)]}'
{
  "commit": "3743aafdacff2f7b083615a043a37101f740fa53",
  "tree": "44c8818dc5c4f31130522cdb8be673611b30f3f5",
  "parents": [
    "9adcb0aa7eb946bea9197276121412ef68776315"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Mon Sep 21 13:55:16 2020 -0400"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Mon Sep 21 18:28:28 2020 +0000"
  },
  "message": "Add SSL_CIPHER_get_protocol_id.\n\nThis was introduced in OpenSSL 1.1.1, and wpa_supplicant expects us to\nhave it. We had this same function as SSL_CIPHER_get_value (to match\nSSL_get_cipher_by_value). Align with upstream\u0027s name.\n\nIt seems we also had a ssl_cipher_get_value lying around, so fold them\ntogether. (I\u0027ve retained the assert in ssl_cipher_get_value as it seems\nreasonable enough; casting a hypothetical SSLv2 cipher ID to uint16_t\nwould not behave correctly.)\n\nChange-Id: Ifbec460435bbc483f2c3de988522e321f2708172\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/42966\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "96ba53b61ebf88d9ee4eeb7ba67d9ebfb97501de",
      "old_mode": 33188,
      "old_path": "include/openssl/ssl.h",
      "new_id": "3e4b638cdf8baab1d1e8a741b5079ee334a8da4d",
      "new_mode": 33188,
      "new_path": "include/openssl/ssl.h"
    },
    {
      "type": "modify",
      "old_id": "670e476434d22f939ddc21b774fc81ed94d5acd7",
      "old_mode": 33188,
      "old_path": "ssl/handshake_client.cc",
      "new_id": "1b7bb1b580ee028788e3736737a291cadaad203c",
      "new_mode": 33188,
      "new_path": "ssl/handshake_client.cc"
    },
    {
      "type": "modify",
      "old_id": "24894289539d6f1fcd2c519531f60c9204e18e0e",
      "old_mode": 33188,
      "old_path": "ssl/handshake_server.cc",
      "new_id": "26227d3417773da14e364531203218d4edaf70d9",
      "new_mode": 33188,
      "new_path": "ssl/handshake_server.cc"
    },
    {
      "type": "modify",
      "old_id": "750bfe93af831af21a2d4b8531cf4301bd19840e",
      "old_mode": 33188,
      "old_path": "ssl/internal.h",
      "new_id": "ffc18a52da5fab8729cfc91abfb77482e09d26b0",
      "new_mode": 33188,
      "new_path": "ssl/internal.h"
    },
    {
      "type": "modify",
      "old_id": "c4212926c7cbb1ed3fb9395b69be837bd4d8569b",
      "old_mode": 33188,
      "old_path": "ssl/ssl_cipher.cc",
      "new_id": "4f5049c607c0af83c3bd2c01f327655975f60af5",
      "new_mode": 33188,
      "new_path": "ssl/ssl_cipher.cc"
    },
    {
      "type": "modify",
      "old_id": "092943244044ee6ca7da19aace15d9a128b38ec1",
      "old_mode": 33188,
      "old_path": "ssl/test/mock_quic_transport.cc",
      "new_id": "6a3f0e8ace242c6919220b39b54ed7f0cf99a738",
      "new_mode": 33188,
      "new_path": "ssl/test/mock_quic_transport.cc"
    },
    {
      "type": "modify",
      "old_id": "25c13ef915130fc5921accd9a44447c568443a94",
      "old_mode": 33188,
      "old_path": "ssl/tls13_server.cc",
      "new_id": "0105f1cdf73913ab1a507e3f41773cce2a193b38",
      "new_mode": 33188,
      "new_path": "ssl/tls13_server.cc"
    }
  ]
}
