aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/mbedtls/patches/200-config.patch
diff options
context:
space:
mode:
Diffstat (limited to 'package/libs/mbedtls/patches/200-config.patch')
-rw-r--r--package/libs/mbedtls/patches/200-config.patch235
1 files changed, 235 insertions, 0 deletions
diff --git a/package/libs/mbedtls/patches/200-config.patch b/package/libs/mbedtls/patches/200-config.patch
new file mode 100644
index 0000000000..a8ffe6dc25
--- /dev/null
+++ b/package/libs/mbedtls/patches/200-config.patch
@@ -0,0 +1,235 @@
+--- a/include/mbedtls/config.h
++++ b/include/mbedtls/config.h
+@@ -181,7 +181,7 @@
+ *
+ * Uncomment to get errors on using deprecated functions.
+ */
+-//#define MBEDTLS_DEPRECATED_REMOVED
++#define MBEDTLS_DEPRECATED_REMOVED
+
+ /* \} name SECTION: System support */
+
+@@ -320,7 +320,7 @@
+ *
+ * Enable Cipher Feedback mode (CFB) for symmetric ciphers.
+ */
+-#define MBEDTLS_CIPHER_MODE_CFB
++//#define MBEDTLS_CIPHER_MODE_CFB
+
+ /**
+ * \def MBEDTLS_CIPHER_MODE_CTR
+@@ -413,13 +413,13 @@
+ *
+ * Comment macros to disable the curve and functions for it
+ */
+-#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
+-#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
++//#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
++//#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
+ #define MBEDTLS_ECP_DP_SECP256R1_ENABLED
+ #define MBEDTLS_ECP_DP_SECP384R1_ENABLED
+ #define MBEDTLS_ECP_DP_SECP521R1_ENABLED
+-#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
+-#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
++//#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
++//#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
+ #define MBEDTLS_ECP_DP_SECP256K1_ENABLED
+ #define MBEDTLS_ECP_DP_BP256R1_ENABLED
+ #define MBEDTLS_ECP_DP_BP384R1_ENABLED
+@@ -435,7 +435,7 @@
+ *
+ * Comment this macro to disable NIST curves optimisation.
+ */
+-#define MBEDTLS_ECP_NIST_OPTIM
++//#define MBEDTLS_ECP_NIST_OPTIM
+
+ /**
+ * \def MBEDTLS_ECDSA_DETERMINISTIC
+@@ -443,7 +443,7 @@
+ * Enable deterministic ECDSA (RFC 6979).
+ * Standard ECDSA is "fragile" in the sense that lack of entropy when signing
+ * may result in a compromise of the long-term signing key. This is avoided by
+- * the deterministic variant.
++ DH * the deterministic variant.
+ *
+ * Requires: MBEDTLS_HMAC_DRBG_C
+ *
+@@ -495,7 +495,7 @@
+ * MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
+ * MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA
+ */
+-#define MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
++//#define MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
+
+ /**
+ * \def MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
+@@ -540,7 +540,7 @@
+ * MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
+ * MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
+ */
+-#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
++//#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
+
+ /**
+ * \def MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
+@@ -594,7 +594,7 @@
+ * MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
+ * MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
+ */
+-#define MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED
++//#define MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED
+
+ /**
+ * \def MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
+@@ -667,7 +667,7 @@
+ * MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
+ * MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
+ */
+-#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
++//#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
+
+ /**
+ * \def MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
+@@ -691,7 +691,7 @@
+ * MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
+ * MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
+ */
+-#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
++//#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
+
+ /**
+ * \def MBEDTLS_PK_PARSE_EC_EXTENDED
+@@ -810,7 +810,7 @@
+ *
+ * Comment this macro to disable support for external private RSA keys.
+ */
+-#define MBEDTLS_PK_RSA_ALT_SUPPORT
++//#define MBEDTLS_PK_RSA_ALT_SUPPORT
+
+ /**
+ * \def MBEDTLS_PKCS1_V15
+@@ -842,14 +842,14 @@
+ * Uncomment this macro to disable the use of CRT in RSA.
+ *
+ */
+-//#define MBEDTLS_RSA_NO_CRT
++#define MBEDTLS_RSA_NO_CRT
+
+ /**
+ * \def MBEDTLS_SELF_TEST
+ *
+ * Enable the checkup functions (*_self_test).
+ */
+-#define MBEDTLS_SELF_TEST
++//#define MBEDTLS_SELF_TEST
+
+ /**
+ * \def MBEDTLS_SHA256_SMALLER
+@@ -865,7 +865,7 @@
+ *
+ * Uncomment to enable the smaller implementation of SHA256.
+ */
+-//#define MBEDTLS_SHA256_SMALLER
++#define MBEDTLS_SHA256_SMALLER
+
+ /**
+ * \def MBEDTLS_SSL_AEAD_RANDOM_IV
+@@ -1038,7 +1038,7 @@
+ *
+ * Comment this macro to disable support for SSL 3.0
+ */
+-#define MBEDTLS_SSL_PROTO_SSL3
++//#define MBEDTLS_SSL_PROTO_SSL3
+
+ /**
+ * \def MBEDTLS_SSL_PROTO_TLS1
+@@ -1176,7 +1176,7 @@
+ *
+ * Comment this macro to disable support for truncated HMAC in SSL
+ */
+-#define MBEDTLS_SSL_TRUNCATED_HMAC
++//#define MBEDTLS_SSL_TRUNCATED_HMAC
+
+ /**
+ * \def MBEDTLS_THREADING_ALT
+@@ -1410,7 +1410,7 @@
+ * MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
+ * MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
+ */
+-#define MBEDTLS_ARC4_C
++//#define MBEDTLS_ARC4_C
+
+ /**
+ * \def MBEDTLS_ASN1_PARSE_C
+@@ -1475,7 +1475,7 @@
+ *
+ * Module: library/blowfish.c
+ */
+-#define MBEDTLS_BLOWFISH_C
++//#define MBEDTLS_BLOWFISH_C
+
+ /**
+ * \def MBEDTLS_CAMELLIA_C
+@@ -1530,7 +1530,7 @@
+ * MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
+ * MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
+ */
+-#define MBEDTLS_CAMELLIA_C
++//#define MBEDTLS_CAMELLIA_C
+
+ /**
+ * \def MBEDTLS_CCM_C
+@@ -1544,7 +1544,7 @@
+ * This module enables the AES-CCM ciphersuites, if other requisites are
+ * enabled as well.
+ */
+-#define MBEDTLS_CCM_C
++//#define MBEDTLS_CCM_C
+
+ /**
+ * \def MBEDTLS_CERTS_C
+@@ -1556,7 +1556,7 @@
+ *
+ * This module is used for testing (ssl_client/server).
+ */
+-#define MBEDTLS_CERTS_C
++//#define MBEDTLS_CERTS_C
+
+ /**
+ * \def MBEDTLS_CIPHER_C
+@@ -1596,7 +1596,7 @@
+ *
+ * This module provides debugging functions.
+ */
+-#define MBEDTLS_DEBUG_C
++//#define MBEDTLS_DEBUG_C
+
+ /**
+ * \def MBEDTLS_DES_C
+@@ -1636,7 +1636,7 @@
+ * This module is used by the following key exchanges:
+ * DHE-RSA, DHE-PSK
+ */
+-#define MBEDTLS_DHM_C
++//#define MBEDTLS_DHM_C
+
+ /**
+ * \def MBEDTLS_ECDH_C
+@@ -2026,7 +2026,7 @@
+ * Caller: library/mbedtls_md.c
+ *
+ */
+-#define MBEDTLS_RIPEMD160_C
++//#define MBEDTLS_RIPEMD160_C
+
+ /**
+ * \def MBEDTLS_RSA_C
+@@ -2324,7 +2324,7 @@
+ * Module: library/xtea.c
+ * Caller:
+ */
+-#define MBEDTLS_XTEA_C
++//#define MBEDTLS_XTEA_C
+
+ /* \} name SECTION: mbed TLS modules */
+
9' href='#n419'>419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762