)]}' { "commit": "494e4d0e8966944b84db797084dcb381b97f25b9", "tree": "05e686185eb43d4664c29dccaa6101d03bdcab05", "parents": [ "a5462d3050ac6a68ab488450bf5856475dbef992" ], "author": { "name": "David Benjamin", "email": "davidben@google.com", "time": "Fri Dec 01 13:05:12 2017 -0500" }, "committer": { "name": "CQ bot account: commit-bot@chromium.org", "email": "commit-bot@chromium.org", "time": "Mon Dec 04 21:20:46 2017 +0000" }, "message": "Add an option for False Start without ALPN.\n\nWe can probably do this globally at this point since the cipher\nrequirements are much more restrict than they were in the beginning.\n(Firefox, in particular, has done so far a while.) For now add a flag\nsince some consumer wanted this.\n\nI\u0027ll see about connecting it to a Chrome field trial after our breakage\nbudget is no longer reserved for TLS 1.3.\n\nChange-Id: Ib61dd5aae2dfd48b56e79873a7f3061a7631a5f8\nReviewed-on: https://boringssl-review.googlesource.com/23725\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nCQ-Verified: CQ bot account: commit-bot@chromium.org \u003ccommit-bot@chromium.org\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "cdf68a12466b462414178ac6354414d6b853140d", "old_mode": 33188, "old_path": "include/openssl/ssl.h", "new_id": "c5b95e9d0328cff9fb695885c915d1abed7f5258", "new_mode": 33188, "new_path": "include/openssl/ssl.h" }, { "type": "modify", "old_id": "53adba611eff8912d841de7353d99aa7a8016d46", "old_mode": 33188, "old_path": "ssl/handshake_client.cc", "new_id": "b801e82ecf2077dec45640d00a9112443d82acbc", "new_mode": 33188, "new_path": "ssl/handshake_client.cc" }, { "type": "modify", "old_id": "6c14383990c4e5da5ec66cecf7d064b485dcf28e", "old_mode": 33188, "old_path": "ssl/internal.h", "new_id": "4bef35820ca5d05011e823250753b2c475410f25", "new_mode": 33188, "new_path": "ssl/internal.h" }, { "type": "modify", "old_id": "122313fa99a52a1c9c00a466aa2c2652e6b95138", "old_mode": 33188, "old_path": "ssl/ssl_lib.cc", "new_id": "6da081e6580c4bdcc3a37f3079b963df87d62abc", "new_mode": 33188, "new_path": "ssl/ssl_lib.cc" }, { "type": "modify", "old_id": "8acabd725c156e85dfd519fd2ae719a117a5eb3c", "old_mode": 33188, "old_path": "ssl/test/bssl_shim.cc", "new_id": "1f43be6d236a9612c212d2cc0e021d053e7f96be", "new_mode": 33188, "new_path": "ssl/test/bssl_shim.cc" }, { "type": "modify", "old_id": "66c13fc90cda1887bdf657f96bfd133274a6a35c", "old_mode": 33188, "old_path": "ssl/test/runner/runner.go", "new_id": "a6b17015325e5ab50926bdb37478d268261f6b17", "new_mode": 33188, "new_path": "ssl/test/runner/runner.go" }, { "type": "modify", "old_id": "a5ce5a12063a8cb87e4ef113d5cc73da8ad19211", "old_mode": 33188, "old_path": "ssl/test/test_config.cc", "new_id": "efe5acbc72f8d49efbd4608650bee0574d00e20b", "new_mode": 33188, "new_path": "ssl/test/test_config.cc" }, { "type": "modify", "old_id": "ea12d344ae3f55b1b3d3065fb7e9d678d79ecff7", "old_mode": 33188, "old_path": "ssl/test/test_config.h", "new_id": "783471aded3dcbf29dceb75021cd5e4c4d80e57b", "new_mode": 33188, "new_path": "ssl/test/test_config.h" } ] }