/* this ALWAYS GENERATED file contains the definitions for the interfaces */ /* File created by MIDL compiler version 7.00.0555 */ /* Compiler settings for ipsectypes.idl: Oicf, W1, Zp8, env=Win32 (32b run), target_arch=X86 7.00.0555 protocol : dce , ms_ext, c_ext, robust error checks: allocation ref bounds_check enum stub_data VC __declspec() decoration level: __declspec(uuid()), __declspec(selectany), __declspec(novtable) DECLSPEC_UUID(), MIDL_INTERFACE() */ /* @@MIDL_FILE_HEADING( ) */ #pragma warning( disable: 4049 ) /* more than 64k source lines */ /* verify that the version is high enough to compile this file*/ #ifndef __REQUIRED_RPCNDR_H_VERSION__ #define __REQUIRED_RPCNDR_H_VERSION__ 500 #endif /* verify that the version is high enough to compile this file*/ #ifndef __REQUIRED_RPCSAL_H_VERSION__ #define __REQUIRED_RPCSAL_H_VERSION__ 100 #endif #include "rpc.h" #include "rpcndr.h" #ifndef __RPCNDR_H_VERSION__ #error this stub requires an updated version of #endif // __RPCNDR_H_VERSION__ #ifndef __ipsectypes_h__ #define __ipsectypes_h__ #if defined(_MSC_VER) && (_MSC_VER >= 1020) #pragma once #endif /* Forward Declarations */ /* header files for imported files */ #include "fwptypes.h" #include "iketypes.h" #ifdef __cplusplus extern "C"{ #endif /* interface __MIDL_itf_ipsectypes_0000_0000 */ /* [local] */ #if _MSC_VER >= 800 #if _MSC_VER >= 1200 #pragma warning(push) #endif #pragma warning(disable:4201) #endif typedef struct FWPM_FILTER0_ FWPM_FILTER0; typedef struct IPSEC_SA_LIFETIME0_ { UINT32 lifetimeSeconds; UINT32 lifetimeKilobytes; UINT32 lifetimePackets; } IPSEC_SA_LIFETIME0; typedef /* [v1_enum] */ enum IPSEC_TRANSFORM_TYPE_ { IPSEC_TRANSFORM_AH = 1, IPSEC_TRANSFORM_ESP_AUTH = ( IPSEC_TRANSFORM_AH + 1 ) , IPSEC_TRANSFORM_ESP_CIPHER = ( IPSEC_TRANSFORM_ESP_AUTH + 1 ) , IPSEC_TRANSFORM_ESP_AUTH_AND_CIPHER = ( IPSEC_TRANSFORM_ESP_CIPHER + 1 ) , IPSEC_TRANSFORM_ESP_AUTH_FW = ( IPSEC_TRANSFORM_ESP_AUTH_AND_CIPHER + 1 ) , IPSEC_TRANSFORM_TYPE_MAX = ( IPSEC_TRANSFORM_ESP_AUTH_FW + 1 ) } IPSEC_TRANSFORM_TYPE; typedef /* [v1_enum] */ enum IPSEC_AUTH_TYPE_ { IPSEC_AUTH_MD5 = 0, IPSEC_AUTH_SHA_1 = ( IPSEC_AUTH_MD5 + 1 ) , IPSEC_AUTH_SHA_256 = ( IPSEC_AUTH_SHA_1 + 1 ) , IPSEC_AUTH_AES_128 = ( IPSEC_AUTH_SHA_256 + 1 ) , IPSEC_AUTH_AES_192 = ( IPSEC_AUTH_AES_128 + 1 ) , IPSEC_AUTH_AES_256 = ( IPSEC_AUTH_AES_192 + 1 ) , IPSEC_AUTH_MAX = ( IPSEC_AUTH_AES_256 + 1 ) } IPSEC_AUTH_TYPE; typedef UINT8 IPSEC_AUTH_CONFIG; #define IPSEC_AUTH_CONFIG_HMAC_MD5_96 (0) #define IPSEC_AUTH_CONFIG_HMAC_SHA_1_96 (1) #define IPSEC_AUTH_CONFIG_HMAC_SHA_256_128 (2) #define IPSEC_AUTH_CONFIG_GCM_AES_128 (3) #define IPSEC_AUTH_CONFIG_GCM_AES_192 (4) #define IPSEC_AUTH_CONFIG_GCM_AES_256 (5) #define IPSEC_AUTH_CONFIG_MAX (6) typedef struct IPSEC_AUTH_TRANSFORM_ID0_ { IPSEC_AUTH_TYPE authType; IPSEC_AUTH_CONFIG authConfig; } IPSEC_AUTH_TRANSFORM_ID0; typedef GUID IPSEC_CRYPTO_MODULE_ID; typedef struct IPSEC_AUTH_TRANSFORM0_ { IPSEC_AUTH_TRANSFORM_ID0 authTransformId; IPSEC_CRYPTO_MODULE_ID *cryptoModuleId; } IPSEC_AUTH_TRANSFORM0; typedef /* [v1_enum] */ enum IPSEC_CIPHER_TYPE_ { IPSEC_CIPHER_TYPE_DES = 1, IPSEC_CIPHER_TYPE_3DES = ( IPSEC_CIPHER_TYPE_DES + 1 ) , IPSEC_CIPHER_TYPE_AES_128 = ( IPSEC_CIPHER_TYPE_3DES + 1 ) , IPSEC_CIPHER_TYPE_AES_192 = ( IPSEC_CIPHER_TYPE_AES_128 + 1 ) , IPSEC_CIPHER_TYPE_AES_256 = ( IPSEC_CIPHER_TYPE_AES_192 + 1 ) , IPSEC_CIPHER_TYPE_MAX = ( IPSEC_CIPHER_TYPE_AES_256 + 1 ) } IPSEC_CIPHER_TYPE; typedef UINT8 IPSEC_CIPHER_CONFIG; #define IPSEC_CIPHER_CONFIG_CBC_DES (1) #define IPSEC_CIPHER_CONFIG_CBC_3DES (2) #define IPSEC_CIPHER_CONFIG_CBC_AES_128 (3) #define IPSEC_CIPHER_CONFIG_CBC_AES_192 (4) #define IPSEC_CIPHER_CONFIG_CBC_AES_256 (5) #define IPSEC_CIPHER_CONFIG_GCM_AES_128 (6) #define IPSEC_CIPHER_CONFIG_GCM_AES_192 (7) #define IPSEC_CIPHER_CONFIG_GCM_AES_256 (8) #define IPSEC_CIPHER_CONFIG_MAX (9) typedef struct IPSEC_CIPHER_TRANSFORM_ID0_ { IPSEC_CIPHER_TYPE cipherType; IPSEC_CIPHER_CONFIG cipherConfig; } IPSEC_CIPHER_TRANSFORM_ID0; typedef struct IPSEC_CIPHER_TRANSFORM0_ { IPSEC_CIPHER_TRANSFORM_ID0 cipherTransformId; IPSEC_CRYPTO_MODULE_ID *cryptoModuleId; } IPSEC_CIPHER_TRANSFORM0; typedef struct IPSEC_AUTH_AND_CIPHER_TRANSFORM0_ { IPSEC_AUTH_TRANSFORM0 authTransform; IPSEC_CIPHER_TRANSFORM0 cipherTransform; } IPSEC_AUTH_AND_CIPHER_TRANSFORM0; typedef struct IPSEC_SA_TRANSFORM0_ { IPSEC_TRANSFORM_TYPE ipsecTransformType; union { IPSEC_AUTH_TRANSFORM0 *ahTransform; IPSEC_AUTH_TRANSFORM0 *espAuthTransform; IPSEC_CIPHER_TRANSFORM0 *espCipherTransform; IPSEC_AUTH_AND_CIPHER_TRANSFORM0 *espAuthAndCipherTransform; IPSEC_AUTH_TRANSFORM0 *espAuthFwTransform; } ; } IPSEC_SA_TRANSFORM0; #define espAuthTranform espAuthTransform typedef /* [v1_enum] */ enum IPSEC_PFS_GROUP_ { IPSEC_PFS_NONE = 0, IPSEC_PFS_1 = ( IPSEC_PFS_NONE + 1 ) , IPSEC_PFS_2 = ( IPSEC_PFS_1 + 1 ) , IPSEC_PFS_2048 = ( IPSEC_PFS_2 + 1 ) , IPSEC_PFS_ECP_256 = ( IPSEC_PFS_2048 + 1 ) , IPSEC_PFS_ECP_384 = ( IPSEC_PFS_ECP_256 + 1 ) , IPSEC_PFS_MM = ( IPSEC_PFS_ECP_384 + 1 ) , IPSEC_PFS_MAX = ( IPSEC_PFS_MM + 1 ) } IPSEC_PFS_GROUP; typedef struct IPSEC_PROPOSAL0_ { IPSEC_SA_LIFETIME0 lifetime; UINT32 numSaTransforms; IPSEC_SA_TRANSFORM0 *saTransforms; IPSEC_PFS_GROUP pfsGroup; } IPSEC_PROPOSAL0; typedef struct IPSEC_SA_IDLE_TIMEOUT0_ { UINT32 idleTimeoutSeconds; UINT32 idleTimeoutSecondsFailOver; } IPSEC_SA_IDLE_TIMEOUT0; #define IPSEC_POLICY_FLAG_ND_SECURE (0x00000002) #define IPSEC_POLICY_FLAG_ND_BOUNDARY (0x00000004) #define IPSEC_POLICY_FLAG_CLEAR_DF_ON_TUNNEL (0x00000008) #define IPSEC_POLICY_FLAG_NAT_ENCAP_ALLOW_PEER_BEHIND_NAT (0x00000010) #define IPSEC_POLICY_FLAG_NAT_ENCAP_ALLOW_GENERAL_NAT_TRAVERSAL (0x00000020) #define IPSEC_POLICY_FLAG_DONT_NEGOTIATE_SECOND_LIFETIME (0x00000040) #define IPSEC_POLICY_FLAG_DONT_NEGOTIATE_BYTE_LIFETIME (0x00000080) #if (NTDDI_VERSION >= NTDDI_WIN7) #define IPSEC_POLICY_FLAG_ENABLE_V6_IN_V4_TUNNELING (0x00000100) #define IPSEC_POLICY_FLAG_ENABLE_SERVER_ADDR_ASSIGNMENT (0x00000200) #define IPSEC_POLICY_FLAG_TUNNEL_ALLOW_OUTBOUND_CLEAR_CONNECTION (0x00000400) #define IPSEC_POLICY_FLAG_TUNNEL_BYPASS_ALREADY_SECURE_CONNECTION (0x00000800) #define IPSEC_POLICY_FLAG_TUNNEL_BYPASS_ICMPV6 (0x00001000) #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_TRANSPORT_POLICY0_ { UINT32 numIpsecProposals; IPSEC_PROPOSAL0 *ipsecProposals; UINT32 flags; UINT32 ndAllowClearTimeoutSeconds; IPSEC_SA_IDLE_TIMEOUT0 saIdleTimeout; IKEEXT_EM_POLICY0 *emPolicy; } IPSEC_TRANSPORT_POLICY0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_TRANSPORT_POLICY1_ { UINT32 numIpsecProposals; IPSEC_PROPOSAL0 *ipsecProposals; UINT32 flags; UINT32 ndAllowClearTimeoutSeconds; IPSEC_SA_IDLE_TIMEOUT0 saIdleTimeout; IKEEXT_EM_POLICY1 *emPolicy; } IPSEC_TRANSPORT_POLICY1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_TUNNEL_ENDPOINTS0_ { FWP_IP_VERSION ipVersion; union { UINT32 localV4Address; UINT8 localV6Address[ 16 ]; } ; union { UINT32 remoteV4Address; UINT8 remoteV6Address[ 16 ]; } ; } IPSEC_TUNNEL_ENDPOINTS0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_TUNNEL_ENDPOINTS1_ { FWP_IP_VERSION ipVersion; union { UINT32 localV4Address; UINT8 localV6Address[ 16 ]; } ; union { UINT32 remoteV4Address; UINT8 remoteV6Address[ 16 ]; } ; UINT64 localIfLuid; } IPSEC_TUNNEL_ENDPOINTS1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_TUNNEL_POLICY0_ { UINT32 flags; UINT32 numIpsecProposals; IPSEC_PROPOSAL0 *ipsecProposals; IPSEC_TUNNEL_ENDPOINTS0 tunnelEndpoints; IPSEC_SA_IDLE_TIMEOUT0 saIdleTimeout; IKEEXT_EM_POLICY0 *emPolicy; } IPSEC_TUNNEL_POLICY0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_TUNNEL_POLICY1_ { UINT32 flags; UINT32 numIpsecProposals; IPSEC_PROPOSAL0 *ipsecProposals; IPSEC_TUNNEL_ENDPOINTS1 tunnelEndpoints; IPSEC_SA_IDLE_TIMEOUT0 saIdleTimeout; IKEEXT_EM_POLICY1 *emPolicy; } IPSEC_TUNNEL_POLICY1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_KEYING_POLICY0_ { UINT32 numKeyMods; GUID *keyModKeys; } IPSEC_KEYING_POLICY0; typedef struct IPSEC_AGGREGATE_SA_STATISTICS0_ { UINT32 activeSas; UINT32 pendingSaNegotiations; UINT32 totalSasAdded; UINT32 totalSasDeleted; UINT32 successfulRekeys; UINT32 activeTunnels; UINT32 offloadedSas; } IPSEC_AGGREGATE_SA_STATISTICS0; typedef struct IPSEC_ESP_DROP_PACKET_STATISTICS0_ { UINT32 invalidSpisOnInbound; UINT32 decryptionFailuresOnInbound; UINT32 authenticationFailuresOnInbound; UINT32 replayCheckFailuresOnInbound; UINT32 saNotInitializedOnInbound; } IPSEC_ESP_DROP_PACKET_STATISTICS0; typedef struct IPSEC_AH_DROP_PACKET_STATISTICS0_ { UINT32 invalidSpisOnInbound; UINT32 authenticationFailuresOnInbound; UINT32 replayCheckFailuresOnInbound; UINT32 saNotInitializedOnInbound; } IPSEC_AH_DROP_PACKET_STATISTICS0; typedef struct IPSEC_AGGREGATE_DROP_PACKET_STATISTICS0_ { UINT32 invalidSpisOnInbound; UINT32 decryptionFailuresOnInbound; UINT32 authenticationFailuresOnInbound; UINT32 udpEspValidationFailuresOnInbound; UINT32 replayCheckFailuresOnInbound; UINT32 invalidClearTextInbound; UINT32 saNotInitializedOnInbound; UINT32 receiveOverIncorrectSaInbound; UINT32 secureReceivesNotMatchingFilters; } IPSEC_AGGREGATE_DROP_PACKET_STATISTICS0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_AGGREGATE_DROP_PACKET_STATISTICS1_ { UINT32 invalidSpisOnInbound; UINT32 decryptionFailuresOnInbound; UINT32 authenticationFailuresOnInbound; UINT32 udpEspValidationFailuresOnInbound; UINT32 replayCheckFailuresOnInbound; UINT32 invalidClearTextInbound; UINT32 saNotInitializedOnInbound; UINT32 receiveOverIncorrectSaInbound; UINT32 secureReceivesNotMatchingFilters; UINT32 totalDropPacketsInbound; } IPSEC_AGGREGATE_DROP_PACKET_STATISTICS1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_TRAFFIC_STATISTICS0_ { UINT64 encryptedByteCount; UINT64 authenticatedAHByteCount; UINT64 authenticatedESPByteCount; UINT64 transportByteCount; UINT64 tunnelByteCount; UINT64 offloadByteCount; } IPSEC_TRAFFIC_STATISTICS0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_TRAFFIC_STATISTICS1_ { UINT64 encryptedByteCount; UINT64 authenticatedAHByteCount; UINT64 authenticatedESPByteCount; UINT64 transportByteCount; UINT64 tunnelByteCount; UINT64 offloadByteCount; UINT64 totalSuccessfulPackets; } IPSEC_TRAFFIC_STATISTICS1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_STATISTICS0_ { IPSEC_AGGREGATE_SA_STATISTICS0 aggregateSaStatistics; IPSEC_ESP_DROP_PACKET_STATISTICS0 espDropPacketStatistics; IPSEC_AH_DROP_PACKET_STATISTICS0 ahDropPacketStatistics; IPSEC_AGGREGATE_DROP_PACKET_STATISTICS0 aggregateDropPacketStatistics; IPSEC_TRAFFIC_STATISTICS0 inboundTrafficStatistics; IPSEC_TRAFFIC_STATISTICS0 outboundTrafficStatistics; } IPSEC_STATISTICS0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_STATISTICS1_ { IPSEC_AGGREGATE_SA_STATISTICS0 aggregateSaStatistics; IPSEC_ESP_DROP_PACKET_STATISTICS0 espDropPacketStatistics; IPSEC_AH_DROP_PACKET_STATISTICS0 ahDropPacketStatistics; IPSEC_AGGREGATE_DROP_PACKET_STATISTICS1 aggregateDropPacketStatistics; IPSEC_TRAFFIC_STATISTICS1 inboundTrafficStatistics; IPSEC_TRAFFIC_STATISTICS1 outboundTrafficStatistics; } IPSEC_STATISTICS1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef UINT32 IPSEC_SA_SPI; typedef struct IPSEC_SA_AUTH_INFORMATION0_ { IPSEC_AUTH_TRANSFORM0 authTransform; FWP_BYTE_BLOB authKey; } IPSEC_SA_AUTH_INFORMATION0; typedef struct IPSEC_SA_CIPHER_INFORMATION0_ { IPSEC_CIPHER_TRANSFORM0 cipherTransform; FWP_BYTE_BLOB cipherKey; } IPSEC_SA_CIPHER_INFORMATION0; typedef struct IPSEC_SA_AUTH_AND_CIPHER_INFORMATION0_ { IPSEC_SA_CIPHER_INFORMATION0 saCipherInformation; IPSEC_SA_AUTH_INFORMATION0 saAuthInformation; } IPSEC_SA_AUTH_AND_CIPHER_INFORMATION0; typedef struct IPSEC_SA0_ { IPSEC_SA_SPI spi; IPSEC_TRANSFORM_TYPE saTransformType; union { IPSEC_SA_AUTH_INFORMATION0 *ahInformation; IPSEC_SA_AUTH_INFORMATION0 *espAuthInformation; IPSEC_SA_CIPHER_INFORMATION0 *espCipherInformation; IPSEC_SA_AUTH_AND_CIPHER_INFORMATION0 *espAuthAndCipherInformation; IPSEC_SA_AUTH_INFORMATION0 *espAuthFwInformation; } ; } IPSEC_SA0; typedef struct IPSEC_KEYMODULE_STATE0_ { GUID keyModuleKey; FWP_BYTE_BLOB stateBlob; } IPSEC_KEYMODULE_STATE0; typedef UINT64 IPSEC_TOKEN_HANDLE; typedef /* [v1_enum] */ enum IPSEC_TOKEN_TYPE_ { IPSEC_TOKEN_TYPE_MACHINE = 0, IPSEC_TOKEN_TYPE_IMPERSONATION = ( IPSEC_TOKEN_TYPE_MACHINE + 1 ) , IPSEC_TOKEN_TYPE_MAX = ( IPSEC_TOKEN_TYPE_IMPERSONATION + 1 ) } IPSEC_TOKEN_TYPE; typedef /* [v1_enum] */ enum IPSEC_TOKEN_PRINCIPAL_ { IPSEC_TOKEN_PRINCIPAL_LOCAL = 0, IPSEC_TOKEN_PRINCIPAL_PEER = ( IPSEC_TOKEN_PRINCIPAL_LOCAL + 1 ) , IPSEC_TOKEN_PRINCIPAL_MAX = ( IPSEC_TOKEN_PRINCIPAL_PEER + 1 ) } IPSEC_TOKEN_PRINCIPAL; typedef /* [v1_enum] */ enum IPSEC_TOKEN_MODE_ { IPSEC_TOKEN_MODE_MAIN = 0, IPSEC_TOKEN_MODE_EXTENDED = ( IPSEC_TOKEN_MODE_MAIN + 1 ) , IPSEC_TOKEN_MODE_MAX = ( IPSEC_TOKEN_MODE_EXTENDED + 1 ) } IPSEC_TOKEN_MODE; typedef struct IPSEC_TOKEN0_ { IPSEC_TOKEN_TYPE type; IPSEC_TOKEN_PRINCIPAL principal; IPSEC_TOKEN_MODE mode; IPSEC_TOKEN_HANDLE token; } IPSEC_TOKEN0; typedef struct IPSEC_ID0_ { wchar_t *mmTargetName; wchar_t *emTargetName; UINT32 numTokens; IPSEC_TOKEN0 *tokens; UINT64 explicitCredentials; UINT64 logonId; } IPSEC_ID0; #define IPSEC_SA_BUNDLE_FLAG_ND_SECURE (0x00000001) #define IPSEC_SA_BUNDLE_FLAG_ND_BOUNDARY (0x00000002) #define IPSEC_SA_BUNDLE_FLAG_ND_PEER_NAT_BOUNDARY (0x00000004) #define IPSEC_SA_BUNDLE_FLAG_GUARANTEE_ENCRYPTION (0x00000008) #define IPSEC_SA_BUNDLE_FLAG_NLB (0x00000010) #define IPSEC_SA_BUNDLE_FLAG_NO_MACHINE_LUID_VERIFY (0x00000020) #define IPSEC_SA_BUNDLE_FLAG_NO_IMPERSONATION_LUID_VERIFY (0x00000040) #define IPSEC_SA_BUNDLE_FLAG_NO_EXPLICIT_CRED_MATCH (0x00000080) #define IPSEC_SA_BUNDLE_FLAG_ALLOW_NULL_TARGET_NAME_MATCH (0x00000200) #define IPSEC_SA_BUNDLE_FLAG_CLEAR_DF_ON_TUNNEL (0x00000400) #define IPSEC_SA_BUNDLE_FLAG_ASSUME_UDP_CONTEXT_OUTBOUND (0x00000800) #if (NTDDI_VERSION >= NTDDI_WIN6SP1) #define IPSEC_SA_BUNDLE_FLAG_ND_PEER_BOUNDARY (0x00001000) #endif #if (NTDDI_VERSION >= NTDDI_WIN7) #define IPSEC_SA_BUNDLE_FLAG_SUPPRESS_DUPLICATE_DELETION (0x00002000) #define IPSEC_SA_BUNDLE_FLAG_PEER_SUPPORTS_GUARANTEE_ENCRYPTION (0x00004000) #define IPSEC_SA_BUNDLE_FLAG_FORCE_INBOUND_CONNECTIONS (0x00008000) #define IPSEC_SA_BUNDLE_FLAG_FORCE_OUTBOUND_CONNECTIONS (0x00010000) #define IPSEC_SA_BUNDLE_FLAG_FORWARD_PATH_INITIATOR (0x00020000) #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_SA_BUNDLE0_ { UINT32 flags; IPSEC_SA_LIFETIME0 lifetime; UINT32 idleTimeoutSeconds; UINT32 ndAllowClearTimeoutSeconds; IPSEC_ID0 *ipsecId; UINT32 napContext; UINT32 qmSaId; UINT32 numSAs; IPSEC_SA0 *saList; IPSEC_KEYMODULE_STATE0 *keyModuleState; FWP_IP_VERSION ipVersion; union { UINT32 peerV4PrivateAddress; /* Empty union arm */ } ; UINT64 mmSaId; IPSEC_PFS_GROUP pfsGroup; } IPSEC_SA_BUNDLE0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_SA_BUNDLE1_ { UINT32 flags; IPSEC_SA_LIFETIME0 lifetime; UINT32 idleTimeoutSeconds; UINT32 ndAllowClearTimeoutSeconds; IPSEC_ID0 *ipsecId; UINT32 napContext; UINT32 qmSaId; UINT32 numSAs; IPSEC_SA0 *saList; IPSEC_KEYMODULE_STATE0 *keyModuleState; FWP_IP_VERSION ipVersion; union { UINT32 peerV4PrivateAddress; /* Empty union arm */ } ; UINT64 mmSaId; IPSEC_PFS_GROUP pfsGroup; GUID saLookupContext; UINT64 qmFilterId; } IPSEC_SA_BUNDLE1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef /* [v1_enum] */ enum IPSEC_TRAFFIC_TYPE_ { IPSEC_TRAFFIC_TYPE_TRANSPORT = 0, IPSEC_TRAFFIC_TYPE_TUNNEL = ( IPSEC_TRAFFIC_TYPE_TRANSPORT + 1 ) , IPSEC_TRAFFIC_TYPE_MAX = ( IPSEC_TRAFFIC_TYPE_TUNNEL + 1 ) } IPSEC_TRAFFIC_TYPE; typedef struct IPSEC_TRAFFIC0_ { FWP_IP_VERSION ipVersion; union { UINT32 localV4Address; UINT8 localV6Address[ 16 ]; } ; union { UINT32 remoteV4Address; UINT8 remoteV6Address[ 16 ]; } ; IPSEC_TRAFFIC_TYPE trafficType; union { UINT64 ipsecFilterId; UINT64 tunnelPolicyId; } ; UINT16 remotePort; } IPSEC_TRAFFIC0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_TRAFFIC1_ { FWP_IP_VERSION ipVersion; union { UINT32 localV4Address; UINT8 localV6Address[ 16 ]; } ; union { UINT32 remoteV4Address; UINT8 remoteV6Address[ 16 ]; } ; IPSEC_TRAFFIC_TYPE trafficType; union { UINT64 ipsecFilterId; UINT64 tunnelPolicyId; } ; UINT16 remotePort; UINT16 localPort; UINT8 ipProtocol; UINT64 localIfLuid; UINT32 realIfProfileId; } IPSEC_TRAFFIC1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_V4_UDP_ENCAPSULATION0_ { UINT16 localUdpEncapPort; UINT16 remoteUdpEncapPort; } IPSEC_V4_UDP_ENCAPSULATION0; typedef struct IPSEC_GETSPI0_ { IPSEC_TRAFFIC0 inboundIpsecTraffic; FWP_IP_VERSION ipVersion; union { IPSEC_V4_UDP_ENCAPSULATION0 *inboundUdpEncapsulation; /* Empty union arm */ } ; IPSEC_CRYPTO_MODULE_ID *rngCryptoModuleID; } IPSEC_GETSPI0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_GETSPI1_ { IPSEC_TRAFFIC1 inboundIpsecTraffic; FWP_IP_VERSION ipVersion; union { IPSEC_V4_UDP_ENCAPSULATION0 *inboundUdpEncapsulation; /* Empty union arm */ } ; IPSEC_CRYPTO_MODULE_ID *rngCryptoModuleID; } IPSEC_GETSPI1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_VIRTUAL_IF_TUNNEL_INFO0_ { UINT64 virtualIfTunnelId; UINT64 trafficSelectorId; } IPSEC_VIRTUAL_IF_TUNNEL_INFO0; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_SA_DETAILS0_ { FWP_IP_VERSION ipVersion; FWP_DIRECTION saDirection; IPSEC_TRAFFIC0 traffic; IPSEC_SA_BUNDLE0 saBundle; union { IPSEC_V4_UDP_ENCAPSULATION0 *udpEncapsulation; /* Empty union arm */ } ; FWPM_FILTER0 *transportFilter; } IPSEC_SA_DETAILS0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_SA_DETAILS1_ { FWP_IP_VERSION ipVersion; FWP_DIRECTION saDirection; IPSEC_TRAFFIC1 traffic; IPSEC_SA_BUNDLE1 saBundle; union { IPSEC_V4_UDP_ENCAPSULATION0 *udpEncapsulation; /* Empty union arm */ } ; FWPM_FILTER0 *transportFilter; IPSEC_VIRTUAL_IF_TUNNEL_INFO0 virtualIfTunnelInfo; } IPSEC_SA_DETAILS1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_SA_CONTEXT0_ { UINT64 saContextId; IPSEC_SA_DETAILS0 *inboundSa; IPSEC_SA_DETAILS0 *outboundSa; } IPSEC_SA_CONTEXT0; #if (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_SA_CONTEXT1_ { UINT64 saContextId; IPSEC_SA_DETAILS1 *inboundSa; IPSEC_SA_DETAILS1 *outboundSa; } IPSEC_SA_CONTEXT1; #endif // (NTDDI_VERSION >= NTDDI_WIN7) typedef struct IPSEC_SA_CONTEXT_ENUM_TEMPLATE0_ { FWP_CONDITION_VALUE0 localSubNet; FWP_CONDITION_VALUE0 remoteSubNet; } IPSEC_SA_CONTEXT_ENUM_TEMPLATE0; typedef struct IPSEC_SA_ENUM_TEMPLATE0_ { FWP_DIRECTION saDirection; } IPSEC_SA_ENUM_TEMPLATE0; typedef /* [v1_enum] */ enum IPSEC_FAILURE_POINT_ { IPSEC_FAILURE_NONE = 0, IPSEC_FAILURE_ME = ( IPSEC_FAILURE_NONE + 1 ) , IPSEC_FAILURE_PEER = ( IPSEC_FAILURE_ME + 1 ) , IPSEC_FAILURE_POINT_MAX = ( IPSEC_FAILURE_PEER + 1 ) } IPSEC_FAILURE_POINT; typedef struct IPSEC_ADDRESS_INFO0_ { UINT32 numV4Addresses; UINT32 *v4Addresses; UINT32 numV6Addresses; FWP_BYTE_ARRAY16 *v6Addresses; } IPSEC_ADDRESS_INFO0; #if (NTDDI_VERSION >= NTDDI_WIN7) #define IPSEC_DOSP_FLAG_ENABLE_IKEV1 (0x00000001) #define IPSEC_DOSP_FLAG_ENABLE_IKEV2 (0x00000002) #define IPSEC_DOSP_FLAG_DISABLE_AUTHIP (0x00000004) #define IPSEC_DOSP_FLAG_DISABLE_DEFAULT_BLOCK (0x00000008) #define IPSEC_DOSP_FLAG_FILTER_BLOCK (0x00000010) #define IPSEC_DOSP_FLAG_FILTER_EXEMPT (0x00000020) #define IPSEC_DOSP_DSCP_DISABLE_VALUE (0xff) #define IPSEC_DOSP_RATE_LIMIT_DISABLE_VALUE (0) typedef struct IPSEC_DOSP_OPTIONS0_ { UINT32 stateIdleTimeoutSeconds; UINT32 perIPRateLimitQueueIdleTimeoutSeconds; UINT8 ipV6IPsecUnauthDscp; UINT32 ipV6IPsecUnauthRateLimitBytesPerSec; UINT32 ipV6IPsecUnauthPerIPRateLimitBytesPerSec; UINT8 ipV6IPsecAuthDscp; UINT32 ipV6IPsecAuthRateLimitBytesPerSec; UINT8 icmpV6Dscp; UINT32 icmpV6RateLimitBytesPerSec; UINT8 ipV6FilterExemptDscp; UINT32 ipV6FilterExemptRateLimitBytesPerSec; UINT8 defBlockExemptDscp; UINT32 defBlockExemptRateLimitBytesPerSec; UINT32 maxStateEntries; UINT32 maxPerIPRateLimitQueues; UINT32 flags; UINT32 numPublicIFLuids; UINT64 *publicIFLuids; UINT32 numInternalIFLuids; UINT64 *internalIFLuids; FWP_V6_ADDR_AND_MASK publicV6AddrMask; FWP_V6_ADDR_AND_MASK internalV6AddrMask; } IPSEC_DOSP_OPTIONS0; typedef struct IPSEC_DOSP_STATISTICS0_ { UINT64 totalStateEntriesCreated; UINT64 currentStateEntries; UINT64 totalInboundAllowedIPv6IPsecUnauthPkts; UINT64 totalInboundRatelimitDiscardedIPv6IPsecUnauthPkts; UINT64 totalInboundPerIPRatelimitDiscardedIPv6IPsecUnauthPkts; UINT64 totalInboundOtherDiscardedIPv6IPsecUnauthPkts; UINT64 totalInboundAllowedIPv6IPsecAuthPkts; UINT64 totalInboundRatelimitDiscardedIPv6IPsecAuthPkts; UINT64 totalInboundOtherDiscardedIPv6IPsecAuthPkts; UINT64 totalInboundAllowedICMPv6Pkts; UINT64 totalInboundRatelimitDiscardedICMPv6Pkts; UINT64 totalInboundAllowedIPv6FilterExemptPkts; UINT64 totalInboundRatelimitDiscardedIPv6FilterExemptPkts; UINT64 totalInboundDiscardedIPv6FilterBlockPkts; UINT64 totalInboundAllowedDefBlockExemptPkts; UINT64 totalInboundRatelimitDiscardedDefBlockExemptPkts; UINT64 totalInboundDiscardedDefBlockPkts; UINT64 currentInboundIPv6IPsecUnauthPerIPRateLimitQueues; } IPSEC_DOSP_STATISTICS0; typedef struct IPSEC_DOSP_STATE0_ { UINT8 publicHostV6Addr[ 16 ]; UINT8 internalHostV6Addr[ 16 ]; UINT64 totalInboundIPv6IPsecAuthPackets; UINT64 totalOutboundIPv6IPsecAuthPackets; UINT32 durationSecs; } IPSEC_DOSP_STATE0; typedef struct IPSEC_DOSP_STATE_ENUM_TEMPLATE0_ { FWP_V6_ADDR_AND_MASK publicV6AddrMask; FWP_V6_ADDR_AND_MASK internalV6AddrMask; } IPSEC_DOSP_STATE_ENUM_TEMPLATE0; #endif // (NTDDI_VERSION >= NTDDI_WIN7) #if _MSC_VER >= 800 #if _MSC_VER >= 1200 #pragma warning(pop) #else #pragma warning(default:4201) #endif #endif extern RPC_IF_HANDLE __MIDL_itf_ipsectypes_0000_0000_v0_0_c_ifspec; extern RPC_IF_HANDLE __MIDL_itf_ipsectypes_0000_0000_v0_0_s_ifspec; /* Additional Prototypes for ALL interfaces */ /* end of Additional Prototypes */ #ifdef __cplusplus } #endif #endif