ipsec: IPsec fix constant propagation
In some anti-replay, some functions weren't using the boolean telling if the window was huge or not. Hence, limiting the constant propagation at compilation. Type: fix Change-Id: Ie5f2dda38339bb32113c6f7b2b82c82135fc92a8 Signed-off-by: Maxime Peim <mpeim@cisco.com>
This commit is contained in:

committed by
Beno�t Ganne

parent
0fbf07ed7f
commit
115e31b43f
@ -731,13 +731,14 @@ ipsec_sa_anti_replay_window_shift (ipsec_sa_t *sa, u32 inc, bool ar_huge)
|
||||
else
|
||||
{
|
||||
/* holes in the replay window are lost packets */
|
||||
n_lost = window_size - IPSEC_SA_ANTI_REPLAY_WINDOW_N_SEEN (sa);
|
||||
n_lost = window_size -
|
||||
IPSEC_SA_ANTI_REPLAY_WINDOW_N_SEEN_KNOWN_WIN (sa, ar_huge);
|
||||
|
||||
/* any sequence numbers that now fall outside the window
|
||||
* are forever lost */
|
||||
n_lost += inc - window_size;
|
||||
|
||||
if (PREDICT_FALSE (ipsec_sa_is_set_ANTI_REPLAY_HUGE (sa)))
|
||||
if (PREDICT_FALSE (ar_huge))
|
||||
{
|
||||
clib_bitmap_zero (sa->replay_window_huge);
|
||||
clib_bitmap_set_no_check (sa->replay_window_huge,
|
||||
|
Reference in New Issue
Block a user