|
@@ -89,12 +89,6 @@ static int validate_user_key(struct fscrypt_info *crypt_info,
|
|
return PTR_ERR(keyring_key);
|
|
return PTR_ERR(keyring_key);
|
|
down_read(&keyring_key->sem);
|
|
down_read(&keyring_key->sem);
|
|
|
|
|
|
- if (keyring_key->type != &key_type_logon) {
|
|
|
|
- printk_once(KERN_WARNING
|
|
|
|
- "%s: key type must be logon\n", __func__);
|
|
|
|
- res = -ENOKEY;
|
|
|
|
- goto out;
|
|
|
|
- }
|
|
|
|
ukp = user_key_payload_locked(keyring_key);
|
|
ukp = user_key_payload_locked(keyring_key);
|
|
if (!ukp) {
|
|
if (!ukp) {
|
|
/* key was revoked before we acquired its semaphore */
|
|
/* key was revoked before we acquired its semaphore */
|