Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/808881/?format=api
{ "id": 808881, "url": "http://patchwork.ozlabs.org/api/patches/808881/?format=api", "web_url": "http://patchwork.ozlabs.org/project/lede/patch/1504289069-11044-1-git-send-email-kevin@darbyshire-bryant.me.uk/", "project": { "id": 54, "url": "http://patchwork.ozlabs.org/api/projects/54/?format=api", "name": "LEDE development", "link_name": "lede", "list_id": "lede-dev.lists.infradead.org", "list_email": "lede-dev@lists.infradead.org", "web_url": "http://lede-project.org/", "scm_url": "", "webscm_url": "http://git.lede-project.org/", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<1504289069-11044-1-git-send-email-kevin@darbyshire-bryant.me.uk>", "list_archive_url": null, "date": "2017-09-01T18:04:29", "name": "[LEDE-DEV] mbedtls: update to 2.6.0 CVE-2017-14032", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "f3949229391d13c4ee63c131c09a65368fd58d53", "submitter": { "id": 66241, "url": "http://patchwork.ozlabs.org/api/people/66241/?format=api", "name": "Kevin Darbyshire-Bryant", "email": "kevin@darbyshire-bryant.me.uk" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/lede/patch/1504289069-11044-1-git-send-email-kevin@darbyshire-bryant.me.uk/mbox/", "series": [ { "id": 1090, "url": "http://patchwork.ozlabs.org/api/series/1090/?format=api", "web_url": "http://patchwork.ozlabs.org/project/lede/list/?series=1090", "date": "2017-09-01T18:04:29", "name": "[LEDE-DEV] mbedtls: update to 2.6.0 CVE-2017-14032", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/1090/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/808881/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/808881/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<lede-dev-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org", "Authentication-Results": [ "ozlabs.org; spf=none (mailfrom)\n\tsmtp.mailfrom=lists.infradead.org (client-ip=65.50.211.133;\n\thelo=bombadil.infradead.org;\n\tenvelope-from=lede-dev-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n\treceiver=<UNKNOWN>)", "ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=lists.infradead.org\n\theader.i=@lists.infradead.org header.b=\"HIUfgqXu\"; \n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n\tunprotected) header.d=darbyshire-bryant.me.uk\n\theader.i=@darbyshire-bryant.me.uk header.b=\"dCxG0WJk\"; \n\tdkim-atps=neutral", "spf=none (sender IP is )\n\tsmtp.mailfrom=kevin@darbyshire-bryant.me.uk; " ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n\t[65.50.211.133])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xkRxf4kF3z9t3F\n\tfor <incoming@patchwork.ozlabs.org>;\n\tSat, 2 Sep 2017 04:05:58 +1000 (AEST)", "from localhost ([127.0.0.1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dnqK9-00012T-Qq; Fri, 01 Sep 2017 18:05:45 +0000", "from mail-ve1eur01on0082.outbound.protection.outlook.com\n\t([104.47.1.82] helo=EUR01-VE1-obe.outbound.protection.outlook.com)\n\tby bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dnqJn-0008GZ-7y\n\tfor lede-dev@lists.infradead.org; Fri, 01 Sep 2017 18:05:26 +0000", "from Animal.darbyshire-bryant.me.uk (188.221.219.2) by\n\tHE1PR07MB1033.eurprd07.prod.outlook.com (2a01:111:e400:581b::25) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.35.3;\n\tFri, 1 Sep 2017 18:04:56 +0000" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20170209; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:Subject:MIME-Version:Message-Id:Date:To\n\t:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:\n\tResent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:\n\tList-Owner; bh=R1YCpEWeiwY4LQpXisOR7zzROd6qkYEzCJYREYjws3w=;\n\tb=HIUfgqXuiQ2dIg\n\tIaPlS0oApZVYju8rNMso9SOJJi8hxVrJx7yP/mGLbK6BzwWyxbfNqK2Vf8wokFmOp45qcnm24JZOe\n\tQG2MTh8I+X7mDLN1SJUZvqTwqh+ypyp+4qlxrW4wxJiTu0Cg15V940pjQ9wNZppHbCjstS7DkSmE3\n\tcP9OtF59QbJVnmGruj3l0WCtcnNqrQv4suEnb77USAC3+4oS3NK/ka2Lus5Cbx91TLSEuHkNCCSVH\n\tyjxv/cPwQkPNw+SvuUvPebdt4LL1U883baKOZyoaGnGaOK7l9MZsl0YmqtycpYmVLCJO/iDK7PqoO\n\tKB81Qlqh6J9+x7xRxA5Q==;", "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=darbyshire-bryant.me.uk; s=selector1;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n\tbh=6p8OFKjvTS33TPhq/ZwZJFJ1/Hl55C+YIzUywvzeBlI=;\n\tb=dCxG0WJkod6ftR2LmPhd2hrK1wqIuPj3oA5SKTIzW1XQYd67i26XnBkI+bOqe6EfY+7sMUZXXgDUi1IEl35SXW2rwUYEmp6TMV74K5eLjd8SIdsAOeCD/2WNlU6D45sxslyHImJ4vdeaFhe2+hGQjiLHWhVB5K8uUGH83zT/+Qk=" ], "From": "Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>", "To": "lede-dev@lists.infradead.org", "Date": "Fri, 1 Sep 2017 19:04:29 +0100", "Message-Id": "<1504289069-11044-1-git-send-email-kevin@darbyshire-bryant.me.uk>", "X-Mailer": "git-send-email 2.7.4", "MIME-Version": "1.0", "X-Originating-IP": "[188.221.219.2]", "X-ClientProxiedBy": "DB6PR07CA0191.eurprd07.prod.outlook.com\n\t(2603:10a6:6:42::21) To HE1PR07MB1033.eurprd07.prod.outlook.com\n\t(2a01:111:e400:581b::25)", "X-MS-PublicTrafficType": "Email", "X-MS-Office365-Filtering-Correlation-Id": "0548ef03-0b0e-4fd8-9ce0-08d4f163f425", "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(2017082002075)(300000503095)(300135400095)(201703131423075)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);\n\tSRVR:HE1PR07MB1033; ", "X-Microsoft-Exchange-Diagnostics": [ "1; HE1PR07MB1033;\n\t3:ZxINYSXXYe74Qut+/t7tyZMdtdPsTAw0xtj1ELsz0ND6nkZ+IJc3ODdGRlDDkDzlPubIA10GwPHPoU0aqwFAnRAwHAR01h1F4XSL2Yscs6HSIEap0G/jLsVsKmezDnsJk/U82a/c/GIDc2k7G3//YaXAoIqsC7xe3LP9A6z8Binjqqay2OpAUwesAnh5WzLqGFyNCj64DQl8EFk/mtpRMhrYhLYK5Eg9LrwVceX8CnON0REnWvKPy2YUgUg6XN6T;\n\t25:Jjrjtn/e0OTNUjQx2NAbRfkJvFP1sIDWam0YmkbmPULs1CNv3B4u368Kw3Xz1YoWFH/AdgPzpp4dRQ4i/X5EUVCYWoBxKtsZx56xCZzkCbcQ/d5SB3qDzjyo3Ju5T5Yk6pKu0GCanlh2kp6vx4cSrKp8+O9kDJPRBxzZyzqX7Mph7yVn6UjrOkmvLZCxUQRrmoB2ptYlL/6cqYu+LdMfculGeiVLasT3wmFIx0ph2uvlpkmfvibUWCCwsyK7l0bfVfkfqGDZZS5arNVhw4Kn36D/GNk00y+vgOVyfqhGedsOCK0EIQvmrDFDvm6Zz9GvWdUdXF2JeYwt11jqUtUsVA==;\n\t31:Ys15O+aAs+U0rQTKobhkrHuExBlkizrD9TQW+GZBgG2VVM/tOPEkdvtnGVQf+1/R+hMVs7q0WEQRc9G2HLAsOznM5TDVckGl7OXRniZ4TQUG4oERzPtD7vS2y9tHIGyTKyFQLUlpXluIANvbfzOPng1r/wLesB8nOyonT5kNlso3xjBiHQdW/adVz7R8mFVMTntTZ4T33B0377Rr87wyEyoJvaDW+kvfPEiqtMz8ACs=", "1; HE1PR07MB1033;\n\t4:BbEEiUUarMbYx1knxkHGyGDuBZtAsKIoACJVcwvEWnFXvvwyrt8Bbf7EWt6DHFyzlpbfykvHpL3moNFzfpc+AdfAxON8urMsnTQzDO22XsJE7jNOJSR66MsPU3vTuaxkiQFy6pwEE3XBjlgJaUolHhYdDUD1d2uKxiyfWj+R1msIA07y0ireG7IP14OTK7wzBlphIEep0mZ3G0W/bHKEA+E6/HX+IP75yL+H8OskVRDwCJykGJaztIZEH/OgvUw/uJkoNqbr5UKIxyU7gbLVqehLtfvU+6jsBL5l9MFqU+k=", "=?us-ascii?Q?1; HE1PR07MB1033;\n\t23:VF5AijW4rJp2i/Cnm7td831tovCUYxlhRKkoUZLex?=\n\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", "1; HE1PR07MB1033;\n\t6:ugMfDDkwdovss+ofXCHNAIzBdd+tQtyauc+OD8E/SBwPmkGnWEm6u2aKx+uIbIYHctqLkTkhvIGHw/NcY7nnf03xT6TR3i2jjqhF0Yl5o+EL+Z3tPdteBdSLJVoOCcAQP7tyf6j2kScm8csyrkL0IKkpmTunpvj0R+2qpNhxASOsq/F6qsuZcVKsuxZ6DwRMF5YMddj71B4OR/oh+okPOdrL3C/s8o2Jim0PI2hu2f/TwFUyiH49wLx4hT4R1vX5d48+UlgGSXpB7Xkb112E7Nfn0FAyBlNOfn2+P4s3GlT0qk/bpiXS3L98rgIeYIRzNq4TShYQIriziZQU9cdExA==;\n\t5:CUI6HmQxNqQGbIeIY3S4D2oCquC2rCfAwrpEmYPHlqMYWx2ku8yD7/TuYaCUrV/7jd5wM9qJwolF25YKceLUcIac5w2CJ/aid9SyClBPBsa7I40KSNVVGg47YyGmOlFlW7562WZNfs0x6bvYffOmjQ==;\n\t24:xrSXMIFB0HdvZXsD7yWNGd6S2knda3kucCYdXXOMFSkqWSH/Wb0CiZoTlX5GUCLUU7IXkK7FmdHi01iaEiRAkL75+9sQTnjaiTKG7LQU298=;\n\t7:pHOVsK40Oq1VV4Sr/McwKQBWBgyMmUMCghVArhx9L2pXN5NJ4m0jDHP44Ork4TJr3AJzeTbJXIBForzJyf+nFmGNWCjg6sx/ATpAxXtkmb+w3J8YKcWyUAR/EHdpauscRIA7lUsn1EY0VkpEa27CgGVIXcSqL1nvx9dwemB9ZpIun5V1RbDfEg1YKKJax9b8LqlBn6Uor8rlhNWXE5YtywrgK3bSE1avkK+5ORrQRqc=" ], "X-MS-TrafficTypeDiagnostic": "HE1PR07MB1033:", "X-Exchange-Antispam-Report-Test": "UriScan:(158342451672863);", "X-Microsoft-Antispam-PRVS": "<HE1PR07MB103384C0E4F2E3A6970D34A6A5920@HE1PR07MB1033.eurprd07.prod.outlook.com>", "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(93006095)(93001095)(100000703101)(100105400095)(3002001)(10201501046)(6041248)(20161123560025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(2016111802025)(20161123558100)(20161123564025)(20161123562025)(6043046)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);\n\tSRVR:HE1PR07MB1033; BCL:0; PCL:0;\n\tRULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);\n\tSRVR:HE1PR07MB1033; ", "X-Forefront-PRVS": "0417A3FFD2", "X-Forefront-Antispam-Report": "SFV:NSPM;\n\tSFS:(10009020)(4630300001)(7370300001)(6009001)(39830400002)(189002)(199003)(288314003)(97736004)(68736007)(74482002)(189998001)(7350300001)(50466002)(5003940100001)(50226002)(47776003)(2906002)(81156014)(8676002)(36756003)(48376002)(66066001)(81166006)(86362001)(575784001)(6116002)(106356001)(230783001)(110136004)(107886003)(6306002)(7736002)(305945005)(25786009)(3846002)(105586002)(69596002)(5660300001)(50986999)(2361001)(4326008)(33646002)(6666003)(101416001)(42882006)(478600001)(42186005)(6916009)(6486002)(53936002)(2351001)(53416004);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB1033;\n\tH:Animal.darbyshire-bryant.me.uk; \n\tFPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; ", "Received-SPF": "None (protection.outlook.com: darbyshire-bryant.me.uk does not\n\tdesignate permitted sender hosts)", "SpamDiagnosticOutput": "1:99", "SpamDiagnosticMetadata": "NSPM", "X-OriginatorOrg": "darbyshire-bryant.me.uk", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "01 Sep 2017 18:04:56.3432\n\t(UTC)", "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "HE1PR07MB1033", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20170901_110523_677359_0B36D7E5 ", "X-CRM114-Status": "UNSURE ( 7.97 )", "X-CRM114-Notice": "Please train this message.", "X-Spam-Score": "-2.0 (--)", "X-Spam-Report": "SpamAssassin version 3.4.1 on bombadil.infradead.org summary:\n\tContent analysis details: (-2.0 points)\n\tpts rule name description\n\t---- ----------------------\n\t--------------------------------------------------\n\t-0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/,\n\tno trust [104.47.1.82 listed in list.dnswl.org]\n\t-0.0 RCVD_IN_MSPIKE_H3 RBL: Good reputation (+3)\n\t[104.47.1.82 listed in wl.mailspike.net]\n\t-0.0 SPF_PASS SPF: sender matches SPF record\n\t-0.0 SPF_HELO_PASS SPF: HELO matches SPF record\n\t-1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%\n\t[score: 0.0000]\n\t-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature\n\t0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n\tnot necessarily valid\n\t-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n\tauthor's\n\tdomain -0.0 RCVD_IN_MSPIKE_WL Mailspike good senders", "Subject": "[LEDE-DEV] [PATCH] mbedtls: update to 2.6.0 CVE-2017-14032", "X-BeenThere": "lede-dev@lists.infradead.org", "X-Mailman-Version": "2.1.21", "Precedence": "list", "List-Id": "<lede-dev.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/lede-dev>,\n\t<mailto:lede-dev-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/lede-dev/>", "List-Post": "<mailto:lede-dev@lists.infradead.org>", "List-Help": "<mailto:lede-dev-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/lede-dev>,\n\t<mailto:lede-dev-request@lists.infradead.org?subject=subscribe>", "Cc": "Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Sender": "\"Lede-dev\" <lede-dev-bounces@lists.infradead.org>", "Errors-To": "lede-dev-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "Fixed an authentication bypass issue in SSL/TLS. When the TLS\nauthentication mode was set to 'optional',\nmbedtls_ssl_get_verify_result() would incorrectly return 0 when the\npeer's X.509 certificate chain had more than\nMBEDTLS_X509_MAX_INTERMEDIATE_CA intermediates (default: 8), even when\nit was not trusted. This could be triggered remotely on both the client\nand server side. (Note, with the authentication mode set by\nmbedtls_ssl_conf_authmode()to be 'required' (the default), the handshake\nwas correctly aborted).\n\nSigned-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>\n---\n\ncompile & run tested: ar71xx - archer C7 v2\n\n\n package/libs/mbedtls/Makefile | 4 +--\n package/libs/mbedtls/patches/200-config.patch | 52 +++++++++++++--------------\n 2 files changed, 28 insertions(+), 28 deletions(-)", "diff": "diff --git a/package/libs/mbedtls/Makefile b/package/libs/mbedtls/Makefile\nindex 4cceb74..0e33831 100644\n--- a/package/libs/mbedtls/Makefile\n+++ b/package/libs/mbedtls/Makefile\n@@ -8,13 +8,13 @@\n include $(TOPDIR)/rules.mk\n \n PKG_NAME:=mbedtls\n-PKG_VERSION:=2.5.1\n+PKG_VERSION:=2.6.0\n PKG_RELEASE:=1\n PKG_USE_MIPS16:=0\n \n PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION)-gpl.tgz\n PKG_SOURCE_URL:=https://tls.mbed.org/download/\n-PKG_HASH:=312f020006f0d8e9ede3ed8e73d907a629baf6475229703941769372ab0adee2\n+PKG_HASH:=a99959d7360def22f9108d2d487c9de384fe76c349697176b1f22370080d5810\n \n PKG_BUILD_PARALLEL:=1\n PKG_LICENSE:=GPL-2.0+\ndiff --git a/package/libs/mbedtls/patches/200-config.patch b/package/libs/mbedtls/patches/200-config.patch\nindex 39de3cc..5fbd6b1 100644\n--- a/package/libs/mbedtls/patches/200-config.patch\n+++ b/package/libs/mbedtls/patches/200-config.patch\n@@ -1,6 +1,6 @@\n --- a/include/mbedtls/config.h\n +++ b/include/mbedtls/config.h\n-@@ -191,7 +191,7 @@\n+@@ -220,7 +220,7 @@\n *\n * Uncomment to get errors on using deprecated functions.\n */\n@@ -9,7 +9,7 @@\n \n /* \\} name SECTION: System support */\n \n-@@ -504,17 +504,17 @@\n+@@ -539,17 +539,17 @@\n *\n * Comment macros to disable the curve and functions for it\n */\n@@ -35,7 +35,7 @@\n #define MBEDTLS_ECP_DP_CURVE25519_ENABLED\n \n /**\n-@@ -539,8 +539,8 @@\n+@@ -574,8 +574,8 @@\n * Requires: MBEDTLS_HMAC_DRBG_C\n *\n * Comment this macro to disable deterministic ECDSA.\n@@ -45,7 +45,7 @@\n \n /**\n * \\def MBEDTLS_KEY_EXCHANGE_PSK_ENABLED\n-@@ -586,7 +586,7 @@\n+@@ -621,7 +621,7 @@\n * MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA\n * MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA\n */\n@@ -54,7 +54,7 @@\n \n /**\n * \\def MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED\n-@@ -605,8 +605,8 @@\n+@@ -640,8 +640,8 @@\n * MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256\n * MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA\n * MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA\n@@ -64,7 +64,7 @@\n \n /**\n * \\def MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED\n-@@ -631,7 +631,7 @@\n+@@ -666,7 +666,7 @@\n * MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA\n * MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA\n */\n@@ -73,7 +73,7 @@\n \n /**\n * \\def MBEDTLS_KEY_EXCHANGE_RSA_ENABLED\n-@@ -758,7 +758,7 @@\n+@@ -793,7 +793,7 @@\n * MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256\n * MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384\n */\n@@ -82,7 +82,7 @@\n \n /**\n * \\def MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED\n-@@ -782,7 +782,7 @@\n+@@ -817,7 +817,7 @@\n * MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256\n * MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384\n */\n@@ -91,7 +91,7 @@\n \n /**\n * \\def MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED\n-@@ -886,7 +886,7 @@\n+@@ -921,7 +921,7 @@\n * This option is only useful if both MBEDTLS_SHA256_C and\n * MBEDTLS_SHA512_C are defined. Otherwise the available hash module is used.\n */\n@@ -100,7 +100,7 @@\n \n /**\n * \\def MBEDTLS_ENTROPY_NV_SEED\n-@@ -980,14 +980,14 @@\n+@@ -1015,14 +1015,14 @@\n * Uncomment this macro to disable the use of CRT in RSA.\n *\n */\n@@ -117,7 +117,7 @@\n \n /**\n * \\def MBEDTLS_SHA256_SMALLER\n-@@ -1003,7 +1003,7 @@\n+@@ -1038,7 +1038,7 @@\n *\n * Uncomment to enable the smaller implementation of SHA256.\n */\n@@ -126,7 +126,7 @@\n \n /**\n * \\def MBEDTLS_SSL_ALL_ALERT_MESSAGES\n-@@ -1122,8 +1122,8 @@\n+@@ -1157,8 +1157,8 @@\n * misuse/misunderstand.\n *\n * Comment this to disable support for renegotiation.\n@@ -136,7 +136,7 @@\n \n /**\n * \\def MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO\n-@@ -1297,8 +1297,8 @@\n+@@ -1332,8 +1332,8 @@\n * callbacks are provided by MBEDTLS_SSL_TICKET_C.\n *\n * Comment this macro to disable support for SSL session tickets\n@@ -146,7 +146,7 @@\n \n /**\n * \\def MBEDTLS_SSL_EXPORT_KEYS\n-@@ -1328,7 +1328,7 @@\n+@@ -1363,7 +1363,7 @@\n *\n * Comment this macro to disable support for truncated HMAC in SSL\n */\n@@ -155,7 +155,7 @@\n \n /**\n * \\def MBEDTLS_THREADING_ALT\n-@@ -1362,8 +1362,8 @@\n+@@ -1397,8 +1397,8 @@\n * Requires: MBEDTLS_VERSION_C\n *\n * Comment this to disable run-time checking and save ROM space\n@@ -165,7 +165,7 @@\n \n /**\n * \\def MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3\n-@@ -1684,7 +1684,7 @@\n+@@ -1719,7 +1719,7 @@\n * MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256\n * MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256\n */\n@@ -174,7 +174,7 @@\n \n /**\n * \\def MBEDTLS_CCM_C\n-@@ -1698,7 +1698,7 @@\n+@@ -1733,7 +1733,7 @@\n * This module enables the AES-CCM ciphersuites, if other requisites are\n * enabled as well.\n */\n@@ -183,7 +183,7 @@\n \n /**\n * \\def MBEDTLS_CERTS_C\n-@@ -1710,7 +1710,7 @@\n+@@ -1745,7 +1745,7 @@\n *\n * This module is used for testing (ssl_client/server).\n */\n@@ -192,7 +192,7 @@\n \n /**\n * \\def MBEDTLS_CIPHER_C\n-@@ -1763,7 +1763,7 @@\n+@@ -1798,7 +1798,7 @@\n *\n * This module provides debugging functions.\n */\n@@ -201,7 +201,7 @@\n \n /**\n * \\def MBEDTLS_DES_C\n-@@ -1788,8 +1788,8 @@\n+@@ -1823,8 +1823,8 @@\n * MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA\n *\n * PEM_PARSE uses DES/3DES for decrypting encrypted keys.\n@@ -211,7 +211,7 @@\n \n /**\n * \\def MBEDTLS_DHM_C\n-@@ -1943,8 +1943,8 @@\n+@@ -1978,8 +1978,8 @@\n * Requires: MBEDTLS_MD_C\n *\n * Uncomment to enable the HMAC_DRBG random number geerator.\n@@ -221,7 +221,7 @@\n \n /**\n * \\def MBEDTLS_MD_C\n-@@ -2221,7 +2221,7 @@\n+@@ -2256,7 +2256,7 @@\n * Caller: library/md.c\n *\n */\n@@ -230,7 +230,7 @@\n \n /**\n * \\def MBEDTLS_RSA_C\n-@@ -2299,8 +2299,8 @@\n+@@ -2334,8 +2334,8 @@\n * Caller:\n *\n * Requires: MBEDTLS_SSL_CACHE_C\n@@ -240,7 +240,7 @@\n \n /**\n * \\def MBEDTLS_SSL_COOKIE_C\n-@@ -2321,8 +2321,8 @@\n+@@ -2356,8 +2356,8 @@\n * Caller:\n *\n * Requires: MBEDTLS_CIPHER_C\n@@ -250,7 +250,7 @@\n \n /**\n * \\def MBEDTLS_SSL_CLI_C\n-@@ -2421,8 +2421,8 @@\n+@@ -2456,8 +2456,8 @@\n * Module: library/version.c\n *\n * This module provides run-time version information.\n@@ -260,7 +260,7 @@\n \n /**\n * \\def MBEDTLS_X509_USE_C\n-@@ -2532,7 +2532,7 @@\n+@@ -2567,7 +2567,7 @@\n * Module: library/xtea.c\n * Caller:\n */\n", "prefixes": [ "LEDE-DEV" ] }