Mercurial > dropbear
comparison options.h @ 554:1d5a3df28b53
Disable Blowfish by default, it has inefficient key memory use
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Fri, 24 Jul 2009 13:49:07 +0000 |
parents | 1037aabf701b |
children | daf52f813328 |
comparison
equal
deleted
inserted
replaced
553:8711f20b89ab | 554:1d5a3df28b53 |
---|---|
84 * Including multiple keysize variants the same cipher | 84 * Including multiple keysize variants the same cipher |
85 * (eg AES256 as well as AES128) will result in a minimal size increase.*/ | 85 * (eg AES256 as well as AES128) will result in a minimal size increase.*/ |
86 #define DROPBEAR_AES128 | 86 #define DROPBEAR_AES128 |
87 #define DROPBEAR_3DES | 87 #define DROPBEAR_3DES |
88 #define DROPBEAR_AES256 | 88 #define DROPBEAR_AES256 |
89 #define DROPBEAR_BLOWFISH | 89 /* Compiling in Blowfish will add ~6kB to runtime heap memory usage */ |
90 /*#define DROPBEAR_BLOWFISH*/ | |
90 #define DROPBEAR_TWOFISH256 | 91 #define DROPBEAR_TWOFISH256 |
91 #define DROPBEAR_TWOFISH128 | 92 #define DROPBEAR_TWOFISH128 |
92 | 93 |
93 /* Enable "Counter Mode" for ciphers. This is more secure than normal | 94 /* Enable "Counter Mode" for ciphers. This is more secure than normal |
94 * CBC mode against certain attacks. This adds around 1kB to binary | 95 * CBC mode against certain attacks. This adds around 1kB to binary |