diff options
author | Dmitry Kasatkin <d.kasatkin@samsung.com> | 2014-10-06 18:31:58 +0200 |
---|---|---|
committer | David Howells <dhowells@redhat.com> | 2014-10-06 18:33:27 +0200 |
commit | 594081ee7145cc30a3977cb4e218f81213b63dc5 (patch) | |
tree | 1c731f9403d18e47fdacb2b74e92bf06211a819a | |
parent | KEYS: output last portion of fingerprint in /proc/keys (diff) | |
download | linux-594081ee7145cc30a3977cb4e218f81213b63dc5.tar.xz linux-594081ee7145cc30a3977cb4e218f81213b63dc5.zip |
integrity: do zero padding of the key id
Latest KEYS code return error if hexadecimal string length id odd.
Fix it.
Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com>
Signed-off-by: David Howells <dhowells@redhat.com>
-rw-r--r-- | security/integrity/digsig_asymmetric.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/integrity/digsig_asymmetric.c b/security/integrity/digsig_asymmetric.c index 37e0d98517a8..4fec1816a2b3 100644 --- a/security/integrity/digsig_asymmetric.c +++ b/security/integrity/digsig_asymmetric.c @@ -28,7 +28,7 @@ static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) struct key *key; char name[12]; - sprintf(name, "id:%x", keyid); + sprintf(name, "id:%08x", keyid); pr_debug("key search: \"%s\"\n", name); |