Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp421314pxu; Fri, 11 Dec 2020 05:41:24 -0800 (PST) X-Google-Smtp-Source: ABdhPJwlvJi0ISBOu+ftQVgzhuSUSW7AftAQNyO4vdLGi3X84NKUEJqWMSJGoWIJL0pY57jZPwQy X-Received: by 2002:a17:906:6dc3:: with SMTP id j3mr11629283ejt.320.1607694084652; Fri, 11 Dec 2020 05:41:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607694084; cv=none; d=google.com; s=arc-20160816; b=gYu6Hs0999dY2v6MUwtCMbYBxdI3UTtImbszNCO6dip7Me7v2dawvTZsQd2x2dE54W +iYfryFB3ZRKxy2yJ/IxGkMNV1tfKhslMxME4m9VYh6Jh8LyuaEZMHZObzH7drisn8Fg DBgaD/Z1C/BPorYGRxV8X/aALPuyYAX9JZaz8ohp6EiWMs8T4ermA+if6kksHd09u9+T N4fqD0qTjItXsiwDvdTJzq9fnDdtzrlkGCnJMErPaJF0bJvGZnejRpn49B9GDZku/me9 TaccoHpmIkbQ3tJlsOfgG3kn2kAauuvROI384C7CXc3Fx3s2Z5S/2rGOmnxWUr9XIu52 sW6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:dkim-signature:date; bh=U0fYr+P2Q+t6VXAQHP2x43Ym5PzDu2uy5xP0hr9CnBU=; b=Q/OaUzHLqcLnkW92e2P3KLwCCx+zkhQsHRKB7A90Oe6JOWZKC5GnAvWAoKZMIkV0PE 7E8myLc/CEveFnQrQ2BUD+Oo7Z9VeenwsBadJcTkV1SmZF2gvQqj87uGxMIBGOLWCfoM 07mfiuHCxtFYHKZ6Mbd8bPWj5YAf5VYvDQeFB27/xnFlpgpq1RbKwr/QKFd/dpzyvsVA TxJuEzdJ7AzfPiyOMg0LgVpbEBRV6mkpt0d96TaW1CR58cfA7nkruCnxANWFuUkDSaP8 0xlHxd6JqTziVh+rBj7Poi1Q5VlXrSAVLQMf9iEuPrMm/+0Z34iP6V2xjF3UDij6kkst B3OA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=rEJRKfw4; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v14si4979509edq.304.2020.12.11.05.41.01; Fri, 11 Dec 2020 05:41:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=rEJRKfw4; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393698AbgLKKxT (ORCPT + 99 others); Fri, 11 Dec 2020 05:53:19 -0500 Received: from mail.kernel.org ([198.145.29.99]:53878 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2393603AbgLKKwh (ORCPT ); Fri, 11 Dec 2020 05:52:37 -0500 Date: Fri, 11 Dec 2020 12:51:46 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1607683916; bh=HveGjGXQtRluuYEASxXKc/5EZsIEMlo+x9anuUBY7A4=; h=From:To:Cc:Subject:References:In-Reply-To:From; b=rEJRKfw4Gchzzkhu5A1Sa4eAosJ0vA5YWvT0fUcSab8bVF2XBfiwragJPNINoDHKu dWpsxkhRCKQemkKc4K0Ia7FPtK9SqtMcWhFc4rxp3dg/H0SubzU6LDEYj2JH8VsPgO w/oFEBySJAYUa51vC27DYySZj0X8J2kdoPuHcDQn2iUbp+Fzr7E7DBcZPuAwIr5OE+ Fc+j9nlVX736g17PKtmrZs56ipC5Z4zxrP+6SyWamcF1sC3HpTw8i6K3sQOcloMl9N wCcWrOPu5hBxYM71T0dtafTaflZVV+4HNuzQpXOIoPeUXdhESLvQxG5KNvyioXvUHk E9h+JvKRzArUw== From: Jarkko Sakkinen To: David Howells Cc: Jarkko Sakkinen , "Alexander A. Klimov" , Petko Manolov , "Serge E. Hallyn" , linux-kernel@vger.kernel.org, YueHaibing , Herbert Xu , Jann Horn , linux-crypto@vger.kernel.org, Ben Boeckel , keyrings@vger.kernel.org, Gabriel Krisman Bertazi , linux-security-module@vger.kernel.org, Randy Dunlap , Mimi Zohar , Tom Rix , "Gustavo A. R. Silva" , Alex Shi , Jarkko Sakkinen , Krzysztof Kozlowski , James Morris , Denis Efremov , =?iso-8859-1?Q?Micka=EBl_Sala=FCn?= , David Woodhouse , "David S. Miller" , Tianjia Zhang Subject: Re: [PATCH 00/18] keys: Miscellaneous fixes Message-ID: <20201211105146.GF12091@kernel.org> References: <160751606428.1238376.14935502103503420781.stgit@warthog.procyon.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <160751606428.1238376.14935502103503420781.stgit@warthog.procyon.org.uk> Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, Dec 09, 2020 at 12:14:24PM +0000, David Howells wrote: > > Hi Jarkko, > > I've extended my collection of minor keyrings fixes for the next merge > window. Anything else I should add (or anything I should drop)? > > The patches can be found on the following branch: > > https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-fixes > > David Looks good to me. /Jarkko > --- > Alex Shi (2): > PKCS#7: drop function from kernel-doc pkcs7_validate_trust_one > certs/blacklist: fix kernel doc interface issue > > Alexander A. Klimov (1): > encrypted-keys: Replace HTTP links with HTTPS ones > > David Howells (1): > certs: Fix blacklist flag type confusion > > Denis Efremov (1): > security/keys: use kvfree_sensitive() > > Gabriel Krisman Bertazi (1): > watch_queue: Drop references to /dev/watch_queue > > Gustavo A. R. Silva (1): > security: keys: Fix fall-through warnings for Clang > > Jann Horn (1): > keys: Remove outdated __user annotations > > Krzysztof Kozlowski (1): > KEYS: asymmetric: Fix kerneldoc > > Micka?l Sala?n (3): > certs: Fix blacklisted hexadecimal hash string check > PKCS#7: Fix missing include > certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID > > Randy Dunlap (2): > security: keys: delete repeated words in comments > crypto: asymmetric_keys: fix some comments in pkcs7_parser.h > > Tianjia Zhang (1): > crypto: public_key: Remove redundant header file from public_key.h > > Tom Rix (2): > KEYS: remove redundant memset > keys: remove trailing semicolon in macro definition > > YueHaibing (1): > crypto: pkcs7: Use match_string() helper to simplify the code > > > Documentation/security/keys/core.rst | 4 ++-- > certs/blacklist.c | 10 +++++----- > certs/system_keyring.c | 5 +++-- > crypto/asymmetric_keys/asymmetric_type.c | 6 ++++-- > crypto/asymmetric_keys/pkcs7_parser.h | 5 ++--- > crypto/asymmetric_keys/pkcs7_trust.c | 2 +- > crypto/asymmetric_keys/pkcs7_verify.c | 9 ++++----- > include/crypto/public_key.h | 1 - > include/keys/encrypted-type.h | 2 +- > include/linux/key.h | 5 +++-- > include/linux/verification.h | 2 ++ > samples/Kconfig | 2 +- > samples/watch_queue/watch_test.c | 2 +- > security/integrity/ima/ima_mok.c | 3 +-- > security/keys/Kconfig | 8 ++++---- > security/keys/big_key.c | 9 +++------ > security/keys/key.c | 2 ++ > security/keys/keyctl.c | 2 +- > security/keys/keyctl_pkey.c | 2 -- > security/keys/keyring.c | 10 +++++----- > 20 files changed, 45 insertions(+), 46 deletions(-) > > >