return -EINVAL;
}
- /* Safety check if anything went wrong */
- if (ms < 10)
- return -EINVAL;
-
if (iter_secs)
*iter_secs = (iterations * 1000) / ms;
return r;
r = LUKS_open_key_with_hdr(keyslot_old, passphrase, passphrase_size,
&cd->u.luks1.hdr, &vk, cd);
if (r < 0)
- return r;
+ goto out;
if (keyslot_old != CRYPT_ANY_SLOT && keyslot_old != r) {
log_dbg("Keyslot mismatch.");
struct crypt_params_tcrypt *params)
{
unsigned char pwd[TCRYPT_KEY_POOL_LEN] = {};
- size_t passphrase_size;
+ size_t passphrase_size, alignment;
char *key;
unsigned int i, skipped = 0;
int r = -EINVAL, legacy_modes;
- if (posix_memalign((void*)&key, crypt_getpagesize(), TCRYPT_HDR_KEY_LEN))
+ alignment = crypt_getpagesize();
+ if (alignment < 0)
+ return -EINVAL;
+
+ if (posix_memalign((void*)&key, alignment, TCRYPT_HDR_KEY_LEN))
return -ENOMEM;
if (params->keyfiles_count)
{
long ms_enc, ms_dec, ms;
int repeat_enc, repeat_dec;
+ size_t alignment;
void *buf = NULL;
- if (posix_memalign(&buf, crypt_getpagesize(), cp->buffer_size))
+ alignment = crypt_getpagesize();
+ if (alignment < 0)
+ return -EINVAL;
+
+ if (posix_memalign(&buf, alignment, cp->buffer_size))
return -ENOMEM;
ms_enc = 0;
&enc_mbr, &dec_mbr);
if (!r) {
log_std("# Algorithm | Key | Encryption | Decryption\n");
- strncat(cipher, "-", MAX_CIPHER_LEN);
- strncat(cipher, cipher_mode, MAX_CIPHER_LEN);
- log_std("%12s %4db %5.1f MiB/s %5.1f MiB/s\n",
- cipher, key_size, enc_mbr, dec_mbr);
+ log_std("%8s-%s %4db %5.1f MiB/s %5.1f MiB/s\n",
+ cipher, cipher_mode, key_size, enc_mbr, dec_mbr);
} else if (r == -ENOENT)
log_err(_("Cipher %s is not available.\n"), opt_cipher);
} else {