)]}'
{
  "commit": "5ede28c8a422801ace3ba5e466ba963005351145",
  "tree": "b202ee7f303dcad707ba385548350f609c344b01",
  "parents": [
    "4902598935fa7d59ece8fcf8e4ed9ed2980b2b51"
  ],
  "author": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Mon Sep 17 15:15:02 2018 -0700"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Thu Sep 20 16:15:51 2018 +0000"
  },
  "message": "Tighten up getrandom handling.\n\nWhile I don\u0027t believe EINTR can occur with a non-blocking getrandom call\nwhen talking to the kernel directly, that may not be true when certain\nsandboxing systems are being used.\n\nAdditionally, with this change we will no longer silently ignore errors\nother than ENOSYS.\n\nUpdate-Note: update internal bug 115344138.\n\nChange-Id: I952c132cf325dcc17dc38e68f054abc41de1f8b0\nReviewed-on: https://boringssl-review.googlesource.com/32006\nReviewed-by: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "e6d779cc308ebb641207f588ec140013f7c5823d",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rand/urandom.c",
      "new_id": "4923fa47413143b827d08e56fe476a7a4266c546",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rand/urandom.c"
    }
  ]
}
