)]}'
{
  "commit": "28987cf081a338f3cfaec9ed31f66acf966ea401",
  "tree": "fe1634f479c72cd62b3a6af79690c19e85ee5304",
  "parents": [
    "f9e0cda2d81858d10ceeadb0d21f4026f8602cf7"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Thu Apr 09 16:21:19 2020 -0400"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Fri Apr 10 15:37:52 2020 +0000"
  },
  "message": "Add a hash_to_scalar variation of P-521\u0027s hash_to_field.\n\nDLEQ proofs for PMBTokens need a random oracle over scalars as well as\nfield elements. (Interestingly, draft-irtf-cfrg-voprf-03 section 5.1\ndoes not specify as strong of requirements, but then their reference\nimplementation does rejection sampling, so it\u0027s unclear.)\n\nReusing the hash_to_field operation so hash calls use the domain\nseparation tag consistently with other hash-to-curve operations seems\nprudent, so implement a companion function until the actual construction\nsolidifies.\n\nChange-Id: I92d807bfddcca26db690cce0a3da551143c25ff3\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/40646\nReviewed-by: Steven Valdez \u003csvaldez@google.com\u003e\nCommit-Queue: Steven Valdez \u003csvaldez@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "52dbd9cc0c692175e1c8c85f9664deb6816d78ff",
      "old_mode": 33188,
      "old_path": "crypto/ec_extra/hash_to_curve.c",
      "new_id": "5c0e2e55228a973d2ce7077a42e15f728e15f34c",
      "new_mode": 33188,
      "new_path": "crypto/ec_extra/hash_to_curve.c"
    },
    {
      "type": "modify",
      "old_id": "873726c4690f8f44ca9402b94826262c4d28faa0",
      "old_mode": 33188,
      "old_path": "crypto/ec_extra/internal.h",
      "new_id": "b05e9ea4333ddee8abf5f27787d4de6a16ee7d79",
      "new_mode": 33188,
      "new_path": "crypto/ec_extra/internal.h"
    },
    {
      "type": "modify",
      "old_id": "7ab7f5fe1a58ccc3b01eecffc82981a874fdfa26",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/ec/ec_test.cc",
      "new_id": "eb53b2fdc79becd69182b90fa74cceb0493d5f73",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/ec/ec_test.cc"
    },
    {
      "type": "modify",
      "old_id": "5a40d9d925e5ddfe52d38d5dbbc990966ee41e32",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/ec/internal.h",
      "new_id": "e9a862376129c07e276929c0f7c25d52ada26b94",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/ec/internal.h"
    },
    {
      "type": "modify",
      "old_id": "aacefd21f4f8c292a94e7d1357f34d89715ffe5d",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/ec/scalar.c",
      "new_id": "2d4968251e5c8137d7e241482b4b8ce4d79faf0a",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/ec/scalar.c"
    }
  ]
}
