* [PATCH 1/2] testsuite: fix modinfo test without openssl
@ 2019-02-04 22:32 Lucas De Marchi
2019-02-04 22:32 ` [PATCH 2/2] build: enable openssl by default Lucas De Marchi
2019-02-04 22:41 ` [PATCH 1/2] testsuite: fix modinfo test without openssl Yauheni Kaliuta
0 siblings, 2 replies; 4+ messages in thread
From: Lucas De Marchi @ 2019-02-04 22:32 UTC (permalink / raw)
To: linux-modules; +Cc: Yauheni Kaliuta
---
.../correct-sig_hashalgo-openssl.txt | 3 +++
.../test-modinfo/correct-sig_hashalgo.txt | 3 ++-
.../test-modinfo/correct-sig_key-openssl.txt | 3 +++
.../test-modinfo/correct-sig_key.txt | 2 +-
.../test-modinfo/correct-signer-openssl.txt | 3 +++
.../test-modinfo/correct-signer.txt | 2 +-
testsuite/test-modinfo.c | 16 ++++++++++++----
7 files changed, 25 insertions(+), 7 deletions(-)
create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
new file mode 100644
index 0000000..f97c4fa
--- /dev/null
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
@@ -0,0 +1,3 @@
+sha1
+sha256
+sha256
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
index f97c4fa..23cb933 100644
--- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
@@ -1,3 +1,4 @@
sha1
sha256
-sha256
+unknown
+
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
new file mode 100644
index 0000000..25a75a8
--- /dev/null
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
@@ -0,0 +1,3 @@
+E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
+E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
+26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
index 25a75a8..7dc4c6a 100644
--- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
@@ -1,3 +1,3 @@
E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
-26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
+
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
new file mode 100644
index 0000000..2b979f9
--- /dev/null
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
@@ -0,0 +1,3 @@
+Magrathea: Glacier signing key
+Magrathea: Glacier signing key
+Build time autogenerated kernel key
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
index 2b979f9..afe83df 100644
--- a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
@@ -1,3 +1,3 @@
Magrathea: Glacier signing key
Magrathea: Glacier signing key
-Build time autogenerated kernel key
+
diff --git a/testsuite/test-modinfo.c b/testsuite/test-modinfo.c
index 504d9dd..373dc95 100644
--- a/testsuite/test-modinfo.c
+++ b/testsuite/test-modinfo.c
@@ -27,7 +27,7 @@
static const char *progname = ABS_TOP_BUILDDIR "/tools/modinfo";
-#define DEFINE_MODINFO_TEST(_field, ...) \
+#define DEFINE_MODINFO_TEST(_field, _flavor, ...) \
static noreturn int test_modinfo_##_field(const struct test *t) \
{ \
const char *const args[] = { \
@@ -44,20 +44,28 @@ DEFINE_TEST(test_modinfo_##_field, \
[TC_ROOTFS] = TESTSUITE_ROOTFS "test-modinfo/", \
}, \
.output = { \
- .out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field ".txt", \
+ .out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field #_flavor ".txt", \
})
#define DEFINE_MODINFO_GENERIC_TEST(_field) \
- DEFINE_MODINFO_TEST(_field, \
+ DEFINE_MODINFO_TEST(_field, , \
"/mod-simple-i386.ko", \
"/mod-simple-x86_64.ko", \
"/mod-simple-sparc64.ko")
+#ifdef ENABLE_OPENSSL
#define DEFINE_MODINFO_SIGN_TEST(_field) \
- DEFINE_MODINFO_TEST(_field, \
+ DEFINE_MODINFO_TEST(_field, -openssl, \
"/mod-simple-sha1.ko", \
"/mod-simple-sha256.ko", \
"/mod-simple-pkcs7.ko")
+#else
+#define DEFINE_MODINFO_SIGN_TEST(_field) \
+ DEFINE_MODINFO_TEST(_field, , \
+ "/mod-simple-sha1.ko", \
+ "/mod-simple-sha256.ko", \
+ "/mod-simple-pkcs7.ko")
+#endif
DEFINE_MODINFO_GENERIC_TEST(filename);
DEFINE_MODINFO_GENERIC_TEST(author);
--
2.20.0
^ permalink raw reply related [flat|nested] 4+ messages in thread
* [PATCH 2/2] build: enable openssl by default
2019-02-04 22:32 [PATCH 1/2] testsuite: fix modinfo test without openssl Lucas De Marchi
@ 2019-02-04 22:32 ` Lucas De Marchi
2019-02-04 22:41 ` [PATCH 1/2] testsuite: fix modinfo test without openssl Yauheni Kaliuta
1 sibling, 0 replies; 4+ messages in thread
From: Lucas De Marchi @ 2019-02-04 22:32 UTC (permalink / raw)
To: linux-modules; +Cc: Yauheni Kaliuta
Like with other features, let's enable it for developers.
---
autogen.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/autogen.sh b/autogen.sh
index e003f78..67b119f 100755
--- a/autogen.sh
+++ b/autogen.sh
@@ -32,7 +32,7 @@ fi
cd $oldpwd
-hackargs="--enable-debug --enable-python --with-xz --with-zlib"
+hackargs="--enable-debug --enable-python --with-xz --with-zlib --with-openssl"
if [ "x$1" = "xc" ]; then
shift
--
2.20.0
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH 1/2] testsuite: fix modinfo test without openssl
2019-02-04 22:32 [PATCH 1/2] testsuite: fix modinfo test without openssl Lucas De Marchi
2019-02-04 22:32 ` [PATCH 2/2] build: enable openssl by default Lucas De Marchi
@ 2019-02-04 22:41 ` Yauheni Kaliuta
2019-02-05 21:01 ` Lucas De Marchi
1 sibling, 1 reply; 4+ messages in thread
From: Yauheni Kaliuta @ 2019-02-04 22:41 UTC (permalink / raw)
To: Lucas De Marchi; +Cc: linux-modules
Hi, Lucas!
Oops :)
Thanks for fixing that!
>>>>> On Mon, 4 Feb 2019 14:32:48 -0800, Lucas De Marchi wrote:
> ---
> .../correct-sig_hashalgo-openssl.txt | 3 +++
> .../test-modinfo/correct-sig_hashalgo.txt | 3 ++-
> .../test-modinfo/correct-sig_key-openssl.txt | 3 +++
> .../test-modinfo/correct-sig_key.txt | 2 +-
> .../test-modinfo/correct-signer-openssl.txt | 3 +++
> .../test-modinfo/correct-signer.txt | 2 +-
> testsuite/test-modinfo.c | 16 ++++++++++++----
> 7 files changed, 25 insertions(+), 7 deletions(-)
> create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
> create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
> create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
> diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
> new file mode 100644
> index 0000000..f97c4fa
> --- /dev/null
> +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
> @@ -0,0 +1,3 @@
> +sha1
> +sha256
> +sha256
> diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
> index f97c4fa..23cb933 100644
> --- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
> +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
> @@ -1,3 +1,4 @@
> sha1
> sha256
> -sha256
> +unknown
> +
> diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
> new file mode 100644
> index 0000000..25a75a8
> --- /dev/null
> +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
> @@ -0,0 +1,3 @@
> +E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
> +E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
> +26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
> diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
> index 25a75a8..7dc4c6a 100644
> --- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
> +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
> @@ -1,3 +1,3 @@
> E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
> E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
> -26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
> +
> diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
> new file mode 100644
> index 0000000..2b979f9
> --- /dev/null
> +++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
> @@ -0,0 +1,3 @@
> +Magrathea: Glacier signing key
> +Magrathea: Glacier signing key
> +Build time autogenerated kernel key
> diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
> index 2b979f9..afe83df 100644
> --- a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
> +++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
> @@ -1,3 +1,3 @@
> Magrathea: Glacier signing key
> Magrathea: Glacier signing key
> -Build time autogenerated kernel key
> +
> diff --git a/testsuite/test-modinfo.c b/testsuite/test-modinfo.c
> index 504d9dd..373dc95 100644
> --- a/testsuite/test-modinfo.c
> +++ b/testsuite/test-modinfo.c
> @@ -27,7 +27,7 @@
> static const char *progname = ABS_TOP_BUILDDIR "/tools/modinfo";
> -#define DEFINE_MODINFO_TEST(_field, ...) \
> +#define DEFINE_MODINFO_TEST(_field, _flavor, ...) \
> static noreturn int test_modinfo_##_field(const struct test *t) \
> { \
> const char *const args[] = { \
> @@ -44,20 +44,28 @@ DEFINE_TEST(test_modinfo_##_field, \
> [TC_ROOTFS] = TESTSUITE_ROOTFS "test-modinfo/", \
> }, \
> .output = { \
> - .out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field ".txt", \
> + .out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field #_flavor ".txt", \
> })
> #define DEFINE_MODINFO_GENERIC_TEST(_field) \
> - DEFINE_MODINFO_TEST(_field, \
> + DEFINE_MODINFO_TEST(_field, , \
> "/mod-simple-i386.ko", \
> "/mod-simple-x86_64.ko", \
> "/mod-simple-sparc64.ko")
> +#ifdef ENABLE_OPENSSL
> #define DEFINE_MODINFO_SIGN_TEST(_field) \
> - DEFINE_MODINFO_TEST(_field, \
> + DEFINE_MODINFO_TEST(_field, -openssl, \
> "/mod-simple-sha1.ko", \
> "/mod-simple-sha256.ko", \
> "/mod-simple-pkcs7.ko")
> +#else
> +#define DEFINE_MODINFO_SIGN_TEST(_field) \
> + DEFINE_MODINFO_TEST(_field, , \
> + "/mod-simple-sha1.ko", \
> + "/mod-simple-sha256.ko", \
> + "/mod-simple-pkcs7.ko")
> +#endif
> DEFINE_MODINFO_GENERIC_TEST(filename);
> DEFINE_MODINFO_GENERIC_TEST(author);
> --
> 2.20.0
--
WBR,
Yauheni Kaliuta
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH 1/2] testsuite: fix modinfo test without openssl
2019-02-04 22:41 ` [PATCH 1/2] testsuite: fix modinfo test without openssl Yauheni Kaliuta
@ 2019-02-05 21:01 ` Lucas De Marchi
0 siblings, 0 replies; 4+ messages in thread
From: Lucas De Marchi @ 2019-02-05 21:01 UTC (permalink / raw)
To: Yauheni Kaliuta; +Cc: Lucas De Marchi, linux-modules
On Mon, Feb 4, 2019 at 3:18 PM Yauheni Kaliuta
<yauheni.kaliuta@redhat.com> wrote:
>
> Hi, Lucas!
>
> Oops :)
>
> Thanks for fixing that!
These are pushed, together with your patches and other 2 to enable
tests on CI/mkosi
Lucas De Marchi
>
> >>>>> On Mon, 4 Feb 2019 14:32:48 -0800, Lucas De Marchi wrote:
>
> > ---
> > .../correct-sig_hashalgo-openssl.txt | 3 +++
> > .../test-modinfo/correct-sig_hashalgo.txt | 3 ++-
> > .../test-modinfo/correct-sig_key-openssl.txt | 3 +++
> > .../test-modinfo/correct-sig_key.txt | 2 +-
> > .../test-modinfo/correct-signer-openssl.txt | 3 +++
> > .../test-modinfo/correct-signer.txt | 2 +-
> > testsuite/test-modinfo.c | 16 ++++++++++++----
> > 7 files changed, 25 insertions(+), 7 deletions(-)
> > create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
> > create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
> > create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
>
> > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
> > new file mode 100644
> > index 0000000..f97c4fa
> > --- /dev/null
> > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
> > @@ -0,0 +1,3 @@
> > +sha1
> > +sha256
> > +sha256
> > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
> > index f97c4fa..23cb933 100644
> > --- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
> > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
> > @@ -1,3 +1,4 @@
> > sha1
> > sha256
> > -sha256
> > +unknown
> > +
> > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
> > new file mode 100644
> > index 0000000..25a75a8
> > --- /dev/null
> > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
> > @@ -0,0 +1,3 @@
> > +E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
> > +E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
> > +26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
> > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
> > index 25a75a8..7dc4c6a 100644
> > --- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
> > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
> > @@ -1,3 +1,3 @@
> > E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
> > E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
> > -26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
> > +
> > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
> > new file mode 100644
> > index 0000000..2b979f9
> > --- /dev/null
> > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
> > @@ -0,0 +1,3 @@
> > +Magrathea: Glacier signing key
> > +Magrathea: Glacier signing key
> > +Build time autogenerated kernel key
> > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
> > index 2b979f9..afe83df 100644
> > --- a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
> > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
> > @@ -1,3 +1,3 @@
> > Magrathea: Glacier signing key
> > Magrathea: Glacier signing key
> > -Build time autogenerated kernel key
> > +
> > diff --git a/testsuite/test-modinfo.c b/testsuite/test-modinfo.c
> > index 504d9dd..373dc95 100644
> > --- a/testsuite/test-modinfo.c
> > +++ b/testsuite/test-modinfo.c
> > @@ -27,7 +27,7 @@
>
> > static const char *progname = ABS_TOP_BUILDDIR "/tools/modinfo";
>
> > -#define DEFINE_MODINFO_TEST(_field, ...) \
> > +#define DEFINE_MODINFO_TEST(_field, _flavor, ...) \
> > static noreturn int test_modinfo_##_field(const struct test *t) \
> > { \
> > const char *const args[] = { \
> > @@ -44,20 +44,28 @@ DEFINE_TEST(test_modinfo_##_field, \
> > [TC_ROOTFS] = TESTSUITE_ROOTFS "test-modinfo/", \
> > }, \
> > .output = { \
> > - .out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field ".txt", \
> > + .out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field #_flavor ".txt", \
> > })
>
> > #define DEFINE_MODINFO_GENERIC_TEST(_field) \
> > - DEFINE_MODINFO_TEST(_field, \
> > + DEFINE_MODINFO_TEST(_field, , \
> > "/mod-simple-i386.ko", \
> > "/mod-simple-x86_64.ko", \
> > "/mod-simple-sparc64.ko")
>
> > +#ifdef ENABLE_OPENSSL
> > #define DEFINE_MODINFO_SIGN_TEST(_field) \
> > - DEFINE_MODINFO_TEST(_field, \
> > + DEFINE_MODINFO_TEST(_field, -openssl, \
> > "/mod-simple-sha1.ko", \
> > "/mod-simple-sha256.ko", \
> > "/mod-simple-pkcs7.ko")
> > +#else
> > +#define DEFINE_MODINFO_SIGN_TEST(_field) \
> > + DEFINE_MODINFO_TEST(_field, , \
> > + "/mod-simple-sha1.ko", \
> > + "/mod-simple-sha256.ko", \
> > + "/mod-simple-pkcs7.ko")
> > +#endif
>
> > DEFINE_MODINFO_GENERIC_TEST(filename);
> > DEFINE_MODINFO_GENERIC_TEST(author);
> > --
> > 2.20.0
>
>
> --
> WBR,
> Yauheni Kaliuta
--
Lucas De Marchi
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2019-02-05 21:02 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-02-04 22:32 [PATCH 1/2] testsuite: fix modinfo test without openssl Lucas De Marchi
2019-02-04 22:32 ` [PATCH 2/2] build: enable openssl by default Lucas De Marchi
2019-02-04 22:41 ` [PATCH 1/2] testsuite: fix modinfo test without openssl Yauheni Kaliuta
2019-02-05 21:01 ` Lucas De Marchi
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).