Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp1205729rdd; Wed, 10 Jan 2024 11:55:16 -0800 (PST) X-Google-Smtp-Source: AGHT+IGfDSA3mPWmZmQbKBxvNwey2VNaQzCHTrYQzIYIsLDz8mCn7AzAfrZxpM5eXUSrXak+fsli X-Received: by 2002:a05:620a:1a03:b0:783:2cf2:29b3 with SMTP id bk3-20020a05620a1a0300b007832cf229b3mr188788qkb.96.1704916516143; Wed, 10 Jan 2024 11:55:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704916516; cv=none; d=google.com; s=arc-20160816; b=usNs9MqIdHos19O2tyhRGIHpr/pIGNJVHCWQ2JQwHjSjSpiUNNjDeg2OndJGk+Ms1K Zk0aTn3uev67ajejbkkyLDJfRYS9HFsNjYABEZFvJgZMENlMxGsFcxmKlCH6TCvUmxLd Q2NHuVMRWA8VlyCXL98E5QFH6vdNdzS4T7brnPlNeWDv89rkHvJkZI28FrjhlWBKbCYb PsFotcXM30MFEvk/KKT+7ZmYk7oBHv2gd3Dv5zgAPCVgO4FPGDnb2dUZoitali2OpBva 8SUiCYN6laPdvGgi6Q19BJHpm5du6S4R6H79Obs9NMhGT/SYRjXFhJycWdwC8jjBd47B WLmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:references:cc:to:from:subject:message-id:date :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=G/7hgYXNJihtqEGK7wf7YlXvXrRVOT9oUMyOaFQcpCk=; fh=KvRwsysKdyUIxB2OsoNUj+ZBL9k0GEcUwZ85kQEu6rA=; b=SiPH6pf43fN18TP1ghoZgic7RAPvKHJY6KkPOeWnPVbbDdXLRtORPcDcsBzNZEp3OL ZgNt8tIQqNxWoWI88jMPhe+MmrSZjst5zzOyXBEwjfMtdgauLtoz6Zq7n24w2wDBd4rm lVkX7eA+ZmUn82QZ2lcAWvv67bQ4s82uWmnhhCSyr81rmLWw8Csaq0yaGJCpKwmEdC0g DHym5OtOgB9+g3a7wTzJk63+muy8zDrL994N9wmPlOMBvxFAc63smkv+1UGnH9tpnuUz I4XI8p/HgQWSaWYuMmzFZa/XjkFVqWNx0EqfHbsMqR6+E/+/tsgUCmljq3iKvLgCPeq3 QGQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=NngQGyCX; spf=pass (google.com: domain of linux-crypto+bounces-1336-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-1336-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id m3-20020a05620a24c300b00781575a8695si4991522qkn.667.2024.01.10.11.55.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 10 Jan 2024 11:55:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-1336-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=NngQGyCX; spf=pass (google.com: domain of linux-crypto+bounces-1336-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-1336-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 74D651C22713 for ; Wed, 10 Jan 2024 19:54:58 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 515074E1DC; Wed, 10 Jan 2024 19:54:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="NngQGyCX" X-Original-To: linux-crypto@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0C8134E1D2; Wed, 10 Jan 2024 19:54:27 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1016BC43390; Wed, 10 Jan 2024 19:54:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1704916467; bh=G/7hgYXNJihtqEGK7wf7YlXvXrRVOT9oUMyOaFQcpCk=; h=Date:Subject:From:To:Cc:References:In-Reply-To:From; b=NngQGyCX1jxlJKb0CtcVKw89DboFowUBRbga16rY/xFOUOQfyO5ngYWMXi1PTH9zL c0gHz89Ug8rvZrOqDUdhGS6oGvI8cqAzV4Cd5xFKKg70iaoKnVORlBGevOo320hY0I v3JWOjyqB2uh97VZsJ0VwfhrIuO5NWcfjlJKUt8ah0F0OXVOnwtlAX4FiSmRpOF2vh XTTNaWLHtJ+GuhHeG++EaZOYYzDsaVydM6ZCeuCTLJXsaLnRHkI13p8Ye+rcdU0e1S S1NrPOuzy3kIpjhj4YRGfv0OOn1AzJOmpw+KFp6SLeUZiKiGNWvVFQ/455x3h22O2w daV8wkd6Irt3Q== Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Wed, 10 Jan 2024 21:54:23 +0200 Message-Id: Subject: Re: [PATCH] KEYS: include header for EINVAL definition From: "Jarkko Sakkinen" To: "Clay Chang" , , , Cc: , , X-Mailer: aerc 0.15.2 References: <20240107132842.4024084-1-clayc@hpe.com> In-Reply-To: On Tue Jan 9, 2024 at 4:10 AM EET, Clay Chang wrote: > Hi Jarkko, > > The issue was found when crypto/public_key.h was included, but > CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE was not enabled. If > CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE was not enabled, the > public_key_verify_signature simply returned -EINVAL, which was not > declared without linux/errno.h being included. > > Thanks, > Clay Do you have .config to verify this? BR, Jarkko