^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) # SPDX-License-Identifier: GPL-2.0-only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) config ECRYPT_FS
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) tristate "eCrypt filesystem layer support"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) depends on KEYS && CRYPTO && (ENCRYPTED_KEYS || ENCRYPTED_KEYS=n)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) select CRYPTO_ECB
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) select CRYPTO_CBC
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) select CRYPTO_MD5
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) help
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) Encrypted filesystem that operates on the VFS layer. See
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) <file:Documentation/filesystems/ecryptfs.rst> to learn more about
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) eCryptfs. Userspace components are required and can be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) obtained from <http://ecryptfs.sf.net>.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) To compile this file system support as a module, choose M here: the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) module will be called ecryptfs.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) config ECRYPT_FS_MESSAGING
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) bool "Enable notifications for userspace key wrap/unwrap"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) depends on ECRYPT_FS
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) help
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) Enables the /dev/ecryptfs entry for use by ecryptfsd. This allows
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) for userspace to wrap/unwrap file encryption keys by other
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) backends, like OpenSSL.