1. 22 Oct, 2015 1 commit
  2. 30 Sep, 2015 1 commit
    • Adam Langley's avatar
      external/boringssl: remove BORINGSSL_201509 support. · 1eb96cca
      Adam Langley authored
      The BORINGSSL_201509 define was used to make updating BoringSSL in
      external/boringssl less painful. It allowed code to compile with either
      the old BoringSSL (which didn't define BORINGSSL_201509) or with the new
      (which does).
      
      Now that the new version has landed, this change removes that define. It
      must be landed after the changes elsewhere in Android that remove
      references to this define.
      
      Change-Id: I19e661419f830459d015bf14e7905af2ec41b735
      1eb96cca
  3. 25 Sep, 2015 6 commits
  4. 24 Sep, 2015 2 commits
  5. 03 Sep, 2015 1 commit
  6. 28 Aug, 2015 1 commit
    • Dan Willemsen's avatar
      Whitelist windows modules · 08656b61
      Dan Willemsen authored
      And stop changing variables based on HOST_OS.
      
      Bug: 23566667
      Change-Id: I3b3b2f0aef066eb224cb1fa6f2e9f32c32695711
      08656b61
  7. 15 Aug, 2015 4 commits
  8. 24 Jul, 2015 2 commits
  9. 04 Jul, 2015 1 commit
  10. 30 Jun, 2015 3 commits
  11. 24 Jun, 2015 1 commit
  12. 23 Jun, 2015 4 commits
    • Adam Langley's avatar
      Handle RDRAND failures. · bd9957e6
      Adam Langley authored
      I mistakenly believed that only RDSEED could fail. However, the Intel
      manuals state that RDRAND can fail too.
      
      This change cherry-picks the following BoringSSL changes:
      
      2cac3506 – Handle RDRAND failures.
      248abbd7 – Add missing comma in .type pragma for rdrand code.
      
      Change-Id: Icdc56a50ce36e9c525063583882c676a5312d313
      bd9957e6
    • Adam Langley's avatar
      dsa_pub_encode: Write out DSA parameters (p, q, g) in addition to key. · e0846bee
      Adam Langley authored
      This change cherry-picks BoringSSL's e65886a5.
      
      Change-Id: I63d5dc280d420b64b658bfd85f180a01adb8a18b
      e0846bee
    • Adam Langley's avatar
      Fix for CVE-2015-1789. · 98856d4b
      Adam Langley authored
      X509_cmp_time does not properly check the length of the ASN1_TIME string
      and can read a few bytes out of bounds. In addition, X509_cmp_time
      accepts an arbitrary number of fractional seconds in the time string.
      
      An attacker can use this to craft malformed certificates and CRLs of
      various sizes and potentially cause a segmentation fault, resulting in a
      DoS on applications that verify certificates or CRLs. TLS clients that
      verify CRLs are affected. TLS clients and servers with client
      authentication enabled may be affected if they use custom verification
      callbacks.
      
      This change cherry-picks the following changes from BoringSSL:
      
      d87021d2 – Fix length checks in X509_cmp_time to avoid out-of-bounds reads.
      
      Change-Id: Ia7d0c5d889f61a3c4be6ea79a5ab41f67bc3c65c
      98856d4b
    • Adam Langley's avatar
      Fixes for CVE-2015-1791. · 56d25032
      Adam Langley authored
      If a NewSessionTicket is received by a multi-threaded client when
      attempting to reuse a previous ticket then a race condition can occur
      potentially leading to a double free of the ticket data.
      
      This change cherry-picks the following BoringSSL changes:
      
      b31040d0 – Get rid of CERT_PKEY slots in SESS_CERT.
      fd67aa8c – Add SSL_SESSION_from_bytes.
      95d31825 – Duplicate SSL_SESSIONs when renewing them.
      d65bb78c – Add SSL_initial_handshake_complete.
      680ca961 – Preserve session->sess_cert on ticket renewal.
      
      Change-Id: I474065330842e4ab0066b2485c1489a50e4dfd5b
      56d25032
  13. 15 Jun, 2015 10 commits
  14. 12 Jun, 2015 3 commits