)]}'
{
  "commit": "89d18c7a880fe43a5cebe39837178c9e6161c3cb",
  "tree": "f4dce773fb79bef52473bfb8e3be372ec9e338ef",
  "parents": [
    "77ee4e4609cfb3480e1a554790348ebcab61313e"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Thu Jan 25 14:53:57 2024 -0500"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Thu Jan 25 20:13:24 2024 +0000"
  },
  "message": "Import upstream tests for CVE-2024-0727\n\nBoringSSL is not affected by CVE-2024-0727, but these are good cases to\nhave in our unit tests.\n\nPKCS#12 is built on top of PKCS#7, a misdesigned, overgeneralized combinator\nformat. One of the features of PKCS#7 is that the content of every\nContentInfo may be omitted, to indicate that the value is \"supplied by other\nmeans\". This is commonly used for \"detached signatures\", where the signature\nis supplied separately.\n\nThis does not make sense in the context of PKCS#12. But because PKCS#7\ncombined many unrelated use cases into the same format, so PKCS#12 (and any\nother use of PKCS#7) must account for and reject inputs.\n\nChange-Id: I22f19b6c14894003f7515206cd34f968e5503d4a\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/65747\nAuto-Submit: David Benjamin \u003cdavidben@google.com\u003e\nCommit-Queue: Bob Beck \u003cbbe@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nReviewed-by: Bob Beck \u003cbbe@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "0416ad7b1ad13afdb87194abd3a070d0fe1838f1",
      "old_mode": 33188,
      "old_path": "crypto/pkcs8/pkcs12_test.cc",
      "new_id": "459339d75838b88eefa5eefbf9a5ad3b2efe3d60",
      "new_mode": 33188,
      "new_path": "crypto/pkcs8/pkcs12_test.cc"
    },
    {
      "type": "add",
      "old_id": "0000000000000000000000000000000000000000",
      "old_mode": 0,
      "old_path": "/dev/null",
      "new_id": "8f3387c7e356e4aa374729f3f3939343557b9c09",
      "new_mode": 33188,
      "new_path": "crypto/pkcs8/test/bad1.p12"
    },
    {
      "type": "add",
      "old_id": "0000000000000000000000000000000000000000",
      "old_mode": 0,
      "old_path": "/dev/null",
      "new_id": "113cb6f1cd523e880db869f518e60142dc875115",
      "new_mode": 33188,
      "new_path": "crypto/pkcs8/test/bad2.p12"
    },
    {
      "type": "add",
      "old_id": "0000000000000000000000000000000000000000",
      "old_mode": 0,
      "old_path": "/dev/null",
      "new_id": "ef86a1d86fb0bc09471ca2596d82e7d521d973a4",
      "new_mode": 33188,
      "new_path": "crypto/pkcs8/test/bad3.p12"
    },
    {
      "type": "modify",
      "old_id": "365245867bdb50cdeb04280ae8664c7c41ddd4a1",
      "old_mode": 33188,
      "old_path": "sources.cmake",
      "new_id": "2a4a03eac404e7a4e495e834d5a8618a71f8e59b",
      "new_mode": 33188,
      "new_path": "sources.cmake"
    }
  ]
}
