)]}'
{
  "commit": "0de64a749b344ce16367bc6514a7d4549bba8c6c",
  "tree": "c5d11d703bd67b2a935c3b54fbd61aaa873a81ce",
  "parents": [
    "63e96f2a2943367082bb1e90a7acc4054c706c1f"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Thu Sep 26 15:59:40 2019 -0400"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Fri Sep 27 19:02:43 2019 +0000"
  },
  "message": "Make the dispatch tests opt-in.\n\nThe assembly dispatch tests currently assume NDEBUG is consistently\ndefined between C/C++ and assembly. While this is usually the case for\nUNIX, CMake does not pass NDEBUG to NASM. This is giving gRPC some\ndifficulties in updating BoringSSL, so switch it to an opt-in\n-DBORINGSSL_DISPATCH_TEST flag instead.\n\nUpdate-Note: If you were copying NDEBUG over to assembly files, that\u0027s\nno longer required (though it\u0027s harmless to leave it in). If you want to\nrun ImplDispatchTest.*, build both C/C++ and assembly with\n-DBORINGSSL_DISPATCH_TEST in your debug builds. (Don\u0027t enable it in\nrelease builds. It causes assembly to scribble in some globals.)\n\nChange-Id: I9ab3371dc0f0a40b27b44ef93835e007a6346900\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/37764\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "d79d35fb2dea8dc89a442f9d3456582570d9bc6d",
      "old_mode": 33188,
      "old_path": "CMakeLists.txt",
      "new_id": "3fe86bf29b61a6fdff9efa5a8e99db33a2c9a3be",
      "new_mode": 33188,
      "new_path": "CMakeLists.txt"
    },
    {
      "type": "modify",
      "old_id": "c86206a000a80590c7923bf88b18c272cc6365b8",
      "old_mode": 33188,
      "old_path": "crypto/crypto.c",
      "new_id": "297240ec3387a4896b6726753cc1a6861b2df729",
      "new_mode": 33188,
      "new_path": "crypto/crypto.c"
    },
    {
      "type": "modify",
      "old_id": "d57127abaa54b28105fe5aa6b004c61dbf6202bd",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/aes/asm/aesni-x86.pl",
      "new_id": "b999e5a436c845d3a06cae63d4ea8f4f7593ce8a",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/aes/asm/aesni-x86.pl"
    },
    {
      "type": "modify",
      "old_id": "15f68059f2428a0d37dabb46d2ca7920fbcf52cc",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/aes/asm/aesni-x86_64.pl",
      "new_id": "f4d2ea51e7ad16350012bd3e00dec0b9a85501cf",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/aes/asm/aesni-x86_64.pl"
    },
    {
      "type": "modify",
      "old_id": "2b403628abcd512eec2e5d96f785ac062b277837",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/aes/asm/vpaes-x86.pl",
      "new_id": "14a31058e1a4d0433dcc3a242c193444d2168a48",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/aes/asm/vpaes-x86.pl"
    },
    {
      "type": "modify",
      "old_id": "8cc6a1ae204ae11ba62ee7a89e9c27b0ced17c2f",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/aes/asm/vpaes-x86_64.pl",
      "new_id": "e761eb2d24c5d86f47d99f9ab9613251f98bcc9d",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/aes/asm/vpaes-x86_64.pl"
    },
    {
      "type": "modify",
      "old_id": "d3e37636be9ccb1dabe375e91d8938972e4a3147",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/modes/asm/aesni-gcm-x86_64.pl",
      "new_id": "48a556087bd97067682ccfab88c320b38fce7f46",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/modes/asm/aesni-gcm-x86_64.pl"
    },
    {
      "type": "modify",
      "old_id": "2c3a6138b2f1067a70f111b77f9e898f92aeaaef",
      "old_mode": 33188,
      "old_path": "crypto/impl_dispatch_test.cc",
      "new_id": "8297e225f1618d271f7e4f80b47d7b000e7c26d0",
      "new_mode": 33188,
      "new_path": "crypto/impl_dispatch_test.cc"
    },
    {
      "type": "modify",
      "old_id": "3278188ac87dc958304be453968824c7046145aa",
      "old_mode": 33188,
      "old_path": "crypto/perlasm/x86asm.pl",
      "new_id": "24f0fc158a742b556a9acad7f9f3788bb6fd3040",
      "new_mode": 33188,
      "new_path": "crypto/perlasm/x86asm.pl"
    },
    {
      "type": "modify",
      "old_id": "4e19a899d75af4cd1370760bfe2b6d7dde0dbcb0",
      "old_mode": 33188,
      "old_path": "crypto/perlasm/x86gas.pl",
      "new_id": "7d0c00f25248bb514c22b0b0b5ff6096f5b58059",
      "new_mode": 33188,
      "new_path": "crypto/perlasm/x86gas.pl"
    },
    {
      "type": "modify",
      "old_id": "01bfbf343a0868a651d8c46f9d95f68772cc5b9f",
      "old_mode": 33188,
      "old_path": "crypto/perlasm/x86masm.pl",
      "new_id": "50f8aed7a6c2629d2ceb04e5a8b637225cddebf5",
      "new_mode": 33188,
      "new_path": "crypto/perlasm/x86masm.pl"
    },
    {
      "type": "modify",
      "old_id": "a3e0ab7299b8ced2f4e3905b0e09ed9a49876c23",
      "old_mode": 33188,
      "old_path": "crypto/perlasm/x86nasm.pl",
      "new_id": "7bb334781785202cd507e50b536cbc6b164b8dbf",
      "new_mode": 33188,
      "new_path": "crypto/perlasm/x86nasm.pl"
    },
    {
      "type": "modify",
      "old_id": "eb36a57e00aa62d1c0ce1615c8907a8f46ce7ed4",
      "old_mode": 33188,
      "old_path": "include/openssl/cpu.h",
      "new_id": "ae55967915e1d47671a15fcdd1fa118c10b86a05",
      "new_mode": 33188,
      "new_path": "include/openssl/cpu.h"
    }
  ]
}
