Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp910163ybh; Tue, 21 Jul 2020 10:50:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqA09evBVoKO9wqj4C0Z063ck72+diIfqpNroryCYV1w4SjhIZIt6h3tds+4dKXhNHvCmy X-Received: by 2002:a17:906:4015:: with SMTP id v21mr8834856ejj.63.1595353801807; Tue, 21 Jul 2020 10:50:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595353801; cv=none; d=google.com; s=arc-20160816; b=l0KWzPYekpJR1Lsy4mBwkk6Kypvul2K0SILn4DjTXgE3PHYng7SWEzCDdn6JPX+5mc f0lUdF/eNXDmDKFiQXTmYGJxbM0dZPZmPh471ZZul7OcsXWWmoLpL2zhYZSV0BOjGIu3 Iug563tatfOC9n0QSq28aQ5PAz+Wud6e7Gomwxmy3c/QRk2DScqh/UCfWigdFNvFO02T 4rsh2gAh/g4Yl2iorFmMRAwn9vJBHUsJraotBuG+qHScJlqU7OolnFd9rHM4/n3fhZ/q P9xt0ptawcI2aexTiXqplJTeYP1IRhQ9dDZmIs2S/nHuYoKDdzE+sU29ccBE0KahTipD OVdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:date:message-id:from :references:to:subject; bh=iab7kHmh6FpUCrkJRMFbRqrAdcFizEAaWizw9IBCfJA=; b=ejvNzeNtdf33478TTlIUN3kol7kR8lGN9cSBe25HgvDCZBfSO5Vh5Mrcg0sLwE/5IJ 7R48rs7BQB3YencMDaXaPLi525Zbh/xNB12Cd6VzB5gu8RoQadKdiopiXmmZRvB5aX0r 20N0ZUroEuDKZt0dJ8JZ6HInL6YRifVrCMqRhJWO+qWOA1htkfKUfGyKbG69cb+mpu2+ ckcz9EvkuA5yQr2AiSwpwJRR3hW2M1MaU4yQYGM9jO4BE7RNp4aXE1+FCOoXigjY7sl0 tKl9wr/XiUMK03wB2PdewyBm5Y8hJ7V9j5Rs1GiAJVE2gALTS4gjtmy0NFImD8/ynffD wLYw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i12si13002175edx.430.2020.07.21.10.49.37; Tue, 21 Jul 2020 10:50:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726943AbgGURte (ORCPT + 99 others); Tue, 21 Jul 2020 13:49:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57484 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726763AbgGURte (ORCPT ); Tue, 21 Jul 2020 13:49:34 -0400 Received: from smtp.al2klimov.de (smtp.al2klimov.de [IPv6:2a01:4f8:c0c:1465::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D8421C061794; Tue, 21 Jul 2020 10:49:33 -0700 (PDT) Received: from authenticated-user (PRIMARY_HOSTNAME [PUBLIC_IP]) by smtp.al2klimov.de (Postfix) with ESMTPA id 5EC01BC1AC; Tue, 21 Jul 2020 17:49:28 +0000 (UTC) Subject: Re: [PATCH for v5.9] ARM: STM32: Replace HTTP links with HTTPS ones To: Alexandre Torgue , linux@armlinux.org.uk, mcoquelin.stm32@gmail.com, herbert@gondor.apana.org.au, davem@davemloft.net, linux-arm-kernel@lists.infradead.org, linux-stm32@st-md-mailman.stormreply.com, linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org References: <20200719094948.57487-1-grandmaster@al2klimov.de> <43c11c7a-269e-cc41-6934-0d2e0dec3226@st.com> From: "Alexander A. Klimov" Message-ID: <219075a0-d7cf-a699-21d7-fabc6f077f95@al2klimov.de> Date: Tue, 21 Jul 2020 19:49:27 +0200 MIME-Version: 1.0 In-Reply-To: <43c11c7a-269e-cc41-6934-0d2e0dec3226@st.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Spamd-Bar: + X-Spam-Level: * Authentication-Results: smtp.al2klimov.de; auth=pass smtp.auth=aklimov@al2klimov.de smtp.mailfrom=grandmaster@al2klimov.de Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Am 21.07.20 um 10:49 schrieb Alexandre Torgue: > Hi Alexander > > On 7/19/20 11:49 AM, Alexander A. Klimov wrote: >> Rationale: >> Reduces attack surface on kernel devs opening the links for MITM >> as HTTPS traffic is much harder to manipulate. >> >> Deterministic algorithm: >> For each file: >>    If not .svg: >>      For each line: >>        If doesn't contain `\bxmlns\b`: >>          For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`: >>       If neither `\bgnu\.org/license`, nor `\bmozilla\.org/MPL\b`: >>              If both the HTTP and HTTPS versions >>              return 200 OK and serve the same content: >>                Replace HTTP with HTTPS. >> >> Signed-off-by: Alexander A. Klimov > > This patch touch 2 different subsystems. Can you please split it ? I can. But don't all files belong to the subsystem this patch is for? ➜ linux git:(autogen/1029) git show arch/arm/mach-stm32/Makefile.boot |perl scripts/get_maintainer.pl --nogit{,-fallback} Russell King (odd fixer:ARM PORT) Maxime Coquelin (maintainer:ARM/STM32 ARCHITECTURE) Alexandre Torgue (maintainer:ARM/STM32 ARCHITECTURE) linux-arm-kernel@lists.infradead.org (moderated list:ARM SUB-ARCHITECTURES) linux-stm32@st-md-mailman.stormreply.com (moderated list:ARM/STM32 ARCHITECTURE) linux-kernel@vger.kernel.org (open list) ➜ linux git:(autogen/1029) git show crypto/testmgr.h |perl scripts/get_maintainer.pl --nogit{,-fallback} Herbert Xu (maintainer:CRYPTO API) "David S. Miller" (maintainer:CRYPTO API) Maxime Coquelin (maintainer:ARM/STM32 ARCHITECTURE) Alexandre Torgue (maintainer:ARM/STM32 ARCHITECTURE) linux-crypto@vger.kernel.org (open list:CRYPTO API) linux-stm32@st-md-mailman.stormreply.com (moderated list:ARM/STM32 ARCHITECTURE) linux-arm-kernel@lists.infradead.org (moderated list:ARM/STM32 ARCHITECTURE) linux-kernel@vger.kernel.org (open list) ➜ linux git:(autogen/1029) > > Regards > Alex > > >> --- >>   Continuing my work started at 93431e0607e5. >>   See also: git log --oneline '--author=Alexander A. Klimov >> ' v5.7..master >>   (Actually letting a shell for loop submit all this stuff for me.) >> >>   If there are any URLs to be removed completely >>   or at least not (just) HTTPSified: >>   Just clearly say so and I'll *undo my change*. >>   See also: https://lkml.org/lkml/2020/6/27/64 >> >>   If there are any valid, but yet not changed URLs: >>   See: https://lkml.org/lkml/2020/6/26/837 >> >>   If you apply the patch, please let me know. >> >>   Sorry again to all maintainers who complained about subject lines. >>   Now I realized that you want an actually perfect prefixes, >>   not just subsystem ones. >>   I tried my best... >>   And yes, *I could* (at least half-)automate it. >>   Impossible is nothing! :) >> >> >>   arch/arm/mach-stm32/Makefile.boot | 2 +- >>   crypto/testmgr.h                  | 6 +++--- >>   2 files changed, 4 insertions(+), 4 deletions(-) >> >> diff --git a/arch/arm/mach-stm32/Makefile.boot >> b/arch/arm/mach-stm32/Makefile.boot >> index cec195d4fcba..5dde7328a7a9 100644 >> --- a/arch/arm/mach-stm32/Makefile.boot >> +++ b/arch/arm/mach-stm32/Makefile.boot >> @@ -1,4 +1,4 @@ >>   # SPDX-License-Identifier: GPL-2.0-only >>   # Empty file waiting for deletion once Makefile.boot isn't needed >> any more. >>   # Patch waits for application at >> -# >> http://www.arm.linux.org.uk/developer/patches/viewpatch.php?id=7889/1 . >> +# >> https://www.arm.linux.org.uk/developer/patches/viewpatch.php?id=7889/1 . >> diff --git a/crypto/testmgr.h b/crypto/testmgr.h >> index d29983908c38..cdcf0d2fe40d 100644 >> --- a/crypto/testmgr.h >> +++ b/crypto/testmgr.h >> @@ -16231,7 +16231,7 @@ static const struct cipher_testvec >> aes_lrw_tv_template[] = { >>                 "\xe9\x5d\x48\x92\x54\x63\x4e\xb8", >>           .len    = 48, >>       }, { >> -/* >> http://www.mail-archive.com/stds-p1619@listserv.ieee.org/msg00173.html */ >> +/* >> https://www.mail-archive.com/stds-p1619@listserv.ieee.org/msg00173.html */ >> >>           .key    = "\xf8\xd4\x76\xff\xd6\x46\xee\x6c" >>                 "\x23\x84\xcb\x1c\x77\xd6\x19\x5d" >>                 "\xfe\xf1\xa9\xf3\x7b\xbc\x8d\x21" >> @@ -21096,7 +21096,7 @@ static const struct aead_testvec >> aegis128_tv_template[] = { >>   /* >>    * All key wrapping test vectors taken from >> - * http://csrc.nist.gov/groups/STM/cavp/documents/mac/kwtestvectors.zip >> + * https://csrc.nist.gov/groups/STM/cavp/documents/mac/kwtestvectors.zip >>    * >>    * Note: as documented in keywrap.c, the ivout for encryption is the >> first >>    * semiblock of the ciphertext from the test vector. For decryption, >> iv is >> @@ -22825,7 +22825,7 @@ static const struct cipher_testvec >> xeta_tv_template[] = { >>    * FCrypt test vectors >>    */ >>   static const struct cipher_testvec fcrypt_pcbc_tv_template[] = { >> -    { /* >> http://www.openafs.org/pipermail/openafs-devel/2000-December/005320.html >> */ >> +    { /* >> https://www.openafs.org/pipermail/openafs-devel/2000-December/005320.html >> */ >>           .key    = "\x00\x00\x00\x00\x00\x00\x00\x00", >>           .klen    = 8, >>           .iv    = "\x00\x00\x00\x00\x00\x00\x00\x00", >>