2 # Generic algorithms support
8 # async_tx api: hardware offloaded memory transfer/transform support
10 source "crypto/async_tx/Kconfig"
13 # Cryptographic API Configuration
16 tristate "Cryptographic API"
18 This option provides the core Cryptographic API.
22 comment "Crypto core or helper"
25 bool "FIPS 200 compliance"
26 depends on CRYPTO_ANSI_CPRNG && !CRYPTO_MANAGER_DISABLE_TESTS
28 This options enables the fips boot option which is
29 required if you want to system to operate in a FIPS 200
30 certification. You should say no unless you know what
37 This option provides the API for cryptographic algorithms.
51 config CRYPTO_BLKCIPHER
53 select CRYPTO_BLKCIPHER2
56 config CRYPTO_BLKCIPHER2
60 select CRYPTO_WORKQUEUE
90 tristate "Cryptographic algorithm manager"
91 select CRYPTO_MANAGER2
93 Create default cryptographic template instantiations such as
96 config CRYPTO_MANAGER2
97 def_tristate CRYPTO_MANAGER || (CRYPTO_MANAGER!=n && CRYPTO_ALGAPI=y)
100 select CRYPTO_BLKCIPHER2
104 tristate "Userspace cryptographic algorithm configuration"
105 select CRYPTO_MANAGER
107 Userapace configuration for cryptographic instantiations such as
110 config CRYPTO_MANAGER_DISABLE_TESTS
111 bool "Disable run-time self tests"
113 depends on CRYPTO_MANAGER2
115 Disable run-time self tests that normally take place at
116 algorithm registration.
118 config CRYPTO_GF128MUL
119 tristate "GF(2^128) multiplication functions (EXPERIMENTAL)"
121 Efficient table driven implementation of multiplications in the
122 field GF(2^128). This is needed by some cypher modes. This
123 option will be selected automatically if you select such a
124 cipher mode. Only select this option by hand if you expect to load
125 an external module that requires these functions.
128 tristate "Null algorithms"
130 select CRYPTO_BLKCIPHER
133 These are 'Null' algorithms, used by IPsec, which do nothing.
136 tristate "Parallel crypto engine (EXPERIMENTAL)"
137 depends on SMP && EXPERIMENTAL
139 select CRYPTO_MANAGER
142 This converts an arbitrary crypto algorithm into a parallel
143 algorithm that executes in kernel threads.
145 config CRYPTO_WORKQUEUE
149 tristate "Software async crypto daemon"
150 select CRYPTO_BLKCIPHER
152 select CRYPTO_MANAGER
153 select CRYPTO_WORKQUEUE
155 This is a generic software asynchronous crypto daemon that
156 converts an arbitrary synchronous software crypto algorithm
157 into an asynchronous algorithm that executes in a kernel thread.
159 config CRYPTO_AUTHENC
160 tristate "Authenc support"
162 select CRYPTO_BLKCIPHER
163 select CRYPTO_MANAGER
166 Authenc: Combined mode wrapper for IPsec.
167 This is required for IPSec.
170 tristate "Testing module"
172 select CRYPTO_MANAGER
174 Quick & dirty crypto test module.
176 comment "Authenticated Encryption with Associated Data"
179 tristate "CCM support"
183 Support for Counter with CBC MAC. Required for IPsec.
186 tristate "GCM/GMAC support"
191 Support for Galois/Counter Mode (GCM) and Galois Message
192 Authentication Code (GMAC). Required for IPSec.
195 tristate "Sequence Number IV Generator"
197 select CRYPTO_BLKCIPHER
200 This IV generator generates an IV based on a sequence number by
201 xoring it with a salt. This algorithm is mainly useful for CTR
203 comment "Block modes"
206 tristate "CBC support"
207 select CRYPTO_BLKCIPHER
208 select CRYPTO_MANAGER
210 CBC: Cipher Block Chaining mode
211 This block cipher algorithm is required for IPSec.
214 tristate "CTR support"
215 select CRYPTO_BLKCIPHER
217 select CRYPTO_MANAGER
220 This block cipher algorithm is required for IPSec.
223 tristate "CTS support"
224 select CRYPTO_BLKCIPHER
226 CTS: Cipher Text Stealing
227 This is the Cipher Text Stealing mode as described by
228 Section 8 of rfc2040 and referenced by rfc3962.
229 (rfc3962 includes errata information in its Appendix A)
230 This mode is required for Kerberos gss mechanism support
234 tristate "ECB support"
235 select CRYPTO_BLKCIPHER
236 select CRYPTO_MANAGER
238 ECB: Electronic CodeBook mode
239 This is the simplest block cipher algorithm. It simply encrypts
240 the input block by block.
243 tristate "LRW support (EXPERIMENTAL)"
244 depends on EXPERIMENTAL
245 select CRYPTO_BLKCIPHER
246 select CRYPTO_MANAGER
247 select CRYPTO_GF128MUL
249 LRW: Liskov Rivest Wagner, a tweakable, non malleable, non movable
250 narrow block cipher mode for dm-crypt. Use it with cipher
251 specification string aes-lrw-benbi, the key must be 256, 320 or 384.
252 The first 128, 192 or 256 bits in the key are used for AES and the
253 rest is used to tie each cipher block to its logical position.
256 tristate "PCBC support"
257 select CRYPTO_BLKCIPHER
258 select CRYPTO_MANAGER
260 PCBC: Propagating Cipher Block Chaining mode
261 This block cipher algorithm is required for RxRPC.
264 tristate "XTS support (EXPERIMENTAL)"
265 depends on EXPERIMENTAL
266 select CRYPTO_BLKCIPHER
267 select CRYPTO_MANAGER
268 select CRYPTO_GF128MUL
270 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain,
271 key size 256, 384 or 512 bits. This implementation currently
272 can't handle a sectorsize which is not a multiple of 16 bytes.
277 tristate "HMAC support"
279 select CRYPTO_MANAGER
281 HMAC: Keyed-Hashing for Message Authentication (RFC2104).
282 This is required for IPSec.
285 tristate "XCBC support"
286 depends on EXPERIMENTAL
288 select CRYPTO_MANAGER
290 XCBC: Keyed-Hashing with encryption algorithm
291 http://www.ietf.org/rfc/rfc3566.txt
292 http://csrc.nist.gov/encryption/modes/proposedmodes/
293 xcbc-mac/xcbc-mac-spec.pdf
296 tristate "VMAC support"
297 depends on EXPERIMENTAL
299 select CRYPTO_MANAGER
301 VMAC is a message authentication algorithm designed for
302 very high speed on 64-bit architectures.
305 <http://fastcrypto.org/vmac>
310 tristate "CRC32c CRC algorithm"
313 Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used
314 by iSCSI for header and data digests and by others.
315 See Castagnoli93. Module will be crc32c.
317 config CRYPTO_CRC32C_INTEL
318 tristate "CRC32c INTEL hardware acceleration"
322 In Intel processor with SSE4.2 supported, the processor will
323 support CRC32C implementation using hardware accelerated CRC32
324 instruction. This option will create 'crc32c-intel' module,
325 which will enable any routine to use the CRC32 instruction to
326 gain performance compared with software implementation.
327 Module will be crc32c-intel.
330 tristate "GHASH digest algorithm"
332 select CRYPTO_GF128MUL
334 GHASH is message digest algorithm for GCM (Galois/Counter Mode).
337 tristate "MD4 digest algorithm"
340 MD4 message digest algorithm (RFC1320).
343 tristate "MD5 digest algorithm"
346 MD5 message digest algorithm (RFC1321).
348 config CRYPTO_MICHAEL_MIC
349 tristate "Michael MIC keyed digest algorithm"
352 Michael MIC is used for message integrity protection in TKIP
353 (IEEE 802.11i). This algorithm is required for TKIP, but it
354 should not be used for other purposes because of the weakness
358 tristate "RIPEMD-128 digest algorithm"
361 RIPEMD-128 (ISO/IEC 10118-3:2004).
363 RIPEMD-128 is a 128-bit cryptographic hash function. It should only
364 be used as a secure replacement for RIPEMD. For other use cases,
365 RIPEMD-160 should be used.
367 Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
368 See <http://homes.esat.kuleuven.be/~bosselae/ripemd160.html>
371 tristate "RIPEMD-160 digest algorithm"
374 RIPEMD-160 (ISO/IEC 10118-3:2004).
376 RIPEMD-160 is a 160-bit cryptographic hash function. It is intended
377 to be used as a secure replacement for the 128-bit hash functions
378 MD4, MD5 and it's predecessor RIPEMD
379 (not to be confused with RIPEMD-128).
381 It's speed is comparable to SHA1 and there are no known attacks
384 Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
385 See <http://homes.esat.kuleuven.be/~bosselae/ripemd160.html>
388 tristate "RIPEMD-256 digest algorithm"
391 RIPEMD-256 is an optional extension of RIPEMD-128 with a
392 256 bit hash. It is intended for applications that require
393 longer hash-results, without needing a larger security level
396 Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
397 See <http://homes.esat.kuleuven.be/~bosselae/ripemd160.html>
400 tristate "RIPEMD-320 digest algorithm"
403 RIPEMD-320 is an optional extension of RIPEMD-160 with a
404 320 bit hash. It is intended for applications that require
405 longer hash-results, without needing a larger security level
408 Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
409 See <http://homes.esat.kuleuven.be/~bosselae/ripemd160.html>
412 tristate "SHA1 digest algorithm"
415 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
417 config CRYPTO_SHA1_SSSE3
418 tristate "SHA1 digest algorithm (SSSE3/AVX)"
419 depends on X86 && 64BIT
423 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
424 using Supplemental SSE3 (SSSE3) instructions or Advanced Vector
425 Extensions (AVX), when available.
428 tristate "SHA224 and SHA256 digest algorithm"
431 SHA256 secure hash standard (DFIPS 180-2).
433 This version of SHA implements a 256 bit hash with 128 bits of
434 security against collision attacks.
436 This code also includes SHA-224, a 224 bit hash with 112 bits
437 of security against collision attacks.
440 tristate "SHA384 and SHA512 digest algorithms"
443 SHA512 secure hash standard (DFIPS 180-2).
445 This version of SHA implements a 512 bit hash with 256 bits of
446 security against collision attacks.
448 This code also includes SHA-384, a 384 bit hash with 192 bits
449 of security against collision attacks.
452 tristate "Tiger digest algorithms"
455 Tiger hash algorithm 192, 160 and 128-bit hashes
457 Tiger is a hash function optimized for 64-bit processors while
458 still having decent performance on 32-bit processors.
459 Tiger was developed by Ross Anderson and Eli Biham.
462 <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>.
465 tristate "Whirlpool digest algorithms"
468 Whirlpool hash algorithm 512, 384 and 256-bit hashes
470 Whirlpool-512 is part of the NESSIE cryptographic primitives.
471 Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
474 <http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html>
476 config CRYPTO_GHASH_CLMUL_NI_INTEL
477 tristate "GHASH digest algorithm (CLMUL-NI accelerated)"
478 depends on X86 && 64BIT
482 GHASH is message digest algorithm for GCM (Galois/Counter Mode).
483 The implementation is accelerated by CLMUL-NI of Intel.
488 tristate "AES cipher algorithms"
491 AES cipher algorithms (FIPS-197). AES uses the Rijndael
494 Rijndael appears to be consistently a very good performer in
495 both hardware and software across a wide range of computing
496 environments regardless of its use in feedback or non-feedback
497 modes. Its key setup time is excellent, and its key agility is
498 good. Rijndael's very low memory requirements make it very well
499 suited for restricted-space environments, in which it also
500 demonstrates excellent performance. Rijndael's operations are
501 among the easiest to defend against power and timing attacks.
503 The AES specifies three key sizes: 128, 192 and 256 bits
505 See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
507 config CRYPTO_AES_586
508 tristate "AES cipher algorithms (i586)"
509 depends on (X86 || UML_X86) && !64BIT
513 AES cipher algorithms (FIPS-197). AES uses the Rijndael
516 Rijndael appears to be consistently a very good performer in
517 both hardware and software across a wide range of computing
518 environments regardless of its use in feedback or non-feedback
519 modes. Its key setup time is excellent, and its key agility is
520 good. Rijndael's very low memory requirements make it very well
521 suited for restricted-space environments, in which it also
522 demonstrates excellent performance. Rijndael's operations are
523 among the easiest to defend against power and timing attacks.
525 The AES specifies three key sizes: 128, 192 and 256 bits
527 See <http://csrc.nist.gov/encryption/aes/> for more information.
529 config CRYPTO_AES_X86_64
530 tristate "AES cipher algorithms (x86_64)"
531 depends on (X86 || UML_X86) && 64BIT
535 AES cipher algorithms (FIPS-197). AES uses the Rijndael
538 Rijndael appears to be consistently a very good performer in
539 both hardware and software across a wide range of computing
540 environments regardless of its use in feedback or non-feedback
541 modes. Its key setup time is excellent, and its key agility is
542 good. Rijndael's very low memory requirements make it very well
543 suited for restricted-space environments, in which it also
544 demonstrates excellent performance. Rijndael's operations are
545 among the easiest to defend against power and timing attacks.
547 The AES specifies three key sizes: 128, 192 and 256 bits
549 See <http://csrc.nist.gov/encryption/aes/> for more information.
551 config CRYPTO_AES_NI_INTEL
552 tristate "AES cipher algorithms (AES-NI)"
554 select CRYPTO_AES_X86_64 if 64BIT
555 select CRYPTO_AES_586 if !64BIT
559 Use Intel AES-NI instructions for AES algorithm.
561 AES cipher algorithms (FIPS-197). AES uses the Rijndael
564 Rijndael appears to be consistently a very good performer in
565 both hardware and software across a wide range of computing
566 environments regardless of its use in feedback or non-feedback
567 modes. Its key setup time is excellent, and its key agility is
568 good. Rijndael's very low memory requirements make it very well
569 suited for restricted-space environments, in which it also
570 demonstrates excellent performance. Rijndael's operations are
571 among the easiest to defend against power and timing attacks.
573 The AES specifies three key sizes: 128, 192 and 256 bits
575 See <http://csrc.nist.gov/encryption/aes/> for more information.
577 In addition to AES cipher algorithm support, the acceleration
578 for some popular block cipher mode is supported too, including
579 ECB, CBC, LRW, PCBC, XTS. The 64 bit version has additional
580 acceleration for CTR.
583 tristate "Anubis cipher algorithm"
586 Anubis cipher algorithm.
588 Anubis is a variable key length cipher which can use keys from
589 128 bits to 320 bits in length. It was evaluated as a entrant
590 in the NESSIE competition.
593 <https://www.cosic.esat.kuleuven.be/nessie/reports/>
594 <http://www.larc.usp.br/~pbarreto/AnubisPage.html>
597 tristate "ARC4 cipher algorithm"
600 ARC4 cipher algorithm.
602 ARC4 is a stream cipher using keys ranging from 8 bits to 2048
603 bits in length. This algorithm is required for driver-based
604 WEP, but it should not be for other purposes because of the
605 weakness of the algorithm.
607 config CRYPTO_BLOWFISH
608 tristate "Blowfish cipher algorithm"
610 select CRYPTO_BLOWFISH_COMMON
612 Blowfish cipher algorithm, by Bruce Schneier.
614 This is a variable key length cipher which can use keys from 32
615 bits to 448 bits in length. It's fast, simple and specifically
616 designed for use on "large microprocessors".
619 <http://www.schneier.com/blowfish.html>
621 config CRYPTO_BLOWFISH_COMMON
624 Common parts of the Blowfish cipher algorithm shared by the
625 generic c and the assembler implementations.
628 <http://www.schneier.com/blowfish.html>
630 config CRYPTO_BLOWFISH_X86_64
631 tristate "Blowfish cipher algorithm (x86_64)"
632 depends on (X86 || UML_X86) && 64BIT
634 select CRYPTO_BLOWFISH_COMMON
636 Blowfish cipher algorithm (x86_64), by Bruce Schneier.
638 This is a variable key length cipher which can use keys from 32
639 bits to 448 bits in length. It's fast, simple and specifically
640 designed for use on "large microprocessors".
643 <http://www.schneier.com/blowfish.html>
645 config CRYPTO_CAMELLIA
646 tristate "Camellia cipher algorithms"
650 Camellia cipher algorithms module.
652 Camellia is a symmetric key block cipher developed jointly
653 at NTT and Mitsubishi Electric Corporation.
655 The Camellia specifies three key sizes: 128, 192 and 256 bits.
658 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
661 tristate "CAST5 (CAST-128) cipher algorithm"
664 The CAST5 encryption algorithm (synonymous with CAST-128) is
665 described in RFC2144.
668 tristate "CAST6 (CAST-256) cipher algorithm"
671 The CAST6 encryption algorithm (synonymous with CAST-256) is
672 described in RFC2612.
675 tristate "DES and Triple DES EDE cipher algorithms"
678 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
681 tristate "FCrypt cipher algorithm"
683 select CRYPTO_BLKCIPHER
685 FCrypt algorithm used by RxRPC.
688 tristate "Khazad cipher algorithm"
691 Khazad cipher algorithm.
693 Khazad was a finalist in the initial NESSIE competition. It is
694 an algorithm optimized for 64-bit processors with good performance
695 on 32-bit processors. Khazad uses an 128 bit key size.
698 <http://www.larc.usp.br/~pbarreto/KhazadPage.html>
700 config CRYPTO_SALSA20
701 tristate "Salsa20 stream cipher algorithm (EXPERIMENTAL)"
702 depends on EXPERIMENTAL
703 select CRYPTO_BLKCIPHER
705 Salsa20 stream cipher algorithm.
707 Salsa20 is a stream cipher submitted to eSTREAM, the ECRYPT
708 Stream Cipher Project. See <http://www.ecrypt.eu.org/stream/>
710 The Salsa20 stream cipher algorithm is designed by Daniel J.
711 Bernstein <djb@cr.yp.to>. See <http://cr.yp.to/snuffle.html>
713 config CRYPTO_SALSA20_586
714 tristate "Salsa20 stream cipher algorithm (i586) (EXPERIMENTAL)"
715 depends on (X86 || UML_X86) && !64BIT
716 depends on EXPERIMENTAL
717 select CRYPTO_BLKCIPHER
719 Salsa20 stream cipher algorithm.
721 Salsa20 is a stream cipher submitted to eSTREAM, the ECRYPT
722 Stream Cipher Project. See <http://www.ecrypt.eu.org/stream/>
724 The Salsa20 stream cipher algorithm is designed by Daniel J.
725 Bernstein <djb@cr.yp.to>. See <http://cr.yp.to/snuffle.html>
727 config CRYPTO_SALSA20_X86_64
728 tristate "Salsa20 stream cipher algorithm (x86_64) (EXPERIMENTAL)"
729 depends on (X86 || UML_X86) && 64BIT
730 depends on EXPERIMENTAL
731 select CRYPTO_BLKCIPHER
733 Salsa20 stream cipher algorithm.
735 Salsa20 is a stream cipher submitted to eSTREAM, the ECRYPT
736 Stream Cipher Project. See <http://www.ecrypt.eu.org/stream/>
738 The Salsa20 stream cipher algorithm is designed by Daniel J.
739 Bernstein <djb@cr.yp.to>. See <http://cr.yp.to/snuffle.html>
742 tristate "SEED cipher algorithm"
745 SEED cipher algorithm (RFC4269).
747 SEED is a 128-bit symmetric key block cipher that has been
748 developed by KISA (Korea Information Security Agency) as a
749 national standard encryption algorithm of the Republic of Korea.
750 It is a 16 round block cipher with the key size of 128 bit.
753 <http://www.kisa.or.kr/kisa/seed/jsp/seed_eng.jsp>
755 config CRYPTO_SERPENT
756 tristate "Serpent cipher algorithm"
759 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
761 Keys are allowed to be from 0 to 256 bits in length, in steps
762 of 8 bits. Also includes the 'Tnepres' algorithm, a reversed
763 variant of Serpent for compatibility with old kerneli.org code.
766 <http://www.cl.cam.ac.uk/~rja14/serpent.html>
769 tristate "TEA, XTEA and XETA cipher algorithms"
772 TEA cipher algorithm.
774 Tiny Encryption Algorithm is a simple cipher that uses
775 many rounds for security. It is very fast and uses
778 Xtendend Tiny Encryption Algorithm is a modification to
779 the TEA algorithm to address a potential key weakness
780 in the TEA algorithm.
782 Xtendend Encryption Tiny Algorithm is a mis-implementation
783 of the XTEA algorithm for compatibility purposes.
785 config CRYPTO_TWOFISH
786 tristate "Twofish cipher algorithm"
788 select CRYPTO_TWOFISH_COMMON
790 Twofish cipher algorithm.
792 Twofish was submitted as an AES (Advanced Encryption Standard)
793 candidate cipher by researchers at CounterPane Systems. It is a
794 16 round block cipher supporting key sizes of 128, 192, and 256
798 <http://www.schneier.com/twofish.html>
800 config CRYPTO_TWOFISH_COMMON
803 Common parts of the Twofish cipher algorithm shared by the
804 generic c and the assembler implementations.
806 config CRYPTO_TWOFISH_586
807 tristate "Twofish cipher algorithms (i586)"
808 depends on (X86 || UML_X86) && !64BIT
810 select CRYPTO_TWOFISH_COMMON
812 Twofish cipher algorithm.
814 Twofish was submitted as an AES (Advanced Encryption Standard)
815 candidate cipher by researchers at CounterPane Systems. It is a
816 16 round block cipher supporting key sizes of 128, 192, and 256
820 <http://www.schneier.com/twofish.html>
822 config CRYPTO_TWOFISH_X86_64
823 tristate "Twofish cipher algorithm (x86_64)"
824 depends on (X86 || UML_X86) && 64BIT
826 select CRYPTO_TWOFISH_COMMON
828 Twofish cipher algorithm (x86_64).
830 Twofish was submitted as an AES (Advanced Encryption Standard)
831 candidate cipher by researchers at CounterPane Systems. It is a
832 16 round block cipher supporting key sizes of 128, 192, and 256
836 <http://www.schneier.com/twofish.html>
838 config CRYPTO_TWOFISH_X86_64_3WAY
839 tristate "Twofish cipher algorithm (x86_64, 3-way parallel)"
840 depends on (X86 || UML_X86) && 64BIT
842 select CRYPTO_TWOFISH_COMMON
843 select CRYPTO_TWOFISH_X86_64
845 Twofish cipher algorithm (x86_64, 3-way parallel).
847 Twofish was submitted as an AES (Advanced Encryption Standard)
848 candidate cipher by researchers at CounterPane Systems. It is a
849 16 round block cipher supporting key sizes of 128, 192, and 256
852 This module provides Twofish cipher algorithm that processes three
853 blocks parallel, utilizing resources of out-of-order CPUs better.
856 <http://www.schneier.com/twofish.html>
858 comment "Compression"
860 config CRYPTO_DEFLATE
861 tristate "Deflate compression algorithm"
866 This is the Deflate algorithm (RFC1951), specified for use in
867 IPSec with the IPCOMP protocol (RFC3173, RFC2394).
869 You will most probably want this if using IPSec.
872 tristate "Zlib compression algorithm"
878 This is the zlib algorithm.
881 tristate "LZO compression algorithm"
884 select LZO_DECOMPRESS
886 This is the LZO algorithm.
888 comment "Random Number Generation"
890 config CRYPTO_ANSI_CPRNG
891 tristate "Pseudo Random Number Generation for Cryptographic modules"
896 This option enables the generic pseudo random number generator
897 for cryptographic modules. Uses the Algorithm specified in
898 ANSI X9.31 A.2.4. Note that this option must be enabled if
899 CRYPTO_FIPS is selected
901 config CRYPTO_USER_API
904 config CRYPTO_USER_API_HASH
905 tristate "User-space interface for hash algorithms"
908 select CRYPTO_USER_API
910 This option enables the user-spaces interface for hash
913 config CRYPTO_USER_API_SKCIPHER
914 tristate "User-space interface for symmetric key cipher algorithms"
916 select CRYPTO_BLKCIPHER
917 select CRYPTO_USER_API
919 This option enables the user-spaces interface for symmetric
920 key cipher algorithms.
922 source "drivers/crypto/Kconfig"