Sample Code
windows driver samples/ Windows Filtering Platform Sample/ C++/ sys/ NotifyFunctions_PendAuthorizationCallouts.cpp/
//////////////////////////////////////////////////////////////////////////////////////////////////// // // Copyright (c) 2012 Microsoft Corporation. All Rights Reserved. // // Module Name: // NotifyFunctions_PendAuthorizationCallouts.h // // Abstract: // This module contains WFP Notify functions for the proxy callouts using WFP's REDIRECT layers. // // Naming Convention: // // <Module><Scenario> // // i.e. // // NotifyProxyByALERedirectNotification // // <Module> // Notify - Function is an FWPS_CALLOUT_NOTIFY_FN // <Scenario> // PendAuthorizationNotification - Function demonstates use of notifications for // callouts pending authorization requests. // // Author: // Dusty Harper (DHarper) // // Revision History: // // [ Month ][Day] [Year] - [Revision]-[ Comments ] // May 01, 2010 - 1.0 - Creation // //////////////////////////////////////////////////////////////////////////////////////////////////// #include "Framework_WFPSamplerCalloutDriver.h" /// . #include "NotifyFunctions_PendAuthorizationCallouts.tmh" /// $(OBJ_PATH)\$(O)\ /** @private_function="PrvPendAuthorizationNotificationWorkItemRoutine" Purpose: Traces the appropriate notification event. <br> <br> Notes: <br> <br> MSDN_Ref: <br> */ _IRQL_requires_(PASSIVE_LEVEL) _IRQL_requires_same_ _Function_class_(IO_WORKITEM_ROUTINE) VOID PrvPendAuthorizationNotificationWorkItemRoutine(_In_ PDEVICE_OBJECT pDeviceObject, _Inout_opt_ PVOID pContext) { #if DBG DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_INFO_LEVEL, " ---> PrvPendAuthorizationNotificationWorkItemRoutine()\n"); #endif /// DBG UNREFERENCED_PARAMETER(pDeviceObject); NT_ASSERT(pContext); NT_ASSERT(((WORKITEM_DATA*)pContext)->pNotifyData); WORKITEM_DATA* pWorkItemData = (WORKITEM_DATA*)pContext; if(pWorkItemData) { NTSTATUS status = STATUS_SUCCESS; FWPM_CALLOUT* pCallout = 0; PWSTR pCalloutName = L""; status = FwpmCalloutGetById(g_EngineHandle, pWorkItemData->pNotifyData->calloutID, &pCallout); if(status != STATUS_SUCCESS) DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_ERROR_LEVEL, " !!!! PrvPendAuthorizationNotificationWorkItemRoutine : FwpmCalloutGetById() [status: %#x]\n", status); else { pCalloutName = pCallout->displayData.name; if(pCallout->applicableLayer != FWPM_LAYER_ALE_RESOURCE_ASSIGNMENT_V4 && pCallout->applicableLayer != FWPM_LAYER_ALE_RESOURCE_ASSIGNMENT_V6 && pCallout->applicableLayer != FWPM_LAYER_ALE_AUTH_LISTEN_V4 && pCallout->applicableLayer != FWPM_LAYER_ALE_AUTH_LISTEN_V6 && pCallout->applicableLayer != FWPM_LAYER_ALE_AUTH_CONNECT_V4 && pCallout->applicableLayer != FWPM_LAYER_ALE_AUTH_CONNECT_V6 && pCallout->applicableLayer != FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V4 && pCallout->applicableLayer != FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V6) { status = STATUS_FWP_INCOMPATIBLE_LAYER; DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_ERROR_LEVEL, " !!!! PrvPendAuthorizationNotificationWorkItemRoutine() [status: %#x]\n", status); } } switch(pWorkItemData->pNotifyData->notificationType) { case FWPS_CALLOUT_NOTIFY_ADD_FILTER: { DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_INFO_LEVEL, " -- A filter referencing %S callout was added\n", pCalloutName); break; } case FWPS_CALLOUT_NOTIFY_DELETE_FILTER: { DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_INFO_LEVEL, " -- A filter referencing %S callout was deleted\n", pCalloutName); break; } case FWPS_CALLOUT_NOTIFY_ADD_FILTER_POST_COMMIT: { DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_INFO_LEVEL, " -- A filter referencing %S callout was committed\n", pCalloutName); break; } default: { DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_INFO_LEVEL, " -- Invalid Notification Type. Please Contact [email protected]\n"); break; } } FwpmFreeMemory((VOID**)&pCallout); HLPR_DELETE(pWorkItemData->pNotifyData, WFPSAMPLER_CALLOUT_DRIVER_TAG); KrnlHlprWorkItemDataDestroy(&pWorkItemData); } #if DBG DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_INFO_LEVEL, " <--- PrvPendAuthorizationNotificationWorkItemRoutine()\n"); #endif /// DBG return; } /** @notify_function="NotifyPendAuthorizationNotification" Purpose: Traces the notification event. <br> <br> Notes: <br> <br> MSDN_Ref: HTTP://MSDN.Microsoft.com/En-US/Library/FF568803.aspx <br> HTTP://MSDN.Microsoft.com/En-US/Library/FF568804.aspx <br> */ _IRQL_requires_min_(PASSIVE_LEVEL) _IRQL_requires_max_(DISPATCH_LEVEL) _IRQL_requires_same_ _Success_(return == STATUS_SUCCESS) NTSTATUS NotifyPendAuthorizationNotification(_In_ FWPS_CALLOUT_NOTIFY_TYPE notificationType, _In_ const GUID* pFilterKey, _Inout_ FWPS_FILTER* pFilter) { #if DBG DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_INFO_LEVEL, " ---> NotifyPendAuthorizationNotification()\n"); #endif /// DBG NT_ASSERT(pFilter); NTSTATUS status = STATUS_SUCCESS; NOTIFY_DATA* pNotifyData = 0; #pragma warning(push) #pragma warning(disable: 6014) /// pNotifyData is expected to be cleaned up by caller using PrvPendAuthorizationNotificationWorkItemRoutine HLPR_NEW(pNotifyData, NOTIFY_DATA, WFPSAMPLER_CALLOUT_DRIVER_TAG); HLPR_BAIL_ON_ALLOC_FAILURE(pNotifyData, status); #pragma warning(pop) pNotifyData->notificationType = notificationType; pNotifyData->calloutID = pFilter ? pFilter->action.calloutId : 0; pNotifyData->pFilterKey = pFilterKey; status = KrnlHlprWorkItemQueue(g_pWDMDevice, PrvPendAuthorizationNotificationWorkItemRoutine, pNotifyData); HLPR_BAIL_LABEL: if(status != STATUS_SUCCESS) { HLPR_DELETE(pNotifyData, WFPSAMPLER_CALLOUT_DRIVER_TAG); } #if DBG DbgPrintEx(DPFLTR_IHVNETWORK_ID, DPFLTR_INFO_LEVEL, " <--- NotifyPendAuthorizationNotification() [status: %#x]\n", status); #endif /// DBG return status; }
Our Services
-
What our customers say about us?
Read our customer testimonials to find out why our clients keep returning for their projects.
View Testimonials