Config.in.crypto 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621
  1. menu "Crypto kernel modules"
  2. config ADK_KERNEL_CRYPTO
  3. tristate
  4. config ADK_KERNEL_CRYPTO_HW
  5. tristate
  6. config ADK_KERNEL_OCF_FIPS
  7. boolean
  8. config ADK_KERNEL_OCF_CRYPTODEV
  9. boolean
  10. config ADK_KERNEL_OCF_OCF
  11. boolean
  12. select ADK_KERNEL_CRYPTO
  13. select ADK_KERNEL_OCF_FIPS
  14. select ADK_KERNEL_OCF_CRYPTODEV
  15. default n
  16. config ADK_KERNEL_CRYPTO_AES
  17. boolean
  18. config ADK_KERNEL_CRYPTO_SHA256
  19. boolean
  20. config ADK_KERNEL_CRYPTO_CBC
  21. boolean
  22. comment "Hardware cryptography"
  23. menu "Hardware crypto devices"
  24. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_GEODE
  25. prompt "kmod-crypto-dev-geode.................. Support for the Geode LX/GX AES engine"
  26. tristate
  27. select ADK_KERNEL_CRYPTO
  28. select ADK_KERNEL_CRYPTO_HW
  29. select ADK_KPACKAGE_KMOD_CRYPTO_ECB
  30. select ADK_KPACKAGE_KMOD_CRYPTO_CBC
  31. depends on ADK_TARGET_WITH_GEODE_CRYPTO
  32. default y if ADK_TARGET_WITH_GEODE_CRYPTO
  33. default n
  34. help
  35. Say 'Y' here to use the AMD Geode LX processor on-board AES
  36. engine for the CryptoAPI AES algorithm.
  37. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_HIFN_795X
  38. prompt "kmod-crypto-dev-hifn-795x.............. Driver for HIFN 795x crypto accelerator chips"
  39. tristate
  40. select ADK_KERNEL_CRYPTO
  41. select ADK_KERNEL_CRYPTO_HW
  42. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  43. select ADK_KPACKAGE_KMOD_CRYPTO_DES
  44. depends on ADK_TARGET_WITH_PCI || ADK_TARGET_WITH_MINIPCI
  45. default n
  46. help
  47. This option allows you to have support for HIFN 795x crypto adapters.
  48. comment "OpenBSD Cryptographic framework"
  49. config ADK_KPACKAGE_KMOD_OCF_HIFN
  50. prompt "kmod-ocf-hifn.......................... HIFN crypto engine"
  51. tristate
  52. default n
  53. select ADK_KERNEL_OCF_OCF
  54. depends on ADK_TARGET_WITH_PCI || ADK_TARGET_WITH_MINIPCI
  55. select ADK_KPACKAGE_KMOD_CRYPTO_AES
  56. help
  57. Engine for cryptodev that uses Hifn based accelerators
  58. such as the 7951, 7955, 7956, 7751, 7811.
  59. endmenu
  60. comment "Software cryptography"
  61. menu "Crypto core / Block and Hash modes"
  62. config ADK_KERNEL_MOD_CRYPTO_PCOMP
  63. tristate
  64. config ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  65. tristate
  66. select ADK_KERNEL_CRYPTO
  67. select ADK_KERNEL_MOD_CRYPTO_PCOMP
  68. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  69. default n
  70. help
  71. config ADK_KERNEL_MOD_CRYPTO_ALGAPI
  72. tristate
  73. config ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  74. tristate
  75. select ADK_KERNEL_CRYPTO
  76. select ADK_KERNEL_MOD_CRYPTO_ALGAPI
  77. default n
  78. help
  79. config ADK_KERNEL_MOD_CRYPTO_AEAD
  80. tristate
  81. config ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  82. tristate
  83. select ADK_KERNEL_CRYPTO
  84. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  85. select ADK_KERNEL_MOD_CRYPTO_AEAD
  86. default n
  87. help
  88. config ADK_KERNEL_MOD_CRYPTO_HASH
  89. tristate
  90. config ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  91. tristate
  92. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  93. select ADK_KERNEL_MOD_CRYPTO_HASH
  94. default n
  95. help
  96. config ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  97. tristate
  98. config ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  99. tristate
  100. select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  101. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  102. select ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  103. default n
  104. help
  105. config ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  106. tristate
  107. config ADK_KERNEL_MOD_CRYPTO_MANAGER
  108. tristate
  109. config ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  110. prompt "kmod-crypto-manager2................. Crypto algorithm manager"
  111. tristate
  112. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  113. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  114. select ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  115. select ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  116. select ADK_KERNEL_MOD_CRYPTO_MANAGER
  117. select ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  118. default n
  119. help
  120. config ADK_KPACKAGE_KMOD_CRYPTO_AUTHENC
  121. prompt "kmod-crypto-authenc.................. AuthENC (IPsec)"
  122. tristate
  123. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  124. default n
  125. help
  126. config ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  127. prompt "kmod-crypto-seqiv.................... Sequence Number IV Generator"
  128. tristate
  129. select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  130. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  131. help
  132. This IV generator generates an IV based on a sequence number by
  133. xoring it with a salt. This algorithm is mainly useful for CTR
  134. config ADK_KPACKAGE_KMOD_CRYPTO_CTS
  135. prompt "kmod-crypto-cts...................... CTS support"
  136. tristate
  137. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  138. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  139. default n
  140. help
  141. CTS: Cipher Text Stealing
  142. This is the Cipher Text Stealing mode as described by
  143. Section 8 of rfc2040 and referenced by rfc3962.
  144. (rfc3962 includes errata information in its Appendix A)
  145. This mode is required for Kerberos gss mechanism support
  146. for AES encryption.
  147. config ADK_KPACKAGE_KMOD_CRYPTO_CBC
  148. prompt "kmod-crypto-cbc...................... CBC support"
  149. tristate
  150. depends on !ADK_KERNEL_CRYPTO_CBC
  151. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  152. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  153. default n
  154. help
  155. CBC: Cipher Block Chaining mode
  156. This block cipher algorithm is required for IPSec.
  157. config ADK_KPACKAGE_KMOD_CRYPTO_CCM
  158. prompt "kmod-crypto-ccm...................... CCM support"
  159. tristate
  160. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  161. select ADK_KPACKAGE_KMOD_CRYPTO_CTR
  162. default n
  163. help
  164. Support for Counter with CBC MAC. Required for IPsec.
  165. config ADK_KPACKAGE_KMOD_CRYPTO_CTR
  166. prompt "kmod-crypto-ctr...................... CTR support"
  167. tristate
  168. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  169. select ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  170. default n
  171. help
  172. CTR: Counter mode
  173. This block cipher algorithm is required for IPSec.
  174. config ADK_KPACKAGE_KMOD_CRYPTO_ECB
  175. prompt "kmod-crypto-ecb...................... ECB support"
  176. tristate
  177. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  178. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  179. default n
  180. help
  181. ECB: Electronic CodeBook mode
  182. This is the simplest block cipher algorithm. It simply encrypts
  183. the input block by block.
  184. config ADK_KPACKAGE_KMOD_CRYPTO_HMAC
  185. prompt "kmod-crypto-hmac..................... HMAC support"
  186. tristate
  187. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  188. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  189. default n
  190. help
  191. HMAC: Keyed-Hashing for Message Authentication (RFC2104).
  192. This is required for IPSec.
  193. config ADK_KPACKAGE_KMOD_CRYPTO_XCBC
  194. prompt "kmod-crypto-xcbc..................... XCBC support"
  195. tristate
  196. default n
  197. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  198. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  199. help
  200. XCBC: Keyed-Hashing with encryption algorithm
  201. config ADK_KERNEL_MOD_CRYPTO_RNG
  202. tristate
  203. config ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  204. prompt "kmod-crypto-rng2..................... RNG support"
  205. tristate
  206. select ADK_KERNEL_MOD_CRYPTO_RNG
  207. default n
  208. help
  209. Random number generator
  210. endmenu
  211. menu "Digest algorithms"
  212. config ADK_KPACKAGE_KMOD_CRYPTO_MD4
  213. prompt "kmod-crypto-md4...................... MD4 digest algorithm"
  214. tristate
  215. default n
  216. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  217. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  218. help
  219. MD4 message digest algorithm (RFC1320).
  220. config ADK_KPACKAGE_KMOD_CRYPTO_MD5
  221. prompt "kmod-crypto-md5...................... MD5 digest algorithm"
  222. tristate
  223. default n
  224. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  225. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  226. help
  227. MD5 message digest algorithm (RFC1321).
  228. config ADK_KPACKAGE_KMOD_CRYPTO_SHA1
  229. prompt "kmod-crypto-sha1..................... SHA1 digest algorithm"
  230. tristate
  231. default n
  232. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  233. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  234. help
  235. SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
  236. config ADK_KPACKAGE_KMOD_CRYPTO_SHA256
  237. prompt "kmod-crypto-sha256................... SHA256 digest algorithm"
  238. tristate
  239. default n
  240. depends on !ADK_KERNEL_CRYPTO_SHA256
  241. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  242. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  243. help
  244. SHA256 secure hash standard (DFIPS 180-2).
  245. This version of SHA implements a 256 bit hash with 128 bits of
  246. security against collision attacks.
  247. config ADK_KPACKAGE_KMOD_CRYPTO_SHA512
  248. prompt "kmod-crypto-sha512................... SHA512 digest algorithm"
  249. tristate
  250. default n
  251. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  252. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  253. help
  254. SHA512 secure hash standard (DFIPS 180-2).
  255. This version of SHA implements a 512 bit hash with 256 bits of
  256. security against collision attacks.
  257. This code also includes SHA-384, a 384 bit hash with 192 bits
  258. of security against collision attacks.
  259. config ADK_KPACKAGE_KMOD_CRYPTO_WP512
  260. prompt "kmod-crypto-whirlpool................ Whirlpool digest algorithms"
  261. tristate
  262. default n
  263. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  264. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  265. help
  266. Whirlpool hash algorithm 512, 384 and 256-bit hashes
  267. Whirlpool-512 is part of the NESSIE cryptographic primitives.
  268. Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
  269. See also:
  270. <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html>
  271. config ADK_KPACKAGE_KMOD_CRYPTO_TGR192
  272. prompt "kmod-crypto-tiger.................... Tiger digest algorithms"
  273. tristate
  274. default n
  275. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  276. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  277. help
  278. Tiger hash algorithm 192, 160 and 128-bit hashes
  279. Tiger is a hash function optimized for 64-bit processors while
  280. still having decent performance on 32-bit processors.
  281. Tiger was developed by Ross Anderson and Eli Biham.
  282. See also:
  283. <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>.
  284. endmenu
  285. menu "Cipher algoritms"
  286. config ADK_KPACKAGE_KMOD_CRYPTO_AES
  287. prompt "kmod-crypto-aes...................... AES cipher algorithms"
  288. tristate
  289. depends on !ADK_KERNEL_CRYPTO_AES
  290. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  291. default n
  292. help
  293. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  294. algorithm.
  295. Rijndael appears to be consistently a very good performer in
  296. both hardware and software across a wide range of computing
  297. environments regardless of its use in feedback or non-feedback
  298. modes. Its key setup time is excellent, and its key agility is
  299. good. Rijndael's very low memory requirements make it very well
  300. suited for restricted-space environments, in which it also
  301. demonstrates excellent performance. Rijndael's operations are
  302. among the easiest to defend against power and timing attacks.
  303. The AES specifies three key sizes: 128, 192 and 256 bits
  304. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  305. config ADK_KPACKAGE_KMOD_CRYPTO_AES_586
  306. prompt "kmod-crypto-aes-i586................. AES cipher algorithms (i586)"
  307. tristate
  308. depends on ADK_x86
  309. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  310. default n
  311. help
  312. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  313. algorithm.
  314. Rijndael appears to be consistently a very good performer in
  315. both hardware and software across a wide range of computing
  316. environments regardless of its use in feedback or non-feedback
  317. modes. Its key setup time is excellent, and its key agility is
  318. good. Rijndael's very low memory requirements make it very well
  319. suited for restricted-space environments, in which it also
  320. demonstrates excellent performance. Rijndael's operations are
  321. among the easiest to defend against power and timing attacks.
  322. The AES specifies three key sizes: 128, 192 and 256 bits
  323. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  324. config ADK_KPACKAGE_KMOD_CRYPTO_ANUBIS
  325. prompt "kmod-crypto-anubis................... Anubis cipher algorithm"
  326. tristate
  327. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  328. default n
  329. help
  330. Anubis cipher algorithm.
  331. Anubis is a variable key length cipher which can use keys from
  332. 128 bits to 320 bits in length. It was evaluated as a entrant
  333. in the NESSIE competition.
  334. See also:
  335. <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/>
  336. <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html>
  337. config ADK_KPACKAGE_KMOD_CRYPTO_ARC4
  338. prompt "kmod-crypto-arc4..................... ARC4 cipher algorithm"
  339. tristate
  340. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  341. default n
  342. help
  343. ARC4 cipher algorithm.
  344. ARC4 is a stream cipher using keys ranging from 8 bits to 2048
  345. bits in length. This algorithm is required for driver-based
  346. WEP, but it should not be for other purposes because of the
  347. weakness of the algorithm.
  348. config ADK_KPACKAGE_KMOD_CRYPTO_BLOWFISH
  349. prompt "kmod-crypto-blowfish................. Blowfish cipher algorithm"
  350. tristate
  351. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  352. default n
  353. help
  354. Blowfish cipher algorithm, by Bruce Schneier.
  355. This is a variable key length cipher which can use keys from 32
  356. bits to 448 bits in length. It's fast, simple and specifically
  357. designed for use on "large microprocessors".
  358. See also:
  359. <http://www.schneier.com/blowfish.html>
  360. config ADK_KPACKAGE_KMOD_CRYPTO_CAMELLIA
  361. prompt "kmod-crypto-camellia................. Camellia cipher algorithms"
  362. tristate
  363. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  364. default n
  365. help
  366. Camellia cipher algorithms module.
  367. Camellia is a symmetric key block cipher developed jointly
  368. at NTT and Mitsubishi Electric Corporation.
  369. The Camellia specifies three key sizes: 128, 192 and 256 bits.
  370. See also:
  371. <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
  372. config ADK_KPACKAGE_KMOD_CRYPTO_CAST5
  373. prompt "kmod-crypto-cast5.................... CAST5 (CAST-128) cipher algorithm"
  374. tristate
  375. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  376. default n
  377. help
  378. The CAST5 encryption algorithm (synonymous with CAST-128) is
  379. described in RFC2144.
  380. config ADK_KPACKAGE_KMOD_CRYPTO_CAST6
  381. prompt "kmod-crypto-cast6.................... CAST6 (CATS-256) cipher algorithm"
  382. tristate
  383. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  384. default n
  385. help
  386. The CAST6 encryption algorithm (synonymous with CAST-256) is
  387. described in RFC2612.
  388. config ADK_KPACKAGE_KMOD_CRYPTO_DES
  389. prompt "kmod-crypto-des...................... DES and Triple DES EDE cipher algorithms"
  390. tristate
  391. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  392. default n
  393. help
  394. DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
  395. config ADK_KPACKAGE_KMOD_CRYPTO_FCRYPT
  396. prompt "kmod-crypto-fcrypt................... FCrypt cipher algorithms"
  397. tristate
  398. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  399. default n
  400. help
  401. FCrypt algorithm used by RxRPC.
  402. config ADK_KPACKAGE_KMOD_CRYPTO_KHAZAD
  403. prompt "kmod-crypto-khazad................... Khazad cipher algorithm"
  404. tristate
  405. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  406. default n
  407. help
  408. Khazad cipher algorithm.
  409. Khazad was a finalist in the initial NESSIE competition. It is
  410. an algorithm optimized for 64-bit processors with good performance
  411. on 32-bit processors. Khazad uses an 128 bit key size.
  412. See also:
  413. <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html>
  414. config ADK_KPACKAGE_KMOD_CRYPTO_SERPENT
  415. prompt "kmod-crypto-serpent.................. Serpent cipher algorithm"
  416. tristate
  417. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  418. default n
  419. help
  420. Serpent cipher algorithm, by Anderson, Biham & Knudsen.
  421. Keys are allowed to be from 0 to 256 bits in length, in steps
  422. of 8 bits. Also includes the 'Tnepres' algorithm, a reversed
  423. variant of Serpent for compatibility with old kerneli code.
  424. See also:
  425. <http://www.cl.cam.ac.uk/~rja14/serpent.html>
  426. config ADK_KPACKAGE_KMOD_CRYPTO_TEA
  427. prompt "kmod-crypto-tea...................... TEA, XTEA and XETA cipher algorithms"
  428. tristate
  429. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  430. default n
  431. help
  432. TEA cipher algorithm.
  433. Tiny Encryption Algorithm is a simple cipher that uses
  434. many rounds for security. It is very fast and uses
  435. little memory.
  436. Xtendend Tiny Encryption Algorithm is a modification to
  437. the TEA algorithm to address a potential key weakness
  438. in the TEA algorithm.
  439. Xtendend Encryption Tiny Algorithm is a mis-implementation
  440. of the XTEA algorithm for compatibility purposes.
  441. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH
  442. prompt "kmod-crypto-twofish.................. Twofish cipher algorithm"
  443. tristate
  444. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  445. default n
  446. help
  447. Twofish cipher algorithm.
  448. Twofish was submitted as an AES (Advanced Encryption Standard)
  449. candidate cipher by researchers at CounterPane Systems. It is a
  450. 16 round block cipher supporting key sizes of 128, 192, and 256
  451. bits.
  452. See also:
  453. <http://www.schneier.com/twofish.html>
  454. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH_586
  455. prompt "kmod-crypto-twofish-586.............. Twofish cipher algorithm (i586)"
  456. tristate
  457. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  458. depends on ADK_x86
  459. default n
  460. help
  461. Twofish cipher algorithm.
  462. Twofish was submitted as an AES (Advanced Encryption Standard)
  463. candidate cipher by researchers at CounterPane Systems. It is a
  464. 16 round block cipher supporting key sizes of 128, 192, and 256
  465. bits.
  466. See also:
  467. <http://www.schneier.com/twofish.html>
  468. config ADK_KPACKAGE_KMOD_CRYPTO_NULL
  469. prompt "kmod-crypto-null..................... Null algorithms"
  470. tristate
  471. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  472. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  473. default n
  474. help
  475. These are 'Null' algorithms, used by IPsec, which do nothing.
  476. endmenu
  477. menu "Compression"
  478. config ADK_KPACKAGE_KMOD_CRYPTO_DEFLATE
  479. prompt "kmod-crypto-deflate.................. Deflate compression algorithm"
  480. tristate
  481. select ADK_KERNEL_CRYPTO
  482. default n
  483. help
  484. This is the Deflate algorithm (RFC1951), specified for use in
  485. IPSec with the IPCOMP protocol (RFC3173, RFC2394).
  486. You will most probably want this if using IPSec.
  487. config ADK_KPACKAGE_KMOD_CRYPTO_LZO
  488. prompt "kmod-crypto-lzo...................... LZO compression algorithm"
  489. tristate
  490. select ADK_KERNEL_CRYPTO
  491. default n
  492. help
  493. config ADK_KPACKAGE_KMOD_CRYPTO_MICHAEL_MIC
  494. prompt "kmod-crypto-michael-mic.............. Michael MIC keyed digest algorithm"
  495. tristate
  496. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  497. default n
  498. help
  499. Michael MIC is used for message integrity protection in TKIP
  500. (IEEE 802.11i). This algorithm is required for TKIP, but it
  501. should not be used for other purposes because of the weakness
  502. of the algorithm.
  503. config ADK_KPACKAGE_KMOD_CRYPTO_CRC32C
  504. prompt "kmod-crypto-crc32c................... CRC32c CRC algorithm"
  505. tristate
  506. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  507. select ADK_KPACKAGE_KMOD_LIBCRC32C
  508. default n
  509. help
  510. Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used
  511. by iSCSI for header and data digests and by others.
  512. See Castagnoli93. This implementation uses lib/libcrc32c.
  513. Module will be crc32c.
  514. endmenu
  515. endmenu