Config.in.crypto 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606
  1. menu "Crypto kernel modules"
  2. config ADK_KERNEL_CRYPTO
  3. tristate
  4. config ADK_KERNEL_CRYPTO_HW
  5. tristate
  6. config ADK_KERNEL_CRYPTO_AES
  7. boolean
  8. config ADK_KERNEL_CRYPTO_SHA256
  9. boolean
  10. config ADK_KERNEL_CRYPTO_CBC
  11. boolean
  12. comment "Hardware cryptography"
  13. menu "Hardware crypto devices"
  14. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_GEODE
  15. prompt "kmod-crypto-dev-geode.................. Support for the Geode LX/GX AES engine"
  16. tristate
  17. select ADK_KERNEL_CRYPTO
  18. select ADK_KERNEL_CRYPTO_HW
  19. select ADK_KPACKAGE_KMOD_CRYPTO_ECB
  20. select ADK_KPACKAGE_KMOD_CRYPTO_CBC
  21. depends on ADK_TARGET_WITH_GEODE_CRYPTO
  22. default y if ADK_TARGET_WITH_GEODE_CRYPTO
  23. default n
  24. help
  25. Say 'Y' here to use the AMD Geode LX processor on-board AES
  26. engine for the CryptoAPI AES algorithm.
  27. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_HIFN_795X
  28. prompt "kmod-crypto-dev-hifn-795x.............. Driver for HIFN 795x crypto accelerator chips"
  29. tristate
  30. select ADK_KERNEL_CRYPTO
  31. select ADK_KERNEL_CRYPTO_HW
  32. #select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  33. select ADK_KPACKAGE_KMOD_CRYPTO_DES
  34. depends on ADK_TARGET_WITH_PCI || ADK_TARGET_WITH_MINIPCI
  35. default n
  36. help
  37. This option allows you to have support for HIFN 795x crypto adapters.
  38. endmenu
  39. comment "Software cryptography"
  40. menu "Crypto core / Block and Hash modes"
  41. config ADK_KERNEL_MOD_CRYPTO_PCOMP
  42. tristate
  43. config ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  44. tristate
  45. select ADK_KERNEL_CRYPTO
  46. select ADK_KERNEL_MOD_CRYPTO_PCOMP
  47. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  48. default n
  49. help
  50. config ADK_KERNEL_MOD_CRYPTO_ALGAPI
  51. tristate
  52. config ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  53. tristate
  54. select ADK_KERNEL_CRYPTO
  55. select ADK_KERNEL_MOD_CRYPTO_ALGAPI
  56. default n
  57. help
  58. config ADK_KERNEL_MOD_CRYPTO_AEAD
  59. tristate
  60. config ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  61. tristate
  62. select ADK_KERNEL_CRYPTO
  63. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  64. select ADK_KERNEL_MOD_CRYPTO_AEAD
  65. default n
  66. help
  67. config ADK_KERNEL_MOD_CRYPTO_HASH
  68. tristate
  69. config ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  70. tristate
  71. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  72. select ADK_KERNEL_MOD_CRYPTO_HASH
  73. default n
  74. help
  75. config ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  76. tristate
  77. config ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  78. tristate
  79. #select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  80. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  81. select ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  82. default n
  83. help
  84. config ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  85. tristate
  86. config ADK_KERNEL_MOD_CRYPTO_MANAGER
  87. tristate
  88. #config ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  89. # prompt "kmod-crypto-manager2................. Crypto algorithm manager"
  90. # tristate
  91. # select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  92. # select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  93. # select ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  94. ## select ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  95. # select ADK_KERNEL_MOD_CRYPTO_MANAGER
  96. ## select ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  97. # default n
  98. # help
  99. config ADK_KPACKAGE_KMOD_CRYPTO_AUTHENC
  100. prompt "kmod-crypto-authenc.................. AuthENC (IPsec)"
  101. tristate
  102. #select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  103. default n
  104. help
  105. config ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  106. prompt "kmod-crypto-seqiv.................... Sequence Number IV Generator"
  107. tristate
  108. #select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  109. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  110. help
  111. This IV generator generates an IV based on a sequence number by
  112. xoring it with a salt. This algorithm is mainly useful for CTR
  113. config ADK_KPACKAGE_KMOD_CRYPTO_CTS
  114. prompt "kmod-crypto-cts...................... CTS support"
  115. tristate
  116. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  117. # select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  118. default n
  119. help
  120. CTS: Cipher Text Stealing
  121. This is the Cipher Text Stealing mode as described by
  122. Section 8 of rfc2040 and referenced by rfc3962.
  123. (rfc3962 includes errata information in its Appendix A)
  124. This mode is required for Kerberos gss mechanism support
  125. for AES encryption.
  126. config ADK_KPACKAGE_KMOD_CRYPTO_CBC
  127. prompt "kmod-crypto-cbc...................... CBC support"
  128. tristate
  129. depends on !ADK_KERNEL_CRYPTO_CBC
  130. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  131. # select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  132. default n
  133. help
  134. CBC: Cipher Block Chaining mode
  135. This block cipher algorithm is required for IPSec.
  136. config ADK_KPACKAGE_KMOD_CRYPTO_CCM
  137. prompt "kmod-crypto-ccm...................... CCM support"
  138. tristate
  139. # select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  140. select ADK_KPACKAGE_KMOD_CRYPTO_CTR
  141. default n
  142. help
  143. Support for Counter with CBC MAC. Required for IPsec.
  144. config ADK_KPACKAGE_KMOD_CRYPTO_GCM
  145. prompt "kmod-crypto-gcm...................... GCM support"
  146. tristate
  147. # select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  148. select ADK_KPACKAGE_KMOD_CRYPTO_CTR
  149. default n
  150. help
  151. Support for Galois/Counter Mode (GCM) and Galois Message
  152. Authentication Code (GMAC). Required for IPSec.
  153. config ADK_KPACKAGE_KMOD_CRYPTO_CTR
  154. prompt "kmod-crypto-ctr...................... CTR support"
  155. tristate
  156. # select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  157. select ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  158. default n
  159. help
  160. CTR: Counter mode
  161. This block cipher algorithm is required for IPSec.
  162. config ADK_KPACKAGE_KMOD_CRYPTO_ECB
  163. prompt "kmod-crypto-ecb...................... ECB support"
  164. tristate
  165. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  166. # select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  167. default n
  168. help
  169. ECB: Electronic CodeBook mode
  170. This is the simplest block cipher algorithm. It simply encrypts
  171. the input block by block.
  172. config ADK_KPACKAGE_KMOD_CRYPTO_HMAC
  173. prompt "kmod-crypto-hmac..................... HMAC support"
  174. tristate
  175. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  176. # select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  177. default n
  178. help
  179. HMAC: Keyed-Hashing for Message Authentication (RFC2104).
  180. This is required for IPSec.
  181. config ADK_KPACKAGE_KMOD_CRYPTO_XCBC
  182. prompt "kmod-crypto-xcbc..................... XCBC support"
  183. tristate
  184. default n
  185. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  186. # select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  187. help
  188. XCBC: Keyed-Hashing with encryption algorithm
  189. config ADK_KERNEL_MOD_CRYPTO_RNG
  190. tristate
  191. #config ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  192. # prompt "kmod-crypto-rng2..................... RNG support"
  193. # tristate
  194. # select ADK_KERNEL_MOD_CRYPTO_RNG
  195. # default n
  196. # help
  197. # Random number generator
  198. endmenu
  199. menu "Digest algorithms"
  200. config ADK_KPACKAGE_KMOD_CRYPTO_MD4
  201. prompt "kmod-crypto-md4...................... MD4 digest algorithm"
  202. tristate
  203. default n
  204. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  205. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  206. help
  207. MD4 message digest algorithm (RFC1320).
  208. config ADK_KPACKAGE_KMOD_CRYPTO_MD5
  209. prompt "kmod-crypto-md5...................... MD5 digest algorithm"
  210. tristate
  211. default n
  212. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  213. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  214. help
  215. MD5 message digest algorithm (RFC1321).
  216. config ADK_KPACKAGE_KMOD_CRYPTO_SHA1
  217. prompt "kmod-crypto-sha1..................... SHA1 digest algorithm"
  218. tristate
  219. default n
  220. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  221. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  222. help
  223. SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
  224. config ADK_KPACKAGE_KMOD_CRYPTO_SHA256
  225. prompt "kmod-crypto-sha256................... SHA256 digest algorithm"
  226. tristate
  227. default n
  228. depends on !ADK_KERNEL_CRYPTO_SHA256
  229. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  230. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  231. help
  232. SHA256 secure hash standard (DFIPS 180-2).
  233. This version of SHA implements a 256 bit hash with 128 bits of
  234. security against collision attacks.
  235. config ADK_KPACKAGE_KMOD_CRYPTO_SHA512
  236. prompt "kmod-crypto-sha512................... SHA512 digest algorithm"
  237. tristate
  238. default n
  239. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  240. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  241. help
  242. SHA512 secure hash standard (DFIPS 180-2).
  243. This version of SHA implements a 512 bit hash with 256 bits of
  244. security against collision attacks.
  245. This code also includes SHA-384, a 384 bit hash with 192 bits
  246. of security against collision attacks.
  247. config ADK_KPACKAGE_KMOD_CRYPTO_WP512
  248. prompt "kmod-crypto-whirlpool................ Whirlpool digest algorithms"
  249. tristate
  250. default n
  251. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  252. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  253. help
  254. Whirlpool hash algorithm 512, 384 and 256-bit hashes
  255. Whirlpool-512 is part of the NESSIE cryptographic primitives.
  256. Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
  257. See also:
  258. <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html>
  259. config ADK_KPACKAGE_KMOD_CRYPTO_TGR192
  260. prompt "kmod-crypto-tiger.................... Tiger digest algorithms"
  261. tristate
  262. default n
  263. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  264. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  265. help
  266. Tiger hash algorithm 192, 160 and 128-bit hashes
  267. Tiger is a hash function optimized for 64-bit processors while
  268. still having decent performance on 32-bit processors.
  269. Tiger was developed by Ross Anderson and Eli Biham.
  270. See also:
  271. <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>.
  272. endmenu
  273. menu "Cipher algoritms"
  274. config ADK_KPACKAGE_KMOD_CRYPTO_AES
  275. prompt "kmod-crypto-aes...................... AES cipher algorithms"
  276. tristate
  277. depends on !ADK_KERNEL_CRYPTO_AES
  278. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  279. default n
  280. help
  281. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  282. algorithm.
  283. Rijndael appears to be consistently a very good performer in
  284. both hardware and software across a wide range of computing
  285. environments regardless of its use in feedback or non-feedback
  286. modes. Its key setup time is excellent, and its key agility is
  287. good. Rijndael's very low memory requirements make it very well
  288. suited for restricted-space environments, in which it also
  289. demonstrates excellent performance. Rijndael's operations are
  290. among the easiest to defend against power and timing attacks.
  291. The AES specifies three key sizes: 128, 192 and 256 bits
  292. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  293. config ADK_KPACKAGE_KMOD_CRYPTO_AES_586
  294. prompt "kmod-crypto-aes-i586................. AES cipher algorithms (i586)"
  295. tristate
  296. depends on ADK_x86
  297. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  298. default n
  299. help
  300. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  301. algorithm.
  302. Rijndael appears to be consistently a very good performer in
  303. both hardware and software across a wide range of computing
  304. environments regardless of its use in feedback or non-feedback
  305. modes. Its key setup time is excellent, and its key agility is
  306. good. Rijndael's very low memory requirements make it very well
  307. suited for restricted-space environments, in which it also
  308. demonstrates excellent performance. Rijndael's operations are
  309. among the easiest to defend against power and timing attacks.
  310. The AES specifies three key sizes: 128, 192 and 256 bits
  311. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  312. config ADK_KPACKAGE_KMOD_CRYPTO_ANUBIS
  313. prompt "kmod-crypto-anubis................... Anubis cipher algorithm"
  314. tristate
  315. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  316. default n
  317. help
  318. Anubis cipher algorithm.
  319. Anubis is a variable key length cipher which can use keys from
  320. 128 bits to 320 bits in length. It was evaluated as a entrant
  321. in the NESSIE competition.
  322. See also:
  323. <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/>
  324. <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html>
  325. config ADK_KPACKAGE_KMOD_CRYPTO_ARC4
  326. prompt "kmod-crypto-arc4..................... ARC4 cipher algorithm"
  327. tristate
  328. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  329. default n
  330. help
  331. ARC4 cipher algorithm.
  332. ARC4 is a stream cipher using keys ranging from 8 bits to 2048
  333. bits in length. This algorithm is required for driver-based
  334. WEP, but it should not be for other purposes because of the
  335. weakness of the algorithm.
  336. config ADK_KPACKAGE_KMOD_CRYPTO_BLOWFISH
  337. prompt "kmod-crypto-blowfish................. Blowfish cipher algorithm"
  338. tristate
  339. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  340. default n
  341. help
  342. Blowfish cipher algorithm, by Bruce Schneier.
  343. This is a variable key length cipher which can use keys from 32
  344. bits to 448 bits in length. It's fast, simple and specifically
  345. designed for use on "large microprocessors".
  346. See also:
  347. <http://www.schneier.com/blowfish.html>
  348. config ADK_KPACKAGE_KMOD_CRYPTO_CAMELLIA
  349. prompt "kmod-crypto-camellia................. Camellia cipher algorithms"
  350. tristate
  351. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  352. default n
  353. help
  354. Camellia cipher algorithms module.
  355. Camellia is a symmetric key block cipher developed jointly
  356. at NTT and Mitsubishi Electric Corporation.
  357. The Camellia specifies three key sizes: 128, 192 and 256 bits.
  358. See also:
  359. <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
  360. config ADK_KPACKAGE_KMOD_CRYPTO_CAST5
  361. prompt "kmod-crypto-cast5.................... CAST5 (CAST-128) cipher algorithm"
  362. tristate
  363. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  364. default n
  365. help
  366. The CAST5 encryption algorithm (synonymous with CAST-128) is
  367. described in RFC2144.
  368. config ADK_KPACKAGE_KMOD_CRYPTO_CAST6
  369. prompt "kmod-crypto-cast6.................... CAST6 (CATS-256) cipher algorithm"
  370. tristate
  371. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  372. default n
  373. help
  374. The CAST6 encryption algorithm (synonymous with CAST-256) is
  375. described in RFC2612.
  376. config ADK_KPACKAGE_KMOD_CRYPTO_DES
  377. prompt "kmod-crypto-des...................... DES and Triple DES EDE cipher algorithms"
  378. tristate
  379. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  380. default n
  381. help
  382. DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
  383. config ADK_KPACKAGE_KMOD_CRYPTO_FCRYPT
  384. prompt "kmod-crypto-fcrypt................... FCrypt cipher algorithms"
  385. tristate
  386. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  387. default n
  388. help
  389. FCrypt algorithm used by RxRPC.
  390. config ADK_KPACKAGE_KMOD_CRYPTO_KHAZAD
  391. prompt "kmod-crypto-khazad................... Khazad cipher algorithm"
  392. tristate
  393. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  394. default n
  395. help
  396. Khazad cipher algorithm.
  397. Khazad was a finalist in the initial NESSIE competition. It is
  398. an algorithm optimized for 64-bit processors with good performance
  399. on 32-bit processors. Khazad uses an 128 bit key size.
  400. See also:
  401. <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html>
  402. config ADK_KPACKAGE_KMOD_CRYPTO_SERPENT
  403. prompt "kmod-crypto-serpent.................. Serpent cipher algorithm"
  404. tristate
  405. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  406. default n
  407. help
  408. Serpent cipher algorithm, by Anderson, Biham & Knudsen.
  409. Keys are allowed to be from 0 to 256 bits in length, in steps
  410. of 8 bits. Also includes the 'Tnepres' algorithm, a reversed
  411. variant of Serpent for compatibility with old kerneli code.
  412. See also:
  413. <http://www.cl.cam.ac.uk/~rja14/serpent.html>
  414. config ADK_KPACKAGE_KMOD_CRYPTO_TEA
  415. prompt "kmod-crypto-tea...................... TEA, XTEA and XETA cipher algorithms"
  416. tristate
  417. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  418. default n
  419. help
  420. TEA cipher algorithm.
  421. Tiny Encryption Algorithm is a simple cipher that uses
  422. many rounds for security. It is very fast and uses
  423. little memory.
  424. Xtendend Tiny Encryption Algorithm is a modification to
  425. the TEA algorithm to address a potential key weakness
  426. in the TEA algorithm.
  427. Xtendend Encryption Tiny Algorithm is a mis-implementation
  428. of the XTEA algorithm for compatibility purposes.
  429. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH
  430. prompt "kmod-crypto-twofish.................. Twofish cipher algorithm"
  431. tristate
  432. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  433. default n
  434. help
  435. Twofish cipher algorithm.
  436. Twofish was submitted as an AES (Advanced Encryption Standard)
  437. candidate cipher by researchers at CounterPane Systems. It is a
  438. 16 round block cipher supporting key sizes of 128, 192, and 256
  439. bits.
  440. See also:
  441. <http://www.schneier.com/twofish.html>
  442. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH_586
  443. prompt "kmod-crypto-twofish-586.............. Twofish cipher algorithm (i586)"
  444. tristate
  445. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  446. depends on ADK_x86
  447. default n
  448. help
  449. Twofish cipher algorithm.
  450. Twofish was submitted as an AES (Advanced Encryption Standard)
  451. candidate cipher by researchers at CounterPane Systems. It is a
  452. 16 round block cipher supporting key sizes of 128, 192, and 256
  453. bits.
  454. See also:
  455. <http://www.schneier.com/twofish.html>
  456. config ADK_KPACKAGE_KMOD_CRYPTO_NULL
  457. prompt "kmod-crypto-null..................... Null algorithms"
  458. tristate
  459. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  460. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  461. default n
  462. help
  463. These are 'Null' algorithms, used by IPsec, which do nothing.
  464. endmenu
  465. menu "Compression"
  466. config ADK_KPACKAGE_KMOD_CRYPTO_DEFLATE
  467. prompt "kmod-crypto-deflate.................. Deflate compression algorithm"
  468. tristate
  469. select ADK_KERNEL_CRYPTO
  470. default n
  471. help
  472. This is the Deflate algorithm (RFC1951), specified for use in
  473. IPSec with the IPCOMP protocol (RFC3173, RFC2394).
  474. You will most probably want this if using IPSec.
  475. config ADK_KPACKAGE_KMOD_CRYPTO_LZO
  476. prompt "kmod-crypto-lzo...................... LZO compression algorithm"
  477. tristate
  478. select ADK_KERNEL_CRYPTO
  479. default n
  480. help
  481. config ADK_KPACKAGE_KMOD_CRYPTO_MICHAEL_MIC
  482. prompt "kmod-crypto-michael-mic.............. Michael MIC keyed digest algorithm"
  483. tristate
  484. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  485. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  486. default n
  487. help
  488. Michael MIC is used for message integrity protection in TKIP
  489. (IEEE 802.11i). This algorithm is required for TKIP, but it
  490. should not be used for other purposes because of the weakness
  491. of the algorithm.
  492. config ADK_KPACKAGE_KMOD_CRYPTO_CRC32C
  493. prompt "kmod-crypto-crc32c................... CRC32c CRC algorithm"
  494. tristate
  495. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  496. select ADK_KPACKAGE_KMOD_LIBCRC32C
  497. default n
  498. help
  499. Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used
  500. by iSCSI for header and data digests and by others.
  501. See Castagnoli93. This implementation uses lib/libcrc32c.
  502. Module will be crc32c.
  503. endmenu
  504. endmenu