blob: 3f74e1c3cba40187fe7f25ee6d1d99dcd03b3759 [file] [log] [blame]
Nathan Haroldb1f605f2017-01-12 18:38:57 -08001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package android.net;
17
Chiachang Wanga0343312021-01-12 18:48:13 +080018import static android.annotation.SystemApi.Client.MODULE_LIBRARIES;
19
Aaron Huangca9c1df2021-12-16 00:11:15 +080020import android.annotation.IntDef;
Nathan Harold031acb82017-03-07 13:23:36 -080021import android.annotation.NonNull;
Benedict Wonge9763752018-11-08 19:45:34 -080022import android.annotation.RequiresFeature;
Nathan Harold025aae12018-02-02 18:34:25 -080023import android.annotation.RequiresPermission;
Nathan Harold3a287d52018-04-25 12:01:34 -070024import android.annotation.SystemApi;
Jeff Sharkeyad1cebe2017-06-02 17:36:26 -060025import android.annotation.SystemService;
Jonathan Basseri2725a232017-04-21 15:53:51 -070026import android.annotation.TestApi;
Jeff Sharkeyad1cebe2017-06-02 17:36:26 -060027import android.content.Context;
Benedict Wonge9763752018-11-08 19:45:34 -080028import android.content.pm.PackageManager;
Nathan Harold031acb82017-03-07 13:23:36 -080029import android.os.Binder;
Aaron Huang80a73fd2021-12-28 02:33:53 +080030import android.os.IBinder;
Nathan Haroldb1f605f2017-01-12 18:38:57 -080031import android.os.ParcelFileDescriptor;
Nathan Harold031acb82017-03-07 13:23:36 -080032import android.os.RemoteException;
Nathan Haroldbeed0b62018-04-03 16:13:19 -070033import android.os.ServiceSpecificException;
34import android.system.ErrnoException;
35import android.system.OsConstants;
Nathan Haroldb1f605f2017-01-12 18:38:57 -080036import android.util.AndroidException;
Nathan Harold80865392017-04-04 19:37:48 -070037import android.util.Log;
Nathan Harold81f54632017-09-11 19:50:19 -070038
Nathan Harold19b99d92017-08-23 13:46:33 -070039import com.android.internal.annotations.VisibleForTesting;
Yan Yane114b382021-02-16 16:29:48 -080040import com.android.modules.utils.build.SdkLevel;
Nathan Harold19b99d92017-08-23 13:46:33 -070041
Nathan Haroldb1f605f2017-01-12 18:38:57 -080042import dalvik.system.CloseGuard;
Nathan Harold81f54632017-09-11 19:50:19 -070043
Nathan Haroldb1f605f2017-01-12 18:38:57 -080044import java.io.FileDescriptor;
45import java.io.IOException;
Aaron Huangca9c1df2021-12-16 00:11:15 +080046import java.lang.annotation.Retention;
47import java.lang.annotation.RetentionPolicy;
Nathan Haroldb1f605f2017-01-12 18:38:57 -080048import java.net.DatagramSocket;
49import java.net.InetAddress;
50import java.net.Socket;
Aaron Huang49eef6f2021-12-22 16:35:13 +080051import java.util.Objects;
Nathan Haroldb1f605f2017-01-12 18:38:57 -080052
53/**
Jonathan Basseri2725a232017-04-21 15:53:51 -070054 * This class contains methods for managing IPsec sessions. Once configured, the kernel will apply
55 * confidentiality (encryption) and integrity (authentication) to IP traffic.
Nathan Haroldb1f605f2017-01-12 18:38:57 -080056 *
Jonathan Basseri2725a232017-04-21 15:53:51 -070057 * <p>Note that not all aspects of IPsec are permitted by this API. Applications may create
58 * transport mode security associations and apply them to individual sockets. Applications looking
Benedict Wongc85b7b02019-11-12 22:31:51 -080059 * to create an IPsec VPN should use {@link VpnManager} and {@link Ikev2VpnProfile}.
Jonathan Basseri2725a232017-04-21 15:53:51 -070060 *
61 * @see <a href="https://tools.ietf.org/html/rfc4301">RFC 4301, Security Architecture for the
Jonathan Basseri20e96c52017-11-16 10:58:01 -080062 * Internet Protocol</a>
Nathan Haroldb1f605f2017-01-12 18:38:57 -080063 */
Jeff Sharkeyad1cebe2017-06-02 17:36:26 -060064@SystemService(Context.IPSEC_SERVICE)
Yan Yan98a3a032022-02-02 16:39:45 -080065public class IpSecManager {
Nathan Haroldb1f605f2017-01-12 18:38:57 -080066 private static final String TAG = "IpSecManager";
67
Yan Yanab5006c2023-11-15 21:41:51 +000068 // TODO : remove this class when udc-mainline-prod is abandoned and android.net.flags.Flags is
69 // available here
70 /** @hide */
71 public static class Flags {
72 static final String IPSEC_TRANSFORM_STATE = "com.android.net.flags.ipsec_transform_state";
73 }
74
Nathan Haroldb1f605f2017-01-12 18:38:57 -080075 /**
Yan Yana48dcd92022-10-18 00:03:20 +000076 * Feature flag to declare the kernel support of updating IPsec SAs.
77 *
78 * <p>Feature for {@link #getSystemAvailableFeatures} and {@link #hasSystemFeature}: The device
79 * has the requisite kernel support for migrating IPsec tunnels to new source/destination
80 * addresses.
81 *
82 * <p>This feature implies that the device supports XFRM Migration (CONFIG_XFRM_MIGRATE) and has
83 * the kernel fixes to allow XFRM Migration correctly
84 *
85 * @see android.content.pm.PackageManager#FEATURE_IPSEC_TUNNEL_MIGRATION
86 * @hide
87 */
88 // Redefine this flag here so that IPsec code shipped in a mainline module can build on old
89 // platforms before FEATURE_IPSEC_TUNNEL_MIGRATION API is released.
90 public static final String FEATURE_IPSEC_TUNNEL_MIGRATION =
91 "android.software.ipsec_tunnel_migration";
92
93 /**
Nathan Harolde3536f02018-03-06 13:22:22 -080094 * Used when applying a transform to direct traffic through an {@link IpSecTransform}
95 * towards the host.
96 *
97 * <p>See {@link #applyTransportModeTransform(Socket, int, IpSecTransform)}.
Nathan Harold5a19b952018-01-05 19:25:13 -080098 */
99 public static final int DIRECTION_IN = 0;
100
101 /**
Nathan Harolde3536f02018-03-06 13:22:22 -0800102 * Used when applying a transform to direct traffic through an {@link IpSecTransform}
103 * away from the host.
104 *
105 * <p>See {@link #applyTransportModeTransform(Socket, int, IpSecTransform)}.
Nathan Harold5a19b952018-01-05 19:25:13 -0800106 */
107 public static final int DIRECTION_OUT = 1;
108
Nathan Harold5a19b952018-01-05 19:25:13 -0800109 /**
Benedict Wong908d34e2021-04-15 11:59:16 -0700110 * Used when applying a transform to direct traffic through an {@link IpSecTransform} for
111 * forwarding between interfaces.
112 *
113 * <p>See {@link #applyTransportModeTransform(Socket, int, IpSecTransform)}.
114 *
115 * @hide
116 */
Aaron Huang4989e952021-12-15 23:27:18 +0800117 @SystemApi(client = MODULE_LIBRARIES)
Benedict Wong908d34e2021-04-15 11:59:16 -0700118 public static final int DIRECTION_FWD = 2;
119
Aaron Huangca9c1df2021-12-16 00:11:15 +0800120 /** @hide */
121 @IntDef(value = {DIRECTION_IN, DIRECTION_OUT})
122 @Retention(RetentionPolicy.SOURCE)
123 public @interface PolicyDirection {}
124
Benedict Wong908d34e2021-04-15 11:59:16 -0700125 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700126 * The Security Parameter Index (SPI) 0 indicates an unknown or invalid index.
Nathan Harold031acb82017-03-07 13:23:36 -0800127 *
128 * <p>No IPsec packet may contain an SPI of 0.
Jonathan Basseri2725a232017-04-21 15:53:51 -0700129 *
130 * @hide
Nathan Harold031acb82017-03-07 13:23:36 -0800131 */
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800132 @TestApi public static final int INVALID_SECURITY_PARAMETER_INDEX = 0;
Nathan Harold031acb82017-03-07 13:23:36 -0800133
134 /** @hide */
135 public interface Status {
Aaron Huangfbae3082021-12-06 15:18:42 +0800136 int OK = 0;
137 int RESOURCE_UNAVAILABLE = 1;
138 int SPI_UNAVAILABLE = 2;
Nathan Harold031acb82017-03-07 13:23:36 -0800139 }
140
141 /** @hide */
Nathan Harold5e854462017-12-13 18:51:35 -0800142 public static final int INVALID_RESOURCE_ID = -1;
Nathan Harold031acb82017-03-07 13:23:36 -0800143
144 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700145 * Thrown to indicate that a requested SPI is in use.
146 *
147 * <p>The combination of remote {@code InetAddress} and SPI must be unique across all apps on
148 * one device. If this error is encountered, a new SPI is required before a transform may be
149 * created. This error can be avoided by calling {@link
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800150 * IpSecManager#allocateSecurityParameterIndex}.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800151 */
152 public static final class SpiUnavailableException extends AndroidException {
153 private final int mSpi;
154
155 /**
156 * Construct an exception indicating that a transform with the given SPI is already in use
157 * or otherwise unavailable.
158 *
Jonathan Basseri2725a232017-04-21 15:53:51 -0700159 * @param msg description indicating the colliding SPI
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800160 * @param spi the SPI that could not be used due to a collision
161 */
162 SpiUnavailableException(String msg, int spi) {
Jonathan Basseri2725a232017-04-21 15:53:51 -0700163 super(msg + " (spi: " + spi + ")");
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800164 mSpi = spi;
165 }
166
Jonathan Basseri2725a232017-04-21 15:53:51 -0700167 /** Get the SPI that caused a collision. */
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800168 public int getSpi() {
169 return mSpi;
170 }
171 }
172
173 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700174 * Thrown to indicate that an IPsec resource is unavailable.
175 *
176 * <p>This could apply to resources such as sockets, {@link SecurityParameterIndex}, {@link
177 * IpSecTransform}, or other system resources. If this exception is thrown, users should release
178 * allocated objects of the type requested.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800179 */
180 public static final class ResourceUnavailableException extends AndroidException {
181
182 ResourceUnavailableException(String msg) {
183 super(msg);
184 }
185 }
186
Nathan Harold65ef8432018-03-15 18:06:06 -0700187 private final Context mContext;
Nathan Haroldd2a1dad2017-03-01 18:55:06 -0800188 private final IIpSecService mService;
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800189
Jonathan Basseri2725a232017-04-21 15:53:51 -0700190 /**
191 * This class represents a reserved SPI.
192 *
193 * <p>Objects of this type are used to track reserved security parameter indices. They can be
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800194 * obtained by calling {@link IpSecManager#allocateSecurityParameterIndex} and must be released
Jonathan Basseri2725a232017-04-21 15:53:51 -0700195 * by calling {@link #close()} when they are no longer needed.
196 */
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800197 public static final class SecurityParameterIndex implements AutoCloseable {
Nathan Haroldd2a1dad2017-03-01 18:55:06 -0800198 private final IIpSecService mService;
Nathan Harold5a19b952018-01-05 19:25:13 -0800199 private final InetAddress mDestinationAddress;
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800200 private final CloseGuard mCloseGuard = CloseGuard.get();
Nathan Harold031acb82017-03-07 13:23:36 -0800201 private int mSpi = INVALID_SECURITY_PARAMETER_INDEX;
Nathan Harold5e854462017-12-13 18:51:35 -0800202 private int mResourceId = INVALID_RESOURCE_ID;
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800203
Jonathan Basseri2725a232017-04-21 15:53:51 -0700204 /** Get the underlying SPI held by this object. */
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800205 public int getSpi() {
206 return mSpi;
207 }
208
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800209 /**
210 * Release an SPI that was previously reserved.
211 *
Nathan Harold909d66e2017-03-29 10:47:59 -0700212 * <p>Release an SPI for use by other users in the system. If a SecurityParameterIndex is
213 * applied to an IpSecTransform, it will become unusable for future transforms but should
214 * still be closed to ensure system resources are released.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800215 */
216 @Override
217 public void close() {
Nathan Harold80865392017-04-04 19:37:48 -0700218 try {
219 mService.releaseSecurityParameterIndex(mResourceId);
220 } catch (RemoteException e) {
221 throw e.rethrowFromSystemServer();
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700222 } catch (Exception e) {
223 // On close we swallow all random exceptions since failure to close is not
224 // actionable by the user.
225 Log.e(TAG, "Failed to close " + this + ", Exception=" + e);
226 } finally {
227 mResourceId = INVALID_RESOURCE_ID;
228 mCloseGuard.close();
Nathan Harold80865392017-04-04 19:37:48 -0700229 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800230 }
231
Jonathan Basseri2725a232017-04-21 15:53:51 -0700232 /** Check that the SPI was closed properly. */
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800233 @Override
Nathan Harold2a30daf2017-11-07 17:17:45 -0800234 protected void finalize() throws Throwable {
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800235 if (mCloseGuard != null) {
236 mCloseGuard.warnIfOpen();
237 }
238
239 close();
240 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800241
Nathan Harold031acb82017-03-07 13:23:36 -0800242 private SecurityParameterIndex(
Nathan Harold5a19b952018-01-05 19:25:13 -0800243 @NonNull IIpSecService service, InetAddress destinationAddress, int spi)
Nathan Harold031acb82017-03-07 13:23:36 -0800244 throws ResourceUnavailableException, SpiUnavailableException {
245 mService = service;
Nathan Harold5a19b952018-01-05 19:25:13 -0800246 mDestinationAddress = destinationAddress;
Nathan Harold031acb82017-03-07 13:23:36 -0800247 try {
Nathan Harold80865392017-04-04 19:37:48 -0700248 IpSecSpiResponse result =
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800249 mService.allocateSecurityParameterIndex(
Nathan Harold5a19b952018-01-05 19:25:13 -0800250 destinationAddress.getHostAddress(), spi, new Binder());
Nathan Harold031acb82017-03-07 13:23:36 -0800251
252 if (result == null) {
253 throw new NullPointerException("Received null response from IpSecService");
254 }
255
Nathan Harold80865392017-04-04 19:37:48 -0700256 int status = result.status;
Nathan Harold031acb82017-03-07 13:23:36 -0800257 switch (status) {
258 case Status.OK:
259 break;
260 case Status.RESOURCE_UNAVAILABLE:
261 throw new ResourceUnavailableException(
262 "No more SPIs may be allocated by this requester.");
263 case Status.SPI_UNAVAILABLE:
264 throw new SpiUnavailableException("Requested SPI is unavailable", spi);
265 default:
266 throw new RuntimeException(
267 "Unknown status returned by IpSecService: " + status);
268 }
Nathan Harold80865392017-04-04 19:37:48 -0700269 mSpi = result.spi;
270 mResourceId = result.resourceId;
Nathan Harold031acb82017-03-07 13:23:36 -0800271
272 if (mSpi == INVALID_SECURITY_PARAMETER_INDEX) {
273 throw new RuntimeException("Invalid SPI returned by IpSecService: " + status);
274 }
275
276 if (mResourceId == INVALID_RESOURCE_ID) {
277 throw new RuntimeException(
278 "Invalid Resource ID returned by IpSecService: " + status);
279 }
Nathan Harold031acb82017-03-07 13:23:36 -0800280 } catch (RemoteException e) {
281 throw e.rethrowFromSystemServer();
282 }
Maciej Żenczykowski40112282023-01-07 09:57:54 +0000283 mCloseGuard.open("close");
Nathan Harold031acb82017-03-07 13:23:36 -0800284 }
Nathan Harold80865392017-04-04 19:37:48 -0700285
286 /** @hide */
Nathan Harold19b99d92017-08-23 13:46:33 -0700287 @VisibleForTesting
288 public int getResourceId() {
Nathan Harold80865392017-04-04 19:37:48 -0700289 return mResourceId;
290 }
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700291
292 @Override
293 public String toString() {
294 return new StringBuilder()
295 .append("SecurityParameterIndex{spi=")
296 .append(mSpi)
297 .append(",resourceId=")
298 .append(mResourceId)
299 .append("}")
300 .toString();
301 }
Nathan Harold031acb82017-03-07 13:23:36 -0800302 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800303
304 /**
Nathan Harold5a19b952018-01-05 19:25:13 -0800305 * Reserve a random SPI for traffic bound to or from the specified destination address.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800306 *
307 * <p>If successful, this SPI is guaranteed available until released by a call to {@link
308 * SecurityParameterIndex#close()}.
309 *
Nathan Harold5a19b952018-01-05 19:25:13 -0800310 * @param destinationAddress the destination address for traffic bearing the requested SPI.
311 * For inbound traffic, the destination should be an address currently assigned on-device.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800312 * @return the reserved SecurityParameterIndex
Aaron Huangfbae3082021-12-06 15:18:42 +0800313 * @throws ResourceUnavailableException indicating that too many SPIs are
Nathan Harold5a19b952018-01-05 19:25:13 -0800314 * currently allocated for this user
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800315 */
Nathan Harold6303d9e2018-03-16 17:27:30 -0700316 @NonNull
317 public SecurityParameterIndex allocateSecurityParameterIndex(
318 @NonNull InetAddress destinationAddress) throws ResourceUnavailableException {
Nathan Harold05406792017-04-06 18:16:28 -0700319 try {
320 return new SecurityParameterIndex(
321 mService,
Nathan Harold5a19b952018-01-05 19:25:13 -0800322 destinationAddress,
Nathan Harold05406792017-04-06 18:16:28 -0700323 IpSecManager.INVALID_SECURITY_PARAMETER_INDEX);
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700324 } catch (ServiceSpecificException e) {
325 throw rethrowUncheckedExceptionFromServiceSpecificException(e);
Nathan Harold05406792017-04-06 18:16:28 -0700326 } catch (SpiUnavailableException unlikely) {
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700327 // Because this function allocates a totally random SPI, it really shouldn't ever
328 // fail to allocate an SPI; we simply need this because the exception is checked.
Nathan Harold05406792017-04-06 18:16:28 -0700329 throw new ResourceUnavailableException("No SPIs available");
330 }
331 }
332
333 /**
Nathan Harold5a19b952018-01-05 19:25:13 -0800334 * Reserve the requested SPI for traffic bound to or from the specified destination address.
Nathan Harold05406792017-04-06 18:16:28 -0700335 *
336 * <p>If successful, this SPI is guaranteed available until released by a call to {@link
337 * SecurityParameterIndex#close()}.
338 *
Nathan Harold5a19b952018-01-05 19:25:13 -0800339 * @param destinationAddress the destination address for traffic bearing the requested SPI.
340 * For inbound traffic, the destination should be an address currently assigned on-device.
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700341 * @param requestedSpi the requested SPI. The range 1-255 is reserved and may not be used. See
342 * RFC 4303 Section 2.1.
Nathan Harold05406792017-04-06 18:16:28 -0700343 * @return the reserved SecurityParameterIndex
Aaron Huangfbae3082021-12-06 15:18:42 +0800344 * @throws ResourceUnavailableException indicating that too many SPIs are
Nathan Harold5a19b952018-01-05 19:25:13 -0800345 * currently allocated for this user
Aaron Huangfbae3082021-12-06 15:18:42 +0800346 * @throws SpiUnavailableException indicating that the requested SPI could not be
Nathan Harold5a19b952018-01-05 19:25:13 -0800347 * reserved
Nathan Harold05406792017-04-06 18:16:28 -0700348 */
Nathan Harold6303d9e2018-03-16 17:27:30 -0700349 @NonNull
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800350 public SecurityParameterIndex allocateSecurityParameterIndex(
Nathan Harold6303d9e2018-03-16 17:27:30 -0700351 @NonNull InetAddress destinationAddress, int requestedSpi)
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800352 throws SpiUnavailableException, ResourceUnavailableException {
Nathan Harold05406792017-04-06 18:16:28 -0700353 if (requestedSpi == IpSecManager.INVALID_SECURITY_PARAMETER_INDEX) {
354 throw new IllegalArgumentException("Requested SPI must be a valid (non-zero) SPI");
355 }
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700356 try {
357 return new SecurityParameterIndex(mService, destinationAddress, requestedSpi);
358 } catch (ServiceSpecificException e) {
359 throw rethrowUncheckedExceptionFromServiceSpecificException(e);
360 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800361 }
362
363 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700364 * Apply an IPsec transform to a stream socket.
365 *
366 * <p>This applies transport mode encapsulation to the given socket. Once applied, I/O on the
367 * socket will be encapsulated according to the parameters of the {@code IpSecTransform}. When
Nathan Harold5a19b952018-01-05 19:25:13 -0800368 * the transform is removed from the socket by calling {@link #removeTransportModeTransforms},
Jonathan Basseri2725a232017-04-21 15:53:51 -0700369 * unprotected traffic can resume on that socket.
370 *
371 * <p>For security reasons, the destination address of any traffic on the socket must match the
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800372 * remote {@code InetAddress} of the {@code IpSecTransform}. Attempts to send traffic to any
Jonathan Basseri2725a232017-04-21 15:53:51 -0700373 * other IP address will result in an IOException. In addition, reads and writes on the socket
374 * will throw IOException if the user deactivates the transform (by calling {@link
Nathan Harold5a19b952018-01-05 19:25:13 -0800375 * IpSecTransform#close()}) without calling {@link #removeTransportModeTransforms}.
Jonathan Basseri2725a232017-04-21 15:53:51 -0700376 *
Benedict Wongc5106f32018-03-14 19:01:14 -0700377 * <p>Note that when applied to TCP sockets, calling {@link IpSecTransform#close()} on an
378 * applied transform before completion of graceful shutdown may result in the shutdown sequence
379 * failing to complete. As such, applications requiring graceful shutdown MUST close the socket
380 * prior to deactivating the applied transform. Socket closure may be performed asynchronously
381 * (in batches), so the returning of a close function does not guarantee shutdown of a socket.
382 * Setting an SO_LINGER timeout results in socket closure being performed synchronously, and is
383 * sufficient to ensure shutdown.
384 *
385 * Specifically, if the transform is deactivated (by calling {@link IpSecTransform#close()}),
386 * prior to the socket being closed, the standard [FIN - FIN/ACK - ACK], or the reset [RST]
387 * packets are dropped due to the lack of a valid Transform. Similarly, if a socket without the
388 * SO_LINGER option set is closed, the delayed/batched FIN packets may be dropped.
389 *
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800390 * <h4>Rekey Procedure</h4>
391 *
Nathan Harolde3536f02018-03-06 13:22:22 -0800392 * <p>When applying a new tranform to a socket in the outbound direction, the previous transform
393 * will be removed and the new transform will take effect immediately, sending all traffic on
394 * the new transform; however, when applying a transform in the inbound direction, traffic
395 * on the old transform will continue to be decrypted and delivered until that transform is
396 * deallocated by calling {@link IpSecTransform#close()}. This overlap allows lossless rekey
397 * procedures where both transforms are valid until both endpoints are using the new transform
398 * and all in-flight packets have been received.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800399 *
400 * @param socket a stream socket
Nathan Harolde3536f02018-03-06 13:22:22 -0800401 * @param direction the direction in which the transform should be applied
Jonathan Basseri2725a232017-04-21 15:53:51 -0700402 * @param transform a transport mode {@code IpSecTransform}
403 * @throws IOException indicating that the transform could not be applied
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800404 */
Nathan Harold6303d9e2018-03-16 17:27:30 -0700405 public void applyTransportModeTransform(@NonNull Socket socket,
406 @PolicyDirection int direction, @NonNull IpSecTransform transform) throws IOException {
Benedict Wong57ab3f62018-04-02 18:12:34 -0700407 // Ensure creation of FD. See b/77548890 for more details.
408 socket.getSoLinger();
409
Nathan Harold31676252018-01-16 12:08:43 -0800410 applyTransportModeTransform(socket.getFileDescriptor$(), direction, transform);
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800411 }
412
413 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700414 * Apply an IPsec transform to a datagram socket.
415 *
416 * <p>This applies transport mode encapsulation to the given socket. Once applied, I/O on the
417 * socket will be encapsulated according to the parameters of the {@code IpSecTransform}. When
Nathan Harold5a19b952018-01-05 19:25:13 -0800418 * the transform is removed from the socket by calling {@link #removeTransportModeTransforms},
Jonathan Basseri2725a232017-04-21 15:53:51 -0700419 * unprotected traffic can resume on that socket.
420 *
421 * <p>For security reasons, the destination address of any traffic on the socket must match the
422 * remote {@code InetAddress} of the {@code IpSecTransform}. Attempts to send traffic to any
423 * other IP address will result in an IOException. In addition, reads and writes on the socket
424 * will throw IOException if the user deactivates the transform (by calling {@link
Nathan Harold5a19b952018-01-05 19:25:13 -0800425 * IpSecTransform#close()}) without calling {@link #removeTransportModeTransforms}.
Jonathan Basseri2725a232017-04-21 15:53:51 -0700426 *
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800427 * <h4>Rekey Procedure</h4>
428 *
Nathan Harolde3536f02018-03-06 13:22:22 -0800429 * <p>When applying a new tranform to a socket in the outbound direction, the previous transform
430 * will be removed and the new transform will take effect immediately, sending all traffic on
431 * the new transform; however, when applying a transform in the inbound direction, traffic
432 * on the old transform will continue to be decrypted and delivered until that transform is
433 * deallocated by calling {@link IpSecTransform#close()}. This overlap allows lossless rekey
434 * procedures where both transforms are valid until both endpoints are using the new transform
435 * and all in-flight packets have been received.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800436 *
437 * @param socket a datagram socket
Nathan Harolde3536f02018-03-06 13:22:22 -0800438 * @param direction the direction in which the transform should be applied
Jonathan Basseri2725a232017-04-21 15:53:51 -0700439 * @param transform a transport mode {@code IpSecTransform}
440 * @throws IOException indicating that the transform could not be applied
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800441 */
Nathan Harold6303d9e2018-03-16 17:27:30 -0700442 public void applyTransportModeTransform(@NonNull DatagramSocket socket,
443 @PolicyDirection int direction, @NonNull IpSecTransform transform) throws IOException {
Nathan Harold31676252018-01-16 12:08:43 -0800444 applyTransportModeTransform(socket.getFileDescriptor$(), direction, transform);
Nathan Harold031acb82017-03-07 13:23:36 -0800445 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800446
447 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700448 * Apply an IPsec transform to a socket.
449 *
450 * <p>This applies transport mode encapsulation to the given socket. Once applied, I/O on the
451 * socket will be encapsulated according to the parameters of the {@code IpSecTransform}. When
Nathan Harold5a19b952018-01-05 19:25:13 -0800452 * the transform is removed from the socket by calling {@link #removeTransportModeTransforms},
Jonathan Basseri2725a232017-04-21 15:53:51 -0700453 * unprotected traffic can resume on that socket.
454 *
455 * <p>For security reasons, the destination address of any traffic on the socket must match the
456 * remote {@code InetAddress} of the {@code IpSecTransform}. Attempts to send traffic to any
457 * other IP address will result in an IOException. In addition, reads and writes on the socket
458 * will throw IOException if the user deactivates the transform (by calling {@link
Nathan Harold5a19b952018-01-05 19:25:13 -0800459 * IpSecTransform#close()}) without calling {@link #removeTransportModeTransforms}.
Jonathan Basseri2725a232017-04-21 15:53:51 -0700460 *
Benedict Wongc5106f32018-03-14 19:01:14 -0700461 * <p>Note that when applied to TCP sockets, calling {@link IpSecTransform#close()} on an
462 * applied transform before completion of graceful shutdown may result in the shutdown sequence
463 * failing to complete. As such, applications requiring graceful shutdown MUST close the socket
464 * prior to deactivating the applied transform. Socket closure may be performed asynchronously
465 * (in batches), so the returning of a close function does not guarantee shutdown of a socket.
466 * Setting an SO_LINGER timeout results in socket closure being performed synchronously, and is
467 * sufficient to ensure shutdown.
468 *
469 * Specifically, if the transform is deactivated (by calling {@link IpSecTransform#close()}),
470 * prior to the socket being closed, the standard [FIN - FIN/ACK - ACK], or the reset [RST]
471 * packets are dropped due to the lack of a valid Transform. Similarly, if a socket without the
472 * SO_LINGER option set is closed, the delayed/batched FIN packets may be dropped.
473 *
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800474 * <h4>Rekey Procedure</h4>
475 *
Nathan Harolde3536f02018-03-06 13:22:22 -0800476 * <p>When applying a new tranform to a socket in the outbound direction, the previous transform
477 * will be removed and the new transform will take effect immediately, sending all traffic on
478 * the new transform; however, when applying a transform in the inbound direction, traffic
479 * on the old transform will continue to be decrypted and delivered until that transform is
480 * deallocated by calling {@link IpSecTransform#close()}. This overlap allows lossless rekey
481 * procedures where both transforms are valid until both endpoints are using the new transform
482 * and all in-flight packets have been received.
Nathan Harold0072e192017-04-06 17:46:00 -0700483 *
484 * @param socket a socket file descriptor
Nathan Harolde3536f02018-03-06 13:22:22 -0800485 * @param direction the direction in which the transform should be applied
Jonathan Basseri2725a232017-04-21 15:53:51 -0700486 * @param transform a transport mode {@code IpSecTransform}
487 * @throws IOException indicating that the transform could not be applied
Nathan Harold0072e192017-04-06 17:46:00 -0700488 */
Nathan Harold6303d9e2018-03-16 17:27:30 -0700489 public void applyTransportModeTransform(@NonNull FileDescriptor socket,
490 @PolicyDirection int direction, @NonNull IpSecTransform transform) throws IOException {
Nathan Harold80865392017-04-04 19:37:48 -0700491 // We dup() the FileDescriptor here because if we don't, then the ParcelFileDescriptor()
Nathan Harold31676252018-01-16 12:08:43 -0800492 // constructor takes control and closes the user's FD when we exit the method.
Nathan Harold80865392017-04-04 19:37:48 -0700493 try (ParcelFileDescriptor pfd = ParcelFileDescriptor.dup(socket)) {
Nathan Harold5a19b952018-01-05 19:25:13 -0800494 mService.applyTransportModeTransform(pfd, direction, transform.getResourceId());
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700495 } catch (ServiceSpecificException e) {
496 throw rethrowCheckedExceptionFromServiceSpecificException(e);
Nathan Harold80865392017-04-04 19:37:48 -0700497 } catch (RemoteException e) {
498 throw e.rethrowFromSystemServer();
499 }
Nathan Harold0072e192017-04-06 17:46:00 -0700500 }
501
502 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700503 * Remove an IPsec transform from a stream socket.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800504 *
Nathan Harold0d483b72018-01-17 01:00:20 -0800505 * <p>Once removed, traffic on the socket will not be encrypted. Removing transforms from a
506 * socket allows the socket to be reused for communication in the clear.
Jonathan Basseri2725a232017-04-21 15:53:51 -0700507 *
508 * <p>If an {@code IpSecTransform} object applied to this socket was deallocated by calling
509 * {@link IpSecTransform#close()}, then communication on the socket will fail until this method
510 * is called.
511 *
512 * @param socket a socket that previously had a transform applied to it
Jonathan Basseri2725a232017-04-21 15:53:51 -0700513 * @throws IOException indicating that the transform could not be removed from the socket
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800514 */
Nathan Harold6303d9e2018-03-16 17:27:30 -0700515 public void removeTransportModeTransforms(@NonNull Socket socket) throws IOException {
Benedict Wong57ab3f62018-04-02 18:12:34 -0700516 // Ensure creation of FD. See b/77548890 for more details.
517 socket.getSoLinger();
518
Nathan Harold0d483b72018-01-17 01:00:20 -0800519 removeTransportModeTransforms(socket.getFileDescriptor$());
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800520 }
521
522 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700523 * Remove an IPsec transform from a datagram socket.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800524 *
Nathan Harold0d483b72018-01-17 01:00:20 -0800525 * <p>Once removed, traffic on the socket will not be encrypted. Removing transforms from a
526 * socket allows the socket to be reused for communication in the clear.
Jonathan Basseri2725a232017-04-21 15:53:51 -0700527 *
528 * <p>If an {@code IpSecTransform} object applied to this socket was deallocated by calling
529 * {@link IpSecTransform#close()}, then communication on the socket will fail until this method
530 * is called.
531 *
532 * @param socket a socket that previously had a transform applied to it
Jonathan Basseri2725a232017-04-21 15:53:51 -0700533 * @throws IOException indicating that the transform could not be removed from the socket
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800534 */
Nathan Harold6303d9e2018-03-16 17:27:30 -0700535 public void removeTransportModeTransforms(@NonNull DatagramSocket socket) throws IOException {
Nathan Harold0d483b72018-01-17 01:00:20 -0800536 removeTransportModeTransforms(socket.getFileDescriptor$());
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800537 }
538
Nathan Harold0072e192017-04-06 17:46:00 -0700539 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700540 * Remove an IPsec transform from a socket.
Nathan Harold0072e192017-04-06 17:46:00 -0700541 *
Nathan Harold0d483b72018-01-17 01:00:20 -0800542 * <p>Once removed, traffic on the socket will not be encrypted. Removing transforms from a
543 * socket allows the socket to be reused for communication in the clear.
Jonathan Basseri2725a232017-04-21 15:53:51 -0700544 *
545 * <p>If an {@code IpSecTransform} object applied to this socket was deallocated by calling
546 * {@link IpSecTransform#close()}, then communication on the socket will fail until this method
547 * is called.
548 *
549 * @param socket a socket that previously had a transform applied to it
Jonathan Basseri2725a232017-04-21 15:53:51 -0700550 * @throws IOException indicating that the transform could not be removed from the socket
Nathan Harold0072e192017-04-06 17:46:00 -0700551 */
Nathan Harold6303d9e2018-03-16 17:27:30 -0700552 public void removeTransportModeTransforms(@NonNull FileDescriptor socket) throws IOException {
Nathan Harold80865392017-04-04 19:37:48 -0700553 try (ParcelFileDescriptor pfd = ParcelFileDescriptor.dup(socket)) {
Nathan Harold0d483b72018-01-17 01:00:20 -0800554 mService.removeTransportModeTransforms(pfd);
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700555 } catch (ServiceSpecificException e) {
556 throw rethrowCheckedExceptionFromServiceSpecificException(e);
Nathan Harold031acb82017-03-07 13:23:36 -0800557 } catch (RemoteException e) {
558 throw e.rethrowFromSystemServer();
559 }
560 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800561
562 /**
563 * Remove a Tunnel Mode IPsec Transform from a {@link Network}. This must be used as part of
564 * cleanup if a tunneled Network experiences a change in default route. The Network will drop
565 * all traffic that cannot be routed to the Tunnel's outbound interface. If that interface is
566 * lost, all traffic will drop.
567 *
Jonathan Basseri20e96c52017-11-16 10:58:01 -0800568 * <p>TODO: Update javadoc for tunnel mode APIs at the same time the APIs are re-worked.
569 *
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800570 * @param net a network that currently has transform applied to it.
571 * @param transform a Tunnel Mode IPsec Transform that has been previously applied to the given
572 * network
573 * @hide
574 */
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800575 public void removeTunnelModeTransform(Network net, IpSecTransform transform) {}
576
577 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700578 * This class provides access to a UDP encapsulation Socket.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800579 *
Jonathan Basseri2725a232017-04-21 15:53:51 -0700580 * <p>{@code UdpEncapsulationSocket} wraps a system-provided datagram socket intended for IKEv2
581 * signalling and UDP encapsulated IPsec traffic. Instances can be obtained by calling {@link
582 * IpSecManager#openUdpEncapsulationSocket}. The provided socket cannot be re-bound by the
583 * caller. The caller should not close the {@code FileDescriptor} returned by {@link
Benedict Wonga386e372018-03-27 16:55:48 -0700584 * #getFileDescriptor}, but should use {@link #close} instead.
Jonathan Basseri2725a232017-04-21 15:53:51 -0700585 *
586 * <p>Allowing the user to close or unbind a UDP encapsulation socket could impact the traffic
587 * of the next user who binds to that port. To prevent this scenario, these sockets are held
588 * open by the system so that they may only be closed by calling {@link #close} or when the user
589 * process exits.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800590 */
591 public static final class UdpEncapsulationSocket implements AutoCloseable {
Nathan Harold80865392017-04-04 19:37:48 -0700592 private final ParcelFileDescriptor mPfd;
Nathan Haroldd2a1dad2017-03-01 18:55:06 -0800593 private final IIpSecService mService;
Nathan Harold5e854462017-12-13 18:51:35 -0800594 private int mResourceId = INVALID_RESOURCE_ID;
Nathan Harold80865392017-04-04 19:37:48 -0700595 private final int mPort;
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800596 private final CloseGuard mCloseGuard = CloseGuard.get();
597
Nathan Harold031acb82017-03-07 13:23:36 -0800598 private UdpEncapsulationSocket(@NonNull IIpSecService service, int port)
Nathan Harold80865392017-04-04 19:37:48 -0700599 throws ResourceUnavailableException, IOException {
Nathan Haroldd2a1dad2017-03-01 18:55:06 -0800600 mService = service;
Nathan Harold80865392017-04-04 19:37:48 -0700601 try {
602 IpSecUdpEncapResponse result =
603 mService.openUdpEncapsulationSocket(port, new Binder());
604 switch (result.status) {
605 case Status.OK:
606 break;
607 case Status.RESOURCE_UNAVAILABLE:
608 throw new ResourceUnavailableException(
609 "No more Sockets may be allocated by this requester.");
610 default:
611 throw new RuntimeException(
612 "Unknown status returned by IpSecService: " + result.status);
613 }
614 mResourceId = result.resourceId;
615 mPort = result.port;
616 mPfd = result.fileDescriptor;
617 } catch (RemoteException e) {
618 throw e.rethrowFromSystemServer();
619 }
Maciej Żenczykowski223b5cc2023-01-07 00:59:44 +0000620 mCloseGuard.open("close");
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800621 }
622
Benedict Wonga386e372018-03-27 16:55:48 -0700623 /** Get the encapsulation socket's file descriptor. */
624 public FileDescriptor getFileDescriptor() {
Nathan Harold80865392017-04-04 19:37:48 -0700625 if (mPfd == null) {
626 return null;
627 }
628 return mPfd.getFileDescriptor();
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800629 }
630
Jonathan Basseri2725a232017-04-21 15:53:51 -0700631 /** Get the bound port of the wrapped socket. */
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800632 public int getPort() {
Nathan Harold80865392017-04-04 19:37:48 -0700633 return mPort;
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800634 }
635
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800636 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700637 * Close this socket.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800638 *
Jonathan Basseri2725a232017-04-21 15:53:51 -0700639 * <p>This closes the wrapped socket. Open encapsulation sockets count against a user's
640 * resource limits, and forgetting to close them eventually will result in {@link
641 * ResourceUnavailableException} being thrown.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800642 */
Jonathan Basseri2725a232017-04-21 15:53:51 -0700643 @Override
Nathan Harolda64b0192017-04-17 17:11:58 -0700644 public void close() throws IOException {
Nathan Harold80865392017-04-04 19:37:48 -0700645 try {
646 mService.closeUdpEncapsulationSocket(mResourceId);
Nathan Harold5e854462017-12-13 18:51:35 -0800647 mResourceId = INVALID_RESOURCE_ID;
Nathan Harold80865392017-04-04 19:37:48 -0700648 } catch (RemoteException e) {
649 throw e.rethrowFromSystemServer();
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700650 } catch (Exception e) {
651 // On close we swallow all random exceptions since failure to close is not
652 // actionable by the user.
653 Log.e(TAG, "Failed to close " + this + ", Exception=" + e);
654 } finally {
655 mResourceId = INVALID_RESOURCE_ID;
656 mCloseGuard.close();
Nathan Harold80865392017-04-04 19:37:48 -0700657 }
658
659 try {
660 mPfd.close();
661 } catch (IOException e) {
662 Log.e(TAG, "Failed to close UDP Encapsulation Socket with Port= " + mPort);
663 throw e;
664 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800665 }
666
Jonathan Basseri2725a232017-04-21 15:53:51 -0700667 /** Check that the socket was closed properly. */
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800668 @Override
669 protected void finalize() throws Throwable {
670 if (mCloseGuard != null) {
671 mCloseGuard.warnIfOpen();
672 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800673 close();
674 }
Nathan Harold80865392017-04-04 19:37:48 -0700675
676 /** @hide */
Chiachang Wanga0343312021-01-12 18:48:13 +0800677 @SystemApi(client = MODULE_LIBRARIES)
Nathan Harold19b99d92017-08-23 13:46:33 -0700678 public int getResourceId() {
Nathan Harold80865392017-04-04 19:37:48 -0700679 return mResourceId;
680 }
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700681
682 @Override
683 public String toString() {
684 return new StringBuilder()
685 .append("UdpEncapsulationSocket{port=")
686 .append(mPort)
687 .append(",resourceId=")
688 .append(mResourceId)
689 .append("}")
690 .toString();
691 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800692 };
693
694 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700695 * Open a socket for UDP encapsulation and bind to the given port.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800696 *
Jonathan Basseri2725a232017-04-21 15:53:51 -0700697 * <p>See {@link UdpEncapsulationSocket} for the proper way to close the returned socket.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800698 *
Jonathan Basseri2725a232017-04-21 15:53:51 -0700699 * @param port a local UDP port
700 * @return a socket that is bound to the given port
701 * @throws IOException indicating that the socket could not be opened or bound
702 * @throws ResourceUnavailableException indicating that too many encapsulation sockets are open
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800703 */
704 // Returning a socket in this fashion that has been created and bound by the system
705 // is the only safe way to ensure that a socket is both accessible to the user and
706 // safely usable for Encapsulation without allowing a user to possibly unbind from/close
707 // the port, which could potentially impact the traffic of the next user who binds to that
708 // socket.
Nathan Harold6303d9e2018-03-16 17:27:30 -0700709 @NonNull
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800710 public UdpEncapsulationSocket openUdpEncapsulationSocket(int port)
711 throws IOException, ResourceUnavailableException {
Nathan Harold80865392017-04-04 19:37:48 -0700712 /*
713 * Most range checking is done in the service, but this version of the constructor expects
714 * a valid port number, and zero cannot be checked after being passed to the service.
715 */
716 if (port == 0) {
717 throw new IllegalArgumentException("Specified port must be a valid port number!");
718 }
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700719 try {
720 return new UdpEncapsulationSocket(mService, port);
721 } catch (ServiceSpecificException e) {
722 throw rethrowCheckedExceptionFromServiceSpecificException(e);
723 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800724 }
725
726 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -0700727 * Open a socket for UDP encapsulation.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800728 *
Jonathan Basseri2725a232017-04-21 15:53:51 -0700729 * <p>See {@link UdpEncapsulationSocket} for the proper way to close the returned socket.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800730 *
Jonathan Basseri2725a232017-04-21 15:53:51 -0700731 * <p>The local port of the returned socket can be obtained by calling {@link
732 * UdpEncapsulationSocket#getPort()}.
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800733 *
Jonathan Basseri2725a232017-04-21 15:53:51 -0700734 * @return a socket that is bound to a local port
735 * @throws IOException indicating that the socket could not be opened or bound
736 * @throws ResourceUnavailableException indicating that too many encapsulation sockets are open
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800737 */
738 // Returning a socket in this fashion that has been created and bound by the system
739 // is the only safe way to ensure that a socket is both accessible to the user and
740 // safely usable for Encapsulation without allowing a user to possibly unbind from/close
741 // the port, which could potentially impact the traffic of the next user who binds to that
742 // socket.
Nathan Harold6303d9e2018-03-16 17:27:30 -0700743 @NonNull
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800744 public UdpEncapsulationSocket openUdpEncapsulationSocket()
745 throws IOException, ResourceUnavailableException {
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700746 try {
747 return new UdpEncapsulationSocket(mService, 0);
748 } catch (ServiceSpecificException e) {
749 throw rethrowCheckedExceptionFromServiceSpecificException(e);
750 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -0800751 }
752
753 /**
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000754 * This class represents an IpSecTunnelInterface
Nathan Harold67e76732018-01-17 16:09:24 -0800755 *
756 * <p>IpSecTunnelInterface objects track tunnel interfaces that serve as
757 * local endpoints for IPsec tunnels.
758 *
759 * <p>Creating an IpSecTunnelInterface creates a device to which IpSecTransforms may be
760 * applied to provide IPsec security to packets sent through the tunnel. While a tunnel
761 * cannot be used in standalone mode within Android, the higher layers may use the tunnel
762 * to create Network objects which are accessible to the Android system.
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000763 * @hide
Nathan Harold67e76732018-01-17 16:09:24 -0800764 */
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000765 @SystemApi
Nathan Harold67e76732018-01-17 16:09:24 -0800766 public static final class IpSecTunnelInterface implements AutoCloseable {
Nathan Harold65ef8432018-03-15 18:06:06 -0700767 private final String mOpPackageName;
Nathan Harold67e76732018-01-17 16:09:24 -0800768 private final IIpSecService mService;
769 private final InetAddress mRemoteAddress;
770 private final InetAddress mLocalAddress;
771 private final Network mUnderlyingNetwork;
772 private final CloseGuard mCloseGuard = CloseGuard.get();
773 private String mInterfaceName;
774 private int mResourceId = INVALID_RESOURCE_ID;
775
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000776 /** Get the underlying SPI held by this object. */
Nathan Harold6303d9e2018-03-16 17:27:30 -0700777 @NonNull
Nathan Harold67e76732018-01-17 16:09:24 -0800778 public String getInterfaceName() {
779 return mInterfaceName;
780 }
781
782 /**
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000783 * Add an address to the IpSecTunnelInterface
Nathan Harold67e76732018-01-17 16:09:24 -0800784 *
785 * <p>Add an address which may be used as the local inner address for
786 * tunneled traffic.
787 *
788 * @param address the local address for traffic inside the tunnel
Benedict Wongd39837f2018-04-03 20:30:54 -0700789 * @param prefixLen length of the InetAddress prefix
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000790 * @hide
Nathan Harold67e76732018-01-17 16:09:24 -0800791 */
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000792 @SystemApi
Benedict Wonge9763752018-11-08 19:45:34 -0800793 @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS)
Nathan Harold00e77242018-03-21 15:32:42 -0700794 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
Benedict Wongd39837f2018-04-03 20:30:54 -0700795 public void addAddress(@NonNull InetAddress address, int prefixLen) throws IOException {
Benedict Wong97c3c942018-03-01 18:53:07 -0800796 try {
Nathan Harold65ef8432018-03-15 18:06:06 -0700797 mService.addAddressToTunnelInterface(
Benedict Wongd39837f2018-04-03 20:30:54 -0700798 mResourceId, new LinkAddress(address, prefixLen), mOpPackageName);
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700799 } catch (ServiceSpecificException e) {
800 throw rethrowCheckedExceptionFromServiceSpecificException(e);
Benedict Wong97c3c942018-03-01 18:53:07 -0800801 } catch (RemoteException e) {
802 throw e.rethrowFromSystemServer();
803 }
Nathan Harold67e76732018-01-17 16:09:24 -0800804 }
805
806 /**
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000807 * Remove an address from the IpSecTunnelInterface
Nathan Harold67e76732018-01-17 16:09:24 -0800808 *
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000809 * <p>Remove an address which was previously added to the IpSecTunnelInterface
Nathan Harold67e76732018-01-17 16:09:24 -0800810 *
811 * @param address to be removed
Benedict Wongd39837f2018-04-03 20:30:54 -0700812 * @param prefixLen length of the InetAddress prefix
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000813 * @hide
Nathan Harold67e76732018-01-17 16:09:24 -0800814 */
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000815 @SystemApi
Benedict Wonge9763752018-11-08 19:45:34 -0800816 @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS)
Nathan Harold00e77242018-03-21 15:32:42 -0700817 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
Benedict Wongd39837f2018-04-03 20:30:54 -0700818 public void removeAddress(@NonNull InetAddress address, int prefixLen) throws IOException {
Benedict Wong97c3c942018-03-01 18:53:07 -0800819 try {
Nathan Harold65ef8432018-03-15 18:06:06 -0700820 mService.removeAddressFromTunnelInterface(
Benedict Wongd39837f2018-04-03 20:30:54 -0700821 mResourceId, new LinkAddress(address, prefixLen), mOpPackageName);
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700822 } catch (ServiceSpecificException e) {
823 throw rethrowCheckedExceptionFromServiceSpecificException(e);
Benedict Wong97c3c942018-03-01 18:53:07 -0800824 } catch (RemoteException e) {
825 throw e.rethrowFromSystemServer();
826 }
Nathan Harold67e76732018-01-17 16:09:24 -0800827 }
828
Yan Yana2f3b492020-09-29 23:38:00 -0700829 /**
830 * Update the underlying network for this IpSecTunnelInterface.
831 *
832 * <p>This new underlying network will be used for all transforms applied AFTER this call is
Yan Yan81c21602022-10-20 22:23:15 +0000833 * complete. Before {@link IpSecTransform}(s) with matching addresses are applied to this
834 * tunnel interface, traffic will still use the old transform, and be routed on the old
Yan Yana2f3b492020-09-29 23:38:00 -0700835 * underlying network.
836 *
837 * <p>To migrate IPsec tunnel mode traffic, a caller should:
838 *
839 * <ol>
840 * <li>Update the IpSecTunnelInterface’s underlying network.
Yan Yan81c21602022-10-20 22:23:15 +0000841 * <li>Apply the new {@link IpSecTransform}(s) to this IpSecTunnelInterface. These can be
842 * new {@link IpSecTransform}(s) with matching addresses, or {@link IpSecTransform}(s)
843 * that have started migration (see {@link
844 * IpSecManager#startTunnelModeTransformMigration}).
Yan Yana2f3b492020-09-29 23:38:00 -0700845 * </ol>
846 *
847 * @param underlyingNetwork the new {@link Network} that will carry traffic for this tunnel.
Yan Yanbe3eb3d2022-05-16 17:13:45 -0700848 * This network MUST be a functional {@link Network} with valid {@link LinkProperties},
849 * and MUST never be the network exposing this IpSecTunnelInterface, otherwise this
850 * method will throw an {@link IllegalArgumentException}. If the IpSecTunnelInterface is
851 * later added to this network, all outbound traffic will be blackholed.
Yan Yana2f3b492020-09-29 23:38:00 -0700852 */
Yan Yana2f3b492020-09-29 23:38:00 -0700853 // The purpose of making updating network and applying transforms separate is to leave open
854 // the possibility to support lossless migration procedures. To do that, Android platform
855 // will need to support multiple inbound tunnel mode transforms, just like it can support
856 // multiple transport mode transforms.
857 @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS)
858 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
859 public void setUnderlyingNetwork(@NonNull Network underlyingNetwork) throws IOException {
860 try {
861 mService.setNetworkForTunnelInterface(
862 mResourceId, underlyingNetwork, mOpPackageName);
863 } catch (RemoteException e) {
864 throw e.rethrowFromSystemServer();
865 }
866 }
867
Nathan Harold65ef8432018-03-15 18:06:06 -0700868 private IpSecTunnelInterface(@NonNull Context ctx, @NonNull IIpSecService service,
Nathan Harold67e76732018-01-17 16:09:24 -0800869 @NonNull InetAddress localAddress, @NonNull InetAddress remoteAddress,
870 @NonNull Network underlyingNetwork)
871 throws ResourceUnavailableException, IOException {
Nathan Harold65ef8432018-03-15 18:06:06 -0700872 mOpPackageName = ctx.getOpPackageName();
Nathan Harold67e76732018-01-17 16:09:24 -0800873 mService = service;
874 mLocalAddress = localAddress;
875 mRemoteAddress = remoteAddress;
876 mUnderlyingNetwork = underlyingNetwork;
Benedict Wong8bc90732018-01-18 18:31:45 -0800877
878 try {
879 IpSecTunnelInterfaceResponse result =
880 mService.createTunnelInterface(
881 localAddress.getHostAddress(),
882 remoteAddress.getHostAddress(),
883 underlyingNetwork,
Nathan Harold65ef8432018-03-15 18:06:06 -0700884 new Binder(),
885 mOpPackageName);
Benedict Wong8bc90732018-01-18 18:31:45 -0800886 switch (result.status) {
887 case Status.OK:
888 break;
889 case Status.RESOURCE_UNAVAILABLE:
890 throw new ResourceUnavailableException(
891 "No more tunnel interfaces may be allocated by this requester.");
892 default:
893 throw new RuntimeException(
894 "Unknown status returned by IpSecService: " + result.status);
895 }
896 mResourceId = result.resourceId;
897 mInterfaceName = result.interfaceName;
898 } catch (RemoteException e) {
899 throw e.rethrowFromSystemServer();
900 }
Maciej Żenczykowski223b5cc2023-01-07 00:59:44 +0000901 mCloseGuard.open("close");
Nathan Harold67e76732018-01-17 16:09:24 -0800902 }
903
904 /**
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000905 * Delete an IpSecTunnelInterface
Nathan Harold67e76732018-01-17 16:09:24 -0800906 *
907 * <p>Calling close will deallocate the IpSecTunnelInterface and all of its system
908 * resources. Any packets bound for this interface either inbound or outbound will
909 * all be lost.
910 */
911 @Override
912 public void close() {
Benedict Wong8bc90732018-01-18 18:31:45 -0800913 try {
Nathan Harold65ef8432018-03-15 18:06:06 -0700914 mService.deleteTunnelInterface(mResourceId, mOpPackageName);
Benedict Wong8bc90732018-01-18 18:31:45 -0800915 } catch (RemoteException e) {
916 throw e.rethrowFromSystemServer();
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700917 } catch (Exception e) {
918 // On close we swallow all random exceptions since failure to close is not
919 // actionable by the user.
920 Log.e(TAG, "Failed to close " + this + ", Exception=" + e);
921 } finally {
922 mResourceId = INVALID_RESOURCE_ID;
923 mCloseGuard.close();
Benedict Wong8bc90732018-01-18 18:31:45 -0800924 }
Nathan Harold67e76732018-01-17 16:09:24 -0800925 }
926
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000927 /** Check that the Interface was closed properly. */
Nathan Harold67e76732018-01-17 16:09:24 -0800928 @Override
929 protected void finalize() throws Throwable {
930 if (mCloseGuard != null) {
931 mCloseGuard.warnIfOpen();
932 }
933 close();
934 }
Benedict Wong8bc90732018-01-18 18:31:45 -0800935
936 /** @hide */
937 @VisibleForTesting
938 public int getResourceId() {
939 return mResourceId;
940 }
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700941
Aurimas Liutikas3a78d9d2019-08-28 13:01:05 -0700942 @NonNull
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700943 @Override
944 public String toString() {
945 return new StringBuilder()
946 .append("IpSecTunnelInterface{ifname=")
947 .append(mInterfaceName)
948 .append(",resourceId=")
949 .append(mResourceId)
950 .append("}")
951 .toString();
952 }
Nathan Harold67e76732018-01-17 16:09:24 -0800953 }
954
955 /**
956 * Create a new IpSecTunnelInterface as a local endpoint for tunneled IPsec traffic.
957 *
Benedict Wong8bc90732018-01-18 18:31:45 -0800958 * <p>An application that creates tunnels is responsible for cleaning up the tunnel when the
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000959 * underlying network goes away, and the onLost() callback is received.
Benedict Wong8bc90732018-01-18 18:31:45 -0800960 *
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000961 * @param localAddress The local addres of the tunnel
962 * @param remoteAddress The local addres of the tunnel
963 * @param underlyingNetwork the {@link Network} that will carry traffic for this tunnel.
964 * This network should almost certainly be a network such as WiFi with an L2 address.
965 * @return a new {@link IpSecManager#IpSecTunnelInterface} with the specified properties
966 * @throws IOException indicating that the socket could not be opened or bound
967 * @throws ResourceUnavailableException indicating that too many encapsulation sockets are open
Yan Yan160aac32020-12-03 17:08:29 -0800968 * @hide
Yan Yan160aac32020-12-03 17:08:29 -0800969 */
Nathan Harold3a287d52018-04-25 12:01:34 -0700970 @SystemApi
Nathan Harold6303d9e2018-03-16 17:27:30 -0700971 @NonNull
Benedict Wonge9763752018-11-08 19:45:34 -0800972 @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS)
Nathan Harold00e77242018-03-21 15:32:42 -0700973 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
Nathan Harold67e76732018-01-17 16:09:24 -0800974 public IpSecTunnelInterface createIpSecTunnelInterface(@NonNull InetAddress localAddress,
975 @NonNull InetAddress remoteAddress, @NonNull Network underlyingNetwork)
976 throws ResourceUnavailableException, IOException {
Nathan Haroldbeed0b62018-04-03 16:13:19 -0700977 try {
978 return new IpSecTunnelInterface(
979 mContext, mService, localAddress, remoteAddress, underlyingNetwork);
980 } catch (ServiceSpecificException e) {
981 throw rethrowCheckedExceptionFromServiceSpecificException(e);
982 }
Nathan Harold67e76732018-01-17 16:09:24 -0800983 }
984
985 /**
Nathan Harolde3536f02018-03-06 13:22:22 -0800986 * Apply an active Tunnel Mode IPsec Transform to a {@link IpSecTunnelInterface}, which will
987 * tunnel all traffic for the given direction through the underlying network's interface with
988 * IPsec (applies an outer IP header and IPsec Header to all traffic, and expects an additional
989 * IP header and IPsec Header on all inbound traffic).
990 * <p>Applications should probably not use this API directly.
991 *
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000992 * @param tunnel The {@link IpSecManager#IpSecTunnelInterface} that will use the supplied
Nathan Harold67e76732018-01-17 16:09:24 -0800993 * transform.
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000994 * @param direction the direction, {@link DIRECTION_OUT} or {@link #DIRECTION_IN} in which
Nathan Harold67e76732018-01-17 16:09:24 -0800995 * the transform will be used.
996 * @param transform an {@link IpSecTransform} created in tunnel mode
Lorenzo Colitti388f4162021-02-01 08:12:34 +0000997 * @throws IOException indicating that the transform could not be applied due to a lower
998 * layer failure.
999 * @hide
Nathan Harold67e76732018-01-17 16:09:24 -08001000 */
Lorenzo Colitti388f4162021-02-01 08:12:34 +00001001 @SystemApi
Benedict Wonge9763752018-11-08 19:45:34 -08001002 @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS)
Nathan Harold00e77242018-03-21 15:32:42 -07001003 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
Nathan Harold6303d9e2018-03-16 17:27:30 -07001004 public void applyTunnelModeTransform(@NonNull IpSecTunnelInterface tunnel,
1005 @PolicyDirection int direction, @NonNull IpSecTransform transform) throws IOException {
Benedict Wong8bc90732018-01-18 18:31:45 -08001006 try {
1007 mService.applyTunnelModeTransform(
Nathan Harold65ef8432018-03-15 18:06:06 -07001008 tunnel.getResourceId(), direction,
1009 transform.getResourceId(), mContext.getOpPackageName());
Nathan Haroldbeed0b62018-04-03 16:13:19 -07001010 } catch (ServiceSpecificException e) {
1011 throw rethrowCheckedExceptionFromServiceSpecificException(e);
Benedict Wong8bc90732018-01-18 18:31:45 -08001012 } catch (RemoteException e) {
1013 throw e.rethrowFromSystemServer();
1014 }
Nathan Harold67e76732018-01-17 16:09:24 -08001015 }
Nathan Harolde3536f02018-03-06 13:22:22 -08001016
Nathan Harold67e76732018-01-17 16:09:24 -08001017 /**
Yan Yane114b382021-02-16 16:29:48 -08001018 * Migrate an active Tunnel Mode IPsec Transform to new source/destination addresses.
1019 *
1020 * <p>Begins the process of migrating a transform and cache the new addresses. To complete the
1021 * migration once started, callers MUST apply the same transform to the appropriate tunnel using
1022 * {@link IpSecManager#applyTunnelModeTransform}. Otherwise, the address update will not be
1023 * committed and the transform will still only process traffic between the current source and
1024 * destination address. One common use case is that the control plane will start the migration
1025 * process and then hand off the transform to the IPsec caller to perform the actual migration
1026 * when the tunnel is ready.
1027 *
1028 * <p>If this method is called multiple times before {@link
1029 * IpSecManager#applyTunnelModeTransform} is called, when the transform is applied, it will be
1030 * migrated to the addresses from the last call.
1031 *
1032 * <p>The provided source and destination addresses MUST share the same address family, but they
1033 * can have a different family from the current addresses.
1034 *
1035 * <p>Transform migration is only supported for tunnel mode transforms. Calling this method on
1036 * other types of transforms will throw an {@code UnsupportedOperationException}.
1037 *
1038 * @see IpSecTunnelInterface#setUnderlyingNetwork
1039 * @param transform a tunnel mode {@link IpSecTransform}
1040 * @param newSourceAddress the new source address
1041 * @param newDestinationAddress the new destination address
1042 * @hide
1043 */
Yan Yan81c21602022-10-20 22:23:15 +00001044 @SystemApi
Yan Yana48dcd92022-10-18 00:03:20 +00001045 @RequiresFeature(FEATURE_IPSEC_TUNNEL_MIGRATION)
Yan Yane114b382021-02-16 16:29:48 -08001046 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
Yan Yan81c21602022-10-20 22:23:15 +00001047 public void startTunnelModeTransformMigration(
Yan Yane114b382021-02-16 16:29:48 -08001048 @NonNull IpSecTransform transform,
1049 @NonNull InetAddress newSourceAddress,
1050 @NonNull InetAddress newDestinationAddress) {
1051 if (!SdkLevel.isAtLeastU()) {
1052 throw new UnsupportedOperationException(
1053 "Transform migration only supported for Android 14+");
1054 }
1055
1056 Objects.requireNonNull(transform, "transform was null");
1057 Objects.requireNonNull(newSourceAddress, "newSourceAddress was null");
1058 Objects.requireNonNull(newDestinationAddress, "newDestinationAddress was null");
1059
1060 try {
1061 mService.migrateTransform(
1062 transform.getResourceId(),
1063 newSourceAddress.getHostAddress(),
1064 newDestinationAddress.getHostAddress(),
1065 mContext.getOpPackageName());
1066 } catch (RemoteException e) {
1067 throw e.rethrowFromSystemServer();
1068 }
1069 }
1070
1071 /**
Aaron Huang80a73fd2021-12-28 02:33:53 +08001072 * @hide
1073 */
1074 public IpSecTransformResponse createTransform(IpSecConfig config, IBinder binder,
1075 String callingPackage) {
1076 try {
1077 return mService.createTransform(config, binder, callingPackage);
1078 } catch (RemoteException e) {
1079 throw e.rethrowFromSystemServer();
1080 }
1081 }
1082
1083 /**
1084 * @hide
1085 */
1086 public void deleteTransform(int resourceId) {
1087 try {
1088 mService.deleteTransform(resourceId);
1089 } catch (RemoteException e) {
1090 throw e.rethrowFromSystemServer();
1091 }
1092 }
1093
Yan Yanab5006c2023-11-15 21:41:51 +00001094 /** @hide */
1095 public IpSecTransformState getTransformState(int transformId)
1096 throws IllegalStateException, RemoteException {
1097 return mService.getTransformState(transformId);
1098 }
1099
Aaron Huang80a73fd2021-12-28 02:33:53 +08001100 /**
Jonathan Basseri2725a232017-04-21 15:53:51 -07001101 * Construct an instance of IpSecManager within an application context.
Nathan Haroldb1f605f2017-01-12 18:38:57 -08001102 *
1103 * @param context the application context for this manager
1104 * @hide
1105 */
Nathan Harold65ef8432018-03-15 18:06:06 -07001106 public IpSecManager(Context ctx, IIpSecService service) {
1107 mContext = ctx;
Aaron Huang49eef6f2021-12-22 16:35:13 +08001108 mService = Objects.requireNonNull(service, "missing service");
Nathan Haroldb1f605f2017-01-12 18:38:57 -08001109 }
Nathan Haroldbeed0b62018-04-03 16:13:19 -07001110
1111 private static void maybeHandleServiceSpecificException(ServiceSpecificException sse) {
1112 // OsConstants are late binding, so switch statements can't be used.
1113 if (sse.errorCode == OsConstants.EINVAL) {
1114 throw new IllegalArgumentException(sse);
1115 } else if (sse.errorCode == OsConstants.EAGAIN) {
1116 throw new IllegalStateException(sse);
Benedict Wongc45974b2018-07-16 14:56:20 -07001117 } else if (sse.errorCode == OsConstants.EOPNOTSUPP
1118 || sse.errorCode == OsConstants.EPROTONOSUPPORT) {
Nathan Haroldbeed0b62018-04-03 16:13:19 -07001119 throw new UnsupportedOperationException(sse);
1120 }
1121 }
1122
1123 /**
1124 * Convert an Errno SSE to the correct Unchecked exception type.
1125 *
1126 * This method never actually returns.
1127 */
1128 // package
1129 static RuntimeException
1130 rethrowUncheckedExceptionFromServiceSpecificException(ServiceSpecificException sse) {
1131 maybeHandleServiceSpecificException(sse);
1132 throw new RuntimeException(sse);
1133 }
1134
1135 /**
1136 * Convert an Errno SSE to the correct Checked or Unchecked exception type.
1137 *
1138 * This method may throw IOException, or it may throw an unchecked exception; it will never
1139 * actually return.
1140 */
1141 // package
1142 static IOException rethrowCheckedExceptionFromServiceSpecificException(
1143 ServiceSpecificException sse) throws IOException {
1144 // First see if this is an unchecked exception of a type we know.
1145 // If so, then we prefer the unchecked (specific) type of exception.
1146 maybeHandleServiceSpecificException(sse);
1147 // If not, then all we can do is provide the SSE in the form of an IOException.
1148 throw new ErrnoException(
1149 "IpSec encountered errno=" + sse.errorCode, sse.errorCode).rethrowAsIOException();
1150 }
Nathan Haroldb1f605f2017-01-12 18:38:57 -08001151}