)]}' { "commit": "350fe3bf32dcf87f281685b1e7fc8df876f396a8", "tree": "30d611f851d5c9d0cde4a42b816a82c433675e03", "parents": [ "b32aa05538113798a07e086102ffb9d57dcdc6a8" ], "author": { "name": "David Benjamin", "email": "davidben@google.com", "time": "Wed Jun 02 17:58:53 2021 -0400" }, "committer": { "name": "Adam Langley", "email": "agl@google.com", "time": "Thu Jun 10 16:41:40 2021 +0000" }, "message": "Fix ext_pre_shared_key_clienthello_length calculation.\n\nIf we\u0027re dropping the PSK extension due to an HRR with mismatched hash\n(looking back at that, we could easily have avoided that nuisance...\nI\u0027ve filed [0] on rfc8446bis), we don\u0027t predict the length correctly.\nThe consequence is we don\u0027t pad the second ClientHello to the desired\nrange. Fix this and add an assert.\n\n[0] https://github.com/tlswg/tls13-spec/issues/1227\n\nChange-Id: I47d880b6bdafa95840f7513b6b7718851f22554d\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/47998\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "da89afb40191a3fe1e4d2ef3e62f942cdf24abdb", "old_mode": 33188, "old_path": "ssl/t1_lib.cc", "new_id": "33621a39eaa5b494f5068a8187f035e5b72eaa49", "new_mode": 33188, "new_path": "ssl/t1_lib.cc" } ] }