Hi Linus:
This push fixes the following issues:
- Zero-length DMA mapping in caam.
- Illegalling mapping stack memory for DMA in talitos.
- Use after free in cavium/nitrox.
- Key parsing in authenc.
- Undefined shift in sm3.
- Bogus completion call in authencesn.
- SHA support detection in caam.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Aymen Sghaier (1):
crypto: caam - fix zero-length buffer DMA mapping
Christophe Leroy (2):
crypto: talitos - reorder code in talitos_edesc_alloc()
crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
Dan Carpenter (1):
crypto: cavium/nitrox - Use after free in process_response_list()
Eric Biggers (5):
crypto: authenc - fix parsing key with misaligned rta_len
crypto: bcm - convert to use crypto_authenc_extractkeys()
crypto: ccree - convert to use crypto_authenc_extractkeys()
crypto: adiantum - initialize crypto_spawn::inst
crypto: sm3 - fix undefined shift by >= width of value
Harsh Jain (1):
crypto: authencesn - Avoid twice completion call in decrypt path
Horia Geantă (1):
crypto: caam - fix SHA support detection
Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt