Lines Matching refs:no

34      documentation did no suggest it did, making it likely for callers relying
161 peers that have middlebox compatibility enabled, as long as no
193 * Improve performance of PSA key generation with ECC keys: it no longer
211 psa_key_derivation_output_key_ext() are no longer declared when compiling
326 CMAC is enabled, but no built-in unauthenticated cipher is enabled.
411 * In the PSA API, domain parameters are no longer used for anything.
419 an RSA key as a domain parameter is no longer supported. Use
454 GCM modules no longer depend on MBEDTLS_CIPHER_C. Also,
542 the function call (i.e. no buffer parameters are in shared memory),
625 * PSA_WANT_ALG_CCM and PSA_WANT_ALG_CCM_STAR_NO_TAG are no more synonyms and
640 * RSA support in PSA no longer auto-enables the pkparse and pkwrite modules,
683 accelerator. As a result, it was possible to declare no curves as
750 if no PAKE algorithms are requested
907 * Fix CCM* with no tag being not supported in a build with CCM as the only
999 - There is no support for certificate revocation lists.
1071 Arm, so that these systems are no longer vulnerable to timing side-channel
1107 * Fix behavior of certain sample programs which could, when run with no
1179 MBEDTLS_SHA512_USE_A64_CRYPTO_*, it is no longer necessary to specify
1188 It is now no longer experimental, and implements the final version from
1220 * Some modules can now use PSA drivers for hashes, including with no
1230 all hashes only provided by drivers (no built-in hash) is to use
1360 not processed correctly by some bignum operations. Fix this. This had no
1400 * The library will no longer compile out of the box on a platform without
1647 * In mbedtls_pk_parse_key(), if no password is provided, don't allocate a
1705 * Add support for CCM*-no-tag cipher to the PSA.
1796 * Fix the build when no SHA2 module is included. Fixes #4930.
1826 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations.
1905 no longer pass the associated data to mbedtls_gcm_starts(), but to the
1920 encryption use the public key. Verification functions also no longer have
1934 possible to skip calling it, which is no longer supported.
1952 * Instead of accessing the len field of a DHM context, which is no longer
1972 Raw keys and IVs are no longer passed to the callback.
1989 * Direct access to fields of structures declared in public headers is no
1998 * Enable by default the functionalities which have no reason to be disabled.
2002 changed: curves and hashes weaker than 255 bits are no longer accepted
2019 than 3.6 are no longer supported.
2059 ciphersuites per version, which are no longer relevant. This removes the
2066 * The RSA module no longer supports private-key operations with the public
2079 MBEDTLS_REMOVE_3DES_CIPHERSUITES option which is no longer relevant.
2084 backward compatibility which is no longer supported. Addresses #4404.
2094 * MBEDTLS_ECP_MAX_BITS is no longer a configuration option because it is
2100 it no longer had any effect.
2121 mbedtls_cipher_update()) no longer requires the size of partial inputs to
2138 directly, which is no longer supported.
2212 is not defined PSA will no longer attempt to use mbedtls_rsa_gen_key().
2242 * Fix mbedtls_mpi_gcd(G,A,B) when the value of B is zero. This had no
2245 * The PSA API no longer allows the creation or destruction of keys with a
2267 * Remove configs/config-psa-crypto.h, which no longer had any intended
2270 python2, which is no longer supported upstream.
2427 mbedtls_cipher_auth_decrypt() no longer accept NIST_KW contexts,
2428 as they have no way to check if the output buffer is large enough.
2464 * In the PSA API, it is no longer necessary to open persistent keys:
2626 revocation of certificates via CRLs. Fixed by no longer checking the
2653 * Library files installed after a CMake build no longer have execute
2686 years of publishing are no longer tracked in the source files. This also
2859 * Mbed Crypto is no longer a Git submodule. The crypto part of the library
2898 existing code is that elliptic curve key types no longer encode the
2997 no known instances where this changes the behavior of the library: this is
3347 will no longer be.
3666 is no functional difference. Contributed by Angus Gratton, and also
3676 * Fix "no symbols" warning issued by ranlib when building on Mac OS X. Fix
3746 versions later than 3.6. Versions of Clang earlier than this may no longer
3915 HMAC key of a single, uninterrupted connection (with no
3975 * MD functions deprecated in 2.7.0 are no longer inline, to provide
3978 * Use (void) when defining functions with no parameters. Contributed by
4255 config-no-entropy.h to reduce the RAM footprint.
4446 * Added a configuration file config-no-entropy.h that configures the subset of
4463 * Fixed cert_app.c sample program for debug output and for use when no root
4501 * Changed the strategy for X.509 certificate parsing and validation, to no
4612 size/curve against the profile. Before that, there was no way to set a
4741 trusted, no later cert is checked. (suggested by hannes-landeholm)
4826 * pk_sign() no longer accepts md_alg == POLARSSL_MD_NONE with ECDSA.
4831 * Test certificates in certs.c are no longer guaranteed to be nul-terminated
4918 * DTLS no longer hard-depends on TIMING_C, but uses a callback interface
4922 * With UDP sockets, it is no longer necessary to call net_bind() again
5013 * ssl_set_own_cert() no longer calls pk_check_pair() since the
5092 but none of them is usable due to external factors such as no certificate
5093 with a suitable (extended)KeyUsage or curve or no PSK set.
5133 * Ciphersuites using SHA-256 or SHA-384 now require TLS 1.x (there is no
5240 ServerHello when no extensions are present (found by Matthew Page)
5271 * The notAfter date of some certificates was no longer checked since 1.3.5.
5476 * Buffer-based memory allocator added (no malloc() / free() / HEAP usage)
5548 Note: Although PolarSSL has been renamed to mbed TLS, no changes reflecting
5670 when no extensions are present (found by Matthew Page)
5731 * Fixed const correctness issues that have no impact on the ABI
6151 * Do not bail out if no client certificate specified. Try
6474 the bignum code is no longer dependent on long long