)]}'
{
  "commit": "ea2a598411cc7bd20456849e56bbc9e93c9916e7",
  "tree": "e1825968b9d0f7208b93944980331179456b7625",
  "parents": [
    "969d3550a8cbb07f8b4d5ebe8dde5064f8260140"
  ],
  "author": {
    "name": "Joakim Tjernlund",
    "email": "Joakim.Tjernlund@transmode.se",
    "time": "Thu Nov 26 12:23:07 2009 +0000"
  },
  "committer": {
    "name": "Vincent JARDIN",
    "email": "vincent.jardin@6wind.com",
    "time": "Mon Oct 27 15:57:59 2014 +0100"
  },
  "message": "ospfd: invalid MD5 auth_key?\n\nThis looks fishy in ospf_make_md5_digest()\nif (list_isempty (OSPF_IF_PARAM (oi, auth_crypt)))\n    auth_key \u003d (const u_int8_t *) \"\";\n...\nMD5Update(\u0026ctx, auth_key, OSPF_AUTH_MD5_SIZE);\nauth_key points to a \"\" string of len 1 which is a lot\nsmaller that OSPF_AUTH_MD5_SIZE. Is this intentional to\nget some random data or just a plain bug?\n\nAnyone using MD5 should have a closer look and decide\nwhat to do.\nAcked-by: Feng Lu \u003clu.feng@6wind.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "efdf8263b747984e3c70e7648be88e02ba67ace4",
      "old_mode": 33188,
      "old_path": "ospfd/ospf_packet.c",
      "new_id": "17260eb1e3d5c50f32ba7cc826b38a77bf15a6ec",
      "new_mode": 33188,
      "new_path": "ospfd/ospf_packet.c"
    }
  ]
}
