Config.in.crypto 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607
  1. menu "Crypto kernel modules"
  2. config ADK_KERNEL_CRYPTO
  3. tristate
  4. config ADK_KERNEL_CRYPTO_HW
  5. tristate
  6. config ADK_KERNEL_OCF_FIPS
  7. boolean
  8. config ADK_KERNEL_OCF_CRYPTODEV
  9. boolean
  10. config ADK_KERNEL_OCF_OCF
  11. boolean
  12. select ADK_KERNEL_CRYPTO
  13. select ADK_KERNEL_OCF_FIPS
  14. select ADK_KERNEL_OCF_CRYPTODEV
  15. default n
  16. config ADK_KERNEL_CRYPTO_AES
  17. boolean
  18. config ADK_KERNEL_CRYPTO_SHA256
  19. boolean
  20. config ADK_KERNEL_CRYPTO_CBC
  21. boolean
  22. comment "Hardware cryptography"
  23. menu "Hardware crypto devices"
  24. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_GEODE
  25. prompt "kmod-crypto-dev-geode.................. Support for the Geode LX/GX AES engine"
  26. tristate
  27. select ADK_KERNEL_CRYPTO
  28. select ADK_KERNEL_CRYPTO_HW
  29. select ADK_KPACKAGE_KMOD_CRYPTO_ECB
  30. select ADK_KPACKAGE_KMOD_CRYPTO_CBC
  31. depends on ADK_TARGET_WITH_GEODE_CRYPTO
  32. default y if ADK_TARGET_WITH_GEODE_CRYPTO
  33. default n
  34. help
  35. Say 'Y' here to use the AMD Geode LX processor on-board AES
  36. engine for the CryptoAPI AES algorithm.
  37. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_HIFN_795X
  38. prompt "kmod-crypto-dev-hifn-795x.............. Driver for HIFN 795x crypto accelerator chips"
  39. tristate
  40. select ADK_KERNEL_CRYPTO
  41. select ADK_KERNEL_CRYPTO_HW
  42. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  43. select ADK_KPACKAGE_KMOD_CRYPTO_DES
  44. depends on ADK_TARGET_WITH_PCI || ADK_TARGET_WITH_MINIPCI
  45. default n
  46. help
  47. This option allows you to have support for HIFN 795x crypto adapters.
  48. comment "OpenBSD Cryptographic framework"
  49. config ADK_KPACKAGE_KMOD_OCF_HIFN
  50. prompt "kmod-ocf-hifn.......................... HIFN crypto engine"
  51. tristate
  52. default n
  53. select ADK_KERNEL_OCF_OCF
  54. depends on ADK_TARGET_WITH_PCI || ADK_TARGET_WITH_MINIPCI
  55. select ADK_KPACKAGE_KMOD_CRYPTO_AES
  56. help
  57. Engine for cryptodev that uses Hifn based accelerators
  58. such as the 7951, 7955, 7956, 7751, 7811.
  59. endmenu
  60. comment "Software cryptography"
  61. menu "Crypto core / Block and Hash modes"
  62. config ADK_KERNEL_MOD_CRYPTO_PCOMP
  63. tristate
  64. config ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  65. tristate
  66. select ADK_KERNEL_CRYPTO
  67. select ADK_KERNEL_MOD_CRYPTO_PCOMP
  68. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  69. default n
  70. help
  71. config ADK_KERNEL_MOD_CRYPTO_ALGAPI
  72. tristate
  73. config ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  74. tristate
  75. select ADK_KERNEL_CRYPTO
  76. select ADK_KERNEL_MOD_CRYPTO_ALGAPI
  77. default n
  78. help
  79. config ADK_KERNEL_MOD_CRYPTO_AEAD
  80. tristate
  81. config ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  82. tristate
  83. select ADK_KERNEL_CRYPTO
  84. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  85. select ADK_KERNEL_MOD_CRYPTO_AEAD
  86. default n
  87. help
  88. config ADK_KERNEL_MOD_CRYPTO_HASH
  89. tristate
  90. config ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  91. tristate
  92. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  93. select ADK_KERNEL_MOD_CRYPTO_HASH
  94. default n
  95. help
  96. config ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  97. tristate
  98. config ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  99. tristate
  100. select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  101. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  102. select ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  103. default n
  104. help
  105. config ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  106. tristate
  107. config ADK_KERNEL_MOD_CRYPTO_MANAGER
  108. tristate
  109. config ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  110. prompt "kmod-crypto-manager2................. Crypto algorithm manager"
  111. tristate
  112. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  113. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  114. select ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  115. select ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  116. select ADK_KERNEL_MOD_CRYPTO_MANAGER
  117. select ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  118. default n
  119. help
  120. config ADK_KPACKAGE_KMOD_CRYPTO_AUTHENC
  121. prompt "kmod-crypto-authenc.................. AuthENC (IPsec)"
  122. tristate
  123. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  124. default n
  125. help
  126. config ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  127. prompt "kmod-crypto-seqiv.................... Sequence Number IV Generator"
  128. tristate
  129. select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  130. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  131. help
  132. This IV generator generates an IV based on a sequence number by
  133. xoring it with a salt. This algorithm is mainly useful for CTR
  134. config ADK_KPACKAGE_KMOD_CRYPTO_CBC
  135. prompt "kmod-crypto-cbc...................... CBC support"
  136. tristate
  137. depends on !ADK_KERNEL_CRYPTO_CBC
  138. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  139. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  140. default n
  141. help
  142. CBC: Cipher Block Chaining mode
  143. This block cipher algorithm is required for IPSec.
  144. config ADK_KPACKAGE_KMOD_CRYPTO_CCM
  145. prompt "kmod-crypto-ccm...................... CCM support"
  146. tristate
  147. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  148. select ADK_KPACKAGE_KMOD_CRYPTO_CTR
  149. default n
  150. help
  151. Support for Counter with CBC MAC. Required for IPsec.
  152. config ADK_KPACKAGE_KMOD_CRYPTO_CTR
  153. prompt "kmod-crypto-ctr...................... CTR support"
  154. tristate
  155. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  156. select ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  157. default n
  158. help
  159. CTR: Counter mode
  160. This block cipher algorithm is required for IPSec.
  161. config ADK_KPACKAGE_KMOD_CRYPTO_ECB
  162. prompt "kmod-crypto-ecb...................... ECB support"
  163. tristate
  164. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  165. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  166. default n
  167. help
  168. ECB: Electronic CodeBook mode
  169. This is the simplest block cipher algorithm. It simply encrypts
  170. the input block by block.
  171. config ADK_KPACKAGE_KMOD_CRYPTO_HMAC
  172. prompt "kmod-crypto-hmac..................... HMAC support"
  173. tristate
  174. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  175. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  176. default n
  177. help
  178. HMAC: Keyed-Hashing for Message Authentication (RFC2104).
  179. This is required for IPSec.
  180. config ADK_KPACKAGE_KMOD_CRYPTO_XCBC
  181. prompt "kmod-crypto-xcbc..................... XCBC support"
  182. tristate
  183. default n
  184. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  185. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  186. help
  187. XCBC: Keyed-Hashing with encryption algorithm
  188. config ADK_KERNEL_MOD_CRYPTO_RNG
  189. tristate
  190. config ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  191. prompt "kmod-crypto-rng2..................... RNG support"
  192. tristate
  193. select ADK_KERNEL_MOD_CRYPTO_RNG
  194. default n
  195. help
  196. Random number generator
  197. endmenu
  198. menu "Digest algorithms"
  199. config ADK_KPACKAGE_KMOD_CRYPTO_MD4
  200. prompt "kmod-crypto-md4...................... MD4 digest algorithm"
  201. tristate
  202. default n
  203. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  204. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  205. help
  206. MD4 message digest algorithm (RFC1320).
  207. config ADK_KPACKAGE_KMOD_CRYPTO_MD5
  208. prompt "kmod-crypto-md5...................... MD5 digest algorithm"
  209. tristate
  210. default n
  211. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  212. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  213. help
  214. MD5 message digest algorithm (RFC1321).
  215. config ADK_KPACKAGE_KMOD_CRYPTO_SHA1
  216. prompt "kmod-crypto-sha1..................... SHA1 digest algorithm"
  217. tristate
  218. default n
  219. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  220. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  221. help
  222. SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
  223. config ADK_KPACKAGE_KMOD_CRYPTO_SHA256
  224. prompt "kmod-crypto-sha256................... SHA256 digest algorithm"
  225. tristate
  226. default n
  227. depends on !ADK_KERNEL_CRYPTO_SHA256
  228. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  229. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  230. help
  231. SHA256 secure hash standard (DFIPS 180-2).
  232. This version of SHA implements a 256 bit hash with 128 bits of
  233. security against collision attacks.
  234. config ADK_KPACKAGE_KMOD_CRYPTO_SHA512
  235. prompt "kmod-crypto-sha512................... SHA512 digest algorithm"
  236. tristate
  237. default n
  238. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  239. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  240. help
  241. SHA512 secure hash standard (DFIPS 180-2).
  242. This version of SHA implements a 512 bit hash with 256 bits of
  243. security against collision attacks.
  244. This code also includes SHA-384, a 384 bit hash with 192 bits
  245. of security against collision attacks.
  246. config ADK_KPACKAGE_KMOD_CRYPTO_WP512
  247. prompt "kmod-crypto-whirlpool................ Whirlpool digest algorithms"
  248. tristate
  249. default n
  250. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  251. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  252. help
  253. Whirlpool hash algorithm 512, 384 and 256-bit hashes
  254. Whirlpool-512 is part of the NESSIE cryptographic primitives.
  255. Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
  256. See also:
  257. <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html>
  258. config ADK_KPACKAGE_KMOD_CRYPTO_TGR192
  259. prompt "kmod-crypto-tiger.................... Tiger digest algorithms"
  260. tristate
  261. default n
  262. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  263. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  264. help
  265. Tiger hash algorithm 192, 160 and 128-bit hashes
  266. Tiger is a hash function optimized for 64-bit processors while
  267. still having decent performance on 32-bit processors.
  268. Tiger was developed by Ross Anderson and Eli Biham.
  269. See also:
  270. <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>.
  271. endmenu
  272. menu "Cipher algoritms"
  273. config ADK_KPACKAGE_KMOD_CRYPTO_AES
  274. prompt "kmod-crypto-aes...................... AES cipher algorithms"
  275. tristate
  276. depends on !ADK_KERNEL_CRYPTO_AES
  277. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  278. default n
  279. help
  280. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  281. algorithm.
  282. Rijndael appears to be consistently a very good performer in
  283. both hardware and software across a wide range of computing
  284. environments regardless of its use in feedback or non-feedback
  285. modes. Its key setup time is excellent, and its key agility is
  286. good. Rijndael's very low memory requirements make it very well
  287. suited for restricted-space environments, in which it also
  288. demonstrates excellent performance. Rijndael's operations are
  289. among the easiest to defend against power and timing attacks.
  290. The AES specifies three key sizes: 128, 192 and 256 bits
  291. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  292. config ADK_KPACKAGE_KMOD_CRYPTO_AES_586
  293. prompt "kmod-crypto-aes-i586................. AES cipher algorithms (i586)"
  294. tristate
  295. depends on ADK_x86
  296. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  297. default n
  298. help
  299. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  300. algorithm.
  301. Rijndael appears to be consistently a very good performer in
  302. both hardware and software across a wide range of computing
  303. environments regardless of its use in feedback or non-feedback
  304. modes. Its key setup time is excellent, and its key agility is
  305. good. Rijndael's very low memory requirements make it very well
  306. suited for restricted-space environments, in which it also
  307. demonstrates excellent performance. Rijndael's operations are
  308. among the easiest to defend against power and timing attacks.
  309. The AES specifies three key sizes: 128, 192 and 256 bits
  310. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  311. config ADK_KPACKAGE_KMOD_CRYPTO_ANUBIS
  312. prompt "kmod-crypto-anubis................... Anubis cipher algorithm"
  313. tristate
  314. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  315. default n
  316. help
  317. Anubis cipher algorithm.
  318. Anubis is a variable key length cipher which can use keys from
  319. 128 bits to 320 bits in length. It was evaluated as a entrant
  320. in the NESSIE competition.
  321. See also:
  322. <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/>
  323. <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html>
  324. config ADK_KPACKAGE_KMOD_CRYPTO_ARC4
  325. prompt "kmod-crypto-arc4..................... ARC4 cipher algorithm"
  326. tristate
  327. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  328. default n
  329. help
  330. ARC4 cipher algorithm.
  331. ARC4 is a stream cipher using keys ranging from 8 bits to 2048
  332. bits in length. This algorithm is required for driver-based
  333. WEP, but it should not be for other purposes because of the
  334. weakness of the algorithm.
  335. config ADK_KPACKAGE_KMOD_CRYPTO_BLOWFISH
  336. prompt "kmod-crypto-blowfish................. Blowfish cipher algorithm"
  337. tristate
  338. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  339. default n
  340. help
  341. Blowfish cipher algorithm, by Bruce Schneier.
  342. This is a variable key length cipher which can use keys from 32
  343. bits to 448 bits in length. It's fast, simple and specifically
  344. designed for use on "large microprocessors".
  345. See also:
  346. <http://www.schneier.com/blowfish.html>
  347. config ADK_KPACKAGE_KMOD_CRYPTO_CAMELLIA
  348. prompt "kmod-crypto-camellia................. Camellia cipher algorithms"
  349. tristate
  350. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  351. default n
  352. help
  353. Camellia cipher algorithms module.
  354. Camellia is a symmetric key block cipher developed jointly
  355. at NTT and Mitsubishi Electric Corporation.
  356. The Camellia specifies three key sizes: 128, 192 and 256 bits.
  357. See also:
  358. <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
  359. config ADK_KPACKAGE_KMOD_CRYPTO_CAST5
  360. prompt "kmod-crypto-cast5.................... CAST5 (CAST-128) cipher algorithm"
  361. tristate
  362. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  363. default n
  364. help
  365. The CAST5 encryption algorithm (synonymous with CAST-128) is
  366. described in RFC2144.
  367. config ADK_KPACKAGE_KMOD_CRYPTO_CAST6
  368. prompt "kmod-crypto-cast6.................... CAST6 (CATS-256) cipher algorithm"
  369. tristate
  370. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  371. default n
  372. help
  373. The CAST6 encryption algorithm (synonymous with CAST-256) is
  374. described in RFC2612.
  375. config ADK_KPACKAGE_KMOD_CRYPTO_DES
  376. prompt "kmod-crypto-des...................... DES and Triple DES EDE cipher algorithms"
  377. tristate
  378. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  379. default n
  380. help
  381. DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
  382. config ADK_KPACKAGE_KMOD_CRYPTO_FCRYPT
  383. prompt "kmod-crypto-fcrypt................... FCrypt cipher algorithms"
  384. tristate
  385. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  386. default n
  387. help
  388. FCrypt algorithm used by RxRPC.
  389. config ADK_KPACKAGE_KMOD_CRYPTO_KHAZAD
  390. prompt "kmod-crypto-khazad................... Khazad cipher algorithm"
  391. tristate
  392. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  393. default n
  394. help
  395. Khazad cipher algorithm.
  396. Khazad was a finalist in the initial NESSIE competition. It is
  397. an algorithm optimized for 64-bit processors with good performance
  398. on 32-bit processors. Khazad uses an 128 bit key size.
  399. See also:
  400. <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html>
  401. config ADK_KPACKAGE_KMOD_CRYPTO_SERPENT
  402. prompt "kmod-crypto-serpent.................. Serpent cipher algorithm"
  403. tristate
  404. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  405. default n
  406. help
  407. Serpent cipher algorithm, by Anderson, Biham & Knudsen.
  408. Keys are allowed to be from 0 to 256 bits in length, in steps
  409. of 8 bits. Also includes the 'Tnepres' algorithm, a reversed
  410. variant of Serpent for compatibility with old kerneli code.
  411. See also:
  412. <http://www.cl.cam.ac.uk/~rja14/serpent.html>
  413. config ADK_KPACKAGE_KMOD_CRYPTO_TEA
  414. prompt "kmod-crypto-tea...................... TEA, XTEA and XETA cipher algorithms"
  415. tristate
  416. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  417. default n
  418. help
  419. TEA cipher algorithm.
  420. Tiny Encryption Algorithm is a simple cipher that uses
  421. many rounds for security. It is very fast and uses
  422. little memory.
  423. Xtendend Tiny Encryption Algorithm is a modification to
  424. the TEA algorithm to address a potential key weakness
  425. in the TEA algorithm.
  426. Xtendend Encryption Tiny Algorithm is a mis-implementation
  427. of the XTEA algorithm for compatibility purposes.
  428. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH
  429. prompt "kmod-crypto-twofish.................. Twofish cipher algorithm"
  430. tristate
  431. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  432. default n
  433. help
  434. Twofish cipher algorithm.
  435. Twofish was submitted as an AES (Advanced Encryption Standard)
  436. candidate cipher by researchers at CounterPane Systems. It is a
  437. 16 round block cipher supporting key sizes of 128, 192, and 256
  438. bits.
  439. See also:
  440. <http://www.schneier.com/twofish.html>
  441. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH_586
  442. prompt "kmod-crypto-twofish-586.............. Twofish cipher algorithm (i586)"
  443. tristate
  444. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  445. depends on ADK_x86
  446. default n
  447. help
  448. Twofish cipher algorithm.
  449. Twofish was submitted as an AES (Advanced Encryption Standard)
  450. candidate cipher by researchers at CounterPane Systems. It is a
  451. 16 round block cipher supporting key sizes of 128, 192, and 256
  452. bits.
  453. See also:
  454. <http://www.schneier.com/twofish.html>
  455. config ADK_KPACKAGE_KMOD_CRYPTO_NULL
  456. prompt "kmod-crypto-null..................... Null algorithms"
  457. tristate
  458. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  459. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  460. default n
  461. help
  462. These are 'Null' algorithms, used by IPsec, which do nothing.
  463. endmenu
  464. menu "Compression"
  465. config ADK_KPACKAGE_KMOD_CRYPTO_DEFLATE
  466. prompt "kmod-crypto-deflate.................. Deflate compression algorithm"
  467. tristate
  468. select ADK_KERNEL_CRYPTO
  469. default n
  470. help
  471. This is the Deflate algorithm (RFC1951), specified for use in
  472. IPSec with the IPCOMP protocol (RFC3173, RFC2394).
  473. You will most probably want this if using IPSec.
  474. config ADK_KPACKAGE_KMOD_CRYPTO_LZO
  475. prompt "kmod-crypto-lzo...................... LZO compression algorithm"
  476. tristate
  477. select ADK_KERNEL_CRYPTO
  478. default n
  479. help
  480. config ADK_KPACKAGE_KMOD_CRYPTO_MICHAEL_MIC
  481. prompt "kmod-crypto-michael-mic.............. Michael MIC keyed digest algorithm"
  482. tristate
  483. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  484. default n
  485. help
  486. Michael MIC is used for message integrity protection in TKIP
  487. (IEEE 802.11i). This algorithm is required for TKIP, but it
  488. should not be used for other purposes because of the weakness
  489. of the algorithm.
  490. config ADK_KPACKAGE_KMOD_CRYPTO_CRC32C
  491. prompt "kmod-crypto-crc32c................... CRC32c CRC algorithm"
  492. tristate
  493. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  494. select ADK_KPACKAGE_KMOD_LIBCRC32C
  495. default n
  496. help
  497. Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used
  498. by iSCSI for header and data digests and by others.
  499. See Castagnoli93. This implementation uses lib/libcrc32c.
  500. Module will be crc32c.
  501. endmenu
  502. endmenu