)]}' { "commit": "396a441421895fe724167b29f6daf307708673fb", "tree": "f5d88ead770eb3cdcbd79acc0038a2b334d17601", "parents": [ "67dc83851bad62397619e2ff107cf44f09505dbd" ], "author": { "name": "David Benjamin", "email": "davidben@chromium.org", "time": "Sun Jul 05 01:38:09 2015 -0400" }, "committer": { "name": "Adam Langley", "email": "agl@google.com", "time": "Tue Jul 07 01:10:35 2015 +0000" }, "message": "ssl3_cert_verify_hash should take the EVP_PKEY type.\n\nAfter the custom key method support, the EVP_PKEY parameter is somewhat\nconfusing (to be resolved with the certificate slots removal) as it must\nalways refer to a private key. ssl3_cert_verify_hash is sometimes used\nwith the peer\u0027s public key. If custom keys were supported on the server,\nthis would break.\n\nFix this by passing a pkey_type parameter and letting the caller decide\nwhether this uses SSL_PRIVATE_KEY_METHOD or not.\n\nChange-Id: I673b92579a84b4561f28026ec0b1c78a6bfee440\nReviewed-on: https://boringssl-review.googlesource.com/5341\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "e89fbc55db860488412d5e7dc88a716c2a5ecb0e", "old_mode": 33188, "old_path": "ssl/internal.h", "new_id": "2b800bc6d75ba47f9970992bdc55efc43dfe8a49", "new_mode": 33188, "new_path": "ssl/internal.h" }, { "type": "modify", "old_id": "6fb0e3f3419f828f12a80c7a7bff23a8f4e7b581", "old_mode": 33188, "old_path": "ssl/s3_both.c", "new_id": "0f8635458b5519ee5041363e4a967b9258d91612", "new_mode": 33188, "new_path": "ssl/s3_both.c" }, { "type": "modify", "old_id": "1550f1989eea06aa65c70d129808af17af757074", "old_mode": 33188, "old_path": "ssl/s3_clnt.c", "new_id": "40df1037cc32f305ad3723cc68cce167baee98f5", "new_mode": 33188, "new_path": "ssl/s3_clnt.c" }, { "type": "modify", "old_id": "b699b180dd80cc9129a2fc9cfcc150dc05b3d482", "old_mode": 33188, "old_path": "ssl/s3_srvr.c", "new_id": "36788f108ced7db0ff879a9302ccb9a49de80e30", "new_mode": 33188, "new_path": "ssl/s3_srvr.c" } ] }