Config.in.crypto 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595
  1. menu "Crypto kernel modules"
  2. config ADK_KERNEL_CRYPTO
  3. tristate
  4. config ADK_KERNEL_CRYPTO_HW
  5. tristate
  6. config ADK_KERNEL_CRYPTO_AES
  7. boolean
  8. config ADK_KERNEL_CRYPTO_SHA256
  9. boolean
  10. config ADK_KERNEL_CRYPTO_CBC
  11. boolean
  12. comment "Hardware cryptography"
  13. menu "Hardware crypto devices"
  14. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_GEODE
  15. prompt "kmod-crypto-dev-geode.................. Support for the Geode LX/GX AES engine"
  16. tristate
  17. select ADK_KERNEL_CRYPTO
  18. select ADK_KERNEL_CRYPTO_HW
  19. select ADK_KPACKAGE_KMOD_CRYPTO_ECB
  20. select ADK_KPACKAGE_KMOD_CRYPTO_CBC
  21. depends on ADK_TARGET_WITH_GEODE_CRYPTO
  22. default y if ADK_TARGET_WITH_GEODE_CRYPTO
  23. default n
  24. help
  25. Say 'Y' here to use the AMD Geode LX processor on-board AES
  26. engine for the CryptoAPI AES algorithm.
  27. config ADK_KPACKAGE_KMOD_CRYPTO_DEV_HIFN_795X
  28. prompt "kmod-crypto-dev-hifn-795x.............. Driver for HIFN 795x crypto accelerator chips"
  29. tristate
  30. select ADK_KERNEL_CRYPTO
  31. select ADK_KERNEL_CRYPTO_HW
  32. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  33. select ADK_KPACKAGE_KMOD_CRYPTO_DES
  34. depends on ADK_TARGET_WITH_PCI || ADK_TARGET_WITH_MINIPCI
  35. default n
  36. help
  37. This option allows you to have support for HIFN 795x crypto adapters.
  38. endmenu
  39. comment "Software cryptography"
  40. menu "Crypto core / Block and Hash modes"
  41. config ADK_KERNEL_MOD_CRYPTO_PCOMP
  42. tristate
  43. config ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  44. tristate
  45. select ADK_KERNEL_CRYPTO
  46. select ADK_KERNEL_MOD_CRYPTO_PCOMP
  47. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  48. default n
  49. help
  50. config ADK_KERNEL_MOD_CRYPTO_ALGAPI
  51. tristate
  52. config ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  53. tristate
  54. select ADK_KERNEL_CRYPTO
  55. select ADK_KERNEL_MOD_CRYPTO_ALGAPI
  56. default n
  57. help
  58. config ADK_KERNEL_MOD_CRYPTO_AEAD
  59. tristate
  60. config ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  61. tristate
  62. select ADK_KERNEL_CRYPTO
  63. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  64. select ADK_KERNEL_MOD_CRYPTO_AEAD
  65. default n
  66. help
  67. config ADK_KERNEL_MOD_CRYPTO_HASH
  68. tristate
  69. config ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  70. tristate
  71. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  72. select ADK_KERNEL_MOD_CRYPTO_HASH
  73. default n
  74. help
  75. config ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  76. tristate
  77. config ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  78. tristate
  79. select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  80. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  81. select ADK_KERNEL_MOD_CRYPTO_BLKCIPHER
  82. default n
  83. help
  84. config ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  85. tristate
  86. config ADK_KERNEL_MOD_CRYPTO_MANAGER
  87. tristate
  88. config ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  89. prompt "kmod-crypto-manager2................. Crypto algorithm manager"
  90. tristate
  91. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  92. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  93. select ADK_KPACKAGE_KMOD_CRYPTO_AEAD2
  94. select ADK_KPACKAGE_KMOD_CRYPTO_PCOMP2
  95. select ADK_KERNEL_MOD_CRYPTO_MANAGER
  96. select ADK_KERNEL_MOD_CRYPTO_WORKQUEUE
  97. default n
  98. help
  99. config ADK_KPACKAGE_KMOD_CRYPTO_AUTHENC
  100. prompt "kmod-crypto-authenc.................. AuthENC (IPsec)"
  101. tristate
  102. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  103. default n
  104. help
  105. config ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  106. prompt "kmod-crypto-seqiv.................... Sequence Number IV Generator"
  107. tristate
  108. select ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  109. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  110. help
  111. This IV generator generates an IV based on a sequence number by
  112. xoring it with a salt. This algorithm is mainly useful for CTR
  113. config ADK_KPACKAGE_KMOD_CRYPTO_CTS
  114. prompt "kmod-crypto-cts...................... CTS support"
  115. tristate
  116. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  117. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  118. default n
  119. help
  120. CTS: Cipher Text Stealing
  121. This is the Cipher Text Stealing mode as described by
  122. Section 8 of rfc2040 and referenced by rfc3962.
  123. (rfc3962 includes errata information in its Appendix A)
  124. This mode is required for Kerberos gss mechanism support
  125. for AES encryption.
  126. config ADK_KPACKAGE_KMOD_CRYPTO_CBC
  127. prompt "kmod-crypto-cbc...................... CBC support"
  128. tristate
  129. depends on !ADK_KERNEL_CRYPTO_CBC
  130. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  131. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  132. default n
  133. help
  134. CBC: Cipher Block Chaining mode
  135. This block cipher algorithm is required for IPSec.
  136. config ADK_KPACKAGE_KMOD_CRYPTO_CCM
  137. prompt "kmod-crypto-ccm...................... CCM support"
  138. tristate
  139. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  140. select ADK_KPACKAGE_KMOD_CRYPTO_CTR
  141. default n
  142. help
  143. Support for Counter with CBC MAC. Required for IPsec.
  144. config ADK_KPACKAGE_KMOD_CRYPTO_CTR
  145. prompt "kmod-crypto-ctr...................... CTR support"
  146. tristate
  147. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  148. select ADK_KPACKAGE_KMOD_CRYPTO_SEQIV
  149. default n
  150. help
  151. CTR: Counter mode
  152. This block cipher algorithm is required for IPSec.
  153. config ADK_KPACKAGE_KMOD_CRYPTO_ECB
  154. prompt "kmod-crypto-ecb...................... ECB support"
  155. tristate
  156. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  157. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  158. default n
  159. help
  160. ECB: Electronic CodeBook mode
  161. This is the simplest block cipher algorithm. It simply encrypts
  162. the input block by block.
  163. config ADK_KPACKAGE_KMOD_CRYPTO_HMAC
  164. prompt "kmod-crypto-hmac..................... HMAC support"
  165. tristate
  166. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  167. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  168. default n
  169. help
  170. HMAC: Keyed-Hashing for Message Authentication (RFC2104).
  171. This is required for IPSec.
  172. config ADK_KPACKAGE_KMOD_CRYPTO_XCBC
  173. prompt "kmod-crypto-xcbc..................... XCBC support"
  174. tristate
  175. default n
  176. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  177. select ADK_KPACKAGE_KMOD_CRYPTO_MANAGER2
  178. help
  179. XCBC: Keyed-Hashing with encryption algorithm
  180. config ADK_KERNEL_MOD_CRYPTO_RNG
  181. tristate
  182. config ADK_KPACKAGE_KMOD_CRYPTO_RNG2
  183. prompt "kmod-crypto-rng2..................... RNG support"
  184. tristate
  185. select ADK_KERNEL_MOD_CRYPTO_RNG
  186. default n
  187. help
  188. Random number generator
  189. endmenu
  190. menu "Digest algorithms"
  191. config ADK_KPACKAGE_KMOD_CRYPTO_MD4
  192. prompt "kmod-crypto-md4...................... MD4 digest algorithm"
  193. tristate
  194. default n
  195. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  196. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  197. help
  198. MD4 message digest algorithm (RFC1320).
  199. config ADK_KPACKAGE_KMOD_CRYPTO_MD5
  200. prompt "kmod-crypto-md5...................... MD5 digest algorithm"
  201. tristate
  202. default n
  203. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  204. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  205. help
  206. MD5 message digest algorithm (RFC1321).
  207. config ADK_KPACKAGE_KMOD_CRYPTO_SHA1
  208. prompt "kmod-crypto-sha1..................... SHA1 digest algorithm"
  209. tristate
  210. default n
  211. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  212. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  213. help
  214. SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
  215. config ADK_KPACKAGE_KMOD_CRYPTO_SHA256
  216. prompt "kmod-crypto-sha256................... SHA256 digest algorithm"
  217. tristate
  218. default n
  219. depends on !ADK_KERNEL_CRYPTO_SHA256
  220. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  221. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  222. help
  223. SHA256 secure hash standard (DFIPS 180-2).
  224. This version of SHA implements a 256 bit hash with 128 bits of
  225. security against collision attacks.
  226. config ADK_KPACKAGE_KMOD_CRYPTO_SHA512
  227. prompt "kmod-crypto-sha512................... SHA512 digest algorithm"
  228. tristate
  229. default n
  230. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  231. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  232. help
  233. SHA512 secure hash standard (DFIPS 180-2).
  234. This version of SHA implements a 512 bit hash with 256 bits of
  235. security against collision attacks.
  236. This code also includes SHA-384, a 384 bit hash with 192 bits
  237. of security against collision attacks.
  238. config ADK_KPACKAGE_KMOD_CRYPTO_WP512
  239. prompt "kmod-crypto-whirlpool................ Whirlpool digest algorithms"
  240. tristate
  241. default n
  242. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  243. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  244. help
  245. Whirlpool hash algorithm 512, 384 and 256-bit hashes
  246. Whirlpool-512 is part of the NESSIE cryptographic primitives.
  247. Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
  248. See also:
  249. <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html>
  250. config ADK_KPACKAGE_KMOD_CRYPTO_TGR192
  251. prompt "kmod-crypto-tiger.................... Tiger digest algorithms"
  252. tristate
  253. default n
  254. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  255. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  256. help
  257. Tiger hash algorithm 192, 160 and 128-bit hashes
  258. Tiger is a hash function optimized for 64-bit processors while
  259. still having decent performance on 32-bit processors.
  260. Tiger was developed by Ross Anderson and Eli Biham.
  261. See also:
  262. <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>.
  263. endmenu
  264. menu "Cipher algoritms"
  265. config ADK_KPACKAGE_KMOD_CRYPTO_AES
  266. prompt "kmod-crypto-aes...................... AES cipher algorithms"
  267. tristate
  268. depends on !ADK_KERNEL_CRYPTO_AES
  269. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  270. default n
  271. help
  272. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  273. algorithm.
  274. Rijndael appears to be consistently a very good performer in
  275. both hardware and software across a wide range of computing
  276. environments regardless of its use in feedback or non-feedback
  277. modes. Its key setup time is excellent, and its key agility is
  278. good. Rijndael's very low memory requirements make it very well
  279. suited for restricted-space environments, in which it also
  280. demonstrates excellent performance. Rijndael's operations are
  281. among the easiest to defend against power and timing attacks.
  282. The AES specifies three key sizes: 128, 192 and 256 bits
  283. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  284. config ADK_KPACKAGE_KMOD_CRYPTO_AES_586
  285. prompt "kmod-crypto-aes-i586................. AES cipher algorithms (i586)"
  286. tristate
  287. depends on ADK_x86
  288. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  289. default n
  290. help
  291. AES cipher algorithms (FIPS-197). AES uses the Rijndael
  292. algorithm.
  293. Rijndael appears to be consistently a very good performer in
  294. both hardware and software across a wide range of computing
  295. environments regardless of its use in feedback or non-feedback
  296. modes. Its key setup time is excellent, and its key agility is
  297. good. Rijndael's very low memory requirements make it very well
  298. suited for restricted-space environments, in which it also
  299. demonstrates excellent performance. Rijndael's operations are
  300. among the easiest to defend against power and timing attacks.
  301. The AES specifies three key sizes: 128, 192 and 256 bits
  302. See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
  303. config ADK_KPACKAGE_KMOD_CRYPTO_ANUBIS
  304. prompt "kmod-crypto-anubis................... Anubis cipher algorithm"
  305. tristate
  306. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  307. default n
  308. help
  309. Anubis cipher algorithm.
  310. Anubis is a variable key length cipher which can use keys from
  311. 128 bits to 320 bits in length. It was evaluated as a entrant
  312. in the NESSIE competition.
  313. See also:
  314. <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/>
  315. <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html>
  316. config ADK_KPACKAGE_KMOD_CRYPTO_ARC4
  317. prompt "kmod-crypto-arc4..................... ARC4 cipher algorithm"
  318. tristate
  319. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  320. default n
  321. help
  322. ARC4 cipher algorithm.
  323. ARC4 is a stream cipher using keys ranging from 8 bits to 2048
  324. bits in length. This algorithm is required for driver-based
  325. WEP, but it should not be for other purposes because of the
  326. weakness of the algorithm.
  327. config ADK_KPACKAGE_KMOD_CRYPTO_BLOWFISH
  328. prompt "kmod-crypto-blowfish................. Blowfish cipher algorithm"
  329. tristate
  330. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  331. default n
  332. help
  333. Blowfish cipher algorithm, by Bruce Schneier.
  334. This is a variable key length cipher which can use keys from 32
  335. bits to 448 bits in length. It's fast, simple and specifically
  336. designed for use on "large microprocessors".
  337. See also:
  338. <http://www.schneier.com/blowfish.html>
  339. config ADK_KPACKAGE_KMOD_CRYPTO_CAMELLIA
  340. prompt "kmod-crypto-camellia................. Camellia cipher algorithms"
  341. tristate
  342. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  343. default n
  344. help
  345. Camellia cipher algorithms module.
  346. Camellia is a symmetric key block cipher developed jointly
  347. at NTT and Mitsubishi Electric Corporation.
  348. The Camellia specifies three key sizes: 128, 192 and 256 bits.
  349. See also:
  350. <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
  351. config ADK_KPACKAGE_KMOD_CRYPTO_CAST5
  352. prompt "kmod-crypto-cast5.................... CAST5 (CAST-128) cipher algorithm"
  353. tristate
  354. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  355. default n
  356. help
  357. The CAST5 encryption algorithm (synonymous with CAST-128) is
  358. described in RFC2144.
  359. config ADK_KPACKAGE_KMOD_CRYPTO_CAST6
  360. prompt "kmod-crypto-cast6.................... CAST6 (CATS-256) cipher algorithm"
  361. tristate
  362. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  363. default n
  364. help
  365. The CAST6 encryption algorithm (synonymous with CAST-256) is
  366. described in RFC2612.
  367. config ADK_KPACKAGE_KMOD_CRYPTO_DES
  368. prompt "kmod-crypto-des...................... DES and Triple DES EDE cipher algorithms"
  369. tristate
  370. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  371. default n
  372. help
  373. DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
  374. config ADK_KPACKAGE_KMOD_CRYPTO_FCRYPT
  375. prompt "kmod-crypto-fcrypt................... FCrypt cipher algorithms"
  376. tristate
  377. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  378. default n
  379. help
  380. FCrypt algorithm used by RxRPC.
  381. config ADK_KPACKAGE_KMOD_CRYPTO_KHAZAD
  382. prompt "kmod-crypto-khazad................... Khazad cipher algorithm"
  383. tristate
  384. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  385. default n
  386. help
  387. Khazad cipher algorithm.
  388. Khazad was a finalist in the initial NESSIE competition. It is
  389. an algorithm optimized for 64-bit processors with good performance
  390. on 32-bit processors. Khazad uses an 128 bit key size.
  391. See also:
  392. <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html>
  393. config ADK_KPACKAGE_KMOD_CRYPTO_SERPENT
  394. prompt "kmod-crypto-serpent.................. Serpent cipher algorithm"
  395. tristate
  396. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  397. default n
  398. help
  399. Serpent cipher algorithm, by Anderson, Biham & Knudsen.
  400. Keys are allowed to be from 0 to 256 bits in length, in steps
  401. of 8 bits. Also includes the 'Tnepres' algorithm, a reversed
  402. variant of Serpent for compatibility with old kerneli code.
  403. See also:
  404. <http://www.cl.cam.ac.uk/~rja14/serpent.html>
  405. config ADK_KPACKAGE_KMOD_CRYPTO_TEA
  406. prompt "kmod-crypto-tea...................... TEA, XTEA and XETA cipher algorithms"
  407. tristate
  408. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  409. default n
  410. help
  411. TEA cipher algorithm.
  412. Tiny Encryption Algorithm is a simple cipher that uses
  413. many rounds for security. It is very fast and uses
  414. little memory.
  415. Xtendend Tiny Encryption Algorithm is a modification to
  416. the TEA algorithm to address a potential key weakness
  417. in the TEA algorithm.
  418. Xtendend Encryption Tiny Algorithm is a mis-implementation
  419. of the XTEA algorithm for compatibility purposes.
  420. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH
  421. prompt "kmod-crypto-twofish.................. Twofish cipher algorithm"
  422. tristate
  423. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  424. default n
  425. help
  426. Twofish cipher algorithm.
  427. Twofish was submitted as an AES (Advanced Encryption Standard)
  428. candidate cipher by researchers at CounterPane Systems. It is a
  429. 16 round block cipher supporting key sizes of 128, 192, and 256
  430. bits.
  431. See also:
  432. <http://www.schneier.com/twofish.html>
  433. config ADK_KPACKAGE_KMOD_CRYPTO_TWOFISH_586
  434. prompt "kmod-crypto-twofish-586.............. Twofish cipher algorithm (i586)"
  435. tristate
  436. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  437. depends on ADK_x86
  438. default n
  439. help
  440. Twofish cipher algorithm.
  441. Twofish was submitted as an AES (Advanced Encryption Standard)
  442. candidate cipher by researchers at CounterPane Systems. It is a
  443. 16 round block cipher supporting key sizes of 128, 192, and 256
  444. bits.
  445. See also:
  446. <http://www.schneier.com/twofish.html>
  447. config ADK_KPACKAGE_KMOD_CRYPTO_NULL
  448. prompt "kmod-crypto-null..................... Null algorithms"
  449. tristate
  450. select ADK_KPACKAGE_KMOD_CRYPTO_BLKCIPHER2
  451. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  452. default n
  453. help
  454. These are 'Null' algorithms, used by IPsec, which do nothing.
  455. endmenu
  456. menu "Compression"
  457. config ADK_KPACKAGE_KMOD_CRYPTO_DEFLATE
  458. prompt "kmod-crypto-deflate.................. Deflate compression algorithm"
  459. tristate
  460. select ADK_KERNEL_CRYPTO
  461. default n
  462. help
  463. This is the Deflate algorithm (RFC1951), specified for use in
  464. IPSec with the IPCOMP protocol (RFC3173, RFC2394).
  465. You will most probably want this if using IPSec.
  466. config ADK_KPACKAGE_KMOD_CRYPTO_LZO
  467. prompt "kmod-crypto-lzo...................... LZO compression algorithm"
  468. tristate
  469. select ADK_KERNEL_CRYPTO
  470. default n
  471. help
  472. config ADK_KPACKAGE_KMOD_CRYPTO_MICHAEL_MIC
  473. prompt "kmod-crypto-michael-mic.............. Michael MIC keyed digest algorithm"
  474. tristate
  475. select ADK_KPACKAGE_KMOD_CRYPTO_ALGAPI2
  476. default n
  477. help
  478. Michael MIC is used for message integrity protection in TKIP
  479. (IEEE 802.11i). This algorithm is required for TKIP, but it
  480. should not be used for other purposes because of the weakness
  481. of the algorithm.
  482. config ADK_KPACKAGE_KMOD_CRYPTO_CRC32C
  483. prompt "kmod-crypto-crc32c................... CRC32c CRC algorithm"
  484. tristate
  485. select ADK_KPACKAGE_KMOD_CRYPTO_HASH2
  486. select ADK_KPACKAGE_KMOD_LIBCRC32C
  487. default n
  488. help
  489. Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used
  490. by iSCSI for header and data digests and by others.
  491. See Castagnoli93. This implementation uses lib/libcrc32c.
  492. Module will be crc32c.
  493. endmenu
  494. endmenu