)]}' { "commit": "0ab3f0ca2575284525acb77672139058a6eb8e97", "tree": "e1dbb006dee59651e3c5cc225975f4d3e27573eb", "parents": [ "0ab86cf6f900a594187469ff5d546e5be203a480" ], "author": { "name": "David Benjamin", "email": "davidben@google.com", "time": "Fri Jan 26 16:33:12 2018 -0500" }, "committer": { "name": "CQ bot account: commit-bot@chromium.org", "email": "commit-bot@chromium.org", "time": "Fri Jan 26 21:53:27 2018 +0000" }, "message": "Notice earlier if a server echoes the TLS 1.3 compatibility session ID.\n\nMono\u0027s legacy TLS 1.0 stack, as a server, does not implement any form of\nresumption, but blindly echos the ClientHello session ID in the\nServerHello for no particularly good reason.\n\nThis is invalid, but due to quirks of how our client checked session ID\nequality, we only noticed on the second connection, rather than the\nfirst. Flaky failures do no one any good, so break deterministically on\nthe first connection, when we realize something strange is going on.\n\nBug: chromium:796910\nChange-Id: I1f255e915fcdffeafb80be481f6c0acb3c628846\nReviewed-on: https://boringssl-review.googlesource.com/25424\nCommit-Queue: Steven Valdez \u003csvaldez@google.com\u003e\nCQ-Verified: CQ bot account: commit-bot@chromium.org \u003ccommit-bot@chromium.org\u003e\nReviewed-by: Steven Valdez \u003csvaldez@google.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "eadb25d1b3770b13fa7336e4ee346ec6e11ee0a0", "old_mode": 33188, "old_path": "crypto/err/ssl.errordata", "new_id": "4450958430897f91fb5485bf95182a82c62ce621", "new_mode": 33188, "new_path": "crypto/err/ssl.errordata" }, { "type": "modify", "old_id": "7ae8276738b9556708a91bacd67f18cf7a6f3c2b", "old_mode": 33188, "old_path": "include/openssl/ssl.h", "new_id": "247a14578225a0468607ff851c8ac195a4f9617b", "new_mode": 33188, "new_path": "include/openssl/ssl.h" }, { "type": "modify", "old_id": "3961ca16d9fd730303008eec5e9ce31824737cb5", "old_mode": 33188, "old_path": "ssl/handshake_client.cc", "new_id": "1f91adbf05012f398905beabddfc1b301e78d0f0", "new_mode": 33188, "new_path": "ssl/handshake_client.cc" }, { "type": "modify", "old_id": "a543e81b199cb88c9f416c2480aa81d24aaf9025", "old_mode": 33188, "old_path": "ssl/test/runner/common.go", "new_id": "d89f7fb1262fe338400c784721dd19e140dd9179", "new_mode": 33188, "new_path": "ssl/test/runner/common.go" }, { "type": "modify", "old_id": "dc7425939a03d21193d7bbc1992eeb609ffd8b66", "old_mode": 33188, "old_path": "ssl/test/runner/handshake_server.go", "new_id": "123ab16345bd6e06366f0861cb1886e48dd107a3", "new_mode": 33188, "new_path": "ssl/test/runner/handshake_server.go" }, { "type": "modify", "old_id": "e17f5dd6b9c9db0353287b480159f0a8f7a35424", "old_mode": 33188, "old_path": "ssl/test/runner/runner.go", "new_id": "02ea53985cc042d544c70ae8f3bc4b1a044e8fb7", "new_mode": 33188, "new_path": "ssl/test/runner/runner.go" } ] }