diff for duplicates of <CA+5PVA43eM0Ah6G=Npu-w-g3FX4MoRSd0guFDGuq6+ns8cBzcw@mail.gmail.com>
diff --git a/a/1.txt b/N1/1.txt
index 99b20aa..e1d8682 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,6 +1,6 @@
-On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook@chromium.org> wrote:
+On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> wrote:
> On Tue, Sep 3, 2013 at 4:50 PM, Matthew Garrett
-> <matthew.garrett@nebula.com> wrote:
+> <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA@public.gmane.org> wrote:
>> We have two in-kernel mechanisms for restricting module loading - disabling
>> it entirely, or limiting it to the loading of modules signed with a trusted
>> key. These can both be configured in such a way that even root is unable to
@@ -22,7 +22,7 @@ On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook@chromium.org> wrote:
>
> Looks good to me. Consider the entire series:
>
-> Acked-by: Kees Cook <keescook@chromium.org>
+> Acked-by: Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>
I spent yesterday rebasing and testing Fedora 20 secure boot support
to this series, and things have tested out fine on both SB and non-SB
@@ -30,7 +30,7 @@ enabled machines.
For the series:
-Reviewed-by: Josh Boyer <jwboyer@fedoraproject.org>
-Tested-by: Josh Boyer <jwboyer@fedoraproject.org>
+Reviewed-by: Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy@public.gmane.org>
+Tested-by: Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy@public.gmane.org>
josh
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index f2a5eeb..377eaf2 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -5,7 +5,10 @@
"ref\0CAGXu5jLCTU1MG4fYDzpT=TAP9DRAUuRuhZNB+edJsOzN4iXbDw\@mail.gmail.com\0"
]
[
- "From\0Josh Boyer <jwboyer\@fedoraproject.org>\0"
+ "ref\0CAGXu5jLCTU1MG4fYDzpT=TAP9DRAUuRuhZNB+edJsOzN4iXbDw-JsoAwUIsXosN+BqQ9rBEUg\@public.gmane.org\0"
+]
+[
+ "From\0Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy\@public.gmane.org>\0"
]
[
"Subject\0Re:\0"
@@ -14,13 +17,13 @@
"Date\0Wed, 4 Sep 2013 12:05:53 -0400\0"
]
[
- "To\0Kees Cook <keescook\@chromium.org>\0"
+ "To\0Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>\0"
]
[
- "Cc\0Matthew Garrett <matthew.garrett\@nebula.com>",
- " LKML <linux-kernel\@vger.kernel.org>",
- " linux-efi\@vger.kernel.org <linux-efi\@vger.kernel.org>",
- " H. Peter Anvin <hpa\@zytor.com>\0"
+ "Cc\0Matthew Garrett <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA\@public.gmane.org>",
+ " LKML <linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+ " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org <linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+ " H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>\0"
]
[
"\0000:1\0"
@@ -29,9 +32,9 @@
"b\0"
]
[
- "On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook\@chromium.org> wrote:\n",
+ "On Wed, Sep 4, 2013 at 11:53 AM, Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org> wrote:\n",
"> On Tue, Sep 3, 2013 at 4:50 PM, Matthew Garrett\n",
- "> <matthew.garrett\@nebula.com> wrote:\n",
+ "> <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA\@public.gmane.org> wrote:\n",
">> We have two in-kernel mechanisms for restricting module loading - disabling\n",
">> it entirely, or limiting it to the loading of modules signed with a trusted\n",
">> key. These can both be configured in such a way that even root is unable to\n",
@@ -53,7 +56,7 @@
">\n",
"> Looks good to me. Consider the entire series:\n",
">\n",
- "> Acked-by: Kees Cook <keescook\@chromium.org>\n",
+ "> Acked-by: Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>\n",
"\n",
"I spent yesterday rebasing and testing Fedora 20 secure boot support\n",
"to this series, and things have tested out fine on both SB and non-SB\n",
@@ -61,10 +64,10 @@
"\n",
"For the series:\n",
"\n",
- "Reviewed-by: Josh Boyer <jwboyer\@fedoraproject.org>\n",
- "Tested-by: Josh Boyer <jwboyer\@fedoraproject.org>\n",
+ "Reviewed-by: Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy\@public.gmane.org>\n",
+ "Tested-by: Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy\@public.gmane.org>\n",
"\n",
"josh"
]
-cbf0093bee75bdaf82e2f3226a1bd72c9915f26ab2a190cd7880f775c9ca3caf
+8bdf72b5b8b07aa320bb44620d40e1ee6d658c99da27dccc8717c31046977f8d
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.