Config.in.crypto 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623
  1. menu "Crypto kernel modules"
  2. config ADK_KERNEL_CRYPTO
  3. tristate
  4. config ADK_KERNEL_CRYPTO_HW
  5. tristate
  6. config ADK_KERNEL_OCF_FIPS
  7. boolean
  8. config ADK_KERNEL_OCF_CRYPTODEV
  9. boolean
  10. config ADK_KERNEL_OCF_OCF
  11. boolean
  12. select ADK_KERNEL_CRYPTO
  13. select ADK_KERNEL_OCF_FIPS
  14. select ADK_KERNEL_OCF_CRYPTODEV
  15. default n
  16. config ADK_KERNEL_CRYPTO_AES
  17. boolean
  18. config ADK_KERNEL_CRYPTO_SHA256
  19. boolean
  20. config ADK_KERNEL_CRYPTO_CBC
  21. boolean
  22. comment "Hardware cryptography"
  23. menu "Hardware crypto devices"
  24. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_GEODE
  25. prompt "kmod-crypto-dev-geode.................. Support for the Geode LX/GX AES engine"
  26. tristate
  27. select ADK_KERNEL_CRYPTO
  28. select ADK_KERNEL_CRYPTO_HW
  29. select ADK_KPACKAGE_KMOD_CRYPTO_ECB
  30. select ADK_KPACKAGE_KMOD_CRYPTO_CBC
  31. depends on ADK_TARGET_WITH_GEODE_CRYPTO
  32. default y if ADK_TARGET_WITH_GEODE_CRYPTO
  33. default n
  34. help
  35. Say 'Y' here to use the AMD Geode LX processor on-board AES
  36. engine for the CryptoAPI AES algorithm.
  37. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_HIFN_795X
  38. prompt "kmod-crypto-dev-hifn-795x.............. Driver for HIFN 795x crypto accelerator chips"
  39. tristate
  40. select ADK_KERNEL_CRYPTO
  41. select ADK_KERNEL_CRYPTO_HW
  42. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  43. select ADK_KPACKAGE_KMOD_CRYPTO_DES
  44. depends on ADK_TARGET_WITH_PCI || ADK_TARGET_WITH_MINIPCI
  45. default n
  46. help
  47. This option allows you to have support for HIFN 795x crypto adapters.
  48. comment "OpenBSD Cryptographic framework"
  49. config ADK_KPACKAGE_KMOD_OCF_HIFN
  50. prompt "kmod-ocf-hifn.......................... HIFN crypto engine"
  51. tristate
  52. default n
  53. select ADK_KERNEL_OCF_OCF
  54. depends on ADK_TARGET_WITH_PCI || ADK_TARGET_WITH_MINIPCI
  55. depends on !ADK_HARDWARE_QEMU
  56. depends on ADK_LINUX_X86 || ADK_LINUX_X86_64
  57. select ADK_KPACKAGE_KMOD_CRYPTO_AES
  58. help
  59. Engine for cryptodev that uses Hifn based accelerators
  60. such as the 7951, 7955, 7956, 7751, 7811.
  61. endmenu
  62. comment "Software cryptography"
  63. menu "Crypto core / Block and Hash modes"
  64. config ADK_KERNEL_MOD_CRYPTO_PCOMP
  65. tristate
  66. config ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  67. tristate
  68. select ADK_KERNEL_CRYPTO
  69. select ADK_KERNEL_MOD_CRYPTO_PCOMP
  70. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  71. default n
  72. help
  73. config ADK_KERNEL_MOD_CRYPTO_ALGAPI
  74. tristate
  75. config ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  76. tristate
  77. select ADK_KERNEL_CRYPTO
  78. select ADK_KERNEL_MOD_CRYPTO_ALGAPI
  79. default n
  80. help
  81. config ADK_KERNEL_MOD_CRYPTO_AEAD
  82. tristate
  83. config ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  84. tristate
  85. select ADK_KERNEL_CRYPTO
  86. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  87. select ADK_KERNEL_MOD_CRYPTO_AEAD
  88. default n
  89. help
  90. config ADK_KERNEL_MOD_CRYPTO_HASH
  91. tristate
  92. config ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  93. tristate
  94. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  95. select ADK_KERNEL_MOD_CRYPTO_HASH
  96. default n
  97. help
  98. config ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  99. tristate
  100. config ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  101. tristate
  102. select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  103. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  104. select ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  105. default n
  106. help
  107. config ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  108. tristate
  109. config ADK_KERNEL_MOD_CRYPTO_MANAGER
  110. tristate
  111. config ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  112. prompt "kmod-crypto-manager2................. Crypto algorithm manager"
  113. tristate
  114. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  115. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  116. select ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  117. select ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  118. select ADK_KERNEL_MOD_CRYPTO_MANAGER
  119. select ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  120. default n
  121. help
  122. config ADK_KPACKAGE_KMOD_CRYPTO_AUTHENC
  123. prompt "kmod-crypto-authenc.................. AuthENC (IPsec)"
  124. tristate
  125. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  126. default n
  127. help
  128. config ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  129. prompt "kmod-crypto-seqiv.................... Sequence Number IV Generator"
  130. tristate
  131. select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  132. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  133. help
  134. This IV generator generates an IV based on a sequence number by
  135. xoring it with a salt. This algorithm is mainly useful for CTR
  136. config ADK_KPACKAGE_KMOD_CRYPTO_CTS
  137. prompt "kmod-crypto-cts...................... CTS support"
  138. tristate
  139. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  140. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  141. default n
  142. help
  143. CTS: Cipher Text Stealing
  144. This is the Cipher Text Stealing mode as described by
  145. Section 8 of rfc2040 and referenced by rfc3962.
  146. (rfc3962 includes errata information in its Appendix A)
  147. This mode is required for Kerberos gss mechanism support
  148. for AES encryption.
  149. config ADK_KPACKAGE_KMOD_CRYPTO_CBC
  150. prompt "kmod-crypto-cbc...................... CBC support"
  151. tristate
  152. depends on !ADK_KERNEL_CRYPTO_CBC
  153. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  154. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  155. default n
  156. help
  157. CBC: Cipher Block Chaining mode
  158. This block cipher algorithm is required for IPSec.
  159. config ADK_KPACKAGE_KMOD_CRYPTO_CCM
  160. prompt "kmod-crypto-ccm...................... CCM support"
  161. tristate
  162. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  163. select ADK_KPACKAGE_KMOD_CRYPTO_CTR
  164. default n
  165. help
  166. Support for Counter with CBC MAC. Required for IPsec.
  167. config ADK_KPACKAGE_KMOD_CRYPTO_CTR
  168. prompt "kmod-crypto-ctr...................... CTR support"
  169. tristate
  170. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  171. select ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  172. default n
  173. help
  174. CTR: Counter mode
  175. This block cipher algorithm is required for IPSec.
  176. config ADK_KPACKAGE_KMOD_CRYPTO_ECB
  177. prompt "kmod-crypto-ecb...................... ECB support"
  178. tristate
  179. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  180. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  181. default n
  182. help
  183. ECB: Electronic CodeBook mode
  184. This is the simplest block cipher algorithm. It simply encrypts
  185. the input block by block.
  186. config ADK_KPACKAGE_KMOD_CRYPTO_HMAC
  187. prompt "kmod-crypto-hmac..................... HMAC support"
  188. tristate
  189. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  190. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  191. default n
  192. help
  193. HMAC: Keyed-Hashing for Message Authentication (RFC2104).
  194. This is required for IPSec.
  195. config ADK_KPACKAGE_KMOD_CRYPTO_XCBC
  196. prompt "kmod-crypto-xcbc..................... XCBC support"
  197. tristate
  198. default n
  199. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  200. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  201. help
  202. XCBC: Keyed-Hashing with encryption algorithm
  203. config ADK_KERNEL_MOD_CRYPTO_RNG
  204. tristate
  205. config ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  206. prompt "kmod-crypto-rng2..................... RNG support"
  207. tristate
  208. select ADK_KERNEL_MOD_CRYPTO_RNG
  209. default n
  210. help
  211. Random number generator
  212. endmenu
  213. menu "Digest algorithms"
  214. config ADK_KPACKAGE_KMOD_CRYPTO_MD4
  215. prompt "kmod-crypto-md4...................... MD4 digest algorithm"
  216. tristate
  217. default n
  218. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  219. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  220. help
  221. MD4 message digest algorithm (RFC1320).
  222. config ADK_KPACKAGE_KMOD_CRYPTO_MD5
  223. prompt "kmod-crypto-md5...................... MD5 digest algorithm"
  224. tristate
  225. default n
  226. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  227. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  228. help
  229. MD5 message digest algorithm (RFC1321).
  230. config ADK_KPACKAGE_KMOD_CRYPTO_SHA1
  231. prompt "kmod-crypto-sha1..................... SHA1 digest algorithm"
  232. tristate
  233. default n
  234. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  235. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  236. help
  237. SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
  238. config ADK_KPACKAGE_KMOD_CRYPTO_SHA256
  239. prompt "kmod-crypto-sha256................... SHA256 digest algorithm"
  240. tristate
  241. default n
  242. depends on !ADK_KERNEL_CRYPTO_SHA256
  243. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  244. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  245. help
  246. SHA256 secure hash standard (DFIPS 180-2).
  247. This version of SHA implements a 256 bit hash with 128 bits of
  248. security against collision attacks.
  249. config ADK_KPACKAGE_KMOD_CRYPTO_SHA512
  250. prompt "kmod-crypto-sha512................... SHA512 digest algorithm"
  251. tristate
  252. default n
  253. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  254. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  255. help
  256. SHA512 secure hash standard (DFIPS 180-2).
  257. This version of SHA implements a 512 bit hash with 256 bits of
  258. security against collision attacks.
  259. This code also includes SHA-384, a 384 bit hash with 192 bits
  260. of security against collision attacks.
  261. config ADK_KPACKAGE_KMOD_CRYPTO_WP512
  262. prompt "kmod-crypto-whirlpool................ Whirlpool digest algorithms"
  263. tristate
  264. default n
  265. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  266. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  267. help
  268. Whirlpool hash algorithm 512, 384 and 256-bit hashes
  269. Whirlpool-512 is part of the NESSIE cryptographic primitives.
  270. Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
  271. See also:
  272. <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html>
  273. config ADK_KPACKAGE_KMOD_CRYPTO_TGR192
  274. prompt "kmod-crypto-tiger.................... Tiger digest algorithms"
  275. tristate
  276. default n
  277. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  278. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  279. help
  280. Tiger hash algorithm 192, 160 and 128-bit hashes
  281. Tiger is a hash function optimized for 64-bit processors while
  282. still having decent performance on 32-bit processors.
  283. Tiger was developed by Ross Anderson and Eli Biham.
  284. See also:
  285. <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>.
  286. endmenu
  287. menu "Cipher algoritms"
  288. config ADK_KPACKAGE_KMOD_CRYPTO_AES
  289. prompt "kmod-crypto-aes...................... AES cipher algorithms"
  290. tristate
  291. depends on !ADK_KERNEL_CRYPTO_AES
  292. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  293. default n
  294. help
  295. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  296. algorithm.
  297. Rijndael appears to be consistently a very good performer in
  298. both hardware and software across a wide range of computing
  299. environments regardless of its use in feedback or non-feedback
  300. modes. Its key setup time is excellent, and its key agility is
  301. good. Rijndael's very low memory requirements make it very well
  302. suited for restricted-space environments, in which it also
  303. demonstrates excellent performance. Rijndael's operations are
  304. among the easiest to defend against power and timing attacks.
  305. The AES specifies three key sizes: 128, 192 and 256 bits
  306. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  307. config ADK_KPACKAGE_KMOD_CRYPTO_AES_586
  308. prompt "kmod-crypto-aes-i586................. AES cipher algorithms (i586)"
  309. tristate
  310. depends on ADK_x86
  311. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  312. default n
  313. help
  314. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  315. algorithm.
  316. Rijndael appears to be consistently a very good performer in
  317. both hardware and software across a wide range of computing
  318. environments regardless of its use in feedback or non-feedback
  319. modes. Its key setup time is excellent, and its key agility is
  320. good. Rijndael's very low memory requirements make it very well
  321. suited for restricted-space environments, in which it also
  322. demonstrates excellent performance. Rijndael's operations are
  323. among the easiest to defend against power and timing attacks.
  324. The AES specifies three key sizes: 128, 192 and 256 bits
  325. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  326. config ADK_KPACKAGE_KMOD_CRYPTO_ANUBIS
  327. prompt "kmod-crypto-anubis................... Anubis cipher algorithm"
  328. tristate
  329. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  330. default n
  331. help
  332. Anubis cipher algorithm.
  333. Anubis is a variable key length cipher which can use keys from
  334. 128 bits to 320 bits in length. It was evaluated as a entrant
  335. in the NESSIE competition.
  336. See also:
  337. <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/>
  338. <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html>
  339. config ADK_KPACKAGE_KMOD_CRYPTO_ARC4
  340. prompt "kmod-crypto-arc4..................... ARC4 cipher algorithm"
  341. tristate
  342. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  343. default n
  344. help
  345. ARC4 cipher algorithm.
  346. ARC4 is a stream cipher using keys ranging from 8 bits to 2048
  347. bits in length. This algorithm is required for driver-based
  348. WEP, but it should not be for other purposes because of the
  349. weakness of the algorithm.
  350. config ADK_KPACKAGE_KMOD_CRYPTO_BLOWFISH
  351. prompt "kmod-crypto-blowfish................. Blowfish cipher algorithm"
  352. tristate
  353. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  354. default n
  355. help
  356. Blowfish cipher algorithm, by Bruce Schneier.
  357. This is a variable key length cipher which can use keys from 32
  358. bits to 448 bits in length. It's fast, simple and specifically
  359. designed for use on "large microprocessors".
  360. See also:
  361. <http://www.schneier.com/blowfish.html>
  362. config ADK_KPACKAGE_KMOD_CRYPTO_CAMELLIA
  363. prompt "kmod-crypto-camellia................. Camellia cipher algorithms"
  364. tristate
  365. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  366. default n
  367. help
  368. Camellia cipher algorithms module.
  369. Camellia is a symmetric key block cipher developed jointly
  370. at NTT and Mitsubishi Electric Corporation.
  371. The Camellia specifies three key sizes: 128, 192 and 256 bits.
  372. See also:
  373. <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
  374. config ADK_KPACKAGE_KMOD_CRYPTO_CAST5
  375. prompt "kmod-crypto-cast5.................... CAST5 (CAST-128) cipher algorithm"
  376. tristate
  377. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  378. default n
  379. help
  380. The CAST5 encryption algorithm (synonymous with CAST-128) is
  381. described in RFC2144.
  382. config ADK_KPACKAGE_KMOD_CRYPTO_CAST6
  383. prompt "kmod-crypto-cast6.................... CAST6 (CATS-256) cipher algorithm"
  384. tristate
  385. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  386. default n
  387. help
  388. The CAST6 encryption algorithm (synonymous with CAST-256) is
  389. described in RFC2612.
  390. config ADK_KPACKAGE_KMOD_CRYPTO_DES
  391. prompt "kmod-crypto-des...................... DES and Triple DES EDE cipher algorithms"
  392. tristate
  393. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  394. default n
  395. help
  396. DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
  397. config ADK_KPACKAGE_KMOD_CRYPTO_FCRYPT
  398. prompt "kmod-crypto-fcrypt................... FCrypt cipher algorithms"
  399. tristate
  400. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  401. default n
  402. help
  403. FCrypt algorithm used by RxRPC.
  404. config ADK_KPACKAGE_KMOD_CRYPTO_KHAZAD
  405. prompt "kmod-crypto-khazad................... Khazad cipher algorithm"
  406. tristate
  407. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  408. default n
  409. help
  410. Khazad cipher algorithm.
  411. Khazad was a finalist in the initial NESSIE competition. It is
  412. an algorithm optimized for 64-bit processors with good performance
  413. on 32-bit processors. Khazad uses an 128 bit key size.
  414. See also:
  415. <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html>
  416. config ADK_KPACKAGE_KMOD_CRYPTO_SERPENT
  417. prompt "kmod-crypto-serpent.................. Serpent cipher algorithm"
  418. tristate
  419. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  420. default n
  421. help
  422. Serpent cipher algorithm, by Anderson, Biham & Knudsen.
  423. Keys are allowed to be from 0 to 256 bits in length, in steps
  424. of 8 bits. Also includes the 'Tnepres' algorithm, a reversed
  425. variant of Serpent for compatibility with old kerneli code.
  426. See also:
  427. <http://www.cl.cam.ac.uk/~rja14/serpent.html>
  428. config ADK_KPACKAGE_KMOD_CRYPTO_TEA
  429. prompt "kmod-crypto-tea...................... TEA, XTEA and XETA cipher algorithms"
  430. tristate
  431. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  432. default n
  433. help
  434. TEA cipher algorithm.
  435. Tiny Encryption Algorithm is a simple cipher that uses
  436. many rounds for security. It is very fast and uses
  437. little memory.
  438. Xtendend Tiny Encryption Algorithm is a modification to
  439. the TEA algorithm to address a potential key weakness
  440. in the TEA algorithm.
  441. Xtendend Encryption Tiny Algorithm is a mis-implementation
  442. of the XTEA algorithm for compatibility purposes.
  443. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH
  444. prompt "kmod-crypto-twofish.................. Twofish cipher algorithm"
  445. tristate
  446. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  447. default n
  448. help
  449. Twofish cipher algorithm.
  450. Twofish was submitted as an AES (Advanced Encryption Standard)
  451. candidate cipher by researchers at CounterPane Systems. It is a
  452. 16 round block cipher supporting key sizes of 128, 192, and 256
  453. bits.
  454. See also:
  455. <http://www.schneier.com/twofish.html>
  456. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH_586
  457. prompt "kmod-crypto-twofish-586.............. Twofish cipher algorithm (i586)"
  458. tristate
  459. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  460. depends on ADK_x86
  461. default n
  462. help
  463. Twofish cipher algorithm.
  464. Twofish was submitted as an AES (Advanced Encryption Standard)
  465. candidate cipher by researchers at CounterPane Systems. It is a
  466. 16 round block cipher supporting key sizes of 128, 192, and 256
  467. bits.
  468. See also:
  469. <http://www.schneier.com/twofish.html>
  470. config ADK_KPACKAGE_KMOD_CRYPTO_NULL
  471. prompt "kmod-crypto-null..................... Null algorithms"
  472. tristate
  473. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  474. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  475. default n
  476. help
  477. These are 'Null' algorithms, used by IPsec, which do nothing.
  478. endmenu
  479. menu "Compression"
  480. config ADK_KPACKAGE_KMOD_CRYPTO_DEFLATE
  481. prompt "kmod-crypto-deflate.................. Deflate compression algorithm"
  482. tristate
  483. select ADK_KERNEL_CRYPTO
  484. default n
  485. help
  486. This is the Deflate algorithm (RFC1951), specified for use in
  487. IPSec with the IPCOMP protocol (RFC3173, RFC2394).
  488. You will most probably want this if using IPSec.
  489. config ADK_KPACKAGE_KMOD_CRYPTO_LZO
  490. prompt "kmod-crypto-lzo...................... LZO compression algorithm"
  491. tristate
  492. select ADK_KERNEL_CRYPTO
  493. default n
  494. help
  495. config ADK_KPACKAGE_KMOD_CRYPTO_MICHAEL_MIC
  496. prompt "kmod-crypto-michael-mic.............. Michael MIC keyed digest algorithm"
  497. tristate
  498. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  499. default n
  500. help
  501. Michael MIC is used for message integrity protection in TKIP
  502. (IEEE 802.11i). This algorithm is required for TKIP, but it
  503. should not be used for other purposes because of the weakness
  504. of the algorithm.
  505. config ADK_KPACKAGE_KMOD_CRYPTO_CRC32C
  506. prompt "kmod-crypto-crc32c................... CRC32c CRC algorithm"
  507. tristate
  508. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  509. select ADK_KPACKAGE_KMOD_LIBCRC32C
  510. default n
  511. help
  512. Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used
  513. by iSCSI for header and data digests and by others.
  514. See Castagnoli93. This implementation uses lib/libcrc32c.
  515. Module will be crc32c.
  516. endmenu
  517. endmenu