)]}'
{
  "commit": "485c7253196a77d419a8535f117d0b0beaf7f4cc",
  "tree": "a8632f7feeb41a50d2b47c786a9d594015d548bb",
  "parents": [
    "46364fb1aab39c8d9cbd88060dd53165c0ea42c8"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Wed Jan 22 14:46:15 2025 -0500"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Wed Jan 22 12:44:35 2025 -0800"
  },
  "message": "Reword the SSL_export_keying_material docs slightly\n\nThe reference to TLS 1.2\u0027s \"master secret\" (renamed to \"main secret\" in\nrfc8446bis, but we haven\u0027t applied that yet) is wrong anyway because\nit\u0027s derived from a different secret in TLS 1.3. Even in TLS 1.2, it\u0027s\nmisleading because TLS 1.2 resumptions share the master secret, but EKM\nstill exports different values by incorporating the client/server\nrandoms.\n\nChange-Id: I21cb4f5ddde9d9fb520c770ca6a89c56daecef6b\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/75509\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nAuto-Submit: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "12ede3f91733a1131039bb6ff444833334793ad5",
      "old_mode": 33188,
      "old_path": "include/openssl/ssl.h",
      "new_id": "aa63b8fa07ad50837b1083e8ac113b63b3eea907",
      "new_mode": 33188,
      "new_path": "include/openssl/ssl.h"
    }
  ]
}
