)]}'
{
  "commit": "a135fe1fad70e4f87b38b0adebd44d93da7eb173",
  "tree": "34b9e033b766c93b7b3cc9391e4ea267b7dcf12a",
  "parents": [
    "fa47b1d0f9d3d30601d7e5ed158d3055cbe6ff44"
  ],
  "author": {
    "name": "Lily Chen",
    "email": "chlily@google.com",
    "time": "Mon Sep 22 11:24:27 2025 -0400"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Mon Sep 22 08:40:29 2025 -0700"
  },
  "message": "Forbid setting EC public key to point at infinity\n\nThe point at infinity is not a valid EC public key. We already refuse to\nparse it. This CL makes it forbidden to set an EC public key to a\nmanually-constructed point at infinity.\n\nThis change will allow callers to assume that ECDH is infallible\ngiven a valid peer public key.\n\nUpdate-Note: EC_KEY_set_public_key will now return an error if\nconfiguring the point at infinity as a public key. This does not impact\nparsing, which already rejected such a point, and the resulting key\nwould have failed all operations already.\n\nChange-Id: I202307a510543f4305b1cb46094d2c83174047af\nFixed: 438493754\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/81267\nCommit-Queue: Lily Chen \u003cchlily@google.com\u003e\nReviewed-by: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "d471e84536033ff0ee499ea1f8f63303cd4ee1e2",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/ec/ec_key.cc.inc",
      "new_id": "754998ae707ed5af9da4720112cd8e7c00996fcd",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/ec/ec_key.cc.inc"
    },
    {
      "type": "modify",
      "old_id": "4be8d5bc901035647cfffb4a0c4a4cde738aa617",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/ec/ec_test.cc",
      "new_id": "2f269fa8a6ff7a0dcad79c2c668f136af40b6deb",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/ec/ec_test.cc"
    },
    {
      "type": "modify",
      "old_id": "1133a37c90534ec2893033d7ad43c34c5535806b",
      "old_mode": 33188,
      "old_path": "include/openssl/ec_key.h",
      "new_id": "47d50636cc2a8b4fdd27bf6aa50b66fcc8924e65",
      "new_mode": 33188,
      "new_path": "include/openssl/ec_key.h"
    }
  ]
}
