Linux Integrity Measurement development
 help / color / mirror / Atom feed
* [PATCH v2 ima-evm-utils 1/3] initialize errno in cmd_sign_hash()
@ 2022-05-12 18:30 Mimi Zohar
  2022-05-12 18:30 ` [PATCH v2 ima-evm-utils 2/3] Sign an fs-verity file digest Mimi Zohar
                   ` (2 more replies)
  0 siblings, 3 replies; 9+ messages in thread
From: Mimi Zohar @ 2022-05-12 18:30 UTC (permalink / raw)
  To: linux-integrity; +Cc: Mimi Zohar, Eric Biggers, Stefan Berger

Prevent "errno: No such file or directory (2)" message.

Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
---
 src/evmctl.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/src/evmctl.c b/src/evmctl.c
index 8bdd34817408..ca9449498321 100644
--- a/src/evmctl.c
+++ b/src/evmctl.c
@@ -737,6 +737,7 @@ static int cmd_sign_hash(struct command *cmd)
 	unsigned char sig[MAX_SIGNATURE_SIZE] = "\x03";
 	int siglen;
 
+	errno = 0;
 	key = imaevm_params.keyfile ? : "/etc/keys/privkey_evm.pem";
 
 	/* support reading hash (eg. output of shasum) */
-- 
2.27.0


^ permalink raw reply related	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2022-05-17 23:13 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-05-12 18:30 [PATCH v2 ima-evm-utils 1/3] initialize errno in cmd_sign_hash() Mimi Zohar
2022-05-12 18:30 ` [PATCH v2 ima-evm-utils 2/3] Sign an fs-verity file digest Mimi Zohar
2022-05-12 21:48   ` Stefan Berger
2022-05-13 12:12     ` Mimi Zohar
2022-05-17 23:13   ` Eric Biggers
2022-05-12 18:30 ` [PATCH v2 ima-evm-utils 3/3] Verify an fs-verity file digest based signature Mimi Zohar
2022-05-13 14:41   ` Stefan Berger
2022-05-12 19:14 ` [PATCH v2 ima-evm-utils 1/3] initialize errno in cmd_sign_hash() Stefan Berger
2022-05-12 22:24   ` Mimi Zohar

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox