Lines Matching full:sha
429 * Support Armv8-A Crypto Extension acceleration for SHA-256
589 * On Linux on ARMv8, fix a build error with SHA-256 and SHA-512
765 * Add SHA-3 family hash functions.
1218 Only the ECC primitive with secp256r1 curve and SHA-256 hash algorithm
1474 * Add support for the ARMv8 SHA-2 acceleration instructions when building
1894 when outputting a SHA-384 or SHA-224 hash into a buffer of exactly
2024 certificates signed with SHA-1 due to the known attacks against SHA-1.
2025 If needed, SHA-1 certificates can still be verified by using a custom
2201 when SHA-1 was disabled and was offered when SHA-1 was enabled but SHA-384
2203 * Do not offer SHA384 cipher suites when SHA-384 is disabled. Fixes #4499.
2216 implementations of the underlying hash (SHA-1, SHA-256, SHA-384), causing
2361 length, or when the entropy module uses SHA-256 and CTR_DRBG uses AES-256.
2891 * The new build option MBEDTLS_SHA512_NO_SHA384 allows building SHA-512
2892 support without SHA-384.
3121 * Replace multiple uses of MD2 by SHA-256 in X.509 test suite. Fixes #821.
3214 * Server's RSA certificate in certs.c was SHA-1 signed. In the default
3215 mbedTLS configuration only SHA-2 signed certificates are accepted.
3219 updated to one that is SHA-256 signed. Fix contributed by
3340 ECJPAKE, SHA, Chacha20 and Poly1305, cipher, pk, RSA, and MPI.
3463 that comply with FIPS 186-4, including SHA-512 with a 1024-bit key.
3624 * Fix a vulnerability in TLS ciphersuites based on CBC and using SHA-384,
3632 or CCM instead of CBC, using hash sizes other than SHA-384, or using
3634 caused by a miscalculation (for SHA-384) in a countermeasure to the
3641 targeting an internal MD/SHA buffer. With TLS or if
3927 * Extend PKCS#8 interface by introducing support for the entire SHA
4099 renegotiated handshakes would only accept signatures using SHA-1
4100 regardless of the peer's preferences, or fail if SHA-1 was disabled.
4181 * Add explicit warnings for the use of MD2, MD4, MD5, SHA-1, DES and ARC4
4268 * Removed SHA-1 and RIPEMD-160 from the default hash algorithms for
4269 certificate verification. SHA-1 can be turned back on with a compile-time
4928 * Reduced ROM fooprint of SHA-256 and added an option to reduce it even
4998 * Add missing dependency on SHA-256 in some x509 programs (reported by
5015 * Move from SHA-1 to SHA-256 in example programs using signatures
5052 * Certificate selection based on signature hash, preferring SHA-1 over SHA-2
5133 * Ciphersuites using SHA-256 or SHA-384 now require TLS 1.x (there is no
5134 standard defining how to use SHA-2 with SSL 3.0).
5306 * Ability to force the entropy module to use SHA-256 as its basis
6262 Base64, MPI, SHA-family, MD-family, HMAC-SHA-family,
6303 * Fixed missing functionality for SHA-224, SHA-256, SHA384,
6304 SHA-512 in rsa_pkcs1_sign()
6310 * Added support for SHA-224, SHA-256, SHA-384 and SHA-512
6380 HMAC-MD5, HMAC-SHA1, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512
6381 * Fixed HMAC-SHA-384 and HMAC-SHA-512 (thanks to Josh Sinykin)
6422 * Added the SHA-224, SHA-384 and SHA-512 hash functions