xref: /linux/crypto/Kconfig (revision cce9e06d100df19a327b19f23adad76e7bf63edd)
11da177e4SLinus Torvalds#
21da177e4SLinus Torvalds# Cryptographic API Configuration
31da177e4SLinus Torvalds#
41da177e4SLinus Torvalds
51da177e4SLinus Torvaldsmenu "Cryptographic options"
61da177e4SLinus Torvalds
71da177e4SLinus Torvaldsconfig CRYPTO
81da177e4SLinus Torvalds	bool "Cryptographic API"
91da177e4SLinus Torvalds	help
101da177e4SLinus Torvalds	  This option provides the core Cryptographic API.
111da177e4SLinus Torvalds
12*cce9e06dSHerbert Xuif CRYPTO
13*cce9e06dSHerbert Xu
14*cce9e06dSHerbert Xuconfig CRYPTO_ALGAPI
15*cce9e06dSHerbert Xu	tristate
16*cce9e06dSHerbert Xu	help
17*cce9e06dSHerbert Xu	  This option provides the API for cryptographic algorithms.
18*cce9e06dSHerbert Xu
191da177e4SLinus Torvaldsconfig CRYPTO_HMAC
201da177e4SLinus Torvalds	bool "HMAC support"
211da177e4SLinus Torvalds	help
221da177e4SLinus Torvalds	  HMAC: Keyed-Hashing for Message Authentication (RFC2104).
231da177e4SLinus Torvalds	  This is required for IPSec.
241da177e4SLinus Torvalds
251da177e4SLinus Torvaldsconfig CRYPTO_NULL
261da177e4SLinus Torvalds	tristate "Null algorithms"
27*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
281da177e4SLinus Torvalds	help
291da177e4SLinus Torvalds	  These are 'Null' algorithms, used by IPsec, which do nothing.
301da177e4SLinus Torvalds
311da177e4SLinus Torvaldsconfig CRYPTO_MD4
321da177e4SLinus Torvalds	tristate "MD4 digest algorithm"
33*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
341da177e4SLinus Torvalds	help
351da177e4SLinus Torvalds	  MD4 message digest algorithm (RFC1320).
361da177e4SLinus Torvalds
371da177e4SLinus Torvaldsconfig CRYPTO_MD5
381da177e4SLinus Torvalds	tristate "MD5 digest algorithm"
39*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
401da177e4SLinus Torvalds	help
411da177e4SLinus Torvalds	  MD5 message digest algorithm (RFC1321).
421da177e4SLinus Torvalds
431da177e4SLinus Torvaldsconfig CRYPTO_SHA1
441da177e4SLinus Torvalds	tristate "SHA1 digest algorithm"
45*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
461da177e4SLinus Torvalds	help
471da177e4SLinus Torvalds	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
481da177e4SLinus Torvalds
49c1e26e1eSJan Glauberconfig CRYPTO_SHA1_S390
50c1e26e1eSJan Glauber	tristate "SHA1 digest algorithm (s390)"
51*cce9e06dSHerbert Xu	depends on S390
52*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
531da177e4SLinus Torvalds	help
540a497c17SJan Glauber	  This is the s390 hardware accelerated implementation of the
551da177e4SLinus Torvalds	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
561da177e4SLinus Torvalds
571da177e4SLinus Torvaldsconfig CRYPTO_SHA256
581da177e4SLinus Torvalds	tristate "SHA256 digest algorithm"
59*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
601da177e4SLinus Torvalds	help
611da177e4SLinus Torvalds	  SHA256 secure hash standard (DFIPS 180-2).
621da177e4SLinus Torvalds
631da177e4SLinus Torvalds	  This version of SHA implements a 256 bit hash with 128 bits of
641da177e4SLinus Torvalds	  security against collision attacks.
651da177e4SLinus Torvalds
660a497c17SJan Glauberconfig CRYPTO_SHA256_S390
670a497c17SJan Glauber	tristate "SHA256 digest algorithm (s390)"
68*cce9e06dSHerbert Xu	depends on S390
69*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
700a497c17SJan Glauber	help
710a497c17SJan Glauber	  This is the s390 hardware accelerated implementation of the
720a497c17SJan Glauber	  SHA256 secure hash standard (DFIPS 180-2).
730a497c17SJan Glauber
740a497c17SJan Glauber	  This version of SHA implements a 256 bit hash with 128 bits of
750a497c17SJan Glauber	  security against collision attacks.
760a497c17SJan Glauber
771da177e4SLinus Torvaldsconfig CRYPTO_SHA512
781da177e4SLinus Torvalds	tristate "SHA384 and SHA512 digest algorithms"
79*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
801da177e4SLinus Torvalds	help
811da177e4SLinus Torvalds	  SHA512 secure hash standard (DFIPS 180-2).
821da177e4SLinus Torvalds
831da177e4SLinus Torvalds	  This version of SHA implements a 512 bit hash with 256 bits of
841da177e4SLinus Torvalds	  security against collision attacks.
851da177e4SLinus Torvalds
861da177e4SLinus Torvalds	  This code also includes SHA-384, a 384 bit hash with 192 bits
871da177e4SLinus Torvalds	  of security against collision attacks.
881da177e4SLinus Torvalds
891da177e4SLinus Torvaldsconfig CRYPTO_WP512
901da177e4SLinus Torvalds	tristate "Whirlpool digest algorithms"
91*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
921da177e4SLinus Torvalds	help
931da177e4SLinus Torvalds	  Whirlpool hash algorithm 512, 384 and 256-bit hashes
941da177e4SLinus Torvalds
951da177e4SLinus Torvalds	  Whirlpool-512 is part of the NESSIE cryptographic primitives.
961da177e4SLinus Torvalds	  Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
971da177e4SLinus Torvalds
981da177e4SLinus Torvalds	  See also:
991da177e4SLinus Torvalds	  <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html>
1001da177e4SLinus Torvalds
1011da177e4SLinus Torvaldsconfig CRYPTO_TGR192
1021da177e4SLinus Torvalds	tristate "Tiger digest algorithms"
103*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1041da177e4SLinus Torvalds	help
1051da177e4SLinus Torvalds	  Tiger hash algorithm 192, 160 and 128-bit hashes
1061da177e4SLinus Torvalds
1071da177e4SLinus Torvalds	  Tiger is a hash function optimized for 64-bit processors while
1081da177e4SLinus Torvalds	  still having decent performance on 32-bit processors.
1091da177e4SLinus Torvalds	  Tiger was developed by Ross Anderson and Eli Biham.
1101da177e4SLinus Torvalds
1111da177e4SLinus Torvalds	  See also:
1121da177e4SLinus Torvalds	  <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>.
1131da177e4SLinus Torvalds
1141da177e4SLinus Torvaldsconfig CRYPTO_DES
1151da177e4SLinus Torvalds	tristate "DES and Triple DES EDE cipher algorithms"
116*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1171da177e4SLinus Torvalds	help
1181da177e4SLinus Torvalds	  DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
1191da177e4SLinus Torvalds
120c1e26e1eSJan Glauberconfig CRYPTO_DES_S390
121c1e26e1eSJan Glauber	tristate "DES and Triple DES cipher algorithms (s390)"
122*cce9e06dSHerbert Xu	depends on S390
123*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1241da177e4SLinus Torvalds	help
1251da177e4SLinus Torvalds	  DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
1261da177e4SLinus Torvalds
1271da177e4SLinus Torvaldsconfig CRYPTO_BLOWFISH
1281da177e4SLinus Torvalds	tristate "Blowfish cipher algorithm"
129*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1301da177e4SLinus Torvalds	help
1311da177e4SLinus Torvalds	  Blowfish cipher algorithm, by Bruce Schneier.
1321da177e4SLinus Torvalds
1331da177e4SLinus Torvalds	  This is a variable key length cipher which can use keys from 32
1341da177e4SLinus Torvalds	  bits to 448 bits in length.  It's fast, simple and specifically
1351da177e4SLinus Torvalds	  designed for use on "large microprocessors".
1361da177e4SLinus Torvalds
1371da177e4SLinus Torvalds	  See also:
1381da177e4SLinus Torvalds	  <http://www.schneier.com/blowfish.html>
1391da177e4SLinus Torvalds
1401da177e4SLinus Torvaldsconfig CRYPTO_TWOFISH
1411da177e4SLinus Torvalds	tristate "Twofish cipher algorithm"
142*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1432729bb42SJoachim Fritschi	select CRYPTO_TWOFISH_COMMON
1441da177e4SLinus Torvalds	help
1451da177e4SLinus Torvalds	  Twofish cipher algorithm.
1461da177e4SLinus Torvalds
1471da177e4SLinus Torvalds	  Twofish was submitted as an AES (Advanced Encryption Standard)
1481da177e4SLinus Torvalds	  candidate cipher by researchers at CounterPane Systems.  It is a
1491da177e4SLinus Torvalds	  16 round block cipher supporting key sizes of 128, 192, and 256
1501da177e4SLinus Torvalds	  bits.
1511da177e4SLinus Torvalds
1521da177e4SLinus Torvalds	  See also:
1531da177e4SLinus Torvalds	  <http://www.schneier.com/twofish.html>
1541da177e4SLinus Torvalds
1552729bb42SJoachim Fritschiconfig CRYPTO_TWOFISH_COMMON
1562729bb42SJoachim Fritschi	tristate
1572729bb42SJoachim Fritschi	help
1582729bb42SJoachim Fritschi	  Common parts of the Twofish cipher algorithm shared by the
1592729bb42SJoachim Fritschi	  generic c and the assembler implementations.
1602729bb42SJoachim Fritschi
161b9f535ffSJoachim Fritschiconfig CRYPTO_TWOFISH_586
162b9f535ffSJoachim Fritschi	tristate "Twofish cipher algorithms (i586)"
163*cce9e06dSHerbert Xu	depends on (X86 || UML_X86) && !64BIT
164*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
165b9f535ffSJoachim Fritschi	select CRYPTO_TWOFISH_COMMON
166b9f535ffSJoachim Fritschi	help
167b9f535ffSJoachim Fritschi	  Twofish cipher algorithm.
168b9f535ffSJoachim Fritschi
169b9f535ffSJoachim Fritschi	  Twofish was submitted as an AES (Advanced Encryption Standard)
170b9f535ffSJoachim Fritschi	  candidate cipher by researchers at CounterPane Systems.  It is a
171b9f535ffSJoachim Fritschi	  16 round block cipher supporting key sizes of 128, 192, and 256
172b9f535ffSJoachim Fritschi	  bits.
173b9f535ffSJoachim Fritschi
174b9f535ffSJoachim Fritschi	  See also:
175b9f535ffSJoachim Fritschi	  <http://www.schneier.com/twofish.html>
176b9f535ffSJoachim Fritschi
177eaf44088SJoachim Fritschiconfig CRYPTO_TWOFISH_X86_64
178eaf44088SJoachim Fritschi	tristate "Twofish cipher algorithm (x86_64)"
179*cce9e06dSHerbert Xu	depends on (X86 || UML_X86) && 64BIT
180*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
181eaf44088SJoachim Fritschi	select CRYPTO_TWOFISH_COMMON
182eaf44088SJoachim Fritschi	help
183eaf44088SJoachim Fritschi	  Twofish cipher algorithm (x86_64).
184eaf44088SJoachim Fritschi
185eaf44088SJoachim Fritschi	  Twofish was submitted as an AES (Advanced Encryption Standard)
186eaf44088SJoachim Fritschi	  candidate cipher by researchers at CounterPane Systems.  It is a
187eaf44088SJoachim Fritschi	  16 round block cipher supporting key sizes of 128, 192, and 256
188eaf44088SJoachim Fritschi	  bits.
189eaf44088SJoachim Fritschi
190eaf44088SJoachim Fritschi	  See also:
191eaf44088SJoachim Fritschi	  <http://www.schneier.com/twofish.html>
192eaf44088SJoachim Fritschi
1931da177e4SLinus Torvaldsconfig CRYPTO_SERPENT
1941da177e4SLinus Torvalds	tristate "Serpent cipher algorithm"
195*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
1961da177e4SLinus Torvalds	help
1971da177e4SLinus Torvalds	  Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1981da177e4SLinus Torvalds
1991da177e4SLinus Torvalds	  Keys are allowed to be from 0 to 256 bits in length, in steps
2001da177e4SLinus Torvalds	  of 8 bits.  Also includes the 'Tnepres' algorithm, a reversed
2011da177e4SLinus Torvalds	  variant of Serpent for compatibility with old kerneli code.
2021da177e4SLinus Torvalds
2031da177e4SLinus Torvalds	  See also:
2041da177e4SLinus Torvalds	  <http://www.cl.cam.ac.uk/~rja14/serpent.html>
2051da177e4SLinus Torvalds
2061da177e4SLinus Torvaldsconfig CRYPTO_AES
2071da177e4SLinus Torvalds	tristate "AES cipher algorithms"
208*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
2091da177e4SLinus Torvalds	help
2101da177e4SLinus Torvalds	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
2111da177e4SLinus Torvalds	  algorithm.
2121da177e4SLinus Torvalds
2131da177e4SLinus Torvalds	  Rijndael appears to be consistently a very good performer in
2141da177e4SLinus Torvalds	  both hardware and software across a wide range of computing
2151da177e4SLinus Torvalds	  environments regardless of its use in feedback or non-feedback
2161da177e4SLinus Torvalds	  modes. Its key setup time is excellent, and its key agility is
2171da177e4SLinus Torvalds	  good. Rijndael's very low memory requirements make it very well
2181da177e4SLinus Torvalds	  suited for restricted-space environments, in which it also
2191da177e4SLinus Torvalds	  demonstrates excellent performance. Rijndael's operations are
2201da177e4SLinus Torvalds	  among the easiest to defend against power and timing attacks.
2211da177e4SLinus Torvalds
2221da177e4SLinus Torvalds	  The AES specifies three key sizes: 128, 192 and 256 bits
2231da177e4SLinus Torvalds
2241da177e4SLinus Torvalds	  See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
2251da177e4SLinus Torvalds
2261da177e4SLinus Torvaldsconfig CRYPTO_AES_586
2271da177e4SLinus Torvalds	tristate "AES cipher algorithms (i586)"
228*cce9e06dSHerbert Xu	depends on (X86 || UML_X86) && !64BIT
229*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
2301da177e4SLinus Torvalds	help
2311da177e4SLinus Torvalds	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
2321da177e4SLinus Torvalds	  algorithm.
2331da177e4SLinus Torvalds
2341da177e4SLinus Torvalds	  Rijndael appears to be consistently a very good performer in
2351da177e4SLinus Torvalds	  both hardware and software across a wide range of computing
2361da177e4SLinus Torvalds	  environments regardless of its use in feedback or non-feedback
2371da177e4SLinus Torvalds	  modes. Its key setup time is excellent, and its key agility is
2381da177e4SLinus Torvalds	  good. Rijndael's very low memory requirements make it very well
2391da177e4SLinus Torvalds	  suited for restricted-space environments, in which it also
2401da177e4SLinus Torvalds	  demonstrates excellent performance. Rijndael's operations are
2411da177e4SLinus Torvalds	  among the easiest to defend against power and timing attacks.
2421da177e4SLinus Torvalds
2431da177e4SLinus Torvalds	  The AES specifies three key sizes: 128, 192 and 256 bits
2441da177e4SLinus Torvalds
2451da177e4SLinus Torvalds	  See <http://csrc.nist.gov/encryption/aes/> for more information.
2461da177e4SLinus Torvalds
247a2a892a2SAndreas Steinmetzconfig CRYPTO_AES_X86_64
248a2a892a2SAndreas Steinmetz	tristate "AES cipher algorithms (x86_64)"
249*cce9e06dSHerbert Xu	depends on (X86 || UML_X86) && 64BIT
250*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
251a2a892a2SAndreas Steinmetz	help
252a2a892a2SAndreas Steinmetz	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
253a2a892a2SAndreas Steinmetz	  algorithm.
254a2a892a2SAndreas Steinmetz
255a2a892a2SAndreas Steinmetz	  Rijndael appears to be consistently a very good performer in
256a2a892a2SAndreas Steinmetz	  both hardware and software across a wide range of computing
257a2a892a2SAndreas Steinmetz	  environments regardless of its use in feedback or non-feedback
258a2a892a2SAndreas Steinmetz	  modes. Its key setup time is excellent, and its key agility is
259a2a892a2SAndreas Steinmetz	  good. Rijndael's very low memory requirements make it very well
260a2a892a2SAndreas Steinmetz	  suited for restricted-space environments, in which it also
261a2a892a2SAndreas Steinmetz	  demonstrates excellent performance. Rijndael's operations are
262a2a892a2SAndreas Steinmetz	  among the easiest to defend against power and timing attacks.
263a2a892a2SAndreas Steinmetz
264a2a892a2SAndreas Steinmetz	  The AES specifies three key sizes: 128, 192 and 256 bits
265a2a892a2SAndreas Steinmetz
266a2a892a2SAndreas Steinmetz	  See <http://csrc.nist.gov/encryption/aes/> for more information.
267a2a892a2SAndreas Steinmetz
268bf754ae8SJan Glauberconfig CRYPTO_AES_S390
269bf754ae8SJan Glauber	tristate "AES cipher algorithms (s390)"
270*cce9e06dSHerbert Xu	depends on S390
271*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
272bf754ae8SJan Glauber	help
273bf754ae8SJan Glauber	  This is the s390 hardware accelerated implementation of the
274bf754ae8SJan Glauber	  AES cipher algorithms (FIPS-197). AES uses the Rijndael
275bf754ae8SJan Glauber	  algorithm.
276bf754ae8SJan Glauber
277bf754ae8SJan Glauber	  Rijndael appears to be consistently a very good performer in
278bf754ae8SJan Glauber	  both hardware and software across a wide range of computing
279bf754ae8SJan Glauber	  environments regardless of its use in feedback or non-feedback
280bf754ae8SJan Glauber	  modes. Its key setup time is excellent, and its key agility is
281bf754ae8SJan Glauber	  good. Rijndael's very low memory requirements make it very well
282bf754ae8SJan Glauber	  suited for restricted-space environments, in which it also
283bf754ae8SJan Glauber	  demonstrates excellent performance. Rijndael's operations are
284bf754ae8SJan Glauber	  among the easiest to defend against power and timing attacks.
285bf754ae8SJan Glauber
286bf754ae8SJan Glauber	  On s390 the System z9-109 currently only supports the key size
287bf754ae8SJan Glauber	  of 128 bit.
288bf754ae8SJan Glauber
2891da177e4SLinus Torvaldsconfig CRYPTO_CAST5
2901da177e4SLinus Torvalds	tristate "CAST5 (CAST-128) cipher algorithm"
291*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
2921da177e4SLinus Torvalds	help
2931da177e4SLinus Torvalds	  The CAST5 encryption algorithm (synonymous with CAST-128) is
2941da177e4SLinus Torvalds	  described in RFC2144.
2951da177e4SLinus Torvalds
2961da177e4SLinus Torvaldsconfig CRYPTO_CAST6
2971da177e4SLinus Torvalds	tristate "CAST6 (CAST-256) cipher algorithm"
298*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
2991da177e4SLinus Torvalds	help
3001da177e4SLinus Torvalds	  The CAST6 encryption algorithm (synonymous with CAST-256) is
3011da177e4SLinus Torvalds	  described in RFC2612.
3021da177e4SLinus Torvalds
3031da177e4SLinus Torvaldsconfig CRYPTO_TEA
304fb4f10edSAaron Grothe	tristate "TEA, XTEA and XETA cipher algorithms"
305*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3061da177e4SLinus Torvalds	help
3071da177e4SLinus Torvalds	  TEA cipher algorithm.
3081da177e4SLinus Torvalds
3091da177e4SLinus Torvalds	  Tiny Encryption Algorithm is a simple cipher that uses
3101da177e4SLinus Torvalds	  many rounds for security.  It is very fast and uses
3111da177e4SLinus Torvalds	  little memory.
3121da177e4SLinus Torvalds
3131da177e4SLinus Torvalds	  Xtendend Tiny Encryption Algorithm is a modification to
3141da177e4SLinus Torvalds	  the TEA algorithm to address a potential key weakness
3151da177e4SLinus Torvalds	  in the TEA algorithm.
3161da177e4SLinus Torvalds
317fb4f10edSAaron Grothe	  Xtendend Encryption Tiny Algorithm is a mis-implementation
318fb4f10edSAaron Grothe	  of the XTEA algorithm for compatibility purposes.
319fb4f10edSAaron Grothe
3201da177e4SLinus Torvaldsconfig CRYPTO_ARC4
3211da177e4SLinus Torvalds	tristate "ARC4 cipher algorithm"
322*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3231da177e4SLinus Torvalds	help
3241da177e4SLinus Torvalds	  ARC4 cipher algorithm.
3251da177e4SLinus Torvalds
3261da177e4SLinus Torvalds	  ARC4 is a stream cipher using keys ranging from 8 bits to 2048
3271da177e4SLinus Torvalds	  bits in length.  This algorithm is required for driver-based
3281da177e4SLinus Torvalds	  WEP, but it should not be for other purposes because of the
3291da177e4SLinus Torvalds	  weakness of the algorithm.
3301da177e4SLinus Torvalds
3311da177e4SLinus Torvaldsconfig CRYPTO_KHAZAD
3321da177e4SLinus Torvalds	tristate "Khazad cipher algorithm"
333*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3341da177e4SLinus Torvalds	help
3351da177e4SLinus Torvalds	  Khazad cipher algorithm.
3361da177e4SLinus Torvalds
3371da177e4SLinus Torvalds	  Khazad was a finalist in the initial NESSIE competition.  It is
3381da177e4SLinus Torvalds	  an algorithm optimized for 64-bit processors with good performance
3391da177e4SLinus Torvalds	  on 32-bit processors.  Khazad uses an 128 bit key size.
3401da177e4SLinus Torvalds
3411da177e4SLinus Torvalds	  See also:
3421da177e4SLinus Torvalds	  <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html>
3431da177e4SLinus Torvalds
3441da177e4SLinus Torvaldsconfig CRYPTO_ANUBIS
3451da177e4SLinus Torvalds	tristate "Anubis cipher algorithm"
346*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3471da177e4SLinus Torvalds	help
3481da177e4SLinus Torvalds	  Anubis cipher algorithm.
3491da177e4SLinus Torvalds
3501da177e4SLinus Torvalds	  Anubis is a variable key length cipher which can use keys from
3511da177e4SLinus Torvalds	  128 bits to 320 bits in length.  It was evaluated as a entrant
3521da177e4SLinus Torvalds	  in the NESSIE competition.
3531da177e4SLinus Torvalds
3541da177e4SLinus Torvalds	  See also:
3551da177e4SLinus Torvalds	  <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/>
3561da177e4SLinus Torvalds	  <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html>
3571da177e4SLinus Torvalds
3581da177e4SLinus Torvalds
3591da177e4SLinus Torvaldsconfig CRYPTO_DEFLATE
3601da177e4SLinus Torvalds	tristate "Deflate compression algorithm"
361*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3621da177e4SLinus Torvalds	select ZLIB_INFLATE
3631da177e4SLinus Torvalds	select ZLIB_DEFLATE
3641da177e4SLinus Torvalds	help
3651da177e4SLinus Torvalds	  This is the Deflate algorithm (RFC1951), specified for use in
3661da177e4SLinus Torvalds	  IPSec with the IPCOMP protocol (RFC3173, RFC2394).
3671da177e4SLinus Torvalds
3681da177e4SLinus Torvalds	  You will most probably want this if using IPSec.
3691da177e4SLinus Torvalds
3701da177e4SLinus Torvaldsconfig CRYPTO_MICHAEL_MIC
3711da177e4SLinus Torvalds	tristate "Michael MIC keyed digest algorithm"
372*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3731da177e4SLinus Torvalds	help
3741da177e4SLinus Torvalds	  Michael MIC is used for message integrity protection in TKIP
3751da177e4SLinus Torvalds	  (IEEE 802.11i). This algorithm is required for TKIP, but it
3761da177e4SLinus Torvalds	  should not be used for other purposes because of the weakness
3771da177e4SLinus Torvalds	  of the algorithm.
3781da177e4SLinus Torvalds
3791da177e4SLinus Torvaldsconfig CRYPTO_CRC32C
3801da177e4SLinus Torvalds	tristate "CRC32c CRC algorithm"
381*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3821da177e4SLinus Torvalds	select LIBCRC32C
3831da177e4SLinus Torvalds	help
3841da177e4SLinus Torvalds	  Castagnoli, et al Cyclic Redundancy-Check Algorithm.  Used
3851da177e4SLinus Torvalds	  by iSCSI for header and data digests and by others.
3861da177e4SLinus Torvalds	  See Castagnoli93.  This implementation uses lib/libcrc32c.
3871da177e4SLinus Torvalds          Module will be crc32c.
3881da177e4SLinus Torvalds
3891da177e4SLinus Torvaldsconfig CRYPTO_TEST
3901da177e4SLinus Torvalds	tristate "Testing module"
391*cce9e06dSHerbert Xu	depends on m
392*cce9e06dSHerbert Xu	select CRYPTO_ALGAPI
3931da177e4SLinus Torvalds	help
3941da177e4SLinus Torvalds	  Quick & dirty crypto test module.
3951da177e4SLinus Torvalds
3961da177e4SLinus Torvaldssource "drivers/crypto/Kconfig"
3971da177e4SLinus Torvalds
398*cce9e06dSHerbert Xuendif	# if CRYPTO
399*cce9e06dSHerbert Xu
400*cce9e06dSHerbert Xuendmenu
401