Hi Linus: This push fixes the following issues: - Incorrect output buffer size calculation in rsa-pkcs1pad. - Uninitialised padding bytes on exported state in ccp driver. - Potentially freed pointer used on completion callback in sha1-mb. Please pull from git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus Tadeusz Struk (1): crypto: rsa-pkcs1pad - fix dst len Tom Lendacky (1): crypto: ccp - Prevent information leakage on export Xiaodong Liu (1): crypto: sha1-mb - use corrcet pointer while completing jobs arch/x86/crypto/sha-mb/sha1_mb.c | 4 ++-- crypto/rsa-pkcs1pad.c | 12 ++++++------ drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 3 +++ drivers/crypto/ccp/ccp-crypto-sha.c | 3 +++ 4 files changed, 14 insertions(+), 8 deletions(-) Thanks, -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html