diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2019-01-19 05:48:43 +1200 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-01-19 05:48:43 +1200 |
commit | dc6fef2cc57972d4d64d9cd6d26b81060e1db0e6 (patch) | |
tree | 88a5b30f0e23f7a94a7b3981ccf990c4cbbacc28 /samples/qmi | |
parent | 6e434bf2e36b8a111c4dea6c1d1e355ad39ec01b (diff) | |
parent | d45a90cb5d061fa7d411b974b950fe0b8bc5f265 (diff) | |
download | linux-dc6fef2cc57972d4d64d9cd6d26b81060e1db0e6.tar.bz2 |
Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Pull crypto fixes from Herbert Xu:
"This fixes the following issues:
- Zero-length DMA mapping in caam
- Invalidly mapping stack memory for DMA in talitos
- Use after free in cavium/nitrox
- Key parsing in authenc
- Undefined shift in sm3
- Bogus completion call in authencesn
- SHA support detection in caam"
* 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6:
crypto: sm3 - fix undefined shift by >= width of value
crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
crypto: talitos - reorder code in talitos_edesc_alloc()
crypto: adiantum - initialize crypto_spawn::inst
crypto: cavium/nitrox - Use after free in process_response_list()
crypto: authencesn - Avoid twice completion call in decrypt path
crypto: caam - fix SHA support detection
crypto: caam - fix zero-length buffer DMA mapping
crypto: ccree - convert to use crypto_authenc_extractkeys()
crypto: bcm - convert to use crypto_authenc_extractkeys()
crypto: authenc - fix parsing key with misaligned rta_len
Diffstat (limited to 'samples/qmi')
0 files changed, 0 insertions, 0 deletions