Commit 99a85a60 authored by Steven Valdez's avatar Steven Valdez Committed by Commit Bot

Roll src/third_party/boringssl/src cece32610..8e75ae488

https://boringssl.googlesource.com/boringssl/+log/cece32610b89549386b42b2032dd5d8a423af6c8..8e75ae488047c519f14f2c08b02a55bf7712fa1d

BUG=none

Change-Id: I36edb8ad89f019bddea940ca7b6433ea3d8ef86e
Reviewed-on: https://chromium-review.googlesource.com/1040588
Commit-Queue: Steven Valdez <svaldez@chromium.org>
Reviewed-by: default avatarDavid Benjamin <davidben@chromium.org>
Cr-Commit-Position: refs/heads/master@{#555812}
parent 0dcdf8c2
...@@ -128,7 +128,7 @@ vars = { ...@@ -128,7 +128,7 @@ vars = {
# Three lines of non-changing comments so that # Three lines of non-changing comments so that
# the commit queue can handle CLs rolling BoringSSL # the commit queue can handle CLs rolling BoringSSL
# and whatever else without interference from each other. # and whatever else without interference from each other.
'boringssl_revision': 'cece32610b89549386b42b2032dd5d8a423af6c8', 'boringssl_revision': '8e75ae488047c519f14f2c08b02a55bf7712fa1d',
# Three lines of non-changing comments so that # Three lines of non-changing comments so that
# the commit queue can handle CLs rolling google-toolbox-for-mac # the commit queue can handle CLs rolling google-toolbox-for-mac
# and whatever else without interference from each other. # and whatever else without interference from each other.
......
...@@ -914,11 +914,9 @@ int SSLClientSocketImpl::Init() { ...@@ -914,11 +914,9 @@ int SSLClientSocketImpl::Init() {
SSL_set_mode(ssl_.get(), mode.set_mask); SSL_set_mode(ssl_.get(), mode.set_mask);
SSL_clear_mode(ssl_.get(), mode.clear_mask); SSL_clear_mode(ssl_.get(), mode.clear_mask);
// Use BoringSSL defaults, but disable HMAC-SHA256 and HMAC-SHA384 ciphers // Use BoringSSL defaults, but disable HMAC-SHA1 ciphers in ECDSA. These are
// (note that SHA256 and SHA384 only select legacy CBC ciphers). // the remaining CBC-mode ECDSA ciphers.
// Additionally disable HMAC-SHA1 ciphers in ECDSA. These are the remaining std::string command("ALL::!aPSK:!ECDSA+SHA1");
// CBC-mode ECDSA ciphers.
std::string command("ALL:!SHA256:!SHA384:!aPSK:!ECDSA+SHA1");
if (ssl_config_.require_ecdhe) if (ssl_config_.require_ecdhe)
command.append(":!kRSA"); command.append(":!kRSA");
......
...@@ -885,7 +885,7 @@ void SSLServerContextImpl::Init() { ...@@ -885,7 +885,7 @@ void SSLServerContextImpl::Init() {
// disabled by default. Note that !SHA256 and !SHA384 only remove HMAC-SHA256 // disabled by default. Note that !SHA256 and !SHA384 only remove HMAC-SHA256
// and HMAC-SHA384 cipher suites, not GCM cipher suites with SHA256 or SHA384 // and HMAC-SHA384 cipher suites, not GCM cipher suites with SHA256 or SHA384
// as the handshake hash. // as the handshake hash.
std::string command("DEFAULT:!SHA256:!SHA384:!AESGCM+AES256:!aPSK"); std::string command("DEFAULT:!AESGCM+AES256:!aPSK");
// SSLPrivateKey only supports ECDHE-based ciphers because it lacks decrypt. // SSLPrivateKey only supports ECDHE-based ciphers because it lacks decrypt.
if (ssl_server_config_.require_ecdhe || (!key_ && private_key_)) if (ssl_server_config_.require_ecdhe || (!key_ && private_key_))
......
...@@ -11,6 +11,8 @@ test_support_sources = [ ...@@ -11,6 +11,8 @@ test_support_sources = [
"src/crypto/test/malloc.cc", "src/crypto/test/malloc.cc",
"src/crypto/test/test_util.cc", "src/crypto/test/test_util.cc",
"src/crypto/test/test_util.h", "src/crypto/test/test_util.h",
"src/crypto/test/wycheproof_util.cc",
"src/crypto/test/wycheproof_util.h",
"src/ssl/test/async_bio.h", "src/ssl/test/async_bio.h",
"src/ssl/test/fuzzer.h", "src/ssl/test/fuzzer.h",
"src/ssl/test/fuzzer_tags.h", "src/ssl/test/fuzzer_tags.h",
......
This diff is collapsed.
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment