This avoids special casing the cipher none/auth none case in other
parts, e.g. in the upcoming buffer/frame rework.
Signed-off-by: Arne Schwabe <arne@rfc2549.org>
Acked-by: Gert Doering <gert@greenie.muc.de>
Message-Id: <
20211201180727.
2496903-9-arne@rfc2549.org>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg23272.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
* No encryption or authentication.
*/
static void
-do_init_crypto_none(const struct context *c)
+do_init_crypto_none(struct context *c)
{
ASSERT(!c->options.test_crypto);
+
+ /* Initialise key_type with auth/cipher "none", so the key_type struct is
+ * valid */
+ init_key_type(&c->c1.ks.key_type, "none", "none",
+ c->options.test_crypto, true);
+
msg(M_WARN,
"******* WARNING *******: All encryption and authentication features "
"disabled -- All data will be tunnelled as clear text and will not be "