)]}'
{
  "commit": "6a8d70c528eee2cd4b6f626c33d11e45a44ca2fa",
  "tree": "19aa6a93a0e71b0d9f010cfa0ff05f53c2a74fe5",
  "parents": [
    "253b3e76dc8045dc4639164aeda8b966745f20a4"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@chromium.org",
    "time": "Thu Nov 13 16:02:33 2014 -0500"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Tue Nov 18 22:20:53 2014 +0000"
  },
  "message": "Trim tls1_check_chain and CERT_PKEY flags.\n\nMany are now unused. Only two are currently considered in cipher selection:\nCERT_PKEY_VALID and CERT_PKEY_SIGN. (As per previous commits, this is either\nbizarre due to limited slots or redundant with ssl_early_callback_ctx. We can\nprobably prune this too.)\n\nThis also fixes a bug where DTLS 1.0 went through a TLS 1.2 codepath. As the\nDTLS code is currently arranged, all version comparisons must be done via\nmacros like SSL_USE_SIGALGS. (Probably we should add functions to map from DTLS\nto TLS versions and slowly move the library to using the TLS version as\nin-memory representation.)\n\nChange-Id: I89bcf5b7b9ea5cdecf54f4445156586377328fe0\nReviewed-on: https://boringssl-review.googlesource.com/2286\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "8f8d77915b6585c3ae541464292d868cfe2c93ce",
      "old_mode": 33188,
      "old_path": "ssl/ssl_locl.h",
      "new_id": "3b5bff7e9e2cc4734dc04c27dab40bb2c193c80a",
      "new_mode": 33188,
      "new_path": "ssl/ssl_locl.h"
    },
    {
      "type": "modify",
      "old_id": "4456dfcac3811fc35706663a6791156f2440729b",
      "old_mode": 33188,
      "old_path": "ssl/t1_lib.c",
      "new_id": "c31720c54bad45ceec3cba5cba5afa1ef4c98201",
      "new_mode": 33188,
      "new_path": "ssl/t1_lib.c"
    }
  ]
}
