Home
last modified time | relevance | path

Searched hist:"4 d2d15c0f1e05ef2478d4891b79570a87c5dd1a6" (Results 1 – 3 of 3) sorted by relevance

/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_internal.hdiff 4d2d15c0f1e05ef2478d4891b79570a87c5dd1a6 Sun Jan 15 18:24:31 CET 2023 Chuck Lever <chuck.lever@oracle.com> SUNRPC: Add RFC 8009 encryption KUnit tests

RFC 8009 provides sample encryption results. Add KUnit tests to
ensure our implementation derives the expected results for the
provided sample input.

I hate how large this test is, but using non-standard key usage
values means rfc8009_encrypt_case() can't simply reuse ->import_ctx
to allocate and key its ciphers; and the test provides its own
confounders, which means krb5_etm_encrypt() can't be used directly.

Tested-by: Scott Mayhew <smayhew@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
H A Dgss_krb5_test.cdiff 4d2d15c0f1e05ef2478d4891b79570a87c5dd1a6 Sun Jan 15 18:24:31 CET 2023 Chuck Lever <chuck.lever@oracle.com> SUNRPC: Add RFC 8009 encryption KUnit tests

RFC 8009 provides sample encryption results. Add KUnit tests to
ensure our implementation derives the expected results for the
provided sample input.

I hate how large this test is, but using non-standard key usage
values means rfc8009_encrypt_case() can't simply reuse ->import_ctx
to allocate and key its ciphers; and the test provides its own
confounders, which means krb5_etm_encrypt() can't be used directly.

Tested-by: Scott Mayhew <smayhew@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
H A Dgss_krb5_crypto.cdiff 4d2d15c0f1e05ef2478d4891b79570a87c5dd1a6 Sun Jan 15 18:24:31 CET 2023 Chuck Lever <chuck.lever@oracle.com> SUNRPC: Add RFC 8009 encryption KUnit tests

RFC 8009 provides sample encryption results. Add KUnit tests to
ensure our implementation derives the expected results for the
provided sample input.

I hate how large this test is, but using non-standard key usage
values means rfc8009_encrypt_case() can't simply reuse ->import_ctx
to allocate and key its ciphers; and the test provides its own
confounders, which means krb5_etm_encrypt() can't be used directly.

Tested-by: Scott Mayhew <smayhew@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>