Richard Weinberger
2018-11-07 20:21:07 UTC
We need to check for AES being in 128-cbc mode and not 256-cbc.
fscrypt supports only 128-cbc and 256-xts so far.
Signed-off-by: Richard Weinberger <***@nod.at>
---
ubifs-utils/mkfs.ubifs/crypto.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ubifs-utils/mkfs.ubifs/crypto.c b/ubifs-utils/mkfs.ubifs/crypto.c
index 9c6073ec00f9..cd68e372601f 100644
--- a/ubifs-utils/mkfs.ubifs/crypto.c
+++ b/ubifs-utils/mkfs.ubifs/crypto.c
@@ -152,7 +152,7 @@ static ssize_t encrypt_block(const void *plaintext, size_t size,
iv.index = cpu_to_le64(block_index);
memset(iv.padding, 0, sizeof(iv.padding));
- if (cipher == EVP_aes_256_cbc()) {
+ if (cipher == EVP_aes_128_cbc()) {
tweak = alloca(ivsize);
gen_essiv_salt(&iv, FS_IV_SIZE, key, key_len, tweak);
} else {
fscrypt supports only 128-cbc and 256-xts so far.
Signed-off-by: Richard Weinberger <***@nod.at>
---
ubifs-utils/mkfs.ubifs/crypto.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ubifs-utils/mkfs.ubifs/crypto.c b/ubifs-utils/mkfs.ubifs/crypto.c
index 9c6073ec00f9..cd68e372601f 100644
--- a/ubifs-utils/mkfs.ubifs/crypto.c
+++ b/ubifs-utils/mkfs.ubifs/crypto.c
@@ -152,7 +152,7 @@ static ssize_t encrypt_block(const void *plaintext, size_t size,
iv.index = cpu_to_le64(block_index);
memset(iv.padding, 0, sizeof(iv.padding));
- if (cipher == EVP_aes_256_cbc()) {
+ if (cipher == EVP_aes_128_cbc()) {
tweak = alloca(ivsize);
gen_essiv_salt(&iv, FS_IV_SIZE, key, key_len, tweak);
} else {
--
2.19.1
2.19.1