From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 490B8C3A589 for ; Tue, 20 Aug 2019 05:54:10 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 1EBFE22CF4 for ; Tue, 20 Aug 2019 05:54:10 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="TS7SGgjE" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729190AbfHTFyF (ORCPT ); Tue, 20 Aug 2019 01:54:05 -0400 Received: from mail-lj1-f195.google.com ([209.85.208.195]:36478 "EHLO mail-lj1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729000AbfHTFyF (ORCPT ); Tue, 20 Aug 2019 01:54:05 -0400 Received: by mail-lj1-f195.google.com with SMTP id u15so3933168ljl.3 for ; Mon, 19 Aug 2019 22:54:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=IaeMGDmGKxX8wxK8cdDbGY1eDp+Ld1z3eVWTJJyayFE=; b=TS7SGgjEzTreybigsAv3qVsuN075oTJVKpFp88ofnjJbbEJZAgthB8vDgLgvRLnLUS ++vjrM9g7gE2SN4igmXwiI7zyfyNMmtdmu3w8qOi/PtuwRPhsGTVmjVqf80oUjz0Gota KLbMPEV3aXizb/qctuOZlv9r2CXJfJWF7uuuHs78yPoxVzArINw/TpZXQhP90Z1WSRqe zB4Oi3RyIcR/OK3OCmRD6nczrw6lo6HvpTS129UjNx1gW4G5bbkeuDsV2cOsphJgjiUm 9KFiqRv2wgsOonNC64H6p5NykM5elpfOcC8VJddEJHVgky5Tbc+GOLM3TWgFH7iWMy3U aYPA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=IaeMGDmGKxX8wxK8cdDbGY1eDp+Ld1z3eVWTJJyayFE=; b=j8ECk18vgMRvea4M2x/U2ZBq++DfzXXyBvdep5QWgHea0U5x5WhsgKmU2Z2RSIEqdy Sl7ZA9H/P/o01PVavwqZ/FgS5E/NoynuUelOIU/+leitdIHvbx2DwDr4wR/vscFTAZgC jMH6wrQU5AgTlkaPDY3K5hG2ZxRWriUZT5cmDqW0I7xXewB1MQolp2WqhF0zgsuU/Df/ Z5tjLQFYPn4LPkegSylnuRpZyUgOapej8Vovqmg38sThcAzBY4Ui7c2V90/8lFoujSQw 8Plwq7vptvsOFWgq0tfHNVDYZhlXi5VDysQt4gemHv/spIdPtYOkF+D/Qks+I40khii0 8hcg== X-Gm-Message-State: APjAAAVdM+DQ4LczTJhMA7nsROZya6eUe/ct1OG9BL5EK9GpiMWdw3EY ii6VGkyL4ry0VijwwwFrc493SmomLjwMHg6YDHVCkA== X-Google-Smtp-Source: APXvYqxDON+ceMUmjzSzpMq37WQzohKgTpxzAYYEzr9bWHlarBKWsHRjGcZO8/n74pOlmwou6eEdk+97uPN2CZG7nig= X-Received: by 2002:a2e:87c5:: with SMTP id v5mr13283366ljj.115.1566280443691; Mon, 19 Aug 2019 22:54:03 -0700 (PDT) MIME-Version: 1.0 References: <1565682784-10234-1-git-send-email-sumit.garg@linaro.org> <1565682784-10234-4-git-send-email-sumit.garg@linaro.org> <20190819170458.m7adhkji64kta32d@linux.intel.com> <20190819170635.jlxxi6ogbm4s6gcx@linux.intel.com> In-Reply-To: <20190819170635.jlxxi6ogbm4s6gcx@linux.intel.com> From: Sumit Garg Date: Tue, 20 Aug 2019 11:23:51 +0530 Message-ID: Subject: Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem To: Jarkko Sakkinen Cc: keyrings@vger.kernel.org, linux-integrity@vger.kernel.org, "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , linux-security-module@vger.kernel.org, dhowells@redhat.com, Herbert Xu , davem@davemloft.net, peterhuewe@gmx.de, jgg@ziepe.ca, jejb@linux.ibm.com, Arnd Bergmann , Greg Kroah-Hartman , Mimi Zohar , James Morris , "Serge E. Hallyn" , Casey Schaufler , Ard Biesheuvel , Daniel Thompson , Linux Kernel Mailing List , "tee-dev @ lists . linaro . org" Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-security-module@vger.kernel.org Precedence: bulk List-ID: On Mon, 19 Aug 2019 at 22:36, Jarkko Sakkinen wrote: > > On Mon, Aug 19, 2019 at 08:04:58PM +0300, Jarkko Sakkinen wrote: > > On Tue, Aug 13, 2019 at 01:23:02PM +0530, Sumit Garg wrote: > > > Move existing code to trusted keys subsystem. Also, rename files with > > > "tpm" as suffix which provides the underlying implementation. > > > > > > Suggested-by: Jarkko Sakkinen > > > Signed-off-by: Sumit Garg > > > --- > > > crypto/asymmetric_keys/asym_tpm.c | 2 +- > > > include/keys/{trusted.h => trusted_tpm.h} | 4 ++-- > > > security/keys/Makefile | 2 +- > > > security/keys/trusted-keys/Makefile | 7 +++++++ > > > security/keys/{trusted.c => trusted-keys/trusted-tpm.c} | 2 +- > > > 5 files changed, 12 insertions(+), 5 deletions(-) > > > rename include/keys/{trusted.h => trusted_tpm.h} (98%) > > > create mode 100644 security/keys/trusted-keys/Makefile > > > rename security/keys/{trusted.c => trusted-keys/trusted-tpm.c} (99%) > > > > Would prefer trusted_tpm.c. > > Actually, trusted_tpm1.c. > Okay. -Sumit > /Jarkko