)]}'
{
  "commit": "c93be52c9ef59801704a80bc39ddcfe3bd4277ed",
  "tree": "d793af8bef1b068707e105c8483ed1af5f587b53",
  "parents": [
    "1c71844ef5538877714d7220f17f4230ae0b896d"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Mar 15 13:46:04 2019 -0500"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Mon Mar 18 17:20:32 2019 +0000"
  },
  "message": "Save a temporary in BN_mod_exp_mont\u0027s w\u003d1 case.\n\nBN_mod_exp_mont is most commonly used in RSA verification, where the exponent\nsizes are small enough to use 1-bit \"windows\". There\u0027s no need to allocate the\nextra BIGNUM.\n\nChange-Id: I14fb523dfae7d77d2cec10a0209f09f22031d1af\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/35327\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "9e408113b893716d1b547ff62d968786c9b88a4f",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/bn/exponentiation.c",
      "new_id": "8d4a5c8b346055aec43fd8ccdc523bc82aea4bdf",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/bn/exponentiation.c"
    }
  ]
}
