]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
payload: Use common prefixes for all payload type identifiers
authorMartin Willi <martin@revosec.ch>
Tue, 29 Oct 2013 09:09:39 +0000 (10:09 +0100)
committerMartin Willi <martin@revosec.ch>
Wed, 4 Jun 2014 13:53:03 +0000 (15:53 +0200)
The old identifiers did not use a proper namespace and often clashed with
other defines.

104 files changed:
src/charon-tkm/src/tkm/tkm_listener.c
src/conftest/hooks/add_notify.c
src/conftest/hooks/custom_proposal.c
src/conftest/hooks/force_cookie.c
src/conftest/hooks/ike_auth_fill.c
src/conftest/hooks/log_id.c
src/conftest/hooks/log_ke.c
src/conftest/hooks/log_proposals.c
src/conftest/hooks/log_ts.c
src/conftest/hooks/pretend_auth.c
src/conftest/hooks/rebuild_auth.c
src/conftest/hooks/set_proposal_number.c
src/conftest/hooks/set_reserved.c
src/conftest/hooks/unencrypted_notify.c
src/libcharon/encoding/generator.c
src/libcharon/encoding/message.c
src/libcharon/encoding/parser.c
src/libcharon/encoding/payloads/auth_payload.c
src/libcharon/encoding/payloads/cert_payload.c
src/libcharon/encoding/payloads/certreq_payload.c
src/libcharon/encoding/payloads/configuration_attribute.c
src/libcharon/encoding/payloads/configuration_attribute.h
src/libcharon/encoding/payloads/cp_payload.c
src/libcharon/encoding/payloads/cp_payload.h
src/libcharon/encoding/payloads/delete_payload.c
src/libcharon/encoding/payloads/delete_payload.h
src/libcharon/encoding/payloads/eap_payload.c
src/libcharon/encoding/payloads/encryption_payload.c
src/libcharon/encoding/payloads/encryption_payload.h
src/libcharon/encoding/payloads/endpoint_notify.c
src/libcharon/encoding/payloads/fragment_payload.c
src/libcharon/encoding/payloads/hash_payload.c
src/libcharon/encoding/payloads/hash_payload.h
src/libcharon/encoding/payloads/id_payload.c
src/libcharon/encoding/payloads/id_payload.h
src/libcharon/encoding/payloads/ike_header.c
src/libcharon/encoding/payloads/ke_payload.c
src/libcharon/encoding/payloads/ke_payload.h
src/libcharon/encoding/payloads/nonce_payload.c
src/libcharon/encoding/payloads/nonce_payload.h
src/libcharon/encoding/payloads/notify_payload.c
src/libcharon/encoding/payloads/notify_payload.h
src/libcharon/encoding/payloads/payload.c
src/libcharon/encoding/payloads/payload.h
src/libcharon/encoding/payloads/proposal_substructure.c
src/libcharon/encoding/payloads/proposal_substructure.h
src/libcharon/encoding/payloads/sa_payload.c
src/libcharon/encoding/payloads/sa_payload.h
src/libcharon/encoding/payloads/traffic_selector_substructure.c
src/libcharon/encoding/payloads/transform_attribute.c
src/libcharon/encoding/payloads/transform_attribute.h
src/libcharon/encoding/payloads/transform_substructure.c
src/libcharon/encoding/payloads/transform_substructure.h
src/libcharon/encoding/payloads/ts_payload.c
src/libcharon/encoding/payloads/unknown_payload.c
src/libcharon/encoding/payloads/vendor_id_payload.c
src/libcharon/encoding/payloads/vendor_id_payload.h
src/libcharon/network/receiver.c
src/libcharon/plugins/eap_gtc/eap_gtc.c
src/libcharon/plugins/eap_radius/eap_radius_forward.c
src/libcharon/plugins/eap_radius/eap_radius_xauth.c
src/libcharon/plugins/radattr/radattr_listener.c
src/libcharon/plugins/xauth_eap/xauth_eap.c
src/libcharon/plugins/xauth_generic/xauth_generic.c
src/libcharon/plugins/xauth_pam/xauth_pam.c
src/libcharon/processing/jobs/process_message_job.c
src/libcharon/sa/authenticator.c
src/libcharon/sa/ike_sa_manager.c
src/libcharon/sa/ikev1/authenticators/psk_v1_authenticator.c
src/libcharon/sa/ikev1/authenticators/pubkey_v1_authenticator.c
src/libcharon/sa/ikev1/keymat_v1.c
src/libcharon/sa/ikev1/phase1.c
src/libcharon/sa/ikev1/task_manager_v1.c
src/libcharon/sa/ikev1/tasks/aggressive_mode.c
src/libcharon/sa/ikev1/tasks/informational.c
src/libcharon/sa/ikev1/tasks/isakmp_cert_post.c
src/libcharon/sa/ikev1/tasks/isakmp_cert_pre.c
src/libcharon/sa/ikev1/tasks/isakmp_delete.c
src/libcharon/sa/ikev1/tasks/isakmp_dpd.c
src/libcharon/sa/ikev1/tasks/isakmp_natd.c
src/libcharon/sa/ikev1/tasks/isakmp_vendor.c
src/libcharon/sa/ikev1/tasks/main_mode.c
src/libcharon/sa/ikev1/tasks/mode_config.c
src/libcharon/sa/ikev1/tasks/quick_delete.c
src/libcharon/sa/ikev1/tasks/quick_mode.c
src/libcharon/sa/ikev1/tasks/xauth.c
src/libcharon/sa/ikev2/authenticators/eap_authenticator.c
src/libcharon/sa/ikev2/authenticators/psk_authenticator.c
src/libcharon/sa/ikev2/authenticators/pubkey_authenticator.c
src/libcharon/sa/ikev2/connect_manager.c
src/libcharon/sa/ikev2/task_manager_v2.c
src/libcharon/sa/ikev2/tasks/child_create.c
src/libcharon/sa/ikev2/tasks/child_delete.c
src/libcharon/sa/ikev2/tasks/child_rekey.c
src/libcharon/sa/ikev2/tasks/ike_auth.c
src/libcharon/sa/ikev2/tasks/ike_cert_post.c
src/libcharon/sa/ikev2/tasks/ike_cert_pre.c
src/libcharon/sa/ikev2/tasks/ike_config.c
src/libcharon/sa/ikev2/tasks/ike_delete.c
src/libcharon/sa/ikev2/tasks/ike_init.c
src/libcharon/sa/ikev2/tasks/ike_me.c
src/libcharon/sa/ikev2/tasks/ike_mobike.c
src/libcharon/sa/ikev2/tasks/ike_natd.c
src/libcharon/sa/ikev2/tasks/ike_vendor.c

index 0505864567a36bd2c5abcfbf539bb31ce0266ca2..b2692a586f2a2f95d817ef2436b1bdebf525d46e 100644 (file)
@@ -310,7 +310,7 @@ METHOD(listener_t, message, bool,
             " (ISA context %llu)", isa_id);
 
        auth_payload = (auth_payload_t*)message->get_payload(message,
-                                                                                                                AUTHENTICATION);
+                                                                                                                PLV2_AUTH);
        if (auth_payload)
        {
                chunk_t auth_data;
index 504b02a7bac5a48a24ec8666195c5e231a617a7b..73a9b1a803d2c47a2eb6318ead8a935700a2066b 100644 (file)
@@ -88,7 +88,7 @@ METHOD(listener_t, message, bool,
                {
                        data = chunk_clone(chunk_create(this->data, strlen(this->data)));
                }
-               notify = notify_payload_create_from_protocol_and_type(NOTIFY,
+               notify = notify_payload_create_from_protocol_and_type(PLV2_NOTIFY,
                                                                        this->esp ? PROTO_ESP : PROTO_IKE, type);
                notify->set_spi(notify, this->spi);
                if (data.len)
index 6086d13b568172959f195a29cf74ce0f659ba6e4..ee4404575786333efcc4d0ebc02d0f156ef164aa 100644 (file)
@@ -124,7 +124,7 @@ METHOD(listener_t, message, bool,
                enumerator = message->create_payload_enumerator(message);
                while (enumerator->enumerate(enumerator, &payload))
                {
-                       if (payload->get_type(payload) == SECURITY_ASSOCIATION)
+                       if (payload->get_type(payload) == PLV2_SECURITY_ASSOCIATION)
                        {
                                old = (sa_payload_t*)payload;
                                message->remove_payload_at(message, enumerator);
index 1b044db14b4f0cc2b231b4556bb4664bdf02c390..6be516cf439747c809718b3d44c0f16859cd13af 100644 (file)
@@ -44,7 +44,7 @@ METHOD(listener_t, message, bool,
                enumerator = message->create_payload_enumerator(message);
                while (enumerator->enumerate(enumerator, &payload))
                {
-                       if (payload->get_type(payload) == NOTIFY)
+                       if (payload->get_type(payload) == PLV2_NOTIFY)
                        {
                                notify_payload_t *notify = (notify_payload_t*)payload;
                                chunk_t data;
index 09590d4f35e523a54bfd41168bb9d6ee1763cd81..5cdd5be38db660878a850034ed5739cd5f793a75 100644 (file)
@@ -108,7 +108,7 @@ METHOD(listener_t, message, bool,
                        diff = this->bytes - size - CERT_PAYLOAD_HEADER_LENGTH;
                        data = chunk_alloc(diff);
                        memset(data.ptr, 0x12, data.len);
-                       pld = cert_payload_create_custom(CERTIFICATE, 201, data);
+                       pld = cert_payload_create_custom(PLV2_CERTIFICATE, 201, data);
                        message->add_payload(message, &pld->payload_interface);
                        DBG1(DBG_CFG, "inserting %d dummy bytes certificate payload", diff);
                }
index 07dd6a44ecd18ba0ca591ca13edbc18b313a9206..f47372fa7b3356f7b65b34178d8166966212d9ef 100644 (file)
@@ -45,8 +45,8 @@ METHOD(listener_t, message, bool,
                enumerator = message->create_payload_enumerator(message);
                while (enumerator->enumerate(enumerator, &payload))
                {
-                       if (payload->get_type(payload) == ID_INITIATOR ||
-                               payload->get_type(payload) == ID_RESPONDER)
+                       if (payload->get_type(payload) == PLV2_ID_INITIATOR ||
+                               payload->get_type(payload) == PLV2_ID_RESPONDER)
                        {
                                id_payload = (id_payload_t*)payload;
                                id = id_payload->get_identification(id_payload);
index 710482326c26ddcc683fd4e7667c563346ea5782..66aa4a65e69963c44300c86bf625eb2d10815e12 100644 (file)
@@ -43,7 +43,7 @@ METHOD(listener_t, message, bool,
                enumerator = message->create_payload_enumerator(message);
                while (enumerator->enumerate(enumerator, &payload))
                {
-                       if (payload->get_type(payload) == KEY_EXCHANGE)
+                       if (payload->get_type(payload) == PLV2_KEY_EXCHANGE)
                        {
                                ke = (ke_payload_t*)payload;
                                DBG1(DBG_CFG, "received DH group %N",
index 347b83209b230ab37e51cbbb1396233d313b9aa5..c0d458eae1305b27acf00e8f3ea1b898431d0a77 100644 (file)
@@ -45,7 +45,7 @@ METHOD(listener_t, message, bool,
                enumerator = message->create_payload_enumerator(message);
                while (enumerator->enumerate(enumerator, &payload))
                {
-                       if (payload->get_type(payload) == SECURITY_ASSOCIATION)
+                       if (payload->get_type(payload) == PLV2_SECURITY_ASSOCIATION)
                        {
                                sa = (sa_payload_t*)payload;
                                list = sa->get_proposals(sa);
index f212efa12ba90f95b9744bb74b544147eb857701..79c59b89a8f935dd58d2a8c85e751ad442441b14 100644 (file)
@@ -43,8 +43,8 @@ METHOD(listener_t, message, bool,
                enumerator = message->create_payload_enumerator(message);
                while (enumerator->enumerate(enumerator, &payload))
                {
-                       if (payload->get_type(payload) == TRAFFIC_SELECTOR_INITIATOR ||
-                               payload->get_type(payload) == TRAFFIC_SELECTOR_RESPONDER)
+                       if (payload->get_type(payload) == PLV2_TS_INITIATOR ||
+                               payload->get_type(payload) == PLV2_TS_RESPONDER)
                        {
                                ts = (ts_payload_t*)payload;
                                host_t *from, *to;
index 4166afc79bd2e97382db173692646a0d508c6f29..54957b04851d0def03ac66b8177d4287c985d977 100644 (file)
@@ -79,7 +79,7 @@ static void process_init_request(private_pretend_auth_t *this,
 {
        nonce_payload_t *nonce;
 
-       nonce = (nonce_payload_t*)message->get_payload(message, NONCE);
+       nonce = (nonce_payload_t*)message->get_payload(message, PLV2_NONCE);
        if (nonce)
        {
                free(this->nonce.ptr);
@@ -98,13 +98,13 @@ static void process_auth_request(private_pretend_auth_t *this,
        ts_payload_t *tsi, *tsr;
        linked_list_t *proposals;
 
-       id = (id_payload_t*)message->get_payload(message, ID_RESPONDER);
+       id = (id_payload_t*)message->get_payload(message, PLV2_ID_RESPONDER);
        if (id)
        {
                this->id->destroy(this->id);
                this->id = id->get_identification(id);
        }
-       sa = (sa_payload_t*)message->get_payload(message, SECURITY_ASSOCIATION);
+       sa = (sa_payload_t*)message->get_payload(message, PLV2_SECURITY_ASSOCIATION);
        if (sa)
        {
                proposals = sa->get_proposals(sa);
@@ -116,13 +116,13 @@ static void process_auth_request(private_pretend_auth_t *this,
                proposals->destroy_offset(proposals, offsetof(proposal_t, destroy));
        }
        tsi = (ts_payload_t*)message->get_payload(message,
-                                                                                         TRAFFIC_SELECTOR_INITIATOR);
+                                                                                         PLV2_TS_INITIATOR);
        if (tsi)
        {
                this->tsi = tsi->get_traffic_selectors(tsi);
        }
        tsr = (ts_payload_t*)message->get_payload(message,
-                                                                                         TRAFFIC_SELECTOR_RESPONDER);
+                                                                                         PLV2_TS_RESPONDER);
        if (tsr)
        {
                this->tsr = tsr->get_traffic_selectors(tsr);
@@ -154,7 +154,7 @@ static void build_certs(private_pretend_auth_t *this,
        cert = auth->get(auth, AUTH_RULE_SUBJECT_CERT);
        if (cert)
        {
-               payload = cert_payload_create_from_cert(CERTIFICATE, cert);
+               payload = cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
                if (payload)
                {
                        DBG1(DBG_IKE, "pretending end entity cert \"%Y\"",
@@ -167,7 +167,7 @@ static void build_certs(private_pretend_auth_t *this,
        {
                if (type == AUTH_RULE_IM_CERT)
                {
-                       payload = cert_payload_create_from_cert(CERTIFICATE, cert);
+                       payload = cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
                        if (payload)
                        {
                                DBG1(DBG_IKE, "pretending issuer cert \"%Y\"",
@@ -276,7 +276,7 @@ static void process_auth_response(private_pretend_auth_t *this,
        {
                notify_payload_t *notify = (notify_payload_t*)payload;
 
-               if (payload->get_type(payload) != NOTIFY ||
+               if (payload->get_type(payload) != PLV2_NOTIFY ||
                        notify->get_notify_type(notify) != AUTHENTICATION_FAILED)
                {
                        DBG1(DBG_CFG, "no %N notify found, disabling AUTH pretending",
@@ -295,7 +295,7 @@ static void process_auth_response(private_pretend_auth_t *this,
                return;
        }
        message->add_payload(message, (payload_t*)
-                               id_payload_create_from_identification(ID_RESPONDER, this->id));
+                               id_payload_create_from_identification(PLV2_ID_RESPONDER, this->id));
        if (this->proposal)
        {
                message->add_payload(message, (payload_t*)
index b7e6f22e7fc308ef109980e1784672c6f1d23ec8..bc2f000713c4a0cfbf9d0a649e82f4d342d95290 100644 (file)
@@ -70,7 +70,7 @@ static bool rebuild_auth(private_rebuild_auth_t *this, ike_sa_t *ike_sa,
        u_int32_t *lenpos;
 
        payload = message->get_payload(message,
-                                       message->get_request(message) ? ID_INITIATOR : ID_RESPONDER);
+                                       message->get_request(message) ? PLV2_ID_INITIATOR : PLV2_ID_RESPONDER);
        if (!payload)
        {
                DBG1(DBG_CFG, "ID payload not found to rebuild AUTH");
@@ -160,7 +160,7 @@ static bool rebuild_auth(private_rebuild_auth_t *this, ike_sa_t *ike_sa,
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == AUTHENTICATION)
+               if (payload->get_type(payload) == PLV2_AUTH)
                {
                        message->remove_payload_at(message, enumerator);
                        payload->destroy(payload);
@@ -191,7 +191,7 @@ METHOD(listener_t, message, bool,
                        {
                                nonce_payload_t *nonce;
 
-                               nonce = (nonce_payload_t*)message->get_payload(message, NONCE);
+                               nonce = (nonce_payload_t*)message->get_payload(message, PLV2_NONCE);
                                if (nonce)
                                {
                                        free(this->nonce.ptr);
index 0cc3cfc634befb1b97d9b701bb48ec01a8da90d4..4e572d6087e5d2ee28fdd2981cf2ac01f0dcb564 100644 (file)
@@ -85,7 +85,7 @@ METHOD(listener_t, message, bool,
                enumerator = message->create_payload_enumerator(message);
                while (enumerator->enumerate(enumerator, &payload))
                {
-                       if (payload->get_type(payload) == SECURITY_ASSOCIATION)
+                       if (payload->get_type(payload) == PLV2_SECURITY_ASSOCIATION)
                        {
                                sa = (sa_payload_t*)payload;
                                list = sa->get_proposals(sa);
index 5961aebc43c62ac52c3eac802d6829cd9494443d..488e8df1ca4aea8f3f33cfc1da3086d638d8d1ac 100644 (file)
@@ -55,7 +55,7 @@ static void set_bit(private_set_reserved_t *this, message_t *message,
        payload_t *payload;
        bool *bit;
 
-       if (type == HEADER)
+       if (type == PL_HEADER)
        {
                message->set_reserved_header_bit(message, nr);
                DBG1(DBG_CFG, "setting reserved bit %d of %N",
@@ -91,7 +91,7 @@ static void set_byte(private_set_reserved_t *this, message_t *message,
        payload_t *payload;
        u_int8_t *byte;
 
-       if (type == TRANSFORM_SUBSTRUCTURE || type == PROPOSAL_SUBSTRUCTURE)
+       if (type == PLV2_TRANSFORM_SUBSTRUCTURE || type == PLV2_PROPOSAL_SUBSTRUCTURE)
        {
                enumerator_t *transforms, *proposals;
                transform_substructure_t *transform;
@@ -101,13 +101,13 @@ static void set_byte(private_set_reserved_t *this, message_t *message,
                payloads = message->create_payload_enumerator(message);
                while (payloads->enumerate(payloads, &payload))
                {
-                       if (payload->get_type(payload) == SECURITY_ASSOCIATION)
+                       if (payload->get_type(payload) == PLV2_SECURITY_ASSOCIATION)
                        {
                                sa = (sa_payload_t*)payload;
                                proposals = sa->create_substructure_enumerator(sa);
                                while (proposals->enumerate(proposals, &proposal))
                                {
-                                       if (type == PROPOSAL_SUBSTRUCTURE)
+                                       if (type == PLV2_PROPOSAL_SUBSTRUCTURE)
                                        {
                                                byte = payload_get_field(&proposal->payload_interface,
                                                                                                 RESERVED_BYTE, nr);
@@ -118,7 +118,7 @@ static void set_byte(private_set_reserved_t *this, message_t *message,
                                                        *byte = byteval;
                                                }
                                        }
-                                       else if (type == TRANSFORM_SUBSTRUCTURE)
+                                       else if (type == PLV2_TRANSFORM_SUBSTRUCTURE)
                                        {
                                                transforms = proposal->create_substructure_enumerator(
                                                                                                                                        proposal);
index dae76faba86efc4b9fbb92419668b9307990a2e5..2a7498527e482908484c0fc15e1e94c4b8695d3a 100644 (file)
@@ -83,7 +83,7 @@ METHOD(listener_t, ike_updown, bool,
                {
                        data = chunk_clone(chunk_create(this->data, strlen(this->data)));
                }
-               notify = notify_payload_create_from_protocol_and_type(NOTIFY,
+               notify = notify_payload_create_from_protocol_and_type(PLV2_NOTIFY,
                                                                        this->esp ? PROTO_ESP : PROTO_IKE, type);
                notify->set_spi(notify, this->spi);
                if (data.len)
index 2b6825c71200930f5479403ac77c4e76143a262a..d4ca5b5846a63cd9d59aabe4d89ae70bba0886cd 100644 (file)
@@ -498,15 +498,15 @@ METHOD(generator_t, generate_payload, void,
                        case ENCRYPTED_DATA:
                                generate_from_chunk(this, rules[i].offset);
                                break;
-                       case PAYLOAD_LIST + PROPOSAL_SUBSTRUCTURE:
-                       case PAYLOAD_LIST + PROPOSAL_SUBSTRUCTURE_V1:
-                       case PAYLOAD_LIST + TRANSFORM_SUBSTRUCTURE:
-                       case PAYLOAD_LIST + TRANSFORM_SUBSTRUCTURE_V1:
-                       case PAYLOAD_LIST + TRANSFORM_ATTRIBUTE:
-                       case PAYLOAD_LIST + TRANSFORM_ATTRIBUTE_V1:
-                       case PAYLOAD_LIST + CONFIGURATION_ATTRIBUTE:
-                       case PAYLOAD_LIST + CONFIGURATION_ATTRIBUTE_V1:
-                       case PAYLOAD_LIST + TRAFFIC_SELECTOR_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV2_PROPOSAL_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV1_PROPOSAL_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV2_TRANSFORM_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV1_TRANSFORM_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV2_TRANSFORM_ATTRIBUTE:
+                       case PAYLOAD_LIST + PLV1_TRANSFORM_ATTRIBUTE:
+                       case PAYLOAD_LIST + PLV2_CONFIGURATION_ATTRIBUTE:
+                       case PAYLOAD_LIST + PLV1_CONFIGURATION_ATTRIBUTE:
+                       case PAYLOAD_LIST + PLV2_TRAFFIC_SELECTOR_SUBSTRUCTURE:
                        {
                                linked_list_t *proposals;
                                enumerator_t *enumerator;
index 3a1014ef0c207edad174b955c6b81dc65553eb59..0f5f40ada1caaafd6a891b094925d3c408fe2b69 100644 (file)
@@ -89,7 +89,7 @@ typedef struct {
 typedef struct {
        /** payload type */
        payload_type_t type;
-       /** notify type, if payload == NOTIFY */
+       /** notify type, if payload == PLV2_NOTIFY */
        notify_type_t notify;
 } payload_order_t;
 
@@ -120,11 +120,11 @@ typedef struct {
  */
 static payload_rule_t ike_sa_init_i_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
-       {SECURITY_ASSOCIATION,                  1,      1,                                              FALSE,  FALSE},
-       {KEY_EXCHANGE,                                  1,      1,                                              FALSE,  FALSE},
-       {NONCE,                                                 1,      1,                                              FALSE,  FALSE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
+       {PLV2_SECURITY_ASSOCIATION,             1,      1,                                              FALSE,  FALSE},
+       {PLV2_KEY_EXCHANGE,                             1,      1,                                              FALSE,  FALSE},
+       {PLV2_NONCE,                                    1,      1,                                              FALSE,  FALSE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
 };
 
 /**
@@ -132,14 +132,14 @@ static payload_rule_t ike_sa_init_i_rules[] = {
  */
 static payload_order_t ike_sa_init_i_order[] = {
 /*     payload type                                    notify type */
-       {NOTIFY,                                                COOKIE},
-       {SECURITY_ASSOCIATION,                  0},
-       {KEY_EXCHANGE,                                  0},
-       {NONCE,                                                 0},
-       {NOTIFY,                                                NAT_DETECTION_SOURCE_IP},
-       {NOTIFY,                                                NAT_DETECTION_DESTINATION_IP},
-       {NOTIFY,                                                0},
-       {VENDOR_ID,                                             0},
+       {PLV2_NOTIFY,                                   COOKIE},
+       {PLV2_SECURITY_ASSOCIATION,             0},
+       {PLV2_KEY_EXCHANGE,                             0},
+       {PLV2_NONCE,                                    0},
+       {PLV2_NOTIFY,                                   NAT_DETECTION_SOURCE_IP},
+       {PLV2_NOTIFY,                                   NAT_DETECTION_DESTINATION_IP},
+       {PLV2_NOTIFY,                                   0},
+       {PLV2_VENDOR_ID,                                0},
 };
 
 /**
@@ -147,12 +147,12 @@ static payload_order_t ike_sa_init_i_order[] = {
  */
 static payload_rule_t ike_sa_init_r_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    FALSE,  TRUE},
-       {SECURITY_ASSOCIATION,                  1,      1,                                              FALSE,  FALSE},
-       {KEY_EXCHANGE,                                  1,      1,                                              FALSE,  FALSE},
-       {NONCE,                                                 1,      1,                                              FALSE,  FALSE},
-       {CERTIFICATE_REQUEST,                   0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    FALSE,  TRUE},
+       {PLV2_SECURITY_ASSOCIATION,             1,      1,                                              FALSE,  FALSE},
+       {PLV2_KEY_EXCHANGE,                             1,      1,                                              FALSE,  FALSE},
+       {PLV2_NONCE,                                    1,      1,                                              FALSE,  FALSE},
+       {PLV2_CERTREQ,                                  0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
 };
 
 /**
@@ -160,15 +160,15 @@ static payload_rule_t ike_sa_init_r_rules[] = {
  */
 static payload_order_t ike_sa_init_r_order[] = {
 /*     payload type                                    notify type */
-       {SECURITY_ASSOCIATION,                  0},
-       {KEY_EXCHANGE,                                  0},
-       {NONCE,                                                 0},
-       {NOTIFY,                                                NAT_DETECTION_SOURCE_IP},
-       {NOTIFY,                                                NAT_DETECTION_DESTINATION_IP},
-       {NOTIFY,                                                HTTP_CERT_LOOKUP_SUPPORTED},
-       {CERTIFICATE_REQUEST,                   0},
-       {NOTIFY,                                                0},
-       {VENDOR_ID,                                             0},
+       {PLV2_SECURITY_ASSOCIATION,             0},
+       {PLV2_KEY_EXCHANGE,                             0},
+       {PLV2_NONCE,                                    0},
+       {PLV2_NOTIFY,                                   NAT_DETECTION_SOURCE_IP},
+       {PLV2_NOTIFY,                                   NAT_DETECTION_DESTINATION_IP},
+       {PLV2_NOTIFY,                                   HTTP_CERT_LOOKUP_SUPPORTED},
+       {PLV2_CERTREQ,                                  0},
+       {PLV2_NOTIFY,                                   0},
+       {PLV2_VENDOR_ID,                                0},
 };
 
 /**
@@ -176,24 +176,24 @@ static payload_order_t ike_sa_init_r_order[] = {
  */
 static payload_rule_t ike_auth_i_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
-       {EXTENSIBLE_AUTHENTICATION,             0,      1,                                              TRUE,   TRUE},
-       {AUTHENTICATION,                                0,      1,                                              TRUE,   TRUE},
-       {ID_INITIATOR,                                  0,      1,                                              TRUE,   FALSE},
-       {CERTIFICATE,                                   0,      MAX_CERT_PAYLOADS,              TRUE,   FALSE},
-       {CERTIFICATE_REQUEST,                   0,      MAX_CERTREQ_PAYLOADS,   TRUE,   FALSE},
-       {ID_RESPONDER,                                  0,      1,                                              TRUE,   FALSE},
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
+       {PLV2_EAP,                                              0,      1,                                              TRUE,   TRUE},
+       {PLV2_AUTH,                                             0,      1,                                              TRUE,   TRUE},
+       {PLV2_ID_INITIATOR,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_CERTIFICATE,                              0,      MAX_CERT_PAYLOADS,              TRUE,   FALSE},
+       {PLV2_CERTREQ,                                  0,      MAX_CERTREQ_PAYLOADS,   TRUE,   FALSE},
+       {PLV2_ID_RESPONDER,                             0,      1,                                              TRUE,   FALSE},
 #ifdef ME
-       {SECURITY_ASSOCIATION,                  0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_INITIATOR,    0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_RESPONDER,    0,      1,                                              TRUE,   FALSE},
+       {PLV2_SECURITY_ASSOCIATION,             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_INITIATOR,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_RESPONDER,                             0,      1,                                              TRUE,   FALSE},
 #else
-       {SECURITY_ASSOCIATION,                  0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_INITIATOR,    0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_RESPONDER,    0,      1,                                              TRUE,   FALSE},
+       {PLV2_SECURITY_ASSOCIATION,             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_INITIATOR,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_RESPONDER,                             0,      1,                                              TRUE,   FALSE},
 #endif /* ME */
-       {CONFIGURATION,                                 0,      1,                                              TRUE,   FALSE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+       {PLV2_CONFIGURATION,                    0,      1,                                              TRUE,   FALSE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
 };
 
 /**
@@ -201,28 +201,28 @@ static payload_rule_t ike_auth_i_rules[] = {
  */
 static payload_order_t ike_auth_i_order[] = {
 /*     payload type                                    notify type */
-       {ID_INITIATOR,                                  0},
-       {CERTIFICATE,                                   0},
-       {NOTIFY,                                                INITIAL_CONTACT},
-       {NOTIFY,                                                HTTP_CERT_LOOKUP_SUPPORTED},
-       {CERTIFICATE_REQUEST,                   0},
-       {ID_RESPONDER,                                  0},
-       {AUTHENTICATION,                                0},
-       {EXTENSIBLE_AUTHENTICATION,             0},
-       {CONFIGURATION,                                 0},
-       {NOTIFY,                                                IPCOMP_SUPPORTED},
-       {NOTIFY,                                                USE_TRANSPORT_MODE},
-       {NOTIFY,                                                ESP_TFC_PADDING_NOT_SUPPORTED},
-       {NOTIFY,                                                NON_FIRST_FRAGMENTS_ALSO},
-       {SECURITY_ASSOCIATION,                  0},
-       {TRAFFIC_SELECTOR_INITIATOR,    0},
-       {TRAFFIC_SELECTOR_RESPONDER,    0},
-       {NOTIFY,                                                MOBIKE_SUPPORTED},
-       {NOTIFY,                                                ADDITIONAL_IP4_ADDRESS},
-       {NOTIFY,                                                ADDITIONAL_IP6_ADDRESS},
-       {NOTIFY,                                                NO_ADDITIONAL_ADDRESSES},
-       {NOTIFY,                                                0},
-       {VENDOR_ID,                                             0},
+       {PLV2_ID_INITIATOR,                             0},
+       {PLV2_CERTIFICATE,                              0},
+       {PLV2_NOTIFY,                                   INITIAL_CONTACT},
+       {PLV2_NOTIFY,                                   HTTP_CERT_LOOKUP_SUPPORTED},
+       {PLV2_CERTREQ,                                  0},
+       {PLV2_ID_RESPONDER,                             0},
+       {PLV2_AUTH,                                             0},
+       {PLV2_EAP,                                              0},
+       {PLV2_CONFIGURATION,                    0},
+       {PLV2_NOTIFY,                                   IPCOMP_SUPPORTED},
+       {PLV2_NOTIFY,                                   USE_TRANSPORT_MODE},
+       {PLV2_NOTIFY,                                   ESP_TFC_PADDING_NOT_SUPPORTED},
+       {PLV2_NOTIFY,                                   NON_FIRST_FRAGMENTS_ALSO},
+       {PLV2_SECURITY_ASSOCIATION,             0},
+       {PLV2_TS_INITIATOR,                             0},
+       {PLV2_TS_RESPONDER,                             0},
+       {PLV2_NOTIFY,                                   MOBIKE_SUPPORTED},
+       {PLV2_NOTIFY,                                   ADDITIONAL_IP4_ADDRESS},
+       {PLV2_NOTIFY,                                   ADDITIONAL_IP6_ADDRESS},
+       {PLV2_NOTIFY,                                   NO_ADDITIONAL_ADDRESSES},
+       {PLV2_NOTIFY,                                   0},
+       {PLV2_VENDOR_ID,                                0},
 };
 
 /**
@@ -230,16 +230,16 @@ static payload_order_t ike_auth_i_order[] = {
  */
 static payload_rule_t ike_auth_r_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    TRUE,   TRUE},
-       {EXTENSIBLE_AUTHENTICATION,             0,      1,                                              TRUE,   TRUE},
-       {AUTHENTICATION,                                0,      1,                                              TRUE,   TRUE},
-       {CERTIFICATE,                                   0,      MAX_CERT_PAYLOADS,              TRUE,   FALSE},
-       {ID_RESPONDER,                                  0,      1,                                              TRUE,   FALSE},
-       {SECURITY_ASSOCIATION,                  0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_INITIATOR,    0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_RESPONDER,    0,      1,                                              TRUE,   FALSE},
-       {CONFIGURATION,                                 0,      1,                                              TRUE,   FALSE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   TRUE},
+       {PLV2_EAP,                                              0,      1,                                              TRUE,   TRUE},
+       {PLV2_AUTH,                                             0,      1,                                              TRUE,   TRUE},
+       {PLV2_CERTIFICATE,                              0,      MAX_CERT_PAYLOADS,              TRUE,   FALSE},
+       {PLV2_ID_RESPONDER,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_SECURITY_ASSOCIATION,             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_INITIATOR,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_RESPONDER,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_CONFIGURATION,                    0,      1,                                              TRUE,   FALSE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
 };
 
 /**
@@ -247,25 +247,25 @@ static payload_rule_t ike_auth_r_rules[] = {
  */
 static payload_order_t ike_auth_r_order[] = {
 /*     payload type                                    notify type */
-       {ID_RESPONDER,                                  0},
-       {CERTIFICATE,                                   0},
-       {AUTHENTICATION,                                0},
-       {EXTENSIBLE_AUTHENTICATION,             0},
-       {CONFIGURATION,                                 0},
-       {NOTIFY,                                                IPCOMP_SUPPORTED},
-       {NOTIFY,                                                USE_TRANSPORT_MODE},
-       {NOTIFY,                                                ESP_TFC_PADDING_NOT_SUPPORTED},
-       {NOTIFY,                                                NON_FIRST_FRAGMENTS_ALSO},
-       {SECURITY_ASSOCIATION,                  0},
-       {TRAFFIC_SELECTOR_INITIATOR,    0},
-       {TRAFFIC_SELECTOR_RESPONDER,    0},
-       {NOTIFY,                                                AUTH_LIFETIME},
-       {NOTIFY,                                                MOBIKE_SUPPORTED},
-       {NOTIFY,                                                ADDITIONAL_IP4_ADDRESS},
-       {NOTIFY,                                                ADDITIONAL_IP6_ADDRESS},
-       {NOTIFY,                                                NO_ADDITIONAL_ADDRESSES},
-       {NOTIFY,                                                0},
-       {VENDOR_ID,                                             0},
+       {PLV2_ID_RESPONDER,                             0},
+       {PLV2_CERTIFICATE,                              0},
+       {PLV2_AUTH,                                             0},
+       {PLV2_EAP,                                              0},
+       {PLV2_CONFIGURATION,                    0},
+       {PLV2_NOTIFY,                                   IPCOMP_SUPPORTED},
+       {PLV2_NOTIFY,                                   USE_TRANSPORT_MODE},
+       {PLV2_NOTIFY,                                   ESP_TFC_PADDING_NOT_SUPPORTED},
+       {PLV2_NOTIFY,                                   NON_FIRST_FRAGMENTS_ALSO},
+       {PLV2_SECURITY_ASSOCIATION,             0},
+       {PLV2_TS_INITIATOR,                             0},
+       {PLV2_TS_RESPONDER,                             0},
+       {PLV2_NOTIFY,                                   AUTH_LIFETIME},
+       {PLV2_NOTIFY,                                   MOBIKE_SUPPORTED},
+       {PLV2_NOTIFY,                                   ADDITIONAL_IP4_ADDRESS},
+       {PLV2_NOTIFY,                                   ADDITIONAL_IP6_ADDRESS},
+       {PLV2_NOTIFY,                                   NO_ADDITIONAL_ADDRESSES},
+       {PLV2_NOTIFY,                                   0},
+       {PLV2_VENDOR_ID,                                0},
 };
 
 /**
@@ -273,10 +273,10 @@ static payload_order_t ike_auth_r_order[] = {
  */
 static payload_rule_t informational_i_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
-       {CONFIGURATION,                                 0,      1,                                              TRUE,   FALSE},
-       {DELETE,                                                0,      MAX_DELETE_PAYLOADS,    TRUE,   FALSE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
+       {PLV2_CONFIGURATION,                    0,      1,                                              TRUE,   FALSE},
+       {PLV2_DELETE,                                   0,      MAX_DELETE_PAYLOADS,    TRUE,   FALSE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
 };
 
 /**
@@ -284,13 +284,13 @@ static payload_rule_t informational_i_rules[] = {
  */
 static payload_order_t informational_i_order[] = {
 /*     payload type                                    notify type */
-       {NOTIFY,                                                UPDATE_SA_ADDRESSES},
-       {NOTIFY,                                                NAT_DETECTION_SOURCE_IP},
-       {NOTIFY,                                                NAT_DETECTION_DESTINATION_IP},
-       {NOTIFY,                                                COOKIE2},
-       {NOTIFY,                                                0},
-       {DELETE,                                                0},
-       {CONFIGURATION,                                 0},
+       {PLV2_NOTIFY,                                   UPDATE_SA_ADDRESSES},
+       {PLV2_NOTIFY,                                   NAT_DETECTION_SOURCE_IP},
+       {PLV2_NOTIFY,                                   NAT_DETECTION_DESTINATION_IP},
+       {PLV2_NOTIFY,                                   COOKIE2},
+       {PLV2_NOTIFY,                                   0},
+       {PLV2_DELETE,                                   0},
+       {PLV2_CONFIGURATION,                    0},
 };
 
 /**
@@ -298,10 +298,10 @@ static payload_order_t informational_i_order[] = {
  */
 static payload_rule_t informational_r_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
-       {CONFIGURATION,                                 0,      1,                                              TRUE,   FALSE},
-       {DELETE,                                                0,      MAX_DELETE_PAYLOADS,    TRUE,   FALSE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
+       {PLV2_CONFIGURATION,                    0,      1,                                              TRUE,   FALSE},
+       {PLV2_DELETE,                                   0,      MAX_DELETE_PAYLOADS,    TRUE,   FALSE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
 };
 
 /**
@@ -309,13 +309,13 @@ static payload_rule_t informational_r_rules[] = {
  */
 static payload_order_t informational_r_order[] = {
 /*     payload type                                    notify type */
-       {NOTIFY,                                                UPDATE_SA_ADDRESSES},
-       {NOTIFY,                                                NAT_DETECTION_SOURCE_IP},
-       {NOTIFY,                                                NAT_DETECTION_DESTINATION_IP},
-       {NOTIFY,                                                COOKIE2},
-       {NOTIFY,                                                0},
-       {DELETE,                                                0},
-       {CONFIGURATION,                                 0},
+       {PLV2_NOTIFY,                                   UPDATE_SA_ADDRESSES},
+       {PLV2_NOTIFY,                                   NAT_DETECTION_SOURCE_IP},
+       {PLV2_NOTIFY,                                   NAT_DETECTION_DESTINATION_IP},
+       {PLV2_NOTIFY,                                   COOKIE2},
+       {PLV2_NOTIFY,                                   0},
+       {PLV2_DELETE,                                   0},
+       {PLV2_CONFIGURATION,                    0},
 };
 
 /**
@@ -323,14 +323,14 @@ static payload_order_t informational_r_order[] = {
  */
 static payload_rule_t create_child_sa_i_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
-       {SECURITY_ASSOCIATION,                  1,      1,                                              TRUE,   FALSE},
-       {NONCE,                                                 1,      1,                                              TRUE,   FALSE},
-       {KEY_EXCHANGE,                                  0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_INITIATOR,    0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_RESPONDER,    0,      1,                                              TRUE,   FALSE},
-       {CONFIGURATION,                                 0,      1,                                              TRUE,   FALSE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
+       {PLV2_SECURITY_ASSOCIATION,             1,      1,                                              TRUE,   FALSE},
+       {PLV2_NONCE,                                    1,      1,                                              TRUE,   FALSE},
+       {PLV2_KEY_EXCHANGE,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_INITIATOR,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_RESPONDER,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_CONFIGURATION,                    0,      1,                                              TRUE,   FALSE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
 };
 
 /**
@@ -338,17 +338,17 @@ static payload_rule_t create_child_sa_i_rules[] = {
  */
 static payload_order_t create_child_sa_i_order[] = {
 /*     payload type                                    notify type */
-       {NOTIFY,                                                REKEY_SA},
-       {NOTIFY,                                                IPCOMP_SUPPORTED},
-       {NOTIFY,                                                USE_TRANSPORT_MODE},
-       {NOTIFY,                                                ESP_TFC_PADDING_NOT_SUPPORTED},
-       {NOTIFY,                                                NON_FIRST_FRAGMENTS_ALSO},
-       {SECURITY_ASSOCIATION,                  0},
-       {NONCE,                                                 0},
-       {KEY_EXCHANGE,                                  0},
-       {TRAFFIC_SELECTOR_INITIATOR,    0},
-       {TRAFFIC_SELECTOR_RESPONDER,    0},
-       {NOTIFY,                                                0},
+       {PLV2_NOTIFY,                                   REKEY_SA},
+       {PLV2_NOTIFY,                                   IPCOMP_SUPPORTED},
+       {PLV2_NOTIFY,                                   USE_TRANSPORT_MODE},
+       {PLV2_NOTIFY,                                   ESP_TFC_PADDING_NOT_SUPPORTED},
+       {PLV2_NOTIFY,                                   NON_FIRST_FRAGMENTS_ALSO},
+       {PLV2_SECURITY_ASSOCIATION,             0},
+       {PLV2_NONCE,                                    0},
+       {PLV2_KEY_EXCHANGE,                             0},
+       {PLV2_TS_INITIATOR,                             0},
+       {PLV2_TS_RESPONDER,                             0},
+       {PLV2_NOTIFY,                                   0},
 };
 
 /**
@@ -356,14 +356,14 @@ static payload_order_t create_child_sa_i_order[] = {
  */
 static payload_rule_t create_child_sa_r_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    TRUE,   TRUE},
-       {SECURITY_ASSOCIATION,                  1,      1,                                              TRUE,   FALSE},
-       {NONCE,                                                 1,      1,                                              TRUE,   FALSE},
-       {KEY_EXCHANGE,                                  0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_INITIATOR,    0,      1,                                              TRUE,   FALSE},
-       {TRAFFIC_SELECTOR_RESPONDER,    0,      1,                                              TRUE,   FALSE},
-       {CONFIGURATION,                                 0,      1,                                              TRUE,   FALSE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   TRUE},
+       {PLV2_SECURITY_ASSOCIATION,             1,      1,                                              TRUE,   FALSE},
+       {PLV2_NONCE,                                    1,      1,                                              TRUE,   FALSE},
+       {PLV2_KEY_EXCHANGE,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_INITIATOR,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_TS_RESPONDER,                             0,      1,                                              TRUE,   FALSE},
+       {PLV2_CONFIGURATION,                    0,      1,                                              TRUE,   FALSE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
 };
 
 /**
@@ -371,17 +371,17 @@ static payload_rule_t create_child_sa_r_rules[] = {
  */
 static payload_order_t create_child_sa_r_order[] = {
 /*     payload type                                    notify type */
-       {NOTIFY,                                                IPCOMP_SUPPORTED},
-       {NOTIFY,                                                USE_TRANSPORT_MODE},
-       {NOTIFY,                                                ESP_TFC_PADDING_NOT_SUPPORTED},
-       {NOTIFY,                                                NON_FIRST_FRAGMENTS_ALSO},
-       {SECURITY_ASSOCIATION,                  0},
-       {NONCE,                                                 0},
-       {KEY_EXCHANGE,                                  0},
-       {TRAFFIC_SELECTOR_INITIATOR,    0},
-       {TRAFFIC_SELECTOR_RESPONDER,    0},
-       {NOTIFY,                                                ADDITIONAL_TS_POSSIBLE},
-       {NOTIFY,                                                0},
+       {PLV2_NOTIFY,                                   IPCOMP_SUPPORTED},
+       {PLV2_NOTIFY,                                   USE_TRANSPORT_MODE},
+       {PLV2_NOTIFY,                                   ESP_TFC_PADDING_NOT_SUPPORTED},
+       {PLV2_NOTIFY,                                   NON_FIRST_FRAGMENTS_ALSO},
+       {PLV2_SECURITY_ASSOCIATION,             0},
+       {PLV2_NONCE,                                    0},
+       {PLV2_KEY_EXCHANGE,                             0},
+       {PLV2_TS_INITIATOR,                             0},
+       {PLV2_TS_RESPONDER,                             0},
+       {PLV2_NOTIFY,                                   ADDITIONAL_TS_POSSIBLE},
+       {PLV2_NOTIFY,                                   0},
 };
 
 #ifdef ME
@@ -390,9 +390,9 @@ static payload_order_t create_child_sa_r_order[] = {
  */
 static payload_rule_t me_connect_i_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    TRUE,   TRUE},
-       {ID_PEER,                                               1,      1,                                              TRUE,   FALSE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               TRUE,   FALSE}
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   TRUE},
+       {PLV2_ID_PEER,                                  1,      1,                                              TRUE,   FALSE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE}
 };
 
 /**
@@ -400,9 +400,9 @@ static payload_rule_t me_connect_i_rules[] = {
  */
 static payload_order_t me_connect_i_order[] = {
 /*     payload type                                    notify type */
-       {NOTIFY,                                                0},
-       {ID_PEER,                                               0},
-       {VENDOR_ID,                                             0},
+       {PLV2_NOTIFY,                                   0},
+       {PLV2_ID_PEER,                                  0},
+       {PLV2_VENDOR_ID,                                0},
 };
 
 /**
@@ -410,8 +410,8 @@ static payload_order_t me_connect_i_order[] = {
  */
 static payload_rule_t me_connect_r_rules[] = {
 /*     payload type                                    min     max                                             encr    suff */
-       {NOTIFY,                                                0,      MAX_NOTIFY_PAYLOADS,    TRUE,   TRUE},
-       {VENDOR_ID,                                             0,      MAX_VID_PAYLOADS,               TRUE,   FALSE}
+       {PLV2_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   TRUE},
+       {PLV2_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE}
 };
 
 /**
@@ -419,8 +419,8 @@ static payload_rule_t me_connect_r_rules[] = {
  */
 static payload_order_t me_connect_r_order[] = {
 /*     payload type                                    notify type */
-       {NOTIFY,                                                0},
-       {VENDOR_ID,                                             0},
+       {PLV2_NOTIFY,                                   0},
+       {PLV2_VENDOR_ID,                                0},
 };
 #endif /* ME */
 
@@ -429,284 +429,284 @@ static payload_order_t me_connect_r_order[] = {
  * Message rule for ID_PROT from initiator.
  */
 static payload_rule_t id_prot_i_rules[] = {
-/*     payload type                            min     max                                             encr    suff */
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
-       {SECURITY_ASSOCIATION_V1,       0,      1,                                              FALSE,  FALSE},
-       {KEY_EXCHANGE_V1,                       0,      1,                                              FALSE,  FALSE},
-       {NONCE_V1,                                      0,      1,                                              FALSE,  FALSE},
-       {VENDOR_ID_V1,                          0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
-       {CERTIFICATE_REQUEST_V1,        0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
-       {NAT_D_V1,                                      0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
-       {NAT_D_DRAFT_00_03_V1,          0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
-       {ID_V1,                                         0,      1,                                              TRUE,   FALSE},
-       {CERTIFICATE_V1,                        0,      MAX_CERT_PAYLOADS,              TRUE,   FALSE},
-       {SIGNATURE_V1,                          0,      1,                                              TRUE,   FALSE},
-       {HASH_V1,                                       0,      1,                                              TRUE,   FALSE},
-       {FRAGMENT_V1,                           0,      1,                                              FALSE,  TRUE},
+/*     payload type                                    min     max                                             encr    suff */
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
+       {PLV1_SECURITY_ASSOCIATION,             0,      1,                                              FALSE,  FALSE},
+       {PLV1_KEY_EXCHANGE,                             0,      1,                                              FALSE,  FALSE},
+       {PLV1_NONCE,                                    0,      1,                                              FALSE,  FALSE},
+       {PLV1_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
+       {PLV1_CERTREQ,                                  0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
+       {PLV1_NAT_D,                                    0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
+       {PLV1_NAT_D_DRAFT_00_03,                0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
+       {PLV1_ID,                                               0,      1,                                              TRUE,   FALSE},
+       {PLV1_CERTIFICATE,                              0,      MAX_CERT_PAYLOADS,              TRUE,   FALSE},
+       {PLV1_SIGNATURE,                                0,      1,                                              TRUE,   FALSE},
+       {PLV1_HASH,                                             0,      1,                                              TRUE,   FALSE},
+       {PLV1_FRAGMENT,                                 0,      1,                                              FALSE,  TRUE},
 };
 
 /**
  * payload order for ID_PROT from initiator.
  */
 static payload_order_t id_prot_i_order[] = {
-/*     payload type                            notify type */
-       {SECURITY_ASSOCIATION_V1,       0},
-       {KEY_EXCHANGE_V1,                       0},
-       {NONCE_V1,                                      0},
-       {ID_V1,                                         0},
-       {CERTIFICATE_V1,                        0},
-       {SIGNATURE_V1,                          0},
-       {HASH_V1,                                       0},
-       {CERTIFICATE_REQUEST_V1,        0},
-       {NOTIFY_V1,                                     0},
-       {VENDOR_ID_V1,                          0},
-       {NAT_D_V1,                                      0},
-       {NAT_D_DRAFT_00_03_V1,          0},
-       {FRAGMENT_V1,                           0},
+/*     payload type                                    notify type */
+       {PLV1_SECURITY_ASSOCIATION,             0},
+       {PLV1_KEY_EXCHANGE,                             0},
+       {PLV1_NONCE,                                    0},
+       {PLV1_ID,                                               0},
+       {PLV1_CERTIFICATE,                              0},
+       {PLV1_SIGNATURE,                                0},
+       {PLV1_HASH,                                             0},
+       {PLV1_CERTREQ,                                  0},
+       {PLV1_NOTIFY,                                   0},
+       {PLV1_VENDOR_ID,                                0},
+       {PLV1_NAT_D,                                    0},
+       {PLV1_NAT_D_DRAFT_00_03,                0},
+       {PLV1_FRAGMENT,                                 0},
 };
 
 /**
  * Message rule for ID_PROT from responder.
  */
 static payload_rule_t id_prot_r_rules[] = {
-/*     payload type                            min     max                                             encr    suff */
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
-       {SECURITY_ASSOCIATION_V1,       0,      1,                                              FALSE,  FALSE},
-       {KEY_EXCHANGE_V1,                       0,      1,                                              FALSE,  FALSE},
-       {NONCE_V1,                                      0,      1,                                              FALSE,  FALSE},
-       {VENDOR_ID_V1,                          0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
-       {CERTIFICATE_REQUEST_V1,        0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
-       {NAT_D_V1,                                      0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
-       {NAT_D_DRAFT_00_03_V1,          0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
-       {ID_V1,                                         0,      1,                                              TRUE,   FALSE},
-       {CERTIFICATE_V1,                        0,      MAX_CERT_PAYLOADS,              TRUE,   FALSE},
-       {SIGNATURE_V1,                          0,      1,                                              TRUE,   FALSE},
-       {HASH_V1,                                       0,      1,                                              TRUE,   FALSE},
-       {FRAGMENT_V1,                           0,      1,                                              FALSE,  TRUE},
+/*     payload type                                    min     max                                             encr    suff */
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
+       {PLV1_SECURITY_ASSOCIATION,             0,      1,                                              FALSE,  FALSE},
+       {PLV1_KEY_EXCHANGE,                             0,      1,                                              FALSE,  FALSE},
+       {PLV1_NONCE,                                    0,      1,                                              FALSE,  FALSE},
+       {PLV1_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
+       {PLV1_CERTREQ,                                  0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
+       {PLV1_NAT_D,                                    0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
+       {PLV1_NAT_D_DRAFT_00_03,                0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
+       {PLV1_ID,                                               0,      1,                                              TRUE,   FALSE},
+       {PLV1_CERTIFICATE,                              0,      MAX_CERT_PAYLOADS,              TRUE,   FALSE},
+       {PLV1_SIGNATURE,                                0,      1,                                              TRUE,   FALSE},
+       {PLV1_HASH,                                             0,      1,                                              TRUE,   FALSE},
+       {PLV1_FRAGMENT,                                 0,      1,                                              FALSE,  TRUE},
 };
 
 /**
  * payload order for ID_PROT from responder.
  */
 static payload_order_t id_prot_r_order[] = {
-/*     payload type                            notify type */
-       {SECURITY_ASSOCIATION_V1,       0},
-       {KEY_EXCHANGE_V1,                       0},
-       {NONCE_V1,                                      0},
-       {ID_V1,                                         0},
-       {CERTIFICATE_V1,                        0},
-       {SIGNATURE_V1,                          0},
-       {HASH_V1,                                       0},
-       {CERTIFICATE_REQUEST_V1,        0},
-       {NOTIFY_V1,                                     0},
-       {VENDOR_ID_V1,                          0},
-       {NAT_D_V1,                                      0},
-       {NAT_D_DRAFT_00_03_V1,          0},
-       {FRAGMENT_V1,                           0},
+/*     payload type                                    notify type */
+       {PLV1_SECURITY_ASSOCIATION,             0},
+       {PLV1_KEY_EXCHANGE,                             0},
+       {PLV1_NONCE,                                    0},
+       {PLV1_ID,                                               0},
+       {PLV1_CERTIFICATE,                              0},
+       {PLV1_SIGNATURE,                                0},
+       {PLV1_HASH,                                             0},
+       {PLV1_CERTREQ,                                  0},
+       {PLV1_NOTIFY,                                   0},
+       {PLV1_VENDOR_ID,                                0},
+       {PLV1_NAT_D,                                    0},
+       {PLV1_NAT_D_DRAFT_00_03,                0},
+       {PLV1_FRAGMENT,                                 0},
 };
 
 /**
  * Message rule for AGGRESSIVE from initiator.
  */
 static payload_rule_t aggressive_i_rules[] = {
-/*     payload type                            min     max                                             encr    suff */
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
-       {SECURITY_ASSOCIATION_V1,       0,      1,                                              FALSE,  FALSE},
-       {KEY_EXCHANGE_V1,                       0,      1,                                              FALSE,  FALSE},
-       {NONCE_V1,                                      0,      1,                                              FALSE,  FALSE},
-       {VENDOR_ID_V1,                          0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
-       {CERTIFICATE_REQUEST_V1,        0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
-       {NAT_D_V1,                                      0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
-       {NAT_D_DRAFT_00_03_V1,          0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
-       {ID_V1,                                         0,      1,                                              FALSE,  FALSE},
-       {CERTIFICATE_V1,                        0,      1,                                              TRUE,   FALSE},
-       {SIGNATURE_V1,                          0,      1,                                              TRUE,   FALSE},
-       {HASH_V1,                                       0,      1,                                              TRUE,   FALSE},
-       {FRAGMENT_V1,                           0,      1,                                              FALSE,  TRUE},
+/*     payload type                                    min     max                                             encr    suff */
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
+       {PLV1_SECURITY_ASSOCIATION,             0,      1,                                              FALSE,  FALSE},
+       {PLV1_KEY_EXCHANGE,                             0,      1,                                              FALSE,  FALSE},
+       {PLV1_NONCE,                                    0,      1,                                              FALSE,  FALSE},
+       {PLV1_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
+       {PLV1_CERTREQ,                                  0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
+       {PLV1_NAT_D,                                    0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
+       {PLV1_NAT_D_DRAFT_00_03,                0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
+       {PLV1_ID,                                               0,      1,                                              FALSE,  FALSE},
+       {PLV1_CERTIFICATE,                              0,      1,                                              TRUE,   FALSE},
+       {PLV1_SIGNATURE,                                0,      1,                                              TRUE,   FALSE},
+       {PLV1_HASH,                                             0,      1,                                              TRUE,   FALSE},
+       {PLV1_FRAGMENT,                                 0,      1,                                              FALSE,  TRUE},
 };
 
 /**
  * payload order for AGGRESSIVE from initiator.
  */
 static payload_order_t aggressive_i_order[] = {
-/*     payload type                            notify type */
-       {SECURITY_ASSOCIATION_V1,       0},
-       {KEY_EXCHANGE_V1,                       0},
-       {NONCE_V1,                                      0},
-       {ID_V1,                                         0},
-       {CERTIFICATE_V1,                        0},
-       {NAT_D_V1,                                      0},
-       {NAT_D_DRAFT_00_03_V1,          0},
-       {SIGNATURE_V1,                          0},
-       {HASH_V1,                                       0},
-       {CERTIFICATE_REQUEST_V1,        0},
-       {NOTIFY_V1,                                     0},
-       {VENDOR_ID_V1,                          0},
-       {FRAGMENT_V1,                           0},
+/*     payload type                                    notify type */
+       {PLV1_SECURITY_ASSOCIATION,             0},
+       {PLV1_KEY_EXCHANGE,                             0},
+       {PLV1_NONCE,                                    0},
+       {PLV1_ID,                                               0},
+       {PLV1_CERTIFICATE,                              0},
+       {PLV1_NAT_D,                                    0},
+       {PLV1_NAT_D_DRAFT_00_03,                0},
+       {PLV1_SIGNATURE,                                0},
+       {PLV1_HASH,                                             0},
+       {PLV1_CERTREQ,                                  0},
+       {PLV1_NOTIFY,                                   0},
+       {PLV1_VENDOR_ID,                                0},
+       {PLV1_FRAGMENT,                                 0},
 };
 
 /**
  * Message rule for AGGRESSIVE from responder.
  */
 static payload_rule_t aggressive_r_rules[] = {
-/*     payload type                            min     max                                             encr    suff */
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
-       {SECURITY_ASSOCIATION_V1,       0,      1,                                              FALSE,  FALSE},
-       {KEY_EXCHANGE_V1,                       0,      1,                                              FALSE,  FALSE},
-       {NONCE_V1,                                      0,      1,                                              FALSE,  FALSE},
-       {VENDOR_ID_V1,                          0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
-       {CERTIFICATE_REQUEST_V1,        0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
-       {NAT_D_V1,                                      0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
-       {NAT_D_DRAFT_00_03_V1,          0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
-       {ID_V1,                                         0,      1,                                              FALSE,  FALSE},
-       {CERTIFICATE_V1,                        0,      1,                                              FALSE,  FALSE},
-       {SIGNATURE_V1,                          0,      1,                                              FALSE,  FALSE},
-       {HASH_V1,                                       0,      1,                                              FALSE,  FALSE},
-       {FRAGMENT_V1,                           0,      1,                                              FALSE,  TRUE},
+/*     payload type                                    min     max                                             encr    suff */
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
+       {PLV1_SECURITY_ASSOCIATION,             0,      1,                                              FALSE,  FALSE},
+       {PLV1_KEY_EXCHANGE,                             0,      1,                                              FALSE,  FALSE},
+       {PLV1_NONCE,                                    0,      1,                                              FALSE,  FALSE},
+       {PLV1_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               FALSE,  FALSE},
+       {PLV1_CERTREQ,                                  0,      MAX_CERTREQ_PAYLOADS,   FALSE,  FALSE},
+       {PLV1_NAT_D,                                    0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
+       {PLV1_NAT_D_DRAFT_00_03,                0,      MAX_NAT_D_PAYLOADS,             FALSE,  FALSE},
+       {PLV1_ID,                                               0,      1,                                              FALSE,  FALSE},
+       {PLV1_CERTIFICATE,                              0,      1,                                              FALSE,  FALSE},
+       {PLV1_SIGNATURE,                                0,      1,                                              FALSE,  FALSE},
+       {PLV1_HASH,                                             0,      1,                                              FALSE,  FALSE},
+       {PLV1_FRAGMENT,                                 0,      1,                                              FALSE,  TRUE},
 };
 
 /**
  * payload order for AGGRESSIVE from responder.
  */
 static payload_order_t aggressive_r_order[] = {
-/*     payload type                            notify type */
-       {SECURITY_ASSOCIATION_V1,       0},
-       {KEY_EXCHANGE_V1,                       0},
-       {NONCE_V1,                                      0},
-       {ID_V1,                                         0},
-       {CERTIFICATE_V1,                        0},
-       {NAT_D_V1,                                      0},
-       {NAT_D_DRAFT_00_03_V1,          0},
-       {SIGNATURE_V1,                          0},
-       {HASH_V1,                                       0},
-       {CERTIFICATE_REQUEST_V1,        0},
-       {NOTIFY_V1,                                     0},
-       {VENDOR_ID_V1,                          0},
-       {FRAGMENT_V1,                           0},
+/*     payload type                                    notify type */
+       {PLV1_SECURITY_ASSOCIATION,             0},
+       {PLV1_KEY_EXCHANGE,                             0},
+       {PLV1_NONCE,                                    0},
+       {PLV1_ID,                                               0},
+       {PLV1_CERTIFICATE,                              0},
+       {PLV1_NAT_D,                                    0},
+       {PLV1_NAT_D_DRAFT_00_03,                0},
+       {PLV1_SIGNATURE,                                0},
+       {PLV1_HASH,                                             0},
+       {PLV1_CERTREQ,                                  0},
+       {PLV1_NOTIFY,                                   0},
+       {PLV1_VENDOR_ID,                                0},
+       {PLV1_FRAGMENT,                                 0},
 };
 
 /**
  * Message rule for INFORMATIONAL_V1 from initiator.
  */
 static payload_rule_t informational_i_rules_v1[] = {
-/*     payload type                            min     max                                             encr    suff */
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
-       {DELETE_V1,                                     0,      MAX_DELETE_PAYLOADS,    TRUE,   FALSE},
-       {VENDOR_ID_V1,                          0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+/*     payload type                                    min     max                                             encr    suff */
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
+       {PLV1_DELETE,                                   0,      MAX_DELETE_PAYLOADS,    TRUE,   FALSE},
+       {PLV1_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
 };
 
 /**
  * payload order for INFORMATIONAL_V1 from initiator.
  */
 static payload_order_t informational_i_order_v1[] = {
-/*     payload type                            notify type */
-       {NOTIFY_V1,                                     0},
-       {DELETE_V1,                                     0},
-       {VENDOR_ID_V1,                          0},
+/*     payload type                                    notify type */
+       {PLV1_NOTIFY,                                   0},
+       {PLV1_DELETE,                                   0},
+       {PLV1_VENDOR_ID,                                0},
 };
 
 /**
  * Message rule for INFORMATIONAL_V1 from responder.
  */
 static payload_rule_t informational_r_rules_v1[] = {
-/*     payload type                            min     max                                             encr    suff */
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
-       {DELETE_V1,                                     0,      MAX_DELETE_PAYLOADS,    TRUE,   FALSE},
-       {VENDOR_ID_V1,                          0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+/*     payload type                                    min     max                                             encr    suff */
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    FALSE,  FALSE},
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
+       {PLV1_DELETE,                                   0,      MAX_DELETE_PAYLOADS,    TRUE,   FALSE},
+       {PLV1_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
 };
 
 /**
  * payload order for INFORMATIONAL_V1 from responder.
  */
 static payload_order_t informational_r_order_v1[] = {
-/*     payload type                            notify type */
-       {NOTIFY_V1,                                     0},
-       {DELETE_V1,                                     0},
-       {VENDOR_ID_V1,                          0},
+/*     payload type                                    notify type */
+       {PLV1_NOTIFY,                                   0},
+       {PLV1_DELETE,                                   0},
+       {PLV1_VENDOR_ID,                                0},
 };
 
 /**
  * Message rule for QUICK_MODE from initiator.
  */
 static payload_rule_t quick_mode_i_rules[] = {
-/*     payload type                            min     max                                             encr    suff */
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
-       {VENDOR_ID_V1,                          0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
-       {HASH_V1,                                       0,      1,                                              TRUE,   FALSE},
-       {SECURITY_ASSOCIATION_V1,       0,      2,                                              TRUE,   FALSE},
-       {NONCE_V1,                                      0,      1,                                              TRUE,   FALSE},
-       {KEY_EXCHANGE_V1,                       0,      1,                                              TRUE,   FALSE},
-       {ID_V1,                                         0,      2,                                              TRUE,   FALSE},
-       {NAT_OA_V1,                                     0,      2,                                              TRUE,   FALSE},
-       {NAT_OA_DRAFT_00_03_V1,         0,      2,                                              TRUE,   FALSE},
+/*     payload type                                    min     max                                             encr    suff */
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
+       {PLV1_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+       {PLV1_HASH,                                             0,      1,                                              TRUE,   FALSE},
+       {PLV1_SECURITY_ASSOCIATION,             0,      2,                                              TRUE,   FALSE},
+       {PLV1_NONCE,                                    0,      1,                                              TRUE,   FALSE},
+       {PLV1_KEY_EXCHANGE,                             0,      1,                                              TRUE,   FALSE},
+       {PLV1_ID,                                               0,      2,                                              TRUE,   FALSE},
+       {PLV1_NAT_OA,                                   0,      2,                                              TRUE,   FALSE},
+       {PLV1_NAT_OA_DRAFT_00_03,               0,      2,                                              TRUE,   FALSE},
 };
 
 /**
  * payload order for QUICK_MODE from initiator.
  */
 static payload_order_t quick_mode_i_order[] = {
-/*     payload type                            notify type */
-       {NOTIFY_V1,                                     0},
-       {VENDOR_ID_V1,                          0},
-       {HASH_V1,                                       0},
-       {SECURITY_ASSOCIATION_V1,       0},
-       {NONCE_V1,                                      0},
-       {KEY_EXCHANGE_V1,                       0},
-       {ID_V1,                                         0},
-       {NAT_OA_V1,                                     0},
-       {NAT_OA_DRAFT_00_03_V1,         0},
+/*     payload type                                    notify type */
+       {PLV1_NOTIFY,                                   0},
+       {PLV1_VENDOR_ID,                                0},
+       {PLV1_HASH,                                             0},
+       {PLV1_SECURITY_ASSOCIATION,             0},
+       {PLV1_NONCE,                                    0},
+       {PLV1_KEY_EXCHANGE,                             0},
+       {PLV1_ID,                                               0},
+       {PLV1_NAT_OA,                                   0},
+       {PLV1_NAT_OA_DRAFT_00_03,               0},
 };
 
 /**
  * Message rule for QUICK_MODE from responder.
  */
 static payload_rule_t quick_mode_r_rules[] = {
-/*     payload type                            min     max                                             encr    suff */
-       {NOTIFY_V1,                                     0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
-       {VENDOR_ID_V1,                          0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
-       {HASH_V1,                                       0,      1,                                              TRUE,   FALSE},
-       {SECURITY_ASSOCIATION_V1,       0,      2,                                              TRUE,   FALSE},
-       {NONCE_V1,                                      0,      1,                                              TRUE,   FALSE},
-       {KEY_EXCHANGE_V1,                       0,      1,                                              TRUE,   FALSE},
-       {ID_V1,                                         0,      2,                                              TRUE,   FALSE},
-       {NAT_OA_V1,                                     0,      2,                                              TRUE,   FALSE},
-       {NAT_OA_DRAFT_00_03_V1,         0,      2,                                              TRUE,   FALSE},
+/*     payload type                                    min     max                                             encr    suff */
+       {PLV1_NOTIFY,                                   0,      MAX_NOTIFY_PAYLOADS,    TRUE,   FALSE},
+       {PLV1_VENDOR_ID,                                0,      MAX_VID_PAYLOADS,               TRUE,   FALSE},
+       {PLV1_HASH,                                             0,      1,                                              TRUE,   FALSE},
+       {PLV1_SECURITY_ASSOCIATION,             0,      2,                                              TRUE,   FALSE},
+       {PLV1_NONCE,                                    0,      1,                                              TRUE,   FALSE},
+       {PLV1_KEY_EXCHANGE,                             0,      1,                                              TRUE,   FALSE},
+       {PLV1_ID,                                               0,      2,                                              TRUE,   FALSE},
+       {PLV1_NAT_OA,                                   0,      2,                                              TRUE,   FALSE},
+       {PLV1_NAT_OA_DRAFT_00_03,               0,      2,                                              TRUE,   FALSE},
 };
 
 /**
  * payload order for QUICK_MODE from responder.
  */
 static payload_order_t quick_mode_r_order[] = {
-/*     payload type                            notify type */
-       {NOTIFY_V1,                                     0},
-       {VENDOR_ID_V1,                          0},
-       {HASH_V1,                                       0},
-       {SECURITY_ASSOCIATION_V1,       0},
-       {NONCE_V1,                                      0},
-       {KEY_EXCHANGE_V1,                       0},
-       {ID_V1,                                         0},
-       {NAT_OA_V1,                                     0},
-       {NAT_OA_DRAFT_00_03_V1,         0},
+/*     payload type                                    notify type */
+       {PLV1_NOTIFY,                                   0},
+       {PLV1_VENDOR_ID,                                0},
+       {PLV1_HASH,                                             0},
+       {PLV1_SECURITY_ASSOCIATION,             0},
+       {PLV1_NONCE,                                    0},
+       {PLV1_KEY_EXCHANGE,                             0},
+       {PLV1_ID,                                               0},
+       {PLV1_NAT_OA,                                   0},
+       {PLV1_NAT_OA_DRAFT_00_03,               0},
 };
 
 /**
  * Message rule for TRANSACTION.
  */
 static payload_rule_t transaction_payload_rules_v1[] = {
-/*     payload type                            min     max     encr    suff */
-       {HASH_V1,                                       0,      1,      TRUE,   FALSE},
-       {CONFIGURATION_V1,                      1,      1,      FALSE,  FALSE},
+/*     payload type                                    min     max     encr    suff */
+       {PLV1_HASH,                                             0,      1,      TRUE,   FALSE},
+       {PLV1_CONFIGURATION,                    1,      1,      FALSE,  FALSE},
 };
 
 /**
  * Payload order for TRANSACTION.
  */
 static payload_order_t transaction_payload_order_v1[] = {
-/*     payload type                    notify type */
-       {HASH_V1,                                       0},
-       {CONFIGURATION_V1,                      0},
+/*     payload type                                    notify type */
+       {PLV1_HASH,                                             0},
+       {PLV1_CONFIGURATION,                    0},
 };
 
 #endif /* USE_IKEV1 */
@@ -1063,7 +1063,7 @@ METHOD(message_t, add_payload, void,
        {
                this->first_payload = payload->get_type(payload);
        }
-       payload->set_next_type(payload, NO_PAYLOAD);
+       payload->set_next_type(payload, PL_NONE);
        this->payloads->insert_last(this->payloads, payload);
 
        DBG2(DBG_ENC ,"added payload of type %N to message",
@@ -1086,11 +1086,11 @@ METHOD(message_t, add_notify, void,
        }
        if (this->major_version == IKEV2_MAJOR_VERSION)
        {
-               notify = notify_payload_create(NOTIFY);
+               notify = notify_payload_create(PLV2_NOTIFY);
        }
        else
        {
-               notify = notify_payload_create(NOTIFY_V1);
+               notify = notify_payload_create(PLV1_NOTIFY);
        }
        notify->set_notify_type(notify, type);
        notify->set_notification_data(notify, data);
@@ -1162,8 +1162,8 @@ METHOD(message_t, get_notify, notify_payload_t*,
        enumerator = create_payload_enumerator(this);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY ||
-                       payload->get_type(payload) == NOTIFY_V1)
+               if (payload->get_type(payload) == PLV2_NOTIFY ||
+                       payload->get_type(payload) == PLV1_NOTIFY)
                {
                        notify = (notify_payload_t*)payload;
                        if (notify->get_notify_type(notify) == type)
@@ -1212,8 +1212,8 @@ static char* get_string(private_message_t *this, char *buf, int len)
                }
                pos += written;
                len -= written;
-               if (payload->get_type(payload) == NOTIFY ||
-                       payload->get_type(payload) == NOTIFY_V1)
+               if (payload->get_type(payload) == PLV2_NOTIFY ||
+                       payload->get_type(payload) == PLV1_NOTIFY)
                {
                        notify_payload_t *notify;
                        notify_type_t type;
@@ -1239,7 +1239,7 @@ static char* get_string(private_message_t *this, char *buf, int len)
                        pos += written;
                        len -= written;
                }
-               if (payload->get_type(payload) == EXTENSIBLE_AUTHENTICATION)
+               if (payload->get_type(payload) == PLV2_EAP)
                {
                        eap_payload_t *eap = (eap_payload_t*)payload;
                        u_int32_t vendor;
@@ -1268,8 +1268,8 @@ static char* get_string(private_message_t *this, char *buf, int len)
                        pos += written;
                        len -= written;
                }
-               if (payload->get_type(payload) == CONFIGURATION ||
-                       payload->get_type(payload) == CONFIGURATION_V1)
+               if (payload->get_type(payload) == PLV2_CONFIGURATION ||
+                       payload->get_type(payload) == PLV1_CONFIGURATION)
                {
                        cp_payload_t *cp = (cp_payload_t*)payload;
                        enumerator_t *attributes;
@@ -1365,7 +1365,7 @@ static void order_payloads(private_message_t *this)
                                notify = (notify_payload_t*)payload;
 
                                /**... and check notify for type. */
-                               if (order.type != NOTIFY || order.notify == 0 ||
+                               if (order.type != PLV2_NOTIFY || order.notify == 0 ||
                                        order.notify == notify->get_notify_type(notify))
                                {
                                        list->remove_at(list, enumerator);
@@ -1410,11 +1410,11 @@ static encryption_payload_t* wrap_payloads(private_message_t *this)
 
        if (this->is_encrypted)
        {
-               encryption = encryption_payload_create(ENCRYPTED_V1);
+               encryption = encryption_payload_create(PLV1_ENCRYPTED);
        }
        else
        {
-               encryption = encryption_payload_create(ENCRYPTED);
+               encryption = encryption_payload_create(PLV2_ENCRYPTED);
        }
        while (payloads->remove_first(payloads, (void**)&current) == SUCCESS)
        {
@@ -1500,7 +1500,7 @@ METHOD(message_t, generate, status_t,
                {       /* insert a HASH payload as first payload */
                        hash_payload_t *hash_payload;
 
-                       hash_payload = hash_payload_create(HASH_V1);
+                       hash_payload = hash_payload_create(PLV1_HASH);
                        hash_payload->set_hash(hash_payload, hash);
                        this->payloads->insert_first(this->payloads, hash_payload);
                        if (this->exchange_type == INFORMATIONAL_V1)
@@ -1598,7 +1598,7 @@ METHOD(message_t, generate, status_t,
        }
        else
        {
-               next_type = encryption ? ENCRYPTED : NO_PAYLOAD;
+               next_type = encryption ? PLV2_ENCRYPTED : PL_NONE;
        }
        payload->set_next_type(payload, next_type);
        generator->generate_payload(generator, payload);
@@ -1683,7 +1683,7 @@ METHOD(message_t, parse_header, status_t,
        DBG2(DBG_ENC, "parsing header of message");
 
        this->parser->reset_context(this->parser);
-       status = this->parser->parse_payload(this->parser, HEADER,
+       status = this->parser->parse_payload(this->parser, PL_HEADER,
                                                                                 (payload_t**)&ike_header);
        if (status != SUCCESS)
        {
@@ -1722,7 +1722,7 @@ METHOD(message_t, parse_header, status_t,
        }
        this->first_payload = ike_header->payload_interface.get_next_type(
                                                                                                &ike_header->payload_interface);
-       if (this->first_payload == FRAGMENT_V1 && this->is_encrypted)
+       if (this->first_payload == PLV1_FRAGMENT && this->is_encrypted)
        {       /* racoon sets the encryted bit when sending a fragment, but these
                 * messages are really not encrypted */
                this->is_encrypted = FALSE;
@@ -1752,7 +1752,7 @@ static bool is_connectivity_check(private_message_t *this, payload_t *payload)
 {
 #ifdef ME
        if (this->exchange_type == INFORMATIONAL &&
-               payload->get_type(payload) == NOTIFY)
+               payload->get_type(payload) == PLV2_NOTIFY)
        {
                notify_payload_t *notify = (notify_payload_t*)payload;
 
@@ -1784,7 +1784,7 @@ static status_t parse_payloads(private_message_t *this)
                 * payload which is then handled just like a regular payload */
                encryption_payload_t *encryption;
 
-               status = this->parser->parse_payload(this->parser, ENCRYPTED_V1,
+               status = this->parser->parse_payload(this->parser, PLV1_ENCRYPTED,
                                                                                         (payload_t**)&encryption);
                if (status != SUCCESS)
                {
@@ -1797,7 +1797,7 @@ static status_t parse_payloads(private_message_t *this)
                return SUCCESS;
        }
 
-       while (type != NO_PAYLOAD)
+       while (type != PL_NONE)
        {
                DBG2(DBG_ENC, "starting parsing a %N payload",
                         payload_type_names, type);
@@ -1826,7 +1826,7 @@ static status_t parse_payloads(private_message_t *this)
 
                /* an encrypted payload is the last one, so STOP here. decryption is
                 * done later */
-               if (type == ENCRYPTED)
+               if (type == PLV2_ENCRYPTED)
                {
                        DBG2(DBG_ENC, "%N payload found, stop parsing",
                                 payload_type_names, type);
@@ -1930,7 +1930,7 @@ static bool accept_unencrypted_mm(private_message_t *this, payload_type_t type)
 {
        if (this->exchange_type == ID_PROT)
        {
-               if (type == ID_V1 || type == HASH_V1)
+               if (type == PLV1_ID || type == PLV1_HASH)
                {
                        return lib->settings->get_bool(lib->settings,
                                                                        "%s.accept_unencrypted_mainmode_messages",
@@ -1959,7 +1959,7 @@ static status_t decrypt_payloads(private_message_t *this, keymat_t *keymat)
 
                DBG2(DBG_ENC, "process payload of type %N", payload_type_names, type);
 
-               if (type == ENCRYPTED || type == ENCRYPTED_V1)
+               if (type == PLV2_ENCRYPTED || type == PLV1_ENCRYPTED)
                {
                        encryption_payload_t *encryption;
 
@@ -2116,7 +2116,7 @@ METHOD(message_t, parse_body, status_t,
                        hash_payload_t *hash_payload;
                        chunk_t other_hash;
 
-                       if (this->first_payload != HASH_V1)
+                       if (this->first_payload != PLV1_HASH)
                        {
                                if (this->exchange_type == INFORMATIONAL_V1)
                                {
@@ -2130,7 +2130,7 @@ METHOD(message_t, parse_body, status_t,
                                chunk_free(&hash);
                                return VERIFY_ERROR;
                        }
-                       hash_payload = (hash_payload_t*)get_payload(this, HASH_V1);
+                       hash_payload = (hash_payload_t*)get_payload(this, PLV1_HASH);
                        other_hash = hash_payload->get_hash(hash_payload);
                        DBG3(DBG_ENC, "HASH received %B\nHASH expected %B",
                                 &other_hash, &hash);
@@ -2211,7 +2211,7 @@ message_t *message_create_from_packet(packet_t *packet)
                },
                .exchange_type = EXCHANGE_TYPE_UNDEFINED,
                .is_request = TRUE,
-               .first_payload = NO_PAYLOAD,
+               .first_payload = PL_NONE,
                .packet = packet,
                .payloads = linked_list_create(),
                .parser = parser_create(packet->get_data(packet)),
index 9e7f8311b4060a903abc8e736f49d8fbe75f65b8..588b8af721608bc8542e7a7fd48b727b975103ad 100644 (file)
@@ -486,15 +486,15 @@ METHOD(parser_t, parse_payload, status_t,
                                }
                                break;
                        }
-                       case PAYLOAD_LIST + PROPOSAL_SUBSTRUCTURE:
-                       case PAYLOAD_LIST + PROPOSAL_SUBSTRUCTURE_V1:
-                       case PAYLOAD_LIST + TRANSFORM_SUBSTRUCTURE:
-                       case PAYLOAD_LIST + TRANSFORM_SUBSTRUCTURE_V1:
-                       case PAYLOAD_LIST + TRANSFORM_ATTRIBUTE:
-                       case PAYLOAD_LIST + TRANSFORM_ATTRIBUTE_V1:
-                       case PAYLOAD_LIST + CONFIGURATION_ATTRIBUTE:
-                       case PAYLOAD_LIST + CONFIGURATION_ATTRIBUTE_V1:
-                       case PAYLOAD_LIST + TRAFFIC_SELECTOR_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV2_PROPOSAL_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV1_PROPOSAL_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV2_TRANSFORM_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV1_TRANSFORM_SUBSTRUCTURE:
+                       case PAYLOAD_LIST + PLV2_TRANSFORM_ATTRIBUTE:
+                       case PAYLOAD_LIST + PLV1_TRANSFORM_ATTRIBUTE:
+                       case PAYLOAD_LIST + PLV2_CONFIGURATION_ATTRIBUTE:
+                       case PAYLOAD_LIST + PLV1_CONFIGURATION_ATTRIBUTE:
+                       case PAYLOAD_LIST + PLV2_TRAFFIC_SELECTOR_SUBSTRUCTURE:
                        {
                                if (payload_length < header_length ||
                                        !parse_list(this, rule_number, output + rule->offset,
index 2410a1aaac8d25834fd1f83bca23ac38dc2c1158..ee3ed54fd0a38e8bf584cb385cc8857c9b145df9 100644 (file)
@@ -135,7 +135,7 @@ METHOD(payload_t, get_header_length, int,
 METHOD(payload_t, get_type, payload_type_t,
        private_auth_payload_t *this)
 {
-       return AUTHENTICATION;
+       return PLV2_AUTH;
 }
 
 METHOD(payload_t, get_next_type, payload_type_t,
@@ -214,7 +214,7 @@ auth_payload_t *auth_payload_create()
                        .get_data = _get_data,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
        );
        return &this->public;
index 05d41051bdfc13702c2df9d1214b75d1fa99761d..43993ae48e73dd627ad959a2d4da3260d547666d 100644 (file)
@@ -315,7 +315,7 @@ cert_payload_t *cert_payload_create(payload_type_t type)
                        .get_url = _get_url,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
                .type = type,
        );
@@ -363,7 +363,7 @@ cert_payload_t *cert_payload_create_from_hash_and_url(chunk_t hash, char *url)
 {
        private_cert_payload_t *this;
 
-       this = (private_cert_payload_t*)cert_payload_create(CERTIFICATE);
+       this = (private_cert_payload_t*)cert_payload_create(PLV2_CERTIFICATE);
        this->encoding = ENC_X509_HASH_AND_URL;
        this->data = chunk_cat("cc", hash, chunk_create(url, strlen(url)));
        this->payload_length = get_header_length(this) + this->data.len;
index df5e73b5b50831c095bf719f5753b892e7800d48..6ac90a2a0b1de81b5b4257d5eb20cf5bd34d0b57 100644 (file)
@@ -66,7 +66,7 @@ struct private_certreq_payload_t {
        chunk_t data;
 
        /**
-        * Payload type CERTIFICATE_REQUEST or CERTIFICATE_REQUEST_V1
+        * Payload type PLV2_CERTREQ or PLV1_CERTREQ
         */
        payload_type_t type;
 };
@@ -111,7 +111,7 @@ static encoding_rule_t encodings[] = {
 METHOD(payload_t, verify, status_t,
        private_certreq_payload_t *this)
 {
-       if (this->type == CERTIFICATE_REQUEST &&
+       if (this->type == PLV2_CERTREQ &&
                this->encoding == ENC_X509_SIGNATURE)
        {
                if (this->data.len % HASH_SIZE_SHA1)
@@ -218,7 +218,7 @@ METHOD(certreq_payload_t, create_keyid_enumerator, enumerator_t*,
 {
        keyid_enumerator_t *enumerator;
 
-       if (this->type == CERTIFICATE_REQUEST_V1)
+       if (this->type == PLV1_CERTREQ)
        {
                return enumerator_create_empty();
        }
@@ -276,7 +276,7 @@ certreq_payload_t *certreq_payload_create(payload_type_t type)
                        .destroy = _destroy,
                        .get_dn = _get_dn,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
                .type = type,
        );
@@ -291,7 +291,7 @@ certreq_payload_t *certreq_payload_create_type(certificate_type_t type)
        private_certreq_payload_t *this;
 
        this = (private_certreq_payload_t*)
-                                       certreq_payload_create(CERTIFICATE_REQUEST);
+                                       certreq_payload_create(PLV2_CERTREQ);
        switch (type)
        {
                case CERT_X509:
@@ -314,7 +314,7 @@ certreq_payload_t *certreq_payload_create_dn(identification_t *id)
        private_certreq_payload_t *this;
 
        this = (private_certreq_payload_t*)
-                                       certreq_payload_create(CERTIFICATE_REQUEST_V1);
+                                       certreq_payload_create(PLV1_CERTREQ);
 
        this->encoding = ENC_X509_SIGNATURE;
        this->data = chunk_clone(id->get_encoding(id));
index 482eca882e77cf3751299425cf41c7cad4977333..481bb7bc65b3b619627d72e364e87d04e08641d7 100644 (file)
@@ -61,7 +61,7 @@ struct private_configuration_attribute_t {
        chunk_t value;
 
        /**
-        * Payload type, CONFIGURATION_ATTRIBUTE or DATA_ATTRIBUTE_V1
+        * Payload type, PLV2_CONFIGURATION_ATTRIBUTE or DATA_ATTRIBUTE_V1
         */
        payload_type_t type;
 };
@@ -209,7 +209,7 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_configuration_attribute_t *this, encoding_rule_t **rules)
 {
-       if (this->type == CONFIGURATION_ATTRIBUTE)
+       if (this->type == PLV2_CONFIGURATION_ATTRIBUTE)
        {
                *rules = encodings_v2;
                return countof(encodings_v2);
@@ -233,7 +233,7 @@ METHOD(payload_t, get_type, payload_type_t,
 METHOD(payload_t, get_next_type, payload_type_t,
        private_configuration_attribute_t *this)
 {
-       return NO_PAYLOAD;
+       return PL_NONE;
 }
 
 METHOD(payload_t, set_next_type, void,
@@ -335,7 +335,7 @@ configuration_attribute_t *configuration_attribute_create_value(
        private_configuration_attribute_t *this;
 
        this = (private_configuration_attribute_t*)
-                                       configuration_attribute_create(CONFIGURATION_ATTRIBUTE_V1);
+                                       configuration_attribute_create(PLV1_CONFIGURATION_ATTRIBUTE);
        this->attr_type = ((u_int16_t)attr_type) & 0x7FFF;
        this->length_or_value = value;
        this->af_flag = TRUE;
index ecc0f9c0752c3acc6100fc80837d2e507b59e087..946c1b500047dd9ddc7250748f80b7f285962e77 100644 (file)
@@ -68,7 +68,7 @@ struct configuration_attribute_t {
 /**
  * Creates an empty configuration attribute.
  *
- * @param type         CONFIGURATION_ATTRIBUTE or CONFIGURATION_ATTRIBUTE_V1
+ * @param type         PLV2_CONFIGURATION_ATTRIBUTE or PLV1_CONFIGURATION_ATTRIBUTE
  * @return                     created configuration attribute
  */
 configuration_attribute_t *configuration_attribute_create(payload_type_t type);
@@ -76,7 +76,7 @@ configuration_attribute_t *configuration_attribute_create(payload_type_t type);
 /**
  * Creates a configuration attribute with type and value.
  *
- * @param type         CONFIGURATION_ATTRIBUTE or CONFIGURATION_ATTRIBUTE_V1
+ * @param type         PLV2_CONFIGURATION_ATTRIBUTE or PLV1_CONFIGURATION_ATTRIBUTE
  * @param attr_type    type of configuration attribute
  * @param chunk                attribute value, gets cloned
  * @return                     created configuration attribute
@@ -89,7 +89,7 @@ configuration_attribute_t *configuration_attribute_create_chunk(
  *
  * @param attr_type    type of configuration attribute
  * @param value                attribute value, gets cloned
- * @return                     created CONFIGURATION_ATTRIBUTE_V1 configuration attribute
+ * @return                     created PLV1_CONFIGURATION_ATTRIBUTE configuration attribute
  */
 configuration_attribute_t *configuration_attribute_create_value(
                                        configuration_attribute_type_t attr_type, u_int16_t value);
index f6f373f99f71f566ebc73bdea5be61d18d4d2e81..ef9df84f754755b4bea8717a041f3efe0f3597dc 100644 (file)
@@ -82,7 +82,7 @@ struct private_cp_payload_t {
        u_int8_t cfg_type;
 
        /**
-        * CONFIGURATION or CONFIGURATION_V1
+        * PLV2_CONFIGURATION or PLV1_CONFIGURATION
         */
        payload_type_t type;
 };
@@ -111,7 +111,7 @@ static encoding_rule_t encodings_v2[] = {
        { RESERVED_BYTE,        offsetof(private_cp_payload_t, reserved_byte[1])},
        { RESERVED_BYTE,        offsetof(private_cp_payload_t, reserved_byte[2])},
        /* list of configuration attributes in a list */
-       { PAYLOAD_LIST + CONFIGURATION_ATTRIBUTE,
+       { PAYLOAD_LIST + PLV2_CONFIGURATION_ATTRIBUTE,
                                                offsetof(private_cp_payload_t, attributes)              },
 };
 
@@ -152,7 +152,7 @@ static encoding_rule_t encodings_v1[] = {
        { RESERVED_BYTE,        offsetof(private_cp_payload_t, reserved_byte[0])},
        { U_INT_16,                     offsetof(private_cp_payload_t, identifier)},
        /* list of configuration attributes in a list */
-       { PAYLOAD_LIST + CONFIGURATION_ATTRIBUTE_V1,
+       { PAYLOAD_LIST + PLV1_CONFIGURATION_ATTRIBUTE,
                                                offsetof(private_cp_payload_t, attributes)              },
 };
 
@@ -193,7 +193,7 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_cp_payload_t *this, encoding_rule_t **rules)
 {
-       if (this->type == CONFIGURATION)
+       if (this->type == PLV2_CONFIGURATION)
        {
                *rules = encodings_v2;
                return countof(encodings_v2);
@@ -314,7 +314,7 @@ cp_payload_t *cp_payload_create_type(payload_type_t type, config_type_t cfg_type
                        .set_identifier = _set_identifier,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
                .attributes = linked_list_create(),
                .cfg_type = cfg_type,
index c23bc0bb4b028799512f4df1020138b257035609..d466989d67f69a591b202f2254110077d6eaebc8 100644 (file)
@@ -100,7 +100,7 @@ struct cp_payload_t {
 /**
  * Creates an empty configuration payload
  *
- * @param type         payload type, CONFIGURATION or CONFIGURATION_V1
+ * @param type         payload type, PLV2_CONFIGURATION or PLV1_CONFIGURATION
  * @return                     empty configuration payload
  */
 cp_payload_t *cp_payload_create(payload_type_t type);
@@ -108,7 +108,7 @@ cp_payload_t *cp_payload_create(payload_type_t type);
 /**
  * Creates an cp_payload_t with type and value
  *
- * @param type         payload type, CONFIGURATION or CONFIGURATION_V1
+ * @param type         payload type, PLV2_CONFIGURATION or PLV1_CONFIGURATION
  * @param cfg_type     type of configuration payload to create
  * @return                     created configuration payload
  */
index 007411f37013775bd4d846e0033dd24b86659198..c2ab3b951bed54b75df139c0d39d90a4a33e1d86 100644 (file)
@@ -78,7 +78,7 @@ struct private_delete_payload_t {
        chunk_t spis;
 
        /**
-        * Payload type, DELETE or DELETE_V1
+        * Payload type, PLV2_DELETE or PLV1_DELETE
         */
        payload_type_t type;
 };
@@ -178,7 +178,7 @@ METHOD(payload_t, verify, status_t,
                        break;
                case PROTO_IKE:
                case 0:
-                       if (this->type == DELETE)
+                       if (this->type == PLV2_DELETE)
                        {       /* IKEv2 deletion has no spi assigned! */
                                if (this->spi_size != 0)
                                {
@@ -206,7 +206,7 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_delete_payload_t *this, encoding_rule_t **rules)
 {
-       if (this->type == DELETE)
+       if (this->type == PLV2_DELETE)
        {
                *rules = encodings_v2;
                return countof(encodings_v2);
@@ -218,7 +218,7 @@ METHOD(payload_t, get_encoding_rules, int,
 METHOD(payload_t, get_header_length, int,
        private_delete_payload_t *this)
 {
-       if (this->type == DELETE)
+       if (this->type == PLV2_DELETE)
        {
                return 8;
        }
@@ -355,7 +355,7 @@ delete_payload_t *delete_payload_create(payload_type_t type,
                        .create_spi_enumerator = _create_spi_enumerator,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .protocol_id = protocol_id,
                .doi = IKEV1_DOI_IPSEC,
                .type = type,
@@ -364,7 +364,7 @@ delete_payload_t *delete_payload_create(payload_type_t type,
 
        if (protocol_id == PROTO_IKE)
        {
-               if (type == DELETE_V1)
+               if (type == PLV1_DELETE)
                {
                        this->spi_size = 16;
                }
index afce1ecf1d4afb2831f90a0bcfc5a95f7dac0d67..46a89eab648b3a8131726959a7badc6f7dcc6b10 100644 (file)
@@ -76,7 +76,7 @@ struct delete_payload_t {
 /**
  * Creates an empty delete_payload_t object.
  *
- * @param type                 DELETE or DELETE_V1
+ * @param type                 PLV2_DELETE or PLV1_DELETE
  * @param protocol_id  protocol, such as AH|ESP
  * @return                             delete_payload_t object
  */
index f2f35aa69c48f937df5a8bb4311d8c88d352f1ae..ebdf8a3fe11a23ad224cdb9ab78c2f5b4881cf73 100644 (file)
@@ -162,7 +162,7 @@ METHOD(payload_t, get_header_length, int,
 METHOD(payload_t, get_payload_type, payload_type_t,
        private_eap_payload_t *this)
 {
-       return EXTENSIBLE_AUTHENTICATION;
+       return PLV2_EAP;
 }
 
 METHOD(payload_t, get_next_type, payload_type_t,
@@ -341,7 +341,7 @@ eap_payload_t *eap_payload_create()
                        .is_expanded = _is_expanded,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
        );
        return &this->public;
index 6a9f9c3bd322e83c714604e895f8bed3d4ce0382..5784562f8d971dff7865b25f2ab1670c9d864dc8 100644 (file)
@@ -74,7 +74,7 @@ struct private_encryption_payload_t {
        linked_list_t *payloads;
 
        /**
-        * Type of payload, ENCRYPTED or ENCRYPTED_V1
+        * Type of payload, PLV2_ENCRYPTED or PLV1_ENCRYPTED
         */
        payload_type_t type;
 };
@@ -145,7 +145,7 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_encryption_payload_t *this, encoding_rule_t **rules)
 {
-       if (this->type == ENCRYPTED)
+       if (this->type == PLV2_ENCRYPTED)
        {
                *rules = encodings_v2;
                return countof(encodings_v2);
@@ -157,7 +157,7 @@ METHOD(payload_t, get_encoding_rules, int,
 METHOD(payload_t, get_header_length, int,
        private_encryption_payload_t *this)
 {
-       if (this->type == ENCRYPTED)
+       if (this->type == PLV2_ENCRYPTED)
        {
                return 4;
        }
@@ -241,7 +241,7 @@ METHOD(encryption_payload_t, add_payload, void,
        {
                this->next_payload = payload->get_type(payload);
        }
-       payload->set_next_type(payload, NO_PAYLOAD);
+       payload->set_next_type(payload, PL_NONE);
        this->payloads->insert_last(this->payloads, payload);
        compute_length(this);
 }
@@ -281,7 +281,7 @@ static chunk_t generate(private_encryption_payload_t *this,
                        generator->generate_payload(generator, current);
                        current = next;
                }
-               current->set_next_type(current, NO_PAYLOAD);
+               current->set_next_type(current, PL_NONE);
                generator->generate_payload(generator, current);
 
                chunk = generator->get_chunk(generator, &lenpos);
@@ -447,7 +447,7 @@ static status_t parse(private_encryption_payload_t *this, chunk_t plain)
 
        parser = parser_create(plain);
        type = this->next_payload;
-       while (type != NO_PAYLOAD)
+       while (type != PL_NONE)
        {
                payload_t *payload;
 
@@ -618,13 +618,13 @@ encryption_payload_t *encryption_payload_create(payload_type_t type)
                        .decrypt = _decrypt,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payloads = linked_list_create(),
                .type = type,
        );
        this->payload_length = get_header_length(this);
 
-       if (type == ENCRYPTED_V1)
+       if (type == PLV1_ENCRYPTED)
        {
                this->public.encrypt = _encrypt_v1;
                this->public.decrypt = _decrypt_v1;
index f4fc7d667eee3305c124ed60baea2eef6ff00e9f..ee44c2de17ab35dd9fc5917a459dd46ed946b67c 100644 (file)
@@ -103,7 +103,7 @@ struct encryption_payload_t {
 /**
  * Creates an empty encryption_payload_t object.
  *
- * @param type         ENCRYPTED or ENCRYPTED_V1
+ * @param type         PLV2_ENCRYPTED or PLV1_ENCRYPTED
  * @return                     encryption_payload_t object
  */
 encryption_payload_t *encryption_payload_create(payload_type_t type);
index 25fb42acd0f35e9aa3c1307c513428e42dea8b31..ebe5f32f7d28fcdd039dae14e1eb741e8ad5ce69 100644 (file)
@@ -227,7 +227,7 @@ METHOD(endpoint_notify_t, build_notify, notify_payload_t*,
        chunk_t data;
        notify_payload_t *notify;
 
-       notify = notify_payload_create(NOTIFY);
+       notify = notify_payload_create(PLV2_NOTIFY);
        notify->set_notify_type(notify, ME_ENDPOINT);
        data = build_notification_data(this);
        notify->set_notification_data(notify, data);
index 1a6b3234b7b4b67699b6fd686212ee1fa02c2360..b861fcc68e36f80a777640f5534f47a748222b51 100644 (file)
@@ -124,7 +124,7 @@ METHOD(payload_t, get_header_length, int,
 METHOD(payload_t, get_type, payload_type_t,
        private_fragment_payload_t *this)
 {
-       return FRAGMENT_V1;
+       return PLV1_FRAGMENT;
 }
 
 METHOD(payload_t, get_next_type, payload_type_t,
@@ -201,7 +201,7 @@ fragment_payload_t *fragment_payload_create()
                        .get_data = _get_data,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
        );
        this->payload_length = get_header_length(this);
        return &this->public;
index 0cf63ba67105c48fd84583031443d6fded519848..a12b018e5090b866921a5e2028bdfff299266701 100644 (file)
@@ -52,7 +52,7 @@ struct private_hash_payload_t {
        chunk_t hash;
 
        /**
-        * either HASH_V1 or NAT_D_V1
+        * either PLV1_HASH or PLV1_NAT_D
         */
        payload_type_t type;
 };
@@ -169,7 +169,7 @@ hash_payload_t *hash_payload_create(payload_type_t type)
                        .get_hash = _get_hash,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
                .type = type,
        );
index cfe28460c1aeca9d6e780267d7976da7748f17fc..604de4894e9332611d7500fec846d342665e61ec 100644 (file)
@@ -59,7 +59,7 @@ struct hash_payload_t {
 /**
  * Creates an empty hash_payload_t object.
  *
- * @param type         either HASH_V1 or NAT_D_V1
+ * @param type         either PLV1_HASH or PLV1_NAT_D
  * @return                     hash_payload_t object
  */
 hash_payload_t *hash_payload_create(payload_type_t type);
index 7470bb3b49d719654a0fe293350ccadd05eb7c8c..a002a8f21ab28acec79644c93a0acd08df2d2395 100644 (file)
@@ -81,7 +81,7 @@ struct private_id_payload_t {
        u_int16_t port;
 
        /**
-        * one of ID_INITIATOR, ID_RESPONDER, IDv1 and NAT_OA_V1
+        * one of PLV2_ID_INITIATOR, PLV2_ID_RESPONDER, IDv1 and PLV1_NAT_OA
         */
        payload_type_t type;
 };
@@ -165,7 +165,7 @@ METHOD(payload_t, verify, status_t,
 {
        bool bad_length = FALSE;
 
-       if ((this->type == NAT_OA_V1 || this->type == NAT_OA_DRAFT_00_03_V1) &&
+       if ((this->type == PLV1_NAT_OA || this->type == PLV1_NAT_OA_DRAFT_00_03) &&
                this->id_type != ID_IPV4_ADDR && this->id_type != ID_IPV6_ADDR)
        {
                DBG1(DBG_ENC, "invalid ID type %N for %N payload", id_type_names,
@@ -195,8 +195,8 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_id_payload_t *this, encoding_rule_t **rules)
 {
-       if (this->type == ID_V1 ||
-               this->type == NAT_OA_V1 || this->type == NAT_OA_DRAFT_00_03_V1)
+       if (this->type == PLV1_ID ||
+               this->type == PLV1_NAT_OA || this->type == PLV1_NAT_OA_DRAFT_00_03)
        {
                *rules = encodings_v1;
                return countof(encodings_v1);
@@ -368,7 +368,7 @@ id_payload_t *id_payload_create(payload_type_t type)
                        .get_ts = _get_ts,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
                .type = type,
        );
@@ -400,7 +400,7 @@ id_payload_t *id_payload_create_from_ts(traffic_selector_t *ts)
        u_int8_t mask;
        host_t *net;
 
-       this = (private_id_payload_t*)id_payload_create(ID_V1);
+       this = (private_id_payload_t*)id_payload_create(PLV1_ID);
 
        if (ts->is_host(ts, NULL))
        {
index 9a62494292b800f8106fd6f1fe803d84287d1a62..df1d07553f3020dfbb0f0dfa6e83a468a47e9ac1 100644 (file)
@@ -70,7 +70,7 @@ struct id_payload_t {
 /**
  * Creates an empty id_payload_t object.
  *
- * @param type         one of ID_INITIATOR, ID_RESPONDER, ID_V1 and NAT_OA_V1
+ * @param type         one of PLV2_ID_INITIATOR, PLV2_ID_RESPONDER, PLV1_ID and PLV1_NAT_OA
  * @return                     id_payload_t object
  */
 id_payload_t *id_payload_create(payload_type_t type);
@@ -78,7 +78,7 @@ id_payload_t *id_payload_create(payload_type_t type);
 /**
  * Creates an id_payload_t from an existing identification_t object.
  *
- * @param type         one of ID_INITIATOR, ID_RESPONDER, ID_V1 and NAT_OA_V1
+ * @param type         one of PLV2_ID_INITIATOR, PLV2_ID_RESPONDER, PLV1_ID and PLV1_NAT_OA
  * @param id           identification_t object
  * @return                     id_payload_t object
  */
@@ -89,7 +89,7 @@ id_payload_t *id_payload_create_from_identification(payload_type_t type,
  * Create an IKEv1 ID_ADDR_SUBNET/RANGE identity from a traffic selector.
  *
  * @param ts           traffic selector
- * @return                     ID_V1 id_paylad_t object.
+ * @return                     PLV1_ID id_paylad_t object.
  */
 id_payload_t *id_payload_create_from_ts(traffic_selector_t *ts);
 
index 58b6241929b6f2ed9bcc86f38219c8a5f46718b9..7015667ee86c5328a156c216c3e77b6d41f7bef6 100644 (file)
@@ -262,7 +262,7 @@ METHOD(payload_t, get_header_length, int,
 METHOD(payload_t, get_type, payload_type_t,
        private_ike_header_t *this)
 {
-       return HEADER;
+       return PL_HEADER;
 }
 
 METHOD(payload_t, get_next_type, payload_type_t,
index 438ea46b9fe1028e7870ab5385ba570a7ce0025f..4f552d6ac47c9ce327dab25fd21d29f5dcc40c4e 100644 (file)
@@ -69,7 +69,7 @@ struct private_ke_payload_t {
        chunk_t key_exchange_data;
 
        /**
-        * Payload type, KEY_EXCHANGE or KEY_EXCHANGE_V1
+        * Payload type, PLV2_KEY_EXCHANGE or PLV1_KEY_EXCHANGE
         */
        payload_type_t type;
 };
@@ -148,7 +148,7 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_ke_payload_t *this, encoding_rule_t **rules)
 {
-       if (this->type == KEY_EXCHANGE)
+       if (this->type == PLV2_KEY_EXCHANGE)
        {
                *rules = encodings_v2;
                return countof(encodings_v2);
@@ -160,7 +160,7 @@ METHOD(payload_t, get_encoding_rules, int,
 METHOD(payload_t, get_header_length, int,
        private_ke_payload_t *this)
 {
-       if (this->type == KEY_EXCHANGE)
+       if (this->type == PLV2_KEY_EXCHANGE)
        {
                return 8;
        }
@@ -233,7 +233,7 @@ ke_payload_t *ke_payload_create(payload_type_t type)
                        .get_dh_group_number = _get_dh_group_number,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .dh_group_number = MODP_NONE,
                .type = type,
        );
index d3aa184840ba50db3c2bf17f97e60d0c7beeb3cd..dfc6308b48e0ec58e377e07cdef3b0c94d3fc769 100644 (file)
@@ -63,7 +63,7 @@ struct ke_payload_t {
 /**
  * Creates an empty ke_payload_t object.
  *
- * @param type         KEY_EXCHANGE or KEY_EXCHANGE_V1
+ * @param type         PLV2_KEY_EXCHANGE or PLV1_KEY_EXCHANGE
  * @return                     ke_payload_t object
  */
 ke_payload_t *ke_payload_create(payload_type_t type);
@@ -71,7 +71,7 @@ ke_payload_t *ke_payload_create(payload_type_t type);
 /**
  * Creates a ke_payload_t from a diffie_hellman_t.
  *
- * @param type         KEY_EXCHANGE or KEY_EXCHANGE_V1
+ * @param type         PLV2_KEY_EXCHANGE or PLV1_KEY_EXCHANGE
  * @param dh           diffie hellman object containing group and key
  * @return                     ke_payload_t object
  */
index 3c5eeb535dbd458abc645958a415dac24428c84c..b0d1c601aac1b135a28ef7e1d50971adc392750c 100644 (file)
@@ -60,7 +60,7 @@ struct private_nonce_payload_t {
        chunk_t nonce;
 
        /**
-        * Payload type, NONCE or NONCE_V1
+        * Payload type, PLV2_NONCE or PLV1_NONCE
         */
        payload_type_t type;
 };
@@ -110,12 +110,12 @@ METHOD(payload_t, verify, status_t,
        {
                bad_length = TRUE;
        }
-       if (this->type == NONCE &&
+       if (this->type == PLV2_NONCE &&
                this->nonce.len < 16)
        {
                bad_length = TRUE;
        }
-       if (this->type == NONCE_V1 &&
+       if (this->type == PLV1_NONCE &&
                this->nonce.len < 8)
        {
                bad_length = TRUE;
@@ -209,7 +209,7 @@ nonce_payload_t *nonce_payload_create(payload_type_t type)
                        .get_nonce = _get_nonce,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
                .type = type,
        );
index 5c47f5f9f9b45cd9281bc4286ec65ff85d35b215..ee8ad17f789ed4fe6a2e3476fc710b79d74885aa 100644 (file)
@@ -64,7 +64,7 @@ struct nonce_payload_t {
 /**
  * Creates an empty nonce_payload_t object
  *
- * @param type         NONCE or NONCE_V1
+ * @param type         PLV2_NONCE or PLV1_NONCE
  * @return                     nonce_payload_t object
  */
 nonce_payload_t *nonce_payload_create(payload_type_t type);
index 889ad6358b7d20b20896b64d8c51c7b49fd2314b..dd92e429a69ca3c51b37c70a8ac3de407548a4dd 100644 (file)
@@ -302,7 +302,7 @@ struct private_notify_payload_t {
        chunk_t notify_data;
 
        /**
-        * Type of payload, NOTIFY or NOTIFY_V1
+        * Type of payload, PLV2_NOTIFY or PLV1_NOTIFY
         */
        payload_type_t type;
 };
@@ -427,7 +427,7 @@ METHOD(payload_t, verify, status_t,
        {
                case INVALID_KE_PAYLOAD:
                {
-                       if (this->type == NOTIFY && this->notify_data.len != 2)
+                       if (this->type == PLV2_NOTIFY && this->notify_data.len != 2)
                        {
                                bad_length = TRUE;
                        }
@@ -447,7 +447,7 @@ METHOD(payload_t, verify, status_t,
                case INVALID_MAJOR_VERSION:
                case NO_PROPOSAL_CHOSEN:
                {
-                       if (this->type == NOTIFY && this->notify_data.len != 0)
+                       if (this->type == PLV2_NOTIFY && this->notify_data.len != 0)
                        {
                                bad_length = TRUE;
                        }
@@ -531,7 +531,7 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_notify_payload_t *this, encoding_rule_t **rules)
 {
-       if (this->type == NOTIFY)
+       if (this->type == PLV2_NOTIFY)
        {
                *rules = encodings_v2;
                return countof(encodings_v2);
@@ -543,7 +543,7 @@ METHOD(payload_t, get_encoding_rules, int,
 METHOD(payload_t, get_header_length, int,
        private_notify_payload_t *this)
 {
-       if (this->type == NOTIFY)
+       if (this->type == PLV2_NOTIFY)
        {
                return 8 + this->spi_size;
        }
@@ -726,7 +726,7 @@ notify_payload_t *notify_payload_create(payload_type_t type)
                        .destroy = _destroy,
                },
                .doi = IKEV1_DOI_IPSEC,
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .type = type,
        );
        compute_length(this);
index c67644a014cbf8550570a819249fa0482fe6b993..3c56f0673ec4edb00120f7b7b08b4f2d4a7a47b8 100644 (file)
@@ -281,7 +281,7 @@ struct notify_payload_t {
 /**
  * Creates an empty notify_payload_t object
  *
- * @param type         payload type, NOTIFY or NOTIFY_V1
+ * @param type         payload type, PLV2_NOTIFY or PLV1_NOTIFY
  * @return                     created notify_payload_t object
  */
 notify_payload_t *notify_payload_create(payload_type_t type);
@@ -289,7 +289,7 @@ notify_payload_t *notify_payload_create(payload_type_t type);
 /**
  * Creates an notify_payload_t object of specific type for specific protocol id.
  *
- * @param type                                 payload type, NOTIFY or NOTIFY_V1
+ * @param type                                 payload type, PLV2_NOTIFY or PLV1_NOTIFY
  * @param protocol                             protocol id (IKE, AH or ESP)
  * @param notify                               type of notify
  * @return                                             notify_payload_t object
index f9dd33edb66749bf4aa5a74d4593da455b626813..fd616620db4a8dd63a62eb470a4a10aa08e85185 100644 (file)
 #include <encoding/payloads/fragment_payload.h>
 #include <encoding/payloads/unknown_payload.h>
 
-ENUM_BEGIN(payload_type_names, NO_PAYLOAD, NO_PAYLOAD,
-       "NO_PAYLOAD");
-ENUM_NEXT(payload_type_names, SECURITY_ASSOCIATION_V1, CONFIGURATION_V1, NO_PAYLOAD,
+ENUM_BEGIN(payload_type_names, PL_NONE, PL_NONE,
+       "PL_NONE");
+ENUM_NEXT(payload_type_names, PLV1_SECURITY_ASSOCIATION, PLV1_CONFIGURATION, PL_NONE,
        "SECURITY_ASSOCIATION_V1",
        "PROPOSAL_V1",
        "TRANSFORM_V1",
        "KEY_EXCHANGE_V1",
        "ID_V1",
        "CERTIFICATE_V1",
-       "CERTIFICATE_REQUEST_V1",
+       "CERTREQ_V1",
        "HASH_V1",
        "SIGNATURE_V1",
        "NONCE_V1",
@@ -56,41 +56,41 @@ ENUM_NEXT(payload_type_names, SECURITY_ASSOCIATION_V1, CONFIGURATION_V1, NO_PAYL
        "DELETE_V1",
        "VENDOR_ID_V1",
        "CONFIGURATION_V1");
-ENUM_NEXT(payload_type_names, NAT_D_V1, NAT_OA_V1, CONFIGURATION_V1,
+ENUM_NEXT(payload_type_names, PLV1_NAT_D, PLV1_NAT_OA, PLV1_CONFIGURATION,
        "NAT_D_V1",
        "NAT_OA_V1");
-ENUM_NEXT(payload_type_names, SECURITY_ASSOCIATION, GENERIC_SECURE_PASSWORD_METHOD, NAT_OA_V1,
+ENUM_NEXT(payload_type_names, PLV2_SECURITY_ASSOCIATION, PLV2_GSPM, PLV1_NAT_OA,
        "SECURITY_ASSOCIATION",
        "KEY_EXCHANGE",
        "ID_INITIATOR",
        "ID_RESPONDER",
        "CERTIFICATE",
-       "CERTIFICATE_REQUEST",
-       "AUTHENTICATION",
+       "CERTREQ",
+       "AUTH",
        "NONCE",
        "NOTIFY",
        "DELETE",
        "VENDOR_ID",
-       "TRAFFIC_SELECTOR_INITIATOR",
-       "TRAFFIC_SELECTOR_RESPONDER",
+       "TS_INITIATOR",
+       "TS_RESPONDER",
        "ENCRYPTED",
        "CONFIGURATION",
-       "EXTENSIBLE_AUTHENTICATION",
-       "GENERIC_SECURE_PASSWORD_METHOD");
+       "EAP",
+       "GSPM");
 #ifdef ME
-ENUM_NEXT(payload_type_names, ID_PEER, ID_PEER, GENERIC_SECURE_PASSWORD_METHOD,
+ENUM_NEXT(payload_type_names, PLV2_ID_PEER, PLV2_ID_PEER, PLV2_GSPM,
        "ID_PEER");
-ENUM_NEXT(payload_type_names, NAT_D_DRAFT_00_03_V1, FRAGMENT_V1, ID_PEER,
+ENUM_NEXT(payload_type_names, PLV1_NAT_D_DRAFT_00_03, PLV1_FRAGMENT, PLV2_ID_PEER,
        "NAT_D_DRAFT_V1",
        "NAT_OA_DRAFT_V1",
        "FRAGMENT");
 #else
-ENUM_NEXT(payload_type_names, NAT_D_DRAFT_00_03_V1, FRAGMENT_V1, GENERIC_SECURE_PASSWORD_METHOD,
+ENUM_NEXT(payload_type_names, PLV1_NAT_D_DRAFT_00_03, PLV1_FRAGMENT, PLV2_GSPM,
        "NAT_D_DRAFT_V1",
        "NAT_OA_DRAFT_V1",
        "FRAGMENT");
 #endif /* ME */
-ENUM_NEXT(payload_type_names, HEADER, ENCRYPTED_V1, FRAGMENT_V1,
+ENUM_NEXT(payload_type_names, PL_HEADER, PLV1_ENCRYPTED, PLV1_FRAGMENT,
        "HEADER",
        "PROPOSAL_SUBSTRUCTURE",
        "PROPOSAL_SUBSTRUCTURE_V1",
@@ -102,12 +102,12 @@ ENUM_NEXT(payload_type_names, HEADER, ENCRYPTED_V1, FRAGMENT_V1,
        "CONFIGURATION_ATTRIBUTE",
        "CONFIGURATION_ATTRIBUTE_V1",
        "ENCRYPTED_V1");
-ENUM_END(payload_type_names, ENCRYPTED_V1);
+ENUM_END(payload_type_names, PLV1_ENCRYPTED);
 
 /* short forms of payload names */
-ENUM_BEGIN(payload_type_short_names, NO_PAYLOAD, NO_PAYLOAD,
+ENUM_BEGIN(payload_type_short_names, PL_NONE, PL_NONE,
        "--");
-ENUM_NEXT(payload_type_short_names, SECURITY_ASSOCIATION_V1, CONFIGURATION_V1, NO_PAYLOAD,
+ENUM_NEXT(payload_type_short_names, PLV1_SECURITY_ASSOCIATION, PLV1_CONFIGURATION, PL_NONE,
        "SA",
        "PROP",
        "TRANS",
@@ -122,10 +122,10 @@ ENUM_NEXT(payload_type_short_names, SECURITY_ASSOCIATION_V1, CONFIGURATION_V1, N
        "D",
        "V",
        "CP");
-ENUM_NEXT(payload_type_short_names, NAT_D_V1, NAT_OA_V1, CONFIGURATION_V1,
+ENUM_NEXT(payload_type_short_names, PLV1_NAT_D, PLV1_NAT_OA, PLV1_CONFIGURATION,
        "NAT-D",
        "NAT-OA");
-ENUM_NEXT(payload_type_short_names, SECURITY_ASSOCIATION, GENERIC_SECURE_PASSWORD_METHOD, NAT_OA_V1,
+ENUM_NEXT(payload_type_short_names, PLV2_SECURITY_ASSOCIATION, PLV2_GSPM, PLV1_NAT_OA,
        "SA",
        "KE",
        "IDi",
@@ -144,19 +144,19 @@ ENUM_NEXT(payload_type_short_names, SECURITY_ASSOCIATION, GENERIC_SECURE_PASSWOR
        "EAP",
        "GSPM");
 #ifdef ME
-ENUM_NEXT(payload_type_short_names, ID_PEER, ID_PEER, GENERIC_SECURE_PASSWORD_METHOD,
+ENUM_NEXT(payload_type_short_names, PLV2_ID_PEER, PLV2_ID_PEER, PLV2_GSPM,
        "IDp");
-ENUM_NEXT(payload_type_short_names, NAT_D_DRAFT_00_03_V1, FRAGMENT_V1, ID_PEER,
+ENUM_NEXT(payload_type_short_names, PLV1_NAT_D_DRAFT_00_03, PLV1_FRAGMENT, PLV2_ID_PEER,
        "NAT-D",
        "NAT-OA",
        "FRAG");
 #else
-ENUM_NEXT(payload_type_short_names, NAT_D_DRAFT_00_03_V1, FRAGMENT_V1, GENERIC_SECURE_PASSWORD_METHOD,
+ENUM_NEXT(payload_type_short_names, PLV1_NAT_D_DRAFT_00_03, PLV1_FRAGMENT, PLV2_GSPM,
        "NAT-D",
        "NAT-OA",
        "FRAG");
 #endif /* ME */
-ENUM_NEXT(payload_type_short_names, HEADER, ENCRYPTED_V1, FRAGMENT_V1,
+ENUM_NEXT(payload_type_short_names, PL_HEADER, PLV1_ENCRYPTED, PLV1_FRAGMENT,
        "HDR",
        "PROP",
        "PROP",
@@ -168,7 +168,7 @@ ENUM_NEXT(payload_type_short_names, HEADER, ENCRYPTED_V1, FRAGMENT_V1,
        "CATTR",
        "CATTR",
        "E");
-ENUM_END(payload_type_short_names, ENCRYPTED_V1);
+ENUM_END(payload_type_short_names, PLV1_ENCRYPTED);
 
 /*
  * see header
@@ -177,75 +177,75 @@ payload_t *payload_create(payload_type_t type)
 {
        switch (type)
        {
-               case HEADER:
+               case PL_HEADER:
                        return (payload_t*)ike_header_create();
-               case SECURITY_ASSOCIATION:
-               case SECURITY_ASSOCIATION_V1:
+               case PLV2_SECURITY_ASSOCIATION:
+               case PLV1_SECURITY_ASSOCIATION:
                        return (payload_t*)sa_payload_create(type);
-               case PROPOSAL_SUBSTRUCTURE:
-               case PROPOSAL_SUBSTRUCTURE_V1:
+               case PLV2_PROPOSAL_SUBSTRUCTURE:
+               case PLV1_PROPOSAL_SUBSTRUCTURE:
                        return (payload_t*)proposal_substructure_create(type);
-               case TRANSFORM_SUBSTRUCTURE:
-               case TRANSFORM_SUBSTRUCTURE_V1:
+               case PLV2_TRANSFORM_SUBSTRUCTURE:
+               case PLV1_TRANSFORM_SUBSTRUCTURE:
                        return (payload_t*)transform_substructure_create(type);
-               case TRANSFORM_ATTRIBUTE:
-               case TRANSFORM_ATTRIBUTE_V1:
+               case PLV2_TRANSFORM_ATTRIBUTE:
+               case PLV1_TRANSFORM_ATTRIBUTE:
                        return (payload_t*)transform_attribute_create(type);
-               case NONCE:
-               case NONCE_V1:
+               case PLV2_NONCE:
+               case PLV1_NONCE:
                        return (payload_t*)nonce_payload_create(type);
-               case ID_INITIATOR:
-               case ID_RESPONDER:
-               case ID_V1:
-               case NAT_OA_V1:
-               case NAT_OA_DRAFT_00_03_V1:
+               case PLV2_ID_INITIATOR:
+               case PLV2_ID_RESPONDER:
+               case PLV1_ID:
+               case PLV1_NAT_OA:
+               case PLV1_NAT_OA_DRAFT_00_03:
 #ifdef ME
-               case ID_PEER:
+               case PLV2_ID_PEER:
 #endif /* ME */
                        return (payload_t*)id_payload_create(type);
-               case AUTHENTICATION:
+               case PLV2_AUTH:
                        return (payload_t*)auth_payload_create();
-               case CERTIFICATE:
-               case CERTIFICATE_V1:
+               case PLV2_CERTIFICATE:
+               case PLV1_CERTIFICATE:
                        return (payload_t*)cert_payload_create(type);
-               case CERTIFICATE_REQUEST:
-               case CERTIFICATE_REQUEST_V1:
+               case PLV2_CERTREQ:
+               case PLV1_CERTREQ:
                        return (payload_t*)certreq_payload_create(type);
-               case TRAFFIC_SELECTOR_SUBSTRUCTURE:
+               case PLV2_TRAFFIC_SELECTOR_SUBSTRUCTURE:
                        return (payload_t*)traffic_selector_substructure_create();
-               case TRAFFIC_SELECTOR_INITIATOR:
+               case PLV2_TS_INITIATOR:
                        return (payload_t*)ts_payload_create(TRUE);
-               case TRAFFIC_SELECTOR_RESPONDER:
+               case PLV2_TS_RESPONDER:
                        return (payload_t*)ts_payload_create(FALSE);
-               case KEY_EXCHANGE:
-               case KEY_EXCHANGE_V1:
+               case PLV2_KEY_EXCHANGE:
+               case PLV1_KEY_EXCHANGE:
                        return (payload_t*)ke_payload_create(type);
-               case NOTIFY:
-               case NOTIFY_V1:
+               case PLV2_NOTIFY:
+               case PLV1_NOTIFY:
                        return (payload_t*)notify_payload_create(type);
-               case DELETE:
-               case DELETE_V1:
+               case PLV2_DELETE:
+               case PLV1_DELETE:
                        return (payload_t*)delete_payload_create(type, 0);
-               case VENDOR_ID:
-               case VENDOR_ID_V1:
+               case PLV2_VENDOR_ID:
+               case PLV1_VENDOR_ID:
                        return (payload_t*)vendor_id_payload_create(type);
-               case HASH_V1:
-               case SIGNATURE_V1:
-               case NAT_D_V1:
-               case NAT_D_DRAFT_00_03_V1:
+               case PLV1_HASH:
+               case PLV1_SIGNATURE:
+               case PLV1_NAT_D:
+               case PLV1_NAT_D_DRAFT_00_03:
                        return (payload_t*)hash_payload_create(type);
-               case CONFIGURATION:
-               case CONFIGURATION_V1:
+               case PLV2_CONFIGURATION:
+               case PLV1_CONFIGURATION:
                        return (payload_t*)cp_payload_create(type);
-               case CONFIGURATION_ATTRIBUTE:
-               case CONFIGURATION_ATTRIBUTE_V1:
+               case PLV2_CONFIGURATION_ATTRIBUTE:
+               case PLV1_CONFIGURATION_ATTRIBUTE:
                        return (payload_t*)configuration_attribute_create(type);
-               case EXTENSIBLE_AUTHENTICATION:
+               case PLV2_EAP:
                        return (payload_t*)eap_payload_create();
-               case ENCRYPTED:
-               case ENCRYPTED_V1:
+               case PLV2_ENCRYPTED:
+               case PLV1_ENCRYPTED:
                        return (payload_t*)encryption_payload_create(type);
-               case FRAGMENT_V1:
+               case PLV1_FRAGMENT:
                        return (payload_t*)fragment_payload_create();
                default:
                        return (payload_t*)unknown_payload_create(type);
@@ -257,29 +257,29 @@ payload_t *payload_create(payload_type_t type)
  */
 bool payload_is_known(payload_type_t type)
 {
-       if (type == HEADER)
+       if (type == PL_HEADER)
        {
                return TRUE;
        }
-       if (type >= SECURITY_ASSOCIATION && type <= EXTENSIBLE_AUTHENTICATION)
+       if (type >= PLV2_SECURITY_ASSOCIATION && type <= PLV2_EAP)
        {
                return TRUE;
        }
-       if (type >= SECURITY_ASSOCIATION_V1 && type <= CONFIGURATION_V1)
+       if (type >= PLV1_SECURITY_ASSOCIATION && type <= PLV1_CONFIGURATION)
        {
                return TRUE;
        }
-       if (type >= NAT_D_V1 && type <= NAT_OA_V1)
+       if (type >= PLV1_NAT_D && type <= PLV1_NAT_OA)
        {
                return TRUE;
        }
 #ifdef ME
-       if (type == ID_PEER)
+       if (type == PLV2_ID_PEER)
        {
                return TRUE;
        }
 #endif
-       if (type >= NAT_D_DRAFT_00_03_V1 && type <= FRAGMENT_V1)
+       if (type >= PLV1_NAT_D_DRAFT_00_03 && type <= PLV1_FRAGMENT)
        {
                return TRUE;
        }
index 0e8a9267bb1b17f3b4a6b47cb6eeb08da1c6e285..d9dd619f74ca1940c1e26965b8dbcf0de7da8374 100644 (file)
@@ -45,195 +45,195 @@ enum payload_type_t {
        /**
         * End of payload list in next_payload
         */
-       NO_PAYLOAD = 0,
+       PL_NONE = 0,
 
        /**
         * The security association (SA) payload containing proposals.
         */
-       SECURITY_ASSOCIATION_V1 = 1,
+       PLV1_SECURITY_ASSOCIATION = 1,
 
        /**
         * The proposal payload, containing transforms.
         */
-       PROPOSAL_V1 = 2,
+       PLV1_PROPOSAL = 2,
 
        /**
         * The transform payload.
         */
-       TRANSFORM_V1 = 3,
+       PLV1_TRANSFORM = 3,
 
        /**
         * The key exchange (KE) payload containing diffie-hellman values.
         */
-       KEY_EXCHANGE_V1 = 4,
+       PLV1_KEY_EXCHANGE = 4,
 
        /**
         * ID payload.
         */
-       ID_V1 = 5,
+       PLV1_ID = 5,
 
        /**
         * Certificate payload with certificates (CERT).
         */
-       CERTIFICATE_V1 = 6,
+       PLV1_CERTIFICATE = 6,
 
        /**
         * Certificate request payload.
         */
-       CERTIFICATE_REQUEST_V1 = 7,
+       PLV1_CERTREQ = 7,
 
        /**
         * Hash payload.
         */
-       HASH_V1 = 8,
+       PLV1_HASH = 8,
 
        /**
         * Signature payload
         */
-       SIGNATURE_V1 = 9,
+       PLV1_SIGNATURE = 9,
 
        /**
         * Nonce payload.
         */
-       NONCE_V1 = 10,
+       PLV1_NONCE = 10,
 
        /**
         * Notification payload.
         */
-       NOTIFY_V1 = 11,
+       PLV1_NOTIFY = 11,
 
        /**
         * Delete payload.
         */
-       DELETE_V1 = 12,
+       PLV1_DELETE = 12,
 
        /**
         * Vendor id payload.
         */
-       VENDOR_ID_V1 = 13,
+       PLV1_VENDOR_ID = 13,
 
        /**
         * Attribute payload (ISAKMP Mode Config, aka configuration payload.
         */
-       CONFIGURATION_V1 = 14,
+       PLV1_CONFIGURATION = 14,
 
        /**
         * NAT discovery payload (NAT-D).
         */
-       NAT_D_V1 = 20,
+       PLV1_NAT_D = 20,
 
        /**
         * NAT original address payload (NAT-OA).
         */
-       NAT_OA_V1 = 21,
+       PLV1_NAT_OA = 21,
 
        /**
         * The security association (SA) payload containing proposals.
         */
-       SECURITY_ASSOCIATION = 33,
+       PLV2_SECURITY_ASSOCIATION = 33,
 
        /**
         * The key exchange (KE) payload containing diffie-hellman values.
         */
-       KEY_EXCHANGE = 34,
+       PLV2_KEY_EXCHANGE = 34,
 
        /**
         * Identification for the original initiator (IDi).
         */
-       ID_INITIATOR = 35,
+       PLV2_ID_INITIATOR = 35,
 
        /**
         * Identification for the original responder (IDr).
         */
-       ID_RESPONDER = 36,
+       PLV2_ID_RESPONDER = 36,
 
        /**
         * Certificate payload with certificates (CERT).
         */
-       CERTIFICATE = 37,
+       PLV2_CERTIFICATE = 37,
 
        /**
         * Certificate request payload (CERTREQ).
         */
-       CERTIFICATE_REQUEST = 38,
+       PLV2_CERTREQ = 38,
 
        /**
         * Authentication payload contains auth data (AUTH).
         */
-       AUTHENTICATION = 39,
+       PLV2_AUTH = 39,
 
        /**
         * Nonces, for initiator and responder (Ni, Nr, N)
         */
-       NONCE = 40,
+       PLV2_NONCE = 40,
 
        /**
         * Notify paylaod (N).
         */
-       NOTIFY = 41,
+       PLV2_NOTIFY = 41,
 
        /**
         * Delete payload (D)
         */
-       DELETE = 42,
+       PLV2_DELETE = 42,
 
        /**
         * Vendor id paylpoad (V).
         */
-       VENDOR_ID = 43,
+       PLV2_VENDOR_ID = 43,
 
        /**
         * Traffic selector for the original initiator (TSi).
         */
-       TRAFFIC_SELECTOR_INITIATOR = 44,
+       PLV2_TS_INITIATOR = 44,
 
        /**
         * Traffic selector for the original responser (TSr).
         */
-       TRAFFIC_SELECTOR_RESPONDER = 45,
+       PLV2_TS_RESPONDER = 45,
 
        /**
         * Encryption payload, contains other payloads (E).
         */
-       ENCRYPTED = 46,
+       PLV2_ENCRYPTED = 46,
 
        /**
         * Configuration payload (CP).
         */
-       CONFIGURATION = 47,
+       PLV2_CONFIGURATION = 47,
 
        /**
         * Extensible authentication payload (EAP).
         */
-       EXTENSIBLE_AUTHENTICATION = 48,
+       PLV2_EAP = 48,
 
        /**
         * Generic Secure Password Method (GSPM).
         */
-       GENERIC_SECURE_PASSWORD_METHOD = 49,
+       PLV2_GSPM = 49,
 
 #ifdef ME
        /**
         * Identification payload for peers has a value from
         * the PRIVATE USE space.
         */
-       ID_PEER = 128,
+       PLV2_ID_PEER = 128,
 #endif /* ME */
 
        /**
         * NAT discovery payload (NAT-D) (drafts).
         */
-       NAT_D_DRAFT_00_03_V1 = 130,
+       PLV1_NAT_D_DRAFT_00_03 = 130,
 
        /**
         * NAT original address payload (NAT-OA) (drafts).
         */
-       NAT_OA_DRAFT_00_03_V1 = 131,
+       PLV1_NAT_OA_DRAFT_00_03 = 131,
 
        /**
         * IKE fragment (proprietary IKEv1 extension)
         */
-       FRAGMENT_V1 = 132,
+       PLV1_FRAGMENT = 132,
 
        /**
         * Header has a value of PRIVATE USE space.
@@ -241,57 +241,57 @@ enum payload_type_t {
         * This type and all the following are never sent over wire and are
         * used internally only.
         */
-       HEADER = 256,
+       PL_HEADER = 256,
 
        /**
-        * PROPOSAL_SUBSTRUCTURE, IKEv2 proposals in a SA payload.
+        * PLV2_PROPOSAL_SUBSTRUCTURE, IKEv2 proposals in a SA payload.
         */
-       PROPOSAL_SUBSTRUCTURE,
+       PLV2_PROPOSAL_SUBSTRUCTURE,
 
        /**
-        * PROPOSAL_SUBSTRUCTURE_V1, IKEv1 proposals in a SA payload.
+        * PLV1_PROPOSAL_SUBSTRUCTURE, IKEv1 proposals in a SA payload.
         */
-       PROPOSAL_SUBSTRUCTURE_V1,
+       PLV1_PROPOSAL_SUBSTRUCTURE,
 
        /**
-        * TRANSFORM_SUBSTRUCTURE, IKEv2 transforms in a proposal substructure.
+        * PLV2_TRANSFORM_SUBSTRUCTURE, IKEv2 transforms in a proposal substructure.
         */
-       TRANSFORM_SUBSTRUCTURE,
+       PLV2_TRANSFORM_SUBSTRUCTURE,
 
        /**
-        * TRANSFORM_SUBSTRUCTURE_V1, IKEv1 transforms in a proposal substructure.
+        * PLV1_TRANSFORM_SUBSTRUCTURE, IKEv1 transforms in a proposal substructure.
         */
-       TRANSFORM_SUBSTRUCTURE_V1,
+       PLV1_TRANSFORM_SUBSTRUCTURE,
 
        /**
-        * TRANSFORM_ATTRIBUTE, IKEv2 attribute in a transform.
+        * PLV2_TRANSFORM_ATTRIBUTE, IKEv2 attribute in a transform.
         */
-       TRANSFORM_ATTRIBUTE,
+       PLV2_TRANSFORM_ATTRIBUTE,
 
        /**
-        * TRANSFORM_ATTRIBUTE_V1, IKEv1 attribute in a transform.
+        * PLV1_TRANSFORM_ATTRIBUTE, IKEv1 attribute in a transform.
         */
-       TRANSFORM_ATTRIBUTE_V1,
+       PLV1_TRANSFORM_ATTRIBUTE,
 
        /**
-        * TRAFFIC_SELECTOR_SUBSTRUCTURE, traffic selector in a TS payload.
+        * PLV2_TRAFFIC_SELECTOR_SUBSTRUCTURE, traffic selector in a TS payload.
         */
-       TRAFFIC_SELECTOR_SUBSTRUCTURE,
+       PLV2_TRAFFIC_SELECTOR_SUBSTRUCTURE,
 
        /**
-        * CONFIGURATION_ATTRIBUTE, IKEv2 attribute in a configuration payload.
+        * PLV2_CONFIGURATION_ATTRIBUTE, IKEv2 attribute in a configuration payload.
         */
-       CONFIGURATION_ATTRIBUTE,
+       PLV2_CONFIGURATION_ATTRIBUTE,
 
        /**
-        * CONFIGURATION_ATTRIBUTE_V1, IKEv1 attribute in a configuration payload.
+        * PLV1_CONFIGURATION_ATTRIBUTE, IKEv1 attribute in a configuration payload.
         */
-       CONFIGURATION_ATTRIBUTE_V1,
+       PLV1_CONFIGURATION_ATTRIBUTE,
 
        /**
         * This is not really a payload, but rather the complete IKEv1 message.
         */
-       ENCRYPTED_V1,
+       PLV1_ENCRYPTED,
 };
 
 /**
@@ -336,7 +336,7 @@ struct payload_t {
        payload_type_t (*get_type) (payload_t *this);
 
        /**
-        * Get type of next payload or NO_PAYLOAD (0) if this is the last one.
+        * Get type of next payload or PL_NONE (0) if this is the last one.
         *
         * @return                              type of next payload
         */
index 3e35b75c650203b6e66e92c954489c2cdb567221..53e8cf3ad338c5ac23ebe119bd782590d9c1bddc 100644 (file)
@@ -88,7 +88,7 @@ struct private_proposal_substructure_t {
        linked_list_t *transforms;
 
        /**
-        * Type of this payload, PROPOSAL_SUBSTRUCTURE or PROPOSAL_SUBSTRUCTURE_V1
+        * Type of this payload, PLV2_PROPOSAL_SUBSTRUCTURE or PLV1_PROPOSAL_SUBSTRUCTURE
         */
        payload_type_t type;
 };
@@ -114,7 +114,7 @@ static encoding_rule_t encodings_v1[] = {
        /* SPI is a chunk of variable size*/
        { SPI,                          offsetof(private_proposal_substructure_t, spi)                          },
        /* Transforms are stored in a transform substructure list */
-       { PAYLOAD_LIST + TRANSFORM_SUBSTRUCTURE_V1,
+       { PAYLOAD_LIST + PLV1_TRANSFORM_SUBSTRUCTURE,
                                                offsetof(private_proposal_substructure_t, transforms)           },
 };
 
@@ -139,7 +139,7 @@ static encoding_rule_t encodings_v2[] = {
        /* SPI is a chunk of variable size*/
        { SPI,                          offsetof(private_proposal_substructure_t, spi)                          },
        /* Transforms are stored in a transform substructure list */
-       { PAYLOAD_LIST + TRANSFORM_SUBSTRUCTURE,
+       { PAYLOAD_LIST + PLV2_TRANSFORM_SUBSTRUCTURE,
                                                offsetof(private_proposal_substructure_t, transforms)           },
 };
 
@@ -329,7 +329,7 @@ METHOD(payload_t, verify, status_t,
        enumerator_t *enumerator;
        payload_t *current;
 
-       if (this->next_payload != NO_PAYLOAD && this->next_payload != 2)
+       if (this->next_payload != PL_NONE && this->next_payload != 2)
        {
                /* must be 0 or 2 */
                DBG1(DBG_ENC, "inconsistent next payload");
@@ -361,7 +361,7 @@ METHOD(payload_t, verify, status_t,
                        }
                        break;
                case PROTO_IKE:
-                       if (this->type == PROPOSAL_SUBSTRUCTURE_V1)
+                       if (this->type == PLV1_PROPOSAL_SUBSTRUCTURE)
                        {
                                if (this->spi.len <= 16)
                                {       /* according to RFC 2409, section 3.5 anything between
@@ -397,7 +397,7 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_proposal_substructure_t *this, encoding_rule_t **rules)
 {
-       if (this->type == PROPOSAL_SUBSTRUCTURE)
+       if (this->type == PLV2_PROPOSAL_SUBSTRUCTURE)
        {
                *rules = encodings_v2;
                return countof(encodings_v2);
@@ -1028,7 +1028,7 @@ METHOD(proposal_substructure_t, get_proposals, void,
                        proposal->set_spi(proposal, spi);
                        proposals->insert_last(proposals, proposal);
                }
-               if (this->type == PROPOSAL_SUBSTRUCTURE)
+               if (this->type == PLV2_PROPOSAL_SUBSTRUCTURE)
                {
                        add_to_proposal_v2(proposal, transform);
                }
@@ -1266,7 +1266,7 @@ proposal_substructure_t *proposal_substructure_create(payload_type_t type)
                        .get_encap_mode = _get_encap_mode,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .transforms = linked_list_create(),
                .type = type,
        );
@@ -1286,7 +1286,7 @@ static void set_from_proposal_v1_ike(private_proposal_substructure_t *this,
        u_int16_t alg, key_size;
        enumerator_t *enumerator;
 
-       transform = transform_substructure_create_type(TRANSFORM_SUBSTRUCTURE_V1,
+       transform = transform_substructure_create_type(PLV1_TRANSFORM_SUBSTRUCTURE,
                                                                                                number, IKEV1_TRANSID_KEY_IKE);
 
        enumerator = proposal->create_enumerator(proposal, ENCRYPTION_ALGORITHM);
@@ -1296,12 +1296,12 @@ static void set_from_proposal_v1_ike(private_proposal_substructure_t *this,
                if (alg)
                {
                        transform->add_transform_attribute(transform,
-                               transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                               transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                                        TATTR_PH1_ENCRYPTION_ALGORITHM, alg));
                        if (key_size)
                        {
                                transform->add_transform_attribute(transform,
-                                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                                                TATTR_PH1_KEY_LENGTH, key_size));
                        }
                        break;
@@ -1317,7 +1317,7 @@ static void set_from_proposal_v1_ike(private_proposal_substructure_t *this,
                if (alg)
                {
                        transform->add_transform_attribute(transform,
-                               transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                               transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                                        TATTR_PH1_HASH_ALGORITHM, alg));
                        break;
                }
@@ -1328,19 +1328,19 @@ static void set_from_proposal_v1_ike(private_proposal_substructure_t *this,
        if (enumerator->enumerate(enumerator, &alg, &key_size))
        {
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                                TATTR_PH1_GROUP, alg));
        }
        enumerator->destroy(enumerator);
 
        transform->add_transform_attribute(transform,
-               transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+               transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH1_AUTH_METHOD, get_ikev1_auth(method)));
        transform->add_transform_attribute(transform,
-               transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+               transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH1_LIFE_TYPE, IKEV1_LIFE_TYPE_SECONDS));
        transform->add_transform_attribute(transform,
-               transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+               transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH1_LIFE_DURATION, lifetime));
 
        add_transform_substructure(this, transform);
@@ -1366,11 +1366,11 @@ static void set_from_proposal_v1(private_proposal_substructure_t *this,
                if (alg)
                {
                        transform = transform_substructure_create_type(
-                                                                       TRANSFORM_SUBSTRUCTURE_V1, number, alg);
+                                                                       PLV1_TRANSFORM_SUBSTRUCTURE, number, alg);
                        if (key_size)
                        {
                                transform->add_transform_attribute(transform,
-                                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                                                        TATTR_PH2_KEY_LENGTH, key_size));
                        }
                }
@@ -1386,10 +1386,10 @@ static void set_from_proposal_v1(private_proposal_substructure_t *this,
                        if (!transform)
                        {
                                transform = transform_substructure_create_type(
-                                                                       TRANSFORM_SUBSTRUCTURE_V1, number, alg);
+                                                                       PLV1_TRANSFORM_SUBSTRUCTURE, number, alg);
                        }
                        transform->add_transform_attribute(transform,
-                               transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                               transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                                        TATTR_PH2_AUTH_ALGORITHM, alg));
                }
        }
@@ -1404,30 +1404,30 @@ static void set_from_proposal_v1(private_proposal_substructure_t *this,
        if (enumerator->enumerate(enumerator, &alg, &key_size))
        {
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                                        TATTR_PH2_GROUP, alg));
        }
        enumerator->destroy(enumerator);
 
        transform->add_transform_attribute(transform,
-               transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+               transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_ENCAP_MODE, get_ikev1_mode(mode, udp)));
        if (lifetime)
        {
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_SA_LIFE_TYPE, IKEV1_LIFE_TYPE_SECONDS));
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_SA_LIFE_DURATION, lifetime));
        }
        if (lifebytes)
        {
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_SA_LIFE_TYPE, IKEV1_LIFE_TYPE_KILOBYTES));
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_SA_LIFE_DURATION, lifebytes / 1000));
        }
 
@@ -1448,12 +1448,12 @@ static void set_from_proposal_v2(private_proposal_substructure_t *this,
        enumerator = proposal->create_enumerator(proposal, ENCRYPTION_ALGORITHM);
        while (enumerator->enumerate(enumerator, &alg, &key_size))
        {
-               transform = transform_substructure_create_type(TRANSFORM_SUBSTRUCTURE,
+               transform = transform_substructure_create_type(PLV2_TRANSFORM_SUBSTRUCTURE,
                                                                                                ENCRYPTION_ALGORITHM, alg);
                if (key_size)
                {
                        transform->add_transform_attribute(transform,
-                               transform_attribute_create_value(TRANSFORM_ATTRIBUTE,
+                               transform_attribute_create_value(PLV2_TRANSFORM_ATTRIBUTE,
                                                                                        TATTR_IKEV2_KEY_LENGTH, key_size));
                }
                add_transform_substructure(this, transform);
@@ -1464,7 +1464,7 @@ static void set_from_proposal_v2(private_proposal_substructure_t *this,
        enumerator = proposal->create_enumerator(proposal, INTEGRITY_ALGORITHM);
        while (enumerator->enumerate(enumerator, &alg, &key_size))
        {
-               transform = transform_substructure_create_type(TRANSFORM_SUBSTRUCTURE,
+               transform = transform_substructure_create_type(PLV2_TRANSFORM_SUBSTRUCTURE,
                                                                                                INTEGRITY_ALGORITHM, alg);
                add_transform_substructure(this, transform);
        }
@@ -1474,7 +1474,7 @@ static void set_from_proposal_v2(private_proposal_substructure_t *this,
        enumerator = proposal->create_enumerator(proposal, PSEUDO_RANDOM_FUNCTION);
        while (enumerator->enumerate(enumerator, &alg, &key_size))
        {
-               transform = transform_substructure_create_type(TRANSFORM_SUBSTRUCTURE,
+               transform = transform_substructure_create_type(PLV2_TRANSFORM_SUBSTRUCTURE,
                                                                                                PSEUDO_RANDOM_FUNCTION, alg);
                add_transform_substructure(this, transform);
        }
@@ -1484,7 +1484,7 @@ static void set_from_proposal_v2(private_proposal_substructure_t *this,
        enumerator = proposal->create_enumerator(proposal, DIFFIE_HELLMAN_GROUP);
        while (enumerator->enumerate(enumerator, &alg, NULL))
        {
-               transform = transform_substructure_create_type(TRANSFORM_SUBSTRUCTURE,
+               transform = transform_substructure_create_type(PLV2_TRANSFORM_SUBSTRUCTURE,
                                                                                                DIFFIE_HELLMAN_GROUP, alg);
                add_transform_substructure(this, transform);
        }
@@ -1494,7 +1494,7 @@ static void set_from_proposal_v2(private_proposal_substructure_t *this,
        enumerator = proposal->create_enumerator(proposal, EXTENDED_SEQUENCE_NUMBERS);
        while (enumerator->enumerate(enumerator, &alg, NULL))
        {
-               transform = transform_substructure_create_type(TRANSFORM_SUBSTRUCTURE,
+               transform = transform_substructure_create_type(PLV2_TRANSFORM_SUBSTRUCTURE,
                                                                                                EXTENDED_SEQUENCE_NUMBERS, alg);
                add_transform_substructure(this, transform);
        }
@@ -1543,7 +1543,7 @@ proposal_substructure_t *proposal_substructure_create_from_proposal_v2(
        private_proposal_substructure_t *this;
 
        this = (private_proposal_substructure_t*)
-                                                       proposal_substructure_create(SECURITY_ASSOCIATION);
+                                                       proposal_substructure_create(PLV2_SECURITY_ASSOCIATION);
        set_from_proposal_v2(this, proposal);
        set_data(this, proposal);
 
@@ -1560,7 +1560,7 @@ proposal_substructure_t *proposal_substructure_create_from_proposal_v1(
        private_proposal_substructure_t *this;
 
        this = (private_proposal_substructure_t*)
-                                               proposal_substructure_create(PROPOSAL_SUBSTRUCTURE_V1);
+                                               proposal_substructure_create(PLV1_PROPOSAL_SUBSTRUCTURE);
        switch (proposal->get_protocol(proposal))
        {
                case PROTO_IKE:
@@ -1636,31 +1636,31 @@ proposal_substructure_t *proposal_substructure_create_for_ipcomp_v1(
 
 
        this = (private_proposal_substructure_t*)
-                                               proposal_substructure_create(PROPOSAL_SUBSTRUCTURE_V1);
+                                               proposal_substructure_create(PLV1_PROPOSAL_SUBSTRUCTURE);
 
        /* we currently support DEFLATE only */
-       transform = transform_substructure_create_type(TRANSFORM_SUBSTRUCTURE_V1,
+       transform = transform_substructure_create_type(PLV1_TRANSFORM_SUBSTRUCTURE,
                                                                                                   1, IKEV1_IPCOMP_DEFLATE);
 
        transform->add_transform_attribute(transform,
-               transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+               transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_ENCAP_MODE, get_ikev1_mode(mode, udp)));
        if (lifetime)
        {
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_SA_LIFE_TYPE, IKEV1_LIFE_TYPE_SECONDS));
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_SA_LIFE_DURATION, lifetime));
        }
        if (lifebytes)
        {
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_SA_LIFE_TYPE, IKEV1_LIFE_TYPE_KILOBYTES));
                transform->add_transform_attribute(transform,
-                       transform_attribute_create_value(TRANSFORM_ATTRIBUTE_V1,
+                       transform_attribute_create_value(PLV1_TRANSFORM_ATTRIBUTE,
                                                        TATTR_PH2_SA_LIFE_DURATION, lifebytes / 1000));
        }
 
index c8e7adfd881d31704d43d2802c2d503985ced221..c4614b88fade3e8d1ac0dc60d21ebd752acf6817 100644 (file)
@@ -168,7 +168,7 @@ struct proposal_substructure_t {
 /**
  * Creates an empty proposal_substructure_t object
  *
- * @param type         PROPOSAL_SUBSTRUCTURE or PROPOSAL_SUBSTRUCTURE_V1
+ * @param type         PLV2_PROPOSAL_SUBSTRUCTURE or PLV1_PROPOSAL_SUBSTRUCTURE
  * @return                     proposal_substructure_t object
  */
 proposal_substructure_t *proposal_substructure_create(payload_type_t type);
@@ -177,7 +177,7 @@ proposal_substructure_t *proposal_substructure_create(payload_type_t type);
  * Creates an IKEv2 proposal_substructure_t from a proposal_t.
  *
  * @param proposal     proposal to build a substruct out of it
- * @return                     proposal_substructure_t PROPOSAL_SUBSTRUCTURE
+ * @return                     proposal_substructure_t PLV2_PROPOSAL_SUBSTRUCTURE
  */
 proposal_substructure_t *proposal_substructure_create_from_proposal_v2(
                                                                                                                proposal_t *proposal);
@@ -190,7 +190,7 @@ proposal_substructure_t *proposal_substructure_create_from_proposal_v2(
  * @param auth         authentication method to use, or AUTH_NONE
  * @param mode         IPsec encapsulation mode, TRANSPORT or TUNNEL
  * @param udp          ENCAP_UDP to use UDP encapsulation
- * @return                     proposal_substructure_t object PROPOSAL_SUBSTRUCTURE_V1
+ * @return                     proposal_substructure_t object PLV1_PROPOSAL_SUBSTRUCTURE
  */
 proposal_substructure_t *proposal_substructure_create_from_proposal_v1(
                        proposal_t *proposal,  u_int32_t lifetime, u_int64_t lifebytes,
@@ -205,7 +205,7 @@ proposal_substructure_t *proposal_substructure_create_from_proposal_v1(
  * @param auth         authentication method to use, or AUTH_NONE
  * @param mode         IPsec encapsulation mode, TRANSPORT or TUNNEL
  * @param udp          ENCAP_UDP to use UDP encapsulation
- * @return                     IKEv1 proposal_substructure_t PROPOSAL_SUBSTRUCTURE_V1
+ * @return                     IKEv1 proposal_substructure_t PLV1_PROPOSAL_SUBSTRUCTURE
  */
 proposal_substructure_t *proposal_substructure_create_from_proposals_v1(
                        linked_list_t *proposals, u_int32_t lifetime, u_int64_t lifebytes,
@@ -221,7 +221,7 @@ proposal_substructure_t *proposal_substructure_create_from_proposals_v1(
  * @param mode                         IPsec encapsulation mode, TRANSPORT or TUNNEL
  * @param udp                          ENCAP_UDP to use UDP encapsulation
  * @param proposal_number      the proposal number of the proposal to be linked
- * @return                                     IKEv1 proposal_substructure_t PROPOSAL_SUBSTRUCTURE_V1
+ * @return                                     IKEv1 proposal_substructure_t PLV1_PROPOSAL_SUBSTRUCTURE
  */
 proposal_substructure_t *proposal_substructure_create_for_ipcomp_v1(
                        u_int32_t lifetime, u_int64_t lifebytes, u_int16_t cpi,
index 3a5bb43a6812a735664a33fb2ea4dd4283220804..8e3a01285c157b46a280dff7827b316e48a3ab4c 100644 (file)
@@ -101,7 +101,7 @@ static encoding_rule_t encodings_v1[] = {
        /* Situation*/
        { U_INT_32,                     offsetof(private_sa_payload_t, situation)               },
        /* Proposals are stored in a proposal substructure list */
-       { PAYLOAD_LIST + PROPOSAL_SUBSTRUCTURE_V1,
+       { PAYLOAD_LIST + PLV1_PROPOSAL_SUBSTRUCTURE,
                                                offsetof(private_sa_payload_t, proposals)               },
 };
 
@@ -140,7 +140,7 @@ static encoding_rule_t encodings_v2[] = {
        /* Length of the whole SA payload*/
        { PAYLOAD_LENGTH,       offsetof(private_sa_payload_t, payload_length)          },
        /* Proposals are stored in a proposal substructure list */
-       { PAYLOAD_LIST + PROPOSAL_SUBSTRUCTURE,
+       { PAYLOAD_LIST + PLV2_PROPOSAL_SUBSTRUCTURE,
                                                offsetof(private_sa_payload_t, proposals)                       },
 };
 
@@ -164,7 +164,7 @@ METHOD(payload_t, verify, status_t,
        enumerator_t *enumerator;
        proposal_substructure_t *substruct;
 
-       if (this->type == SECURITY_ASSOCIATION)
+       if (this->type == PLV2_SECURITY_ASSOCIATION)
        {
                expected_number = 1;
        }
@@ -196,7 +196,7 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_sa_payload_t *this, encoding_rule_t **rules)
 {
-       if (this->type == SECURITY_ASSOCIATION_V1)
+       if (this->type == PLV1_SECURITY_ASSOCIATION)
        {
                *rules = encodings_v1;
                return countof(encodings_v1);
@@ -208,7 +208,7 @@ METHOD(payload_t, get_encoding_rules, int,
 METHOD(payload_t, get_header_length, int,
        private_sa_payload_t *this)
 {
-       if (this->type == SECURITY_ASSOCIATION_V1)
+       if (this->type == PLV1_SECURITY_ASSOCIATION)
        {
                return 12;
        }
@@ -295,7 +295,7 @@ METHOD(sa_payload_t, get_proposals, linked_list_t*,
        proposal_substructure_t *substruct;
        linked_list_t *substructs, *list;
 
-       if (this->type == SECURITY_ASSOCIATION_V1)
+       if (this->type == PLV1_SECURITY_ASSOCIATION)
        {       /* IKEv1 proposals start with 0 */
                struct_number = ignore_struct_number = -1;
        }
@@ -502,7 +502,7 @@ sa_payload_t *sa_payload_create(payload_type_t type)
                        .get_encap_mode = _get_encap_mode,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .proposals = linked_list_create(),
                .type = type,
                /* for IKEv1 only */
@@ -524,7 +524,7 @@ sa_payload_t *sa_payload_create_from_proposals_v2(linked_list_t *proposals)
        enumerator_t *enumerator;
        proposal_t *proposal;
 
-       this = (private_sa_payload_t*)sa_payload_create(SECURITY_ASSOCIATION);
+       this = (private_sa_payload_t*)sa_payload_create(PLV2_SECURITY_ASSOCIATION);
        enumerator = proposals->create_enumerator(proposals);
        while (enumerator->enumerate(enumerator, &proposal))
        {
@@ -542,7 +542,7 @@ sa_payload_t *sa_payload_create_from_proposal_v2(proposal_t *proposal)
 {
        private_sa_payload_t *this;
 
-       this = (private_sa_payload_t*)sa_payload_create(SECURITY_ASSOCIATION);
+       this = (private_sa_payload_t*)sa_payload_create(PLV2_SECURITY_ASSOCIATION);
        add_proposal_v2(this, proposal);
 
        return &this->public;
@@ -560,7 +560,7 @@ sa_payload_t *sa_payload_create_from_proposals_v1(linked_list_t *proposals,
        proposal_substructure_t *substruct;
        private_sa_payload_t *this;
 
-       this = (private_sa_payload_t*)sa_payload_create(SECURITY_ASSOCIATION_V1);
+       this = (private_sa_payload_t*)sa_payload_create(PLV1_SECURITY_ASSOCIATION);
 
        if (!proposals || !proposals->get_count(proposals))
        {
index b62a341d8147ba4ce1d31fe3e4a6bc2cf7f0bb55..0ddf3619cf6b696106a172d62b3f6c799ce52dfc 100644 (file)
@@ -104,7 +104,7 @@ struct sa_payload_t {
 /**
  * Creates an empty sa_payload_t object
  *
- * @param type                         SECURITY_ASSOCIATION or SECURITY_ASSOCIATION_V1
+ * @param type                         PLV2_SECURITY_ASSOCIATION or PLV1_SECURITY_ASSOCIATION
  * @return                                     created sa_payload_t object
  */
 sa_payload_t *sa_payload_create(payload_type_t type);
index 334823db974b64d8822dd4e3e1dbabd886453df0..83618ff5d59a9e5dafe36f02a47904ad31fc40ec 100644 (file)
@@ -168,13 +168,13 @@ METHOD(payload_t, get_header_length, int,
 METHOD(payload_t, get_type, payload_type_t,
        private_traffic_selector_substructure_t *this)
 {
-       return TRAFFIC_SELECTOR_SUBSTRUCTURE;
+       return PLV2_TRAFFIC_SELECTOR_SUBSTRUCTURE;
 }
 
 METHOD(payload_t, get_next_type, payload_type_t,
        private_traffic_selector_substructure_t *this)
 {
-       return NO_PAYLOAD;
+       return PL_NONE;
 }
 
 METHOD(payload_t, set_next_type, void,
index d20f77c599dede86c0851b2434f3881686164089..4a5b52dcf46eb506ec91c43bef851e3e55df4133 100644 (file)
@@ -98,7 +98,7 @@ struct private_transform_attribute_t {
        chunk_t attribute_value;
 
        /**
-        * Payload type, TRANSFORM_ATTRIBUTE or TRANSFORM_ATTRIBUTE_V1
+        * Payload type, PLV2_TRANSFORM_ATTRIBUTE or PLV1_TRANSFORM_ATTRIBUTE
         */
        payload_type_t type;
 };
@@ -157,7 +157,7 @@ METHOD(payload_t, get_type, payload_type_t,
 METHOD(payload_t, get_next_type, payload_type_t,
        private_transform_attribute_t *this)
 {
-       return NO_PAYLOAD;
+       return PL_NONE;
 }
 
 METHOD(payload_t, set_next_type, void,
index 23897a50a39e69862c58c781726a90875d4cc2b3..87e283b184a6304d07361cbf5a6d50380ce84870 100644 (file)
@@ -127,7 +127,7 @@ struct transform_attribute_t {
 /**
  * Creates an empty transform_attribute_t object.
  *
- * @param type                 TRANSFORM_ATTRIBUTE or TRANSFORM_ATTRIBUTE_V1
+ * @param type                 PLV2_TRANSFORM_ATTRIBUTE or PLV1_TRANSFORM_ATTRIBUTE
  * @return                             transform_attribute_t object
  */
 transform_attribute_t *transform_attribute_create(payload_type_t type);
@@ -135,7 +135,7 @@ transform_attribute_t *transform_attribute_create(payload_type_t type);
 /**
  * Creates a two byte value or a larger attribute for a given attribute kind.
  *
- * @param type                 TRANSFORM_ATTRIBUTE or TRANSFORM_ATTRIBUTE_V1
+ * @param type                 PLV2_TRANSFORM_ATTRIBUTE or PLV1_TRANSFORM_ATTRIBUTE
  * @param kind                 attribute kind
  * @param value                        fixed two byte value
  * @return                             transform_attribute_t object
index a8502756175e799211e2c259cb7d796a84a05371..6885d61817375888bdf73b1eadd98a607f3f5298 100644 (file)
@@ -73,13 +73,13 @@ struct private_transform_substructure_t {
        linked_list_t *attributes;
 
        /**
-        * Payload type, TRANSFORM_SUBSTRUCTURE or TRANSFORM_SUBSTRUCTURE_V1
+        * Payload type, PLV2_TRANSFORM_SUBSTRUCTURE or PLV1_TRANSFORM_SUBSTRUCTURE
         */
        payload_type_t type;
 };
 
 /**
- * Encoding rules for TRANSFORM_SUBSTRUCTURE
+ * Encoding rules for PLV2_TRANSFORM_SUBSTRUCTURE
  */
 static encoding_rule_t encodings_v2[] = {
        /* 1 Byte next payload type, stored in the field next_payload */
@@ -95,12 +95,12 @@ static encoding_rule_t encodings_v2[] = {
        /* transform identifier, as used by IKEv2 */
        { U_INT_16,                     offsetof(private_transform_substructure_t, transform_id_v2)     },
        /* Attributes in a transform attribute list */
-       { PAYLOAD_LIST + TRANSFORM_ATTRIBUTE,
+       { PAYLOAD_LIST + PLV2_TRANSFORM_ATTRIBUTE,
                                                offsetof(private_transform_substructure_t, attributes)          }
 };
 
 /**
- * Encoding rules for TRANSFORM_SUBSTRUCTURE_V1
+ * Encoding rules for PLV1_TRANSFORM_SUBSTRUCTURE
  */
 static encoding_rule_t encodings_v1[] = {
        /* 1 Byte next payload type, stored in the field next_payload */
@@ -117,7 +117,7 @@ static encoding_rule_t encodings_v1[] = {
        { RESERVED_BYTE,        offsetof(private_transform_substructure_t, reserved[1])         },
        { RESERVED_BYTE,        offsetof(private_transform_substructure_t, reserved[2])         },
        /* Attributes in a transform attribute list */
-       { PAYLOAD_LIST + TRANSFORM_ATTRIBUTE_V1,
+       { PAYLOAD_LIST + PLV1_TRANSFORM_ATTRIBUTE,
                                                offsetof(private_transform_substructure_t, attributes)          }
 };
 
@@ -142,7 +142,7 @@ METHOD(payload_t, verify, status_t,
        enumerator_t *enumerator;
        payload_t *attribute;
 
-       if (this->next_payload != NO_PAYLOAD && this->next_payload != 3)
+       if (this->next_payload != PL_NONE && this->next_payload != 3)
        {
                DBG1(DBG_ENC, "inconsistent next payload");
                return FAILED;
@@ -167,7 +167,7 @@ METHOD(payload_t, verify, status_t,
 METHOD(payload_t, get_encoding_rules, int,
        private_transform_substructure_t *this, encoding_rule_t **rules)
 {
-       if (this->type == TRANSFORM_SUBSTRUCTURE)
+       if (this->type == PLV2_TRANSFORM_SUBSTRUCTURE)
        {
                *rules = encodings_v2;
                return countof(encodings_v2);
@@ -244,7 +244,7 @@ METHOD(transform_substructure_t, get_transform_type_or_number, u_int8_t,
 METHOD(transform_substructure_t, get_transform_id, u_int16_t,
        private_transform_substructure_t *this)
 {
-       if (this->type == TRANSFORM_SUBSTRUCTURE)
+       if (this->type == PLV2_TRANSFORM_SUBSTRUCTURE)
        {
                return this->transform_id_v2;
        }
@@ -291,7 +291,7 @@ transform_substructure_t *transform_substructure_create(payload_type_t type)
                        .create_attribute_enumerator = _create_attribute_enumerator,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .transform_length = get_header_length(this),
                .attributes = linked_list_create(),
                .type = type,
@@ -310,7 +310,7 @@ transform_substructure_t *transform_substructure_create_type(payload_type_t type
        this = (private_transform_substructure_t*)transform_substructure_create(type);
 
        this->transform_ton = type_or_number;
-       if (type == TRANSFORM_SUBSTRUCTURE)
+       if (type == PLV2_TRANSFORM_SUBSTRUCTURE)
        {
                this->transform_id_v2 = id;
        }
index 97717e65b9f668f62b8260169e9c6063b06f7438..ba821d3bddfa04269be319f0ec6c1a005df4bfac 100644 (file)
@@ -97,7 +97,7 @@ struct transform_substructure_t {
 /**
  * Creates an empty transform_substructure_t object.
  *
- * @param type                 TRANSFORM_SUBSTRUCTURE or TRANSFORM_SUBSTRUCTURE_V1
+ * @param type                 PLV2_TRANSFORM_SUBSTRUCTURE or PLV1_TRANSFORM_SUBSTRUCTURE
  * @return                             created transform_substructure_t object
  */
 transform_substructure_t *transform_substructure_create(payload_type_t type);
@@ -105,7 +105,7 @@ transform_substructure_t *transform_substructure_create(payload_type_t type);
 /**
  * Creates an empty transform_substructure_t object.
  *
- * @param type                         TRANSFORM_SUBSTRUCTURE or TRANSFORM_SUBSTRUCTURE_V1
+ * @param type                         PLV2_TRANSFORM_SUBSTRUCTURE or PLV1_TRANSFORM_SUBSTRUCTURE
  * @param type_or_number       Type (IKEv2) or number (IKEv1) of transform
  * @param id                           transform id specifc for the transform type
  * @return                                     transform_substructure_t object
index 8dfa47bc2a437316100b5600d358e520721932c3..e74b9ae1b849dc4dcd3a8d231560b84a625a4bc5 100644 (file)
@@ -103,7 +103,7 @@ static encoding_rule_t encodings[] = {
        { RESERVED_BYTE,        offsetof(private_ts_payload_t, reserved_byte[1])},
        { RESERVED_BYTE,        offsetof(private_ts_payload_t, reserved_byte[2])},
        /* wrapped list of traffic selectors substructures */
-       { PAYLOAD_LIST + TRAFFIC_SELECTOR_SUBSTRUCTURE,
+       { PAYLOAD_LIST + PLV2_TRAFFIC_SELECTOR_SUBSTRUCTURE,
                                                offsetof(private_ts_payload_t, substrs)                 },
 };
 
@@ -164,9 +164,9 @@ METHOD(payload_t, get_type, payload_type_t,
 {
        if (this->is_initiator)
        {
-               return TRAFFIC_SELECTOR_INITIATOR;
+               return PLV2_TS_INITIATOR;
        }
-       return TRAFFIC_SELECTOR_RESPONDER;
+       return PLV2_TS_RESPONDER;
 }
 
 METHOD(payload_t, get_next_type, payload_type_t,
@@ -269,7 +269,7 @@ ts_payload_t *ts_payload_create(bool is_initiator)
                        .get_traffic_selectors = _get_traffic_selectors,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
                .is_initiator = is_initiator,
                .substrs = linked_list_create(),
index fe7ced20be3026498cb3adb749b475073c64c50c..45b91fd0b32f0aa7172e94a36b90dd42373223a1 100644 (file)
@@ -184,7 +184,7 @@ unknown_payload_t *unknown_payload_create(payload_type_t type)
                        .get_data = _get_data,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this),
                .type = type,
        );
index 0c1df56e244698fe9547bcebe547bc63a28789aa..400e0640dfd975c760dc0645fed3233ae2b9cb71 100644 (file)
@@ -178,7 +178,7 @@ vendor_id_payload_t *vendor_id_payload_create_data(payload_type_t type,
                        .get_data = _get_data,
                        .destroy = _destroy,
                },
-               .next_payload = NO_PAYLOAD,
+               .next_payload = PL_NONE,
                .payload_length = get_header_length(this) + data.len,
                .data = data,
                .type = type,
index 9a814777b134948c57306740e43bb2f9f336b8cc..42c31f921a115ff08f408a2953e7cef61ffdb77d 100644 (file)
@@ -55,7 +55,7 @@ struct vendor_id_payload_t {
 /**
  * Creates an empty Vendor ID payload for IKEv1 or IKEv2.
  *
- * @@param type                VENDOR_ID or VENDOR_ID_V1
+ * @@param type                PLV2_VENDOR_ID or PLV1_VENDOR_ID
  * @return                     vendor ID payload
  */
 vendor_id_payload_t *vendor_id_payload_create(payload_type_t type);
@@ -63,7 +63,7 @@ vendor_id_payload_t *vendor_id_payload_create(payload_type_t type);
 /**
  * Creates a vendor ID payload using a chunk of data
  *
- * @param type         VENDOR_ID or VENDOR_ID_V1
+ * @param type         PLV2_VENDOR_ID or PLV1_VENDOR_ID
  * @param data         data to use in vendor ID payload, gets owned by payload
  * @return                     vendor ID payload
  */
index 8dfb47b69015cbc665ae7d9f7b8a08a73e2e72ae..a2a3b1f89a4d28b0290446026e5319a19c7a3c4c 100644 (file)
@@ -271,7 +271,7 @@ static bool check_cookie(private_receiver_t *this, message_t *message)
        if (data.len <
                 IKE_HEADER_LENGTH + NOTIFY_PAYLOAD_HEADER_LENGTH +
                 sizeof(u_int32_t) + this->hasher->get_hash_size(this->hasher) ||
-               *(data.ptr + 16) != NOTIFY ||
+               *(data.ptr + 16) != PLV2_NOTIFY ||
                *(u_int16_t*)(data.ptr + IKE_HEADER_LENGTH + 6) != htons(COOKIE))
        {
                /* no cookie found */
index e751b51b638758bd88afffbf1ebe59bfedd9694a..5fcd9ebc9db237833019101902c307cc77f76349 100644 (file)
@@ -161,11 +161,11 @@ METHOD(eap_method_t, process_server, status_t,
        {
                /* assume that "out" contains username/password attributes */
                co->destroy(co);
-               ci = cp_payload_create_type(CONFIGURATION_V1, CFG_REPLY);
+               ci = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REPLY);
                ci->add_attribute(ci, configuration_attribute_create_chunk(
-                                       CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_NAME, user));
+                                       PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_NAME, user));
                ci->add_attribute(ci, configuration_attribute_create_chunk(
-                                       CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_PASSWORD, pass));
+                                       PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_PASSWORD, pass));
                switch (xauth->process(xauth, ci, &co))
                {
                        case SUCCESS:
index a41d5207d595ab1b10472fcd186f03ea0ac7d990..52ea84070d1e0268046d369267d6c2440eea31fd 100644 (file)
@@ -232,8 +232,8 @@ static void ike2queue(message_t *message, linked_list_t *queue,
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY ||
-                       payload->get_type(payload) == NOTIFY_V1)
+               if (payload->get_type(payload) == PLV2_NOTIFY ||
+                       payload->get_type(payload) == PLV1_NOTIFY)
                {
                        notify = (notify_payload_t*)payload;
                        if (notify->get_notify_type(notify) == RADIUS_ATTRIBUTE)
index d00f6bb2c9f10b5a2e7de1fb39c2573296298176..0fea509194726efd2f23156cd526f6d6f0154340 100644 (file)
@@ -87,12 +87,12 @@ static bool build_round(private_eap_radius_xauth_t *this, cp_payload_t *cp)
                return FALSE;
        }
        cp->add_attribute(cp, configuration_attribute_create_chunk(
-                                       CONFIGURATION_ATTRIBUTE_V1, this->round.type, chunk_empty));
+                                       PLV1_CONFIGURATION_ATTRIBUTE, this->round.type, chunk_empty));
 
        if (this->round.message && strlen(this->round.message))
        {
                cp->add_attribute(cp, configuration_attribute_create_chunk(
-                                       CONFIGURATION_ATTRIBUTE_V1, XAUTH_MESSAGE,
+                                       PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_MESSAGE,
                                        chunk_from_str(this->round.message)));
        }
        return TRUE;
@@ -103,10 +103,10 @@ METHOD(xauth_method_t, initiate, status_t,
 {
        cp_payload_t *cp;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_REQUEST);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REQUEST);
        /* first message always comes with username */
        cp->add_attribute(cp, configuration_attribute_create_chunk(
-                               CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_NAME, chunk_empty));
+                               PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_NAME, chunk_empty));
 
        if (build_round(this, cp))
        {
@@ -211,7 +211,7 @@ METHOD(xauth_method_t, process, status_t,
        {
                return verify_radius(this);
        }
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_REQUEST);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REQUEST);
        if (build_round(this, cp))
        {
                *out = cp;
index aca83aafc86c99218f5f460a1eedfe2f968f576e..1d30460adf3e6d4777f26beb13c189c0520282ab 100644 (file)
@@ -68,7 +68,7 @@ static void print_radius_attributes(private_radattr_listener_t *this,
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY)
+               if (payload->get_type(payload) == PLV2_NOTIFY)
                {
                        notify = (notify_payload_t*)payload;
                        if (notify->get_notify_type(notify) == RADIUS_ATTRIBUTE)
@@ -144,7 +144,7 @@ METHOD(listener_t, message, bool,
 {
        if (plain && ike_sa->supports_extension(ike_sa, EXT_STRONGSWAN) &&
                message->get_exchange_type(message) == IKE_AUTH &&
-               message->get_payload(message, EXTENSIBLE_AUTHENTICATION))
+               message->get_payload(message, PLV2_EAP))
        {
                if (incoming)
                {
index f597bb7aeec85654c18db4c075eaf2a64b36a0ab..f21d02697ca17a666b55d9397b4d9431ff2def90 100644 (file)
@@ -163,11 +163,11 @@ METHOD(xauth_method_t, initiate, status_t,
 {
        cp_payload_t *cp;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_REQUEST);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REQUEST);
        cp->add_attribute(cp, configuration_attribute_create_chunk(
-                               CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_NAME, chunk_empty));
+                               PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_NAME, chunk_empty));
        cp->add_attribute(cp, configuration_attribute_create_chunk(
-                               CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_PASSWORD, chunk_empty));
+                               PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_PASSWORD, chunk_empty));
        *out = cp;
        return NEED_MORE;
 }
index 5df8aadee71fd819bc9841f33e54ff41db1ff498..c37da0cb0c2b0b6aedb8ba1d883f385a049e2037 100644 (file)
@@ -69,7 +69,7 @@ METHOD(xauth_method_t, process_peer, status_t,
        }
        enumerator->destroy(enumerator);
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_REPLY);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REPLY);
 
        enumerator = in->create_attribute_enumerator(in);
        while (enumerator->enumerate(enumerator, &attr))
@@ -80,7 +80,7 @@ METHOD(xauth_method_t, process_peer, status_t,
                {
                        case XAUTH_USER_NAME:
                                cp->add_attribute(cp, configuration_attribute_create_chunk(
-                                                       CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_NAME,
+                                                       PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_NAME,
                                                        this->peer->get_encoding(this->peer)));
                                break;
                        case XAUTH_NEXT_PIN:
@@ -99,7 +99,7 @@ METHOD(xauth_method_t, process_peer, status_t,
                                        return FAILED;
                                }
                                cp->add_attribute(cp, configuration_attribute_create_chunk(
-                                                       CONFIGURATION_ATTRIBUTE_V1, attr->get_type(attr),
+                                                       PLV1_CONFIGURATION_ATTRIBUTE, attr->get_type(attr),
                                                        shared->get_key(shared)));
                                shared->destroy(shared);
                                break;
@@ -118,11 +118,11 @@ METHOD(xauth_method_t, initiate_server, status_t,
 {
        cp_payload_t *cp;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_REQUEST);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REQUEST);
        cp->add_attribute(cp, configuration_attribute_create_chunk(
-                               CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_NAME, chunk_empty));
+                               PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_NAME, chunk_empty));
        cp->add_attribute(cp, configuration_attribute_create_chunk(
-                               CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_PASSWORD, chunk_empty));
+                               PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_PASSWORD, chunk_empty));
        *out = cp;
        return NEED_MORE;
 }
index 71c79ecc0bcbccf69804999fff2acb4ac49e840f..1970146c0b5116a1037b12aeb5bf0cf30ad09852 100644 (file)
@@ -43,11 +43,11 @@ METHOD(xauth_method_t, initiate, status_t,
 {
        cp_payload_t *cp;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_REQUEST);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REQUEST);
        cp->add_attribute(cp, configuration_attribute_create_chunk(
-                               CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_NAME, chunk_empty));
+                               PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_NAME, chunk_empty));
        cp->add_attribute(cp, configuration_attribute_create_chunk(
-                               CONFIGURATION_ATTRIBUTE_V1, XAUTH_USER_PASSWORD, chunk_empty));
+                               PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_USER_PASSWORD, chunk_empty));
        *out = cp;
        return NEED_MORE;
 }
index 606135b0b5ae0210ef0b05158147cd44094eb515..a6795e766e64f0e09037dc26b3f19019c9c1a16d 100644 (file)
@@ -51,7 +51,7 @@ METHOD(job_t, execute, job_requeue_t,
        /* if this is an unencrypted INFORMATIONAL exchange it is likely a
         * connectivity check. */
        if (this->message->get_exchange_type(this->message) == INFORMATIONAL &&
-               this->message->get_first_payload_type(this->message) != ENCRYPTED)
+               this->message->get_first_payload_type(this->message) != PLV2_ENCRYPTED)
        {
                /* theoretically this could also be an error message
                 * see RFC 4306, section 1.5. */
index a32b6ab122ec5ccf8e706baa79ca7bfecfe2a63a..8571274acac2a1b7a3e242c8fa2cdd9edb2a1856 100644 (file)
@@ -86,7 +86,7 @@ authenticator_t *authenticator_create_verifier(
 {
        auth_payload_t *auth_payload;
 
-       auth_payload = (auth_payload_t*)message->get_payload(message, AUTHENTICATION);
+       auth_payload = (auth_payload_t*)message->get_payload(message, PLV2_AUTH);
        if (auth_payload == NULL)
        {
                return (authenticator_t*)eap_authenticator_create_verifier(ike_sa,
index 525117f3b0f4758bfce68df547443053ca08cbcb..8e68e7bee3accd94adefda1c02e9325cef92f050 100644 (file)
@@ -971,7 +971,7 @@ static bool get_init_hash(private_ike_sa_manager_t *this, message_t *message,
        {       /* this might be the case when flush() has been called */
                return FALSE;
        }
-       if (message->get_first_payload_type(message) == FRAGMENT_V1)
+       if (message->get_first_payload_type(message) == PLV1_FRAGMENT)
        {       /* only hash the source IP, port and SPI for fragmented init messages */
                u_int16_t port;
                u_int64_t spi;
@@ -1313,7 +1313,7 @@ METHOD(ike_sa_manager_t, checkout_by_message, ike_sa_t*,
 
                        ike_id = entry->ike_sa->get_id(entry->ike_sa);
                        entry->checked_out = TRUE;
-                       if (message->get_first_payload_type(message) != FRAGMENT_V1)
+                       if (message->get_first_payload_type(message) != PLV1_FRAGMENT)
                        {
                                entry->processing = get_message_id_or_hash(message);
                        }
index ee15408c70f2ca6d96c497cf0a86521c0e09ea16..aa966cd5fba0410f47c60c8f4005b1dbe0340514 100644 (file)
@@ -85,7 +85,7 @@ METHOD(authenticator_t, build, status_t,
        }
        free(dh.ptr);
 
-       hash_payload = hash_payload_create(HASH_V1);
+       hash_payload = hash_payload_create(PLV1_HASH);
        hash_payload->set_hash(hash_payload, hash);
        message->add_payload(message, &hash_payload->payload_interface);
        free(hash.ptr);
@@ -101,7 +101,7 @@ METHOD(authenticator_t, process, status_t,
        chunk_t hash, dh;
        auth_cfg_t *auth;
 
-       hash_payload = (hash_payload_t*)message->get_payload(message, HASH_V1);
+       hash_payload = (hash_payload_t*)message->get_payload(message, PLV1_HASH);
        if (!hash_payload)
        {
                DBG1(DBG_IKE, "HASH payload missing in message");
index d81c77f0d2d8536e3cb0ff19045d40e4d737de02..bfe5ff449be761325784dda7e5bb2deb54a92e40 100644 (file)
@@ -108,7 +108,7 @@ METHOD(authenticator_t, build, status_t,
 
        if (private->sign(private, scheme, hash, &sig))
        {
-               sig_payload = hash_payload_create(SIGNATURE_V1);
+               sig_payload = hash_payload_create(PLV1_SIGNATURE);
                sig_payload->set_hash(sig_payload, sig);
                free(sig.ptr);
                message->add_payload(message, &sig_payload->payload_interface);
@@ -144,7 +144,7 @@ METHOD(authenticator_t, process, status_t,
                scheme = SIGN_ECDSA_WITH_NULL;
        }
 
-       sig_payload = (hash_payload_t*)message->get_payload(message, SIGNATURE_V1);
+       sig_payload = (hash_payload_t*)message->get_payload(message, PLV1_SIGNATURE);
        if (!sig_payload)
        {
                DBG1(DBG_IKE, "SIG payload missing in message");
index bf1b0046c3c398956b7f7279162283c1b2d02faa..619d197bd5206d09fe5a0d0100ed95bf9fc42415 100644 (file)
@@ -791,7 +791,7 @@ METHOD(keymat_v1_t, get_hash, bool,
 static bool get_nonce(message_t *message, chunk_t *n)
 {
        nonce_payload_t *nonce;
-       nonce = (nonce_payload_t*)message->get_payload(message, NONCE_V1);
+       nonce = (nonce_payload_t*)message->get_payload(message, PLV1_NONCE);
        if (nonce)
        {
                *n = nonce->get_nonce(nonce);
@@ -815,7 +815,7 @@ static chunk_t get_message_data(message_t *message, generator_t *generator)
                enumerator = message->create_payload_enumerator(message);
                while (enumerator->enumerate(enumerator, &payload))
                {
-                       if (payload->get_type(payload) == HASH_V1)
+                       if (payload->get_type(payload) == PLV1_HASH)
                        {
                                continue;
                        }
@@ -835,7 +835,7 @@ static chunk_t get_message_data(message_t *message, generator_t *generator)
                                generator->generate_payload(generator, payload);
                                payload = next;
                        }
-                       payload->set_next_type(payload, NO_PAYLOAD);
+                       payload->set_next_type(payload, PL_NONE);
                        generator->generate_payload(generator, payload);
                }
                enumerator->destroy(enumerator);
index 1189d3c69a0f1ed27f32c3f7d5cb31374fd8b482..114b8a3e4e098ef50cbdc3b694c66c393ab1febb 100644 (file)
@@ -648,7 +648,7 @@ METHOD(phase1_t, save_sa_payload, bool,
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == SECURITY_ASSOCIATION_V1)
+               if (payload->get_type(payload) == PLV1_SECURITY_ASSOCIATION)
                {
                        sa = payload;
                        break;
@@ -682,7 +682,7 @@ METHOD(phase1_t, add_nonce_ke, bool,
        nonce_gen_t *nonceg;
        chunk_t nonce;
 
-       ke_payload = ke_payload_create_from_diffie_hellman(KEY_EXCHANGE_V1, this->dh);
+       ke_payload = ke_payload_create_from_diffie_hellman(PLV1_KEY_EXCHANGE, this->dh);
        message->add_payload(message, &ke_payload->payload_interface);
 
        nonceg = this->keymat->keymat.create_nonce_gen(&this->keymat->keymat);
@@ -699,7 +699,7 @@ METHOD(phase1_t, add_nonce_ke, bool,
        }
        nonceg->destroy(nonceg);
 
-       nonce_payload = nonce_payload_create(NONCE_V1);
+       nonce_payload = nonce_payload_create(PLV1_NONCE);
        nonce_payload->set_nonce(nonce_payload, nonce);
        message->add_payload(message, &nonce_payload->payload_interface);
 
@@ -720,7 +720,7 @@ METHOD(phase1_t, get_nonce_ke, bool,
        nonce_payload_t *nonce_payload;
        ke_payload_t *ke_payload;
 
-       ke_payload = (ke_payload_t*)message->get_payload(message, KEY_EXCHANGE_V1);
+       ke_payload = (ke_payload_t*)message->get_payload(message, PLV1_KEY_EXCHANGE);
        if (!ke_payload)
        {
                DBG1(DBG_IKE, "KE payload missing in message");
@@ -729,7 +729,7 @@ METHOD(phase1_t, get_nonce_ke, bool,
        this->dh_value = chunk_clone(ke_payload->get_key_exchange_data(ke_payload));
        this->dh->set_other_public_value(this->dh, this->dh_value);
 
-       nonce_payload = (nonce_payload_t*)message->get_payload(message, NONCE_V1);
+       nonce_payload = (nonce_payload_t*)message->get_payload(message, PLV1_NONCE);
        if (!nonce_payload)
        {
                DBG1(DBG_IKE, "NONCE payload missing in message");
index 8fc158bba83115162312ab8726baa6abcfc7c3f2..97812a5c55cc52fd001a48d099a3e1afe1806674 100644 (file)
@@ -956,7 +956,7 @@ static void send_notify(private_task_manager_t *this, message_t *request,
        response->set_request(response, TRUE);
        response->set_message_id(response, mid);
        response->add_payload(response, (payload_t*)
-                               notify_payload_create_from_protocol_and_type(NOTIFY_V1,
+                               notify_payload_create_from_protocol_and_type(PLV1_NOTIFY,
                                                                                                        PROTO_IKE, type));
 
        me = this->ike_sa->get_my_host(this->ike_sa);
@@ -1265,7 +1265,7 @@ static status_t handle_fragment(private_task_manager_t *this, message_t *msg)
        chunk_t data;
        u_int8_t num;
 
-       payload = (fragment_payload_t*)msg->get_payload(msg, FRAGMENT_V1);
+       payload = (fragment_payload_t*)msg->get_payload(msg, PLV1_FRAGMENT);
        if (!payload)
        {
                return FAILED;
@@ -1412,7 +1412,7 @@ static status_t parse_message(private_task_manager_t *this, message_t *msg)
                }
        }
 
-       if (msg->get_first_payload_type(msg) == FRAGMENT_V1)
+       if (msg->get_first_payload_type(msg) == PLV1_FRAGMENT)
        {
                return handle_fragment(this, msg);
        }
@@ -1514,7 +1514,7 @@ METHOD(task_manager_t, process_message, status_t,
                {
                        if (this->ike_sa->get_state(this->ike_sa) != IKE_CREATED &&
                                this->ike_sa->get_state(this->ike_sa) != IKE_CONNECTING &&
-                               msg->get_first_payload_type(msg) != FRAGMENT_V1)
+                               msg->get_first_payload_type(msg) != PLV1_FRAGMENT)
                        {
                                DBG1(DBG_IKE, "ignoring %N in established IKE_SA state",
                                         exchange_type_names, msg->get_exchange_type(msg));
index 6cc3e04b38b95b3217b18057afbe393e9b3956aa..7009ae95d723d6759342128128a61f88432cf272 100644 (file)
@@ -133,7 +133,7 @@ static bool has_notify_errors(private_aggressive_mode_t *this, message_t *messag
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY_V1)
+               if (payload->get_type(payload) == PLV1_NOTIFY)
                {
                        notify_payload_t *notify;
                        notify_type_t type;
@@ -167,7 +167,7 @@ static status_t send_notify(private_aggressive_mode_t *this, notify_type_t type)
        u_int64_t spi_i, spi_r;
        chunk_t spi;
 
-       notify = notify_payload_create_from_protocol_and_type(NOTIFY_V1,
+       notify = notify_payload_create_from_protocol_and_type(PLV1_NOTIFY,
                                                                                                                  PROTO_IKE, type);
        ike_sa_id = this->ike_sa->get_id(this->ike_sa);
        spi_i = ike_sa_id->get_initiator_spi(ike_sa_id);
@@ -276,7 +276,7 @@ METHOD(task_t, build_i, status_t,
                                return FAILED;
                        }
                        this->ike_sa->set_my_id(this->ike_sa, id->clone(id));
-                       id_payload = id_payload_create_from_identification(ID_V1, id);
+                       id_payload = id_payload_create_from_identification(PLV1_ID, id);
                        this->id_data = id_payload->get_encoded(id_payload);
                        message->add_payload(message, &id_payload->payload_interface);
 
@@ -389,7 +389,7 @@ METHOD(task_t, process_r, status_t,
                                                                           message->get_source(message), TRUE);
 
                        sa_payload = (sa_payload_t*)message->get_payload(message,
-                                                                                                       SECURITY_ASSOCIATION_V1);
+                                                                                                       PLV1_SECURITY_ASSOCIATION);
                        if (!sa_payload)
                        {
                                DBG1(DBG_IKE, "SA payload missing");
@@ -448,7 +448,7 @@ METHOD(task_t, process_r, status_t,
                                return send_notify(this, INVALID_PAYLOAD_TYPE);
                        }
 
-                       id_payload = (id_payload_t*)message->get_payload(message, ID_V1);
+                       id_payload = (id_payload_t*)message->get_payload(message, PLV1_ID);
                        if (!id_payload)
                        {
                                DBG1(DBG_IKE, "IDii payload missing");
@@ -588,7 +588,7 @@ METHOD(task_t, build_r, status_t,
                }
                this->ike_sa->set_my_id(this->ike_sa, id->clone(id));
 
-               id_payload = id_payload_create_from_identification(ID_V1, id);
+               id_payload = id_payload_create_from_identification(PLV1_ID, id);
                message->add_payload(message, &id_payload->payload_interface);
 
                if (!this->ph1->build_auth(this->ph1, this->method, message,
@@ -614,7 +614,7 @@ METHOD(task_t, process_i, status_t,
                u_int32_t lifetime;
 
                sa_payload = (sa_payload_t*)message->get_payload(message,
-                                                                                               SECURITY_ASSOCIATION_V1);
+                                                                                               PLV1_SECURITY_ASSOCIATION);
                if (!sa_payload)
                {
                        DBG1(DBG_IKE, "SA payload missing");
@@ -654,7 +654,7 @@ METHOD(task_t, process_i, status_t,
                        return send_notify(this, NO_PROPOSAL_CHOSEN);
                }
 
-               id_payload = (id_payload_t*)message->get_payload(message, ID_V1);
+               id_payload = (id_payload_t*)message->get_payload(message, PLV1_ID);
                if (!id_payload)
                {
                        DBG1(DBG_IKE, "IDir payload missing");
index bda1d2afbab3b8bce45eac2c2d5f7ac3a407b725..b742dbef9c66afde5be60b57de350253df722e61 100644 (file)
@@ -93,7 +93,7 @@ METHOD(task_t, process_r, status_t,
        {
                switch (payload->get_type(payload))
                {
-                       case NOTIFY_V1:
+                       case PLV1_NOTIFY:
                                notify = (notify_payload_t*)payload;
                                type = notify->get_notify_type(notify);
 
@@ -153,7 +153,7 @@ METHOD(task_t, process_r, status_t,
                                                 notify_type_names, type);
                                }
                                continue;
-                       case DELETE_V1:
+                       case PLV1_DELETE:
                                if (!this->del)
                                {
                                        delete = (delete_payload_t*)payload;
index edad3b2fa954616abbe3a8c1fb849ce99f0df4f6..7dbbdc92fdfea5047103eaf082e6d044fb2c9a9e 100644 (file)
@@ -68,7 +68,7 @@ static bool use_certs(private_isakmp_cert_post_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == SECURITY_ASSOCIATION_V1)
+               if (payload->get_type(payload) == PLV1_SECURITY_ASSOCIATION)
                {
                        sa_payload_t *sa_payload = (sa_payload_t*)payload;
 
@@ -132,7 +132,7 @@ static void build_certs(private_isakmp_cert_post_t *this, message_t *message)
                        {
                                break;
                        }
-                       payload = cert_payload_create_from_cert(CERTIFICATE_V1, cert);
+                       payload = cert_payload_create_from_cert(PLV1_CERTIFICATE, cert);
                        if (!payload)
                        {
                                break;
@@ -146,7 +146,7 @@ static void build_certs(private_isakmp_cert_post_t *this, message_t *message)
                        {
                                if (type == AUTH_RULE_IM_CERT)
                                {
-                                       payload = cert_payload_create_from_cert(CERTIFICATE_V1, cert);
+                                       payload = cert_payload_create_from_cert(PLV1_CERTIFICATE, cert);
                                        if (payload)
                                        {
                                                DBG1(DBG_IKE, "sending issuer cert \"%Y\"",
index 43a0aaa36babbeeb416179f1fd876e49858d82c7..58f856e3f93e89709214b46d95b1c4a5b1b3ee0d 100644 (file)
@@ -134,7 +134,7 @@ static void process_certreqs(private_isakmp_cert_pre_t *this, message_t *message
        {
                switch (payload->get_type(payload))
                {
-                       case CERTIFICATE_REQUEST_V1:
+                       case PLV1_CERTREQ:
                        {
                                certificate_t *cert;
 
@@ -268,7 +268,7 @@ static void process_certs(private_isakmp_cert_pre_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == CERTIFICATE_V1)
+               if (payload->get_type(payload) == PLV1_CERTIFICATE)
                {
                        cert_payload_t *cert_payload;
                        cert_encoding_t encoding;
@@ -377,7 +377,7 @@ static void build_certreqs(private_isakmp_cert_pre_t *this, message_t *message)
                }
                enumerator->destroy(enumerator);
        }
-       if (!message->get_payload(message, CERTIFICATE_REQUEST_V1))
+       if (!message->get_payload(message, PLV1_CERTREQ))
        {
                /* otherwise add all trusted CA certificates */
                enumerator = lib->credmgr->create_cert_enumerator(lib->credmgr,
@@ -402,7 +402,7 @@ static bool use_certs(private_isakmp_cert_pre_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == SECURITY_ASSOCIATION_V1)
+               if (payload->get_type(payload) == PLV1_SECURITY_ASSOCIATION)
                {
                        sa_payload_t *sa_payload = (sa_payload_t*)payload;
 
index a44f3c4a9c95a60f69c77c9374c6e929ee5c7092..bea0428c402e82cfd3df34c81db763cd31094c82 100644 (file)
@@ -50,7 +50,7 @@ METHOD(task_t, build_i, status_t,
                 this->ike_sa->get_other_host(this->ike_sa),
                 this->ike_sa->get_other_id(this->ike_sa));
 
-       delete_payload = delete_payload_create(DELETE_V1, PROTO_IKE);
+       delete_payload = delete_payload_create(PLV1_DELETE, PROTO_IKE);
        id = this->ike_sa->get_id(this->ike_sa);
        delete_payload->set_ike_spi(delete_payload, id->get_initiator_spi(id),
                                                                id->get_responder_spi(id));
index a3395a043bc6b2b57e8b1db4c4fb5f476b00a09f..5522e92219b470e90559243e245018161c9168e3 100644 (file)
@@ -55,7 +55,7 @@ METHOD(task_t, build, status_t,
        u_int32_t seqnr;
        chunk_t spi;
 
-       notify = notify_payload_create_from_protocol_and_type(NOTIFY_V1,
+       notify = notify_payload_create_from_protocol_and_type(PLV1_NOTIFY,
                                                                                                                  PROTO_IKE, this->type);
        seqnr = htonl(this->seqnr);
        ike_sa_id = this->ike_sa->get_id(this->ike_sa);
index fc6ac0771e3a24683f1c92e0cd4bf8661fbda1e6..b8af6f67bf5377d02c1bec0046666eff09e1c675 100644 (file)
@@ -117,9 +117,9 @@ static payload_type_t get_nat_d_payload_type(ike_sa_t *ike_sa)
 {
        if (ike_sa->supports_extension(ike_sa, EXT_NATT_DRAFT_02_03))
        {
-               return NAT_D_DRAFT_00_03_V1;
+               return PLV1_NAT_D_DRAFT_00_03;
        }
-       return NAT_D_V1;
+       return PLV1_NAT_D;
 }
 
 /**
@@ -269,8 +269,8 @@ static void process_payloads(private_isakmp_natd_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) != NAT_D_V1 &&
-                       payload->get_type(payload) != NAT_D_DRAFT_00_03_V1)
+               if (payload->get_type(payload) != PLV1_NAT_D &&
+                       payload->get_type(payload) != PLV1_NAT_D_DRAFT_00_03)
                {
                        continue;
                }
@@ -334,7 +334,7 @@ METHOD(task_t, build_i, status_t,
                case ID_PROT:
                {       /* add NAT-D payloads to the second request, need to process
                         * those by the responder contained in the second response */
-                       if (message->get_payload(message, SECURITY_ASSOCIATION_V1))
+                       if (message->get_payload(message, PLV1_SECURITY_ASSOCIATION))
                        {       /* wait for the second exchange */
                                return NEED_MORE;
                        }
@@ -362,7 +362,7 @@ METHOD(task_t, process_i, status_t,
                case ID_PROT:
                {       /* process NAT-D payloads in the second response, added them in the
                         * second request already, so we're done afterwards */
-                       if (message->get_payload(message, SECURITY_ASSOCIATION_V1))
+                       if (message->get_payload(message, PLV1_SECURITY_ASSOCIATION))
                        {       /* wait for the second exchange */
                                return NEED_MORE;
                        }
@@ -407,7 +407,7 @@ METHOD(task_t, process_r, status_t,
                case ID_PROT:
                {       /* process NAT-D payloads in the second request, need to add ours
                         * to the second response */
-                       if (message->get_payload(message, SECURITY_ASSOCIATION_V1))
+                       if (message->get_payload(message, PLV1_SECURITY_ASSOCIATION))
                        {       /* wait for the second exchange */
                                return NEED_MORE;
                        }
@@ -428,7 +428,7 @@ METHOD(task_t, build_r, status_t,
                case ID_PROT:
                {       /* add NAT-D payloads to second response, already processed those
                         * contained in the second request */
-                       if (message->get_payload(message, SECURITY_ASSOCIATION_V1))
+                       if (message->get_payload(message, PLV1_SECURITY_ASSOCIATION))
                        {       /* wait for the second exchange */
                                return NEED_MORE;
                        }
index e07ac0ab4465fc31708a869598951d589fd35c6e..426c4bd6953a6c8afbf01b30cd209afc58e31010 100644 (file)
@@ -209,7 +209,7 @@ static void build(private_isakmp_vendor_t *this, message_t *message)
                   (vendor_ids[i].extension == EXT_IKE_FRAGMENTATION && fragmentation))
                {
                        DBG2(DBG_IKE, "sending %s vendor ID", vendor_ids[i].desc);
-                       vid_payload = vendor_id_payload_create_data(VENDOR_ID_V1,
+                       vid_payload = vendor_id_payload_create_data(PLV1_VENDOR_ID,
                                chunk_clone(chunk_create(vendor_ids[i].id, vendor_ids[i].len)));
                        message->add_payload(message, &vid_payload->payload_interface);
                }
@@ -220,7 +220,7 @@ static void build(private_isakmp_vendor_t *this, message_t *message)
                        this->best_natt_ext == i)
                {
                        DBG2(DBG_IKE, "sending %s vendor ID", vendor_natt_ids[i].desc);
-                       vid_payload = vendor_id_payload_create_data(VENDOR_ID_V1,
+                       vid_payload = vendor_id_payload_create_data(PLV1_VENDOR_ID,
                                                        chunk_clone(chunk_create(vendor_natt_ids[i].id,
                                                                                                         vendor_natt_ids[i].len)));
                        message->add_payload(message, &vid_payload->payload_interface);
@@ -240,7 +240,7 @@ static void process(private_isakmp_vendor_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == VENDOR_ID_V1)
+               if (payload->get_type(payload) == PLV1_VENDOR_ID)
                {
                        vendor_id_payload_t *vid;
                        bool found = FALSE;
index 81638169a6b612461737a681aea05175aaf727fc..8a5d9ae16110714a6646f408d77120a1680a33b0 100644 (file)
@@ -130,7 +130,7 @@ static bool has_notify_errors(private_main_mode_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY_V1)
+               if (payload->get_type(payload) == PLV1_NOTIFY)
                {
                        notify_payload_t *notify;
                        notify_type_t type;
@@ -176,7 +176,7 @@ static status_t send_notify(private_main_mode_t *this, notify_type_t type)
        u_int64_t spi_i, spi_r;
        chunk_t spi;
 
-       notify = notify_payload_create_from_protocol_and_type(NOTIFY_V1,
+       notify = notify_payload_create_from_protocol_and_type(PLV1_NOTIFY,
                                                                                                                  PROTO_IKE, type);
        ike_sa_id = this->ike_sa->get_id(this->ike_sa);
        spi_i = ike_sa_id->get_initiator_spi(ike_sa_id);
@@ -302,7 +302,7 @@ METHOD(task_t, build_i, status_t,
                                return send_notify(this, INVALID_ID_INFORMATION);
                        }
                        this->ike_sa->set_my_id(this->ike_sa, id->clone(id));
-                       id_payload = id_payload_create_from_identification(ID_V1, id);
+                       id_payload = id_payload_create_from_identification(PLV1_ID, id);
                        message->add_payload(message, &id_payload->payload_interface);
 
                        if (!this->ph1->build_auth(this->ph1, this->method, message,
@@ -340,7 +340,7 @@ METHOD(task_t, process_r, status_t,
                                                                           message->get_source(message), TRUE);
 
                        sa_payload = (sa_payload_t*)message->get_payload(message,
-                                                                                                       SECURITY_ASSOCIATION_V1);
+                                                                                                       PLV1_SECURITY_ASSOCIATION);
                        if (!sa_payload)
                        {
                                DBG1(DBG_IKE, "SA payload missing");
@@ -401,7 +401,7 @@ METHOD(task_t, process_r, status_t,
                        id_payload_t *id_payload;
                        identification_t *id;
 
-                       id_payload = (id_payload_t*)message->get_payload(message, ID_V1);
+                       id_payload = (id_payload_t*)message->get_payload(message, PLV1_ID);
                        if (!id_payload)
                        {
                                DBG1(DBG_IKE, "IDii payload missing");
@@ -488,7 +488,7 @@ METHOD(task_t, build_r, status_t,
                        }
                        this->ike_sa->set_my_id(this->ike_sa, id->clone(id));
 
-                       id_payload = id_payload_create_from_identification(ID_V1, id);
+                       id_payload = id_payload_create_from_identification(PLV1_ID, id);
                        message->add_payload(message, &id_payload->payload_interface);
 
                        if (!this->ph1->build_auth(this->ph1, this->method, message,
@@ -575,7 +575,7 @@ METHOD(task_t, process_i, status_t,
                        bool private;
 
                        sa_payload = (sa_payload_t*)message->get_payload(message,
-                                                                                                       SECURITY_ASSOCIATION_V1);
+                                                                                                       PLV1_SECURITY_ASSOCIATION);
                        if (!sa_payload)
                        {
                                DBG1(DBG_IKE, "SA payload missing");
@@ -627,7 +627,7 @@ METHOD(task_t, process_i, status_t,
                        id_payload_t *id_payload;
                        identification_t *id, *cid;
 
-                       id_payload = (id_payload_t*)message->get_payload(message, ID_V1);
+                       id_payload = (id_payload_t*)message->get_payload(message, PLV1_ID);
                        if (!id_payload)
                        {
                                DBG1(DBG_IKE, "IDir payload missing");
index 17fe02538dec56bdaf2798e7598cbf16d0512114..55fb390ce0e192a7914afbad3742f353fa551248 100644 (file)
@@ -107,7 +107,7 @@ static configuration_attribute_t *build_vip(host_t *vip)
                        chunk = chunk_cata("cc", chunk, prefix);
                }
        }
-       return configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE_V1,
+       return configuration_attribute_create_chunk(PLV1_CONFIGURATION_ATTRIBUTE,
                                                                                                type, chunk);
 }
 
@@ -222,7 +222,7 @@ static void process_payloads(private_mode_config_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == CONFIGURATION_V1)
+               if (payload->get_type(payload) == PLV1_CONFIGURATION)
                {
                        cp_payload_t *cp = (cp_payload_t*)payload;
                        configuration_attribute_t *ca;
@@ -273,7 +273,7 @@ static void add_attribute(private_mode_config_t *this, cp_payload_t *cp,
        entry_t *entry;
 
        cp->add_attribute(cp,
-                       configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE_V1,
+                       configuration_attribute_create_chunk(PLV1_CONFIGURATION_ATTRIBUTE,
                                                                                                 type, data));
        INIT(entry,
                .type = type,
@@ -296,7 +296,7 @@ static status_t build_request(private_mode_config_t *this, message_t *message)
        linked_list_t *vips;
        host_t *host;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_REQUEST);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REQUEST);
 
        vips = linked_list_create();
 
@@ -360,7 +360,7 @@ static status_t build_set(private_mode_config_t *this, message_t *message)
        host_t *any4, *any6, *found;
        char *name;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_SET);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_SET);
 
        id = this->ike_sa->get_other_eap_id(this->ike_sa);
        config = this->ike_sa->get_peer_cfg(this->ike_sa);
@@ -470,7 +470,7 @@ static status_t build_reply(private_mode_config_t *this, message_t *message)
        linked_list_t *vips, *pools;
        host_t *requested;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_REPLY);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REPLY);
 
        id = this->ike_sa->get_other_eap_id(this->ike_sa);
        config = this->ike_sa->get_peer_cfg(this->ike_sa);
@@ -511,7 +511,7 @@ static status_t build_reply(private_mode_config_t *this, message_t *message)
        while (enumerator->enumerate(enumerator, &type, &value))
        {
                cp->add_attribute(cp,
-                       configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE_V1,
+                       configuration_attribute_create_chunk(PLV1_CONFIGURATION_ATTRIBUTE,
                                                                                                 type, value));
        }
        enumerator->destroy(enumerator);
@@ -535,7 +535,7 @@ static status_t build_ack(private_mode_config_t *this, message_t *message)
        configuration_attribute_type_t type;
        entry_t *entry;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_ACK);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_ACK);
 
        /* return empty attributes for installed IPs */
 
@@ -552,7 +552,7 @@ static status_t build_ack(private_mode_config_t *this, message_t *message)
                        type = INTERNAL_IP4_ADDRESS;
                }
                cp->add_attribute(cp, configuration_attribute_create_chunk(
-                                                               CONFIGURATION_ATTRIBUTE_V1, type, chunk_empty));
+                                                               PLV1_CONFIGURATION_ATTRIBUTE, type, chunk_empty));
        }
        enumerator->destroy(enumerator);
 
@@ -560,7 +560,7 @@ static status_t build_ack(private_mode_config_t *this, message_t *message)
        while (enumerator->enumerate(enumerator, &entry))
        {
                cp->add_attribute(cp,
-                       configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE_V1,
+                       configuration_attribute_create_chunk(PLV1_CONFIGURATION_ATTRIBUTE,
                                                                                                 entry->type, chunk_empty));
        }
        enumerator->destroy(enumerator);
index 605c10cea88aad50fe14a92802aeb6511c73d3fe..499081caa19519b63722bdf181761d39f65e1b0d 100644 (file)
@@ -177,7 +177,7 @@ METHOD(task_t, build_i, status_t,
                DBG1(DBG_IKE, "sending DELETE for %N CHILD_SA with SPI %.8x",
                         protocol_id_names, this->protocol, ntohl(this->spi));
 
-               delete_payload = delete_payload_create(DELETE_V1, this->protocol);
+               delete_payload = delete_payload_create(PLV1_DELETE, this->protocol);
                delete_payload->add_spi(delete_payload, this->spi);
                message->add_payload(message, &delete_payload->payload_interface);
 
@@ -205,7 +205,7 @@ METHOD(task_t, process_r, status_t,
        payloads = message->create_payload_enumerator(message);
        while (payloads->enumerate(payloads, &payload))
        {
-               if (payload->get_type(payload) == DELETE_V1)
+               if (payload->get_type(payload) == PLV1_DELETE)
                {
                        delete_payload = (delete_payload_t*)payload;
                        protocol = delete_payload->get_protocol_id(delete_payload);
index 74b5c453abce14563b5e840b83c869a08a27e68a..e6273682d51c3ce7de0b76e9c576e5e23974f02b 100644 (file)
@@ -427,7 +427,7 @@ static bool add_nonce(private_quick_mode_t *this, chunk_t *nonce,
        }
        nonceg->destroy(nonceg);
 
-       nonce_payload = nonce_payload_create(NONCE_V1);
+       nonce_payload = nonce_payload_create(PLV1_NONCE);
        nonce_payload->set_nonce(nonce_payload, *nonce);
        message->add_payload(message, &nonce_payload->payload_interface);
 
@@ -442,7 +442,7 @@ static bool get_nonce(private_quick_mode_t *this, chunk_t *nonce,
 {
        nonce_payload_t *nonce_payload;
 
-       nonce_payload = (nonce_payload_t*)message->get_payload(message, NONCE_V1);
+       nonce_payload = (nonce_payload_t*)message->get_payload(message, PLV1_NONCE);
        if (!nonce_payload)
        {
                DBG1(DBG_IKE, "NONCE payload missing in message");
@@ -460,7 +460,7 @@ static void add_ke(private_quick_mode_t *this, message_t *message)
 {
        ke_payload_t *ke_payload;
 
-       ke_payload = ke_payload_create_from_diffie_hellman(KEY_EXCHANGE_V1, this->dh);
+       ke_payload = ke_payload_create_from_diffie_hellman(PLV1_KEY_EXCHANGE, this->dh);
        message->add_payload(message, &ke_payload->payload_interface);
 }
 
@@ -471,7 +471,7 @@ static bool get_ke(private_quick_mode_t *this, message_t *message)
 {
        ke_payload_t *ke_payload;
 
-       ke_payload = (ke_payload_t*)message->get_payload(message, KEY_EXCHANGE_V1);
+       ke_payload = (ke_payload_t*)message->get_payload(message, PLV1_KEY_EXCHANGE);
        if (!ke_payload)
        {
                DBG1(DBG_IKE, "KE payload missing");
@@ -537,7 +537,7 @@ static bool get_ts(private_quick_mode_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == ID_V1)
+               if (payload->get_type(payload) == PLV1_ID)
                {
                        id_payload = (id_payload_t*)payload;
 
@@ -640,9 +640,9 @@ static payload_type_t get_nat_oa_payload_type(ike_sa_t *ike_sa)
 {
        if (ike_sa->supports_extension(ike_sa, EXT_NATT_DRAFT_02_03))
        {
-               return NAT_OA_DRAFT_00_03_V1;
+               return PLV1_NAT_OA_DRAFT_00_03;
        }
-       return NAT_OA_V1;
+       return PLV1_NAT_OA;
 }
 
 /**
@@ -726,7 +726,7 @@ static status_t send_notify(private_quick_mode_t *this, notify_type_t type)
 {
        notify_payload_t *notify;
 
-       notify = notify_payload_create_from_protocol_and_type(NOTIFY_V1,
+       notify = notify_payload_create_from_protocol_and_type(PLV1_NOTIFY,
                                                                                                                  this->proto, type);
        notify->set_spi(notify, this->spi_i);
 
@@ -917,7 +917,7 @@ static bool has_notify_errors(private_quick_mode_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY_V1)
+               if (payload->get_type(payload) == PLV1_NOTIFY)
                {
                        notify_payload_t *notify;
                        notify_type_t type;
@@ -1000,7 +1000,7 @@ METHOD(task_t, process_r, status_t,
                        bool private;
 
                        sa_payload = (sa_payload_t*)message->get_payload(message,
-                                                                                                       SECURITY_ASSOCIATION_V1);
+                                                                                                       PLV1_SECURITY_ASSOCIATION);
                        if (!sa_payload)
                        {
                                DBG1(DBG_IKE, "sa payload missing");
@@ -1215,7 +1215,7 @@ METHOD(task_t, process_i, status_t,
                        bool private;
 
                        sa_payload = (sa_payload_t*)message->get_payload(message,
-                                                                                                       SECURITY_ASSOCIATION_V1);
+                                                                                                       PLV1_SECURITY_ASSOCIATION);
                        if (!sa_payload)
                        {
                                DBG1(DBG_IKE, "sa payload missing");
index f5555ecd29815a3ada7a70357a69b84072e101e7..9329dab5eb7f78a9c6edcd46de20b771a78cebf2 100644 (file)
@@ -277,7 +277,7 @@ METHOD(task_t, build_i_status, status_t,
 {
        cp_payload_t *cp;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_SET);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_SET);
        cp->add_attribute(cp,
                        configuration_attribute_create_value(XAUTH_STATUS, this->status));
 
@@ -291,7 +291,7 @@ METHOD(task_t, process_i_status, status_t,
 {
        cp_payload_t *cp;
 
-       cp = (cp_payload_t*)message->get_payload(message, CONFIGURATION_V1);
+       cp = (cp_payload_t*)message->get_payload(message, PLV1_CONFIGURATION);
        if (!cp || cp->get_type(cp) != CFG_ACK)
        {
                DBG1(DBG_IKE, "received invalid XAUTH status response");
@@ -354,11 +354,11 @@ METHOD(task_t, build_r_ack, status_t,
 {
        cp_payload_t *cp;
 
-       cp = cp_payload_create_type(CONFIGURATION_V1, CFG_ACK);
+       cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_ACK);
        cp->set_identifier(cp, this->identifier);
        cp->add_attribute(cp,
                        configuration_attribute_create_chunk(
-                                       CONFIGURATION_ATTRIBUTE_V1, XAUTH_STATUS, chunk_empty));
+                                       PLV1_CONFIGURATION_ATTRIBUTE, XAUTH_STATUS, chunk_empty));
 
        message->add_payload(message, (payload_t *)cp);
 
@@ -382,7 +382,7 @@ METHOD(task_t, process_r, status_t,
                        return NEED_MORE;
                }
        }
-       cp = (cp_payload_t*)message->get_payload(message, CONFIGURATION_V1);
+       cp = (cp_payload_t*)message->get_payload(message, PLV1_CONFIGURATION);
        if (!cp)
        {
                DBG1(DBG_IKE, "configuration payload missing in XAuth request");
@@ -438,7 +438,7 @@ METHOD(task_t, build_r, status_t,
 {
        if (!this->cp)
        {       /* send empty reply if building data failed */
-               this->cp = cp_payload_create_type(CONFIGURATION_V1, CFG_REPLY);
+               this->cp = cp_payload_create_type(PLV1_CONFIGURATION, CFG_REPLY);
        }
        message->add_payload(message, (payload_t *)this->cp);
        this->cp = NULL;
@@ -451,7 +451,7 @@ METHOD(task_t, process_i, status_t,
        identification_t *id;
        cp_payload_t *cp;
 
-       cp = (cp_payload_t*)message->get_payload(message, CONFIGURATION_V1);
+       cp = (cp_payload_t*)message->get_payload(message, PLV1_CONFIGURATION);
        if (!cp)
        {
                DBG1(DBG_IKE, "configuration payload missing in XAuth response");
index b8359cc88f4683f29d6bcc6da7b546653694fdb0..eed6d1996d8ee076f8f5e9c6afda881c76d2316a 100644 (file)
@@ -450,7 +450,7 @@ static bool verify_auth(private_eap_authenticator_t *this, message_t *message,
        keymat_v2_t *keymat;
 
        auth_payload = (auth_payload_t*)message->get_payload(message,
-                                                                                                                AUTHENTICATION);
+                                                                                                                PLV2_AUTH);
        if (!auth_payload)
        {
                DBG1(DBG_IKE, "AUTH payload missing");
@@ -532,7 +532,7 @@ METHOD(authenticator_t, process_server, status_t,
        else
        {
                eap_payload = (eap_payload_t*)message->get_payload(message,
-                                                                                                       EXTENSIBLE_AUTHENTICATION);
+                                                                                                       PLV2_EAP);
                if (!eap_payload)
                {
                        return FAILED;
@@ -590,7 +590,7 @@ METHOD(authenticator_t, process_client, status_t,
        }
 
        eap_payload = (eap_payload_t*)message->get_payload(message,
-                                                                                                       EXTENSIBLE_AUTHENTICATION);
+                                                                                                       PLV2_EAP);
        if (eap_payload)
        {
                switch (eap_payload->get_code(eap_payload))
index 997efe3590d01c66b717c38a905fc5144b14c264..c6a4b6ba4412e1d8687697191d03a5b049fe7597 100644 (file)
@@ -103,7 +103,7 @@ METHOD(authenticator_t, process, status_t,
        int keys_found = 0;
        keymat_v2_t *keymat;
 
-       auth_payload = (auth_payload_t*)message->get_payload(message, AUTHENTICATION);
+       auth_payload = (auth_payload_t*)message->get_payload(message, PLV2_AUTH);
        if (!auth_payload)
        {
                return FAILED;
index 5ceff40baaaa217e18bbb2c8b931c2fa884d6f38..6fb14bc06c21dd446da809d3baaff2d45b45aed4 100644 (file)
@@ -147,7 +147,7 @@ METHOD(authenticator_t, process, status_t,
        status_t status = NOT_FOUND;
        keymat_v2_t *keymat;
 
-       auth_payload = (auth_payload_t*)message->get_payload(message, AUTHENTICATION);
+       auth_payload = (auth_payload_t*)message->get_payload(message, PLV2_AUTH);
        if (!auth_payload)
        {
                return FAILED;
index c4e5ea7a0c9a219471cad9dae66a7077107202de..161c4fdaf4a392e7a1e36f9837c13ddd79b2f696 100644 (file)
@@ -748,7 +748,7 @@ static status_t process_payloads(message_t *message, check_t *check)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) != NOTIFY)
+               if (payload->get_type(payload) != PLV2_NOTIFY)
                {
                        DBG1(DBG_IKE, "ignoring payload of type '%N' while processing "
                                 "connectivity check", payload_type_names,
index a5252ab7047b8bc3be1581091d6628590df66bce..ada798bdc57cfd63f66eb379232731dee6c720f6 100644 (file)
@@ -792,7 +792,7 @@ static status_t process_request(private_task_manager_t *this,
                                {
                                        switch (payload->get_type(payload))
                                        {
-                                               case NOTIFY:
+                                               case PLV2_NOTIFY:
                                                {       /* if we find a rekey notify, its CHILD_SA rekeying */
                                                        notify = (notify_payload_t*)payload;
                                                        if (notify->get_notify_type(notify) == REKEY_SA &&
@@ -803,8 +803,8 @@ static status_t process_request(private_task_manager_t *this,
                                                        }
                                                        break;
                                                }
-                                               case TRAFFIC_SELECTOR_INITIATOR:
-                                               case TRAFFIC_SELECTOR_RESPONDER:
+                                               case PLV2_TS_INITIATOR:
+                                               case PLV2_TS_RESPONDER:
                                                {       /* if we don't find a TS, its IKE rekeying */
                                                        ts_found = TRUE;
                                                        break;
@@ -842,7 +842,7 @@ static status_t process_request(private_task_manager_t *this,
                                {
                                        switch (payload->get_type(payload))
                                        {
-                                               case NOTIFY:
+                                               case PLV2_NOTIFY:
                                                {
                                                        notify = (notify_payload_t*)payload;
                                                        switch (notify->get_notify_type(notify))
@@ -875,7 +875,7 @@ static status_t process_request(private_task_manager_t *this,
                                                        }
                                                        break;
                                                }
-                                               case DELETE:
+                                               case PLV2_DELETE:
                                                {
                                                        delete = (delete_payload_t*)payload;
                                                        if (delete->get_protocol_id(delete) == PROTO_IKE)
index 35b7e12c98e677e47dc70b99a356481171dc8e20..a1f01c276fa36de4986a50f1ecfacfa5d5fe63a0 100644 (file)
@@ -187,7 +187,7 @@ static status_t get_nonce(message_t *message, chunk_t *nonce)
 {
        nonce_payload_t *payload;
 
-       payload = (nonce_payload_t*)message->get_payload(message, NONCE);
+       payload = (nonce_payload_t*)message->get_payload(message, PLV2_NONCE);
        if (payload == NULL)
        {
                return FAILED;
@@ -731,7 +731,7 @@ static void build_payloads(private_child_create_t *this, message_t *message)
        /* add nonce payload if not in IKE_AUTH */
        if (message->get_exchange_type(message) == CREATE_CHILD_SA)
        {
-               nonce_payload = nonce_payload_create(NONCE);
+               nonce_payload = nonce_payload_create(PLV2_NONCE);
                nonce_payload->set_nonce(nonce_payload, this->my_nonce);
                message->add_payload(message, (payload_t*)nonce_payload);
        }
@@ -739,7 +739,7 @@ static void build_payloads(private_child_create_t *this, message_t *message)
        /* diffie hellman exchange, if PFS enabled */
        if (this->dh)
        {
-               ke_payload = ke_payload_create_from_diffie_hellman(KEY_EXCHANGE,
+               ke_payload = ke_payload_create_from_diffie_hellman(PLV2_KEY_EXCHANGE,
                                                                                                                   this->dh);
                message->add_payload(message, (payload_t*)ke_payload);
        }
@@ -866,11 +866,11 @@ static void process_payloads(private_child_create_t *this, message_t *message)
        {
                switch (payload->get_type(payload))
                {
-                       case SECURITY_ASSOCIATION:
+                       case PLV2_SECURITY_ASSOCIATION:
                                sa_payload = (sa_payload_t*)payload;
                                this->proposals = sa_payload->get_proposals(sa_payload);
                                break;
-                       case KEY_EXCHANGE:
+                       case PLV2_KEY_EXCHANGE:
                                ke_payload = (ke_payload_t*)payload;
                                if (!this->initiator)
                                {
@@ -884,15 +884,15 @@ static void process_payloads(private_child_create_t *this, message_t *message)
                                                                ke_payload->get_key_exchange_data(ke_payload));
                                }
                                break;
-                       case TRAFFIC_SELECTOR_INITIATOR:
+                       case PLV2_TS_INITIATOR:
                                ts_payload = (ts_payload_t*)payload;
                                this->tsi = ts_payload->get_traffic_selectors(ts_payload);
                                break;
-                       case TRAFFIC_SELECTOR_RESPONDER:
+                       case PLV2_TS_RESPONDER:
                                ts_payload = (ts_payload_t*)payload;
                                this->tsr = ts_payload->get_traffic_selectors(ts_payload);
                                break;
-                       case NOTIFY:
+                       case PLV2_NOTIFY:
                                handle_notify(this, (notify_payload_t*)payload);
                                break;
                        default:
@@ -1217,7 +1217,7 @@ METHOD(task_t, build_r, status_t,
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY)
+               if (payload->get_type(payload) == PLV2_NOTIFY)
                {
                        notify_payload_t *notify = (notify_payload_t*)payload;
 
@@ -1319,7 +1319,7 @@ METHOD(task_t, build_i_delete, status_t,
 
                proto = this->proposal->get_protocol(this->proposal);
                spi = this->child_sa->get_spi(this->child_sa, TRUE);
-               del = delete_payload_create(DELETE, proto);
+               del = delete_payload_create(PLV2_DELETE, proto);
                del->add_spi(del, spi);
                message->add_payload(message, (payload_t*)del);
 
@@ -1368,7 +1368,7 @@ METHOD(task_t, process_i, status_t,
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY)
+               if (payload->get_type(payload) == PLV2_NOTIFY)
                {
                        notify_payload_t *notify = (notify_payload_t*)payload;
                        notify_type_t type = notify->get_notify_type(notify);
index 88b032c8bd745c4b625863c4838cd5ab186a117d..2b1697423ff854b226e009c635532b3c0499ea07 100644 (file)
@@ -93,7 +93,7 @@ static void build_payloads(private_child_delete_t *this, message_t *message)
                        case PROTO_ESP:
                                if (esp == NULL)
                                {
-                                       esp = delete_payload_create(DELETE, PROTO_ESP);
+                                       esp = delete_payload_create(PLV2_DELETE, PROTO_ESP);
                                        message->add_payload(message, (payload_t*)esp);
                                }
                                esp->add_spi(esp, spi);
@@ -103,7 +103,7 @@ static void build_payloads(private_child_delete_t *this, message_t *message)
                        case PROTO_AH:
                                if (ah == NULL)
                                {
-                                       ah = delete_payload_create(DELETE, PROTO_AH);
+                                       ah = delete_payload_create(PLV2_DELETE, PROTO_AH);
                                        message->add_payload(message, (payload_t*)ah);
                                }
                                ah->add_spi(ah, spi);
@@ -133,7 +133,7 @@ static void process_payloads(private_child_delete_t *this, message_t *message)
        payloads = message->create_payload_enumerator(message);
        while (payloads->enumerate(payloads, &payload))
        {
-               if (payload->get_type(payload) == DELETE)
+               if (payload->get_type(payload) == PLV2_DELETE)
                {
                        delete_payload = (delete_payload_t*)payload;
                        protocol = delete_payload->get_protocol_id(delete_payload);
index d2003bb452de7c67b2c8ce0b0d769ee309bfd16d..db872827d78084fb9bb0e0671681fdad20829f46 100644 (file)
@@ -171,7 +171,7 @@ METHOD(task_t, build_i, status_t,
        config = this->child_sa->get_config(this->child_sa);
 
        /* we just need the rekey notify ... */
-       notify = notify_payload_create_from_protocol_and_type(NOTIFY,
+       notify = notify_payload_create_from_protocol_and_type(PLV2_NOTIFY,
                                                                                                        this->protocol, REKEY_SA);
        notify->set_spi(notify, this->spi);
        message->add_payload(message, (payload_t*)notify);
@@ -228,7 +228,7 @@ METHOD(task_t, build_r, status_t,
        this->child_create->set_config(this->child_create, config->get_ref(config));
        this->child_create->task.build(&this->child_create->task, message);
 
-       if (message->get_payload(message, SECURITY_ASSOCIATION) == NULL)
+       if (message->get_payload(message, PLV2_SECURITY_ASSOCIATION) == NULL)
        {
                /* rekeying failed, reuse old child */
                this->child_sa->set_state(this->child_sa, CHILD_INSTALLED);
@@ -332,7 +332,7 @@ METHOD(task_t, process_i, status_t,
                this->child_create->task.migrate(&this->child_create->task, this->ike_sa);
                return NEED_MORE;
        }
-       if (message->get_payload(message, SECURITY_ASSOCIATION) == NULL)
+       if (message->get_payload(message, PLV2_SECURITY_ASSOCIATION) == NULL)
        {
                /* establishing new child failed, reuse old. but not when we
                 * received a delete in the meantime */
index 800dab07e7c7c1cf95521db402696bee6fd07195..bf747a49edde8042ca086f84c5cd0807917445f9 100644 (file)
@@ -132,7 +132,7 @@ static status_t collect_my_init_data(private_ike_auth_t *this,
        nonce_payload_t *nonce;
 
        /* get the nonce that was generated in ike_init */
-       nonce = (nonce_payload_t*)message->get_payload(message, NONCE);
+       nonce = (nonce_payload_t*)message->get_payload(message, PLV2_NONCE);
        if (nonce == NULL)
        {
                return FAILED;
@@ -158,7 +158,7 @@ static status_t collect_other_init_data(private_ike_auth_t *this,
        nonce_payload_t *nonce;
 
        /* get the nonce that was generated in ike_init */
-       nonce = (nonce_payload_t*)message->get_payload(message, NONCE);
+       nonce = (nonce_payload_t*)message->get_payload(message, PLV2_NONCE);
        if (nonce == NULL)
        {
                return FAILED;
@@ -433,7 +433,7 @@ METHOD(task_t, build_i, status_t,
                        {
                                this->ike_sa->set_other_id(this->ike_sa, idr->clone(idr));
                                id_payload = id_payload_create_from_identification(
-                                                                                                                       ID_RESPONDER, idr);
+                                                                                                                       PLV2_ID_RESPONDER, idr);
                                message->add_payload(message, (payload_t*)id_payload);
                        }
                }
@@ -451,7 +451,7 @@ METHOD(task_t, build_i, status_t,
                        cfg->add(cfg, AUTH_RULE_IDENTITY, idi);
                }
                this->ike_sa->set_my_id(this->ike_sa, idi->clone(idi));
-               id_payload = id_payload_create_from_identification(ID_INITIATOR, idi);
+               id_payload = id_payload_create_from_identification(PLV2_ID_INITIATOR, idi);
                get_reserved_id_bytes(this, id_payload);
                message->add_payload(message, (payload_t*)id_payload);
 
@@ -498,7 +498,7 @@ METHOD(task_t, build_i, status_t,
        /* check for additional authentication rounds */
        if (do_another_auth(this))
        {
-               if (message->get_payload(message, AUTHENTICATION))
+               if (message->get_payload(message, PLV2_AUTH))
                {
                        message->add_notify(message, FALSE, ANOTHER_AUTH_FOLLOWS, chunk_empty);
                }
@@ -525,7 +525,7 @@ METHOD(task_t, process_r, status_t,
        if (this->my_auth == NULL && this->do_another_auth)
        {
                /* handle (optional) IDr payload, apply proposed identity */
-               id_payload = (id_payload_t*)message->get_payload(message, ID_RESPONDER);
+               id_payload = (id_payload_t*)message->get_payload(message, PLV2_ID_RESPONDER);
                if (id_payload)
                {
                        id = id_payload->get_identification(id_payload);
@@ -558,7 +558,7 @@ METHOD(task_t, process_r, status_t,
        if (this->other_auth == NULL)
        {
                /* handle IDi payload */
-               id_payload = (id_payload_t*)message->get_payload(message, ID_INITIATOR);
+               id_payload = (id_payload_t*)message->get_payload(message, PLV2_ID_INITIATOR);
                if (!id_payload)
                {
                        DBG1(DBG_IKE, "IDi payload missing");
@@ -578,7 +578,7 @@ METHOD(task_t, process_r, status_t,
                                return NEED_MORE;
                        }
                }
-               if (message->get_payload(message, AUTHENTICATION) == NULL)
+               if (message->get_payload(message, PLV2_AUTH) == NULL)
                {       /* before authenticating with EAP, we need a EAP config */
                        cand = get_auth_cfg(this, FALSE);
                        while (!cand || (
@@ -631,7 +631,7 @@ METHOD(task_t, process_r, status_t,
                        this->other_auth = NULL;
                        break;
                case NEED_MORE:
-                       if (message->get_payload(message, AUTHENTICATION))
+                       if (message->get_payload(message, PLV2_AUTH))
                        {       /* AUTH verification successful, but another build() needed */
                                break;
                        }
@@ -733,7 +733,7 @@ METHOD(task_t, build_r, status_t,
                        }
                }
 
-               id_payload = id_payload_create_from_identification(ID_RESPONDER, id);
+               id_payload = id_payload_create_from_identification(PLV2_ID_RESPONDER, id);
                get_reserved_id_bytes(this, id_payload);
                message->add_payload(message, (payload_t*)id_payload);
 
@@ -780,7 +780,7 @@ METHOD(task_t, build_r, status_t,
                        case NEED_MORE:
                                break;
                        default:
-                               if (message->get_payload(message, EXTENSIBLE_AUTHENTICATION))
+                               if (message->get_payload(message, PLV2_EAP))
                                {       /* skip AUTHENTICATION_FAILED if we have EAP_FAILURE */
                                        goto peer_auth_failed_no_notify;
                                }
@@ -900,7 +900,7 @@ METHOD(task_t, process_i, status_t,
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY)
+               if (payload->get_type(payload) == PLV2_NOTIFY)
                {
                        notify_payload_t *notify = (notify_payload_t*)payload;
                        notify_type_t type = notify->get_notify_type(notify);
@@ -956,7 +956,7 @@ METHOD(task_t, process_i, status_t,
 
                        /* handle IDr payload */
                        id_payload = (id_payload_t*)message->get_payload(message,
-                                                                                                                        ID_RESPONDER);
+                                                                                                                        PLV2_ID_RESPONDER);
                        if (!id_payload)
                        {
                                DBG1(DBG_IKE, "IDr payload missing");
@@ -968,7 +968,7 @@ METHOD(task_t, process_i, status_t,
                        cfg = this->ike_sa->get_auth_cfg(this->ike_sa, FALSE);
                        cfg->add(cfg, AUTH_RULE_IDENTITY, id->clone(id));
 
-                       if (message->get_payload(message, AUTHENTICATION))
+                       if (message->get_payload(message, PLV2_AUTH))
                        {
                                /* verify authentication data */
                                this->other_auth = authenticator_create_verifier(this->ike_sa,
index 6dbc4dec367cbfabfb9e03cdbcea087eabb9db31..5a9e08de28a1a8a64725a440a09bf3f8fe71278c 100644 (file)
@@ -63,14 +63,14 @@ static cert_payload_t *build_cert_payload(private_ike_cert_post_t *this,
 
        if (!this->ike_sa->supports_extension(this->ike_sa, EXT_HASH_AND_URL))
        {
-               return cert_payload_create_from_cert(CERTIFICATE, cert);
+               return cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
        }
 
        hasher = lib->crypto->create_hasher(lib->crypto, HASH_SHA1);
        if (!hasher)
        {
                DBG1(DBG_IKE, "unable to use hash-and-url: sha1 not supported");
-               return cert_payload_create_from_cert(CERTIFICATE, cert);
+               return cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
        }
 
        if (!cert->get_encoding(cert, CERT_ASN1_DER, &encoded))
@@ -83,7 +83,7 @@ static cert_payload_t *build_cert_payload(private_ike_cert_post_t *this,
        {
                hasher->destroy(hasher);
                chunk_free(&encoded);
-               return cert_payload_create_from_cert(CERTIFICATE, cert);
+               return cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
        }
        chunk_free(&encoded);
        hasher->destroy(hasher);
@@ -97,7 +97,7 @@ static cert_payload_t *build_cert_payload(private_ike_cert_post_t *this,
        }
        else
        {
-               payload = cert_payload_create_from_cert(CERTIFICATE, cert);
+               payload = cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
        }
        enumerator->destroy(enumerator);
        chunk_free(&hash);
@@ -145,7 +145,7 @@ static void add_im_certs(private_ike_cert_post_t *this, auth_cfg_t *auth,
        {
                if (type == AUTH_RULE_IM_CERT)
                {
-                       payload = cert_payload_create_from_cert(CERTIFICATE, cert);
+                       payload = cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
                        if (payload)
                        {
                                DBG1(DBG_IKE, "sending issuer cert \"%Y\"",
@@ -187,7 +187,7 @@ static void add_attribute_certs(private_ike_cert_post_t *this,
                        if (id && id->equals(id, subject->get_issuer(subject)) &&
                                cert->get_validity(cert, NULL, NULL, NULL))
                        {
-                               payload = cert_payload_create_from_cert(CERTIFICATE, cert);
+                               payload = cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
                                if (payload)
                                {
                                        DBG1(DBG_IKE, "sending attribute certificate "
@@ -210,7 +210,7 @@ static void build_certs(private_ike_cert_post_t *this, message_t *message)
        auth_payload_t *payload;
        auth_cfg_t *auth;
 
-       payload = (auth_payload_t*)message->get_payload(message, AUTHENTICATION);
+       payload = (auth_payload_t*)message->get_payload(message, PLV2_AUTH);
        peer_cfg = this->ike_sa->get_peer_cfg(this->ike_sa);
        if (!peer_cfg || !payload || payload->get_auth_method(payload) == AUTH_PSK)
        {       /* no CERT payload for EAP/PSK */
index 558b1e91409c124ed03dbfc516a9e5c16c04efc4..0dac975e7ea240fbc1162e439e4217ab42db0df3 100644 (file)
@@ -138,10 +138,10 @@ static void process_certreqs(private_ike_cert_pre_t *this, message_t *message)
        {
                switch (payload->get_type(payload))
                {
-                       case CERTIFICATE_REQUEST:
+                       case PLV2_CERTREQ:
                                process_certreq(this, (certreq_payload_t*)payload, auth);
                                break;
-                       case NOTIFY:
+                       case PLV2_NOTIFY:
                                process_notify(this, (notify_payload_t*)payload);
                                break;
                        default:
@@ -298,7 +298,7 @@ static void process_certs(private_ike_cert_pre_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == CERTIFICATE)
+               if (payload->get_type(payload) == PLV2_CERTIFICATE)
                {
                        cert_payload_t *cert_payload;
                        cert_encoding_t encoding;
@@ -469,7 +469,7 @@ static void build_certreqs(private_ike_cert_pre_t *this, message_t *message)
 static bool final_auth(message_t *message)
 {
        /* we check for an AUTH payload without a ANOTHER_AUTH_FOLLOWS notify */
-       if (message->get_payload(message, AUTHENTICATION) == NULL)
+       if (message->get_payload(message, PLV2_AUTH) == NULL)
        {
                return FALSE;
        }
index 17132feee1dc31c5587f5dec2d235cccf35c2e72..1a4c21b5418bf7c163ee1ac9fc020059f0bf413f 100644 (file)
@@ -98,7 +98,7 @@ static configuration_attribute_t *build_vip(host_t *vip)
                        chunk = chunk_cata("cc", chunk, prefix);
                }
        }
-       return configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE,
+       return configuration_attribute_create_chunk(PLV2_CONFIGURATION_ATTRIBUTE,
                                                                                                type, chunk);
 }
 
@@ -200,7 +200,7 @@ static void process_payloads(private_ike_config_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == CONFIGURATION)
+               if (payload->get_type(payload) == PLV2_CONFIGURATION)
                {
                        cp_payload_t *cp = (cp_payload_t*)payload;
                        configuration_attribute_t *ca;
@@ -268,7 +268,7 @@ METHOD(task_t, build_i, status_t,
 
                if (vips->get_count(vips))
                {
-                       cp = cp_payload_create_type(CONFIGURATION, CFG_REQUEST);
+                       cp = cp_payload_create_type(PLV2_CONFIGURATION, CFG_REQUEST);
                        enumerator = vips->create_enumerator(vips);
                        while (enumerator->enumerate(enumerator, &host))
                        {
@@ -288,11 +288,11 @@ METHOD(task_t, build_i, status_t,
                        /* create configuration attribute */
                        DBG2(DBG_IKE, "building %N attribute",
                                 configuration_attribute_type_names, type);
-                       ca = configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE,
+                       ca = configuration_attribute_create_chunk(PLV2_CONFIGURATION_ATTRIBUTE,
                                                                                                          type, data);
                        if (!cp)
                        {
-                               cp = cp_payload_create_type(CONFIGURATION, CFG_REQUEST);
+                               cp = cp_payload_create_type(PLV2_CONFIGURATION, CFG_REQUEST);
                        }
                        cp->add_attribute(cp, ca);
 
@@ -363,7 +363,7 @@ METHOD(task_t, build_r, status_t,
                                this->ike_sa->add_virtual_ip(this->ike_sa, FALSE, found);
                                if (!cp)
                                {
-                                       cp = cp_payload_create_type(CONFIGURATION, CFG_REPLY);
+                                       cp = cp_payload_create_type(PLV2_CONFIGURATION, CFG_REPLY);
                                }
                                cp->add_attribute(cp, build_vip(found));
                                vips->insert_last(vips, found);
@@ -407,12 +407,12 @@ METHOD(task_t, build_r, status_t,
                {
                        if (!cp)
                        {
-                               cp = cp_payload_create_type(CONFIGURATION, CFG_REPLY);
+                               cp = cp_payload_create_type(PLV2_CONFIGURATION, CFG_REPLY);
                        }
                        DBG2(DBG_IKE, "building %N attribute",
                                 configuration_attribute_type_names, type);
                        cp->add_attribute(cp,
-                               configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE,
+                               configuration_attribute_create_chunk(PLV2_CONFIGURATION_ATTRIBUTE,
                                                                                                         type, value));
                }
                enumerator->destroy(enumerator);
index 9bc62bf2a835dff69abc75dbef3d6cf9880af47f..e972dba07b6ca608f0fcad0a3e946db741e917fb 100644 (file)
@@ -65,7 +65,7 @@ METHOD(task_t, build_i, status_t,
                 this->ike_sa->get_other_host(this->ike_sa),
                 this->ike_sa->get_other_id(this->ike_sa));
 
-       delete_payload = delete_payload_create(DELETE, PROTO_IKE);
+       delete_payload = delete_payload_create(PLV2_DELETE, PROTO_IKE);
        message->add_payload(message, (payload_t*)delete_payload);
 
        if (this->ike_sa->get_state(this->ike_sa) == IKE_REKEYING)
index 278bdc3f2cb95ca95bb4839f6bdf1fb0a0817d49..e3c18ea0f8991f4de0873cebd494f0008dd1006a 100644 (file)
@@ -147,9 +147,9 @@ static void build_payloads(private_ike_init_t *this, message_t *message)
        }
        message->add_payload(message, (payload_t*)sa_payload);
 
-       nonce_payload = nonce_payload_create(NONCE);
+       nonce_payload = nonce_payload_create(PLV2_NONCE);
        nonce_payload->set_nonce(nonce_payload, this->my_nonce);
-       ke_payload = ke_payload_create_from_diffie_hellman(KEY_EXCHANGE, this->dh);
+       ke_payload = ke_payload_create_from_diffie_hellman(PLV2_KEY_EXCHANGE, this->dh);
 
        if (this->old_sa)
        {       /* payload order differs if we are rekeying */
@@ -176,7 +176,7 @@ static void process_payloads(private_ike_init_t *this, message_t *message)
        {
                switch (payload->get_type(payload))
                {
-                       case SECURITY_ASSOCIATION:
+                       case PLV2_SECURITY_ASSOCIATION:
                        {
                                sa_payload_t *sa_payload = (sa_payload_t*)payload;
                                linked_list_t *proposal_list;
@@ -196,7 +196,7 @@ static void process_payloads(private_ike_init_t *this, message_t *message)
                                                                                          offsetof(proposal_t, destroy));
                                break;
                        }
-                       case KEY_EXCHANGE:
+                       case PLV2_KEY_EXCHANGE:
                        {
                                ke_payload_t *ke_payload = (ke_payload_t*)payload;
 
@@ -213,7 +213,7 @@ static void process_payloads(private_ike_init_t *this, message_t *message)
                                }
                                break;
                        }
-                       case NONCE:
+                       case PLV2_NONCE:
                        {
                                nonce_payload_t *nonce_payload = (nonce_payload_t*)payload;
 
@@ -449,7 +449,7 @@ METHOD(task_t, process_i, status_t,
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == NOTIFY)
+               if (payload->get_type(payload) == PLV2_NOTIFY)
                {
                        notify_payload_t *notify = (notify_payload_t*)payload;
                        notify_type_t type = notify->get_notify_type(notify);
index 135c06d1927dbd00c8967fa82877a12874908f4e..a7e7505a19a9a133825333169b67c8e94e70e539 100644 (file)
@@ -171,7 +171,7 @@ static void process_payloads(private_ike_me_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) != NOTIFY)
+               if (payload->get_type(payload) != PLV2_NOTIFY)
                {
                        continue;
                }
@@ -277,7 +277,7 @@ METHOD(task_t, build_i, status_t,
                {
                        rng_t *rng;
                        id_payload_t *id_payload;
-                       id_payload = id_payload_create_from_identification(ID_PEER,
+                       id_payload = id_payload_create_from_identification(PLV2_ID_PEER,
                                                                                                                           this->peer_id);
                        message->add_payload(message, (payload_t*)id_payload);
 
@@ -339,7 +339,7 @@ METHOD(task_t, process_r, status_t,
                case ME_CONNECT:
                {
                        id_payload_t *id_payload;
-                       id_payload = (id_payload_t*)message->get_payload(message, ID_PEER);
+                       id_payload = (id_payload_t*)message->get_payload(message, PLV2_ID_PEER);
                        if (!id_payload)
                        {
                                DBG1(DBG_IKE, "received ME_CONNECT without ID_PEER payload"
@@ -534,7 +534,7 @@ METHOD(task_t, build_i_ms, status_t,
                case ME_CONNECT:
                {
                        id_payload_t *id_payload;
-                       id_payload = id_payload_create_from_identification(ID_PEER,
+                       id_payload = id_payload_create_from_identification(PLV2_ID_PEER,
                                                                                                                           this->peer_id);
                        message->add_payload(message, (payload_t*)id_payload);
 
@@ -594,7 +594,7 @@ METHOD(task_t, process_r_ms, status_t,
                case ME_CONNECT:
                {
                        id_payload_t *id_payload;
-                       id_payload = (id_payload_t*)message->get_payload(message, ID_PEER);
+                       id_payload = (id_payload_t*)message->get_payload(message, PLV2_ID_PEER);
                        if (!id_payload)
                        {
                                DBG1(DBG_IKE, "received ME_CONNECT without ID_PEER payload"
index ae3526f42a60e3e113f4f503a0cb130fbefe69a3..00ca615d820a3c669c9700f3bd5ea28a150733f2 100644 (file)
@@ -96,7 +96,7 @@ static void process_payloads(private_ike_mobike_t *this, message_t *message)
                chunk_t data;
                host_t *host;
 
-               if (payload->get_type(payload) != NOTIFY)
+               if (payload->get_type(payload) != PLV2_NOTIFY)
                {
                        continue;
                }
index 4fc968f251fbccbc764cd136083f16f1d2683132..9e0eb68ce9b86a967ad156d8844ccd511705f666 100644 (file)
@@ -172,7 +172,7 @@ static notify_payload_t *build_natd_payload(private_ike_natd_t *this,
        {
                return NULL;
        }
-       notify = notify_payload_create(NOTIFY);
+       notify = notify_payload_create(PLV2_NOTIFY);
        notify->set_notify_type(notify, type);
        notify->set_notification_data(notify, hash);
        chunk_free(&hash);
@@ -206,7 +206,7 @@ static void process_payloads(private_ike_natd_t *this, message_t *message)
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) != NOTIFY)
+               if (payload->get_type(payload) != PLV2_NOTIFY)
                {
                        continue;
                }
@@ -381,7 +381,7 @@ METHOD(task_t, build_r, status_t,
 
        /* only add notifies on successful responses. */
        if (message->get_exchange_type(message) == IKE_SA_INIT &&
-               message->get_payload(message, SECURITY_ASSOCIATION) == NULL)
+               message->get_payload(message, PLV2_SECURITY_ASSOCIATION) == NULL)
        {
                return SUCCESS;
        }
index 16ac166739f06e26040935a0a6b6b8a3a5efba28..d536af2180ee3a5a09117aaa32b413375e23bd17 100644 (file)
@@ -92,7 +92,7 @@ METHOD(task_t, build, status_t,
                if (vids[i].extension == EXT_STRONGSWAN && strongswan)
                {
                        DBG2(DBG_IKE, "sending %s vendor ID", vids[i].desc);
-                       vid = vendor_id_payload_create_data(VENDOR_ID,
+                       vid = vendor_id_payload_create_data(PLV2_VENDOR_ID,
                                                                                chunk_clone(get_vid_data(&vids[i])));
                        message->add_payload(message, &vid->payload_interface);
                }
@@ -111,7 +111,7 @@ METHOD(task_t, process, status_t,
        enumerator = message->create_payload_enumerator(message);
        while (enumerator->enumerate(enumerator, &payload))
        {
-               if (payload->get_type(payload) == VENDOR_ID)
+               if (payload->get_type(payload) == PLV2_VENDOR_ID)
                {
                        vendor_id_payload_t *vid;
                        chunk_t data;