)]}'
{
  "commit": "d12f2ba55e015a16f97e53c7314babd483e10ea3",
  "tree": "c0c4ef12dba7aa80a949a4b322cb6f94615b2c31",
  "parents": [
    "fa544f1c0510969e3a85871504b4b8d6c770bb62"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Mon May 14 18:10:14 2018 -0400"
  },
  "committer": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Tue May 15 23:02:49 2018 +0000"
  },
  "message": "Tweak RSA errors for compatibility.\n\ncryptography.io wants RSA_R_BLOCK_TYPE_IS_NOT_02, only used by the\nancient RSA_padding_check_SSLv23 function. Define it but never emit it.\n\nAdditionally, it\u0027s rather finicky about RSA_R_TOO_LARGE* errors. We\nmerged them in BoringSSL because having RSA_R_TOO_LARGE,\nRSA_R_TOO_LARGE_FOR_MODULUS, and RSA_R_TOO_LARGE_FOR_KEY_SIZE is a\nlittle silly. But since we don\u0027t expect well-behaved code to condition\non error codes anyway, perhaps that wasn\u0027t worth it.  Split them back\nup.\n\nLooking through OpenSSL, there is a vague semantic difference:\n\nRSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY - Specifically emitted if a digest is\ntoo big for PKCS#1 signing with this key.\n\nRSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE - You asked me to sign or encrypt a\ndigest/plaintext, but it\u0027s too big for this key.\n\nRSA_R_DATA_TOO_LARGE_FOR_MODULUS - You gave me an RSA ciphertext or\nsignature and it is not fully reduced modulo N.\n-OR-\nThe padding functions produced something that isn\u0027t reduced, but I\nbelieve this is unreachable outside of RSA_NO_PADDING.\n\nRSA_R_DATA_TOO_LARGE - Some low-level padding function was told to copy\na digest/plaintext into some buffer, but the buffer was too small. I\nthink this is basically unreachable.\n-OR-\nYou asked me to verify a PSS signature, but I didn\u0027t need to bother\nbecause the digest/salt parameters you picked were too big.\n\nUpdate-Note: This depends on cl/196566462.\nChange-Id: I2e539e075eff8bfcd52ccde365e975ebcee72567\nReviewed-on: https://boringssl-review.googlesource.com/28547\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "75d265a586f9d17d31b1e46b1e0475c368cc20b8",
      "old_mode": 33188,
      "old_path": "crypto/err/rsa.errordata",
      "new_id": "a74ee18ec54b5388ae7e3aeeb428ef2abbac89c5",
      "new_mode": 33188,
      "new_path": "crypto/err/rsa.errordata"
    },
    {
      "type": "modify",
      "old_id": "b0f527c4cbeb1a1a8cf3ca05941ce187c93106ce",
      "old_mode": 33188,
      "old_path": "crypto/evp/evp_tests.txt",
      "new_id": "80d4833c828f6654e745c260e58af05169403e30",
      "new_mode": 33188,
      "new_path": "crypto/evp/evp_tests.txt"
    },
    {
      "type": "modify",
      "old_id": "9d88dba790196cbc919611d58b82e43e098341c5",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rsa/padding.c",
      "new_id": "ce3df7aea6aa96fd1aae90661ce86de663bf5364",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rsa/padding.c"
    },
    {
      "type": "modify",
      "old_id": "aed87a68b42666b52251515575803eb7af55bdce",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rsa/rsa.c",
      "new_id": "efb2f9b6ab3a3fe12e0ba35d8e65f1425914026e",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rsa/rsa.c"
    },
    {
      "type": "modify",
      "old_id": "6d1206b4817697abd807283466c251e2eaa19c1c",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rsa/rsa_impl.c",
      "new_id": "18a75384b603ae5a0f072a368f6cbaa83919e2d4",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rsa/rsa_impl.c"
    },
    {
      "type": "modify",
      "old_id": "a52fa538996f58acb2a0a45ebecdc275c054c6ed",
      "old_mode": 33188,
      "old_path": "include/openssl/rsa.h",
      "new_id": "92982b48b643ec033665224cf2503a58835a7ac6",
      "new_mode": 33188,
      "new_path": "include/openssl/rsa.h"
    }
  ]
}
