1 # SPDX-License-Identifier: GPL-2.0-only
4 bool "Hardware crypto devices"
7 Say Y here to get to see options for hardware crypto devices and
8 processors. This option alone does not add any kernel code.
10 If you say N, all options in this submenu will be skipped and disabled.
14 source "drivers/crypto/allwinner/Kconfig"
16 config CRYPTO_DEV_PADLOCK
17 tristate "Support for VIA PadLock ACE"
18 depends on X86 && !UML
20 Some VIA processors come with an integrated crypto engine
21 (so called VIA PadLock ACE, Advanced Cryptography Engine)
22 that provides instructions for very fast cryptographic
23 operations with supported algorithms.
25 The instructions are used only when the CPU supports them.
26 Otherwise software encryption is used.
28 config CRYPTO_DEV_PADLOCK_AES
29 tristate "PadLock driver for AES algorithm"
30 depends on CRYPTO_DEV_PADLOCK
31 select CRYPTO_SKCIPHER
34 Use VIA PadLock for AES algorithm.
36 Available in VIA C3 and newer CPUs.
38 If unsure say M. The compiled module will be
41 config CRYPTO_DEV_PADLOCK_SHA
42 tristate "PadLock driver for SHA1 and SHA256 algorithms"
43 depends on CRYPTO_DEV_PADLOCK
48 Use VIA PadLock for SHA1/SHA256 algorithms.
50 Available in VIA C7 and newer processors.
52 If unsure say M. The compiled module will be
55 config CRYPTO_DEV_GEODE
56 tristate "Support for the Geode LX AES engine"
57 depends on X86_32 && PCI
59 select CRYPTO_SKCIPHER
61 Say 'Y' here to use the AMD Geode LX processor on-board AES
62 engine for the CryptoAPI AES algorithm.
64 To compile this driver as a module, choose M here: the module
65 will be called geode-aes.
68 tristate "Support for s390 cryptographic adapters"
73 Select this option if you want to enable support for
74 s390 cryptographic adapters like Crypto Express 4 up
75 to 8 in Coprocessor (CEXxC), EP11 Coprocessor (CEXxP)
76 or Accelerator (CEXxA) mode.
79 tristate "Kernel API for protected key handling"
82 With this option enabled the pkey kernel modules provide an API
83 for creation and handling of protected keys. Other parts of the
84 kernel or userspace applications may use these functions.
86 The protected key support is distributed into:
87 - A pkey base and API kernel module (pkey.ko) which offers the
88 infrastructure for the pkey handler kernel modules, the ioctl
89 and the sysfs API and the in-kernel API to the crypto cipher
90 implementations using protected key.
91 - A pkey pckmo kernel module (pkey-pckmo.ko) which is automatically
92 loaded when pckmo support (that is generation of protected keys
93 from clear key values) is available.
94 - A pkey CCA kernel module (pkey-cca.ko) which is automatically
95 loaded when a CEX crypto card is available.
96 - A pkey EP11 kernel module (pkey-ep11.ko) which is automatically
97 loaded when a CEX crypto card is available.
98 - A pkey UV kernel module (pkey-uv.ko) which is automatically
99 loaded when the Ultravisor feature is available within a
100 protected execution environment.
102 Select this option if you want to enable the kernel and userspace
103 API for protected key handling.
106 tristate "PKEY CCA support handler"
110 This is the CCA support handler for deriving protected keys
111 from CCA (secure) keys. Also this handler provides an alternate
112 way to make protected keys from clear key values.
114 The PKEY CCA support handler needs a Crypto Express card (CEX)
117 If you have selected the PKEY option then you should also enable
118 this option unless you are sure you never need to derive protected
119 keys from CCA key material.
122 tristate "PKEY EP11 support handler"
126 This is the EP11 support handler for deriving protected keys
127 from EP11 (secure) keys. Also this handler provides an alternate
128 way to make protected keys from clear key values.
130 The PKEY EP11 support handler needs a Crypto Express card (CEX)
133 If you have selected the PKEY option then you should also enable
134 this option unless you are sure you never need to derive protected
135 keys from EP11 key material.
138 tristate "PKEY PCKMO support handler"
141 This is the PCKMO support handler for deriving protected keys
142 from clear key values via invoking the PCKMO instruction.
144 The PCKMO instruction can be enabled and disabled in the crypto
145 settings at the LPAR profile. This handler checks for availability
146 during initialization and if build as a kernel module unloads
147 itself if PCKMO is disabled.
149 The PCKMO way of deriving protected keys from clear key material
150 is especially used during self test of protected key ciphers like
151 PAES but the CCA and EP11 handler provide alternate ways to
152 generate protected keys from clear key values.
154 If you have selected the PKEY option then you should also enable
155 this option unless you are sure you never need to derive protected
156 keys from clear key values directly via PCKMO.
159 tristate "PKEY UV support handler"
161 depends on S390_UV_UAPI
163 This is the PKEY Ultravisor support handler for deriving protected
164 keys from secrets stored within the Ultravisor (UV).
166 This module works together with the UV device and supports the
167 retrieval of protected keys from secrets stored within the
168 UV firmware layer. This service is only available within
169 a protected execution guest and thus this module will fail upon
170 modprobe if no protected execution environment is detected.
172 Enable this option if you intend to run this kernel with an KVM
173 guest with protected execution and you want to use UV retrievable
174 secrets via PKEY API.
176 config CRYPTO_PAES_S390
177 tristate "PAES cipher algorithms"
182 select CRYPTO_SKCIPHER
184 This is the s390 hardware accelerated implementation of the
185 AES cipher algorithms for use with protected key.
187 Select this option if you want to use the paes cipher
188 for example to use protected key encrypted devices.
191 tristate "Pseudo random number generator device driver"
195 Select this option if you want to use the s390 pseudo random number
196 generator. The PRNG is part of the cryptographic processor functions
197 and uses triple-DES to generate secure random numbers like the
198 ANSI X9.17 standard. User-space programs access the
199 pseudo-random-number device through the char device /dev/prandom.
201 It is available as of z9.
203 config CRYPTO_DEV_SL3516
204 tristate "Storlink SL3516 crypto offloader"
205 depends on ARCH_GEMINI || COMPILE_TEST
206 depends on HAS_IOMEM && PM
207 select CRYPTO_SKCIPHER
213 This option allows you to have support for SL3516 crypto offloader.
215 config CRYPTO_DEV_SL3516_DEBUG
216 bool "Enable SL3516 stats"
217 depends on CRYPTO_DEV_SL3516
220 Say y to enable SL3516 debug stats.
221 This will create /sys/kernel/debug/sl3516/stats for displaying
222 the number of requests per algorithm and other internal stats.
224 config CRYPTO_DEV_HIFN_795X
225 tristate "Driver HIFN 795x crypto accelerator chips"
226 select CRYPTO_LIB_DES
227 select CRYPTO_SKCIPHER
228 select HW_RANDOM if CRYPTO_DEV_HIFN_795X_RNG
230 depends on !ARCH_DMA_ADDR_T_64BIT
232 This option allows you to have support for HIFN 795x crypto adapters.
234 config CRYPTO_DEV_HIFN_795X_RNG
235 bool "HIFN 795x random number generator"
236 depends on CRYPTO_DEV_HIFN_795X
238 Select this option if you want to enable the random number generator
239 on the HIFN 795x crypto adapters.
241 source "drivers/crypto/caam/Kconfig"
243 config CRYPTO_DEV_TALITOS
244 tristate "Talitos Freescale Security Engine (SEC)"
246 select CRYPTO_AUTHENC
247 select CRYPTO_SKCIPHER
249 select CRYPTO_LIB_DES
253 Say 'Y' here to use the Freescale Security Engine (SEC)
254 to offload cryptographic algorithm computation.
256 The Freescale SEC is present on PowerQUICC 'E' processors, such
257 as the MPC8349E and MPC8548E.
259 To compile this driver as a module, choose M here: the module
260 will be called talitos.
262 config CRYPTO_DEV_TALITOS1
263 bool "SEC1 (SEC 1.0 and SEC Lite 1.2)"
264 depends on CRYPTO_DEV_TALITOS
265 depends on PPC_8xx || PPC_82xx
268 Say 'Y' here to use the Freescale Security Engine (SEC) version 1.0
269 found on MPC82xx or the Freescale Security Engine (SEC Lite)
270 version 1.2 found on MPC8xx
272 config CRYPTO_DEV_TALITOS2
273 bool "SEC2+ (SEC version 2.0 or upper)"
274 depends on CRYPTO_DEV_TALITOS
275 default y if !PPC_8xx
277 Say 'Y' here to use the Freescale Security Engine (SEC)
278 version 2 and following as found on MPC83xx, MPC85xx, etc ...
280 config CRYPTO_DEV_PPC4XX
281 tristate "Driver AMCC PPC4xx crypto accelerator"
282 depends on PPC && 4xx
286 select CRYPTO_LIB_AES
290 select CRYPTO_SKCIPHER
292 This option allows you to have support for AMCC crypto acceleration.
294 config HW_RANDOM_PPC4XX
295 bool "PowerPC 4xx generic true random number generator support"
296 depends on CRYPTO_DEV_PPC4XX && HW_RANDOM=y
299 This option provides the kernel-side support for the TRNG hardware
300 found in the security function of some PowerPC 4xx SoCs.
302 config CRYPTO_DEV_OMAP
303 tristate "Support for OMAP crypto HW accelerators"
304 depends on ARCH_OMAP2PLUS
306 OMAP processors have various crypto HW accelerators. Select this if
307 you want to use the OMAP modules for any of the crypto algorithms.
311 config CRYPTO_DEV_OMAP_SHAM
312 tristate "Support for OMAP MD5/SHA1/SHA2 hw accelerator"
313 depends on ARCH_OMAP2PLUS
321 OMAP processors have MD5/SHA1/SHA2 hw accelerator. Select this if you
322 want to use the OMAP module for MD5/SHA1/SHA2 algorithms.
324 config CRYPTO_DEV_OMAP_AES
325 tristate "Support for OMAP AES hw engine"
326 depends on ARCH_OMAP2 || ARCH_OMAP3 || ARCH_OMAP2PLUS
328 select CRYPTO_SKCIPHER
335 OMAP processors have AES module accelerator. Select this if you
336 want to use the OMAP module for AES algorithms.
338 config CRYPTO_DEV_OMAP_DES
339 tristate "Support for OMAP DES/3DES hw engine"
340 depends on ARCH_OMAP2PLUS
341 select CRYPTO_LIB_DES
342 select CRYPTO_SKCIPHER
345 OMAP processors have DES/3DES module accelerator. Select this if you
346 want to use the OMAP module for DES and 3DES algorithms. Currently
347 the ECB and CBC modes of operation are supported by the driver. Also
348 accesses made on unaligned boundaries are supported.
350 endif # CRYPTO_DEV_OMAP
352 config CRYPTO_DEV_SAHARA
353 tristate "Support for SAHARA crypto accelerator"
354 depends on ARCH_MXC && OF
355 select CRYPTO_SKCIPHER
360 This option enables support for the SAHARA HW crypto accelerator
361 found in some Freescale i.MX chips.
363 config CRYPTO_DEV_EXYNOS_RNG
364 tristate "Exynos HW pseudo random number generator support"
365 depends on ARCH_EXYNOS || COMPILE_TEST
369 This driver provides kernel-side support through the
370 cryptographic API for the pseudo random number generator hardware
371 found on Exynos SoCs.
373 To compile this driver as a module, choose M here: the
374 module will be called exynos-rng.
378 config CRYPTO_DEV_S5P
379 tristate "Support for Samsung S5PV210/Exynos crypto accelerator"
380 depends on ARCH_S5PV210 || ARCH_EXYNOS || COMPILE_TEST
383 select CRYPTO_SKCIPHER
385 This option allows you to have support for S5P crypto acceleration.
386 Select this to offload Samsung S5PV210 or S5PC110, Exynos from AES
387 algorithms execution.
389 config CRYPTO_DEV_EXYNOS_HASH
390 bool "Support for Samsung Exynos HASH accelerator"
391 depends on CRYPTO_DEV_S5P
392 depends on !CRYPTO_DEV_EXYNOS_RNG && CRYPTO_DEV_EXYNOS_RNG!=m
397 Select this to offload Exynos from HASH MD5/SHA1/SHA256.
398 This will select software SHA1, MD5 and SHA256 as they are
399 needed for small and zero-size messages.
400 HASH algorithms will be disabled if EXYNOS_RNG
401 is enabled due to hw conflict.
404 bool "Support for IBM PowerPC Nest (NX) cryptographic acceleration"
407 This enables support for the NX hardware cryptographic accelerator
408 coprocessor that is in IBM PowerPC P7+ or later processors. This
409 does not actually enable any drivers, it only allows you to select
410 which acceleration type (encryption and/or compression) to enable.
413 source "drivers/crypto/nx/Kconfig"
416 config CRYPTO_DEV_ATMEL_AUTHENC
417 bool "Support for Atmel IPSEC/SSL hw accelerator"
418 depends on ARCH_AT91 || COMPILE_TEST
419 depends on CRYPTO_DEV_ATMEL_AES
421 Some Atmel processors can combine the AES and SHA hw accelerators
422 to enhance support of IPSEC/SSL.
423 Select this if you want to use the Atmel modules for
424 authenc(hmac(shaX),Y(cbc)) algorithms.
426 config CRYPTO_DEV_ATMEL_AES
427 tristate "Support for Atmel AES hw accelerator"
428 depends on ARCH_AT91 || COMPILE_TEST
431 select CRYPTO_SKCIPHER
432 select CRYPTO_AUTHENC if CRYPTO_DEV_ATMEL_AUTHENC
433 select CRYPTO_DEV_ATMEL_SHA if CRYPTO_DEV_ATMEL_AUTHENC
435 Some Atmel processors have AES hw accelerator.
436 Select this if you want to use the Atmel module for
439 To compile this driver as a module, choose M here: the module
440 will be called atmel-aes.
442 config CRYPTO_DEV_ATMEL_TDES
443 tristate "Support for Atmel DES/TDES hw accelerator"
444 depends on ARCH_AT91 || COMPILE_TEST
445 select CRYPTO_LIB_DES
446 select CRYPTO_SKCIPHER
448 Some Atmel processors have DES/TDES hw accelerator.
449 Select this if you want to use the Atmel module for
452 To compile this driver as a module, choose M here: the module
453 will be called atmel-tdes.
455 config CRYPTO_DEV_ATMEL_SHA
456 tristate "Support for Atmel SHA hw accelerator"
457 depends on ARCH_AT91 || COMPILE_TEST
460 Some Atmel processors have SHA1/SHA224/SHA256/SHA384/SHA512
462 Select this if you want to use the Atmel module for
463 SHA1/SHA224/SHA256/SHA384/SHA512 algorithms.
465 To compile this driver as a module, choose M here: the module
466 will be called atmel-sha.
468 config CRYPTO_DEV_ATMEL_I2C
472 config CRYPTO_DEV_ATMEL_ECC
473 tristate "Support for Microchip / Atmel ECC hw accelerator"
475 select CRYPTO_DEV_ATMEL_I2C
479 Microhip / Atmel ECC hw accelerator.
480 Select this if you want to use the Microchip / Atmel module for
483 To compile this driver as a module, choose M here: the module
484 will be called atmel-ecc.
486 config CRYPTO_DEV_ATMEL_SHA204A
487 tristate "Support for Microchip / Atmel SHA accelerator and RNG"
489 select CRYPTO_DEV_ATMEL_I2C
493 Microhip / Atmel SHA accelerator and RNG.
494 Select this if you want to use the Microchip / Atmel SHA204A
495 module as a random number generator. (Other functions of the
496 chip are currently not exposed by this driver)
498 To compile this driver as a module, choose M here: the module
499 will be called atmel-sha204a.
501 config CRYPTO_DEV_CCP
502 bool "Support for AMD Secure Processor"
503 depends on ((X86 && PCI) || (ARM64 && (OF_ADDRESS || ACPI))) && HAS_IOMEM
505 The AMD Secure Processor provides support for the Cryptographic Coprocessor
506 (CCP) and the Platform Security Processor (PSP) devices.
509 source "drivers/crypto/ccp/Kconfig"
512 config CRYPTO_DEV_MXS_DCP
513 tristate "Support for Freescale MXS DCP"
514 depends on (ARCH_MXS || ARCH_MXC)
519 select CRYPTO_SKCIPHER
522 The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB
523 co-processor on the die.
525 To compile this driver as a module, choose M here: the module
526 will be called mxs-dcp.
528 source "drivers/crypto/cavium/cpt/Kconfig"
529 source "drivers/crypto/cavium/nitrox/Kconfig"
530 source "drivers/crypto/marvell/Kconfig"
531 source "drivers/crypto/intel/Kconfig"
533 config CRYPTO_DEV_CAVIUM_ZIP
534 tristate "Cavium ZIP driver"
535 depends on PCI && 64BIT && (ARM64 || COMPILE_TEST)
537 Select this option if you want to enable compression/decompression
538 acceleration on Cavium's ARM based SoCs
540 config CRYPTO_DEV_QCE
541 tristate "Qualcomm crypto engine accelerator"
542 depends on ARCH_QCOM || COMPILE_TEST
545 This driver supports Qualcomm crypto engine accelerator
546 hardware. To compile this driver as a module, choose M here. The
547 module will be called qcrypto.
549 config CRYPTO_DEV_QCE_SKCIPHER
551 depends on CRYPTO_DEV_QCE
553 select CRYPTO_LIB_DES
558 select CRYPTO_SKCIPHER
560 config CRYPTO_DEV_QCE_SHA
562 depends on CRYPTO_DEV_QCE
566 config CRYPTO_DEV_QCE_AEAD
568 depends on CRYPTO_DEV_QCE
569 select CRYPTO_AUTHENC
570 select CRYPTO_LIB_DES
573 prompt "Algorithms enabled for QCE acceleration"
574 default CRYPTO_DEV_QCE_ENABLE_ALL
575 depends on CRYPTO_DEV_QCE
577 This option allows to choose whether to build support for all algorithms
578 (default), hashes-only, or skciphers-only.
580 The QCE engine does not appear to scale as well as the CPU to handle
581 multiple crypto requests. While the ipq40xx chips have 4-core CPUs, the
582 QCE handles only 2 requests in parallel.
584 Ipsec throughput seems to improve when disabling either family of
585 algorithms, sharing the load with the CPU. Enabling skciphers-only
586 appears to work best.
588 config CRYPTO_DEV_QCE_ENABLE_ALL
589 bool "All supported algorithms"
590 select CRYPTO_DEV_QCE_SKCIPHER
591 select CRYPTO_DEV_QCE_SHA
592 select CRYPTO_DEV_QCE_AEAD
594 Enable all supported algorithms:
595 - AES (CBC, CTR, ECB, XTS)
599 - SHA256, HMAC-SHA256
601 config CRYPTO_DEV_QCE_ENABLE_SKCIPHER
602 bool "Symmetric-key ciphers only"
603 select CRYPTO_DEV_QCE_SKCIPHER
605 Enable symmetric-key ciphers only:
606 - AES (CBC, CTR, ECB, XTS)
610 config CRYPTO_DEV_QCE_ENABLE_SHA
611 bool "Hash/HMAC only"
612 select CRYPTO_DEV_QCE_SHA
614 Enable hashes/HMAC algorithms only:
616 - SHA256, HMAC-SHA256
618 config CRYPTO_DEV_QCE_ENABLE_AEAD
619 bool "AEAD algorithms only"
620 select CRYPTO_DEV_QCE_AEAD
622 Enable AEAD algorithms only:
628 config CRYPTO_DEV_QCE_SW_MAX_LEN
629 int "Default maximum request size to use software for AES"
630 depends on CRYPTO_DEV_QCE && CRYPTO_DEV_QCE_SKCIPHER
633 This sets the default maximum request size to perform AES requests
634 using software instead of the crypto engine. It can be changed by
635 setting the aes_sw_max_len parameter.
637 Small blocks are processed faster in software than hardware.
638 Considering the 256-bit ciphers, software is 2-3 times faster than
639 qce at 256-bytes, 30% faster at 512, and about even at 768-bytes.
640 With 128-bit keys, the break-even point would be around 1024-bytes.
642 The default is set a little lower, to 512 bytes, to balance the
643 cost in CPU usage. The minimum recommended setting is 16-bytes
644 (1 AES block), since AES-GCM will fail if you set it lower.
645 Setting this to zero will send all requests to the hardware.
647 Note that 192-bit keys are not supported by the hardware and are
648 always processed by the software fallback, and all DES requests
649 are done by the hardware.
651 config CRYPTO_DEV_QCOM_RNG
652 tristate "Qualcomm Random Number Generator Driver"
653 depends on ARCH_QCOM || COMPILE_TEST
657 This driver provides support for the Random Number
658 Generator hardware found on Qualcomm SoCs.
660 To compile this driver as a module, choose M here. The
661 module will be called qcom-rng. If unsure, say N.
663 #config CRYPTO_DEV_VMX
664 # bool "Support for VMX cryptographic acceleration instructions"
665 # depends on PPC64 && VSX
667 # Support for VMX cryptographic acceleration instructions.
669 #source "drivers/crypto/vmx/Kconfig"
671 config CRYPTO_DEV_IMGTEC_HASH
672 tristate "Imagination Technologies hardware hash accelerator"
673 depends on MIPS || COMPILE_TEST
679 This driver interfaces with the Imagination Technologies
680 hardware hash accelerator. Supporting MD5/SHA1/SHA224/SHA256
683 config CRYPTO_DEV_ROCKCHIP
684 tristate "Rockchip's Cryptographic Engine driver"
685 depends on OF && ARCH_ROCKCHIP
692 select CRYPTO_LIB_DES
697 select CRYPTO_SKCIPHER
700 This driver interfaces with the hardware crypto accelerator.
701 Supporting cbc/ecb chainmode, and aes/des/des3_ede cipher mode.
703 config CRYPTO_DEV_ROCKCHIP_DEBUG
704 bool "Enable Rockchip crypto stats"
705 depends on CRYPTO_DEV_ROCKCHIP
708 Say y to enable Rockchip crypto debug stats.
709 This will create /sys/kernel/debug/rk3288_crypto/stats for displaying
710 the number of requests per algorithm and other internal stats.
712 config CRYPTO_DEV_TEGRA
713 tristate "Enable Tegra Security Engine"
714 depends on TEGRA_HOST1X
718 Select this to enable Tegra Security Engine which accelerates various
719 AES encryption/decryption and HASH algorithms.
721 config CRYPTO_DEV_ZYNQMP_AES
722 tristate "Support for Xilinx ZynqMP AES hw accelerator"
723 depends on ZYNQMP_FIRMWARE || COMPILE_TEST
728 Xilinx ZynqMP has AES-GCM engine used for symmetric key
729 encryption and decryption. This driver interfaces with AES hw
730 accelerator. Select this if you want to use the ZynqMP module
733 config CRYPTO_DEV_ZYNQMP_SHA3
734 tristate "Support for Xilinx ZynqMP SHA3 hardware accelerator"
735 depends on ZYNQMP_FIRMWARE || COMPILE_TEST
738 Xilinx ZynqMP has SHA3 engine used for secure hash calculation.
739 This driver interfaces with SHA3 hardware engine.
740 Select this if you want to use the ZynqMP module
741 for SHA3 hash computation.
743 source "drivers/crypto/chelsio/Kconfig"
745 source "drivers/crypto/virtio/Kconfig"
747 config CRYPTO_DEV_BCM_SPU
748 tristate "Broadcom symmetric crypto/hash acceleration support"
749 depends on ARCH_BCM_IPROC
752 select CRYPTO_AUTHENC
753 select CRYPTO_LIB_DES
759 This driver provides support for Broadcom crypto acceleration using the
760 Secure Processing Unit (SPU). The SPU driver registers skcipher,
761 ahash, and aead algorithms with the kernel cryptographic API.
763 source "drivers/crypto/stm32/Kconfig"
765 config CRYPTO_DEV_SAFEXCEL
766 tristate "Inside Secure's SafeXcel cryptographic engine driver"
767 depends on (OF || PCI || COMPILE_TEST) && HAS_IOMEM
768 select CRYPTO_LIB_AES
769 select CRYPTO_AUTHENC
770 select CRYPTO_SKCIPHER
771 select CRYPTO_LIB_DES
778 select CRYPTO_CHACHA20POLY1305
781 This driver interfaces with the SafeXcel EIP-97 and EIP-197 cryptographic
782 engines designed by Inside Secure. It currently accelerates DES, 3DES and
783 AES block ciphers in ECB and CBC mode, as well as SHA1, SHA224, SHA256,
784 SHA384 and SHA512 hash algorithms for both basic hash and HMAC.
785 Additionally, it accelerates combined AES-CBC/HMAC-SHA AEAD operations.
787 config CRYPTO_DEV_ARTPEC6
788 tristate "Support for Axis ARTPEC-6/7 hardware crypto acceleration."
789 depends on ARM && (ARCH_ARTPEC || COMPILE_TEST)
794 select CRYPTO_SKCIPHER
801 Enables the driver for the on-chip crypto accelerator
804 To compile this driver as a module, choose M here.
806 config CRYPTO_DEV_CCREE
807 tristate "Support for ARM TrustZone CryptoCell family of security processors"
808 depends on CRYPTO && CRYPTO_HW && OF && HAS_DMA
811 select CRYPTO_SKCIPHER
812 select CRYPTO_LIB_DES
814 select CRYPTO_AUTHENC
825 select CRYPTO_SM4_GENERIC
826 select CRYPTO_SM3_GENERIC
828 Say 'Y' to enable a driver for the REE interface of the Arm
829 TrustZone CryptoCell family of processors. Currently the
830 CryptoCell 713, 703, 712, 710 and 630 are supported.
831 Choose this if you wish to use hardware acceleration of
832 cryptographic operations on the system REE.
835 source "drivers/crypto/hisilicon/Kconfig"
837 source "drivers/crypto/amlogic/Kconfig"
839 config CRYPTO_DEV_SA2UL
840 tristate "Support for TI security accelerator"
841 depends on ARCH_K3 || COMPILE_TEST
844 select CRYPTO_AUTHENC
852 K3 devices include a security accelerator engine that may be
853 used for crypto offload. Select this if you want to use hardware
854 acceleration for cryptographic algorithms on these devices.
856 source "drivers/crypto/aspeed/Kconfig"
857 source "drivers/crypto/starfive/Kconfig"