comparison options.h @ 850:7507b174bba0 ecc

- Make curve25519 work after fixing a typo, interoperates with OpenSSH - comment on ecc binary size effects
author Matt Johnston <matt@ucc.asn.au>
date Sat, 09 Nov 2013 00:02:26 +0800
parents 754d7bee1068
children c1c1b43f78c2
comparison
equal deleted inserted replaced
849:754d7bee1068 850:7507b174bba0
136 * for hostkey as well as for verifying signatures with pubkey auth. 136 * for hostkey as well as for verifying signatures with pubkey auth.
137 * Removing either of these won't save very much space. 137 * Removing either of these won't save very much space.
138 * SSH2 RFC Draft requires dss, recommends rsa */ 138 * SSH2 RFC Draft requires dss, recommends rsa */
139 #define DROPBEAR_RSA 139 #define DROPBEAR_RSA
140 #define DROPBEAR_DSS 140 #define DROPBEAR_DSS
141 /* ECDSA is significantly faster than RSA or DSS. Compiling in ECC
142 * code (either ECDSA or ECDH) increases binary size - around 30kB
143 * on x86-64 */
141 #define DROPBEAR_ECDSA 144 #define DROPBEAR_ECDSA
142 145
143 /* Generate hostkeys as-needed when the first connection using that key type occurs. 146 /* Generate hostkeys as-needed when the first connection using that key type occurs.
144 This avoids the need to otherwise run "dropbearkey" and avoids some problems 147 This avoids the need to otherwise run "dropbearkey" and avoids some problems
145 with badly seeded random devices when systems first boot. 148 with badly seeded /dev/urandom when systems first boot.
146 This also requires a runtime flag "-R". */ 149 This also requires a runtime flag "-R". */
147 #define DROPBEAR_DELAY_HOSTKEY 150 #define DROPBEAR_DELAY_HOSTKEY
148 151
152 /* Enable Curve25519 for key exchange. This is another elliptic
153 * curve method with good security properties. Increases binary size
154 * by ~10kB on x86-64 */
149 #define DROPBEAR_CURVE25519 155 #define DROPBEAR_CURVE25519
150 156
151 /* RSA can be vulnerable to timing attacks which use the time required for 157 /* Enable elliptic curve Diffie Hellman key exchange, see note about
152 * signing to guess the private key. Blinding avoids this attack, though makes 158 * ECDSA above */
153 * signing operations slightly slower. */
154 #define RSA_BLINDING
155
156 /* Enable elliptic curve Diffie Hellman key exchange */
157 #define DROPBEAR_ECDH 159 #define DROPBEAR_ECDH
158 160
159 /* Control the memory/performance/compression tradeoff for zlib. 161 /* Control the memory/performance/compression tradeoff for zlib.
160 * Set windowBits=8 for least memory usage, see your system's 162 * Set windowBits=8 for least memory usage, see your system's
161 * zlib.h for full details. 163 * zlib.h for full details.