)]}'
{
  "commit": "f6c8d35c8ebc4878a33f5be00dba5205eabd52bd",
  "tree": "5a0f1c3d4fd735b3f95b3b9161b0d1142cebd077",
  "parents": [
    "29235ca855caa601b674fd68a1735b196e90cb82"
  ],
  "author": {
    "name": "Timothy Trippel",
    "email": "ttrippel@google.com",
    "time": "Mon Mar 13 12:17:23 2023 -0700"
  },
  "committer": {
    "name": "Timothy Trippel",
    "email": "5633066+timothytrippel@users.noreply.github.com",
    "time": "Wed Mar 15 07:43:12 2023 -0700"
  },
  "message": "[util] implement flash scrambling key derivation\n\nThe address and data flash scrambling keys are computed from seeds\nstored in the OTP, and netlist constants embedded in the RTL. This\nimplements the same flash scrambling key derivation scheme implemented\nin the RTL so flash VMEM images can be pre-scrabled for backdoor loading\nin DV.\n\nSigned-off-by: Timothy Trippel \u003cttrippel@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "90b580a7fde17eae1bb780f2390e38c9392d5ab2",
      "old_mode": 33261,
      "old_path": "util/design/gen-flash-img.py",
      "new_id": "754dbac23bb3fbcf9df5b07e0d27d8b382bd20fc",
      "new_mode": 33261,
      "new_path": "util/design/gen-flash-img.py"
    }
  ]
}
