)]}'
{
  "commit": "bf82aede675e343087ca9d31b53547d01c269be0",
  "tree": "2ebf98e9de0c823b9d54e328cf8fb07efd2f4a72",
  "parents": [
    "2477adcf6236c3040a291ad1bfd53f525e1af96d"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Tue Mar 01 22:57:40 2016 -0500"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Wed Mar 02 23:39:36 2016 +0000"
  },
  "message": "Disable all TLS crypto in fuzzer mode.\n\nBoth sides\u0027 signature and Finished checks still occur, but the results\nare ignored. Also, all ciphers behave like the NULL cipher.\nConveniently, this isn\u0027t that much code since all ciphers and their size\ncomputations funnel into SSL_AEAD_CTX.\n\nThis does carry some risk that we\u0027ll mess up this code. Up until now, we\u0027ve\ntried to avoid test-only changes to the SSL stack.\n\nThere is little risk that anyone will ship a BORINGSSL_UNSAFE_FUZZER_MODE build\nfor anything since it doesn\u0027t interop anyway. There is some risk that we\u0027ll end\nup messing up the disableable checks. However, both skipped checks have\nnegative tests in runner (see tests that set InvalidSKXSignature and\nBadFinished). For good measure, I\u0027ve added a server variant of the existing\nBadFinished test to this CL, although they hit the same code.\n\nChange-Id: I37f6b4d62b43bc08fab7411965589b423d86f4b8\nReviewed-on: https://boringssl-review.googlesource.com/7287\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "725c4f533a649c1093c829f389d12a2f75f7ed21",
      "old_mode": 33188,
      "old_path": "ssl/s3_both.c",
      "new_id": "c9eb83ad2db316b1bb29538882ee951fe7467cf9",
      "new_mode": 33188,
      "new_path": "ssl/s3_both.c"
    },
    {
      "type": "modify",
      "old_id": "bbbaccd4e75e1eab0b7d43d179c10d83e920592c",
      "old_mode": 33188,
      "old_path": "ssl/s3_clnt.c",
      "new_id": "201c036777e85ea5625acffe421f2d8d331e1a1b",
      "new_mode": 33188,
      "new_path": "ssl/s3_clnt.c"
    },
    {
      "type": "modify",
      "old_id": "ae709dc36384076080b25e924abc805e61892dc2",
      "old_mode": 33188,
      "old_path": "ssl/s3_srvr.c",
      "new_id": "1f2d07653272fa890e6dea59912b9c77a3ae3334",
      "new_mode": 33188,
      "new_path": "ssl/s3_srvr.c"
    },
    {
      "type": "modify",
      "old_id": "ea44a6cbfdb621111b499a148aa56a95d6b89abe",
      "old_mode": 33188,
      "old_path": "ssl/ssl_aead_ctx.c",
      "new_id": "4de9d45e7519850b5a692ea32b57bbd61315f059",
      "new_mode": 33188,
      "new_path": "ssl/ssl_aead_ctx.c"
    },
    {
      "type": "modify",
      "old_id": "86d0d4467c154e6facd51d032723c29cd0d9417d",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/runner.go",
      "new_id": "18f744f7c12d3fda12c38b10e1d3a893884afa9a",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/runner.go"
    },
    {
      "type": "modify",
      "old_id": "d53e1d78c41919fc16c3fc45751ccafa84fafe1b",
      "old_mode": 33188,
      "old_path": "ssl/tls_record.c",
      "new_id": "b71da17f672aec7db83f10190d44d7b65e7aaa88",
      "new_mode": 33188,
      "new_path": "ssl/tls_record.c"
    }
  ]
}
