aboutsummaryrefslogtreecommitdiffstats
path: root/net/compat.c
diff options
context:
space:
mode:
authorHerbert Xu <herbert@gondor.apana.org.au>2008-04-27 00:59:59 -0700
committerDavid S. Miller <davem@davemloft.net>2008-04-27 14:26:52 -0700
commit01a2202c95989a4df48e9a5b5e013cb80c6b2d66 (patch)
tree8eb1bd6cc4f99fc9fc3def2cc81ab256fe40e206 /net/compat.c
parent0b80ae4201e5128e16e5161825f5cd377a5d1fee (diff)
downloadkernel_samsung_smdk4412-01a2202c95989a4df48e9a5b5e013cb80c6b2d66.zip
kernel_samsung_smdk4412-01a2202c95989a4df48e9a5b5e013cb80c6b2d66.tar.gz
kernel_samsung_smdk4412-01a2202c95989a4df48e9a5b5e013cb80c6b2d66.tar.bz2
[IPSEC]: Use digest_null directly for auth
Previously digest_null had no setkey function which meant that we used hmac(digest_null) for IPsec since IPsec always calls setkey. Now that digest_null has a setkey we no longer need to do that. In fact when only confidentiality is specified for ESP we already use digest_null directly. However, when the null algorithm is explicitly specified by the user we still opt for hmac(digest_null). This patch removes this discrepancy. I have not added a new compat name for it because by chance it wasn't actualy possible for the user to specify the name hmac(digest_null) due to a key length check in xfrm_user (which I found out when testing that compat name :) Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/compat.c')
0 files changed, 0 insertions, 0 deletions