Add checkServerTrusted variant to X509TrustManagerExtensions

This variant passes down the OCSP and TLS data that may be required to
validate the Certificate Transparency status of a certificate.

This is required for network stacks that are not able to pass down an
SSLSession nor a Socket (e.g., Cronet).

Bug: 293505388
Bug: 319829948
Bug: 377159091
Test: build
API-Coverage-Bug: 376139811
Flag: android.net.platform.flags.x509_extensions_certificate_transparency
Change-Id: I0304c97e799452a51916174788ba7dd6c9a82fb6
diff --git a/AconfigFlags.bp b/AconfigFlags.bp
index e184704..e951708 100644
--- a/AconfigFlags.bp
+++ b/AconfigFlags.bp
@@ -105,6 +105,7 @@
         "com.android.server.flags.services-aconfig-java",
         "com.android.text.flags-aconfig-java",
         "com.android.window.flags.window-aconfig-java",
+        "conscrypt_exported_aconfig_flags_lib",
         "device_policy_aconfig_flags_lib",
         "display_flags_lib",
         "dropbox_flags_lib",
@@ -194,6 +195,14 @@
     defaults: ["framework-minus-apex-aconfig-java-defaults"],
 }
 
+// Conscrypt
+java_aconfig_library {
+    name: "conscrypt_exported_aconfig_flags_lib",
+    aconfig_declarations: "conscrypt-aconfig-flags",
+    mode: "exported",
+    defaults: ["framework-minus-apex-aconfig-java-defaults"],
+}
+
 // Telecom
 java_aconfig_library {
     name: "telecom_flags_core_java_lib",