/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeNotifyPayload.java | 258 public final byte[] notifyData; field in IkeNotifyPayload 293 notifyData = new byte[payloadBody.length - NOTIFY_HEADER_LEN - spiSize]; in IkeNotifyPayload() 294 inputBuffer.get(notifyData); in IkeNotifyPayload() 362 byte[] notifyData = cookie2Notify.notifyData; in handleCookieAndGenerateCopy() 363 if (notifyData.length < minLen || notifyData.length > maxLen) { in handleCookieAndGenerateCopy() 370 + notifyData.length); in handleCookieAndGenerateCopy() 373 return new IkeNotifyPayload(cookie2Notify.notifyType, notifyData); in handleCookieAndGenerateCopy() 402 byteBuffer.put(notifyData); in encodeToByteBuffer() 412 return GENERIC_HEADER_LENGTH + NOTIFY_HEADER_LEN + spiSize + notifyData.length; in getPayloadLength() 416 @ProtocolId int protocolId, byte spiSize, int spi, int notifyType, byte[] notifyData) { in IkeNotifyPayload() argument [all …]
|
D | IkeAuthDigitalSignPayload.java | 329 int dataLen = notifyPayload.notifyData.length; in getSignatureHashAlgorithmsFromIkeNotifyPayload() 336 ByteBuffer serializedHashAlgos = ByteBuffer.wrap(notifyPayload.notifyData); in getSignatureHashAlgorithmsFromIkeNotifyPayload()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeNotifyPayloadTest.java | 100 byte[] notifyData = TestUtils.hexStringToByteArray(NAT_DETECTION_DATA_HEX_STRING); in testDecodeNotifyPayloadSpiUnset() 107 assertArrayEquals(notifyData, payload.notifyData); in testDecodeNotifyPayloadSpiUnset() 119 assertArrayEquals(new byte[0], payload.notifyData); in testDecodeNotifyPayloadSpiSet() 148 assertArrayEquals(cookieData, outboundCookieNotify.notifyData); in verifyHandleCookieAndGenerateCopy() 190 assertArrayEquals(new byte[] {(byte) payloadType}, notifyPayload.notifyData); in testBuildIkeErrorNotifyWithData() 200 assertArrayEquals(new byte[0], notifyPayload.notifyData); in testBuildIkeErrorNotifyWithoutData() 210 assertArrayEquals(new byte[0], notifyPayload.notifyData); in testBuildChildConfigNotify() 220 assertArrayEquals(new byte[0], notifyPayload.notifyData); in testBuildChildErrorNotify()
|
/packages/modules/IPsec/src/java/android/net/ipsec/ike/exceptions/ |
D | IkeProtocolException.java | 137 protected IkeProtocolException(@ErrorType int code, byte[] notifyData) { in IkeProtocolException() argument 140 if (!isValidDataLength(notifyData.length)) { in IkeProtocolException() 145 + notifyData.length); in IkeProtocolException() 149 mErrorData = notifyData.clone(); in IkeProtocolException()
|
D | InvalidMajorVersionException.java | 55 public InvalidMajorVersionException(byte[] notifyData) { in InvalidMajorVersionException() argument 56 super(ERROR_TYPE_INVALID_MAJOR_VERSION, notifyData); in InvalidMajorVersionException() 57 mVersion = notifyData[0]; in InvalidMajorVersionException()
|
D | UnsupportedCriticalPayloadException.java | 61 public UnsupportedCriticalPayloadException(byte[] notifyData) { in UnsupportedCriticalPayloadException() argument 62 super(ERROR_TYPE_UNSUPPORTED_CRITICAL_PAYLOAD, notifyData); in UnsupportedCriticalPayloadException() 63 mPayloadTypeList = Collections.singletonList(byteArrayToInteger(notifyData)); in UnsupportedCriticalPayloadException()
|
D | InvalidIkeSpiException.java | 50 public InvalidIkeSpiException(byte[] notifyData) { in InvalidIkeSpiException() argument 51 super(ERROR_TYPE_INVALID_IKE_SPI, notifyData); in InvalidIkeSpiException()
|
D | TsUnacceptableException.java | 51 public TsUnacceptableException(byte[] notifyData) { in TsUnacceptableException() argument 52 super(ERROR_TYPE_TS_UNACCEPTABLE, notifyData); in TsUnacceptableException()
|
D | FailedCpRequiredException.java | 51 public FailedCpRequiredException(byte[] notifyData) { in FailedCpRequiredException() argument 52 super(ERROR_TYPE_FAILED_CP_REQUIRED, notifyData); in FailedCpRequiredException()
|
D | NoAdditionalSasException.java | 50 public NoAdditionalSasException(byte[] notifyData) { in NoAdditionalSasException() argument 51 super(ERROR_TYPE_NO_ADDITIONAL_SAS, notifyData); in NoAdditionalSasException()
|
D | SinglePairRequiredException.java | 51 public SinglePairRequiredException(byte[] notifyData) { in SinglePairRequiredException() argument 52 super(ERROR_TYPE_SINGLE_PAIR_REQUIRED, notifyData); in SinglePairRequiredException()
|
D | InternalAddressFailureException.java | 50 public InternalAddressFailureException(byte[] notifyData) { in InternalAddressFailureException() argument 51 super(ERROR_TYPE_INTERNAL_ADDRESS_FAILURE, notifyData); in InternalAddressFailureException()
|
D | InvalidKeException.java | 55 public InvalidKeException(byte[] notifyData) { in InvalidKeException() argument 56 super(ERROR_TYPE_INVALID_KE_PAYLOAD, notifyData); in InvalidKeException()
|
D | InvalidMessageIdException.java | 54 public InvalidMessageIdException(byte[] notifyData) { in InvalidMessageIdException() argument 55 super(ERROR_TYPE_INVALID_MESSAGE_ID, notifyData); in InvalidMessageIdException()
|
D | TemporaryFailureException.java | 54 public TemporaryFailureException(byte[] notifyData) { in TemporaryFailureException() argument 55 super(ERROR_TYPE_TEMPORARY_FAILURE, notifyData); in TemporaryFailureException()
|
D | ChildSaNotFoundException.java | 56 public ChildSaNotFoundException(int spi, byte[] notifyData) { in ChildSaNotFoundException() argument 57 super(ERROR_TYPE_CHILD_SA_NOT_FOUND, notifyData); in ChildSaNotFoundException()
|
D | AuthenticationFailedException.java | 64 public AuthenticationFailedException(byte[] notifyData) { in AuthenticationFailedException() argument 65 super(ERROR_TYPE_AUTHENTICATION_FAILED, notifyData); in AuthenticationFailedException()
|
D | NoValidProposalChosenException.java | 71 public NoValidProposalChosenException(byte[] notifyData) { in NoValidProposalChosenException() argument 72 super(ERROR_TYPE_NO_PROPOSAL_CHOSEN, notifyData); in NoValidProposalChosenException()
|
D | InvalidSyntaxException.java | 84 public InvalidSyntaxException(byte[] notifyData) { in InvalidSyntaxException() argument 85 super(ERROR_TYPE_INVALID_SYNTAX, notifyData); in InvalidSyntaxException()
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/ike3gpp/ |
D | Ike3gppN1ModeUtils.java | 58 static byte[] getSnssaiFromNotifyData(byte[] notifyData) throws InvalidSyntaxException { in getSnssaiFromNotifyData() argument 59 ByteBuffer buffer = ByteBuffer.wrap(notifyData); in getSnssaiFromNotifyData() 63 if (snssaiLen != notifyData.length - 1) { in getSnssaiFromNotifyData()
|
D | Ike3gppBackoffTimerUtils.java | 40 static byte getBackoffTimerfromNotifyData(byte[] notifyData) throws InvalidSyntaxException { in getBackoffTimerfromNotifyData() argument 41 ByteBuffer buffer = ByteBuffer.wrap(notifyData); in getBackoffTimerfromNotifyData()
|
D | Ike3gppIkeAuth.java | 111 Ike3gppN1ModeUtils.getSnssaiFromNotifyData(notifyPayload.notifyData); in handleAuthResp() 137 backoffTimerPayload.notifyData); in handleAuthResp()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/ike3gpp/ |
D | Ike3gppExtensionExchangeTest.java | 87 assertArrayEquals(N1_MODE_CAPABILITY_DATA, n1ModeCapability.notifyData); in testGetRequestPayloadsIkeAuth() 130 assertArrayEquals(N1_MODE_INFORMATION_DATA, n1ModeInformation.notifyData); in testExtract3gppResponsePayloadsIkeAuth() 131 assertArrayEquals(BACKOFF_TIMER_DATA, backoffTimer.notifyData); in testExtract3gppResponsePayloadsIkeAuth()
|
D | Ike3gppN1ModeUtilsTest.java | 47 assertArrayEquals(N1_MODE_CAPABILITY_PAYLOAD, n1ModeCapabilityPayload.notifyData); in testGenerateN1ModeCapabilityPayload()
|
/packages/modules/IPsec/tests/iketests/src/java/android/net/ipsec/ike/exceptions/ |
D | IkeProtocolExceptionTest.java | 44 assertArrayEquals(new byte[] {(byte) 0x37}, payload.notifyData); in buildNotifyPayloadWithData() 54 assertArrayEquals(new byte[0], payload.notifyData); in buildNotifyPayloadWithoutData()
|