Roll BoringSSL from 40e035a9e5d7 to db638238d297 (59 revisions)
https://boringssl.googlesource.com/boringssl.git/+log/40e035a9e5d7..db638238d297
2025-09-26 davidben@google.com Tolerate nullptr in i2d_X509_NAME
2025-09-26 davidben@google.com Add some missing includes
2025-09-26 davidben@google.com Fix and test other self-assignment cases in crypto/x509
2025-09-26 chlily@google.com Const-correct all i2d_*_bio functions
2025-09-26 agl@imperialviolet.org Add ACVP modulewrapper for the jitter entropy SHA-384 implementation.
2025-09-26 agl@imperialviolet.org Document that HMAC_Final can have a nullptr `out_len`.
2025-09-25 davidben@google.com Add a missing note about the hashes in ssl_compliance_policy_fips_202205 docs
2025-09-25 poliudian-iv@yandex-team.ru Fix bugs found by clangsa
2025-09-25 davidben@google.com Make setting an X509_NAME to itself work
2025-09-25 davidben@google.com Make the ASN1_TYPE-level type take precedence over the ASN1_STRING one
2025-09-23 davidben@google.com Use CRYPTO_addc_w in bn_from_montgomery_in_place
2025-09-23 davidben@google.com Use a simpler process to compute n0
2025-09-22 chlily@google.com Forbid setting EC public key to point at infinity
2025-09-21 davidben@google.com Remove stale comment
2025-09-21 davidben@google.com Upgrade the opportunistic CRYPTO_sysrand calls to normal ones
2025-09-21 davidben@google.com Remove some stale ifdefs from urandom.cc
2025-09-20 davidben@google.com Reject explicit default X.509 versions and empty extension lists
2025-09-19 davidben@google.com Bump the minimum CMake version to 3.22
2025-09-16 chlily@google.com Add API for configuring client key shares
2025-09-16 davidben@google.com draft-ietf-lamps-x509-policy-graph is now RFC 9618
2025-09-16 davidben@google.com Test a few more unusual TBS certificates
2025-09-16 davidben@google.com Const-correct a bunch more of <openssl/x509.h>
2025-09-16 davidben@google.com Unwind ASN1_ANY_AS_STRING
2025-09-16 davidben@google.com Embed X509_NAME into X509
2025-09-16 davidben@google.com Don't create partial X509 and X509_CRL objects to search the X509_STORE
2025-09-15 davidben@google.com Const-correct X509_NAME and test thread-safety
2025-09-15 davidben@google.com Rewrite the X509_NAME parser
2025-09-15 davidben@google.com Parameterize the tag in IMPLEMENT_EXTERN_ASN1_SIMPLE
2025-09-15 davidben@google.com Test a few more cases of null STACK_OF(T)
2025-09-15 davidben@google.com Make more of atomic<T> available to libcrypto
2025-09-15 davidben@google.com Test that X509_NAME_add_entry will not allow invalid entries to be added
2025-09-15 davidben@google.com Make make_unusual_tbs.go test data idempotent
2025-09-10 davidben@google.com Add EVP_pkey_rsa_pss_sha384 and EVP_pkey_rsa_pss_sha512
2025-09-10 davidben@google.com Store the PSS parameters in the RSA object
2025-09-10 davidben@google.com Don't include every field in every EVP_PKEY_ALG
2025-09-09 chlily@google.com Allow SSL_HANDSHAKE::key_shares to vary in size
2025-09-09 chlily@google.com Always populate supported_group_list
2025-09-09 chlily@google.com Require configured groups for key exchange to be unique
2025-09-07 davidben@google.com Various IWYU fixes
2025-09-06 jonathanjlee@google.com [gtest] Clean up single-arg `testing::Invoke()`s
2025-09-04 davidben@google.com Remove stale static asserts about atomics
2025-09-04 davidben@google.com Add X509_parse_with_algorithms
2025-09-04 davidben@google.com Make X509_verify X509_sign_ctx work with EVP_PKEY_RSA_PSS
2025-09-04 davidben@google.com Rewrite X509's parser with CBS/CBB
2025-09-04 davidben@google.com Rename X509_CINF::signature to X509_CINF::tbs_sig_alg
2025-09-04 davidben@google.com Rewrite X509_PUBKEY's parsers with CBS/CBB
2025-09-04 davidben@google.com Parse X509's signature algorithm with the CBS/CBB functions
2025-09-04 davidben@google.com Parse X509_ALGOR without depending on the templates
2025-09-04 davidben@google.com Make ASN1_EXTERN_FUNCS's parse callback CBS-based
2025-09-04 davidben@google.com Remove the tag parameter to IMPLEMENT_EXTERN_ASN1
2025-09-04 davidben@google.com Add X509_ALGOR_copy
2025-09-04 davidben@google.com Write some templated functions for the d2i/i2d convention
2025-09-04 davidben@google.com Make CBS/CBB-versions of crypto/asn1 types
2025-09-04 davidben@google.com Avoid one malloc indirection in X509
2025-09-03 davidben@google.com Test the implicit cleanup feature of X509_sign_ctx, etc.
2025-09-03 davidben@google.com Add a benchmark for parsing with d2i_X509
2025-09-03 davidben@google.com Systematically test that parsers catch trailing data
2025-09-03 davidben@google.com Test verifying signatures over "unusual" TBSCertificates
2025-09-03 davidben@google.com Use std::string_view in x509_test.cc
If this roll has caused a breakage, revert this CL and stop the roller
using the controls here:
https://autoroll.skia.org/r/boringssl-dart-sdk
Please CC dart-engprod@google.com,dart-vm-gardener@grotations.appspotmail.com,dart-vm-team@google.com on the revert to ensure that a human
is aware of the problem.
To file a bug in BoringSSL: https://crbug.com/boringssl/new
To file a bug in Dart SDK: https://github.com/dart-lang/sdk/issues
To report a problem with the AutoRoller itself, please file a bug:
https://issues.skia.org/issues/new?component=1389291&template=1850622
Documentation for the AutoRoller is here:
https://skia.googlesource.com/buildbot/+doc/main/autoroll/README.md
Tbr: dart-vm-gardener@grotations.appspotmail.com
Change-Id: I3007be42a120096e0f0027cbc6acb7504f0c4f94
Reviewed-on: https://dart-review.googlesource.com/c/sdk/+/451842
Commit-Queue: Ryan Macnak <rmacnak@google.com>
Reviewed-by: Ryan Macnak <rmacnak@google.com>
Reviewed-by: Alexander Aprelev <aam@google.com>
diff --git a/DEPS b/DEPS
index ef4b9c0..0397c97 100644
--- a/DEPS
+++ b/DEPS
@@ -97,7 +97,7 @@
# Prefer to use hashes of binaryen that have been reviewed & rolled into g3.
"binaryen_rev" : "1d2e23d5e55788091a51420ba3a9889d4efe7509",
- "boringssl_rev": "40e035a9e5d721b3b7c15c46259d782ffe7d9e96",
+ "boringssl_rev": "db638238d29708a20b991af3b2488e45a8bbcf71",
"browser-compat-data_tag": "ac8cae697014da1ff7124fba33b0b4245cc6cd1b", # v1.0.22
"cpu_features_rev": "936b9ab5515dead115606559502e3864958f7f6e",
"devtools_rev": "5e1792245005088a0a0dfe28f207bd22045ba783",