diff for duplicates of <20190418035120.2354-2-bauerman@linux.ibm.com> diff --git a/a/1.txt b/N1/1.txt index cf053ec..dfe80a9 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -232,7 +232,7 @@ index 6b9a926fd86b..cdd04a6b8074 100644 size_t sig_len, modlen = info->len; + int ret; - pr_devel("=>%s(,%zu)\n", __func__, modlen); + pr_devel("==>%s(,%zu)\n", __func__, modlen); @@ -56,32 +33,15 @@ int mod_verify_sig(const void *mod, struct load_info *info) return -EBADMSG; diff --git a/a/content_digest b/N1/content_digest index 4417ba8..2f7bcb8 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,7 +1,7 @@ "ref\020190418035120.2354-1-bauerman@linux.ibm.com\0" "From\0Thiago Jung Bauermann <bauerman@linux.ibm.com>\0" "Subject\0[PATCH v10 01/12] MODSIGN: Export module signature definitions\0" - "Date\0Thu, 18 Apr 2019 03:51:09 +0000\0" + "Date\0Thu, 18 Apr 2019 00:51:09 -0300\0" "To\0linux-integrity@vger.kernel.org\0" "Cc\0linux-security-module@vger.kernel.org" keyrings@vger.kernel.org @@ -258,7 +258,7 @@ " \tsize_t sig_len, modlen = info->len;\n" "+\tint ret;\n" " \n" - " \tpr_devel(\"=>%s(,%zu)\\n\", __func__, modlen);\n" + " \tpr_devel(\"==>%s(,%zu)\\n\", __func__, modlen);\n" " \n" "@@ -56,32 +33,15 @@ int mod_verify_sig(const void *mod, struct load_info *info)\n" " \t\treturn -EBADMSG;\n" @@ -311,4 +311,4 @@ " hostprogs-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert\n" hostprogs-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert -e50bd19a0fd656d2689a1bad8b651e72ae25b5addda7f798f901fd3fd02da6e8 +7404305945330cf694bc9043001444e44bcd06cc05d1fff51cb2799bac07b7bd
diff --git a/a/1.txt b/N2/1.txt index cf053ec..dfe80a9 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -232,7 +232,7 @@ index 6b9a926fd86b..cdd04a6b8074 100644 size_t sig_len, modlen = info->len; + int ret; - pr_devel("=>%s(,%zu)\n", __func__, modlen); + pr_devel("==>%s(,%zu)\n", __func__, modlen); @@ -56,32 +33,15 @@ int mod_verify_sig(const void *mod, struct load_info *info) return -EBADMSG; diff --git a/a/content_digest b/N2/content_digest index 4417ba8..72d74b2 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,27 +1,27 @@ "ref\020190418035120.2354-1-bauerman@linux.ibm.com\0" "From\0Thiago Jung Bauermann <bauerman@linux.ibm.com>\0" "Subject\0[PATCH v10 01/12] MODSIGN: Export module signature definitions\0" - "Date\0Thu, 18 Apr 2019 03:51:09 +0000\0" + "Date\0Thu, 18 Apr 2019 00:51:09 -0300\0" "To\0linux-integrity@vger.kernel.org\0" - "Cc\0linux-security-module@vger.kernel.org" - keyrings@vger.kernel.org - linux-crypto@vger.kernel.org - linuxppc-dev@lists.ozlabs.org + "Cc\0Herbert Xu <herbert@gondor.apana.org.au>" linux-doc@vger.kernel.org + Dmitry Kasatkin <dmitry.kasatkin@gmail.com> + David S. Miller <davem@davemloft.net> + Jonathan Corbet <corbet@lwn.net> linux-kernel@vger.kernel.org Mimi Zohar <zohar@linux.ibm.com> - Dmitry Kasatkin <dmitry.kasatkin@gmail.com> James Morris <jmorris@namei.org> - Serge E. Hallyn <serge@hallyn.com> David Howells <dhowells@redhat.com> - David Woodhouse <dwmw2@infradead.org> - Jessica Yu <jeyu@kernel.org> - Herbert Xu <herbert@gondor.apana.org.au> - David S. Miller <davem@davemloft.net> - Jonathan Corbet <corbet@lwn.net> AKASHI Takahiro <takahiro.akashi@linaro.org> - " Thiago Jung Bauermann <bauerman@linux.ibm.com>\0" + linux-security-module@vger.kernel.org + keyrings@vger.kernel.org + linux-crypto@vger.kernel.org + Jessica Yu <jeyu@kernel.org> + linuxppc-dev@lists.ozlabs.org + David Woodhouse <dwmw2@infradead.org> + Thiago Jung Bauermann <bauerman@linux.ibm.com> + " Serge E. Hallyn <serge@hallyn.com>\0" "\00:1\0" "b\0" "IMA will use the module_signature format for append signatures, so export\n" @@ -258,7 +258,7 @@ " \tsize_t sig_len, modlen = info->len;\n" "+\tint ret;\n" " \n" - " \tpr_devel(\"=>%s(,%zu)\\n\", __func__, modlen);\n" + " \tpr_devel(\"==>%s(,%zu)\\n\", __func__, modlen);\n" " \n" "@@ -56,32 +33,15 @@ int mod_verify_sig(const void *mod, struct load_info *info)\n" " \t\treturn -EBADMSG;\n" @@ -311,4 +311,4 @@ " hostprogs-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert\n" hostprogs-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert -e50bd19a0fd656d2689a1bad8b651e72ae25b5addda7f798f901fd3fd02da6e8 +25267800ec8fb47b6fda65a5b96285025e55bb70d127cf6436c9764a94b5596f
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.