)]}'
{
  "commit": "5fa2cdf1ed4069be359038107e144cd7c7506dca",
  "tree": "196dae132dba76874be8128774327c118d38b283",
  "parents": [
    "772a5bed7d5065b301c3979c325248689d36b92c"
  ],
  "author": {
    "name": "Adam Langley",
    "email": "alangley@gmail.com",
    "time": "Fri Feb 03 08:23:18 2017 -0800"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Fri Feb 03 16:46:26 2017 +0000"
  },
  "message": "Test SSE4.1 before using ChaCha20-Poly1305 asm.\n\nThis change guards the ChaCha20-Poly1305 asm on having SSE4.1. The\npinsrb instruction that it uses requires this, which I didn\u0027t notice,\nand so this would fail on Core 2 and older chips.\n\nBUG\u003dchromium:688384\n\nChange-Id: I177e3492782a1a9974b6df29d26fc4809009ad48\nReviewed-on: https://boringssl-review.googlesource.com/13586\nReviewed-by: Adam Langley \u003calangley@gmail.com\u003e\nCommit-Queue: Adam Langley \u003calangley@gmail.com\u003e\nCQ-Verified: CQ bot account: commit-bot@chromium.org \u003ccommit-bot@chromium.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "a7b58d47d1234a591535be789e933a2d5e02f0df",
      "old_mode": 33188,
      "old_path": "crypto/cipher/e_chacha20poly1305.c",
      "new_id": "c6e81ab87cbdca1e3bb194e65a2aedda20c8ff37",
      "new_mode": 33188,
      "new_path": "crypto/cipher/e_chacha20poly1305.c"
    }
  ]
}
