It is expected that platforms that are not able to support
odp_ipsec_sa_disable() status result in a form of separate event will
set SA hard expiry time to 0, submit a dummy packet to that SA. Then
after receiving this packet after IPsec processing (which should result
in hard expiry breach) odp_ipsec_result() will detect this packet
through the combination of hard_expiry, size, contents, etc and will
report it as a packet with odp_ipsec_warn_t->sa_disabled bit set.
Signed-off-by: Dmitry Eremin-Solenikov [email protected]
Cc: Nikhil Agarwal [email protected]
Cc: Balasubramanian Manoharan [email protected]

----------------github------------------------
/** Email created from pull request 197 (lumag:ipsec_sa_disable_proposal)
 ** https://github.com/Linaro/odp/pull/197
 ** Patch: https://github.com/Linaro/odp/pull/197.patch
 ** Base sha: bf803098eb1518dfb9e719071256fe22700b8c72
 ** Merge commit sha: 3a4b74654b98e9189d8d81ac7cc7ff68e629a7c5
 **/
----------------/github------------------------

----------------checkpatch.pl------------------------
WARNING: Duplicate signature
#18: 
Signed-off-by: Dmitry Eremin-Solenikov <[email protected]>

total: 0 errors, 1 warnings, 0 checks, 61 lines checked


to_send-p-000.patch has style problems, please review.

If any of these errors are false positives, please report
them to the maintainer, see CHECKPATCH in MAINTAINERS.
----------------/checkpatch.pl------------------------

Reply via email to