)]}'
{
  "commit": "4e3e65776a613132d628ca7d2be7571cb26f37c4",
  "tree": "87b888b962cb5c04ff69ab61248250098d66a10a",
  "parents": [
    "43eefae7ff3b3a723826fff477120c40733c6d76"
  ],
  "author": {
    "name": "dschinazi",
    "email": "dschinazi@google.com",
    "time": "Fri Aug 02 12:57:17 2019 -0700"
  },
  "committer": {
    "name": "Copybara-Service",
    "email": "copybara-worker@google.com",
    "time": "Fri Aug 02 16:18:42 2019 -0700"
  },
  "message": "Send correct stateless reset token when using TLS\n\nWhen using TLS, the stateless reset token needs to be populated in the QuicConfig early in the session\u0027s lifetime to ensure it\u0027s correctly encoded in the server\u0027s transport parameters. Previously the server would send an all-zeroes token. I\u0027ve confirmed that EndToEndTestWithTls.SendStatelessResetTokenInShlo fails without the fix and passes with the fix.\n\ngfe-relnote: send correct reset token, protected by disabled TLS flag\nPiperOrigin-RevId: 261374750\nChange-Id: I60725c5eb6cedfa1b06cf3797bf258875fb495eb\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "ca71f3fb5bd638c944029eb5795119561570bfdd",
      "old_mode": 33188,
      "old_path": "quic/core/http/end_to_end_test.cc",
      "new_id": "702dd70dd77cc716d4659ba6e11b1209c696b79e",
      "new_mode": 33188,
      "new_path": "quic/core/http/end_to_end_test.cc"
    },
    {
      "type": "modify",
      "old_id": "1dbaf4408b7d6bbe1111e9583fc0d087188d8a53",
      "old_mode": 33188,
      "old_path": "quic/core/quic_session.cc",
      "new_id": "ba53d5e03fcbf6acda92498503161b6c6ac4fbf2",
      "new_mode": 33188,
      "new_path": "quic/core/quic_session.cc"
    }
  ]
}
