)]}'
{
  "commit": "e95d20dcb80523bf9bc6a9c5682856c8371e0a96",
  "tree": "3c11317d552540b5f987f16d3bdb38041fb8c6af",
  "parents": [
    "044abb0aaa18012c65ea0e7c46988eff283ed200"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@chromium.org",
    "time": "Tue Dec 23 11:16:01 2014 -0500"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Wed Jan 14 21:03:40 2015 +0000"
  },
  "message": "Support EVP_AEAD in DTLS.\n\nThis CL removes the last of the EVP_CIPHER codepath in ssl/. The dead code is\nintentionally not pruned for ease of review, except in DTLS-only code where\nadding new logic to support both, only to remove half, would be cumbersome.\n\nFixes made:\n- dtls1_retransmit_state is taught to retain aead_write_ctx rather than\n  enc_write_ctx.\n- d1_pkt.c reserves space for the variable-length nonce when echoed into the\n  packet.\n- dtls1_do_write sizes the MTU based on EVP_AEAD max overhead.\n- tls1_change_cipher_state_cipher should not free AEAD write contexts in DTLS.\n  This matches the (rather confused) ownership for the EVP_CIPHER contexts.\n  I\u0027ve added a TODO to resolve this craziness.\n\nA follow-up CL will remove all the resultant dead code.\n\nChange-Id: I644557f4db53bbfb182950823ab96d5e4c908866\nReviewed-on: https://boringssl-review.googlesource.com/2699\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "57337f6389b5d2a4657c6b42ca68f43ddc9a77cb",
      "old_mode": 33188,
      "old_path": "include/openssl/dtls1.h",
      "new_id": "0fc3ae6fc5be8047053767d860f3a28ffbbe2bc4",
      "new_mode": 33188,
      "new_path": "include/openssl/dtls1.h"
    },
    {
      "type": "modify",
      "old_id": "9081e4ba4c12d0c94f00a12c12a6cd72b7de5124",
      "old_mode": 33188,
      "old_path": "ssl/d1_both.c",
      "new_id": "8d1dbf9b1e917237424b0f2562f992fee4ecaff4",
      "new_mode": 33188,
      "new_path": "ssl/d1_both.c"
    },
    {
      "type": "modify",
      "old_id": "7e76905a94ffdb1c0091eebf4a7ad38e7d77cefe",
      "old_mode": 33188,
      "old_path": "ssl/d1_lib.c",
      "new_id": "e4928a513cdac5e7b1929124f45f4c38e0401d6e",
      "new_mode": 33188,
      "new_path": "ssl/d1_lib.c"
    },
    {
      "type": "modify",
      "old_id": "67b06a577a8300034af8fcaa35328090c8938da1",
      "old_mode": 33188,
      "old_path": "ssl/d1_pkt.c",
      "new_id": "85bd3056ca12ce06e2af19a85dbad945ff2af352",
      "new_mode": 33188,
      "new_path": "ssl/d1_pkt.c"
    },
    {
      "type": "modify",
      "old_id": "6f2e8448518a0a51bfa56d27e5c685d4b0d306db",
      "old_mode": 33188,
      "old_path": "ssl/d1_srvr.c",
      "new_id": "e4c57c323bc14f7e026b582f0a7ce1d0f74697fe",
      "new_mode": 33188,
      "new_path": "ssl/d1_srvr.c"
    },
    {
      "type": "modify",
      "old_id": "48079ff225e623e623b3ecacfaecf7c74f59c077",
      "old_mode": 33188,
      "old_path": "ssl/t1_enc.c",
      "new_id": "e4e990747549ab2320a377364d19fbaccc236ecd",
      "new_mode": 33188,
      "new_path": "ssl/t1_enc.c"
    },
    {
      "type": "modify",
      "old_id": "d76bdf723f05cbe42ba07e48cf44eb269791166d",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/runner.go",
      "new_id": "2342682e2c4481f6e0d22ba24db185ce275850d6",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/runner.go"
    }
  ]
}
