Lines Matching refs:new

12    * The new function mbedtls_cipher_finish_padded() is similar to
166 enable the new compile-time option
170 * Added new configuration option MBEDTLS_PSA_STATIC_KEY_SLOTS, which
270 need to enable the handling of TLS 1.3 tickets through the new
320 * When the new compilation option MBEDTLS_PSA_KEY_STORE_DYNAMIC is enabled,
357 non-existent key while concurrently creating a new key could potentially
476 * Add new mbedtls_x509_csr_parse_der_with_ext_cb() routine which allows
478 * Enable the new option MBEDTLS_BLOCK_CIPHER_NO_DECRYPT to omit
524 * The new function mbedtls_rsa_get_bitlen() returns the length of the modulus
530 * The new functions mbedtls_pk_get_psa_attributes() and
538 * The new function psa_generate_key_ext() allows generating an RSA
540 * The new function mbedtls_ecp_write_key_ext() is similar to
543 * Add new accessor to expose the private group id member of
545 * Add new accessor to expose the `MBEDTLS_PRIVATE(ca_istrue)` member of
554 * The new functions mbedtls_pk_copy_from_psa() and
557 * Add new accessors to expose the private session-id,
560 Add new accessor to expose the ciphersuite-id of
653 generating a new random after a HelloRetryRequest. Fixes #8669.
687 improvement. The new default value of MBEDTLS_MPI_WINDOW_SIZE roughly
732 * Add new millisecond time type `mbedtls_ms_time_t` and `mbedtls_ms_time()`
750 maximum size of any supported block cipher) or the new name
765 provided - these limitations are lifted in this version. A new set of
810 A new configuration option, MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH, can be
861 new implementation with a much smaller footprint, but some minor
862 usage restrictions. See the documentation of the new configuration
877 to the new functions mbedtls_pkcs5_pbes2_ext() or mbedtls_pkcs12_pbe_ext()
1083 * Add new API mbedtls_ssl_cache_remove for cache entry removal by
1087 64-bit Arm. A new configuration option, MBEDTLS_AESCE_C, can
1104 ECJPAKE key exchange, using the new API function
1211 * The C code follows a new coding style. This is transparent for users but
1301 corresponding new public API call has been added in the library,
1309 * The new functions mbedtls_asn1_free_named_data_list() and
1510 feature requirements in the file named by the new macro
1712 * You can configure groups for a TLS key exchange with the new function
1742 value is almost always a bug. Enable the new configuration option
1752 * Add new API mbedtls_ct_memcmp for constant time buffer comparison.
1825 that it produces when signing, as documented. Use the new algorithm
1830 PSA_ALG_ECDSA_ANY. The new predicate macro PSA_ALG_IS_SIGN_HASH covers
1874 * The mbedcrypto library includes a new source code module constant_time.c,
1949 new function mbedtls_gcm_update_ad().
1982 mbedtls_ssl_get_output_max_frag_len(), and add a new API
1996 supported, use the new function mbedtls_dhm_get_len() .
2014 replaced by a new API mbedtls_ssl_set_export_keys_cb().
2168 * The new function mbedtls_mpi_random() generates a random value in a
2175 * The new functions mbedtls_dhm_get_len() and mbedtls_dhm_get_bitlen()
2177 * The new function mbedtls_dhm_get_value() copy a field out of a
2179 * Use the new function mbedtls_ecjpake_set_point_format() to select the
2318 MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY with a new single unified option
2381 through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK.
2395 minimum MAC or tag length thanks to the new wildcards
2444 both the old SE interface and the new PSA driver interface, external keys were
2455 * A new library C file psa_crypto_client.c has been created to contain
2484 mbedtls_cipher_auth_decrypt() are deprecated in favour of the new
2487 these new functions always append the tag to the ciphertext, and include
2491 * Partial implementation of the new PSA Crypto accelerator APIs. (Symmetric
2645 * The new function mbedtls_ecp_write_key() exports private ECC keys back to
2678 attackers. The new countermeasure defends against local attackers, even
2757 * The new utility programs/ssl/ssl_context_info prints a human-readable
2760 * Add new mbedtls_x509_crt_parse_der_with_ext_cb() routine which allows
2856 be avoided by enabling the new option `MBEDTLS_ECP_NO_INTERNAL_RNG`.
2874 * Fix issue in DTLS handling of new associations with the same parameters
2889 * The new build option MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH automatically
2934 * The new build option MBEDTLS_SHA512_NO_SHA384 allows building SHA-512
2938 * Change the encoding of key types and curves in the PSA API. The new
3084 * Add new API functions mbedtls_ssl_session_save() and
3088 * Add a new API function mbedtls_ssl_check_record() to allow checking that
3114 * The new function mbedtls_ecdsa_sign_det_ext() is similar to
3221 through the new APIs mbedtls_ssl_conf_cid() and mbedtls_ssl_set_cid().
3276 * Add a new X.509 API call `mbedtls_x509_parse_der_nocopy()`
3280 * Add a new function mbedtls_asn1_write_named_bitstring() to write ASN.1
3287 * Add a new X.509 API call `mbedtls_x509_parse_der_nocopy()`.
3290 for the benefit of saving RAM, by disabling the new compile-time
3360 * Add a new config.h option of MBEDTLS_CHECK_PARAMS that enables validation
3371 deprecated and replaced as shown below. The new functions change
3455 * The new functions mbedtls_ctr_drbg_update_ret() and
3457 and mbedtls_hmac_drbg_update() respectively, but the new functions
3459 applications use the new functions.
3493 configured by mbedtls_ecp_set_max_ops() at runtime. It applies to the new
3519 supported are deprecated and are now replaced by the new equivalent
3608 with the peer, as well as by a new per-connection MTU option, set using
3700 * Add new crypto primitives from RFC 7539: stream cipher Chacha20, one-time
3717 * Fix compilation error on C++, because of a variable named new.
4081 * Add support for alternative implementations for ECDSA, controlled by new
4088 new configuration flags MBEDTLS_ECDH_COMPUTE_SHARED_ALT and
4094 the new configuration flag MBEDTLS_ECJPAKE_ALT.
4109 The new functions change the return type from void to int to allow
4133 accepting DHM parameters in binary form, matching the new constants.
4217 new ones with return codes. In particular, this modifies the
4245 by the user in a platform_alt.h file. These new functions are required in
4369 * Add a new configuration option to 'mbedtls_ssl_config' to enable
4375 by the functions shown below. The new functions change the return type from
4531 * Extended test coverage of special cases, and added new timing test suite.
4737 MBEDTLS_ERR_SSL_CLIENT_RECONNECT - it is then possible to start a new
4847 * The SSL debug callback gained two new arguments (file name, line number).
4864 * net_accept() gained new arguments for the size of the client_ip buffer.
4875 strings; use the new *_len variables instead of strlen().
4887 * net_connect() and net_bind() have a new 'proto' argument to choose
4956 new prototype, and mbedtls_ssl_set_read_timeout().
5101 * Added new error codes and debug messages about selection of
5178 * Ciphersuites using RSA-PSK key exchange new require TLS 1.x (the spec is
6079 * Moved all examples programs to use the new entropy and CTR_DRBG
6469 * Added new bignum import and export helper functions