Cannot read payload of an encrypted key rooted in a trusted key

2019-02-10 Thread Salah Coronya
In the file Documentation/security/keys-trusted-encrypted, an example is shown for to create an encrypted key rooted in trusted key. Basically, the following should work: KMK_KEY=$(keyctl add trusted kmk "new 32" @u) keyctl pipe $KMK_KEY > ~/kmk-trusted.blob EVM_KEY=$(keyctl add encrypted evm "

Re: Forced unmounting for removable devices

2007-08-29 Thread Salah Coronya
Eduard-Gabriel Munteanu wrote: > *This message was transferred with a trial version of CommuniGate(r) Pro* > This might have been discussed a few years ago, but things have changed. > I'm talking about patches like this one (I'm not the author): > http://developer.osdl.org/dev/fumount/#kernel1 > >

Re: NFS hang + umount -f: better behaviour requested.

2007-08-20 Thread Salah Coronya
Robin Lee Powell digitalkingdom.org> writes: > > Though I agree that it would be nice if we could convince all > > subsequent requests to a server to fail EIO instead of just the > > currently active ones. I'm not sure that just changing "umount > > -f" is the right interface though Maybe

Re: I2C block reads with i2c-viapro: testers wanted

2005-08-09 Thread Salah Coronya
I have a VT8235 chipset, I applied the patch to my kernel (2.6.12-gentoo-r6), comapred the "before" and "after" eeproms in /sys with diff and they are the same. So it seems to work with VT8235. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to