comparison options.h @ 988:6c0fb5428aaa

Enable sha2 HMACs by default, they're required for ecdsa already
author Matt Johnston <matt@ucc.asn.au>
date Tue, 13 Jan 2015 20:55:04 +0800
parents dccaecc68c77
children 73ea0dce9a57 731f624af902
comparison
equal deleted inserted replaced
987:ed85797bbc85 988:6c0fb5428aaa
121 * These hashes are also used for public key fingerprints in logs. 121 * These hashes are also used for public key fingerprints in logs.
122 * If you disable MD5, Dropbear will fall back to SHA1 fingerprints, 122 * If you disable MD5, Dropbear will fall back to SHA1 fingerprints,
123 * which are not the standard form. */ 123 * which are not the standard form. */
124 #define DROPBEAR_SHA1_HMAC 124 #define DROPBEAR_SHA1_HMAC
125 #define DROPBEAR_SHA1_96_HMAC 125 #define DROPBEAR_SHA1_96_HMAC
126 /*#define DROPBEAR_SHA2_256_HMAC*/ 126 #define DROPBEAR_SHA2_256_HMAC
127 /*#define DROPBEAR_SHA2_512_HMAC*/ 127 #define DROPBEAR_SHA2_512_HMAC
128 #define DROPBEAR_MD5_HMAC 128 #define DROPBEAR_MD5_HMAC
129 129
130 /* You can also disable integrity. Don't bother disabling this if you're 130 /* You can also disable integrity. Don't bother disabling this if you're
131 * still using a cipher, it's relatively cheap. If you disable this it's dead 131 * still using a cipher, it's relatively cheap. If you disable this it's dead
132 * simple for an attacker to run arbitrary commands on the remote host. Beware. */ 132 * simple for an attacker to run arbitrary commands on the remote host. Beware. */