return status;
}
-static NTSTATUS compute_l1_seed_key(
- TALLOC_CTX *mem_ctx,
- struct GkdiContext *ctx,
- const DATA_BLOB security_descriptor,
- const struct ProvRootKey *const root_key,
- const struct Gkid gkid,
- uint8_t key[static const GKDI_KEY_LEN])
+static NTSTATUS compute_l1_seed_key(TALLOC_CTX *mem_ctx,
+ struct GkdiContext *ctx,
+ const DATA_BLOB security_descriptor,
+ const struct ProvRootKey *const root_key,
+ const struct Gkid gkid,
+ uint8_t key[static const GKDI_KEY_LEN])
{
NTSTATUS status = NT_STATUS_OK;
struct GkdiContextShort short_ctx;
return true;
}
-NTSTATUS compute_seed_key(
- TALLOC_CTX *mem_ctx,
- const DATA_BLOB target_security_descriptor,
- const struct ProvRootKey *const root_key,
- const struct Gkid gkid,
- uint8_t key[static const GKDI_KEY_LEN])
+NTSTATUS compute_seed_key(TALLOC_CTX *mem_ctx,
+ const DATA_BLOB target_security_descriptor,
+ const struct ProvRootKey *const root_key,
+ const struct Gkid gkid,
+ uint8_t key[static const GKDI_KEY_LEN])
{
NTSTATUS status = NT_STATUS_OK;
enum GkidType gkid_type;
gnutls_mac_algorithm_t get_sp800_108_mac_algorithm(
const struct KdfAlgorithm kdf_algorithm);
-NTSTATUS compute_seed_key(
- TALLOC_CTX *mem_ctx,
- const DATA_BLOB target_security_descriptor,
- const struct ProvRootKey *const root_key,
- const struct Gkid gkid,
- uint8_t out[static const GKDI_KEY_LEN]);
+NTSTATUS compute_seed_key(TALLOC_CTX *mem_ctx,
+ const DATA_BLOB target_security_descriptor,
+ const struct ProvRootKey *const root_key,
+ const struct Gkid gkid,
+ uint8_t out[static const GKDI_KEY_LEN]);
#endif /* LIB_CRYPTO_GKDI_H */