Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit d393d9b8 authored by Jan Glauber's avatar Jan Glauber Committed by Herbert Xu
Browse files

crypto: s390 - cleanup s390 Kconfig options



Cleanup the remaining s390 crypto options by mentioning the earliest machine
type that supports an accelerated algorithm.

Signed-off-by: default avatarJan Glauber <jang@linux.vnet.ibm.com>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent df1309ce
Loading
Loading
Loading
Loading
+8 −8
Original line number Original line Diff line number Diff line
@@ -91,6 +91,8 @@ config CRYPTO_SHA1_S390
	  This is the s390 hardware accelerated implementation of the
	  This is the s390 hardware accelerated implementation of the
	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
	  SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).


	  It is available as of z990.

config CRYPTO_SHA256_S390
config CRYPTO_SHA256_S390
	tristate "SHA256 digest algorithm"
	tristate "SHA256 digest algorithm"
	depends on S390
	depends on S390
@@ -99,8 +101,7 @@ config CRYPTO_SHA256_S390
	  This is the s390 hardware accelerated implementation of the
	  This is the s390 hardware accelerated implementation of the
	  SHA256 secure hash standard (DFIPS 180-2).
	  SHA256 secure hash standard (DFIPS 180-2).


	  This version of SHA implements a 256 bit hash with 128 bits of
	  It is available as of z9.
	  security against collision attacks.


config CRYPTO_SHA512_S390
config CRYPTO_SHA512_S390
	tristate "SHA384 and SHA512 digest algorithm"
	tristate "SHA384 and SHA512 digest algorithm"
@@ -110,10 +111,7 @@ config CRYPTO_SHA512_S390
	  This is the s390 hardware accelerated implementation of the
	  This is the s390 hardware accelerated implementation of the
	  SHA512 secure hash standard.
	  SHA512 secure hash standard.


	  This version of SHA implements a 512 bit hash with 256 bits of
	  It is available as of z10.
	  security against collision attacks. The code also includes SHA-384,
	  a 384 bit hash with 192 bits of security against collision attacks.



config CRYPTO_DES_S390
config CRYPTO_DES_S390
	tristate "DES and Triple DES cipher algorithms"
	tristate "DES and Triple DES cipher algorithms"
@@ -148,8 +146,10 @@ config S390_PRNG
	  Select this option if you want to use the s390 pseudo random number
	  Select this option if you want to use the s390 pseudo random number
	  generator. The PRNG is part of the cryptographic processor functions
	  generator. The PRNG is part of the cryptographic processor functions
	  and uses triple-DES to generate secure random numbers like the
	  and uses triple-DES to generate secure random numbers like the
	  ANSI X9.17 standard. The PRNG is usable via the char device
	  ANSI X9.17 standard. User-space programs access the
	  /dev/prandom.
	  pseudo-random-number device through the char device /dev/prandom.

	  It is available as of z9.


config CRYPTO_GHASH_S390
config CRYPTO_GHASH_S390
	tristate "GHASH digest algorithm"
	tristate "GHASH digest algorithm"