xfrm4_policy.c (eff430de53be6f3328c3eebe93755f1ecf499e37) | xfrm4_policy.c (b71d1d426d263b0b6cb5760322efebbfc89d4463) |
---|---|
1/* 2 * xfrm4_policy.c 3 * 4 * Changes: 5 * Kazunori MIYAZAWA @USAGI 6 * YOSHIFUJI Hideaki @USAGI 7 * Split up af-specific portion 8 * --- 88 unchanged lines hidden (view full) --- 97 xdst->u.rt.rt_spec_dst = rt->rt_spec_dst; 98 99 return 0; 100} 101 102static void 103_decode_session4(struct sk_buff *skb, struct flowi *fl, int reverse) 104{ | 1/* 2 * xfrm4_policy.c 3 * 4 * Changes: 5 * Kazunori MIYAZAWA @USAGI 6 * YOSHIFUJI Hideaki @USAGI 7 * Split up af-specific portion 8 * --- 88 unchanged lines hidden (view full) --- 97 xdst->u.rt.rt_spec_dst = rt->rt_spec_dst; 98 99 return 0; 100} 101 102static void 103_decode_session4(struct sk_buff *skb, struct flowi *fl, int reverse) 104{ |
105 struct iphdr *iph = ip_hdr(skb); | 105 const struct iphdr *iph = ip_hdr(skb); |
106 u8 *xprth = skb_network_header(skb) + iph->ihl * 4; 107 struct flowi4 *fl4 = &fl->u.ip4; 108 109 memset(fl4, 0, sizeof(struct flowi4)); 110 fl4->flowi4_mark = skb->mark; 111 112 if (!(iph->frag_off & htons(IP_MF | IP_OFFSET))) { 113 switch (iph->protocol) { --- 184 unchanged lines hidden --- | 106 u8 *xprth = skb_network_header(skb) + iph->ihl * 4; 107 struct flowi4 *fl4 = &fl->u.ip4; 108 109 memset(fl4, 0, sizeof(struct flowi4)); 110 fl4->flowi4_mark = skb->mark; 111 112 if (!(iph->frag_off & htons(IP_MF | IP_OFFSET))) { 113 switch (iph->protocol) { --- 184 unchanged lines hidden --- |