)]}'
{
  "commit": "982fdec54e32569be615762e2df4e99f672eb17e",
  "tree": "01a8a885d252a4d9caf820dd95b4353e03c12e37",
  "parents": [
    "484a7707c45b3c35f33164c995d0d41811b6ba65"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Feb 13 13:26:54 2026 -0500"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Fri Feb 20 15:56:10 2026 -0800"
  },
  "message": "runner: Check that the server did not resume a session at the wrong version/cipher\n\nThe TLS 1.3 side was missing a version check, which is technically a\nno-op (only one TLS 1.3 version), but maybe there will be a TLS 1.4\nsomeday. The TLS 1.2 side was missing all of these checks.\n\nWe already explicitly tested the server behavior, so we weren\u0027t missing\nany test coverage here, but since this is a protocol-wide rule, not\nspecific to those tests, we should assert on this in the handshake logic\nitself.\n\nChange-Id: I136fa9fc69108c1ed09952f2f0d25c196fa3b041\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/89469\nReviewed-by: Lily Chen \u003cchlily@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "96f0298cad2b2ca5a106a6e53c2b5601d4920ce2",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/handshake_client.go",
      "new_id": "f2f9c97c125a3957254c3917216607f02cc43b7f",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/handshake_client.go"
    }
  ]
}
