diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2008-04-27 03:59:59 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2008-04-27 17:26:52 -0400 |
commit | 01a2202c95989a4df48e9a5b5e013cb80c6b2d66 (patch) | |
tree | 8eb1bd6cc4f99fc9fc3def2cc81ab256fe40e206 | |
parent | 0b80ae4201e5128e16e5161825f5cd377a5d1fee (diff) |
[IPSEC]: Use digest_null directly for auth
Previously digest_null had no setkey function which meant that
we used hmac(digest_null) for IPsec since IPsec always calls
setkey. Now that digest_null has a setkey we no longer need to
do that.
In fact when only confidentiality is specified for ESP we already
use digest_null directly. However, when the null algorithm is
explicitly specified by the user we still opt for hmac(digest_null).
This patch removes this discrepancy. I have not added a new compat
name for it because by chance it wasn't actualy possible for the user
to specify the name hmac(digest_null) due to a key length check in
xfrm_user (which I found out when testing that compat name :)
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/xfrm/xfrm_algo.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/net/xfrm/xfrm_algo.c b/net/xfrm/xfrm_algo.c index 8aa6440d689f..ac765dd9c7f5 100644 --- a/net/xfrm/xfrm_algo.c +++ b/net/xfrm/xfrm_algo.c | |||
@@ -129,8 +129,7 @@ static struct xfrm_algo_desc aead_list[] = { | |||
129 | 129 | ||
130 | static struct xfrm_algo_desc aalg_list[] = { | 130 | static struct xfrm_algo_desc aalg_list[] = { |
131 | { | 131 | { |
132 | .name = "hmac(digest_null)", | 132 | .name = "digest_null", |
133 | .compat = "digest_null", | ||
134 | 133 | ||
135 | .uinfo = { | 134 | .uinfo = { |
136 | .auth = { | 135 | .auth = { |