)]}'
{
  "commit": "2e819d8be47e4b3b1fed719b5db918539240eff9",
  "tree": "9146dd0e7e3f19503aed5688a7b47ec96e99bd62",
  "parents": [
    "15ba2d11a9873cb40b2a45bba18242fdb16ca4c6"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Wed Feb 06 04:33:38 2019 +0000"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Tue Feb 12 20:24:27 2019 +0000"
  },
  "message": "Unwind RDRAND functions correctly on Windows.\n\nBut for the ABI conversion bits, these are just leaf functions and don\u0027t\neven need unwind tables. Just renumber the registers on Windows to only\nused volatile ones.\n\nIn doing so, this switches to writing rdrand explicitly. perlasm already\nknows how to manually encode it and our minimum assembler versions\nsurely cover rdrand by now anyway. Also add the .size directive. I\u0027m not\nsure what it\u0027s used for, but the other files have it.\n\n(This isn\u0027t a generally reusable technique. The more complex functions\nwill need actual unwind codes.)\n\nBug: 259\nChange-Id: I1d5669bcf8b6e34939885d78aea6f60597be1528\nReviewed-on: https://boringssl-review.googlesource.com/c/34867\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "056dd74878389009bff48132e91e0dc56ce764ba",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rand/asm/rdrand-x86_64.pl",
      "new_id": "76b5f9b7069441a0fc48502781a31fa2853e3c2f",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rand/asm/rdrand-x86_64.pl"
    },
    {
      "type": "modify",
      "old_id": "f73f4a1773ed876618a7818406f7cba180d63a5a",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rand/internal.h",
      "new_id": "ad75823f5c7aeaeca233f6c83b38910ae3b9647d",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rand/internal.h"
    },
    {
      "type": "modify",
      "old_id": "4128033479f89cbff8a39d86f07ecf55313101d1",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rand/rand.c",
      "new_id": "a8ef458755c5c6a4e7538866705e470e6394c1cd",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rand/rand.c"
    },
    {
      "type": "modify",
      "old_id": "9bc5d970e672f7f0c36f15eb1be5487ddd04b5bf",
      "old_mode": 33188,
      "old_path": "crypto/rand_extra/rand_test.cc",
      "new_id": "9c69b8f63863d4e0864de3984caccae0c77da397",
      "new_mode": 33188,
      "new_path": "crypto/rand_extra/rand_test.cc"
    }
  ]
}
