comparison options.h @ 554:1d5a3df28b53

Disable Blowfish by default, it has inefficient key memory use
author Matt Johnston <matt@ucc.asn.au>
date Fri, 24 Jul 2009 13:49:07 +0000
parents 1037aabf701b
children daf52f813328
comparison
equal deleted inserted replaced
553:8711f20b89ab 554:1d5a3df28b53
84 * Including multiple keysize variants the same cipher 84 * Including multiple keysize variants the same cipher
85 * (eg AES256 as well as AES128) will result in a minimal size increase.*/ 85 * (eg AES256 as well as AES128) will result in a minimal size increase.*/
86 #define DROPBEAR_AES128 86 #define DROPBEAR_AES128
87 #define DROPBEAR_3DES 87 #define DROPBEAR_3DES
88 #define DROPBEAR_AES256 88 #define DROPBEAR_AES256
89 #define DROPBEAR_BLOWFISH 89 /* Compiling in Blowfish will add ~6kB to runtime heap memory usage */
90 /*#define DROPBEAR_BLOWFISH*/
90 #define DROPBEAR_TWOFISH256 91 #define DROPBEAR_TWOFISH256
91 #define DROPBEAR_TWOFISH128 92 #define DROPBEAR_TWOFISH128
92 93
93 /* Enable "Counter Mode" for ciphers. This is more secure than normal 94 /* Enable "Counter Mode" for ciphers. This is more secure than normal
94 * CBC mode against certain attacks. This adds around 1kB to binary 95 * CBC mode against certain attacks. This adds around 1kB to binary