)]}'
{
  "commit": "cbacc7cd77c081c2b23907acb515992e598fea6f",
  "tree": "0d1c23eaa1e7b09a821367fa75a9be2184da600e",
  "parents": [
    "d7421ebf6cae07051caf657016f160585b64f8a6"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@chromium.org",
    "time": "Sun Feb 07 00:35:42 2016 -0500"
  },
  "committer": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Mon Feb 22 15:35:13 2016 -0500"
  },
  "message": "Remove support for mis-encoded PKCS#8 DSA keys.\n\nPreviously, OpenSSL supported many different DSA PKCS#8 encodings. Only\nsupport the standard format. One of the workaround formats (SEQUENCE of\nprivate key and public key) seems to be a workaround for an old Netscape\nbug. From inspection, NSS seems to have fixed this from the first open\nsource commit.\n\nChange-Id: I1e097b675145954b4d7a0bed8733e5a25c25fd8e\nReviewed-on: https://boringssl-review.googlesource.com/7074\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "c92068f81e8f6334c70b3951d388a105457ebf3b",
      "old_mode": 33188,
      "old_path": "crypto/evp/p_dsa_asn1.c",
      "new_id": "3c89e5e254a44f5954f29e73b809453c3f4b18e8",
      "new_mode": 33188,
      "new_path": "crypto/evp/p_dsa_asn1.c"
    }
  ]
}
