)]}'
{
  "commit": "e62bf02a131a14b6ec6ebea3590342a6c8265bbf",
  "tree": "575d263450cd90deb3095fc7eb4a6c6555018a37",
  "parents": [
    "cc9d935256539af2d3b7f831abf57c0d685ffd81"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Nov 02 13:19:20 2018 -0500"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Fri Nov 02 18:33:43 2018 +0000"
  },
  "message": "Don\u0027t overflow state-\u003ecalls on 16TiB RAND_bytes calls.\n\nThis is an extremely important and practical use case. The comment that\nstate-\u003ecalls is bounded by the reseed interval isn\u0027t quite true. We only\ncheck on entry to the function, which means that it may exceed it by one\ncall\u0027s worth. Switch it to a size_t (which doesn\u0027t actually increase\nmemory because the struct was already padded).\n\nChange-Id: Ia7646fd5b4142789c1d613280223baa4cd1a4a9b\nReviewed-on: https://boringssl-review.googlesource.com/c/32804\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCQ-Verified: CQ bot account: commit-bot@chromium.org \u003ccommit-bot@chromium.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "02e63bc737cdf2373932820f9190c9d33caed971",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rand/rand.c",
      "new_id": "e6b4bb48c822d14056dbb339e7f63733f5a9db29",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rand/rand.c"
    }
  ]
}
