)]}'
{
  "commit": "36eb7d5fbc841987be3d6272884c07c90328dbb1",
  "tree": "f7edb0e315f9915034523d89488ab6e554e3a496",
  "parents": [
    "53cbd6c8a0064d2958cb759637b2a6bf02f8dd93"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@chromium.org",
    "time": "Mon Jan 26 20:21:26 2015 -0500"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Tue Jan 27 01:38:57 2015 +0000"
  },
  "message": "Fix buffer size in aead_test.c.\n\nout2 wasn\u0027t sized to account for stateful AEAD open requiring a seal overhead\u0027s\nworth of scratch space. Also, pass in sizeof(out2) rather than a computed\nciphertext length, so the max_out check would have actually caught this.\n\nChange-Id: Ibe689424f6c8ad550b3a45266699892076e7ba5e\nReviewed-on: https://boringssl-review.googlesource.com/3060\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "dac022fbe590d26b51aa65494a715cb706c45ae1",
      "old_mode": 33188,
      "old_path": "crypto/cipher/aead_test.c",
      "new_id": "310c90c0741cc3edc8c24cad2f0f4e1b9474c7a3",
      "new_mode": 33188,
      "new_path": "crypto/cipher/aead_test.c"
    }
  ]
}
