)]}'
{
  "commit": "641ab6b32049cabca26c30bf27baaae445bf4175",
  "tree": "e958d93565c87984de68334c5d4adc00762a949e",
  "parents": [
    "b05791f2e11c76a1ca25fd2181cc059e14bceeaa"
  ],
  "author": {
    "name": "Han-Wen Nienhuys",
    "email": "hanwen@google.com",
    "time": "Tue Jan 31 18:39:58 2017 +0100"
  },
  "committer": {
    "name": "Han-Wen Nienhuys",
    "email": "hanwen@google.com",
    "time": "Thu Feb 02 10:03:54 2017 +0000"
  },
  "message": "ssh: reset buffered packets after sending\n\nSince encryption messes up the packets, the wrongly retained packets\nlook like noise and cause application protocol errors or panics in the\nSSH library.\n\nThis normally triggers very rarely: the mandatory key exchange doesn\u0027t\nhave parallel writes, so this failure condition would be setup on the\nfirst key exchange, take effect only after the second key exchange.\n\nFortunately, the tests against openssh exercise this. This change adds\nalso adds a unittest.\n\nFixes #18850.\n\nChange-Id: I656c8b94bfb265831daa118f4d614a2f0c65d2af\nReviewed-on: https://go-review.googlesource.com/36056\nReviewed-by: Brad Fitzpatrick \u003cbradfitz@golang.org\u003e\nRun-TryBot: Han-Wen Nienhuys \u003chanwen@google.com\u003e\nTryBot-Result: Gobot Gobot \u003cgobot@golang.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "57f2d3daf63bc2c11b53c2dcbbc7eeca92d87db7",
      "old_mode": 33188,
      "old_path": "ssh/handshake.go",
      "new_id": "e3f82c40c919009351dfb92d069c4ac66511ea0f",
      "new_mode": 33188,
      "new_path": "ssh/handshake.go"
    },
    {
      "type": "modify",
      "old_id": "e61348fea7afd18954e9b45c7a1c4e3f9988541b",
      "old_mode": 33188,
      "old_path": "ssh/handshake_test.go",
      "new_id": "4d643768a6c941f44ea93d0d40893c2682831479",
      "new_mode": 33188,
      "new_path": "ssh/handshake_test.go"
    }
  ]
}
