)]}'
{
  "commit": "0a6bfa36c932fbf6bf8d8cc8611d499a6f2d9b5d",
  "tree": "fc1f223e9111ac8cad737f3902e999b940b484ad",
  "parents": [
    "5656fec512a8dfd2833fbf47b6aaa76364c26fad"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Wed Nov 18 14:30:49 2020 -0500"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Wed Nov 18 22:56:11 2020 +0000"
  },
  "message": "Always check the TLS 1.3 downgrade signal.\n\nThese APIs were used by Chromium to control the carve-out for the TLS\n1.3 downgrade signal. As of\nhttps://chromium-review.googlesource.com/c/chromium/src/+/2324170,\nChromium no longer uses them.\n\nUpdate-Note: SSL_CTX_set_ignore_tls13_downgrade,\nSSL_set_ignore_tls13_downgrade, and SSL_is_tls13_downgrade now do\nnothing. Calls sites should be removed. (There are some copies of older\nChromium lying around, so I haven\u0027t removed the functions yet.) The\nenforcement was already on by default, so this CL does not affect\ncallers that don\u0027t use those functions.\n\nChange-Id: I016af8291cd92051472d239c4650602fe2a68f5b\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44124\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "c12aa0e17bdd7d2469de4416d105b68961a9c99f",
      "old_mode": 33188,
      "old_path": "include/openssl/ssl.h",
      "new_id": "933c04a756e02c9f73e49701983a6431168fa037",
      "new_mode": 33188,
      "new_path": "include/openssl/ssl.h"
    },
    {
      "type": "modify",
      "old_id": "5c800fb5f50cbefba116f45088b79e1ca858c01a",
      "old_mode": 33188,
      "old_path": "ssl/handshake_client.cc",
      "new_id": "c36b192a191de0ad0ebd50045ba9e5d021ba2baf",
      "new_mode": 33188,
      "new_path": "ssl/handshake_client.cc"
    },
    {
      "type": "modify",
      "old_id": "7420f6564f18f92d5d28ba01ccb9506bfb91c537",
      "old_mode": 33188,
      "old_path": "ssl/internal.h",
      "new_id": "1e54c98dc79aaeef3712daf90931985754c76d1c",
      "new_mode": 33188,
      "new_path": "ssl/internal.h"
    },
    {
      "type": "modify",
      "old_id": "ee356040583ecc36cfa669e2c8efaa7520ba57da",
      "old_mode": 33188,
      "old_path": "ssl/s3_lib.cc",
      "new_id": "3e12492209e17bc5712e9b23031e157f735940ae",
      "new_mode": 33188,
      "new_path": "ssl/s3_lib.cc"
    },
    {
      "type": "modify",
      "old_id": "a52f1fa4f51efd07febd7bb95371aebe5f9e74d7",
      "old_mode": 33188,
      "old_path": "ssl/ssl_lib.cc",
      "new_id": "79eaacbb387d1312325da748fac65592ba09063f",
      "new_mode": 33188,
      "new_path": "ssl/ssl_lib.cc"
    },
    {
      "type": "modify",
      "old_id": "b04f0892ace548b18a718d2b30cf72ff66452ed2",
      "old_mode": 33188,
      "old_path": "ssl/test/bssl_shim.cc",
      "new_id": "08482fb6940d04233143e32642a0d1eff9e1aa56",
      "new_mode": 33188,
      "new_path": "ssl/test/bssl_shim.cc"
    },
    {
      "type": "modify",
      "old_id": "631756f0c7062e5c1f2f9a5265aa75f8e070f437",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/runner.go",
      "new_id": "1bbec864150c46e6e737dddbbe5354f7cdbdf6d5",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/runner.go"
    },
    {
      "type": "modify",
      "old_id": "ca87c448c4773ab6b4bda42d17ec0a707582268e",
      "old_mode": 33188,
      "old_path": "ssl/test/test_config.cc",
      "new_id": "3c49b944640dcf96f9fa31e3198d56e004e6f2e4",
      "new_mode": 33188,
      "new_path": "ssl/test/test_config.cc"
    },
    {
      "type": "modify",
      "old_id": "318c7335f1b163e4c6762404dd46b850a584b83b",
      "old_mode": 33188,
      "old_path": "ssl/test/test_config.h",
      "new_id": "35007b68d1e4fb7852d6414e6185b185aa9ab7a6",
      "new_mode": 33188,
      "new_path": "ssl/test/test_config.h"
    }
  ]
}
