)]}'
{
  "commit": "7a5980cfbe12c93dceaa74b024f1503e60114539",
  "tree": "e5e9feb80240159c5e8eff9eb414c8ba290bd2a1",
  "parents": [
    "a9068c556bf3e009db4f85567bdaf52942afb670"
  ],
  "author": {
    "name": "Piotr Sikora",
    "email": "piotrsikora@google.com",
    "time": "Thu Jun 03 12:14:35 2021 -0700"
  },
  "committer": {
    "name": "Piotr Sikora",
    "email": "piotrsikora@google.com",
    "time": "Thu Jun 24 03:55:02 2021 +0000"
  },
  "message": "Bazel: update BoringSSL to ddecaab / 25ba1f4 (master-with-bazel).\n\nddecaabdc Check hs-\u003eearly_session, not ssl-\u003esession, for the early data limit.\na4646740e Fix some includes.\n940475da0 Be clearer which signing inputs are digests.\n29507b818 Validate RSA public keys more consistently.\n4b066b0e3 Add APIs to manually fill in signatures for CRLs.\n71a3b8266 Check for resumption identifiers in SSL_SESSION_is_resumable.\n6ff942985 Don\u0027t use SHA256(ticket) as the signaling session ID for tickets.\n1f6c3dc7d Simplify renego + resumption handling.\n962b375bc Move session ID assignment out of ssl_get_new_session.\n8349dfc87 Fix the ech_accept comment.\n070a6c3e0 Export the HPKE implementation.\n1eb7769e1 Refer to EVP_HPKE_CTX by a consistent name.\n1d58cd1fd Shift the KEM dependency in HPKE up a step.\nf0e5ea2d7 Update ACVP URLs.\n9b2cdb769 Add SSL_can_release_private_key.\n9f55d9728 Make X509_SIG and X509_CERT_AUX opaque.\n9fc617416 acvp: move hash iterations into modulewrapper.\n2b2cb7d93 Switch HPKE to a three-parameter output buffer.\nf39c81d52 Introduce EVP_HPKE_{AEAD,KDF} types.\n1d842c65e Don\u0027t mark up the first word in a collective comment.\nda4390f4e Revise the deterministic for_test variant of HPKE\u0027s SetupBaseS.\n198c5f56f Fix a memory leak with d2i_ASN1_OBJECT object reuse.\ne4d655648 Remove HPKE PSK mode.\n9f70097ef Remove HKDF-SHA384 and HKDF-SHA512 from HPKE.\n1264f0ce3 Correctly order PKCS#7 certificates and CRLs.\n94a63a5b6 Implement ECH draft 10 and update HPKE to draft 08.\nfe049e4d1 Document expected use of BTI and PAC macros.\n853ca1ea1 Remove non-deterministic bits from ECDSA ACVP test.\nd4f877ea3 Reference the newer ChaCha20-Poly1305 RFC.\n1cf78cd29 Use passive entropy collection everywhere.\na96f4dd38 Rename X509V*_VERSION constants.\n782d9b6cf Const-correct ASN1_OBJECT_create.\n354cd48f5 Clarify OBJ_get0_data and OBJ_get_length.\nc5dc2781b avcp: SHA-1 for ECDSA _verification_ is still supported by NIST.\n2e54edf32 A couple of Aarch64 FIPS delocate fixes.\neec7f3247 Use a placeholder for unknown errors in ERR_*_error_string.\n16c76acc7 Include assembly optimizations in Bazel builds on Linux-aarch64.\nfcec391b0 Remove some BoringSSL-only X509_CINF functions.\nab7811ee8 Document and test X509_ATTRIBUTE creation functions.\ndaf1aca1a Revert handshaker fd numbers and make StartProcess more flexible.\nb173d9191 Remove support for malformed X509_ATTRIBUTEs.\n575d11285 Make X509_ATTRIBUTE opaque.\n68a799af7 acvptool: Fix typo hard-coding the HTTP method.\nf0e64904a Document a few more x509.h functions.\ne60893c09 Make X509_PUBKEY opaque.\n468cde90c Always encode booleans as DER.\n2f3958a41 Fix issuerUID and subjectUID parsing in the key usage checker.\nb571e7777 Add experimental handshake hints API.\n666f2ab65 Make our Python scripts Python-3-compatible.\n15961379e Export ssl_client_hello_init for fuzzers.\n7a1986c46 acvp: support GMAC as an algorithm.\n94b477cea Record a fuzzing corpus for the ClientHelloInner decoder.\n5545b61a9 Use a consistent plural for \u0027corpus\u0027.\n43828993b Add util/bot/libFuzzer to .gitignore.\n09f71c1bf acvp: support KAS-ECC-SSC staticUnified mode.\n12a3e7edf Check for invalid ALPN inputs in SSL_(CTX_)set_alpn_protos.\ne4c19175a Don\u0027t duplicate ServerHello construction code.\n3b8c5ec1f Rearrange key share and early data logic.\ne2b7bb722 Only skip early data with HRR when offered.\n2de33c6b2 Add ECH server config API to ssl_ctx_api fuzzer\n3af88549c Fix ppc64le build.\n669ffe64a Simplify the Lucky13 mitigation.\n00e434d67 Add ECH server (draft-ietf-tls-esni-09).\n61d5aabc0 runner: Remove unused field\nca65bff67 runner: Construct finishedHash earlier.\nc31fb79cf Simplify tls_cbc.c slightly.\n7a0834b91 Remove remnants of CBC SHA2 cipher suites.\nbff883436 runner: Test different V2ClientHello challenge lengths.\n6810f0e83 runner: Ensure helloBytes is always the same as hello.marshal().\nfa2d3d56b runner: Fix ECH confirmation calculation with PSKs in tests.\n7d2ddd299 runner: Fix HPKE parameter order.\nd791fbd30 runner: UpdateForHelloRetryRequest cannot fail.\n4151b9feb runner: Don\u0027t use the buffer in TLS 1.3.\n4b854a6db runner: Don\u0027t maintain two copies of the same transcript hash.\n99f6d4bd1 runner: Remove remnants of SSL 3.0.\n5f757bc39 runner: Fix writeClientHash and writeRecord ordering.\n7a15a702a runner: Remove CheckTLS13DowngradeRandom.\nf225516cc runner: Remove remnants of the separate HelloRetryRequest message.\n050827189 runner: Store a cipherSuite in ClientSessionState.\n26a589e10 runner: Move writeHash to the finishedHash struct.\nfd739853a Fix the spelling of HPKE AEAD constants.\ndfde04f07 Don\u0027t reset server callback expectations on new handshake.\n8501579ac Fix MockQuicTransport::Flush error handling.\n15e0f6784 Fold ripemd/internal.h into ripemd.c.\nca4598781 Move load/store helpers to crypto/internal.h.\n8d4c8fc41 Make words in crypto/fipsmodule/modes actually words.\n6b9c012b7 Handle EINTR more in handshaker.cc.\n084064bec Add a few missing SSL_R_BIO_NOT_SET cases.\n9bcf307c4 Fix some unreachable code in the QUIC handshaker driver.\n0a6c3fc9c Rearrange SSLKeyShare::Serialize.\n08b1729f0 Fix ssl/internal.h sectioning.\nb62a48f31 Remove some now unnecessary test exclusions from split handshakes.\n60a78dcc9 Remove tls13-split-handshakes flag.\n953650cc7 Define HANDSHAKER_SUPPORTED in once place.\nb9b036340 Tidy up handshaker tester.\n1a93f4f82 modulewrapper: add option to print build information.\n0da75f35d FIPS counters for AES-CTR.\n3af62269d Enforce that pre_shared_key must come with psk_key_exchange_modes.\n4aef687fc Zero out FIPS counters.\nda890de1b Remove is_resume field on TestState.\n04c44d92c Remove OPENSSL_DANGEROUS_RELEASE_PTHREAD_KEY build flag.\n20f7bbaac Add some warnings on how to use OPENSSL_memory_* functions.\na24ab549e Use an unsized helper for truncated SHA-512 variants.\n139adff9b Fix mismatch between header and implementation of bn_sqr_comba8.\n\nChange-Id: Iabc6ece6bd677c1433eb71714fd4536892bb7711\nSigned-off-by: Piotr Sikora \u003cpiotrsikora@google.com\u003e\nReviewed-on: https://nginx-review.googlesource.com/c/nginx/+/3901\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "e1e37ab9c55b142d2e29a41452f4ae2bf60de869",
      "old_mode": 33188,
      "old_path": "bazel/repositories.bzl",
      "new_id": "0521cade6fa71f30124e6a0e627c738cdcf2869e",
      "new_mode": 33188,
      "new_path": "bazel/repositories.bzl"
    }
  ]
}
