Searched hist:"4 d2d15c0f1e05ef2478d4891b79570a87c5dd1a6" (Results 1 – 3 of 3) sorted by relevance
/linux/net/sunrpc/auth_gss/ |
H A D | gss_krb5_internal.h | diff 4d2d15c0f1e05ef2478d4891b79570a87c5dd1a6 Sun Jan 15 18:24:31 CET 2023 Chuck Lever <chuck.lever@oracle.com> SUNRPC: Add RFC 8009 encryption KUnit tests
RFC 8009 provides sample encryption results. Add KUnit tests to ensure our implementation derives the expected results for the provided sample input.
I hate how large this test is, but using non-standard key usage values means rfc8009_encrypt_case() can't simply reuse ->import_ctx to allocate and key its ciphers; and the test provides its own confounders, which means krb5_etm_encrypt() can't be used directly.
Tested-by: Scott Mayhew <smayhew@redhat.com> Reviewed-by: Simo Sorce <simo@redhat.com> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
|
H A D | gss_krb5_test.c | diff 4d2d15c0f1e05ef2478d4891b79570a87c5dd1a6 Sun Jan 15 18:24:31 CET 2023 Chuck Lever <chuck.lever@oracle.com> SUNRPC: Add RFC 8009 encryption KUnit tests
RFC 8009 provides sample encryption results. Add KUnit tests to ensure our implementation derives the expected results for the provided sample input.
I hate how large this test is, but using non-standard key usage values means rfc8009_encrypt_case() can't simply reuse ->import_ctx to allocate and key its ciphers; and the test provides its own confounders, which means krb5_etm_encrypt() can't be used directly.
Tested-by: Scott Mayhew <smayhew@redhat.com> Reviewed-by: Simo Sorce <simo@redhat.com> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
|
H A D | gss_krb5_crypto.c | diff 4d2d15c0f1e05ef2478d4891b79570a87c5dd1a6 Sun Jan 15 18:24:31 CET 2023 Chuck Lever <chuck.lever@oracle.com> SUNRPC: Add RFC 8009 encryption KUnit tests
RFC 8009 provides sample encryption results. Add KUnit tests to ensure our implementation derives the expected results for the provided sample input.
I hate how large this test is, but using non-standard key usage values means rfc8009_encrypt_case() can't simply reuse ->import_ctx to allocate and key its ciphers; and the test provides its own confounders, which means krb5_etm_encrypt() can't be used directly.
Tested-by: Scott Mayhew <smayhew@redhat.com> Reviewed-by: Simo Sorce <simo@redhat.com> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
|