)]}'
{
  "commit": "7fb4d3da5082225c7180267e9daad291887ce982",
  "tree": "02678d9eead8a0e8f1f420d1b749143f6bb097ce",
  "parents": [
    "6f7c3dee22c40edd32e3170dd052126f7a9d9d5c"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Aug 23 15:27:03 2024 -0400"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Tue Aug 27 17:49:40 2024 +0000"
  },
  "message": "Implement X25519MLKEM768 for TLS\n\nML-KEM is now finalized, so uses of Kyber should migrate to ML-KEM. This\nadds the new codepoint for TLS, X25519MLKEM768 from\ndraft-kwiatkowski-tls-ecdhe-mlkem-01.\n\nOne detail to call out: where the Kyber hybrid put X25519 first, this\none places MLKEM768 first. Section 3 of the draft discusses why.\n\nBug: 40910498\nChange-Id: I18862cd5d25d6ab6c4b38514e8333684dc5e3778\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/70547\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "71ef2d2bdc2a7d44e8756bd6ad1e15ad8928039b",
      "old_mode": 33188,
      "old_path": "crypto/obj/obj_dat.h",
      "new_id": "f1b706391b1af70857a753fd0c8aecda19568bf1",
      "new_mode": 33188,
      "new_path": "crypto/obj/obj_dat.h"
    },
    {
      "type": "modify",
      "old_id": "a0519aceeb56218dbd688cbd96d32785503f0214",
      "old_mode": 33188,
      "old_path": "crypto/obj/obj_mac.num",
      "new_id": "6e2a2aed64a162414c57949533c4f86aa01dc436",
      "new_mode": 33188,
      "new_path": "crypto/obj/obj_mac.num"
    },
    {
      "type": "modify",
      "old_id": "3ad32ea3d12744ff916441a1d7f1499fce02ca85",
      "old_mode": 33188,
      "old_path": "crypto/obj/objects.txt",
      "new_id": "655340710c922ea99f9c67fdbc206d50b0f61062",
      "new_mode": 33188,
      "new_path": "crypto/obj/objects.txt"
    },
    {
      "type": "modify",
      "old_id": "b1cb93eb731175da11a0a9a4b1d4e55f5d0d0ec3",
      "old_mode": 33188,
      "old_path": "go.mod",
      "new_id": "b87a3c1f19a2fc8d5aad2f1763c3292a975ef034",
      "new_mode": 33188,
      "new_path": "go.mod"
    },
    {
      "type": "modify",
      "old_id": "709415cdb8c23e555944185e0c6d16a7ea6e3ce2",
      "old_mode": 33188,
      "old_path": "go.sum",
      "new_id": "7424815df02951d72e0fd7656ff8cb4015764811",
      "new_mode": 33188,
      "new_path": "go.sum"
    },
    {
      "type": "modify",
      "old_id": "4dd8841b1e7336ae399eab0ca726de0300e9fc82",
      "old_mode": 33188,
      "old_path": "include/openssl/nid.h",
      "new_id": "02d78c648355f4b1fff52e32f2d6bc509997155e",
      "new_mode": 33188,
      "new_path": "include/openssl/nid.h"
    },
    {
      "type": "modify",
      "old_id": "1dbc1e7dcbaa9acb2d0326981684a941f0d4bb9f",
      "old_mode": 33188,
      "old_path": "include/openssl/ssl.h",
      "new_id": "a0797cd611e372bb533a8b9faa69abc14723b747",
      "new_mode": 33188,
      "new_path": "include/openssl/ssl.h"
    },
    {
      "type": "modify",
      "old_id": "7f06dedbbe723276ee9c1996f5821e9bcb18e88f",
      "old_mode": 33188,
      "old_path": "ssl/extensions.cc",
      "new_id": "30591a6a07bf9e3e2c07693f60988c60173f310a",
      "new_mode": 33188,
      "new_path": "ssl/extensions.cc"
    },
    {
      "type": "modify",
      "old_id": "419724c624439d5886242386b6811a5c1c4a619b",
      "old_mode": 33188,
      "old_path": "ssl/ssl_key_share.cc",
      "new_id": "923b8bb4832918dbb27a9fff96eda1013875f941",
      "new_mode": 33188,
      "new_path": "ssl/ssl_key_share.cc"
    },
    {
      "type": "modify",
      "old_id": "1b71c97ba49fb9a7d362e1989b4a5ae5b49ab7a4",
      "old_mode": 33188,
      "old_path": "ssl/ssl_test.cc",
      "new_id": "393b48e00479ab46a749a514b3671099994e0d0f",
      "new_mode": 33188,
      "new_path": "ssl/ssl_test.cc"
    },
    {
      "type": "modify",
      "old_id": "e6d2d0219d522c82abd521ca1be4a32a9800b06d",
      "old_mode": 33188,
      "old_path": "ssl/test/fuzzer.h",
      "new_id": "ca7b55a77a527579c8df280922635d29de063b59",
      "new_mode": 33188,
      "new_path": "ssl/test/fuzzer.h"
    },
    {
      "type": "modify",
      "old_id": "5907a35cbcf2ce7c3d0e4ddc75265719afc4bd9b",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/common.go",
      "new_id": "2eedd6283a2cee8de6c3ddc1aad01cc26fd2f243",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/common.go"
    },
    {
      "type": "modify",
      "old_id": "9e647df0cf0b2d3856d1318a664d79015bde1cb9",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/handshake_server.go",
      "new_id": "fa7eb9c86d8ee89aefbd1997323d612f147827e1",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/handshake_server.go"
    },
    {
      "type": "modify",
      "old_id": "aff0820e3cabd2dfc6e8f91bbaa3642334430970",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/key_agreement.go",
      "new_id": "a4bbfa5961981d9a7ae49e0456d9faf4e3cb3642",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/key_agreement.go"
    },
    {
      "type": "modify",
      "old_id": "16cebb23e8cd4df1f32e743a65d78125cd882610",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/runner.go",
      "new_id": "6179ee0f5d4591c05e8f5cd00eedeac8d88b7242",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/runner.go"
    }
  ]
}
