)]}'
{
  "commit": "9cde848bd1109f1a0a77d68b19732ed5535d6953",
  "tree": "d8f55391cd66fa3fc4001d7eb11c9e5572de1060",
  "parents": [
    "1aaa7aa83c13d52043e1fe342d0df68cc91b7b0e"
  ],
  "author": {
    "name": "Christopher Patton",
    "email": "chrispatton@gmail.com",
    "time": "Tue Jul 17 11:36:36 2018 -0700"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Fri Jan 04 19:29:33 2019 +0000"
  },
  "message": "Use handshake parameters to decide if cert/key are available\n\nWhether the host has a valid certificate or private key may depend on\nthe handshake parameters and not just its configuration. For example,\nnegotiating the delegated credential extension (see\nhttps://tools.ietf.org/html/draft-ietf-tls-subcerts) requires an\nalternate private key for the handshake.\n\nChange-Id: I11cea1d11e731aa4018d980c010b8d8ebaa64c31\nReviewed-on: https://boringssl-review.googlesource.com/c/33664\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "0274dc2ab7e8be4102cc1d23331c0a0fe70c2cb4",
      "old_mode": 33188,
      "old_path": "ssl/handshake_client.cc",
      "new_id": "4d57ae56bfc88749fbc3ad1841a2726ac53cfa35",
      "new_mode": 33188,
      "new_path": "ssl/handshake_client.cc"
    },
    {
      "type": "modify",
      "old_id": "15720967e44e124e92dbcc6e2a4829afddda4152",
      "old_mode": 33188,
      "old_path": "ssl/handshake_server.cc",
      "new_id": "15ba2b0839cd527d1067fd4a49b54f2ceb50ed94",
      "new_mode": 33188,
      "new_path": "ssl/handshake_server.cc"
    },
    {
      "type": "modify",
      "old_id": "bc45b504cfca436349d7c3411322b2497c426bcb",
      "old_mode": 33188,
      "old_path": "ssl/internal.h",
      "new_id": "9846966659a9b95e8669f9a6d9cffaac13c3c264",
      "new_mode": 33188,
      "new_path": "ssl/internal.h"
    },
    {
      "type": "modify",
      "old_id": "37d65018e228fbe67e5b31e6f35942e62e913096",
      "old_mode": 33188,
      "old_path": "ssl/ssl_cert.cc",
      "new_id": "955181070b743407f8247ef37d901dbe7ad33561",
      "new_mode": 33188,
      "new_path": "ssl/ssl_cert.cc"
    },
    {
      "type": "modify",
      "old_id": "e716c9af3f89cae5ac99a6c6963682692ce560db",
      "old_mode": 33188,
      "old_path": "ssl/ssl_privkey.cc",
      "new_id": "16888b926c589cf17e743edc51242c1688002517",
      "new_mode": 33188,
      "new_path": "ssl/ssl_privkey.cc"
    },
    {
      "type": "modify",
      "old_id": "eb3a38b73b4b89dc5a54e526747cb05585e3109c",
      "old_mode": 33188,
      "old_path": "ssl/ssl_x509.cc",
      "new_id": "841482f87f447b0bad849047e6959903c057025e",
      "new_mode": 33188,
      "new_path": "ssl/ssl_x509.cc"
    },
    {
      "type": "modify",
      "old_id": "f6e359c30d13c71a83d554fb458619fca113fedf",
      "old_mode": 33188,
      "old_path": "ssl/tls13_both.cc",
      "new_id": "605942a5e29aac9a8a90054c72e4925a0fb4b083",
      "new_mode": 33188,
      "new_path": "ssl/tls13_both.cc"
    },
    {
      "type": "modify",
      "old_id": "0ab40218628b670a258a96f6bb17b824d65fdb1e",
      "old_mode": 33188,
      "old_path": "ssl/tls13_client.cc",
      "new_id": "e7d6dae6592332ee85e9d7685f47fd10da391f2c",
      "new_mode": 33188,
      "new_path": "ssl/tls13_client.cc"
    },
    {
      "type": "modify",
      "old_id": "efdb602ddaca94960cd56a37de1c4ad0379141e7",
      "old_mode": 33188,
      "old_path": "ssl/tls13_server.cc",
      "new_id": "562fecb035c8ccc1e4f6454cd60c5fa10d3b705a",
      "new_mode": 33188,
      "new_path": "ssl/tls13_server.cc"
    }
  ]
}
