[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <201606240835.L1dQrXeH%fengguang.wu@intel.com>
Date: Fri, 24 Jun 2016 09:01:40 +0800
From: kbuild test robot <lkp@...el.com>
To: Tadeusz Struk <tadeusz.struk@...el.com>
Cc: kbuild-all@...org, dhowells@...hat.com,
herbert@...dor.apana.org.au, tadeusz.struk@...el.com,
smueller@...onox.de, linux-api@...r.kernel.org,
marcel@...tmann.org, mathew.j.martineau@...ux.intel.com,
linux-kernel@...r.kernel.org, keyrings@...r.kernel.org,
linux-crypto@...r.kernel.org, dwmw2@...radead.org,
davem@...emloft.net
Subject: Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
Hi,
[auto build test ERROR on cryptodev/master]
[also build test ERROR on v4.7-rc4 next-20160623]
[if your patch is applied to the wrong git tree, please drop us a note to help improve the system]
url: https://github.com/0day-ci/linux/commits/Tadeusz-Struk/crypto-algif-add-akcipher/20160624-065803
base: https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git master
config: x86_64-allmodconfig (attached as .config)
compiler: gcc-6 (Debian 6.1.1-1) 6.1.1 20160430
reproduce:
# save the attached .config to linux build tree
make ARCH=x86_64
All error/warnings (new ones prefixed by >>):
crypto/algif_akcipher.c: In function 'asym_key_encrypt':
>> crypto/algif_akcipher.c:326:9: error: variable 'params' has initializer but incomplete type
struct kernel_pkey_params params = {0};
^~~~~~~~~~~~~~~~~~
>> crypto/algif_akcipher.c:326:38: warning: excess elements in struct initializer
struct kernel_pkey_params params = {0};
^
crypto/algif_akcipher.c:326:38: note: (near initialization for 'params')
>> crypto/algif_akcipher.c:326:28: error: storage size of 'params' isn't known
struct kernel_pkey_params params = {0};
^~~~~~
>> crypto/algif_akcipher.c:352:8: error: implicit declaration of function 'encrypt_blob' [-Werror=implicit-function-declaration]
ret = encrypt_blob(¶ms, in, out);
^~~~~~~~~~~~
>> crypto/algif_akcipher.c:326:28: warning: unused variable 'params' [-Wunused-variable]
struct kernel_pkey_params params = {0};
^~~~~~
crypto/algif_akcipher.c: In function 'asym_key_decrypt':
crypto/algif_akcipher.c:366:9: error: variable 'params' has initializer but incomplete type
struct kernel_pkey_params params = {0};
^~~~~~~~~~~~~~~~~~
crypto/algif_akcipher.c:366:38: warning: excess elements in struct initializer
struct kernel_pkey_params params = {0};
^
crypto/algif_akcipher.c:366:38: note: (near initialization for 'params')
crypto/algif_akcipher.c:366:28: error: storage size of 'params' isn't known
struct kernel_pkey_params params = {0};
^~~~~~
>> crypto/algif_akcipher.c:392:8: error: implicit declaration of function 'decrypt_blob' [-Werror=implicit-function-declaration]
ret = decrypt_blob(¶ms, in, out);
^~~~~~~~~~~~
crypto/algif_akcipher.c:366:28: warning: unused variable 'params' [-Wunused-variable]
struct kernel_pkey_params params = {0};
^~~~~~
crypto/algif_akcipher.c: In function 'asym_key_sign':
crypto/algif_akcipher.c:406:9: error: variable 'params' has initializer but incomplete type
struct kernel_pkey_params params = {0};
^~~~~~~~~~~~~~~~~~
crypto/algif_akcipher.c:406:38: warning: excess elements in struct initializer
struct kernel_pkey_params params = {0};
^
crypto/algif_akcipher.c:406:38: note: (near initialization for 'params')
crypto/algif_akcipher.c:406:28: error: storage size of 'params' isn't known
struct kernel_pkey_params params = {0};
^~~~~~
>> crypto/algif_akcipher.c:432:8: error: implicit declaration of function 'create_signature' [-Werror=implicit-function-declaration]
ret = create_signature(¶ms, in, out);
^~~~~~~~~~~~~~~~
crypto/algif_akcipher.c:406:28: warning: unused variable 'params' [-Wunused-variable]
struct kernel_pkey_params params = {0};
^~~~~~
crypto/algif_akcipher.c: In function 'asym_key_verify':
>> crypto/algif_akcipher.c:460:5: error: 'struct public_key_signature' has no member named 'encoding'
sig.encoding = "pkcs1";
^
cc1: some warnings being treated as errors
vim +/params +326 crypto/algif_akcipher.c
320
321 return err ? err : size;
322 }
323
324 static int asym_key_encrypt(const struct key *key, struct akcipher_request *req)
325 {
> 326 struct kernel_pkey_params params = {0};
327 char *src = NULL, *dst = NULL, *in, *out;
328 int ret;
329
330 if (!sg_is_last(req->src)) {
331 src = kmalloc(req->src_len, GFP_KERNEL);
332 if (!src)
333 return -ENOMEM;
334 scatterwalk_map_and_copy(src, req->src, 0, req->src_len, 0);
335 in = src;
336 } else {
337 in = sg_virt(req->src);
338 }
339 if (!sg_is_last(req->dst)) {
340 dst = kmalloc(req->dst_len, GFP_KERNEL);
341 if (!dst) {
342 kfree(src);
343 return -ENOMEM;
344 }
345 out = dst;
346 } else {
347 out = sg_virt(req->dst);
348 }
349 params.key = (struct key *)key;
350 params.in_len = req->src_len;
351 params.out_len = req->dst_len;
> 352 ret = encrypt_blob(¶ms, in, out);
353 if (ret)
354 goto free;
355
356 if (dst)
357 scatterwalk_map_and_copy(dst, req->dst, 0, req->dst_len, 1);
358 free:
359 kfree(src);
360 kfree(dst);
361 return ret;
362 }
363
364 static int asym_key_decrypt(const struct key *key, struct akcipher_request *req)
365 {
> 366 struct kernel_pkey_params params = {0};
367 char *src = NULL, *dst = NULL, *in, *out;
368 int ret;
369
370 if (!sg_is_last(req->src)) {
371 src = kmalloc(req->src_len, GFP_KERNEL);
372 if (!src)
373 return -ENOMEM;
374 scatterwalk_map_and_copy(src, req->src, 0, req->src_len, 0);
375 in = src;
376 } else {
377 in = sg_virt(req->src);
378 }
379 if (!sg_is_last(req->dst)) {
380 dst = kmalloc(req->dst_len, GFP_KERNEL);
381 if (!dst) {
382 kfree(src);
383 return -ENOMEM;
384 }
385 out = dst;
386 } else {
387 out = sg_virt(req->dst);
388 }
389 params.key = (struct key *)key;
390 params.in_len = req->src_len;
391 params.out_len = req->dst_len;
> 392 ret = decrypt_blob(¶ms, in, out);
393 if (ret)
394 goto free;
395
396 if (dst)
397 scatterwalk_map_and_copy(dst, req->dst, 0, req->dst_len, 1);
398 free:
399 kfree(src);
400 kfree(dst);
401 return ret;
402 }
403
404 static int asym_key_sign(const struct key *key, struct akcipher_request *req)
405 {
> 406 struct kernel_pkey_params params = {0};
407 char *src = NULL, *dst = NULL, *in, *out;
408 int ret;
409
410 if (!sg_is_last(req->src)) {
411 src = kmalloc(req->src_len, GFP_KERNEL);
412 if (!src)
413 return -ENOMEM;
414 scatterwalk_map_and_copy(src, req->src, 0, req->src_len, 0);
415 in = src;
416 } else {
417 in = sg_virt(req->src);
418 }
419 if (!sg_is_last(req->dst)) {
420 dst = kmalloc(req->dst_len, GFP_KERNEL);
421 if (!dst) {
422 kfree(src);
423 return -ENOMEM;
424 }
425 out = dst;
426 } else {
427 out = sg_virt(req->dst);
428 }
429 params.key = (struct key *)key;
430 params.in_len = req->src_len;
431 params.out_len = req->dst_len;
> 432 ret = create_signature(¶ms, in, out);
433 if (ret)
434 goto free;
435
436 if (dst)
437 scatterwalk_map_and_copy(dst, req->dst, 0, req->dst_len, 1);
438 free:
439 kfree(src);
440 kfree(dst);
441 return ret;
442 }
443
444 static int asym_key_verify(const struct key *key, struct akcipher_request *req)
445 {
446 struct public_key_signature sig;
447 char *src = NULL, *in, digest[20];
448 int ret;
449
450 if (!sg_is_last(req->src)) {
451 src = kmalloc(req->src_len, GFP_KERNEL);
452 if (!src)
453 return -ENOMEM;
454 scatterwalk_map_and_copy(src, req->src, 0, req->src_len, 0);
455 in = src;
456 } else {
457 in = sg_virt(req->src);
458 }
459 sig.pkey_algo = "rsa";
> 460 sig.encoding = "pkcs1";
461 /* Need to find a way to pass the hash param */
462 sig.hash_algo = "sha1";
463 sig.digest_size = sizeof(digest);
---
0-DAY kernel test infrastructure Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all Intel Corporation
Download attachment ".config.gz" of type "application/octet-stream" (54789 bytes)
Powered by blists - more mailing lists