On 9/9/24 17:16, Daniel P. Berrangé wrote:

Various crypto fixes

  * Support sha384 with glib crypto backend
  * Improve error reporting for unsupported cipher modes
  * Avoid memory leak when bad cipher mode is given
  * Run pbkdf tests on macOS
  * Runtime check for pbkdf hash impls with gnutls & gcrypt
  * Avoid hangs counter pbkdf iterations on some Linux kernels
    by using a throwaway thread for benchmarking performance
  * Fix iotests expected output from gnutls errors

Hm.  Are you sure *all* of it should go to qemu-stable? :)

Daniel P. Berrangé (6):
   iotests: fix expected output from gnutls
   crypto: check gnutls & gcrypt support the requested pbkdf hash
   tests/unit: always build the pbkdf crypto unit test
   tests/unit: build pbkdf test on macOS
   crypto: avoid leak of ctx when bad cipher mode is given
   crypto: use consistent error reporting pattern for unsupported cipher
     modes

Dorjoy Chowdhury (3):
   crypto: Define macros for hash algorithm digest lengths
   crypto: Support SHA384 hash when using glib
   crypto: Introduce x509 utils

Tiago Pasqualini (1):
   crypto: run qcrypto_pbkdf2_count_iters in a new thread

Thanks,

/mjt


Reply via email to