On 9/9/24 17:16, Daniel P. Berrangé wrote:
Various crypto fixes
* Support sha384 with glib crypto backend
* Improve error reporting for unsupported cipher modes
* Avoid memory leak when bad cipher mode is given
* Run pbkdf tests on macOS
* Runtime check for pbkdf hash impls with gnutls & gcrypt
* Avoid hangs counter pbkdf iterations on some Linux kernels
by using a throwaway thread for benchmarking performance
* Fix iotests expected output from gnutls errors
Hm. Are you sure *all* of it should go to qemu-stable? :)
Daniel P. Berrangé (6):
iotests: fix expected output from gnutls
crypto: check gnutls & gcrypt support the requested pbkdf hash
tests/unit: always build the pbkdf crypto unit test
tests/unit: build pbkdf test on macOS
crypto: avoid leak of ctx when bad cipher mode is given
crypto: use consistent error reporting pattern for unsupported cipher
modes
Dorjoy Chowdhury (3):
crypto: Define macros for hash algorithm digest lengths
crypto: Support SHA384 hash when using glib
crypto: Introduce x509 utils
Tiago Pasqualini (1):
crypto: run qcrypto_pbkdf2_count_iters in a new thread
Thanks,
/mjt