Skip to content

Commit 3409d4d

Browse files
DEPS AutorollerCommit Queue
authored andcommitted
Roll BoringSSL from 739613d2e62b to 40e035a9e5d7 (82 revisions)
https://boringssl.googlesource.com/boringssl.git/+log/739613d2e62b..40e035a9e5d7 2025-09-01 davidben@google.com Clear the extension list when removing the last extension 2025-09-01 davidben@google.com Refresh basic constraints test certificates 2025-09-01 davidben@google.com Document ASN1_item_sign's order of operations a bit 2025-09-01 davidben@google.com Add a few more TODOs for functions that should be const but aren't 2025-09-01 davidben@google.com Use the new SPKI API in d2i_RSA_PUBKEY and friends 2025-09-01 davidben@google.com Unexport a few more ASN1_ITEMs 2025-09-01 davidben@google.com Make some test data of unknown ASN.1 types slightly less invalid 2025-09-01 davidben@google.com Test ASN1_TYPE parsing more extensively 2025-08-28 davidben@google.com Add EVP_PKEY_ALG-based raw public/private key importers 2025-08-28 davidben@google.com Use EVP_PKEY_bits in SimplePathBuilderDelegate 2025-08-28 davidben@google.com Update citations from RFC 3447 to RFC 8017 2025-08-28 davidben@google.com Replace OPENSSL_ARRAY_SIZE with std::size 2025-08-28 davidben@google.com Const-correct the kPrintMethods table 2025-08-28 davidben@google.com Add SHA-256-only support for EVP_PKEY_RSA_PSS 2025-08-28 davidben@google.com Write a CBS-based RSA-PSS parameter parser 2025-08-28 davidben@google.com Switch libssl to the new SPKI parsing APIs 2025-08-28 davidben@google.com Switch libpki to the new SPKI-parsing APIs 2025-08-28 davidben@google.com bssl-crypto: Switch to new SPKI/PKCS8 parsing APIs 2025-08-28 davidben@google.com Introduce EVP_PKEY_ALG 2025-08-28 davidben@google.com Add internal EC parsing functions that take lists of allowed groups 2025-08-27 davidben@google.com Test lookup and creation by RSA parameters in evp_test 2025-08-27 andreser@google.com bump fiat-crypto (remove redundant return statements) 2025-08-27 davidben@google.com Make FileTest work with std::string_view 2025-08-27 davidben@google.com Test key import in EVPTest a bit more extensively 2025-08-27 tikuta@google.com infra/config: Remove luci.recipes.use_python3 experiment 2025-08-25 davidben@google.com Add an ERR_equals function 2025-08-25 agl@chromium.org Add utility for dumping raw jitter samples. 2025-08-25 davidben@google.com Use inline asm to read cntvct_el0 to accommodate GCC 2025-08-22 davidben@google.com bssl-crypto: Fix Ed25519 SPKI parser to check key types 2025-08-22 agl@chromium.org Add a jitter entropy source. 2025-08-22 davidben@google.com Set an EVP_PKEY's algorithm and data together 2025-08-22 davidben@google.com Make some more half-empty EVP_PKEY states impossible 2025-08-21 davidben@google.com Limit EVP_PKEY_set_type to EVP_PKEY_X25519 2025-08-21 davidben@google.com Add a test that arbitrary curves can be wrapped in EVP_PKEY 2025-08-21 davidben@google.com Stop tracking an ENGINE in EVP_PKEY_CTX 2025-08-21 davidben@google.com Rename EVP_PKEY_METHOD to EVP_PKEY_CTX_METHOD 2025-08-21 davidben@google.com Pull the EC_GROUP_new_by_curve_name up into EVP_PKEY_CTX_set_ec_paramgen_curve_nid 2025-08-21 davidben@google.com Split evp_tests.txt into separate files 2025-08-21 davidben@google.com Add a test for SPKI and PKCS8 parsing with unknown algorithms 2025-08-21 chlily@google.com Fix markdown syntax in BUILDING.md 2025-08-19 davidben@google.com Test async BIO_flush and fix a corner case 2025-08-18 davidben@google.com Rename EVP_R_EXPECTING_AN_EC_KEY_KEY to match OpenSSL 2025-08-18 davidben@google.com Document the generators for all the MODP groups 2025-08-18 davidben@google.com Remove an old, impractical TODO 2025-08-18 davidben@google.com Say a bit more in docs about how to use EVP_PKEY_CTX 2025-08-18 davidben@google.com Bump version for BCR 2025-08-18 davidben@google.com Run through more code in PKCS#8 and SPKI parsers 2025-08-18 davidben@google.com Fix typo in comment 2025-08-18 davidben@google.com runner: Remove need for an AllCurves value 2025-08-18 davidben@google.com Remove redundant copy of EVP_PKEY type 2025-08-18 davidben@google.com Remove EVP_PKEY_print_* support for DSA 2025-08-18 davidben@google.com Don't support parameterless DSA keys in SPKIs 2025-08-18 davidben@google.com Add a couple more no-op compatibility functions 2025-08-18 davidben@google.com More consistently reset EVP_PKEYs in free_it 2025-08-18 davidben@google.com Unexport the Kyber implementation 2025-08-14 davidben@google.com Deprecate EVP_PKEY_set_type 2025-08-14 davidben@google.com Fix reference to public key in evp.h docs 2025-08-13 ellyjones@chromium.org pki: add PEMDecode and PEMDecodeSingle 2025-08-13 agl@chromium.org Switch to using a derivation function in CTR-DRBG. 2025-08-13 ellyjones@chromium.org pki: allow span<string_view> for allowed types in PEMTokenizer 2025-08-13 chlily@google.com Style guide: mention placement of & for reference types 2025-08-13 davidben@google.com Update releasing docs slightly 2025-08-12 chlily@google.com Implement MLKEM1024 for TLS 2025-08-09 agl@imperialviolet.org delocate: support 4-bit tweak immediates for AArch64. 2025-08-08 davidben@google.com Add a discussion about callbacks to API Conventions 2025-08-08 agl@chromium.org Don't run CTR-DRBG in Kyber tests. 2025-08-08 agl@chromium.org Link to ACVP results for 20250728. 2025-08-07 davidben@google.com Bump Bazel deps and version for BCR 2025-08-05 chlily@google.com Expand BCM abbreviation in the FIPS.md documentation 2025-08-04 chlily@google.com Add IWYU export in nid.h file generated by objects.go 2025-08-04 chlily@google.com Fix documentation typo 2025-08-04 chlily@google.com Revert Rust config for 32-bit Linux CI/CQ bots 2025-08-04 chlily@google.com Run Rust recipe steps on Mac CI/CQ builders and 32-bit Linux 2025-07-31 chlily@google.com Run Rust recipe steps on "win64_rel" builder 2025-07-31 chlily@google.com Make Windows Rust try builder use a Release build 2025-07-29 chlily@google.com Add a default-off win64_rust try builder for testing 2025-07-29 chlily@google.com Run Rust recipe steps on "linux" builder 2025-07-28 agl@imperialviolet.org Fix FIPS version number comment. 2025-07-28 agl@imperialviolet.org Add AES-CCM to test_fips.cc. 2025-07-28 agl@imperialviolet.org Add AES-KW(P) to test_fips.cc 2025-07-28 agl@imperialviolet.org Remove DES from test_fips.cc 2025-07-28 davidben@google.com Fix typo in header comments If this roll has caused a breakage, revert this CL and stop the roller using the controls here: https://autoroll.skia.org/r/boringssl-dart-sdk Please CC dart-engprod@google.com,dart-vm-gardener@grotations.appspotmail.com,dart-vm-team@google.com on the revert to ensure that a human is aware of the problem. To file a bug in BoringSSL: https://crbug.com/boringssl/new To file a bug in Dart SDK: https://github.com/dart-lang/sdk/issues To report a problem with the AutoRoller itself, please file a bug: https://issues.skia.org/issues/new?component=1389291&template=1850622 Documentation for the AutoRoller is here: https://skia.googlesource.com/buildbot/+doc/main/autoroll/README.md Tbr: dart-vm-gardener@grotations.appspotmail.com Change-Id: I06d8041efa42c66a897ced21eb7fcf03eb000761 Reviewed-on: https://dart-review.googlesource.com/c/sdk/+/448062 Reviewed-by: Brian Quinlan <bquinlan@google.com> Commit-Queue: Alexander Aprelev <aam@google.com> Reviewed-by: Alexander Aprelev <aam@google.com>
1 parent 1f35a21 commit 3409d4d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

DEPS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ vars = {
9797

9898
# Prefer to use hashes of binaryen that have been reviewed & rolled into g3.
9999
"binaryen_rev" : "1d2e23d5e55788091a51420ba3a9889d4efe7509",
100-
"boringssl_rev": "739613d2e62bd6ab3e7378bf70a5767b50e3c4bf",
100+
"boringssl_rev": "40e035a9e5d721b3b7c15c46259d782ffe7d9e96",
101101
"browser-compat-data_tag": "ac8cae697014da1ff7124fba33b0b4245cc6cd1b", # v1.0.22
102102
"cpu_features_rev": "936b9ab5515dead115606559502e3864958f7f6e",
103103
"devtools_rev": "5e1792245005088a0a0dfe28f207bd22045ba783",

0 commit comments

Comments
 (0)