)]}'
{
  "commit": "a26ff6a290ff8b8bfbc836f0fd54bc7e55306e0f",
  "tree": "23e9416c540b7df40085aa9a74c8bd98232ac78b",
  "parents": [
    "2b450e3a01e138598e31dbb0c0f8b8a4182e92f7"
  ],
  "author": {
    "name": "Gilles Peskine",
    "email": "Gilles.Peskine@arm.com",
    "time": "Thu Jun 28 12:21:19 2018 +0200"
  },
  "committer": {
    "name": "itayzafrir",
    "email": "itay.zafrir@arm.com",
    "time": "Wed Sep 12 16:41:11 2018 +0300"
  },
  "message": "psa_asymmetric_sign: consistently fill unused output with \u0027!\u0027\n\nFill the unused part of the output buffer with \u0027!\u0027, for consistency\nwith hash and mac.\n\nOn error, set the output length to the output buffer size and fill the\noutput buffer with \u0027!\u0027, again for consistency with hash and mac. This\nway an invalid output is more visible in a memory dump.\n\nRestructure the error paths so that there is a single place where the\nunused part of the output buffer is filled.\n\nAlso remove a redundant initialization of *signature_length to 0.\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "cb2a4f271a93fc60104631436141950568fba818",
      "old_mode": 33188,
      "old_path": "library/psa_crypto.c",
      "new_id": "1d8eb506d28b4bf7b7b238ba0f8f2784ac4b411c",
      "new_mode": 33188,
      "new_path": "library/psa_crypto.c"
    }
  ]
}
