)]}'
{
  "commit": "e7f0d9210c4a421e6306cd9a0c486c3e96be4d25",
  "tree": "4d25ae6bed3a5c5255c688e3459542eef1b7612e",
  "parents": [
    "686cf15e9dfd3263ec05019f4b2b52253cdcf38e"
  ],
  "author": {
    "name": "Dr. Stephen Henson",
    "email": "steve@openssl.org",
    "time": "Fri Dec 04 19:48:15 2015 +0000"
  },
  "committer": {
    "name": "Dr. Stephen Henson",
    "email": "steve@openssl.org",
    "time": "Tue Dec 08 16:32:39 2015 +0000"
  },
  "message": "Extended master secret fixes and checks.\n\nAdd new flag TLS1_FLAGS_RECEIVED_EXTMS which is set when the peer sends\nthe extended master secret extension.\n\nServer now sends extms if and only if the client sent extms.\n\nCheck consistency of extms extension when resuming sessions following (where\npractical) RFC7627.\n\nReviewed-by: Matt Caswell \u003cmatt@openssl.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "ef93c085a639cc954ef8acc31cb07589a31a25c9",
      "old_mode": 33188,
      "old_path": "include/openssl/ssl3.h",
      "new_id": "2a2974c3caf8e3a06cf5118db59011314818203b",
      "new_mode": 33188,
      "new_path": "include/openssl/ssl3.h"
    },
    {
      "type": "modify",
      "old_id": "34091d3aa6a7f911dcb4e7e9a3d57e9917441597",
      "old_mode": 33188,
      "old_path": "ssl/ssl_locl.h",
      "new_id": "1e1b26569c9d20225450fb714a2b090685ec1ed6",
      "new_mode": 33188,
      "new_path": "ssl/ssl_locl.h"
    },
    {
      "type": "modify",
      "old_id": "5265b15983a44ad780284feae3bce4a044c1ce73",
      "old_mode": 33188,
      "old_path": "ssl/ssl_sess.c",
      "new_id": "aff615e0e61632c9ec093c406d44985ea6f8a754",
      "new_mode": 33188,
      "new_path": "ssl/ssl_sess.c"
    },
    {
      "type": "modify",
      "old_id": "a6f2502c7214ab33cc4c50159679270c9296e349",
      "old_mode": 33188,
      "old_path": "ssl/t1_lib.c",
      "new_id": "83015e85c350fcd7eb813fb78624041b5e9c7afd",
      "new_mode": 33188,
      "new_path": "ssl/t1_lib.c"
    }
  ]
}
