Commit 1867be14 authored by agl's avatar agl Committed by Commit bot

Roll BoringSSL.

Brings in the following commits:

1f3591d Export CBS_asn1_ber_to_der.
25c93ff Fix BN_sub documentation.
854dd65 Refactor server-side CertificateVerify handling.
5b8f104 Revise hash management for reading the Finished message.
880b14e Compute the Channel ID hash after ssl_get_message.
590cbe9 Introduce a hash_message parameter to ssl_get_message.
912806b Fix build (broken by MD4_CTX redefine).
bbac844 Add missing <errno.h> include.
3cb50e0 Move a variable declaration to function start.
98ad22e Fix "integer constant is too large for 'long' type" errors.
58f9095 Remove hack in parsing PKCS#12.
0eb1aae Readd EC_GROUP_get_curve_GFp.
539112f Readd EVP_CIPHER_CTX_set_key_length.
c9eb7ea Readd MD4.
8da9906 Rename some message functions for consistency.
e58c4f5 Add a test to ensure False Start occurs.
ef86550 Remove logic for non-signing client certificates.
a08e49d Add basic TLS Channel ID tests.
4e99c52 Fix FalseStart-SessionTicketsDisabled tests.
2561dc3 Introduce a mechanism for base64 options.
d698f32 Introduce EVP_DecodeBase64.
3a66e28 Update ssl3_get_channel_id for the simpler ECDSA_do_verify.
d30a990 Implement TLS Channel ID in runner.go
f9b96fa Fix flipped DTLS checks.
2a0c496 Fix duplicate test name.
8e16b6e Add PKCS#12 parser.
9c01e00 Rework support for ASN.1 BER.
cc8fcf4 Add 40-bit RC2 support.
9169c96 Implement client side of TLS signed certificate stamps extension.
c44d2f4 Convert all zero-argument functions to '(void)'

BUG=none

Review URL: https://codereview.chromium.org/511703002

Cr-Commit-Position: refs/heads/master@{#292240}
parent 2358b2eb
......@@ -70,7 +70,7 @@ vars = {
# Three lines of non-changing comments so that
# the commit queue can handle CLs rolling BoringSSL
# and whatever else without interference from each other.
'boringssl_revision': '5213df4e9ed9ca130c40f142893cb91f2e18eee1',
'boringssl_revision': '1f3591d4c75fc4039dbd120ff1c459b311e976e2',
# Three lines of non-changing comments so that
# the commit queue can handle CLs rolling nss
# and whatever else without interference from each other.
......
......@@ -81,6 +81,7 @@
'src/crypto/bn/sqrt.c',
'src/crypto/buf/buf.c',
'src/crypto/buf/buf_error.c',
'src/crypto/bytestring/ber.c',
'src/crypto/bytestring/cbb.c',
'src/crypto/bytestring/cbs.c',
'src/crypto/chacha/chacha_generic.c',
......@@ -93,6 +94,7 @@
'src/crypto/cipher/e_chacha20poly1305.c',
'src/crypto/cipher/e_des.c',
'src/crypto/cipher/e_null.c',
'src/crypto/cipher/e_rc2.c',
'src/crypto/cipher/e_rc4.c',
'src/crypto/conf/conf.c',
'src/crypto/conf/conf_error.c',
......@@ -148,6 +150,7 @@
'src/crypto/ex_data_impl.c',
'src/crypto/hmac/hmac.c',
'src/crypto/lhash/lhash.c',
'src/crypto/md4/md4.c',
'src/crypto/md5/md5.c',
'src/crypto/mem.c',
'src/crypto/modes/cbc.c',
......
......@@ -166,6 +166,16 @@
'src/crypto/modes/gcm_test.c',
],
},
{
'target_name': 'boringssl_pkcs12_test',
'type': 'executable',
'dependencies': [
'boringssl.gyp:boringssl',
],
'sources': [
'src/crypto/pkcs8/pkcs12_test.c',
],
},
{
'target_name': 'boringssl_rsa_test',
'type': 'executable',
......@@ -215,6 +225,7 @@
'boringssl_hmac_test',
'boringssl_lhash_test',
'boringssl_md5_test',
'boringssl_pkcs12_test',
'boringssl_pkcs7_test',
'boringssl_rsa_test',
'boringssl_sha1_test',
......
......@@ -208,6 +208,10 @@ TEST(BoringSSL, PKCS7) {
TestSimple("pkcs7_test");
}
TEST(BoringSSL, PKCS12) {
TestSimple("pkcs12_test");
}
TEST(BoringSSL, ExampleMul) {
TestSimple("example_mul");
}
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment