Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758940AbcCDP1S (ORCPT ); Fri, 4 Mar 2016 10:27:18 -0500 Received: from mx-rz-1.rrze.uni-erlangen.de ([131.188.11.20]:34631 "EHLO mx-rz-1.rrze.uni-erlangen.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757605AbcCDP1M (ORCPT ); Fri, 4 Mar 2016 10:27:12 -0500 X-Greylist: delayed 591 seconds by postgrey-1.27 at vger.kernel.org; Fri, 04 Mar 2016 10:27:11 EST X-RRZE-Submit-IP: 2001:638:a000:4142::ff10:d304 From: Andreas Ziegler Subject: Left-over select to PUBLIC_KEY_ALGO_RSA X-Enigmail-Draft-Status: N1110 To: David Howells Cc: Tadeusz Struk , Herbert Xu , Valentin Rothberg , "linux-kernel@vger.kernel.org" , linux-crypto@vger.kernel.org, linux-security-module@vger.kernel.org Message-ID: <56D9A6FC.7000307@fau.de> Date: Fri, 4 Mar 2016 16:17:16 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 672 Lines: 20 Hi David, your patch "akcipher: Move the RSA DER encoding check to the crypto layer" showed up in linux-next today as commit d43de6c780a8 (that is, next-20160304). It removes the CONFIG_PUBLIC_KEY_ALGO_RSA option, but does leave one reference to it in place inside security/integrity/Kconfig, in the definition of CONFIG_INTEGRITY_ASYMMETRIC_KEYS. As the corresponding option is gone, the select statement can safely be removed. Should I prepare a simple patch for that? I detected this by using scripts/checkkconfigsymbols on today's and yesterday's linux-next trees (i.e., "./scripts/checkkconfigsymbols.py -d next-20160303..next-20160304"). Best regards, Andreas