Message ID | 20240909141635.1459701-1-berrange@redhat.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
On Mon, 9 Sept 2024 at 15:17, Daniel P. Berrangé <berrange@redhat.com> wrote: > > The following changes since commit f2aee60305a1e40374b2fc1093e4d04404e780ee: > > Merge tag 'pull-request-2024-09-08' of https://gitlab.com/huth/qemu into staging (2024-09-09 10:47:24 +0100) > > are available in the Git repository at: > > https://gitlab.com/berrange/qemu tags/crypto-fixes-pull-request > > for you to fetch changes up to 10a1d34fc0d4dfe0dd6f5ec73f62dc1afa04af6c: > > crypto: Introduce x509 utils (2024-09-09 15:13:38 +0100) > > ---------------------------------------------------------------- > Various crypto fixes > > * Support sha384 with glib crypto backend > * Improve error reporting for unsupported cipher modes > * Avoid memory leak when bad cipher mode is given > * Run pbkdf tests on macOS > * Runtime check for pbkdf hash impls with gnutls & gcrypt > * Avoid hangs counter pbkdf iterations on some Linux kernels > by using a throwaway thread for benchmarking performance > * Fix iotests expected output from gnutls errors > Applied, thanks. Please update the changelog at https://wiki.qemu.org/ChangeLog/9.2 for any user-visible changes. -- PMM
On 9/9/24 17:16, Daniel P. Berrangé wrote: > Various crypto fixes > > * Support sha384 with glib crypto backend > * Improve error reporting for unsupported cipher modes > * Avoid memory leak when bad cipher mode is given > * Run pbkdf tests on macOS > * Runtime check for pbkdf hash impls with gnutls & gcrypt > * Avoid hangs counter pbkdf iterations on some Linux kernels > by using a throwaway thread for benchmarking performance > * Fix iotests expected output from gnutls errors Hm. Are you sure *all* of it should go to qemu-stable? :) > Daniel P. Berrangé (6): > iotests: fix expected output from gnutls > crypto: check gnutls & gcrypt support the requested pbkdf hash > tests/unit: always build the pbkdf crypto unit test > tests/unit: build pbkdf test on macOS > crypto: avoid leak of ctx when bad cipher mode is given > crypto: use consistent error reporting pattern for unsupported cipher > modes > > Dorjoy Chowdhury (3): > crypto: Define macros for hash algorithm digest lengths > crypto: Support SHA384 hash when using glib > crypto: Introduce x509 utils > > Tiago Pasqualini (1): > crypto: run qcrypto_pbkdf2_count_iters in a new thread Thanks, /mjt