Lines Matching refs:set
76 * On entry to PSA driver entry points that set up a multipart operation
362 * Fixed a regression introduced in 3.6.0 where the CA callback set with
375 verify callbacks, set with mbedtls_ssl_set_verify() as opposed to
512 mbedtls_pk_copy_public_from_psa() provide ways to set up a PK context
619 MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS is set (#3266).
722 provided - these limitations are lifted in this version. A new set of
792 * Allow MBEDTLS_CONFIG_FILE and MBEDTLS_USER_CONFIG_FILE to be set by
1020 * Use HOSTCC (if it is set) when compiling C code during generation of the
1022 CC is set for cross compilation.
1125 have the most-significant bit set in their last byte.
1242 purposes only. This currently only supports one parameter set
1434 information that was used to set up a message digest context.
1654 variable. For backward compatibility, set CMAKE_INSTALL_LIBDIR if
1655 LIB_INSTALL_DIR is set.
1749 * Fix a parameter set but unused in psa_crypto_cipher.c. Fixes #4935.
1821 to set a callback, but was deemed unnecessary as it was yet another define
1994 mbedtls_ssl_{set,get}_session() may now only be called once for any given
2190 set with mbedtls_ssl_conf_dhm_min_bitlen() precisely. Before, the
2303 PSA_KEY_USAGE_SIGN_HASH flag is set and PSA_KEY_USAGE_VERIFY_MESSAGE flag
2304 when PSA_KEY_USAGE_VERIFY_HASH flag is set. This usage flag extension
2373 mbedtls_pk_write_key_pem(). If MBEDTLS_MPI_MAX_SIZE is set to an odd
2694 set a password for the key file provided through the existing key_file2
3488 MBEDTLS_MEMORY_BUFFER_ALLOC_C and MBEDTLS_MEMORY_BACKTRACE are set.
3564 is controlled by the maximum fragment length as set locally or negotiated
3565 with the peer, as well as by a new per-connection MTU option, set using
3702 when the request_size argument is set to 0 as stated in the documentation.
4163 * Extend cert_write example program by options to set the certificate version
4187 * Fix authentication bypass in SSL/TLS: when authmode is set to optional,
4191 triggered remotely from either side. (With authmode set to 'required'
4212 * Certificate verification functions now set flags to -1 in case the full
4215 * With authmode set to optional, the TLS handshake is now aborted if the
4372 * Fix output certificate verification flags set by x509_crt_verify_top() when
4375 set when the verification conditions are not met regardless of the cause.
4612 size/curve against the profile. Before that, there was no way to set a
4692 callbacks set with mbedtls_ssl_conf_dtls_cookies()), this will be
4798 * mbedtls_ssl_conf_ca_chain() lost its last argument (peer_cn), now set
4934 * With authmode set to SSL_VERIFY_OPTIONAL, verification of keyUsage and
4977 initialized but not set (found by pravic).
5067 * User set CFLAGS were ignored by Cmake with gcc (introduced in 1.3.9, found
5081 * On a 0-length input, base64_encode() did not correctly set output length
5093 with a suitable (extended)KeyUsage or curve or no PSK set.
5292 * dhm_parse_dhm() (hence dhm_parse_dhmfile()) did not set dhm->len.
5303 * Option to set the Curve preference order (disabled by default)
5500 dynamically set (Better support for hardware acceleration)
5580 * On a 0-length input, base64_encode() did not correctly set output length
5773 POLARSSL_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO is set
6004 SSL contexts without needing to set all non-connection-specific
6410 * Replaced realloc with malloc in mpi_grow(), and set
6463 version was not properly set), thanks to Didier Rebeix