)]}' { "commit": "225e91acc7cb29951ee5829b8ca502ff78bc812c", "tree": "eaa49af4b6690c6653591d800d58ac552ad4d80f", "parents": [ "aea8bfa852206646a2dd3d03de3f6af768625bf9" ], "author": { "name": "martinduke", "email": "martinduke@google.com", "time": "Mon Nov 28 17:18:13 2022 -0800" }, "committer": { "name": "Copybara-Service", "email": "copybara-worker@google.com", "time": "Mon Nov 28 17:19:22 2022 -0800" }, "message": "Update fuzzer Packet/Proto Conversion to use 16B auth tags.\n\nVirtually all packets (including all IETF QUIC packets) have 16B tags, so the fuzzer packet signature should match that.\n\nAlso, packets with very small payloads, once enabled, cannot work with short tags, so longer tags are a prerequisite.\n\nThe test was originally highly dependent on everything being a NullEncrypter, so that decryption would work even if things were out of sync. This now normalizes everything so that Initial packets are always sent with the version-appropriate encryption, which might involve the original Destination Connection ID, and all other encryption levels are sent with the TaggingEncrypter.\n\nSome production code, when operating in fuzz mode, used the NullDecrypter for Forward Secure packets. This can\u0027t explicitly be replaced with TaggingDecrypter, since this is in the test namespace. So instead, this adds a singleton to ssl_global_data to refer to a factory in the test namespace.\n\nPiperOrigin-RevId: 491481742\n", "tree_diff": [ { "type": "modify", "old_id": "bcb09f9e828269dcc05b54d3bc1fa99c3f68f690", "old_mode": 33188, "old_path": "quiche/quic/core/quic_connection_test.cc", "new_id": "2152a6f9163c88e957899220c82d5c6253798fa7", "new_mode": 33188, "new_path": "quiche/quic/core/quic_connection_test.cc" }, { "type": "modify", "old_id": "0c0ab24da486fa1dbc202cc10d498f2a3335e0de", "old_mode": 33188, "old_path": "quiche/quic/test_tools/quic_test_utils.h", "new_id": "4c8c9b0835d1c5fac648c0d3f4e8ad7e5ceb4231", "new_mode": 33188, "new_path": "quiche/quic/test_tools/quic_test_utils.h" } ] }