forked from espressif/esp-idf
mbedtls: Expand KConfig documentation for MBEDTLS_HAVE_TIME_DATE
Original comments were copied from mbedtls config.h, so not directly applicable to ESP-IDF. As reported https://esp32.com/viewtopic.php?f=13&t=18817&p=69772#p69772
This commit is contained in:
@@ -295,24 +295,48 @@ menu "mbedTLS"
|
|||||||
when using ATECC608A cryptoauth chip (integrated with ESP32-WROOM-32SE)
|
when using ATECC608A cryptoauth chip (integrated with ESP32-WROOM-32SE)
|
||||||
|
|
||||||
config MBEDTLS_HAVE_TIME
|
config MBEDTLS_HAVE_TIME
|
||||||
bool "Enable mbedtls time"
|
bool "Enable mbedtls time support"
|
||||||
depends on !ESP_TIME_FUNCS_USE_NONE
|
depends on !ESP_TIME_FUNCS_USE_NONE
|
||||||
default y
|
default y
|
||||||
help
|
help
|
||||||
System has time.h and time().
|
Enable use of time.h functions (time() and gmtime()) by mbedTLS.
|
||||||
The time does not need to be correct, only time differences are used.
|
|
||||||
|
This option doesn't require the system time to be correct, but enables
|
||||||
|
functionality that requires relative timekeeping - for example periodic
|
||||||
|
expiry of TLS session tickets or session cache entries.
|
||||||
|
|
||||||
|
Disabling this option will save some firmware size, particularly if
|
||||||
|
the rest of the firmware doesn't call any standard timekeeeping
|
||||||
|
functions.
|
||||||
|
|
||||||
config MBEDTLS_HAVE_TIME_DATE
|
config MBEDTLS_HAVE_TIME_DATE
|
||||||
bool "Enable mbedtls certificate expiry check"
|
bool "Enable mbedtls certificate expiry check"
|
||||||
depends on MBEDTLS_HAVE_TIME
|
depends on MBEDTLS_HAVE_TIME
|
||||||
default n
|
default n
|
||||||
help
|
help
|
||||||
System has time.h and time(), gmtime() and the clock is correct.
|
Enables X.509 certificate expiry checks in mbedTLS.
|
||||||
The time needs to be correct (not necesarily very accurate, but at least
|
|
||||||
the date should be correct). This is used to verify the validity period of
|
|
||||||
X.509 certificates.
|
|
||||||
|
|
||||||
It is suggested that you should get the real time by "SNTP".
|
If this option is disabled (default) then X.509 certificate
|
||||||
|
"valid from" and "valid to" timestamp fields are ignored.
|
||||||
|
|
||||||
|
If this option is enabled, these fields are compared with the
|
||||||
|
current system date and time. The time is retrieved using the
|
||||||
|
standard time() and gmtime() functions. If the certificate is not
|
||||||
|
valid for the current system time then verification will fail with
|
||||||
|
code MBEDTLS_X509_BADCERT_FUTURE or MBEDTLS_X509_BADCERT_EXPIRED.
|
||||||
|
|
||||||
|
Enabling this option requires adding functionality in the firmware
|
||||||
|
to set the system clock to a valid timestamp before using TLS. The
|
||||||
|
recommended way to do this is via ESP-IDF's SNTP functionality, but
|
||||||
|
any method can be used.
|
||||||
|
|
||||||
|
In the case where only a small number of certificates are trusted by
|
||||||
|
the device, please carefully consider the tradeoffs of enabling this
|
||||||
|
option. There may be undesired consequences, for example if all
|
||||||
|
trusted certificates expire while the device is offline and a TLS
|
||||||
|
connection is required to update. Or if an issue with the SNTP
|
||||||
|
server means that the system time is invalid for an extended period
|
||||||
|
after a reset.
|
||||||
|
|
||||||
config MBEDTLS_ECDSA_DETERMINISTIC
|
config MBEDTLS_ECDSA_DETERMINISTIC
|
||||||
bool "Enable deterministic ECDSA"
|
bool "Enable deterministic ECDSA"
|
||||||
|
Reference in New Issue
Block a user