97227dc52d
This finally removes the last Android hack. Both Chromium and Android end up needing this thing (Chromium needs it for WebCrypto but currently uses the EVP_AEAD version and Android needs it by way of wpa_supplicant). On the Android side, the alternative is we finish upstream's NEED_INTERNAL_AES_WRAP patch, but then it just uses its own key-wrap implementation. This seems a little silly, considering we have a version of key-wrap under a different API anyway. It also doesn't make much sense to leave the EVP_AEAD API around if we don't want people to use it and Chromium's the only consumer. Remove it and I'll switch Chromium to the new---er, old--- APIs next roll. Change-Id: I23a89cda25bddb6ac1033e4cd408165f393d1e6c Reviewed-on: https://boringssl-review.googlesource.com/11410 Commit-Queue: David Benjamin <davidben@google.com> Reviewed-by: Adam Langley <agl@google.com> |
||
---|---|---|
.. | ||
aes_128_cbc_sha1_ssl3_tests.txt | ||
aes_128_cbc_sha1_tls_implicit_iv_tests.txt | ||
aes_128_cbc_sha1_tls_tests.txt | ||
aes_128_cbc_sha256_tls_tests.txt | ||
aes_128_ctr_hmac_sha256.txt | ||
aes_128_gcm_tests.txt | ||
aes_256_cbc_sha1_ssl3_tests.txt | ||
aes_256_cbc_sha1_tls_implicit_iv_tests.txt | ||
aes_256_cbc_sha1_tls_tests.txt | ||
aes_256_cbc_sha256_tls_tests.txt | ||
aes_256_cbc_sha384_tls_tests.txt | ||
aes_256_ctr_hmac_sha256.txt | ||
aes_256_gcm_tests.txt | ||
chacha20_poly1305_old_tests.txt | ||
chacha20_poly1305_tests.txt | ||
cipher_tests.txt | ||
des_ede3_cbc_sha1_ssl3_tests.txt | ||
des_ede3_cbc_sha1_tls_implicit_iv_tests.txt | ||
des_ede3_cbc_sha1_tls_tests.txt | ||
make_all_legacy_aead_tests.sh | ||
make_legacy_aead_tests.go |