)]}'
{
  "commit": "dd1ca99da4ba21684c4136a4ecb87d291d1792fa",
  "tree": "5f62e249651e35930859a8aed8099f8344894945",
  "parents": [
    "310db06b79a8a997e077dc88bb2327992fad37bb"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@chromium.org",
    "time": "Mon Feb 16 21:15:53 2015 -0500"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Tue Feb 17 23:15:47 2015 +0000"
  },
  "message": "Remove X509_get_pubkey_parameters.\n\nIt\u0027s never called in outside code. This too seems to be a remnant of the DSA\nPKIX optional parameter stuff. This is confirmed both by a removed comment and\nby the brief documentation at http://www.umich.edu/~x509/ssleay/x509_pkey.html\n\nRFC 5480 does not allow ECDSA keys to be missing parameters, so this logic is\nincorrect for ECDSA anyway.  It was also failing to check\nEVP_PKEY_copy_parameters\u0027 return value. And that logic looks pretty suspect if\nyou have a chain made up multiple certificate types.\n\nChange-Id: Id6c60659a0162356c7f3eae5c797047366baae1c\nReviewed-on: https://boringssl-review.googlesource.com/3485\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "28d2182d60b71bdc8c9317918aba1d95c40c89da",
      "old_mode": 33188,
      "old_path": "crypto/x509/x509_vfy.c",
      "new_id": "78e70a61ba324317b7d20416758e780a52c745c7",
      "new_mode": 33188,
      "new_path": "crypto/x509/x509_vfy.c"
    },
    {
      "type": "modify",
      "old_id": "f500876a48ad64070c716a35fa4b85bebf3ccfeb",
      "old_mode": 33188,
      "old_path": "include/openssl/x509.h",
      "new_id": "acdab6ea32190d6ee328c56d8fde5c708c33721f",
      "new_mode": 33188,
      "new_path": "include/openssl/x509.h"
    }
  ]
}
