)]}'
{
  "commit": "8364547d29ced3c00f11510817c0796b6b175635",
  "tree": "0386cb0abacc2c71c6acf2eaa7db180f06d40e4c",
  "parents": [
    "4544c5065a6b7436ea18afa34b5197713b64fab5"
  ],
  "author": {
    "name": "Maxim Dounin",
    "email": "mdounin@mdounin.ru",
    "time": "Mon Jul 16 17:47:18 2018 +0300"
  },
  "committer": {
    "name": "Maxim Dounin",
    "email": "mdounin@mdounin.ru",
    "time": "Mon Jul 16 17:47:18 2018 +0300"
  },
  "message": "SSL: logging levels of \"unsupported protocol\", \"version too low\".\n\nStarting with OpenSSL 1.1.0, SSL_R_UNSUPPORTED_PROTOCOL instead of\nSSL_R_UNKNOWN_PROTOCOL is reported when a protocol is disabled via\nan SSL_OP_NO_* option.\n\nAdditionally, SSL_R_VERSION_TOO_LOW is reported when using MinProtocol\nor when seclevel checks (as set by @SECLEVEL\u003dn in the cipher string)\nrejects a protocol, and this is what happens with SSLv3 and @SECLEVEL\u003d1,\nwhich is the default.\n\nThere is also the SSL_R_VERSION_TOO_HIGH error code, but it looks like\nit is not possible to trigger it.\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "b8680561480cf82ec22547347582977cfc6e86b0",
      "old_mode": 33188,
      "old_path": "src/event/ngx_event_openssl.c",
      "new_id": "c3bb90e381389a399cd093106cb154760d505e97",
      "new_mode": 33188,
      "new_path": "src/event/ngx_event_openssl.c"
    }
  ]
}
