)]}'
{
  "commit": "8a74f07c2a17cc9dd024882afcfee563282bcb78",
  "tree": "b90eb3215a118b8fe2cfe04bafc4725632053cc2",
  "parents": [
    "3d0c8255aabf1072547e1187b6e55c8acdb26ad1"
  ],
  "author": {
    "name": "Ronald Cron",
    "email": "ronald.cron@arm.com",
    "time": "Wed Jun 14 17:59:29 2023 +0200"
  },
  "committer": {
    "name": "Ronald Cron",
    "email": "ronald.cron@arm.com",
    "time": "Fri Jul 07 15:53:12 2023 +0200"
  },
  "message": "tls13: server: Fix spurious HRR\n\nIf the server during a TLS 1.3 handshake selects\nthe PSK key exchange mode, it does not matter\nif it did not find in the key share extension\na key share for a group it supports. Such a\nkey share is used and necessary only in the\ncase of the ephemeral or PSK ephemeral key\nexchange mode. This is a possible scenario in\nthe case of a server that supports only the PSK\nkey exchange mode and a client that also\nsupports a key exchange mode with ephemeral keys.\n\nSigned-off-by: Ronald Cron \u003cronald.cron@arm.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "ba64c32c16c529b3eec290dd702b10df2a6cc1d4",
      "old_mode": 33188,
      "old_path": "library/ssl_tls13_server.c",
      "new_id": "534516718457c30f547798c038115cee360e3ebf",
      "new_mode": 33188,
      "new_path": "library/ssl_tls13_server.c"
    },
    {
      "type": "modify",
      "old_id": "1374bca5ee056c681a393cd08dc423b6147ee8fb",
      "old_mode": 33261,
      "old_path": "tests/ssl-opt.sh",
      "new_id": "4e468da1a8bf839956a899b80a1c5cfd64804b34",
      "new_mode": 33261,
      "new_path": "tests/ssl-opt.sh"
    }
  ]
}
