{"id":808881,"url":"http://patchwork.ozlabs.org/api/patches/808881/?format=json","web_url":"http://patchwork.ozlabs.org/project/lede/patch/1504289069-11044-1-git-send-email-kevin@darbyshire-bryant.me.uk/","project":{"id":54,"url":"http://patchwork.ozlabs.org/api/projects/54/?format=json","name":"LEDE development","link_name":"lede","list_id":"lede-dev.lists.infradead.org","list_email":"lede-dev@lists.infradead.org","web_url":"http://lede-project.org/","scm_url":"","webscm_url":"http://git.lede-project.org/","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<1504289069-11044-1-git-send-email-kevin@darbyshire-bryant.me.uk>","list_archive_url":null,"date":"2017-09-01T18:04:29","name":"[LEDE-DEV] mbedtls: update to 2.6.0 CVE-2017-14032","commit_ref":null,"pull_url":null,"state":"accepted","archived":false,"hash":"f3949229391d13c4ee63c131c09a65368fd58d53","submitter":{"id":66241,"url":"http://patchwork.ozlabs.org/api/people/66241/?format=json","name":"Kevin Darbyshire-Bryant","email":"kevin@darbyshire-bryant.me.uk"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/lede/patch/1504289069-11044-1-git-send-email-kevin@darbyshire-bryant.me.uk/mbox/","series":[{"id":1090,"url":"http://patchwork.ozlabs.org/api/series/1090/?format=json","web_url":"http://patchwork.ozlabs.org/project/lede/list/?series=1090","date":"2017-09-01T18:04:29","name":"[LEDE-DEV] mbedtls: update to 2.6.0 CVE-2017-14032","version":1,"mbox":"http://patchwork.ozlabs.org/series/1090/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/808881/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/808881/checks/","tags":{},"related":[],"headers":{"Return-Path":"<lede-dev-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@bilbo.ozlabs.org","Authentication-Results":["ozlabs.org; spf=none (mailfrom)\n\tsmtp.mailfrom=lists.infradead.org (client-ip=65.50.211.133;\n\thelo=bombadil.infradead.org;\n\tenvelope-from=lede-dev-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n\treceiver=<UNKNOWN>)","ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=lists.infradead.org\n\theader.i=@lists.infradead.org header.b=\"HIUfgqXu\"; \n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n\tunprotected) header.d=darbyshire-bryant.me.uk\n\theader.i=@darbyshire-bryant.me.uk header.b=\"dCxG0WJk\"; \n\tdkim-atps=neutral","spf=none (sender IP is )\n\tsmtp.mailfrom=kevin@darbyshire-bryant.me.uk; "],"Received":["from bombadil.infradead.org (bombadil.infradead.org\n\t[65.50.211.133])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xkRxf4kF3z9t3F\n\tfor <incoming@patchwork.ozlabs.org>;\n\tSat,  2 Sep 2017 04:05:58 +1000 (AEST)","from localhost ([127.0.0.1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dnqK9-00012T-Qq; Fri, 01 Sep 2017 18:05:45 +0000","from mail-ve1eur01on0082.outbound.protection.outlook.com\n\t([104.47.1.82] helo=EUR01-VE1-obe.outbound.protection.outlook.com)\n\tby bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dnqJn-0008GZ-7y\n\tfor lede-dev@lists.infradead.org; Fri, 01 Sep 2017 18:05:26 +0000","from Animal.darbyshire-bryant.me.uk (188.221.219.2) by\n\tHE1PR07MB1033.eurprd07.prod.outlook.com (2a01:111:e400:581b::25) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.35.3;\n\tFri, 1 Sep 2017 18:04:56 +0000"],"DKIM-Signature":["v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20170209; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:Subject:MIME-Version:Message-Id:Date:To\n\t:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:\n\tResent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:\n\tList-Owner; bh=R1YCpEWeiwY4LQpXisOR7zzROd6qkYEzCJYREYjws3w=;\n\tb=HIUfgqXuiQ2dIg\n\tIaPlS0oApZVYju8rNMso9SOJJi8hxVrJx7yP/mGLbK6BzwWyxbfNqK2Vf8wokFmOp45qcnm24JZOe\n\tQG2MTh8I+X7mDLN1SJUZvqTwqh+ypyp+4qlxrW4wxJiTu0Cg15V940pjQ9wNZppHbCjstS7DkSmE3\n\tcP9OtF59QbJVnmGruj3l0WCtcnNqrQv4suEnb77USAC3+4oS3NK/ka2Lus5Cbx91TLSEuHkNCCSVH\n\tyjxv/cPwQkPNw+SvuUvPebdt4LL1U883baKOZyoaGnGaOK7l9MZsl0YmqtycpYmVLCJO/iDK7PqoO\n\tKB81Qlqh6J9+x7xRxA5Q==;","v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=darbyshire-bryant.me.uk; s=selector1;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n\tbh=6p8OFKjvTS33TPhq/ZwZJFJ1/Hl55C+YIzUywvzeBlI=;\n\tb=dCxG0WJkod6ftR2LmPhd2hrK1wqIuPj3oA5SKTIzW1XQYd67i26XnBkI+bOqe6EfY+7sMUZXXgDUi1IEl35SXW2rwUYEmp6TMV74K5eLjd8SIdsAOeCD/2WNlU6D45sxslyHImJ4vdeaFhe2+hGQjiLHWhVB5K8uUGH83zT/+Qk="],"From":"Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>","To":"lede-dev@lists.infradead.org","Date":"Fri,  1 Sep 2017 19:04:29 +0100","Message-Id":"<1504289069-11044-1-git-send-email-kevin@darbyshire-bryant.me.uk>","X-Mailer":"git-send-email 2.7.4","MIME-Version":"1.0","X-Originating-IP":"[188.221.219.2]","X-ClientProxiedBy":"DB6PR07CA0191.eurprd07.prod.outlook.com\n\t(2603:10a6:6:42::21) To HE1PR07MB1033.eurprd07.prod.outlook.com\n\t(2a01:111:e400:581b::25)","X-MS-PublicTrafficType":"Email","X-MS-Office365-Filtering-Correlation-Id":"0548ef03-0b0e-4fd8-9ce0-08d4f163f425","X-Microsoft-Antispam":"UriScan:; BCL:0; PCL:0;\n\tRULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(2017082002075)(300000503095)(300135400095)(201703131423075)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);\n\tSRVR:HE1PR07MB1033; ","X-Microsoft-Exchange-Diagnostics":["1; HE1PR07MB1033;\n\t3:ZxINYSXXYe74Qut+/t7tyZMdtdPsTAw0xtj1ELsz0ND6nkZ+IJc3ODdGRlDDkDzlPubIA10GwPHPoU0aqwFAnRAwHAR01h1F4XSL2Yscs6HSIEap0G/jLsVsKmezDnsJk/U82a/c/GIDc2k7G3//YaXAoIqsC7xe3LP9A6z8Binjqqay2OpAUwesAnh5WzLqGFyNCj64DQl8EFk/mtpRMhrYhLYK5Eg9LrwVceX8CnON0REnWvKPy2YUgUg6XN6T;\n\t25:Jjrjtn/e0OTNUjQx2NAbRfkJvFP1sIDWam0YmkbmPULs1CNv3B4u368Kw3Xz1YoWFH/AdgPzpp4dRQ4i/X5EUVCYWoBxKtsZx56xCZzkCbcQ/d5SB3qDzjyo3Ju5T5Yk6pKu0GCanlh2kp6vx4cSrKp8+O9kDJPRBxzZyzqX7Mph7yVn6UjrOkmvLZCxUQRrmoB2ptYlL/6cqYu+LdMfculGeiVLasT3wmFIx0ph2uvlpkmfvibUWCCwsyK7l0bfVfkfqGDZZS5arNVhw4Kn36D/GNk00y+vgOVyfqhGedsOCK0EIQvmrDFDvm6Zz9GvWdUdXF2JeYwt11jqUtUsVA==;\n\t31:Ys15O+aAs+U0rQTKobhkrHuExBlkizrD9TQW+GZBgG2VVM/tOPEkdvtnGVQf+1/R+hMVs7q0WEQRc9G2HLAsOznM5TDVckGl7OXRniZ4TQUG4oERzPtD7vS2y9tHIGyTKyFQLUlpXluIANvbfzOPng1r/wLesB8nOyonT5kNlso3xjBiHQdW/adVz7R8mFVMTntTZ4T33B0377Rr87wyEyoJvaDW+kvfPEiqtMz8ACs=","1; HE1PR07MB1033;\n\t4:BbEEiUUarMbYx1knxkHGyGDuBZtAsKIoACJVcwvEWnFXvvwyrt8Bbf7EWt6DHFyzlpbfykvHpL3moNFzfpc+AdfAxON8urMsnTQzDO22XsJE7jNOJSR66MsPU3vTuaxkiQFy6pwEE3XBjlgJaUolHhYdDUD1d2uKxiyfWj+R1msIA07y0ireG7IP14OTK7wzBlphIEep0mZ3G0W/bHKEA+E6/HX+IP75yL+H8OskVRDwCJykGJaztIZEH/OgvUw/uJkoNqbr5UKIxyU7gbLVqehLtfvU+6jsBL5l9MFqU+k=","=?us-ascii?Q?1; HE1PR07MB1033;\n\t23:VF5AijW4rJp2i/Cnm7td831tovCUYxlhRKkoUZLex?=\n\tnM4/e0UGVvPkd7F82LRX11FRH8+ZpX/Ps/io1QIo23xHRYkp836W1DotYGke6VyTcCe1vY1ivWCD5n7W4d/vbZ67wM2a+zpJZ+Hx9Z28VAl7Ddy/mNcFTOPCoDI7rzSnIk2XRfwJweAj5PjgT59nFc0Mj+T7ncd0ovwFlSmgqa7QdmYPQKdED5/48RDibl+JlQSMahPP906ym4MRQ5byvtaQ2uAEzRWvgybg++QdXekm7ErRuoiIXWnpQn2xGCzxf6tfC1FIZLpPE6ZgcEIIRWVIWCXhG9QgmRr7awg1Hb9lGPVW8Dhva3TADjo0W+ur2ggv8UMz2m74MK7zmiFWLVwQ7nQNH+c19aj8FwuJhzdosJXJ8LFJwWKWImx+U4BB7gTNhxuSqsbFBDnLCoNS0/auLZM810LY/Hhu2w6EnlHGcxlXupSCL5ky3itnQsbDJVi7ChlsQxStMG63Qnx/EEdXwQR12xfPTd7MArovIZ8VQrnk/vGF89eZ7M4M/dU2woECZiy6QyhhGevGme+IRUF0BEvq8owavongTLgudmNx6+zHfWH5hFWVCZfwWU2fGoo6ASIlCXDeCehEofSb0YqBIJ5QL5OgNygbOVkaTTrHTYHWRQOqmADJ03sHBhmvHIl+EaoepNAM/CJmg5pob67JwtSiKvQGaNml9xErox24q6FIz1a4htdozrtdhJN5+z4Etqj9udLns/KCnJ+kmM5kfRkVfq7yUb6GQCyAFRxrxGBTKkkZqYNG0UVc4FMGvQEUhHfRqW7CntxzxunoqQnfOGbnT8+CwVCF6W8/KDYS0U3ogu2XeQo6GEpl7YWiH9rPD3VrdUF9rf5Y9BicEm9/d7Nxy7Lnesm6drlae1bcaDIXX6dsnlxYlQ3J47Bkq5mIKPm63CFvCYXM4o4x+RoOc7l0TOszE+e2FucWyVz77qCZ6i5MoS6xaLP+/z1ap7zCAaQ3nP06xjEK+sA5YlOsVaN0F6XfhrmGJRokc/8kNYq3VTM12apRaNFDtDHpdgwpDKeH/pFV6tU6ONF4hD2jrqlndJS8+SmaZTt/hWZcYl7BPC9mLz4q1lNNpm7lRdoIlaJC/diegmjoardKBg/5j4LEl9meaf3FcUwQQfQk+e47afiwRCk6l5X1XjNlaYlIvzA0ICQm+50SGnH6T6E9xMDwyMKkOQJ9DgiUrbo7wmg7t9WVwMO5IPZZbxBj+iwP7RQddDRIeM6fMalwuJ2","1; HE1PR07MB1033;\n\t6:ugMfDDkwdovss+ofXCHNAIzBdd+tQtyauc+OD8E/SBwPmkGnWEm6u2aKx+uIbIYHctqLkTkhvIGHw/NcY7nnf03xT6TR3i2jjqhF0Yl5o+EL+Z3tPdteBdSLJVoOCcAQP7tyf6j2kScm8csyrkL0IKkpmTunpvj0R+2qpNhxASOsq/F6qsuZcVKsuxZ6DwRMF5YMddj71B4OR/oh+okPOdrL3C/s8o2Jim0PI2hu2f/TwFUyiH49wLx4hT4R1vX5d48+UlgGSXpB7Xkb112E7Nfn0FAyBlNOfn2+P4s3GlT0qk/bpiXS3L98rgIeYIRzNq4TShYQIriziZQU9cdExA==;\n\t5:CUI6HmQxNqQGbIeIY3S4D2oCquC2rCfAwrpEmYPHlqMYWx2ku8yD7/TuYaCUrV/7jd5wM9qJwolF25YKceLUcIac5w2CJ/aid9SyClBPBsa7I40KSNVVGg47YyGmOlFlW7562WZNfs0x6bvYffOmjQ==;\n\t24:xrSXMIFB0HdvZXsD7yWNGd6S2knda3kucCYdXXOMFSkqWSH/Wb0CiZoTlX5GUCLUU7IXkK7FmdHi01iaEiRAkL75+9sQTnjaiTKG7LQU298=;\n\t7:pHOVsK40Oq1VV4Sr/McwKQBWBgyMmUMCghVArhx9L2pXN5NJ4m0jDHP44Ork4TJr3AJzeTbJXIBForzJyf+nFmGNWCjg6sx/ATpAxXtkmb+w3J8YKcWyUAR/EHdpauscRIA7lUsn1EY0VkpEa27CgGVIXcSqL1nvx9dwemB9ZpIun5V1RbDfEg1YKKJax9b8LqlBn6Uor8rlhNWXE5YtywrgK3bSE1avkK+5ORrQRqc="],"X-MS-TrafficTypeDiagnostic":"HE1PR07MB1033:","X-Exchange-Antispam-Report-Test":"UriScan:(158342451672863);","X-Microsoft-Antispam-PRVS":"<HE1PR07MB103384C0E4F2E3A6970D34A6A5920@HE1PR07MB1033.eurprd07.prod.outlook.com>","X-Exchange-Antispam-Report-CFA-Test":"BCL:0; PCL:0;\n\tRULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(93006095)(93001095)(100000703101)(100105400095)(3002001)(10201501046)(6041248)(20161123560025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(2016111802025)(20161123558100)(20161123564025)(20161123562025)(6043046)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);\n\tSRVR:HE1PR07MB1033; BCL:0; PCL:0;\n\tRULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);\n\tSRVR:HE1PR07MB1033; ","X-Forefront-PRVS":"0417A3FFD2","X-Forefront-Antispam-Report":"SFV:NSPM;\n\tSFS:(10009020)(4630300001)(7370300001)(6009001)(39830400002)(189002)(199003)(288314003)(97736004)(68736007)(74482002)(189998001)(7350300001)(50466002)(5003940100001)(50226002)(47776003)(2906002)(81156014)(8676002)(36756003)(48376002)(66066001)(81166006)(86362001)(575784001)(6116002)(106356001)(230783001)(110136004)(107886003)(6306002)(7736002)(305945005)(25786009)(3846002)(105586002)(69596002)(5660300001)(50986999)(2361001)(4326008)(33646002)(6666003)(101416001)(42882006)(478600001)(42186005)(6916009)(6486002)(53936002)(2351001)(53416004);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB1033;\n\tH:Animal.darbyshire-bryant.me.uk; \n\tFPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; ","Received-SPF":"None (protection.outlook.com: darbyshire-bryant.me.uk does not\n\tdesignate permitted sender hosts)","SpamDiagnosticOutput":"1:99","SpamDiagnosticMetadata":"NSPM","X-OriginatorOrg":"darbyshire-bryant.me.uk","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"01 Sep 2017 18:04:56.3432\n\t(UTC)","X-MS-Exchange-CrossTenant-FromEntityHeader":"Hosted","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"HE1PR07MB1033","X-CRM114-Version":"20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ","X-CRM114-CacheID":"sfid-20170901_110523_677359_0B36D7E5 ","X-CRM114-Status":"UNSURE (   7.97  )","X-CRM114-Notice":"Please train this message.","X-Spam-Score":"-2.0 (--)","X-Spam-Report":"SpamAssassin version 3.4.1 on bombadil.infradead.org summary:\n\tContent analysis details:   (-2.0 points)\n\tpts rule name              description\n\t---- ----------------------\n\t--------------------------------------------------\n\t-0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/,\n\tno trust [104.47.1.82 listed in list.dnswl.org]\n\t-0.0 RCVD_IN_MSPIKE_H3      RBL: Good reputation (+3)\n\t[104.47.1.82 listed in wl.mailspike.net]\n\t-0.0 SPF_PASS               SPF: sender matches SPF record\n\t-0.0 SPF_HELO_PASS          SPF: HELO matches SPF record\n\t-1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n\t[score: 0.0000]\n\t-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature\n\t0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n\tnot necessarily valid\n\t-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n\tauthor's\n\tdomain -0.0 RCVD_IN_MSPIKE_WL      Mailspike good senders","Subject":"[LEDE-DEV] [PATCH] mbedtls: update to 2.6.0 CVE-2017-14032","X-BeenThere":"lede-dev@lists.infradead.org","X-Mailman-Version":"2.1.21","Precedence":"list","List-Id":"<lede-dev.lists.infradead.org>","List-Unsubscribe":"<http://lists.infradead.org/mailman/options/lede-dev>,\n\t<mailto:lede-dev-request@lists.infradead.org?subject=unsubscribe>","List-Archive":"<http://lists.infradead.org/pipermail/lede-dev/>","List-Post":"<mailto:lede-dev@lists.infradead.org>","List-Help":"<mailto:lede-dev-request@lists.infradead.org?subject=help>","List-Subscribe":"<http://lists.infradead.org/mailman/listinfo/lede-dev>,\n\t<mailto:lede-dev-request@lists.infradead.org?subject=subscribe>","Cc":"Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Sender":"\"Lede-dev\" <lede-dev-bounces@lists.infradead.org>","Errors-To":"lede-dev-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"},"content":"Fixed an authentication bypass issue in SSL/TLS. When the TLS\nauthentication mode was set to 'optional',\nmbedtls_ssl_get_verify_result() would incorrectly return 0 when the\npeer's X.509 certificate chain had more than\nMBEDTLS_X509_MAX_INTERMEDIATE_CA intermediates (default: 8), even when\nit was not trusted. This could be triggered remotely on both the client\nand server side. (Note, with the authentication mode set by\nmbedtls_ssl_conf_authmode()to be 'required' (the default), the handshake\nwas correctly aborted).\n\nSigned-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>\n---\n\ncompile & run tested: ar71xx - archer C7 v2\n\n\n package/libs/mbedtls/Makefile                 |  4 +--\n package/libs/mbedtls/patches/200-config.patch | 52 +++++++++++++--------------\n 2 files changed, 28 insertions(+), 28 deletions(-)","diff":"diff --git a/package/libs/mbedtls/Makefile b/package/libs/mbedtls/Makefile\nindex 4cceb74..0e33831 100644\n--- a/package/libs/mbedtls/Makefile\n+++ b/package/libs/mbedtls/Makefile\n@@ -8,13 +8,13 @@\n include $(TOPDIR)/rules.mk\n \n PKG_NAME:=mbedtls\n-PKG_VERSION:=2.5.1\n+PKG_VERSION:=2.6.0\n PKG_RELEASE:=1\n PKG_USE_MIPS16:=0\n \n PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION)-gpl.tgz\n PKG_SOURCE_URL:=https://tls.mbed.org/download/\n-PKG_HASH:=312f020006f0d8e9ede3ed8e73d907a629baf6475229703941769372ab0adee2\n+PKG_HASH:=a99959d7360def22f9108d2d487c9de384fe76c349697176b1f22370080d5810\n \n PKG_BUILD_PARALLEL:=1\n PKG_LICENSE:=GPL-2.0+\ndiff --git a/package/libs/mbedtls/patches/200-config.patch b/package/libs/mbedtls/patches/200-config.patch\nindex 39de3cc..5fbd6b1 100644\n--- a/package/libs/mbedtls/patches/200-config.patch\n+++ b/package/libs/mbedtls/patches/200-config.patch\n@@ -1,6 +1,6 @@\n --- a/include/mbedtls/config.h\n +++ b/include/mbedtls/config.h\n-@@ -191,7 +191,7 @@\n+@@ -220,7 +220,7 @@\n   *\n   * Uncomment to get errors on using deprecated functions.\n   */\n@@ -9,7 +9,7 @@\n  \n  /* \\} name SECTION: System support */\n  \n-@@ -504,17 +504,17 @@\n+@@ -539,17 +539,17 @@\n   *\n   * Comment macros to disable the curve and functions for it\n   */\n@@ -35,7 +35,7 @@\n  #define MBEDTLS_ECP_DP_CURVE25519_ENABLED\n  \n  /**\n-@@ -539,8 +539,8 @@\n+@@ -574,8 +574,8 @@\n   * Requires: MBEDTLS_HMAC_DRBG_C\n   *\n   * Comment this macro to disable deterministic ECDSA.\n@@ -45,7 +45,7 @@\n  \n  /**\n   * \\def MBEDTLS_KEY_EXCHANGE_PSK_ENABLED\n-@@ -586,7 +586,7 @@\n+@@ -621,7 +621,7 @@\n   *      MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA\n   *      MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA\n   */\n@@ -54,7 +54,7 @@\n  \n  /**\n   * \\def MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED\n-@@ -605,8 +605,8 @@\n+@@ -640,8 +640,8 @@\n   *      MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256\n   *      MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA\n   *      MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA\n@@ -64,7 +64,7 @@\n  \n  /**\n   * \\def MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED\n-@@ -631,7 +631,7 @@\n+@@ -666,7 +666,7 @@\n   *      MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA\n   *      MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA\n   */\n@@ -73,7 +73,7 @@\n  \n  /**\n   * \\def MBEDTLS_KEY_EXCHANGE_RSA_ENABLED\n-@@ -758,7 +758,7 @@\n+@@ -793,7 +793,7 @@\n   *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256\n   *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384\n   */\n@@ -82,7 +82,7 @@\n  \n  /**\n   * \\def MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED\n-@@ -782,7 +782,7 @@\n+@@ -817,7 +817,7 @@\n   *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256\n   *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384\n   */\n@@ -91,7 +91,7 @@\n  \n  /**\n   * \\def MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED\n-@@ -886,7 +886,7 @@\n+@@ -921,7 +921,7 @@\n   * This option is only useful if both MBEDTLS_SHA256_C and\n   * MBEDTLS_SHA512_C are defined. Otherwise the available hash module is used.\n   */\n@@ -100,7 +100,7 @@\n  \n  /**\n   * \\def MBEDTLS_ENTROPY_NV_SEED\n-@@ -980,14 +980,14 @@\n+@@ -1015,14 +1015,14 @@\n   * Uncomment this macro to disable the use of CRT in RSA.\n   *\n   */\n@@ -117,7 +117,7 @@\n  \n  /**\n   * \\def MBEDTLS_SHA256_SMALLER\n-@@ -1003,7 +1003,7 @@\n+@@ -1038,7 +1038,7 @@\n   *\n   * Uncomment to enable the smaller implementation of SHA256.\n   */\n@@ -126,7 +126,7 @@\n  \n  /**\n   * \\def MBEDTLS_SSL_ALL_ALERT_MESSAGES\n-@@ -1122,8 +1122,8 @@\n+@@ -1157,8 +1157,8 @@\n   * misuse/misunderstand.\n   *\n   * Comment this to disable support for renegotiation.\n@@ -136,7 +136,7 @@\n  \n  /**\n   * \\def MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO\n-@@ -1297,8 +1297,8 @@\n+@@ -1332,8 +1332,8 @@\n   * callbacks are provided by MBEDTLS_SSL_TICKET_C.\n   *\n   * Comment this macro to disable support for SSL session tickets\n@@ -146,7 +146,7 @@\n  \n  /**\n   * \\def MBEDTLS_SSL_EXPORT_KEYS\n-@@ -1328,7 +1328,7 @@\n+@@ -1363,7 +1363,7 @@\n   *\n   * Comment this macro to disable support for truncated HMAC in SSL\n   */\n@@ -155,7 +155,7 @@\n  \n  /**\n   * \\def MBEDTLS_THREADING_ALT\n-@@ -1362,8 +1362,8 @@\n+@@ -1397,8 +1397,8 @@\n   * Requires: MBEDTLS_VERSION_C\n   *\n   * Comment this to disable run-time checking and save ROM space\n@@ -165,7 +165,7 @@\n  \n  /**\n   * \\def MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3\n-@@ -1684,7 +1684,7 @@\n+@@ -1719,7 +1719,7 @@\n   *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256\n   *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256\n   */\n@@ -174,7 +174,7 @@\n  \n  /**\n   * \\def MBEDTLS_CCM_C\n-@@ -1698,7 +1698,7 @@\n+@@ -1733,7 +1733,7 @@\n   * This module enables the AES-CCM ciphersuites, if other requisites are\n   * enabled as well.\n   */\n@@ -183,7 +183,7 @@\n  \n  /**\n   * \\def MBEDTLS_CERTS_C\n-@@ -1710,7 +1710,7 @@\n+@@ -1745,7 +1745,7 @@\n   *\n   * This module is used for testing (ssl_client/server).\n   */\n@@ -192,7 +192,7 @@\n  \n  /**\n   * \\def MBEDTLS_CIPHER_C\n-@@ -1763,7 +1763,7 @@\n+@@ -1798,7 +1798,7 @@\n   *\n   * This module provides debugging functions.\n   */\n@@ -201,7 +201,7 @@\n  \n  /**\n   * \\def MBEDTLS_DES_C\n-@@ -1788,8 +1788,8 @@\n+@@ -1823,8 +1823,8 @@\n   *      MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA\n   *\n   * PEM_PARSE uses DES/3DES for decrypting encrypted keys.\n@@ -211,7 +211,7 @@\n  \n  /**\n   * \\def MBEDTLS_DHM_C\n-@@ -1943,8 +1943,8 @@\n+@@ -1978,8 +1978,8 @@\n   * Requires: MBEDTLS_MD_C\n   *\n   * Uncomment to enable the HMAC_DRBG random number geerator.\n@@ -221,7 +221,7 @@\n  \n  /**\n   * \\def MBEDTLS_MD_C\n-@@ -2221,7 +2221,7 @@\n+@@ -2256,7 +2256,7 @@\n   * Caller:  library/md.c\n   *\n   */\n@@ -230,7 +230,7 @@\n  \n  /**\n   * \\def MBEDTLS_RSA_C\n-@@ -2299,8 +2299,8 @@\n+@@ -2334,8 +2334,8 @@\n   * Caller:\n   *\n   * Requires: MBEDTLS_SSL_CACHE_C\n@@ -240,7 +240,7 @@\n  \n  /**\n   * \\def MBEDTLS_SSL_COOKIE_C\n-@@ -2321,8 +2321,8 @@\n+@@ -2356,8 +2356,8 @@\n   * Caller:\n   *\n   * Requires: MBEDTLS_CIPHER_C\n@@ -250,7 +250,7 @@\n  \n  /**\n   * \\def MBEDTLS_SSL_CLI_C\n-@@ -2421,8 +2421,8 @@\n+@@ -2456,8 +2456,8 @@\n   * Module:  library/version.c\n   *\n   * This module provides run-time version information.\n@@ -260,7 +260,7 @@\n  \n  /**\n   * \\def MBEDTLS_X509_USE_C\n-@@ -2532,7 +2532,7 @@\n+@@ -2567,7 +2567,7 @@\n   * Module:  library/xtea.c\n   * Caller:\n   */\n","prefixes":["LEDE-DEV"]}