)]}'
{
  "commit": "a2518dd077868cc8205b339f40a6da3e2fdfbca6",
  "tree": "a446ebc3356014b4bab0177e72ccf95947471324",
  "parents": [
    "9855c1c59a53a80f9dec91624fac1a042fc66e51"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Nov 08 22:48:30 2019 -0500"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Tue Nov 12 01:01:38 2019 +0000"
  },
  "message": "Vectorize gcm_mul32_nohw and replace gcm_gmult_4bit_mmx.\n\nThis shrinks the perf gap between nohw and 4bit_mmx. Replace 4bit_mmx\nand fix the last remaining variable-time GHASH implementation, covering\n32-bit x86 without SSSE3.\n\nBefore:\nDid 2065000 AES-128-GCM (16 bytes) seal operations in 1000154us (2064682.0 ops/sec): 33.0 MB/s\nDid 368000 AES-128-GCM (256 bytes) seal operations in 1002435us (367106.1 ops/sec): 94.0 MB/s\nDid 77000 AES-128-GCM (1350 bytes) seal operations in 1001225us (76905.8 ops/sec): 103.8 MB/s\nDid 14000 AES-128-GCM (8192 bytes) seal operations in 1067523us (13114.5 ops/sec): 107.4 MB/s\nDid 6572 AES-128-GCM (16384 bytes) seal operations in 1015976us (6468.7 ops/sec): 106.0 MB/s\nAfter:\nDid 1995000 AES-128-GCM (16 bytes) seal operations in 1000374us (1994254.1 ops/sec): 31.9 MB/s\nDid 319000 AES-128-GCM (256 bytes) seal operations in 1000196us (318937.5 ops/sec): 81.6 MB/s\nDid 66000 AES-128-GCM (1350 bytes) seal operations in 1002823us (65814.2 ops/sec): 88.8 MB/s\nDid 12000 AES-128-GCM (8192 bytes) seal operations in 1079294us (11118.4 ops/sec): 91.1 MB/s\nDid 5511 AES-128-GCM (16384 bytes) seal operations in 1006218us (5476.9 ops/sec): 89.7 MB/s\n(Note fallback AES is dampening the perf hit. Pairing with AESNI to\nroughly isolate GHASH shows a 40% hit.)\n\nThat just leaves aes_nohw...\n\nChange-Id: I7d842806c54a5a057895fa2e7665633330e34b72\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/38784\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "a2ab859c696730278c5e097c18a20c8e8542e176",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/modes/asm/ghash-x86.pl",
      "new_id": "9486c2ea768ccf682f4af64d62b051cbb1b0451d",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/modes/asm/ghash-x86.pl"
    },
    {
      "type": "modify",
      "old_id": "51e7b73048c9fe209029cbda2080930fce03b891",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/modes/gcm.c",
      "new_id": "fb9f042727ccf83f3b7b88d8545ba0ccb7859dd2",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/modes/gcm.c"
    },
    {
      "type": "modify",
      "old_id": "2a5051a4392a20c6c7d59b24451576e1df4d15e4",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/modes/gcm_nohw.c",
      "new_id": "4dc3b27feca5fc08606e7e3bb481f9454e3ef828",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/modes/gcm_nohw.c"
    },
    {
      "type": "modify",
      "old_id": "a25c17a6aec9bbdb7a5778fe364c4259d15bac45",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/modes/gcm_test.cc",
      "new_id": "ca3d08a815fcd3119f25a433a802b7293a2fa2c8",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/modes/gcm_test.cc"
    },
    {
      "type": "modify",
      "old_id": "a3135abf8f91139687447fd26260b50dde73a374",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/modes/internal.h",
      "new_id": "1262490ecc43e3bc61a1b36ebf87b61ee4587153",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/modes/internal.h"
    }
  ]
}
