Hi Linus: Here is an updated to the crypto pull request for 2.6.38: * Crypto API interface for user-space (hash + skcipher) This interface is intended to provide access of kernel hardware crypto drivers to user-space applications. It presents the kernel crypto API via a socket interface. It is only meant to be used for bulk crypto operations, i.e., if you're doing less than a page's worth of data, then this is not for you. For bulk data processing the performance is similar to that in the kernel when zero-copy is used in both directions. * Memory corruption fix for via_rng. * Fixes for new OMAP driver. * 32-bit support in aesni-intel. * GCM support in aesni-intel. * Misc fixes. Please pull from git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git or master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git Adrian Hoban (1): crypto: rfc4106 - Extending the RC4106 AES-GCM test vectors Adrian-Ken Rueegsegger (1): crypto: ripemd - Set module author and update email address Dennis Gilmore (1): crypto: n2 - use __devexit not __exit in n2_unregister_algs Dmitry Kasatkin (15): crypto: omap-sham - uses digest buffer in request context crypto: omap-sham - DMA initialization fixes for off mode crypto: omap-sham - error handling improved crypto: omap-sham - removed redundunt locking crypto: omap-sham - crypto_ahash_final() now not need to be called. crypto: omap-sham - hash-in-progress is stored in hw format crypto: omap-sham - FLAGS_FIRST is redundant and removed crypto: omap-sham - zero-copy scatterlist handling crypto: omap-aes - DMA initialization fixes for OMAP off mode crypto: omap-aes - redundant locking is removed crypto: omap-aes - error handling implementation improved crypto: omap-aes - unnecessary code removed crypto: omap-aes - initialize aes module once per request crypto: omap-aes - checkpatch --file warning fixes crypto: omap-sham - backlog handling fix Herbert Xu (13): crypto: hash - Fix async import on shash algorithm net - Add AF_ALG macros crypto: af_alg - User-space interface for Crypto API crypto: algif_hash - User-space interface for hash operations crypto: algif_skcipher - User-space interface for skcipher operations crypto: algif_skcipher - Pass on error from af_alg_make_sg crypto: af_alg - Add dependency on NET crypto: algif_skcipher - Fixed overflow when sndbuf is page aligned crypto: algif_skcipher - Handle unaligned receive buffer crypto: gf128mul - Remove experimental tag hwrng: via_rng - Fix asm constraints crypto: padlock - Move padlock.h into include/crypto hwrng: via_rng - Fix memory scribbling on some CPUs Joe Perches (1): crypto: Use vzalloc Mathias Krause (2): crypto: aesni-intel - Ported implementation to x86-32 crypto: aesni-intel - Fixed build error on x86-32 Miloslav TrmaÄ (3): include: Install linux/if_alg.h for user-space crypto API net: Add missing lockdep class names for af_alg crypto: af_alg - Make sure sk_security is initialized on accept()ed sockets Nicolas Kaiser (1): crypto: cast5 - simplify if-statements Randy Dunlap (1): crypto: af_alg - fix af_alg memory_allocated data type Roel Kluin (1): crypto: mv_cesa - dont return PTR_ERR() of wrong pointer Steffen Klassert (2): crypto: scatterwalk - Add scatterwalk_crypto_chain helper crypto: Use scatterwalk_crypto_chain Tadeusz Struk (2): crypto: aesni-intel - RFC4106 AES-GCM Driver Using Intel New Instructions crypto: aesni-intel - Fixed build with binutils 2.16 Tejun Heo (1): crypto: mark crypto workqueues CPU_INTENSIVE Tracey Dent (1): crypto: Makefile clean up arch/x86/crypto/aesni-intel_asm.S | 1832 ++++++++++++++++++++++++++++++++- arch/x86/crypto/aesni-intel_glue.c | 540 ++++++++++- crypto/Kconfig | 34 +- crypto/Makefile | 17 +- crypto/af_alg.c | 483 +++++++++ crypto/algif_hash.c | 319 ++++++ crypto/algif_skcipher.c | 632 ++++++++++++ crypto/authenc.c | 22 +- crypto/cast5.c | 74 +- crypto/crypto_wq.c | 3 +- crypto/deflate.c | 3 +- crypto/eseqiv.c | 18 +- crypto/gcm.c | 19 +- crypto/pcrypt.c | 3 +- crypto/rmd128.c | 3 +- crypto/rmd160.c | 3 +- crypto/rmd256.c | 3 +- crypto/rmd320.c | 3 +- crypto/shash.c | 8 +- crypto/tcrypt.c | 11 + crypto/testmgr.c | 24 + crypto/testmgr.h | 361 +++++++ crypto/zlib.c | 3 +- drivers/char/hw_random/via-rng.c | 10 +- drivers/crypto/mv_cesa.c | 2 +- drivers/crypto/n2_core.c | 2 +- drivers/crypto/omap-aes.c | 260 +++--- drivers/crypto/omap-sham.c | 374 ++++--- drivers/crypto/padlock-aes.c | 2 +- drivers/crypto/padlock-sha.c | 8 +- include/crypto/if_alg.h | 92 ++ {drivers => include}/crypto/padlock.h | 8 +- include/crypto/scatterwalk.h | 15 + include/linux/Kbuild | 1 + include/linux/if_alg.h | 40 + include/linux/socket.h | 5 +- net/core/sock.c | 6 +- 37 files changed, 4779 insertions(+), 464 deletions(-) Thanks, -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html