Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/dev/marvell Make this build with or without options IPSEC.
details: https://anonhg.NetBSD.org/src/rev/242497ff7d64
branches: trunk
changeset: 1012190:242497ff7d64
user: riastradh <riastradh%NetBSD.org@localhost>
date: Sat Jul 25 22:37:48 2020 +0000
description:
Make this build with or without options IPSEC.
Not really that useful without options IPSEC, but simply uncommenting
mvxpsec in conf/ARMADAXP didn't build, and this change is trivial, so
why not.
diffstat:
sys/dev/marvell/mvxpsec.c | 13 ++++++++++++-
1 files changed, 12 insertions(+), 1 deletions(-)
diffs (63 lines):
diff -r 645be5b591c3 -r 242497ff7d64 sys/dev/marvell/mvxpsec.c
--- a/sys/dev/marvell/mvxpsec.c Sat Jul 25 22:37:16 2020 +0000
+++ b/sys/dev/marvell/mvxpsec.c Sat Jul 25 22:37:48 2020 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: mvxpsec.c,v 1.6 2020/07/25 22:37:16 riastradh Exp $ */
+/* $NetBSD: mvxpsec.c,v 1.7 2020/07/25 22:37:48 riastradh Exp $ */
/*
* Copyright (c) 2015 Internet Initiative Japan Inc.
* All rights reserved.
@@ -24,6 +24,11 @@
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
+
+#ifdef _KERNEL_OPT
+#include "opt_ipsec.h"
+#endif
+
/*
* Cryptographic Engine and Security Accelerator(MVXPSEC)
*/
@@ -63,7 +68,9 @@
#include <netinet/ip.h>
#include <netinet/ip6.h>
+#if NIPSEC > 0
#include <netipsec/esp_var.h>
+#endif
#include <arm/cpufunc.h>
#include <arm/marvell/mvsocvar.h>
@@ -2513,6 +2520,7 @@
}
}
if (pktlen > SRAM_PAYLOAD_SIZE) {
+#if NIPSEC > 0
extern percpu_t *espstat_percpu;
/* XXX:
* layer violation. opencrypto knows our max packet size
@@ -2520,6 +2528,7 @@
*/
_NET_STATINC(espstat_percpu, ESP_STAT_TOOBIG);
+#endif
log(LOG_ERR,
"%s: ESP Packet too large: %zu [oct.] > %zu [oct.]\n",
device_xname(sc->sc_dev),
@@ -2562,6 +2571,7 @@
struct mvxpsec_softc *sc = mv_s->sc;
if (uio->uio_resid > SRAM_PAYLOAD_SIZE) {
+#if NIPSEC > 0
extern percpu_t *espstat_percpu;
/* XXX:
* layer violation. opencrypto knows our max packet size
@@ -2569,6 +2579,7 @@
*/
_NET_STATINC(espstat_percpu, ESP_STAT_TOOBIG);
+#endif
log(LOG_ERR,
"%s: uio request too large: %zu [oct.] > %zu [oct.]\n",
device_xname(sc->sc_dev),
Home |
Main Index |
Thread Index |
Old Index