)]}'
{
  "commit": "84bf510f2841e9b3defe0bae7dedcdc79740edbc",
  "tree": "a20a9135cb8e621a7ba03e90a5844365e936c0a1",
  "parents": [
    "ddc06518da2fd47baa7aa6cf5bd22122b7b4e70d"
  ],
  "author": {
    "name": "Piotr Sikora",
    "email": "piotrsikora@google.com",
    "time": "Tue Jun 05 13:47:15 2018 -0700"
  },
  "committer": {
    "name": "Piotr Sikora",
    "email": "piotrsikora@google.com",
    "time": "Sun Jun 10 02:10:09 2018 +0000"
  },
  "message": "Bazel: update BoringSSL to 5601bda / 372daf7 (master-with-bazel).\n\nThis update includes the following changes:\n\n5601bdac Rename crypto/rsa_extra/print.c.\n990a3232 Add --embed_test_data\u003dfalse option to generate_build_files.py\n239c05a7 Allow convert_wycheproof.go to be used one file at a time.\n576b6378 Move convert_wycheproof.go to util/\n189270cd Ignore Spectre mitigation warning.\nc93724b5 Benchmark TLS AES-CBC ciphers in both directions.\nfee8709f Replace |alloca| in |BN_mod_exp_mont_consttime|.\n63e2a081 Spell Falko Strenzke\u0027s name correctly.\n982279b3 Add a PKCS#12 fuzzer.\n2f5100e6 More compatibility stuff.\n9b2c6a93 Extract friendly names attached to certificates.\n22ae0b85 Try both null and empty passwords when decoding PKCS#12.\n910320a3 Restore some revocation-related X.509 extensions.\ndb196aab Distinguish unrecognized SPKI/PKCS8 key types from syntax errors.\n91254c24 Rename |asm_AES_*| to |aes_nohw_*|.\nd12f2ba5 Tweak RSA errors for compatibility.\nfa544f1c Reject if the ALPN callback returned an empty protocol.\ne6737a86 x509_test: Fix gcc-8 build\n911cc0a0 The legacy client OCSP callback should run without server OCSP.\nd6e31f6a Return more placeholder version strings.\n9db1a001 Support 3DES-CMAC.\n62abcebb Add a driver for Wycheproof CMAC tests.\n370bb356 Refresh TLS fuzzer corpora.\n05750f23 Revert \"Revert \"Revert \"Revert \"Make x86(-64) use the same aes_hw_* infrastructure as POWER and the ARMs.\"\"\"\"\n5b220ee7 Add APIs to query authentication properties of SSL_SESSIONs.\n69271b5d Revert \"Revert \"Revert \"Make x86(-64) use the same aes_hw_* infrastructure as POWER and the ARMs.\"\"\"\n7d1f3598 Show an error before we abort the process for an entropy failure.\n103ed085 Implement legacy OCSP APIs for libssl.\n7b832ad1 Don\u0027t crash if asked to treat PBES2 as a PBES1 scheme.\nf05e3eaf Add a bunch of X509_STORE getters and setters.\n2e67153d Add PKCS12_create.\na3c2517b Add i2d_PKCS12*.\nbc2562e5 Treat PKCS#12 passwords as UTF-8.\nae153bb9 Use new encoding functions in ASN1_mbstring_ncopy.\n99767ecd Enable ADX assembly.\nb06f92da Add new character encoding functions.\n29d97ff3 Revert \"Revert \"Make x86(-64) use the same aes_hw_* infrastructure as POWER and the ARMs.\"\"\naca24c87 Revert \"Make x86(-64) use the same aes_hw_* infrastructure as POWER and the ARMs.\"\n5f001d14 Const-correct some functions.\n26ba48a6 Make x86(-64) use the same aes_hw_* infrastructure as POWER and the ARMs.\n56c4ed9a Allow enabling all TLS 1.3 variants by setting |tls13_default|.\n65359f08 Don\u0027t keep trying to read from stdin after EOF.\nd4e091ec Refresh TLS fuzzer corpora.\n418cdc4d Use the right alert for bad CA lists.\n3babc86d Expand the documentation of |SSL_set_shed_handshake_config|.\n8094b54e Add BIO versions of i2d_DHparams and d2i_DHparams.\n02de7bd3 Add some more accessors to SSL_SESSION.\nf64c3737 Fix build with GCC 4.9.2 and -Wtype-limits.\nbb3a4569 Move some RSA keygen support code into separate files.\n5d626b22 Add some more compatibility functions.\n044f637f reformat third_party/wycheproof_testvectors/METADATA\n477a9262 Bump BORINGSSL_API_VERSION.\n57eaeaba Fix include path.\n91374e0c Add a stub e_os2.h header.\n0318b051 Add some OpenSSL compatibility functions and hacks.\n1d339558 Fix clang-cl build.\n26aa7c88 Handle blocked writes in bssl client/server.\ned188fd8 Enforce supported_versions in the second ServerHello.\n3d9705d0 Fix bssl handling of buffered read data.\n28385db6 Fix bssl select loop on Windows.\n2a92847c Restore some MSVC warnings.\nbf33114b Rename third_party/wycheproof to satisfy a bureaucrat.\n98831738 Revert \"Add other Windows configurations to the CQ.\"\nb0412a6e Add other Windows configurations to the CQ.\n3c37d0ab Reland \"Fix bssl client/server\u0027s error-handling.\"\n0cdbc876 Revert \"Fix bssl client/server\u0027s error-handling.\"\ne7ca8a5d Fix bssl client/server\u0027s error-handling.\ne30fac63 Fuzz SSL_serialize_handoff() and SSL_serialize_handback().\n9fdf7cb9 SSL_apply_handback: check session is where it\u0027s expected to be.\n0e9e0ba1 SSL_apply_handback: check that SSL version is valid.\n537553ff Prevent out of bound read in do_buf (a_strex).\n179c4e25 Update Wycheproof, add keywrap tests, and fix a bug.\ncf341d02 Add missing #include of \u003copenssl/mem.h\u003e.\nf6d9f0b5 bn/asm/*-mont.pl: fix memory access pattern in final subtraction.\n3e87165d Avoid compiler errors for Android ARMv7.\ndd444b1d Fix bugs in X509_NAME_add_entry.\n0c9ac2e7 Drop FULL_UNROLL code in aes.c.\n0ca92143 Temporarily restore SHA256 and SHA384 cipher suite aliases.\nb95d4b4c Move srtp_profiles to SSL_CONFIG.\n98472cb3 Consistently use session_ctx for session caching.\n8e75ae48 Add a Wycheproof driver for AES-CBC.\n302bb396 Small curve25519 cleanups.\n6e678eeb Remove legacy SHA-2 CBC ciphers.\n71666cb8 Allow renego and config shedding to coexist more smoothly.\nb7bc80a9 SSL_CONFIG: new struct for sheddable handshake configuration.\na2dd7818 Defer writing the shim settings.\n3f944674 Add an ECDH Wycheproof driver.\n7760af4b Print tcId in converted Wycheproof files.\n55053286 Add AEAD Wycheproof drivers.\n58d6fc48 Add missing #include of \u003copenssl/err.h\u003e.\nc596415e Add a DSA Wycheproof driver.\n57072742 Add Ed25519 Wycheproof driver.\n6ae7ddb7 Add some notes on how to handle breaking changes.\n8370fb6b Implement constant-time generic multiplication.\n8b0dc7a7 Simplify ec_wNAF_mul table sizing.\n041dd68c Clear mallocs in ec_wNAF_mul.\ne14e4a7e Remove ec_compute_wNAF\u0027s failure cases.\n40d76f4f Add ECDSA and RSA verify Wycheproof drivers.\n5509bc06 Add a test driver for Wycheproof\u0027s x25519_test.json.\n855dabc9 Add an accessor for session-\u003ecerts.\nbf4bcdf1 Fix some stuttering.\n2d10c368 Check in a copy of Project Wycheproof test vectors.\nb8546dd8 Update location of root certificates on Fuchsia\ncece3261 Add SHA256_TransformBlocks.\nec4f0dda EC_GROUP_dup cannot fail.\n32e0d100 Add EC_FELEM for EC_POINTs and related temporaries.\n6a289b3e Remove EC_POINTs_make_affine and related logic.\n06c28d8e Simplify shim timeout logic.\n48b276db Give ssl_cipher_preference_list_st a destructor.\n06d467c5 ghashv8-armx.pl: add Qualcomm Kryo results.\na7c8f2b7 ghashv8-armvx.pl: Fix various typos.\na63d0ad4 Require BN_mod_exp_mont* inputs be reduced.\n52a68a9b Remove unused string.h include.\n5c0e0cec Remove Z \u003d 1 special-case in generic point_get_affine.\nf5858ca0 Remove unnecessary endian flip in p224-64.c.\nb8f14b7d Add dedicated scalar inversion code to p256-x86_64.c.\n364a51ec Abstract scalar inversion in EC_METHOD.\nb27b579f Add some tests for scalar operations.\n3861ae66 p256-x86_64-asm.pl: add .cfi and SEH handlers to new functions.\n5c30dab8 Import P-256 scalar multiplication assembly from OpenSSL.\n7121fe24 Align ECDSA sign/verify scalar inversions.\n941f5354 Abstract away EC_SCALAR operations.\n9291be5b Remove return values from bn_*_small.\n3f8074c2 Fix the error on overly large group orders.\ncd012549 Explicitly guarantee BN_MONT_CTX::{RR,N} have the same width.\ne3aba378 Fix typo in ssl_cert_cache_chain_certs.\na2938719 Improve the RSA key generation failure probability.\n9af9b946 Restore the BN_mod codepath for public Montgomery moduli.\n7e2a8a34 Speed up variable windowed exponentation a bit.\nb1e6a854 Change OPENSSL_cpuid_setup to reserve more extended feature space.\n35e7c994 Remove files from Trusty which can\u0027t link because of Trusty libc.\n6f6a237d delocate: put emitted labels in a specific file.\n56b1a8ef Test the high-order bit in X25519.\n56ea9e27 Fix bn_mod_exp_mont_small when exponentiating to zero.\ne0ae249f Remove a \u003d 0 special-case in BN_mod_exp_mont.\nd3192050 Deny CRT to unbalanced RSA keys.\n024f5df3 Avoid some divisions in Lucky 13 fix.\ne325c3f4 Give CERT a destructor.\nfceca8e2 Move srtp_profile to ssl-\u003es3.\ne28552de Add an API to disable RSA-PSS for certificates.\nc9775322 Pretty-print TicketAEADMethod tests.\n6879e193 Rename SSL_SIGN_RSA_PSS_SHA* constants.\n5ad94767 Remove legacy SSL_CTX_sess_set_get_cb overload.\n68478b7e Add runtime bounds checks to bssl::Span.\n9f0e7cb3 Move TB state to ssl-\u003es3.\nb8b1a9d8 Add SSL_SESSION_get0_cipher.\n1414d86f tool: Move the RSA specific code from |Speed| to |SpeedRSA|.\n27e4c3ba Add an OPENSSL_malloc_init stub.\nde20810f Fix return value in speed tool.\nacddb8c1 Avoid modifying stack in sk_find.\nc5154f7d SSL_serialize_handoff: serialize fewer things.\n868ec735 SSL_apply_handback: check that |max_send_fragment| is nonzero.\n98dd68fb [util] Generate separate GN source sets for headers and sources\n5b2a51de Check for nullptr result of SSLKeyShare::Create().\ne2ab21d1 Use the actual record header, rather than reassembling it.\nf11ea190 Actually benchmark RSA verification with a fresh key.\nbb2e1e1e No-op comment to kick the bots.\n628b3c7f Don\u0027t write out a bad OID\ndcd862c1 No-op commit to kick the bots.\nb2eaeb0b Drop some trial-division primes for 1024-bit candidates.\n861f384d Implement TLS 1.3 draft28.\neda47f5d Make generic point arithmetic slightly less variable-time.\n56986f90 Hand back ECDHE split handshakes after the first server message.\n\nChange-Id: Ia1bc0f57111a18e0fe979842fcf28e90eceb398e\nSigned-off-by: Piotr Sikora \u003cpiotrsikora@google.com\u003e\nReviewed-on: https://nginx-review.googlesource.com/3401\nReviewed-by: Lizan Zhou \u003czlizan@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "88678721a980bf232966869ea6eb1d55abfc3942",
      "old_mode": 33188,
      "old_path": "build.bzl",
      "new_id": "35726989de3754192928ccfe6023784fa1785dfe",
      "new_mode": 33188,
      "new_path": "build.bzl"
    }
  ]
}
