Hi Linus: This push fixes the following issues: - Fix pointer size when caam is used with AArch64 boot loader on AArch32 kernel. - Fix ahash state corruption in marvell driver. - Fix buggy algif_aed tag handling. - Prevent mcryptd from being used with incompatible algorithms which can cause crashes. Please pull from git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus Horia Geantă (1): crypto: caam - fix pointer size for AArch64 boot loader, AArch32 kernel Romain Perier (2): crypto: marvell - Don't copy hash operation twice into the SRAM crypto: marvell - Don't corrupt state of an STD req for re-stepped ahash Stephan Mueller (2): crypto: algif_aead - fix AEAD tag memory handling crypto: algif_aead - fix uninitialized variable warning tim (1): crypto: mcryptd - Check mcryptd algorithm compatibility crypto/algif_aead.c | 59 ++++++++++++++++++++++++++--------------- crypto/mcryptd.c | 19 ++++++++----- drivers/crypto/caam/ctrl.c | 5 ++-- drivers/crypto/marvell/hash.c | 11 ++++---- 4 files changed, 57 insertions(+), 37 deletions(-) Thanks, -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html