summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDavid S. Miller <davem@davemloft.net>2008-05-22 02:36:21 +0200
committerDavid S. Miller <davem@davemloft.net>2008-05-22 02:36:21 +0200
commit88860c9ef45963eb69411b0d2ace4e8ba0f7a32f (patch)
tree043447814c6913d16a5a191dced1989d81cc4fb3
parentnet/ipv4/arp.c: Use common hex_asc helpers (diff)
downloadlinux-88860c9ef45963eb69411b0d2ace4e8ba0f7a32f.tar.xz
linux-88860c9ef45963eb69411b0d2ace4e8ba0f7a32f.zip
xfrm_user: Remove zero length key checks.
The crypto layer will determine whether that is valid or not. Suggested by Herbert Xu, based upon a report and patch by Martin Willi. Signed-off-by: David S. Miller <davem@davemloft.net> Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r--net/xfrm/xfrm_user.c11
1 files changed, 0 insertions, 11 deletions
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c
index a1b0fbe3ea35..b976d9ed10e4 100644
--- a/net/xfrm/xfrm_user.c
+++ b/net/xfrm/xfrm_user.c
@@ -50,19 +50,8 @@ static int verify_one_alg(struct nlattr **attrs, enum xfrm_attr_type_t type)
switch (type) {
case XFRMA_ALG_AUTH:
- if (!algp->alg_key_len &&
- strcmp(algp->alg_name, "digest_null") != 0)
- return -EINVAL;
- break;
-
case XFRMA_ALG_CRYPT:
- if (!algp->alg_key_len &&
- strcmp(algp->alg_name, "cipher_null") != 0)
- return -EINVAL;
- break;
-
case XFRMA_ALG_COMP:
- /* Zero length keys are legal. */
break;
default: