comparison options.h @ 849:754d7bee1068 ecc

Merge
author Matt Johnston <matt@ucc.asn.au>
date Fri, 08 Nov 2013 23:32:13 +0800
parents 6c69e7df3621 f4bb964c8678
children 7507b174bba0
comparison
equal deleted inserted replaced
848:6c69e7df3621 849:754d7bee1068
6 #define _OPTIONS_H_ 6 #define _OPTIONS_H_
7 7
8 /* Define compile-time options below - the "#ifndef DROPBEAR_XXX .... #endif" 8 /* Define compile-time options below - the "#ifndef DROPBEAR_XXX .... #endif"
9 * parts are to allow for commandline -DDROPBEAR_XXX options etc. */ 9 * parts are to allow for commandline -DDROPBEAR_XXX options etc. */
10 10
11 /* Important: Many options will require "make clean" after changes */ 11 /* IMPORTANT: Many options will require "make clean" after changes */
12 12
13 #ifndef DROPBEAR_DEFPORT 13 #ifndef DROPBEAR_DEFPORT
14 #define DROPBEAR_DEFPORT "22" 14 #define DROPBEAR_DEFPORT "22"
15 #endif 15 #endif
16 16
127 /*#define DROPBEAR_SHA2_512_HMAC*/ 127 /*#define DROPBEAR_SHA2_512_HMAC*/
128 #define DROPBEAR_MD5_HMAC 128 #define DROPBEAR_MD5_HMAC
129 129
130 /* You can also disable integrity. Don't bother disabling this if you're 130 /* You can also disable integrity. Don't bother disabling this if you're
131 * still using a cipher, it's relatively cheap. If you disable this it's dead 131 * still using a cipher, it's relatively cheap. If you disable this it's dead
132 * simple to run arbitrary commands on the remote host. Beware. */ 132 * simple for an attacker to run arbitrary commands on the remote host. Beware. */
133 /* #define DROPBEAR_NONE_INTEGRITY */ 133 /* #define DROPBEAR_NONE_INTEGRITY */
134 134
135 /* Hostkey/public key algorithms - at least one required, these are used 135 /* Hostkey/public key algorithms - at least one required, these are used
136 * for hostkey as well as for verifying signatures with pubkey auth. 136 * for hostkey as well as for verifying signatures with pubkey auth.
137 * Removing either of these won't save very much space. 137 * Removing either of these won't save very much space.
138 * SSH2 RFC Draft requires dss, recommends rsa */ 138 * SSH2 RFC Draft requires dss, recommends rsa */
139 #define DROPBEAR_RSA 139 #define DROPBEAR_RSA
140 #define DROPBEAR_DSS 140 #define DROPBEAR_DSS
141
142 #define DROPBEAR_ECDH
143 #define DROPBEAR_ECDSA 141 #define DROPBEAR_ECDSA
142
143 /* Generate hostkeys as-needed when the first connection using that key type occurs.
144 This avoids the need to otherwise run "dropbearkey" and avoids some problems
145 with badly seeded random devices when systems first boot.
146 This also requires a runtime flag "-R". */
147 #define DROPBEAR_DELAY_HOSTKEY
144 148
145 #define DROPBEAR_CURVE25519 149 #define DROPBEAR_CURVE25519
146 150
147 /* RSA can be vulnerable to timing attacks which use the time required for 151 /* RSA can be vulnerable to timing attacks which use the time required for
148 * signing to guess the private key. Blinding avoids this attack, though makes 152 * signing to guess the private key. Blinding avoids this attack, though makes
149 * signing operations slightly slower. */ 153 * signing operations slightly slower. */
150 #define RSA_BLINDING 154 #define RSA_BLINDING
155
156 /* Enable elliptic curve Diffie Hellman key exchange */
157 #define DROPBEAR_ECDH
151 158
152 /* Control the memory/performance/compression tradeoff for zlib. 159 /* Control the memory/performance/compression tradeoff for zlib.
153 * Set windowBits=8 for least memory usage, see your system's 160 * Set windowBits=8 for least memory usage, see your system's
154 * zlib.h for full details. 161 * zlib.h for full details.
155 * Default settings (windowBits=15) will use 256kB for compression 162 * Default settings (windowBits=15) will use 256kB for compression
182 * PAM challenge/response. 189 * PAM challenge/response.
183 * You can't enable both PASSWORD and PAM. */ 190 * You can't enable both PASSWORD and PAM. */
184 191
185 #define ENABLE_SVR_PASSWORD_AUTH 192 #define ENABLE_SVR_PASSWORD_AUTH
186 /* PAM requires ./configure --enable-pam */ 193 /* PAM requires ./configure --enable-pam */
187 //#define ENABLE_SVR_PAM_AUTH 194 /*#define ENABLE_SVR_PAM_AUTH */
188 #define ENABLE_SVR_PUBKEY_AUTH 195 #define ENABLE_SVR_PUBKEY_AUTH
189 196
190 /* Whether to take public key options in 197 /* Whether to take public key options in
191 * authorized_keys file into account */ 198 * authorized_keys file into account */
192 #ifdef ENABLE_SVR_PUBKEY_AUTH 199 #ifdef ENABLE_SVR_PUBKEY_AUTH