Ignore:
Timestamp:
2011-03-02T15:51:45+01:00 (6 years ago)
Author:
kaloz
Message:

[package/dropbear]: tune some more options by default to decrease size

File:
1 moved

Legend:

Unmodified
Added
Removed
  • trunk/package/dropbear/patches/120-openwrt_options.patch

    r25830 r25831  
    11--- a/options.h 
    22+++ b/options.h 
     3@@ -38,7 +38,7 @@ 
     4  * Both of these flags can be defined at once, don't compile without at least 
     5  * one of them. */ 
     6 #define NON_INETD_MODE 
     7-#define INETD_MODE 
     8+/*#define INETD_MODE*/ 
     9  
     10 /* Setting this disables the fast exptmod bignum code. It saves ~5kB, but is 
     11  * perhaps 20% slower for pubkey operations (it is probably worth experimenting 
    312@@ -49,7 +49,7 @@ 
    413 several kB in binary size however will make the symmetrical ciphers and hashes 
     
    1019 /* Enable X11 Forwarding - server only */ 
    1120 #define ENABLE_X11FWD 
     21@@ -78,7 +78,7 @@ much traffic. */ 
     22  
     23 /* Enable "Netcat mode" option. This will forward standard input/output 
     24  * to a remote TCP-forwarded connection */ 
     25-#define ENABLE_CLI_NETCAT 
     26+/*#define ENABLE_CLI_NETCAT*/ 
     27  
     28 /* Encryption - at least one required. 
     29  * Protocol RFC requires 3DES and recommends AES128 for interoperability. 
     30@@ -89,8 +89,8 @@ much traffic. */ 
     31 #define DROPBEAR_AES256 
     32 /* Compiling in Blowfish will add ~6kB to runtime heap memory usage */ 
     33 /*#define DROPBEAR_BLOWFISH*/ 
     34-#define DROPBEAR_TWOFISH256 
     35-#define DROPBEAR_TWOFISH128 
     36+/*#define DROPBEAR_TWOFISH256 
     37+#define DROPBEAR_TWOFISH128*/ 
     38  
     39 /* Enable "Counter Mode" for ciphers. This is more secure than normal 
     40  * CBC mode against certain attacks. This adds around 1kB to binary  
     41@@ -110,7 +110,7 @@ much traffic. */ 
     42  * If you disable MD5, Dropbear will fall back to SHA1 fingerprints, 
     43  * which are not the standard form. */ 
     44 #define DROPBEAR_SHA1_HMAC 
     45-#define DROPBEAR_SHA1_96_HMAC 
     46+/*#define DROPBEAR_SHA1_96_HMAC*/ 
     47 #define DROPBEAR_MD5_HMAC 
     48  
     49 /* Hostkey/public key algorithms - at least one required, these are used 
     50@@ -148,7 +148,7 @@ much traffic. */ 
     51  
     52 /* Whether to print the message of the day (MOTD). This doesn't add much code 
     53  * size */ 
     54-#define DO_MOTD 
     55+/*#define DO_MOTD*/ 
     56  
     57 /* The MOTD file path */ 
     58 #ifndef MOTD_FILENAME 
     59@@ -177,7 +177,7 @@ much traffic. */ 
     60  
     61 #define ENABLE_CLI_PASSWORD_AUTH 
     62 #define ENABLE_CLI_PUBKEY_AUTH 
     63-#define ENABLE_CLI_INTERACT_AUTH 
     64+/*#define ENABLE_CLI_INTERACT_AUTH*/ 
     65  
     66 /* This variable can be used to set a password for client 
     67  * authentication on the commandline. Beware of platforms 
     68@@ -185,7 +185,7 @@ much traffic. */ 
     69  * note that it will be provided for all "hidden" client-interactive 
     70  * style prompts - if you want something more sophisticated, use  
     71  * SSH_ASKPASS instead. Comment out this var to remove this functionality.*/ 
     72-#define DROPBEAR_PASSWORD_ENV "DROPBEAR_PASSWORD" 
     73+/*#define DROPBEAR_PASSWORD_ENV "DROPBEAR_PASSWORD"*/ 
     74  
     75 /* Define this (as well as ENABLE_CLI_PASSWORD_AUTH) to allow the use of 
     76  * a helper program for the ssh client. The helper program should be 
Note: See TracChangeset for help on using the changeset viewer.