113 Star 72 Fork 309

src-openEuler/kernel

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
文件
0000-raspberrypi-kernel.patch
0002-cpupower-clang-compile-support.patch
0003-x86_energy_perf_policy-clang-compile-support.patch
0004-turbostat-clang-compile-support.patch
RPM-GPG-KEY-openEuler-compass-ci
SOURCE
apply-patches
check-kabi
cpupower.config
cpupower.service
extra_certificates
gcov_blacklist.sh
guards
kernel.spec
kvm_func_blacklist.txt
mkgrub-menu-aarch64.sh
napi_id
process_pgp_certs.sh
raspberrypi-kernel.spec
readme
sender_cpu
sign-modules
x509.genkey
该仓库未声明开源许可证文件(LICENSE),使用请关注具体项目描述及其代码上游依赖。
克隆/下载
process_pgp_certs.sh 1.06 KB
一键复制 编辑 原始数据 按行查看 历史
#!/bin/bash
# from: https://repo.openeuler.org/${openEuler_version}/source/RPM-GPG-KEY-openEuler
# sha256: 006e79d37c10e74c24df6d07c4efc4176515cec009daa5ed493b06f5b6ef39c1
CERT="RPM-GPG-KEY-openEuler-compass-ci"
# process result for kernel building
CERT_OUT="pubring.gpg"
# base64 decode with removing prefix and suffix
for cert in $CERT; do
cat $cert | head -n -2 | tail -n +2 | base64 -d > $cert.gpg
done
# Now EBS use subkey to sign, but kernel can only parse main key. So we need to
# extract subkey information and wrap to a main key format.
# The PGP data can be parsered with https://cirw.in/gpg-decoder/
# Extra User ID Packet
# start: 400; length: 38
dd if=$CERT.gpg of=$CERT.userid.gpg skip=400 bs=1c count=38
# Extra Public-Subkey Packet
# start: 902 + 1(wrap cipherTypeByte); length: 400 - 1
# cipherTypeByte: 0x99 = 10 0110(wrap to a main key) 01
echo -en "\x99" > $CERT.subkey.gpg
dd if=$CERT.gpg of=$CERT.subkey.gpg skip=903 bs=1c count=399 seek=1
# merge all cert information
cat $CERT.subkey.gpg $CERT.userid.gpg > $CERT_OUT
# cleanup
rm -f RPM-GPG-KEY-openEuler-*
Loading...
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
1
https://gitee.com/src-openeuler/kernel.git
git@gitee.com:src-openeuler/kernel.git
src-openeuler
kernel
kernel
openEuler-23.09

搜索帮助