)]}'
{
  "commit": "f39c81d5249ed59cc67d7930f64cec46bc184ec8",
  "tree": "df868f7854bca6ae865773099c8f64e27bf20dce",
  "parents": [
    "1d842c65e60583888891abd032e6034475949f7b"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Mon May 03 18:39:46 2021 -0400"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Thu May 06 19:56:38 2021 +0000"
  },
  "message": "Introduce EVP_HPKE_{AEAD,KDF} types.\n\nThis replaces the ID-based API with one that is more static linker\nfriendly. For ECH, it doesn\u0027t make a difference because we currently\npull in all the options we\u0027ve implemented. But this means other HPKE\nuses need not pull in everything ECH needs and vice versa.\n\nAlong the way, fix an inconsistency: we prefixed all the AEAD constants\nwith \"AEAD\", but not the others. Since the rest of the name already\ndetermines everything, go with the shorter version.\n\nBug: 410\nChange-Id: I56e46c13b43c97e15eeb45204cde7019dd21e250\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/47327\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "cc0def5da82c45763b38dbeee84f7dca59fc1653",
      "old_mode": 33188,
      "old_path": "crypto/hpke/hpke.c",
      "new_id": "3e9815908ddd344bbcf97114d59b695bb498192b",
      "new_mode": 33188,
      "new_path": "crypto/hpke/hpke.c"
    },
    {
      "type": "modify",
      "old_id": "e4aa932279a455a21c9344b58444e6276a3c4b05",
      "old_mode": 33188,
      "old_path": "crypto/hpke/hpke_test.cc",
      "new_id": "82ba229ddd418ab5623bfa8e0de97ea1185acc8d",
      "new_mode": 33188,
      "new_path": "crypto/hpke/hpke_test.cc"
    },
    {
      "type": "modify",
      "old_id": "54382c86f25669360868e5d654183ea84d635e37",
      "old_mode": 33188,
      "old_path": "crypto/hpke/internal.h",
      "new_id": "6dee25ad8c45b79807f264f786dc7ba5933f9f18",
      "new_mode": 33188,
      "new_path": "crypto/hpke/internal.h"
    },
    {
      "type": "modify",
      "old_id": "959017e90bc8138c26982779e1c9aa665ef97108",
      "old_mode": 33188,
      "old_path": "ssl/encrypted_client_hello.cc",
      "new_id": "da233196996bf7953aebace7dcbbb54a9d39ad1c",
      "new_mode": 33188,
      "new_path": "ssl/encrypted_client_hello.cc"
    },
    {
      "type": "modify",
      "old_id": "5d6b3e5c1092c32f722dd759e1dda18e2b3cb4f0",
      "old_mode": 33188,
      "old_path": "ssl/handshake_server.cc",
      "new_id": "5da6b40b90da9b4b1497defe1c432709d4388b40",
      "new_mode": 33188,
      "new_path": "ssl/handshake_server.cc"
    },
    {
      "type": "modify",
      "old_id": "a51a0e193409d9c637be214bacad24c8bcd9b9d5",
      "old_mode": 33188,
      "old_path": "ssl/internal.h",
      "new_id": "f1085a1483cb5276d2233827d7babd746914a0df",
      "new_mode": 33188,
      "new_path": "ssl/internal.h"
    },
    {
      "type": "modify",
      "old_id": "3d283f1b41dbdec3377509fb4ac984fd59d82e7e",
      "old_mode": 33188,
      "old_path": "ssl/ssl_test.cc",
      "new_id": "5f79e8605ea7e58c197b848c61d3e2e0e5e8f04d",
      "new_mode": 33188,
      "new_path": "ssl/ssl_test.cc"
    },
    {
      "type": "modify",
      "old_id": "cc6cf05db9c2829fe8eba782f5ece7c54f8a7889",
      "old_mode": 33188,
      "old_path": "ssl/t1_lib.cc",
      "new_id": "0dc53063e12e1bae9fa5a36c9d4916e6840b18ef",
      "new_mode": 33188,
      "new_path": "ssl/t1_lib.cc"
    },
    {
      "type": "modify",
      "old_id": "676591b43e203309c6a4ee736d5dbcee23620c00",
      "old_mode": 33188,
      "old_path": "ssl/tls13_server.cc",
      "new_id": "6b9867d2c0e9e0415f73f44eaa20ffdf3f72887a",
      "new_mode": 33188,
      "new_path": "ssl/tls13_server.cc"
    }
  ]
}
