linux-modules.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 1/2] testsuite: fix modinfo test without openssl
@ 2019-02-04 22:32 Lucas De Marchi
  2019-02-04 22:32 ` [PATCH 2/2] build: enable openssl by default Lucas De Marchi
  2019-02-04 22:41 ` [PATCH 1/2] testsuite: fix modinfo test without openssl Yauheni Kaliuta
  0 siblings, 2 replies; 4+ messages in thread
From: Lucas De Marchi @ 2019-02-04 22:32 UTC (permalink / raw)
  To: linux-modules; +Cc: Yauheni Kaliuta

---
 .../correct-sig_hashalgo-openssl.txt             |  3 +++
 .../test-modinfo/correct-sig_hashalgo.txt        |  3 ++-
 .../test-modinfo/correct-sig_key-openssl.txt     |  3 +++
 .../test-modinfo/correct-sig_key.txt             |  2 +-
 .../test-modinfo/correct-signer-openssl.txt      |  3 +++
 .../test-modinfo/correct-signer.txt              |  2 +-
 testsuite/test-modinfo.c                         | 16 ++++++++++++----
 7 files changed, 25 insertions(+), 7 deletions(-)
 create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
 create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
 create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt

diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
new file mode 100644
index 0000000..f97c4fa
--- /dev/null
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
@@ -0,0 +1,3 @@
+sha1
+sha256
+sha256
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
index f97c4fa..23cb933 100644
--- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
@@ -1,3 +1,4 @@
 sha1
 sha256
-sha256
+unknown
+
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
new file mode 100644
index 0000000..25a75a8
--- /dev/null
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
@@ -0,0 +1,3 @@
+E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
+E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
+26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
index 25a75a8..7dc4c6a 100644
--- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
@@ -1,3 +1,3 @@
 E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
 E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
-26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
+
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
new file mode 100644
index 0000000..2b979f9
--- /dev/null
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
@@ -0,0 +1,3 @@
+Magrathea: Glacier signing key
+Magrathea: Glacier signing key
+Build time autogenerated kernel key
diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
index 2b979f9..afe83df 100644
--- a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
+++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
@@ -1,3 +1,3 @@
 Magrathea: Glacier signing key
 Magrathea: Glacier signing key
-Build time autogenerated kernel key
+
diff --git a/testsuite/test-modinfo.c b/testsuite/test-modinfo.c
index 504d9dd..373dc95 100644
--- a/testsuite/test-modinfo.c
+++ b/testsuite/test-modinfo.c
@@ -27,7 +27,7 @@
 
 static const char *progname = ABS_TOP_BUILDDIR "/tools/modinfo";
 
-#define DEFINE_MODINFO_TEST(_field, ...) \
+#define DEFINE_MODINFO_TEST(_field, _flavor, ...) \
 static noreturn int test_modinfo_##_field(const struct test *t) \
 { \
 	const char *const args[] = { \
@@ -44,20 +44,28 @@ DEFINE_TEST(test_modinfo_##_field, \
 		[TC_ROOTFS] = TESTSUITE_ROOTFS "test-modinfo/", \
 	}, \
 	.output = { \
-		.out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field ".txt", \
+		.out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field #_flavor ".txt", \
 	})
 
 #define DEFINE_MODINFO_GENERIC_TEST(_field) \
-	DEFINE_MODINFO_TEST(_field, \
+	DEFINE_MODINFO_TEST(_field, , \
 			    "/mod-simple-i386.ko", \
 			    "/mod-simple-x86_64.ko", \
 			    "/mod-simple-sparc64.ko")
 
+#ifdef ENABLE_OPENSSL
 #define DEFINE_MODINFO_SIGN_TEST(_field) \
-	DEFINE_MODINFO_TEST(_field, \
+	DEFINE_MODINFO_TEST(_field, -openssl, \
 			    "/mod-simple-sha1.ko", \
 			    "/mod-simple-sha256.ko",	\
 			    "/mod-simple-pkcs7.ko")
+#else
+#define DEFINE_MODINFO_SIGN_TEST(_field) \
+	DEFINE_MODINFO_TEST(_field, , \
+			    "/mod-simple-sha1.ko", \
+			    "/mod-simple-sha256.ko",	\
+			    "/mod-simple-pkcs7.ko")
+#endif
 
 DEFINE_MODINFO_GENERIC_TEST(filename);
 DEFINE_MODINFO_GENERIC_TEST(author);
-- 
2.20.0


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [PATCH 2/2] build: enable openssl by default
  2019-02-04 22:32 [PATCH 1/2] testsuite: fix modinfo test without openssl Lucas De Marchi
@ 2019-02-04 22:32 ` Lucas De Marchi
  2019-02-04 22:41 ` [PATCH 1/2] testsuite: fix modinfo test without openssl Yauheni Kaliuta
  1 sibling, 0 replies; 4+ messages in thread
From: Lucas De Marchi @ 2019-02-04 22:32 UTC (permalink / raw)
  To: linux-modules; +Cc: Yauheni Kaliuta

Like with other features, let's enable it for developers.
---
 autogen.sh | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/autogen.sh b/autogen.sh
index e003f78..67b119f 100755
--- a/autogen.sh
+++ b/autogen.sh
@@ -32,7 +32,7 @@ fi
 
 cd $oldpwd
 
-hackargs="--enable-debug --enable-python --with-xz --with-zlib"
+hackargs="--enable-debug --enable-python --with-xz --with-zlib --with-openssl"
 
 if [ "x$1" = "xc" ]; then
         shift
-- 
2.20.0


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH 1/2] testsuite: fix modinfo test without openssl
  2019-02-04 22:32 [PATCH 1/2] testsuite: fix modinfo test without openssl Lucas De Marchi
  2019-02-04 22:32 ` [PATCH 2/2] build: enable openssl by default Lucas De Marchi
@ 2019-02-04 22:41 ` Yauheni Kaliuta
  2019-02-05 21:01   ` Lucas De Marchi
  1 sibling, 1 reply; 4+ messages in thread
From: Yauheni Kaliuta @ 2019-02-04 22:41 UTC (permalink / raw)
  To: Lucas De Marchi; +Cc: linux-modules

Hi, Lucas!

Oops :)

Thanks for fixing that!

>>>>> On Mon,  4 Feb 2019 14:32:48 -0800, Lucas De Marchi  wrote:

 > ---
 >  .../correct-sig_hashalgo-openssl.txt             |  3 +++
 >  .../test-modinfo/correct-sig_hashalgo.txt        |  3 ++-
 >  .../test-modinfo/correct-sig_key-openssl.txt     |  3 +++
 >  .../test-modinfo/correct-sig_key.txt             |  2 +-
 >  .../test-modinfo/correct-signer-openssl.txt      |  3 +++
 >  .../test-modinfo/correct-signer.txt              |  2 +-
 >  testsuite/test-modinfo.c                         | 16 ++++++++++++----
 >  7 files changed, 25 insertions(+), 7 deletions(-)
 >  create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
 >  create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
 >  create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt

 > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
 > new file mode 100644
 > index 0000000..f97c4fa
 > --- /dev/null
 > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
 > @@ -0,0 +1,3 @@
 > +sha1
 > +sha256
 > +sha256
 > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
 > index f97c4fa..23cb933 100644
 > --- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
 > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
 > @@ -1,3 +1,4 @@
 >  sha1
 >  sha256
 > -sha256
 > +unknown
 > +
 > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
 > new file mode 100644
 > index 0000000..25a75a8
 > --- /dev/null
 > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
 > @@ -0,0 +1,3 @@
 > +E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
 > +E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
 > +26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
 > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
 > index 25a75a8..7dc4c6a 100644
 > --- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
 > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
 > @@ -1,3 +1,3 @@
 >  E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
 >  E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
 > -26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
 > +
 > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
 > new file mode 100644
 > index 0000000..2b979f9
 > --- /dev/null
 > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
 > @@ -0,0 +1,3 @@
 > +Magrathea: Glacier signing key
 > +Magrathea: Glacier signing key
 > +Build time autogenerated kernel key
 > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
 > index 2b979f9..afe83df 100644
 > --- a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
 > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
 > @@ -1,3 +1,3 @@
 >  Magrathea: Glacier signing key
 >  Magrathea: Glacier signing key
 > -Build time autogenerated kernel key
 > +
 > diff --git a/testsuite/test-modinfo.c b/testsuite/test-modinfo.c
 > index 504d9dd..373dc95 100644
 > --- a/testsuite/test-modinfo.c
 > +++ b/testsuite/test-modinfo.c
 > @@ -27,7 +27,7 @@
 
 >  static const char *progname = ABS_TOP_BUILDDIR "/tools/modinfo";
 
 > -#define DEFINE_MODINFO_TEST(_field, ...) \
 > +#define DEFINE_MODINFO_TEST(_field, _flavor, ...) \
 >  static noreturn int test_modinfo_##_field(const struct test *t) \
 >  { \
 >  	const char *const args[] = { \
 > @@ -44,20 +44,28 @@ DEFINE_TEST(test_modinfo_##_field, \
 >  		[TC_ROOTFS] = TESTSUITE_ROOTFS "test-modinfo/", \
 >  	}, \
 >  	.output = { \
 > -		.out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field ".txt", \
 > +		.out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field #_flavor ".txt", \
 >  	})
 
 >  #define DEFINE_MODINFO_GENERIC_TEST(_field) \
 > -	DEFINE_MODINFO_TEST(_field, \
 > +	DEFINE_MODINFO_TEST(_field, , \
 >  			    "/mod-simple-i386.ko", \
 >  			    "/mod-simple-x86_64.ko", \
 >  			    "/mod-simple-sparc64.ko")
 
 > +#ifdef ENABLE_OPENSSL
 >  #define DEFINE_MODINFO_SIGN_TEST(_field) \
 > -	DEFINE_MODINFO_TEST(_field, \
 > +	DEFINE_MODINFO_TEST(_field, -openssl, \
 >  			    "/mod-simple-sha1.ko", \
 >  			    "/mod-simple-sha256.ko",	\
 >  			    "/mod-simple-pkcs7.ko")
 > +#else
 > +#define DEFINE_MODINFO_SIGN_TEST(_field) \
 > +	DEFINE_MODINFO_TEST(_field, , \
 > +			    "/mod-simple-sha1.ko", \
 > +			    "/mod-simple-sha256.ko",	\
 > +			    "/mod-simple-pkcs7.ko")
 > +#endif
 
 >  DEFINE_MODINFO_GENERIC_TEST(filename);
 >  DEFINE_MODINFO_GENERIC_TEST(author);
 > -- 
 > 2.20.0


-- 
WBR,
Yauheni Kaliuta

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH 1/2] testsuite: fix modinfo test without openssl
  2019-02-04 22:41 ` [PATCH 1/2] testsuite: fix modinfo test without openssl Yauheni Kaliuta
@ 2019-02-05 21:01   ` Lucas De Marchi
  0 siblings, 0 replies; 4+ messages in thread
From: Lucas De Marchi @ 2019-02-05 21:01 UTC (permalink / raw)
  To: Yauheni Kaliuta; +Cc: Lucas De Marchi, linux-modules

On Mon, Feb 4, 2019 at 3:18 PM Yauheni Kaliuta
<yauheni.kaliuta@redhat.com> wrote:
>
> Hi, Lucas!
>
> Oops :)
>
> Thanks for fixing that!

These are pushed, together with your patches and other 2 to enable
tests on CI/mkosi

Lucas De Marchi

>
> >>>>> On Mon,  4 Feb 2019 14:32:48 -0800, Lucas De Marchi  wrote:
>
>  > ---
>  >  .../correct-sig_hashalgo-openssl.txt             |  3 +++
>  >  .../test-modinfo/correct-sig_hashalgo.txt        |  3 ++-
>  >  .../test-modinfo/correct-sig_key-openssl.txt     |  3 +++
>  >  .../test-modinfo/correct-sig_key.txt             |  2 +-
>  >  .../test-modinfo/correct-signer-openssl.txt      |  3 +++
>  >  .../test-modinfo/correct-signer.txt              |  2 +-
>  >  testsuite/test-modinfo.c                         | 16 ++++++++++++----
>  >  7 files changed, 25 insertions(+), 7 deletions(-)
>  >  create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
>  >  create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
>  >  create mode 100644 testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
>
>  > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
>  > new file mode 100644
>  > index 0000000..f97c4fa
>  > --- /dev/null
>  > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo-openssl.txt
>  > @@ -0,0 +1,3 @@
>  > +sha1
>  > +sha256
>  > +sha256
>  > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
>  > index f97c4fa..23cb933 100644
>  > --- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
>  > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_hashalgo.txt
>  > @@ -1,3 +1,4 @@
>  >  sha1
>  >  sha256
>  > -sha256
>  > +unknown
>  > +
>  > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
>  > new file mode 100644
>  > index 0000000..25a75a8
>  > --- /dev/null
>  > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key-openssl.txt
>  > @@ -0,0 +1,3 @@
>  > +E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
>  > +E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
>  > +26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
>  > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
>  > index 25a75a8..7dc4c6a 100644
>  > --- a/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
>  > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-sig_key.txt
>  > @@ -1,3 +1,3 @@
>  >  E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
>  >  E3:C8:FC:A7:3F:B3:1D:DE:84:81:EF:38:E3:4C:DE:4B:0C:FD:1B:F9
>  > -26:DA:C3:EB:0F:0D:1A:56:A2:D8:B2:13:F0:D7:53:47:1D:0D:48:68
>  > +
>  > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
>  > new file mode 100644
>  > index 0000000..2b979f9
>  > --- /dev/null
>  > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer-openssl.txt
>  > @@ -0,0 +1,3 @@
>  > +Magrathea: Glacier signing key
>  > +Magrathea: Glacier signing key
>  > +Build time autogenerated kernel key
>  > diff --git a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
>  > index 2b979f9..afe83df 100644
>  > --- a/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
>  > +++ b/testsuite/rootfs-pristine/test-modinfo/correct-signer.txt
>  > @@ -1,3 +1,3 @@
>  >  Magrathea: Glacier signing key
>  >  Magrathea: Glacier signing key
>  > -Build time autogenerated kernel key
>  > +
>  > diff --git a/testsuite/test-modinfo.c b/testsuite/test-modinfo.c
>  > index 504d9dd..373dc95 100644
>  > --- a/testsuite/test-modinfo.c
>  > +++ b/testsuite/test-modinfo.c
>  > @@ -27,7 +27,7 @@
>
>  >  static const char *progname = ABS_TOP_BUILDDIR "/tools/modinfo";
>
>  > -#define DEFINE_MODINFO_TEST(_field, ...) \
>  > +#define DEFINE_MODINFO_TEST(_field, _flavor, ...) \
>  >  static noreturn int test_modinfo_##_field(const struct test *t) \
>  >  { \
>  >      const char *const args[] = { \
>  > @@ -44,20 +44,28 @@ DEFINE_TEST(test_modinfo_##_field, \
>  >              [TC_ROOTFS] = TESTSUITE_ROOTFS "test-modinfo/", \
>  >      }, \
>  >      .output = { \
>  > -            .out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field ".txt", \
>  > +            .out = TESTSUITE_ROOTFS "test-modinfo/correct-" #_field #_flavor ".txt", \
>  >      })
>
>  >  #define DEFINE_MODINFO_GENERIC_TEST(_field) \
>  > -    DEFINE_MODINFO_TEST(_field, \
>  > +    DEFINE_MODINFO_TEST(_field, , \
>  >                          "/mod-simple-i386.ko", \
>  >                          "/mod-simple-x86_64.ko", \
>  >                          "/mod-simple-sparc64.ko")
>
>  > +#ifdef ENABLE_OPENSSL
>  >  #define DEFINE_MODINFO_SIGN_TEST(_field) \
>  > -    DEFINE_MODINFO_TEST(_field, \
>  > +    DEFINE_MODINFO_TEST(_field, -openssl, \
>  >                          "/mod-simple-sha1.ko", \
>  >                          "/mod-simple-sha256.ko",    \
>  >                          "/mod-simple-pkcs7.ko")
>  > +#else
>  > +#define DEFINE_MODINFO_SIGN_TEST(_field) \
>  > +    DEFINE_MODINFO_TEST(_field, , \
>  > +                        "/mod-simple-sha1.ko", \
>  > +                        "/mod-simple-sha256.ko",    \
>  > +                        "/mod-simple-pkcs7.ko")
>  > +#endif
>
>  >  DEFINE_MODINFO_GENERIC_TEST(filename);
>  >  DEFINE_MODINFO_GENERIC_TEST(author);
>  > --
>  > 2.20.0
>
>
> --
> WBR,
> Yauheni Kaliuta



-- 
Lucas De Marchi

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2019-02-05 21:02 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-02-04 22:32 [PATCH 1/2] testsuite: fix modinfo test without openssl Lucas De Marchi
2019-02-04 22:32 ` [PATCH 2/2] build: enable openssl by default Lucas De Marchi
2019-02-04 22:41 ` [PATCH 1/2] testsuite: fix modinfo test without openssl Yauheni Kaliuta
2019-02-05 21:01   ` Lucas De Marchi

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).