1
0
Fork 0
remarkable-linux/security/keys
Arnd Bergmann 077463be4f security/keys: BIG_KEY requires CONFIG_CRYPTO
commit 3cd18d1981 upstream.

The recent rework introduced a possible randconfig build failure
when CONFIG_CRYPTO configured to only allow modules:

security/keys/big_key.o: In function `big_key_crypt':
big_key.c:(.text+0x29f): undefined reference to `crypto_aead_setkey'
security/keys/big_key.o: In function `big_key_init':
big_key.c:(.init.text+0x1a): undefined reference to `crypto_alloc_aead'
big_key.c:(.init.text+0x45): undefined reference to `crypto_aead_setauthsize'
big_key.c:(.init.text+0x77): undefined reference to `crypto_destroy_tfm'
crypto/gcm.o: In function `gcm_hash_crypt_remain_continue':
gcm.c:(.text+0x167): undefined reference to `crypto_ahash_finup'
crypto/gcm.o: In function `crypto_gcm_exit_tfm':
gcm.c:(.text+0x847): undefined reference to `crypto_destroy_tfm'

When we 'select CRYPTO' like the other users, we always get a
configuration that builds.

Fixes: 428490e38b ("security/keys: rewrite all of big_key crypto")
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-02-25 11:05:53 +01:00
..
encrypted-keys KEYS: encrypted: fix buffer overread in valid_master_desc() 2018-02-13 12:35:57 +01:00
Kconfig security/keys: BIG_KEY requires CONFIG_CRYPTO 2018-02-25 11:05:53 +01:00
Makefile KEYS: Add KEYCTL_DH_COMPUTE command 2016-04-12 19:54:58 +01:00
big_key.c KEYS: Fix race between updating and finding a negative key 2017-10-27 10:38:11 +02:00
compat.c KEYS: Add placeholder for KDF usage with DH 2016-06-03 16:14:34 +10:00
dh.c KEYS: Add placeholder for KDF usage with DH 2016-06-03 16:14:34 +10:00
gc.c KEYS: Fix race between updating and finding a negative key 2017-10-27 10:38:11 +02:00
internal.h KEYS: prevent creating a different user's keyrings 2017-10-05 09:44:00 +02:00
key.c KEYS: Fix race between updating and finding a negative key 2017-10-27 10:38:11 +02:00
keyctl.c KEYS: Fix race between updating and finding a negative key 2017-10-27 10:38:11 +02:00
keyring.c KEYS: return full count in keyring_read() if buffer is too small 2017-11-08 10:08:31 +01:00
permission.c KEYS: Move the flags representing required permission to linux/key.h 2014-03-14 17:44:49 +00:00
persistent.c KEYS: Strip trailing spaces 2016-06-14 10:29:44 +01:00
proc.c KEYS: Fix race between updating and finding a negative key 2017-10-27 10:38:11 +02:00
process_keys.c KEYS: Fix race between updating and finding a negative key 2017-10-27 10:38:11 +02:00
request_key.c KEYS: add missing permission check for request_key() destination 2017-12-14 09:28:12 +01:00
request_key_auth.c KEYS: Fix race between updating and finding a negative key 2017-10-27 10:38:11 +02:00
sysctl.c security: Convert use of typedef ctl_table to struct ctl_table 2014-04-15 13:39:58 +10:00
trusted.c KEYS: trusted: fix writing past end of buffer in trusted_read() 2017-11-15 15:53:17 +01:00
trusted.h keys, trusted: move struct trusted_key_options to trusted-type.h 2015-10-19 01:01:21 +02:00
user_defined.c KEYS: Fix race between updating and finding a negative key 2017-10-27 10:38:11 +02:00