xref: /openbmc/linux/arch/arm/crypto/Kconfig (revision f3539c12)
1
2menuconfig ARM_CRYPTO
3	bool "ARM Accelerated Cryptographic Algorithms"
4	depends on ARM
5	help
6	  Say Y here to choose from a selection of cryptographic algorithms
7	  implemented using ARM specific CPU features or instructions.
8
9if ARM_CRYPTO
10
11config CRYPTO_SHA1_ARM
12	tristate "SHA1 digest algorithm (ARM-asm)"
13	select CRYPTO_SHA1
14	select CRYPTO_HASH
15	help
16	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
17	  using optimized ARM assembler.
18
19config CRYPTO_SHA1_ARM_NEON
20	tristate "SHA1 digest algorithm (ARM NEON)"
21	depends on KERNEL_MODE_NEON
22	select CRYPTO_SHA1_ARM
23	select CRYPTO_SHA1
24	select CRYPTO_HASH
25	help
26	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
27	  using optimized ARM NEON assembly, when NEON instructions are
28	  available.
29
30config CRYPTO_SHA1_ARM_CE
31	tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)"
32	depends on KERNEL_MODE_NEON
33	select CRYPTO_SHA1_ARM
34	select CRYPTO_HASH
35	help
36	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
37	  using special ARMv8 Crypto Extensions.
38
39config CRYPTO_SHA2_ARM_CE
40	tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)"
41	depends on KERNEL_MODE_NEON
42	select CRYPTO_SHA256_ARM
43	select CRYPTO_HASH
44	help
45	  SHA-256 secure hash standard (DFIPS 180-2) implemented
46	  using special ARMv8 Crypto Extensions.
47
48config CRYPTO_SHA256_ARM
49	tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)"
50	select CRYPTO_HASH
51	depends on !CPU_V7M
52	help
53	  SHA-256 secure hash standard (DFIPS 180-2) implemented
54	  using optimized ARM assembler and NEON, when available.
55
56config CRYPTO_SHA512_ARM
57	tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)"
58	select CRYPTO_HASH
59	depends on !CPU_V7M
60	help
61	  SHA-512 secure hash standard (DFIPS 180-2) implemented
62	  using optimized ARM assembler and NEON, when available.
63
64config CRYPTO_AES_ARM
65	tristate "AES cipher algorithms (ARM-asm)"
66	depends on ARM
67	select CRYPTO_ALGAPI
68	select CRYPTO_AES
69	help
70	  Use optimized AES assembler routines for ARM platforms.
71
72	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
73	  algorithm.
74
75	  Rijndael appears to be consistently a very good performer in
76	  both hardware and software across a wide range of computing
77	  environments regardless of its use in feedback or non-feedback
78	  modes. Its key setup time is excellent, and its key agility is
79	  good. Rijndael's very low memory requirements make it very well
80	  suited for restricted-space environments, in which it also
81	  demonstrates excellent performance. Rijndael's operations are
82	  among the easiest to defend against power and timing attacks.
83
84	  The AES specifies three key sizes: 128, 192 and 256 bits
85
86	  See <http://csrc.nist.gov/encryption/aes/> for more information.
87
88config CRYPTO_AES_ARM_BS
89	tristate "Bit sliced AES using NEON instructions"
90	depends on KERNEL_MODE_NEON
91	select CRYPTO_ALGAPI
92	select CRYPTO_AES_ARM
93	select CRYPTO_ABLK_HELPER
94	help
95	  Use a faster and more secure NEON based implementation of AES in CBC,
96	  CTR and XTS modes
97
98	  Bit sliced AES gives around 45% speedup on Cortex-A15 for CTR mode
99	  and for XTS mode encryption, CBC and XTS mode decryption speedup is
100	  around 25%. (CBC encryption speed is not affected by this driver.)
101	  This implementation does not rely on any lookup tables so it is
102	  believed to be invulnerable to cache timing attacks.
103
104config CRYPTO_AES_ARM_CE
105	tristate "Accelerated AES using ARMv8 Crypto Extensions"
106	depends on KERNEL_MODE_NEON
107	select CRYPTO_ALGAPI
108	select CRYPTO_ABLK_HELPER
109	help
110	  Use an implementation of AES in CBC, CTR and XTS modes that uses
111	  ARMv8 Crypto Extensions
112
113config CRYPTO_GHASH_ARM_CE
114	tristate "PMULL-accelerated GHASH using ARMv8 Crypto Extensions"
115	depends on KERNEL_MODE_NEON
116	select CRYPTO_HASH
117	select CRYPTO_CRYPTD
118	help
119	  Use an implementation of GHASH (used by the GCM AEAD chaining mode)
120	  that uses the 64x64 to 128 bit polynomial multiplication (vmull.p64)
121	  that is part of the ARMv8 Crypto Extensions
122
123endif
124