From: Masahiro Yamada Date: Fri, 1 Oct 2021 04:01:26 +0000 (+0900) Subject: certs: move the 'depends on' to the choice of module signing keys X-Git-Tag: v6.6.17~8363^2~25 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=be0d5fa7f0373197a44ebeb3f9e833ee50376225;p=platform%2Fkernel%2Flinux-rpi.git certs: move the 'depends on' to the choice of module signing keys When the condition "MODULE_SIG || (IMA_APPRAISE_MODSIG && MODULES)" is unmet, you cannot choose anything in the choice, but the choice menu is still displayed in the menuconfig etc. Move the 'depends on' to the choice to hide the meaningless menu. Also delete the redundant 'default'. In a choice, the first entry is the default. Signed-off-by: Masahiro Yamada --- diff --git a/certs/Kconfig b/certs/Kconfig index ae7f2e8..73d1350 100644 --- a/certs/Kconfig +++ b/certs/Kconfig @@ -17,21 +17,19 @@ config MODULE_SIG_KEY choice prompt "Type of module signing key to be generated" - default MODULE_SIG_KEY_TYPE_RSA + depends on MODULE_SIG || (IMA_APPRAISE_MODSIG && MODULES) help The type of module signing key type to generate. This option does not apply if a #PKCS11 URI is used. config MODULE_SIG_KEY_TYPE_RSA bool "RSA" - depends on MODULE_SIG || (IMA_APPRAISE_MODSIG && MODULES) help Use an RSA key for module signing. config MODULE_SIG_KEY_TYPE_ECDSA bool "ECDSA" select CRYPTO_ECDSA - depends on MODULE_SIG || (IMA_APPRAISE_MODSIG && MODULES) help Use an elliptic curve key (NIST P384) for module signing. Consider using a strong hash like sha256 or sha384 for hashing modules.