)]}'
{
  "commit": "29c83ceb702714d10265e9f2d5d2ee85c6bb3db7",
  "tree": "a5ea810ea47f9b0c7408c6dfffefcb12d485eebf",
  "parents": [
    "e0193ce492b5d8dd4f1d661aba478d5239a06140"
  ],
  "author": {
    "name": "Michael Schaffner",
    "email": "msf@opentitan.org",
    "time": "Fri Feb 28 13:59:20 2020 -0800"
  },
  "committer": {
    "name": "Michael Schaffner",
    "email": "msf@google.com",
    "time": "Wed Mar 04 10:36:42 2020 -0800"
  },
  "message": "[prim] This adds initial versions of the PRINCE and PRESENT scramblers\n\nThe implementations follow the original papers\n\n- http://www.lightweightcrypto.org/present/present_ches2007.pdf\n- https://eprint.iacr.org/2012/529.pdf\n\nNote that weaker parameterizations than used in the original\nimplementations do NOT result in cryptographically secure instances.\n\nFurther, these implementations are not hardened against any attacks,\nand should hence only be used for lightweight data scrambling purposes.\n\nSigned-off-by: Michael Schaffner \u003cmsf@opentitan.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "40e7edc848835844605be9f9c22f54fbbd2f61b9",
      "old_mode": 33188,
      "old_path": "hw/ip/prim/prim.core",
      "new_id": "bc023ed2347c74636ae0e4578b7e8913e11357e2",
      "new_mode": 33188,
      "new_path": "hw/ip/prim/prim.core"
    },
    {
      "type": "add",
      "old_id": "0000000000000000000000000000000000000000",
      "old_mode": 0,
      "old_path": "/dev/null",
      "new_id": "83aa14e49769efb48b92134a4db201dd97e566e1",
      "new_mode": 33188,
      "new_path": "hw/ip/prim/rtl/prim_present.sv"
    },
    {
      "type": "add",
      "old_id": "0000000000000000000000000000000000000000",
      "old_mode": 0,
      "old_path": "/dev/null",
      "new_id": "b32f95fc3d9db428a1d3d0199f47241920f7b74e",
      "new_mode": 33188,
      "new_path": "hw/ip/prim/rtl/prim_prince.sv"
    }
  ]
}
