# Copyright 2014 The Chromium Authors
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
import("//build/config/android/config.gni")
import("//build/config/arm.gni")
import("//build/config/compiler/compiler.gni")
import("//build/config/rust.gni")
import("//build/config/sanitizers/sanitizers.gni")
import("//build_overrides/build.gni")
import("src/gen/sources.gni")
if (enable_rust) {
import("//build/rust/cargo_crate.gni")
import("//build/rust/rust_bindgen.gni")
}
# Config for us and everybody else depending on BoringSSL.
config("external_config") {
include_dirs = [ "src/include" ]
if (is_component_build) {
defines = [ "BORINGSSL_SHARED_LIBRARY" ]
}
}
# The config used by the :boringssl component itself, and the fuzzer copies.
config("component_config") {
visibility = [ ":*" ]
configs = [ ":internal_config" ]
defines = [ "BORINGSSL_IMPLEMENTATION" ]
}
# This config is used by anything that consumes internal headers. Tests consume
# this rather than :component_config.
config("internal_config") {
visibility = [ ":*" ]
defines = [ "OPENSSL_SMALL" ]
}
config("no_asm_config") {
visibility = [ ":*" ]
defines = [ "OPENSSL_NO_ASM" ]
}
# TODO(crbug.com/42290535): Move Chromium's use of libpki to the public API and
# unexport pki_internal_headers.
all_sources = bcm_internal_headers + bcm_sources + crypto_internal_headers +
crypto_sources + ssl_internal_headers + ssl_sources + pki_sources
all_headers = crypto_headers + ssl_headers + pki_headers + pki_internal_headers
if (enable_rust) {
rust_bindgen("raw_bssl_sys_bindings") {
header = "src/rust/bssl-sys/wrapper.h"
deps = [ ":boringssl" ]
bindgen_flags = [
"no-derive-default",
"enable-function-attribute-detection",
"use-core",
"default-macro-constant-type=signed",
# These two functions use `va_list`, which causes bindgen errors on
# some platforms: i.e. "`extern` block uses type `[u64; 4]`, which is not
# FFI-safe"
"blocklist-function=BIO_vsnprintf",
"blocklist-function=OPENSSL_vasprintf",
"rustified-enum=point_conversion_form_t",
"allowlist-file=.*[[:punct:]]include[[:punct:]]openssl[[:punct:]].*\\.h",
]
wrap_static_fns = true
visibility = [ ":*" ] # private, should only be exposed through bssl_crypto
}
# Low level, bindgen generates system bindings to boringssl
cargo_crate("bssl_sys") {
crate_type = "rlib"
crate_root = "src/rust/bssl-sys/src/lib.rs"
sources = rebase_path(rust_bssl_sys_sources, ".", "src")
edition = "2021"
deps = [
":boringssl",
":raw_bssl_sys_bindings",
":raw_bssl_sys_bindings_static_fns",
]
visibility = [
":*", # private, should only be exposed through bssl_crypto
]
bindgen_output = get_target_outputs(":raw_bssl_sys_bindings")
inputs = bindgen_output
rustenv =
[ "BINDGEN_RS_FILE=" +
rebase_path(bindgen_output[0], get_path_info(crate_root, "dir")) ]
}
# Rust bindings to boringssl
cargo_crate("bssl_crypto") {
crate_type = "rlib"
crate_root = "src/rust/bssl-crypto/src/lib.rs"
sources = rebase_path(rust_bssl_crypto_sources, ".", "src")
edition = "2021"
deps = [ ":bssl_sys" ]
}
}
if (is_msan) {
# MSan instrumentation is incompatible with assembly optimizations.
# BoringSSL's GAS-compatible assembly knows how to detect MSan, but the NASM
# assembly does not, so we check for MSan explicitly.
source_set("boringssl_asm") {
visibility = [ ":*" ]
public_configs = [ ":no_asm_config" ]
}
source_set("test_support_asm") {
visibility = [ ":*" ]
testonly = true
}
} else if (is_win && (current_cpu == "x86" || current_cpu == "x64")) {
# Windows' x86 and x86_64 assembly is built with NASM.
import("//third_party/nasm/nasm_assemble.gni")
nasm_assemble("boringssl_asm") {
visibility = [ ":*" ]
sources = rebase_path(bcm_sources_nasm + crypto_sources_nasm, ".", "src")
}
nasm_assemble("test_support_asm") {
visibility = [ ":*" ]
sources = rebase_path(test_support_sources_nasm, ".", "src")
}
} else {
# All other targets use GAS-compatible assembler. BoringSSL's assembly files
# are all wrapped in processor checks for the corresponding target, so there
# is no need to add target conditions in the build.
source_set("boringssl_asm") {
visibility = [ ":*" ]
sources = rebase_path(bcm_sources_asm + crypto_sources_asm, ".", "src")
include_dirs = [ "src/include" ]
}
source_set("test_support_asm") {
visibility = [ ":*" ]
sources = rebase_path(test_support_sources_asm, ".", "src")
include_dirs = [ "src/include" ]
}
}
component("boringssl") {
sources = rebase_path(all_sources, ".", "src")
public = rebase_path(all_headers, ".", "src")
friend = [ ":*" ]
deps = [ "//third_party/boringssl/src/third_party/fiat:fiat_license" ]
# Mark boringssl_asm as a public dependency so the OPENSSL_NO_ASM
# config is forwarded to callers. In particular, boringssl_crypto_tests
# requires it.
public_deps = [ ":boringssl_asm" ]
public_configs = [ ":external_config" ]
configs += [ ":component_config" ]
configs -= [ "//build/config/compiler:chromium_code" ]
configs += [ "//build/config/compiler:no_chromium_code" ]
if (is_nacl) {
deps += [ "//native_client_sdk/src/libraries/nacl_io" ]
}
if (!is_debug && !(is_fuchsia && optimize_for_size)) {
configs -= [ "//build/config/compiler:default_optimization" ]
configs += [ "//build/config/compiler:optimize_max" ]
}
if (is_linux && is_component_build) {
version_script = "boringssl.map"
inputs = [ version_script ]
ldflags = [ "-Wl,--version-script=" +
rebase_path(version_script, root_build_dir) ]
}
}
if (build_with_chromium) {
import("//testing/libfuzzer/fuzzer_test.gni")
source_set("test_support") {
visibility = [ ":*" ]
sources = rebase_path(test_support_sources, ".", "src")
public = rebase_path(test_support_internal_headers, ".", "src")
testonly = true
# Test data in Chromium is complex. Swap out GetTestData with a
# Chromium-specific implementation.
sources += [ "test_data_chromium.cc" ]
defines = [ "BORINGSSL_CUSTOM_GET_TEST_DATA" ]
deps = [
":boringssl",
":test_support_asm",
"//base",
"//testing/gtest",
]
}
# These targets are named "_tests" rather than "_test" to avoid colliding with
# a historical "boringssl_ssl_test" target. This works around a bug with the
# iOS build rules.
bundle_data("boringssl_crypto_tests_bundle_data") {
sources = rebase_path(crypto_test_data, ".", "src")
testonly = true
outputs = [ "{{bundle_resources_dir}}/" +
"{{source_root_relative_dir}}/{{source_file_part}}" ]
}
test("boringssl_crypto_tests") {
sources = rebase_path(crypto_test_sources, ".", "src")
data = rebase_path(crypto_test_data, ".", "src")
deps = [
":boringssl",
":boringssl_crypto_tests_bundle_data",
":test_support",
"//testing/gtest",
]
configs -= [ "//build/config/compiler:chromium_code" ]
configs += [
":internal_config",
"//build/config/compiler:no_chromium_code",
]
# Chromium infrastructure does not support GTest, only the //base wrapper.
sources -= [ "src/crypto/test/gtest_main.cc" ]
sources += [ "gtest_main_chromium.cc" ]
deps += [ "//base/test:test_support" ]
if (is_fuchsia) {
additional_manifest_fragments =
[ "//build/config/fuchsia/test/network.shard.test-cml" ]
}
}
test("boringssl_ssl_tests") {
sources = rebase_path(ssl_test_sources, ".", "src")
deps = [
":boringssl",
":test_support",
"//testing/gtest",
]
configs -= [ "//build/config/compiler:chromium_code" ]
configs += [
":internal_config",
"//build/config/compiler:no_chromium_code",
]
# Chromium infrastructure does not support GTest, only the //base wrapper.
sources -= [ "src/crypto/test/gtest_main.cc" ]
sources += [ "gtest_main_chromium.cc" ]
deps += [ "//base/test:test_support" ]
}
test("boringssl_pki_tests") {
sources = rebase_path(pki_test_sources, ".", "src")
data = rebase_path(pki_test_data, ".", "src")
deps = [
":boringssl",
":test_support",
"//testing/gtest",
]
configs -= [ "//build/config/compiler:chromium_code" ]
configs += [
":internal_config",
"//build/config/compiler:no_chromium_code",
]
# Chromium infrastructure does not support GTest, only the //base wrapper.
sources -= [ "src/crypto/test/gtest_main.cc" ]
sources += [ "gtest_main_chromium.cc" ]
deps += [ "//base/test:test_support" ]
}
config("fuzzer_config") {
visibility = [ ":*" ]
defines = [
"BORINGSSL_UNSAFE_FUZZER_MODE",
"BORINGSSL_UNSAFE_DETERMINISTIC_MODE",
]
}
# The same as boringssl, but builds with BORINGSSL_UNSAFE_FUZZER_MODE.
# TODO(https://crbug.com/boringssl/258): Fold this into the normal target.
component("boringssl_fuzzer") {
visibility = [ ":*" ]
sources = rebase_path(all_sources, ".", "src")
public = rebase_path(all_headers, ".", "src")
friend = [ ":*" ]
deps = [ "//third_party/boringssl/src/third_party/fiat:fiat_license" ]
# Mark boringssl_asm as a public dependency so the OPENSSL_NO_ASM
# config is forwarded to callers. In particular, boringssl_crypto_tests
# requires it.
public_deps = [ ":boringssl_asm" ]
public_configs = [
":external_config",
":fuzzer_config",
]
configs += [ ":component_config" ]
configs -= [ "//build/config/compiler:chromium_code" ]
configs += [ "//build/config/compiler:no_chromium_code" ]
if (is_nacl) {
deps += [ "//native_client_sdk/src/libraries/nacl_io" ]
}
}
foreach(source, fuzz_sources) {
fuzzer = get_path_info(source, "name")
fuzzer_test("boringssl_${fuzzer}_fuzzer") {
sources = [
rebase_path(source, ".", "src"),
"src/ssl/test/fuzzer.h",
"src/ssl/test/fuzzer_tags.h",
]
additional_configs = [ ":internal_config" ]
deps = [ ":boringssl_fuzzer" ]
seed_corpus = "src/fuzz/${fuzzer}_corpus"
if ("cert" == fuzzer) {
libfuzzer_options = [ "max_len=3072" ]
} else if ("client" == fuzzer) {
libfuzzer_options = [ "max_len=20000" ]
} else if ("pkcs8" == fuzzer) {
libfuzzer_options = [ "max_len=2048" ]
} else if ("privkey" == fuzzer) {
libfuzzer_options = [ "max_len=2048" ]
} else if ("read_pem" == fuzzer) {
libfuzzer_options = [ "max_len=512" ]
} else if ("session" == fuzzer) {
libfuzzer_options = [ "max_len=8192" ]
} else if ("server" == fuzzer) {
libfuzzer_options = [ "max_len=4096" ]
} else if ("spki" == fuzzer) {
libfuzzer_options = [ "max_len=1024" ]
} else if ("ssl_ctx_api" == fuzzer) {
libfuzzer_options = [ "max_len=256" ]
}
}
}
config("fuzzer_no_fuzzer_mode_config") {
visibility = [ ":*" ]
defines = [ "BORINGSSL_UNSAFE_DETERMINISTIC_MODE" ]
}
# The same as boringssl, but builds with BORINGSSL_UNSAFE_DETERMINISTIC_MODE.
# TODO(https://crbug.com/boringssl/258): Fold this into the normal target.
component("boringssl_fuzzer_no_fuzzer_mode") {
visibility = [ ":*" ]
sources = rebase_path(all_sources, ".", "src")
public = rebase_path(all_headers, ".", "src")
friend = [ ":*" ]
deps = [ "//third_party/boringssl/src/third_party/fiat:fiat_license" ]
# Mark boringssl_asm as a public dependency so the OPENSSL_NO_ASM
# config is forwarded to callers. In particular, boringssl_crypto_tests
# requires it.
public_deps = [ ":boringssl_asm" ]
public_configs = [
":external_config",
":fuzzer_no_fuzzer_mode_config",
]
configs += [ ":component_config" ]
configs -= [ "//build/config/compiler:chromium_code" ]
configs += [ "//build/config/compiler:no_chromium_code" ]
if (is_nacl) {
deps += [ "//native_client_sdk/src/libraries/nacl_io" ]
}
}
fuzzer_test("boringssl_client_no_fuzzer_mode_fuzzer") {
sources = [
"src/fuzz/client.cc",
"src/ssl/test/fuzzer.h",
"src/ssl/test/fuzzer_tags.h",
]
additional_configs = [ ":internal_config" ]
deps = [ ":boringssl_fuzzer_no_fuzzer_mode" ]
seed_corpus = "src/fuzz/client_corpus_no_fuzzer_mode"
}
fuzzer_test("boringssl_server_no_fuzzer_mode_fuzzer") {
sources = [
"src/fuzz/server.cc",
"src/ssl/test/fuzzer.h",
"src/ssl/test/fuzzer_tags.h",
]
additional_configs = [ ":internal_config" ]
deps = [ ":boringssl_fuzzer_no_fuzzer_mode" ]
seed_corpus = "src/fuzz/server_corpus_no_fuzzer_mode"
}
}