Hi Linus: This push fixes the following issues: * A regression caused by the conversion of IPsec ESP to the new AEAD interface: ESN with authencesn no longer works because it relied on the AD input SG list having a specific layout which is no longer the case. In linux-next authencesn is fixed properly and no longer assumes anything about the SG list format. While for this release a minimal fix is applied to authencesn so that it works with the new linear layout. * Fix memory corruption caused by bogus index in the caam hash code. * Fix powerpc nx SHA hashing which could cause module load failures if module signature verification is enabled. Please pull from git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git Herbert Xu (1): crypto: authencesn - Fix breakage with new ESP code Horia Geant? (1): crypto: caam - fix memory corruption in ahash_final_ctx Jan Stancek (1): crypto: nx - respect sg limit bounds when building sg lists for SHA crypto/authencesn.c | 44 +++++++++++----------------------------- drivers/crypto/caam/caamhash.c | 7 ++++--- drivers/crypto/nx/nx-sha256.c | 27 ++++++++++++++---------- drivers/crypto/nx/nx-sha512.c | 28 ++++++++++++++----------- 4 files changed, 48 insertions(+), 58 deletions(-) Thanks, -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html