Kconfig 2.1 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. menuconfig ASYMMETRIC_KEY_TYPE
  2. bool "Asymmetric (public-key cryptographic) key type"
  3. depends on KEYS
  4. help
  5. This option provides support for a key type that holds the data for
  6. the asymmetric keys used for public key cryptographic operations such
  7. as encryption, decryption, signature generation and signature
  8. verification.
  9. if ASYMMETRIC_KEY_TYPE
  10. config ASYMMETRIC_PUBLIC_KEY_SUBTYPE
  11. tristate "Asymmetric public-key crypto algorithm subtype"
  12. select MPILIB
  13. select CRYPTO_HASH_INFO
  14. select CRYPTO_AKCIPHER
  15. help
  16. This option provides support for asymmetric public key type handling.
  17. If signature generation and/or verification are to be used,
  18. appropriate hash algorithms (such as SHA-1) must be available.
  19. ENOPKG will be reported if the requisite algorithm is unavailable.
  20. config X509_CERTIFICATE_PARSER
  21. tristate "X.509 certificate parser"
  22. depends on ASYMMETRIC_PUBLIC_KEY_SUBTYPE
  23. select ASN1
  24. select OID_REGISTRY
  25. help
  26. This option provides support for parsing X.509 format blobs for key
  27. data and provides the ability to instantiate a crypto key from a
  28. public key packet found inside the certificate.
  29. config PKCS7_MESSAGE_PARSER
  30. tristate "PKCS#7 message parser"
  31. depends on X509_CERTIFICATE_PARSER
  32. select ASN1
  33. select OID_REGISTRY
  34. help
  35. This option provides support for parsing PKCS#7 format messages for
  36. signature data and provides the ability to verify the signature.
  37. config PKCS7_TEST_KEY
  38. tristate "PKCS#7 testing key type"
  39. depends on SYSTEM_DATA_VERIFICATION
  40. help
  41. This option provides a type of key that can be loaded up from a
  42. PKCS#7 message - provided the message is signed by a trusted key. If
  43. it is, the PKCS#7 wrapper is discarded and reading the key returns
  44. just the payload. If it isn't, adding the key will fail with an
  45. error.
  46. This is intended for testing the PKCS#7 parser.
  47. config SIGNED_PE_FILE_VERIFICATION
  48. bool "Support for PE file signature verification"
  49. depends on PKCS7_MESSAGE_PARSER=y
  50. depends on SYSTEM_DATA_VERIFICATION
  51. select ASN1
  52. select OID_REGISTRY
  53. help
  54. This option provides support for verifying the signature(s) on a
  55. signed PE binary.
  56. endif # ASYMMETRIC_KEY_TYPE