)]}'
{
  "commit": "0df6edff4f69f804b862d595e34ebe8cf3387db8",
  "tree": "a8294b830467b3d9d56e55b963fdceae30000582",
  "parents": [
    "9511ca4c036c61df51c2018facdcdbf79ff80151"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Sun Dec 15 16:25:44 2019 -0500"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Mon Dec 16 22:20:22 2019 +0000"
  },
  "message": "Split BN_prime_checks into two constants for generation and validation.\n\nAlthough (somewhat) documented in prose, it is not obvious from the name\nthat BN_prime_checks only works for randomly-selected candidate primes.\nSplit into BN_prime_checks_for_generation and\nBN_prime_checks_for_validation. Fix internal call sites. Notably,\nDH_check now uses more iterations.\n\nConsistently call the parameter \u0027checks\u0027 rather than \u0027iterations\u0027, to\nmatch BN_prime_checks.\n\nThis is in preparation for importing the Wycheproof primality testing\nvectors, some of which include Miller-Rabin worst case values.\n(Realistically the blinding mechanism meant, even for those inputs, our\nfalse positive rate was at most ~2^-64 anyway, but best to keep the use\ncases clear.)\n\nUpdate-Note: DH_check may be slower after this change.\nChange-Id: Ic13d03d8631e74bf2958979ee5ef45a69e603f46\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/39195\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "454ad44a1e2f7afc8924ab7e31d7f8c508ea4292",
      "old_mode": 33188,
      "old_path": "crypto/dh/check.c",
      "new_id": "5b6e03a517394d49270c4933fe6244c7a4ded0d7",
      "new_mode": 33188,
      "new_path": "crypto/dh/check.c"
    },
    {
      "type": "modify",
      "old_id": "ea3967b51c2b476835bb43eb47dbf7bcb4d9e11d",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/bn/bn_test.cc",
      "new_id": "4793d248c00c41639109d5ad9f073168c229113b",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/bn/bn_test.cc"
    },
    {
      "type": "modify",
      "old_id": "c0c795b1dd891e3b0bdaf73a48ad0afb3979c23f",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/bn/prime.c",
      "new_id": "262822f382f02773ee4131503eebe38b86811dc0",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/bn/prime.c"
    },
    {
      "type": "modify",
      "old_id": "724de69efdcbc9d5fa2d0579c038e621d6796f22",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rsa/rsa.c",
      "new_id": "0830b05101d58553bd48bd4697bf48542418bbf6",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rsa/rsa.c"
    },
    {
      "type": "modify",
      "old_id": "39dc789ca8ab822d490761fe94d3e3f107076845",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rsa/rsa_impl.c",
      "new_id": "74bf098dcce0fa2ef6cce3f4b4a69358a079960c",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rsa/rsa_impl.c"
    },
    {
      "type": "modify",
      "old_id": "0ca9ad5aad92edaafc16ca6a5999e931c98a6469",
      "old_mode": 33188,
      "old_path": "include/openssl/bn.h",
      "new_id": "295ca629841ee005228b6ba59558a66696f34ed1",
      "new_mode": 33188,
      "new_path": "include/openssl/bn.h"
    }
  ]
}
