)]}'
{
  "commit": "afb970dea4e32a996c67169b5becab199b09c179",
  "tree": "998be71a16f93213d4585408236cfb506639f6e4",
  "parents": [
    "51ed8ad6b7f18dba2b7b87d633a7f3b85b4fdec7"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Mon Aug 25 16:48:20 2025 -0400"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Wed Aug 27 07:31:25 2025 -0700"
  },
  "message": "Test key import in EVPTest a bit more extensively\n\nBetween the \"raw\" import and what\u0027ll soon be a few parsing entrypoints,\nwe\u0027ll have a few different ways to make keys. Rather than importing one\nkey and then checking properties, this function is now meant to describe\nproperties of a key and then:\n\n- For each set of properties that is enough to construct a key,\n  construct that key.\n\n- For each key that was constructed, check all properties apply to that\n  key.\n\nRather than having ExpectNo* attributes, let\u0027s just say that if you omit\nthe raw public/private key, the expectation is that you don\u0027t have one.\nI\u0027ve also dropped \"Expect\" on the positive cases because it is now both\na property to check and a way to construct the key.\n\nWe\u0027ve since added a few properties of keys that aren\u0027t curently\nwell-tested, so go test those. This revealed that actually the DSA test\nvectors were misnamed. The test public key didn\u0027t correspond to the test\npublic key and they were of different sizes.\n\nI tried to test the EC point format getting but ran into\nhttps://crbug.com/441087671, so I\u0027m going to just ignore this for now.\n\nChange-Id: I5a0432061e33fcc92f790023ad40019e8eaf27c1\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/81647\nAuto-Submit: David Benjamin \u003cdavidben@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "4702e31d6287c379d368ca38bfcfe5802974f29c",
      "old_mode": 33188,
      "old_path": "crypto/evp/evp_test.cc",
      "new_id": "108886994ee62a2b184b8d5c988b05cda8ef90bd",
      "new_mode": 33188,
      "new_path": "crypto/evp/evp_test.cc"
    },
    {
      "type": "modify",
      "old_id": "5d4fb8d7313f34e574aad39484dd5f4536e1479a",
      "old_mode": 33188,
      "old_path": "crypto/evp/test/ec_tests.txt",
      "new_id": "b15fda597726d40a928aef1112f8d53ad33f50e0",
      "new_mode": 33188,
      "new_path": "crypto/evp/test/ec_tests.txt"
    },
    {
      "type": "modify",
      "old_id": "28e636916effbd791030bb3185358b97369ace20",
      "old_mode": 33188,
      "old_path": "crypto/evp/test/ed25519_tests.txt",
      "new_id": "5b0b21614edaa2bb56ebd398a5a7c26e94d08a44",
      "new_mode": 33188,
      "new_path": "crypto/evp/test/ed25519_tests.txt"
    },
    {
      "type": "modify",
      "old_id": "fc2c748b0bf785317f5e884d5e8088b4c2fb1557",
      "old_mode": 33188,
      "old_path": "crypto/evp/test/evp_tests.txt",
      "new_id": "820f1d8e90e958d35352aa79fd528d6107222cc8",
      "new_mode": 33188,
      "new_path": "crypto/evp/test/evp_tests.txt"
    },
    {
      "type": "modify",
      "old_id": "f25a352126740835be0d87de48f14b84c8c8adbb",
      "old_mode": 33188,
      "old_path": "crypto/evp/test/rsa_tests.txt",
      "new_id": "d12ce2129220e1ead312222ca2e3db96fdd3719b",
      "new_mode": 33188,
      "new_path": "crypto/evp/test/rsa_tests.txt"
    },
    {
      "type": "modify",
      "old_id": "d6ea40aa7584a4c5269404721464d668f853d65f",
      "old_mode": 33188,
      "old_path": "crypto/evp/test/x25519_tests.txt",
      "new_id": "9e9690aaf8c3684b12d4a216af5d2b82577df872",
      "new_mode": 33188,
      "new_path": "crypto/evp/test/x25519_tests.txt"
    }
  ]
}
