)]}'
{
  "commit": "9ea6d56d044a95459e563abdc85aed26149e6ee9",
  "tree": "87d387cd874954d248631d87e6aa8447fd4337eb",
  "parents": [
    "ca2045dc545ba4afe8abbe29d0316ee3d36da7df"
  ],
  "author": {
    "name": "Richard Levitte",
    "email": "levitte@openssl.org",
    "time": "Wed Mar 15 02:40:55 2017 +0100"
  },
  "committer": {
    "name": "Richard Levitte",
    "email": "levitte@openssl.org",
    "time": "Tue Mar 21 10:16:23 2017 +0100"
  },
  "message": "Rework how protocol specific ciphers in 80-test_ssl_old.t are picked out\n\nThe code to do this incorrectly assumed that the protocol version\ncould be used as a valid cipher suite  for the \u0027openssl cipher\u0027\ncommand.  While this is true in some cases, that isn\u0027t something to be\ntrusted.  Replace that assumption with code that takes the full\n\u0027openssl ciphers\u0027 command output and parses it to find the ciphers we\nlook for.\n\nReviewed-by: Emilia Käsper \u003cemilia@openssl.org\u003e\n(Merged from https://github.com/openssl/openssl/pull/2956)",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "5342ede7bd7294f9acaa889aa2ce2cbb4fe876fb",
      "old_mode": 33188,
      "old_path": "test/recipes/80-test_ssl_old.t",
      "new_id": "a790d9be2aaa033fe1527467d12ff78fba456ae9",
      "new_mode": 33188,
      "new_path": "test/recipes/80-test_ssl_old.t"
    }
  ]
}
