It is expected that platforms that are not able to support odp_ipsec_sa_disable() status result in a form of separate event will set SA hard expiry time to 0, submit a dummy packet to that SA. Then after receiving this packet after IPsec processing (which should result in hard expiry breach) odp_ipsec_result() will detect this packet through the combination of hard_expiry, size, contents, etc and will report it as a packet with odp_ipsec_warn_t->sa_disabled bit set. Signed-off-by: Dmitry Eremin-Solenikov [email protected] Cc: Nikhil Agarwal [email protected] Cc: Balasubramanian Manoharan [email protected]
----------------github------------------------ /** Email created from pull request 197 (lumag:ipsec_sa_disable_proposal) ** https://github.com/Linaro/odp/pull/197 ** Patch: https://github.com/Linaro/odp/pull/197.patch ** Base sha: bf803098eb1518dfb9e719071256fe22700b8c72 ** Merge commit sha: 3a4b74654b98e9189d8d81ac7cc7ff68e629a7c5 **/ ----------------/github------------------------ ----------------checkpatch.pl------------------------ WARNING: Duplicate signature #18: Signed-off-by: Dmitry Eremin-Solenikov <[email protected]> total: 0 errors, 1 warnings, 0 checks, 61 lines checked to_send-p-000.patch has style problems, please review. If any of these errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. ----------------/checkpatch.pl------------------------
