)]}'
{
  "commit": "c5e4538e3b0bcfdda30d2dabecbee952faf54c1c",
  "tree": "f330de26ba07e765293734b151aa80bc59808066",
  "parents": [
    "ae2bb641735447496bed334c495e4868b981fe32"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Jan 29 11:31:49 2021 -0500"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Fri Jan 29 19:20:59 2021 +0000"
  },
  "message": "Fix TLS13SessionID-TLS13 test.\n\nThe check was happening in code that only ran at TLS 1.2, so we weren\u0027t\ntesting anything. Additionally check the resumption case. While we do\nhandle it correctly, we only manage it due to the weird OpenSSL quirk\nwe\u0027ve carried over from TLS 1.2 tickets where we synthesize a session ID\nfor TLS 1.3 tickets. (Is that still needed?)\n\nThat\u0027s subtle enough to warrant a test, and some other implementations\nreuse our test suite, so it\u0027s worth the coverage there.\n\nChange-Id: I83cc355bd853097ec6edcd2cc40b06b19e3b00e5\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45324\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "85561fca7228b89ee70a9f97caed1debb114dfa1",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/handshake_server.go",
      "new_id": "35e993301992f6b902b4ab12135b8270858ca62c",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/handshake_server.go"
    },
    {
      "type": "modify",
      "old_id": "e3931d7985d3cd9acf1eb22babecae2d31893942",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/runner.go",
      "new_id": "07c0aa63486d47cea66aa31890abda92b2a59048",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/runner.go"
    }
  ]
}
