Mercurial > dropbear
comparison options.h @ 670:349fb2dda2dd
Improve comment about sha1-96
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Thu, 12 Apr 2012 21:57:30 +0800 |
parents | d40f3cc47aed |
children | 55b84e59aaad |
comparison
equal
deleted
inserted
replaced
669:a8367733e8cd | 670:349fb2dda2dd |
---|---|
97 * size and is recommended for most cases */ | 97 * size and is recommended for most cases */ |
98 #define DROPBEAR_ENABLE_CTR_MODE | 98 #define DROPBEAR_ENABLE_CTR_MODE |
99 | 99 |
100 /* Message Integrity - at least one required. | 100 /* Message Integrity - at least one required. |
101 * Protocol RFC requires sha1 and recommends sha1-96. | 101 * Protocol RFC requires sha1 and recommends sha1-96. |
102 * sha1-96 may be of use for slow links, as it has a smaller overhead. | 102 * sha1-96 is of use for slow links as it has a smaller overhead. |
103 * | 103 * |
104 * Note: there's no point disabling sha1 to save space, since it's used | 104 * There's no reason to disable sha1 or sha1-96 to save space since it's |
105 * for the random number generator and public-key cryptography anyway. | 105 * used for the random number generator and public-key cryptography anyway. |
106 * Disabling it here will just stop it from being used as the integrity portion | 106 * Disabling it here will just stop it from being used as the integrity portion |
107 * of the ssh protocol. | 107 * of the ssh protocol. |
108 * | 108 * |
109 * These hashes are also used for public key fingerprints in logs. | 109 * These hashes are also used for public key fingerprints in logs. |
110 * If you disable MD5, Dropbear will fall back to SHA1 fingerprints, | 110 * If you disable MD5, Dropbear will fall back to SHA1 fingerprints, |
111 * which are not the standard form. */ | 111 * which are not the standard form. */ |
112 | |
112 #define DROPBEAR_SHA1_HMAC | 113 #define DROPBEAR_SHA1_HMAC |
113 #define DROPBEAR_SHA1_96_HMAC | 114 #define DROPBEAR_SHA1_96_HMAC |
114 #define DROPBEAR_MD5_HMAC | 115 #define DROPBEAR_MD5_HMAC |
115 | 116 |
116 /* Hostkey/public key algorithms - at least one required, these are used | 117 /* Hostkey/public key algorithms - at least one required, these are used |