)]}' { "commit": "9a41d1b946c17f353c1f7f1d35713b5623dc399e", "tree": "c5c4b6683984866adc9634035994014fc08c1e2a", "parents": [ "76e48c51d0744e916613c1e7657995099e8122f9" ], "author": { "name": "David Benjamin", "email": "davidben@chromium.org", "time": "Sat May 16 01:30:09 2015 -0400" }, "committer": { "name": "Adam Langley", "email": "agl@google.com", "time": "Thu May 21 18:29:34 2015 +0000" }, "message": "Deprecate SSL_*_read_ahead and enforce DTLS packet boundaries.\n\nNow that WebRTC honors packet boundaries (https://crbug.com/447431), we\ncan start enforcing them correctly. Configuring read-ahead now does\nnothing. Instead DTLS will always set \"read-ahead\" and also correctly\nenforce packet boundaries when reading records. Add tests to ensure that\nbadly fragmented packets are ignored. Because such packets don\u0027t fail\nthe handshake, the tests work by injecting an alert in the front of the\nhandshake stream and ensuring the DTLS implementation ignores them.\n\nssl3_read_n can be be considerably unraveled now, but leave that for\nfuture cleanup. For now, make it correct.\n\nBUG\u003d468889\n\nChange-Id: I800cfabe06615af31c2ccece436ca52aed9fe899\nReviewed-on: https://boringssl-review.googlesource.com/4820\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "a7e49c90960006d89d5197549fb47b2713df994a", "old_mode": 33188, "old_path": "include/openssl/ssl.h", "new_id": "8b696130a56e439a20087ed4259d4915b21e55c6", "new_mode": 33188, "new_path": "include/openssl/ssl.h" }, { "type": "modify", "old_id": "45759f33c4dc5926df72ac6d37588ac51dce751b", "old_mode": 33188, "old_path": "ssl/d1_pkt.c", "new_id": "da2e414b8f80bd56845422c0878d1d5bf18c9145", "new_mode": 33188, "new_path": "ssl/d1_pkt.c" }, { "type": "modify", "old_id": "18cf47b01d71932b372e6f3dc7e6ccba093ad6ae", "old_mode": 33188, "old_path": "ssl/s3_pkt.c", "new_id": "6f867511d80b48ad4b29c7e187cd26353fba0365", "new_mode": 33188, "new_path": "ssl/s3_pkt.c" }, { "type": "modify", "old_id": "276d0fd36231b4d940ad7285d6b04199a25c5411", "old_mode": 33188, "old_path": "ssl/ssl_lib.c", "new_id": "3a2e0dd32f76cd86e0af91944597875f3cc12a39", "new_mode": 33188, "new_path": "ssl/ssl_lib.c" }, { "type": "modify", "old_id": "a9d21eba578fb8b84ffd39afbfcae0463e720a8c", "old_mode": 33188, "old_path": "ssl/test/bssl_shim.cc", "new_id": "71c5bf0ee28f8df028d5961a187772ce87891c02", "new_mode": 33188, "new_path": "ssl/test/bssl_shim.cc" }, { "type": "modify", "old_id": "e1479e9ebf80d5acbb2a687b26dfc6bfdb440789", "old_mode": 33188, "old_path": "ssl/test/runner/common.go", "new_id": "57524a723f7c7087d3319883b264368bf94c5e2e", "new_mode": 33188, "new_path": "ssl/test/runner/common.go" }, { "type": "modify", "old_id": "fd198ca64b068a14561a01c87bb7c9fd5358b363", "old_mode": 33188, "old_path": "ssl/test/runner/conn.go", "new_id": "ec7a4a013fdc0a271a64b222dc2a448299391c40", "new_mode": 33188, "new_path": "ssl/test/runner/conn.go" }, { "type": "modify", "old_id": "bb2184706bb76fd288a076c15f6a87002af2ef8e", "old_mode": 33188, "old_path": "ssl/test/runner/runner.go", "new_id": "e4a3f9a64482f723857c8010cf809ee336bc4617", "new_mode": 33188, "new_path": "ssl/test/runner/runner.go" } ] }