Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update BoringSSL from Chromium 96.0.4664.219 #2267

Merged
merged 8 commits into from
Jan 24, 2024

Conversation

dahlstrom-g
Copy link
Contributor

b/309016038

Chrome Release Bot (LUCI) and others added 2 commits January 21, 2024 21:00
git-subtree-dir: third_party/boringssl
git-subtree-split: 6a496db5ef7219101beacceca9566367c9cb1a09
All the test vectors testing key length greater than the block length
were mislabelled as key length being equal to the block length. Add a
note to these test vectors indicating they are directly from the NIST
tests with the misleading input intact.

Change-Id: I9fe87971265ad48e9b835fccbe92306e1670b4d6
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/49705
Reviewed-by: David Benjamin <[email protected]>
Commit-Queue: David Benjamin <[email protected]>
git-subtree-dir: third_party/boringssl/src
git-subtree-split: 87f316d7748268eb56f2dc147bd593254ae93198
Copy link

codecov bot commented Jan 23, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Comparison is base (6dd5f99) 58.45% compared to head (9182e8f) 58.58%.
Report is 1 commits behind head on main.

❗ Current head 9182e8f differs from pull request most recent head 8377e5b. Consider uploading reports for the commit 8377e5b to get more accurate results

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2267      +/-   ##
==========================================
+ Coverage   58.45%   58.58%   +0.12%     
==========================================
  Files        1904     1904              
  Lines       94327    94522     +195     
==========================================
+ Hits        55138    55371     +233     
+ Misses      39189    39151      -38     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@dahlstrom-g dahlstrom-g force-pushed the boringssl-96.0.4664.219 branch from 3683570 to 8377e5b Compare January 24, 2024 03:00
dahlstrom-g and others added 6 commits January 23, 2024 23:00
lh_new is a very short name to be claiming.

(cherry picked from commit ec8c67dfbc01eb13f16a40f6c8da6299a65a540c)

Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/48206
Trusty wants to seed from a different RNG than the one that supplies
per-draw entropy. This is a no-op change unless you're substituting in
your own implementations of these functions.

To see that it's a no-op in urandom.c, note that it only changes the
|seed| argument to |fill_with_entropy|. That causes the value of
|extra_getrandom_flags_for_seed_bss_get| to be ORed into the flags,
but that value will always be zero unless it's an Android FIPS build.

(cherry picked from commit 519c2986c73c23461b130ad19b93fd7d081353d5)

Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/48485
Instead let crypto/fipsmodule/md5/internal.h define it conditionally.
That preprocessor logic was moved there from crypto/fipsmodule/md5/md5.c
by BoringSSL commit 5e350d13.
@dahlstrom-g dahlstrom-g merged commit a1e6077 into youtube:main Jan 24, 2024
322 of 329 checks passed
@dahlstrom-g dahlstrom-g deleted the boringssl-96.0.4664.219 branch January 24, 2024 07:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants