|
@@ -951,8 +951,8 @@ xfrm_policy_ok(struct xfrm_tmpl *tmpl, struct sec_path *sp, int start,
|
|
return start;
|
|
return start;
|
|
}
|
|
}
|
|
|
|
|
|
-static int
|
|
|
|
-_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family)
|
|
|
|
|
|
+int
|
|
|
|
+xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family)
|
|
{
|
|
{
|
|
struct xfrm_policy_afinfo *afinfo = xfrm_policy_get_afinfo(family);
|
|
struct xfrm_policy_afinfo *afinfo = xfrm_policy_get_afinfo(family);
|
|
|
|
|
|
@@ -963,6 +963,7 @@ _decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family)
|
|
xfrm_policy_put_afinfo(afinfo);
|
|
xfrm_policy_put_afinfo(afinfo);
|
|
return 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
+EXPORT_SYMBOL(xfrm_decode_session);
|
|
|
|
|
|
static inline int secpath_has_tunnel(struct sec_path *sp, int k)
|
|
static inline int secpath_has_tunnel(struct sec_path *sp, int k)
|
|
{
|
|
{
|
|
@@ -982,7 +983,7 @@ int __xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb,
|
|
u8 fl_dir = policy_to_flow_dir(dir);
|
|
u8 fl_dir = policy_to_flow_dir(dir);
|
|
u32 sk_sid;
|
|
u32 sk_sid;
|
|
|
|
|
|
- if (_decode_session(skb, &fl, family) < 0)
|
|
|
|
|
|
+ if (xfrm_decode_session(skb, &fl, family) < 0)
|
|
return 0;
|
|
return 0;
|
|
|
|
|
|
sk_sid = security_sk_sid(sk, &fl, fl_dir);
|
|
sk_sid = security_sk_sid(sk, &fl, fl_dir);
|
|
@@ -1055,7 +1056,7 @@ int __xfrm_route_forward(struct sk_buff *skb, unsigned short family)
|
|
{
|
|
{
|
|
struct flowi fl;
|
|
struct flowi fl;
|
|
|
|
|
|
- if (_decode_session(skb, &fl, family) < 0)
|
|
|
|
|
|
+ if (xfrm_decode_session(skb, &fl, family) < 0)
|
|
return 0;
|
|
return 0;
|
|
|
|
|
|
return xfrm_lookup(&skb->dst, &fl, NULL, 0) == 0;
|
|
return xfrm_lookup(&skb->dst, &fl, NULL, 0) == 0;
|