lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <1547223220.19931.471.camel@linux.ibm.com> Date: Fri, 11 Jan 2019 11:13:40 -0500 From: Mimi Zohar <zohar@...ux.ibm.com> To: Dave Young <dyoung@...hat.com>, Kairui Song <kasong@...hat.com> Cc: linux-kernel@...r.kernel.org, dhowells@...hat.com, dwmw2@...radead.org, jwboyer@...oraproject.org, keyrings@...r.kernel.org, jmorris@...ei.org, serge@...lyn.com, bauerman@...ux.ibm.com, ebiggers@...gle.com, nayna@...ux.ibm.com, linux-integrity@...r.kernel.org, kexec@...ts.infradead.org Subject: Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify On Fri, 2019-01-11 at 21:43 +0800, Dave Young wrote: [snip] > Personally I would like to see platform key separated from integrity. > But for the kexec_file part I think it is good at least it works with > this fix. > > Acked-by: Dave Young <dyoung@...hat.com> The original "platform" keyring patches that Nayna posted multiple times were in the certs directory, but nobody commented/responded. So she reworked the patches, moving them to the integrity directory and posted them (cc'ing the kexec mailing list). It's a bit late to be asking to move it, isn't it? Mimi
Powered by blists - more mailing lists