On 08/06/2019 00:31, Jaskaran Khurana wrote:
The verification is to support cases where the roothash is not secured by
+ key = request_key(&key_type_user,
+ key_desc, NULL);
+ if (IS_ERR(key))
+ return PTR_ERR(key);
You will need dependence on keyring here (kernel can be configured without it),
try to compile it without CONFIG_KEYS selected.
I think it is ok that DM_VERITY_VERIFY_ROOTHASH_SIG can directly require CONFIG_KEYS.
(Add depends on CONFIG_KEYS in KConfig)