All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20190109164824.19708-3-kasong@redhat.com>

diff --git a/a/1.txt b/N1/1.txt
index dd36c2a..ad950ca 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -34,7 +34,7 @@ index 7d97e432cbbc..a8a5c1773ccc 100644
 +	ret = verify_pefile_signature(kernel, kernel_len,
 +			VERIFY_USE_SECONDARY_KEYRING,
 +			VERIFYING_KEXEC_PE_SIGNATURE);
-+	if (ret == -ENOKEY) {
++	if (ret = -ENOKEY) {
 +		ret = verify_pefile_signature(kernel, kernel_len,
 +				VERIFY_USE_PLATFORM_KEYRING,
 +				VERIFYING_KEXEC_PE_SIGNATURE);
@@ -61,13 +61,13 @@ index a61b95390b80..7514e69e719f 100644
  		trusted_keys = builtin_trusted_keys;
 +#endif
 +#ifdef CONFIG_INTEGRITY_PLATFORM_KEYRING
-+	} else if (trusted_keys == VERIFY_USE_PLATFORM_KEYRING) {
++	} else if (trusted_keys = VERIFY_USE_PLATFORM_KEYRING) {
 +		trusted_keys = platform_trusted_keys;
  #endif
  	}
  	ret = pkcs7_validate_trust(pkcs7, trusted_keys);
  	if (ret < 0) {
- 		if (ret == -ENOKEY)
+ 		if (ret = -ENOKEY)
 -			pr_err("PKCS#7 signature not signed with a trusted key\n");
 +			pr_devel("PKCS#7 signature not signed with a trusted key\n");
  		goto error;
@@ -87,9 +87,3 @@ index cfa4730d607a..018fb5f13d44 100644
   * The use to which an asymmetric key is being put.
 -- 
 2.20.1
-
-
-_______________________________________________
-kexec mailing list
-kexec@lists.infradead.org
-http://lists.infradead.org/mailman/listinfo/kexec
diff --git a/a/content_digest b/N1/content_digest
index 3f013da..d301708 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,22 +1,22 @@
  "ref\020190109164824.19708-1-kasong@redhat.com\0"
  "From\0Kairui Song <kasong@redhat.com>\0"
  "Subject\0[RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify\0"
- "Date\0Thu, 10 Jan 2019 00:48:24 +0800\0"
+ "Date\0Wed, 09 Jan 2019 16:48:24 +0000\0"
  "To\0linux-kernel@vger.kernel.org\0"
- "Cc\0jwboyer@fedoraproject.org"
-  Kairui Song <kasong@redhat.com>
-  ebiggers@google.com
-  dyoung@redhat.com
-  nayna@linux.ibm.com
-  kexec@lists.infradead.org
+ "Cc\0dhowells@redhat.com"
+  dwmw2@infradead.org
+  jwboyer@fedoraproject.org
+  keyrings@vger.kernel.org
   jmorris@namei.org
+  serge@hallyn.com
   zohar@linux.ibm.com
-  dhowells@redhat.com
-  keyrings@vger.kernel.org
-  linux-integrity@vger.kernel.org
-  dwmw2@infradead.org
   bauerman@linux.ibm.com
- " serge@hallyn.com\0"
+  ebiggers@google.com
+  nayna@linux.ibm.com
+  dyoung@redhat.com
+  linux-integrity@vger.kernel.org
+  kexec@lists.infradead.org
+ " Kairui Song <kasong@redhat.com>\0"
  "\00:1\0"
  "b\0"
  "kexec_file_load will need to verify the kernel signed with third part\n"
@@ -55,7 +55,7 @@
  "+\tret = verify_pefile_signature(kernel, kernel_len,\n"
  "+\t\t\tVERIFY_USE_SECONDARY_KEYRING,\n"
  "+\t\t\tVERIFYING_KEXEC_PE_SIGNATURE);\n"
- "+\tif (ret == -ENOKEY) {\n"
+ "+\tif (ret = -ENOKEY) {\n"
  "+\t\tret = verify_pefile_signature(kernel, kernel_len,\n"
  "+\t\t\t\tVERIFY_USE_PLATFORM_KEYRING,\n"
  "+\t\t\t\tVERIFYING_KEXEC_PE_SIGNATURE);\n"
@@ -82,13 +82,13 @@
  " \t\ttrusted_keys = builtin_trusted_keys;\n"
  "+#endif\n"
  "+#ifdef CONFIG_INTEGRITY_PLATFORM_KEYRING\n"
- "+\t} else if (trusted_keys == VERIFY_USE_PLATFORM_KEYRING) {\n"
+ "+\t} else if (trusted_keys = VERIFY_USE_PLATFORM_KEYRING) {\n"
  "+\t\ttrusted_keys = platform_trusted_keys;\n"
  " #endif\n"
  " \t}\n"
  " \tret = pkcs7_validate_trust(pkcs7, trusted_keys);\n"
  " \tif (ret < 0) {\n"
- " \t\tif (ret == -ENOKEY)\n"
+ " \t\tif (ret = -ENOKEY)\n"
  "-\t\t\tpr_err(\"PKCS#7 signature not signed with a trusted key\\n\");\n"
  "+\t\t\tpr_devel(\"PKCS#7 signature not signed with a trusted key\\n\");\n"
  " \t\tgoto error;\n"
@@ -107,12 +107,6 @@
  " /*\n"
  "  * The use to which an asymmetric key is being put.\n"
  "-- \n"
- "2.20.1\n"
- "\n"
- "\n"
- "_______________________________________________\n"
- "kexec mailing list\n"
- "kexec@lists.infradead.org\n"
- http://lists.infradead.org/mailman/listinfo/kexec
+ 2.20.1
 
-3480786d031e38d56246d5b1f7dbbed65b0320d1694f59f4b1c0383abf3c88e5
+9d60c1b15e6d3bda197e32b7eeb1e7c404c3bbf912bbdeac62252315f145e5c1

diff --git a/a/1.txt b/N2/1.txt
index dd36c2a..e71e081 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -87,9 +87,3 @@ index cfa4730d607a..018fb5f13d44 100644
   * The use to which an asymmetric key is being put.
 -- 
 2.20.1
-
-
-_______________________________________________
-kexec mailing list
-kexec@lists.infradead.org
-http://lists.infradead.org/mailman/listinfo/kexec
diff --git a/a/content_digest b/N2/content_digest
index 3f013da..39cde39 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -3,20 +3,20 @@
  "Subject\0[RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify\0"
  "Date\0Thu, 10 Jan 2019 00:48:24 +0800\0"
  "To\0linux-kernel@vger.kernel.org\0"
- "Cc\0jwboyer@fedoraproject.org"
-  Kairui Song <kasong@redhat.com>
-  ebiggers@google.com
-  dyoung@redhat.com
-  nayna@linux.ibm.com
-  kexec@lists.infradead.org
+ "Cc\0dhowells@redhat.com"
+  dwmw2@infradead.org
+  jwboyer@fedoraproject.org
+  keyrings@vger.kernel.org
   jmorris@namei.org
+  serge@hallyn.com
   zohar@linux.ibm.com
-  dhowells@redhat.com
-  keyrings@vger.kernel.org
-  linux-integrity@vger.kernel.org
-  dwmw2@infradead.org
   bauerman@linux.ibm.com
- " serge@hallyn.com\0"
+  ebiggers@google.com
+  nayna@linux.ibm.com
+  dyoung@redhat.com
+  linux-integrity@vger.kernel.org
+  kexec@lists.infradead.org
+ " Kairui Song <kasong@redhat.com>\0"
  "\00:1\0"
  "b\0"
  "kexec_file_load will need to verify the kernel signed with third part\n"
@@ -107,12 +107,6 @@
  " /*\n"
  "  * The use to which an asymmetric key is being put.\n"
  "-- \n"
- "2.20.1\n"
- "\n"
- "\n"
- "_______________________________________________\n"
- "kexec mailing list\n"
- "kexec@lists.infradead.org\n"
- http://lists.infradead.org/mailman/listinfo/kexec
+ 2.20.1
 
-3480786d031e38d56246d5b1f7dbbed65b0320d1694f59f4b1c0383abf3c88e5
+ccfc36cbeb2a0864386d83d8e8047984acb3526c3b203a148fdc1f9e738cbf2c

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.