Commit d393d9b8 authored by Jan Glauber's avatar Jan Glauber Committed by Herbert Xu

crypto: s390 - cleanup s390 Kconfig options

Cleanup the remaining s390 crypto options by mentioning the earliest machine
type that supports an accelerated algorithm.
Signed-off-by: default avatarJan Glauber <jang@linux.vnet.ibm.com>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent df1309ce
...@@ -91,6 +91,8 @@ config CRYPTO_SHA1_S390 ...@@ -91,6 +91,8 @@ config CRYPTO_SHA1_S390
This is the s390 hardware accelerated implementation of the This is the s390 hardware accelerated implementation of the
SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2). SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
It is available as of z990.
config CRYPTO_SHA256_S390 config CRYPTO_SHA256_S390
tristate "SHA256 digest algorithm" tristate "SHA256 digest algorithm"
depends on S390 depends on S390
...@@ -99,8 +101,7 @@ config CRYPTO_SHA256_S390 ...@@ -99,8 +101,7 @@ config CRYPTO_SHA256_S390
This is the s390 hardware accelerated implementation of the This is the s390 hardware accelerated implementation of the
SHA256 secure hash standard (DFIPS 180-2). SHA256 secure hash standard (DFIPS 180-2).
This version of SHA implements a 256 bit hash with 128 bits of It is available as of z9.
security against collision attacks.
config CRYPTO_SHA512_S390 config CRYPTO_SHA512_S390
tristate "SHA384 and SHA512 digest algorithm" tristate "SHA384 and SHA512 digest algorithm"
...@@ -110,10 +111,7 @@ config CRYPTO_SHA512_S390 ...@@ -110,10 +111,7 @@ config CRYPTO_SHA512_S390
This is the s390 hardware accelerated implementation of the This is the s390 hardware accelerated implementation of the
SHA512 secure hash standard. SHA512 secure hash standard.
This version of SHA implements a 512 bit hash with 256 bits of It is available as of z10.
security against collision attacks. The code also includes SHA-384,
a 384 bit hash with 192 bits of security against collision attacks.
config CRYPTO_DES_S390 config CRYPTO_DES_S390
tristate "DES and Triple DES cipher algorithms" tristate "DES and Triple DES cipher algorithms"
...@@ -148,8 +146,10 @@ config S390_PRNG ...@@ -148,8 +146,10 @@ config S390_PRNG
Select this option if you want to use the s390 pseudo random number Select this option if you want to use the s390 pseudo random number
generator. The PRNG is part of the cryptographic processor functions generator. The PRNG is part of the cryptographic processor functions
and uses triple-DES to generate secure random numbers like the and uses triple-DES to generate secure random numbers like the
ANSI X9.17 standard. The PRNG is usable via the char device ANSI X9.17 standard. User-space programs access the
/dev/prandom. pseudo-random-number device through the char device /dev/prandom.
It is available as of z9.
config CRYPTO_GHASH_S390 config CRYPTO_GHASH_S390
tristate "GHASH digest algorithm" tristate "GHASH digest algorithm"
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment