Lines Matching refs:optional
293 * With TLS 1.3, when a server enables optional authentication of the
301 optional authentication (required would abort the handshake with a fatal
367 optional/none authentication mode, by calling mbedtls_ssl_conf_authmode()
370 support for optional/none with TLS 1.3 as well. Note that the TLS 1.3
372 use authmode none, and to carefully check the results when using optional
1349 * Add a configuration check to exclude optional client authentication
1464 mixed-PSK. Add an optional input PSA_KEY_DERIVATION_INPUT_OTHER_SECRET
3345 that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default
3788 where an optional signature algorithms list is expected when the signature
3830 unable to parse keys which had only the optional parameters field of the
4187 * Fix authentication bypass in SSL/TLS: when authmode is set to optional,
4215 * With authmode set to optional, the TLS handshake is now aborted if the
4892 * Support for RSA_ALT contexts in the PK layer is now optional. Since is is
5327 "triple handshake" attack when authentication mode is 'optional' (the
5423 * Added optional optimization for NIST MODP curves (POLARSSL_ECP_NIST_OPTIM)
5632 "triple handshake" attack when authentication mode is optional (the