE*, DWORD*);
typedef DWORD (APIENTRY * RASEAPGETIDENTITY)( DWORD, HWND, DWORD, const WCHAR*, const WCHAR*, PBYTE, DWORD, PBYTE, DWORD, PBYTE*, DWORD*, WCHAR** );
typedef DWORD (APIENTRY * RASEAPINVOKEINTERACTIVEUI)( DWORD, HWND, PBYTE, DWORD, PBYTE*, DWORD* );
typedef DWORD (APIENTRY * RASEAPCREATECONNPROP)( PEAPTLS_CONNPROP_ATTRIBUTE, PVOID*, DWORD*, PVOID*, DWORD*);
#define RAS_EAP_VALUENAME_HIDEPEAPMSCHAPv2 TEXT("HidePEAPMSCHAPv2")
// Flags
#define EAPCFG_FLAG_RequireUsername 0x1
#define EAPCFG_FLAG_RequirePassword 0x2
// EAP configuration package definition.
typedef struct
_EAPCFG
{
// The package's unique EAP algorithm code.
//
DWORD dwKey;
// The friendly name of the package suitable for display to the user.
//
TCHAR* pszFriendlyName;
// The SystemRoot-relative path to the package's configuration DLL. May
// be NULL indicating there is none.
//
TCHAR* pszConfigDll;
// The SystemRoot-relative path to the package's identity DLL. May
// be NULL indicating there is none.
//
TCHAR* pszIdentityDll;
// Flags that specify what standard credentials are required at dial
// time.
//
DWORD dwStdCredentialFlags;
// True if user is to be forced to run the configuration API for the
// package, i.e. defaults are not sufficient.
//
BOOL fForceConfig;
// True if the package provides MPPE encryption keys, false if not.
//
BOOL fProvidesMppeKeys;
// The package's default configuration blob, which can be overwritten by
// the configuration DLL. May be NULL and 0 indicating there is none.
//
BYTE* pData;
DWORD cbData;
// EAP per user data to be stored in HKCU. This data is returned from
// the EapInvokeConfigUI entrypoint in the eap dll.
//
BYTE* pUserData;
DWORD cbUserData;
// Set when the configuration DLL has been called on the package. This is
// not a registry setting. It is provided for the convenience of the UI
// only.
//
BOOL fConfigDllCalled;
// Specifies the class ID of the configuration UI for remote machines.
// Not used
GUID guidConfigCLSID;
} EAPCFG;
VOID DtlDestroyList( DTLLIST*, PDESTROYNODE );
DTLNODE *
CreateEapcfgNode(
void);
VOID
DestroyEapcfgNode(
IN OUT DTLNODE* pNode);
DTLNODE*
EapcfgNodeFromKey(
IN DTLLIST* pList,
IN DWORD dwKey);
#define EAPOL_MUTUAL_AUTH_EAP_ONLY 0x00000001
DTLLIST*
ReadEapcfgList(IN DWORD dwFlags);
#define MAX_SSID_LEN 32
//
// Structure : EAPOL_INTF_PARAMS
//
typedef struct _EAPOL_INTF_PARAMS
{
DWORD dwVersion;
DWORD dwReserved2;
DWORD dwEapFlags;
DWORD dwEapType;
DWORD dwSizeOfSSID;
BYTE bSSID[MAX_SSID_LEN];
} EAPOL_INTF_PARAMS, *PEAPOL_INTF_PARAMS;
//
// EAPOL states
//
typedef enum _EAPOL_STATE
{
EAPOLSTATE_LOGOFF = 0,
EAPOLSTATE_DISCONNECTED,
EAPOLSTATE_CONNECTING,
EAPOLSTATE_ACQUIRED,
EAPOLSTATE_AUTHENTICATING,
EAPOLSTATE_HELD,
EAPOLSTATE_AUTHENTICATED,
EAPOLSTATE_UNDEFINED
} EAPOL_STATE;
//
// EAP UI State
//
typedef enum _EAPUISTATE
{
EAPUISTATE_WAITING_FOR_IDENTITY = 1,
EAPUISTATE_WAITING_FOR_UI_RESPONSE
} EAPUISTATE;
//
// Structure : EAPOL_INTF_STATE
//
typedef struct _EAPOL_INTF_STATE
{
#if defined(MIDL_PASS)
[unique, string] LPWSTR pwszLocalMACAddr;
#else
LPWSTR pwszLocalMACAddr;
#endif
#if defined(MIDL_PASS)
[unique, string] LPWSTR pwszRemoteMACAddr;
#else
LPWSTR pwszRemoteMACAddr;
#endif
DWORD dwSizeOfSSID;
BYTE bSSID[MAX_SSID_LEN+1];
#if defined(MIDL_PASS)
[unique, string] LPSTR pszEapIdentity;
#else
LPSTR pszEapIdentity;
#endif
EAPOL_STATE dwState;
EAPUISTATE dwEapUIState;
DWORD dwEAPOLAuthMode;
DWORD dwEAPOLAuthenticationType;
DWORD dwEapType;
DWORD dwFailCount;
DWORD dwPhysicalMediumType;
} EAPOL_INTF_STATE, *PEAPOL_INTF_STATE;
#define EAPOL_VERSION_1 1
#define EAPOL_VERSION_2 2
#define EAPOL_VERSION_3 3
#define EAPOL_CURRENT_VERSION EAPOL_VERSION_3
//
// Structure : EAPOL_AUTH_DATA
//
typedef struct _EAPOL_AUTH_DATA
{
DWORD dwEapType;
DWORD dwSize;
BYTE bData[1];
} EAPOL_AUTH_DATA, *PEAPOL_AUTH_DATA;
DWORD
WZCGetEapUserInfo (
IN WCHAR *pwszGUID,
IN DWORD dwEapTypeId,
IN DWORD dwSizOfSSID,
IN BYTE *pbSSID,
IN OUT PBYTE pbUserInfo,
IN OUT DWORD *pdwInfoSize
);
// Structure used to define the UI Response.
// Currently it contains upto 3 blobs.
// If more are required, add to the structure
#define NUM_RESP_BLOBS 3
typedef struct _EAPOLUI_RESP
{
RAW_DATA rdData0;
RAW_DATA rdData1;
RAW_DATA rdData2;
} EAPOLUI_RESP, *PEAPOLUI_RESP;
//
// EAPOL Policy related parameters
//
#define EAPOL_CERT_TYPE_SMARTCARD 1
#define EAPOL_CERT_TYPE_MC_CERT 2
typedef struct _EAPOL_POLICY_DATA {
BYTE pbWirelessSSID[32];
DWORD dwWirelessSSIDLen;
DWORD dwEnable8021x;
DWORD dw8021xMode;
DWORD dwEAPType;
DWORD dwMachineAuthentication;
DWORD dwMachineAuthenticationType;
DWORD dwGuestAuthentication;
DWORD dwIEEE8021xMaxStart;
DWORD dwIEEE8021xStartPeriod;
DWORD dwIEEE8021xAuthPeriod;
DWORD dwIEEE8021xHeldPeriod;
DWORD dwEAPDataLen;
LPBYTE pbEAPData;
} EAPOL_POLICY_DATA, *PEAPOL_POLICY_DATA;
typedef struct _EAPOL_POLICY_LIST {
DWORD dwNumberOfItems;
EAPOL_POLICY_DATA EAPOLPolicy[1];
} EAPOL_POLICY_LIST, *PEAPOL_POLICY_LIST;
#if !defined(MIDL_PASS)
//---------------------------------------
// WZCEapolGetCustomAuthData: Get EAP-specific configuration data for interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// dwEapTypeId:
// [in] EAP type Id
// dwSizeOfSSID:
// [in] Size of SSID for which data is to be stored
// pbSSID:
// [in] SSID for which data is to be stored
// pbConnInfo:
// [in out] Connection EAP info
// pdwInfoSize:
// [in out] Size of pbConnInfo
//
// Returned value:
// Win32 error code
DWORD
WZCEapolGetCustomAuthData (
IN LPWSTR pSrvAddr,
IN PWCHAR pwszGuid,
IN DWORD dwEapTypeId,
IN DWORD dwSizeOfSSID,
IN BYTE *pbSSID,
IN OUT PBYTE pbConnInfo,
IN OUT PDWORD pdwInfoSize
);
//---------------------------------------
// WZCEapolSetCustomAuthData: Set EAP-specific configuration data for interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// dwEapTypeId:
// [in] EAP type Id
// dwSizeOfSSID:
// [in] Size of SSID for which data is to be stored
// pbSSID:
// [in] SSID for which data is to be stored
// pbConnInfo:
// [in] Connection EAP info
// pdwInfoSize:
// [in] Size of pbConnInfo
//
// Returned value:
// Win32 error code
DWORD
WZCEapolSetCustomAuthData (
IN LPWSTR pSrvAddr,
IN PWCHAR pwszGuid,
IN DWORD dwEapTypeId,
IN DWORD dwSizeOfSSID,
IN BYTE *pbSSID,
IN PBYTE pbConnInfo,
IN DWORD dwInfoSize
);
//---------------------------------------
// WZCEapolGetInterfaceParams: Get configuration parameters for interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// pIntfParams:
// [in out] Interface Parameters
//
// Returned value:
// Win32 error code
DWORD
WZCEapolGetInterfaceParams (
IN LPWSTR pSrvAddr,
IN PWCHAR pwszGuid,
IN OUT EAPOL_INTF_PARAMS *pIntfParams
);
//---------------------------------------
// WZCEapolSetInterfaceParams: Set configuration parameters for interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// pIntfParams:
// [in] Interface parameters
// Returned value:
// Win32 error code
DWORD
WZCEapolSetInterfaceParams (
IN LPWSTR pSrvAddr,
IN PWCHAR pwszGuid,
IN EAPOL_INTF_PARAMS *pIntfParams
);
//---------------------------------------
// WZCEapolReAuthenticate : Restart 802.1X authentication on an interface
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// Returned value:
// Win32 error code
DWORD
WZCEapolReAuthenticate (
IN LPWSTR pSrvAddr,
IN PWCHAR pwszGuid
);
//---------------------------------------
// WZCEapolQueryState: Query the interface 802.1X/EAPOL state
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// pwszGuid:
// [in] Interface GUID
// pIntfState:
// [in out] EAPOL Interface State
//
// Returned value:
// Win32 error code
DWORD
WZCEapolQueryState (
IN LPWSTR pSrvAddr,
IN PWCHAR pwszGuid,
IN OUT EAPOL_INTF_STATE *pIntfState
);
#endif // MIDL_PASS
//
// Free EAPOL interface state information on the client side obtained via
// RPC query
//
DWORD
WZCEapolFreeState (
IN EAPOL_INTF_STATE *pIntfState
);
//
// Structure: EAPOL_EAP_UI_CONTEXT
//
typedef struct _EAPOL_EAP_UI_CONTEXT
{
DWORD dwEAPOLUIMsgType;
WCHAR wszGUID[39];
DWORD dwSessionId;
DWORD dwContextId;
DWORD dwEapId;
DWORD dwEapTypeId;
DWORD dwEapFlags;
WCHAR wszSSID[MAX_SSID_LEN+1];
DWORD dwSizeOfSSID;
BYTE bSSID[MAX_SSID_LEN];
DWORD dwEAPOLState;
DWORD dwRetCode;
DWORD dwSizeOfEapUIData;
BYTE bEapUIData[1];
} EAPOL_EAP_UI_CONTEXT, *PEAPOL_EAP_UI_CONTEXT;
//
// Defines for messaging between Service and Dialog DLL
//
#define EAPOLUI_GET_USERIDENTITY 0x00000001
#define EAPOLUI_GET_USERNAMEPASSWORD 0x00000002
#define EAPOLUI_INVOKEINTERACTIVEUI 0x00000004
#define EAPOLUI_EAP_NOTIFICATION 0x00000008
#define EAPOLUI_REAUTHENTICATE 0x00000010
#define EAPOLUI_CREATEBALLOON 0x00000020
#define EAPOLUI_CLEANUP 0x00000040
#define EAPOLUI_DUMMY 0x00000080
#define NUM_EAPOL_DLG_MSGS 8
//---------------------------------------
// WZCEapolUIResponse: Send Dlg response to Service
//
// Parameters:
// pSrvAddr:
// [in] WZC Server to contact
// EapolUIContext:
// [in] EAPOLUI Context data
// EapolUI:
// [in] EAPOLUI response data
//
// Returned value:
// Win32 error code
DWORD
WZCEapolUIResponse (
IN LPWSTR pSrvAddr,
IN EAPOL_EAP_UI_CONTEXT EapolUIContext,
IN EAPOLUI_RESP EapolUIResp
);
# ifdef __cplusplus
}
# endif