Mercurial > dropbear
comparison options.h @ 988:6c0fb5428aaa
Enable sha2 HMACs by default, they're required for ecdsa already
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Tue, 13 Jan 2015 20:55:04 +0800 |
parents | dccaecc68c77 |
children | 73ea0dce9a57 731f624af902 |
comparison
equal
deleted
inserted
replaced
987:ed85797bbc85 | 988:6c0fb5428aaa |
---|---|
121 * These hashes are also used for public key fingerprints in logs. | 121 * These hashes are also used for public key fingerprints in logs. |
122 * If you disable MD5, Dropbear will fall back to SHA1 fingerprints, | 122 * If you disable MD5, Dropbear will fall back to SHA1 fingerprints, |
123 * which are not the standard form. */ | 123 * which are not the standard form. */ |
124 #define DROPBEAR_SHA1_HMAC | 124 #define DROPBEAR_SHA1_HMAC |
125 #define DROPBEAR_SHA1_96_HMAC | 125 #define DROPBEAR_SHA1_96_HMAC |
126 /*#define DROPBEAR_SHA2_256_HMAC*/ | 126 #define DROPBEAR_SHA2_256_HMAC |
127 /*#define DROPBEAR_SHA2_512_HMAC*/ | 127 #define DROPBEAR_SHA2_512_HMAC |
128 #define DROPBEAR_MD5_HMAC | 128 #define DROPBEAR_MD5_HMAC |
129 | 129 |
130 /* You can also disable integrity. Don't bother disabling this if you're | 130 /* You can also disable integrity. Don't bother disabling this if you're |
131 * still using a cipher, it's relatively cheap. If you disable this it's dead | 131 * still using a cipher, it's relatively cheap. If you disable this it's dead |
132 * simple for an attacker to run arbitrary commands on the remote host. Beware. */ | 132 * simple for an attacker to run arbitrary commands on the remote host. Beware. */ |