Received: by 2002:ab2:6203:0:b0:1f5:f2ab:c469 with SMTP id o3csp2549050lqt; Mon, 22 Apr 2024 14:09:21 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXXjHQflAg2xpkx49lEI7DCBEFqaN8QWBD3Wxy/KyTzoHPZQ/bfHxwgYXjL4O+NSjXu9IAPNBwcR20FQ5BN3OhD6YEOjwpX0vFnA+l++g== X-Google-Smtp-Source: AGHT+IEZL7nq/Fv2NvLps6CNnghysDjiI0uT+i7Vxwnu3xBwBnvS6UouPWKVO0RVk80xOuPCHFxd X-Received: by 2002:a05:6a21:920e:b0:1ac:49e3:938c with SMTP id tl14-20020a056a21920e00b001ac49e3938cmr13021832pzb.13.1713820161496; Mon, 22 Apr 2024 14:09:21 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713820161; cv=pass; d=google.com; s=arc-20160816; b=bRSgpTsHVbcEfQ+8DmwyNPh/nB3R1vLX8OqLSFnrFqBBAvpLJwWIvrh5qxsEOL9PuB 8nkhfWZBlz/VXix+UBgROSHzh7fB+60ixkoLaJBb9wY7pCJWwlsDYY9x8v7sZRefbCZN gf/PXvWIFy1oDaDuCiVHnFqlMYiHQKGzXqHIHAzn752Kqxp4Y03r0N3KBomZIB8Us8Dr EWq4SbT64n10kJ3QdmJnvs41s6tfkF1RXzhNWknv9InN8Y4hAVZjAdR3ENo6bh6Tv5Gx kKzxzeufuVYCOFcrAMyzM5EgQjURdTahI8E6EoGCyrpDFnXAmrH8FABiwKQtypB1t0dl llfw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=VaWLuZrwExIfO2qn7Nnl1wvAAtZnJjnY318DGBuUxHs=; fh=GxGorxzzm7Qf52bhZMIFyD2ykWY+7eG3GmRq3QaSnTI=; b=F7sbk8kPCc52UfQiSC86LT4dMvOiw1QIMf3OWSpO4zAv6yKwXXKQxpe8LJJrjReBKa c/zmwhbSCn0WrX7nADEnqQj6dvJO0TBSqeEqYryLf6YUdCEs78d0yYNg3YVZIVRBOioD WoeNS/qyRBJKZ/zCVfyb+uS6S/Q8/ouWUtMTcg5Z/eHsdLS5a0QLd5VO2zxehGv++x1p 5auCzmM/4stPWZd5gGPhG1FNXBUfDJYSuCbUCA9RLMW+sRv6DPx1OqFElgCnQn8VrR11 tdi5oBIKEdumrmbsrtFz7r01Iuhp1M6HlHAr+BOvDObAAQ/ThQglaYZd8Q9hncnh/GB8 osHw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bb2nR47d; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-crypto+bounces-3773-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-crypto+bounces-3773-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id q13-20020a63e94d000000b005d7a13d0be6si8201042pgj.232.2024.04.22.14.09.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 22 Apr 2024 14:09:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto+bounces-3773-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bb2nR47d; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-crypto+bounces-3773-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-crypto+bounces-3773-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 36249283304 for ; Mon, 22 Apr 2024 21:09:20 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 399431C6A0; Mon, 22 Apr 2024 21:09:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="bb2nR47d" X-Original-To: linux-crypto@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E4E521C286; Mon, 22 Apr 2024 21:09:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713820159; cv=none; b=kZ/dp9ZK48e5yEphP9AsGtNiUAiEww1S6T89puhqUxudM4Wz/bQIpuIWzpMCH8/eC8avUTuO2yCKtGeYkcTheV8zoLUer2nToRfgw1kN5f4V98ZLjL2pYnLhcm1UOLVIsGQOzHl3aaXUkaGgpgey6O5hDlVAGGN5Z9vbjLm6ozM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713820159; c=relaxed/simple; bh=EZ/4suVJKVlwC7dAC9OkDw5dwBWhF1JTgJot7xAMDGw=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=HsWWosKufpOQqtxGpOMquyhFdhAi5BdWF1kkARl2G9YtGPoolX88tvB9XAyTHy79hgljY+WggL/j+RuIa6hzCVwiT8lAQq+DUjhS3kF4VmzsNFUHPHwnKKo/D1PKmEGgjzXJDs+B2482g+IEv4kPjH9LubGlrVCM//gqS1DQ2WU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=bb2nR47d; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 63A7BC113CC; Mon, 22 Apr 2024 21:09:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1713820158; bh=EZ/4suVJKVlwC7dAC9OkDw5dwBWhF1JTgJot7xAMDGw=; h=From:To:Cc:Subject:Date:From; b=bb2nR47d3zVmLp2Hd6zkL9rJi06DjrFGC0d5wW3I+YsaHf1Nh+yHIg+r+4nFkoqpr 2nTmGn/dyhjhnRBHKO2xnWqIi2GSX8JOSErtJtQhqpRTjgFNExWzivu1nZqpMHpP+e OR0isIqXkBxPDPC0EndceaLlQs2O2ItoXFd7r/VejgEttA8QxqPciftk4NBpQE2Mts UUtK2Zp+Z+Kjheom2hAILcgoPjsKu7H0TOIbKM1gsrRxTPOtrvJYfrA6t6TBlaoIIG 2nAWQPis5Z53d5x1Kv/GkLYBaUkCkQWI5qy6npKuiGV3os/l0lfnw10Sag3o9pjqVV lOAOzH5L89/oA== From: Eric Biggers To: keyrings@vger.kernel.org, linux-crypto@vger.kernel.org Cc: stable@vger.kernel.org Subject: [PATCH] KEYS: asymmetric: Add missing dependency on CRYPTO_SIG Date: Mon, 22 Apr 2024 14:08:45 -0700 Message-ID: <20240422210845.319819-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.44.0 Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Eric Biggers Make ASYMMETRIC_PUBLIC_KEY_SUBTYPE select CRYPTO_SIG to avoid build errors like the following, which were possible with CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE=y && CONFIG_CRYPTO_SIG=n: ld: vmlinux.o: in function `public_key_verify_signature': (.text+0x306280): undefined reference to `crypto_alloc_sig' ld: (.text+0x306300): undefined reference to `crypto_sig_set_pubkey' ld: (.text+0x306324): undefined reference to `crypto_sig_verify' ld: (.text+0x30636c): undefined reference to `crypto_sig_set_privkey' Fixes: 63ba4d67594a ("KEYS: asymmetric: Use new crypto interface without scatterlists") Cc: stable@vger.kernel.org Signed-off-by: Eric Biggers --- crypto/asymmetric_keys/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/crypto/asymmetric_keys/Kconfig b/crypto/asymmetric_keys/Kconfig index 59ec726b7c77..3f089abd6fc9 100644 --- a/crypto/asymmetric_keys/Kconfig +++ b/crypto/asymmetric_keys/Kconfig @@ -13,10 +13,11 @@ if ASYMMETRIC_KEY_TYPE config ASYMMETRIC_PUBLIC_KEY_SUBTYPE tristate "Asymmetric public-key crypto algorithm subtype" select MPILIB select CRYPTO_HASH_INFO select CRYPTO_AKCIPHER + select CRYPTO_SIG select CRYPTO_HASH help This option provides support for asymmetric public key type handling. If signature generation and/or verification are to be used, appropriate hash algorithms (such as SHA-1) must be available. base-commit: ed30a4a51bb196781c8058073ea720133a65596f -- 2.44.0