Add support for AES-GCM-ESP as an IPSec algorithm

Allows native AES-GCM-ESP to be used as an IPSec transport/tunnel mode
algorithm with kernel support

Bug: 63589918
Test: IPsecService tests added, existing ones pass
Change-Id: I9f742027730f6affabb0667300f6d0d65983410c
diff --git a/server/XfrmControllerTest.cpp b/server/XfrmControllerTest.cpp
index dea1584..0b54523 100644
--- a/server/XfrmControllerTest.cpp
+++ b/server/XfrmControllerTest.cpp
@@ -250,8 +250,8 @@
         static_cast<int>(XfrmDirection::OUT), "127.0.0.1" /* local address */,
         "8.8.8.8" /* remote address */, 0 /* network handle */, reqSpi,
         "hmac(sha256)" /* auth algo */, authKey, 0, "cbc(aes)" /* encryption algo */, cryptKey, 0,
-        UDP_ENCAP_ESPINUDP_NON_IKE /* encapType */, 34567 /* local port */,
-        34567 /* remote port */);
+        "" /* AEAD algo */, {}, 0, UDP_ENCAP_ESPINUDP_NON_IKE /* encapType */,
+        34567 /* local port */, 34567 /* remote port */);
 
     EXPECT_EQ(0, res.code());
     EXPECT_EQ(expectMsgLength, nlMsgBuf.size());