)]}'
{
  "commit": "28d938d4c3b0e7a7fd34afc755c6dc8ab40a0172",
  "tree": "08bc6eee7d91b943e66ba223e8d7331e005a20dd",
  "parents": [
    "e63d9d76250fb4ea4985c56536d8c14029f146b0"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Wed Sep 21 10:42:54 2016 -0400"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Wed Sep 21 15:36:49 2016 +0000"
  },
  "message": "Unwind unnecessary Android hacks.\n\nwpa_supplicant in AOSP has now been updated, so these all can go. We\u0027re\njust left with the AES keywrap business.\n\nChange-Id: Ie4c3e08902a2a1f9b43e1907116c7d85791ad5e9\nReviewed-on: https://boringssl-review.googlesource.com/11160\nReviewed-by: Steven Valdez \u003csvaldez@google.com\u003e\nReviewed-by: David Benjamin \u003cdavidben@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nCQ-Verified: CQ bot account: commit-bot@chromium.org \u003ccommit-bot@chromium.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "6524371f8212da4d776efbe961182e9b61f6f86b",
      "old_mode": 33188,
      "old_path": "include/openssl/bio.h",
      "new_id": "18f9f2ae735cba58964fcc95f670046c9117c09c",
      "new_mode": 33188,
      "new_path": "include/openssl/bio.h"
    },
    {
      "type": "modify",
      "old_id": "ac1a63b45b92f13a40acd7ec7e5d87d8026a7763",
      "old_mode": 33188,
      "old_path": "include/openssl/ssl.h",
      "new_id": "a8d5abd9123796ffe17524660115ede79b994c31",
      "new_mode": 33188,
      "new_path": "include/openssl/ssl.h"
    },
    {
      "type": "modify",
      "old_id": "382504638f0d2c71e227a4e3022917726b2794f0",
      "old_mode": 33188,
      "old_path": "util/generate_build_files.py",
      "new_id": "92a15074121f2353d71452e7f31b94728adcda99",
      "new_mode": 33188,
      "new_path": "util/generate_build_files.py"
    }
  ]
}
