)]}'
{
  "commit": "1b5bcb59f40993de836e40bf4190f6ac6fbc9309",
  "tree": "e1c8a4a4873b5d1269f068bd826a39fb4b1e4651",
  "parents": [
    "b69307a1c4e99284c7c014bcfa7a5bee8dbb433f"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Thu Apr 28 12:17:55 2016 -0400"
  },
  "committer": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Apr 29 14:24:33 2016 -0400"
  },
  "message": "Make CRYPTO_is_NEON_capable aware of the buggy CPU.\n\nIf we\u0027re to allow the buggy CPU workaround to fire when __ARM_NEON__ is set,\nCRYPTO_is_NEON_capable also needs to be aware of it. Also add an API to export\nthis value out of BoringSSL, so we can get some metrics on how prevalent this\nchip is.\n\nBUG\u003dchromium:606629\n\nChange-Id: I97d65a47a6130689098b32ce45a8c57c468aa405\nReviewed-on: https://boringssl-review.googlesource.com/7796\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "ab4648ce69afd5e113cec1db82264d89d983ac1f",
      "old_mode": 33188,
      "old_path": "crypto/cpu-arm-linux.c",
      "new_id": "73c38eccce0507295d30acc6d2cf39c6332f67d2",
      "new_mode": 33188,
      "new_path": "crypto/cpu-arm-linux.c"
    },
    {
      "type": "modify",
      "old_id": "dad544e7f6dacf21d47cea83b14839c533b38ac6",
      "old_mode": 33188,
      "old_path": "include/openssl/cpu.h",
      "new_id": "55be4c1faf763000d32a8746def17113417d4052",
      "new_mode": 33188,
      "new_path": "include/openssl/cpu.h"
    }
  ]
}
