)]}' { "commit": "4f7783eaea60afbdfd77899aa64c51c8ba21ddcc", "tree": "ee49d82eef54a1495e43ae7f919fbcf3094ee93c", "parents": [ "7cb0f44d9d388b96bda8e714b592993d2c34e9b3" ], "author": { "name": "David Benjamin", "email": "davidben@chromium.org", "time": "Thu Mar 05 03:05:11 2015 -0500" }, "committer": { "name": "Adam Langley", "email": "agl@google.com", "time": "Fri Mar 13 19:49:39 2015 +0000" }, "message": "Use EC_KEY_new_by_curve_name.\n\nMay as well use this convenience function when we can. A little tidier. Even\nfixes a leak on malloc failure in eckey_type2param.\n\nChange-Id: Ie48dd98f2fe03fa9911bd78db4423ab9faefc63d\nReviewed-on: https://boringssl-review.googlesource.com/3772\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "670ee744861b26fc8ed0b194d74b7a030302cc00", "old_mode": 33188, "old_path": "crypto/evp/p_ec_asn1.c", "new_id": "6c4afb1876d9c55c23df55333614d1bd38a5d93e", "new_mode": 33188, "new_path": "crypto/evp/p_ec_asn1.c" }, { "type": "modify", "old_id": "910a05135ce0fc743068ba21d668941b45b717fc", "old_mode": 33188, "old_path": "ssl/s3_clnt.c", "new_id": "5f891d4e331a43e47329c581d2037e1bc0c2d8ce", "new_mode": 33188, "new_path": "ssl/s3_clnt.c" } ] }