)]}'
{
  "commit": "b74d1d260f07bf0836610d6b1a53b32101913886",
  "tree": "defbbbd67a9ef4f90b35bfe9b5cced3600b28be9",
  "parents": [
    "d0a4b7d1a2948fce38515b8d862f43e7ba0ebf74"
  ],
  "author": {
    "name": "Adam Langley",
    "email": "agl@imperialviolet.org",
    "time": "Fri Jun 06 14:44:20 2014 -0700"
  },
  "committer": {
    "name": "Matt Caswell",
    "email": "matt@openssl.org",
    "time": "Wed Aug 06 20:36:40 2014 +0100"
  },
  "message": "Fix return code for truncated DTLS fragment.\n\nPreviously, a truncated DTLS fragment in\n|dtls1_process_out_of_seq_message| would cause *ok to be cleared, but\nthe return value would still be the number of bytes read. This would\ncause |dtls1_get_message| not to consider it an error and it would\ncontinue processing as normal until the calling function noticed that\n*ok was zero.\n\nI can\u0027t see an exploit here because |dtls1_get_message| uses\n|s-\u003einit_num| as the length, which will always be zero from what I can\nsee.\n\nReviewed-by: Matt Caswell \u003cmatt@openssl.org\u003e\nReviewed-by: Emilia Käsper \u003cemilia@openssl.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "4d8d2d15bacabf1daf4d4b508e6f0ca50c69f6fb",
      "old_mode": 33188,
      "old_path": "ssl/d1_both.c",
      "new_id": "29df26e99a35f054081240dfae844f40e297fd5a",
      "new_mode": 33188,
      "new_path": "ssl/d1_both.c"
    }
  ]
}
