6
0
forked from pool/boringssl

Commit Graph

  • 06665d6744 Revert to d4a92c1a5cad30101b668941d87f0dac main Adam Majer 2025-08-18 16:33:49 +02:00
  • b2315a6b2e - Update to version 0.20210430 tag fips-20210429. This pinned version of boringssl is expected by go1.22 and go1.23 when building with GOEXPERIMENT=boringcrypto. Refs boo#1236000 - Packaging improvements: * _service change disabled to manual per osc deprecation warning: WARNING: Command 'disabledrun/dr' is obsolete, please convert your _service to use 'manual' and then 'manualrun/mr' instead. * Vendor Go build-time utility dependences in go.mod, not yet using OBS Service Go Modules. * Add BuildRequires: golang(API) >= 1.22 to enable Go related utilities used in CMake build steps related to FIPS mode. Upstream minimum version per go.mod is go1.13. * _service add go_modules to vendor pinned dependences in go.mod * Use autosetup -a 1 to unpack source and vendored dependencies * Rebase 0001-Compile-for-RISC-V.patch * Rebase 0002-crypto-Fix-aead_test-build-on-aarch64.patch * Rebase 0003-enable-s390x-builds.patch * Rebase 0004-fix-alignment-for-ppc64le.patch * Rebase 0005-fix-alignment-for-arm.patch * Rebase 0006-gcc-disable-werror.patch * Rebase 0007-fix-go-vendor-embed_test_data.patch * Rebase 0008-fix-go-vendor-err_data_generate.patch * Rebase 0009-soname-sover.patch (was soname-sover.patch) * rpmlint fix version-control-internal-file error * rpmlint fix script-without-shebang error * rpmlint fix non-executable-script error * rpmlint fix binary-or-shlib-defines-rpath error use CMAKE_SKIP_RPATH Martin Pluskal 2025-04-02 14:04:35 +00:00
  • 7ec4a441a0 Accepting request 1218684 from Java:packages Pedro Monreal Gonzalez 2024-10-28 08:59:55 +00:00
  • 0b30400cdf Accepting request 1145360 from home:ohollmann:branches:security:tls Otto Hollmann 2024-02-09 08:26:34 +00:00
  • a43a433f84 Accepting request 974909 from openSUSE:Factory:RISCV Marcus Meissner 2022-05-06 07:50:57 +00:00
  • 5a8ea03b49 Accepting request 893861 from home:mrostecki:branches:devel:kubic Michał Rostecki 2021-05-17 23:36:07 +00:00
  • cf1523f196 Accepting request 809919 from home:jengelh:branches:security:tls Michał Rostecki 2020-05-28 12:14:44 +00:00
  • d829addd81 Accepting request 809901 from home:mrostecki:branches:security:tls Michał Rostecki 2020-05-28 10:24:38 +00:00
  • 4b0dfcd790 Accepting request 783534 from home:Guillaume_G:branches:openSUSE:Factory:ARM Tomáš Chvátal 2020-03-10 21:38:59 +00:00
  • 1b152a3e40 Accepting request 753908 from home:kwk:branches:security:tls Martin Pluskal 2019-12-04 08:27:05 +00:00
  • 0aebfce375 Accepting request 740044 from home:RBrownSUSE:branches:security:tls Martin Pluskal 2019-10-17 15:03:58 +00:00
  • d0e0a68384 - Update to version 20190916: * Revert "Fix VS build when assembler is enabled" * Only bypass the signature verification itself in fuzzer mode. * Move the PQ-experiment signal to SSL_CTX. * Name cipher suite tests in runner by IETF names. * Align TLS 1.3 cipher suite names with OpenSSL. * Prefix all the SIKE symbols. * Rename SIKE's params.c. * Add post-quantum experiment signal extension. * Fix shim error message endings. * Add initial draft of ACVP tool. * Implements SIKE/p434 * Add SipHash-2-4. * Remove android_tools checkout * Support key wrap with padding in CAVP. * Add android_sdk checkout * Move fipstools/ to util/fipstools/cavp * Factor out TLS cipher selection to ssl_choose_tls_cipher. * Emit empty signerInfos in PKCS#7 bundles. * Clarify language about default SSL_CTX session ticket key behavior. * Add an API to record use of delegated credential * Fix runner tests with Go 1.13. * Add a value barrier to constant-time selects. * Avoid leaking intermediate states in point doubling special case. * Split p224-64.c multiplication functions in three. * Add AES-KWP * Discuss the doubling case in windowed Booth representation. * Update build tools. * Set a minimum CMake version of 3.0. * Replace addc64,subc64,mul64 in SIKE Go code with functions from math/bits Martin Pluskal 2019-10-14 10:48:31 +00:00
  • dc0147e239 Accepting request 728268 from home:Guillaume_G:branches:openSUSE:Factory:ARM Martin Pluskal 2019-09-04 13:35:41 +00:00
  • bb77bd0d83 - Limit building only to supported architectures Martin Pluskal 2019-09-03 14:52:11 +00:00
  • 04d83306cd OBS-URL: https://build.opensuse.org/package/show/security:tls/boringssl?expand=0&rev=17 Martin Pluskal 2019-09-03 13:57:49 +00:00
  • 570c177ee5 - Update to version 20190523: * Disable RDRAND on AMD chips before Zen. * Always store early data tickets. * Align PKCS12_parse closer to OpenSSL. * Support PKCS#12 KeyBags. * Support PKCS#8 blobs using PBES2 with HMAC-SHA256. * Make EVP_PKEY_keygen work for Ed25519. * Sync aesp8-ppc.pl with upstream. * Update generate_build_files.py for SIKE. * Fix the last casts in third_party/sike. * Remove no-op casts around tt1. * Define p503 with crypto_word_t, not uint64_t. * Add support for SIKE/p503 post-quantum KEM * tool: fix speed tests. * Add an option to skip crypto_test_data.cc in GN too. * Save and restore errors when ignoring ssl_send_alert result. * Reject obviously invalid DSA parameters during signing. * Make expect/expected flag and variable names match. * clang-format Flag arrays in test_config.cc. * Rename remnants of ticket_early_data_info. * Enforce the ticket_age parameter for 0-RTT. * Add SSL_get_early_data_reason. * Remove implicit -on-resume for -expect-early-data-accept. * Use weak symbols only on supported platforms * Fix spelling in comments. * Add functions for "raw" EVP_PKEY serializations. * Remove stray underscores. * Add a compatibility EVP_DigestFinalXOF function. * Fix up EVP_DigestSign implementation for Ed25519. * Check for errors when setting up X509_STORE_CTX. Martin Pluskal 2019-09-03 07:30:31 +00:00
  • 77110adca1 - Disable lto to fix build failure Martin Pluskal 2019-08-30 06:53:22 +00:00
  • 9f8e0f10dc Accepting request 697903 from home:mrostecki:branches:security:tls Michał Rostecki 2019-04-25 16:54:09 +00:00
  • 25389482df Accepting request 697898 from home:mrostecki:branches:security:tls Michał Rostecki 2019-04-25 16:10:16 +00:00
  • 2e5cbb222b Accepting request 697843 from home:dirkmueller:branches:security:tls Michał Rostecki 2019-04-25 13:02:02 +00:00
  • d75a470725 Accepting request 687294 from home:mrostecki:branches:security:tls Michał Rostecki 2019-03-21 11:40:26 +00:00
  • 5effde5061 Accepting request 657249 from security:tls Dominique Leuenberger 2019-01-05 13:41:52 +00:00
  • dd0c0bfbd0 Accepting request 657222 from home:jengelh:branches:security:tls Michał Rostecki 2018-12-11 15:33:44 +00:00
  • 81a0b1c454 Accepting request 649544 from home:mrostecki Michał Rostecki 2018-11-16 11:38:39 +00:00
  • fe1b167e1f Accepting request 647599 from home:pluskalm:branches:security:tls Michał Rostecki 2018-11-09 14:40:59 +00:00
  • b927c09cfb Accepting request 647355 from home:mrostecki:branches:security:tls Michał Rostecki 2018-11-08 15:23:29 +00:00
  • 327cd6b266 Accepting request 647339 from home:mrostecki:branches:security:tls Michał Rostecki 2018-11-08 15:04:34 +00:00
  • 35d0a38396 Accepting request 647027 from home:mrostecki:branches:security:tls Michał Rostecki 2018-11-07 15:04:19 +00:00
  • d6d0f36bb4 Accepting request 646911 from home:mrostecki Martin Pluskal 2018-11-07 10:10:08 +00:00