#typev ike_exch_validate_c755 10 "%0 %10!I64d!|%11!s!|Incorrect payload received. Too many payloads. mmState %12!d! Exch %13!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindPayloadValidationDefMMOak
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmState->oakState->state, ItemLong -- 12
mmState->oakState->subExchType, ItemLong -- 13
}
#typev ike_exch_validate_c839 11 "%0 %10!I64d!|%11!s!|Incorrect payload received. Too many payloads. mmState %12!d! Exch %13!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindPayloadValidationDefMMAuthip
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmState->authipState->state, ItemLong -- 12
mmState->authipState->subExchType, ItemLong -- 13
}
#typev ike_exch_validate_c907 12 "%0 %10!I64d!|%11!s!|Incorrect IKE QM payload received. Too many payloads. State %12!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindPayloadValidationDefQMOak
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
state->oakState->state, ItemLong -- 12
}
#typev ike_exch_validate_c952 13 "%0 %10!I64d!|%11!s!|Incorrect QM Authip payload received. Too many payloads. State %12!d! Exch %13!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindPayloadValidationDefQMAuthip
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
state->authipState->state, ItemLong -- 12
state->authipState->subExchType, ItemLong -- 13
}
#typev ike_exch_validate_c1044 14 "%0 %10!I64d!|%11!s!|Incorrect payload received. Too many payloads. State %12!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindPayloadValidationDefUMAuthip
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
state->authipState->umState.state, ItemLong -- 12
}
#typev ike_exch_validate_c1199 15 "%0 %10!I64d!|%11!s!|Incorrect payload received. State %12!d! Exch %13!d! expected %14!d! received %15!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeIsNextPayloadExpectedAuthip
#typev ike_sspi_c4159 53 "%0 %10!I64d!|%11!s!|Looking up local cert chain for SSL:" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindSspiCert
#typev ike_mm_negotiate_c613 12 "%0 %10!I64d!|%11!s!|Dropping IKE packet because co-existence is active and Authip is enabled" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeInitMMResponderPhase1
#typev ike_mm_negotiate_c1930 19 "%0 %10!I64d!|%11!s!|IKE Kerb Continue for MM SA %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeConstructOakMMSspiInitiator
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmSa, ItemPtr -- 12
}
#typev ike_mm_negotiate_c2112 20 "%0 %10!I64d!|%11!s!|IKE Kerb Continue for MM SA %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeConstructOakMMSspiResponder
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmSa, ItemPtr -- 12
}
#typev ike_mm_negotiate_c1211 18 "%0 %10!I64d!|%11!s!|SSL complete on delayed auth complete, SA %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=CheckMMSslDelayState
#typev ike_mm_negotiate_c185 11 "%0 %10!I64d!|%11!s!|IkeBeginMMInitiator: Setting acquire %12!p! as prime acquire for MM SA %13!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeBeginMMInitiator
#typev ike_policy_c503 14 "%0 %10!I64d!|%11!s!|Looking up MM policy for %12!s!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindMMPolicy
#typev ike_crypto_c496 18 "%0 %10!I64d!|%11!s!|Resending previously sent UM pkt, MM SA %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeHandlePayloadUMCrypto
#typev ike_proposal_c53 10 "%0 %10!I64d!|%11!s!|Skipping MD5 transform in MM policy, because FIPS policy regkey is enabled" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeShouldSkipMmTransformForFipsPolicy
#typev ike_proposal_c694 14 "%0 %10!I64d!|%11!s!|Skipping MD5 transform in QM policy, because FIPS policy regkey is enabled" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeShouldSkipQmProposalForFipsPolicy
#typev ike_packet_process_c428 15 "%0 %10!I64d!|%11!s!|Dropping packet. Initialization of MM SA %12!p! not yet complete" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeCanProcessPacket
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmSa, ItemPtr -- 12
}
#typev ike_packet_process_c363 14 "%0 %10!I64d!|%11!s!|IkeFinishMMSAProcessing: Setting acquire %12!p! as prime acquire for MM SA %13!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFinishMMSAProcessing
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
acquire, ItemPtr -- 12
mmSa, ItemPtr -- 13
}
#typev ike_packet_process_c160 13 "%0 %10!I64d!|%11!s!|Packet queued inside MM SA %12!p!, and will be processed later" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeProcessPacketDispatch
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmSa, ItemPtr -- 12
}
#typev ike_packet_process_c117 12 "%0 %10!I64d!|%11!s!|Too many packets queued on MM: %12!p! queuesize: %13!d!. Dropping packet" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeProcessPacketDispatch
#typev ike_transform_c237 10 "%0 %10!I64d!|%11!s!|Adjusting MM cipher type to AES_192" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeAdjustIkeCipherType
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_transform_c247 11 "%0 %10!I64d!|%11!s!|Adjusting MM cipher type to AES_256" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeAdjustIkeCipherType
#typev ike_id_c487 11 "%0 %10!I64d!|%11!s!|Peer sent invalid MM ID protocol %12!d! or port %13!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeProcessMMId
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
id.protocol, ItemLong -- 12
id.port, ItemLong -- 13
}
#typev ike_id_c583 12 "%0 %10!I64d!|%11!s!|Process Payload MM ID, SA %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeHandlePayloadMMId
#typev ike_sa_management_c2952 14 "%0 %10!I64d!|%11!s!|Scheduling MM lifetime expiry for SA %12!p!, secs %13!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeMMEstablished
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmSa, ItemPtr -- 12
saLifetimeSecs, ItemLong -- 13
}
#typev ike_sa_management_c3759 24 "%0 %10!I64d!|%11!s!|Linger check for SA %12!p! found matching SA %13!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=DoesSaExistMatchLingeringSa
#typev ike_sa_management_c3331 19 "%0 %10!I64d!|%11!s!|Failed to get ref to abort entry %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeQueueMMAbort
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmSa, ItemPtr -- 12
}
#typev ike_sa_management_c3394 20 "%0 %10!I64d!|%11!s!|Failed to get ref to queue postponed entry %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeQueuePostponedWorkEntry
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
postponedEntry->mmSa, ItemPtr -- 12
}
#typev ike_sa_management_c3482 22 "%0 %10!I64d!|%11!s!|queuing power event for MM SA %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeProcessPowerEventForMMSaWithoutLock
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmSa, ItemPtr -- 12
}
#typev ike_sa_management_c3832 26 "%0 %10!I64d!|%11!s!|Scheduling MM lifetime linger expiry for SA %12!p!, secs %13!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkePerformPostponedLingerCheck
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
lingeringSa, ItemPtr -- 12
saLifetimeSecs, ItemLong -- 13
}
#typev ike_sa_management_c3791 25 "%0 %10!I64d!|%11!s!|Linger check for SA %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkePerformPostponedLingerCheck
#typev ike_sa_management_c3457 21 "%0 %10!I64d!|%11!s!|queuing invalidation of MM SA %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeTerminateMMWithoutLock
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
mmSa, ItemPtr -- 12
}
#typev ike_sa_management_c4002 29 "%0 %10!I64d!|%11!s!|Not sending QM deletes during service shutdown" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeShutdownHashtableEntry
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_sa_management_c4042 30 "%0 %10!I64d!|%11!s!|Waiting for MMs to go. IKE and Authip MM SAs %12!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeDeleteAllSAs
#typev ike_notify_c796 18 "%0 %10!I64d!|%11!s!|Sending an MS status notify" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeMapWin32ErrorCodeToNotifyType
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_notify_c785 17 "%0 %10!I64d!|%11!s!|Error code %12!s! doesnt map to any RFC notify type" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeMapWin32ErrorCodeToNotifyType
#typev ike_timer_c225 11 "%0 %10!I64d!|%11!s!|Created new TimerContext %12!p!, type %13!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeAllocAndInitTimerContext
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
*tContext, ItemPtr -- 12
(*tContext)->type, ItemLong -- 13
}
#typev ike_timer_c173 10 "%0 %10!I64d!|%11!s!|Could not ref MM SA %12!p!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeAllocAndInitTimerContext
#typev ike_lifecycle_c832 35 "%0 %10!I64d!|%11!s!|Subscribing for Authip QM transport policy notifications" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeRegisterWithBFE
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_lifecycle_c817 34 "%0 %10!I64d!|%11!s!|Subscribing for IKE QM tunnel policy notifications" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeRegisterWithBFE
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_lifecycle_c802 33 "%0 %10!I64d!|%11!s!|Subscribing for IKE QM transport policy notifications" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeRegisterWithBFE
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_lifecycle_c787 32 "%0 %10!I64d!|%11!s!|Subscribing for Authip MM policy notifications" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeRegisterWithBFE
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_lifecycle_c772 31 "%0 %10!I64d!|%11!s!|Subscribing for IKE MM policy notifications" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeRegisterWithBFE
#typev ike_network_c1473 29 "%0 %10!I64d!|%11!s!|Global IF index epoch (%12!I64d!) higher than cache epoch (%13!I64d!). Obtaining IF index from stack." // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeGetIfIndexAndLuid
#typev ike_cert_c423 15 "%0 %10!I64d!|%11!s!|Cert chain didn't match the CA names specified in the policy" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeCompareSimpleChainArrayWithPolicyRootList
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_cert_c483 16 "%0 %10!I64d!|%11!s!|Cert chain didn't match the CA names specified by the peer in CRPs" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeCompareSimpleChainArrayWithCRPRootList
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_cert_c836 17 "%0 %10!I64d!|%11!s!|CertFindExtension failed with %12!d!. This is OK as it means all Key usages are valid" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeCheckCertKeyUsage
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
GetLastError(), ItemLong -- 12
}
#typev ike_cert_c1356 19 "%0 %10!I64d!|%11!s!|But we are not failing because cert auth flags in policy is set to %12!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeValidateChainAgainstCAPI
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
policyCertAuth->flags, ItemLong -- 12
}
#typev ike_cert_c1336 18 "%0 %10!I64d!|%11!s!|CertChain did not pass CertVerifyCertificateChainPolicy: %12!s!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeValidateChainAgainstCAPI
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
policyStatus.dwError, ItemWINERROR -- 12
}
#typev ike_cert_c2014 31 "%0 %10!I64d!|%11!s!|Shortened MM lifeTime (%12!d!) because of cert lifeTime (%13!d!)" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeAdjustMMLifetimeFromCert
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
saLifetimeSecs, ItemLong -- 12
lifeTime.LowPart, ItemLong -- 13
}
#typev ike_cert_c1985 30 "%0 %10!I64d!|%11!s!|Cert lifetime in seconds low %12!d!, high %13!d!" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeAdjustMMLifetimeFromCert
#typev ike_cert_c1572 25 "%0 %10!I64d!|%11!s!|Skipping valid Local cert chain in auth retry" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindLocalCertChainHelper
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_cert_c1557 24 "%0 %10!I64d!|%11!s!|Policy for chain root doesn't require NAP cert, rejecting chain" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindLocalCertChainHelper
{
IkeGetTlsMmLuid(), ItemLongLong -- 10
IkeGetTlsPeerAddr(), ItemWString -- 11
}
#typev ike_cert_c1546 23 "%0 %10!I64d!|%11!s!|End cert is not NAP cert, rejecting the chain" // COMPID=WFP_TRACE_IKE LEVEL=TRACE_LEVEL_INFORMATION FUNC=IkeFindLocalCertChainHelper
#typev wfp_lifecycle_c330 12 "%0 |%10!s!|Changing state of %11!s! service to %12!s!" // COMPID=WFP_TRACE_BASE LEVEL=TRACE_LEVEL_WARNING FUNC=WfpServiceChangeState
#typev wfp_lifecycle_c330 12 "%0 |%10!s!|Changing state of %11!s! service to %12!s!" // COMPID=WFP_TRACE_BASE LEVEL=TRACE_LEVEL_WARNING FUNC=WfpServiceChangeState
#typev bfe_driver_control_c1064 15 "%0SA already scheduled to be deleted by the driver." // COMPID=WFP_TRACE_BFE LEVEL=TRACE_LEVEL_INFORMATION FUNC=BfeDriverProcessExpireOrDeleteSaResult
{
}
#typev bfe_driver_control_c1051 14 "%0SA not found by the driver." // COMPID=WFP_TRACE_BFE LEVEL=TRACE_LEVEL_INFORMATION FUNC=BfeDriverProcessExpireOrDeleteSaResult