diff options
| author | Antoine Tenart <atenart@kernel.org> | 2022-11-15 16:44:51 +0100 |
|---|---|---|
| committer | David S. Miller <davem@davemloft.net> | 2022-11-18 09:17:42 +0000 |
| commit | 0dc33c65835d456e42de509ba17563caa6a9d4c1 (patch) | |
| tree | c22fa7e8a1483a7616e66811203338e10dc21aa3 /drivers/net/phy/mscc/mscc_macsec.h | |
| parent | a452d30f3f17e59a585beafd015ca826a609f549 (diff) | |
| download | linux-0dc33c65835d456e42de509ba17563caa6a9d4c1.tar.gz linux-0dc33c65835d456e42de509ba17563caa6a9d4c1.tar.bz2 linux-0dc33c65835d456e42de509ba17563caa6a9d4c1.zip | |
net: phy: mscc: macsec: do not copy encryption keys
Following 1b16b3fdf675 ("net: phy: mscc: macsec: clear encryption keys when freeing a flow"),
go one step further and instead of calling memzero_explicit on the key
when freeing a flow, simply not copy the key in the first place as it's
only used when a new flow is set up.
Signed-off-by: Antoine Tenart <atenart@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/net/phy/mscc/mscc_macsec.h')
| -rw-r--r-- | drivers/net/phy/mscc/mscc_macsec.h | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/drivers/net/phy/mscc/mscc_macsec.h b/drivers/net/phy/mscc/mscc_macsec.h index 453304bae778..21ce3b892f7f 100644 --- a/drivers/net/phy/mscc/mscc_macsec.h +++ b/drivers/net/phy/mscc/mscc_macsec.h @@ -81,8 +81,6 @@ struct macsec_flow { /* Highest takes precedence [0..15] */ u8 priority; - u8 key[MACSEC_MAX_KEY_LEN]; - union { struct macsec_rx_sa *rx_sa; struct macsec_tx_sa *tx_sa; |
