)]}'
{
  "commit": "b01d7bbf7b0933f105bad2f1c9aed64ece537cbe",
  "tree": "b6a33f73d07302b7a6d55f99cd0c61fcce519e1d",
  "parents": [
    "be5be0a4f5ebf00da151a06860deb11a0ffb609f"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Mon Jun 30 14:46:18 2025 -0400"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Mon Jun 30 14:23:31 2025 -0700"
  },
  "message": "Change the RSA-PSS salt length default to RSA_PSS_SALTLEN_DIGEST\n\nUpdate-Note: Signing RSA-PSS with the EVP APIs will now default to a\nsalt length of RSA_PSS_SALTLEN_DIGEST (-1) instead of\nRSA_PSS_SALTLEN_AUTO (-2). Applications that use\nEVP_PKEY_CTX_set_rsa_padding(RSA_PKCS1_PSS_PADDING) without calling\nEVP_PKEY_CTX_set_rsa_pss_saltlen will see slightly different behavior.\nCall EVP_PKEY_CTX_set_rsa_pss_saltlen(RSA_PSS_SALTLEN_AUTO) to restore\nthe old behavior.\n\nThe new behavior matches that protocols do in practice (TLS, our only\nsupported X.509 modes), and also matches FIPS 186-5 requirements. The\nRSA_PSS_SALTLEN_AUTO behavior caused signing to maximize the salt\nlength and caused verifying to automatically recover the salt length and\naccept all values. Both behaviors are forbidden by FIPS 186-5, and the\nverification procedure in RFC 8017 does not admit this auto-recovery\nbehavior.\n\nChange-Id: I1d5666d3401c335840d8736207143bc673d5c789\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/79987\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nAuto-Submit: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "d53373348bc1948608ed9f5a381867692c7e0bbc",
      "old_mode": 33188,
      "old_path": "crypto/evp/evp_extra_test.cc",
      "new_id": "2d2dfc61ef83e5b236ed9a279d0bae6dedf75662",
      "new_mode": 33188,
      "new_path": "crypto/evp/evp_extra_test.cc"
    },
    {
      "type": "modify",
      "old_id": "c996f2511bf659dda4befd43eac70c435efce297",
      "old_mode": 33188,
      "old_path": "crypto/evp/p_rsa.cc",
      "new_id": "2f15f708fe206959929904acf353bbb8f9044033",
      "new_mode": 33188,
      "new_path": "crypto/evp/p_rsa.cc"
    },
    {
      "type": "modify",
      "old_id": "87e3ad25e8c79e1fcdcfa0b1b9c2dff7910135c9",
      "old_mode": 33188,
      "old_path": "include/openssl/evp.h",
      "new_id": "c5c23918aa0bc2cef1d7c2412a7356354ff20d26",
      "new_mode": 33188,
      "new_path": "include/openssl/evp.h"
    },
    {
      "type": "modify",
      "old_id": "c80aea85451ea4e0f45991dd32550c03349a8463",
      "old_mode": 33188,
      "old_path": "include/openssl/rsa.h",
      "new_id": "94923e7c8a868805677dceb4d90f3fa699d9940c",
      "new_mode": 33188,
      "new_path": "include/openssl/rsa.h"
    }
  ]
}
