1<?xml version="1.0" encoding="utf-8" ?> 2<!-- Copyright (C) 2019 The Android Open Source Project 3 4 Licensed under the Apache License, Version 2.0 (the "License"); 5 you may not use this file except in compliance with the License. 6 You may obtain a copy of the License at 7 8 http://www.apache.org/licenses/LICENSE-2.0 9 10 Unless required by applicable law or agreed to in writing, software 11 distributed under the License is distributed on an "AS IS" BASIS, 12 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 See the License for the specific language governing permissions and 14 limitations under the License. 15--> 16<resources xmlns:android="http://schemas.android.com/apk/res/android"> 17 <overlayable name="NetworkStackConfig"> 18 <policy type="product|system|vendor"> 19 <!-- Configuration values for NetworkMonitor --> 20 <item type="integer" name="config_captive_portal_dns_probe_timeout"/> 21 <!-- Define the min and max range of the content-length that should be in the HTTP 22 response header of probe responses for the validation success/failed regexp to be 23 used. The RegExp will be used to match the probe response content when the 24 content-length is inside this interval(Strictly greater than the 25 config_min_matches_http_content_length and strictly smaller than the 26 config_max_matches_http_content_length). When the content-length is out of this 27 interval, the RegExp will not be used. --> 28 <item type="integer" name="config_min_matches_http_content_length"/> 29 <item type="integer" name="config_max_matches_http_content_length"/> 30 <item type="string" name="config_captive_portal_http_url"/> 31 <item type="string" name="config_captive_portal_https_url"/> 32 <!-- A regular expression to match the content of a network validation probe. 33 Treat the network validation as failed when the content matches the 34 config_network_validation_failed_content_regexp and treat the network validation 35 as success when the content matches the 36 config_network_validation_success_content_regexp. If the content matches both of 37 the config_network_validation_failed_content_regexp and the 38 config_network_validation_success_content_regexp, the result will be considered as 39 failed. --> 40 <item type="string" name="config_network_validation_failed_content_regexp"/> 41 <item type="string" name="config_network_validation_success_content_regexp"/> 42 <item type="array" name="config_captive_portal_http_urls"/> 43 <item type="array" name="config_captive_portal_https_urls"/> 44 <item type="array" name="config_captive_portal_fallback_urls"/> 45 <item type="bool" name="config_no_sim_card_uses_neighbor_mcc"/> 46 <!-- Configuration value for DhcpResults --> 47 <item type="array" name="config_default_dns_servers"/> 48 <!-- Configuration for including DHCP client hostname option. 49 If this option is true, client hostname set in Settings.Global.DEVICE_NAME will be 50 included in DHCPDISCOVER/DHCPREQUEST, otherwise, the DHCP hostname option will not 51 be sent. RFC952 and RFC1123 stipulates an valid hostname should be only comprised of 52 'a-z', 'A-Z' and '-', and the length should be up to 63 octets or less (RFC1035#2.3.4), 53 platform will perform best-effort transliteration for other characters. Anything that 54 could be used to identify the device uniquely is not recommended, e.g. user's name, 55 random number and etc. 56 --> 57 <item type="bool" name="config_dhcp_client_hostname"/> 58 <!-- Customized neighbor unreachable probe parameters. 59 Legal config_*_num value should be in the range of 5-15; and config_*_interval value 60 should be in the range of 750-1000ms. 61 --> 62 <item type="integer" name="config_nud_steadystate_solicit_num"/> 63 <item type="integer" name="config_nud_steadystate_solicit_interval"/> 64 <item type="integer" name="config_nud_postroaming_solicit_num"/> 65 <item type="integer" name="config_nud_postroaming_solicit_interval"/> 66 67 <!-- Whether to force considering DNS probes returning private IP addresses as failed 68 when attempting to detect captive portals. 69 The impact of this feature will be evaluated separately through experiments. 70 Force-enabling the feature regardless of the experiment results is not advised, as it 71 could result in valid captive portals being incorrectly classified as having no 72 connectivity.--> 73 <item type="bool" name="config_force_dns_probe_private_ip_no_internet"/> 74 75 <!-- Configurations for bandwidth check. --> 76 <item type="string" name="config_evaluating_bandwidth_url"/> 77 <item type="integer" name="config_evaluating_bandwidth_timeout_ms"/> 78 <item type="integer" name="config_evaluating_bandwidth_min_retry_timer_ms"/> 79 <item type="integer" name="config_evaluating_bandwidth_max_retry_timer_ms"/> 80 81 <!-- Whether the APF Filter in the device should filter out IEEE 802.3 Frames 82 Those frames are identified by the field Eth-type having values less than 0x600 --> 83 <item type="bool" name="config_apfDrop802_3Frames"/> 84 <!-- An array of Denylisted EtherType, packets with EtherTypes within this array 85 will be dropped --> 86 <item type="array" name="config_apfEthTypeDenyList"/> 87 </policy> 88 </overlayable> 89</resources> 90