Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp3062775iob; Fri, 6 May 2022 17:31:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwh5gl15X7QC1UGhOH6hyEGqYtnlK2wntIHKUS69zWjrJVapUpaxVouTn3cm50ivGj2GuuC X-Received: by 2002:a17:906:9b8f:b0:6f4:e5e8:9984 with SMTP id dd15-20020a1709069b8f00b006f4e5e89984mr5261650ejc.327.1651883466535; Fri, 06 May 2022 17:31:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651883466; cv=none; d=google.com; s=arc-20160816; b=zIaul0OjBlAbd2GTQiipkzvaUxF+fMsy8VgTveXDVTOSVUyVzzPBkQxmr32f3Z4OKY E63Wn+4lCotInPQ1MU1eL3ktBTL5/B0PCPf/Najah7r/h5rbDi3K4oxH14dVUDYSy2Ax XyfBbzK1Qli0hDOqIz5oNt//bxkCsA7AhOP0ES4ECEhohPt5V0b8WNujrwNyQyeRKwu9 O9fzCIzIUfCxB/sZyWO769y0B9Ol30tTy4SEIlxSuApKDJLv+aJ3wd3VDoYnrwdiSAk0 Han1iZwY4B0RkYhAqkcbZhAvw61xRsSsf8Rtkr0uG6sVq12FLoBgiAhuN9gF/QQDDNz/ PD/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=JkJHsJwGhFaWK/XiFlpBDuGMU8AHdb5yPjhxVoEsfSc=; b=A5TIYuFnFTqWgml5MGIor/URvJEs3TnjA2gjaaxLbvdGizaRHcDXTjmBNjWNpm248/ +KiSS5A7SnSH0rH9hUijPVsghURt4IfE7XNn1Dm59j1afWHH35a6Hda1maDaS0cJhKlX /Vi/4d6mvyx73tpj3GMu2TpPf3VitF9htB9V3f9TdgMWOntIVd6auBqI6xvLYrEqgQ/k c3toi9zmzTwtqSCK3OyvocyH/YKK+rQliDqOCVHPUDnhfxFZfcPEiTiPNVzU7L4jHOIx TP76qou07sn5oFd4PXUu1gNUHmIjqt9qQ4eNQbDP4uSWI2WGg/fpZEmtycB5Rl6qBbKj NmBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k9-20020a1709067ac900b006f383823eb6si6243730ejo.143.2022.05.06.17.30.20; Fri, 06 May 2022 17:31:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235815AbiEFGaT (ORCPT + 99 others); Fri, 6 May 2022 02:30:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51858 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235522AbiEFGaR (ORCPT ); Fri, 6 May 2022 02:30:17 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EA4FC5E171 for ; Thu, 5 May 2022 23:26:33 -0700 (PDT) Received: from drehscheibe.grey.stw.pengutronix.de ([2a0a:edc0:0:c01:1d::a2]) by metis.ext.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1nmrPo-0005oH-Ma; Fri, 06 May 2022 08:26:13 +0200 Received: from [2a0a:edc0:0:1101:1d::ac] (helo=dude04.red.stw.pengutronix.de) by drehscheibe.grey.stw.pengutronix.de with esmtp (Exim 4.94.2) (envelope-from ) id 1nmrPi-000edh-C9; Fri, 06 May 2022 08:26:05 +0200 Received: from afa by dude04.red.stw.pengutronix.de with local (Exim 4.94.2) (envelope-from ) id 1nmrPf-004Tw9-LV; Fri, 06 May 2022 08:26:03 +0200 From: Ahmad Fatoum To: Jarkko Sakkinen , James Bottomley , Mimi Zohar , David Howells Cc: kernel@pengutronix.de, Pankaj Gupta , Ahmad Fatoum , James Morris , "Serge E. Hallyn" , =?UTF-8?q?Horia=20Geant=C4=83?= , Herbert Xu , "David S. Miller" , Eric Biggers , Jan Luebbe , David Gstir , Richard Weinberger , Franck LENORMAND , Matthias Schiffer , Michael Walle , Sumit Garg , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-doc@vger.kernel.org, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM Date: Fri, 6 May 2022 08:25:53 +0200 Message-Id: <20220506062553.1068296-8-a.fatoum@pengutronix.de> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220506062553.1068296-1-a.fatoum@pengutronix.de> References: <20220506062553.1068296-1-a.fatoum@pengutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2a0a:edc0:0:c01:1d::a2 X-SA-Exim-Mail-From: afa@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Create a maintainer entry for CAAM trusted keys in the Linux keyring. Reviewed-by: Pankaj Gupta Signed-off-by: Ahmad Fatoum --- v8 -> v9: - rewrite commit message (Jarkko) v7 -> v8: - add Pankaj's Reviewed-by v6 -> v7: - split off as separate patch (Jarkko) To: Jarkko Sakkinen To: James Bottomley To: Mimi Zohar To: David Howells Cc: James Morris Cc: "Serge E. Hallyn" Cc: "Horia Geantă" Cc: Pankaj Gupta Cc: Herbert Xu Cc: "David S. Miller" Cc: Eric Biggers Cc: Jan Luebbe Cc: David Gstir Cc: Richard Weinberger Cc: Franck LENORMAND Cc: Matthias Schiffer Cc: Michael Walle Cc: Sumit Garg Cc: keyrings@vger.kernel.org Cc: linux-crypto@vger.kernel.org Cc: linux-doc@vger.kernel.org Cc: linux-integrity@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: linux-security-module@vger.kernel.org --- MAINTAINERS | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/MAINTAINERS b/MAINTAINERS index 5e8c2f611766..e58e6fc3016d 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -10855,6 +10855,15 @@ S: Supported F: include/keys/trusted_tee.h F: security/keys/trusted-keys/trusted_tee.c +KEYS-TRUSTED-CAAM +M: Ahmad Fatoum +R: Pengutronix Kernel Team +L: linux-integrity@vger.kernel.org +L: keyrings@vger.kernel.org +S: Maintained +F: include/keys/trusted_caam.h +F: security/keys/trusted-keys/trusted_caam.c + KEYS/KEYRINGS M: David Howells M: Jarkko Sakkinen -- 2.30.2