Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp4921516pxk; Wed, 30 Sep 2020 15:41:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwcIhWb/8PzV5IANMThcU0iUzSfAMKYdl53Q1SsBEKlPFjSFsd0SXhQBZUb/0qg/nzrnXmU X-Received: by 2002:a17:906:2659:: with SMTP id i25mr5044632ejc.16.1601505707271; Wed, 30 Sep 2020 15:41:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601505707; cv=none; d=google.com; s=arc-20160816; b=K0JDfhgAQ7n1EwWocYEiTbRsA8gD/fWpc+rNlqXbMw2TdjVU6xARSo+zlnKiOTnNiM +G/DZvtUBij0AhzKOni92xAxgdUbJggkaaMFm9EiraEygHNtOGQjjZCXGG7IstL2iWcr Y+1vITRrBMwRDq5q0tfwCzWlvzUzQ7TyQoyvuF7lyQRS44aMTvEjiuUMJ7DPzpaCasXC LDDx9Ub7s3fk40WOYcANVkNJbo5jh2dDjZKWy+X3YAuRHtqNXi8k2efmgSox+o/FNW2X lFVEaNC7iuvYyuf6nCPMeBPRRwe6ZiruGkGWPmoaV8vmc231dpxsagb3DORToF1lcdR5 MGTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:organization:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :ironport-sdr:ironport-sdr; bh=QagVkwdZtvkf8+283M1az10KpvQSPhY/p5Amhhv7u9M=; b=XK+PDjXi84rN3feCZrYyMAVW0Yp2kLOxriBQ9Fv1Teul7RCLCFBfi5HkePsidtBuQF mCNRxhKaBwp7LdARHW2sr+B/UFY9QJrGngE02vcDunWgJqZslS2TNiOvnO79uQ7dxciK 7enhOpRlx4jvSumVSFNhGc1C1NMpCMKhIt7wGiYQupPi/L86sxOoMai9eN60rYXsmiC6 mLXC8YjV0Jp0+NRioYgABfqsJxHzsFClMS1wPtgAU4j0Hu7juouTkoCtkQwVi2lISOqW VQZUj0+kMB/ZKflhc4FTvatG9E2HE7YJ1ItYprR5/6sl+MYVT0oQ6gziN1CW7WY57uvu AhBw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c21si2034010edw.18.2020.09.30.15.41.24; Wed, 30 Sep 2020 15:41:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731012AbgI3Vt4 (ORCPT + 99 others); Wed, 30 Sep 2020 17:49:56 -0400 Received: from mga02.intel.com ([134.134.136.20]:62005 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729912AbgI3Vtz (ORCPT ); Wed, 30 Sep 2020 17:49:55 -0400 IronPort-SDR: n303Xxdnm4Vry6qFno62hJzzyuO/XNMwGBTKxnb/xXkk44pbNmmJJ2EdI4onZi+EPBPp8wYr46 2MiOC97q+gNA== X-IronPort-AV: E=McAfee;i="6000,8403,9760"; a="150207784" X-IronPort-AV: E=Sophos;i="5.77,322,1596524400"; d="scan'208";a="150207784" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Sep 2020 14:49:50 -0700 IronPort-SDR: cHbLJX7YNzrydKgEumUKRaDaCeTl3zHYQ/hKgkrwsVqNdfRUbKPDK/e17LRwfxPtWKmwWmq25p yBI/q2qig/4w== X-IronPort-AV: E=Sophos;i="5.77,322,1596524400"; d="scan'208";a="499650551" Received: from mmarder-mobl.ger.corp.intel.com (HELO localhost) ([10.252.50.231]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Sep 2020 14:49:47 -0700 Date: Thu, 1 Oct 2020 00:49:44 +0300 From: Jarkko Sakkinen To: Eric Snowberg Cc: dhowells@redhat.com, dwmw2@infradead.org, masahiroy@kernel.org, michal.lkml@markovi.net, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kbuild@vger.kernel.org Subject: Re: [PATCH 1/2] certs: Move load_system_certificate_list to a common function Message-ID: <20200930214944.GA67803@linux.intel.com> References: <20200930201508.35113-1-eric.snowberg@oracle.com> <20200930201508.35113-2-eric.snowberg@oracle.com> <20200930210254.GB65339@linux.intel.com> <9E194595-5A19-42F8-9657-7FB36DE59F16@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <9E194595-5A19-42F8-9657-7FB36DE59F16@oracle.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 30, 2020 at 03:15:10PM -0600, Eric Snowberg wrote: > > > On Sep 30, 2020, at 3:02 PM, Jarkko Sakkinen wrote: > > > > On Wed, Sep 30, 2020 at 04:15:07PM -0400, Eric Snowberg wrote: > >> Move functionality within load_system_certificate_list to a common > >> function, so it can be reused in the future. > >> > >> Signed-off-by: Eric Snowberg > > > > I rather think now rather than the future. I think this should be part > > of a patch set where the re-use actually happens. > > load_certificate_list is being used in the second patch in the series [1]. > It uses the now common code, to load the revocation certificates, just like > the system certificates are being loaded in this patch. Ugh, better to get some sleep. Double checked 2/2 and ack still holds. Sorry about this. Acked-by: Jarkko Sakkinen /Jarkko