Message ID | 20180323192358.95691-6-ebiggers3@gmail.com |
---|---|
State | Not Applicable, archived |
Headers | show
Return-Path: <linux-ext4-owner@vger.kernel.org> X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=linux-ext4-owner@vger.kernel.org; receiver=<UNKNOWN>) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="mCsfDTv2"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 407DDS5wKVz9s0w for <patchwork-incoming@ozlabs.org>; Sat, 24 Mar 2018 06:31:20 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752540AbeCWTbT (ORCPT <rfc822;patchwork-incoming@ozlabs.org>); Fri, 23 Mar 2018 15:31:19 -0400 Received: from mail-pf0-f193.google.com ([209.85.192.193]:44708 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752378AbeCWTbR (ORCPT <rfc822; linux-ext4@vger.kernel.org>); Fri, 23 Mar 2018 15:31:17 -0400 Received: by mail-pf0-f193.google.com with SMTP id m68so5105052pfm.11; Fri, 23 Mar 2018 12:31:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=Va95w6fmA9Co1/uxsgf3HdEVuaibFN6JiufFqrpPhyg=; b=mCsfDTv2BQr+iM2ySyRRJuFV+F7CmXUPwv+K5gQgkH1HjY0qFwJ/YEfa1it7sU+p5C vREvdUtFHb6s0O6xN4SCIaibM9/eoZXDaMfx429tRy5jaxIcksjcWy8IcMc8dsZMhTcX 20tbpk++H5j5azRgn7SBqHi3EjUNuZffS/QAkOFWlnWev4ek9bpeo6IiX0vOw1PBr1Uc ToHLsqD4+8C10GulCh3PBbnweMrGqOfrLiSYkNYErfUoknmWnjaV4CfPavYdAD9EmAjk 05NjG+ywq75K9jsU1LZGLvdFeKGxis34qL4o5g5WVxIbEwu1AisuNCgh17Z7XPGH3uHt pmjA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=Va95w6fmA9Co1/uxsgf3HdEVuaibFN6JiufFqrpPhyg=; b=jS6Xiik+BC3qfBdv+V21WKgSjvd3XyfMoQHOvRqMF5Ef8fkJMcCHoOKOf7cAoU3VWI g30RK7bfZDVyOWgCmg0+MdT34WCSatuZid30sTrvHMTBjGvgjdcpoCgkXTb96VdxaGn4 jLXofJsn/rgSiMOosC2vuOsuw43vlFdIDBT32lsmZIrpIf1U63Sv7MUfgg56lJ/JXuca MMJkgMIzQ89++66+Wzmxu3s+YSPpwsQAOpiOeAmqBg6nP18ITLDm/2RiZ9iM4PKxk8oO giufFaE1N+4SYCoOYoJI2uevurObF/flSrC/VBZduOxsBRhmA6ShAhMeexAdD6BBC4OS u+xw== X-Gm-Message-State: AElRT7HySY2umF4fbJlYeTxe0FFZG1eo8wRHO9ufrhD+r8Qb20UIwYcH d/Z68CBwtp4Y86t/An3R5w7VbP2h X-Google-Smtp-Source: AG47ELt43g59Jcp+ZSUu4lwIeHQbCDZjBJjI/v3vDQe4XHohE/W7Y0sspE2urwV67BScCECYQlWX+A== X-Received: by 10.101.92.138 with SMTP id a10mr21915660pgt.129.1521833476278; Fri, 23 Mar 2018 12:31:16 -0700 (PDT) Received: from ebiggers-linuxstation.kir.corp.google.com ([2620:15c:17:3:dc28:5c82:b905:e8a8]) by smtp.gmail.com with ESMTPSA id x1sm20924545pfk.144.2018.03.23.12.31.15 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 23 Mar 2018 12:31:15 -0700 (PDT) From: Eric Biggers <ebiggers3@gmail.com> To: linux-fscrypt@vger.kernel.org, "Theodore Y . Ts'o" <tytso@mit.edu> Cc: linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-mtd@lists.infradead.org, Jaegeuk Kim <jaegeuk@kernel.org>, Eric Biggers <ebiggers@google.com> Subject: [PATCH 05/14] fscrypt: don't clear flags on crypto transform Date: Fri, 23 Mar 2018 12:23:49 -0700 Message-Id: <20180323192358.95691-6-ebiggers3@gmail.com> X-Mailer: git-send-email 2.17.0.rc0.231.g781580f067-goog In-Reply-To: <20180323192358.95691-1-ebiggers3@gmail.com> References: <20180323192358.95691-1-ebiggers3@gmail.com> Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: <linux-ext4.vger.kernel.org> X-Mailing-List: linux-ext4@vger.kernel.org |
Series |
fscrypt: improved logging and other cleanups
|
expand
|
diff --git a/fs/crypto/keyinfo.c b/fs/crypto/keyinfo.c index 8099388f5581..1435a1c81010 100644 --- a/fs/crypto/keyinfo.c +++ b/fs/crypto/keyinfo.c @@ -327,7 +327,6 @@ int fscrypt_get_encryption_info(struct inode *inode) goto out; } crypt_info->ci_ctfm = ctfm; - crypto_skcipher_clear_flags(ctfm, ~0); crypto_skcipher_set_flags(ctfm, CRYPTO_TFM_REQ_WEAK_KEY); /* * if the provided key is longer than keysize, we use the first