)]}'
{
  "commit": "5b786dfeb069f03bad6cde7efeedbe643f4f0c84",
  "tree": "4e19e7d5b7d477f905a68c8720c014580da82c45",
  "parents": [
    "0d5d9b338f480bd5256eb58edb06a950d1f77583"
  ],
  "author": {
    "name": "wub",
    "email": "wub@google.com",
    "time": "Wed Dec 01 15:11:38 2021 -0800"
  },
  "committer": {
    "name": "Copybara-Service",
    "email": "copybara-worker@google.com",
    "time": "Wed Dec 01 15:12:33 2021 -0800"
  },
  "message": "Automated g4 rollback of changelist 291429810.\n\n*** Reason for rollback ***\n\nNo needed for mTLS. quic::TlsHandshaker::VerifyCert is sufficient for a QUIC server to verify client certs.\n\n*** Original change description ***\n\nAdd a ServerProofVerifier interface to QUIC.\n\nThis is a server-side equivalent of ProofVerifier.  It is used to verify a\nclient\u0027s certificate chain.  It will only be used when the server needs to\nrequest client certificates.\n\nServerProofVerifier drops the VerifyProof() function (not used in TLS 1.3) and\nthe |hostname|, |ocsp_response|, and |cert_sct| parameters of VerifyCertChain()\n(those aren\u0027t really meaningful to a server).\n\nSee go/quic-tls-client-certificates for the full design doc and cont...\n\n***\n\nPiperOrigin-RevId: 413521549\n",
  "tree_diff": [
    {
      "type": "delete",
      "old_id": "3e5e67bedf9c8f96e6bf58eacfc34c59ab050148",
      "old_mode": 33188,
      "old_path": "quic/core/crypto/server_proof_verifier.h",
      "new_id": "0000000000000000000000000000000000000000",
      "new_mode": 0,
      "new_path": "/dev/null"
    },
    {
      "type": "modify",
      "old_id": "3335564955030d13c557e9c7768857d51c823fc4",
      "old_mode": 33188,
      "old_path": "quic/core/tls_handshaker.h",
      "new_id": "9509e814f244a8eecb3e34dec5397dea5b906a60",
      "new_mode": 33188,
      "new_path": "quic/core/tls_handshaker.h"
    }
  ]
}
