All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1488207354.3004.4.camel@HansenPartnership.com>

diff --git a/a/1.txt b/N1/1.txt
index 46bae04..9a9708a 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -4,7 +4,7 @@ On Mon, 2017-02-27 at 17:16 +0530, Nayna wrote:
 > > On Fri, 2017-02-24 at 12:29 +0530, Nayna wrote:
 > > > 
 > > > On 02/17/2017 12:55 AM, Jarkko Sakkinen wrote:
-> > > > From: James Bottomley <James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
+> > > > From: James Bottomley <James.Bottomley@HansenPartnership.com>
 > > > > 
 > > > > Currently the tpm spaces are not exposed to userspace.  Make 
 > > > > this exposure via a separate device, which can now be opened
@@ -63,9 +63,3 @@ The only such command would be session or policy context save.  It's
 debateable whether we should interfere.
 
 James
-
-
-
-------------------------------------------------------------------------------
-Check out the vibrant tech community on one of the world's most
-engaging tech sites, SlashDot.org! http://sdm.link/slashdot
diff --git a/a/content_digest b/N1/content_digest
index 97346e1..05597e7 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -3,16 +3,15 @@
  "ref\058AFD9C1.1050507@linux.vnet.ibm.com\0"
  "ref\01487940829.2249.15.camel@HansenPartnership.com\0"
  "ref\058B41184.7020200@linux.vnet.ibm.com\0"
- "ref\058B41184.7020200-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org\0"
- "From\0James Bottomley <James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>\0"
- "Subject\0Re: [PATCH v2 6/7] tpm: expose spaces via a device link /dev/tpms<n>\0"
+ "From\0James Bottomley <James.Bottomley@hansenpartnership.com>\0"
+ "Subject\0Re: [tpmdd-devel] [PATCH v2 6/7] tpm: expose spaces via a device link /dev/tpms<n>\0"
  "Date\0Mon, 27 Feb 2017 06:55:54 -0800\0"
- "To\0Nayna <nayna-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>"
-  Jarkko Sakkinen <jarkko.sakkinen-VuQAYsv1563Yd54FQh9/CA@public.gmane.org>
- " tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org\0"
- "Cc\0dhowells-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org"
-  linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
- " open list <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>\0"
+ "To\0Nayna <nayna@linux.vnet.ibm.com>"
+  Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+ " tpmdd-devel@lists.sourceforge.net\0"
+ "Cc\0dhowells@redhat.com"
+  open list <linux-kernel@vger.kernel.org>
+ " linux-security-module@vger.kernel.org\0"
  "\00:1\0"
  "b\0"
  "On Mon, 2017-02-27 at 17:16 +0530, Nayna wrote:\n"
@@ -21,7 +20,7 @@
  "> > On Fri, 2017-02-24 at 12:29 +0530, Nayna wrote:\n"
  "> > > \n"
  "> > > On 02/17/2017 12:55 AM, Jarkko Sakkinen wrote:\n"
- "> > > > From: James Bottomley <James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>\n"
+ "> > > > From: James Bottomley <James.Bottomley@HansenPartnership.com>\n"
  "> > > > \n"
  "> > > > Currently the tpm spaces are not exposed to userspace.  Make \n"
  "> > > > this exposure via a separate device, which can now be opened\n"
@@ -79,12 +78,6 @@
  "The only such command would be session or policy context save.  It's\n"
  "debateable whether we should interfere.\n"
  "\n"
- "James\n"
- "\n"
- "\n"
- "\n"
- "------------------------------------------------------------------------------\n"
- "Check out the vibrant tech community on one of the world's most\n"
- engaging tech sites, SlashDot.org! http://sdm.link/slashdot
+ James
 
-d57a5443043c27bafedb4d3fcaa67e6a5933abb18607f38592832444ee376641
+dd9e417f998a5b03642451bab17659818c4816758eef1061b692c9da7c086cfc

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.