Hi Linus: This push fixes the following issues: - Zero-length DMA mapping in caam. - Illegalling mapping stack memory for DMA in talitos. - Use after free in cavium/nitrox. - Key parsing in authenc. - Undefined shift in sm3. - Bogus completion call in authencesn. - SHA support detection in caam. Please pull from git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus Aymen Sghaier (1): crypto: caam - fix zero-length buffer DMA mapping Christophe Leroy (2): crypto: talitos - reorder code in talitos_edesc_alloc() crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK Dan Carpenter (1): crypto: cavium/nitrox - Use after free in process_response_list() Eric Biggers (5): crypto: authenc - fix parsing key with misaligned rta_len crypto: bcm - convert to use crypto_authenc_extractkeys() crypto: ccree - convert to use crypto_authenc_extractkeys() crypto: adiantum - initialize crypto_spawn::inst crypto: sm3 - fix undefined shift by >= width of value Harsh Jain (1): crypto: authencesn - Avoid twice completion call in decrypt path Horia Geantă (1): crypto: caam - fix SHA support detection Thanks, -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt