)]}'
{
  "commit": "80aa6949756d327476750f9ea2c9700aa2a027c5",
  "tree": "f88ae2a4f0492c12b0a72ef46589895d0de20549",
  "parents": [
    "2d98d49cf712ca7dc6f4b23b9c5f5542385d8dbe"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Thu Oct 11 12:40:59 2018 -0500"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Thu Oct 11 19:53:15 2018 +0000"
  },
  "message": "Always push errors on BIO_read_asn1 failure.\n\nThis is consistent with the old behavior of d2i_*_fp and avoids tripping\nConscrypt\u0027s unnecessarily fragile error-handling (see\nhttps://github.com/google/conscrypt/pull/552).\n\nAdditionally, by source inspection, CPython expects\nASN1_R_HEADER_TOO_LONG on EOF, analogously to PEM_R_NO_START_LINE. Fix\nthat. The other errors are a bit haphazard in the old implementation\n(that code is really hard to follow), so I didn\u0027t match it too\ncarefully. In particular, OpenSSL would report ASN1_R_HEADER_TOO_LONG on\nsome generic tag parsing, but that is inconsistent with\nASN1_R_HEADER_TOO_LONG being an EOF signal.\n\nUpdate-Note: https://boringssl-review.googlesource.com/32106 may have\ncaused some compatibility issues. This should fix it.\n\nChange-Id: Idfe2746ffd7733de4338e14c58a40753e98a791e\nReviewed-on: https://boringssl-review.googlesource.com/c/32444\nReviewed-by: Steven Valdez \u003csvaldez@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nCQ-Verified: CQ bot account: commit-bot@chromium.org \u003ccommit-bot@chromium.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "881c14e1303729a37bbb13330766982ee8b9561c",
      "old_mode": 33188,
      "old_path": "crypto/bio/bio.c",
      "new_id": "fe40578b99c8da8107800b43adb8bee09dea04b5",
      "new_mode": 33188,
      "new_path": "crypto/bio/bio.c"
    },
    {
      "type": "modify",
      "old_id": "bf0b29a2fb44f9848e5d15d4387bac35eb0365ec",
      "old_mode": 33188,
      "old_path": "crypto/x509/x509_test.cc",
      "new_id": "c42a7c826a3feecbf7db45f0d1ef876f41ed1887",
      "new_mode": 33188,
      "new_path": "crypto/x509/x509_test.cc"
    }
  ]
}
