Hi Linus:

This push fixes the following issues:

- Fix pointer size when caam is used with AArch64 boot loader on
  AArch32 kernel.
- Fix ahash state corruption in marvell driver.
- Fix buggy algif_aed tag handling.
- Prevent mcryptd from being used with incompatible algorithms
  which can cause crashes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Horia Geantă (1):
      crypto: caam - fix pointer size for AArch64 boot loader, AArch32 kernel

Romain Perier (2):
      crypto: marvell - Don't copy hash operation twice into the SRAM
      crypto: marvell - Don't corrupt state of an STD req for re-stepped ahash

Stephan Mueller (2):
      crypto: algif_aead - fix AEAD tag memory handling
      crypto: algif_aead - fix uninitialized variable warning

tim (1):
      crypto: mcryptd - Check mcryptd algorithm compatibility

 crypto/algif_aead.c           |   59 ++++++++++++++++++++++++++---------------
 crypto/mcryptd.c              |   19 ++++++++-----
 drivers/crypto/caam/ctrl.c    |    5 ++--
 drivers/crypto/marvell/hash.c |   11 ++++----
 4 files changed, 57 insertions(+), 37 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herb...@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

Reply via email to