Lines Matching refs:no
77 documentation did no suggest it did, making it likely for callers relying
204 peers that have middlebox compatibility enabled, as long as no
236 * Improve performance of PSA key generation with ECC keys: it no longer
254 psa_key_derivation_output_key_ext() are no longer declared when compiling
369 CMAC is enabled, but no built-in unauthenticated cipher is enabled.
454 * In the PSA API, domain parameters are no longer used for anything.
462 an RSA key as a domain parameter is no longer supported. Use
497 GCM modules no longer depend on MBEDTLS_CIPHER_C. Also,
585 the function call (i.e. no buffer parameters are in shared memory),
668 * PSA_WANT_ALG_CCM and PSA_WANT_ALG_CCM_STAR_NO_TAG are no more synonyms and
683 * RSA support in PSA no longer auto-enables the pkparse and pkwrite modules,
726 accelerator. As a result, it was possible to declare no curves as
793 if no PAKE algorithms are requested
950 * Fix CCM* with no tag being not supported in a build with CCM as the only
1042 - There is no support for certificate revocation lists.
1114 Arm, so that these systems are no longer vulnerable to timing side-channel
1150 * Fix behavior of certain sample programs which could, when run with no
1222 MBEDTLS_SHA512_USE_A64_CRYPTO_*, it is no longer necessary to specify
1231 It is now no longer experimental, and implements the final version from
1263 * Some modules can now use PSA drivers for hashes, including with no
1273 all hashes only provided by drivers (no built-in hash) is to use
1403 not processed correctly by some bignum operations. Fix this. This had no
1443 * The library will no longer compile out of the box on a platform without
1690 * In mbedtls_pk_parse_key(), if no password is provided, don't allocate a
1748 * Add support for CCM*-no-tag cipher to the PSA.
1839 * Fix the build when no SHA2 module is included. Fixes #4930.
1869 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations.
1948 no longer pass the associated data to mbedtls_gcm_starts(), but to the
1963 encryption use the public key. Verification functions also no longer have
1977 possible to skip calling it, which is no longer supported.
1995 * Instead of accessing the len field of a DHM context, which is no longer
2015 Raw keys and IVs are no longer passed to the callback.
2032 * Direct access to fields of structures declared in public headers is no
2041 * Enable by default the functionalities which have no reason to be disabled.
2045 changed: curves and hashes weaker than 255 bits are no longer accepted
2062 than 3.6 are no longer supported.
2102 ciphersuites per version, which are no longer relevant. This removes the
2109 * The RSA module no longer supports private-key operations with the public
2122 MBEDTLS_REMOVE_3DES_CIPHERSUITES option which is no longer relevant.
2127 backward compatibility which is no longer supported. Addresses #4404.
2137 * MBEDTLS_ECP_MAX_BITS is no longer a configuration option because it is
2143 it no longer had any effect.
2164 mbedtls_cipher_update()) no longer requires the size of partial inputs to
2181 directly, which is no longer supported.
2255 is not defined PSA will no longer attempt to use mbedtls_rsa_gen_key().
2285 * Fix mbedtls_mpi_gcd(G,A,B) when the value of B is zero. This had no
2288 * The PSA API no longer allows the creation or destruction of keys with a
2310 * Remove configs/config-psa-crypto.h, which no longer had any intended
2313 python2, which is no longer supported upstream.
2470 mbedtls_cipher_auth_decrypt() no longer accept NIST_KW contexts,
2471 as they have no way to check if the output buffer is large enough.
2507 * In the PSA API, it is no longer necessary to open persistent keys:
2669 revocation of certificates via CRLs. Fixed by no longer checking the
2696 * Library files installed after a CMake build no longer have execute
2729 years of publishing are no longer tracked in the source files. This also
2902 * Mbed Crypto is no longer a Git submodule. The crypto part of the library
2941 existing code is that elliptic curve key types no longer encode the
3040 no known instances where this changes the behavior of the library: this is
3390 will no longer be.
3709 is no functional difference. Contributed by Angus Gratton, and also
3719 * Fix "no symbols" warning issued by ranlib when building on Mac OS X. Fix
3789 versions later than 3.6. Versions of Clang earlier than this may no longer
3958 HMAC key of a single, uninterrupted connection (with no
4018 * MD functions deprecated in 2.7.0 are no longer inline, to provide
4021 * Use (void) when defining functions with no parameters. Contributed by
4298 config-no-entropy.h to reduce the RAM footprint.
4489 * Added a configuration file config-no-entropy.h that configures the subset of
4506 * Fixed cert_app.c sample program for debug output and for use when no root
4544 * Changed the strategy for X.509 certificate parsing and validation, to no
4655 size/curve against the profile. Before that, there was no way to set a
4784 trusted, no later cert is checked. (suggested by hannes-landeholm)
4869 * pk_sign() no longer accepts md_alg == POLARSSL_MD_NONE with ECDSA.
4874 * Test certificates in certs.c are no longer guaranteed to be nul-terminated
4961 * DTLS no longer hard-depends on TIMING_C, but uses a callback interface
4965 * With UDP sockets, it is no longer necessary to call net_bind() again
5056 * ssl_set_own_cert() no longer calls pk_check_pair() since the
5135 but none of them is usable due to external factors such as no certificate
5136 with a suitable (extended)KeyUsage or curve or no PSK set.
5176 * Ciphersuites using SHA-256 or SHA-384 now require TLS 1.x (there is no
5283 ServerHello when no extensions are present (found by Matthew Page)
5314 * The notAfter date of some certificates was no longer checked since 1.3.5.
5519 * Buffer-based memory allocator added (no malloc() / free() / HEAP usage)
5591 Note: Although PolarSSL has been renamed to mbed TLS, no changes reflecting
5713 when no extensions are present (found by Matthew Page)
5774 * Fixed const correctness issues that have no impact on the ABI
6194 * Do not bail out if no client certificate specified. Try
6517 the bignum code is no longer dependent on long long