)]}'
{
  "commit": "09b8fd44c3d36cab0860a8e520ecbfe58b02a7fa",
  "tree": "b9f7d75f772bc6bde380c59167ceeb84e890ac62",
  "parents": [
    "b859642c20724a9c43d726933c74b30602fb356a"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Sun Jul 10 19:14:48 2022 -0400"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Fri Jul 15 22:09:40 2022 +0000"
  },
  "message": "Const-correct X509_EXTENSION functions, as best we can.\n\nSome of these were non-const because dup functions weren\u0027t\nconst-correct, but they are now. Once nuisance is the accessors. Ideally\nthey\u0027d return non-const pointers, but that\u0027ll break OpenSSL consumers.\n\nBug: 407\nChange-Id: I52b939a846b726d1d84dd2d5fdf71a7a7284d49e\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/53336\nReviewed-by: Bob Beck \u003cbbe@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "154fb75bc74f52c1358ecc9fbcafcfda24ccfa2f",
      "old_mode": 33188,
      "old_path": "crypto/x509/t_req.c",
      "new_id": "e9287d5f3d3dacb628542f5749a89774dca8a0a3",
      "new_mode": 33188,
      "new_path": "crypto/x509/t_req.c"
    },
    {
      "type": "modify",
      "old_id": "17f4d171fee0414bd305d2aa5a085190c44c461f",
      "old_mode": 33188,
      "old_path": "crypto/x509/x509_ext.c",
      "new_id": "8ab1926d2355902118366c890c8d94bd63efc3db",
      "new_mode": 33188,
      "new_path": "crypto/x509/x509_ext.c"
    },
    {
      "type": "modify",
      "old_id": "8aee2d5a108623c56975e66c026aeedf4f08b6e3",
      "old_mode": 33188,
      "old_path": "crypto/x509/x509_test.cc",
      "new_id": "8343fee39afa75603704a975a3649a58b3554c48",
      "new_mode": 33188,
      "new_path": "crypto/x509/x509_test.cc"
    },
    {
      "type": "modify",
      "old_id": "920923309aec81c31eb081dcc52daad1d611a219",
      "old_mode": 33188,
      "old_path": "crypto/x509/x509_v3.c",
      "new_id": "4b88ea70764b49938c8167351ee11c944a6a5cce",
      "new_mode": 33188,
      "new_path": "crypto/x509/x509_v3.c"
    },
    {
      "type": "modify",
      "old_id": "2e5a3c622e80f1a50e1564ae75bf7bd1ccd8451c",
      "old_mode": 33188,
      "old_path": "crypto/x509/x509_vfy.c",
      "new_id": "e054629af10f8287ea085d74e53049618ef4fa01",
      "new_mode": 33188,
      "new_path": "crypto/x509/x509_vfy.c"
    },
    {
      "type": "modify",
      "old_id": "343940be495a4519fe1c017fcdaf0b1564acc23b",
      "old_mode": 33188,
      "old_path": "crypto/x509v3/v3_akey.c",
      "new_id": "7616f4f0875494867c65dd1b49d0bfa8d3990ebd",
      "new_mode": 33188,
      "new_path": "crypto/x509v3/v3_akey.c"
    },
    {
      "type": "modify",
      "old_id": "129c4fac0074993d692b8099381356b76aa96680",
      "old_mode": 33188,
      "old_path": "crypto/x509v3/v3_prn.c",
      "new_id": "20d2ad99e58fedd888ff2442e16628cba716fdc3",
      "new_mode": 33188,
      "new_path": "crypto/x509v3/v3_prn.c"
    },
    {
      "type": "modify",
      "old_id": "9a925b22930e984d9fc7d914182857ec1f8376c3",
      "old_mode": 33188,
      "old_path": "crypto/x509v3/v3_purp.c",
      "new_id": "00c0571c2f03d60a85da04aef19bfe2ccb886638",
      "new_mode": 33188,
      "new_path": "crypto/x509v3/v3_purp.c"
    },
    {
      "type": "modify",
      "old_id": "ede59940b00ec61b1ef0c4d4190562872ad9bac8",
      "old_mode": 33188,
      "old_path": "include/openssl/x509.h",
      "new_id": "a2cda17e0cbdf4df19f3e3392282ffc051e5e639",
      "new_mode": 33188,
      "new_path": "include/openssl/x509.h"
    },
    {
      "type": "modify",
      "old_id": "38c72cd2bd5b6c12c6c08be53dfd0da909a5eaee",
      "old_mode": 33188,
      "old_path": "include/openssl/x509v3.h",
      "new_id": "9db57e6f6aec62249ee3472956f505f267719eac",
      "new_mode": 33188,
      "new_path": "include/openssl/x509v3.h"
    }
  ]
}
