Add support for AES-GCM-ESP as an IPSec algorithm
Allows native AES-GCM-ESP to be used as an IPSec transport/tunnel mode
algorithm with kernel support
Bug: 63589918
Test: IPsecService tests added, existing ones pass
Change-Id: I9f742027730f6affabb0667300f6d0d65983410c
diff --git a/server/XfrmControllerTest.cpp b/server/XfrmControllerTest.cpp
index dea1584..0b54523 100644
--- a/server/XfrmControllerTest.cpp
+++ b/server/XfrmControllerTest.cpp
@@ -250,8 +250,8 @@
static_cast<int>(XfrmDirection::OUT), "127.0.0.1" /* local address */,
"8.8.8.8" /* remote address */, 0 /* network handle */, reqSpi,
"hmac(sha256)" /* auth algo */, authKey, 0, "cbc(aes)" /* encryption algo */, cryptKey, 0,
- UDP_ENCAP_ESPINUDP_NON_IKE /* encapType */, 34567 /* local port */,
- 34567 /* remote port */);
+ "" /* AEAD algo */, {}, 0, UDP_ENCAP_ESPINUDP_NON_IKE /* encapType */,
+ 34567 /* local port */, 34567 /* remote port */);
EXPECT_EQ(0, res.code());
EXPECT_EQ(expectMsgLength, nlMsgBuf.size());