xref: /openbmc/linux/crypto/Kconfig (revision 840ef8b7)
1#
2# Generic algorithms support
3#
4config XOR_BLOCKS
5	tristate
6
7#
8# async_tx api: hardware offloaded memory transfer/transform support
9#
10source "crypto/async_tx/Kconfig"
11
12#
13# Cryptographic API Configuration
14#
15menuconfig CRYPTO
16	tristate "Cryptographic API"
17	help
18	  This option provides the core Cryptographic API.
19
20if CRYPTO
21
22comment "Crypto core or helper"
23
24config CRYPTO_FIPS
25	bool "FIPS 200 compliance"
26	depends on CRYPTO_ANSI_CPRNG && !CRYPTO_MANAGER_DISABLE_TESTS
27	help
28	  This options enables the fips boot option which is
29	  required if you want to system to operate in a FIPS 200
30	  certification.  You should say no unless you know what
31	  this is.
32
33config CRYPTO_ALGAPI
34	tristate
35	select CRYPTO_ALGAPI2
36	help
37	  This option provides the API for cryptographic algorithms.
38
39config CRYPTO_ALGAPI2
40	tristate
41
42config CRYPTO_AEAD
43	tristate
44	select CRYPTO_AEAD2
45	select CRYPTO_ALGAPI
46
47config CRYPTO_AEAD2
48	tristate
49	select CRYPTO_ALGAPI2
50
51config CRYPTO_BLKCIPHER
52	tristate
53	select CRYPTO_BLKCIPHER2
54	select CRYPTO_ALGAPI
55
56config CRYPTO_BLKCIPHER2
57	tristate
58	select CRYPTO_ALGAPI2
59	select CRYPTO_RNG2
60	select CRYPTO_WORKQUEUE
61
62config CRYPTO_HASH
63	tristate
64	select CRYPTO_HASH2
65	select CRYPTO_ALGAPI
66
67config CRYPTO_HASH2
68	tristate
69	select CRYPTO_ALGAPI2
70
71config CRYPTO_RNG
72	tristate
73	select CRYPTO_RNG2
74	select CRYPTO_ALGAPI
75
76config CRYPTO_RNG2
77	tristate
78	select CRYPTO_ALGAPI2
79
80config CRYPTO_PCOMP
81	tristate
82	select CRYPTO_PCOMP2
83	select CRYPTO_ALGAPI
84
85config CRYPTO_PCOMP2
86	tristate
87	select CRYPTO_ALGAPI2
88
89config CRYPTO_MANAGER
90	tristate "Cryptographic algorithm manager"
91	select CRYPTO_MANAGER2
92	help
93	  Create default cryptographic template instantiations such as
94	  cbc(aes).
95
96config CRYPTO_MANAGER2
97	def_tristate CRYPTO_MANAGER || (CRYPTO_MANAGER!=n && CRYPTO_ALGAPI=y)
98	select CRYPTO_AEAD2
99	select CRYPTO_HASH2
100	select CRYPTO_BLKCIPHER2
101	select CRYPTO_PCOMP2
102
103config CRYPTO_USER
104	tristate "Userspace cryptographic algorithm configuration"
105	depends on NET
106	select CRYPTO_MANAGER
107	help
108	  Userspace configuration for cryptographic instantiations such as
109	  cbc(aes).
110
111config CRYPTO_MANAGER_DISABLE_TESTS
112	bool "Disable run-time self tests"
113	default y
114	depends on CRYPTO_MANAGER2
115	help
116	  Disable run-time self tests that normally take place at
117	  algorithm registration.
118
119config CRYPTO_GF128MUL
120	tristate "GF(2^128) multiplication functions"
121	help
122	  Efficient table driven implementation of multiplications in the
123	  field GF(2^128).  This is needed by some cypher modes. This
124	  option will be selected automatically if you select such a
125	  cipher mode.  Only select this option by hand if you expect to load
126	  an external module that requires these functions.
127
128config CRYPTO_NULL
129	tristate "Null algorithms"
130	select CRYPTO_ALGAPI
131	select CRYPTO_BLKCIPHER
132	select CRYPTO_HASH
133	help
134	  These are 'Null' algorithms, used by IPsec, which do nothing.
135
136config CRYPTO_PCRYPT
137	tristate "Parallel crypto engine"
138	depends on SMP
139	select PADATA
140	select CRYPTO_MANAGER
141	select CRYPTO_AEAD
142	help
143	  This converts an arbitrary crypto algorithm into a parallel
144	  algorithm that executes in kernel threads.
145
146config CRYPTO_WORKQUEUE
147       tristate
148
149config CRYPTO_CRYPTD
150	tristate "Software async crypto daemon"
151	select CRYPTO_BLKCIPHER
152	select CRYPTO_HASH
153	select CRYPTO_MANAGER
154	select CRYPTO_WORKQUEUE
155	help
156	  This is a generic software asynchronous crypto daemon that
157	  converts an arbitrary synchronous software crypto algorithm
158	  into an asynchronous algorithm that executes in a kernel thread.
159
160config CRYPTO_AUTHENC
161	tristate "Authenc support"
162	select CRYPTO_AEAD
163	select CRYPTO_BLKCIPHER
164	select CRYPTO_MANAGER
165	select CRYPTO_HASH
166	help
167	  Authenc: Combined mode wrapper for IPsec.
168	  This is required for IPSec.
169
170config CRYPTO_TEST
171	tristate "Testing module"
172	depends on m
173	select CRYPTO_MANAGER
174	help
175	  Quick & dirty crypto test module.
176
177config CRYPTO_ABLK_HELPER_X86
178	tristate
179	depends on X86
180	select CRYPTO_CRYPTD
181
182config CRYPTO_GLUE_HELPER_X86
183	tristate
184	depends on X86
185	select CRYPTO_ALGAPI
186
187comment "Authenticated Encryption with Associated Data"
188
189config CRYPTO_CCM
190	tristate "CCM support"
191	select CRYPTO_CTR
192	select CRYPTO_AEAD
193	help
194	  Support for Counter with CBC MAC. Required for IPsec.
195
196config CRYPTO_GCM
197	tristate "GCM/GMAC support"
198	select CRYPTO_CTR
199	select CRYPTO_AEAD
200	select CRYPTO_GHASH
201	help
202	  Support for Galois/Counter Mode (GCM) and Galois Message
203	  Authentication Code (GMAC). Required for IPSec.
204
205config CRYPTO_SEQIV
206	tristate "Sequence Number IV Generator"
207	select CRYPTO_AEAD
208	select CRYPTO_BLKCIPHER
209	select CRYPTO_RNG
210	help
211	  This IV generator generates an IV based on a sequence number by
212	  xoring it with a salt.  This algorithm is mainly useful for CTR
213
214comment "Block modes"
215
216config CRYPTO_CBC
217	tristate "CBC support"
218	select CRYPTO_BLKCIPHER
219	select CRYPTO_MANAGER
220	help
221	  CBC: Cipher Block Chaining mode
222	  This block cipher algorithm is required for IPSec.
223
224config CRYPTO_CTR
225	tristate "CTR support"
226	select CRYPTO_BLKCIPHER
227	select CRYPTO_SEQIV
228	select CRYPTO_MANAGER
229	help
230	  CTR: Counter mode
231	  This block cipher algorithm is required for IPSec.
232
233config CRYPTO_CTS
234	tristate "CTS support"
235	select CRYPTO_BLKCIPHER
236	help
237	  CTS: Cipher Text Stealing
238	  This is the Cipher Text Stealing mode as described by
239	  Section 8 of rfc2040 and referenced by rfc3962.
240	  (rfc3962 includes errata information in its Appendix A)
241	  This mode is required for Kerberos gss mechanism support
242	  for AES encryption.
243
244config CRYPTO_ECB
245	tristate "ECB support"
246	select CRYPTO_BLKCIPHER
247	select CRYPTO_MANAGER
248	help
249	  ECB: Electronic CodeBook mode
250	  This is the simplest block cipher algorithm.  It simply encrypts
251	  the input block by block.
252
253config CRYPTO_LRW
254	tristate "LRW support"
255	select CRYPTO_BLKCIPHER
256	select CRYPTO_MANAGER
257	select CRYPTO_GF128MUL
258	help
259	  LRW: Liskov Rivest Wagner, a tweakable, non malleable, non movable
260	  narrow block cipher mode for dm-crypt.  Use it with cipher
261	  specification string aes-lrw-benbi, the key must be 256, 320 or 384.
262	  The first 128, 192 or 256 bits in the key are used for AES and the
263	  rest is used to tie each cipher block to its logical position.
264
265config CRYPTO_PCBC
266	tristate "PCBC support"
267	select CRYPTO_BLKCIPHER
268	select CRYPTO_MANAGER
269	help
270	  PCBC: Propagating Cipher Block Chaining mode
271	  This block cipher algorithm is required for RxRPC.
272
273config CRYPTO_XTS
274	tristate "XTS support"
275	select CRYPTO_BLKCIPHER
276	select CRYPTO_MANAGER
277	select CRYPTO_GF128MUL
278	help
279	  XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain,
280	  key size 256, 384 or 512 bits. This implementation currently
281	  can't handle a sectorsize which is not a multiple of 16 bytes.
282
283comment "Hash modes"
284
285config CRYPTO_HMAC
286	tristate "HMAC support"
287	select CRYPTO_HASH
288	select CRYPTO_MANAGER
289	help
290	  HMAC: Keyed-Hashing for Message Authentication (RFC2104).
291	  This is required for IPSec.
292
293config CRYPTO_XCBC
294	tristate "XCBC support"
295	select CRYPTO_HASH
296	select CRYPTO_MANAGER
297	help
298	  XCBC: Keyed-Hashing with encryption algorithm
299		http://www.ietf.org/rfc/rfc3566.txt
300		http://csrc.nist.gov/encryption/modes/proposedmodes/
301		 xcbc-mac/xcbc-mac-spec.pdf
302
303config CRYPTO_VMAC
304	tristate "VMAC support"
305	select CRYPTO_HASH
306	select CRYPTO_MANAGER
307	help
308	  VMAC is a message authentication algorithm designed for
309	  very high speed on 64-bit architectures.
310
311	  See also:
312	  <http://fastcrypto.org/vmac>
313
314comment "Digest"
315
316config CRYPTO_CRC32C
317	tristate "CRC32c CRC algorithm"
318	select CRYPTO_HASH
319	select CRC32
320	help
321	  Castagnoli, et al Cyclic Redundancy-Check Algorithm.  Used
322	  by iSCSI for header and data digests and by others.
323	  See Castagnoli93.  Module will be crc32c.
324
325config CRYPTO_CRC32C_X86_64
326	bool
327	depends on X86 && 64BIT
328	select CRYPTO_HASH
329	help
330	  In Intel processor with SSE4.2 supported, the processor will
331	  support CRC32C calculation using hardware accelerated CRC32
332	  instruction optimized with PCLMULQDQ instruction when available.
333
334config CRYPTO_CRC32C_INTEL
335	tristate "CRC32c INTEL hardware acceleration"
336	depends on X86
337	select CRYPTO_CRC32C_X86_64 if 64BIT
338	select CRYPTO_HASH
339	help
340	  In Intel processor with SSE4.2 supported, the processor will
341	  support CRC32C implementation using hardware accelerated CRC32
342	  instruction. This option will create 'crc32c-intel' module,
343	  which will enable any routine to use the CRC32 instruction to
344	  gain performance compared with software implementation.
345	  Module will be crc32c-intel.
346
347config CRYPTO_CRC32C_SPARC64
348	tristate "CRC32c CRC algorithm (SPARC64)"
349	depends on SPARC64
350	select CRYPTO_HASH
351	select CRC32
352	help
353	  CRC32c CRC algorithm implemented using sparc64 crypto instructions,
354	  when available.
355
356config CRYPTO_CRC32
357	tristate "CRC32 CRC algorithm"
358	select CRYPTO_HASH
359	select CRC32
360	help
361	  CRC-32-IEEE 802.3 cyclic redundancy-check algorithm.
362	  Shash crypto api wrappers to crc32_le function.
363
364config CRYPTO_CRC32_PCLMUL
365	tristate "CRC32 PCLMULQDQ hardware acceleration"
366	depends on X86
367	select CRYPTO_HASH
368	select CRC32
369	help
370	  From Intel Westmere and AMD Bulldozer processor with SSE4.2
371	  and PCLMULQDQ supported, the processor will support
372	  CRC32 PCLMULQDQ implementation using hardware accelerated PCLMULQDQ
373	  instruction. This option will create 'crc32-plcmul' module,
374	  which will enable any routine to use the CRC-32-IEEE 802.3 checksum
375	  and gain better performance as compared with the table implementation.
376
377config CRYPTO_GHASH
378	tristate "GHASH digest algorithm"
379	select CRYPTO_GF128MUL
380	help
381	  GHASH is message digest algorithm for GCM (Galois/Counter Mode).
382
383config CRYPTO_MD4
384	tristate "MD4 digest algorithm"
385	select CRYPTO_HASH
386	help
387	  MD4 message digest algorithm (RFC1320).
388
389config CRYPTO_MD5
390	tristate "MD5 digest algorithm"
391	select CRYPTO_HASH
392	help
393	  MD5 message digest algorithm (RFC1321).
394
395config CRYPTO_MD5_SPARC64
396	tristate "MD5 digest algorithm (SPARC64)"
397	depends on SPARC64
398	select CRYPTO_MD5
399	select CRYPTO_HASH
400	help
401	  MD5 message digest algorithm (RFC1321) implemented
402	  using sparc64 crypto instructions, when available.
403
404config CRYPTO_MICHAEL_MIC
405	tristate "Michael MIC keyed digest algorithm"
406	select CRYPTO_HASH
407	help
408	  Michael MIC is used for message integrity protection in TKIP
409	  (IEEE 802.11i). This algorithm is required for TKIP, but it
410	  should not be used for other purposes because of the weakness
411	  of the algorithm.
412
413config CRYPTO_RMD128
414	tristate "RIPEMD-128 digest algorithm"
415	select CRYPTO_HASH
416	help
417	  RIPEMD-128 (ISO/IEC 10118-3:2004).
418
419	  RIPEMD-128 is a 128-bit cryptographic hash function. It should only
420	  be used as a secure replacement for RIPEMD. For other use cases,
421	  RIPEMD-160 should be used.
422
423	  Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
424	  See <http://homes.esat.kuleuven.be/~bosselae/ripemd160.html>
425
426config CRYPTO_RMD160
427	tristate "RIPEMD-160 digest algorithm"
428	select CRYPTO_HASH
429	help
430	  RIPEMD-160 (ISO/IEC 10118-3:2004).
431
432	  RIPEMD-160 is a 160-bit cryptographic hash function. It is intended
433	  to be used as a secure replacement for the 128-bit hash functions
434	  MD4, MD5 and it's predecessor RIPEMD
435	  (not to be confused with RIPEMD-128).
436
437	  It's speed is comparable to SHA1 and there are no known attacks
438	  against RIPEMD-160.
439
440	  Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
441	  See <http://homes.esat.kuleuven.be/~bosselae/ripemd160.html>
442
443config CRYPTO_RMD256
444	tristate "RIPEMD-256 digest algorithm"
445	select CRYPTO_HASH
446	help
447	  RIPEMD-256 is an optional extension of RIPEMD-128 with a
448	  256 bit hash. It is intended for applications that require
449	  longer hash-results, without needing a larger security level
450	  (than RIPEMD-128).
451
452	  Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
453	  See <http://homes.esat.kuleuven.be/~bosselae/ripemd160.html>
454
455config CRYPTO_RMD320
456	tristate "RIPEMD-320 digest algorithm"
457	select CRYPTO_HASH
458	help
459	  RIPEMD-320 is an optional extension of RIPEMD-160 with a
460	  320 bit hash. It is intended for applications that require
461	  longer hash-results, without needing a larger security level
462	  (than RIPEMD-160).
463
464	  Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
465	  See <http://homes.esat.kuleuven.be/~bosselae/ripemd160.html>
466
467config CRYPTO_SHA1
468	tristate "SHA1 digest algorithm"
469	select CRYPTO_HASH
470	help
471	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
472
473config CRYPTO_SHA1_SSSE3
474	tristate "SHA1 digest algorithm (SSSE3/AVX)"
475	depends on X86 && 64BIT
476	select CRYPTO_SHA1
477	select CRYPTO_HASH
478	help
479	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
480	  using Supplemental SSE3 (SSSE3) instructions or Advanced Vector
481	  Extensions (AVX), when available.
482
483config CRYPTO_SHA1_SPARC64
484	tristate "SHA1 digest algorithm (SPARC64)"
485	depends on SPARC64
486	select CRYPTO_SHA1
487	select CRYPTO_HASH
488	help
489	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
490	  using sparc64 crypto instructions, when available.
491
492config CRYPTO_SHA1_ARM
493	tristate "SHA1 digest algorithm (ARM-asm)"
494	depends on ARM
495	select CRYPTO_SHA1
496	select CRYPTO_HASH
497	help
498	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
499	  using optimized ARM assembler.
500
501config CRYPTO_SHA1_PPC
502	tristate "SHA1 digest algorithm (powerpc)"
503	depends on PPC
504	help
505	  This is the powerpc hardware accelerated implementation of the
506	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
507
508config CRYPTO_SHA256
509	tristate "SHA224 and SHA256 digest algorithm"
510	select CRYPTO_HASH
511	help
512	  SHA256 secure hash standard (DFIPS 180-2).
513
514	  This version of SHA implements a 256 bit hash with 128 bits of
515	  security against collision attacks.
516
517	  This code also includes SHA-224, a 224 bit hash with 112 bits
518	  of security against collision attacks.
519
520config CRYPTO_SHA256_SPARC64
521	tristate "SHA224 and SHA256 digest algorithm (SPARC64)"
522	depends on SPARC64
523	select CRYPTO_SHA256
524	select CRYPTO_HASH
525	help
526	  SHA-256 secure hash standard (DFIPS 180-2) implemented
527	  using sparc64 crypto instructions, when available.
528
529config CRYPTO_SHA512
530	tristate "SHA384 and SHA512 digest algorithms"
531	select CRYPTO_HASH
532	help
533	  SHA512 secure hash standard (DFIPS 180-2).
534
535	  This version of SHA implements a 512 bit hash with 256 bits of
536	  security against collision attacks.
537
538	  This code also includes SHA-384, a 384 bit hash with 192 bits
539	  of security against collision attacks.
540
541config CRYPTO_SHA512_SPARC64
542	tristate "SHA384 and SHA512 digest algorithm (SPARC64)"
543	depends on SPARC64
544	select CRYPTO_SHA512
545	select CRYPTO_HASH
546	help
547	  SHA-512 secure hash standard (DFIPS 180-2) implemented
548	  using sparc64 crypto instructions, when available.
549
550config CRYPTO_TGR192
551	tristate "Tiger digest algorithms"
552	select CRYPTO_HASH
553	help
554	  Tiger hash algorithm 192, 160 and 128-bit hashes
555
556	  Tiger is a hash function optimized for 64-bit processors while
557	  still having decent performance on 32-bit processors.
558	  Tiger was developed by Ross Anderson and Eli Biham.
559
560	  See also:
561	  <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>.
562
563config CRYPTO_WP512
564	tristate "Whirlpool digest algorithms"
565	select CRYPTO_HASH
566	help
567	  Whirlpool hash algorithm 512, 384 and 256-bit hashes
568
569	  Whirlpool-512 is part of the NESSIE cryptographic primitives.
570	  Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
571
572	  See also:
573	  <http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html>
574
575config CRYPTO_GHASH_CLMUL_NI_INTEL
576	tristate "GHASH digest algorithm (CLMUL-NI accelerated)"
577	depends on X86 && 64BIT
578	select CRYPTO_CRYPTD
579	help
580	  GHASH is message digest algorithm for GCM (Galois/Counter Mode).
581	  The implementation is accelerated by CLMUL-NI of Intel.
582
583comment "Ciphers"
584
585config CRYPTO_AES
586	tristate "AES cipher algorithms"
587	select CRYPTO_ALGAPI
588	help
589	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
590	  algorithm.
591
592	  Rijndael appears to be consistently a very good performer in
593	  both hardware and software across a wide range of computing
594	  environments regardless of its use in feedback or non-feedback
595	  modes. Its key setup time is excellent, and its key agility is
596	  good. Rijndael's very low memory requirements make it very well
597	  suited for restricted-space environments, in which it also
598	  demonstrates excellent performance. Rijndael's operations are
599	  among the easiest to defend against power and timing attacks.
600
601	  The AES specifies three key sizes: 128, 192 and 256 bits
602
603	  See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
604
605config CRYPTO_AES_586
606	tristate "AES cipher algorithms (i586)"
607	depends on (X86 || UML_X86) && !64BIT
608	select CRYPTO_ALGAPI
609	select CRYPTO_AES
610	help
611	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
612	  algorithm.
613
614	  Rijndael appears to be consistently a very good performer in
615	  both hardware and software across a wide range of computing
616	  environments regardless of its use in feedback or non-feedback
617	  modes. Its key setup time is excellent, and its key agility is
618	  good. Rijndael's very low memory requirements make it very well
619	  suited for restricted-space environments, in which it also
620	  demonstrates excellent performance. Rijndael's operations are
621	  among the easiest to defend against power and timing attacks.
622
623	  The AES specifies three key sizes: 128, 192 and 256 bits
624
625	  See <http://csrc.nist.gov/encryption/aes/> for more information.
626
627config CRYPTO_AES_X86_64
628	tristate "AES cipher algorithms (x86_64)"
629	depends on (X86 || UML_X86) && 64BIT
630	select CRYPTO_ALGAPI
631	select CRYPTO_AES
632	help
633	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
634	  algorithm.
635
636	  Rijndael appears to be consistently a very good performer in
637	  both hardware and software across a wide range of computing
638	  environments regardless of its use in feedback or non-feedback
639	  modes. Its key setup time is excellent, and its key agility is
640	  good. Rijndael's very low memory requirements make it very well
641	  suited for restricted-space environments, in which it also
642	  demonstrates excellent performance. Rijndael's operations are
643	  among the easiest to defend against power and timing attacks.
644
645	  The AES specifies three key sizes: 128, 192 and 256 bits
646
647	  See <http://csrc.nist.gov/encryption/aes/> for more information.
648
649config CRYPTO_AES_NI_INTEL
650	tristate "AES cipher algorithms (AES-NI)"
651	depends on X86
652	select CRYPTO_AES_X86_64 if 64BIT
653	select CRYPTO_AES_586 if !64BIT
654	select CRYPTO_CRYPTD
655	select CRYPTO_ABLK_HELPER_X86
656	select CRYPTO_ALGAPI
657	select CRYPTO_LRW
658	select CRYPTO_XTS
659	help
660	  Use Intel AES-NI instructions for AES algorithm.
661
662	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
663	  algorithm.
664
665	  Rijndael appears to be consistently a very good performer in
666	  both hardware and software across a wide range of computing
667	  environments regardless of its use in feedback or non-feedback
668	  modes. Its key setup time is excellent, and its key agility is
669	  good. Rijndael's very low memory requirements make it very well
670	  suited for restricted-space environments, in which it also
671	  demonstrates excellent performance. Rijndael's operations are
672	  among the easiest to defend against power and timing attacks.
673
674	  The AES specifies three key sizes: 128, 192 and 256 bits
675
676	  See <http://csrc.nist.gov/encryption/aes/> for more information.
677
678	  In addition to AES cipher algorithm support, the acceleration
679	  for some popular block cipher mode is supported too, including
680	  ECB, CBC, LRW, PCBC, XTS. The 64 bit version has additional
681	  acceleration for CTR.
682
683config CRYPTO_AES_SPARC64
684	tristate "AES cipher algorithms (SPARC64)"
685	depends on SPARC64
686	select CRYPTO_CRYPTD
687	select CRYPTO_ALGAPI
688	help
689	  Use SPARC64 crypto opcodes for AES algorithm.
690
691	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
692	  algorithm.
693
694	  Rijndael appears to be consistently a very good performer in
695	  both hardware and software across a wide range of computing
696	  environments regardless of its use in feedback or non-feedback
697	  modes. Its key setup time is excellent, and its key agility is
698	  good. Rijndael's very low memory requirements make it very well
699	  suited for restricted-space environments, in which it also
700	  demonstrates excellent performance. Rijndael's operations are
701	  among the easiest to defend against power and timing attacks.
702
703	  The AES specifies three key sizes: 128, 192 and 256 bits
704
705	  See <http://csrc.nist.gov/encryption/aes/> for more information.
706
707	  In addition to AES cipher algorithm support, the acceleration
708	  for some popular block cipher mode is supported too, including
709	  ECB and CBC.
710
711config CRYPTO_AES_ARM
712	tristate "AES cipher algorithms (ARM-asm)"
713	depends on ARM
714	select CRYPTO_ALGAPI
715	select CRYPTO_AES
716	help
717	  Use optimized AES assembler routines for ARM platforms.
718
719	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
720	  algorithm.
721
722	  Rijndael appears to be consistently a very good performer in
723	  both hardware and software across a wide range of computing
724	  environments regardless of its use in feedback or non-feedback
725	  modes. Its key setup time is excellent, and its key agility is
726	  good. Rijndael's very low memory requirements make it very well
727	  suited for restricted-space environments, in which it also
728	  demonstrates excellent performance. Rijndael's operations are
729	  among the easiest to defend against power and timing attacks.
730
731	  The AES specifies three key sizes: 128, 192 and 256 bits
732
733	  See <http://csrc.nist.gov/encryption/aes/> for more information.
734
735config CRYPTO_ANUBIS
736	tristate "Anubis cipher algorithm"
737	select CRYPTO_ALGAPI
738	help
739	  Anubis cipher algorithm.
740
741	  Anubis is a variable key length cipher which can use keys from
742	  128 bits to 320 bits in length.  It was evaluated as a entrant
743	  in the NESSIE competition.
744
745	  See also:
746	  <https://www.cosic.esat.kuleuven.be/nessie/reports/>
747	  <http://www.larc.usp.br/~pbarreto/AnubisPage.html>
748
749config CRYPTO_ARC4
750	tristate "ARC4 cipher algorithm"
751	select CRYPTO_BLKCIPHER
752	help
753	  ARC4 cipher algorithm.
754
755	  ARC4 is a stream cipher using keys ranging from 8 bits to 2048
756	  bits in length.  This algorithm is required for driver-based
757	  WEP, but it should not be for other purposes because of the
758	  weakness of the algorithm.
759
760config CRYPTO_BLOWFISH
761	tristate "Blowfish cipher algorithm"
762	select CRYPTO_ALGAPI
763	select CRYPTO_BLOWFISH_COMMON
764	help
765	  Blowfish cipher algorithm, by Bruce Schneier.
766
767	  This is a variable key length cipher which can use keys from 32
768	  bits to 448 bits in length.  It's fast, simple and specifically
769	  designed for use on "large microprocessors".
770
771	  See also:
772	  <http://www.schneier.com/blowfish.html>
773
774config CRYPTO_BLOWFISH_COMMON
775	tristate
776	help
777	  Common parts of the Blowfish cipher algorithm shared by the
778	  generic c and the assembler implementations.
779
780	  See also:
781	  <http://www.schneier.com/blowfish.html>
782
783config CRYPTO_BLOWFISH_X86_64
784	tristate "Blowfish cipher algorithm (x86_64)"
785	depends on X86 && 64BIT
786	select CRYPTO_ALGAPI
787	select CRYPTO_BLOWFISH_COMMON
788	help
789	  Blowfish cipher algorithm (x86_64), by Bruce Schneier.
790
791	  This is a variable key length cipher which can use keys from 32
792	  bits to 448 bits in length.  It's fast, simple and specifically
793	  designed for use on "large microprocessors".
794
795	  See also:
796	  <http://www.schneier.com/blowfish.html>
797
798config CRYPTO_CAMELLIA
799	tristate "Camellia cipher algorithms"
800	depends on CRYPTO
801	select CRYPTO_ALGAPI
802	help
803	  Camellia cipher algorithms module.
804
805	  Camellia is a symmetric key block cipher developed jointly
806	  at NTT and Mitsubishi Electric Corporation.
807
808	  The Camellia specifies three key sizes: 128, 192 and 256 bits.
809
810	  See also:
811	  <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
812
813config CRYPTO_CAMELLIA_X86_64
814	tristate "Camellia cipher algorithm (x86_64)"
815	depends on X86 && 64BIT
816	depends on CRYPTO
817	select CRYPTO_ALGAPI
818	select CRYPTO_GLUE_HELPER_X86
819	select CRYPTO_LRW
820	select CRYPTO_XTS
821	help
822	  Camellia cipher algorithm module (x86_64).
823
824	  Camellia is a symmetric key block cipher developed jointly
825	  at NTT and Mitsubishi Electric Corporation.
826
827	  The Camellia specifies three key sizes: 128, 192 and 256 bits.
828
829	  See also:
830	  <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
831
832config CRYPTO_CAMELLIA_AESNI_AVX_X86_64
833	tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX)"
834	depends on X86 && 64BIT
835	depends on CRYPTO
836	select CRYPTO_ALGAPI
837	select CRYPTO_CRYPTD
838	select CRYPTO_ABLK_HELPER_X86
839	select CRYPTO_GLUE_HELPER_X86
840	select CRYPTO_CAMELLIA_X86_64
841	select CRYPTO_LRW
842	select CRYPTO_XTS
843	help
844	  Camellia cipher algorithm module (x86_64/AES-NI/AVX).
845
846	  Camellia is a symmetric key block cipher developed jointly
847	  at NTT and Mitsubishi Electric Corporation.
848
849	  The Camellia specifies three key sizes: 128, 192 and 256 bits.
850
851	  See also:
852	  <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
853
854config CRYPTO_CAMELLIA_SPARC64
855	tristate "Camellia cipher algorithm (SPARC64)"
856	depends on SPARC64
857	depends on CRYPTO
858	select CRYPTO_ALGAPI
859	help
860	  Camellia cipher algorithm module (SPARC64).
861
862	  Camellia is a symmetric key block cipher developed jointly
863	  at NTT and Mitsubishi Electric Corporation.
864
865	  The Camellia specifies three key sizes: 128, 192 and 256 bits.
866
867	  See also:
868	  <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
869
870config CRYPTO_CAST_COMMON
871	tristate
872	help
873	  Common parts of the CAST cipher algorithms shared by the
874	  generic c and the assembler implementations.
875
876config CRYPTO_CAST5
877	tristate "CAST5 (CAST-128) cipher algorithm"
878	select CRYPTO_ALGAPI
879	select CRYPTO_CAST_COMMON
880	help
881	  The CAST5 encryption algorithm (synonymous with CAST-128) is
882	  described in RFC2144.
883
884config CRYPTO_CAST5_AVX_X86_64
885	tristate "CAST5 (CAST-128) cipher algorithm (x86_64/AVX)"
886	depends on X86 && 64BIT
887	select CRYPTO_ALGAPI
888	select CRYPTO_CRYPTD
889	select CRYPTO_ABLK_HELPER_X86
890	select CRYPTO_CAST_COMMON
891	select CRYPTO_CAST5
892	help
893	  The CAST5 encryption algorithm (synonymous with CAST-128) is
894	  described in RFC2144.
895
896	  This module provides the Cast5 cipher algorithm that processes
897	  sixteen blocks parallel using the AVX instruction set.
898
899config CRYPTO_CAST6
900	tristate "CAST6 (CAST-256) cipher algorithm"
901	select CRYPTO_ALGAPI
902	select CRYPTO_CAST_COMMON
903	help
904	  The CAST6 encryption algorithm (synonymous with CAST-256) is
905	  described in RFC2612.
906
907config CRYPTO_CAST6_AVX_X86_64
908	tristate "CAST6 (CAST-256) cipher algorithm (x86_64/AVX)"
909	depends on X86 && 64BIT
910	select CRYPTO_ALGAPI
911	select CRYPTO_CRYPTD
912	select CRYPTO_ABLK_HELPER_X86
913	select CRYPTO_GLUE_HELPER_X86
914	select CRYPTO_CAST_COMMON
915	select CRYPTO_CAST6
916	select CRYPTO_LRW
917	select CRYPTO_XTS
918	help
919	  The CAST6 encryption algorithm (synonymous with CAST-256) is
920	  described in RFC2612.
921
922	  This module provides the Cast6 cipher algorithm that processes
923	  eight blocks parallel using the AVX instruction set.
924
925config CRYPTO_DES
926	tristate "DES and Triple DES EDE cipher algorithms"
927	select CRYPTO_ALGAPI
928	help
929	  DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
930
931config CRYPTO_DES_SPARC64
932	tristate "DES and Triple DES EDE cipher algorithms (SPARC64)"
933	depends on SPARC64
934	select CRYPTO_ALGAPI
935	select CRYPTO_DES
936	help
937	  DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3),
938	  optimized using SPARC64 crypto opcodes.
939
940config CRYPTO_FCRYPT
941	tristate "FCrypt cipher algorithm"
942	select CRYPTO_ALGAPI
943	select CRYPTO_BLKCIPHER
944	help
945	  FCrypt algorithm used by RxRPC.
946
947config CRYPTO_KHAZAD
948	tristate "Khazad cipher algorithm"
949	select CRYPTO_ALGAPI
950	help
951	  Khazad cipher algorithm.
952
953	  Khazad was a finalist in the initial NESSIE competition.  It is
954	  an algorithm optimized for 64-bit processors with good performance
955	  on 32-bit processors.  Khazad uses an 128 bit key size.
956
957	  See also:
958	  <http://www.larc.usp.br/~pbarreto/KhazadPage.html>
959
960config CRYPTO_SALSA20
961	tristate "Salsa20 stream cipher algorithm"
962	select CRYPTO_BLKCIPHER
963	help
964	  Salsa20 stream cipher algorithm.
965
966	  Salsa20 is a stream cipher submitted to eSTREAM, the ECRYPT
967	  Stream Cipher Project. See <http://www.ecrypt.eu.org/stream/>
968
969	  The Salsa20 stream cipher algorithm is designed by Daniel J.
970	  Bernstein <djb@cr.yp.to>. See <http://cr.yp.to/snuffle.html>
971
972config CRYPTO_SALSA20_586
973	tristate "Salsa20 stream cipher algorithm (i586)"
974	depends on (X86 || UML_X86) && !64BIT
975	select CRYPTO_BLKCIPHER
976	help
977	  Salsa20 stream cipher algorithm.
978
979	  Salsa20 is a stream cipher submitted to eSTREAM, the ECRYPT
980	  Stream Cipher Project. See <http://www.ecrypt.eu.org/stream/>
981
982	  The Salsa20 stream cipher algorithm is designed by Daniel J.
983	  Bernstein <djb@cr.yp.to>. See <http://cr.yp.to/snuffle.html>
984
985config CRYPTO_SALSA20_X86_64
986	tristate "Salsa20 stream cipher algorithm (x86_64)"
987	depends on (X86 || UML_X86) && 64BIT
988	select CRYPTO_BLKCIPHER
989	help
990	  Salsa20 stream cipher algorithm.
991
992	  Salsa20 is a stream cipher submitted to eSTREAM, the ECRYPT
993	  Stream Cipher Project. See <http://www.ecrypt.eu.org/stream/>
994
995	  The Salsa20 stream cipher algorithm is designed by Daniel J.
996	  Bernstein <djb@cr.yp.to>. See <http://cr.yp.to/snuffle.html>
997
998config CRYPTO_SEED
999	tristate "SEED cipher algorithm"
1000	select CRYPTO_ALGAPI
1001	help
1002	  SEED cipher algorithm (RFC4269).
1003
1004	  SEED is a 128-bit symmetric key block cipher that has been
1005	  developed by KISA (Korea Information Security Agency) as a
1006	  national standard encryption algorithm of the Republic of Korea.
1007	  It is a 16 round block cipher with the key size of 128 bit.
1008
1009	  See also:
1010	  <http://www.kisa.or.kr/kisa/seed/jsp/seed_eng.jsp>
1011
1012config CRYPTO_SERPENT
1013	tristate "Serpent cipher algorithm"
1014	select CRYPTO_ALGAPI
1015	help
1016	  Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1017
1018	  Keys are allowed to be from 0 to 256 bits in length, in steps
1019	  of 8 bits.  Also includes the 'Tnepres' algorithm, a reversed
1020	  variant of Serpent for compatibility with old kerneli.org code.
1021
1022	  See also:
1023	  <http://www.cl.cam.ac.uk/~rja14/serpent.html>
1024
1025config CRYPTO_SERPENT_SSE2_X86_64
1026	tristate "Serpent cipher algorithm (x86_64/SSE2)"
1027	depends on X86 && 64BIT
1028	select CRYPTO_ALGAPI
1029	select CRYPTO_CRYPTD
1030	select CRYPTO_ABLK_HELPER_X86
1031	select CRYPTO_GLUE_HELPER_X86
1032	select CRYPTO_SERPENT
1033	select CRYPTO_LRW
1034	select CRYPTO_XTS
1035	help
1036	  Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1037
1038	  Keys are allowed to be from 0 to 256 bits in length, in steps
1039	  of 8 bits.
1040
1041	  This module provides Serpent cipher algorithm that processes eigth
1042	  blocks parallel using SSE2 instruction set.
1043
1044	  See also:
1045	  <http://www.cl.cam.ac.uk/~rja14/serpent.html>
1046
1047config CRYPTO_SERPENT_SSE2_586
1048	tristate "Serpent cipher algorithm (i586/SSE2)"
1049	depends on X86 && !64BIT
1050	select CRYPTO_ALGAPI
1051	select CRYPTO_CRYPTD
1052	select CRYPTO_ABLK_HELPER_X86
1053	select CRYPTO_GLUE_HELPER_X86
1054	select CRYPTO_SERPENT
1055	select CRYPTO_LRW
1056	select CRYPTO_XTS
1057	help
1058	  Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1059
1060	  Keys are allowed to be from 0 to 256 bits in length, in steps
1061	  of 8 bits.
1062
1063	  This module provides Serpent cipher algorithm that processes four
1064	  blocks parallel using SSE2 instruction set.
1065
1066	  See also:
1067	  <http://www.cl.cam.ac.uk/~rja14/serpent.html>
1068
1069config CRYPTO_SERPENT_AVX_X86_64
1070	tristate "Serpent cipher algorithm (x86_64/AVX)"
1071	depends on X86 && 64BIT
1072	select CRYPTO_ALGAPI
1073	select CRYPTO_CRYPTD
1074	select CRYPTO_ABLK_HELPER_X86
1075	select CRYPTO_GLUE_HELPER_X86
1076	select CRYPTO_SERPENT
1077	select CRYPTO_LRW
1078	select CRYPTO_XTS
1079	help
1080	  Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1081
1082	  Keys are allowed to be from 0 to 256 bits in length, in steps
1083	  of 8 bits.
1084
1085	  This module provides the Serpent cipher algorithm that processes
1086	  eight blocks parallel using the AVX instruction set.
1087
1088	  See also:
1089	  <http://www.cl.cam.ac.uk/~rja14/serpent.html>
1090
1091config CRYPTO_TEA
1092	tristate "TEA, XTEA and XETA cipher algorithms"
1093	select CRYPTO_ALGAPI
1094	help
1095	  TEA cipher algorithm.
1096
1097	  Tiny Encryption Algorithm is a simple cipher that uses
1098	  many rounds for security.  It is very fast and uses
1099	  little memory.
1100
1101	  Xtendend Tiny Encryption Algorithm is a modification to
1102	  the TEA algorithm to address a potential key weakness
1103	  in the TEA algorithm.
1104
1105	  Xtendend Encryption Tiny Algorithm is a mis-implementation
1106	  of the XTEA algorithm for compatibility purposes.
1107
1108config CRYPTO_TWOFISH
1109	tristate "Twofish cipher algorithm"
1110	select CRYPTO_ALGAPI
1111	select CRYPTO_TWOFISH_COMMON
1112	help
1113	  Twofish cipher algorithm.
1114
1115	  Twofish was submitted as an AES (Advanced Encryption Standard)
1116	  candidate cipher by researchers at CounterPane Systems.  It is a
1117	  16 round block cipher supporting key sizes of 128, 192, and 256
1118	  bits.
1119
1120	  See also:
1121	  <http://www.schneier.com/twofish.html>
1122
1123config CRYPTO_TWOFISH_COMMON
1124	tristate
1125	help
1126	  Common parts of the Twofish cipher algorithm shared by the
1127	  generic c and the assembler implementations.
1128
1129config CRYPTO_TWOFISH_586
1130	tristate "Twofish cipher algorithms (i586)"
1131	depends on (X86 || UML_X86) && !64BIT
1132	select CRYPTO_ALGAPI
1133	select CRYPTO_TWOFISH_COMMON
1134	help
1135	  Twofish cipher algorithm.
1136
1137	  Twofish was submitted as an AES (Advanced Encryption Standard)
1138	  candidate cipher by researchers at CounterPane Systems.  It is a
1139	  16 round block cipher supporting key sizes of 128, 192, and 256
1140	  bits.
1141
1142	  See also:
1143	  <http://www.schneier.com/twofish.html>
1144
1145config CRYPTO_TWOFISH_X86_64
1146	tristate "Twofish cipher algorithm (x86_64)"
1147	depends on (X86 || UML_X86) && 64BIT
1148	select CRYPTO_ALGAPI
1149	select CRYPTO_TWOFISH_COMMON
1150	help
1151	  Twofish cipher algorithm (x86_64).
1152
1153	  Twofish was submitted as an AES (Advanced Encryption Standard)
1154	  candidate cipher by researchers at CounterPane Systems.  It is a
1155	  16 round block cipher supporting key sizes of 128, 192, and 256
1156	  bits.
1157
1158	  See also:
1159	  <http://www.schneier.com/twofish.html>
1160
1161config CRYPTO_TWOFISH_X86_64_3WAY
1162	tristate "Twofish cipher algorithm (x86_64, 3-way parallel)"
1163	depends on X86 && 64BIT
1164	select CRYPTO_ALGAPI
1165	select CRYPTO_TWOFISH_COMMON
1166	select CRYPTO_TWOFISH_X86_64
1167	select CRYPTO_GLUE_HELPER_X86
1168	select CRYPTO_LRW
1169	select CRYPTO_XTS
1170	help
1171	  Twofish cipher algorithm (x86_64, 3-way parallel).
1172
1173	  Twofish was submitted as an AES (Advanced Encryption Standard)
1174	  candidate cipher by researchers at CounterPane Systems.  It is a
1175	  16 round block cipher supporting key sizes of 128, 192, and 256
1176	  bits.
1177
1178	  This module provides Twofish cipher algorithm that processes three
1179	  blocks parallel, utilizing resources of out-of-order CPUs better.
1180
1181	  See also:
1182	  <http://www.schneier.com/twofish.html>
1183
1184config CRYPTO_TWOFISH_AVX_X86_64
1185	tristate "Twofish cipher algorithm (x86_64/AVX)"
1186	depends on X86 && 64BIT
1187	select CRYPTO_ALGAPI
1188	select CRYPTO_CRYPTD
1189	select CRYPTO_ABLK_HELPER_X86
1190	select CRYPTO_GLUE_HELPER_X86
1191	select CRYPTO_TWOFISH_COMMON
1192	select CRYPTO_TWOFISH_X86_64
1193	select CRYPTO_TWOFISH_X86_64_3WAY
1194	select CRYPTO_LRW
1195	select CRYPTO_XTS
1196	help
1197	  Twofish cipher algorithm (x86_64/AVX).
1198
1199	  Twofish was submitted as an AES (Advanced Encryption Standard)
1200	  candidate cipher by researchers at CounterPane Systems.  It is a
1201	  16 round block cipher supporting key sizes of 128, 192, and 256
1202	  bits.
1203
1204	  This module provides the Twofish cipher algorithm that processes
1205	  eight blocks parallel using the AVX Instruction Set.
1206
1207	  See also:
1208	  <http://www.schneier.com/twofish.html>
1209
1210comment "Compression"
1211
1212config CRYPTO_DEFLATE
1213	tristate "Deflate compression algorithm"
1214	select CRYPTO_ALGAPI
1215	select ZLIB_INFLATE
1216	select ZLIB_DEFLATE
1217	help
1218	  This is the Deflate algorithm (RFC1951), specified for use in
1219	  IPSec with the IPCOMP protocol (RFC3173, RFC2394).
1220
1221	  You will most probably want this if using IPSec.
1222
1223config CRYPTO_ZLIB
1224	tristate "Zlib compression algorithm"
1225	select CRYPTO_PCOMP
1226	select ZLIB_INFLATE
1227	select ZLIB_DEFLATE
1228	select NLATTR
1229	help
1230	  This is the zlib algorithm.
1231
1232config CRYPTO_LZO
1233	tristate "LZO compression algorithm"
1234	select CRYPTO_ALGAPI
1235	select LZO_COMPRESS
1236	select LZO_DECOMPRESS
1237	help
1238	  This is the LZO algorithm.
1239
1240config CRYPTO_842
1241	tristate "842 compression algorithm"
1242	depends on CRYPTO_DEV_NX_COMPRESS
1243	# 842 uses lzo if the hardware becomes unavailable
1244	select LZO_COMPRESS
1245	select LZO_DECOMPRESS
1246	help
1247	  This is the 842 algorithm.
1248
1249comment "Random Number Generation"
1250
1251config CRYPTO_ANSI_CPRNG
1252	tristate "Pseudo Random Number Generation for Cryptographic modules"
1253	default m
1254	select CRYPTO_AES
1255	select CRYPTO_RNG
1256	help
1257	  This option enables the generic pseudo random number generator
1258	  for cryptographic modules.  Uses the Algorithm specified in
1259	  ANSI X9.31 A.2.4. Note that this option must be enabled if
1260	  CRYPTO_FIPS is selected
1261
1262config CRYPTO_USER_API
1263	tristate
1264
1265config CRYPTO_USER_API_HASH
1266	tristate "User-space interface for hash algorithms"
1267	depends on NET
1268	select CRYPTO_HASH
1269	select CRYPTO_USER_API
1270	help
1271	  This option enables the user-spaces interface for hash
1272	  algorithms.
1273
1274config CRYPTO_USER_API_SKCIPHER
1275	tristate "User-space interface for symmetric key cipher algorithms"
1276	depends on NET
1277	select CRYPTO_BLKCIPHER
1278	select CRYPTO_USER_API
1279	help
1280	  This option enables the user-spaces interface for symmetric
1281	  key cipher algorithms.
1282
1283source "drivers/crypto/Kconfig"
1284source crypto/asymmetric_keys/Kconfig
1285
1286endif	# if CRYPTO
1287