lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f49f8d88-d7c1-3a78-115f-07b93d2eb160@huawei.com>
Date:   Tue, 2 Mar 2021 09:04:53 +0800
From:   yumeng <yumeng18@...wei.com>
To:     Mimi Zohar <zohar@...ux.ibm.com>,
        Stefan Berger <stefanb@...ux.vnet.ibm.com>,
        <keyrings@...r.kernel.org>, <linux-crypto@...r.kernel.org>,
        <davem@...emloft.net>, <herbert@...dor.apana.org.au>,
        <dhowells@...hat.com>
CC:     <linux-kernel@...r.kernel.org>, <patrick@...terwijk.org>,
        <linux-integrity@...r.kernel.org>,
        Stefan Berger <stefanb@...ux.ibm.com>
Subject: [PATCH v9 9/9] certs: Add support for using elliptic curve keys for
 signing modules



在 2021/3/1 21:11, Mimi Zohar 写道:
> On Sat, 2021-02-27 at 11:35 +0800, yumeng wrote:
>> 在 2021/2/26 0:08, Stefan Berger 写道:
>>> From: Stefan Berger <stefanb@...ux.ibm.com>
>>>
>>
>>> diff --git a/certs/Makefile b/certs/Makefile
>>> index 3fe6b73786fa..c487d7021c54 100644
>>> --- a/certs/Makefile
>>> +++ b/certs/Makefile
>>> @@ -69,6 +69,18 @@ else
>>>    SIGNER = -signkey $(obj)/signing_key.key
>>>    endif # CONFIG_IMA_APPRAISE_MODSIG
>>>    
>>
>> Is there anything wrong in this patch?
>> I can't apply it when I use 'git am '.
>> errors like below:
>>
>> error: certs/Kconfig: does not match index
>> error: patch failed: certs/Makefile:69
>> error: certs/Makefile: patch does not apply
>>
>> Thanks
> 
> Nothing wrong with the patch, just a dependency.  From the Change log:
>     - This patch builds on top Nayna's series for 'kernel build support
>     for loading the kernel module signing key'.
>     - https://lkml.org/lkml/2021/2/18/856
> 
> thanks,
> 
> Mimi
> 
> 

OK, thank you. Sorry for the noise.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ