)]}'
{
  "commit": "eaa80b7069f70f422d5a46b18d7fbf59f9f7ac03",
  "tree": "27baa83c652aff73687de4fd580aebef5378678c",
  "parents": [
    "08805fe27910e09d05e87d61bc5411a4e3b2d999"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Thu Jan 25 11:39:22 2018 -0500"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Tue Feb 06 00:51:54 2018 +0000"
  },
  "message": "Remove DSA k+q kludge.\n\nWith fixed-width BIGNUMs, this is no longer a concern. With this CL, I\nbelieve we now no longer call BN_num_bits on BIGNUMs with secret\nmagnitude.\n\nOf course, DSA then turns around and calls the variable-time BN_mod\nimmediately afterwards anyway. But the DSA is deprecated and doomed to\nbe removed someday anyway.\n\nChange-Id: Iac1dab22aa51c0e7f5ca0f7f44a026a242a4eaa2\nReviewed-on: https://boringssl-review.googlesource.com/25284\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nCQ-Verified: CQ bot account: commit-bot@chromium.org \u003ccommit-bot@chromium.org\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "532ffec94ad4f9ce0773342ac3ab30ad249d2987",
      "old_mode": 33188,
      "old_path": "crypto/dsa/dsa.c",
      "new_id": "b97806b8482b1b41a30715e849eb91e255fa87e9",
      "new_mode": 33188,
      "new_path": "crypto/dsa/dsa.c"
    }
  ]
}
