Rename DTLS 1.3 TODOs.
Prior to the buganizer migration, the DTLS 1.3 tracking bug was
crbug.com/boringssl/715. To make it easier to find all TODOs for the
DTLS 1.3 work, this changes them to point to the same bug under the new
number.
Change-Id: I585c551947ded2b82e3e1faaf133a518961686ea
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/72407
Reviewed-by: David Benjamin <davidben@google.com>
Auto-Submit: Nick Harper <nharper@chromium.org>
Commit-Queue: David Benjamin <davidben@google.com>
diff --git a/ssl/dtls_method.cc b/ssl/dtls_method.cc
index 4b87221..27993da 100644
--- a/ssl/dtls_method.cc
+++ b/ssl/dtls_method.cc
@@ -89,9 +89,9 @@
DTLSReadEpoch new_epoch;
if (ssl_protocol_version(ssl) > TLS1_2_VERSION) {
- // TODO(crbug.com/boringssl/715): Handle the additional epochs used for key
+ // TODO(crbug.com/42290594): Handle the additional epochs used for key
// update.
- // TODO(crbug.com/boringssl/715): If we want to gracefully handle packet
+ // TODO(crbug.com/42290594): If we want to gracefully handle packet
// reordering around KeyUpdate (i.e. accept records from both epochs), we'll
// need a separate bitmap for each epoch.
new_epoch.epoch = level;
@@ -117,7 +117,7 @@
Span<const uint8_t> traffic_secret) {
DTLSWriteEpoch new_epoch;
if (ssl_protocol_version(ssl) > TLS1_2_VERSION) {
- // TODO(crbug.com/boringssl/715): See above.
+ // TODO(crbug.com/42290594): See above.
new_epoch.epoch = level;
new_epoch.rn_encrypter =
RecordNumberEncrypter::Create(aead_ctx->cipher(), traffic_secret);
diff --git a/ssl/ssl_test.cc b/ssl/ssl_test.cc
index 098c32a..dd295cc 100644
--- a/ssl/ssl_test.cc
+++ b/ssl/ssl_test.cc
@@ -3494,7 +3494,7 @@
TEST_P(SSLVersionTest, SessionIDContext) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -3635,7 +3635,7 @@
TEST_P(SSLVersionTest, SessionTimeout) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -3776,7 +3776,7 @@
TEST_P(SSLVersionTest, DefaultTicketKeyRotation) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -4484,7 +4484,7 @@
CreateClientSession(client_ctx_.get(), server_ctx_.get(), config);
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -4501,7 +4501,7 @@
// Test that session cache mode bits are honored in the client session callback.
TEST_P(SSLVersionTest, ClientSessionCacheMode) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -5572,7 +5572,7 @@
TEST_P(SSLVersionTest, SessionVersion) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -6229,7 +6229,7 @@
// Test that ticket-based sessions on the client get fake session IDs.
TEST_P(SSLVersionTest, FakeIDsForTickets) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -6365,7 +6365,7 @@
TEST_P(SSLVersionTest, SessionTicketThreads) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -8042,7 +8042,7 @@
TEST_P(SSLVersionTest, SameKeyResume) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -8084,7 +8084,7 @@
TEST_P(SSLVersionTest, DifferentKeyNoResume) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -8127,7 +8127,7 @@
TEST_P(SSLVersionTest, UnrelatedServerNoResume) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
@@ -8169,7 +8169,7 @@
TEST_P(SSLVersionTest, TicketSessionIDsMatch) {
if (version() == DTLS1_3_EXPERIMENTAL_VERSION) {
- // TODO(crbug.com/boringssl/715): Enable the rest of this test for DTLS 1.3
+ // TODO(crbug.com/42290594): Enable the rest of this test for DTLS 1.3
// once it supports NewSessionTickets.
return;
}
diff --git a/ssl/test/runner/runner.go b/ssl/test/runner/runner.go
index c0d4276..8a4dd55 100644
--- a/ssl/test/runner/runner.go
+++ b/ssl/test/runner/runner.go
@@ -3231,7 +3231,7 @@
},
resumeSession: true,
},
- // TODO(crbug.com/boringssl/715): This test and the next shouldn't be
+ // TODO(crbug.com/42290594): This test and the next shouldn't be
// restricted to a max version of TLS 1.2, but they're broken in DTLS 1.3.
{
protocol: dtls,
@@ -5054,7 +5054,7 @@
flags: []string{"-expect-hrr"},
})
- // TODO(crbug.com/boringssl/715): The -NoResume tests here are copies
+ // TODO(crbug.com/42290594): The -NoResume tests here are copies
// of the above tests, but without resumeSession set. These exist to
// test HRR in DTLS 1.3, because tests DTLS 1.3 tests with resumption
// enabled are skipped due to lack of support for resumption. Once we
@@ -5091,7 +5091,7 @@
// These tests are disabled for QUIC as well because they test features
// that do not apply to QUIC's use of TLS 1.3.
//
- // TODO(crbug.com/boringssl/715): Enable these tests for DTLS once we
+ // TODO(crbug.com/42290594): Enable these tests for DTLS once we
// support early data in DTLS 1.3.
if config.protocol != dtls && config.protocol != quic {
tests = append(tests, testCase{