xfrm_user: Remove zero length key checks.
The crypto layer will determine whether that is valid or not. Suggested by Herbert Xu, based upon a report and patch by Martin Willi. Signed-off-by: David S. Miller <davem@davemloft.net> Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
parent
51f82a2b12
commit
88860c9ef4
|
@ -50,19 +50,8 @@ static int verify_one_alg(struct nlattr **attrs, enum xfrm_attr_type_t type)
|
|||
|
||||
switch (type) {
|
||||
case XFRMA_ALG_AUTH:
|
||||
if (!algp->alg_key_len &&
|
||||
strcmp(algp->alg_name, "digest_null") != 0)
|
||||
return -EINVAL;
|
||||
break;
|
||||
|
||||
case XFRMA_ALG_CRYPT:
|
||||
if (!algp->alg_key_len &&
|
||||
strcmp(algp->alg_name, "cipher_null") != 0)
|
||||
return -EINVAL;
|
||||
break;
|
||||
|
||||
case XFRMA_ALG_COMP:
|
||||
/* Zero length keys are legal. */
|
||||
break;
|
||||
|
||||
default:
|
||||
|
|
Loading…
Reference in New Issue