From b8fa5686097337ffb289ecfc00b2558ee54de74e Mon Sep 17 00:00:00 2001 From: Dimitri Staessens Date: Sat, 2 May 2026 15:38:00 +0200 Subject: irmd, lib: Minor cleanup in oap/srv and irm.proto Signed-off-by: Dimitri Staessens Signed-off-by: Sander Vrijders --- src/irmd/oap/srv.c | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) (limited to 'src/irmd') diff --git a/src/irmd/oap/srv.c b/src/irmd/oap/srv.c index ce97654f..587a8f9f 100644 --- a/src/irmd/oap/srv.c +++ b/src/irmd/oap/srv.c @@ -180,11 +180,7 @@ static int negotiate_cipher(const struct oap_hdr * peer_hdr, cli_rank = crypt_kdf_rank(peer_hdr->kdf_nid); srv_rank = crypt_kdf_rank(kcfg->k.nid); - /* - * For client-encap KEM, the KDF is baked into - * the ciphertext. The server must use the client's - * KDF and can only verify the minimum. - */ + /* Client-encap KEM bakes KDF into ciphertext; verify min. */ if (OAP_KEX_ROLE(peer_hdr) == KEM_MODE_CLIENT_ENCAP) { if (srv_rank > cli_rank) { log_err_id(id, "Client KDF too weak."); @@ -388,7 +384,7 @@ int oap_srv_process(const struct name_info * info, uint8_t hash_buf[MAX_HASH_SIZE]; buffer_t req_hash = BUF_INIT; ssize_t hash_ret; - char cli_name[NAME_SIZE + 1]; /* TODO */ + char cli_name[NAME_SIZE + 1]; uint8_t * id; void * pkp = NULL; void * crt = NULL; -- cgit v1.2.3