We need to check for AES being in 128-cbc mode and not 256-cbc. fscrypt supports only 128-cbc and 256-xts so far. Signed-off-by: Richard Weinberger <richard@xxxxxx> --- ubifs-utils/mkfs.ubifs/crypto.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ubifs-utils/mkfs.ubifs/crypto.c b/ubifs-utils/mkfs.ubifs/crypto.c index 9c6073ec00f9..cd68e372601f 100644 --- a/ubifs-utils/mkfs.ubifs/crypto.c +++ b/ubifs-utils/mkfs.ubifs/crypto.c @@ -152,7 +152,7 @@ static ssize_t encrypt_block(const void *plaintext, size_t size, iv.index = cpu_to_le64(block_index); memset(iv.padding, 0, sizeof(iv.padding)); - if (cipher == EVP_aes_256_cbc()) { + if (cipher == EVP_aes_128_cbc()) { tweak = alloca(ivsize); gen_essiv_salt(&iv, FS_IV_SIZE, key, key_len, tweak); } else { -- 2.19.1 ______________________________________________________ Linux MTD discussion mailing list http://lists.infradead.org/mailman/listinfo/linux-mtd/