)]}'
{
  "commit": "b0341041b03ea71d8371a9692aedae263fc06ee9",
  "tree": "6a059a2214de31509ca1bbb62537cbf3b6eebcef",
  "parents": [
    "e106b536ee6233fec2e8876a16686d10607911c5"
  ],
  "author": {
    "name": "Theo Buehler",
    "email": "theorbuehler@gmail.com",
    "time": "Fri Jun 02 11:46:21 2023 +0200"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Fri Jun 02 18:16:40 2023 +0000"
  },
  "message": "Make BN_mod_inverse() deal with repeated arguments\n\nBN_nnmod() can deal with the situation that the first and the second\narguments are the same, but it cannot deal with the first and the\nsecond argument being equal. In that situation, if BN_mod(x, y, x, ctx)\nresults in a negative x, then the result of BN_nnmod() is zero. This\nbreaks the strange BN_mod_inverse(m, a, m, ctx).\n\nReported by Guido Vranken in\nhttps://github.com/openssl/openssl/issues/21110\n\nChange-Id: I8584720660f214f172b3b33716a5e3b29e8f2fd8\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/60365\nReviewed-by: Bob Beck \u003cbbe@google.com\u003e\nReviewed-by: David Benjamin \u003cdavidben@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "e4720b1b348af761059f92709dc7ae48ee0e7a4c",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/bn/bn_test.cc",
      "new_id": "92da5f2f0f674c2d1a22cedc07a70c1f370f1bdd",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/bn/bn_test.cc"
    },
    {
      "type": "modify",
      "old_id": "e8cc764cf89121ce35d21d774ce5c55758d4896b",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/bn/gcd.c",
      "new_id": "df12569a719384a66c0a280ce89435624583e3bc",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/bn/gcd.c"
    }
  ]
}
