)]}'
{
  "commit": "921b4d16d42c07c7214acb938084604f10baa43e",
  "tree": "7491016d29b767daf85dfe157d29a9c31fc67ba3",
  "parents": [
    "a3208c45cab24ef2ddb510f1c8ef98bc491be9b1"
  ],
  "author": {
    "name": "davidben",
    "email": "davidben@google.com",
    "time": "Mon Apr 06 20:07:26 2026 -0700"
  },
  "committer": {
    "name": "Copybara-Service",
    "email": "copybara-worker@google.com",
    "time": "Mon Apr 06 20:09:05 2026 -0700"
  },
  "message": "BEGIN_PUBLIC\n\nSwitch to OpenSSL-compatible names for `TLS1_CK_*` constants\n\nBoringSSL implemented TLS 1.3 first and named the constants `TLS1_CK_FOO`, to match the existing OpenSSL naming convention.\n\nWhen OpenSSL later implemented TLS 1.3, they decided to break their own convention and use `TLS1_3_CK_FOO` for these ciphers. BoringSSL then switched to those names but has kept `TLS1_CK_FOO` as compatibility for code that was written against the original BoringSSL names.\n\nMigrate to the OpenSSL names, just so we don\u0027t need to keep both names around.\n\nEND_PUBLIC\n\nPiperOrigin-RevId: 895624174\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "7842508b1e2fc8e6d6cb9553e7f5dfa2dab21afd",
      "old_mode": 33188,
      "old_path": "quiche/quic/core/crypto/aes_128_gcm_12_decrypter.cc",
      "new_id": "799680878e74cba8b79972a9185235f896636c9b",
      "new_mode": 33188,
      "new_path": "quiche/quic/core/crypto/aes_128_gcm_12_decrypter.cc"
    },
    {
      "type": "modify",
      "old_id": "de3e6dec284bc5eaa2e9ee077cc35e6403e68b67",
      "old_mode": 33188,
      "old_path": "quiche/quic/core/crypto/aes_128_gcm_decrypter.cc",
      "new_id": "30fd3bfe6c749e53090e3ac597f405d6c067fb82",
      "new_mode": 33188,
      "new_path": "quiche/quic/core/crypto/aes_128_gcm_decrypter.cc"
    },
    {
      "type": "modify",
      "old_id": "8aa15f1fca6382c8b7a4bf303dc9e10a87ebf93d",
      "old_mode": 33188,
      "old_path": "quiche/quic/core/crypto/aes_256_gcm_decrypter.cc",
      "new_id": "3505cee2e78508ae3adfaceb8c689f8d55279db8",
      "new_mode": 33188,
      "new_path": "quiche/quic/core/crypto/aes_256_gcm_decrypter.cc"
    },
    {
      "type": "modify",
      "old_id": "990311883e2bd0df7172fd2dfdf534f1ec7c736b",
      "old_mode": 33188,
      "old_path": "quiche/quic/core/crypto/chacha20_poly1305_decrypter.cc",
      "new_id": "ded4aebf0a1d0ee2e8f77a2e549f0afaaeefffb2",
      "new_mode": 33188,
      "new_path": "quiche/quic/core/crypto/chacha20_poly1305_decrypter.cc"
    },
    {
      "type": "modify",
      "old_id": "0fcc2ea27e979e2fe654c071bfa3b23698480f58",
      "old_mode": 33188,
      "old_path": "quiche/quic/core/crypto/chacha20_poly1305_tls_decrypter.cc",
      "new_id": "56cd8378304cb7d40e8a13e4e0d5bbaf43904c4b",
      "new_mode": 33188,
      "new_path": "quiche/quic/core/crypto/chacha20_poly1305_tls_decrypter.cc"
    },
    {
      "type": "modify",
      "old_id": "5399647f65ff4d294b409b13ce153fc45440032b",
      "old_mode": 33188,
      "old_path": "quiche/quic/core/crypto/quic_decrypter.cc",
      "new_id": "06da896dce97e4e27aa3b4e46c4f7a48f13bf397",
      "new_mode": 33188,
      "new_path": "quiche/quic/core/crypto/quic_decrypter.cc"
    },
    {
      "type": "modify",
      "old_id": "be795be129543c45aec6f8509bd8937bac843d42",
      "old_mode": 33188,
      "old_path": "quiche/quic/core/crypto/quic_encrypter.cc",
      "new_id": "7e64e07a857123e0bfda29c05a8986536c72a67f",
      "new_mode": 33188,
      "new_path": "quiche/quic/core/crypto/quic_encrypter.cc"
    }
  ]
}
