altcp_tls_mbedtls: convert #error on too small TCP_WND to warning

Many TLS use cases are OK with a small TCP_WND, so don't prevent these
by having a preprocessor check that cannot be disabled.
This commit is contained in:
Simon Goldschmidt 2018-09-12 22:24:05 +02:00
parent bbf80b05c8
commit fc24d4139f

View File

@ -85,10 +85,6 @@
#include <string.h> #include <string.h>
#if TCP_WND < MBEDTLS_SSL_MAX_CONTENT_LEN
#error TCP_WND < MBEDTLS_SSL_MAX_CONTENT_LEN, cannot receive a full decryption buffer
#endif
#ifndef ALTCP_MBEDTLS_ENTROPY_PTR #ifndef ALTCP_MBEDTLS_ENTROPY_PTR
#define ALTCP_MBEDTLS_ENTROPY_PTR NULL #define ALTCP_MBEDTLS_ENTROPY_PTR NULL
#endif #endif
@ -675,6 +671,11 @@ altcp_tls_create_config(int is_server, int have_cert, int have_pkey, int have_ca
struct altcp_tls_config *conf; struct altcp_tls_config *conf;
mbedtls_x509_crt *mem; mbedtls_x509_crt *mem;
if (TCP_WND < MBEDTLS_SSL_MAX_CONTENT_LEN) {
LWIP_DEBUGF(ALTCP_MBEDTLS_DEBUG|LWIP_DBG_LEVEL_SERIOUS,
("altcp_tls: TCP_WND is smaller than the RX decrypion buffer, connection RX might stall!\n"));
}
altcp_mbedtls_mem_init(); altcp_mbedtls_mem_init();
sz = sizeof(struct altcp_tls_config); sz = sizeof(struct altcp_tls_config);