xfrm4_policy.c (eff430de53be6f3328c3eebe93755f1ecf499e37) xfrm4_policy.c (b71d1d426d263b0b6cb5760322efebbfc89d4463)
1/*
2 * xfrm4_policy.c
3 *
4 * Changes:
5 * Kazunori MIYAZAWA @USAGI
6 * YOSHIFUJI Hideaki @USAGI
7 * Split up af-specific portion
8 *

--- 88 unchanged lines hidden (view full) ---

97 xdst->u.rt.rt_spec_dst = rt->rt_spec_dst;
98
99 return 0;
100}
101
102static void
103_decode_session4(struct sk_buff *skb, struct flowi *fl, int reverse)
104{
1/*
2 * xfrm4_policy.c
3 *
4 * Changes:
5 * Kazunori MIYAZAWA @USAGI
6 * YOSHIFUJI Hideaki @USAGI
7 * Split up af-specific portion
8 *

--- 88 unchanged lines hidden (view full) ---

97 xdst->u.rt.rt_spec_dst = rt->rt_spec_dst;
98
99 return 0;
100}
101
102static void
103_decode_session4(struct sk_buff *skb, struct flowi *fl, int reverse)
104{
105 struct iphdr *iph = ip_hdr(skb);
105 const struct iphdr *iph = ip_hdr(skb);
106 u8 *xprth = skb_network_header(skb) + iph->ihl * 4;
107 struct flowi4 *fl4 = &fl->u.ip4;
108
109 memset(fl4, 0, sizeof(struct flowi4));
110 fl4->flowi4_mark = skb->mark;
111
112 if (!(iph->frag_off & htons(IP_MF | IP_OFFSET))) {
113 switch (iph->protocol) {

--- 184 unchanged lines hidden ---
106 u8 *xprth = skb_network_header(skb) + iph->ihl * 4;
107 struct flowi4 *fl4 = &fl->u.ip4;
108
109 memset(fl4, 0, sizeof(struct flowi4));
110 fl4->flowi4_mark = skb->mark;
111
112 if (!(iph->frag_off & htons(IP_MF | IP_OFFSET))) {
113 switch (iph->protocol) {

--- 184 unchanged lines hidden ---