)]}'
{
  "log": [
    {
      "commit": "bc97e57eb21f8db55bf0e1f182d384e75b2e3c99",
      "tree": "470a1564aaa3d36f545bb7b4d25e853a38617f01",
      "parents": [
        "0f6bb83cb12e4617e696ffa566f3fc6c092686e2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 30 17:04:31 2010 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 30 17:04:31 2010 +0800"
      },
      "message": "crypto: algif_skcipher - Handle unaligned receive buffer\n\nAs it is if user-space passes through a receive buffer that\u0027s not\naligned to to the cipher block size, we\u0027ll end up encrypting or\ndecrypting a partial block which causes a spurious EINVAL to be\nreturned.\n\nThis patch fixes this by moving the partial block test after the\naf_alg_make_sg call.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "0f6bb83cb12e4617e696ffa566f3fc6c092686e2",
      "tree": "c871ab8acedb25ba19de73be427620af8475236d",
      "parents": [
        "7451708f39db19a8303bb7fb95f00aca9f673cb5"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 30 16:49:02 2010 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 30 16:49:02 2010 +0800"
      },
      "message": "crypto: algif_skcipher - Fixed overflow when sndbuf is page aligned\n\nWhen sk_sndbuf is not a multiple of PAGE_SIZE, the limit tests\nin sendmsg fail as the limit variable becomes negative and we\u0027re\nusing an unsigned comparison.\n\nThe same thing can happen if sk_sndbuf is lowered after a sendmsg\ncall.\n\nThis patch fixes this by always taking the signed maximum of limit\nand 0 before we perform the comparison.\n\nIt also rounds the value of sk_sndbuf down to a multiple of PAGE_SIZE\nso that we don\u0027t end up allocating a page only to use a small number\nof bytes in it because we\u0027re bound by sk_sndbuf.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "c762be637503b833012457087133c1292fd6056d",
      "tree": "5bf3dff445a259b361a5b7d87d625497aeed5a57",
      "parents": [
        "887c883eea9867535059f3c8414c8cfc952ccff1"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Nov 28 16:28:01 2010 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Nov 28 16:28:01 2010 +0800"
      },
      "message": "crypto: algif_skcipher - Pass on error from af_alg_make_sg\n\nThe error returned from af_alg_make_sg is currently lost and we\nalways pass on -EINVAL.  This patch pases on the underlying error.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "8ff590903d5fc7f5a0a988c38267a3d08e6393a2",
      "tree": "2e73472f71848945136661c82f50176d6a3db388",
      "parents": [
        "fe869cdb89c95d060c77eea20204d6c91f233b53"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 19 21:31:55 2010 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 26 20:53:59 2010 +0800"
      },
      "message": "crypto: algif_skcipher - User-space interface for skcipher operations\n\nThis patch adds the af_alg plugin for symmetric key ciphers,\ncorresponding to the ablkcipher kernel operation type.\n\nKeys can optionally be set through the setsockopt interface.\n\nOnce a sendmsg call occurs without MSG_MORE no further writes\nmay be made to the socket until all previous data has been read.\n\nIVs and and whether encryption/decryption is performed can be\nset through the setsockopt interface or as a control message\nto sendmsg.\n\nThe interface is completely synchronous, all operations are\ncarried out in recvmsg(2) and will complete prior to the system\ncall returning.\n\nThe splice(2) interface support reading the user-space data directly\nwithout copying (except that the Crypto API itself may copy the data\nif alignment is off).\n\nThe recvmsg(2) interface supports directly writing to user-space\nwithout additional copying, i.e., the kernel crypto interface will\nreceive the user-space address as its output SG list.\n\nThakns to Miloslav Trmac for reviewing this and contributing\nfixes and improvements.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ]
}
