diff options
author | Alex Klyubin <klyubin@google.com> | 2014-09-19 22:41:09 +0000 |
---|---|---|
committer | Gerrit Code Review <noreply-gerritcodereview@google.com> | 2014-09-19 22:41:09 +0000 |
commit | 6efa9351a257edc53ce07eb8c544ccf08efb64ae (patch) | |
tree | c5856d35da0040efd17c961cf8a911ca4c8ec5fa | |
parent | 2b2a0bec0cf350ae6239d7b2a31c5a328ddb2b32 (diff) | |
parent | 889c4f1e36f69c1d5a9a92a6ba40d8a729d3f7b0 (diff) | |
download | vold-l-preview.tar.gz |
Merge "Don't use deprecated OpenSSL functions."android-l-preview_r2l-preview
-rw-r--r-- | cryptfs.c | 10 |
1 files changed, 6 insertions, 4 deletions
@@ -903,7 +903,8 @@ static int encrypt_master_key(char *passwd, unsigned char *salt, scrypt(passwd, salt, ikey, crypt_ftr); /* Initialize the decryption engine */ - if (! EVP_EncryptInit(&e_ctx, EVP_aes_128_cbc(), ikey, ikey+KEY_LEN_BYTES)) { + EVP_CIPHER_CTX_init(&e_ctx); + if (! EVP_EncryptInit_ex(&e_ctx, EVP_aes_128_cbc(), NULL, ikey, ikey+KEY_LEN_BYTES)) { SLOGE("EVP_EncryptInit failed\n"); return -1; } @@ -915,7 +916,7 @@ static int encrypt_master_key(char *passwd, unsigned char *salt, SLOGE("EVP_EncryptUpdate failed\n"); return -1; } - if (! EVP_EncryptFinal(&e_ctx, encrypted_master_key + encrypted_len, &final_len)) { + if (! EVP_EncryptFinal_ex(&e_ctx, encrypted_master_key + encrypted_len, &final_len)) { SLOGE("EVP_EncryptFinal failed\n"); return -1; } @@ -941,7 +942,8 @@ static int decrypt_master_key_aux(char *passwd, unsigned char *salt, kdf(passwd, salt, ikey, kdf_params); /* Initialize the decryption engine */ - if (! EVP_DecryptInit(&d_ctx, EVP_aes_128_cbc(), ikey, ikey+KEY_LEN_BYTES)) { + EVP_CIPHER_CTX_init(&d_ctx); + if (! EVP_DecryptInit_ex(&d_ctx, EVP_aes_128_cbc(), NULL, ikey, ikey+KEY_LEN_BYTES)) { return -1; } EVP_CIPHER_CTX_set_padding(&d_ctx, 0); /* Turn off padding as our data is block aligned */ @@ -950,7 +952,7 @@ static int decrypt_master_key_aux(char *passwd, unsigned char *salt, encrypted_master_key, KEY_LEN_BYTES)) { return -1; } - if (! EVP_DecryptFinal(&d_ctx, decrypted_master_key + decrypted_len, &final_len)) { + if (! EVP_DecryptFinal_ex(&d_ctx, decrypted_master_key + decrypted_len, &final_len)) { return -1; } |