All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20190315135128.GL11334@mit.edu>

diff --git a/a/1.txt b/N1/1.txt
index 449fa39..f85d5b9 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,7 +1,7 @@
 On Fri, Mar 15, 2019 at 08:48:10AM +0100, Richard Weinberger wrote:
 > Ted,
 > 
-> Am Freitag, 15. M�rz 2019, 00:07:02 CET schrieb Theodore Ts'o:
+> Am Freitag, 15. März 2019, 00:07:02 CET schrieb Theodore Ts'o:
 > > Richard --- stepping back for a moment, in your use case, are you
 > > assuming that the encryption key is always going to be present while
 > > the system is running?
@@ -12,7 +12,7 @@ On Fri, Mar 15, 2019 at 08:48:10AM +0100, Richard Weinberger wrote:
 > Well, fscrypt was chosen as UBIFS encryption backend because per-file encryption
 > with derived keys makes a lot of sense.
 > Also the implementation was not super hard, David and I weren't keen to reinvent
-> dm-crypt f�r UBI/MTD.
+> dm-crypt für UBI/MTD.
 > 
 > That said, I'm happy with fscrypt, it works well in production.
 
@@ -38,3 +38,7 @@ user of fscrypt.  :-)
 Cheers,
 
 						- Ted
+
+______________________________________________________
+Linux MTD discussion mailing list
+http://lists.infradead.org/mailman/listinfo/linux-mtd/
diff --git a/a/content_digest b/N1/content_digest
index 65bb0a1..b9339ea 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -6,23 +6,23 @@
  "Subject\0Re: [PATCH 4/4] ubifs: Implement new mount option, fscrypt_key_required\0"
  "Date\0Fri, 15 Mar 2019 09:51:28 -0400\0"
  "To\0Richard Weinberger <richard@nod.at>\0"
- "Cc\0Eric Biggers <ebiggers@kernel.org>"
-  linux-mtd@lists.infradead.org
-  linux-fscrypt@vger.kernel.org
-  jaegeuk@kernel.org
-  linux-unionfs@vger.kernel.org
+ "Cc\0paullawrence@google.com"
   miklos@szeredi.hu
   amir73il@gmail.com
-  linux-fsdevel@vger.kernel.org
+  linux-unionfs@vger.kernel.org
   linux-kernel@vger.kernel.org
-  paullawrence@google.com
+  Eric Biggers <ebiggers@kernel.org>
+  linux-fscrypt@vger.kernel.org
+  linux-mtd@lists.infradead.org
+  linux-fsdevel@vger.kernel.org
+  jaegeuk@kernel.org
  " James.Bottomley@hansenpartnership.com\0"
  "\00:1\0"
  "b\0"
  "On Fri, Mar 15, 2019 at 08:48:10AM +0100, Richard Weinberger wrote:\n"
  "> Ted,\n"
  "> \n"
- "> Am Freitag, 15. M\303\257\302\277\302\275rz 2019, 00:07:02 CET schrieb Theodore Ts'o:\n"
+ "> Am Freitag, 15. M\303\244rz 2019, 00:07:02 CET schrieb Theodore Ts'o:\n"
  "> > Richard --- stepping back for a moment, in your use case, are you\n"
  "> > assuming that the encryption key is always going to be present while\n"
  "> > the system is running?\n"
@@ -33,7 +33,7 @@
  "> Well, fscrypt was chosen as UBIFS encryption backend because per-file encryption\n"
  "> with derived keys makes a lot of sense.\n"
  "> Also the implementation was not super hard, David and I weren't keen to reinvent\n"
- "> dm-crypt f\303\257\302\277\302\275r UBI/MTD.\n"
+ "> dm-crypt f\303\274r UBI/MTD.\n"
  "> \n"
  "> That said, I'm happy with fscrypt, it works well in production.\n"
  "\n"
@@ -58,6 +58,10 @@
  "\n"
  "Cheers,\n"
  "\n"
- "\t\t\t\t\t\t- Ted"
+ "\t\t\t\t\t\t- Ted\n"
+ "\n"
+ "______________________________________________________\n"
+ "Linux MTD discussion mailing list\n"
+ http://lists.infradead.org/mailman/listinfo/linux-mtd/
 
-53743739000716adc15163849a7dcac960bc9c6760131e8d3221e49752bdb781
+06979fbf7b6b44d05f016105c4c371240fe125aae1435b26b647cb3937651852

diff --git a/a/1.txt b/N2/1.txt
index 449fa39..be90a1d 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,7 +1,7 @@
 On Fri, Mar 15, 2019 at 08:48:10AM +0100, Richard Weinberger wrote:
 > Ted,
 > 
-> Am Freitag, 15. M�rz 2019, 00:07:02 CET schrieb Theodore Ts'o:
+> Am Freitag, 15. März 2019, 00:07:02 CET schrieb Theodore Ts'o:
 > > Richard --- stepping back for a moment, in your use case, are you
 > > assuming that the encryption key is always going to be present while
 > > the system is running?
@@ -12,7 +12,7 @@ On Fri, Mar 15, 2019 at 08:48:10AM +0100, Richard Weinberger wrote:
 > Well, fscrypt was chosen as UBIFS encryption backend because per-file encryption
 > with derived keys makes a lot of sense.
 > Also the implementation was not super hard, David and I weren't keen to reinvent
-> dm-crypt f�r UBI/MTD.
+> dm-crypt für UBI/MTD.
 > 
 > That said, I'm happy with fscrypt, it works well in production.
 
diff --git a/a/content_digest b/N2/content_digest
index 65bb0a1..dc13ad2 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -22,7 +22,7 @@
  "On Fri, Mar 15, 2019 at 08:48:10AM +0100, Richard Weinberger wrote:\n"
  "> Ted,\n"
  "> \n"
- "> Am Freitag, 15. M\303\257\302\277\302\275rz 2019, 00:07:02 CET schrieb Theodore Ts'o:\n"
+ "> Am Freitag, 15. M\303\244rz 2019, 00:07:02 CET schrieb Theodore Ts'o:\n"
  "> > Richard --- stepping back for a moment, in your use case, are you\n"
  "> > assuming that the encryption key is always going to be present while\n"
  "> > the system is running?\n"
@@ -33,7 +33,7 @@
  "> Well, fscrypt was chosen as UBIFS encryption backend because per-file encryption\n"
  "> with derived keys makes a lot of sense.\n"
  "> Also the implementation was not super hard, David and I weren't keen to reinvent\n"
- "> dm-crypt f\303\257\302\277\302\275r UBI/MTD.\n"
+ "> dm-crypt f\303\274r UBI/MTD.\n"
  "> \n"
  "> That said, I'm happy with fscrypt, it works well in production.\n"
  "\n"
@@ -60,4 +60,4 @@
  "\n"
  "\t\t\t\t\t\t- Ted"
 
-53743739000716adc15163849a7dcac960bc9c6760131e8d3221e49752bdb781
+b6f5c38cd49eedda6c34d5b2271e4d08f0bb8e850939579cc8895bcfc0a2a1f4

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.