)]}'
{
  "commit": "71666cb87c4de0bbc34df783e571bdc936f38b0b",
  "tree": "459536eeed0b18e2ca4a088314dbd73e61008647",
  "parents": [
    "b7bc80a9a632ab0c69598382304b14a63e8cae72"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Tue May 01 17:14:27 2018 -0400"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Tue May 01 23:28:59 2018 +0000"
  },
  "message": "Allow renego and config shedding to coexist more smoothly.\n\nChrome needs to support renegotiation at TLS 1.2 + HTTP/1.1, but we\u0027re\nfree to shed the handshake configuration at TLS 1.3 or HTTP/2.\n\nRather than making config shedding implicitly disable renegotiation,\nmake the actual shedding dependent on a combination of the two settings.\nIf config shedding is enabled, but so is renegotiation (including\nwhether we are a client, etc.), leave the config around. If the\nrenegotiation setting gets disabled again after the handshake,\nre-evaluate and shed the config then.\n\nBug: 123\nChange-Id: Ie833f413b3f15b8f0ede617991e3fef239d4a323\nReviewed-on: https://boringssl-review.googlesource.com/27904\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nCQ-Verified: CQ bot account: commit-bot@chromium.org \u003ccommit-bot@chromium.org\u003e\nReviewed-by: Matt Braithwaite \u003cmab@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "2b8791484ae188093a3f36fe429e8809b53a67f8",
      "old_mode": 33188,
      "old_path": "include/openssl/ssl.h",
      "new_id": "ee879c8e263094eaafee19bda4191f53d5774e06",
      "new_mode": 33188,
      "new_path": "include/openssl/ssl.h"
    },
    {
      "type": "modify",
      "old_id": "1e5b3d1883315052dceef882ea9909120228fd27",
      "old_mode": 33188,
      "old_path": "ssl/ssl_lib.cc",
      "new_id": "7b80a03ab1e18e0bbf46ae6e08c385fe98011421",
      "new_mode": 33188,
      "new_path": "ssl/ssl_lib.cc"
    },
    {
      "type": "modify",
      "old_id": "dae759c1b07a60a6fc7131dcb6616baf6bd26f54",
      "old_mode": 33188,
      "old_path": "ssl/test/bssl_shim.cc",
      "new_id": "1b37a8d338d6408e8465c4e2373480de9533698b",
      "new_mode": 33188,
      "new_path": "ssl/test/bssl_shim.cc"
    },
    {
      "type": "modify",
      "old_id": "d85efca369c500b16612fe4133f5029932f874c7",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/runner.go",
      "new_id": "38607d2854c3b938d046420c982367e7cbafceba",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/runner.go"
    },
    {
      "type": "modify",
      "old_id": "9433e4cb38a5293c69173a31bba346ef24ea990c",
      "old_mode": 33188,
      "old_path": "ssl/test/test_config.cc",
      "new_id": "2ab5bfeaeb84fc684de9e03b63a57794ace934af",
      "new_mode": 33188,
      "new_path": "ssl/test/test_config.cc"
    },
    {
      "type": "modify",
      "old_id": "4a03fbac6c7e13d6e1458e7fdcca668b6cd0034c",
      "old_mode": 33188,
      "old_path": "ssl/test/test_config.h",
      "new_id": "9a026ce738a9058e44a1fa304f6116b397d697ae",
      "new_mode": 33188,
      "new_path": "ssl/test/test_config.h"
    }
  ]
}
