)]}'
{
  "commit": "f30c73389b6cbca3190d875d232b7ece7e876ca1",
  "tree": "ab17f1c819e903381f355c9a3e87a68a163ac5a8",
  "parents": [
    "c452c71ebd5ba86ae21f3150c66900d375fedb6d"
  ],
  "author": {
    "name": "Lily Chen",
    "email": "chlily@google.com",
    "time": "Mon Dec 15 17:06:29 2025 -0500"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Fri Dec 19 12:07:53 2025 -0800"
  },
  "message": "Add API to configure server\u0027s NamedGroups with equal preference\n\nThis adds an API to associate each named group with a \"flags\" value, and\nadds a flag that indicates that the group has equal preference with the\nnext group in the list. This is analogous to \"in_group\" flags used with\nSSL ciphers (but is renamed to avoid using the overloaded term \"group\").\nWhen SSL_OP_CIPHER_SERVER_PREFERENCE is specified, the server\u0027s\nsupported group list is used, so these \"with next\" flags allow the\nserver to express equal preference between consecutively listed groups,\nso that a choice among them respects the client\u0027s preference.\n\nBug: 437414714\nChange-Id: I73ec6523d6a6e3d852a5664d49cf1f0a6a6a6964\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/85787\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nAuto-Submit: Lily Chen \u003cchlily@google.com\u003e\nReviewed-by: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "a7d5954f7d20b310106703743c7ac125ef320dfe",
      "old_mode": 33188,
      "old_path": "include/openssl/ssl.h",
      "new_id": "0e99279c85c86305d9b15b43c9179d2132c9bbf2",
      "new_mode": 33188,
      "new_path": "include/openssl/ssl.h"
    },
    {
      "type": "modify",
      "old_id": "fcb0bf8f476aeb5a39b074c4285545dafea3cd75",
      "old_mode": 33188,
      "old_path": "ssl/extensions.cc",
      "new_id": "077acb418417bd68f0704f64011e23c0fdce1f82",
      "new_mode": 33188,
      "new_path": "ssl/extensions.cc"
    },
    {
      "type": "modify",
      "old_id": "8dfc5f9a167f656ef293090676cf3b9d3b7a20d6",
      "old_mode": 33188,
      "old_path": "ssl/handoff.cc",
      "new_id": "9f56ca5c41e5129db436cf1b01e6dc1edf586593",
      "new_mode": 33188,
      "new_path": "ssl/handoff.cc"
    },
    {
      "type": "modify",
      "old_id": "abb130242d96f2f0586833a0f85e963e63388a95",
      "old_mode": 33188,
      "old_path": "ssl/internal.h",
      "new_id": "0673f5fa68d51054af35c78fdf676d5119710905",
      "new_mode": 33188,
      "new_path": "ssl/internal.h"
    },
    {
      "type": "modify",
      "old_id": "f64b103fbb7a298a22fe0ff4bc95a4415c58e305",
      "old_mode": 33188,
      "old_path": "ssl/ssl_lib.cc",
      "new_id": "3c98a7cf7fe7f9a773d55460345da060b75113fb",
      "new_mode": 33188,
      "new_path": "ssl/ssl_lib.cc"
    },
    {
      "type": "modify",
      "old_id": "6c2a382573d48a415cbd4dd0e66b2c03f1640dd8",
      "old_mode": 33188,
      "old_path": "ssl/ssl_test.cc",
      "new_id": "bd5759c7f77b8bbd4f71b3b2fe7aaf6cb9336e5b",
      "new_mode": 33188,
      "new_path": "ssl/ssl_test.cc"
    },
    {
      "type": "modify",
      "old_id": "8e7b0a45b17bb5da0302dfa6fb4ec2c9b915a5a7",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/curve_tests.go",
      "new_id": "9bc13115e447894f6c5b7f29f8be46d3aa1d125d",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/curve_tests.go"
    },
    {
      "type": "modify",
      "old_id": "1f3c3092d0850ddeac64ea48931006ed3e97e43a",
      "old_mode": 33188,
      "old_path": "ssl/test/test_config.cc",
      "new_id": "01dbea06cc3e7619ffb3964af7514c1a02352067",
      "new_mode": 33188,
      "new_path": "ssl/test/test_config.cc"
    },
    {
      "type": "modify",
      "old_id": "9745de03589ad63a0fb0806e02c1d06e5bbad9f8",
      "old_mode": 33188,
      "old_path": "ssl/test/test_config.h",
      "new_id": "440a6a4a7b8a29276f00e96f3ac92c234fe855af",
      "new_mode": 33188,
      "new_path": "ssl/test/test_config.h"
    }
  ]
}
