)]}'
{
  "commit": "bf7ce2396482e2dbc810dfbf15210ada191117b2",
  "tree": "6ce1088de34460ae0ac88abab1f2fcd4d8f6ee69",
  "parents": [
    "622f62c0a63bfa9e1c054e0db7369dc2f5319945"
  ],
  "author": {
    "name": "Piotr Sikora",
    "email": "piotrsikora@google.com",
    "time": "Tue Nov 29 20:48:58 2016 -0800"
  },
  "committer": {
    "name": "Piotr Sikora",
    "email": "piotrsikora@google.com",
    "time": "Wed Dec 07 19:00:58 2016 +0000"
  },
  "message": "Bazel: update BoringSSL to 5fa2538 / a94639d (master-with-bazel).\n\nThis update includes the following changes:\n\n5fa2538 Clean up the GHASH init function a little.\nabd36dd Set needed defines for UINT64_C in gcm_test.cc.\n64a8659 Rename BSWAP[48] to CRYPTO_bswap[48] and always define them.\n48891ad Simplify BoGo\u0027s TLS 1.3 key derivation.\n0d1faef Also add util/bot/golang to .gitignore.\nc629e8b Split CRYPTO_ghash_init from CRYPTO_gcm128_init.\na00cafc Drop H (the key) from the GCM context.\ne8bbc6c Assume little-endian in GCM code.\n0ec5639 Don\u0027t extract archives if unchanged.\n65241cf Add util/bot files to .gitignore.\nf18ad08 tool: don\u0027t generate negative serial numbers.\nd8a2682 Simplify rotate_offset computation in EVP_tls_cbc_copy_mac.\na4ddb6e Remove unnecessary constant-time operation.\n029cce5 Tidy up EVP_tls_cbc_copy_mac a little.\naedf303 Parse the entire PSK extension.\nbf48364 Support setting per-connection default session lifetime value\n15073af Adding a fuzzer for Sessions\na4ee74d Skipping early data on 0RTT rejection.\n8f820b4 Clean up resumption secret \"derivation\" step.\nce1f62c Make `bssl server` generate a self-signed cert if none is provided.\n509889d Sync with upstream\u0027s version of sha256-armv4.pl.\nf086df9 signed char \u003d\u003e int8_t.\ne4a9dbc Minor formatting fixups.\nbfe5f08 Rewrite EC_window_bits_for_scalar_size into a function.\nc6d09e8 Check for BN_lshift failure in BN_sqrt.\n1c68eff Fix error code for unreduced x.\n14ebb4f Don\u0027t compute the Kronecker symbol in ec_GFp_simple_set_compressed_coordinates.\nbd69175 Test that BN_mod_sqrt detects quadratic non-residues.\n55a1ecc Don\u0027t allow BN_mod_sqrt(0) to return P in tests.\n3d622e5 Add missing bounds check in tls13_derive_resumption_secret.\n68f37b7 Run TestOneSidedShutdown at all versions.\n0fef305 Add a ForEachVersion function to ssl_test.\n9b885c5 Don\u0027t allow invalid SCT lists to be set.\n6f5f49f Flush TLS 1.3 certificate extensions.\ncfa08c3 Enforce basic sanity of SCT lists.\nb5172a7 Make tls1_setup_key_block static.\n7da8ea7 Add forward declaration to avoid a compiler warning\nfbbef12 Don\u0027t put a colon in the extra error message.\nd7b9002 Define BORINGSSL_SHARED_LIBRARY when building tests with Bazel.\n5f04b6b Add ppc64le vector implementation of SHA-1.\n35598ae Remove ext_alpn_init.\ne7f60a2 Fix alert on tls1_process_alert failure.\n12d6baf Make ssl_ext_pre_shared_key_add_clienthello static.\n2aaaa16 Depend all_tests on p256-x86_64_test.\nbbaf367 Add |SSL_set_retain_only_sha256_of_client_certs|.\na933c38 Test setting session ID context in early or SNI callback.\nf01f42a Negotiate ciphers before resumption.\n34202b9 Call cert_cb before resolving resumption.\n4eb95cc Parse ClientHello extensions before deciding on resumption.\n8d3f130 tool: print client\u0027s SNI value, if any.\n4008c7a Fix some more negative zeros and add tests for each case.\nca0b603 Remove unnecessary BN_is_negative check in p256-x86_64_test.\ndc16f38 ec/ecp_nistz256: harmonize is_infinity with ec_GFp_simple_is_at_infinity.\ne1cc35e Tolerate cipher changes on TLS 1.3 resumption as a client.\n2b02f4b Loosen TLS 1.3 session/cipher matching in BoGo.\nd0d532f Select TLS 1.3 cipher before resumption in BoGo.\n6929f27 Fix return values for TLS 1.3 state machine code.\n71186e8 Move ExpectTicketAge out of AcceptAnySession.\n0b8f85e Fix AcceptAnyVersion bug.\nba28dfc Add a -repeat-until-failure flag to runner.\n53210cb Do not send unsolicited SCTs in TLS 1.3.\nea80f9d obfuscated_ticket_age must also be reset when comparing.\n75f9914 Align TLS 1.2 and 1.3 server session validity checks.\n1e21e99 More flexible detection of arm processors to fix cmake errors on armv6l and armv7l devices\nbca451e Remove bssl::Main wrapper in ec_test.\ne36888d Rename and document ecp_nistz256_mod_inverse.\ndde19c6 Fix booth_recode_w5 comment.\n4a9313a Add low-level p256-x86_64 tests.\n28d1dc8 Perform stricter reduction in p256-x86_64-asm.pl.\nc5665c9 Remove out-of-date BoGo earlyDataContext parsing bits.\nb8d74f5 Add tests for failing cert_cb.\nd5ff2f9 Refresh TLS fuzzer corpora.\nfd06601 Add a script to refresh fuzzer corpora.\n9b63f29 Fix run_tests on fuzzer-mode builds.\ndfb4138 Update suppressions for fuzzer mode.\nffb1107 Add a helper function for parsing extensions blocks.\n32b47a5 Allow PSK binder mismatches in fuzzer mode.\na833c35 Update to TLS 1.3 draft 18.\nced9479 Replace hash_current_message with get_current_message.\ne8b554d Fix Android bots.\n2c51645 Add runner tests which send intermediate certificates.\ne6f2221 Enforce record-layer version numbers.\n49b5038 Speculative fix to Android bots.\neab773a Add missing PSK identity comment.\n076ade5 Update pinned revisions in util/bot.\n78476f6 Move tlsext_ticket_expected to SSL_HANDSHAKE.\nba1660b Tidy up finish_message logic.\n5eead16 Splitting finish_message to finish_message/queue_message.\n8499621 Check for i2d_name_canon failures in x509_name_canon.\na380f9d Always assume little-endian in Poly1305 reference code.\ne4f96d6 Align the non-vector Poly1305 structure.\n45c844a aes/asm/aesp8-ppc.pl: improve [backward] portability.\n231a475 Test bad records at all cipher suites.\n126fa27 Don\u0027t leak memory on ASN1_GENERALIZEDTIME_adj() error path\n7f2ee35 bn/asm/x86_64-mont.pl: fix for CVE-2016-7055 (not affected).\n14c7e8d BORINGSSL_UNSAFE_FUZZER_MODE implies BORINGSSL_UNSAFE_DETERMINISTIC_MODE.\nc5ac2b6 Rename X.509 members in |SSL_SESSION| and |CERT|.\na983b4c Set SSL_MODE_NO_AUTO_CHAIN by default.\nb348897 Correctness fixes for NaCl and other platforms.\nda4789e Fix BoGo HelloVerifyRequest version handling.\n4e41926 Move key_block into SSL_HANDSHAKE.\n54955fe Allow building on MIPS.\nec978dd Add corpora for fuzzers with fuzzer mode disabled.\nda86360 Expose SSL_max_seal_overhead.\n864c887 Add STACK_OF(CRYPTO_BUFFER).\nd50f1c8 Address review comments from https://boringssl-review.googlesource.com/#/c/11920/2\n123db57 Measure session-\u003etimeout from ticket issuance.\ne75cc27 Fix ssl3_send_new_session_ticket error-handling.\n0a011fc Flush TLS 1.3 NewSessionTicket messages together.\n8e816eb Treat sessions as expired on the boundary second.\n5b7b09c Remove weird special-cases around times in SSL_SESSION.\n0f31ac7 Don\u0027t serialize negative times and timeouts.\n11a7b3c Trim ssl_create_cipher_list slightly.\n3c51d9b Test that session renewals interact with lifetimes correctly.\nc034e2d Add ED25519_keypair_from_seed.\ndda85e8 Remove the last of BIO_print_errors.\nd2cb1c1 Remove cipher_list_by_id.\n9ec3798 Don\u0027t access SSL internals in bssl_shim.\nabbbee1 Detach TLS 1.3 cipher configuration from the cipher language.\nfb73e97 Test that version is available in the ALPN callback.\n7bb1d29 Forbid using exporters during a renego.\n4199b0d Add tests which modify the shim ticket.\n7bb88bb Fix comment on session version field.\n9ef31f0 Negotiate the cipher suite before ALPN.\nb2e2e32 Test that client and server enforce session timeouts.\n997c706 Remove no-op loops in curve25519.c.\n4898331 Add d2i_X509_from_buffer.\n1e5ac5d Fix more clang-tidy warnings.\naf3b8a9 Fix multiple PSK identity parsing.\n70aba26 Skip ec_point_format if min_version \u003e\u003d TLS 1.3.\naf3b3d3 Only resolve which cipher list to use once.\n74df74b Remove ssl_any_ec_cipher_suites_enabled check.\nf85d323 TLS: Choose the max version supported by the client, not first.\n6f73379 Add X25519 length constants.\ncec45b7 Update links to Bazel\u0027s site.\n4b0d0e4 Validate input iv/mac sizes in SSL_AEAD_CTX_new.\nea213d1 Add missing include.\nb917909 Move a few more types out of ssl.h.\n8b17671 Test that SNI is accessible from the SNI callback.\nd547f55 Remove superfluous const from CRYPTO_BUFFER_len.\n0d211bd Clarify the scope \u0026 initialization of |data_len| in |aead_tls_open|.\n305e6fb Revise ssl_cipher_get_evp_aead.\n5e393fe Test getrandom(2) on Linux if available\n9ef99d5 Add CRYPTO_BUFFER and CRYPTO_BUFFER_POOL.\n1b22f85 Reject tickets from the future.\nb6b6ff3 Verifying resumption cipher validity with current configuration.\n3a322f5 Revise signing preferences.\n9415a14 Fix SSL_CTX_set1_curves fuzzer.\na1bbaca Record kCRLTestRoot\u0027s private key in the source.\n351af19 Remove a clang-cl workaround that\u0027s no longer needed.\nc6722cd Check SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER before touching wpend_buf.\n\nChange-Id: I0a507eced3eb316ea350ba6bb6c85a75604ac308\nSigned-off-by: Piotr Sikora \u003cpiotrsikora@google.com\u003e\nReviewed-on: https://nginx-review.googlesource.com/2642\nReviewed-by: Gurgen Hrachyan \u003cgugo@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "cf90e8beddaffea53aec522ef446772b47d01b45",
      "old_mode": 33188,
      "old_path": "build.bzl",
      "new_id": "3f2de4104088ef655be65f2a8cadd7d6c7cd8b38",
      "new_mode": 33188,
      "new_path": "build.bzl"
    }
  ]
}
