)]}' { "commit": "c4f25ce0c6e3822eb639b2a5649a51ea42b46490", "tree": "bb60d34d62528206a3a517138a5182498693e527", "parents": [ "c5eb4676b69d6431cce4904ddc3703f3358a2fd9" ], "author": { "name": "Adam Langley", "email": "alangley@gmail.com", "time": "Thu Nov 26 16:39:08 2015 -0800" }, "committer": { "name": "Adam Langley", "email": "agl@google.com", "time": "Mon Nov 30 22:41:24 2015 +0000" }, "message": "Work around yaSSL bug.\n\nyaSSL has a couple of bugs in their DH client implementation. This\nchange works around the worst of the two.\n\nFirstly, they expect the the DH public value to be the same length as\nthe prime. This change pads the public value as needed to ensure this.\n\nSecondly, although they handle the first byte of the shared key being\nzero, they don\u0027t handle the case of the second, third, etc bytes being\nzero. So whenever that happens the handshake fails. I don\u0027t think that\nthere\u0027s anything that we can do about that one.\n\nChange-Id: I789c9e5739f19449473305d59fe5c3fb9b4a6167\nReviewed-on: https://boringssl-review.googlesource.com/6578\nReviewed-by: David Benjamin \u003cdavidben@chromium.org\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "cd5d2a143b917616b1991bd951d39db51d155183", "old_mode": 33188, "old_path": "ssl/s3_srvr.c", "new_id": "b5ec1b547a47946059aa4b46624f9c3aff4f7595", "new_mode": 33188, "new_path": "ssl/s3_srvr.c" }, { "type": "modify", "old_id": "1321b2ad8de0328657463a9064d2d78c05be90e7", "old_mode": 33188, "old_path": "ssl/test/bssl_shim.cc", "new_id": "67b74b4bddeb5f5d0e9dea62c11fc8a762e94044", "new_mode": 33188, "new_path": "ssl/test/bssl_shim.cc" }, { "type": "modify", "old_id": "078c227ee1d8119f9081e8b28faa96c0eb331f8c", "old_mode": 33188, "old_path": "ssl/test/runner/common.go", "new_id": "fd6ca7169b84076ef35f79dc863fb4f16802cf59", "new_mode": 33188, "new_path": "ssl/test/runner/common.go" }, { "type": "modify", "old_id": "3a9b8997480d97d2a3bd3d860d2368352be10ff4", "old_mode": 33188, "old_path": "ssl/test/runner/key_agreement.go", "new_id": "4a07ed754458d24bb9d2725a42ed2d8f1511568a", "new_mode": 33188, "new_path": "ssl/test/runner/key_agreement.go" }, { "type": "modify", "old_id": "a1801c8ebf06cff470101d58c1577632b44ea8cf", "old_mode": 33188, "old_path": "ssl/test/runner/runner.go", "new_id": "befde8629b567193a8890b0094d3d5cbe0013a50", "new_mode": 33188, "new_path": "ssl/test/runner/runner.go" }, { "type": "modify", "old_id": "23b0879e1200072e8310593aa89acebee311d98d", "old_mode": 33188, "old_path": "ssl/test/test_config.cc", "new_id": "ba44b4dce193425af2d67f5f1dad45a95738de27", "new_mode": 33188, "new_path": "ssl/test/test_config.cc" }, { "type": "modify", "old_id": "733e0a11afab22293a8ef53130b88239441c5fec", "old_mode": 33188, "old_path": "ssl/test/test_config.h", "new_id": "2fabcfc5620511dd45d2139e7632ec5600b4e41c", "new_mode": 33188, "new_path": "ssl/test/test_config.h" } ] }