Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

[CRYPTO] kconfig: Ordering cleanup

Ciphers, block modes, name it, are grouped together and sorted.

Signed-off-by: Sebastian Siewior <sebastian@breakpoint.cc>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>

authored by

Sebastian Siewior and committed by
Herbert Xu
584fffc8 3af5b90b

+384 -371
+384 -371
crypto/Kconfig
··· 19 19 20 20 if CRYPTO 21 21 22 + comment "Crypto core or helper" 23 + 22 24 config CRYPTO_ALGAPI 23 25 tristate 24 26 help ··· 34 32 tristate 35 33 select CRYPTO_ALGAPI 36 34 37 - config CRYPTO_SEQIV 38 - tristate "Sequence Number IV Generator" 39 - select CRYPTO_AEAD 40 - select CRYPTO_BLKCIPHER 41 - help 42 - This IV generator generates an IV based on a sequence number by 43 - xoring it with a salt. This algorithm is mainly useful for CTR 44 - and similar modes. 45 - 46 35 config CRYPTO_HASH 47 36 tristate 48 37 select CRYPTO_ALGAPI ··· 45 52 Create default cryptographic template instantiations such as 46 53 cbc(aes). 47 54 48 - config CRYPTO_HMAC 49 - tristate "HMAC support" 50 - select CRYPTO_HASH 51 - select CRYPTO_MANAGER 52 - help 53 - HMAC: Keyed-Hashing for Message Authentication (RFC2104). 54 - This is required for IPSec. 55 - 56 - config CRYPTO_XCBC 57 - tristate "XCBC support" 58 - depends on EXPERIMENTAL 59 - select CRYPTO_HASH 60 - select CRYPTO_MANAGER 61 - help 62 - XCBC: Keyed-Hashing with encryption algorithm 63 - http://www.ietf.org/rfc/rfc3566.txt 64 - http://csrc.nist.gov/encryption/modes/proposedmodes/ 65 - xcbc-mac/xcbc-mac-spec.pdf 66 - 67 - config CRYPTO_NULL 68 - tristate "Null algorithms" 69 - select CRYPTO_ALGAPI 70 - select CRYPTO_BLKCIPHER 71 - help 72 - These are 'Null' algorithms, used by IPsec, which do nothing. 73 - 74 - config CRYPTO_MD4 75 - tristate "MD4 digest algorithm" 76 - select CRYPTO_ALGAPI 77 - help 78 - MD4 message digest algorithm (RFC1320). 79 - 80 - config CRYPTO_MD5 81 - tristate "MD5 digest algorithm" 82 - select CRYPTO_ALGAPI 83 - help 84 - MD5 message digest algorithm (RFC1321). 85 - 86 - config CRYPTO_SHA1 87 - tristate "SHA1 digest algorithm" 88 - select CRYPTO_ALGAPI 89 - help 90 - SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2). 91 - 92 - config CRYPTO_SHA256 93 - tristate "SHA224 and SHA256 digest algorithm" 94 - select CRYPTO_ALGAPI 95 - help 96 - SHA256 secure hash standard (DFIPS 180-2). 97 - 98 - This version of SHA implements a 256 bit hash with 128 bits of 99 - security against collision attacks. 100 - 101 - This code also includes SHA-224, a 224 bit hash with 112 bits 102 - of security against collision attacks. 103 - 104 - config CRYPTO_SHA512 105 - tristate "SHA384 and SHA512 digest algorithms" 106 - select CRYPTO_ALGAPI 107 - help 108 - SHA512 secure hash standard (DFIPS 180-2). 109 - 110 - This version of SHA implements a 512 bit hash with 256 bits of 111 - security against collision attacks. 112 - 113 - This code also includes SHA-384, a 384 bit hash with 192 bits 114 - of security against collision attacks. 115 - 116 - config CRYPTO_WP512 117 - tristate "Whirlpool digest algorithms" 118 - select CRYPTO_ALGAPI 119 - help 120 - Whirlpool hash algorithm 512, 384 and 256-bit hashes 121 - 122 - Whirlpool-512 is part of the NESSIE cryptographic primitives. 123 - Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard 124 - 125 - See also: 126 - <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html> 127 - 128 - config CRYPTO_TGR192 129 - tristate "Tiger digest algorithms" 130 - select CRYPTO_ALGAPI 131 - help 132 - Tiger hash algorithm 192, 160 and 128-bit hashes 133 - 134 - Tiger is a hash function optimized for 64-bit processors while 135 - still having decent performance on 32-bit processors. 136 - Tiger was developed by Ross Anderson and Eli Biham. 137 - 138 - See also: 139 - <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>. 140 - 141 55 config CRYPTO_GF128MUL 142 56 tristate "GF(2^128) multiplication functions (EXPERIMENTAL)" 143 57 depends on EXPERIMENTAL ··· 55 155 cipher mode. Only select this option by hand if you expect to load 56 156 an external module that requires these functions. 57 157 58 - config CRYPTO_ECB 59 - tristate "ECB support" 158 + config CRYPTO_NULL 159 + tristate "Null algorithms" 160 + select CRYPTO_ALGAPI 161 + select CRYPTO_BLKCIPHER 162 + help 163 + These are 'Null' algorithms, used by IPsec, which do nothing. 164 + 165 + config CRYPTO_CRYPTD 166 + tristate "Software async crypto daemon" 60 167 select CRYPTO_BLKCIPHER 61 168 select CRYPTO_MANAGER 62 169 help 63 - ECB: Electronic CodeBook mode 64 - This is the simplest block cipher algorithm. It simply encrypts 65 - the input block by block. 170 + This is a generic software asynchronous crypto daemon that 171 + converts an arbitrary synchronous software crypto algorithm 172 + into an asynchronous algorithm that executes in a kernel thread. 173 + 174 + config CRYPTO_AUTHENC 175 + tristate "Authenc support" 176 + select CRYPTO_AEAD 177 + select CRYPTO_BLKCIPHER 178 + select CRYPTO_MANAGER 179 + select CRYPTO_HASH 180 + help 181 + Authenc: Combined mode wrapper for IPsec. 182 + This is required for IPSec. 183 + 184 + config CRYPTO_TEST 185 + tristate "Testing module" 186 + depends on m 187 + select CRYPTO_ALGAPI 188 + select CRYPTO_AEAD 189 + select CRYPTO_BLKCIPHER 190 + help 191 + Quick & dirty crypto test module. 192 + 193 + comment "Authenticated Encryption with Associated Data" 194 + 195 + config CRYPTO_CCM 196 + tristate "CCM support" 197 + select CRYPTO_CTR 198 + select CRYPTO_AEAD 199 + help 200 + Support for Counter with CBC MAC. Required for IPsec. 201 + 202 + config CRYPTO_GCM 203 + tristate "GCM/GMAC support" 204 + select CRYPTO_CTR 205 + select CRYPTO_AEAD 206 + select CRYPTO_GF128MUL 207 + help 208 + Support for Galois/Counter Mode (GCM) and Galois Message 209 + Authentication Code (GMAC). Required for IPSec. 210 + 211 + config CRYPTO_SEQIV 212 + tristate "Sequence Number IV Generator" 213 + select CRYPTO_AEAD 214 + select CRYPTO_BLKCIPHER 215 + help 216 + This IV generator generates an IV based on a sequence number by 217 + xoring it with a salt. This algorithm is mainly useful for CTR 218 + 219 + comment "Block modes" 66 220 67 221 config CRYPTO_CBC 68 222 tristate "CBC support" ··· 125 171 help 126 172 CBC: Cipher Block Chaining mode 127 173 This block cipher algorithm is required for IPSec. 128 - 129 - config CRYPTO_PCBC 130 - tristate "PCBC support" 131 - select CRYPTO_BLKCIPHER 132 - select CRYPTO_MANAGER 133 - help 134 - PCBC: Propagating Cipher Block Chaining mode 135 - This block cipher algorithm is required for RxRPC. 136 - 137 - config CRYPTO_LRW 138 - tristate "LRW support (EXPERIMENTAL)" 139 - depends on EXPERIMENTAL 140 - select CRYPTO_BLKCIPHER 141 - select CRYPTO_MANAGER 142 - select CRYPTO_GF128MUL 143 - help 144 - LRW: Liskov Rivest Wagner, a tweakable, non malleable, non movable 145 - narrow block cipher mode for dm-crypt. Use it with cipher 146 - specification string aes-lrw-benbi, the key must be 256, 320 or 384. 147 - The first 128, 192 or 256 bits in the key are used for AES and the 148 - rest is used to tie each cipher block to its logical position. 149 - 150 - config CRYPTO_XTS 151 - tristate "XTS support (EXPERIMENTAL)" 152 - depends on EXPERIMENTAL 153 - select CRYPTO_BLKCIPHER 154 - select CRYPTO_MANAGER 155 - select CRYPTO_GF128MUL 156 - help 157 - XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain, 158 - key size 256, 384 or 512 bits. This implementation currently 159 - can't handle a sectorsize which is not a multiple of 16 bytes. 160 174 161 175 config CRYPTO_CTR 162 176 tristate "CTR support" ··· 146 224 This mode is required for Kerberos gss mechanism support 147 225 for AES encryption. 148 226 149 - config CRYPTO_GCM 150 - tristate "GCM/GMAC support" 151 - select CRYPTO_CTR 152 - select CRYPTO_AEAD 153 - select CRYPTO_GF128MUL 154 - help 155 - Support for Galois/Counter Mode (GCM) and Galois Message 156 - Authentication Code (GMAC). Required for IPSec. 157 - 158 - config CRYPTO_CCM 159 - tristate "CCM support" 160 - select CRYPTO_CTR 161 - select CRYPTO_AEAD 162 - help 163 - Support for Counter with CBC MAC. Required for IPsec. 164 - 165 - config CRYPTO_CRYPTD 166 - tristate "Software async crypto daemon" 227 + config CRYPTO_ECB 228 + tristate "ECB support" 167 229 select CRYPTO_BLKCIPHER 168 230 select CRYPTO_MANAGER 169 231 help 170 - This is a generic software asynchronous crypto daemon that 171 - converts an arbitrary synchronous software crypto algorithm 172 - into an asynchronous algorithm that executes in a kernel thread. 232 + ECB: Electronic CodeBook mode 233 + This is the simplest block cipher algorithm. It simply encrypts 234 + the input block by block. 173 235 174 - config CRYPTO_DES 175 - tristate "DES and Triple DES EDE cipher algorithms" 176 - select CRYPTO_ALGAPI 177 - help 178 - DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3). 179 - 180 - config CRYPTO_FCRYPT 181 - tristate "FCrypt cipher algorithm" 182 - select CRYPTO_ALGAPI 236 + config CRYPTO_LRW 237 + tristate "LRW support (EXPERIMENTAL)" 238 + depends on EXPERIMENTAL 183 239 select CRYPTO_BLKCIPHER 240 + select CRYPTO_MANAGER 241 + select CRYPTO_GF128MUL 184 242 help 185 - FCrypt algorithm used by RxRPC. 243 + LRW: Liskov Rivest Wagner, a tweakable, non malleable, non movable 244 + narrow block cipher mode for dm-crypt. Use it with cipher 245 + specification string aes-lrw-benbi, the key must be 256, 320 or 384. 246 + The first 128, 192 or 256 bits in the key are used for AES and the 247 + rest is used to tie each cipher block to its logical position. 186 248 187 - config CRYPTO_BLOWFISH 188 - tristate "Blowfish cipher algorithm" 249 + config CRYPTO_PCBC 250 + tristate "PCBC support" 251 + select CRYPTO_BLKCIPHER 252 + select CRYPTO_MANAGER 253 + help 254 + PCBC: Propagating Cipher Block Chaining mode 255 + This block cipher algorithm is required for RxRPC. 256 + 257 + config CRYPTO_XTS 258 + tristate "XTS support (EXPERIMENTAL)" 259 + depends on EXPERIMENTAL 260 + select CRYPTO_BLKCIPHER 261 + select CRYPTO_MANAGER 262 + select CRYPTO_GF128MUL 263 + help 264 + XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain, 265 + key size 256, 384 or 512 bits. This implementation currently 266 + can't handle a sectorsize which is not a multiple of 16 bytes. 267 + 268 + comment "Hash modes" 269 + 270 + config CRYPTO_HMAC 271 + tristate "HMAC support" 272 + select CRYPTO_HASH 273 + select CRYPTO_MANAGER 274 + help 275 + HMAC: Keyed-Hashing for Message Authentication (RFC2104). 276 + This is required for IPSec. 277 + 278 + config CRYPTO_XCBC 279 + tristate "XCBC support" 280 + depends on EXPERIMENTAL 281 + select CRYPTO_HASH 282 + select CRYPTO_MANAGER 283 + help 284 + XCBC: Keyed-Hashing with encryption algorithm 285 + http://www.ietf.org/rfc/rfc3566.txt 286 + http://csrc.nist.gov/encryption/modes/proposedmodes/ 287 + xcbc-mac/xcbc-mac-spec.pdf 288 + 289 + comment "Digest" 290 + 291 + config CRYPTO_CRC32C 292 + tristate "CRC32c CRC algorithm" 293 + select CRYPTO_ALGAPI 294 + select LIBCRC32C 295 + help 296 + Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used 297 + by iSCSI for header and data digests and by others. 298 + See Castagnoli93. This implementation uses lib/libcrc32c. 299 + Module will be crc32c. 300 + 301 + config CRYPTO_MD4 302 + tristate "MD4 digest algorithm" 189 303 select CRYPTO_ALGAPI 190 304 help 191 - Blowfish cipher algorithm, by Bruce Schneier. 192 - 193 - This is a variable key length cipher which can use keys from 32 194 - bits to 448 bits in length. It's fast, simple and specifically 195 - designed for use on "large microprocessors". 196 - 197 - See also: 198 - <http://www.schneier.com/blowfish.html> 305 + MD4 message digest algorithm (RFC1320). 199 306 200 - config CRYPTO_TWOFISH 201 - tristate "Twofish cipher algorithm" 202 - select CRYPTO_ALGAPI 203 - select CRYPTO_TWOFISH_COMMON 204 - help 205 - Twofish cipher algorithm. 206 - 207 - Twofish was submitted as an AES (Advanced Encryption Standard) 208 - candidate cipher by researchers at CounterPane Systems. It is a 209 - 16 round block cipher supporting key sizes of 128, 192, and 256 210 - bits. 211 - 212 - See also: 213 - <http://www.schneier.com/twofish.html> 214 - 215 - config CRYPTO_TWOFISH_COMMON 216 - tristate 217 - help 218 - Common parts of the Twofish cipher algorithm shared by the 219 - generic c and the assembler implementations. 220 - 221 - config CRYPTO_TWOFISH_586 222 - tristate "Twofish cipher algorithms (i586)" 223 - depends on (X86 || UML_X86) && !64BIT 224 - select CRYPTO_ALGAPI 225 - select CRYPTO_TWOFISH_COMMON 226 - help 227 - Twofish cipher algorithm. 228 - 229 - Twofish was submitted as an AES (Advanced Encryption Standard) 230 - candidate cipher by researchers at CounterPane Systems. It is a 231 - 16 round block cipher supporting key sizes of 128, 192, and 256 232 - bits. 233 - 234 - See also: 235 - <http://www.schneier.com/twofish.html> 236 - 237 - config CRYPTO_TWOFISH_X86_64 238 - tristate "Twofish cipher algorithm (x86_64)" 239 - depends on (X86 || UML_X86) && 64BIT 240 - select CRYPTO_ALGAPI 241 - select CRYPTO_TWOFISH_COMMON 242 - help 243 - Twofish cipher algorithm (x86_64). 244 - 245 - Twofish was submitted as an AES (Advanced Encryption Standard) 246 - candidate cipher by researchers at CounterPane Systems. It is a 247 - 16 round block cipher supporting key sizes of 128, 192, and 256 248 - bits. 249 - 250 - See also: 251 - <http://www.schneier.com/twofish.html> 252 - 253 - config CRYPTO_SERPENT 254 - tristate "Serpent cipher algorithm" 307 + config CRYPTO_MD5 308 + tristate "MD5 digest algorithm" 255 309 select CRYPTO_ALGAPI 256 310 help 257 - Serpent cipher algorithm, by Anderson, Biham & Knudsen. 311 + MD5 message digest algorithm (RFC1321). 258 312 259 - Keys are allowed to be from 0 to 256 bits in length, in steps 260 - of 8 bits. Also includes the 'Tnepres' algorithm, a reversed 261 - variant of Serpent for compatibility with old kerneli.org code. 313 + config CRYPTO_MICHAEL_MIC 314 + tristate "Michael MIC keyed digest algorithm" 315 + select CRYPTO_ALGAPI 316 + help 317 + Michael MIC is used for message integrity protection in TKIP 318 + (IEEE 802.11i). This algorithm is required for TKIP, but it 319 + should not be used for other purposes because of the weakness 320 + of the algorithm. 321 + 322 + config CRYPTO_SHA1 323 + tristate "SHA1 digest algorithm" 324 + select CRYPTO_ALGAPI 325 + help 326 + SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2). 327 + 328 + config CRYPTO_SHA256 329 + tristate "SHA224 and SHA256 digest algorithm" 330 + select CRYPTO_ALGAPI 331 + help 332 + SHA256 secure hash standard (DFIPS 180-2). 333 + 334 + This version of SHA implements a 256 bit hash with 128 bits of 335 + security against collision attacks. 336 + 337 + This code also includes SHA-224, a 224 bit hash with 112 bits 338 + of security against collision attacks. 339 + 340 + config CRYPTO_SHA512 341 + tristate "SHA384 and SHA512 digest algorithms" 342 + select CRYPTO_ALGAPI 343 + help 344 + SHA512 secure hash standard (DFIPS 180-2). 345 + 346 + This version of SHA implements a 512 bit hash with 256 bits of 347 + security against collision attacks. 348 + 349 + This code also includes SHA-384, a 384 bit hash with 192 bits 350 + of security against collision attacks. 351 + 352 + config CRYPTO_TGR192 353 + tristate "Tiger digest algorithms" 354 + select CRYPTO_ALGAPI 355 + help 356 + Tiger hash algorithm 192, 160 and 128-bit hashes 357 + 358 + Tiger is a hash function optimized for 64-bit processors while 359 + still having decent performance on 32-bit processors. 360 + Tiger was developed by Ross Anderson and Eli Biham. 262 361 263 362 See also: 264 - <http://www.cl.cam.ac.uk/~rja14/serpent.html> 363 + <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>. 364 + 365 + config CRYPTO_WP512 366 + tristate "Whirlpool digest algorithms" 367 + select CRYPTO_ALGAPI 368 + help 369 + Whirlpool hash algorithm 512, 384 and 256-bit hashes 370 + 371 + Whirlpool-512 is part of the NESSIE cryptographic primitives. 372 + Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard 373 + 374 + See also: 375 + <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html> 376 + 377 + comment "Ciphers" 265 378 266 379 config CRYPTO_AES 267 380 tristate "AES cipher algorithms" 268 381 select CRYPTO_ALGAPI 269 382 help 270 - AES cipher algorithms (FIPS-197). AES uses the Rijndael 383 + AES cipher algorithms (FIPS-197). AES uses the Rijndael 271 384 algorithm. 272 385 273 386 Rijndael appears to be consistently a very good performer in 274 - both hardware and software across a wide range of computing 275 - environments regardless of its use in feedback or non-feedback 276 - modes. Its key setup time is excellent, and its key agility is 277 - good. Rijndael's very low memory requirements make it very well 278 - suited for restricted-space environments, in which it also 279 - demonstrates excellent performance. Rijndael's operations are 280 - among the easiest to defend against power and timing attacks. 387 + both hardware and software across a wide range of computing 388 + environments regardless of its use in feedback or non-feedback 389 + modes. Its key setup time is excellent, and its key agility is 390 + good. Rijndael's very low memory requirements make it very well 391 + suited for restricted-space environments, in which it also 392 + demonstrates excellent performance. Rijndael's operations are 393 + among the easiest to defend against power and timing attacks. 281 394 282 - The AES specifies three key sizes: 128, 192 and 256 bits 395 + The AES specifies three key sizes: 128, 192 and 256 bits 283 396 284 397 See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information. 285 398 ··· 324 367 select CRYPTO_ALGAPI 325 368 select CRYPTO_AES 326 369 help 327 - AES cipher algorithms (FIPS-197). AES uses the Rijndael 370 + AES cipher algorithms (FIPS-197). AES uses the Rijndael 328 371 algorithm. 329 372 330 373 Rijndael appears to be consistently a very good performer in 331 - both hardware and software across a wide range of computing 332 - environments regardless of its use in feedback or non-feedback 333 - modes. Its key setup time is excellent, and its key agility is 334 - good. Rijndael's very low memory requirements make it very well 335 - suited for restricted-space environments, in which it also 336 - demonstrates excellent performance. Rijndael's operations are 337 - among the easiest to defend against power and timing attacks. 374 + both hardware and software across a wide range of computing 375 + environments regardless of its use in feedback or non-feedback 376 + modes. Its key setup time is excellent, and its key agility is 377 + good. Rijndael's very low memory requirements make it very well 378 + suited for restricted-space environments, in which it also 379 + demonstrates excellent performance. Rijndael's operations are 380 + among the easiest to defend against power and timing attacks. 338 381 339 - The AES specifies three key sizes: 128, 192 and 256 bits 382 + The AES specifies three key sizes: 128, 192 and 256 bits 340 383 341 384 See <http://csrc.nist.gov/encryption/aes/> for more information. 342 385 ··· 346 389 select CRYPTO_ALGAPI 347 390 select CRYPTO_AES 348 391 help 349 - AES cipher algorithms (FIPS-197). AES uses the Rijndael 392 + AES cipher algorithms (FIPS-197). AES uses the Rijndael 350 393 algorithm. 351 394 352 395 Rijndael appears to be consistently a very good performer in 353 - both hardware and software across a wide range of computing 354 - environments regardless of its use in feedback or non-feedback 355 - modes. Its key setup time is excellent, and its key agility is 356 - good. Rijndael's very low memory requirements make it very well 357 - suited for restricted-space environments, in which it also 358 - demonstrates excellent performance. Rijndael's operations are 359 - among the easiest to defend against power and timing attacks. 396 + both hardware and software across a wide range of computing 397 + environments regardless of its use in feedback or non-feedback 398 + modes. Its key setup time is excellent, and its key agility is 399 + good. Rijndael's very low memory requirements make it very well 400 + suited for restricted-space environments, in which it also 401 + demonstrates excellent performance. Rijndael's operations are 402 + among the easiest to defend against power and timing attacks. 360 403 361 - The AES specifies three key sizes: 128, 192 and 256 bits 404 + The AES specifies three key sizes: 128, 192 and 256 bits 362 405 363 406 See <http://csrc.nist.gov/encryption/aes/> for more information. 407 + 408 + config CRYPTO_ANUBIS 409 + tristate "Anubis cipher algorithm" 410 + select CRYPTO_ALGAPI 411 + help 412 + Anubis cipher algorithm. 413 + 414 + Anubis is a variable key length cipher which can use keys from 415 + 128 bits to 320 bits in length. It was evaluated as a entrant 416 + in the NESSIE competition. 417 + 418 + See also: 419 + <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/> 420 + <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html> 421 + 422 + config CRYPTO_ARC4 423 + tristate "ARC4 cipher algorithm" 424 + select CRYPTO_ALGAPI 425 + help 426 + ARC4 cipher algorithm. 427 + 428 + ARC4 is a stream cipher using keys ranging from 8 bits to 2048 429 + bits in length. This algorithm is required for driver-based 430 + WEP, but it should not be for other purposes because of the 431 + weakness of the algorithm. 432 + 433 + config CRYPTO_BLOWFISH 434 + tristate "Blowfish cipher algorithm" 435 + select CRYPTO_ALGAPI 436 + help 437 + Blowfish cipher algorithm, by Bruce Schneier. 438 + 439 + This is a variable key length cipher which can use keys from 32 440 + bits to 448 bits in length. It's fast, simple and specifically 441 + designed for use on "large microprocessors". 442 + 443 + See also: 444 + <http://www.schneier.com/blowfish.html> 445 + 446 + config CRYPTO_CAMELLIA 447 + tristate "Camellia cipher algorithms" 448 + depends on CRYPTO 449 + select CRYPTO_ALGAPI 450 + help 451 + Camellia cipher algorithms module. 452 + 453 + Camellia is a symmetric key block cipher developed jointly 454 + at NTT and Mitsubishi Electric Corporation. 455 + 456 + The Camellia specifies three key sizes: 128, 192 and 256 bits. 457 + 458 + See also: 459 + <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html> 364 460 365 461 config CRYPTO_CAST5 366 462 tristate "CAST5 (CAST-128) cipher algorithm" ··· 429 419 The CAST6 encryption algorithm (synonymous with CAST-256) is 430 420 described in RFC2612. 431 421 432 - config CRYPTO_TEA 433 - tristate "TEA, XTEA and XETA cipher algorithms" 422 + config CRYPTO_DES 423 + tristate "DES and Triple DES EDE cipher algorithms" 434 424 select CRYPTO_ALGAPI 435 425 help 436 - TEA cipher algorithm. 426 + DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3). 437 427 438 - Tiny Encryption Algorithm is a simple cipher that uses 439 - many rounds for security. It is very fast and uses 440 - little memory. 441 - 442 - Xtendend Tiny Encryption Algorithm is a modification to 443 - the TEA algorithm to address a potential key weakness 444 - in the TEA algorithm. 445 - 446 - Xtendend Encryption Tiny Algorithm is a mis-implementation 447 - of the XTEA algorithm for compatibility purposes. 448 - 449 - config CRYPTO_ARC4 450 - tristate "ARC4 cipher algorithm" 428 + config CRYPTO_FCRYPT 429 + tristate "FCrypt cipher algorithm" 451 430 select CRYPTO_ALGAPI 431 + select CRYPTO_BLKCIPHER 452 432 help 453 - ARC4 cipher algorithm. 454 - 455 - ARC4 is a stream cipher using keys ranging from 8 bits to 2048 456 - bits in length. This algorithm is required for driver-based 457 - WEP, but it should not be for other purposes because of the 458 - weakness of the algorithm. 433 + FCrypt algorithm used by RxRPC. 459 434 460 435 config CRYPTO_KHAZAD 461 436 tristate "Khazad cipher algorithm" ··· 454 459 455 460 See also: 456 461 <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html> 457 - 458 - config CRYPTO_ANUBIS 459 - tristate "Anubis cipher algorithm" 460 - select CRYPTO_ALGAPI 461 - help 462 - Anubis cipher algorithm. 463 - 464 - Anubis is a variable key length cipher which can use keys from 465 - 128 bits to 320 bits in length. It was evaluated as a entrant 466 - in the NESSIE competition. 467 - 468 - See also: 469 - <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/> 470 - <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html> 471 - 472 - config CRYPTO_SEED 473 - tristate "SEED cipher algorithm" 474 - select CRYPTO_ALGAPI 475 - help 476 - SEED cipher algorithm (RFC4269). 477 - 478 - SEED is a 128-bit symmetric key block cipher that has been 479 - developed by KISA (Korea Information Security Agency) as a 480 - national standard encryption algorithm of the Republic of Korea. 481 - It is a 16 round block cipher with the key size of 128 bit. 482 - 483 - See also: 484 - <http://www.kisa.or.kr/kisa/seed/jsp/seed_eng.jsp> 485 462 486 463 config CRYPTO_SALSA20 487 464 tristate "Salsa20 stream cipher algorithm (EXPERIMENTAL)" ··· 496 529 The Salsa20 stream cipher algorithm is designed by Daniel J. 497 530 Bernstein <djb@cr.yp.to>. See <http://cr.yp.to/snuffle.html> 498 531 532 + config CRYPTO_SEED 533 + tristate "SEED cipher algorithm" 534 + select CRYPTO_ALGAPI 535 + help 536 + SEED cipher algorithm (RFC4269). 537 + 538 + SEED is a 128-bit symmetric key block cipher that has been 539 + developed by KISA (Korea Information Security Agency) as a 540 + national standard encryption algorithm of the Republic of Korea. 541 + It is a 16 round block cipher with the key size of 128 bit. 542 + 543 + See also: 544 + <http://www.kisa.or.kr/kisa/seed/jsp/seed_eng.jsp> 545 + 546 + config CRYPTO_SERPENT 547 + tristate "Serpent cipher algorithm" 548 + select CRYPTO_ALGAPI 549 + help 550 + Serpent cipher algorithm, by Anderson, Biham & Knudsen. 551 + 552 + Keys are allowed to be from 0 to 256 bits in length, in steps 553 + of 8 bits. Also includes the 'Tnepres' algorithm, a reversed 554 + variant of Serpent for compatibility with old kerneli.org code. 555 + 556 + See also: 557 + <http://www.cl.cam.ac.uk/~rja14/serpent.html> 558 + 559 + config CRYPTO_TEA 560 + tristate "TEA, XTEA and XETA cipher algorithms" 561 + select CRYPTO_ALGAPI 562 + help 563 + TEA cipher algorithm. 564 + 565 + Tiny Encryption Algorithm is a simple cipher that uses 566 + many rounds for security. It is very fast and uses 567 + little memory. 568 + 569 + Xtendend Tiny Encryption Algorithm is a modification to 570 + the TEA algorithm to address a potential key weakness 571 + in the TEA algorithm. 572 + 573 + Xtendend Encryption Tiny Algorithm is a mis-implementation 574 + of the XTEA algorithm for compatibility purposes. 575 + 576 + config CRYPTO_TWOFISH 577 + tristate "Twofish cipher algorithm" 578 + select CRYPTO_ALGAPI 579 + select CRYPTO_TWOFISH_COMMON 580 + help 581 + Twofish cipher algorithm. 582 + 583 + Twofish was submitted as an AES (Advanced Encryption Standard) 584 + candidate cipher by researchers at CounterPane Systems. It is a 585 + 16 round block cipher supporting key sizes of 128, 192, and 256 586 + bits. 587 + 588 + See also: 589 + <http://www.schneier.com/twofish.html> 590 + 591 + config CRYPTO_TWOFISH_COMMON 592 + tristate 593 + help 594 + Common parts of the Twofish cipher algorithm shared by the 595 + generic c and the assembler implementations. 596 + 597 + config CRYPTO_TWOFISH_586 598 + tristate "Twofish cipher algorithms (i586)" 599 + depends on (X86 || UML_X86) && !64BIT 600 + select CRYPTO_ALGAPI 601 + select CRYPTO_TWOFISH_COMMON 602 + help 603 + Twofish cipher algorithm. 604 + 605 + Twofish was submitted as an AES (Advanced Encryption Standard) 606 + candidate cipher by researchers at CounterPane Systems. It is a 607 + 16 round block cipher supporting key sizes of 128, 192, and 256 608 + bits. 609 + 610 + See also: 611 + <http://www.schneier.com/twofish.html> 612 + 613 + config CRYPTO_TWOFISH_X86_64 614 + tristate "Twofish cipher algorithm (x86_64)" 615 + depends on (X86 || UML_X86) && 64BIT 616 + select CRYPTO_ALGAPI 617 + select CRYPTO_TWOFISH_COMMON 618 + help 619 + Twofish cipher algorithm (x86_64). 620 + 621 + Twofish was submitted as an AES (Advanced Encryption Standard) 622 + candidate cipher by researchers at CounterPane Systems. It is a 623 + 16 round block cipher supporting key sizes of 128, 192, and 256 624 + bits. 625 + 626 + See also: 627 + <http://www.schneier.com/twofish.html> 628 + 629 + comment "Compression" 630 + 499 631 config CRYPTO_DEFLATE 500 632 tristate "Deflate compression algorithm" 501 633 select CRYPTO_ALGAPI ··· 603 537 help 604 538 This is the Deflate algorithm (RFC1951), specified for use in 605 539 IPSec with the IPCOMP protocol (RFC3173, RFC2394). 606 - 540 + 607 541 You will most probably want this if using IPSec. 608 - 609 - config CRYPTO_MICHAEL_MIC 610 - tristate "Michael MIC keyed digest algorithm" 611 - select CRYPTO_ALGAPI 612 - help 613 - Michael MIC is used for message integrity protection in TKIP 614 - (IEEE 802.11i). This algorithm is required for TKIP, but it 615 - should not be used for other purposes because of the weakness 616 - of the algorithm. 617 - 618 - config CRYPTO_CRC32C 619 - tristate "CRC32c CRC algorithm" 620 - select CRYPTO_ALGAPI 621 - select LIBCRC32C 622 - help 623 - Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used 624 - by iSCSI for header and data digests and by others. 625 - See Castagnoli93. This implementation uses lib/libcrc32c. 626 - Module will be crc32c. 627 - 628 - config CRYPTO_CAMELLIA 629 - tristate "Camellia cipher algorithms" 630 - depends on CRYPTO 631 - select CRYPTO_ALGAPI 632 - help 633 - Camellia cipher algorithms module. 634 - 635 - Camellia is a symmetric key block cipher developed jointly 636 - at NTT and Mitsubishi Electric Corporation. 637 - 638 - The Camellia specifies three key sizes: 128, 192 and 256 bits. 639 - 640 - See also: 641 - <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html> 642 - 643 - config CRYPTO_TEST 644 - tristate "Testing module" 645 - depends on m 646 - select CRYPTO_ALGAPI 647 - select CRYPTO_AEAD 648 - select CRYPTO_BLKCIPHER 649 - help 650 - Quick & dirty crypto test module. 651 - 652 - config CRYPTO_AUTHENC 653 - tristate "Authenc support" 654 - select CRYPTO_AEAD 655 - select CRYPTO_BLKCIPHER 656 - select CRYPTO_MANAGER 657 - select CRYPTO_HASH 658 - help 659 - Authenc: Combined mode wrapper for IPsec. 660 - This is required for IPSec. 661 542 662 543 config CRYPTO_LZO 663 544 tristate "LZO compression algorithm"