)]}'
{
  "log": [
    {
      "commit": "8fd61d34226014fe7886babfca6f45a7eff89d25",
      "tree": "f20387d290768d8989ddf9263f8757acdd8447fc",
      "parents": [
        "e336ed9647b06e3bb52995dbc51101cbdf39f2a2"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Tue Feb 05 18:19:15 2013 +0100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Feb 19 20:27:04 2013 +0800"
      },
      "message": "crypto: user - ensure user supplied strings are nul-terminated\n\nTo avoid misuse, ensure cru_name and cru_driver_name are always\nnul-terminated strings.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "e336ed9647b06e3bb52995dbc51101cbdf39f2a2",
      "tree": "08ad18361dc19e23ad2941dbb595793107245eaa",
      "parents": [
        "9a5467bf7b6e9e02ec9c3da4e23747c05faeaac6"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Tue Feb 05 18:19:14 2013 +0100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Feb 19 20:27:04 2013 +0800"
      },
      "message": "crypto: user - fix empty string test in report API\n\nThe current test for empty strings fails because it is testing the\naddress of a field, not a pointer. So the test will always be true.\nTest the first character in the string to not be null instead.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nCc: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "9a5467bf7b6e9e02ec9c3da4e23747c05faeaac6",
      "tree": "321e685947c9d47ca369efabb061bf50e1921c1d",
      "parents": [
        "7eb9c5df92361c55daab4d8d4e8468eb774e297b"
      ],
      "author": {
        "name": "Mathias Krause",
        "email": "minipli@googlemail.com",
        "time": "Tue Feb 05 18:19:13 2013 +0100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Feb 19 20:27:03 2013 +0800"
      },
      "message": "crypto: user - fix info leaks in report API\n\nThree errors resulting in kernel memory disclosure:\n\n1/ The structures used for the netlink based crypto algorithm report API\nare located on the stack. As snprintf() does not fill the remainder of\nthe buffer with null bytes, those stack bytes will be disclosed to users\nof the API. Switch to strncpy() to fix this.\n\n2/ crypto_report_one() does not initialize all field of struct\ncrypto_user_alg. Fix this to fix the heap info leak.\n\n3/ For the module name we should copy only as many bytes as\nmodule_name() returns -- not as much as the destination buffer could\nhold. But the current code does not and therefore copies random data\nfrom behind the end of the module name, as the module name is always\nshorter than CRYPTO_MAX_ALG_NAME.\n\nAlso switch to use strncpy() to copy the algorithm\u0027s name and\ndriver_name. They are strings, after all.\n\nSigned-off-by: Mathias Krause \u003cminipli@googlemail.com\u003e\nCc: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "d66e6737d454553e1e62109d8298ede5351178a4",
      "tree": "c28b205045935b111527f461d2b114daa26e4fb8",
      "parents": [
        "612a9aab56a93533e76e3ad91642db7033e03b69",
        "c9f97a27ceee84998999bf3341e6d5d207b05539"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Oct 04 09:06:34 2012 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Oct 04 09:06:34 2012 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6\n\nPull crypto update from Herbert Xu:\n - Optimised AES/SHA1 for ARM.\n - IPsec ESN support in talitos and caam.\n - x86_64/avx implementation of cast5/cast6.\n - Add/use multi-algorithm registration helpers where possible.\n - Added IBM Power7+ in-Nest support.\n - Misc fixes.\n\nFix up trivial conflicts in crypto/Kconfig due to the sparc64 crypto\nconfig options being added next to the new ARM ones.\n\n[ Side note: cut-and-paste duplicate help texts make those conflicts\n  harder to read than necessary, thanks to git being smart about\n  minimizing conflicts and maximizing the common parts... ]\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (71 commits)\n  crypto: x86/glue_helper - fix storing of new IV in CBC encryption\n  crypto: cast5/avx - fix storing of new IV in CBC encryption\n  crypto: tcrypt - add missing tests for camellia and ghash\n  crypto: testmgr - make test_aead also test \u0027dst !\u003d src\u0027 code paths\n  crypto: testmgr - make test_skcipher also test \u0027dst !\u003d src\u0027 code paths\n  crypto: testmgr - add test vectors for CTR mode IV increasement\n  crypto: testmgr - add test vectors for partial ctr(cast5) and ctr(cast6)\n  crypto: testmgr - allow non-multi page and multi page skcipher tests from same test template\n  crypto: caam - increase TRNG clocks per sample\n  crypto, tcrypt: remove local_bh_disable/enable() around local_irq_disable/enable()\n  crypto: tegra-aes - fix error return code\n  crypto: crypto4xx - fix error return code\n  crypto: hifn_795x - fix error return code\n  crypto: ux500 - fix error return code\n  crypto: caam - fix error IDs for SEC v5.x RNG4\n  hwrng: mxc-rnga - Access data via structure\n  hwrng: mxc-rnga - Adapt clocks to new i.mx clock framework\n  crypto: caam - add IPsec ESN support\n  crypto: 842 - remove .cra_list initialization\n  Revert \"[CRYPTO] cast6: inline bloat--\"\n  ...\n"
    },
    {
      "commit": "15e473046cb6e5d18a4d0057e61d76315230382b",
      "tree": "893d2df5d46a6ce156933ac57a1398f0ad22b889",
      "parents": [
        "9f00d9776bc5beb92e8bfc884a7e96ddc5589e2e"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Fri Sep 07 20:12:54 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Sep 10 15:30:41 2012 -0400"
      },
      "message": "netlink: Rename pid to portid to avoid confusion\n\nIt is a frequent mistake to confuse the netlink port identifier with a\nprocess identifier.  Try to reduce this confusion by renaming fields\nthat hold port identifiers portid instead of pid.\n\nI have carefully avoided changing the structures exported to\nuserspace to avoid changing the userspace API.\n\nI have successfully built an allyesconfig kernel with this change.\n\nSigned-off-by: \"Eric W. Biederman\" \u003cebiederm@xmission.com\u003e\nAcked-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9f00d9776bc5beb92e8bfc884a7e96ddc5589e2e",
      "tree": "2a9f9513a13c73cb1196ebe3426389c1140e2888",
      "parents": [
        "9785e10aedfa0fad5c1aac709dce5ada1b123783"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Sat Sep 08 02:53:54 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Sep 08 18:46:30 2012 -0400"
      },
      "message": "netlink: hide struct module parameter in netlink_kernel_create\n\nThis patch defines netlink_kernel_create as a wrapper function of\n__netlink_kernel_create to hide the struct module *me parameter\n(which seems to be THIS_MODULE in all existing netlink subsystems).\n\nSuggested by David S. Miller.\n\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "66ce0b0f290b2cf1ac74a30ddd13a9a3e67296ce",
      "tree": "044232fd7c2a9b99d1e511cc6de050ccbb4c8369",
      "parents": [
        "c09220e1bc97d83cae445cab8dcb057fabd62361"
      ],
      "author": {
        "name": "Jussi Kivilinna",
        "email": "jussi.kivilinna@mbnet.fi",
        "time": "Tue Aug 28 16:46:54 2012 +0300"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Sep 07 04:17:05 2012 +0800"
      },
      "message": "crypto: crypto_user - fix sparse warnings (symbol was not declared, should be static?)\n\nFix \"symbol \u0027x\u0027 was not declared. Should it be static?\" sparse warnings.\n\nSigned-off-by: Jussi Kivilinna \u003cjussi.kivilinna@mbnet.fi\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "a31f2d17b331db970259e875b7223d3aba7e3821",
      "tree": "0d10021be81446ab360f4240b0d16729f518387f",
      "parents": [
        "dd7f36ba3ce17d4fe85987d83efd5901b0935816"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Fri Jun 29 06:15:21 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jun 29 16:46:02 2012 -0700"
      },
      "message": "netlink: add netlink_kernel_cfg parameter to netlink_kernel_create\n\nThis patch adds the following structure:\n\nstruct netlink_kernel_cfg {\n        unsigned int    groups;\n        void            (*input)(struct sk_buff *skb);\n        struct mutex    *cb_mutex;\n};\n\nThat can be passed to netlink_kernel_create to set optional configurations\nfor netlink kernel sockets.\n\nI\u0027ve populated this structure by looking for NULL and zero parameters at the\nexisting code. The remaining parameters that always need to be set are still\nleft in the original interface.\n\nThat includes optional parameters for the netlink socket creation. This allows\neasy extensibility of this interface in the future.\n\nThis patch also adapts all callers to use this new interface.\n\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "06eb4eafbdc0796d741d139a44f1253278da8611",
      "tree": "fbdb44317130c371928154c9e6903e699fe2b995",
      "parents": [
        "32ed53b83ea5ec26a4dba90e18f5e0ff6c71eb48",
        "f68e556e23d1a4176b563bcb25d8baf2c5313f91"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 10 14:30:45 2012 -0400"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 10 14:30:45 2012 -0400"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net\n"
    },
    {
      "commit": "6662df33f85b87bb29f2ecad124efe7bb2c08e05",
      "tree": "13c8ac420b8d10ec3a7aa9aa7fdaa221e430c9cc",
      "parents": [
        "b21dddb9dfe50ca1e205faf4b25900895494d25b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 01 20:19:05 2012 -0400"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 02 04:33:42 2012 -0400"
      },
      "message": "crypto: Stop using NLA_PUT*().\n\nThese macros contain a hidden goto, and are thus extremely error\nprone and make code hard to audit.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5219a5342ab13650ae0f0c62319407268c48d0ab",
      "tree": "42f49976ca15418e512bc172e2b4b08c86b2008a",
      "parents": [
        "1e1229940045a537c61fb69f86010a8774e576d0"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Thu Mar 29 09:04:46 2012 +0200"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Mar 29 19:52:48 2012 +0800"
      },
      "message": "crypto: user - Fix size of netlink dump message\n\nThe default netlink message size limit might be exceeded when dumping a\nlot of algorithms to userspace. As a result, not all of the instantiated\nalgorithms dumped to userspace. So calculate an upper bound on the message\nsize and call netlink_dump_start() with that value.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "1e1229940045a537c61fb69f86010a8774e576d0",
      "tree": "3a594eef2d1cda7e49f7b62f70853d6f6a021d61",
      "parents": [
        "fbf0ca1bf852fe224cec5400a69cd755ddc4ddcb"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Thu Mar 29 09:03:47 2012 +0200"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Mar 29 19:52:47 2012 +0800"
      },
      "message": "crypto: user - Fix lookup of algorithms with IV generator\n\nWe lookup algorithms with crypto_alg_mod_lookup() when instantiating via\ncrypto_add_alg(). However, algorithms that are wrapped by an IV genearator\n(e.g. aead or genicv type algorithms) need special care. The userspace\nprocess hangs until it gets a timeout when we use crypto_alg_mod_lookup()\nto lookup these algorithms. So export the lookup functions for these\nalgorithms and use them in crypto_add_alg().\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "b8716614a7cc2fc15ea2a518edd04755fb08d922",
      "tree": "2a8a5d04066b2bd589ba2ebbeb228e2a6a178ec9",
      "parents": [
        "31f6765266417c0d99f0e922fe82848a7c9c2ae9",
        "2dc9b5dbdef09840de852a4f0cc6a9c9eece7220"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 21 13:20:43 2012 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 21 13:20:43 2012 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6\n\nPull crypto update from Herbert Xu:\n \"* sha512 bug fixes (already in your tree).\n  * SHA224/SHA384 AEAD support in caam.\n  * X86-64 optimised version of Camellia.\n  * Tegra AES support.\n  * Bulk algorithm registration interface to make driver registration easier.\n  * padata race fixes.\n  * Misc fixes.\"\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (31 commits)\n  padata: Fix race on sequence number wrap\n  padata: Fix race in the serialization path\n  crypto: camellia - add assembler implementation for x86_64\n  crypto: camellia - rename camellia.c to camellia_generic.c\n  crypto: camellia - fix checkpatch warnings\n  crypto: camellia - rename camellia module to camellia_generic\n  crypto: tcrypt - add more camellia tests\n  crypto: testmgr - add more camellia test vectors\n  crypto: camellia - simplify key setup and CAMELLIA_ROUNDSM macro\n  crypto: twofish-x86_64/i586 - set alignmask to zero\n  crypto: blowfish-x86_64 - set alignmask to zero\n  crypto: serpent-sse2 - combine ablk_*_init functions\n  crypto: blowfish-x86_64 - use crypto_[un]register_algs\n  crypto: twofish-x86_64-3way - use crypto_[un]register_algs\n  crypto: serpent-sse2 - use crypto_[un]register_algs\n  crypto: serpent-sse2 - remove dead code from serpent_sse2_glue.c::serpent_sse2_init()\n  crypto: twofish-x86 - Remove dead code from twofish_glue_3way.c::init()\n  crypto: In crypto_add_alg(), \u0027exact\u0027 wants to be initialized to 0\n  crypto: caam - fix gcc 4.6 warning\n  crypto: Add bulk algorithm registration interface\n  ...\n"
    },
    {
      "commit": "80d326fab534a5380e8f6e509a0b9076655a9670",
      "tree": "57c636de934b3f8abb7db9bcde64360ecc4eaf66",
      "parents": [
        "48e316bc2e045206248c6c75c0d5bbc0c9ddc32c"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Fri Feb 24 14:30:15 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 26 14:10:06 2012 -0500"
      },
      "message": "netlink: add netlink_dump_control structure for netlink_dump_start()\n\nDavem considers that the argument list of this interface is getting\nout of control. This patch tries to address this issue following\nhis proposal:\n\nstruct netlink_dump_control c \u003d { .dump \u003d dump, .done \u003d done, ... };\n\nnetlink_dump_start(..., \u0026c);\n\nSuggested by David S. Miller.\n\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0cfdec7a65c98de6637e547a04a33969dc9c61b1",
      "tree": "052e9b64882142a535e009f647235dadb0d9f1de",
      "parents": [
        "65a4a573b74f8f27e33a99c21a5a5d2fc4d82a1a"
      ],
      "author": {
        "name": "Jesper Juhl",
        "email": "jj@chaosbits.net",
        "time": "Sun Jan 29 23:39:22 2012 +0100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Feb 05 15:12:25 2012 +1100"
      },
      "message": "crypto: In crypto_add_alg(), \u0027exact\u0027 wants to be initialized to 0\n\nWe declare \u0027exact\u0027 without initializing it and then do:\n\n[...]\n\tif (strlen(p-\u003ecru_driver_name))\n\t\texact \u003d 1;\n\n\tif (priority \u0026\u0026 !exact)\n\t\treturn -EINVAL;\n\n[...]\n\nIf the first \u0027if\u0027 is not true, then the second will test an\nuninitialized \u0027exact\u0027.\nAs far as I can tell, what we want is for \u0027exact\u0027 to be initialized to\n0 (zero/false).\n\nSigned-off-by: Jesper Juhl \u003cjj@chaosbits.net\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "c49c41a4134679cecb77362e7f6b59acb6320aa7",
      "tree": "45e690c036ca5846a48c8be67945d1d841b2d96d",
      "parents": [
        "892d208bcf79e4e1058707786a7b6d486697cd78",
        "f423e5ba76e7e4a6fcb4836b4f072d1fdebba8b5"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Jan 14 18:36:33 2012 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Jan 14 18:36:33 2012 -0800"
      },
      "message": "Merge branch \u0027for-linus\u0027 of git://selinuxproject.org/~jmorris/linux-security\n\n* \u0027for-linus\u0027 of git://selinuxproject.org/~jmorris/linux-security:\n  capabilities: remove __cap_full_set definition\n  security: remove the security_netlink_recv hook as it is equivalent to capable()\n  ptrace: do not audit capability check when outputing /proc/pid/stat\n  capabilities: remove task_ns_* functions\n  capabitlies: ns_capable can use the cap helpers rather than lsm call\n  capabilities: style only - move capable below ns_capable\n  capabilites: introduce new has_ns_capabilities_noaudit\n  capabilities: call has_ns_capability from has_capability\n  capabilities: remove all _real_ interfaces\n  capabilities: introduce security_capable_noaudit\n  capabilities: reverse arguments to security_capable\n  capabilities: remove the task from capable LSM hook entirely\n  selinux: sparse fix: fix several warnings in the security server cod\n  selinux: sparse fix: fix warnings in netlink code\n  selinux: sparse fix: eliminate warnings for selinuxfs\n  selinux: sparse fix: declare selinux_disable() in security.h\n  selinux: sparse fix: move selinux_complete_init\n  selinux: sparse fix: make selinux_secmark_refcount static\n  SELinux: Fix RCU deref check warning in sel_netport_insert()\n\nManually fix up a semantic mis-merge wrt security_netlink_recv():\n\n - the interface was removed in commit fd7784615248 (\"security: remove\n   the security_netlink_recv hook as it is equivalent to capable()\")\n\n - a new user of it appeared in commit a38f7907b926 (\"crypto: Add\n   userspace configuration API\")\n\ncausing no automatic merge conflict, but Eric Paris pointed out the\nissue.\n"
    },
    {
      "commit": "4f58cb90bcb04cfe18f524d1c9a65edef5eb3f51",
      "tree": "8c686e8b736eed7258921909282c0955543c7d2f",
      "parents": [
        "e7691a1ce341c80ed9504244a36b31c025217391",
        "08c70fc3a239475122e20b7a21dfae4c264c24f7"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Jan 10 22:01:27 2012 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Jan 10 22:01:27 2012 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (54 commits)\n  crypto: gf128mul - remove leftover \"(EXPERIMENTAL)\" in Kconfig\n  crypto: serpent-sse2 - remove unneeded LRW/XTS #ifdefs\n  crypto: serpent-sse2 - select LRW and XTS\n  crypto: twofish-x86_64-3way - remove unneeded LRW/XTS #ifdefs\n  crypto: twofish-x86_64-3way - select LRW and XTS\n  crypto: xts - remove dependency on EXPERIMENTAL\n  crypto: lrw - remove dependency on EXPERIMENTAL\n  crypto: picoxcell - fix boolean and / or confusion\n  crypto: caam - remove DECO access initialization code\n  crypto: caam - fix polarity of \"propagate error\" logic\n  crypto: caam - more desc.h cleanups\n  crypto: caam - desc.h - convert spaces to tabs\n  crypto: talitos - convert talitos_error to struct device\n  crypto: talitos - remove NO_IRQ references\n  crypto: talitos - fix bad kfree\n  crypto: convert drivers/crypto/* to use module_platform_driver()\n  char: hw_random: convert drivers/char/hw_random/* to use module_platform_driver()\n  crypto: serpent-sse2 - should select CRYPTO_CRYPTD\n  crypto: serpent - rename serpent.c to serpent_generic.c\n  crypto: serpent - cleanup checkpatch errors and warnings\n  ...\n"
    },
    {
      "commit": "ce3fd840f588d85a8c1be651cf90fa1ba1f029e9",
      "tree": "d113057ca46784cfa34380ab44f73dde76bda1fd",
      "parents": [
        "505172e11f5a0d9916e20e40d3b0a6f87d3a59b6"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Nov 08 10:09:17 2011 +0100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Nov 09 12:04:06 2011 +0800"
      },
      "message": "crypto: Unlink and free instances when deleted\n\nWe leak the crypto instance when we unregister an instance with\ncrypto_del_alg(). Therefore we introduce crypto_unregister_instance()\nto unlink the crypto instance from the template\u0027s instances list and\nto free the recources of the instance properly.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "fb223c32b4d3ee593c8dce07e983680d06abe387",
      "tree": "80b88c2adde46fdd5608989929d54bddf38b513a",
      "parents": [
        "5db017aa2809c49ca0a43b0f3ed1267e6be60883"
      ],
      "author": {
        "name": "Jonathan Corbet",
        "email": "corbet@lwn.net",
        "time": "Wed Nov 02 09:15:16 2011 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Nov 02 09:15:16 2011 +1100"
      },
      "message": "crypto: user - Fix rwsem leak in crypto_user\n\nThe list_empty case in crypto_alg_match() will return without calling\nup_read() on crypto_alg_sem.  We could do the \"goto out\" routine, but the\nfunction will clearly do the right thing with that test simply removed.\n\nSigned-off-by: Jonathan Corbet \u003ccorbet@lwn.net\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "e6ea64ece7f4c14294b2fce5403b1e71eab87f1e",
      "tree": "201a204bcd707608ae23ebe2ac90b4fe1b403f83",
      "parents": [
        "573da6208a7e2b2d8666b8b02f5054d3a4e12998"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Oct 21 14:37:10 2011 +0200"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Oct 21 14:37:10 2011 +0200"
      },
      "message": "crypto: user - Initialise match in crypto_alg_match\n\nWe need to default match to 0 as otherwise it may lead to a false\npositive.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "540b97c1dd9ee68112269be322d901f1edc1a282",
      "tree": "7be73eb907c50a11e1fe1a70d33694a4960a5960",
      "parents": [
        "07a5fa4abd8b6965d4585d3b110f89bdf5612aff"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Sep 27 07:48:48 2011 +0200"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Oct 21 14:24:12 2011 +0200"
      },
      "message": "crypto: Add userspace report for compress type algorithms\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "07a5fa4abd8b6965d4585d3b110f89bdf5612aff",
      "tree": "fdd378f220df032be3db1dbbc6622ddc13080a5f",
      "parents": [
        "792608e9c215141fa4b870b7b2a23767a1ef12f4"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Sep 27 07:48:01 2011 +0200"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Oct 21 14:24:07 2011 +0200"
      },
      "message": "crypto: Add userspace report for cipher type algorithms\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "6c5a86f529a9e9ca4c9aca5fa477e9557d4a3d3d",
      "tree": "e9909c4d97dd6b697cfb7f70cac8c514a72b94a4",
      "parents": [
        "b6aa63c09ba3b150a1030f9c95c7647361e7910e"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Sep 27 07:25:05 2011 +0200"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Oct 21 14:24:04 2011 +0200"
      },
      "message": "crypto: Add userspace report for larval type algorithms\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "b6aa63c09ba3b150a1030f9c95c7647361e7910e",
      "tree": "26f90dcea8e95a5f8a81c53695ce46a60b192ffa",
      "parents": [
        "a38f7907b926e4c6c7d389ad96cc38cec2e5a9e9"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Sep 27 07:24:29 2011 +0200"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Oct 21 14:24:03 2011 +0200"
      },
      "message": "crypto: Add a report function pointer to crypto_type\n\nWe add a report function pointer to struct crypto_type. This function\npointer is used from the crypto userspace configuration API to report\ncrypto algorithms to userspace.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "a38f7907b926e4c6c7d389ad96cc38cec2e5a9e9",
      "tree": "b8b5735b794a5ba98b8dd05ba0c87d3c09971a67",
      "parents": [
        "22e5b20be72e2e166c3ba915b01a59a8eb2dc71f"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Sep 27 07:23:50 2011 +0200"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Oct 21 14:24:03 2011 +0200"
      },
      "message": "crypto: Add userspace configuration API\n\nThis patch adds a basic userspace configuration API for the crypto layer.\nWith this it is possible to instantiate, remove and to show crypto\nalgorithms from userspace.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    }
  ]
}
