)]}'
{
  "commit": "45b2464158379f48cec6e35a1ef503ddea1511a6",
  "tree": "7f37b25e1d3c8b56eb8f9485c717a36e62a6b2f2",
  "parents": [
    "2fcdd11f6d33b667968a5bc5147e2ba83a2082b8"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Jun 21 17:00:31 2024 -0400"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Fri Jun 21 21:53:36 2024 +0000"
  },
  "message": "Rewrite CBS_get_asn1_int64 slightly\n\nGCC 13.2.0 has a false positive in -Wstringop-overflow. Oddly, I can\nonly reproduce it with -O2 -march\u003dnative. The old code was also correct,\nbut this version seems to do a better job of avoiding the warning.\nInstead of reversing the variable-length string while sign-extending, we\nassemble a big-endian sign-extended version and then do a fixed-width\nbyte swap at the end.\n\nFixed: 42290598\nChange-Id: I6d5de1e1d6d117f6b5947d3a2155e794764eb472\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/69547\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nAuto-Submit: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "bf94db11893b095ca86d352b6258e6fd79ec16f1",
      "old_mode": 33188,
      "old_path": "crypto/bytestring/cbs.c",
      "new_id": "c5f0464421c84277efa84fc63a33303d541b611e",
      "new_mode": 33188,
      "new_path": "crypto/bytestring/cbs.c"
    }
  ]
}
