socsvn commit: r284993 - in soc2013/def/crashdump-head: sbin/cryptcore sbin/savecore sys/amd64/conf

def at FreeBSD.org def at FreeBSD.org
Mon May 4 16:50:22 UTC 2015


Author: def
Date: Mon May  4 16:50:20 2015
New Revision: 284993
URL: http://svnweb.FreeBSD.org/socsvn/?view=rev&rev=284993

Log:
  Style.

Modified:
  soc2013/def/crashdump-head/sbin/cryptcore/cryptcore.c
  soc2013/def/crashdump-head/sbin/savecore/savecore.c
  soc2013/def/crashdump-head/sys/amd64/conf/GENERIC

Modified: soc2013/def/crashdump-head/sbin/cryptcore/cryptcore.c
==============================================================================
--- soc2013/def/crashdump-head/sbin/cryptcore/cryptcore.c	Mon May  4 15:04:39 2015	(r284992)
+++ soc2013/def/crashdump-head/sbin/cryptcore/cryptcore.c	Mon May  4 16:50:20 2015	(r284993)
@@ -73,11 +73,11 @@
 
 	if (RSA_public_encrypt(KERNELDUMP_KEY_SIZE + KERNELDUMP_IV_SIZE, buf,
 	    ciphertext, pubkey, RSA_PKCS1_PADDING) != pubkeysize) {
-		pjdlog_exit(1, "Unable to encrypt an one-time key");
+		pjdlog_exit(1, "Unable to encrypt the one-time key");
 	}
 
 	/*
-	 * From this moment keys have to be erased before exit.
+	 * From this moment on keys have to be erased before exit.
 	 */
 	if (sysctlbyname("kern.ekcd.keymaterial", NULL, NULL, buf,
 	    KERNELDUMP_KEY_SIZE) != 0) {
@@ -149,7 +149,7 @@
 		pjdlog_exit(1, "Unable to read data from %s", privkeyfile);
 	}
 	/*
-	 * From this moment keys have to be erased before exit.
+	 * From this moment on keys have to be erased before exit.
 	 */
 	privkeysize = RSA_size(privkey);
 	if (RSA_size(privkey) > 8 * KERNELDUMP_CIPHERTEXT_SIZE) {

Modified: soc2013/def/crashdump-head/sbin/savecore/savecore.c
==============================================================================
--- soc2013/def/crashdump-head/sbin/savecore/savecore.c	Mon May  4 15:04:39 2015	(r284992)
+++ soc2013/def/crashdump-head/sbin/savecore/savecore.c	Mon May  4 16:50:20 2015	(r284993)
@@ -190,12 +190,12 @@
 
 	fd = open(keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600);
 	if (fd == -1) {
-		syslog(LOG_ERR, "Unable to open %s to write a key.", keyname);
+		syslog(LOG_ERR, "Unable to open %s to write the key.", keyname);
 		exit(1);
 	}
 	if (write(fd, kdh->ciphertext, KERNELDUMP_CIPHERTEXT_SIZE) !=
 	    KERNELDUMP_CIPHERTEXT_SIZE) {
-		syslog(LOG_ERR, "Unable to write a key to %s.", keyname);
+		syslog(LOG_ERR, "Unable to write the key to %s.", keyname);
 		exit(1);
 	}
 	close(fd);

Modified: soc2013/def/crashdump-head/sys/amd64/conf/GENERIC
==============================================================================
--- soc2013/def/crashdump-head/sys/amd64/conf/GENERIC	Mon May  4 15:04:39 2015	(r284992)
+++ soc2013/def/crashdump-head/sys/amd64/conf/GENERIC	Mon May  4 16:50:20 2015	(r284993)
@@ -354,5 +354,5 @@
 # Netmap provides direct access to TX/RX rings on supported NICs
 device		netmap			# netmap(4) support
 
-# Unattended encrypted kernel crash dumps 	 
+# Unattended encrypted kernel crash dumps
 options		EKCD


More information about the svn-soc-all mailing list