)]}'
{
  "commit": "0a5f00673656b1f8714f5ef275816e23fdf927f1",
  "tree": "1945f943e07a5233d3f6b4ad889ac67c66100d79",
  "parents": [
    "e7c95d91f8f42b0f17fb113e2204e2d9af4d2814"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Thu Nov 16 21:18:08 2017 +0800"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Mon Nov 20 18:32:30 2017 +0000"
  },
  "message": "Test that EC_POINT_mul works with the order.\n\n|EC_POINT_mul| is almost exclusively used with reduced scalars, with\nthis exception. This comes from consumers following NIST SP 800-56A\nsection 5.6.2.3.2. (Though all our curves have cofactor one, so this\ncheck isn\u0027t useful.)\n\nAdd a test for this so we don\u0027t accidentally break it.\n\nChange-Id: I42492db38a1ea03acec4febdd7945c8a3933530a\nReviewed-on: https://boringssl-review.googlesource.com/23084\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "0ee7378701ba1abc69576d10591daa0c769861b4",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/ec/ec_test.cc",
      "new_id": "5e5ce94834eca009f878e2d7327da55e8d605fd3",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/ec/ec_test.cc"
    }
  ]
}
