)]}'
{
  "log": [
    {
      "commit": "e2b21b5002a2bf21ca73c7448309a7288a984ddf",
      "tree": "11e55173debdb2428a37655968ceef39786f2383",
      "parents": [
        "b7a30da61adc5f252ee97b2a4f3fc23c9d06a08a"
      ],
      "author": {
        "name": "Denys Vlasenko",
        "email": "vda.linux@googlemail.com",
        "time": "Fri Oct 26 16:22:57 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Jan 11 08:16:06 2008 +1100"
      },
      "message": "[CRYPTO] twofish: Do not unroll big stuff in twofish key setup\n\nCurrently twofish cipher key setup code\nhas unrolled loops - approximately 70-100\ninstructions are repeated 40 times.\n\nAs a result, twofish module is the biggest module\nin crypto/*.\n\nUnrolling produces x2.5 more code (+18k on i386), and speeds up key\nsetup by 7%:\n\n\tunrolled: twofish_setkey/sec: 41128\n\t    loop: twofish_setkey/sec: 38148\n\tCALC_K256: ~100 insns each\n\tCALC_K192: ~90 insns\n\t   CALC_K: ~70 insns\n\nAttached patch removes this unrolling.\n\n$ size */twofish_common.o\n   text    data     bss     dec     hex filename\n  37920       0       0   37920    9420 crypto.org/twofish_common.o\n  13209       0       0   13209    3399 crypto/twofish_common.o\n\nRun tested (modprobe tcrypt reports ok). Please apply.\n\nSigned-off-by: Denys Vlasenko \u003cvda.linux@googlemail.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "560c06ae1ab7c677002ea3b6ac83521bf12ee07d",
      "tree": "374ed69a7e23ba9d07458d20672aac6ae552ae51",
      "parents": [
        "25cdbcd9e5d20e431f829cafce48a418830011f4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Aug 13 14:16:39 2006 +1000"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Sep 21 11:41:02 2006 +1000"
      },
      "message": "[CRYPTO] api: Get rid of flags argument to setkey\n\nNow that the tfm is passed directly to setkey instead of the ctx, we no\nlonger need to pass the \u0026tfm-\u003ecrt_flags pointer.\n\nThis patch also gets rid of a few unnecessary checks on the key length\nfor ciphers as the cipher layer guarantees that the key length is within\nthe bounds specified by the algorithm.\n\nRather than testing dia_setkey every time, this patch does it only once\nduring crypto_alloc_tfm.  The redundant check from crypto_digest_setkey\nis also removed.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "2729bb427f686e47970406d6bde6b11892885f29",
      "tree": "6c17bab6970fc4bcc92c0de76d174e35d8043844",
      "parents": [
        "799111020c66c41aef621a3b53ad112543754124"
      ],
      "author": {
        "name": "Joachim Fritschi",
        "email": "jfritschi@freenet.de",
        "time": "Tue Jun 20 20:37:23 2006 +1000"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Sep 21 11:16:27 2006 +1000"
      },
      "message": "[CRYPTO] twofish: Split out common c code\n\nThis patch splits up the twofish crypto routine into a common part ( key\nsetup  ) which will be uses by all twofish crypto modules ( generic-c , i586\nassembler and x86_64 assembler ) and generic-c part. It also creates a new\nheader file which will be used by all 3 modules.\n\nThis eliminates all code duplication.\n\nCorrectness was verified with the tcrypt module and automated test scripts.\n\nSigned-off-by: Joachim Fritschi \u003cjfritschi@freenet.de\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    }
  ]
}
