)]}'
{
  "commit": "f28dd64d43f8705d63b8142915e51f4091dc092b",
  "tree": "1cce9d70c40ea0df23a1696548d0db465dff727b",
  "parents": [
    "423488557c4526640831c87f025d6abf413348a2"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@chromium.org",
    "time": "Tue Dec 15 15:37:39 2015 -0500"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Wed Dec 16 15:40:18 2015 +0000"
  },
  "message": "Fix flaky BadRSAClientKeyExchange-1 test.\n\nSometimes BadRSAClientKeyExchange-1 fails with DATA_TOO_LARGE_FOR_MODULUS if\nthe corruption brings the ciphertext above the RSA modulus. Ensure this does\nnot happen.\n\nChange-Id: I0d8ea6887dfcab946fdf5d38f5b196f5a927c4a9\nReviewed-on: https://boringssl-review.googlesource.com/6731\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "d1ec91f45961b851cfb4c1daeed4893787b1025f",
      "old_mode": 33188,
      "old_path": "ssl/test/runner/key_agreement.go",
      "new_id": "5b6f240dea78be4307726482367d0d227349fc27",
      "new_mode": 33188,
      "new_path": "ssl/test/runner/key_agreement.go"
    }
  ]
}
