Lines Matching refs:now
80 non-default members of the union. The PSA core now ensures that this
97 as long as they had at most two trailing equal signs. They are now
108 * The function mbedtls_x509_string_to_names() now requires its head argument
117 mbedtls_ssl_handshake() now fails with
132 * MD module can now perform PSA dispatching also when
145 The library will now prevent the handshake and return
221 * A TLS handshake may now call psa_crypto_init() if TLS 1.3 is enabled.
224 * By default, the handling of TLS 1.3 tickets by the Mbed TLS client is now
226 signalled by MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET return values now
309 * MBEDTLS_ASN1_PARSE_C and MBEDTLS_ASN1_WRITE_C are now automatically enabled
398 * psa_import_key() now only accepts RSA keys in the PSA standard formats.
431 * AES-NI is now supported in Windows builds with clang and clang-cl.
442 * If a cipher or AEAD mechanism has a PSA driver, you can now build the
449 * The CTR_DRBG module will now use AES from a PSA driver if MBEDTLS_AES_C is
455 MBEDTLS_PSA_CRYPTO can now be enabled without MBEDTLS_CIPHER_C if all
480 with PKCS#5 PBES2. Keys encrypted this way can now be parsed by PK parse.
490 * The benchmark program now reports times for both ephemeral and static
519 * Mbed TLS now supports the writing and reading of TLS 1.3 early data (see
536 to PSA functions is now secure by default.
537 The PSA core now protects against modification of inputs or exposure
598 * mbedtls_pem_read_buffer() now performs a check on the padding data of
626 they are now treated separately. This means that they should be
632 * mbedtls_pk_sign_ext() is now always available, not just when
636 PSA_WANT_DH_RFC7919_XXXX. You now need to defined the corresponding macro
649 * The TLS 1.3 protocol is now enabled in the default configuration.
669 * Mbed TLS is now released under a dual Apache-2.0 OR GPL-2.0-or-later
694 * Officially require Python 3.8 now that earlier versions are out of support.
695 * Minimum required Windows version is now Windows Vista, or
701 are now being deprecated in favor of PSA_WANT_KEY_TYPE_xxx_KEY_PAIR_yyy and
710 * mbedtls_pkcs5_pbes2() and mbedtls_pkcs12_pbe() functions are now
717 * All modules that use hashes or HMAC can now take advantage of PSA Crypto
727 * When a PSA driver for ECDH is present, it is now possible to disable
741 TLS 1.3 protocols are enabled, the TLS server now selects TLS 1.2 or
744 * X.509 hostname verification now supports IPAddress Subject Alternate Names.
755 * It is now possible to generate certificates with SubjectAltNames.
760 * X.509 hostname verification now partially supports URI Subject Alternate
801 extended: it is now possible to use mbedtls_pk_write_key_der(),
805 * The documentation of mbedtls_ecp_group now describes the optimized
937 * Functions in the ssl_cache module now return a negative MBEDTLS_ERR_xxx
940 * mbedtls_pk_parse_key() now rejects trailing garbage in encrypted keys.
960 mbedtls_cipher_set_padding_mode() is now enforced. Previously, omitting
977 ssl_ciphersuites.c). The preferred cipher suite is now
981 * mbedtls_x509write_crt_set_serial() is now being deprecated in favor of
984 * PSA to mbedtls error translation is now unified in psa_util.h,
1015 * SHA224_C/SHA384_C are now independent from SHA384_C/SHA512_C respectively.
1032 * When a PSA driver for ECDSA is present, it is now possible to disable
1047 * When a PSA driver for EC J-PAKE is present, it is now possible to disable
1054 * AES-NI is now supported with Visual Studio.
1055 * AES-NI is now supported in 32-bit builds, or when MBEDTLS_HAVE_ASM
1060 * It is now possible to use a PSA-held (opaque) password with the TLS 1.2
1077 timing side-channel attacks. There is now an intrinsics-based AES-NI
1100 * mbedtls_x509write_crt_set_serial() now explicitly rejects serial numbers
1102 forbidden by the standard (RFC5280 - section 4.1.2.2) and now it's being
1118 mbedtls_oid_get_numeric_string(). OIDs such as 2.40.0.25 are now printed
1128 * Fix the handling of renegotiation attempts in TLS 1.3. They are now
1155 defined, mbedtls_pk_sign() now use deterministic ECDSA for ECDSA
1162 - now it accepts the serial number in 2 different formats: decimal and
1180 compiler target flags on the command line; the library now sets target
1188 It is now no longer experimental, and implements the final version from
1201 from a release, the Python module jsonschema is now necessary, in
1220 * Some modules can now use PSA drivers for hashes, including with no
1222 - RSA OAEP and PSS (PKCS#1 v2.1), PKCS5, PKCS12 and EC J-PAKE now use
1224 - PEM parsing of encrypted files now uses MD-5 from PSA when (and only
1229 the entropy module. As a consequence, for now the only way to build with
1232 * When MBEDTLS_USE_PSA_CRYPTO is enabled, X.509, TLS 1.2 and TLS 1.3 now
1234 As a consequence, they now work in configurations where the built-in
1250 * Mbed TLS now supports TLS 1.3 key establishment via pre-shared keys.
1262 * The PSA driver wrapper generator generate_driver_wrappers.py now
1269 * The TLS 1.2 EC J-PAKE key exchange can now use the PSA Crypto API.
1354 serial numbers are now rendered in hex format. Fixes #6262.
1384 ChaCha20+Poly1305) now returns MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE
1395 * mbedtls_cipher_set_iv will now fail with ChaCha20 and ChaCha20+Poly1305
1418 TLS 1.3 handshake should now be configured with
1426 * The structures mbedtls_ssl_config and mbedtls_ssl_context now store
1442 * The X.509 module now uses PSA hash acceleration if present.
1478 now capable of negotiating another shared secret if the one sent in its
1481 TLS 1.3 protocols are enabled in the build of Mbed TLS, the TLS client now
1493 now causes most of them to be done using PSA Crypto; see
1495 * The function mbedtls_pk_setup_opaque() now supports RSA key pairs as well.
1496 Opaque keys can now be used everywhere a private key is expected in the
1500 previously only worked for "pure" PSK key exchange, now can also be used
1502 * cmake now detects if it is being built as a sub-project, and in that case
1562 * The TLS 1.3 implementation is now compatible with the
1592 * psa_raw_key_agreement() now returns PSA_ERROR_BUFFER_TOO_SMALL when
1617 connection identifier, the Mbed TLS client now properly sends the server
1640 * The file library/psa_crypto_driver_wrappers.c is now generated
1651 DLLs are now installed in the bin directory instead of lib.
1781 This algorithm now accepts only the same salt length for verification
1784 * The existing predicate macro name PSA_ALG_IS_HASH_AND_SIGN is now reserved
1802 * The key usage flags PSA_KEY_USAGE_SIGN_MESSAGE now allows the MAC
1804 * The key usage flags PSA_KEY_USAGE_VERIFY_MESSAGE now allows the MAC
1816 postponed until now.
1837 * The generated configuration-independent files are now automatically
1892 mbedtls_sha256_finish and mbedtls_sha256 now has a pointer type
1899 now takes extra output parameters for the last partial output block.
1900 mbedtls_gcm_update() now takes extra parameters for the output length.
1919 decryption functions now always use the private key and verification and
1931 mbedtls_cipher_finish() is now mandatory. Previously the documentation
1936 instead of computing tables in runtime. Thus, this option now increase
1946 * mbedtls_rsa_init() now always selects the PKCS#1v1.5 encoding for an RSA
1948 after initializing the context. mbedtls_rsa_set_padding() now returns an
1955 mbedtls_xxx() now return int instead of void, and the corresponding
1960 parameter, this parameter is now mandatory (that is, NULL is not an
1961 acceptable value). Functions which previously accepted NULL and now
1966 * The following functions now require an RNG parameter:
1973 Further, callbacks now receive an additional parameter
1977 context are now connection-specific.
1978 * Signature functions in the RSA and PK modules now require the hash
1984 mbedtls_ecdsa_write_signature_restartable() now take an extra parameter
1992 "Most structure fields are now private".
1994 mbedtls_ssl_{set,get}_session() may now only be called once for any given
2003 by default. The default order in TLS now favors faster curves over larger
2007 * The library now uses the %zu format specifier with the printf() family of
2012 release, some configuration-independent files are now generated at build
2095 now determined automatically based on supported curves.
2123 * The multi-part GCM interface now supports chunked associated data through
2169 * PSA functions creating a key now return PSA_ERROR_INVALID_ARGUMENT rather
2175 * PSA functions other than psa_open_key now return PSA_ERROR_INVALID_HANDLE
2232 implementations. This reliance is now removed. Fixes #3990.
2247 can now only be used as intended, for keys that cannot be modified through
2263 * Alternative implementations of CMAC may now opt to not support 3DES as a
2280 mbedtls_mpi_read_string() now construct an mbedtls_mpi object with 0 limbs
2284 now writing an empty string where it previously wrote one or more
2312 * The API glue function mbedtls_ecc_group_of_psa() now takes the curve size
2320 as always 0. It is now reserved for internal purposes and may take
2332 * The PSA crypto subsystem can now use HMAC_DRBG instead of CTR_DRBG.
2337 MBEDTLS_ECP_xxx_ALT accelerator hooks are in use can now be turned off
2339 * The PSA crypto subsystem can now be configured to use less static RAM by
2344 now use an external random generator instead of the library's own
2348 applications using TLS and MBEDTLS_USE_PSA_CRYPTO) can now use the PSA
2416 now uses the getrandom syscall instead of reading from /dev/urandom.
2465 operations now accept the key identifier. The type psa_key_handle_t is now
2526 * mbedtls_ecp_curve_list() now lists Curve25519 and Curve448 under the names
2546 * psa_set_key_id() now also sets the lifetime to persistent for keys located
2548 * Attempting to create a volatile key with a non-zero key identifier now
2552 range now fails.
2659 APIs. psa_import_key and psa_export_key will now correctly expect/output
2667 * PSA key import will now correctly import a Curve25519/Curve448 public key
2685 the copyright of contributors other than Arm is now acknowledged, and the
2786 * Fix warnings about signedness issues in format strings. The build is now
2804 dropped. As a consequence, the TLS handshake now fails when the output
2806 * The unit tests now rely on header files in framework/tests/include/test and source
2810 * The ECP module, enabled by `MBEDTLS_ECP_C`, now depends on
2956 * Key derivation inputs in the PSA API can now either come from a key object
2967 key derivation function, use a buffer instead (this is now always
2986 mbedtls_hmac_drbg_set_entropy_len() now work if you call them before
2992 * psa_close_key(0) and psa_destroy_key(0) now succeed (doing nothing, as
2994 * Variables containing error codes are now initialized to an error code
3065 * The HAVEGE state type now uses uint32_t elements instead of int.
3066 * The functions mbedtls_ecp_curve_list() and mbedtls_ecp_grp_id_list() now
3079 is now deprecated.
3135 code and tests are now only available via Mbed Crypto, which
3153 * It is now possible to use NIST key wrap mode via the mbedtls_cipher API.
3157 * It is now possible to perform RSA PKCS v1.5 signatures with RIPEMD-160 digest.
3311 * Ciphersuites based on 3DES now have the lowest priority by default when
3343 parameter validation whereas other modules had little. This has now been
3345 that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default
3476 supported are deprecated and are now replaced by the new equivalent
3803 mbedtls_ecdh_compute_shared()) are supported for now. Contributed by
3903 * The truncated HMAC extension now conforms to RFC 6066. This means
3905 HMAC extension, Mbed TLS can now interoperate with other
4212 * Certificate verification functions now set flags to -1 in case the full
4215 * With authmode set to optional, the TLS handshake is now aborted if the
4442 scripts, which is also now called by all.sh.
4551 * Fix non-compliance server extension handling. Extensions for SSLv3 are now
4611 * mbedtls_x509_crt_verify(_with_profile)() now also checks the key type and
4736 * The PEM parser now accepts a trailing space at end of lines (#226).
4737 * It is now possible to #include a user-provided configuration file at the
4766 You now need to link to all of them if you use TLS for example.
4775 * Headers are now found in the 'mbedtls' directory (previously 'polarssl').
4798 * mbedtls_ssl_conf_ca_chain() lost its last argument (peer_cn), now set
4802 * On server, mbedtls_ssl_conf_session_tickets_cb() must now be used in
4806 * mbedtls_ssl_conf_truncated_hmac() now returns void.
4807 * mbedtls_memory_buffer_alloc_init() now returns void.
4808 * X.509 verification flags are now an uint32_t. Affect the signature of:
4822 * In the threading layer, mbedtls_mutex_init() and mbedtls_mutex_free() now
4834 mbedtls_pk_parse_public_key() and mbedtls_dhm_parse_dhm() now expect the
4837 * calloc() is now used instead of malloc() everywhere. API of platform
4841 (support for renegotiation now needs explicit enabling in config.h).
4862 * Configuration options POLARSSL_HAVE_LONGLONG was removed (now always on).
4886 * The default minimum TLS version is now TLS 1.0.
4887 * RC4 is now blacklisted by default in the SSL/TLS layer, and excluded from the
4889 * Support for receiving SSLv2 ClientHello is now disabled by default at
4891 * The default authmode for SSL/TLS clients is now REQUIRED.
4892 * Support for RSA_ALT contexts in the PK layer is now optional. Since is is
4896 * A minimum RSA key size of 2048 bits is now enforced during ceritificate
4898 * Negotiation of truncated HMAC is now disabled by default on server too.
4899 * The following functions are now case-sensitive:
4907 * The minimum MSVC version required is now 2010 (better C99 support).
4908 * The NET layer now unconditionnaly relies on getaddrinfo() and select().
4914 * The following functions now return void:
4926 * mbedtls_ctr_drbg_random() and mbedtls_hmac_drbg_random() are now
4957 speed and RAM (heap only for now) usage.
5010 * Adjusting/overriding CFLAGS and LDFLAGS with the make build system is now
5050 * Support for renegotiation can now be disabled at compile-time
5075 * ssl_get_verify_result() now works even if the handshake was aborted due
5088 * ssl_set_own_cert() now returns an error on key-certificate mismatch.
5090 * debug_print_buf() now prints a text view in addition to hexadecimal.
5091 * A specific error is now returned when there are ciphersuites in common
5094 * It is now possible to disable negotiation of truncated HMAC server-side
5096 * Example programs for SSL client and server now disable SSLv3 by default.
5097 * Example programs for SSL client and server now disable RC4 by default.
5133 * Ciphersuites using SHA-256 or SHA-384 now require TLS 1.x (there is no
5139 * ssl_read() now returns POLARSSL_ERR_NET_WANT_READ rather than
5141 * POLARSSL_MPI_MAX_SIZE now defaults to 1024 in order to allow 8192 bits
5158 * Blowfish in the cipher layer now supports variable length keys.
5173 * md_list() now returns hashes strongest first
5174 * Selection of hash for signing ServerKeyExchange in TLS 1.2 now picks
5176 * All public contexts have _init() and _free() functions now for simpler
5228 * AES-NI now compiles with "old" assemblers too
5229 * Ciphersuites based on RC4 now have the lowest priority by default
5241 * rsa_check_pubkey() now allows an E up to N
5262 * x509_crt_info() now prints information about parsed extensions as well
5263 * pk_verify() now returns a specific error code when the signature is valid
5311 * Entropy module now supports seed writing and reading
5316 now thread-safe if POLARSSL_THREADING_C defined
5371 * ssl_mail_client now terminates lines with CRLF, instead of LF
5398 * Curves are now stored fully in ROM
5405 * SSL now gracefully handles missing RNG
5427 * Padding checks in cipher layer are now constant-time
5428 * Value comparisons in SSL layer are now constant-time
5504 * Client and server now filter sent and accepted ciphersuites on minimum
5512 * x509_crt_verify() now case insensitive for cn (RFC 6125 6.4)
5574 * ssl_get_verify_result() now works even if the handshake was aborted due
5611 * ssl_read() now returns POLARSSL_ERR_NET_WANT_READ rather than
5617 * Entropy module now supports seed writing and reading
5644 * SSL now gracefully handles missing RNG
5654 * ssl_mail_client now terminates lines with CRLF, instead of LF
5671 * rsa_check_pubkey() now allows an E up to N
5696 * x509_verify() now case insensitive for cn (RFC 6125 6.4)
5732 * x509parse_crt() now better handles PEM error situations
5733 * ssl_parse_certificate() now calls x509parse_crt_der() directly
5736 * x509parse_crtpath() is now reentrant and uses more portable stat()
5750 * Default Blowfish keysize is now 128-bits
5774 * The SSL session cache module (ssl_cache) now also retains peer_cert
5825 * Depth that the certificate verify callback receives is now numbered
5890 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
5896 * mpi_add_abs() now correctly handles adding short numbers to long numbers
5921 * x509parse_crt() now better handles PEM error situations
5922 * ssl_parse_certificate() now calls x509parse_crt_der() directly
5952 * mpi_add_abs() now correctly handles adding short numbers to long numbers
5956 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
6024 So now there is a module that is controlled with POLARSSL_ASN1_PARSE_C.
6041 * All error codes are now negative. Even on mermory failures and IO errors.
6052 * If certificate serial is longer than 32 octets, serial number is now
6065 * The generic cipher and message digest layer now have normal error
6077 * Functions requiring File System functions can now be disabled
6090 * mpi_init() and mpi_free() now only accept a single MPI
6093 is now done with a PLUS instead of an OR as error codes
6096 net_recv() now returns 0 on EOF instead of
6101 * Network functions now return POLARSSL_ERR_NET_WANT_READ or
6115 * Debug print of MPI now removes leading zero octets and
6122 * Debug output of MPI's now the same independent of underlying
6134 are now supported as well (Fixes ticket #5)
6210 * rsa_check_private() now supports PKCS1v2 keys as well
6230 * X509 signature algorithm determination is now
6249 * Coverage test definitions now support 'depends_on'
6251 * Tests requiring specific hashing algorithms now honor
6322 * Undefining POLARSSL_HAVE_ASM now also handles prevents asm in
6432 * Ciphers used in SSL/TLS can now be disabled at compile