diff options
author | David S. Miller <davem@davemloft.net> | 2008-05-22 02:36:21 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2008-05-22 02:36:21 +0200 |
commit | 88860c9ef45963eb69411b0d2ace4e8ba0f7a32f (patch) | |
tree | 043447814c6913d16a5a191dced1989d81cc4fb3 | |
parent | net/ipv4/arp.c: Use common hex_asc helpers (diff) | |
download | linux-88860c9ef45963eb69411b0d2ace4e8ba0f7a32f.tar.xz linux-88860c9ef45963eb69411b0d2ace4e8ba0f7a32f.zip |
xfrm_user: Remove zero length key checks.
The crypto layer will determine whether that is valid
or not.
Suggested by Herbert Xu, based upon a report and patch
by Martin Willi.
Signed-off-by: David S. Miller <davem@davemloft.net>
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r-- | net/xfrm/xfrm_user.c | 11 |
1 files changed, 0 insertions, 11 deletions
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index a1b0fbe3ea35..b976d9ed10e4 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c @@ -50,19 +50,8 @@ static int verify_one_alg(struct nlattr **attrs, enum xfrm_attr_type_t type) switch (type) { case XFRMA_ALG_AUTH: - if (!algp->alg_key_len && - strcmp(algp->alg_name, "digest_null") != 0) - return -EINVAL; - break; - case XFRMA_ALG_CRYPT: - if (!algp->alg_key_len && - strcmp(algp->alg_name, "cipher_null") != 0) - return -EINVAL; - break; - case XFRMA_ALG_COMP: - /* Zero length keys are legal. */ break; default: |