)]}'
{
  "commit": "35fb591f242ec6b34ed24eb1c2cb7adb13fcf3b7",
  "tree": "1ad0fa81acbc81d72a178287fc7dfb0abaa80edc",
  "parents": [
    "c0c9001440db8121bdc1ff1307b3a9aedf26fcd8"
  ],
  "author": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Tue Oct 16 12:11:51 2018 -0700"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Mon Oct 22 23:12:57 2018 +0000"
  },
  "message": "Flatten EVP_AEAD_CTX\n\nAn EVP_AEAD_CTX used to be a small struct that contained a pointer to\nan AEAD-specific context. That involved heap allocating the\nAEAD-specific context, which was a problem for users who wanted to setup\nand discard these objects quickly.\n\nInstead this change makes EVP_AEAD_CTX large enough to contain the\nAEAD-specific context inside itself. The dominant AEAD is AES-GCM, and\nthat\u0027s also the largest. So, in practice, this shouldn\u0027t waste too much\nmemory.\n\nChange-Id: I795cb37afae9df1424f882adaf514a222e040c80\nReviewed-on: https://boringssl-review.googlesource.com/c/32506\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nCQ-Verified: CQ bot account: commit-bot@chromium.org \u003ccommit-bot@chromium.org\u003e\nReviewed-by: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "87f16dc6a4cf2dbfcdfcf94bdb1955476ac8740b",
      "old_mode": 33188,
      "old_path": "crypto/cipher_extra/e_aesccm.c",
      "new_id": "37a9add276a1bdaecbed92cab4dab70a9c78f3d4",
      "new_mode": 33188,
      "new_path": "crypto/cipher_extra/e_aesccm.c"
    },
    {
      "type": "modify",
      "old_id": "3a0de9b1584997b5aae6d90a943bcd80cc7eb3d4",
      "old_mode": 33188,
      "old_path": "crypto/cipher_extra/e_aesctrhmac.c",
      "new_id": "54a50ec5e8b76564be5a7bb0c702b1d49c087a89",
      "new_mode": 33188,
      "new_path": "crypto/cipher_extra/e_aesctrhmac.c"
    },
    {
      "type": "modify",
      "old_id": "9de23003b7962e4ecff46dc13f6cbaa91f941abd",
      "old_mode": 33188,
      "old_path": "crypto/cipher_extra/e_aesgcmsiv.c",
      "new_id": "fe436331dc2fd9694f84bee710dfcc9ef4e8bd19",
      "new_mode": 33188,
      "new_path": "crypto/cipher_extra/e_aesgcmsiv.c"
    },
    {
      "type": "modify",
      "old_id": "e632010a0c5c05bf1ca86769915a58c12b2632e1",
      "old_mode": 33188,
      "old_path": "crypto/cipher_extra/e_chacha20poly1305.c",
      "new_id": "5aee4aea84629c10be6c334354477cb00b6c0d06",
      "new_mode": 33188,
      "new_path": "crypto/cipher_extra/e_chacha20poly1305.c"
    },
    {
      "type": "modify",
      "old_id": "bba22be53a16afa650036231bbc9cad3d2687114",
      "old_mode": 33188,
      "old_path": "crypto/cipher_extra/e_tls.c",
      "new_id": "1f1fc3a751e5d72b6c5571b04f6083175c3504f4",
      "new_mode": 33188,
      "new_path": "crypto/cipher_extra/e_tls.c"
    },
    {
      "type": "modify",
      "old_id": "0ced19350778d5e0ddf7db556157869e62928bc9",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/cipher/e_aes.c",
      "new_id": "32b51a15672f412688bd9506d5d8ebe94b2a4923",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/cipher/e_aes.c"
    },
    {
      "type": "modify",
      "old_id": "f19344e481a64ab3b0c107a0eb464a37295b8281",
      "old_mode": 33188,
      "old_path": "include/openssl/aead.h",
      "new_id": "963b2c7d5d5dec058726ba2500184e6af72979e7",
      "new_mode": 33188,
      "new_path": "include/openssl/aead.h"
    }
  ]
}
