)]}' { "commit": "bdf5e72f50e25f0e45e825c156168766d8442dde", "tree": "316fb2d3877a529618767d8a415fe990c8a7a8e8", "parents": [ "2f3ba910a2bdb9e7d19e712a827cdc80c8d8c777" ], "author": { "name": "David Benjamin", "email": "davidben@chromium.org", "time": "Tue Nov 11 00:52:15 2014 -0500" }, "committer": { "name": "Adam Langley", "email": "agl@google.com", "time": "Thu Nov 13 22:05:12 2014 +0000" }, "message": "Don\u0027t resume sessions if the negotiated version doesn\u0027t match.\n\nAll of NSS, upstream OpenSSL, SChannel, and Secure Transport require, on the\nclient, that the ServerHello version match the session\u0027s version on resumption.\nOpenSSL\u0027s current behavior is incompatible with all of these. Fall back to a\nfull handshake on the server instead of mismatch.\n\nAdd a comment on the client for why we are, as of\n30ddb434bfb845356fbacb6b2bd51f8814c7043c, not currently enforcing the same in\nthe client.\n\nChange-Id: I60aec972d81368c4ec30e2fd515dabd69401d175\nReviewed-on: https://boringssl-review.googlesource.com/2244\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "aeb260416c141c50100d9af17c2e32d291fb6ec7", "old_mode": 33188, "old_path": "ssl/s3_clnt.c", "new_id": "bade13b3875b0c8b71c5e374dcbab533d40c0a47", "new_mode": 33188, "new_path": "ssl/s3_clnt.c" }, { "type": "modify", "old_id": "5f861a7b4b32239884022a5d75a45127d72b8850", "old_mode": 33188, "old_path": "ssl/s3_srvr.c", "new_id": "d591e19263c1253366d8edefd72b63a378095022", "new_mode": 33188, "new_path": "ssl/s3_srvr.c" }, { "type": "modify", "old_id": "f8649d3c3eefe84d3bb1a893bc5f63017709f2cc", "old_mode": 33188, "old_path": "ssl/test/runner/runner.go", "new_id": "91722239cd2125715dad5ec1d5f899983b388d10", "new_mode": 33188, "new_path": "ssl/test/runner/runner.go" } ] }