The one that was removed for version 2.0.4, because a bogus special
cases caused it to accept forged signature (a big fat vulnerability).
To avoid the vulnerability, this optimisation is only used for signing
and public key generation. Those never multiply the base point by zero,
and as such should not hit any nasty special case. More specifically:
- Public key generation works the same as X25519: the scalar is trimmed
before it is multiplied by the base point.
- Signing multiplies the base point by a nonce, which by construction is
a random number between 1 and L-1 (L is the order of the curve).
External scrutiny will be needed to confirm this is safe.
Note: signing is now even faster than it was, because multiplying by a
known point (the base point) lets us avoid a conversion and a division.