From patchwork Wed May 18 14:12:44 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 102336 Delivered-To: patch@linaro.org Received: by 10.140.92.199 with SMTP id b65csp2660700qge; Wed, 18 May 2016 07:13:35 -0700 (PDT) X-Received: by 10.66.250.132 with SMTP id zc4mr11544998pac.130.1463580815538; Wed, 18 May 2016 07:13:35 -0700 (PDT) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b12si12361111pal.199.2016.05.18.07.13.35 for ; Wed, 18 May 2016 07:13:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932215AbcERONe (ORCPT ); Wed, 18 May 2016 10:13:34 -0400 Received: from mout.kundenserver.de ([212.227.126.135]:50738 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932107AbcERONd (ORCPT ); Wed, 18 May 2016 10:13:33 -0400 Received: from wuerfel.lan. ([78.42.132.4]) by mrelayeu.kundenserver.de (mreue004) with ESMTPA (Nemesis) id 0LsdeH-1bj8Na0bUH-012LBv; Wed, 18 May 2016 16:13:11 +0200 From: Arnd Bergmann To: David Howells , Herbert Xu , "David S. Miller" Cc: Arnd Bergmann , Tadeusz Struk , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] crypto: public_key: select CRYPTO_AKCIPHER2 Date: Wed, 18 May 2016 16:12:44 +0200 Message-Id: <1463580776-930850-1-git-send-email-arnd@arndb.de> X-Mailer: git-send-email 2.7.0 X-Provags-ID: V03:K0:FOnjKtNJRHueV1K3C7rwlDe8TVp1VVnbx4QV+lrHFN6Rx+Ye7MZ lzkrsfmCibscjPOj0ANHb200b0nhHFpWtv0F4piv7INCSh0qnisfxlqsudAdcil2/lwmRDw hLtnFexRzmd/DZ1uLqTnG/6Q2vYpS+KyWgTp+ayXa/gnUYgB/1yS1pePaOubwnBpWXgxtET /Ne4rEX32NHylzxT8iWoA== X-UI-Out-Filterresults: notjunk:1; V01:K0:kQUYcxkEIyQ=:/k1ATrDrUoYuBJmtD2MERK QZSSEdyxyGUkftdZ+h+aKQ+L+AacdfZhsnkzB0mzoHX+K2SLLmTdcI8Owrv3eRrwhQbNEd/ej WBUy3VrfgsB15hKEqqIcfaYVnPRGG/xxi1lGD6OrlSIBkhphZsrFRPKCc8oBlQ3cg3NZjLdt8 Q6gQjG4CwGmsGPWxXurPOLaT5HQ3Cc9sAtr5p0z4YDJt7KtRNa/1HaIebfDHmb3hskwDzLC13 0gvkrHP8uVMvxKXT4htb8puKHEwPEQZRbuajAJ+1Z31rSac8QUea/EjnGRO3cttYwmuC+MGCq 0MUepMGVz/8nkro8BJAPcDJF+OiZFSGaqBLYLL4Mf0vQC258DGhmqNwibGRPwH/qz8ocW68h7 f543KU1fO4IcOousOc6UQ4KBaeuITW2F9zYwKY8ED42k/LJrlgpO6gTfensVRDbis46P+iT7W vTFD3dAEKzQHEhugF1YLzeCVHYxhK32VFOAxUouh3GfjDlFvooBi4et5ZFv3w1nsEJ//Aef7d Jyi9pREYwTpCq+MQKCJKIiMWJ+LFIZ/L7yP91mu5wYme3tfB0uY664io1LgmeEYsnbUaC5GEY N6F8Y9Mz1cW/VLGwgFjByuBHfKblsRAeycW1XMyti5gWsx6ft1Z90Thc0z1U3gWcboVwhUHIl wS/9G+Iw+TZw5IU6Y+8HKpDgTAGWaW4kLSwzV7AzLKbBviB98h0jvsa1OOVDcNTx0IyY= Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org In some rare randconfig builds, we can end up with ASYMMETRIC_PUBLIC_KEY_SUBTYPE enabled but CRYPTO_AKCIPHER2 disabled, which fails to link because of the reference to crypto_alloc_akcipher: crypto/built-in.o: In function `public_key_verify_signature': :(.text+0x110e4): undefined reference to `crypto_alloc_akcipher' This adds a Kconfig 'select' statement to ensure the dependency is always there. Signed-off-by: Arnd Bergmann --- crypto/asymmetric_keys/Kconfig | 1 + 1 file changed, 1 insertion(+) -- 2.7.0 -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/crypto/asymmetric_keys/Kconfig b/crypto/asymmetric_keys/Kconfig index e28e912000a7..c93723a852d9 100644 --- a/crypto/asymmetric_keys/Kconfig +++ b/crypto/asymmetric_keys/Kconfig @@ -13,6 +13,7 @@ config ASYMMETRIC_PUBLIC_KEY_SUBTYPE tristate "Asymmetric public-key crypto algorithm subtype" select MPILIB select CRYPTO_HASH_INFO + select CRYPTO_AKCIPHER2 help This option provides support for asymmetric public key type handling. If signature generation and/or verification are to be used,