In the file Documentation/security/keys-trusted-encrypted, an example is
shown for to create an encrypted key rooted in trusted key. Basically,
the following should work:
KMK_KEY=$(keyctl add trusted kmk "new 32" @u)
keyctl pipe $KMK_KEY > ~/kmk-trusted.blob
EVM_KEY=$(keyctl add encrypted evm "
Eduard-Gabriel Munteanu wrote:
> *This message was transferred with a trial version of CommuniGate(r) Pro*
> This might have been discussed a few years ago, but things have changed.
> I'm talking about patches like this one (I'm not the author):
> http://developer.osdl.org/dev/fumount/#kernel1
>
>
Robin Lee Powell digitalkingdom.org> writes:
> > Though I agree that it would be nice if we could convince all
> > subsequent requests to a server to fail EIO instead of just the
> > currently active ones. I'm not sure that just changing "umount
> > -f" is the right interface though Maybe
I have a VT8235 chipset, I applied the patch to my kernel
(2.6.12-gentoo-r6), comapred the "before" and "after" eeproms in /sys
with diff and they are the same.
So it seems to work with VT8235.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
4 matches
Mail list logo