Lines Matching refs:new

123      enable the new compile-time option
127 * Added new configuration option MBEDTLS_PSA_STATIC_KEY_SLOTS, which
227 need to enable the handling of TLS 1.3 tickets through the new
277 * When the new compilation option MBEDTLS_PSA_KEY_STORE_DYNAMIC is enabled,
314 non-existent key while concurrently creating a new key could potentially
433 * Add new mbedtls_x509_csr_parse_der_with_ext_cb() routine which allows
435 * Enable the new option MBEDTLS_BLOCK_CIPHER_NO_DECRYPT to omit
481 * The new function mbedtls_rsa_get_bitlen() returns the length of the modulus
487 * The new functions mbedtls_pk_get_psa_attributes() and
495 * The new function psa_generate_key_ext() allows generating an RSA
497 * The new function mbedtls_ecp_write_key_ext() is similar to
500 * Add new accessor to expose the private group id member of
502 * Add new accessor to expose the `MBEDTLS_PRIVATE(ca_istrue)` member of
511 * The new functions mbedtls_pk_copy_from_psa() and
514 * Add new accessors to expose the private session-id,
517 Add new accessor to expose the ciphersuite-id of
610 generating a new random after a HelloRetryRequest. Fixes #8669.
644 improvement. The new default value of MBEDTLS_MPI_WINDOW_SIZE roughly
689 * Add new millisecond time type `mbedtls_ms_time_t` and `mbedtls_ms_time()`
707 maximum size of any supported block cipher) or the new name
722 provided - these limitations are lifted in this version. A new set of
767 A new configuration option, MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH, can be
818 new implementation with a much smaller footprint, but some minor
819 usage restrictions. See the documentation of the new configuration
834 to the new functions mbedtls_pkcs5_pbes2_ext() or mbedtls_pkcs12_pbe_ext()
1040 * Add new API mbedtls_ssl_cache_remove for cache entry removal by
1044 64-bit Arm. A new configuration option, MBEDTLS_AESCE_C, can
1061 ECJPAKE key exchange, using the new API function
1168 * The C code follows a new coding style. This is transparent for users but
1258 corresponding new public API call has been added in the library,
1266 * The new functions mbedtls_asn1_free_named_data_list() and
1467 feature requirements in the file named by the new macro
1669 * You can configure groups for a TLS key exchange with the new function
1699 value is almost always a bug. Enable the new configuration option
1709 * Add new API mbedtls_ct_memcmp for constant time buffer comparison.
1782 that it produces when signing, as documented. Use the new algorithm
1787 PSA_ALG_ECDSA_ANY. The new predicate macro PSA_ALG_IS_SIGN_HASH covers
1831 * The mbedcrypto library includes a new source code module constant_time.c,
1906 new function mbedtls_gcm_update_ad().
1939 mbedtls_ssl_get_output_max_frag_len(), and add a new API
1953 supported, use the new function mbedtls_dhm_get_len() .
1971 replaced by a new API mbedtls_ssl_set_export_keys_cb().
2125 * The new function mbedtls_mpi_random() generates a random value in a
2132 * The new functions mbedtls_dhm_get_len() and mbedtls_dhm_get_bitlen()
2134 * The new function mbedtls_dhm_get_value() copy a field out of a
2136 * Use the new function mbedtls_ecjpake_set_point_format() to select the
2275 MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY with a new single unified option
2338 through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK.
2352 minimum MAC or tag length thanks to the new wildcards
2401 both the old SE interface and the new PSA driver interface, external keys were
2412 * A new library C file psa_crypto_client.c has been created to contain
2441 mbedtls_cipher_auth_decrypt() are deprecated in favour of the new
2444 these new functions always append the tag to the ciphertext, and include
2448 * Partial implementation of the new PSA Crypto accelerator APIs. (Symmetric
2602 * The new function mbedtls_ecp_write_key() exports private ECC keys back to
2635 attackers. The new countermeasure defends against local attackers, even
2714 * The new utility programs/ssl/ssl_context_info prints a human-readable
2717 * Add new mbedtls_x509_crt_parse_der_with_ext_cb() routine which allows
2813 be avoided by enabling the new option `MBEDTLS_ECP_NO_INTERNAL_RNG`.
2831 * Fix issue in DTLS handling of new associations with the same parameters
2846 * The new build option MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH automatically
2891 * The new build option MBEDTLS_SHA512_NO_SHA384 allows building SHA-512
2895 * Change the encoding of key types and curves in the PSA API. The new
3041 * Add new API functions mbedtls_ssl_session_save() and
3045 * Add a new API function mbedtls_ssl_check_record() to allow checking that
3071 * The new function mbedtls_ecdsa_sign_det_ext() is similar to
3178 through the new APIs mbedtls_ssl_conf_cid() and mbedtls_ssl_set_cid().
3233 * Add a new X.509 API call `mbedtls_x509_parse_der_nocopy()`
3237 * Add a new function mbedtls_asn1_write_named_bitstring() to write ASN.1
3244 * Add a new X.509 API call `mbedtls_x509_parse_der_nocopy()`.
3247 for the benefit of saving RAM, by disabling the new compile-time
3317 * Add a new config.h option of MBEDTLS_CHECK_PARAMS that enables validation
3328 deprecated and replaced as shown below. The new functions change
3412 * The new functions mbedtls_ctr_drbg_update_ret() and
3414 and mbedtls_hmac_drbg_update() respectively, but the new functions
3416 applications use the new functions.
3450 configured by mbedtls_ecp_set_max_ops() at runtime. It applies to the new
3476 supported are deprecated and are now replaced by the new equivalent
3565 with the peer, as well as by a new per-connection MTU option, set using
3657 * Add new crypto primitives from RFC 7539: stream cipher Chacha20, one-time
3674 * Fix compilation error on C++, because of a variable named new.
4038 * Add support for alternative implementations for ECDSA, controlled by new
4045 new configuration flags MBEDTLS_ECDH_COMPUTE_SHARED_ALT and
4051 the new configuration flag MBEDTLS_ECJPAKE_ALT.
4066 The new functions change the return type from void to int to allow
4090 accepting DHM parameters in binary form, matching the new constants.
4174 new ones with return codes. In particular, this modifies the
4202 by the user in a platform_alt.h file. These new functions are required in
4326 * Add a new configuration option to 'mbedtls_ssl_config' to enable
4332 by the functions shown below. The new functions change the return type from
4488 * Extended test coverage of special cases, and added new timing test suite.
4694 MBEDTLS_ERR_SSL_CLIENT_RECONNECT - it is then possible to start a new
4804 * The SSL debug callback gained two new arguments (file name, line number).
4821 * net_accept() gained new arguments for the size of the client_ip buffer.
4832 strings; use the new *_len variables instead of strlen().
4844 * net_connect() and net_bind() have a new 'proto' argument to choose
4913 new prototype, and mbedtls_ssl_set_read_timeout().
5058 * Added new error codes and debug messages about selection of
5135 * Ciphersuites using RSA-PSK key exchange new require TLS 1.x (the spec is
6036 * Moved all examples programs to use the new entropy and CTR_DRBG
6426 * Added new bignum import and export helper functions