)]}'
{
  "commit": "1e68f5d827a859ba3b7ab6a70a60247e0b96afa5",
  "tree": "f4870aa1e3cef0f3e60477bc7dad546cef101409",
  "parents": [
    "98eba18fb11e5d2d4f7cdadd03c24f69ee2bd32e"
  ],
  "author": {
    "name": "Alex Vakulenko",
    "email": "avakulenko@google.com",
    "time": "Mon Sep 28 16:28:19 2015 -0700"
  },
  "committer": {
    "name": "Alex Vakulenko",
    "email": "avakulenko@google.com",
    "time": "Mon Sep 28 16:49:51 2015 -0700"
  },
  "message": "Remove GCM cipher mode requirements for fallback ciphersuites\n\nSecureTransport of MacOS/iOS does not support GCM cipher mode with\nECDHE-ECDSA/ECDHE-RSA key-exchange algorithms even though they seem\nto claim that they do. This is supposedly fixed in MacOS 10.11 but\nthat one is not out yet.\n\nUsing \"meta\" suite from BoringSSL to support strong encryption\nalgorithms with a bit more leeway, not just 4 we used to hardcode.\n\nBUG: 24468826\nChange-Id: Ie62a9b11584b6745848090888b7d9e1fe50e90ee\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "40059cfe399f63acdd3dd289e065fd20dd19a157",
      "old_mode": 33188,
      "old_path": "src/microhttpd/daemon.c",
      "new_id": "9247fbabaa039961d2a7812ca83c79115c1fc169",
      "new_mode": 33188,
      "new_path": "src/microhttpd/daemon.c"
    }
  ]
}
