)]}'
{
  "commit": "adeb72b3539ef330b590413702289307ff1b9e96",
  "tree": "8281c20f136aa0e4ed3fb376c9a96a5d34703914",
  "parents": [
    "f09df6930f86ef5d0fbc4b0f6163f8b4467b86f9"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Nov 09 15:48:17 2018 -0600"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Mon Nov 12 16:34:45 2018 +0000"
  },
  "message": "Fix r \u003d p-n+epsilon ECDSA tests.\n\nI forgot to refresh the public key in those tests, so they weren\u0027t\nactually testing what they were supposed to. With this fix, injecting\ntoo larger of a P_MINUS_ORDER into p256-x86_64.c now breaks tests.\n\nChange-Id: I5d10a85c84b09629448beef67c86de607525fc71\nReviewed-on: https://boringssl-review.googlesource.com/c/33044\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "9c4b889b88e5b5fac490c4c6f54cf3819996df09",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/ecdsa/ecdsa_verify_tests.txt",
      "new_id": "03975c8cbe0b56008c3e4275bcd45c570975560b",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/ecdsa/ecdsa_verify_tests.txt"
    }
  ]
}
