1
0

200-config.patch 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269
  1. --- a/include/mbedtls/config.h
  2. +++ b/include/mbedtls/config.h
  3. @@ -566,17 +566,17 @@
  4. *
  5. * Comment macros to disable the curve and functions for it
  6. */
  7. -#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
  8. -#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
  9. +//#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
  10. +//#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
  11. #define MBEDTLS_ECP_DP_SECP256R1_ENABLED
  12. #define MBEDTLS_ECP_DP_SECP384R1_ENABLED
  13. -#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
  14. -#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
  15. -#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
  16. +//#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
  17. +//#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
  18. +//#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
  19. #define MBEDTLS_ECP_DP_SECP256K1_ENABLED
  20. -#define MBEDTLS_ECP_DP_BP256R1_ENABLED
  21. -#define MBEDTLS_ECP_DP_BP384R1_ENABLED
  22. -#define MBEDTLS_ECP_DP_BP512R1_ENABLED
  23. +//#define MBEDTLS_ECP_DP_BP256R1_ENABLED
  24. +//#define MBEDTLS_ECP_DP_BP384R1_ENABLED
  25. +//#define MBEDTLS_ECP_DP_BP512R1_ENABLED
  26. #define MBEDTLS_ECP_DP_CURVE25519_ENABLED
  27. /**
  28. @@ -601,8 +601,8 @@
  29. * Requires: MBEDTLS_HMAC_DRBG_C
  30. *
  31. * Comment this macro to disable deterministic ECDSA.
  32. - */
  33. #define MBEDTLS_ECDSA_DETERMINISTIC
  34. + */
  35. /**
  36. * \def MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
  37. @@ -655,7 +655,7 @@
  38. * See dhm.h for more details.
  39. *
  40. */
  41. -#define MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
  42. +//#define MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
  43. /**
  44. * \def MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
  45. @@ -674,8 +674,8 @@
  46. * MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
  47. * MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
  48. * MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
  49. - */
  50. #define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
  51. + */
  52. /**
  53. * \def MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
  54. @@ -700,7 +700,7 @@
  55. * MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
  56. * MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
  57. */
  58. -#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
  59. +//#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
  60. /**
  61. * \def MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
  62. @@ -834,7 +834,7 @@
  63. * MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
  64. * MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
  65. */
  66. -#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
  67. +//#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
  68. /**
  69. * \def MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
  70. @@ -858,7 +858,7 @@
  71. * MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
  72. * MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
  73. */
  74. -#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
  75. +//#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
  76. /**
  77. * \def MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
  78. @@ -962,7 +962,7 @@
  79. * This option is only useful if both MBEDTLS_SHA256_C and
  80. * MBEDTLS_SHA512_C are defined. Otherwise the available hash module is used.
  81. */
  82. -//#define MBEDTLS_ENTROPY_FORCE_SHA256
  83. +#define MBEDTLS_ENTROPY_FORCE_SHA256
  84. /**
  85. * \def MBEDTLS_ENTROPY_NV_SEED
  86. @@ -1057,14 +1057,14 @@
  87. * Uncomment this macro to disable the use of CRT in RSA.
  88. *
  89. */
  90. -//#define MBEDTLS_RSA_NO_CRT
  91. +#define MBEDTLS_RSA_NO_CRT
  92. /**
  93. * \def MBEDTLS_SELF_TEST
  94. *
  95. * Enable the checkup functions (*_self_test).
  96. */
  97. -#define MBEDTLS_SELF_TEST
  98. +//#define MBEDTLS_SELF_TEST
  99. /**
  100. * \def MBEDTLS_SHA256_SMALLER
  101. @@ -1080,7 +1080,7 @@
  102. *
  103. * Uncomment to enable the smaller implementation of SHA256.
  104. */
  105. -//#define MBEDTLS_SHA256_SMALLER
  106. +#define MBEDTLS_SHA256_SMALLER
  107. /**
  108. * \def MBEDTLS_SSL_ALL_ALERT_MESSAGES
  109. @@ -1207,7 +1207,7 @@
  110. * configuration of this extension).
  111. *
  112. */
  113. -#define MBEDTLS_SSL_RENEGOTIATION
  114. +//#define MBEDTLS_SSL_RENEGOTIATION
  115. /**
  116. * \def MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
  117. @@ -1381,8 +1381,8 @@
  118. * callbacks are provided by MBEDTLS_SSL_TICKET_C.
  119. *
  120. * Comment this macro to disable support for SSL session tickets
  121. - */
  122. #define MBEDTLS_SSL_SESSION_TICKETS
  123. + */
  124. /**
  125. * \def MBEDTLS_SSL_EXPORT_KEYS
  126. @@ -1412,7 +1412,7 @@
  127. *
  128. * Comment this macro to disable support for truncated HMAC in SSL
  129. */
  130. -#define MBEDTLS_SSL_TRUNCATED_HMAC
  131. +//#define MBEDTLS_SSL_TRUNCATED_HMAC
  132. /**
  133. * \def MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT
  134. @@ -1470,8 +1470,8 @@
  135. * Requires: MBEDTLS_VERSION_C
  136. *
  137. * Comment this to disable run-time checking and save ROM space
  138. - */
  139. #define MBEDTLS_VERSION_FEATURES
  140. + */
  141. /**
  142. * \def MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3
  143. @@ -1801,7 +1801,7 @@
  144. * MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
  145. * MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
  146. */
  147. -#define MBEDTLS_CAMELLIA_C
  148. +//#define MBEDTLS_CAMELLIA_C
  149. /**
  150. * \def MBEDTLS_CCM_C
  151. @@ -1815,7 +1815,7 @@
  152. * This module enables the AES-CCM ciphersuites, if other requisites are
  153. * enabled as well.
  154. */
  155. -#define MBEDTLS_CCM_C
  156. +//#define MBEDTLS_CCM_C
  157. /**
  158. * \def MBEDTLS_CERTS_C
  159. @@ -1827,7 +1827,7 @@
  160. *
  161. * This module is used for testing (ssl_client/server).
  162. */
  163. -#define MBEDTLS_CERTS_C
  164. +//#define MBEDTLS_CERTS_C
  165. /**
  166. * \def MBEDTLS_CIPHER_C
  167. @@ -1880,7 +1880,7 @@
  168. *
  169. * This module provides debugging functions.
  170. */
  171. -#define MBEDTLS_DEBUG_C
  172. +//#define MBEDTLS_DEBUG_C
  173. /**
  174. * \def MBEDTLS_DES_C
  175. @@ -1909,7 +1909,7 @@
  176. * \warning DES is considered a weak cipher and its use constitutes a
  177. * security risk. We recommend considering stronger ciphers instead.
  178. */
  179. -#define MBEDTLS_DES_C
  180. +//#define MBEDTLS_DES_C
  181. /**
  182. * \def MBEDTLS_DHM_C
  183. @@ -2070,8 +2070,8 @@
  184. * Requires: MBEDTLS_MD_C
  185. *
  186. * Uncomment to enable the HMAC_DRBG random number geerator.
  187. - */
  188. #define MBEDTLS_HMAC_DRBG_C
  189. + */
  190. /**
  191. * \def MBEDTLS_MD_C
  192. @@ -2365,7 +2365,7 @@
  193. * Caller: library/md.c
  194. *
  195. */
  196. -#define MBEDTLS_RIPEMD160_C
  197. +//#define MBEDTLS_RIPEMD160_C
  198. /**
  199. * \def MBEDTLS_RSA_C
  200. @@ -2449,8 +2449,8 @@
  201. * Caller:
  202. *
  203. * Requires: MBEDTLS_SSL_CACHE_C
  204. - */
  205. #define MBEDTLS_SSL_CACHE_C
  206. + */
  207. /**
  208. * \def MBEDTLS_SSL_COOKIE_C
  209. @@ -2471,8 +2471,8 @@
  210. * Caller:
  211. *
  212. * Requires: MBEDTLS_CIPHER_C
  213. - */
  214. #define MBEDTLS_SSL_TICKET_C
  215. + */
  216. /**
  217. * \def MBEDTLS_SSL_CLI_C
  218. @@ -2571,8 +2571,8 @@
  219. * Module: library/version.c
  220. *
  221. * This module provides run-time version information.
  222. - */
  223. #define MBEDTLS_VERSION_C
  224. + */
  225. /**
  226. * \def MBEDTLS_X509_USE_C
  227. @@ -2682,7 +2682,7 @@
  228. * Module: library/xtea.c
  229. * Caller:
  230. */
  231. -#define MBEDTLS_XTEA_C
  232. +//#define MBEDTLS_XTEA_C
  233. /* \} name SECTION: mbed TLS modules */
  234. @@ -2681,7 +2681,7 @@
  235. * recommended because of it is possible to generte SHA-1 collisions, however
  236. * this may be safe for legacy infrastructure where additional controls apply.
  237. */
  238. -// #define MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
  239. +#define MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
  240. /**
  241. * Allow SHA-1 in the default TLS configuration for TLS 1.2 handshake