Bug 501275

Summary: Select key bytes: item "default" is bogus
Product: Red Hat Enterprise Linux 5 Reporter: Michal Nowak <mnowak>
Component: ecryptfs-utilsAssignee: Michal Hlavinka <mhlavink>
Status: CLOSED ERRATA QA Contact: BaseOS QE <qe-baseos-auto>
Severity: low Docs Contact:
Priority: low    
Version: 5.4CC: ohudlick, rvokal
Target Milestone: rcKeywords: Regression
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-09-02 09:57:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
sent upstream none

Description Michal Nowak 2009-05-18 10:48:33 UTC
Description of problem:

Old:

[root@hp-ml370g4-01 trueopenssl-keyfile]# /sbin/mount.ecryptfs secret/ secret/ -o "key=openssl:openssl_keyfile=/root/.ecryptfs/pki/openssl/mykey-trueopenssl.pem:openssl_passwd_file=passfile.txt,ecryptfs_cipher=aes"
Select key bytes: 
 1) 16
 2) 32
 3) 24
Selection [16]: 


New:

[root@hp-ml370g4-01 trueopenssl-keyfile]# /sbin/mount.ecryptfs secret/ secret/ -o "key=openssl:openssl_keyfile=/root/.ecryptfs/pki/openssl/mykey-trueopenssl.pem:openssl_passwd_file=passfile.txt,ecryptfs_cipher=aes"
Select key bytes: 
 1) default
 2) 16
Selection [16]: 


It's correct not to show items [ 24, 32 ], but the "default" is somewhat bogus here.

Version-Release number of selected component (if applicable):

ecryptfs-utils-75-2.el5

How reproducible:

always

Comment 1 Michal Hlavinka 2009-05-18 12:13:06 UTC
Created attachment 344423 [details]
sent upstream

Comment 7 errata-xmlrpc 2009-09-02 09:57:50 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2009-1307.html