I’ve ranted lately a lot at #LKML about how #kernel #Bugzilla’s role in the #development #process should be defined better in the #documentation. #linux
I wonder what is the best practice to remove #passphrase from #OpenPGP subkey. I’m using #gnupg2. I’ve spend hours on this and still not able to do it :-(
I.e. I have this:
$ gpg -K
/home/jarkko/.gnupg/pubring.kbx
-------------------------------
sec rsa4096 2019-06-24 [C] [expires: 2024-07-04]
5107E66D34788A93E3227C903AB05486C7752FE1
uid [ unknown] Jarkko Sakkinen <jarkko.sakkinen@iki.fi>
uid [ unknown] Jarkko Sakkinen <jarkko@kernel.org>
uid [ unknown] Jarkko Sakkinen <jarkko.sakkinen@tuni.fi>
ssb ed25519 2019-06-25 [S] [expires: 2025-07-27]
ssb rsa4096 2020-08-11 [A]
ssb rsa4096 2022-03-21 [E] [expires: 2024-03-20]
ssb ed25519 2022-12-29 [A]
And I want to remove passphrase from #ed25519 #authentication #key.
A shallow #Git clone with shallow clones of the #submodule’s:
git clone --depth=1 \
--recurse-submodules \
--shallow-submodules \
<URL>
A generic flashing and verification script draft (will be edited over time):
#!/usr/bin/env bash
#
# Authors:
# Jarkko Sakkinen <jarkko.sakkinen@tuni.fi>
set -e
if [ $# -ne 2 ]; then
echo "`basename $0` <payload> <block device>"
exit 1
fi
PAYLOAD=`realpath $1`
SIZE=`wc -c $1 | cut -d' ' -f1`
START="2048"
END="$((START + (SIZE >> 9) + 1))"
parted --script $2 mklabel gpt
parted --script $2 mkpart primary fat32 ${START}s ${END}s
PARTITION="${2}1"
if [ ! -b $PARTITION ]; then
echo "Invalid partition"
exit 1
fi
echo "Payload: $PAYLOAD"
echo "Partition: $PARTITION"
DD_OPTIONS="count=$((END - START)) bs=512 status=progress conv=sync"
dd if="$PAYLOAD" of="$PARTITION" $DD_OPTIONS
sync
echo "Payload MD5: `dd if="$PAYLOAD" $DD_OPTIONS 2> /dev/null | md5sum`"
echo "Partition MD5: `dd if="$PARTITION" $DD_OPTIONS 2> /dev/null | md5sum`"
#flashing #firmware #image #riscv #CVA6 #Keystone #EFI #note
OK cool:
$ sudo apt dist-upgrade
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
#
# You can verify the status of security fixes using the `pro fix` command.
# E.g., a recent Ruby vulnerability can be checked with: `pro fix USN-6219-1`
# For more detail see: https://ubuntu.com/security/notices/USN-6219-1
#
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
$ pro fix
usage: pro fix <CVE-yyyy-nnnn+>|<USN-nnnn-d+> [flags]
the following arguments are required: security_issue
Two common #GNU #make patterns I tend to use often with #Buildroot:
time ( make &> build.txt; )
time ( make 2>&1 | tee build.txt; )