)]}' { "commit": "c73375467c71356d331b3794001bb832af8d9a6a", "tree": "e4950194519ea27d90234d5140afb5f3aafeefd1", "parents": [ "b8b0e9f4856a75035873764a8b8a9b38a161abe7" ], "author": { "name": "David Benjamin", "email": "davidben@google.com", "time": "Thu Nov 28 08:32:16 2019 -0500" }, "committer": { "name": "CQ bot account: commit-bot@chromium.org", "email": "commit-bot@chromium.org", "time": "Mon Dec 02 22:14:18 2019 +0000" }, "message": "Allocate small TLS read buffers inline.\n\nOur TLS read patterns are always read(5); read(record_size); read(5);\nread(record_size); ...;. Allocate the 5-byte reads inline in SSLBuffer.\nThis avoids bouncing on a 5-byte malloc to learn a socket is idle and\navoids calling malloc twice on each record.\n\nThis costs a few bytes but means we malloc once per record, rather than\ntwice per record + once each time the state machine is run while idle.\n\nChange-Id: I4f6dafe4141cbb890b921a5fa8d528c1fb98a0b4\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/39004\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "41135e37b639aa0d8451d97b6acbf0714f76c7b3", "old_mode": 33188, "old_path": "ssl/internal.h", "new_id": "7ef810e9ad0f6a240f9dd0d4dab3d0e4f3d9250a", "new_mode": 33188, "new_path": "ssl/internal.h" }, { "type": "modify", "old_id": "49ecf9038de501a61eb16637e9c93ea2c13cb5a0", "old_mode": 33188, "old_path": "ssl/ssl_buffer.cc", "new_id": "d73055fbf39334925ef4b4804bbaca57c4a4d5d3", "new_mode": 33188, "new_path": "ssl/ssl_buffer.cc" } ] }