)]}'
{
  "commit": "7216466aecd59e675a4f66d6e329e748f32ad690",
  "tree": "f1fdec0381383aef8b8491008c4337f89c5bc077",
  "parents": [
    "18b12c387e2bcd8a0e81a8d2635c1ef52c8a9a7d"
  ],
  "author": {
    "name": "paul",
    "email": "paul",
    "time": "Tue Oct 05 14:39:43 2004 +0000"
  },
  "committer": {
    "name": "paul",
    "email": "paul",
    "time": "Tue Oct 05 14:39:43 2004 +0000"
  },
  "message": "2004-10-05 Paul Jakma \u003cpaul@dishone.st\u003e\n\n\t* irdp_packet.c: (parse_irdp_packet) style issues.\n\t  Use sockopt_iphdrincl_swab_systoh.\n          Try unbork the code. Checksum the ICMP data and actually\n          compare it to received checksum. Check data length against\n          claimed length in header.\n\t  Always use ntoh.. when accessing addresses, even when the\n          comparison happens to be endian-safe.\n\t  (send_packet) minor style isues. Use\n          sockopt_iphdrincl_swab_htosys.\n\t  (irdp_iph_hton/ntoh) IP header to/from network/host order.\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "fb8d0ab1b1226db70cc7416fd58bf4501b61c705",
      "old_mode": 33188,
      "old_path": "zebra/ChangeLog",
      "new_id": "a6ac1fc3b22f29a78056c7abeafe4127a4376ba1",
      "new_mode": 33188,
      "new_path": "zebra/ChangeLog"
    },
    {
      "type": "modify",
      "old_id": "67609b31f0fee3f205b4f2ffa609a15351413c51",
      "old_mode": 33188,
      "old_path": "zebra/irdp_packet.c",
      "new_id": "60604353ca60930deb6229a1c53f7677a18bbeb7",
      "new_mode": 33188,
      "new_path": "zebra/irdp_packet.c"
    }
  ]
}
