FROMGIT: xfrm: Check if_id in inbound policy/secpath match
This change ensures that if configured in the policy, the if_id set in the policy and secpath states match during the inbound policy check. Without this, there is potential for ambiguity where entries in the secpath differing by only the if_id could be mismatched. Notably, this is checked in the outbound direction when resolving templates to SAs, but not on the inbound path when matching SAs and policies. Test: Tested against Android kernel unit tests & CTS Signed-off-by:Benedict Wong <benedictwong@google.com> Signed-off-by:
Steffen Klassert <steffen.klassert@secunet.com> Bug: 279217934 (cherry picked from commit 8680407b https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git master) Change-Id: Ibb97561eaf1a99b7ad239d4d4860bfe5b0ac20ea Signed-off-by:
Carlos Llamas <cmllamas@google.com>
Loading
Please sign in to comment