All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <CA+5PVA43eM0Ah6G=Npu-w-g3FX4MoRSd0guFDGuq6+ns8cBzcw@mail.gmail.com>

diff --git a/a/1.txt b/N1/1.txt
index 99b20aa..e1d8682 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,6 +1,6 @@
-On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook@chromium.org> wrote:
+On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> wrote:
 > On Tue, Sep 3, 2013 at 4:50 PM, Matthew Garrett
-> <matthew.garrett@nebula.com> wrote:
+> <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA@public.gmane.org> wrote:
 >> We have two in-kernel mechanisms for restricting module loading - disabling
 >> it entirely, or limiting it to the loading of modules signed with a trusted
 >> key. These can both be configured in such a way that even root is unable to
@@ -22,7 +22,7 @@ On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook@chromium.org> wrote:
 >
 > Looks good to me. Consider the entire series:
 >
-> Acked-by: Kees Cook <keescook@chromium.org>
+> Acked-by: Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>
 
 I spent yesterday rebasing and testing Fedora 20 secure boot support
 to this series, and things have tested out fine on both SB and non-SB
@@ -30,7 +30,7 @@ enabled machines.
 
 For the series:
 
-Reviewed-by: Josh Boyer <jwboyer@fedoraproject.org>
-Tested-by: Josh Boyer <jwboyer@fedoraproject.org>
+Reviewed-by: Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy@public.gmane.org>
+Tested-by: Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy@public.gmane.org>
 
 josh
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index f2a5eeb..377eaf2 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -5,7 +5,10 @@
   "ref\0CAGXu5jLCTU1MG4fYDzpT=TAP9DRAUuRuhZNB+edJsOzN4iXbDw\@mail.gmail.com\0"
 ]
 [
-  "From\0Josh Boyer <jwboyer\@fedoraproject.org>\0"
+  "ref\0CAGXu5jLCTU1MG4fYDzpT=TAP9DRAUuRuhZNB+edJsOzN4iXbDw-JsoAwUIsXosN+BqQ9rBEUg\@public.gmane.org\0"
+]
+[
+  "From\0Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy\@public.gmane.org>\0"
 ]
 [
   "Subject\0Re:\0"
@@ -14,13 +17,13 @@
   "Date\0Wed, 4 Sep 2013 12:05:53 -0400\0"
 ]
 [
-  "To\0Kees Cook <keescook\@chromium.org>\0"
+  "To\0Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>\0"
 ]
 [
-  "Cc\0Matthew Garrett <matthew.garrett\@nebula.com>",
-  " LKML <linux-kernel\@vger.kernel.org>",
-  " linux-efi\@vger.kernel.org <linux-efi\@vger.kernel.org>",
-  " H. Peter Anvin <hpa\@zytor.com>\0"
+  "Cc\0Matthew Garrett <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA\@public.gmane.org>",
+  " LKML <linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+  " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org <linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+  " H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>\0"
 ]
 [
   "\0000:1\0"
@@ -29,9 +32,9 @@
   "b\0"
 ]
 [
-  "On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook\@chromium.org> wrote:\n",
+  "On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org> wrote:\n",
   "> On Tue, Sep 3, 2013 at 4:50 PM, Matthew Garrett\n",
-  "> <matthew.garrett\@nebula.com> wrote:\n",
+  "> <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA\@public.gmane.org> wrote:\n",
   ">> We have two in-kernel mechanisms for restricting module loading - disabling\n",
   ">> it entirely, or limiting it to the loading of modules signed with a trusted\n",
   ">> key. These can both be configured in such a way that even root is unable to\n",
@@ -53,7 +56,7 @@
   ">\n",
   "> Looks good to me. Consider the entire series:\n",
   ">\n",
-  "> Acked-by: Kees Cook <keescook\@chromium.org>\n",
+  "> Acked-by: Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>\n",
   "\n",
   "I spent yesterday rebasing and testing Fedora 20 secure boot support\n",
   "to this series, and things have tested out fine on both SB and non-SB\n",
@@ -61,10 +64,10 @@
   "\n",
   "For the series:\n",
   "\n",
-  "Reviewed-by: Josh Boyer <jwboyer\@fedoraproject.org>\n",
-  "Tested-by: Josh Boyer <jwboyer\@fedoraproject.org>\n",
+  "Reviewed-by: Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy\@public.gmane.org>\n",
+  "Tested-by: Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy\@public.gmane.org>\n",
   "\n",
   "josh"
 ]
 
-cbf0093bee75bdaf82e2f3226a1bd72c9915f26ab2a190cd7880f775c9ca3caf
+8bdf72b5b8b07aa320bb44620d40e1ee6d658c99da27dccc8717c31046977f8d

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.