Merge remote-tracking branch 'selinux/next'
[deliverable/linux.git] / crypto / asymmetric_keys / Kconfig
1 menuconfig ASYMMETRIC_KEY_TYPE
2 bool "Asymmetric (public-key cryptographic) key type"
3 depends on KEYS
4 help
5 This option provides support for a key type that holds the data for
6 the asymmetric keys used for public key cryptographic operations such
7 as encryption, decryption, signature generation and signature
8 verification.
9
10 if ASYMMETRIC_KEY_TYPE
11
12 config ASYMMETRIC_PUBLIC_KEY_SUBTYPE
13 tristate "Asymmetric public-key crypto algorithm subtype"
14 select MPILIB
15 select CRYPTO_HASH_INFO
16 select CRYPTO_AKCIPHER
17 help
18 This option provides support for asymmetric public key type handling.
19 If signature generation and/or verification are to be used,
20 appropriate hash algorithms (such as SHA-1) must be available.
21 ENOPKG will be reported if the requisite algorithm is unavailable.
22
23 config X509_CERTIFICATE_PARSER
24 tristate "X.509 certificate parser"
25 depends on ASYMMETRIC_PUBLIC_KEY_SUBTYPE
26 select ASN1
27 select OID_REGISTRY
28 help
29 This option provides support for parsing X.509 format blobs for key
30 data and provides the ability to instantiate a crypto key from a
31 public key packet found inside the certificate.
32
33 config PKCS8_PRIVATE_KEY_PARSER
34 tristate "PKCS#8 private key parser"
35 depends on ASYMMETRIC_PUBLIC_KEY_SUBTYPE
36 select ASN1
37 select OID_REGISTRY
38 help
39 This option provides support for parsing PKCS#8 format blobs for
40 private key data and provides the ability to instantiate a crypto key
41 from that data.
42
43 config PKCS7_MESSAGE_PARSER
44 tristate "PKCS#7 message parser"
45 depends on X509_CERTIFICATE_PARSER
46 select ASN1
47 select OID_REGISTRY
48 help
49 This option provides support for parsing PKCS#7 format messages for
50 signature data and provides the ability to verify the signature.
51
52 config PKCS7_TEST_KEY
53 tristate "PKCS#7 testing key type"
54 depends on SYSTEM_DATA_VERIFICATION
55 help
56 This option provides a type of key that can be loaded up from a
57 PKCS#7 message - provided the message is signed by a trusted key. If
58 it is, the PKCS#7 wrapper is discarded and reading the key returns
59 just the payload. If it isn't, adding the key will fail with an
60 error.
61
62 This is intended for testing the PKCS#7 parser.
63
64 config SIGNED_PE_FILE_VERIFICATION
65 bool "Support for PE file signature verification"
66 depends on PKCS7_MESSAGE_PARSER=y
67 depends on SYSTEM_DATA_VERIFICATION
68 select ASN1
69 select OID_REGISTRY
70 help
71 This option provides support for verifying the signature(s) on a
72 signed PE binary.
73
74 endif # ASYMMETRIC_KEY_TYPE
This page took 0.039324 seconds and 5 git commands to generate.