Skip to content

Conversation

mattklein123
Copy link
Member

boringssl has internal support for threading.

boringssl has internal support for threading.
@mattklein123
Copy link
Member Author

@lyft/network-team @PiotrSikora

@PiotrSikora
Copy link
Contributor

Both: CRYPTO_set_id_callback() and CRYPTO_set_locking_callback() are no-op in BoringSSL, so this doesn't change much at runtime.

However, if you want to remove dead code, then OpenSSL_add_all_algorithms(), SSL_load_error_strings() and RAND_poll() are also no-op in BoringSSL.

@mattklein123
Copy link
Member Author

I just noticed it in the coverage build so just deleting dead code. I will fix it up to include the other functions you mention.

@mattklein123
Copy link
Member Author

@PiotrSikora updated

@mattklein123 mattklein123 merged commit 40e0cf3 into master Jan 27, 2017
@mattklein123 mattklein123 deleted the openssl_locking branch January 27, 2017 18:59
rshriram pushed a commit to rshriram/envoy that referenced this pull request Oct 30, 2018
PiotrSikora added a commit to istio/envoy that referenced this pull request Jan 25, 2020
We don't care about it, and it's currently broken.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
PiotrSikora added a commit to PiotrSikora/envoy that referenced this pull request Feb 24, 2020
We don't care about it, and it's currently broken.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
PiotrSikora added a commit to istio/envoy that referenced this pull request Feb 24, 2020
…161)

We don't care about it, and it's currently broken.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
wolfguoliang pushed a commit to wolfguoliang/envoy that referenced this pull request Jan 23, 2021
zh-translation:docs/root/configuration/other_features/other_features.rst
jpsim pushed a commit that referenced this pull request Nov 28, 2022
envoyproxy/envoy-mobile#381 surfaced an issue where extensions aren't allowed on Swift protocols that are visible to Objective-C. This meant that the Swift `Client` protocol (conformed to by the `Envoy` Swift class) could not provide a default implementation of the non-streaming `send` function, and the function had to be moved into the concrete `Envoy` class so that it could be visible from both Swift and Objective-C. This ended up breaking our Swift tests in `ClientTests.swift` (as mentioned in that PR's description).

In order to fix these tests, we need to convert `EnvoyHTTPStream` into a protocol and use an `EnvoyHTTPStreamImpl` concrete type - similarly to how we do with `EnvoyEngine`/`EnvoyEngineImpl`.

This PR updates the types accordingly, and fixes the tests. Also renames the tests to `EnvoyTests` rather than `ClientTests` since this is testing the concrete type.

Signed-off-by: Michael Rebello <me@michaelrebello.com>
Signed-off-by: JP Simard <jp@jpsim.com>
jpsim pushed a commit that referenced this pull request Nov 29, 2022
envoyproxy/envoy-mobile#381 surfaced an issue where extensions aren't allowed on Swift protocols that are visible to Objective-C. This meant that the Swift `Client` protocol (conformed to by the `Envoy` Swift class) could not provide a default implementation of the non-streaming `send` function, and the function had to be moved into the concrete `Envoy` class so that it could be visible from both Swift and Objective-C. This ended up breaking our Swift tests in `ClientTests.swift` (as mentioned in that PR's description).

In order to fix these tests, we need to convert `EnvoyHTTPStream` into a protocol and use an `EnvoyHTTPStreamImpl` concrete type - similarly to how we do with `EnvoyEngine`/`EnvoyEngineImpl`.

This PR updates the types accordingly, and fixes the tests. Also renames the tests to `EnvoyTests` rather than `ClientTests` since this is testing the concrete type.

Signed-off-by: Michael Rebello <me@michaelrebello.com>
Signed-off-by: JP Simard <jp@jpsim.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants