)]}'
{
  "commit": "6ef1b6455821f0d1c6b61ba91ba0cadd374d4049",
  "tree": "8855feaed3ad3a38bb8b2e5e024b57ced25cb228",
  "parents": [
    "1c55e54eda2cb8d099c047cac43db3f3f0680aef"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Sun Dec 30 19:27:46 2018 +0000"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Wed Jan 02 23:33:31 2019 +0000"
  },
  "message": "Add a comment about ecp_nistz256_point_add_affine\u0027s limitations.\n\necp_nistz256_point_add_affine does not support the doubling case and,\nunlike ecp_nistz256_point_add which does a tail call, computes the wrong\nanswer. Note TestPointAdd in the unit tests skips this case.\n\nThis works fine because we only use ecp_nistz256_point_add_affine for\nthe g_scalar term, which is fully computed before the p_scalar term.\n(Additionally it requires that the windowing pattern never hit the\ndoubling case for single multiplication.)\n\nBut this is not obvious from reading the multiplication functions, so\nleave a comment at the call site to point this out.\n\nChange-Id: I08882466d98030cdc882a5be9e702ee404e80cce\nReviewed-on: https://boringssl-review.googlesource.com/c/33945\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "ef1ccef730c4f42595b683d174db2ecc9b5ad79e",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/ec/p256-x86_64.c",
      "new_id": "013afd389724dcbe647d3d508830c3295ddd44cb",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/ec/p256-x86_64.c"
    }
  ]
}
