)]}'
{
  "commit": "f78fa1ea33906e35c40e9163303c982de4272318",
  "tree": "5b99ac4a3e8defc90c1e35d8d73b54ecf766699f",
  "parents": [
    "40acdaeb86c516b68e3442f3a008e8d21e514bda"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@chromium.org",
    "time": "Fri Apr 24 15:20:13 2015 -0400"
  },
  "committer": {
    "name": "David Benjamin",
    "email": "davidben@chromium.org",
    "time": "Mon May 04 17:43:00 2015 -0400"
  },
  "message": "Always enable ecdh_auto.\n\nThis is a really dumb API wart. Now that we have a limited set of curves that\nare all reasonable, the automatic logic should just always kick in. This makes\nset_ecdh_auto a no-op and, instead of making it the first choice, uses it as\nthe fallback behavior should none of the older curve selection APIs be used.\n\nCurrently, by default, server sockets can only use the plain RSA key exchange.\n\nBUG\u003d481139\n\n(cherry picked from commit dd978784d7cc2564d6916135cca94a2e3a62ed5c)\n\nChange-Id: I2ef653236c55df0d990c01cfdcaedbd757062e46\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "563da67083ec9a86c55266fd8c741dfeaf99a0f0",
      "old_mode": 33188,
      "old_path": "include/openssl/ssl.h",
      "new_id": "b086c41deb952c9a62b8250d1998d65d8ddce757",
      "new_mode": 33188,
      "new_path": "include/openssl/ssl.h"
    },
    {
      "type": "modify",
      "old_id": "fe0e7606a5f6e282f71706e2e618c438e086ceb0",
      "old_mode": 33188,
      "old_path": "ssl/s3_lib.c",
      "new_id": "41544ee94a2e5a86a1f2e308cf1f3dac6c3930f2",
      "new_mode": 33188,
      "new_path": "ssl/s3_lib.c"
    },
    {
      "type": "modify",
      "old_id": "25482a2b67722c30b1de6ce26477216cd25e8487",
      "old_mode": 33188,
      "old_path": "ssl/s3_srvr.c",
      "new_id": "98e667b8e21243bf2cf2069eb3248dfcda22d266",
      "new_mode": 33188,
      "new_path": "ssl/s3_srvr.c"
    },
    {
      "type": "modify",
      "old_id": "185c12b8348de89f78307df54b8b456b8c271e43",
      "old_mode": 33188,
      "old_path": "ssl/ssl_cert.c",
      "new_id": "58be2d562b9b470664779ded7969f1b91db04161",
      "new_mode": 33188,
      "new_path": "ssl/ssl_cert.c"
    },
    {
      "type": "modify",
      "old_id": "b21b5211cd51caf64c56ded25a7e0de2312e9234",
      "old_mode": 33188,
      "old_path": "ssl/ssl_lib.c",
      "new_id": "fec21825248c9155c6604065619e288d7da9f0b7",
      "new_mode": 33188,
      "new_path": "ssl/ssl_lib.c"
    },
    {
      "type": "modify",
      "old_id": "ed62fab0b6551a6bbe03a275ed6a16b4ad14cd7c",
      "old_mode": 33188,
      "old_path": "ssl/ssl_locl.h",
      "new_id": "cc4d48d3145483bf49f2687a4e15ffcd6c53e518",
      "new_mode": 33188,
      "new_path": "ssl/ssl_locl.h"
    },
    {
      "type": "modify",
      "old_id": "0009d135b0c8ff9d8b910f9a65b612730fde8c4e",
      "old_mode": 33188,
      "old_path": "ssl/t1_lib.c",
      "new_id": "11c563555ad2d2781fde93388b790a834eba3397",
      "new_mode": 33188,
      "new_path": "ssl/t1_lib.c"
    },
    {
      "type": "modify",
      "old_id": "d79074bba9136f890526b66babff4e5344873139",
      "old_mode": 33188,
      "old_path": "ssl/test/bssl_shim.cc",
      "new_id": "b59a719199ad8065d05371e8097b1b9711942c30",
      "new_mode": 33188,
      "new_path": "ssl/test/bssl_shim.cc"
    }
  ]
}
