|
@@ -42,7 +42,6 @@
|
|
|
|
|
|
struct aead_tfm {
|
|
|
struct crypto_aead *aead;
|
|
|
- bool has_key;
|
|
|
struct crypto_skcipher *null_tfm;
|
|
|
};
|
|
|
|
|
@@ -398,7 +397,7 @@ static int aead_check_key(struct socket *sock)
|
|
|
|
|
|
err = -ENOKEY;
|
|
|
lock_sock_nested(psk, SINGLE_DEPTH_NESTING);
|
|
|
- if (!tfm->has_key)
|
|
|
+ if (crypto_aead_get_flags(tfm->aead) & CRYPTO_TFM_NEED_KEY)
|
|
|
goto unlock;
|
|
|
|
|
|
if (!pask->refcnt++)
|
|
@@ -523,12 +522,8 @@ static int aead_setauthsize(void *private, unsigned int authsize)
|
|
|
static int aead_setkey(void *private, const u8 *key, unsigned int keylen)
|
|
|
{
|
|
|
struct aead_tfm *tfm = private;
|
|
|
- int err;
|
|
|
-
|
|
|
- err = crypto_aead_setkey(tfm->aead, key, keylen);
|
|
|
- tfm->has_key = !err;
|
|
|
|
|
|
- return err;
|
|
|
+ return crypto_aead_setkey(tfm->aead, key, keylen);
|
|
|
}
|
|
|
|
|
|
static void aead_sock_destruct(struct sock *sk)
|
|
@@ -589,7 +584,7 @@ static int aead_accept_parent(void *private, struct sock *sk)
|
|
|
{
|
|
|
struct aead_tfm *tfm = private;
|
|
|
|
|
|
- if (!tfm->has_key)
|
|
|
+ if (crypto_aead_get_flags(tfm->aead) & CRYPTO_TFM_NEED_KEY)
|
|
|
return -ENOKEY;
|
|
|
|
|
|
return aead_accept_parent_nokey(private, sk);
|