)]}'
{
  "commit": "2e0d354690064c90ee245c715b92e2bb32492571",
  "tree": "128fcdf3a4d98ee57bc21792e36a7a5ce1da63d1",
  "parents": [
    "5274cea40447aad76a7bb8c7c8693e9c4ee39aef"
  ],
  "author": {
    "name": "Adam Langley",
    "email": "alangley@gmail.com",
    "time": "Thu May 23 13:05:38 2019 -0700"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Thu May 23 20:28:14 2019 +0000"
  },
  "message": "Disable RDRAND on AMD chips before Zen.\n\nThere are reports that RDRAND on these chips can fail. Thus this change\ndisables the use RDRAND. Outside of FIPS mode, RDRAND is only used for\nprotection against forks and VM clones anyway.\n\n(Note: I don\u0027t have any AMD chips to test on, so this is done blindly\nfrom AMD\u0027s docs.)\n\nChange-Id: Id61b2f6ba74c5ecf66804f7268a26e480a5bf815\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/36144\nCommit-Queue: Adam Langley \u003calangley@gmail.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nReviewed-by: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "98d8d4e5d67ddaa583a66f394417ddc3cd86399e",
      "old_mode": 33188,
      "old_path": "crypto/cpu-intel.c",
      "new_id": "1621ef6cfc8d91d6eff8c1d0e2af174a39645a3c",
      "new_mode": 33188,
      "new_path": "crypto/cpu-intel.c"
    }
  ]
}
