lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 9 Sep 2011 10:20:04 +0530
From:	Shakthi Kannan <shakthimaan@...il.com>
To:	Michal Marek <mmarek@...e.cz>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: CRC calculation in Module.symvers

Hi Michal,

--- On Wed, Sep 7, 2011 at 6:24 PM, Michal Marek <mmarek@...e.cz> wrote:
| You need at least -include include/generated/autoconf.h
\--

I tried using:

$  gcc -E -D__GENKSYMS__ -DCONFIG_MODVERSIONS -DEXPORT_SYMTAB
crypto/api.c -I/tmp/linux-3.0.2/include
-I/tmp/linux-3.0.2/arch/x86/include -include
include/generated/autoconf.h  | ./scripts/genksyms/genksyms

and it returned the checksums like:

  __crc_crypto_alg_list = 0x86fb488e ;
  __crc_crypto_alg_sem = 0xb7865a4f ;
  __crc_crypto_chain = 0x2f947450 ;
  __crc_crypto_mod_get = 0x67cda209 ;
  ...

But, in Module.symvers there is only crypto_mod_get and its checksum
is 0x3286637f which is different from the one listed above.

---
| $ make V=1 crypto/api.symtypes
|
| this will generate a file with the symbol expansions.
\--

This generated the api.symtypes file.

---
| And if you copy
| the commandline without the >/dev/null redirection, you'll see the
| calculated checksums on standard output.
\--

Sorry, I didn't understand. Can you elaborate on what needs to be done here?

Thanks for your reply,

SK

-- 
Shakthi Kannan
http://www.shakthimaan.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ