)]}'
{
  "commit": "2a72f9770fdad399a605a6c8b45dffafe35870fd",
  "tree": "87991c79692e658db9488d214c5588a8b894610f",
  "parents": [
    "8e16c046b138e4806e69f22810b4d33e925ec58f"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Wed Jun 07 12:21:18 2023 -0400"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Thu Jun 08 15:27:16 2023 +0000"
  },
  "message": "Tidy bssl-crypto documentation\n\nThis probably needs a few iterations, but fix the stuff I noticed on a\nfirst pass:\n\n- I don\u0027t think it\u0027s useful to say this is the BoringSSL implementation\n  of something. That\u0027s all implicit from this crate anyway.\n\n- Rust seems to prefer \"Returns ...\" rather than \"Return ...\"\n\n- Algorithm names like \"hkdf\" or \"hmac\" should be written \"HKDF\" or\n  \"HMAC\" when referring to the algorithms. Also BoringSSL is styled\n  \"BoringSSL\" rather than \"boringssl\".\n\n- Given Rust overall doesn\u0027t try to handle allocation failure, let\u0027s\n  just write that we don\u0027t believe in allocation failure once in the\n  README rather than marking which functions do and don\u0027t panic.\n\nChange-Id: I48501717dd0b063a2fa4106c4c140d76a7ef69a9\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/60546\nReviewed-by: Nabil Wadih \u003cnwadih@google.com\u003e\nCommit-Queue: Bob Beck \u003cbbe@google.com\u003e\nReviewed-by: Bob Beck \u003cbbe@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "dff669bcd82bba73172a3014e5d386b5889d2784",
      "old_mode": 33188,
      "old_path": "rust/bssl-crypto/README.md",
      "new_id": "bc7371a2facc34b4bee7f91f3a1cf9be783279af",
      "new_mode": 33188,
      "new_path": "rust/bssl-crypto/README.md"
    },
    {
      "type": "modify",
      "old_id": "e3ec5bdaf5efbed5f17a1aee10294b80b0b854a0",
      "old_mode": 33188,
      "old_path": "rust/bssl-crypto/src/aes.rs",
      "new_id": "e5a16078c875b34595be43b92b3c1347795b029d",
      "new_mode": 33188,
      "new_path": "rust/bssl-crypto/src/aes.rs"
    },
    {
      "type": "modify",
      "old_id": "ee26f3e57a7b3c5a4c8a76a55701790c05714a11",
      "old_mode": 33188,
      "old_path": "rust/bssl-crypto/src/digest.rs",
      "new_id": "35b653452f837eab50e558d3860e45960ee79b5b",
      "new_mode": 33188,
      "new_path": "rust/bssl-crypto/src/digest.rs"
    },
    {
      "type": "modify",
      "old_id": "1fa5b051e23bcef08ca06c5776193864788413f4",
      "old_mode": 33188,
      "old_path": "rust/bssl-crypto/src/ed25519.rs",
      "new_id": "df3650797a7b718af6d70ffbc450edf62817ffdd",
      "new_mode": 33188,
      "new_path": "rust/bssl-crypto/src/ed25519.rs"
    },
    {
      "type": "modify",
      "old_id": "66b8d60e305cbf4292f8291a0bec4ab391592958",
      "old_mode": 33188,
      "old_path": "rust/bssl-crypto/src/hkdf.rs",
      "new_id": "d3144951e794bdbe6daa68230165a65d3387cb0f",
      "new_mode": 33188,
      "new_path": "rust/bssl-crypto/src/hkdf.rs"
    },
    {
      "type": "modify",
      "old_id": "7dbf39ba5b1f06f057b38f247f96a53a107f9a38",
      "old_mode": 33188,
      "old_path": "rust/bssl-crypto/src/hmac.rs",
      "new_id": "167e92e59bd3333812b5aa925ecb8d627158840d",
      "new_mode": 33188,
      "new_path": "rust/bssl-crypto/src/hmac.rs"
    },
    {
      "type": "modify",
      "old_id": "2c80ae8e144704725945dd8e124baefd6f3147b4",
      "old_mode": 33188,
      "old_path": "rust/bssl-crypto/src/lib.rs",
      "new_id": "ce9500bf954ec8e482de872a975d695d723add06",
      "new_mode": 33188,
      "new_path": "rust/bssl-crypto/src/lib.rs"
    }
  ]
}
