1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
// WARNING: this file is auto-generated by xtask gen and may be overwritten
use *;
/// The specified quick mode policy already exists.
pub const QM_POLICY_EXISTS : ErrorCode = from_constant; // ERROR_IPSEC_QM_POLICY_EXISTS
/// The specified quick mode policy was not found.
pub const QM_POLICY_NOT_FOUND : ErrorCode = from_constant; // ERROR_IPSEC_QM_POLICY_NOT_FOUND
/// The specified quick mode policy is being used.
pub const QM_POLICY_IN_USE : ErrorCode = from_constant; // ERROR_IPSEC_QM_POLICY_IN_USE
/// The specified main mode policy already exists.
pub const MM_POLICY_EXISTS : ErrorCode = from_constant; // ERROR_IPSEC_MM_POLICY_EXISTS
/// The specified main mode policy was not found
pub const MM_POLICY_NOT_FOUND : ErrorCode = from_constant; // ERROR_IPSEC_MM_POLICY_NOT_FOUND
/// The specified main mode policy is being used.
pub const MM_POLICY_IN_USE : ErrorCode = from_constant; // ERROR_IPSEC_MM_POLICY_IN_USE
/// The specified main mode filter already exists.
pub const MM_FILTER_EXISTS : ErrorCode = from_constant; // ERROR_IPSEC_MM_FILTER_EXISTS
/// The specified main mode filter was not found.
pub const MM_FILTER_NOT_FOUND : ErrorCode = from_constant; // ERROR_IPSEC_MM_FILTER_NOT_FOUND
/// The specified transport mode filter already exists.
pub const TRANSPORT_FILTER_EXISTS : ErrorCode = from_constant; // ERROR_IPSEC_TRANSPORT_FILTER_EXISTS
/// The specified transport mode filter does not exist.
pub const TRANSPORT_FILTER_NOT_FOUND : ErrorCode = from_constant; // ERROR_IPSEC_TRANSPORT_FILTER_NOT_FOUND
/// The specified main mode authentication list exists.
pub const MM_AUTH_EXISTS : ErrorCode = from_constant; // ERROR_IPSEC_MM_AUTH_EXISTS
/// The specified main mode authentication list was not found.
pub const MM_AUTH_NOT_FOUND : ErrorCode = from_constant; // ERROR_IPSEC_MM_AUTH_NOT_FOUND
/// The specified main mode authentication list is being used.
pub const MM_AUTH_IN_USE : ErrorCode = from_constant; // ERROR_IPSEC_MM_AUTH_IN_USE
/// The specified default main mode policy was not found.
pub const DEFAULT_MM_POLICY_NOT_FOUND : ErrorCode = from_constant; // ERROR_IPSEC_DEFAULT_MM_POLICY_NOT_FOUND
/// The specified default main mode authentication list was not found.
pub const DEFAULT_MM_AUTH_NOT_FOUND : ErrorCode = from_constant; // ERROR_IPSEC_DEFAULT_MM_AUTH_NOT_FOUND
/// The specified default quick mode policy was not found.
pub const DEFAULT_QM_POLICY_NOT_FOUND : ErrorCode = from_constant; // ERROR_IPSEC_DEFAULT_QM_POLICY_NOT_FOUND
/// The specified tunnel mode filter exists.
pub const TUNNEL_FILTER_EXISTS : ErrorCode = from_constant; // ERROR_IPSEC_TUNNEL_FILTER_EXISTS
/// The specified tunnel mode filter was not found.
pub const TUNNEL_FILTER_NOT_FOUND : ErrorCode = from_constant; // ERROR_IPSEC_TUNNEL_FILTER_NOT_FOUND
/// The Main Mode filter is pending deletion.
pub const MM_FILTER_PENDING_DELETION : ErrorCode = from_constant; // ERROR_IPSEC_MM_FILTER_PENDING_DELETION
/// The transport filter is pending deletion.
pub const TRANSPORT_FILTER_PENDING_DELETION : ErrorCode = from_constant; // ERROR_IPSEC_TRANSPORT_FILTER_PENDING_DELETION
/// The tunnel filter is pending deletion.
pub const TUNNEL_FILTER_PENDING_DELETION : ErrorCode = from_constant; // ERROR_IPSEC_TUNNEL_FILTER_PENDING_DELETION
/// The Main Mode policy is pending deletion.
pub const MM_POLICY_PENDING_DELETION : ErrorCode = from_constant; // ERROR_IPSEC_MM_POLICY_PENDING_DELETION
/// The Main Mode authentication bundle is pending deletion.
pub const MM_AUTH_PENDING_DELETION : ErrorCode = from_constant; // ERROR_IPSEC_MM_AUTH_PENDING_DELETION
/// The Quick Mode policy is pending deletion.
pub const QM_POLICY_PENDING_DELETION : ErrorCode = from_constant; // ERROR_IPSEC_QM_POLICY_PENDING_DELETION
/// ERROR_IPSEC_IKE_NEG_STATUS_BEGIN
pub const IKE_NEG_STATUS_BEGIN : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NEG_STATUS_BEGIN
/// IKE authentication credentials are unacceptable
pub const IKE_AUTH_FAIL : ErrorCode = from_constant; // ERROR_IPSEC_IKE_AUTH_FAIL
/// IKE security attributes are unacceptable
pub const IKE_ATTRIB_FAIL : ErrorCode = from_constant; // ERROR_IPSEC_IKE_ATTRIB_FAIL
/// IKE Negotiation in progress
pub const IKE_NEGOTIATION_PENDING : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NEGOTIATION_PENDING
/// General processing error
pub const IKE_GENERAL_PROCESSING_ERROR : ErrorCode = from_constant; // ERROR_IPSEC_IKE_GENERAL_PROCESSING_ERROR
/// Negotiation timed out
pub const IKE_TIMED_OUT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_TIMED_OUT
/// IKE failed to find valid machine certificate. Contact your Network Security Administrator about installing a valid certificate in the appropriate Certificate Store.
pub const IKE_NO_CERT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NO_CERT
/// IKE SA deleted by peer before establishment completed
pub const IKE_SA_DELETED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_SA_DELETED
/// IKE SA deleted before establishment completed
pub const IKE_SA_REAPED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_SA_REAPED
/// Negotiation request sat in Queue too long
pub const IKE_MM_ACQUIRE_DROP : ErrorCode = from_constant; // ERROR_IPSEC_IKE_MM_ACQUIRE_DROP
/// Negotiation request sat in Queue too long
pub const IKE_QM_ACQUIRE_DROP : ErrorCode = from_constant; // ERROR_IPSEC_IKE_QM_ACQUIRE_DROP
/// Negotiation request sat in Queue too long
pub const IKE_QUEUE_DROP_MM : ErrorCode = from_constant; // ERROR_IPSEC_IKE_QUEUE_DROP_MM
/// Negotiation request sat in Queue too long
pub const IKE_QUEUE_DROP_NO_MM : ErrorCode = from_constant; // ERROR_IPSEC_IKE_QUEUE_DROP_NO_MM
/// No response from peer
pub const IKE_DROP_NO_RESPONSE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_DROP_NO_RESPONSE
/// Negotiation took too long
pub const IKE_MM_DELAY_DROP : ErrorCode = from_constant; // ERROR_IPSEC_IKE_MM_DELAY_DROP
/// Negotiation took too long
pub const IKE_QM_DELAY_DROP : ErrorCode = from_constant; // ERROR_IPSEC_IKE_QM_DELAY_DROP
/// Unknown error occurred
pub const IKE_ERROR : ErrorCode = from_constant; // ERROR_IPSEC_IKE_ERROR
/// Certificate Revocation Check failed
pub const IKE_CRL_FAILED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_CRL_FAILED
/// Invalid certificate key usage
pub const IKE_INVALID_KEY_USAGE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_KEY_USAGE
/// Invalid certificate type
pub const IKE_INVALID_CERT_TYPE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_CERT_TYPE
/// IKE negotiation failed because the machine certificate used does not have a private key. IPsec certificates require a private key. Contact your Network Security administrator about replacing with a certificate that has a private key.
pub const IKE_NO_PRIVATE_KEY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NO_PRIVATE_KEY
/// Simultaneous rekeys were detected.
pub const IKE_SIMULTANEOUS_REKEY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_SIMULTANEOUS_REKEY
/// Failure in Diffie-Hellman computation
pub const IKE_DH_FAIL : ErrorCode = from_constant; // ERROR_IPSEC_IKE_DH_FAIL
/// Don't know how to process critical payload
pub const IKE_CRITICAL_PAYLOAD_NOT_RECOGNIZED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_CRITICAL_PAYLOAD_NOT_RECOGNIZED
/// Invalid header
pub const IKE_INVALID_HEADER : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_HEADER
/// No policy configured
pub const IKE_NO_POLICY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NO_POLICY
/// Failed to verify signature
pub const IKE_INVALID_SIGNATURE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_SIGNATURE
/// Failed to authenticate using Kerberos
pub const IKE_KERBEROS_ERROR : ErrorCode = from_constant; // ERROR_IPSEC_IKE_KERBEROS_ERROR
/// Peer's certificate did not have a public key
pub const IKE_NO_PUBLIC_KEY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NO_PUBLIC_KEY
/// Error processing error payload
pub const IKE_PROCESS_ERR : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR
/// Error processing SA payload
pub const IKE_PROCESS_ERR_SA : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_SA
/// Error processing Proposal payload
pub const IKE_PROCESS_ERR_PROP : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_PROP
/// Error processing Transform payload
pub const IKE_PROCESS_ERR_TRANS : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_TRANS
/// Error processing KE payload
pub const IKE_PROCESS_ERR_KE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_KE
/// Error processing ID payload
pub const IKE_PROCESS_ERR_ID : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_ID
/// Error processing Cert payload
pub const IKE_PROCESS_ERR_CERT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_CERT
/// Error processing Certificate Request payload
pub const IKE_PROCESS_ERR_CERT_REQ : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_CERT_REQ
/// Error processing Hash payload
pub const IKE_PROCESS_ERR_HASH : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_HASH
/// Error processing Signature payload
pub const IKE_PROCESS_ERR_SIG : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_SIG
/// Error processing Nonce payload
pub const IKE_PROCESS_ERR_NONCE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_NONCE
/// Error processing Notify payload
pub const IKE_PROCESS_ERR_NOTIFY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_NOTIFY
/// Error processing Delete Payload
pub const IKE_PROCESS_ERR_DELETE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_DELETE
/// Error processing VendorId payload
pub const IKE_PROCESS_ERR_VENDOR : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_VENDOR
/// Invalid payload received
pub const IKE_INVALID_PAYLOAD : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_PAYLOAD
/// Soft SA loaded
pub const IKE_LOAD_SOFT_SA : ErrorCode = from_constant; // ERROR_IPSEC_IKE_LOAD_SOFT_SA
/// Soft SA torn down
pub const IKE_SOFT_SA_TORN_DOWN : ErrorCode = from_constant; // ERROR_IPSEC_IKE_SOFT_SA_TORN_DOWN
/// Invalid cookie received.
pub const IKE_INVALID_COOKIE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_COOKIE
/// Peer failed to send valid machine certificate
pub const IKE_NO_PEER_CERT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NO_PEER_CERT
/// Certification Revocation check of peer's certificate failed
pub const IKE_PEER_CRL_FAILED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PEER_CRL_FAILED
/// New policy invalidated SAs formed with old policy
pub const IKE_POLICY_CHANGE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_POLICY_CHANGE
/// There is no available Main Mode IKE policy.
pub const IKE_NO_MM_POLICY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NO_MM_POLICY
/// Failed to enabled TCB privilege.
pub const IKE_NOTCBPRIV : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NOTCBPRIV
/// Failed to load SECURITY.DLL.
pub const IKE_SECLOADFAIL : ErrorCode = from_constant; // ERROR_IPSEC_IKE_SECLOADFAIL
/// Failed to obtain security function table dispatch address from SSPI.
pub const IKE_FAILSSPINIT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_FAILSSPINIT
/// Failed to query Kerberos package to obtain max token size.
pub const IKE_FAILQUERYSSP : ErrorCode = from_constant; // ERROR_IPSEC_IKE_FAILQUERYSSP
/// Failed to obtain Kerberos server credentials for ISAKMP/ERROR_IPSEC_IKE service. Kerberos authentication will not function. The most likely reason for this is lack of domain membership. This is normal if your computer is a member of a workgroup.
pub const IKE_SRVACQFAIL : ErrorCode = from_constant; // ERROR_IPSEC_IKE_SRVACQFAIL
/// Failed to determine SSPI principal name for ISAKMP/ERROR_IPSEC_IKE service (QueryCredentialsAttributes).
pub const IKE_SRVQUERYCRED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_SRVQUERYCRED
/// Failed to obtain new SPI for the inbound SA from IPsec driver. The most common cause for this is that the driver does not have the correct filter. Check your policy to verify the filters.
pub const IKE_GETSPIFAIL : ErrorCode = from_constant; // ERROR_IPSEC_IKE_GETSPIFAIL
/// Given filter is invalid
pub const IKE_INVALID_FILTER : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_FILTER
/// Memory allocation failed.
pub const IKE_OUT_OF_MEMORY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_OUT_OF_MEMORY
/// Failed to add Security Association to IPsec Driver. The most common cause for this is if the IKE negotiation took too long to complete. If the problem persists, reduce the load on the faulting machine.
pub const IKE_ADD_UPDATE_KEY_FAILED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_ADD_UPDATE_KEY_FAILED
/// Invalid policy
pub const IKE_INVALID_POLICY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_POLICY
/// Invalid DOI
pub const IKE_UNKNOWN_DOI : ErrorCode = from_constant; // ERROR_IPSEC_IKE_UNKNOWN_DOI
/// Invalid situation
pub const IKE_INVALID_SITUATION : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_SITUATION
/// Diffie-Hellman failure
pub const IKE_DH_FAILURE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_DH_FAILURE
/// Invalid Diffie-Hellman group
pub const IKE_INVALID_GROUP : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_GROUP
/// Error encrypting payload
pub const IKE_ENCRYPT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_ENCRYPT
/// Error decrypting payload
pub const IKE_DECRYPT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_DECRYPT
/// Policy match error
pub const IKE_POLICY_MATCH : ErrorCode = from_constant; // ERROR_IPSEC_IKE_POLICY_MATCH
/// Unsupported ID
pub const IKE_UNSUPPORTED_ID : ErrorCode = from_constant; // ERROR_IPSEC_IKE_UNSUPPORTED_ID
/// Hash verification failed
pub const IKE_INVALID_HASH : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_HASH
/// Invalid hash algorithm
pub const IKE_INVALID_HASH_ALG : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_HASH_ALG
/// Invalid hash size
pub const IKE_INVALID_HASH_SIZE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_HASH_SIZE
/// Invalid encryption algorithm
pub const IKE_INVALID_ENCRYPT_ALG : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_ENCRYPT_ALG
/// Invalid authentication algorithm
pub const IKE_INVALID_AUTH_ALG : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_AUTH_ALG
/// Invalid certificate signature
pub const IKE_INVALID_SIG : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_SIG
/// Load failed
pub const IKE_LOAD_FAILED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_LOAD_FAILED
/// Deleted via RPC call
pub const IKE_RPC_DELETE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_RPC_DELETE
/// Temporary state created to perform reinitialization. This is not a real failure.
pub const IKE_BENIGN_REINIT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_BENIGN_REINIT
/// The lifetime value received in the Responder Lifetime Notify is below the Windows 2000 configured minimum value. Please fix the policy on the peer machine.
pub const IKE_INVALID_RESPONDER_LIFETIME_NOTIFY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_RESPONDER_LIFETIME_NOTIFY
/// The recipient cannot handle version of IKE specified in the header.
pub const IKE_INVALID_MAJOR_VERSION : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_MAJOR_VERSION
/// Key length in certificate is too small for configured security requirements.
pub const IKE_INVALID_CERT_KEYLEN : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_CERT_KEYLEN
/// Max number of established MM SAs to peer exceeded.
pub const IKE_MM_LIMIT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_MM_LIMIT
/// IKE received a policy that disables negotiation.
pub const IKE_NEGOTIATION_DISABLED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_NEGOTIATION_DISABLED
/// Reached maximum quick mode limit for the main mode. New main mode will be started.
pub const IKE_QM_LIMIT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_QM_LIMIT
/// Main mode SA lifetime expired or peer sent a main mode delete.
pub const IKE_MM_EXPIRED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_MM_EXPIRED
/// Main mode SA assumed to be invalid because peer stopped responding.
pub const IKE_PEER_MM_ASSUMED_INVALID : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PEER_MM_ASSUMED_INVALID
/// Certificate doesn't chain to a trusted root in IPsec policy.
pub const IKE_CERT_CHAIN_POLICY_MISMATCH : ErrorCode = from_constant; // ERROR_IPSEC_IKE_CERT_CHAIN_POLICY_MISMATCH
/// Received unexpected message ID.
pub const IKE_UNEXPECTED_MESSAGE_ID : ErrorCode = from_constant; // ERROR_IPSEC_IKE_UNEXPECTED_MESSAGE_ID
/// Received invalid authentication offers.
pub const IKE_INVALID_AUTH_PAYLOAD : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_AUTH_PAYLOAD
/// Sent DoS cookie notify to initiator.
pub const IKE_DOS_COOKIE_SENT : ErrorCode = from_constant; // ERROR_IPSEC_IKE_DOS_COOKIE_SENT
/// IKE service is shutting down.
pub const IKE_SHUTTING_DOWN : ErrorCode = from_constant; // ERROR_IPSEC_IKE_SHUTTING_DOWN
/// Could not verify binding between CGA address and certificate.
pub const IKE_CGA_AUTH_FAILED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_CGA_AUTH_FAILED
/// Error processing NatOA payload.
pub const IKE_PROCESS_ERR_NATOA : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PROCESS_ERR_NATOA
/// Parameters of the main mode are invalid for this quick mode.
pub const IKE_INVALID_MM_FOR_QM : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INVALID_MM_FOR_QM
/// Quick mode SA was expired by IPsec driver.
pub const IKE_QM_EXPIRED : ErrorCode = from_constant; // ERROR_IPSEC_IKE_QM_EXPIRED
/// Too many dynamically added IKEEXT filters were detected.
pub const IKE_TOO_MANY_FILTERS : ErrorCode = from_constant; // ERROR_IPSEC_IKE_TOO_MANY_FILTERS
/// NAP reauth succeeded and must delete the dummy NAP IKEv2 tunnel.
pub const IKE_KILL_DUMMY_NAP_TUNNEL : ErrorCode = from_constant; // ERROR_IPSEC_IKE_KILL_DUMMY_NAP_TUNNEL
/// Error in assigning inner IP address to initiator in tunnel mode.
pub const IKE_INNER_IP_ASSIGNMENT_FAILURE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_INNER_IP_ASSIGNMENT_FAILURE
/// Require configuration payload missing.
pub const IKE_REQUIRE_CP_PAYLOAD_MISSING : ErrorCode = from_constant; // ERROR_IPSEC_IKE_REQUIRE_CP_PAYLOAD_MISSING
/// A negotiation running as the security principle who issued the connection is in progress
pub const KEY_MODULE_IMPERSONATION_NEGOTIATION_PENDING : ErrorCode = from_constant; // ERROR_IPSEC_KEY_MODULE_IMPERSONATION_NEGOTIATION_PENDING
/// SA was deleted due to IKEv1/AuthIP co-existence suppress check.
pub const IKE_COEXISTENCE_SUPPRESS : ErrorCode = from_constant; // ERROR_IPSEC_IKE_COEXISTENCE_SUPPRESS
/// Incoming SA request was dropped due to peer IP address rate limiting.
pub const IKE_RATELIMIT_DROP : ErrorCode = from_constant; // ERROR_IPSEC_IKE_RATELIMIT_DROP
/// Peer does not support MOBIKE.
pub const IKE_PEER_DOESNT_SUPPORT_MOBIKE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_PEER_DOESNT_SUPPORT_MOBIKE
/// SA establishment is not authorized.
pub const IKE_AUTHORIZATION_FAILURE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_AUTHORIZATION_FAILURE
/// SA establishment is not authorized because there is not a sufficiently strong PKINIT-based credential.
pub const IKE_STRONG_CRED_AUTHORIZATION_FAILURE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_STRONG_CRED_AUTHORIZATION_FAILURE
/// SA establishment is not authorized. You may need to enter updated or different credentials such as a smartcard.
pub const IKE_AUTHORIZATION_FAILURE_WITH_OPTIONAL_RETRY : ErrorCode = from_constant; // ERROR_IPSEC_IKE_AUTHORIZATION_FAILURE_WITH_OPTIONAL_RETRY
/// SA establishment is not authorized because there is not a sufficiently strong PKINIT-based credential. This might be related to certificate-to-account mapping failure for the SA.
pub const IKE_STRONG_CRED_AUTHORIZATION_AND_CERTMAP_FAILURE : ErrorCode = from_constant; // ERROR_IPSEC_IKE_STRONG_CRED_AUTHORIZATION_AND_CERTMAP_FAILURE
/// The SPI in the packet does not match a valid IPsec SA.
pub const BAD_SPI : ErrorCode = from_constant; // ERROR_IPSEC_BAD_SPI
/// Packet was received on an IPsec SA whose lifetime has expired.
pub const SA_LIFETIME_EXPIRED : ErrorCode = from_constant; // ERROR_IPSEC_SA_LIFETIME_EXPIRED
/// Packet was received on an IPsec SA that does not match the packet characteristics.
pub const WRONG_SA : ErrorCode = from_constant; // ERROR_IPSEC_WRONG_SA
/// Packet sequence number replay check failed.
pub const REPLAY_CHECK_FAILED : ErrorCode = from_constant; // ERROR_IPSEC_REPLAY_CHECK_FAILED
/// IPsec header and/or trailer in the packet is invalid.
pub const INVALID_PACKET : ErrorCode = from_constant; // ERROR_IPSEC_INVALID_PACKET
/// IPsec integrity check failed.
pub const INTEGRITY_CHECK_FAILED : ErrorCode = from_constant; // ERROR_IPSEC_INTEGRITY_CHECK_FAILED
/// IPsec dropped a clear text packet.
pub const CLEAR_TEXT_DROP : ErrorCode = from_constant; // ERROR_IPSEC_CLEAR_TEXT_DROP
/// IPsec dropped an incoming ESP packet in authenticated firewall mode. This drop is benign.
pub const AUTH_FIREWALL_DROP : ErrorCode = from_constant; // ERROR_IPSEC_AUTH_FIREWALL_DROP
/// IPsec dropped a packet due to DoS throttling.
pub const THROTTLE_DROP : ErrorCode = from_constant; // ERROR_IPSEC_THROTTLE_DROP
/// IPsec DoS Protection matched an explicit block rule.
pub const DOSP_BLOCK : ErrorCode = from_constant; // ERROR_IPSEC_DOSP_BLOCK
/// IPsec DoS Protection received an IPsec specific multicast packet which is not allowed.
pub const DOSP_RECEIVED_MULTICAST : ErrorCode = from_constant; // ERROR_IPSEC_DOSP_RECEIVED_MULTICAST
/// IPsec DoS Protection received an incorrectly formatted packet.
pub const DOSP_INVALID_PACKET : ErrorCode = from_constant; // ERROR_IPSEC_DOSP_INVALID_PACKET
/// IPsec DoS Protection failed to look up state.
pub const DOSP_STATE_LOOKUP_FAILED : ErrorCode = from_constant; // ERROR_IPSEC_DOSP_STATE_LOOKUP_FAILED
/// IPsec DoS Protection failed to create state because the maximum number of entries allowed by policy has been reached.
pub const DOSP_MAX_ENTRIES : ErrorCode = from_constant; // ERROR_IPSEC_DOSP_MAX_ENTRIES
/// IPsec DoS Protection received an IPsec negotiation packet for a keying module which is not allowed by policy.
pub const DOSP_KEYMOD_NOT_ALLOWED : ErrorCode = from_constant; // ERROR_IPSEC_DOSP_KEYMOD_NOT_ALLOWED
/// IPsec DoS Protection has not been enabled.
pub const DOSP_NOT_INSTALLED : ErrorCode = from_constant; // ERROR_IPSEC_DOSP_NOT_INSTALLED
/// IPsec DoS Protection failed to create a per internal IP rate limit queue because the maximum number of queues allowed by policy has been reached.
pub const DOSP_MAX_PER_IP_RATELIMIT_QUEUES : ErrorCode = from_constant; // ERROR_IPSEC_DOSP_MAX_PER_IP_RATELIMIT_QUEUES
pub const SERVICE_STOPPED : ErrorCode = from_constant; // ERROR_IPSEC_SERVICE_STOPPED