|
@@ -799,7 +799,7 @@ int ecryptfs_init_crypt_ctx(struct ecryptfs_crypt_stat *crypt_stat)
|
|
rc = ecryptfs_crypto_api_algify_cipher_name(&full_alg_name,
|
|
rc = ecryptfs_crypto_api_algify_cipher_name(&full_alg_name,
|
|
crypt_stat->cipher, "cbc");
|
|
crypt_stat->cipher, "cbc");
|
|
if (rc)
|
|
if (rc)
|
|
- goto out;
|
|
|
|
|
|
+ goto out_unlock;
|
|
crypt_stat->tfm = crypto_alloc_blkcipher(full_alg_name, 0,
|
|
crypt_stat->tfm = crypto_alloc_blkcipher(full_alg_name, 0,
|
|
CRYPTO_ALG_ASYNC);
|
|
CRYPTO_ALG_ASYNC);
|
|
kfree(full_alg_name);
|
|
kfree(full_alg_name);
|
|
@@ -808,12 +808,12 @@ int ecryptfs_init_crypt_ctx(struct ecryptfs_crypt_stat *crypt_stat)
|
|
ecryptfs_printk(KERN_ERR, "cryptfs: init_crypt_ctx(): "
|
|
ecryptfs_printk(KERN_ERR, "cryptfs: init_crypt_ctx(): "
|
|
"Error initializing cipher [%s]\n",
|
|
"Error initializing cipher [%s]\n",
|
|
crypt_stat->cipher);
|
|
crypt_stat->cipher);
|
|
- mutex_unlock(&crypt_stat->cs_tfm_mutex);
|
|
|
|
- goto out;
|
|
|
|
|
|
+ goto out_unlock;
|
|
}
|
|
}
|
|
crypto_blkcipher_set_flags(crypt_stat->tfm, CRYPTO_TFM_REQ_WEAK_KEY);
|
|
crypto_blkcipher_set_flags(crypt_stat->tfm, CRYPTO_TFM_REQ_WEAK_KEY);
|
|
- mutex_unlock(&crypt_stat->cs_tfm_mutex);
|
|
|
|
rc = 0;
|
|
rc = 0;
|
|
|
|
+out_unlock:
|
|
|
|
+ mutex_unlock(&crypt_stat->cs_tfm_mutex);
|
|
out:
|
|
out:
|
|
return rc;
|
|
return rc;
|
|
}
|
|
}
|