)]}'
{
  "commit": "302bb3964ad8cc4fb8540ee4783a936c5515605d",
  "tree": "63d01096257d1e7501a69b0fa899f123c412b45f",
  "parents": [
    "6e678eeb6e76171712ae00d467321b6fe196152d"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Wed May 02 15:08:16 2018 -0400"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Wed May 02 19:24:00 2018 +0000"
  },
  "message": "Small curve25519 cleanups.\n\nPer Brian, x25519_ge_frombytes_vartime does not match the usual\nBoringSSL return value convention, and we\u0027re slightly inconsistent about\nwhether to mask the last byte with 63 or 127. (It then gets ANDed with\n64, so it doesn\u0027t matter which.) Use 127 to align with the curve25519\nRFC. Finally, when we invert the transformation, use the same constants\ninverted so that they\u0027re parallel.\n\nBug: 243, 244\nChange-Id: I0e3aca0433ead210446c58d86b2f57526bde1eac\nReviewed-on: https://boringssl-review.googlesource.com/27984\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "e0ff9baee0b30ecf3bfda95197ec4fd7b34d5bc3",
      "old_mode": 33188,
      "old_path": "crypto/curve25519/spake25519.c",
      "new_id": "650178cdaa1895df54c73d1cc42a8dcf1a8313e4",
      "new_mode": 33188,
      "new_path": "crypto/curve25519/spake25519.c"
    },
    {
      "type": "modify",
      "old_id": "0fdf1d9300acf338f3978427352eee599b1a2c67",
      "old_mode": 33188,
      "old_path": "third_party/fiat/curve25519.c",
      "new_id": "60da1c89060f075dc255cd2edf47c48fcd032614",
      "new_mode": 33188,
      "new_path": "third_party/fiat/curve25519.c"
    }
  ]
}
