xfrm_user: Remove zero length key checks.
authorDavid S. Miller <davem@davemloft.net>
Thu, 22 May 2008 00:36:21 +0000 (17:36 -0700)
committerDavid S. Miller <davem@davemloft.net>
Thu, 22 May 2008 00:36:21 +0000 (17:36 -0700)
The crypto layer will determine whether that is valid
or not.

Suggested by Herbert Xu, based upon a report and patch
by Martin Willi.

Signed-off-by: David S. Miller <davem@davemloft.net>
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
net/xfrm/xfrm_user.c

index a1b0fbe3ea351f6e7e953078ffd90d29dd29e196..b976d9ed10e45a3a2e410a6b873f9128a18f6021 100644 (file)
@@ -50,19 +50,8 @@ static int verify_one_alg(struct nlattr **attrs, enum xfrm_attr_type_t type)
 
        switch (type) {
        case XFRMA_ALG_AUTH:
-               if (!algp->alg_key_len &&
-                   strcmp(algp->alg_name, "digest_null") != 0)
-                       return -EINVAL;
-               break;
-
        case XFRMA_ALG_CRYPT:
-               if (!algp->alg_key_len &&
-                   strcmp(algp->alg_name, "cipher_null") != 0)
-                       return -EINVAL;
-               break;
-
        case XFRMA_ALG_COMP:
-               /* Zero length keys are legal.  */
                break;
 
        default: