From d0f99dc765eccf28576e5273612b02a15f0c891b Mon Sep 17 00:00:00 2001 From: Mathew Inwood Date: Wed, 28 Apr 2021 09:49:58 +0000 Subject: Add IPsec SDK prebuilts. They are moved here from vendor/unbundled_google/modules. Test: m Bug: 180769414 Change-Id: I72f486b4561831cd953fcdb1b6765249a787e213 --- Android.bp | 33 ++ .../module_lib/android.net.ipsec.ike-removed.txt | 1 + current/module_lib/android.net.ipsec.ike.jar | Bin 0 -> 34105 bytes current/module_lib/android.net.ipsec.ike.srcjar | Bin 0 -> 22961 bytes current/module_lib/android.net.ipsec.ike.txt | 1 + current/public/android.net.ipsec.ike-removed.txt | 1 + current/public/android.net.ipsec.ike.jar | Bin 0 -> 5184 bytes current/public/android.net.ipsec.ike.srcjar | Bin 0 -> 8137 bytes current/public/android.net.ipsec.ike.txt | 1 + current/system/android.net.ipsec.ike-removed.txt | 1 + current/system/android.net.ipsec.ike.jar | Bin 0 -> 34105 bytes current/system/android.net.ipsec.ike.srcjar | Bin 0 -> 22961 bytes current/system/android.net.ipsec.ike.txt | 358 +++++++++++++++++++++ 13 files changed, 396 insertions(+) create mode 100644 Android.bp create mode 100644 current/module_lib/android.net.ipsec.ike-removed.txt create mode 100644 current/module_lib/android.net.ipsec.ike.jar create mode 100644 current/module_lib/android.net.ipsec.ike.srcjar create mode 100644 current/module_lib/android.net.ipsec.ike.txt create mode 100644 current/public/android.net.ipsec.ike-removed.txt create mode 100644 current/public/android.net.ipsec.ike.jar create mode 100644 current/public/android.net.ipsec.ike.srcjar create mode 100644 current/public/android.net.ipsec.ike.txt create mode 100644 current/system/android.net.ipsec.ike-removed.txt create mode 100644 current/system/android.net.ipsec.ike.jar create mode 100644 current/system/android.net.ipsec.ike.srcjar create mode 100644 current/system/android.net.ipsec.ike.txt diff --git a/Android.bp b/Android.bp new file mode 100644 index 0000000..6a2693c --- /dev/null +++ b/Android.bp @@ -0,0 +1,33 @@ + + +java_sdk_library_import { + name: "android.net.ipsec.ike", + owner: "google", + prefer: false, + shared_library: true, + apex_available: [ + "com.android.ipsec", + "test_com.android.ipsec", + ], + public: { + jars: ["current/public/android.net.ipsec.ike.jar"], + stub_srcs: ["current/public/android.net.ipsec.ike.srcjar"], + current_api: "current/public/android.net.ipsec.ike.txt", + removed_api: "current/public/android.net.ipsec.ike-removed.txt", + sdk_version: "module_current", + }, + system: { + jars: ["current/system/android.net.ipsec.ike.jar"], + stub_srcs: ["current/system/android.net.ipsec.ike.srcjar"], + current_api: "current/system/android.net.ipsec.ike.txt", + removed_api: "current/system/android.net.ipsec.ike-removed.txt", + sdk_version: "module_current", + }, + module_lib: { + jars: ["current/module_lib/android.net.ipsec.ike.jar"], + stub_srcs: ["current/module_lib/android.net.ipsec.ike.srcjar"], + current_api: "current/module_lib/android.net.ipsec.ike.txt", + removed_api: "current/module_lib/android.net.ipsec.ike-removed.txt", + sdk_version: "module_current", + }, +} diff --git a/current/module_lib/android.net.ipsec.ike-removed.txt b/current/module_lib/android.net.ipsec.ike-removed.txt new file mode 100644 index 0000000..d802177 --- /dev/null +++ b/current/module_lib/android.net.ipsec.ike-removed.txt @@ -0,0 +1 @@ +// Signature format: 2.0 diff --git a/current/module_lib/android.net.ipsec.ike.jar b/current/module_lib/android.net.ipsec.ike.jar new file mode 100644 index 0000000..2ef9e96 Binary files /dev/null and b/current/module_lib/android.net.ipsec.ike.jar differ diff --git a/current/module_lib/android.net.ipsec.ike.srcjar b/current/module_lib/android.net.ipsec.ike.srcjar new file mode 100644 index 0000000..f1cf4a6 Binary files /dev/null and b/current/module_lib/android.net.ipsec.ike.srcjar differ diff --git a/current/module_lib/android.net.ipsec.ike.txt b/current/module_lib/android.net.ipsec.ike.txt new file mode 100644 index 0000000..d802177 --- /dev/null +++ b/current/module_lib/android.net.ipsec.ike.txt @@ -0,0 +1 @@ +// Signature format: 2.0 diff --git a/current/public/android.net.ipsec.ike-removed.txt b/current/public/android.net.ipsec.ike-removed.txt new file mode 100644 index 0000000..d802177 --- /dev/null +++ b/current/public/android.net.ipsec.ike-removed.txt @@ -0,0 +1 @@ +// Signature format: 2.0 diff --git a/current/public/android.net.ipsec.ike.jar b/current/public/android.net.ipsec.ike.jar new file mode 100644 index 0000000..e817843 Binary files /dev/null and b/current/public/android.net.ipsec.ike.jar differ diff --git a/current/public/android.net.ipsec.ike.srcjar b/current/public/android.net.ipsec.ike.srcjar new file mode 100644 index 0000000..a9fed69 Binary files /dev/null and b/current/public/android.net.ipsec.ike.srcjar differ diff --git a/current/public/android.net.ipsec.ike.txt b/current/public/android.net.ipsec.ike.txt new file mode 100644 index 0000000..d802177 --- /dev/null +++ b/current/public/android.net.ipsec.ike.txt @@ -0,0 +1 @@ +// Signature format: 2.0 diff --git a/current/system/android.net.ipsec.ike-removed.txt b/current/system/android.net.ipsec.ike-removed.txt new file mode 100644 index 0000000..d802177 --- /dev/null +++ b/current/system/android.net.ipsec.ike-removed.txt @@ -0,0 +1 @@ +// Signature format: 2.0 diff --git a/current/system/android.net.ipsec.ike.jar b/current/system/android.net.ipsec.ike.jar new file mode 100644 index 0000000..2ef9e96 Binary files /dev/null and b/current/system/android.net.ipsec.ike.jar differ diff --git a/current/system/android.net.ipsec.ike.srcjar b/current/system/android.net.ipsec.ike.srcjar new file mode 100644 index 0000000..f1cf4a6 Binary files /dev/null and b/current/system/android.net.ipsec.ike.srcjar differ diff --git a/current/system/android.net.ipsec.ike.txt b/current/system/android.net.ipsec.ike.txt new file mode 100644 index 0000000..d42f8c0 --- /dev/null +++ b/current/system/android.net.ipsec.ike.txt @@ -0,0 +1,358 @@ +// Signature format: 2.0 +package android.net.eap { + + public final class EapSessionConfig { + method @Nullable public android.net.eap.EapSessionConfig.EapAkaConfig getEapAkaConfig(); + method @Nullable public android.net.eap.EapSessionConfig.EapAkaPrimeConfig getEapAkaPrimeConfig(); + method @NonNull public byte[] getEapIdentity(); + method @Nullable public android.net.eap.EapSessionConfig.EapMsChapV2Config getEapMsChapV2onfig(); + method @Nullable public android.net.eap.EapSessionConfig.EapSimConfig getEapSimConfig(); + } + + public static final class EapSessionConfig.Builder { + ctor public EapSessionConfig.Builder(); + method @NonNull public android.net.eap.EapSessionConfig build(); + method @NonNull public android.net.eap.EapSessionConfig.Builder setEapAkaConfig(int, int); + method @NonNull public android.net.eap.EapSessionConfig.Builder setEapAkaPrimeConfig(int, int, @NonNull String, boolean); + method @NonNull public android.net.eap.EapSessionConfig.Builder setEapIdentity(@NonNull byte[]); + method @NonNull public android.net.eap.EapSessionConfig.Builder setEapMsChapV2Config(@NonNull String, @NonNull String); + method @NonNull public android.net.eap.EapSessionConfig.Builder setEapSimConfig(int, int); + } + + public static class EapSessionConfig.EapAkaConfig extends android.net.eap.EapSessionConfig.EapUiccConfig { + } + + public static class EapSessionConfig.EapAkaPrimeConfig extends android.net.eap.EapSessionConfig.EapAkaConfig { + method public boolean allowsMismatchedNetworkNames(); + method @NonNull public String getNetworkName(); + } + + public abstract static class EapSessionConfig.EapMethodConfig { + method public int getMethodType(); + } + + public static class EapSessionConfig.EapMsChapV2Config extends android.net.eap.EapSessionConfig.EapMethodConfig { + method @NonNull public String getPassword(); + method @NonNull public String getUsername(); + } + + public static class EapSessionConfig.EapSimConfig extends android.net.eap.EapSessionConfig.EapUiccConfig { + } + + public abstract static class EapSessionConfig.EapUiccConfig extends android.net.eap.EapSessionConfig.EapMethodConfig { + method public int getAppType(); + method public int getSubId(); + } + +} + +package android.net.ipsec.ike { + + public final class ChildSaProposal extends android.net.ipsec.ike.SaProposal { + } + + public static final class ChildSaProposal.Builder { + ctor public ChildSaProposal.Builder(); + method @NonNull public android.net.ipsec.ike.ChildSaProposal.Builder addDhGroup(int); + method @NonNull public android.net.ipsec.ike.ChildSaProposal.Builder addEncryptionAlgorithm(int, int); + method @NonNull public android.net.ipsec.ike.ChildSaProposal.Builder addIntegrityAlgorithm(int); + method @NonNull public android.net.ipsec.ike.ChildSaProposal build(); + } + + public interface ChildSessionCallback { + method public void onClosed(); + method public void onClosedExceptionally(@NonNull android.net.ipsec.ike.exceptions.IkeException); + method public void onIpSecTransformCreated(@NonNull android.net.IpSecTransform, int); + method public void onIpSecTransformDeleted(@NonNull android.net.IpSecTransform, int); + method public void onOpened(@NonNull android.net.ipsec.ike.ChildSessionConfiguration); + } + + public final class ChildSessionConfiguration { + method @NonNull public java.util.List getInboundTrafficSelectors(); + method @NonNull public java.util.List getInternalAddresses(); + method @NonNull public java.util.List getInternalDhcpServers(); + method @NonNull public java.util.List getInternalDnsServers(); + method @NonNull public java.util.List getInternalSubnets(); + method @NonNull public java.util.List getOutboundTrafficSelectors(); + } + + public abstract class ChildSessionParams { + method @IntRange(from=0x12c, to=0x3840) public int getHardLifetimeSeconds(); + method @NonNull public java.util.List getInboundTrafficSelectors(); + method @NonNull public java.util.List getOutboundTrafficSelectors(); + method @NonNull public java.util.List getSaProposals(); + method @IntRange(from=0x78, to=0x3840) public int getSoftLifetimeSeconds(); + } + + public final class IkeDerAsn1DnIdentification extends android.net.ipsec.ike.IkeIdentification { + ctor public IkeDerAsn1DnIdentification(@NonNull javax.security.auth.x500.X500Principal); + field @NonNull public final javax.security.auth.x500.X500Principal derAsn1Dn; + } + + public class IkeFqdnIdentification extends android.net.ipsec.ike.IkeIdentification { + ctor public IkeFqdnIdentification(@NonNull String); + field @NonNull public final String fqdn; + } + + public abstract class IkeIdentification { + } + + public final class IkeIpv4AddrIdentification extends android.net.ipsec.ike.IkeIdentification { + ctor public IkeIpv4AddrIdentification(@NonNull java.net.Inet4Address); + field @NonNull public final java.net.Inet4Address ipv4Address; + } + + public class IkeIpv6AddrIdentification extends android.net.ipsec.ike.IkeIdentification { + ctor public IkeIpv6AddrIdentification(@NonNull java.net.Inet6Address); + field @NonNull public final java.net.Inet6Address ipv6Address; + } + + public final class IkeKeyIdIdentification extends android.net.ipsec.ike.IkeIdentification { + ctor public IkeKeyIdIdentification(@NonNull byte[]); + field @NonNull public final byte[] keyId; + } + + public final class IkeRfc822AddrIdentification extends android.net.ipsec.ike.IkeIdentification { + ctor public IkeRfc822AddrIdentification(@NonNull String); + field @NonNull public final String rfc822Name; + } + + public final class IkeSaProposal extends android.net.ipsec.ike.SaProposal { + method @NonNull public java.util.List getPseudorandomFunctions(); + } + + public static final class IkeSaProposal.Builder { + ctor public IkeSaProposal.Builder(); + method @NonNull public android.net.ipsec.ike.IkeSaProposal.Builder addDhGroup(int); + method @NonNull public android.net.ipsec.ike.IkeSaProposal.Builder addEncryptionAlgorithm(int, int); + method @NonNull public android.net.ipsec.ike.IkeSaProposal.Builder addIntegrityAlgorithm(int); + method @NonNull public android.net.ipsec.ike.IkeSaProposal.Builder addPseudorandomFunction(int); + method @NonNull public android.net.ipsec.ike.IkeSaProposal build(); + } + + public final class IkeSession implements java.lang.AutoCloseable { + ctor public IkeSession(@NonNull android.content.Context, @NonNull android.net.ipsec.ike.IkeSessionParams, @NonNull android.net.ipsec.ike.ChildSessionParams, @NonNull java.util.concurrent.Executor, @NonNull android.net.ipsec.ike.IkeSessionCallback, @NonNull android.net.ipsec.ike.ChildSessionCallback); + method public void close(); + method public void closeChildSession(@NonNull android.net.ipsec.ike.ChildSessionCallback); + method public void kill(); + method public void openChildSession(@NonNull android.net.ipsec.ike.ChildSessionParams, @NonNull android.net.ipsec.ike.ChildSessionCallback); + } + + public interface IkeSessionCallback { + method public void onClosed(); + method public void onClosedExceptionally(@NonNull android.net.ipsec.ike.exceptions.IkeException); + method public void onError(@NonNull android.net.ipsec.ike.exceptions.IkeProtocolException); + method public void onOpened(@NonNull android.net.ipsec.ike.IkeSessionConfiguration); + } + + public final class IkeSessionConfiguration { + method @NonNull public android.net.ipsec.ike.IkeSessionConnectionInfo getIkeSessionConnectionInfo(); + method @NonNull public java.util.List getPcscfServers(); + method @NonNull public String getRemoteApplicationVersion(); + method @NonNull public java.util.List getRemoteVendorIds(); + method public boolean isIkeExtensionEnabled(int); + field public static final int EXTENSION_TYPE_FRAGMENTATION = 1; // 0x1 + field public static final int EXTENSION_TYPE_MOBIKE = 2; // 0x2 + } + + public final class IkeSessionConnectionInfo { + method @NonNull public java.net.InetAddress getLocalAddress(); + method @NonNull public android.net.Network getNetwork(); + method @NonNull public java.net.InetAddress getRemoteAddress(); + } + + public final class IkeSessionParams { + method @NonNull public java.util.List getConfigurationRequests(); + method @IntRange(from=0x14, to=0x708) public int getDpdDelaySeconds(); + method @IntRange(from=0x12c, to=0x15180) public int getHardLifetimeSeconds(); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.IkeAuthConfig getLocalAuthConfig(); + method @NonNull public android.net.ipsec.ike.IkeIdentification getLocalIdentification(); + method @NonNull public android.net.Network getNetwork(); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.IkeAuthConfig getRemoteAuthConfig(); + method @NonNull public android.net.ipsec.ike.IkeIdentification getRemoteIdentification(); + method public int[] getRetransmissionTimeoutsMillis(); + method @NonNull public java.util.List getSaProposals(); + method @NonNull public String getServerHostname(); + method @IntRange(from=0x78, to=0x15180) public int getSoftLifetimeSeconds(); + method public boolean hasIkeOption(int); + field public static final int IKE_OPTION_ACCEPT_ANY_REMOTE_ID = 0; // 0x0 + field public static final int IKE_OPTION_EAP_ONLY_AUTH = 1; // 0x1 + } + + public static final class IkeSessionParams.Builder { + ctor public IkeSessionParams.Builder(@NonNull android.content.Context); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder addIkeOption(int); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder addPcscfServerRequest(@NonNull java.net.InetAddress); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder addPcscfServerRequest(int); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder addSaProposal(@NonNull android.net.ipsec.ike.IkeSaProposal); + method @NonNull public android.net.ipsec.ike.IkeSessionParams build(); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder removeIkeOption(int); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setAuthDigitalSignature(@Nullable java.security.cert.X509Certificate, @NonNull java.security.cert.X509Certificate, @NonNull java.security.PrivateKey); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setAuthDigitalSignature(@Nullable java.security.cert.X509Certificate, @NonNull java.security.cert.X509Certificate, @NonNull java.util.List, @NonNull java.security.PrivateKey); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setAuthEap(@Nullable java.security.cert.X509Certificate, @NonNull android.net.eap.EapSessionConfig); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setAuthPsk(@NonNull byte[]); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setDpdDelaySeconds(@IntRange(from=0x14, to=0x708) int); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setLifetimeSeconds(@IntRange(from=0x12c, to=0x15180) int, @IntRange(from=0x78, to=0x15180) int); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setLocalIdentification(@NonNull android.net.ipsec.ike.IkeIdentification); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setNetwork(@NonNull android.net.Network); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setRemoteIdentification(@NonNull android.net.ipsec.ike.IkeIdentification); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setRetransmissionTimeoutsMillis(@NonNull int[]); + method @NonNull public android.net.ipsec.ike.IkeSessionParams.Builder setServerHostname(@NonNull String); + } + + public static interface IkeSessionParams.ConfigRequestIpv4PcscfServer extends android.net.ipsec.ike.IkeSessionParams.IkeConfigRequest { + method @Nullable public java.net.Inet4Address getAddress(); + } + + public static interface IkeSessionParams.ConfigRequestIpv6PcscfServer extends android.net.ipsec.ike.IkeSessionParams.IkeConfigRequest { + method @Nullable public java.net.Inet6Address getAddress(); + } + + public abstract static class IkeSessionParams.IkeAuthConfig { + } + + public static class IkeSessionParams.IkeAuthDigitalSignLocalConfig extends android.net.ipsec.ike.IkeSessionParams.IkeAuthConfig { + method @NonNull public java.security.cert.X509Certificate getClientEndCertificate(); + method @NonNull public java.util.List getIntermediateCertificates(); + method @NonNull public java.security.PrivateKey getPrivateKey(); + } + + public static class IkeSessionParams.IkeAuthDigitalSignRemoteConfig extends android.net.ipsec.ike.IkeSessionParams.IkeAuthConfig { + method @Nullable public java.security.cert.X509Certificate getRemoteCaCert(); + } + + public static class IkeSessionParams.IkeAuthEapConfig extends android.net.ipsec.ike.IkeSessionParams.IkeAuthConfig { + method @NonNull public android.net.eap.EapSessionConfig getEapConfig(); + } + + public static class IkeSessionParams.IkeAuthPskConfig extends android.net.ipsec.ike.IkeSessionParams.IkeAuthConfig { + method @NonNull public byte[] getPsk(); + } + + public static interface IkeSessionParams.IkeConfigRequest { + } + + public final class IkeTrafficSelector { + ctor public IkeTrafficSelector(int, int, @NonNull java.net.InetAddress, @NonNull java.net.InetAddress); + field public final int endPort; + field @NonNull public final java.net.InetAddress endingAddress; + field public final int startPort; + field @NonNull public final java.net.InetAddress startingAddress; + } + + public abstract class SaProposal { + method @NonNull public java.util.List getDhGroups(); + method @NonNull public java.util.List> getEncryptionAlgorithms(); + method @NonNull public java.util.List getIntegrityAlgorithms(); + field public static final int DH_GROUP_1024_BIT_MODP = 2; // 0x2 + field public static final int DH_GROUP_2048_BIT_MODP = 14; // 0xe + field public static final int DH_GROUP_NONE = 0; // 0x0 + field public static final int ENCRYPTION_ALGORITHM_3DES = 3; // 0x3 + field public static final int ENCRYPTION_ALGORITHM_AES_CBC = 12; // 0xc + field public static final int ENCRYPTION_ALGORITHM_AES_GCM_12 = 19; // 0x13 + field public static final int ENCRYPTION_ALGORITHM_AES_GCM_16 = 20; // 0x14 + field public static final int ENCRYPTION_ALGORITHM_AES_GCM_8 = 18; // 0x12 + field public static final int INTEGRITY_ALGORITHM_AES_XCBC_96 = 5; // 0x5 + field public static final int INTEGRITY_ALGORITHM_HMAC_SHA1_96 = 2; // 0x2 + field public static final int INTEGRITY_ALGORITHM_HMAC_SHA2_256_128 = 12; // 0xc + field public static final int INTEGRITY_ALGORITHM_HMAC_SHA2_384_192 = 13; // 0xd + field public static final int INTEGRITY_ALGORITHM_HMAC_SHA2_512_256 = 14; // 0xe + field public static final int INTEGRITY_ALGORITHM_NONE = 0; // 0x0 + field public static final int KEY_LEN_AES_128 = 128; // 0x80 + field public static final int KEY_LEN_AES_192 = 192; // 0xc0 + field public static final int KEY_LEN_AES_256 = 256; // 0x100 + field public static final int KEY_LEN_UNUSED = 0; // 0x0 + field public static final int PSEUDORANDOM_FUNCTION_AES128_XCBC = 4; // 0x4 + field public static final int PSEUDORANDOM_FUNCTION_HMAC_SHA1 = 2; // 0x2 + field public static final int PSEUDORANDOM_FUNCTION_SHA2_256 = 5; // 0x5 + field public static final int PSEUDORANDOM_FUNCTION_SHA2_384 = 6; // 0x6 + field public static final int PSEUDORANDOM_FUNCTION_SHA2_512 = 7; // 0x7 + } + + public final class TransportModeChildSessionParams extends android.net.ipsec.ike.ChildSessionParams { + } + + public static final class TransportModeChildSessionParams.Builder { + ctor public TransportModeChildSessionParams.Builder(); + method @NonNull public android.net.ipsec.ike.TransportModeChildSessionParams.Builder addInboundTrafficSelectors(@NonNull android.net.ipsec.ike.IkeTrafficSelector); + method @NonNull public android.net.ipsec.ike.TransportModeChildSessionParams.Builder addOutboundTrafficSelectors(@NonNull android.net.ipsec.ike.IkeTrafficSelector); + method @NonNull public android.net.ipsec.ike.TransportModeChildSessionParams.Builder addSaProposal(@NonNull android.net.ipsec.ike.ChildSaProposal); + method @NonNull public android.net.ipsec.ike.TransportModeChildSessionParams build(); + method @NonNull public android.net.ipsec.ike.TransportModeChildSessionParams.Builder setLifetimeSeconds(@IntRange(from=0x12c, to=0x3840) int, @IntRange(from=0x78, to=0x3840) int); + } + + public final class TunnelModeChildSessionParams extends android.net.ipsec.ike.ChildSessionParams { + method @NonNull public java.util.List getConfigurationRequests(); + } + + public static final class TunnelModeChildSessionParams.Builder { + ctor public TunnelModeChildSessionParams.Builder(); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams.Builder addInboundTrafficSelectors(@NonNull android.net.ipsec.ike.IkeTrafficSelector); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams.Builder addInternalAddressRequest(int); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams.Builder addInternalAddressRequest(@NonNull java.net.Inet4Address); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams.Builder addInternalAddressRequest(@NonNull java.net.Inet6Address, int); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams.Builder addInternalDhcpServerRequest(int); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams.Builder addInternalDnsServerRequest(int); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams.Builder addOutboundTrafficSelectors(@NonNull android.net.ipsec.ike.IkeTrafficSelector); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams.Builder addSaProposal(@NonNull android.net.ipsec.ike.ChildSaProposal); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams build(); + method @NonNull public android.net.ipsec.ike.TunnelModeChildSessionParams.Builder setLifetimeSeconds(@IntRange(from=0x12c, to=0x3840) int, @IntRange(from=0x78, to=0x3840) int); + } + + public static interface TunnelModeChildSessionParams.ConfigRequestIpv4Address extends android.net.ipsec.ike.TunnelModeChildSessionParams.TunnelModeChildConfigRequest { + method @Nullable public java.net.Inet4Address getAddress(); + } + + public static interface TunnelModeChildSessionParams.ConfigRequestIpv4DhcpServer extends android.net.ipsec.ike.TunnelModeChildSessionParams.TunnelModeChildConfigRequest { + } + + public static interface TunnelModeChildSessionParams.ConfigRequestIpv4DnsServer extends android.net.ipsec.ike.TunnelModeChildSessionParams.TunnelModeChildConfigRequest { + } + + public static interface TunnelModeChildSessionParams.ConfigRequestIpv4Netmask extends android.net.ipsec.ike.TunnelModeChildSessionParams.TunnelModeChildConfigRequest { + } + + public static interface TunnelModeChildSessionParams.ConfigRequestIpv6Address extends android.net.ipsec.ike.TunnelModeChildSessionParams.TunnelModeChildConfigRequest { + method @Nullable public java.net.Inet6Address getAddress(); + method public int getPrefixLength(); + } + + public static interface TunnelModeChildSessionParams.ConfigRequestIpv6DnsServer extends android.net.ipsec.ike.TunnelModeChildSessionParams.TunnelModeChildConfigRequest { + } + + public static interface TunnelModeChildSessionParams.TunnelModeChildConfigRequest { + } + +} + +package android.net.ipsec.ike.exceptions { + + public abstract class IkeException extends java.lang.Exception { + } + + public final class IkeInternalException extends android.net.ipsec.ike.exceptions.IkeException { + } + + public abstract class IkeProtocolException extends android.net.ipsec.ike.exceptions.IkeException { + method @Nullable public byte[] getErrorData(); + method public int getErrorType(); + field public static final int ERROR_TYPE_AUTHENTICATION_FAILED = 24; // 0x18 + field public static final int ERROR_TYPE_CHILD_SA_NOT_FOUND = 44; // 0x2c + field public static final int ERROR_TYPE_FAILED_CP_REQUIRED = 37; // 0x25 + field public static final int ERROR_TYPE_INTERNAL_ADDRESS_FAILURE = 36; // 0x24 + field public static final int ERROR_TYPE_INVALID_IKE_SPI = 4; // 0x4 + field public static final int ERROR_TYPE_INVALID_KE_PAYLOAD = 17; // 0x11 + field public static final int ERROR_TYPE_INVALID_MAJOR_VERSION = 5; // 0x5 + field public static final int ERROR_TYPE_INVALID_MESSAGE_ID = 9; // 0x9 + field public static final int ERROR_TYPE_INVALID_SELECTORS = 39; // 0x27 + field public static final int ERROR_TYPE_INVALID_SYNTAX = 7; // 0x7 + field public static final int ERROR_TYPE_NO_ADDITIONAL_SAS = 35; // 0x23 + field public static final int ERROR_TYPE_NO_PROPOSAL_CHOSEN = 14; // 0xe + field public static final int ERROR_TYPE_SINGLE_PAIR_REQUIRED = 34; // 0x22 + field public static final int ERROR_TYPE_TEMPORARY_FAILURE = 43; // 0x2b + field public static final int ERROR_TYPE_TS_UNACCEPTABLE = 38; // 0x26 + field public static final int ERROR_TYPE_UNSUPPORTED_CRITICAL_PAYLOAD = 1; // 0x1 + } + +} + -- cgit v1.2.3