lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20120220191820.GB6541@thunk.org>
Date:	Mon, 20 Feb 2012 14:18:20 -0500
From:	Ted Ts'o <tytso@....edu>
To:	Eric Sandeen <sandeen@...hat.com>
Cc:	Eric Sandeen <esandeen@...hat.com>,
	Phillip Susi <psusi@...ntu.com>,
	"linux-ext4@...r.kernel.org" <linux-ext4@...r.kernel.org>
Subject: Re: E2fsprogs 1.42.1 release

On Mon, Feb 20, 2012 at 01:01:52PM -0600, Eric Sandeen wrote:
> > The tarball is a little messed up:
> > 
> > [esandeen@...n e2fsprogs]$ tar xvzf e2fsprogs-1.42.1.tar.gz
> > e2fsprogs-libs-1.42.1/
> > e2fsprogs-libs-1.42.1/.gitignore
> > e2fsprogs-libs-1.42.1/.release-checklist
> > e2fsprogs-libs-1.42.1/lib/
> > 
> > why does it unpack into e2fsprogs-libs-1.42.1?
> >                                   ^^^^
> > 
> > I could work around that but it's unexpected.
> 
> Oh actually I can't work around it, it really is just the libs.

Whoops, kup screwup.  I uploaded e2fsprogs-1.42.tar.gz and
e2fsprogs-libs-1.42.tar.gz.... into the same destination file.  I just
fixed it on master.kernel.org; it should propagate over in 15 minutes
or so.

Or you can grab the files from sourceforge.  (Note that the
sourceforge tarballs are actually signed by me.  In contrast the
kernel.org tarballs are signed by the ftp.kernel.org machine key, and
the signature covers the uncompressed tar file.  That way they can use
the same signature file for the tar.gz and tar.bz2 tarball.)

    	 	   	    	       	   	   - Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ