All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20190418035120.2354-2-bauerman@linux.ibm.com>

diff --git a/a/1.txt b/N1/1.txt
index cf053ec..dfe80a9 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -232,7 +232,7 @@ index 6b9a926fd86b..cdd04a6b8074 100644
  	size_t sig_len, modlen = info->len;
 +	int ret;
  
- 	pr_devel("=>%s(,%zu)\n", __func__, modlen);
+ 	pr_devel("==>%s(,%zu)\n", __func__, modlen);
  
 @@ -56,32 +33,15 @@ int mod_verify_sig(const void *mod, struct load_info *info)
  		return -EBADMSG;
diff --git a/a/content_digest b/N1/content_digest
index 4417ba8..2f7bcb8 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,7 +1,7 @@
  "ref\020190418035120.2354-1-bauerman@linux.ibm.com\0"
  "From\0Thiago Jung Bauermann <bauerman@linux.ibm.com>\0"
  "Subject\0[PATCH v10 01/12] MODSIGN: Export module signature definitions\0"
- "Date\0Thu, 18 Apr 2019 03:51:09 +0000\0"
+ "Date\0Thu, 18 Apr 2019 00:51:09 -0300\0"
  "To\0linux-integrity@vger.kernel.org\0"
  "Cc\0linux-security-module@vger.kernel.org"
   keyrings@vger.kernel.org
@@ -258,7 +258,7 @@
  " \tsize_t sig_len, modlen = info->len;\n"
  "+\tint ret;\n"
  " \n"
- " \tpr_devel(\"=>%s(,%zu)\\n\", __func__, modlen);\n"
+ " \tpr_devel(\"==>%s(,%zu)\\n\", __func__, modlen);\n"
  " \n"
  "@@ -56,32 +33,15 @@ int mod_verify_sig(const void *mod, struct load_info *info)\n"
  " \t\treturn -EBADMSG;\n"
@@ -311,4 +311,4 @@
  " hostprogs-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert\n"
   hostprogs-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert
 
-e50bd19a0fd656d2689a1bad8b651e72ae25b5addda7f798f901fd3fd02da6e8
+7404305945330cf694bc9043001444e44bcd06cc05d1fff51cb2799bac07b7bd

diff --git a/a/1.txt b/N2/1.txt
index cf053ec..dfe80a9 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -232,7 +232,7 @@ index 6b9a926fd86b..cdd04a6b8074 100644
  	size_t sig_len, modlen = info->len;
 +	int ret;
  
- 	pr_devel("=>%s(,%zu)\n", __func__, modlen);
+ 	pr_devel("==>%s(,%zu)\n", __func__, modlen);
  
 @@ -56,32 +33,15 @@ int mod_verify_sig(const void *mod, struct load_info *info)
  		return -EBADMSG;
diff --git a/a/content_digest b/N2/content_digest
index 4417ba8..72d74b2 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,27 +1,27 @@
  "ref\020190418035120.2354-1-bauerman@linux.ibm.com\0"
  "From\0Thiago Jung Bauermann <bauerman@linux.ibm.com>\0"
  "Subject\0[PATCH v10 01/12] MODSIGN: Export module signature definitions\0"
- "Date\0Thu, 18 Apr 2019 03:51:09 +0000\0"
+ "Date\0Thu, 18 Apr 2019 00:51:09 -0300\0"
  "To\0linux-integrity@vger.kernel.org\0"
- "Cc\0linux-security-module@vger.kernel.org"
-  keyrings@vger.kernel.org
-  linux-crypto@vger.kernel.org
-  linuxppc-dev@lists.ozlabs.org
+ "Cc\0Herbert Xu <herbert@gondor.apana.org.au>"
   linux-doc@vger.kernel.org
+  Dmitry Kasatkin <dmitry.kasatkin@gmail.com>
+  David S. Miller <davem@davemloft.net>
+  Jonathan Corbet <corbet@lwn.net>
   linux-kernel@vger.kernel.org
   Mimi Zohar <zohar@linux.ibm.com>
-  Dmitry Kasatkin <dmitry.kasatkin@gmail.com>
   James Morris <jmorris@namei.org>
-  Serge E. Hallyn <serge@hallyn.com>
   David Howells <dhowells@redhat.com>
-  David Woodhouse <dwmw2@infradead.org>
-  Jessica Yu <jeyu@kernel.org>
-  Herbert Xu <herbert@gondor.apana.org.au>
-  David S. Miller <davem@davemloft.net>
-  Jonathan Corbet <corbet@lwn.net>
   AKASHI
   Takahiro <takahiro.akashi@linaro.org>
- " Thiago Jung Bauermann <bauerman@linux.ibm.com>\0"
+  linux-security-module@vger.kernel.org
+  keyrings@vger.kernel.org
+  linux-crypto@vger.kernel.org
+  Jessica Yu <jeyu@kernel.org>
+  linuxppc-dev@lists.ozlabs.org
+  David Woodhouse <dwmw2@infradead.org>
+  Thiago Jung Bauermann <bauerman@linux.ibm.com>
+ " Serge E. Hallyn <serge@hallyn.com>\0"
  "\00:1\0"
  "b\0"
  "IMA will use the module_signature format for append signatures, so export\n"
@@ -258,7 +258,7 @@
  " \tsize_t sig_len, modlen = info->len;\n"
  "+\tint ret;\n"
  " \n"
- " \tpr_devel(\"=>%s(,%zu)\\n\", __func__, modlen);\n"
+ " \tpr_devel(\"==>%s(,%zu)\\n\", __func__, modlen);\n"
  " \n"
  "@@ -56,32 +33,15 @@ int mod_verify_sig(const void *mod, struct load_info *info)\n"
  " \t\treturn -EBADMSG;\n"
@@ -311,4 +311,4 @@
  " hostprogs-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert\n"
   hostprogs-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert
 
-e50bd19a0fd656d2689a1bad8b651e72ae25b5addda7f798f901fd3fd02da6e8
+25267800ec8fb47b6fda65a5b96285025e55bb70d127cf6436c9764a94b5596f

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.