summaryrefslogtreecommitdiff
path: root/drivers/net/phy/mscc/mscc_macsec.h
diff options
context:
space:
mode:
authorAntoine Tenart <atenart@kernel.org>2022-11-15 16:44:51 +0100
committerDavid S. Miller <davem@davemloft.net>2022-11-18 09:17:42 +0000
commit0dc33c65835d456e42de509ba17563caa6a9d4c1 (patch)
treec22fa7e8a1483a7616e66811203338e10dc21aa3 /drivers/net/phy/mscc/mscc_macsec.h
parenta452d30f3f17e59a585beafd015ca826a609f549 (diff)
downloadlinux-0dc33c65835d456e42de509ba17563caa6a9d4c1.tar.gz
linux-0dc33c65835d456e42de509ba17563caa6a9d4c1.tar.bz2
linux-0dc33c65835d456e42de509ba17563caa6a9d4c1.zip
net: phy: mscc: macsec: do not copy encryption keys
Following 1b16b3fdf675 ("net: phy: mscc: macsec: clear encryption keys when freeing a flow"), go one step further and instead of calling memzero_explicit on the key when freeing a flow, simply not copy the key in the first place as it's only used when a new flow is set up. Signed-off-by: Antoine Tenart <atenart@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/net/phy/mscc/mscc_macsec.h')
-rw-r--r--drivers/net/phy/mscc/mscc_macsec.h2
1 files changed, 0 insertions, 2 deletions
diff --git a/drivers/net/phy/mscc/mscc_macsec.h b/drivers/net/phy/mscc/mscc_macsec.h
index 453304bae778..21ce3b892f7f 100644
--- a/drivers/net/phy/mscc/mscc_macsec.h
+++ b/drivers/net/phy/mscc/mscc_macsec.h
@@ -81,8 +81,6 @@ struct macsec_flow {
/* Highest takes precedence [0..15] */
u8 priority;
- u8 key[MACSEC_MAX_KEY_LEN];
-
union {
struct macsec_rx_sa *rx_sa;
struct macsec_tx_sa *tx_sa;