)]}'
{
  "commit": "28f035f48bf704f508f9b77ded4e41c065fe8d3a",
  "tree": "3344c1be3a6f3d251d3949d83c4241394901e0fe",
  "parents": [
    "fc31677a1dc96bb9286c30a1f047751c0ff774e0"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Sat Feb 02 21:29:58 2019 -0600"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Tue Feb 05 19:22:15 2019 +0000"
  },
  "message": "Implement unwind testing for Windows.\n\nUnfortunately, due to most OpenSSL assembly using custom exception\nhandlers to unwind, most of our assembly doesn\u0027t work with\nnon-destructive unwind. For now, CHECK_ABI behaves like\nCHECK_ABI_NO_UNWIND on Windows, and CHECK_ABI_SEH will test unwinding on\nboth platforms.\n\nThe tests do, however, work with the unwind-code-based assembly we\nrecently added, as well as the clmul-based GHASH which is also\ncode-based. Remove the ad-hoc SEH tests which intentionally hit memory\naccess exceptions, now that we can test unwind directly.\n\nNow that we can test it, the next step is to implement SEH directives in\nperlasm so writing these unwind codes is less of a chore.\n\nBug: 259\nChange-Id: I23a57a22c5dc9fa4513f575f18192335779678a5\nReviewed-on: https://boringssl-review.googlesource.com/c/34784\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "5352b80f4c670041d073662b9d67d440f14da477",
      "old_mode": 33188,
      "old_path": "crypto/abi_self_test.cc",
      "new_id": "c5bace15095c69f5aea1160d1b7345a84f541080",
      "new_mode": 33188,
      "new_path": "crypto/abi_self_test.cc"
    },
    {
      "type": "modify",
      "old_id": "c1b2c9f59595019446d7b2fe59ec3a143f70d2bd",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/modes/gcm_test.cc",
      "new_id": "9283cd263b926c936559cfd8a329413b698faf87",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/modes/gcm_test.cc"
    },
    {
      "type": "modify",
      "old_id": "6530ddf9f8ff4ff7033dff68ece60d3cb4da4660",
      "old_mode": 33188,
      "old_path": "crypto/test/abi_test.cc",
      "new_id": "39dd2bef9eeecfba886cbd4dccfc40eea7936519",
      "new_mode": 33188,
      "new_path": "crypto/test/abi_test.cc"
    },
    {
      "type": "modify",
      "old_id": "91b2d425f1aed72e13df60c9b6bcc72af9f7e3a1",
      "old_mode": 33188,
      "old_path": "crypto/test/abi_test.h",
      "new_id": "bf255520de2b57d84c69da531cb154eae72db7e5",
      "new_mode": 33188,
      "new_path": "crypto/test/abi_test.h"
    },
    {
      "type": "modify",
      "old_id": "57d70b2c6cfcdc696884518a8a882f896e7302ff",
      "old_mode": 33261,
      "old_path": "crypto/test/asm/trampoline-x86_64.pl",
      "new_id": "75aae4593ddf903c092a4cb32c9abeca058a8959",
      "new_mode": 33261,
      "new_path": "crypto/test/asm/trampoline-x86_64.pl"
    }
  ]
}
