| commit | 7b4b704732bc63853293ac3eeaa453a44bb912ad | [log] [tgz] |
|---|---|---|
| author | DEPS Autoroller <dart-autoroll@skia-public.iam.gserviceaccount.com> | Tue Dec 03 15:58:54 2024 +0000 |
| committer | Commit Queue <dart-scoped@luci-project-accounts.iam.gserviceaccount.com> | Tue Dec 03 15:58:54 2024 +0000 |
| tree | 17a82bf304b7ca820b8e267cd42bc1f1b2020abd | |
| parent | 30c93d67b4e7ddc58b7a4ef61731d265d800f92b [diff] |
Roll BoringSSL from cd9521046549 to 567289e4bb19 (102 revisions) https://boringssl.googlesource.com/boringssl.git/+log/cd9521046549..567289e4bb19 2024-12-02 davidben@google.com Remove redundant GCM tests 2024-12-02 agl@chromium.org Add EVP_MD_CTX_get0_md 2024-11-28 davidben@google.com Update tools and add a .bazelversion 2024-11-26 tokarip@google.com Speed up sha512 on x86 2024-11-26 agl@chromium.org crypto: switch to C++ 2024-11-26 davidben@google.com Remove the old SSL_R_APPLICATION_DATA_INSTEAD_OF_HANDSHAKE logic 2024-11-26 davidben@google.com Don't access the read_buffer directly in read_v2_client_hello 2024-11-26 davidben@google.com Don't refer to key_update_requested responses as ACKs 2024-11-25 davidben@google.com Test ACKing and reassembly of post-handshake messages 2024-11-25 davidben@google.com runner: Move some test bugs into the callback 2024-11-25 davidben@google.com Test that the DTLS 1.3 server retransmits NewSessionTicket correctly. 2024-11-25 jpihl08@gmail.com Fix OPENSSL_NO_ASM build for ARM 2024-11-25 davidben@google.com Document expected operations on libssl custom BIOs 2024-11-23 davidben@google.com Gate -fno-rtti on BORINGSSL_ALLOW_CXX_RUNTIME 2024-11-23 davidben@google.com Tweak comment in thread.h slightly 2024-11-20 davidben@google.com Build with -Wextra-semi in Clang 2024-11-19 davidben@google.com runner: Move receivedFlightRecords tracking up a layer 2024-11-19 davidben@google.com Remove outdated DTLS 1.3 test suppression 2024-11-18 davidben@google.com runner: Remove unused skipPacket method 2024-11-18 davidben@google.com Remove stale DTLS 1.3 TODO 2024-11-18 davidben@google.com Schedule ACKs when we receive a partial flight 2024-11-18 davidben@google.com Introduce a DTLSTimer abstraction 2024-11-18 davidben@google.com Check for QUIC in SSL_process_quic_post_handshake 2024-11-18 davidben@google.com runner: Remove outdated FragmentClientVersion logic 2024-11-15 davidben@google.com Test DTLSv1_get_timeout behavior 2024-11-15 davidben@google.com runner: Add a helper to read and downcast a message 2024-11-15 davidben@google.com runner: Rearrange 0-RTT code in server slightly 2024-11-15 davidben@google.com Return OPENSSL_timeval by value 2024-11-14 davidben@google.com Call the message callback for DTLS 1.3 ACKs 2024-11-14 davidben@google.com Better track final vs early versions 2024-11-14 davidben@google.com Update the default retransmit timeout for DTLS 2024-11-14 davidben@google.com runner: Remove unused SendHalfRTTData option 2024-11-14 davidben@google.com Send one ACK immediately after the handshake in DTLS 1.3 servers 2024-11-13 bbe@google.com clang-format all of ssl 2024-11-13 agl@chromium.org Include <memory> in mldsa.cc 2024-11-13 davidben@google.com Support skipping tickets in both ticket callbacks 2024-11-13 davidben@google.com Exercise SSL_TICKET_AEAD_METHOD in runner 2024-11-12 davidben@google.com Disable sdallocx detection by default 2024-11-12 davidben@google.com Correctly retransmit the final flight in DTLS 1.3 2024-11-12 davidben@google.com Track SSL session types a bit better on the client 2024-11-12 davidben@google.com Don't pack fragments as efficiently for plaintext records 2024-11-12 davidben@google.com Reject NewSessionTicket messages with empty tickets in TLS 1.3 2024-11-12 davidben@google.com Remove stray semicolon 2024-11-12 davidben@google.com Update the timer API for DTLS 1.3 2024-11-12 davidben@google.com runner: ACK flights in DTLS 1.3 by default 2024-11-12 davidben@google.com Handle implicit ACKs in DTLS 1.3 2024-11-11 davidben@google.com Use DTLS 1.3 ACKs to avoid retransmitting ACKed fragments 2024-11-08 agl@chromium.org SLH-DSA: support SHA-384 as the prehash function instead. 2024-11-07 davidben@google.com Test that DTLS retransmit can react to MTU changes 2024-11-06 davidben@google.com Redo DTLS retransmit tests 2024-11-06 filippo@golang.org runner: don't assume BlockMod implements SetIV 2024-11-03 nharper@chromium.org Remove redundant tests. 2024-11-01 nharper@chromium.org Fix up a DTLS 1.3 comment. 2024-11-01 davidben@google.com Run some DTLS tests across all versions 2024-11-01 davidben@google.com Stage new DTLS 1.3 read epochs until the first record comes in 2024-11-01 agl@imperialviolet.org acvptool: unbreak tests. 2024-11-01 agl@chromium.org Add support for prehashed SLH-DSA. 2024-11-01 davidben@google.com Pack DTLS fragments into records when possible 2024-10-31 davidben@google.com runner: Retain past epochs 2024-10-31 davidben@google.com runner: Move epoch state into a separate structure 2024-10-30 nharper@chromium.org Don't attempt to send early data in DTLS 1.3. 2024-10-30 nharper@chromium.org Don't issue early data capable tickets in DTLS 1.3. 2024-10-30 davidben@google.com runner: Remove explicit seq parameter to encrypt and decrypt 2024-10-30 davidben@google.com runner: Remove unnecessary config parameter to hc.changeCipherSpec 2024-10-30 davidben@google.com runner: Remove redundant check for (D)TLS 1.3 in test code 2024-10-29 emarteca@google.com Adding Debug derivation for RSA PublicKey 2024-10-29 davidben@google.com runner: Flush DTLS fragments on key change in our 1.3 test stack 2024-10-29 davidben@google.com Remove now redundant check for extra DTLS messages in epoch 1 2024-10-28 bbe@google.com fix indexing_slicing and unwrap warnings 2024-10-28 davidben@google.com Update Cargo.toml after the cfg rename 2024-10-28 danakj@chromium.org Copy bindings to OUT_DIR in bssl-sys build.rs 2024-10-28 agl@chromium.org mldsa: abstract over the matrix size. 2024-10-26 daniel@binaryparadox.net utils/fipstools: add SHAKE-128/256 ACVP support 2024-10-25 davidben@google.com Spanify the DTLS packet assembly logic a bit 2024-10-25 davidben@google.com Implement a fixed-width ring buffer for DTLS 1.3 2024-10-25 davidben@google.com Amortize invariant maintenance in DTLSMessageBitmap 2024-10-25 bbe@google.com add some details to releaseing.md 2024-10-25 davidben@google.com Store an Array in hm_fragment 2024-10-25 davidben@google.com Use DTLSRecordNumber in DTLSWriteEpoch 2024-10-24 agl@chromium.org mldsa: convert to C++ 2024-10-24 davidben@google.com Return the record number out of the DTLS record layer 2024-10-24 bbe@google.com Update BCR to 20241024.0 2024-10-24 nharper@chromium.org Resolve DTLS 1.3 TODOs in ssl_test.cc. 2024-10-24 davidben@google.com Never reconstruct 1.3 record numbers above 2^48-1 2024-10-24 yiwzhang@google.com enable honor_gerrit_linked_accounts for boingssl 2024-10-24 davidben@google.com Allow bssl_shim to be ptraced by anyone if waiting for a debugger 2024-10-24 nharper@chromium.org Rename DTLS 1.3 TODOs. 2024-10-23 davidben@google.com Pull the DTLS reassembly bitmap into its own abstraction 2024-10-23 agl@chromium.org Have modulewrapper print more of its build environment. 2024-10-22 davidben@google.com Standardize on Init vs InitForOverwrite for value vs default initialization 2024-10-22 davidben@google.com Move tests for libssl's internal utilities into a separate file 2024-10-22 nharper@chromium.org Process (and ignore) DTLS 1.3 ACK messages. 2024-10-22 daniel@binaryparadox.net util/fipstools: add EDDSA ACVP support 2024-10-21 nharper@chromium.org Support resumption in DTLS 1.3. 2024-10-21 davidben@google.com Move RecordNumberEncrypter to DTLS-specific state 2024-10-21 davidben@google.com Store DTLS epoch state separately 2024-10-16 davidben@google.com Copy the infra/config branch into an infra/config subdirectory 2024-10-16 nharper@chromium.org Improve handling of DTLS 1.3 post-handshake messages. 2024-10-16 davidben@google.com Don't use OPENSSL_ARRAY_SIZE with an InplaceVector 2024-10-15 daniel@binaryparadox.net utils/fipstools: add PBKDF ACVP support 2024-10-15 daniel@binaryparadox.net utils/fipstools: fix ACVP test data comments 2024-10-15 daniel@binaryparadox.net util/fipstools: SHA2-512-224 ACVP.md updates If this roll has caused a breakage, revert this CL and stop the roller using the controls here: https://autoroll.skia.org/r/boringssl-dart-sdk Please CC dart-engprod@google.com,dart-vm-gardener@grotations.appspotmail.com,dart-vm-team@google.com on the revert to ensure that a human is aware of the problem. To file a bug in BoringSSL: https://crbug.com/boringssl/new To file a bug in Dart SDK: https://github.com/dart-lang/sdk/issues To report a problem with the AutoRoller itself, please file a bug: https://issues.skia.org/issues/new?component=1389291&template=1850622 Documentation for the AutoRoller is here: https://skia.googlesource.com/buildbot/+doc/main/autoroll/README.md Tbr: dart-vm-gardener@grotations.appspotmail.com Change-Id: Idc48d27f43d8c483038fe4cff394f4cd586448e4 Reviewed-on: https://dart-review.googlesource.com/c/sdk/+/398562 Commit-Queue: Alexander Aprelev <aam@google.com> Reviewed-by: Alexander Aprelev <aam@google.com> Reviewed-by: Ryan Macnak <rmacnak@google.com>
Dart is:
Approachable: Develop with a strongly typed programming language that is consistent, concise, and offers modern language features like null safety and patterns.
Portable: Compile to ARM, x64, or RISC-V machine code for mobile, desktop, and backend. Compile to JavaScript or WebAssembly for the web.
Productive: Make changes iteratively: use hot reload to see the result instantly in your running app. Diagnose app issues using DevTools.
Dart's flexible compiler technology lets you run Dart code in different ways, depending on your target platform and goals:
Dart Native: For programs targeting devices (mobile, desktop, server, and more), Dart Native includes both a Dart VM with JIT (just-in-time) compilation and an AOT (ahead-of-time) compiler for producing machine code.
Dart Web: For programs targeting the web, Dart Web includes both a development time compiler (dartdevc) and a production time compiler (dart2js).
Dart is free and open source.
See LICENSE and PATENT_GRANT.
Visit dart.dev to learn more about the language, tools, and to find codelabs.
Browse pub.dev for more packages and libraries contributed by the community and the Dart team.
Our API reference documentation is published at api.dart.dev, based on the stable release. (We also publish docs from our beta and dev channels, as well as from the primary development branch).
If you want to build Dart yourself, here is a guide to getting the source, preparing your machine to build the SDK, and building.
There are more documents in our repo at docs.
The easiest way to contribute to Dart is to file issues.
You can also contribute patches, as described in Contributing.
Future plans for Dart are included in the combined Dart and Flutter roadmap on the Flutter wiki.