- Get rid of blowfish and twofish CTR since they weren't likely

to be that useful

--HG--
extra : convert_revision : e16bd265bb6e8093b3488993dffc86662a2a7a62
This commit is contained in:
Matt Johnston 2008-09-29 14:30:47 +00:00
parent 511f6555c9
commit c2bd79131a
2 changed files with 2 additions and 10 deletions

View File

@ -128,15 +128,6 @@ algo_type sshciphers[] = {
#ifdef DROPBEAR_AES256
{"aes256-ctr", 0, &dropbear_aes256, 1, &dropbear_mode_ctr},
#endif
#ifdef DROPBEAR_TWOFISH256
{"twofish256-ctr", 0, &dropbear_twofish256, 1, &dropbear_mode_ctr},
#endif
#ifdef DROPBEAR_TWOFISH128
{"twofish128-ctr", 0, &dropbear_twofish128, 1, &dropbear_mode_ctr},
#endif
#ifdef DROPBEAR_BLOWFISH
{"blowfish-ctr", 0, &dropbear_blowfish, 1, &dropbear_mode_ctr},
#endif
#endif /* DROPBEAR_ENABLE_CTR_MODE */
/* CBC modes are always enabled */

View File

@ -86,7 +86,8 @@ etc) slower (perhaps by 50%). Recommended for most small systems. */
#define DROPBEAR_TWOFISH128
/* Enable "Counter Mode" for ciphers. This is more secure than normal
* CBC mode against certain attacks. TODO how much size does it add? */
* CBC mode against certain attacks. This adds around 1kB to binary
* size and is recommended for most cases */
#define DROPBEAR_ENABLE_CTR_MODE
/* Message Integrity - at least one required.