xref: /linux/crypto/Kconfig (revision 2b8c19dbdc692e81243a328725a02efb77b144a5)
11da177e4SLinus Torvalds#
21da177e4SLinus Torvalds# Cryptographic API Configuration
31da177e4SLinus Torvalds#
41da177e4SLinus Torvalds
51da177e4SLinus Torvaldsmenu "Cryptographic options"
61da177e4SLinus Torvalds
71da177e4SLinus Torvaldsconfig CRYPTO
81da177e4SLinus Torvalds	bool "Cryptographic API"
91da177e4SLinus Torvalds	help
101da177e4SLinus Torvalds	  This option provides the core Cryptographic API.
111da177e4SLinus Torvalds
12cce9e06dSHerbert Xuif CRYPTO
13cce9e06dSHerbert Xu
14cce9e06dSHerbert Xuconfig CRYPTO_ALGAPI
15cce9e06dSHerbert Xu	tristate
16cce9e06dSHerbert Xu	help
17cce9e06dSHerbert Xu	  This option provides the API for cryptographic algorithms.
18cce9e06dSHerbert Xu
19*2b8c19dbSHerbert Xuconfig CRYPTO_MANAGER
20*2b8c19dbSHerbert Xu	tristate "Cryptographic algorithm manager"
21*2b8c19dbSHerbert Xu	select CRYPTO_ALGAPI
22*2b8c19dbSHerbert Xu	default m
23*2b8c19dbSHerbert Xu	help
24*2b8c19dbSHerbert Xu	  Create default cryptographic template instantiations such as
25*2b8c19dbSHerbert Xu	  cbc(aes).
26*2b8c19dbSHerbert Xu
271da177e4SLinus Torvaldsconfig CRYPTO_HMAC
281da177e4SLinus Torvalds	bool "HMAC support"
291da177e4SLinus Torvalds	help
301da177e4SLinus Torvalds	  HMAC: Keyed-Hashing for Message Authentication (RFC2104).
311da177e4SLinus Torvalds	  This is required for IPSec.
321da177e4SLinus Torvalds
331da177e4SLinus Torvaldsconfig CRYPTO_NULL
341da177e4SLinus Torvalds	tristate "Null algorithms"
35cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
361da177e4SLinus Torvalds	help
371da177e4SLinus Torvalds	  These are 'Null' algorithms, used by IPsec, which do nothing.
381da177e4SLinus Torvalds
391da177e4SLinus Torvaldsconfig CRYPTO_MD4
401da177e4SLinus Torvalds	tristate "MD4 digest algorithm"
41cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
421da177e4SLinus Torvalds	help
431da177e4SLinus Torvalds	  MD4 message digest algorithm (RFC1320).
441da177e4SLinus Torvalds
451da177e4SLinus Torvaldsconfig CRYPTO_MD5
461da177e4SLinus Torvalds	tristate "MD5 digest algorithm"
47cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
481da177e4SLinus Torvalds	help
491da177e4SLinus Torvalds	  MD5 message digest algorithm (RFC1321).
501da177e4SLinus Torvalds
511da177e4SLinus Torvaldsconfig CRYPTO_SHA1
521da177e4SLinus Torvalds	tristate "SHA1 digest algorithm"
53cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
541da177e4SLinus Torvalds	help
551da177e4SLinus Torvalds	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
561da177e4SLinus Torvalds
57c1e26e1eSJan Glauberconfig CRYPTO_SHA1_S390
58c1e26e1eSJan Glauber	tristate "SHA1 digest algorithm (s390)"
59cce9e06dSHerbert Xu	depends on S390
60cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
611da177e4SLinus Torvalds	help
620a497c17SJan Glauber	  This is the s390 hardware accelerated implementation of the
631da177e4SLinus Torvalds	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
641da177e4SLinus Torvalds
651da177e4SLinus Torvaldsconfig CRYPTO_SHA256
661da177e4SLinus Torvalds	tristate "SHA256 digest algorithm"
67cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
681da177e4SLinus Torvalds	help
691da177e4SLinus Torvalds	  SHA256 secure hash standard (DFIPS 180-2).
701da177e4SLinus Torvalds
711da177e4SLinus Torvalds	  This version of SHA implements a 256 bit hash with 128 bits of
721da177e4SLinus Torvalds	  security against collision attacks.
731da177e4SLinus Torvalds
740a497c17SJan Glauberconfig CRYPTO_SHA256_S390
750a497c17SJan Glauber	tristate "SHA256 digest algorithm (s390)"
76cce9e06dSHerbert Xu	depends on S390
77cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
780a497c17SJan Glauber	help
790a497c17SJan Glauber	  This is the s390 hardware accelerated implementation of the
800a497c17SJan Glauber	  SHA256 secure hash standard (DFIPS 180-2).
810a497c17SJan Glauber
820a497c17SJan Glauber	  This version of SHA implements a 256 bit hash with 128 bits of
830a497c17SJan Glauber	  security against collision attacks.
840a497c17SJan Glauber
851da177e4SLinus Torvaldsconfig CRYPTO_SHA512
861da177e4SLinus Torvalds	tristate "SHA384 and SHA512 digest algorithms"
87cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
881da177e4SLinus Torvalds	help
891da177e4SLinus Torvalds	  SHA512 secure hash standard (DFIPS 180-2).
901da177e4SLinus Torvalds
911da177e4SLinus Torvalds	  This version of SHA implements a 512 bit hash with 256 bits of
921da177e4SLinus Torvalds	  security against collision attacks.
931da177e4SLinus Torvalds
941da177e4SLinus Torvalds	  This code also includes SHA-384, a 384 bit hash with 192 bits
951da177e4SLinus Torvalds	  of security against collision attacks.
961da177e4SLinus Torvalds
971da177e4SLinus Torvaldsconfig CRYPTO_WP512
981da177e4SLinus Torvalds	tristate "Whirlpool digest algorithms"
99cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1001da177e4SLinus Torvalds	help
1011da177e4SLinus Torvalds	  Whirlpool hash algorithm 512, 384 and 256-bit hashes
1021da177e4SLinus Torvalds
1031da177e4SLinus Torvalds	  Whirlpool-512 is part of the NESSIE cryptographic primitives.
1041da177e4SLinus Torvalds	  Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
1051da177e4SLinus Torvalds
1061da177e4SLinus Torvalds	  See also:
1071da177e4SLinus Torvalds	  <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html>
1081da177e4SLinus Torvalds
1091da177e4SLinus Torvaldsconfig CRYPTO_TGR192
1101da177e4SLinus Torvalds	tristate "Tiger digest algorithms"
111cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1121da177e4SLinus Torvalds	help
1131da177e4SLinus Torvalds	  Tiger hash algorithm 192, 160 and 128-bit hashes
1141da177e4SLinus Torvalds
1151da177e4SLinus Torvalds	  Tiger is a hash function optimized for 64-bit processors while
1161da177e4SLinus Torvalds	  still having decent performance on 32-bit processors.
1171da177e4SLinus Torvalds	  Tiger was developed by Ross Anderson and Eli Biham.
1181da177e4SLinus Torvalds
1191da177e4SLinus Torvalds	  See also:
1201da177e4SLinus Torvalds	  <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>.
1211da177e4SLinus Torvalds
1221da177e4SLinus Torvaldsconfig CRYPTO_DES
1231da177e4SLinus Torvalds	tristate "DES and Triple DES EDE cipher algorithms"
124cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1251da177e4SLinus Torvalds	help
1261da177e4SLinus Torvalds	  DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
1271da177e4SLinus Torvalds
128c1e26e1eSJan Glauberconfig CRYPTO_DES_S390
129c1e26e1eSJan Glauber	tristate "DES and Triple DES cipher algorithms (s390)"
130cce9e06dSHerbert Xu	depends on S390
131cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1321da177e4SLinus Torvalds	help
1331da177e4SLinus Torvalds	  DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
1341da177e4SLinus Torvalds
1351da177e4SLinus Torvaldsconfig CRYPTO_BLOWFISH
1361da177e4SLinus Torvalds	tristate "Blowfish cipher algorithm"
137cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1381da177e4SLinus Torvalds	help
1391da177e4SLinus Torvalds	  Blowfish cipher algorithm, by Bruce Schneier.
1401da177e4SLinus Torvalds
1411da177e4SLinus Torvalds	  This is a variable key length cipher which can use keys from 32
1421da177e4SLinus Torvalds	  bits to 448 bits in length.  It's fast, simple and specifically
1431da177e4SLinus Torvalds	  designed for use on "large microprocessors".
1441da177e4SLinus Torvalds
1451da177e4SLinus Torvalds	  See also:
1461da177e4SLinus Torvalds	  <http://www.schneier.com/blowfish.html>
1471da177e4SLinus Torvalds
1481da177e4SLinus Torvaldsconfig CRYPTO_TWOFISH
1491da177e4SLinus Torvalds	tristate "Twofish cipher algorithm"
150cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1512729bb42SJoachim Fritschi	select CRYPTO_TWOFISH_COMMON
1521da177e4SLinus Torvalds	help
1531da177e4SLinus Torvalds	  Twofish cipher algorithm.
1541da177e4SLinus Torvalds
1551da177e4SLinus Torvalds	  Twofish was submitted as an AES (Advanced Encryption Standard)
1561da177e4SLinus Torvalds	  candidate cipher by researchers at CounterPane Systems.  It is a
1571da177e4SLinus Torvalds	  16 round block cipher supporting key sizes of 128, 192, and 256
1581da177e4SLinus Torvalds	  bits.
1591da177e4SLinus Torvalds
1601da177e4SLinus Torvalds	  See also:
1611da177e4SLinus Torvalds	  <http://www.schneier.com/twofish.html>
1621da177e4SLinus Torvalds
1632729bb42SJoachim Fritschiconfig CRYPTO_TWOFISH_COMMON
1642729bb42SJoachim Fritschi	tristate
1652729bb42SJoachim Fritschi	help
1662729bb42SJoachim Fritschi	  Common parts of the Twofish cipher algorithm shared by the
1672729bb42SJoachim Fritschi	  generic c and the assembler implementations.
1682729bb42SJoachim Fritschi
169b9f535ffSJoachim Fritschiconfig CRYPTO_TWOFISH_586
170b9f535ffSJoachim Fritschi	tristate "Twofish cipher algorithms (i586)"
171cce9e06dSHerbert Xu	depends on (X86 || UML_X86) && !64BIT
172cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
173b9f535ffSJoachim Fritschi	select CRYPTO_TWOFISH_COMMON
174b9f535ffSJoachim Fritschi	help
175b9f535ffSJoachim Fritschi	  Twofish cipher algorithm.
176b9f535ffSJoachim Fritschi
177b9f535ffSJoachim Fritschi	  Twofish was submitted as an AES (Advanced Encryption Standard)
178b9f535ffSJoachim Fritschi	  candidate cipher by researchers at CounterPane Systems.  It is a
179b9f535ffSJoachim Fritschi	  16 round block cipher supporting key sizes of 128, 192, and 256
180b9f535ffSJoachim Fritschi	  bits.
181b9f535ffSJoachim Fritschi
182b9f535ffSJoachim Fritschi	  See also:
183b9f535ffSJoachim Fritschi	  <http://www.schneier.com/twofish.html>
184b9f535ffSJoachim Fritschi
185eaf44088SJoachim Fritschiconfig CRYPTO_TWOFISH_X86_64
186eaf44088SJoachim Fritschi	tristate "Twofish cipher algorithm (x86_64)"
187cce9e06dSHerbert Xu	depends on (X86 || UML_X86) && 64BIT
188cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
189eaf44088SJoachim Fritschi	select CRYPTO_TWOFISH_COMMON
190eaf44088SJoachim Fritschi	help
191eaf44088SJoachim Fritschi	  Twofish cipher algorithm (x86_64).
192eaf44088SJoachim Fritschi
193eaf44088SJoachim Fritschi	  Twofish was submitted as an AES (Advanced Encryption Standard)
194eaf44088SJoachim Fritschi	  candidate cipher by researchers at CounterPane Systems.  It is a
195eaf44088SJoachim Fritschi	  16 round block cipher supporting key sizes of 128, 192, and 256
196eaf44088SJoachim Fritschi	  bits.
197eaf44088SJoachim Fritschi
198eaf44088SJoachim Fritschi	  See also:
199eaf44088SJoachim Fritschi	  <http://www.schneier.com/twofish.html>
200eaf44088SJoachim Fritschi
2011da177e4SLinus Torvaldsconfig CRYPTO_SERPENT
2021da177e4SLinus Torvalds	tristate "Serpent cipher algorithm"
203cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
2041da177e4SLinus Torvalds	help
2051da177e4SLinus Torvalds	  Serpent cipher algorithm, by Anderson, Biham & Knudsen.
2061da177e4SLinus Torvalds
2071da177e4SLinus Torvalds	  Keys are allowed to be from 0 to 256 bits in length, in steps
2081da177e4SLinus Torvalds	  of 8 bits.  Also includes the 'Tnepres' algorithm, a reversed
2091da177e4SLinus Torvalds	  variant of Serpent for compatibility with old kerneli code.
2101da177e4SLinus Torvalds
2111da177e4SLinus Torvalds	  See also:
2121da177e4SLinus Torvalds	  <http://www.cl.cam.ac.uk/~rja14/serpent.html>
2131da177e4SLinus Torvalds
2141da177e4SLinus Torvaldsconfig CRYPTO_AES
2151da177e4SLinus Torvalds	tristate "AES cipher algorithms"
216cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
2171da177e4SLinus Torvalds	help
2181da177e4SLinus Torvalds	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
2191da177e4SLinus Torvalds	  algorithm.
2201da177e4SLinus Torvalds
2211da177e4SLinus Torvalds	  Rijndael appears to be consistently a very good performer in
2221da177e4SLinus Torvalds	  both hardware and software across a wide range of computing
2231da177e4SLinus Torvalds	  environments regardless of its use in feedback or non-feedback
2241da177e4SLinus Torvalds	  modes. Its key setup time is excellent, and its key agility is
2251da177e4SLinus Torvalds	  good. Rijndael's very low memory requirements make it very well
2261da177e4SLinus Torvalds	  suited for restricted-space environments, in which it also
2271da177e4SLinus Torvalds	  demonstrates excellent performance. Rijndael's operations are
2281da177e4SLinus Torvalds	  among the easiest to defend against power and timing attacks.
2291da177e4SLinus Torvalds
2301da177e4SLinus Torvalds	  The AES specifies three key sizes: 128, 192 and 256 bits
2311da177e4SLinus Torvalds
2321da177e4SLinus Torvalds	  See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
2331da177e4SLinus Torvalds
2341da177e4SLinus Torvaldsconfig CRYPTO_AES_586
2351da177e4SLinus Torvalds	tristate "AES cipher algorithms (i586)"
236cce9e06dSHerbert Xu	depends on (X86 || UML_X86) && !64BIT
237cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
2381da177e4SLinus Torvalds	help
2391da177e4SLinus Torvalds	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
2401da177e4SLinus Torvalds	  algorithm.
2411da177e4SLinus Torvalds
2421da177e4SLinus Torvalds	  Rijndael appears to be consistently a very good performer in
2431da177e4SLinus Torvalds	  both hardware and software across a wide range of computing
2441da177e4SLinus Torvalds	  environments regardless of its use in feedback or non-feedback
2451da177e4SLinus Torvalds	  modes. Its key setup time is excellent, and its key agility is
2461da177e4SLinus Torvalds	  good. Rijndael's very low memory requirements make it very well
2471da177e4SLinus Torvalds	  suited for restricted-space environments, in which it also
2481da177e4SLinus Torvalds	  demonstrates excellent performance. Rijndael's operations are
2491da177e4SLinus Torvalds	  among the easiest to defend against power and timing attacks.
2501da177e4SLinus Torvalds
2511da177e4SLinus Torvalds	  The AES specifies three key sizes: 128, 192 and 256 bits
2521da177e4SLinus Torvalds
2531da177e4SLinus Torvalds	  See <http://csrc.nist.gov/encryption/aes/> for more information.
2541da177e4SLinus Torvalds
255a2a892a2SAndreas Steinmetzconfig CRYPTO_AES_X86_64
256a2a892a2SAndreas Steinmetz	tristate "AES cipher algorithms (x86_64)"
257cce9e06dSHerbert Xu	depends on (X86 || UML_X86) && 64BIT
258cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
259a2a892a2SAndreas Steinmetz	help
260a2a892a2SAndreas Steinmetz	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
261a2a892a2SAndreas Steinmetz	  algorithm.
262a2a892a2SAndreas Steinmetz
263a2a892a2SAndreas Steinmetz	  Rijndael appears to be consistently a very good performer in
264a2a892a2SAndreas Steinmetz	  both hardware and software across a wide range of computing
265a2a892a2SAndreas Steinmetz	  environments regardless of its use in feedback or non-feedback
266a2a892a2SAndreas Steinmetz	  modes. Its key setup time is excellent, and its key agility is
267a2a892a2SAndreas Steinmetz	  good. Rijndael's very low memory requirements make it very well
268a2a892a2SAndreas Steinmetz	  suited for restricted-space environments, in which it also
269a2a892a2SAndreas Steinmetz	  demonstrates excellent performance. Rijndael's operations are
270a2a892a2SAndreas Steinmetz	  among the easiest to defend against power and timing attacks.
271a2a892a2SAndreas Steinmetz
272a2a892a2SAndreas Steinmetz	  The AES specifies three key sizes: 128, 192 and 256 bits
273a2a892a2SAndreas Steinmetz
274a2a892a2SAndreas Steinmetz	  See <http://csrc.nist.gov/encryption/aes/> for more information.
275a2a892a2SAndreas Steinmetz
276bf754ae8SJan Glauberconfig CRYPTO_AES_S390
277bf754ae8SJan Glauber	tristate "AES cipher algorithms (s390)"
278cce9e06dSHerbert Xu	depends on S390
279cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
280bf754ae8SJan Glauber	help
281bf754ae8SJan Glauber	  This is the s390 hardware accelerated implementation of the
282bf754ae8SJan Glauber	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
283bf754ae8SJan Glauber	  algorithm.
284bf754ae8SJan Glauber
285bf754ae8SJan Glauber	  Rijndael appears to be consistently a very good performer in
286bf754ae8SJan Glauber	  both hardware and software across a wide range of computing
287bf754ae8SJan Glauber	  environments regardless of its use in feedback or non-feedback
288bf754ae8SJan Glauber	  modes. Its key setup time is excellent, and its key agility is
289bf754ae8SJan Glauber	  good. Rijndael's very low memory requirements make it very well
290bf754ae8SJan Glauber	  suited for restricted-space environments, in which it also
291bf754ae8SJan Glauber	  demonstrates excellent performance. Rijndael's operations are
292bf754ae8SJan Glauber	  among the easiest to defend against power and timing attacks.
293bf754ae8SJan Glauber
294bf754ae8SJan Glauber	  On s390 the System z9-109 currently only supports the key size
295bf754ae8SJan Glauber	  of 128 bit.
296bf754ae8SJan Glauber
2971da177e4SLinus Torvaldsconfig CRYPTO_CAST5
2981da177e4SLinus Torvalds	tristate "CAST5 (CAST-128) cipher algorithm"
299cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3001da177e4SLinus Torvalds	help
3011da177e4SLinus Torvalds	  The CAST5 encryption algorithm (synonymous with CAST-128) is
3021da177e4SLinus Torvalds	  described in RFC2144.
3031da177e4SLinus Torvalds
3041da177e4SLinus Torvaldsconfig CRYPTO_CAST6
3051da177e4SLinus Torvalds	tristate "CAST6 (CAST-256) cipher algorithm"
306cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3071da177e4SLinus Torvalds	help
3081da177e4SLinus Torvalds	  The CAST6 encryption algorithm (synonymous with CAST-256) is
3091da177e4SLinus Torvalds	  described in RFC2612.
3101da177e4SLinus Torvalds
3111da177e4SLinus Torvaldsconfig CRYPTO_TEA
312fb4f10edSAaron Grothe	tristate "TEA, XTEA and XETA cipher algorithms"
313cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3141da177e4SLinus Torvalds	help
3151da177e4SLinus Torvalds	  TEA cipher algorithm.
3161da177e4SLinus Torvalds
3171da177e4SLinus Torvalds	  Tiny Encryption Algorithm is a simple cipher that uses
3181da177e4SLinus Torvalds	  many rounds for security.  It is very fast and uses
3191da177e4SLinus Torvalds	  little memory.
3201da177e4SLinus Torvalds
3211da177e4SLinus Torvalds	  Xtendend Tiny Encryption Algorithm is a modification to
3221da177e4SLinus Torvalds	  the TEA algorithm to address a potential key weakness
3231da177e4SLinus Torvalds	  in the TEA algorithm.
3241da177e4SLinus Torvalds
325fb4f10edSAaron Grothe	  Xtendend Encryption Tiny Algorithm is a mis-implementation
326fb4f10edSAaron Grothe	  of the XTEA algorithm for compatibility purposes.
327fb4f10edSAaron Grothe
3281da177e4SLinus Torvaldsconfig CRYPTO_ARC4
3291da177e4SLinus Torvalds	tristate "ARC4 cipher algorithm"
330cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3311da177e4SLinus Torvalds	help
3321da177e4SLinus Torvalds	  ARC4 cipher algorithm.
3331da177e4SLinus Torvalds
3341da177e4SLinus Torvalds	  ARC4 is a stream cipher using keys ranging from 8 bits to 2048
3351da177e4SLinus Torvalds	  bits in length.  This algorithm is required for driver-based
3361da177e4SLinus Torvalds	  WEP, but it should not be for other purposes because of the
3371da177e4SLinus Torvalds	  weakness of the algorithm.
3381da177e4SLinus Torvalds
3391da177e4SLinus Torvaldsconfig CRYPTO_KHAZAD
3401da177e4SLinus Torvalds	tristate "Khazad cipher algorithm"
341cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3421da177e4SLinus Torvalds	help
3431da177e4SLinus Torvalds	  Khazad cipher algorithm.
3441da177e4SLinus Torvalds
3451da177e4SLinus Torvalds	  Khazad was a finalist in the initial NESSIE competition.  It is
3461da177e4SLinus Torvalds	  an algorithm optimized for 64-bit processors with good performance
3471da177e4SLinus Torvalds	  on 32-bit processors.  Khazad uses an 128 bit key size.
3481da177e4SLinus Torvalds
3491da177e4SLinus Torvalds	  See also:
3501da177e4SLinus Torvalds	  <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html>
3511da177e4SLinus Torvalds
3521da177e4SLinus Torvaldsconfig CRYPTO_ANUBIS
3531da177e4SLinus Torvalds	tristate "Anubis cipher algorithm"
354cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3551da177e4SLinus Torvalds	help
3561da177e4SLinus Torvalds	  Anubis cipher algorithm.
3571da177e4SLinus Torvalds
3581da177e4SLinus Torvalds	  Anubis is a variable key length cipher which can use keys from
3591da177e4SLinus Torvalds	  128 bits to 320 bits in length.  It was evaluated as a entrant
3601da177e4SLinus Torvalds	  in the NESSIE competition.
3611da177e4SLinus Torvalds
3621da177e4SLinus Torvalds	  See also:
3631da177e4SLinus Torvalds	  <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/>
3641da177e4SLinus Torvalds	  <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html>
3651da177e4SLinus Torvalds
3661da177e4SLinus Torvalds
3671da177e4SLinus Torvaldsconfig CRYPTO_DEFLATE
3681da177e4SLinus Torvalds	tristate "Deflate compression algorithm"
369cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3701da177e4SLinus Torvalds	select ZLIB_INFLATE
3711da177e4SLinus Torvalds	select ZLIB_DEFLATE
3721da177e4SLinus Torvalds	help
3731da177e4SLinus Torvalds	  This is the Deflate algorithm (RFC1951), specified for use in
3741da177e4SLinus Torvalds	  IPSec with the IPCOMP protocol (RFC3173, RFC2394).
3751da177e4SLinus Torvalds
3761da177e4SLinus Torvalds	  You will most probably want this if using IPSec.
3771da177e4SLinus Torvalds
3781da177e4SLinus Torvaldsconfig CRYPTO_MICHAEL_MIC
3791da177e4SLinus Torvalds	tristate "Michael MIC keyed digest algorithm"
380cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3811da177e4SLinus Torvalds	help
3821da177e4SLinus Torvalds	  Michael MIC is used for message integrity protection in TKIP
3831da177e4SLinus Torvalds	  (IEEE 802.11i). This algorithm is required for TKIP, but it
3841da177e4SLinus Torvalds	  should not be used for other purposes because of the weakness
3851da177e4SLinus Torvalds	  of the algorithm.
3861da177e4SLinus Torvalds
3871da177e4SLinus Torvaldsconfig CRYPTO_CRC32C
3881da177e4SLinus Torvalds	tristate "CRC32c CRC algorithm"
389cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3901da177e4SLinus Torvalds	select LIBCRC32C
3911da177e4SLinus Torvalds	help
3921da177e4SLinus Torvalds	  Castagnoli, et al Cyclic Redundancy-Check Algorithm.  Used
3931da177e4SLinus Torvalds	  by iSCSI for header and data digests and by others.
3941da177e4SLinus Torvalds	  See Castagnoli93.  This implementation uses lib/libcrc32c.
3951da177e4SLinus Torvalds          Module will be crc32c.
3961da177e4SLinus Torvalds
3971da177e4SLinus Torvaldsconfig CRYPTO_TEST
3981da177e4SLinus Torvalds	tristate "Testing module"
399cce9e06dSHerbert Xu	depends on m
400cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
4011da177e4SLinus Torvalds	help
4021da177e4SLinus Torvalds	  Quick & dirty crypto test module.
4031da177e4SLinus Torvalds
4041da177e4SLinus Torvaldssource "drivers/crypto/Kconfig"
4051da177e4SLinus Torvalds
406cce9e06dSHerbert Xuendif	# if CRYPTO
407cce9e06dSHerbert Xu
408cce9e06dSHerbert Xuendmenu
409