From mboxrd@z Thu Jan 1 00:00:00 1970 From: Mike Halcrow Subject: [PATCH 8/12] Check for weak keys Date: Tue, 20 Jun 2006 16:23:59 -0500 Message-ID: References: <20060620212134.GB18701@us.ibm.com> Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Mike Halcrow , Mike Halcrow Return-path: In-reply-to: <20060620212134.GB18701@us.ibm.com> To: Andrew Morton Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org Check for weak keys. Signed-off-by: Michael Halcrow --- fs/ecryptfs/crypto.c | 3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) 54bfaad87b42a4bfe9bb0890eebc3a69d877d03e diff --git a/fs/ecryptfs/crypto.c b/fs/ecryptfs/crypto.c index 966426d..5292220 100644 --- a/fs/ecryptfs/crypto.c +++ b/fs/ecryptfs/crypto.c @@ -739,7 +739,8 @@ int ecryptfs_init_crypt_ctx(struct ecryp goto out; } crypt_stat->tfm = crypto_alloc_tfm(crypt_stat->cipher, - ECRYPTFS_DEFAULT_CHAINING_MODE); + ECRYPTFS_DEFAULT_CHAINING_MODE + | CRYPTO_TFM_REQ_WEAK_KEY); if (crypt_stat->tfm == NULL) { ecryptfs_printk(KERN_ERR, "cryptfs: init_crypt_ctx(): Error " "initializing cipher [%s]\n", -- 1.3.3